<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SXP with multiple border nodes recommended design in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920317#M2600</link>
    <description>&lt;P&gt;u need to legalize manual modifications by creating DayN network templates &amp;amp; associating them with devices of interest. After u provision devices w/ that templates from DNAC configuration becomes compliant &amp;amp; always be used as part of device provisioning&lt;/P&gt;</description>
    <pubDate>Fri, 08 Sep 2023 13:47:22 GMT</pubDate>
    <dc:creator>Andrii Oliinyk</dc:creator>
    <dc:date>2023-09-08T13:47:22Z</dc:date>
    <item>
      <title>SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920305#M2599</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I was wondering what the recommended approach is for implementing IP-SGT SXP connections to ISE for every VRF from multiple border nodes.&lt;BR /&gt;In guides the DNA Center created network loopback address is used with a single border node. In environments with multiple external borders nodes this does not work. And if the network is deleted or changed the SXP connection needs to be remade. I don't want to use the peer-networks because the SXP connection will go down when the peer goes down and takes additional time after the peer-link is up to restore, possibly not enforcing policies correctly for a moment until the SXP connection is back up.&lt;/P&gt;&lt;P&gt;I have managed to get it to work by creating local loopbacks for each vrf and adding it manually in lisp and bgp. But as I understand it is not recommended/supported to manually edit lisp as DNA Center overrides it when configuring new networks.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 13:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920305#M2599</guid>
      <dc:creator>Jakob Mellberg</dc:creator>
      <dc:date>2023-09-08T13:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920317#M2600</link>
      <description>&lt;P&gt;u need to legalize manual modifications by creating DayN network templates &amp;amp; associating them with devices of interest. After u provision devices w/ that templates from DNAC configuration becomes compliant &amp;amp; always be used as part of device provisioning&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 13:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920317#M2600</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2023-09-08T13:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920336#M2601</link>
      <description>&lt;P&gt;It seems that "router lisp" is a blacklisted command in dna center templates and cannot be used to override lisp changes.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 14:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920336#M2601</guid>
      <dc:creator>Jakob Mellberg</dc:creator>
      <dc:date>2023-09-08T14:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920499#M2602</link>
      <description>&lt;P&gt;not sure i get why do u need to use your custom loopbacks under router lisp. u need to have them in the VN &amp;amp; u can directly inject their host-routes into BGP vpnv4 af&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 16:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920499#M2602</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2023-09-08T16:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920578#M2603</link>
      <description>&lt;P&gt;I have a Pub/Sub fabric with 2 Anywhere Border nodes (Catalyst 9500) that does outbound policy enforcement on the peer vlans.&lt;BR /&gt;I am using ISE to push IP-SGT mappings from ISE to all vrfs. The scenario I am trying to mitigate is when one border node looses its upstream bgp I want the SXP connection to still be active through the other border node. Otherwise when the border node recovers its upstream bgp the SXP will not be active and IP-SGT mappings will not be enforced until SXP is back up. I have injected the loopbacks into BGP so the upstream fusion routers can see the route.&lt;/P&gt;&lt;P&gt;The only way I found that the border nodes can reach each others loopbacks is when I manually add the route to lisp using the database-mapping command in the respective vrfs (instance-id).&lt;/P&gt;&lt;P&gt;Without: database-mapping 10.128.4.13/32 locator-set rloc_xxxxxx&lt;/P&gt;&lt;P&gt;ORE-LH-TA05-BN1#sh ip cef vrf INTERNAL 10.128.4.13/32&lt;BR /&gt;10.128.4.13/32&lt;BR /&gt;nexthop 10.129.0.49 TwentyFiveGigE1/0/45 unusable: no label&lt;BR /&gt;nexthop 10.129.0.53 TwentyFiveGigE1/0/46 unusable: no label&lt;BR /&gt;ORE-LH-TA05-BN1#ping vrf INTERNAL 10.128.4.13 source lo 3&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.128.4.13, timeout is 2 seconds:&lt;BR /&gt;Packet sent with a source address of 10.128.3.13&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;With manual lisp mapping&lt;BR /&gt;ORE-LH-TA05-BN1#sh ip cef vrf INTERNAL 10.128.4.13/32&lt;BR /&gt;10.128.4.13/32&lt;BR /&gt;nexthop 10.129.0.2 LISP0.4101&lt;BR /&gt;ORE-LH-TA05-BN1#ping vrf INTERNAL 10.128.4.13 source lo 3&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.128.4.13, timeout is 2 seconds:&lt;BR /&gt;Packet sent with a source address of 10.128.3.13&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Is there some other approach I can take?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 18:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920578#M2603</guid>
      <dc:creator>Jakob Mellberg</dc:creator>
      <dc:date>2023-09-08T18:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920583#M2604</link>
      <description>&lt;P&gt;If you deploy fabric multicast (headend or native, it does not matter), you will now have a unique loopback for the VRF in each Border which you can use as SXP source &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 19:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920583#M2604</guid>
      <dc:creator>jalejand</dc:creator>
      <dc:date>2023-09-08T19:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920590#M2605</link>
      <description>&lt;P&gt;Hi Jay&lt;BR /&gt;it make a sense but it still dosnt prevent admin from creation custom interfaces within VNs &amp;amp; advertising them in BGP. assuming this non-DNAC-native configuration will be legalized via network templates/profiles to cut off DNAC incompliance woos :0)&lt;BR /&gt;lucky IOS-XE in SDA is totally different from NX-OS in ACI mode&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 19:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920590#M2605</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2023-09-08T19:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920596#M2606</link>
      <description>&lt;P&gt;ultimately, it needs time for the product to reach a mature :0D&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 19:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4920596#M2606</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2023-09-08T19:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: SXP with multiple border nodes recommended design</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4921071#M2615</link>
      <description>&lt;P&gt;-Some customers move SXP to the Fusion device and propagate data plane SGTs between Fusion and SD-Access Border Nodes. I realize it's not always possible, but FYI in case helps in your scenario.&lt;/P&gt;
&lt;P&gt;-Correct, at this time we do not allow changes under router lisp, an incorrect modification could take down the SD-Access Fabric so it's considered generally safer to block router lisp.&lt;/P&gt;
&lt;P&gt;-If you inject Border Node loopbacks into BGP then you'll need per-VRF IBGP between the Border Nodes to propagate your manual injections when BN-Fusion BGP is down. Note that this will counterfeit Pub/Sub Dynamic Default Border behavior unless you manually block default route between BN IBGP sessions. Because you chose Anywhere Border, BGP is imported to LISP,&amp;nbsp; you may not want to import IBGP routes into LISP when L3HO is down, if you want entirely optimal forwarding paths (it can be a personal preference, or a design restriction, it's not a technical restriction). Perhaps filter per-VRF IBGP&amp;nbsp; to the minimum necessary routes and test it thoroughly in your specific environment.&lt;/P&gt;
&lt;P&gt;-You're right, it's reasonable to have an option to inject manually created loopbacks into LISP, please open a feature request by clicking "Make a Wish" in the DNA Center UI, under the question mark menu in the top right corner.&lt;/P&gt;
&lt;P&gt;Regards, Jerome&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 00:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/sxp-with-multiple-border-nodes-recommended-design/m-p/4921071#M2615</guid>
      <dc:creator>jedolphi</dc:creator>
      <dc:date>2023-09-11T00:19:14Z</dc:date>
    </item>
  </channel>
</rss>

