SDA HLD Template v1.3
SDA HLD Template v1.3
SDA HLD © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 49
Contents
Introduction..................................................................................................................................................................................................................... 4
SDA Partner Resource Center.................................................................................................................................................................................... 4
SDA Design Engineers.............................................................................................................................................................................................. 4
Document Purpose..................................................................................................................................................................................................... 4
Why is Completing the HLD is recommended Prior to Placing the Order?................................................................................................................4
Business Objectives......................................................................................................................................................................................................... 5
Customer’s Business Goals........................................................................................................................................................................................ 5
Estimated Timelines........................................................................................................................................................................................................ 6
Business Intent........................................................................................................................................................................................................... 7
Scope & Scale............................................................................................................................................................................................................ 8
Miscellaneous............................................................................................................................................................................................................ 9
Customer Network Overview........................................................................................................................................................................................ 10
Physical Network Topology..................................................................................................................................................................................... 10
Design Considerations and Scope................................................................................................................................................................................. 12
Cisco Software Defined Access solution.................................................................................................................................................................. 12
Cisco DNA Center 1.2.10.............................................................................................................................................................................................. 13
Network Connectivity................................................................................................................................................................................................... 15
Network Connectivity Services................................................................................................................................................................................ 15
Network Connectivity: Wired Connections..............................................................................................................................................................17
Network Connectivity: Underlay and Overlay......................................................................................................................................................... 20
Network Connectivity: Wireless.............................................................................................................................................................................. 22
Network Connectivity: Transit................................................................................................................................................................................. 23
Policy............................................................................................................................................................................................................................ 25
Policy: Overview..................................................................................................................................................................................................... 25
Policy: General........................................................................................................................................................................................................ 26
Policy: Macro and Micro Segmentation................................................................................................................................................................... 27
Policy: Cisco Identity Services Engine.................................................................................................................................................................... 28
Cisco SDA Design Guidance........................................................................................................................................................................................ 34
Very Small Design................................................................................................................................................................................................... 34
Small Design............................................................................................................................................................................................................ 36
Medium Design........................................................................................................................................................................................................ 36
Large Design............................................................................................................................................................................................................ 37
Cisco DNAC Ports........................................................................................................................................................................................................ 39
Cisco DNAC Node Communications.......................................................................................................................................................................39
Cisco DNA Center 1.2.10 Scale.................................................................................................................................................................................... 40
Cisco SDA Supported Latency...................................................................................................................................................................................... 41
Latency Requirements (RTT)................................................................................................................................................................................... 41
Cisco SDA Supported Wired Platforms........................................................................................................................................................................ 42
Fabric Edge, Border and Control Plane.................................................................................................................................................................... 42
Cisco SDA Supported Wireless Platforms..................................................................................................................................................................... 43
FEW and OTT......................................................................................................................................................................................................... 43
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 49
Policy Details................................................................................................................................................................................................................ 44
Deployment Details....................................................................................................................................................................................................... 47
Unknowns................................................................................................................................................................................................................ 47
High Availability..................................................................................................................................................................................................... 47
Migration................................................................................................................................................................................................................. 47
ISE Node details...................................................................................................................................................................................................... 47
Bill of Materials (BOM)................................................................................................................................................................................................ 49
Appendix....................................................................................................................................................................................................................... 50
SDA Partner Resource Center.................................................................................................................................................................................. 50
SDA Ordering Guide............................................................................................................................................................................................... 50
SDA CVD Documents............................................................................................................................................................................................. 50
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 49
Introduction
Document Purpose
This document provides a template to be used when creating a high-level design (HLD) for the Cisco Software Define Access (SDA).
The Cisco TAC or Enterprise Business Unit representatives may request a copy of the HLD with any support or escalation case.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 49
Business Objectives
Customer’s Business Goals
Describe the customer’s business goals. Consider the following example business goals:
●
Simplify my network operations by using automation, there are many challenges today in managing the network because of
manual configuration and fragmented tool offerings.
●
Faster change management, standard operational activities in running a network e.g. upgrade software and configurations
periodically
●
Provide faster resolution to current issues, whenever a failure occurs provide visibility for pinpointing and resolving the issue.
properly correlate collected data to understand the various contexts of network and user behaviors
●
Get visibility in to users and devices connecting to the network -- Profiling for visibility or inventory management
●
Implement a consistent policy for Wired and Wireless networks by providing role-based access control and segmentation for
East-West as well as North-South traffic.
●
Differentiation of service based on user identity, device type, location etc …
●
Regulatory compliance
●
Providing guest access
●
Managing employee-provided devices (e.g., iPads)
●
Port lockdown
●
Ensuring endpoint health or posture
●
Other
The details provided in later sections of this HLD should reflect the business objectives stated here.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 49
Estimated Timelines
Number of
Phase endpoints Begin End Comments
Lab testing and qualification N/A
Final Design Review call with Cisco SME N/A Earliest target date for Latest target date for May also occur after
review call review call initial pilot/POC phase
Production phase 1 (pilot)
Production phase 2
Production phase 3
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 49
Business Intent
Deployment Summary Response
What are the Top Priorities? Please check or add to the list to Network Automation
the right): Wired and Wireless Mobility
Policy and Segmentation
Assurance and Analytics
What types of Access Control? Identity (MS AD, LDAP, Duo, etc ..)
Access Control
Asset Visibility
Access Control (EAP, MSCHAP ..)
Guest Access
BYOD & Enterprise
Segmentation
Firewalls
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 49
Scope & Scale
Describe the Scope of the project, number and types of sites the customer has, while describing the scope, consider the following
items
●
Expansion plan
●
Sites which will participate in POC or Pilot
●
Overall coverage will help in designing Cisco DNAC and Cisco ISE design for the customer
Are the Sites Existing or New? Incremental (Custom LAN, WLAN + SDA Overlay)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 49
Miscellaneous
Deployment Summary Response
Other Integrations ETA External Integrations
Radius Proxy Cisco Stealth Watch
Other Use Cases:
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 49
Customer Network Overview
Physical Network Topology
Insert a high-level network diagram showing the SDA Design, placement of Edge, Border and Control nodes, Wireless LAN
Controllers and show placement of network services such as DHCP Server, Active Directory/LDAP, DNS servers, NTP servers, and
VPN concentrators. This should include number of sites and/ or branch networks and data centers. Include the general number of
endpoint and types per location. Include placement of SDA components like Cisco DNAC, Cisco Identity Services Engine and others.
Include WAN bandwidth information.
Bandwidth and latency requirements between various components on the DSA architecture are outlined in the “Cisco SDA
Supported Latency” section of this document.
Note: When ISE is deployed in a distributed environment, the maximum latency between admin node and any other ISE node
including secondary admin, MnT, and PSN is 300ms. Here is link to the WAN bandwidth calculator for ISE deployment (May need to
copy & paste the url https://community.cisco.com/t5/security-documents/ise-latency-and-bandwidth-calculators/ta-p/3641112). This
calculator can be used to find out how much bandwidth needs to be reserved for ISE operation across WAN links.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 49
Customer’s Physical Network Topology
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 49
Design Considerations and Scope
Cisco Software Defined Access solution
The recommended way to design an SDA Fabric is to logically separate the Network Connectivity with the Policy design. Customers
could be the same team for network design and policy design or could be separate team functions where running the network
operations is responsibility of the NetOps (network operations) team and Policy design is handled by the SecOps security operations)
team.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 49
Cisco DNA Center 1.2.10
Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise, your
overall solution scale is driven by Cisco DNAC.
Question Response
Cisco DNAC: Placement
Where is Cisco DNAC placed?
DNAC now supports VIP (required), even if it’s a single Cisco DNAC server/
appliance
Please refer to the DNAC Ports requirements in this document “Cisco DNAC Node
Communications”
DNAC HA requires 3-nodes. All DNAC should be in same DC, since the latency is
10ms (1-hop away)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 49
Question Response
Automation vs Assurance: Automation can be Active-Active, whereas Assurance is
Active-Passive.
When running DNAC with 2 nodes, HA is not supported but the servers can be
deployed in a cold stand-by mode.
Current Cisco DNAC Disaster Recovery offering is to restore the last known
configuration to the DR site
Brownfield Customers
Question Response
Prime
Is the customer using prime today?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 49
Network Connectivity
Connection Network Services should be done first because the location of these services and how they are accessed will directly
impact the design of all of the subsequent stages.
Fabric enabled network requirement is for your DHCP Server to support Option 82.
In summary Option-82 Remote-ID Sub Option:Stringencodedas “SRLOCIPv4
address" and "VxLANL3 VNI ID" associated with Client segment
Where are the servers located, what are the OS / Apps, Are there
VRFs, etc.?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 49
Question Response
IPAM Model: IP address management
External or Manual, What are the IP Pools for Hosts, for Devices, Are there VRFs,
etc.?
Miscellaneous
Multicast / Broadcast?
Voice / Video (Collaboration)?
Client Services (mDNS)?
Data Collection (SPAN/Netflow)?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 49
Network Connectivity: Wired Connections
This stage is focused on building out the “wired” infrastructure, which will interconnect all of the other elements
Wired Connection should be done second because how the physical infrastructure is setup will directly impact the design of the
wireless & transit stages.
Question Response
Network Connections: LAN Switches
Are there 1-2-3 Tiers? Border, CP, Edge? What is the scale? Do we
need HA, etc.?
What are the other domains? What protocols? What is the scale? Do
we need HA, etc.?
Are there VRFs? IP vs. SGT based rules? What is the scale? Do we
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 49
Question Response
need HA, etc.?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 49
Network Connectivity: Underlay and Overlay
This stage is focused on building Underlay and Overlay for the fabric. let’s look at a combined packet when it gets across the Fabric
i.e. underlay and overlay encapsulation.
We can also take a high-level look at the function for an overlay and underlay
In summary, Overlay networks in data center fabrics are commonly used to provide Layer 2 and Layer 3 logical networks with virtual
machine mobility (examples: Cisco ACI™, VXLAN/EVPN, and FabricPath). Overlay networks are also used in wide-area networks
to provide secure tunneling from remote sites (examples: MPLS, DMVPN, and GRE).
Question Response
Wired - Underlay
Wired - Underlay
YES – Internal
NO – External Border
This stage is focused on building the “wireless” on top of the wired infrastructure.
Wireless Connection should be done third because the placement of WLCs and APs will be based on the wired infrastructure and
client scale.
Question Response
Wireless - WLAN Controllers
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 49
Question Response
How many APs? How many SSIDs? Do we need HA? FEW vs.
OTT, etc.?
Maximum supported is 20 ms
Refer to the “SDA Latency” Section
Do they want FEW? Do they need OTT or Mixed? Cisco or 3rd Party
OTT, etc.?
Wireless - FEW
Wireless - AirOS
Wireless - Guest
Guest Wireless?
Simple -- Guest VN
Dedicated -- Guest VN + Dedicated Border
NO – No considerations
CT8540 -- Large
CT5520 -- Medium
CT3540 – Small
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 49
Question Response
NO – No considerations
Transit Connection should be done last because the design and deployment of transit devices will be based on the location, number
and scale of the different sites.
Question Response
Network Connections: Transit WAN Routers
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 49
Question Response
Network Connections: Transit
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 49
Policy
Policy: Overview
List all security policies that are needed to implement the business requirements described above.
Macro/ Micro Segmentation: Provide details on device segmentation policy using Virtual networks (VN) for Macro Segmentation
and (if required) Scalable Groups (SG) for Micro Segmentation.
Recommendation is to use Macro Segmentation for users and devices which typically do not talk to each other, some of the Macro
segmentation use cases are
●
Virtual Network A = USERS
●
Virtual Network B = THINGS
●
Virtual Network C = GUESTS
Now, for segmentation with-in the VN, recommendation is to use Micro Segmentation.
Question Response
Segmentation: Macro vs Micro
Please see SD-Access CVD for details on Micro and Macro Segmentation
May need to copy and Paste URL
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/CVD-Software-
Defined-Access-Design-Sol1dot2-2018DEC.pdf
Please explain if you are not planning on deploying the Micro Segmentation.
Policy: General
Question Response
Policy: General
Policy: General
Policy: General
Policy: General
Policy: General
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 49
Policy: Macro and Micro Segmentation
Question Response
Segmentation: Macro Segmentation
Separate Departments
Secure Areas
Partners/Contractors
Guest Network
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 49
Policy: Cisco Identity Services Engine
This section covers the AAA server (Authentication, Authorization & Accounting), there are many functions of a AAA Server in the
Fabric, some of which are:
●
Host on-boarding – Assigning users and endpoints VN’s and VN’s to land in the correct VN.
●
Authentication Policy – Secure connections for user and clients (802.1x, MAB, WebAuth etc …)
●
Authorization Policy – In addition to assigning VLANs, VN’s, this step can also assign a Scalable Group (SGT) to the endpoint
to enable Micro Segmentation with-in a VN.
Question Response
Topology Specifics -- Network Access Devices
Provide the general switch/controller model numbers/platforms deployed and Cisco
IOS and AireOS Software versions to be deployed to support ISE design.
Please see ISE Component Compatibility Document for the recommended
IOS and AireOS versions
Please explain if you are not planning on deploying the versions listed in the
ISE compatibility document.
EndPoint Types
What are the general client types deployed (Please provide service pack details for
Windows and OS types for MacOSX)?
●
Will 3rd party Mobile Device Management (MDM) be integrated with ISE? 3rd party MDM Vendor:
●
If already using 3rd party Mobile Device Management (MDM) or planning to
use MDM please note the vendor and version as well as brief description on how Windows Versions
it will integrate with ISE Windows XP: Windows Vista:
◦ Please see Cisco ISE – MDM Partner Integration guide for supported MDM Windows 7: Windows 8/8.1:
vendor for integration and supported versions Supplicant Type
●
Are mobile devices corporate- or employee-owned assets? Windows Native AnyConnect NAM
●
Will user access policy be based on device type (for example, laptop versus 3rd Party supplicant:
iPad)? If so, will machine auth or profiling or static MAC assignments be used Other User EndPoint Types
to distinguish device types? Mac OSX: iDevice:
●
Please note how many of the concurrent endpoints will utilize MDM Android: Linux:
information during authorization from ISE Other EndPoint Types:
Non-User EndPoint Types
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 49
Question Response
Note: For domain joined Windows machines to function properly, machine Wireless AP: IP Phone:
authentication is recommended. Performing user only authentication may break Printer/Fax/Etc: HVAC:
critical functions such as machine GPO and other background services such as Medical: SCADA:
backup and software push. Other:
Note: State whether the customer is using machine or user authentication, or both. If
both machine and user authentication are planned, are Machine Access Restrictions
(MAR) planned? If so, review the Appendix information on MAR caveats.
For machine / user authentication details, please refer to 802.1X Authenticated
Wired and Wireless Access
ID Stores
[EAP and ID Store Compatibility Reference]
List the internal and external ID stores the customer will use for different use cases.
Note: For Sponsored or Self-Service Guests, ID store is always ISE guest users
database
Note: AD Site & Services is recommended for ISE subnets for all forests. For more
information regarding multi-AD support, please refer to ISE 1.3 Multi-AD how-to
guide
Web Authentication
●
Will WebAuthuth be used?
●
Will WebAuth be used for wired, wireless, or both?
●
Will Local Web Auth (LWA) or Central Web Auth (CWA) be used?
●
Where will the web portal be hosted?
Note: If deploying CWA the portal must be hosted by ISE. If deploying LWA
the portal can be local to access device, or external (such as ISE).
●
Will web auth be used for guest access? Will web auth be used for non-guests
(for example, employees)?
Note: For more information on CWA and LWA support on different platforms,
please refer to ISE Component Compatibility Document
Authorization
Describe the enforcement types used. Consider the following options:
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 49
Question Response
●
VLANs
●
ACLs (dACL for wired /named ACL for wireless)
●
Security group tags/ACLs (SGTs/SGACLs)
dACL considerations:
●
Cisco Catalyst switches support the wire−rate access control list (ACL) with use
of the ternary content addressable memory (TCAM). If the TCAM is exhausted,
the packets may be forwarded via the CPU path, which can decrease
performance for those packets. It is recommended to limit the number of Access
Control Entries (ACE) to prevent potential TCAM exhaustion.
●
Using IP SourceGuard feature or QoS feature may also affect the TCAM
utilization
VLAN considerations:
●
Consider the use case for why VLAN enforcement is used and estimate the
number of VLANS required.
●
To authorize an endpoint using dynamic VLANs (dVLANs), the access device
must have that VLAN locally defined or else authorization will fail.
●
To reduce the number of unique authorization policy rules, access devices
should use consistent numbering, or case-sensitive naming if assign dVLANs by
VLAN name or VLAN Group name.
●
When using monitor mode of the phased deployment, VLAN assignment may
cause endpoints with wrong IP address
●
Some endpoints, such as non-user devices, may not refresh IP after VLAN
change
●
If devices are statically addressed, they may not be able to communicate on
assigned VLAN
Posture
●
Which posture agents will be used? Consider: AnyConect 4.0 posture agent for
Windows or Mac, Web agent for Windows
●
If persistent posture agents deployed, how will they be provisioned? (e.g.
through ISE or other desktop software/patch management solution, via ASA, or
via ISE)
In the Posture Policy section below, explain the posture policy by OS type including
remediation policies.
Note: For latest AV/AS posture requirements, review the list of currently supported
packages for Windows and MacOSX
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 49
Question Response
ISE Nodes/Personas
●
Number and type (3315/3355/3395/3415/3495/VM) of each ISE appliance
(node)
●
Define the personas assigned to each node (e.g., Administration, Monitoring,
Policy Service, Inline Posture) including Primary and Secondary designations.
Wireless Configuration
Describe the wireless configuration
●
How many SSIDs does the deployment require?
●
Please provide SSID security settings.
●
Is wireless AP in FlexConnect mode or not?
●
For Guest wireless access, is the WLC configured as an anchor controller?
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 49
Question Response
Note: Please note that Dual SSID and CWA are only supported with WLC AireOS
7.2 and up. Please plan to use LWA if there is no plan to upgrade to the devices that
support CWA and MAB.
Note: With AireOS 7.6 and up, DNS based wireless ACL is supported which can
allow admin to create an ACL for Android devices have access to Google Play
Store.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 49
Cisco SDA Design Guidance
Cisco SDA design guidance can be in to 4 categories which are listed in the following picture, this is an high-level introduction
followed by individual design details.
Benefits
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 49
Stack of FIAB’s
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 49
Small Design
Overview
Benefits
• Small site design
• Tends to be Building or Office with < 10,000 endpoints and < 100 IP Pools/Groups
• 1-2 Collocated CP +
External Border (Single Exit)
• Tends to be local WLC connected to Border (e.g. Stack) + FEW
• Looking at <1000 dynamic authentications and <250 group based policies.
• FB + CP + Wireless (9300)with distributed Fabric Edges
• Supports 9800 & Embedded-Wireless in 1.2.10 (16.10.1e for C9300)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 49
Medium Design
Overview
Benefits
• Next level up to a small design.
• Max Control Plane nodes = 6 (Wired Only); 4 with Wireless (2 Enterprise and 2 Guest CP’s).
• Tends to be Multiple Buildings with < 25,000 endpoints
• Most likely a 3 Tier design, recommendation is to use 9400 & 9500 as intermediate nodes.
• Can choose a Co-located or a Distributed/Dedicated CP + Border(Single Exit) design.
• Tends to be WLC + FEW via Services Block or a local Data Center
• Looking at < 25,000 dynamic authentications and < 1000 group based policies
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 49
Large Design
Overview
Benefits
• Dedicated borders can provide multiple exits to different DC’s or destinations.
• Tends to be Many Buildings with < 25,000 endpoints and < 500 IP Pools/Groups
• Most likely a 3 Tier design, recommendation is to use 9500 as intermediate nodes.
• Can choose a Co-located or a Distributed/Dedicated CP + 2-4 Borders (Multiple Exits)
• Looking at < 25,000 dynamic authentications and < 2000 group based policies
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 49
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 49
Cisco DNAC Ports
Cisco DNA-Center needs access to below URLs & FQDNs
*.tiles.mapbox.com/* :443.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 49
Cisco DNA Center 1.2.10 Scale
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 49
Cisco SDA Supported Latency
Latency Requirements (RTT)
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 49
Cisco SDA Supported Wired Platforms
Fabric Edge, Border and Control Plane
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 49
Cisco SDA Supported Wireless Platforms
FEW and OTT
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 49
Policy Details
Host On-boarding: For each use case (wired, wireless, VPN), describe the ISE authentication policies that will on-board users and
endpoints to the fabric, whether managed or unmanaged.
Cisco ISE Authorization Policy: For each use case (wired, wireless, VPN), describe the authorization policies that will be
implemented for all users and endpoints whether managed or unmanaged.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 49
Guest Access: For each use case (wired or wireless), describe guest access policy. Provide information on how guest will access the
network including information on guest provisioning, sponsors, and whether custom guest portal pages need to be created. Please fill
details in the forms below if the answer yes applies to you. Put no if the scenario does not apply to you.
Services Wired (yes or no) Wireless (yes or no)
Guest
Profiling: For each use case (wired or wireless), describe how the profile data will be collected by each probe required to classify
each device type to be profiled. For example, will SPAN or RSPAN be used to carry data from the network to the Identity Services
Engine? If so, what is the SPAN design? Will dedicated ISE interfaces be used? If HTTP probe used, will SPAN or redirection be
used to capture user agent attributes?
Please note that the number of events per second a platform can safely process per the Platform Performance Spec table below. For
example, if IPAD traffic is to be profiled by probing http traffic for the User Agent attribute, then the design must assure the Policy
Services node is not inspecting more than 1200 http events per second (3395 spec). Consider profiling strategies that reduce overall
load on Policy Service node such use of HTTP redirect at connect time to capture the User Agent attribute, or the use of IP Helper
statements for DHCP capture versus the use of SPAN.
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 49
Device Profile Unique Attributes Probes Used Collection Method
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 49
Deployment Details
Unknowns
What are the key unknowns or concerns about this deployment? For instance, the information that was required but not received from
the customer, please list it here. (E.g. My customer uses IE3000 series switches. Is this supported? Customer is using 3 rd party NAD.
Or the customer is currently using IPv6)
High Availability
Discuss high availability considerations.
High availability for ISE, each persona and node should be part of design to ensure that no single persona/appliance failure
results in total loss of a service. Please confirm persona/node redundancy design and explain reason if HA not planned for
any component.
Migration
If migrating this deployment from traditional network architecture to SDA provide details on the current deployment and how you're
going to address migration of licensing, existing policy, NAD configurations, etc.
802.1X Phasing
●
Deployment modes (Please refer to DIG in Appendix for Mode details):
o Will Monitor mode be enabled for a period of time on the 802.1X-enabled routers and switches?
o Will Authenticated or Enforcement mode (formerly known as “Low Impact mode”) be deployed?
o Will Closed Mode (formerly known as “High Security mode”) be deployed?
The VM host should be sized comparably with the ISE appliance. See platform hardware specs below for CPU specification of the
various appliances. For example, if the performance characteristics required are similar to a 3615 appliance, then per platform
performance specs, please refer to the following link https://www.cisco.com/c/en/us/products/collateral/security/identity-services-
engine/data_sheet_c78-726524.html
Note: Hard disks with 10K or higher RPM are required. Average IO Write performance for the disk should be higher than 300MB/sec
and IO Write performance should be higher than 50MB/sec. VMotion is supported since ISE 1.3. Please make sure to reserve the
RAM and CPU cycles for the ISE node deployed as VM.
Note: If disk size needs to be resized, the node will need to be re-imaged from the ISO
Note: The resources need to be reserved for each ISE node and cannot be shared among different ISE nodes or other guest VMs on the
host.
Example:
ise1.example.com Admin/MnT 1.1.1.1 VM Intel Xeon E5-2609 @ 2.4 GHZ X 8 32GB 600GB
Core
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 49
ise2.example.com PSN 2.2.2.2 VM Intel Xeon E5-2609 @ 2.4 GHZ X 8 32GB 300GB
Core
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 49
Bill of Materials (BOM)
Insert as part of this document, or in a separate attachment, the list of equipment to be ordered for the SDA deployment that matches
the design. If Sales Order already placed, then be sure to include the order details here.
Please include SmartNet/SAU or explain its omission (for example, included as part of another order, support agreement, or deliberate
acknowledgement that support refused).
Note: Please only include the information of the products that are related SDA.
Example BOM:
Line Product Qty List Price Contract Discount Unit Price Extended Price
1 Cat 9k 1
2 ISE 1
3 DNAC 3
SDA HLD © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 49
Appendix
SDA Partner Resource Center
Please visit SDA, for additional SDA resources (Login required).
SDA Ordering Guide
The SDA Ordering Guide located at
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/software-defined-access/guide-C07-739242.pdf