Applications Of SDN In Cisco - NetAcad

Transcription

Applications of SDN inCiscoSoftware Defined Networking Webinar SeriesSpeakers: Serges NanfackHostess: Kara Sullivan22 February 2017

Use the Q and A panel toask questions.Welcome to the 3rdsession of theSoftware DefinedNetworking webinarseries! Use the Chat panel tocommunicate with attendeesand panelists. A link to a recording of thesession will be sent to allregistered attendees. Please take the feedbacksurvey at the end of thewebinar. 2015 Cisco and/or its affiliates. All rights reserved.Cisco Confidential2

SD-WAN: iWANOverviewSam ByersSystem Engineer, Cisco 2014 Cisco and/or its affiliates. All rights reserved.Cisco Confidential3

Intelligent WAN Solution /4G-LTEBranchInternetWAASPublicCloudPfRControl and Management AutomationTransportIndependent Consistent operational model Dynamic Application best path basedon policy Load balancing for full utilization ofbandwidth Improved availabilitySimple provider migrations Scalable and modular design IPsec routing overlay designApplicationOptimizationIntelligentPath ControlApplication visibility withperformance monitoringApplication accelerationand bandwidth optimizationSecureConnectivity Certified strong encryption Comprehensive threat defense Cloud Managed Security for securedirect Internet access

Hybrid WAN DesignsTraditional and iWANTraditional HybridIWAN HybridActive/StandbyWAN PathsPrimary With BackupActive/ActiveWAN PathsData CenterTwo IPsec TechnologiesGETVPN/MPLSDMVPN/InternetTwo WAN RoutingDomainsMPLS: eBGP or StaticInternet: iBGP, EIGRP or OSPFRoute RedistributionRoute Filtering Loop PreventionData CenterASR 1000ASR 1000SP VISP ADMVPNGETVPNMPLSInternetOne IPsec OverlayASR 1000ASR 1000DMVPNISP ASP VDMVPNDMVPNMPLSInternetOne WANRouting DomainiBGP, EIGRP, or OSPFISRBranchISRBranch

SD-WAN AutomationPerformance Router (PfR)Automated Discovery, Service Exchange, Peering & Coordination across the WAN DomainLearningNetwork Discoversthe Apps (NBAR2)or based on DSCPNetwork Discoverssite topology,connected networksand ect ApplicationPerformanceSmart Probes fordiscoveryUsing UnifiedPerformanceMonitors (AVCInfrastructure)Also used if thereis no ed oningress on theremote siteWAN Edgepeers, learns linkperformance(per DSCP),Sendsperformancefeedback to PeersManagescongestion (localCAC, RemoteCAC*)

SDN Orchestration with APIC-EMAddressing the whole branch, not just the WAN.Customized Deploymentwith SDNPrime AppCustomTemplatesPrescriptive Deploymentwith SDNBranch ServicesPartnersAutomationCisco IWAN AppModelTemplatesPlug & Play WorkflowWhole isioningSecurityPolicyPath SelectionPolicyApplicationPolicyBranch-Level PolicyIWANSwitchingWirelessREST APIsAPIC-EM Services orySvcDevice Abstraction LayerOnePK/OpenflowCLIPnPSvcAPIC-EM

iWAN Branch Services RoutersISR4000 Series - IWAN AX Ready, Next Generation BranchAPPLIANCE LEVEL PERFORMANCE Service-Aware Dataplane Resilient Service Virtualization Multi-gigabit FabricAPPLICATION CENTRIC App/User policy-driven deployment APIC-EM Automation: deploy in minutes Pay-as-you-grow Up-to-75% cost savingsINTEGRATED IWAN SERVICES IOS Firewall, VPN, IPSec, PfRV3, NBAR2,AVC, AppNav, VRF, MPLS Scalable on-chip service provisioningISR44511-2GbpsISR4431500Mbps/1GbpsISR 4351200/400MbpsISR 4331100/300MbpsISR432150/100Mbps

iWAN Aggregation Border RoutersASR1000 - IWAN AX ready, high performance routersCOMPACT, POWERFUL ROUTER Line-rate performance 2.5G to 200G withservices enabled Crypto performance from 2G to 60G Flexible I/O: SPAs and Ethernet LCsBUSINESS-CRITICAL RESILIENCY Separate control and data planes Hardware and software redundancy In-service software upgradesASR1001-XModular ASR1006 2.5G Upgradeable to 5G, 10G, 20G Up to 8G Crypto ThroughputASR1002-X Modular, Redundant up to 200G Up to 60G Crypto ThroughputINTEGRATED IWAN SERVICES IOS Firewall, VPN, IPSec, PfRV3, NBAR2,AVC, AppNav, VRF, MPLS Scalable on-chip service provisioning 5G Upgradeable to 10G, 20G, 36G Up to 4G Crypto Throughput

Introduction to ACIDana TurnerConsulting Systems Engineerdanaturn@cisco.com

WebOutside(Tenant VRF)AppDBQoSQoSQoSFilterServiceFilterAPICACI FabricNon-Blocking Penalty Free OverlayApplication PolicyInfrastructureController

ACI and Today’s 3-Tier applicationsAppNetworkProfile“The Application / iceCould be many VMsP Defined PolicyDBQoSPFilterMostly physicalresourcesCould be mix of physical/virtual machines13

Application Network Profiles (ANP) – what’s that ?Application Network profiles are a group of EPGs and thepolicies that define the communication between them.Application Network ProfileEPG - WEBEPG - APPEPG - DB POLICY icies

ACI Fabric provides the next generationof analytic capabilitiesPetStore EventTriggered Eventsor QueriesActions:No new hosts or VMsEvacuate hypervisorsRe-balance clustersPer application, tenants, andinfrastructure: Health scoresLatencyAtomic countersResource consumptionPetStore DevPetStore ProdPetStore QA Leaf 1 and 2 Spine 1 – 3 Atomic counters Leaf 2 and 3 Spine 1 – 2 Atomic counters Leaf 3 and 4 Spine 2 – 3 Atomic countersAPICIntegrate with workload placement ormigrationVXLANPer-Hop VisibilityPhysical andVirtual as One

Northbound Rapid integration with existingAPImanagement rManagementOrchestrationFrameworks OpenStack Tenant- and application-awareObject-OrientedCentralized AutomationRESTful XML / JSONSouthboundAPI Publish data model Open source Enables application portability*Only straight chains supported at FCSOpen EcosystemFrameworkComprehensiveProgrammability andSystem Access

APICACI SpineNodesInsiemeFabricControllerACI LeafNodes ACI Fabric provides:‒Decoupling of endpoint identity, location, and associated policy, all of which are independent from the underlying topology‒Full normalization of the ingress encapsulation mechanism used: 802.1Q VLAN, IETF VXLAN, IETF NVGRE‒Distributed Layer 3 gateway to ensure optimal forwarding for Layers 3 and 2‒Support for standard bridging and routing semantics without standard location constraints (any IP address anywhere)‒ Service insertion and redirection‒Removal of flooding requirements for IP control plane (ARP, GARP)

Each node will beassigned loopback IPaddress(es) advertisedthrough IS-ISIP fabric withintegratedoverlayIP un-numbered40 Gb links ACI Fabric is based on an IP fabric supporting routing to the edge with an integrated overlay for host routing‒ All end-host (tenant) traffic within the fabric is carried through the overlay The fabric is capable of supporting an arbitrary number of tiers and/or partial mesh if required Why choose an integrated overlay?‒ Mobility, scale, multi-tenancy, and integration with emerging hypervisor designs‒ Data traffic can now carry explicit meta data that allows for distributed policy (flow-level control without requiring flow-levelprogramming)APIC

App TierAApp rServerChain“Security 5” Helps enable administrativeseparation between applicationtier policy and service definitionStage 1 .instinst . ServiceAdminStage NinstinstFirewallLoad BalancerendService ProfilebeginServiceGraph“Security 5” Chain Defined APIC as central point of networkcontrol with policy coordination Automation of service bringup/tear-down throughprogrammable interfacePolicy RedirectionProviders Elastic service insertionarchitecture for physical andvirtual services

Device Package Service automation requires avendor device package. It is a zipfile containingDevice Specification dev type “f5” service type “slb” param name “vip” dev ident “210.1.1.1” validator “ip” hidden “no” locked “yes” APIC – Policy ElementDevice ModelAPIC Device specification (XML file) Device scripts (Python)APIC Script InterfaceDevice-Specific Python Scripts APIC interfaces with the deviceusing device Python scripts APIC uses the deviceconfiguration model provided inthe package to pass appropriateconfigurations to the deviceDevice Interface: REST/CLIScript EngineAPIC NodeService Device

NetworkAdminVirtual IntegrationAPICAPIC Integrated gateway forVLAN, VxLAN, andNVGRE networks fromvirtual to physical Normalization for NVGRE,VXLAN, and VLANnetworks Customer not restricted byACI FabricVLANVXLANVMwareMicrosoftRed ANNVGREVLANVXLANESXHyper-VKVMVMwareMicrosoftRed HatVLANPHYSICALSERVER

ACI Operational Simplicity – GUI Drag and DropAccelerating Time to Deploy ApplicationEasy to Use, Policy Driven, Automated DeploymentDrag & DropTenantTenant Sales Deployed Network VRF Deployed Firewall DeployedApps DeployedACI rityPolicy“Now we can spin upSalesan environmentin 17 minutes(from 4.5 months)”Application- Vince Spina, DC Architect

Unified point of data center network automationand management:Layer anagement̶ Application-centric network policies̶ Data model-based declarative provisioning̶ Application, topology monitoring, and troubleshootingOpen RESTful API̶ Third-party integration (Layer 4 - 7 services, storage,compute, WAN, etc.)APICStorage SMEServer SME Network SME̶ Image management (Spine / Leaf)̶ Fabric inventory Single APIC cluster supports one million endpoints, 200,000 ports, 64,000 tenants Centralized access to all fabric information - GUI,CLI, and RESTful APIs Extensible to compute and storage managementPolicy-BasedProvisioningSecurity SMEApp. SMEOS SME

Topology discoverythrough LLDP usingACI-specific TLVs (ACIOUI)Loopback and VTEP IPaddresses allocated from“infra VRF” through DHCPfrom APICAPICAPIC ClusterAPICAPIC ACI Fabric supports discovery, boot, inventory, and systems maintenanceprocesses through the APIC‒Fabric discovery and addressing‒Image management‒Topology validation through wiring diagram and systems checks

NEXUS 9000 ACI PLATFORMSACI LEAVESACI SPINESACI 3128TX95049396PX9336PQNX-OS and ACIChoice of FabricArchitecturesBest Price / Performance10G / 40G / 100G

Shiyue Cheng, CCIEConsulting Systems EngineerCommercial East Area 2010 Cisco and/or its affiliates. All rights reserved.

Technology can connect us, empower us, and drive us. At Meraki we believeby simplifying powerful technology we can free passionate people to focuson their mission and reach groups previously left in the darkness.Technology that simply works 2010 Cisco and/or its affiliates. All rights reserved.27

Cisco Meraki: a complete cloud-managed networking solution- Wireless, switching, security, MDM, phones and cameras centrally managed over the web- Built from the ground up for cloud management- Integrated hardware, software, and cloud servicesLeader in cloud-managed networking- Among Cisco’s fastest-growing portfolios: over 100% annual growth- Tens of millions of devices connected worldwideRecognized for innovation- Gartner Magic Quadrant, InfoWorld Technology of the Year, CRN Coolest TechnologiesTrusted by thousands of customers worldwide: 2010 Cisco and/or its affiliates. All rights reserved.28

Security - UTMNG Firewall, Client VPN,Site to Site VPN, IDS/IPS,Anti-Malware, GeoNetworkingFirewallNAT/DHCP, 3G/4GCellular,ApplicationControlIntelligent WAN(IWAN)Web Caching, TrafficShaping, ContentFiltering 2010 Cisco and/or its affiliates. All rights reserved.29

Enabling transport independence, intelligent path control, application optimization, and secure connectivity for multi-sitedeployments.TransportIndependence IPSec overlay (Auto VPN) Scalable (Cloud Controller) Traffic distribution over multiplepathways (Internet, cellular,MPLS-to-VPN failover) 2010 Cisco and/or its affiliates. All rights reserved.ApplicationOptimizationIntelligent PathControl App visibility & control (Merakidashboard, group-basedpolicies, traffic analytics) Dynamic Path Selection Uplink chosen by link latency,data loss, etc. (performancebased routing) Application QoS & bandwidthoptimization (Traffic shaping)SecureConnectivity Intuitive, automatic,scalable VPN solution toconnect remote branchsites (Auto VPN) Uplink assigned by trafficprotocol, subnet, source,destination, etc. (PbR, policybased routing)30

Transport IndependenceConsistent deployment models simplify operationsIWAN HybridInternet 4GData CenterData CenterMX 400MX 400SP VISP AAuto VPNAuto VPNMPLSInternetIWAN Dual InternetData CenterMX 400MX 400MX 400ISP BISP AMX 400ISP AISP CDSLCableAuto VPNAuto VPNAuto VPNAuto VPNInternetInternetInternetInternet4GBranch 2010 Cisco and/or its affiliates. All rights reserved.BranchBranch31

Dual-active path: Dual-active VPN Dual-active VPN & MPLSDynamic Path Selection:Ensures that the best VPN tunnel is used basedWAN 2Secure VPN tunnel (active)Latency / loss thresholdWAN 1Secure VPN tunnel (active)Latency / loss thresholdon latency and loss performance metricsPolicy-based routing (PbR) :Allows uplinks to be intelligently assigned basedon traffic protocol, subnet, source, destination,etc.Data 2010 Cisco and/or its affiliates. All rights reserved.Based on L3 / L4 categorization, this datanormally travels out WAN 1 (PbR), butMX detects optimal path is WAN 2 basedon latency / loss on WAN 132

Q&A 2014 Cisco and/or its affiliates. All rights reserved.Cisco Confidential33

Interested in Joining Cisco Networking Academy? Go to netacad.com Scroll Down toGet Started Click Find an Academy Need Help?karsulli@cisco.com 2015 Cisco and/or its affiliates. All rights reserved.Cisco Confidential34

NetFlow Svc PnP Svc Network Svc Events Svc Inventory Svc IWAN Topology Trust Automation Security Policy Path Selection . ACI Fabric is based on an IP fabric supporting routing to the edge with an integrated overlay for host routing . Cisco Meraki: a complete cloud-managed networking