Cisco DNA Center

Policy Automation Assurance

Outside

Cisco Software-Defined Access B B C Technology Deep Dive

SD-Access Extension User Mobility Victor Moreno Policy follows User Distinguished Engineer - Technical Marketing BRKCRS-3810 Cisco Webex Teams

Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Assumptions

This session assumes you have received Cisco DNA, SD-Access & ISE Training

If not… please complete one or all of the following training materials: • CiscoLive • dCloud Lab • Learning@Cisco • SDA Design CVD • SDA Deploy CVD • DNAC Guides

This session is based on Cisco DNAC / SDA 1.3.1, ISE 2.6 and IOS-XE 16.11 • Product Compatibility Matrix

For a full list of current capabilities, restrictions, limitations & caveats refer to: • DNAC Release Notes

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Agenda

• Cisco SD-Access Recap Cisco DNA Center

• Host Onboarding Policy Automation Assurance • Endpoint Classification Outside

B B • DHCP in SD-Access Fabric C • Connectivity & Access Control • Unicast Forwarding • Access Control Policy

SD-Access • Advanced Topics Extension User Mobility Policy follows User • Multicast Forwarding • Broadcast Forwarding

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 1.Architecture 2.Key Components 3.Fabric Constructs

What is Campus Fabric? Fabric Fundamentals Cisco Software Defined Access The Foundation for Cisco’s Intent-Based Network Cisco DNA Center Identity-Based Policy and Segmentation Policy definition decoupled Policy Automation Assurance from VLAN and IP address Outside

B B Automated C Network Fabric Single fabric for Wired and Wireless with full automation

Insights and

SD-Access Telemetry Extension User Mobility Analytics and insights into Policy follows User User and Application experience

IoT Network Employee Network © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public SD-Access Architecture Fabric Roles & Terminology . Network Automation – Simple graphical Automation user interface and intent based automation NCP Identity (e.g. NCP) of fabric devices Services ISE NDP . Network Assurance – Data Collectors (e.g. NDP) analyze Endpoint to App flows Cisco DNA Assurance Center and monitor fabric status . Identity Services – NAC & ID Systems (e.g. ISE) for dynamic Endpoint to Group Fabric Border Fabric Wireless mapping and Policy definition Nodes Controller B B . Control-Plane Nodes – Map System that manages Endpoint to Device relationships Control-Plane Intermediate . – A Fabric device C Nodes Fabric Border Nodes Nodes (Underlay) (e.g. Core) that connects External L3 network(s) to the SD-Access Fabric . Fabric Edge Nodes – A Fabric device Campus (e.g. Access or Distribution) that connects Fabric Edge Wired Endpoints to the SD-Access Fabric Nodes Fabric . Fabric Wireless Controller – A Fabric device (WLC) that connects APs and Wireless Endpoints to the SD-Access Fabric

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 SD-Access Fabric Campus Fabric - Key Components 1. Control-Plane based on LISP 2. Data-Plane based on VXLAN 3. Policy-Plane based on CTS

B B Key Differences C • L2 + L3 Overlay -vs- L2 or L3 Only • Host Mobility with Anycast Gateway • Adds VRF + SGT into Data-Plane • Virtual Tunnel Endpoints (Automatic) • NO Topology Limitations (Basic IP)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Locator / ID Separation Protocol Location and Identity separation

Traditional Behavior - Location + ID are “Combined” IP core 192.158.28.101 When the Device moves, it gets a new IPv4 or IPv6 Address for its new Device IPv4 or IPv6 Identity and Location Address represents both 189.16.17.89 Prefix RLOC Identity and Location 192.158.28.101 …...171.68.226.1201.68.228.121 189.16.17.89 ….....171.68.226.120 22.78.190.64 ….....171.68.226.121 172.16.19.90 ….....171.68.226.120 192.58.28.128 ….....171.68.228.121 192.58.28.128 ….....171.68.228.121 Mapping 189.16.17.89 ….....171.68.226.120 Database Overlay Behavior - Location & ID are “Separated”

IP core 192.158.28.101 When the Device moves, it keeps 171.68.228.121 171.68.226.120 the same IPv4 or IPv6 Address. Device IPv4 or IPv6 Address It has the Same Identity represents Identity only Underlay addressing space 192.158.28.101 End Point ID (EID) space

Location is Here Only the Location Changes (Route Locator (RLOC) BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 SD-Access Fabric LISP Control Plane

Fabric nodes use LISP as a control plane for Cisco DNA Center ISE Endpoint Identifier (EID) and Locator (RLOC) info Automation Analytics Policy Fabric Control Plane node acts as a Map 172.16.101.11/16 -> 192.168.1.11 172.16.101.12/16 -> 192.168.1.13 Server / Resolver for EID to RLOC mappings B B C

Fabric Edge and Internal Border devices registers EIDs to the Map Server.

192.168.1.13/32 External Border node acts as PXTR (LISP 192.168.1.11/32 Database Mapping Entry Proxy Tunnel ) and provides default 172.16.101.11/16 -> 192.168.1.11 gateway when no mapping exists. Database Mapping Entry Employee Contractor 172.16.101.12/16 -> 192.168.1.13 SGT SGT 172.16.101.11/16 172.16.101.12/16 Corporate VN

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 SD-Access Fabric VXLAN Data Plane

Cisco DNA Center ISE Fabric nodes use VXLAN ( Based) as the data plane which supports both L2 and L3 overlay. Automation Analytics Policy

B B VXLAN header contains VNID (VXLAN Network C Identifier) field which allows up to 16 million Virtual Networks (Layer 3 (VRFs) or Layer 2). VXLAN VXLAN header also has Group Policy ID, or Scalable Group Tags (SGTs), allowing 64,000 192.168.1.13/32 SGTs. 192.168.1.11/32

172.16.101.11 -> 172.16.101.12 Employee Contractor SGT SGT 172.16.101.11/16 172.16.101.12/16 Corporate VN

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 SD-Access Fabric Cisco TrustSec Policy Plane

Scalable Groups (SG) are a logical construct Cisco DNA Center ISE defined/identified based on the user and/or device context. Automation Analytics Policy ISE dynamically assign SGs to the users and devices coming to the network fabric. B B C

Nodes add Scalable Group Tags (SGTs) to the fabric encapsulation when communicating between the users and devices.

Edge and border nodes enforce the SGACL policies for the SGTs they protect locally.

Lighting Cameras Employee Developer Contractor Supplier SGT SGT SGT SGT SGT SGT IoT VN Corporate VN

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 SD-Access Fabric How VNs work in SD-Access

• Fabric Devices (Underlay) connectivity Scope of Fabric

is in the Global User-Defined VN(s) • INFRA_VN is only for Access Points User VN (for Default) Border and Extended Nodes in GRT USER VRF(s) VN (for APs, Extended Nodes) • DEFAULT_VN is an actual “User VN” DEFAULT_VN INFRA_VN provided by default Devices (Underlay) GRT • User-Defined VNs can be added or removed on-demand

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 SD-Access Fabric How VNs work in SD-Access

ip vrf USERS rd 1:4099 route-target export 1:4099 route-target import 1:4099 route-target import 1:4097 SD-Access Designs connecting to existing Global Routing Table ! ip vrf DEFAULT_VN rd 1:4098 should use a “Fusion” router with MP-BGP & VRF import/export. route-target export 1:4098 route-target import 1:4098 route-target import 1:4097

Control Plane ip vrf GLOBAL rd 1:4097 route-target export 1:4097 route-target import 1:4097 C route-target export 1:4099 VRF B route-target export 1:4098 T5/1 SVI B SVI B G0/0/0.B ISIS AF VRF B BGP GRT SVI A AF VRF A G0/0/0.A T5/2 B

T5/8 G0/0/0 G0/0/3 T1/0/1 T5/1 AF IPv4 MP-BGP

Edge Node Border Node Fusion Router Switch VRF A Shared SVI A Services

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 ISE – Cisco DNA Center Operation

Admin/Operate

Network Devices DNA-Center

Devices REST pxGrid

Things Config Sync Context

ISE-PSN ISE-PAN ISE-PXGrid Users Authorization Policy Exchange Topics TrustSecMetaData if Employee then SGT 10 SGT Name: Employee = SGT 10 Users SGT Name: Contractor = SGT 20 if Contractor then SGT 20 ... SessionDirectory* if Things then SGT 30 Bob with Win10 on CorpSSID ISE-MNT * Future Plan

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 SD-Access Policy Two Level Hierarchy - Macro Level

Known Unknown Networks Networks

VN VN VN SD-Access Virtual Network (VN) “A” “B” “C” Fabric First level Segmentation ensures zero communication between forwarding domains. Ability to consolidate multiple networks into one management plane.

Building Management Campus Users VN VN

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 SD-Access Policy Two Level Hierarchy - Micro Level

Known Unknown Networks Networks

SG SG SG SD-Access 1 4 7 SG SG SG SG SG SG Scalable Group (SG) 2 3 5 6 8 9 Fabric Second level Segmentation ensures role based access control between two groups within a Virtual Network. Provides the ability to segment the network into either line of businesses or functional blocks.

Building Management Campus Users VN VN

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 1.Endpoint Classification 2.DHCP in Fabric

Classification and Group tagging Host Onboarding Authentication and Authorization

Native Supplicants / Cisco AnyConnect

External Identity Stores

Active Directory

ENTERPRISE SQL Server

802.1X NETWORK LDAP / SQL LDAP Servers

Authentication Methods Authorization Options

. MAC Authentication Bypass . VLAN Assignment . IEEE 802.1X . Security Group Tags . Web Authentication . URL-Redirection

Who are you? What can you do?

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Authorization Workflow for Segmentation

Host Onboarding: IP Pool Virtual Network  Auth_Policy-ID 172.16.101.0/24 VN_IoT 172_16_101_0-VN_IoT

Virtual Network Policy: Group Virtual Network(s) IoT_Devices VN_IoT DNAC

ISE Authorization Profile: Group Auth_Policy-ID (constrained list) IoT_Devices + 172_16_101_0-VN_IoT

Authz Policy: Conditions Apply Profile Assign host to Group+VN

BRKCRS-3811 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 Authorization Policy - Authorization Profiles

VN_IoT

IoT_Devices SGT

VN_IOT

VN_IoT VN_IoT

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 ISE Authorization for VN assignment Authorization Result = Virtual Network + Security Group

Work Centers > TrustSec > Authorization Policy

VN+SG Identity Services

VN_IoT

Virtual Network

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 Group Assignment Two ways to assign SGT

Dynamic Classification Static Classification

Subnet to SGT

Campus Access Distribution Core DC Core DC Access

MAB Enterprise Backbone

WLC Firewall Hypervisor SW

VLAN to SGT

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Defining Security Groups

Define SGs under ‘Components’ section in TrustSec Work Center (from ISE 2.0)

Device SGT

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 SGT for wired 802.1X session

Switch# show authentication sessions int Gi 0/1 details Interface: GigabitEthernet1/0/23 IIF-ID: 0x107AB4000000076 MAC Address: 0005.0005.0005 Cisco ISE Catalyst Switch IPv6 Address: 2001:DB8:100:0:3809:A879:5197:16DB IPv4 Address: 172.20.100.2 Assign User-Name: [email protected] SGT Status: Authorized G 0/1 Domain: DATA Oper host mode: multi-auth Oper control dir: both Session timeout: N/A Common Session ID: 0A01010100000FC50BEC5800 Acct Session ID: 0x00000FBE Handle: 0xD4000009 Current Policy: POLICY_Gi1/0/23

Server Policies: SGT Value: 10

Method status list: Method State mab Authc Success

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 SGTs for Wireless sessions

Cisco ISE WLC Assign SGT

Works on AirOS and IOS-XE Wireless controllers.

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 1.Endpoint Classification 2.DHCP in Fabric

Gaining access to network fabric Host Onboarding SD-Access Fabric Architecture DHCP reachability

DHCP Server

Data Center Data Center

Internet Edge

Internet

DHCP Server Centralized WLC OTT

Shared Services SD-WAN

Border C WAN Edge

Access Nodes

Small Small Large Hybrid Internet Hybrid WAN Site WAN Site WAN Site

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 SD-Access Fabric Architecture DHCP in an anycast Gateway environment

Anycast GW provides a single L3 Default Gateway for IP capable endpoints

• The same Switch Virtual Interface (SVI) is present C on EVERY Edge with the SAME Virtual IP and MAC Known Unknown Networks Networks B B • When a Host moves from Edge 1 to Edge 2, it does not need to change its Default Gateway 

• The SVI is also configured with an IP helper address for DHCP.

GW GW GW GW GW

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 SD-Access Fabric Architecture DHCP in an anycast Gateway environment

DHCP reply needs to come to the right edge node switch.

• But “we do not know on which edge node a host is C located” as we don’t have an IP address for it yet. Known Unknown Networks Networks B B • Once an IP address is assigned to the host, the control plane node learns where the host is located.

• The Control-Plane maintains the Host to Edge relationship (Fabric Dynamic EID mapping)

GW GW GW GW GW

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 SD-Access Fabric Architecture DHCP in Fabric – Enable LISP lookups for DHCP requests

10.1.18.1/24 1.1.1.1/32 3.3.3.3/32 192.1.1.1/24

IP Network 10.1.18.0/24 20.20.20.20 Host Pool 10 Edge Node 1 Border and Shared Services Control Plane Node (DHCP Server) • The Edge node needs to be configured as a “proxy-itr” to avoid router lisp source EID validation. The source of instance-id 4098 dynamic-eid user the DHCP request doesn’t have an database-mapping 10.1.18.0/24 locator-set edge1 IP address yet. exit-dynamic-eid ! • We also need a 0/0 map-cache service ipv4 that triggers a LISP lookup for the eid-table vrf User DHCP helper address so that the map-cache 0.0.0.0/0 map-request itr map-resolver 3.3.3.3 DHCP request is sent in the overlay. proxy-itr 1.1.1.1 etr map-server 3.3.3.3 key uci etr use-petr 3.3.3.3 exit-service-ipv4 ! exit-instance-id ! exit-router-lisp BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35 SD-Access Fabric Architecture DHCP in Fabric – Option 82 plus Snooping

10.1.18.1/24 1.1.1.1/32 3.3.3.3/32 192.1.1.1/24

IP Network 10.1.18.0/24 20.20.20.20 Host Pool 10 Edge Node 1 Border and Shared Services Control Plane Node (DHCP Server) • The Edge node needs to enable option 82 in the DHCP request. ip dhcp relay information option ip dhcp snooping vlan 1022 • Option 82 will carry the VNID and ip dhcp snooping RLOC. interface Vlan1022 ip vrf forwarding User ip address 10.1.18.1 255.255.255.0 • DHCP snooping needs to be enabled on all ip helper-address 20.20.20.20 the VLANs in fabric. lisp mobility user

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public SD-Access Fabric Architecture DHCP in Fabric – “Pre-advertise” IP pools outside the fabric

10.1.18.1/24 1.1.1.1/32 3.3.3.3/32 192.1.1.1/24

IP Network 10.1.18.0/24 20.20.20.20 Host Pool 10 Edge Node 1 Border and Shared Services Control Plane • The Border will only advertise the “Aggregate Node (DHCP Server) route(10.1.18.0/24) when there is a more specific prefix(host route)for that subnet in RIB” router bgp 65002 bgp log-neighbor-changes ! • For the DHCP server to send the DHCP reply address-family ipv4 vrf USER aggregate-address 10.1.18.0 255.255.255.0 summary-only back we need a route to 10.1.18.0/24 at the redistribute lisp metric 10 DCHP server side. neighbor x.x.x.x remote-as xxxxx exit-address-family

• This will not happen until we have a HOST in interface Loopback1022 the subnet 10.1.18.0/24 registered with LISP vrf forwarding User ip address 10.1.18.1 255.255.255.255 HTDB. This needs DHCP to happen first.

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 SD-Access Fabric Architecture DHCP in Fabric – Include RLOC in DHCP request Option 82: -VNID 10.1.18.0/24 • Unicast DHCP request sent to Border with Option 82/Circuit ID -RLOC for Relaying xTR E • Option 82 = “1.1.1.1”(RLOC loopback) and “10”VN-ID B 3 • Set in DHCP request GIADDR= 10.1.18.1 ( SVI address)

2 DHCP request C sent to server through fusion router 1 DHCP Request B DHCP 20.20.20.20 SERVER Fusion Router Shared Services 3.3.3.3

1.1.1.1 2.2.2.2 4

SVI SVI 10.1.18.1 10.1.18.1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38 SD-Access Fabric Architecture DHCP in Fabric – DHCP Reply

E B 4

DHCP reply is sent to GIADDR-10.1.18.1 via border C Option 82 ”reflected” back unaltered

B DHCP 20.20.20.20 SERVER Fusion Router Shared Services 3.3.3.3

1.1.1.1 2.2.2.2 Option 82: 4 VNID + RLOC

SVI SVI 10.1.18.1 10.1.18.1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40 SD-Access Fabric Architecture DHCP in Fabric – Snoop and encapsulate DHCP reply at the Border

Snoop Option 82: E Encapsulate DHCP B 5 Reply to Snooped VNID + RLOC RLOC/VNID

C • DHCP reply comes to the Border where it is punted to CPU.

B • Relay xTR RLOC + VNI is extracted from Option82 / Circuit ID

• Border encapsulates DHCP reply in 3.3.3.3 VXLAN with destination RLOC = 1.1.1.1 and VNI = 10

1.1.1.1 2.2.2.2 4

SVI SVI 10.1.18.1 10.1.18.1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 SD-Access Fabric Architecture DHCP in Fabric – Complete DHCP reply

10.1.18.0/24 DHPC reply sent from Border to Edge switch E with VNI=10 to RLOC =1.1.1.1 B

6 C

7 DHCP Reply B DHCP 20.20.20.20 SERVER Fusion Router Shared Services 3.3.3.3

1.1.1.1 2.2.2.2 4

SVI SVI 10.1.18.1 10.1.18.1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42 1.Control Plane Lookup 2.Access Control Policy

Unicast Packet Forwarding & Access Control Cisco SD-Access Architecture Control-Plane Nodes – A Closer Look

Control-Plane Node runs a Host Tracking Database to map location information

• A simple Host Database that maps Endpoint IDs to C Known Unknown a current Location, along with other attributes Networks Networks B B • Host Database supports multiple types of Endpoint ID lookup types (IPv4, IPv6 or MAC)

• Receives Endpoint ID map registrations from Edge and/or Border Nodes for “known” IP prefixes

• Resolves lookup requests from Edge and/or Border Nodes, to locate destination Endpoint IDs

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48 Endpoint Registration in Fabric Cisco SD-Access Fabric Architecture Host Registration

Control Plane state:

C IP to RLOC MAC to RLOC Address Resolution Table Table Table

B Fabric WLC

SDA Fabric

• The Control Plane node has three related tables:

• IP to RLOC stores IP address of a Host and its corresponding location FE1 FE2 • MAC to RLOC stores MAC address of a Host and its corresponding location

• Address Resolution Data from the above two tables are collated for IP to MAC bindings (ARP Table)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50 Cisco SD-Access Fabric Architecture Host Registration

C 101 Wired host attaches to the fabric network on an edge node B Fabric WLC

SDA Fabric

FE1 FE2

1.1.1.1 A:A:A:A

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 Cisco SD-Access Fabric Architecture Host Registration

C 102 After the host gets an IP address, the fabric edge sends a map-register to the control plane node with the IP and mac address of the host B Fabric WLC

SDA Fabric

FE1 FE2

1.1.1.1 A:A:A:A

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52 Cisco SD-Access Fabric Architecture Host Registration

103 The control plane node upon receiving the map-register C populates the database tables for the host

B Control Plane state: Fabric WLC IP to RLOC MAC to RLOC Address Resolution Table Table Table SDA Fabric 1.1.1.1  FE1 AA:AA:AA:AA  FE1

FE1 FE2

1.1.1.1 A:A:A:A

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53 Cisco SD-Access Fabric Architecture Host Registration

104 The Control plane then takes the information from the IP C and MAC table and populates the ARP table

B Control Plane state: Fabric WLC IP to RLOC MAC to RLOC Address Resolution Table Table Table SDA Fabric 1.1.1.1  FE1 AA:AA:AA:AA  FE1 1.1.1.1 = A:A:A:A

FE1 FE2

1.1.1.1 A:A:A:A

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 Registering an Access Point in Fabric SD-Access Wireless Workflow AP onboarding – AP Discovery and VLAN assignment 1 FE1 B Cisco DNA Center IP Network CDP C 2

AP directly connected (*) Fabric WLC

1 Admin configures AP pool in Cisco DNA Center in INFRA_VN. Cisco DNA Center pre- provision a configuration macro on all the FEs

2 AP is plugged in and powers up. FE discovers it’s an AP via CDP and applies the macro to assign the switch-port the right VLAN

(*) AP can be connected also through an “Extended node” switch

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60 SD-Access Wireless Workflow AP onboarding – AP assigned IP address 1 FE1 B

IP Network DHCP 2 CDP C DHCP 3

AP directly connected Fabric WLC

Admin configures AP pool in Cisco DNA Center in INFRA_VN. Cisco DNA Center pre- 1 provision a configuration macro on all the FEs

2 AP is plugged in and powers up. FE discovers it’s an AP via CDP and applies the macro to assign the switch port the the right VLAN

3 AP gets an IP address via DHCP in the overlay

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61 SD-Access Wireless Workflow AP onboarding – Register AP with Fabric and Connect to WLC FE1 5 B

CAPWAP Join CAPWAP in VXLAN exchange SDA Fabric C CAPWAP traffic 7 AP RLOC? 4 AP EID register 6 AP Check

Fabric WLC

4. Fabric Edge registers AP’s IP address and MAC (EID) and updates the Control Plane (CP)

5. AP learns WLC’s IP and joins using traditional methods. Fabric AP joins in Local mode

6. WLC checks if AP is fabric-capable (11ax, Wave 2, Wave 1 APs)

7. If AP is supported, WLC queries the CP to know if AP is connected to Fabric

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62 SD-Access Wireless Workflow AP onboarding – Switch AP to Fabric mode

FE1 B

SDA Fabric C

8 AP RLOC

Fabric WLC AP L2 EID register 9

8. Control Plane (CP) replies to WLC with RLOC. This means AP is attached to Fabric and will be shown as “Fabric enabled”

9. WLC does a L2 LISP registration for the AP in CP (a.k.a. AP “special” secure client registration). This is used to pass important metadata information from WLC to the FE

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63 SD-Access Wireless Workflow AP onboarding – Program access ports for Fabric AP

FE1 B

interface Tunnel 10 SDA Fabric C 11 AP EID update Fabric WLC

1010• In response to this proxy registration, Control Plane (CP) notifies Fabric Edge and pass the metadata received from WLC (flag that says it’s an AP and the AP IP address)

1111• Fabric Edge processes the information, it learns it’s an AP and creates a VXLAN tunnel interface to the specified IP (optimization: switch side is ready for clients to join)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64 SD-Access Wireless Workflow AP onboarding - Program access ports for Fabric AP

FE1 B edge-2#sh access-tunnel summary interface Tunnel Access10 Tunnels General Statistics:SDA Fabric Number of AccessTunnel Data Tunnels = 1 C Name SrcIP SrcPort DestIP DstPort VrfId 11 ------Ac0 172.16.2.98AP EID N/A update 172.16.3.130 4789 0

Name IfId Uptime Fabric WLC ------Ac0 0x0000003A 0 days, 15:20:47

1010• In response to this proxy registration, Control Plane (CP) notifies Fabric Edge and pass the metadata received from WLC (flag that says it’s an AP and the AP IP address)

1111• Fabric Edge processes the information, it learns it’s an AP and creates a VXLAN tunnel interface to the specified IP (optimization: switch side is ready for clients to join)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65 Registering a Wireless host in Fabric SD-Access Wireless Workflow Client Onboarding

FE1 B CAPWAP in VXLAN SDA Fabric ISE C Client Join 101

Fabric WLC Client SGT/VNID and RLOC

101• Client authenticates to a Fabric enabled WLAN. WLC gets SGT from ISE, updates AP with client L2VNID and SGT

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67 SD-Access Wireless Workflow Client Onboarding

B 3 Client in FWD 10 table SDA Fabric C FE1

MAC to RLOC 102 bb.bb.bb.bb  FE1 Client MAC register

Fabric WLC

101 • Client authenticates to a Fabric enabled WLAN. WLC gets SGT from ISE, updates AP with client L2VNID and SGT

102 • WLC knows RLOC of AP from internal DB . WLC proxy registers Client L2 info in CP; this is LISP modified message to pass additional info, like the client SGT

103 • FE gets notified by CP and knows it’s a client; FE adds client MAC in L2 forwarding table and go and fetch the client policy from ISE based on the client SGT

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68 SD-Access Wireless Workflow Client Onboarding DHCP DHCP flow B

106 SDA Fabric 105 FE1 C

DHCP packet + L2 vnid 104 Fabric WLC

104• Client initiates DHCP Request

105• AP encapsulates it in VXLAN with L2 VNI info (and SGT)

106• Fabric Edge maps L2 VNID to the VLAN interface and forwards the DHCP packet in the overlay (same as for a wired Fabric client)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69 SD-Access Wireless Workflow Client Onboarding DHCP 107 FE1 B

SDA Fabric 108 C

Client IP, L3 VNI, RLOC IP

IP to RLOC MAC to RLOC Table Address Resolution Fabric WLC Table Table 2.2.2.2  FE1 bb.bb.bb.bb - 2.2.2.2 <--  FE1 bb.bb.bb.bb

107• Client receives an IP address from DHCP

108• DHCP snooping triggers the client EID registration (MAC, IP address) by the Fabric Edge to the CP. (If client has a static IP, then ARP or any other IP packet will trigger the registration) This completes client onboarding process

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70 Mobility Events in Fabric Cisco SD-Access Fabric Architecture Client Roam

C 101 Client roams from AP1 to AP2 (inter-switch roaming)

B Fabric WLC

SDA Fabric

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72 Cisco SD-Access Fabric Architecture Client Roam

C AP2 detects the client move and registers its MAC 102 address to the WLC as a mobility event

B Fabric WLC

SDA Fabric

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73 Cisco SD-Access Fabric Architecture Client Roam

C

B Fabric WLC 103 WLC updates forwarding table on AP2 with client info (SGT, L2VNID, RLOC) SDA Fabric

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74 Cisco SD-Access Fabric Architecture Client Roam

C 104 WLC updates the L2 MAC entry in CP with new RLOC B FE2. Fabric WLC

SDA Fabric

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75 Cisco SD-Access Fabric Architecture Client Roam

105 The control plane state will be mismatched as the IP address of host says it is located behind FE1 but MAC C address says its behind FE2

B Fabric WLC IP to RLOC MAC to RLOC Address Table Table Resolution Table SDA Fabric 2.2.2.2  FE1 bb.bb.bb.bb - 2.2.2.2 <--  FE2 bb.bb.bb.bb

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76 Cisco SD-Access Fabric Architecture Client Roam

106 In this state the control plane node will trust the notification from the WLC and will correct its IP to RLOC C table.

B Fabric WLC IP to RLOC MAC to RLOC Address Table Table Resolution Table SDA Fabric 2.2.2.2  FE2 bb.bb.bb.bb - 2.2.2.2 <--  FE2 bb.bb.bb.bb

FE1 FE2

AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77 Cisco SD-Access Fabric Architecture Client Roam

107 The control plane node after correcting its IP to RLOC table will send notifications to Edge 1 and Edge 2. C CP then notifies • Fabric Edge FE2 (”roam-to” switch) to add the client MAC to forwarding table pointing to B VXLAN tunnel Fabric WLC • Fabric Edge FE1 (”roam-from” switch) to do clean up for the wireless client SDA Fabric This ensures that when a host moves from one AP to other, the new edge node is waiting for it even before the move fully completes to ensure seamless roaming.

FE1 FE2 108 Roam is Layer 2 as FE2 has the same VLAN interface as FE1 (Anycast Gateway) AP1 AP2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78 Unicast Packet Forwarding in Fabric in the same subnet Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C Assumptions: • Host H1 and Host H2 belong to the same subnet

B Fabric WLC Control Plane state: SDA Fabric IP to RLOC MAC to RLOC Address Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa FE1 FE2 1.1.1.2  FE2 bb.bb.bb.bb - 1.1.1.2 <-- Host1  FE2 bb.bb.bb.bb

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 101 Host2 wants to communicate to Host1. Since they are in the same subnet Host2 sends an ARP request for the mac-address of Host1 B Fabric WLC The packet will contain below: ARP REQUEST: SDA Fabric SRC IP: H2 IP DST IP: H1 IP SRC MAC: H2 MAC DST MAC: FF:FF:FF:FF

FE1 FE2

Host1 ARP request

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 102 Edge node FE2 will intercept the ARP request from Host2 and then will contact the control plane to ask for the MAC address of Host1. B Fabric WLC

SDA Fabric Address Resolution Request

FE1 FE2

Host1 ARP request

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

The control plane node will consult its Address C 3 10 resolution table to find the IP to MAC binding for Host1

B Fabric WLC Control Plane state:

IP to RLOC MAC to RLOC Address SDA Fabric Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa  FE1 FE2 1.1.1.2 FE2 bb.bb.bb.bb - 1.1.1.2 <--  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 104 If it finds the mapping it will reply back to the edge node with the MAC address of Host1.

B Fabric WLC Control Plane state:

IP to MAC binding IP to RLOC MAC to RLOC Address reply Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa  FE1 FE2 1.1.1.2 FE2 bb.bb.bb.bb - 1.1.1.2 <--  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C Once the edge node FE2 gets the MAC address for 105 Host1, it will again consult the control plane node to find out the location of Host1’s MAC address. B Fabric WLC

MAP-request

FE1 FE2 Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 106 The control plane node after getting the map-request will consult its MAC to RLOC table for the location.

B Control Plane state: Fabric WLC IP to RLOC MAC to RLOC Address Table Table Resolution SDA Fabric Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa 1.1.1.2  FE2 bb.bb.bb.bb - 1.1.1.2 <-- FE1 FE2  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 107 If the entry is found the information is sent to the edge node

B Control Plane state: Fabric WLC

IP to RLOC MAC to RLOC Address SDA Fabric MAP-reply Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa 1.1.1.2  FE2 bb.bb.bb.bb - 1.1.1.2 <-- FE2 FE1  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C The fabric edge node upon receiving the map-reply 108 will install this entry into the Layer 2 forwarding table.

B Fabric WLC

SDA Fabric MAP-reply

FE1 FE2 Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

109 Edge node FE2 will now convert the ARP broadcast it received from Host2 to a directed unicast. It will send it to FE1 in the overlay encapsulating it with the L2VNI for C that subnet/vlan.

The L2 VNI is derived from the L2 LISP configuration: B instance-id 8188 Fabric WLC service ethernet eid-table vlan 1024 ARP request on L2 VNI=8188 The packet will contain below:

ARP REQUEST:

SRC IP: H2 IP FE1 FE2 DST IP: H1 IP SRC MAC: H1 MAC Host1 ARP request DST MAC: H2 MAC << unicast ARP>>>

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 1010 The edge node FE1 upon receiving the ARP request will decapsulate the packet. It will forward it to the destination host Host1. B Fabric WLC

ARP request on L2 VNI=8188

ARP request FE1 FE2

ARP request Host1 AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 1011 The destination Host1 will unicast the ARP reply to Host2. To do so, FE1 will issue a Map-request for the MAC B address of Host 2 and cache the mapping received in the Fabric WLC map-reply.

MAP- ARP reply on L2 VNI=8188 Request/reply

ARP reply FE1 FE2

ARP reply Host1 AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 1012 Now that ARP is resolved, we can test data connection (ping request) .

B Fabric WLC

SDA Fabric

FE1 FE2 Host1 Ping request

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 1013 The fabric edge node will use the Layer 2 forwarding tables that have been already populated and will use the L2VNI to forward to the destination node. B Fabric WLC INNER PACKET:

SRC IP: H2 IP SDA Fabric DST IP: H1 IP SRC MAC: H2 MAC DST MAC: H1 MAC

OUTER PACKET: FE2 FE1 SRC IP: Edge 2 IP Host1 SRC MAC: Edge 2 MAC Ping request DST IP: Edge 1 IP DST MAC: Next-Hop MAC (Intermediate node) AP AP Host2 .

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93 Cisco SD-Access Fabric Architecture Unicast Forwarding in the same subnet

C 1014 Once traffic reaches edge 1 it will decapsulate the VXLAN headers and based on the Inner packet details will do a switching lookup to send it to Host1. B Fabric WLC

ARP request on L2 VNI=8188

Ping request FE1 FE2

Ping request Host1 AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94 Forwarding across different subnets Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C Assumptions: • Host H1 and Host H2 belong to different subnets

B Fabric WLC Control Plane state:

SDA Fabric IP to RLOC MAC to RLOC Address Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa FE2 FE1 2.2.2.2  FE2 bb.bb.bb.bb - 2.2.2.2 <--  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C 101 Host2 sends a ping packet to Host1.

B Fabric WLC The packet will contain below:

PING REQUEST: SDA Fabric SRC IP: H2 IP DST IP: H1 IP SRC MAC: H2 MAC DST MAC: DEFAULT GATEWAY MAC FE1 FE2 Host1 Ping Request

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C 102 Edge node FE2 will intercept the ping request from Host2 destined to Host1 and then will contact the control plane to ask for the location of Host1. B Fabric WLC

MAP-request

FE1 FE2 Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C 103 The control plane node will consult its IP to RLOC binding for location of Host1.

B Fabric WLC Control Plane state: IP to RLOC MAC to RLOC Address SDA Fabric Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa 2.2.2.2  FE2 bb.bb.bb.bb - 2.2.2.2 <-- FE1 FE2  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C 104 If it finds the mapping it will reply back to the edge node with the location of Host1

B Fabric WLC Control Plane state:

MAP-reply IP to RLOC MAC to RLOC Address SDA Fabric Table Table Resolution Table 1.1.1.1  FE1 aa.aa.aa.aa - 1.1.1.1 <--  FE1 aa.aa.aa.aa  FE1 FE2 2.2.2.2 FE2 bb.bb.bb.bb - 2.2.2.2 <--  FE2 bb.bb.bb.bb Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C

B The fabric edge node upon receiving the map-reply Fabric WLC 105 will install this entry into the Layer 3 forwarding tables .

SDA Fabric MAP-reply

FE1 FE2 Host1

AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

C 106 Edge node FE2 will now send the ping request received from Host2 to edge node FE1 in the overlay encapsulating it with the L3VNI for that VRF. B Fabric WLC The L3 VNI is derived from the LISP configuration: Ping request on L3 VNI=4099 instance-id 4099 remote-rloc-probe on-route-change service ipv4 eid-table vrf Campus map-cache 0.0.0.0/0 map-request exit-service-ipv4 FE1 FE2

Ping request Host1 AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103 Cisco SD-Access Fabric Architecture Unicast Forwarding across different subnets

Once traffic reaches edge 1 it will decapsulate the VXLAN C 107 headers and based on the inner packet details will do a routing lookup to send it to Host1. B Fabric WLC .

Ping request on L3 VNI=4099

FE1 FE2

Ping request Host1 AP AP Host2

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104 1.Control Plane Lookup 2.Access Control Policy

Unicast Packet Forwarding & Access Control Group-Based Policy Ingress Classification & Egress Enforcement

Encapsulation Decapsulation IP Network

Edge Node 1 Edge Node 2

VXLAN VXLAN

VN ID SGT ID VN ID SGT ID

Classification Propagation Enforcement Static or Dynamic VN Carry VN and Group Group Based Policies and SGT assignments context across the network ACLs, Firewall Rules

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106 Policy Definition in Cisco DNA Center

REST API SGACL matrix in ISE for Policies in DNAC rendering (runtime download)

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107 Dynamic Policy Download

• New User/Device/Server provisioned Prod_Server Dev_Server Switches pull down • Switch requests policies for assets they only the policies they need protect • Policies downloaded & applied dynamically

• Result: All controls centrally managed • Security policies de-coupled from network topology • No switch-specific security configs needed • One place to audit network-wide policies

Switches request Prod_Server Dev_Server policies for assets (SGT=7) (SGT=10) they protect

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108 Downloaded Policy ISE

Switch#show cts rbacl Permit_Email_Traffic CTS RBACL Policy ======RBACL IP Version Supported: IPv4 name = Permit_Email_Traffic-40 Switch IP protocol version = IPV4 refcnt = 1 flag = 0x40000000 stale = FALSE RBACL ACEs: Switch#show cts role-based permissions permit tcp dst eq 110 IPv4 Role-based permissions default: IOS switch as enforcer permit tcp dst eq 143 Permit IP-00 permit tcp dst eq 25 ... permit tcp dst eq 465 IPv4 Role-based permissions from group 10:Employee_FullAccess to group permit tcp dst eq 585 10:Employee_FullAccess: permit tcp dst eq 993 Malware_Contol_ACL-10 permit tcp dst eq 995 IPv4 Role-based permissions from group 10:Employee_FullAccess to group 30:Contractors: deny all log Cisco_Jabber_Access-10 IPv4 Role-based permissions from group 30:Contractors to group 10:Employee_FullAccess: Cisco_Jabber_Access-10 IPv4 Role-based permissions from group 30:Contractors to group 120:Mail_Servers: Permit_Email_Traffic ...

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 109 1.Multicast modes 2.Broadcast forwarding

Advanced Topics PIM ASM/SSM Control plane Interaction with the Fabric Cisco SD-Access Fabric Architecture Multicast with PIM-ASM – Multicast Receiver to RP

non . Fabric Multicast client (receiver) is in the overlay, multicast source can be outside or inside the fabric Multicast source C . FB PIM-ASM or SSM can be running in the overlay

Fabric RP . The client sends an IGMP report for a specific multicast Underlay group (G)

PIM join . The fabric Edge node (FE) sends a PIM join towards the Rendezvous Point RP . The RP is registered as part of the end point IP (EID) space FE of the overlay. . The edge node will ask the control plane for the location of IGMP report the RP address (IP to RLOC Table) and based on the reply will send the PIM join in the overlay to the RP.

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112 Cisco SD-Access Fabric Architecture How multicast works with PIM SSM

non . Fabric Multicast client (receiver) is in the overlay, multicast source can be outside the fabric or in the overlay as well Multicast source C . FB PIM-SSM needs to be running in the overlay . An RP is not used in a PIM SSM deployment Underlay . The client sends an IGMP v3 report for a specific multicast group (G) PIM join . The fabric edge node (FE) receives it and since the IGMP v3 report has the source address information for that multicast FE group it sends a PIM join towards the source directly. In our case since the source is reachable through the border it sends the PIM join to the border. IGMP v3 join

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113 Cisco SD-Access Fabric Architecture How multicast works with PIM SSM – Multicast Receiver to RP

non . Fabric Since in a SSM deployment the source address is part of IGMP v3 join the edge node will ask the control plane for the Multicast source C location of the source address (IP to RLOC Table) and based FB on the reply will send the PIM join in the overlay to the destination node. Underlay . If Border registered that source then the PIM join is directly sent to the Border (the Border may forward the PIM join PIM join upstream towards the source, if the source is not directly connected).

FE . If the source is not known in the fabric, the PIM join is also sent to the border as it is the default exit point of the fabric.

IGMP v3 join

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 114 Cisco SD-Access Fabric Architecture How multicast works with PIM ASM – Multicast Source to RP

Multicast source

non Fabric . The multicast source will send the multicast traffic on the interfaces towards the RP via the fabric Border(FB) C Multicast traffic . FB If the Source is directly connected to the border, the border is the DR for that segment Fabric RP . Underlay If the Source is not directly connected, the border is simply Multicast Traffic along the routed path towards the RP . The FB receives it and sends the traffic towards the RP . The Border node will ask the control plane for the location of FE the RP address (IP to RLOC Table) and based on the reply will send the traffic in the overlay to the RP . The RP now has the source and receiver information for that multicast group

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115 Cisco SD-Access Fabric Architecture How multicast works with PIM SSM – Multicast Source to RP

Multicast source

non Fabric . The multicast source will send the multicast traffic on the interfaces towards the listeners via the fabric Border(FB) C Multicast traffic . FB If the Source is directly connected to the border, the border is the DR for the segment Fabric RP . Underlay If the Source is not directly connected, an SSM tree was formed when the PIM joins where forwarded previously and Multicast Traffic the Fabric Border is on the path of that tree. . The FB receives it and sends the traffic towards the fabric Edge(s) as the PIM join is directly coming from the fabric FE Edge(s) to the Border in a SSM deployment. . In a PIM SSM deployment there isn’t an RP anchored shared tree .

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 116 Head End Replication Multicast Data Plane in Fabric Cisco SD-Access Fabric Architecture How multicast works with PIM ASM – Data Plane

Multicast source

non Fabric . The RP has the source and receiver information for a particular multicast group C FB . The fabric Border will send the multicast source traffic over a VXLAN tunnel to the RP. The RP will forward that traffic to Fabric RP Underlay FE over another VXLAN tunnel VXLAN tunnels . FE receives the VXLAN packets, decapsulates, applies policy and sends original IP multicast packet to the port on which the receiver is connected

FE

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 118 Cisco SD-Access Fabric Architecture Multicast using PIM-ASM – Data Plane

. Once the first multicast packet is delivered to the FE, the non shortest path failover (SPT) takes place. Traffic is Fabric forwarded directly between the Border and the Edge. Multicast source C . The FE knows that the Border owns the multicast source FB based on the first multicast packet received and send a PIM join directly to the Border for that multicast group. Fabric RP Overlay . FB now knows which FEs have clients that requested the specific multicast group. VXLAN tunnels . It performs headend replication and VXLAN encapsulates the multicast traffic and unicasts it to the interested FEs FE2 FE1 . The multicast traffic is sent in the overlay . FE receives the VXLAN packets, decapsulates, policy and then sends original IP multicast packet to the port on which the receiver is connected.

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 119 Native Multicast Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source Fabric

C FB Significantly reduces replication Fabric RP load at the Head-End

Underlay Overlay Significantly improves overall scale

PIM-SSM and reduces latency

FE2 FE1

Client 2 Client 1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 122 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source • All existing multicast control plane overlay behavior is the Fabric same

• PIM ASM and SSM can be used in the overlay as before. C FB • Each multicast group in the overlay is mapped to a Fabric RP corresponding (PIM SSM) multicast underlay group

Underlay Overlay • Multicast distribution (replication) occurs natively within the underlay network (e.g. intermediate nodes)

PIM-SSM • Incoming multicast traffic for a given VN is encapsulated in VXLAN, and then sent with {Source IP = FE node RLOC, Destination IP = Underlay Multicast Group} as the outer IP addresses. FE2 FE1 • PIM SSM is used in the underlay for multicast transport

Client 2 Client 1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 123 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source Fabric When the native multicast knob is turned on for a given fabric site the VNs where multicast is turned on will be instructed to move over to native multicast for the data C path. FB Fabric RP The configuration is pushed under the LISP interface for the respective VNs and the multicast groups in that VN will Underlay Overlay be mapped to underlay SSM groups for data transport.

PIM-SSM Interface LISP0.4096 ip pim lisp transport multicast ip pim lisp core-group-range 232.0.0.1 1000 FE2 FE1

Client 2 Client 1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 124 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source Client 1, a multicast receiver sends an IGMP report for Fabric 1 group 238.0.0.1 to the fabric Edge

C FB In this example we assume that ASM is used Fabric RP in the overlay and the group address is 238.0.0.1.

Underlay Overlay The overlay ASM group is mapped to SSM group (RP-RLOC, 232.0.0.9) in the underlay.

PIM-SSM This is derived based on the configuration

Since we are using SSM in the underlay for native multicast there is no pre built multicast tree for FE2 FE1 any given group in overlay.

IGMP Report

Client 2 Client 1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 125 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source The fabric Edge node receives the IGMP report for group Fabric 2 238.0.0.1, it sends the corresponding PIM joins:

C • in the overlay: a PIM join to the RP for 238.0.0.1 FB • In the underlay: a PIM join for (RP-RLOC,232.0.0.9) Fabric RP (SSM group).

Underlay Overlay The source address in the underlay SSM join will be the RLOC address of the RP. The Information of the RLOC

PIM-SSM address for the RP is provided by the control plane node.

Native multicast maps an overlay ASM group to an SSM underlay multicast group.

FE2 FE1 Thus, the *,G joins in the overlay and RP-RLOC,G joins in the underlay are assembled and transmitted. IGMP Report A multicast tree anchored at the RP-RLOC is created in the Client 2 Client 1 underlay

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 126 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source The multicast source starts sending traffic. Fabric 3 The overlay multicast traffic is unicast encapsulated to the C RP-RLOC, it is then multicast encapsulated in the (S,G) FB tree from the RP-RLOC onwards. Fabric RP The iTR (in our case the fabric Border) will send a source Underlay Overlay registration message in the overlay on the group address 238.0.0.1 to the RP and also sends the 238.0.0.1

PIM-SSM multicast traffic in the overlay to the RP-RLOC (unicast encapsulated).

The RP-RLOC xTR sends the traffic in the underlay on the mapped group 232.0.0.9. FE2 FE1 The information of the RLOC address is provided by control IGMP report plane node. The control plane gives the IP to RLOC information for the RP address. Client 2 Client 1 Up to this point an RP anchored ASM tree has been created

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 127 Cisco SD-Access Fabric Architecture Native Multicast

non Multicast Source The underlay now has enough information to replicate the Fabric 4 traffic to the needed devices.

C When SPT failover takes place, the source specific PIM FB joins in the overlay are mapped to source specific PIM Fabric RP joins in the underlay and an SSM SPT to the actual source is formed in the underlay. Overlay Underlay Overlay Pre-SPT: Underlay (RP-RLOC, 232.0.0.9)

PIM-SSM Post SPT: Underlay (Source-RLOC, 232.0.0.9)

FE2 FE1

IGMP report

Client 2 Client 1

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 129 Summary SD-Access Support For more details: cs.co/sda-compatibility-matrix Digital Platforms for your Cisco Digital Network Architecture

BETA Switching Routing Wireless Extended Catalyst 9600 Catalyst 9400 ASR-1000-HX Catalyst 9800 NEW

NEW ASR-1000-X NEW

Catalyst 9500 Catalyst 9300 Cisco Digital Building Catalyst 9100 APs

Catalyst 9200 NEW AIR-CT8540 ISR 4451

ISR 4430 AIR-CT3504 Catalyst 3560-CX AIR-CT5520 ISR 4330 NEW Catalyst 4500E Catalyst 6800 Nexus 7700 NEW

Aironet Aironet Catalyst 3850 & 3650 ENCS 5400 Wave 1 APs* Wave 2 APs Cisco IE 4K/5K

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 139 What to Do Next?

SD-Access Cisco DNA Cisco Capable Center Services

Refresh your Deploy the Engage with Hardware & Software Cisco DNA Center Cisco Services

Get SD-Access supported Devices Get Cisco DNA Center Appliances Cisco Services can help you with Cisco DNA Advantage Licenses with Cisco DNA Center Software Test - Migrate - Deploy - Manage

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 140 SD-Access Resources Would you like to know more?

cisco.com/go/dna cisco.com/go/sdaccess cisco.com/go/dnacenter • SD-Access At-A-Glance • Cisco DNA Center At-A-Glance • SD-Access Ordering Guide cisco.com/go/cvd • Cisco DNA ROI Calculator • SD-Access Solution Data Sheet • Cisco DNA Center Data Sheet • SD-Access Solution White Paper • SD-Access Design Guide • Cisco DNA Center 'How To' Video Resources • SD-Access Deployment Guide • SD-Access Segmentation Guide

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 141 More Resources

Understand the underpinnings of your SDA fabric

Understand the potential of your LISP enabled network

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 142 Complete your online session • Please complete your session survey survey after each session. Your feedback is very important.

• Complete a minimum of 4 session surveys and the Overall Conference survey (starting on Thursday) to receive your Cisco Live t-shirt.

• All surveys can be taken in the Cisco Events Mobile App or by logging in to the Content Catalog on ciscolive.com/emea.

Cisco Live sessions will be available for viewing on demand after the event at ciscolive.com.

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 143 Continue your education

Demos in the Walk-In Labs Cisco Showcase

Meet the Engineer Related sessions 1:1 meetings

BRKCRS-3810 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 144 Thank you