10-29-2021 09:03 AM
I am working on a SD-access design and green field deployment for our client I have attached a diagram to illustrate the design.
Firewall would connect outside to fabric borders which has connectivity to Internet, WAN and DMZs. In addition, those firewalls are used for East-West traffic between servers in server farm as well.
Here are some technical questions prior to finalizing the low level design.
1- At first place, is it a valid design? I would love to have your valuable inputs and recommendations.
2- For now, there is no plan for micro-segmentation using ISE and SGTs by customer. That said, macro-segmentation is way to go in the fabric for segmenating traffic between Corporate users, IoTs, Guest etc. VNs
In the design, I will use data center distribution switch for L3 handoff to handle communication between separate VN’s or VRF or from VN/VRF to Shared services residing at the Data Center. I want to ensure internet/unknown traffic originating from campus users is routed directly to firewalls.
What is recommended approach to accomplish it?
3- How should routing be configured when North-South traffic from clients to servers when some servers have network segment behind firewalls? I am guessing I have to creates VRFs on Data center switch then import them Campus VNs!
4- There would be full mesh connectivity between Border nodes and Fusion devices and cross-links between redundant border devices. What routing protocols and configuration will be needed ensure no traffic is disrupted if any link or device fails?
5- I have some IoTs devices for Building Management Systems (BMS) like HVAC, Campus Security and their servers are located in data center block, however these devices should have L2 adjacency with the server ? What is the optimal solution since all the links in campus fabric is L3.
Hoping for valuable suggestions from the great experts. Thanks in advance.
10-29-2021 09:50 AM
There is no diagram attached, unless I am missing it.
Cheers,
Scott Hodgdon
Senior Technical Marketing Engineer
Enterprise Networking and Cloud Group
10-29-2021 10:34 AM - edited 10-29-2021 10:36 AM
I am sorry, my bad I have attached now.
10-29-2021 12:33 PM
Let me address each point individually ...
Cheers,
Scott Hodgdon
Senior Technical Marketing Engineer
Enterprise Networking and Cloud Group
10-29-2021 04:50 PM
Thank you for detailed explanation, highly appreciated.
1. Those borders nodes are hosting both CP + FB
2. I agree with you to use the DC switches to single handedly manage the L3 handoff to route any VN traffic destined to Data center subnets, however for internet traffic from VNs I am intending to direct them to firewalls VN>Border<Firewalls.
3. Servers subnets would be segmented behind firewalls to control the east-west traffic between them. How they can talk to campus VNs if L3 supposedly configured on DC switches ? I have just snippet the diagram and zoomed in to depict better. Please see attached.
4. Implementation is scheduled after a week, so please suggest the configuration considering the current DNAC software release
5. IoTs devices gateway will be on fabric borders.Out of curiosity since you mentioned, how to configure the IP gateway outside the fabric for a VLAN ?
11-01-2021 07:08 AM
Cheers,
Scott Hodgdon
Senior Technical Marketing Engineer
Enterprise Networking and Cloud Group
11-05-2021 05:45 AM
Thank you @Scott Hodgdon and sorry for my late response
For second point, from security and standard network architecture perspective, would be valid design to route the campus internet traffic passing through Data center switches
For last L2 IoT issue, how to resolve this issue?
11-10-2021 08:58 AM
The only way to do what you want (no IP Gateway on the Edge Nodes) is to have the gateways outside the fabric and use a mechanism such as L2VNI to transport traffic to those gateways.
Is there any SD-Access Wireless involved here with these IOT clients, or are they all wired clients ?
Cheers,
Scott Hodgdon
Senior Technical Marketing Engineer
Enterprise Networking and Cloud Group
11-10-2021 10:00 AM - edited 11-10-2021 10:15 AM
we have both wired and wireless IoT clients. Extending the L2VN to DC, wouldn't be a terrible?
11-10-2021 10:34 AM
It wouldn't have to extend to the DC, just to a gateway outside the fabric.
Do any of the IOT clients have overlapping IP spaces ? If not, there is another way that could work, but that also requires Cisco Approval as it is a non-standard design.
Is the plan to use SD-Access Wireless, or will wireless be Over The Top (OTT) and outside the fabric ?
Cheers,
Scott Hodgdon
Senior Technical Marketing Engineer
Enterprise Networking and Cloud Group
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide