SD Access Flashcards

(35 cards)

1
Q

What protocol is used in the Cisco SD-Access solution for scalable connectivity?

A

Locator/ID Separation Protocol (LISP)

LISP is specifically designed to enhance the control plane in network architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does LISP separate in network architectures?

A

Device identity (Endpoint Identifier or EID) from its location (Routing Locator or RLOC)

This separation allows for increased flexibility and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of LISP in the Cisco SD-Access solution?

A

To provide scalable and efficient connectivity within the fabric

LISP acts as a control plane protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: LISP is a proprietary protocol.

A

False

LISP is an industry-standard protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: LISP stands for _______.

A

Locator/ID Separation Protocol

This protocol is crucial for managing device identities and locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two main components of Cisco’s fabric architecture?

A

Underlay network and overlay network

These components work together to provide a scalable, flexible, and efficient networking solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the underlay network represent?

A

The physical infrastructure that forms the foundation of the fabric

It consists of physical network devices such as switches and routers, their physical connectivity, and routing protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of the underlay network in Cisco’s fabric architecture?

A

Establishes the transport infrastructure over which the overlay network operates

It includes the physical devices and their interconnections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the overlay network abstract?

A

The underlying physical infrastructure

This abstraction allows for more flexible and dynamic allocation of network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the overlay network implemented?

A

Using virtualization and encapsulation techniques

This allows for the creation of a logical network on top of the physical infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: The underlay network consists of physical network devices such as _______.

A

switches and routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: The overlay network operates independently of the underlay network.

A

False

The overlay network relies on the underlay network for its transport infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does VXLAN stand for?

A

Virtual Extensible LAN

VXLAN is a network virtualization technology that allows the creation of a virtualized Layer 2 network over a Layer 3 infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of VXLAN tunnel endpoint (VTEP) devices?

A

To map tenants’ end devices to VXLAN segments and to perform VXLAN encapsulation and de-encapsulation

VTEP devices are crucial for enabling the communication of virtual machines across different network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many interfaces does each VTEP function have?

A

Two interfaces

These interfaces include a switch interface for local LAN communication and an IP interface for transport over the IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of the switch interface in a VTEP?

A

To support local endpoint communication through bridging

This interface allows devices within the same local area network to communicate directly.

17
Q

What is the function of the IP interface in a VTEP?

A

To connect to the transport IP network

The IP interface enables communication across different networks by using standard IP routing.

18
Q

Fill in the blank: VXLAN uses _______ to perform encapsulation and de-encapsulation.

A

VXLAN tunnel endpoint (VTEP) devices

This process is essential for creating virtual networks that can span across physical network boundaries.

19
Q

What type of solution is VXLAN?

A

VXLAN is a MAC-in-UDP type of solution.

20
Q

What does VXLAN permit regarding Layer 2 information?

A

VXLAN permits the encapsulation of the Layer 2 information into Layer 3 using UDP.

21
Q

What does VXLAN allow for in terms of network infrastructure?

A

VXLAN allows for flexible overlays that contain the Layer 2 information.

22
Q

Why might you need to use VXLAN in a routed network?

A

To extend the Layer 2 information from one part of the routed network to another.

23
Q

Fill in the blank: VXLAN permits the encapsulation of Layer 2 information into Layer 3 using _______.

24
Q

True or False: VXLAN can only be used within a single Layer 2 network.

25
What role does CTS play in Cisco SD-Access?
Provides secure access control and segmentation within the network
26
What does CTS leverage to enforce policy-based access control?
Cisco Identity Services Engine (ISE) and network devices
27
What are the contextual attributes used by CTS to create security policies?
* User identity * Device type * Location * Time of access
28
What does CTS allow for in terms of network policy enforcement?
Dynamic policy enforcement throughout the network infrastructure
29
What are trustsec domains?
Logical divisions within the network for segmentation and isolation
30
What do Security Group Tags (SGTs) do?
Classify endpoints for access policy enforcement
31
What are Security Group ACLs (SGACLs) used for?
Define allowed traffic between different SGTs
32
What type of connections does CTS use to propagate SGTs?
Security Group Tag Exchange Protocol (SXP) connections
33
Fill in the blank: CTS employs _______ to classify and enforce access policies.
Security Group Tags (SGTs)
34
True or False: CTS allows for static policy enforcement throughout the network.
False
35
What devices are included in the network infrastructure for dynamic policy enforcement?
* Switches * Routers * Wireless access points