Cisco SD Access deployment guide
Cisco SD Access deployment guide
SD-Access Project
Based on LISP\VXLAN stack
#CiscoLive
Cisco Webex App
https://ciscolive.ciscoevents.com/
ciscolivebot/#BRKENS-2824
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Introduction
• The session assumes fundamental knowledge of SD-Access solution:
• BRKENS-2810 – Cisco SD-Access Solution Fundamentals
• BRKENS-2811 – Connecting Cisco SD-Access to the External World
• BRKENS-2814 – Role of ISE in SD-Access
• BRKENS-2827 – Cisco SD-Access Migration Tools and Strategies
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
• Planning SD-Access
Deployment
• Designing SD-Access
Agenda Deployment
• Implementing or Migrating to
SD-Access
• Take-aways or What’s Next?
BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Nomenclature
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Planning
SD-Access
Deployment
Cisco Catalyst Center
Cisco SD-Access has a few considerations that network designer needs to be aware of:
• Site level: Border and/or Control Plane nodes and Catalyst Center:
• Logical: Number of concurrent EPs (v4/v6, wired/wireless), RTT to controllers, IP
pools, L2 handoffs.
• Physical: Number of fabric devices per site.
All scalability limits are well documented in Cisco Catalyst Center Data Sheet, but it’s hard to apply
those to the design when doing it for the first time.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Meet ACME Corporation
Large manufacturing organization – legacy network refresh.
Main site – 3 sub-areas interconnected via dark fibre in ring topology:
• 25,000 users with 45,000 concurrent devices.
• 2100 x WS-C2960X access switches in 1300 access switch cabinets.
• 5200 x AIR-CAP3702I wireless access points.
• 700 VLANs for users and device segmentation.
• L3 boundary at distribution layer, MPLS for segmentation, DC firewall as enforcement point.
• Multiple business units are sharing the same network.
Two onsite active/active data centers with applications, Internet access and public cloud peering.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
ACME Diagram
WWW
Data Center
Remote Sites
Site 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
ACME Business Drivers for Cisco Campus Fabric
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Designing
SD-Access
Deployment
External Dependencies
ISE DHCP/DNS Catalyst Center
Before you spin up your first SD-Access fabric site,
you will need:
• Catalyst Center – automation engine for SD-
Access.
• DHCP / DNS – if you intend to provide these IP WAN
services to users connecting to SD-Access
network.
• Cisco ISE – if you want to authenticate and
authorize users or devices.
• Cisco WLC – if you want to provide wireless
access. WLC can enable fabric-enabled wireless
for a single site only.
• Fusion device (typically a firewall) to implement
VRF route-leaking and enforce security policy at
the leaking point.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
External Dependencies
ISE DHCP/DNS Catalyst Center
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
How Would Your Carve Your Fabric Sites?
Fabric Site 1
• Fabric site is an instance of an SD-Access Fabric.
• Endpoint scale.
• Failure domain scoping.
• Underlay connectivity attributes (MTU, multicast).
• Typically interconnected by a “Transit”.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Site Limits – Endpoint Scale
WWW DC
Full border node sizing values for all SD-Access platforms are documented in Catalyst Center Data Sheet.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Site Limits – Failure Domain Scoping
WWW DC
• All Edge Nodes in the site are sharing the same set of Control
Plane and Border Nodes. If all CP or BN nodes fail, the site is
failed*. SD-Access site with fabric wireless can have 2 CP
nodes max.
• A lot of configuration elements (VRF, VLAN, multicast,
wireless, default switchport policy) are applied at the site level,
to all** fabric site switches at the same time.
• Fabric site is underpinned by a single instance of underlay
routing protocol (IGP) as well as overlay routing protocol (LISP)
and is visible as single BGP AS from the outside world.
*During a total CP failure, no new endpoints can be onboarded into the fabric and roaming events won’t work.
Existing traffic flows will be cached for 24 hours.
**Some changes can be scoped to a limited subset of switches via Fabric Zones, see BRKENS-3833 for details.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Site Limits – Underlay Connectivity Attributes
WWW DC
Radio link
(1500 MTU, no multicast)
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Multiple Fabric Sites vs Single Fabric Site?
Fabric Site 1
Make large single fabric site within single geographical area until:
• You hit fabric device (1200 logical switches for –XL Catalyst Center) or endpoint limit
(~100,000 EPs).
• Links between parts of your fabric site can support increased MTU (from 1550 to 9000
bytes) and can be multicast-enabled.
• Part of your fabric site needs to be online even if the rest of your site is offline.
• Part of your fabric site needs to provide Direct Internet Access for users in the overlay.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Multiple Fabric Sites vs Single Fabric Site for
ACME?
Requirement:
• 2100 x WS-C2960X access switches in 1300 switch cabinets.
Solution:
• Three fabric sites in main campus because of 1300 switch cabinets (max fabric
site is 1200 fabric devices).
Caveats:
Data
• No seamless wireless roaming as IP subnet can exist only in one site.
Center
• Each site needs its own set of WLCs and BN/CP nodes.
• Extra switching hardware for SDA Transit CP nodes. Fabric site 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
SD-Access Transit
Allows SD-Access fabric sites to communicate to each other using VXLAN
tunnels between Border Nodes leveraging plain IP network between each other.
Why VXLAN?
• VXLAN carries VRF and SGT in the header over plain VXLAN tunnel
IP network.
• Transit network just need to provide IP connectivity
between BN Looback0 interfaces.
Data
Center
Requirements: Fabric site 1
• MTU > 1550 bytes.
• Dedicated Transit Control Plane(s).
• Multicast in the transit network*
Fabric site 2 Fabric site 3
*If overlay multicast is required
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
What About 70 Small Sites?
Individual site “Stretched” site
Remote site 1
MPLS WAN
Remote site 2
…
Remote site N
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
WAN SD-Access Site for
ACME
Remote site 1
MPLS WAN
Remote site 2
…
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Control Plane – Pub/Sub or Not?
LISP Pub/Sub
• Released in 2022 with Catalyst Center 2.2.3.X and IOS-XE 17.6.X.
• Reliable and stable.
• Less Control Plane load.
Greenfield: deploy LISP Pub/Sub.
• Faster convergence.
• Requires default route (0.0.0.0/0) from upstream to work in External Border capacity.
• No longer need per-VN iBGP peering between Border Nodes.
• All sites connected via SDA Transit need to be on the same CP architecture (Pub/Sub or LISP/BGP).
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Control Plane – Colocate with Border or Not?
+ or ?
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Underlay Design Options – LAN Automation vs
DIY
Underlay build:
• Configure Loopback0 interface (/32) on each SD-Access BN, CP, and Edge node.
• Set increased MTU to accommodate VXLAN header overhead, vtp transparent and enable multicast
routing.
• Configure point to point routed links between each switch in the topology.
• Enable routing protocol so that each switch in the topology can reach the Loopback0 of each other
in the topology.
• Enable PIM on each point-to-point link, Loopback0 and configure anycast ASM RP on CP/BN nodes.
• Configure SNMP and SSH credentials and that’s it!
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Underlay Design Options – LAN Automation vs
DIY
LAN Automation DIY
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
OSPF or IS-IS for SD-Access Underlay?
LAN Automation DIY
1. LISP needs /32 host route for destination VTEP Loopback0 to be present in
forwarding table.
2. Maximum tested/supported L3 switches in link-state protocol area is 250.
3. More than 250 switches in the network will require multi-area deployment.
4. IS-IS Level1 areas filter all inter-area prefixes, including Loopback0 host routes
(injects 0/0 route instead). OSPF areas allow inter-area routes by default.
5. Solution?
a) Implement IS-IS multi-area design and configure Level2->Level1 route
leaking (manually).
b) Implement OSPF multi-area design (manually).
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Underlay
Automation
Demo
Demo Topology Catalyst Center
10.66.181.10
IP WAN
• C9500-1: automation pool 10.250.15.0/24
• C9500-2: automation pool 10.250.16.0/24
• Loopback range – 10.250.255.0/24
Distribution Switches
C9500
Access Switches
C9300
Template sources:
https://github.com/sergeynasonov/sda-underlay-templates Factory default
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
For your
reference
Underlay Multicast
Multicast in underlay is no longer optional. It is required for:
• Layer 2 flooding (broadcasts) in user overlays – most
deployments have this.
• Layer 2 border functionality – most deployments have this. RP RP
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Multicast with SD-Access Transit – For your
reference
Underlay
Underlay requirements:
• Underlay links between fabric sites support PIM-SSM.
• All fabric sites use the same set of underlay RPs.
Data Center
10.0.0.1
10.0.0.1
• RPs outside the fabric (external) are highly recommended.
• Minimum SW version is 17.10.1 / Catalyst Center 2.3.5.X+.
Fabric site 1
RP 10.0.0.1
Fabric site 2
Fabric site 3
RP 10.0.0.1
RP 10.0.0.1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Overlay Unicast Per-VRF BGP peering
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Overlay Multicast in SD-Access Transit
Multicast over SDA Transit (in VXLAN) is supported when:
• Multicast-enabled VNs in all sites are configured with the
same set of RPs (per VN).
• All sites are configured to use native multicast (head-end Data Center
replication is not supported). 10.0.0.1
10.0.0.1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Upstream Connectivity – Fusion Firewall
Active/Active Borders with two uplinks to HA firewalls (active/passive pair)
• Inevitably half the traffic will arrive to firewall via the other
10.1.0.0/24
interface (facing BN Green) and will get dropped.
Solution?
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Upstream Connectivity – Fusion Firewall
Solution 1 – Make Border Nodes Active/Passive too.
1. Configure Border Red to have better LISP priority as fabric exit
(smaller the better, default value is 10). Destination Interface Next-hop
10.1.0.0/24 Eth1/1 BN Red
A P
10.1.0.0/24
2. Configure Border Green to add AS-PATH prepend while advertising
fabric subnets to the firewall.
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Upstream Connectivity – Fusion Firewall
Solution 2. ECMP on firewall cluster.
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Upstream Connectivity – Fusion Firewall
Solution 3. Intermediate hop.
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Upstream Connectivity – Fusion Firewall
Solution 4. Stack Border Nodes.
A P
• Single point of failure, especially if you collocate CP and BN
roles.
• Hardware changes require SVL reboot (=fabric outage).
• No In-Service Software Upgrade (ISSU) for SVL in SD- 10.1.0.0/24
Access.
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
For your
reference
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
For your
reference
10.1.0.0/24
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Switchport Access Policy
• Closed authentication – 802.1X + MAB (IBNS 2.0
template). No DHCP/ARP before authentication.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
For your
reference
Wireless Considerations
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
For your
reference
OTT FEW
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Key Design Decisions
Design Decision Rationale
D1 Divide main campus into 3 fabric Cannot implement single fabric site, number of fabric devices is >1200.
sites. Three geographical sub-sites align with proposed fabric site structure.
D2 Implement SDA Transit between 3 Need to maintain unified macro- and micro-segmentation policy across all
fabric sites in the main campus. three fabric sites that make up ACME campus.
D3 Use colocated BN/CP roles. Each individual site will not exceed more than 50,000 EP. Two BN/CP
switches will provide adequate level of resilience of the fabric site.
D4 Implement one “Stretched” fabric 1. MPLS sites do not have local server resources or DIA and are accessing
site for 70 small branch sites all resources via the centralised data center.
across the WAN. 2. MPLS carrier can support MTU > 1550.
3. Small branch sites do not have overlay multicast and L2F requirements.
D5 Use OSPFv2 as underlay routing 1. LAN Automation (with IS-IS) cannot be used due the scale of the
protocol for the fabric. deployment, necessitating multi-area design.
2. ACME IT team has a lot of experience with OSPF and is not comfortable
with IS-IS manual deployment.
D6 Use the external set of multicast ACME has multicast sources in IoT VN (AppleTV & Printers) and receivers in
RPs for overlay VNs. Corp VN.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Final BOM
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Implementing SD-
Access
Project Flow
M1. Build management stack (Catalyst Center).
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
M2. Integrate with Existing ISE
ISE Catalyst Center
• One Catalyst Center cluster can only be integrated with a single
PxGrid, ERS, SSH
ISE cluster.
• Reuse existing authentication flows and add new SD-Access
IP WAN
specific authorization profiles.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
M2. Integrate with Existing ISE
ISE Catalyst Center
• One Catalyst Center cluster can only be integrated with a single
PxGrid, ERS, SSH
ISE cluster.
• Reuse existing authentication flows and add new SD-Access
IP WAN
specific authorization profiles.
• Changing already-integrated ISE cluster requires removal of all
SD-Access fabric sites in Catalyst Center.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
M3. Parallel Core
4
Campus Area 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
M3. Test Configuration Before Migration
Campus Area 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
M3. Reuse Existing Distribution
Campus Area 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
For your
reference
12
Campus Area 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
M4. Remove Legacy Configuration
Campus Area 1
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Layer 2 Border – Gateway Inside the Fabric
Use-case: Stretch VLAN between fabric and traditional network
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Layer 2 Border – Gateway Outside the Fabric
Two use-cases:
• Endpoints that are not using IP (Profinet, Bacnet, Modbus and other industrial
protocols) and relying on MAC layer / broadcasts for communication.
• Overlapping IP addresses in the overlay (multi-tenancy).
VLAN 300
SDA Fabric
VLAN 300
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Layer 2 Border – Deployment Model
Dual-homing from single L2 BN is supported.
VLAN 300
STP root
SDA Fabric
STP blocking
VLAN 300
Dedicated L2 BN reduces risk that is created by attaching fabric to
external L2 domain:
• L2 forwarding loop.
• Link-local multicast flooding.
L2 BN requires Layer 2 flooding to be enabled for the stretched
segment.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Layer 2 Border – Deployment Model
Multi-chassis EtherChannel from stacked L2 BN is supported.
StackWise
StackWise Virtual
SDA Fabric
VLAN 300
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
For your
reference
Fragmentation in VXLAN
RFC 7348 “Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized
Layer 2 Networks over Layer 3 Networks” says:
“4.3 VTEPs MUST NOT fragment VXLAN packets. Intermediate routers may fragment encapsulated
VXLAN packets due to the larger frame size. The destination VTEP MAY silently discard such VXLAN
fragments.”
Solution?
• Increase link MTU - within the campus.
• Adjust TCP MSS - over WAN (1300 is the magic number).
14 bytes 20 bytes 8 bytes 8 bytes
Fragmentation in VXLAN
ip tcp adjust-mss
• Per VLAN - pushed to all Edge Nodes within fabric site.
• Adjust if site links’ MTU cannot be set to >1550 bytes.
• Only helps with TCP traffic.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
For your
reference
Fragmentation in VXLAN
ip tcp adjust-mss
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Lessons Learned From Previous Migrations
• Most struggles during SDA deployments are found with underlay routing design (IGP, BGP)
and misbehaving endpoints - iron those out before the deployment.
• Using IS-IS without experience - do you really want to learn new IGP while troubleshooting
fabric operations?
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
What’s Next for
ACME?
What’s Next for ACME?
Switchport Authentication Policy: None
SDA Fabric
Authentication: None
G1/0/4
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
What’s Next for ACME?
Upgrade Switchport Policy to 802.1X + MAB
SDA Fabric
Authentication: Closed
G1/0/38
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
What’s Next for ACME?
Upgrade Switchport Policy to 802.1X+MAB
SDA Fabric
Authentication: Closed
G1/0/38
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Cisco AI Endpoint Analytics
What if endpoint does not support 802.1X?
SDA Fabric
Authentication: Closed
Authorize endpoint into VLAN
“Guest_VN_Users” and assign SGT 2
G1/0/13
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Cisco AI Endpoint Analytics
What if endpoint does not support 802.1X?
PxGrid
SDA Fabric
Authentication: Closed
G1/0/13
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Cisco AI Endpoint Analytics
What if endpoint does not support 802.1X?
SDA Fabric
Authentication: Closed
G1/0/13
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco AI Endpoint Analytics
What if endpoint does not support 802.1X?
SDA Fabric
Authentication: Closed
G1/0/13
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
What’s Next for ACME?
Implement micro-segmentation
Micro-segmentation “gotchas”:
• Default deny will deny everything including
broadcasts/ARP/DHCP traffic.
• Micro-segmentation policy is applied to unicast traffic
only:
• Broadcast (including DHCP) traffic is not filtered.
• Multicast traffic is not filtered.
• Statically assigned SGTs (in switch CLI) are not shown in
Policy Analytics visualisation (classified as “Unknown”).
• Avoid “default deny” unless you have very specific
reasons.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Summary
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Complete Your Session Evaluations
Earn 100 points per survey completed and compete on the Cisco Live
Challenge leaderboard.
#CiscoLive BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
• Visit the Cisco Showcase
for related demos
BRKENS-2824 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Thank you
#CiscoLive