Cisco Software Defined Access (SDA) : High-Level Design (HLD)
Cisco Software Defined Access (SDA) : High-Level Design (HLD)
Content
SDA HLD © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 49
Introduction..................................................................................................................................................................................................................... 4
SDA Partner Resource Center.................................................................................................................................................................................... 4
SDA Design Engineers.............................................................................................................................................................................................. 4
Document Purpose..................................................................................................................................................................................................... 4
Why is Completing the HLD is recommended Prior to Placing the Order?................................................................................................................4
Business Objectives......................................................................................................................................................................................................... 5
Customer’s Business Goals........................................................................................................................................................................................ 5
Estimated Timelines........................................................................................................................................................................................................ 6
Business Intent........................................................................................................................................................................................................... 7
Scope & Scale............................................................................................................................................................................................................ 8
Miscellaneous............................................................................................................................................................................................................ 9
Customer Network Overview........................................................................................................................................................................................ 10
Physical Network Topology..................................................................................................................................................................................... 10
Design Considerations and Scope................................................................................................................................................................................. 12
Cisco Software Defined Access solution.................................................................................................................................................................. 12
Cisco DNA Center 1.2.10.............................................................................................................................................................................................. 13
Network Connectivity................................................................................................................................................................................................... 15
Network Connectivity Services................................................................................................................................................................................ 15
Network Connectivity: Wired Connections..............................................................................................................................................................17
Network Connectivity: Underlay and Overlay......................................................................................................................................................... 20
Network Connectivity: Wireless.............................................................................................................................................................................. 22
Network Connectivity: Transit................................................................................................................................................................................. 23
Policy............................................................................................................................................................................................................................ 25
Policy: Overview..................................................................................................................................................................................................... 25
Policy: General........................................................................................................................................................................................................ 26
Policy: Macro and Micro Segmentation................................................................................................................................................................... 27
Policy: Cisco Identity Services Engine.................................................................................................................................................................... 28
Cisco SDA Design Guidance........................................................................................................................................................................................ 34
Very Small Design................................................................................................................................................................................................... 34
Small Design............................................................................................................................................................................................................ 36
Medium Design........................................................................................................................................................................................................ 36
Large Design............................................................................................................................................................................................................ 37
Cisco DNAC Ports........................................................................................................................................................................................................ 39
Cisco DNAC Node Communications.......................................................................................................................................................................39
Cisco DNA Center 1.2.10 Scale.................................................................................................................................................................................... 40
Cisco SDA Supported Latency...................................................................................................................................................................................... 41
Latency Requirements (RTT)................................................................................................................................................................................... 41
Cisco SDA Supported Wired Platforms........................................................................................................................................................................ 42
Fabric Edge, Border and Control Plane.................................................................................................................................................................... 42
Cisco SDA Supported Wireless Platforms..................................................................................................................................................................... 43
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 49
FEW and OTT......................................................................................................................................................................................................... 43
Policy Details................................................................................................................................................................................................................ 44
Deployment Details....................................................................................................................................................................................................... 47
Unknowns................................................................................................................................................................................................................ 47
High Availability..................................................................................................................................................................................................... 47
Migration................................................................................................................................................................................................................. 47
ISE Node details...................................................................................................................................................................................................... 47
Bill of Materials (BOM)................................................................................................................................................................................................ 49
Appendix....................................................................................................................................................................................................................... 50
SDA Partner Resource Center.................................................................................................................................................................................. 50
SDA Ordering Guide............................................................................................................................................................................................... 50
SDA CVD Documents............................................................................................................................................................................................. 50
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 49
Introduction
Document Purpose
This document provides a template to be used when creating a high-level design (HLD) for the Cisco Software
Define Access (SDA). The Cisco TAC or Enterprise Business Unit representatives may request a copy of the
HLD with any support or escalation case.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 49
Business Objectives
Customer’s Business Goals
Describe the customer’s business goals. Consider the following example business goals:
● Simplify my network operations by using automation, there are many challenges today in managing the
network because of manual configuration and fragmented tool offerings.
● Faster change management, standard operational activities in running a network e.g. upgrade software and
configurations periodically
● Provide faster resolution to current issues, whenever a failure occurs provide visibility for pinpointing and
resolving the issue. properly correlate collected data to understand the various contexts of network and
user behaviors
● Get visibility in to users and devices connecting to the network -- Profiling for visibility or inventory
management
● Implement a consistent policy for Wired and Wireless networks by providing role-based access control
and segmentation for East-West as well as North-South traffic.
● Differentiation of service based on user identity, device type, location etc …
● Regulatory compliance
● Providing guest access
● Managing employee-provided devices (e.g., iPads)
● Port lockdown
● Ensuring endpoint health or posture
● Other
The details provided in later sections of this HLD should reflect the business objectives stated here.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 49
Estimated Timelines
Number of
Phase endpoints Begin End Comments
Lab testing and qualification N/A
Final Design Review call with Cisco SME N/A Earliest target date for Latest target date for May also occur after
review call review call initial pilot/POC phase
Production phase 1 (pilot)
Production phase 2
Production phase 3
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 49
Business Intent
Deployment Summary Response
What are the Top Priorities? Please check or add to the list to Network Automation
the right): Wired and Wireless Mobility
Policy and Segmentation
Assurance and Analytics
What types of Access Control? Identity (MS AD, LDAP, Duo, etc ..)
Access Control
Asset Visibility
Access Control (EAP, MSCHAP ..)
Guest Access
BYOD & Enterprise
Segmentation
Firewalls
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 49
Scope & Scale
Describe the Scope of the project, number and types of sites the customer has, while describing the scope,
consider the following items
● Expansion plan
● Sites which will participate in POC or Pilot
● Overall coverage will help in designing Cisco DNAC and Cisco ISE design for the customer
Are the Sites Existing or New? Incremental (Custom LAN, WLAN + SDA Overlay)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 49
Miscellaneous
Deployment Summary Response
Other Integrations ETA External Integrations
Radius Proxy Cisco Stealth Watch
Other Use Cases:
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 49
Customer Network Overview
Physical Network Topology
Insert a high-level network diagram showing the SDA Design, placement of Edge, Border and Control nodes,
Wireless LAN Controllers and show placement of network services such as DHCP Server, Active
Directory/LDAP, DNS servers, NTP servers, and VPN concentrators. This should include number of sites and/
or branch networks and data centers. Include the general number of endpoint and types per location. Include
placement of SDA components like Cisco DNAC, Cisco Identity Services Engine and others. Include WAN
bandwidth information.
Bandwidth and latency requirements between various components on the DSA architecture are outlined in the
“Cisco SDA Supported Latency” section of this document.
Note: When ISE is deployed in a distributed environment, the maximum latency between admin node and any
other ISE node including secondary admin, MnT, and PSN is 300ms. Here is link to the WAN bandwidth
calculator for ISE deployment (May need to copy & paste the url https://community.cisco.com/t5/security-
documents/ise-latency-and-bandwidth-calculators/ta-p/3641112). This calculator can be used to find out how
much bandwidth needs to be reserved for ISE operation across WAN links.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 49
Customer’s Physical Network Topology
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 49
Design Considerations and Scope
Cisco Software Defined Access solution
The recommended way to design an SDA Fabric is to logically separate the Network Connectivity with the Policy design. Customers
could be the same team for network design and policy design or could be separate team functions where running the network
operations is responsibility of the NetOps (network operations) team and Policy design is handled by the SecOps security operations)
team.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 49
Cisco DNA Center 1.2.10
Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise, your
overall solution scale is driven by Cisco DNAC.
Question Response
Cisco DNAC: Placement
Where is Cisco DNAC placed?
DNAC now supports VIP (required), even if it’s a single Cisco DNAC server/
appliance
Please refer to the DNAC Ports requirements in this document “Cisco DNAC Node
Communications”
DNAC HA requires 3-nodes. All DNAC should be in same DC, since the latency is
10ms (1-hop away)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 49
Question Response
Automation vs Assurance: Automation can be Active-Active, whereas Assurance is
Active-Passive.
When running DNAC with 2 nodes, HA is not supported but the servers can be
deployed in a cold stand-by mode.
Current Cisco DNAC Disaster Recovery offering is to restore the last known
configuration to the DR site
Brownfield Customers
Question Response
Prime
Is the customer using prime today?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 49
Network Connectivity
Connection Network Services should be done first because the location of these services and how they are accessed will directly
impact the design of all of the subsequent stages.
Fabric enabled network requirement is for your DHCP Server to support Option 82.
In summary Option-82 Remote-ID Sub Option:Stringencodedas “SRLOCIPv4
address" and "VxLANL3 VNI ID" associated with Client segment
Where are the servers located, what are the OS / Apps, Are there
VRFs, etc.?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 49
Question Response
IPAM Model: IP address management
External or Manual, What are the IP Pools for Hosts, for Devices, Are there VRFs,
etc.?
Miscellaneous
Multicast / Broadcast?
Voice / Video (Collaboration)?
Client Services (mDNS)?
Data Collection (SPAN/Netflow)?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 49
Network Connectivity: Wired Connections
This stage is focused on building out the “wired” infrastructure, which will interconnect all of the other
elements
Wired Connection should be done second because how the physical infrastructure is setup will directly impact
the design of the wireless & transit stages.
This includes question on Fabric Edges (access layer switches).
Question Response
Network Connections: LAN Switches
Are there 1-2-3 Tiers? Border, CP, Edge? What is the scale? Do we
need HA, etc.?
What are the other domains? What protocols? What is the scale? Do
we need HA, etc.?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 49
Question Response
Are there VRFs? IP vs. SGT based rules? What is the scale? Do we
need HA, etc.?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 49
Network Connectivity: Underlay and Overlay
This stage is focused on building Underlay and Overlay for the fabric. let’s look at a combined packet when it
gets across the Fabric i.e. underlay and overlay encapsulation.
We can also take a high-level look at the function for an overlay and underlay
In summary, Overlay networks in data center fabrics are commonly used to provide Layer 2 and Layer 3 logical
networks with virtual machine mobility (examples: Cisco ACI™, VXLAN/EVPN, and FabricPath). Overlay
networks are also used in wide-area networks to provide secure tunneling from remote sites (examples: MPLS,
DMVPN, and GRE).
Question Response
Wired - Underlay
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 49
Question Response
What type of Underlay?
Wired - Underlay
YES – Internal
NO – External Border
This stage is focused on building the “wireless” on top of the wired infrastructure.
Wireless Connection should be done third because the placement of WLCs and APs will be based on the wired
infrastructure and client scale.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 49
Question Response
Wireless - WLAN Controllers
How many APs? How many SSIDs? Do we need HA? FEW vs.
OTT, etc.?
Maximum supported is 20 ms
Refer to the “SDA Latency” Section
Do they want FEW? Do they need OTT or Mixed? Cisco or 3rd Party
OTT, etc.?
Wireless - FEW
Wireless - AirOS
Wireless - Guest
Guest Wireless?
Simple -- Guest VN
Dedicated -- Guest VN + Dedicated Border
NO – No considerations
CT8540 -- Large
CT5520 -- Medium
CT3540 – Small
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 49
Question Response
EIGRP, OSPF, ISIS – IGP + AF + Distribute-List
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 49
Policy
Policy: Overview
List all security policies that are needed to implement the business requirements described above.
Macro/ Micro Segmentation: Provide details on device segmentation policy using Virtual networks (VN) for
Macro Segmentation and (if required) Scalable Groups (SG) for Micro Segmentation.
Recommendation is to use Macro Segmentation for users and devices which typically do not talk to each other,
some of the Macro segmentation use cases are
●Virtual Network A = USERS
● Virtual Network B = THINGS
● Virtual Network C = GUESTS
Now, for segmentation with-in the VN, recommendation is to use Micro Segmentation.
Question Response
Segmentation: Macro vs Micro
Please see SD-Access CVD for details on Micro and Macro Segmentation
May need to copy and Paste URL
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/CVD-Software-
Defined-Access-Design-Sol1dot2-2018DEC.pdf
Please explain if you are not planning on deploying the Micro Segmentation.
Policy: General
Question Response
Policy: General
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 49
Question Response
What type of Policies?
• Access Control?
• Quality of Service?
• Policy Routing?
• IDS/IPS
Policy: General
Policy: General
Policy: General
Policy: General
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 49
Policy: Macro and Micro Segmentation
Question Response
Segmentation: Macro Segmentation
Separate Departments
Secure Areas
Partners/Contractors
Guest Network
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 49
Policy: Cisco Identity Services Engine
This section covers the AAA server (Authentication, Authorization & Accounting), there are many functions of
a AAA Server in the Fabric, some of which are:
● Host on-boarding – Assigning users and endpoints VN’s and VN’s to land in the correct VN.
● Authentication Policy – Secure connections for user and clients (802.1x, MAB, WebAuth etc …)
● Authorization Policy – In addition to assigning VLANs, VN’s, this step can also assign a Scalable Group
(SGT) to the endpoint to enable Micro Segmentation with-in a VN.
Question Response
Topology Specifics -- Network Access Devices
Provide the general switch/controller model numbers/platforms deployed and Cisco
IOS and AireOS Software versions to be deployed to support ISE design.
Please see ISE Component Compatibility Document for the recommended
IOS and AireOS versions
Please explain if you are not planning on deploying the versions listed in the
ISE compatibility document.
EndPoint Types
What are the general client types deployed (Please provide service pack details for
Windows and OS types for MacOSX)?
● Will 3rd party Mobile Device Management (MDM) be integrated with ISE? 3rd party MDM Vendor:
● If already using 3rd party Mobile Device Management (MDM) or planning to
use MDM please note the vendor and version as well as brief description on how Windows Versions
it will integrate with ISE Windows XP: Windows Vista:
◦ Please see Cisco ISE – MDM Partner Integration guide for supported MDM Windows 7: Windows 8/8.1:
vendor for integration and supported versions Supplicant Type
● Are mobile devices corporate- or employee-owned assets? Windows Native AnyConnect NAM
● Will user access policy be based on device type (for example, laptop versus 3rd Party supplicant:
iPad)? If so, will machine auth or profiling or static MAC assignments be used Other User EndPoint Types
to distinguish device types? Mac OSX: iDevice:
● Please note how many of the concurrent endpoints will utilize MDM Android: Linux:
information during authorization from ISE Other EndPoint Types:
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 49
Question Response
Non-User EndPoint Types
Note: For domain joined Windows machines to function properly, machine Wireless AP: IP Phone:
authentication is recommended. Performing user only authentication may break Printer/Fax/Etc: HVAC:
critical functions such as machine GPO and other background services such as Medical: SCADA:
backup and software push. Other:
Note: State whether the customer is using machine or user authentication, or both. If
both machine and user authentication are planned, are Machine Access Restrictions
(MAR) planned? If so, review the Appendix information on MAR caveats.
For machine / user authentication details, please refer to 802.1X Authenticated
Wired and Wireless Access
ID Stores
[EAP and ID Store Compatibility Reference]
List the internal and external ID stores the customer will use for different use cases.
Note: For Sponsored or Self-Service Guests, ID store is always ISE guest users
database
Note: AD Site & Services is recommended for ISE subnets for all forests. For more
information regarding multi-AD support, please refer to ISE 1.3 Multi-AD how-to
guide
Web Authentication
● Will WebAuthuth be used?
● Will WebAuth be used for wired, wireless, or both?
● Will Local Web Auth (LWA) or Central Web Auth (CWA) be used?
● Where will the web portal be hosted?
Note: If deploying CWA the portal must be hosted by ISE. If deploying LWA
the portal can be local to access device, or external (such as ISE).
● Will web auth be used for guest access? Will web auth be used for non-guests
(for example, employees)?
Note: For more information on CWA and LWA support on different platforms,
please refer to ISE Component Compatibility Document
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 49
Question Response
Authorization
Describe the enforcement types used. Consider the following options:
● VLANs
● ACLs (dACL for wired /named ACL for wireless)
● Security group tags/ACLs (SGTs/SGACLs)
dACL considerations:
● Cisco Catalyst switches support the wire−rate access control list (ACL) with use
of the ternary content addressable memory (TCAM). If the TCAM is exhausted,
the packets may be forwarded via the CPU path, which can decrease
performance for those packets. It is recommended to limit the number of Access
Control Entries (ACE) to prevent potential TCAM exhaustion.
● Using IP SourceGuard feature or QoS feature may also affect the TCAM
utilization
VLAN considerations:
● Consider the use case for why VLAN enforcement is used and estimate the
number of VLANS required.
● To authorize an endpoint using dynamic VLANs (dVLANs), the access device
must have that VLAN locally defined or else authorization will fail.
● To reduce the number of unique authorization policy rules, access devices
should use consistent numbering, or case-sensitive naming if assign dVLANs by
VLAN name or VLAN Group name.
● When using monitor mode of the phased deployment, VLAN assignment may
cause endpoints with wrong IP address
● Some endpoints, such as non-user devices, may not refresh IP after VLAN
change
● If devices are statically addressed, they may not be able to communicate on
assigned VLAN
Posture
● Which posture agents will be used? Consider: AnyConect 4.0 posture agent for
Windows or Mac, Web agent for Windows
● If persistent posture agents deployed, how will they be provisioned? (e.g.
through ISE or other desktop software/patch management solution, via ASA, or
via ISE)
In the Posture Policy section below, explain the posture policy by OS type including
remediation policies.
Note: For latest AV/AS posture requirements, review the list of currently supported
packages for Windows and MacOSX
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 49
Question Response
Profiling Profiling Probes
● Identify the primary device types to be profiled NETFLOW DHCP
● What is the profile data required to classify each device type? DHCPSPAN HTTP
● Which probes will be deployed to collect the required data? RADIUS Device Sensor
● If SPAN/RSPAN is to be used, does infrastructure support these technologies? DNS NMAP
Note: If SPAN/RSPAN used, a dedicated interface should be used on the Policy SNMPTRAP SNMPQUERY
Service Node for the DHCP SPAN or HTTP SPAN probe.
● If RSPAN or Netflow is to be used, is there sufficient bandwidth between source
SPAN/Netflow exporter and ISE Policy Service node used for profiling?
● Is profiling for visibility only or for use in authorization policy?
In the Profiling Policy section below, explain the profiling policy in detail.
ISE Nodes/Personas
● Number and type (3315/3355/3395/3415/3495/VM) of each ISE appliance
(node)
● Define the personas assigned to each node (e.g., Administration, Monitoring,
Policy Service, Inline Posture) including Primary and Secondary designations.
Wireless Configuration
Describe the wireless configuration
● How many SSIDs does the deployment require?
● Please provide SSID security settings.
● Is wireless AP in FlexConnect mode or not?
● For Guest wireless access, is the WLC configured as an anchor controller?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 49
Question Response
Bring Your Own Devices (BYOD)
Describe the detailed BYOD configuration
● Is it Single SSID or Dual SSID?
● Will Android be in the BYOD design? If so, please provide details of
provisioning authorization profile
● What devices will be auto provisioned?
● What supplicant will be used? Please provide detailed supplicant configuration
information.
● What access will unsupported device get? (i.e. Blackberry, Windows phones,
Chromebooks)
● Will MDM be integrated with BYOD design, If so, please provide details of
MDM policy below in the Authorization Policy section and whether or not
redirection will be used for MDM agent installation
Note: Please note that Dual SSID and CWA are only supported with WLC AireOS
7.2 and up. Please plan to use LWA if there is no plan to upgrade to the devices that
support CWA and MAB.
Note: With AireOS 7.6 and up, DNS based wireless ACL is supported which can
allow admin to create an ACL for Android devices have access to Google Play
Store.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 49
Cisco SDA Design Guidance
Cisco SDA design guidance can be in to 4 categories which are listed in the following picture, this is an high-
level introduction followed by individual design details.
Benefits
• Reduces cost to deploy SDA for very small sites
• FE + FB + CP on same C9K
• Supports 9800 & Embedded-Wireless in 1.2.10 (16.10.1e for C9300)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 49
Stack of FIAB’s
• Total endpoints < 2K (software limit)
• If a member of the Stack fails (with CP and Border), the next available member in the stack taker over
the CP and Border functionality
Limited Survivability for CP and Border
• Single wiring closet (MDF)
• Max of 8 boxes can be in a Stack
• All the stack members must be the same platform
Benefits
• Get additional ports in a FIAB
• Still reduced cost to deploy SDA for very small sites
• FE + FB + CP on same C9K
• Supports 9800 & Embedded-Wireless in 1.2.10 (16.10.1e for C9300)
•
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 49
Small Design
Overview
• Multiple wiring closets or even single.
• Border and CP are collocated in a single box
• Redundancy for Border or CP
• Limited Survivability
• Total endpoints < 10K (recommendation, but DNAC and platform scale can drive this number)
Benefits
• Small site design
• Tends to be Building or Office with < 10,000 endpoints and < 100 IP Pools/Groups
• 1-2 Collocated CP +
External Border (Single Exit)
• Tends to be local WLC connected to Border (e.g. Stack) + FEW
• Looking at <1000 dynamic authentications and <250 group based policies.
• FB + CP + Wireless (9300)with distributed Fabric Edges
• Supports 9800 & Embedded-Wireless in 1.2.10 (16.10.1e for C9300)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 49
Medium Design
Overview
• Multiple wiring closets or even single.
• Dedicated CP’s for higher survivability (Site, building, floor)
• 2 x collocated Border & CP (in a single box)
• Full Survivability for CP
• Limited Redundancy for Border
• Dedicated Edge (no stacking)
• Recommended total endpoints < 10K (recommendation, but DNAC and platform scale can drive this
number).
Benefits
• Next level up to a small design.
• Max Control Plane nodes = 6 (Wired Only); 4 with Wireless (2 Enterprise and 2 Guest CP’s).
• Tends to be Multiple Buildings with < 25,000 endpoints
• Most likely a 3 Tier design, recommendation is to use 9400 & 9500 as intermediate nodes.
• Can choose a Co-located or a Distributed/Dedicated CP + Border(Single Exit) design.
• Tends to be WLC + FEW via Services Block or a local Data Center
• Looking at < 25,000 dynamic authentications and < 1000 group based policies
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 49
Large Design
Overview
• Multiple wiring closets (most likely).
• Max Control Plane nodes = 6 (Wired Only); 4 with Wireless.
• Max Border nodes = 4
• Dedicated CP’s for higher survivability (Site, building, floor)
• Dedicated Borders for site exits
• Full Survivability for CP
• Full Redundancy for Border
• Dedicated Edge (no stacking)
• Recommended total endpoints < 25K (recommendation, but DNAC and platform scale can drive this
number).
Benefits
• Dedicated borders can provide multiple exits to different DC’s or destinations.
• Tends to be Many Buildings with < 25,000 endpoints and < 500 IP Pools/Groups
• Most likely a 3 Tier design, recommendation is to use 9500 as intermediate nodes.
• Can choose a Co-located or a Distributed/Dedicated CP + 2-4 Borders (Multiple Exits)
• Looking at < 25,000 dynamic authentications and < 2000 group based policies
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 49
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 49
Cisco DNAC Ports
Cisco DNA-Center needs access to below URLs & FQDNs
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 49
Cisco DNA Center 1.2.10 Scale
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 49
Cisco SDA Supported Latency
Latency Requirements (RTT)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 49
Cisco SDA Supported Wired Platforms
Fabric Edge, Border and Control Plane
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 49
Cisco SDA Supported Wireless Platforms
FEW and OTT
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 49
Policy Details
Host On-boarding: For each use case (wired, wireless, VPN), describe the ISE authentication policies that will
on-board users and endpoints to the fabric, whether managed or unmanaged.
Cisco ISE Authentication Policy Example:
Rule Name Condition Allowed Protocols ID Store / ID Sequence
Device Access Wired_MAB Default Network Access Internal EndPoints
802.1X Access Wired_802.1X Default Network Access AD_then_Local
VPN NAS-Port-Type = Virtual Default Network Access AD
Default - Default Network Access Internal Users
Cisco ISE Authorization Policy: For each use case (wired, wireless, VPN), describe the authorization policies
that will be implemented for all users and endpoints whether managed or unmanaged.
Authorization Policy Example:
Rule Name Identity Groups Other Conditions Permissions SGT
BYOD Unknown Mobile Devices Logical EAP Tunnel = PEAP NSP dACL BYOD
Group EAP Type = MSCHAPv2 NSP Redirect
BYOD Registered Registered EAP Type = EAP-TLS Registered dACL BYOD-Registered
SAN = Calling-StationID
IP_Phones Cisco-IP-Phones - Voice VLAN IP-Phone
Authz VVID
Printers Managed-Printers - Printer VLAN Printer
Cameras Managed-Cameras - Camera VLAN Camera
Workstation_Access Any Domain PC AD Access dACL AD-Access
User_Role_1_Access Any Domain Member Role1 Role1 dACL Role1
User_Role_2_Access Any Domain Member Role2 Role2 dACL Role2
Guest_Access Guest - Internet Only dACL Internet-Only
Default - - Web Auth Default
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 49
Guest Access: For each use case (wired or wireless), describe guest access policy. Provide information on how
guest will access the network including information on guest provisioning, sponsors, and whether custom guest
portal pages need to be created. Please fill details in the forms below if the answer yes applies to you. Put no if
the scenario does not apply to you.
Services Wired (yes or no) Wireless (yes or no)
Guest
Profiling: For each use case (wired or wireless), describe how the profile data will be collected by each probe
required to classify each device type to be profiled. For example, will SPAN or RSPAN be used to carry data
from the network to the Identity Services Engine? If so, what is the SPAN design? Will dedicated ISE
interfaces be used? If HTTP probe used, will SPAN or redirection be used to capture user agent attributes?
Please note that the number of events per second a platform can safely process per the Platform Performance
Spec table below. For example, if IPAD traffic is to be profiled by probing http traffic for the User Agent
attribute, then the design must assure the Policy Services node is not inspecting more than 1200 http events per
second (3395 spec). Consider profiling strategies that reduce overall load on Policy Service node such use of
HTTP redirect at connect time to capture the User Agent attribute, or the use of IP Helper statements for DHCP
capture versus the use of SPAN.
Profiling Policy / Requirements Example:
Device Profile Unique Attributes Probes Used Collection Method
Cisco IP Phone OUI RADIUS RADIUS Authentication
CDP SNMP Query Triggered by RADIUS Start
IP Camera OUI RADIUS RADIUS Authentication
CDP SNMP Query Triggered by RADIUS Start
Printer OUI RADIUS RADIUS Authentication
DHCP Class Identifier DHCP
POS Station MAC Address RADIUS (MAC RADIUS Authentication
(static IP) Address discovery)
ARP Cache for MAC to IP SNMP Query Triggered by RADIUS Start
mapping
DNS name DNS Triggered by IP Discovery
Apple iPad/iPhone OUI RADIUS RADIUS Authentication
Browser User Agent HTTP Authorization Policy posture redirect to
central Policy Service node cluster
DHCP Class Identifier + MAC DHCP IP Helper from local L3 switch SVI
to IP mapping
NMAP Scan Result NMAP Active Scanning
Device X MAC Address RADIUS (MAC RADIUS Authentication
Address discovery)
Requested IP Address for DHCP RSPAN of DHCP Server ports to local
MAC to IP mapping Policy Service node
Optional to acquire ARP Cache SNMP Query Triggered by RADIUS Start
for MAC to IP mapping
Port # traffic to Destination IP Netflow Netflow export from Distribution 6500
switch to central Policy Service node
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 49
Customer Profiling Policy / Requirements:
Device Profile Unique Attributes Probes Used Collection Method
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 49
Deployment Details
Unknowns
What are the key unknowns or concerns about this deployment? For instance, the information that was required
but not received from the customer, please list it here. (E.g. My customer uses IE3000 series switches. Is this
supported? Customer is using 3rd party NAD. Or the customer is currently using IPv6)
High Availability
Discuss high availability considerations.
High availability for ISE, each persona and node should be part of design to ensure that no single
persona/appliance failure results in total loss of a service. Please confirm persona/node redundancy
design and explain reason if HA not planned for any component.
Migration
If migrating this deployment from traditional network architecture to SDA provide details on the current
deployment and how you're going to address migration of licensing, existing policy, NAD configurations, etc.
802.1X Phasing
● Deployment modes (Please refer to DIG in Appendix for Mode details):
o Will Monitor mode be enabled for a period of time on the 802.1X-enabled routers and switches?
o Will Authenticated or Enforcement mode (formerly known as “Low Impact mode”) be deployed?
o Will Closed Mode (formerly known as “High Security mode”) be deployed?
Example:
Host Name (FQDN) Persona IP Address VM/HW CPU RAM Storage
ise1.example.com Admin/Mn 1.1.1.1 VM Intel Xeon E5-2609 @ 2.4 32GB 600GB
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 49
T GHZ X 8 Core
ise2.example.com PSN 2.2.2.2 VM Intel Xeon E5-2609 @ 2.4 32GB 300GB
GHZ X 8 Core
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 49
Bill of Materials (BOM)
Insert as part of this document, or in a separate attachment, the list of equipment to be ordered for the SDA
deployment that matches the design. If Sales Order already placed, then be sure to include the order details
here.
Please include SmartNet/SAU or explain its omission (for example, included as part of another order, support
agreement, or deliberate acknowledgement that support refused).
Note: Please only include the information of the products that are related SDA.
Example BOM:
Line Product Qty List Price Contract Discount Unit Price Extended Price
1 Cat 9k 1
2 ISE 1
3 DNAC 3
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 49
Appendix
SDA Partner Resource Center
Please visit SDA, for additional SDA resources (Login required).
SDA Ordering Guide
The SDA Ordering Guide located at
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/software-defined-access/guide-
C07-739242.pdf
General Support links for SDA
cisco.com/go/sdaccess
• SD-Access At-A-Glance
• SD-Access Ordering Guide
• SD-Access Solution Data Sheet
• SD-Access Solution White Paper