12-06-2017 05:47 AM - edited 03-08-2019 05:25 PM
Hi everyone,
I have been reading about DNA-Center for some days now, and I guess that TrustSec is a strong requirement to use the Policy feature, and I did not find it clearly stated. Without this, DNA-Center just creates an insecure, flat single-VLAN LAN.
In DNA-Center, the Policy app make sense only on a SD-Access LAN, correct me if not. From what I see, Policy definitions need ISE to be fully integrated, fully configured to the TrustSec level (groups created, SGT Tags). So I can see 4 cases, please correct me if I missed something:
I know, lots of questions... but not having DNA-Center to play with, relying only on videos/pres/marketing material ... I sincerely felt I had to work out the guts of DNA-Center out of a bunch of marketing talk.
I would like to have this clear to make a solid business-case (a real one, with design architecture and process behind), that will choose the correct elements and appliances for the specific client needs. Perhaps SD-Access makes sense only for companies using or willing to fully integrate ISE and TrustSec (DNA-Center has its own benefits alone, of course)
Sorry for the long post
Solved! Go to Solution.
05-16-2018 05:23 PM
Hi Jose.
I was browsing the Communities and saw that your post was never answered. You raise some good questions, so you deserve an answer. Some parts of your assessment are correct, and others are not. Let me try to clarify some.
The long-term vision of Cisco DNA (and Intent Based Networking in general) requires key capabilities like 'host mobility' with 'dynamic authentication & identity' and 'address-independent policy enforcement', and an infrastructure to support that.
For those reasons... you are quite right that DNA (and DNA Center) favors SD-Access fabric overlay with full-blown ISE and CTS for Policy administration. Without those, we will forever be tied to IP subnets, VLANs and IP-based ACLs (circa 1990).
However, SD-Access separates IP subnets & VLANs (called Pools) from group-based policy enforcement (called Scalable Groups). Furthermore, the fabric overlay is routed and does not use "VLAN" to forward traffic. VLANs (and corresponding SVI with Anycast IP) terminate at the first-hop edge device, and are then routed via the fabric to the remote edge device.
Also, as you noted: DNA Center does support both fabric & non-fabric Provision and Assurance workflows. Similarly, the Policy workflow does actually support IP-based ACLs for non-fabric designs. Of course, you also take on the additional complexity.
For example - DNA Center Policy > Policy Administration
We understand that this will be a journey... and it will take time to reach the long-term goal. You may want to start out non-fabric, with IP-based policy... and then move on to fabric and group-based policy later.
The important thing is to decide if that's the direction you will eventually go... and then build the infrastructure to support it!
05-16-2018 05:23 PM
Hi Jose.
I was browsing the Communities and saw that your post was never answered. You raise some good questions, so you deserve an answer. Some parts of your assessment are correct, and others are not. Let me try to clarify some.
The long-term vision of Cisco DNA (and Intent Based Networking in general) requires key capabilities like 'host mobility' with 'dynamic authentication & identity' and 'address-independent policy enforcement', and an infrastructure to support that.
For those reasons... you are quite right that DNA (and DNA Center) favors SD-Access fabric overlay with full-blown ISE and CTS for Policy administration. Without those, we will forever be tied to IP subnets, VLANs and IP-based ACLs (circa 1990).
However, SD-Access separates IP subnets & VLANs (called Pools) from group-based policy enforcement (called Scalable Groups). Furthermore, the fabric overlay is routed and does not use "VLAN" to forward traffic. VLANs (and corresponding SVI with Anycast IP) terminate at the first-hop edge device, and are then routed via the fabric to the remote edge device.
Also, as you noted: DNA Center does support both fabric & non-fabric Provision and Assurance workflows. Similarly, the Policy workflow does actually support IP-based ACLs for non-fabric designs. Of course, you also take on the additional complexity.
For example - DNA Center Policy > Policy Administration
We understand that this will be a journey... and it will take time to reach the long-term goal. You may want to start out non-fabric, with IP-based policy... and then move on to fabric and group-based policy later.
The important thing is to decide if that's the direction you will eventually go... and then build the infrastructure to support it!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide