Cisco Software-Defined Access (SDA): Use Case Implementation, Operations, & Troubleshooting (SDAOTS)

Skip to Schedule / Outline
5 days - $4,495

This 5-day deep dive training course explores the capabilities of the Cisco Software-Defined Access (SDA) solution. Students will learn how to implement SDA for different solution verticals. It also addresses the details of how to operate and troubleshoot the different capabilities of the underlying solution components.

This Course is for…

The primary audience for this course is as follows:
IT management, to understand how to address key business requirements with greater efficiency and flexibility in network service delivery
IT solution architects, to understand the role that SDA plays in enabling such efficiency and flexibility for network services in the context of IT solution delivery
IT and network security architects, to understand how the integrated capabilities of the SDA solution are used to design and implement network segmentation-based security
IT operations engineers, integrating network and application visibility and root cause analysis into integrated IT case handling workflows
Networking Admin and Operations installing, integrating, configuring and operating Cisco DNA Center, Cisco Identity Services Engine (ISE), and other solution components, in the context of Cisco SDA based network services.

Schedule / Enroll

StartsTimePriceEnroll
08/12/202410:00 AM - 6:00 PM ET$4,495.00
09/16/202410:00 AM - 6:00 PM ET$4,495.00
10/07/202410:00 AM - 6:00 PM ET$4,495.00
11/18/202410:00 AM - 6:00 PM ET$4,495.00
12/02/202410:00 AM - 6:00 PM ET$4,495.00
  • Course Outline
  • Objectives
  • 1 – Introduction to Cisco’s Software Defined Access (SD-Access)

    • Understanding Cisco Intent-Based Networking
    • Understanding Cisco SDA Use Cases customer’s benefits including business and technical outcomes and capabilities
    • Cisco DNA Center Introduction
    • SD-Access Overview
    • SD-Access Benefits
    • SD-Access Key Concepts
    • SD-Access Main Components
    • Fabric Control Plane Node
    • Fabric Border Node
    • Fabric Edge Node
    • Fabric Wireless LAN Controller and Fabric Enabled Access Points
    • Cisco DNA Center Automation
    • Cisco ISE (Policy)
    • Cisco StealthWatch (Traffic Analysis)
    • DNA Center Assurance

    2 – Deployment and Initial setup for the Cisco DNA-Center

    • Cisco DNA-Center Appliances
    • Cisco DNA-Center Deployment Models
    • Single Node Deployment
    • Clustered Deployment
    • Installation Procedure
    • Initial Setup and Configuration
    • GUI Navigation

    3 – Design

    • Network design options
    • Sites
    • Creating Enterprise and Sites Hierarchy
    • Configuring General Network Settings
    • Loading maps into the GUI
    • IP Address Management
    • Software Image Management
    • Network Device Profiles
    • AAA
    • SNMP
    • Syslog
    • IP address pools
    • Image management
    • Creating Enterprise and Guest SSIDs
    • Creating the wireless RF Profile
    • Cresting the Guest Portal for the Guest SSIDs
    • Network profiles
    • Authentication templates

    4 – Policy

    • 2-level Hierarchy
    • Macro Level: Virtual Network (VN)
    • Micro Level: Scalable Group (SG)
    • Policy
    • Policy in SD-Access
    • Access Policy: Authentication and Authorization
    • Access Control Policy
    • Application Policy
    • Extending Policy across domains
    • Preserving Group Metadata across Campus, WAN and DC
    • Enforcing policy in Firewall domains
    • Cross Domain Policies

    5 – SDA – Provision

    • Devices Onboarding
    • Templates
    • IP Transits
    • Fabric Domains
    • Adding Nodes

    6 – SDA – Assurance

    • Overview of DNA Assurance
    • Cisco DNA Center Assurance- Use Cases Examples
    • Network Health & Device 360
    • Client Health & Client 360
    • Application Health & Application 360
    • Cisco SD- Application Visibility Control (AVC) on DNA-Center
    • Proactive troubleshooting using Sensors

    7 – Cisco SD-Access Distributed Campus Design

    • Introduction to Cisco SD-Access Distributed Campus Design – The Advantage?
    • Fabric Domain vs Fabric Site
    • SD-Access Transits:
    • IP-Based Transit
    • Cisco SD-Access Transit
    • Cisco SD-WAN Transit
    • Deploying the Cisco Distributed Campus with SD-Access Transit
    • Site considerations
    • Internet connectivity considerations
    • Segmentation considerations
    • Role of a Cisco Transit Control Plane
    • Cisco SD-Access Fabric in a Box
    • The need for FiaB
    • Deploying the FiaB

    8 – Cisco SD-Access Brownfield Migration

    • Cisco SD-Access Migration Tools and Strategies
    • Two Basic Approaches:
    • Parallel Deployment Approach
    • Incremental Deployment Approach
    • Integration with existing Cisco ISE in the network – Things to watch out for!
    • Choosing the correct Fusion Device
    • Existing Core as Fusion
    • Firewall as Fusion
    • When do you need the SD-Access Layer-2 Border?
    • L2 Border – Understanding the requirement
    • Designing and Configuring the L2 Border
    • L2 Border – Not a permanent solution

    9 – Cisco DNA Center Automation- Use Cases Examples

    • DAY0: Onboarding new devices using Zero Touch Deployment
    • DAY1: Configurations using Templates
    • DAYN: Security Advisories based on Machine Reasoning Engine
    • DAYN: Simplified Software Management based on Golden Images
    • DAYN: Defective Device Replacement – RMA

    10 – 3rd Party Integrations

    • ServiceNow
    • Integration
    • Management
    • InfoBlox IPAM
    • Integration
    • Management

    11 – Specific Use Cases

    • Use Case: STACK LAN Automation
    • Use Case: Silent Hosts
    • Use Case: Wake on LAN
    • Use Case: The need for L2 flooding
    • Use Case: Multicast in the SD-Access Fabric

    12 – Cisco SD-Access Multi-Domain Integrations

    • Cisco SD-Access to ACI Integrations
    • Phase-1: Policy Plane Integration
    • Phase-2: Data Plane Integration
    • Cisco SD-Access to Cisco SD-WAN Integrations
    • What is possible today? SD-WAN Transit setup.
    • Phase-1: The one box solution
    • Phase-2: The two box solution

    13 – Troubleshooting

    • Fabric
    • Layer 3 forwarding
    • Layer 2 forwarding
    • Multicast Forwarding
    • Security in the Fabric
    • Troubleshooting Multi-Site Deployments
  • Upon completing this course, the learner will be able to meet these overall objectives:
    Articulate the value of Cisco SDA Use Cases including, for example: saving operational and management cost to maintain and support ever growing network infrastructure; central security policy to comply to regional or global regulatory requirements and enterprise security policy; deliver best-in-class services to end-users; leveraging networking insights and trends to optimize business process and workflows. Some real scenarios such as supporting multi-mode collaboration within shared workspaces in life sciences; accelerating the deployment of “pop-up” sites for emergency medical purposes; creating integrated building management solutions; zero-touch day 0 network turn-up of additional sites, rapid response to network threat and vulnerabilities, and similar.
    Describe the technical capabilities of Cisco DNA Center and how they are applied in SDA Use Cases. This includes the lifecycle stages of network device discovery, assigning network devices to sites, network design options, provisioning, software image management, building a fabric, segmentation design, assurance, application policy, etc.
    Set up an SDA environment, integrating Cisco Identity Services Engine (ISE) and other solution components as required.
    Apply troubleshooting methods, processes, tips to resolve implementation and maintenance issues of the following aspects of the technical solution:
    Device Onboarding, including device discovery, Plug-and-Play and LAN Automation
    Network design settings, including sites, AAA, SNMP, Syslog, IP address pools, image management, network profiles, and authentication templates
    Policies for access control, applications and virtual networks
    Provisioning, including template-based provisioning for day 0 and day N operations
    Network Segmentation, including the application of Cisco TrustSec security with Scalable Group Tags (SGTs) and Virtual Networks
    Assurance to monitor network, endpoint, and applications to ensure best user experience
    Integration of ServiceNow for an integrated IT service management lifecycle
    Integration of InfoBlox for integrated IPAM