Home > Computing and Information Technology > Computer networking and communications > Cisco Software-Defined Access: (Networking Technology)
16%
Cisco Software-Defined Access: (Networking Technology)

Cisco Software-Defined Access: (Networking Technology)

4.3       |  3 Reviews 
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The definitive Cisco SD-Access resource, from the architects who train Cisco’s own engineers and partners This comprehensive book guides you through all aspects of planning, implementing, and operating Cisco Software-Defined Access (SD-Access). Through practical use cases, you’ll learn how to use intent-based networking, Cisco ISE, and Cisco DNA Center to improve any campus network’s security and simplify its management. Drawing on their unsurpassed experience architecting solutions and training technical professionals inside and outside Cisco, the authors explain when and where to leverage Cisco SD-Access instead of a traditional legacy design. They illuminate the fundamental building blocks of a modern campus fabric architecture, show how to design a software-defined campus that delivers the most value in your environment, and introduce best practices for administration, support, and troubleshooting. Case studies show how to use Cisco SD-Access to address secure segmentation, plug and play, software image management (SWIM), host mobility, and more. The authors also present full chapters on advanced Cisco SD-Access and Cisco DNA Center topics, plus detailed coverage of Cisco DNA monitoring and analytics. Learn how Cisco SD-Access addresses key drivers for network change, including automation and security Explore how Cisco DNA Center improves network planning, deployment, evolution, and agility Master Cisco SD-Access essentials: design, components, best practices, and fabric construction Integrate Cisco DNA Center and Cisco ISE, and smoothly onboard diverse endpoints Efficiently operate Cisco SD-Access and troubleshoot common fabric problems, step by step Master advanced topics, including multicast flows, Layer 2 flooding, and the integration of IoT devices Extend campus network policies to WANs and data center networks Choose the right deployment options for Cisco DNA Center in your environment Master Cisco DNA Assurance analytics and tests for optimizing the health of clients, network devices, and applications

Table of Contents:
Introduction xvii Chapter 1 Today’s Networks and the Drivers for Change 1 Networks of Today 1 Common Business and IT Trends 4 Common Desired Benefits 5 High-Level Design Considerations 6 Cisco Digital Network Architecture 10 Past Solutions to Today’s Problems 12 Spanning-Tree and Layer 2–Based Networks 13 Introduction to Multidomain 16 Cloud Trends and Adoption 18 Summary 20 Chapter 2 Introduction to Cisco Software-Defined Access 21 Challenges with Today’s Networks 22 Software-Defined Networking 22 Cisco Software-Defined Access 23 Cisco Campus Fabric Architecture 24 Campus Fabric Fundamentals 25 Cisco SD-Access Roles 27 Network Access Control 30 Why Network Access Control? 31 Introduction to Cisco Identity Services Engine 32 Overview of Cisco Identity Services Engine 32 Cisco ISE Features 34 Secure Access 34 Device Administration 37 Guest Access 38 Profiling 40 Bring Your Own Device 45 Compliance 46 Integrations with pxGrid 48 Cisco ISE Design Considerations 50 Cisco ISE Architecture 50 Cisco ISE Deployment Options 51 Standalone Deployment 51 Distributed Deployment 51 Dedicated Distributed Deployment 52 Segmentation with Cisco TrustSec 54 Cisco TrustSec Functions 54 Classification 55 Propagation 55 Enforcement 57 Summary 58 Chapter 3 Introduction to Cisco DNA Center 59 Network Planning and Deployment Trends 59 History of Automation Tools 60 Cisco DNA Center Overview 62 Design and Visualization of the Network 64 Site Design and Layout 64 Network Settings 69 Wireless Deployments 70 Network Discovery and Inventory 72 Discovery Tool 72 Inventory 74 Device Configuration and Provisioning 77 Summary 79 Chapter 4 Cisco Software-Defined Access Fundamentals 81 Network Topologies 81 Cisco Software-Defined Access Underlay 82 Manual Underlay 83 Automated Underlay: LAN Automation 84 Wireless LAN Controllers and Access Points in Cisco Software-Defined Access 89 Shared Services 90 Transit Networks 91 IP-Based Transit 91 SD-Access Transit 92 Fabric Creation 92 Fabric Location 93 Fabric VNs 94 Fabric Device Roles 94 Control Plane 95 Fabric Borders 96 Border Automation 98 Border and Control Plane Collocation 99 Fabric Edge Nodes 100 Intermediate Nodes 103 External Connectivity 104 Fusion Router 104 Host Onboarding 105 Authentication Templates 105 VN to IP Pool Mapping 106 SSID to IP Pool Mapping 108 Switchport Override 109 Summary 110 References in This Chapter 110 Chapter 5 Cisco Identity Services Engine with Cisco DNA Center 111 Policy Management in Cisco DNA Center with Cisco ISE 112 Integration of Cisco DNA Center and ISE 113 Certificates in Cisco DNA Center 113 Certificates on Cisco Identity Services Engine 115 Cisco ISE and Cisco DNA Center Integration Process 116 Group-Based Access Control 122 Segmentation with Third-Party RADIUS Server 126 Secure Host Onboarding in Enterprise Networks 128 Endpoint Host Modes in 802.1X 128 Single-Host Mode 128 Multi-Host Mode 128 Multi-Domain Mode 129 Multi-Auth Mode 129 802.1X Phased Deployment 130 Why a Phased Approach? 131 Phase I: Monitor Mode (Visibility Mode) 132 Phase II: Low-Impact Mode 133 Phase II: Closed Mode 134 Host Onboarding with Cisco DNA Center 136 No Authentication Template 137 Open Authentication Template 138 Closed Authentication 140 Easy Connect 141 Security in Cisco Software-Defined Access Network 144 Macro-Segmentation in Cisco SD-Access 144 Micro-Segmentation in Cisco SD-Access 145 Policy Set Overview in Cisco ISE 146 Segmentation Policy Construction in Cisco SD-Access 148 Corporate Network Access Use Case 149 Guest Access Use Case 159 Segmentation Outside the Fabric 164 Summary 164 References in This Chapter 165 Chapter 6 Cisco Software-Defined Access Operation and Troubleshooting 167 Cisco SD-Access Under the Covers 167 Fabric Encapsulation 167 LISP 168 VXLAN 171 MTU Considerations 172 Host Operation and Packet Flow in Cisco SD-Access 172 DHCP in Cisco SD-Access 172 Wired Host Onboarding and Registration 175 Wired Host Operation 176 Intra-Subnet Traffic in the Fabric 176 Inter-Subnet Traffic in the Fabric 179 Traffic to Destinations Outside of the Fabric 180 Wireless Host Operation 180 Initial Onboarding and Registration 180 Cisco SD-Access Troubleshooting 181 Fabric Edge 182 Fabric Control Plane 186 Authentication/Policy Troubleshooting 188 Authentication 188 Policy 190 Scalable Group Tags 191 Summary 193 References in This Chapter 193 Chapter 7 Advanced Cisco Software-Defined Access Topics 195 Cisco Software-Defined Access Extension to IoT 196 Types of Extended Nodes 198 Extended Nodes 198 Policy Extended Nodes 198 Configuration of Extended Nodes 200 Onboarding the Extended Node 203 Packet Walk of Extended Cisco SD-Access Use Cases 205 Use Case: Hosts in Fabric Communicating with Hosts Connected Outside the Fabric 205 Use Case: Traffic from a Client Connected to a Policy Extended Node 206 Use Case: Traffic to a Client Connected to a Policy Extended Node 207 Use Case: Traffic Flow Within a Policy Extended Node 207 Multicast in Cisco SD-Access 208 Multicast Overview 209 IP Multicast Delivery Modes 210 Multicast Flows in Cisco SD-Access 210 Scenario 1: Multicast in PIM ASM with Head-End Replication (Fabric RP) 211 Scenario 2: Multicast in PIM SSM with Head-End Replication 213 Scenario 3: Cisco SD-Access Fabric Native Multicast 214 Cisco SD-Access Multicast Configuration in Cisco DNA Center 216 Layer 2 Flooding in Cisco SD-Access 218 Layer 2 Flooding Operation 219 Layer 2 Border in Cisco SD-Access 221 Layer 2 Intersite 224 Layer 2 Intersite Design and Traffic Flow 224 Fabric in a Box in Cisco SD-Access 227 Cisco SD-Access for Distributed Campus Deployments 228 Types of Transit 229 IP Transit 229 Fabric Multisite or Multidomain with IP Transit 230 Cisco SD-Access Transit 232 Cisco SD-WAN Transit 237 Policy Deployment Models in Cisco SD-Access Distributed Deployment 238 Cisco SD-Access Design Considerations 240 Latency Considerations 240 Cisco SD-Access Design Approach 241 Very Small Site 241 Small Site 242 Medium Site 243 Large Site 243 Single-Site Design Versus Multisite Design 244 Cisco SD-Access Component Considerations 245 Underlay Network 246 Underlay Network Design Considerations 246 Overlay Network 247 Overlay Fabric Design Considerations 247 Fabric Control Plane Node Design Considerations 248 Fabric Border Node Design Considerations 248 Infrastructure Services Design Considerations 249 Fabric Wireless Integration Design Considerations 249 Wireless Over-the-Top Centralized Wireless Option Design Considerations 250 Mixed SD-Access Wireless and Centralized Wireless Option Design Considerations 250 Wireless Guest Deployment Considerations 250 Security Policy Design Considerations 251 Cisco SD-Access Policy Extension to Cisco ACI 252 Summary 254 References in This Chapter 254 Chapter 8 Advanced Cisco DNA Center 255 Cisco DNA Center Architecture and Connectivity 256 Hardware and Scale 256 Network Connectivity 256 High Availability and Clustering with Cisco DNA Center 258 Software Image Management 259 Image Repository 261 Golden Image 262 Upgrading Devices 263 Cisco DNA Center Templates 266 Template Creation 267 Template Assignment and Network Profiles 269 Deploying Templates 270 Plug and Play 272 Onboarding Templates 273 PnP Agent 275 Claiming a Device 276 Cisco DNA Center Tools 280 Topology 280 Command Runner 281 Security Advisories 283 Summary 284 References in This Chapter 284 Chapter 9 Cisco DNA Assurance 285 Assurance Benefits 285 Challenges of Traditional Implementations 285 Cisco DNA Analytics 286 Cisco DNA Assurance Architecture 287 Cisco DNA Assurance Data Collection Points 289 Streaming Telemetry 290 Network Time Travel 292 Health Dashboards 292 Overall Health Dashboard 293 Network Health Dashboard 294 Cisco SD-Access Fabric Network Health 296 Client Health Dashboard 297 Application Health Dashboard 299 Cisco DNA Assurance Tools 300 Intelligent Capture 300 Anomaly Capture 301 Path Trace 303 Sensor Tests 303 Cisco AI Network Analytics 304 Summary 306 References in This Chapter 306 Glossary 307 9780136448389 TOC 6/24/2020


Best Sellers


Product Details
  • ISBN-13: 9780136448389
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 230 mm
  • No of Pages: 352
  • Series Title: Networking Technology
  • Weight: 588 gr
  • ISBN-10: 0136448380
  • Publisher Date: 11 Nov 2020
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Spine Width: 18 mm
  • Width: 185 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

4.3       |  3 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
4.3       |  3 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Cisco Software-Defined Access: (Networking Technology)
    Pearson Education (US) -
    Cisco Software-Defined Access: (Networking Technology)
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Cisco Software-Defined Access: (Networking Technology)

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!
      ASK VIDYA