Sample
Sample
Networks to Intent-Based
Networking
Pieter-Jan Nefkens
Cisco Press
221 River Street
Published by:
Cisco Press
221 River Street
Hoboken, NJ 07030 USA
All rights reserved. This publication is protected by copyright, and permission must be obtained from the
publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form
or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding
permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights &
Permissions Department, please visit www.pearson.com/permissions.
ScoutAutomatedPrintCode
Library of Congress Control Number: 2019914065
ISBN-13: 978-0-13-546633-9
ISBN-10: 0-13-546633-4
iv Transforming Campus Networks to Intent-Based Networking
Credits
Figure 2-3a Shutterstock
Contents at a Glance
Introduction xx
Index 321
vi Transforming Campus Networks to Intent-Based Networking
Contents
Introduction xx
Business Architecture 41
Data Architecture 42
Application Architecture 42
Technology Architecture 42
ADM 43
Preliminary Phase 44
Phase A. Architecture Vision 44
Phase B. Business Architecture 44
Phase C. Information Systems Architecture 44
Phase D. Technology Architecture 44
Phase E. Opportunities and Solutions 44
Phase F. Migration Planning 45
Phase G. Implementation Governance 45
Phase H. Architecture Change Management 45
Requirements Management 45
Guidelines and Principles 46
Building Blocks 46
Repository 47
Enterprise Architectures 48
Summary 49
Stakeholders 141
Prioritize 142
Action Plan 143
Management Summary 143
Analysis 144
Action List 144
Decision List 144
Estimated Timeline 144
Summary 145
Index 321
xiv Transforming Campus Networks to Intent-Based Networking
Sharing and applying new technology is in the DNA of Pieter-Jan, which resulted in his
becoming a Cisco Champion since 2017. Besides networking consultancy, Pieter-Jan also
participated in standardization processes for inland shipping across Europe.
Over the past years, Pieter-Jan has been working for both the Dutch government as well
as his own consultancy company.
xv
Shawn Wargo is a Principal Engineer of Technical Marketing (PTME) for the Cisco
Systems Enterprise Product Marketing team. Shawn has been with Cisco since 1999,
and worked in both TAC and Engineering, before becoming a TME in 2010. Shawn
primarily focuses on Catalyst multi-layer switching products, with special emphasis
on next-generation hardware (for example, Catalyst 9000) and software products (for
example, Cisco SD-Access).
xvi Transforming Campus Networks to Intent-Based Networking
Dedications
I would like to dedicate this book to my late father, Piet, whose guidance and counsel
I still miss, and my lovely and wonderful partner, Renate, who has been a great support
for me throughout the complete process from idea to actual writing of this book.
xvii
Acknowledgments
I would like to thank and acknowledge several people who have helped me directly or
indirectly with the necessary skills that enabled me to write this book.
First of all, I would like to thank my partner, Renate, and our two beautiful daughters
for believing in me, accepting me for who I am, and supporting me when things got a bit
more challenging.
I would also like to thank my parents for allowing me to follow my dreams and to provide
me with the opportunities to learn skills and gain knowledge. I would specifically like to
thank my late father, Piet Nefkens; Jos van Splunder; and Lex de Lijster for teaching and
coaching me that consultancy in IT is only successful if you first understand the business
and then apply technology to solve a specific problem.
A big thank you goes out to Patrick Nefkens for reviewing my rough writing material and
providing honest and candid feedback. It helped me stay on track.
I would also like to thank Dick van den Heuvel for providing me the opportunity to start
working with DNA Center and help the team along with automation.
A thank you also goes out to Brett Bartow, Chris Cleveland, and everybody else at Cisco
Press for believing in this new concept of merging process and organizational aspects
with technologies in a single Cisco Press book.
I would also like to thank Brett Shore, Lauren Friedman, and Andrea Fisher Bardeau for
running the Cisco Champions program and allowing me into this program, and—via the
program and meeting Brett Bartow—making this book possible.
And, well, a very big and warm thank you goes out to all Cisco Champions. I am honored
to be part of that warm community of experts on networking for some years now. All
feedback, opinions, good recipes, and meetups have always been great and fun.
Also, a special acknowledgment goes out to the Piano Guys. Their music allowed me to
get into the necessary flow and focus for writing this book.
Finally, I would like to thank my technical reviewers Shawn Wargo and Denise Donohue
for their patience, commitment, and support in the adventure of writing my first book.
xix
■ Boldface indicates commands and keywords that are entered literally as shown. In
actual configuration examples and output (not general command syntax), boldface
indicates commands that are manually input by the user (such as a show command).
■ Braces within brackets ([{ }]) indicate a required choice within an optional element.
xx Transforming Campus Networks to Intent-Based Networking
Introduction
Intent-Based Networking (IBN) is the next revolution in networking that Cisco, Juniper,
Gartner, and others are conveying. Cisco explains the concept with the Network
Intuitive communication and solutions such as Cisco DNA Center, Software Defined
Access, and Cisco SD-WAN. But IBN is much more than just a combination of those
technologies and solutions. It is also a concept on how a modern network infrastruc-
ture should be designed, managed, and operated, leveraging Cisco Digital Network
Architecture as the foundation.
And although the concept of IBN is accepted by the industry as the next generation of
network infrastructures, many IT specialists and organizations face the challenge of how
to design and transform network infrastructures and network operation teams into IBN,
specifically for existing environments. This challenge is mostly seen with questions like
“Yes, I do understand about IBN but how do I get started?”; “Now that I installed Cisco
DNA Center, what can I do with it?”; or “How can IBN help me in providing services
faster to my internal users?”
This book is written as a compendium to that challenge and its related questions, specifi-
cally focusing on campus enterprise networks. This book provides a detailed explanation
of IBN, specifically related to campus networks. With that background information,
this book documents a unique four-phase approach to answer the question of how an
organization can get started on the transformation (or journey as some call it) to IBN for
existing campus networks.
As IBN requires changes in both technologies (and how they are applied) and organi-
zations (how networks are managed), this book also provides tips on how change can
be realized throughout an organization. This book should be of help and support for
anybody who wants to transform their network into an Intent-Based Network.
A large part of my career as an engineer and consultant has been focused on enabling
change and making change happen. The change always involved technology in one way or
the other, primarily with use cases where technology would solve today’s or tomorrow’s
problems, or sometimes the technology would open up new innovative ideas and
concepts. As an external specialist, my role was always to help and support the
organization with the change of work.
Intent-Based Networking will bring very interesting times of change to the networking
industry in general. The network, specifically the campus, will play an important role in
the future of any organization. The rate of change is increasing too, which I see in my
day-to-day work as well. The ability to deploy intents in this manner is for me only the
first step. What would be the next step when you can do this? The opportunities are
really unlimited.
I have used my personal experiences and observations throughout this book together
with the concepts of Cisco DNA and IBN to support you on your journey to the next
generation of networks.
Introduction xxi
I do hope that reading this book provides you with enough information and background
on why and how to transform an existing campus and network operations team to the
concept of Intent-Based Networking.
This book also has two appendixes that are used to provide you with conceptual
background information on the technologies named throughout this book as well as
reference configurations for the underlay of an Intent-Based Network.
■ Chapter 2, “Why Change Current Networks? A Need for Change”: This chapter
provides a summary of external trends, drivers (or forces), that require the current
campus network design and operation to be changed to cope with these drivers. You
will learn about external trends such as wireless/mobility, (Net)DevOps, complexity,
cloud, and digitization.
network design within the enterprise. You will learn that a network design
(or architecture) is part of a larger technology architecture and an architecture for
the enterprise or organization as a whole. This chapter uses the TOGAF® standard
for enterprise architectures both as an introduction to enterprise architecture as well
as an example for the relationship between network infrastructures and enterprise
architecture.
■ Chapter 4, “Cisco Digital Network Architecture”: This chapter provides you with a
detailed explanation of Cisco Digital Network Architecture (DNA) that Cisco intro-
duced in May 2016. Cisco DNA is an architecture that is intended to be the founda-
tion for both modern state-of-the-art network infrastructures as well as the concept
of Intent-Based Networking. You will learn the different requirements Cisco DNA
has, the building blocks of its architecture, and the different design principles.
■ Chapter 5, “Intent-Based Networking”: In this chapter you will learn the concept
of Intent-Based Networking (IBN) via the explanation of what Intent means, how
that can be applied to a network infrastructure, and how it relates to Cisco Digital
Network Architecture. You will learn how IBN can help the network operations
team cope with the changes described in Chapter 2 and be able to remain in con-
trol of the network. Chapter 5 also introduces two technical concepts, Software
Defined Access and Classic VLANs, that can be used to deploy an Intent-Based
Network. Intent-Based Network (or Intent-Enabled Network) is used throughout
this book as a network that is configured based on the concept of Intent-Based
Networking (IBN)—that is, IBN describes the concept, and Intent-Based Network is
an implementation of that concept.
■ Chapter 6, “Tools for Intent”: This chapter provides a short overview of the tools
that are available to enable Intent-Based Networking within the campus network. In
this chapter you will learn about important concepts within IBN, such as automation
and assurance, and which tools can fulfill those requirements for the concept of IBN.
■ Chapter 7, “Phase One: Identifying Challenges”: This chapter describes the first
phase of the transformation and is all about identifying the requirements (I used the
word challenges on purpose, as that is more positive and challenges can be solved)
within a campus network and getting the proper support and commitment. You will
learn that IBN is a concept that not only involves (new) technologies and sets specific
hardware requirements but also sets requirements and expectations on the organiza-
tion. You will learn which challenges are to be identified on the required hardware
and software as well as challenges related to the organization and its processes. The
chapter ends with an action plan that contains details on how to approach the trans-
formation to IBN.
Introduction xxiii
■ Chapter 8, “Phase Two: Prepare for Intent”: This chapter describes phase two of
the transformation. Phase two is used to prepare the campus network and the orga-
nization for the transformation. It starts with solving all the challenges identified
in the previous phase. After these challenges are solved, the remaining steps of the
phase focus on preparing the network (and network operations team) for a successful
transformation to IBN. You will learn about the standardization of the campus net-
work, the introduction of automation and assurance to the network operations team,
and why these steps are important for IBN. These steps also include tips on why and
how to execute them. The last section of this chapter contains information about
risks that you might encounter during this phase, including some suggestions on how
to cope with them.
■ Chapter 9, “Phase Three: Design, Deploy, and Extend”: This chapter provides all
information required to actually transform the campus network to an Intent-Based
Network. You will learn two technology concepts (Software Defined Access and
classic VLAN) that can be used to deploy your campus network with their pros
and cons. You will be executing sequential steps to gradually implement IBN on
the campus network. As with the previous phases, a special section on risks for this
phase allows you to identify and prepare for potential problems.
■ Chapter 10, “Phase Four: Enable Intent”: This chapter describes the last phase of
the transformation; now that the campus network is transformed to IBN, it is time
to fully take advantage of the possibilities created. The chapter involves a strategy
on how you can introduce IBN to the rest of the organization, including a special
methodology to allow the campus network to deliver services to the business on
demand.
Part III, “Organizational Aspects,” is quite a different part compared to the first two.
Whereas the first two are primarily focused on background information and hands-on
for the transformation, this part provides information on the impact that IBN has on the
organization. This part’s chapters can be read individually and are as follows:
■ Chapter 12, “Enabling the Digital Business”: This chapter provides a more detailed
description of the concept of digitalization and digital business. It describes how
Intent-Based Networking fits within (and enables) the digital business and what
impact this will have on an organizational level.
■ Chapter 13, “IT Operations”: This chapter describes the relationship between IBN
and common IT operations. It provides an introduction to common IT operation
models such as ITIL, DevOps, and Lean. It also describes what impact and change
IBN will have on these IT operation models.
■ Chapter 14, “Tips to Make Your IBN Journey a Success”: The transformation
to IBN involves quite some change, including technical, organizational, and indi-
vidual. This chapter provides background information and tips on how change can
xxiv Transforming Campus Networks to Intent-Based Networking
Part IV, “Appendixes” This book also has appendixes that provide you with conceptual
background information on the technologies named throughout this book as well as
reference configurations for the underlay of an Intent-Based Network:
Intent-Based Networking
By and large, Cisco DNA describes the requirements and operations of a network infra-
structure of an enterprise on an abstract level. Cisco DNA achieves this description by
dividing the requirements of the enterprise network into several functions and design
principles. Cisco DNA itself does not describe how to use or implement that network
architecture. You can compare it with the design of a large office building. The drawings
provide enough guidelines and a viewpoint of how the building will look. But it does not
provide details on which materials the contractor needs to create the building or which
functionality the building will be used for. Cisco DNA is nothing more than a description
of the network in an abstract manner.
But what is Intent Based Networking? What perspective does it provide? This chapter
describes IBN in more detail and covers the following topics:
■ What is Intent
■ Intent-Based Networking paradigm
■ IBN designs
■ Network as a platform
■ Possible IBN implementations
■ IBN examples
78 Chapter 5: Intent-Based Networking
What Is Intent?
To understand what Intent-Based Networking is, it is important to know more about what
Intent encompasses. Purpose is a synonym and probably makes the definition of intent
easier to understand.
A good example of intent would be that my wife likes me to clear out the garbage cans
in the kitchen and put their contents in the containers outside our home. My actions to
fulfill her intent would then be: Take out the general-waste trash bag from the can in the
kitchen and carry it to the appropriate container outside. Walk back to the kitchen and
then take the bag of recyclable waste and put it in its correct container. Clean the kitchen
cans if needed and put new trash bags in them.
This example describes intent quite well. My wife has an intent, and I have described
steps to fulfill that intent. And once you take this point of view to many common tasks,
intent can be seen everywhere. Table 5-1 shows some examples of intent.
As you can see, intent is everywhere. An intent is essentially a brief description of the
purpose and a concrete predetermined set of steps that need to be executed to (success-
fully) achieve the intent. This principle can also be applied to the operation of a network
infrastructure. The intent and its steps describe very specifically what needs to be done
on the network to accomplish a specific task. Table 5-2 provides a number of examples of
how intent can be applied on a network infrastructure.
Table 5-2 provides only a small number of examples, but the possibilities are endless. The
most important condition (and restriction) is that the proposed intent must be written
in controllable, repeatable execution steps, so that the automation function within Cisco
DNA can execute those steps automatically. In summary, Intent-Based Networking is a per-
spective or viewpoint on how a network infrastructure that meets Cisco DNA’s functions,
design principles, and requirements is operated. Using this perspective to operate the net-
work will in turn enable the enterprise to embrace digitalization and the digital enterprise.
The following sections describe in more detail how this perspective leverages Cisco
DNA’s functions and design principles to achieve Intent-Based Networking.
Business
Translation
Activation Assurance
translates steps into validates intent based on
configuration. feedback and telemetry.
Network Infrastructure
This approach resembles the functional approach of Cisco DNA a lot. It is, of course,
a perspective on how a Cisco DNA-based network infrastructure is operated. This
approach is based on six steps in a continuous loop.
1. Request an intent: A part of the business, whether a process, front-end application,
or operator, specifies a specific Intent request to the network infrastructure. This is
of course based on a number of available intents, where the variety of the Intent also
depends on the organization and the level of availability.
The translation process, receiving the request for Intent, translates the specific intent
into a number of repetitive executable required steps. This is, for deploying a net-
work Intent, perhaps one of the most important aspects of Intent-Based Networking.
These steps need to be designed, tested, and defined within the translation process.
Depending on the solution, these steps could be predefined templates or specific
pieces of network configuration specific to the enterprise. The implementation of
these repetitive executable steps needs to be as predictable as possible and is quite
often defined by the network designer.
For example, if the intent is a new IoT network, the Intent is translated into steps like
create a new network, assign an IP-pool to that network, and place this network into
a single logically separated compartment.
2. Request steps: Once the required steps for the specific intent are defined and cre-
ated, the requested steps are sent to the Activation process. This process receives the
requested steps and translates these steps into device-specific configuration changes
that are required on the network infrastructure. The Activation process knows which
configuration changes are required on which devices and uses automation to activate
the changes on the applicable network devices. In turn the Activation process pushes
the required changes to the network infrastructure.
Based on the earlier example of intent, the Activation process translates the new net-
work into a new VRF on a number of core switches in the network and allocates a
new VLAN where the IoT devices are placed. The allocated IP pool is translated into
a DHCP scope on the device that provides DHCP services to the network. A security
policy can automatically be added to detect and authorize the new IoT devices.
3. Execution of configuration changes: This is the step where the Activation process
actually connects to the network devices and deploys the changes to the network
infrastructure. At this stage the requested Intent has been translated into a specific
configuration on the network infrastructure. The requested intent is implemented.
Although the Activation process performs pre- and postchecks to validate if the con-
figuration of the network infrastructure devices was successful, the Activation pro-
cess cannot determine whether the deployed configuration has the desired outcome.
Using the same example, the IoT devices are now connected to the network and
assigned to the specific VLAN and VRF. Telemetry data on whether the IoT device
gets an IP address and which communication flows are seen by the network are sent
to the Assurance process.
5. Validation & metrics: In this step the Assurance process has analyzed and validated
the different data flows received from the network infrastructure devices. The
received data is combined and analyzed, and potential issues or correct operation
is sent back to the Translation process. This step provides the feedback on whether
the requested intent is working as expected, and which IP addresses clients have
received, including metrics on the usage, are provided to the Translation process.
Within the same example, the status of the intent, including client-related informa-
tion is sent to the translation process.
6. Intent-based feedback: The translation process receives metrics and the valida-
tion of the requested intent operation. The Translation process checks the status
of the requested intent continuously and determines whether problems exist with
the requested intent. In case of a problem, the operations team is informed of the
failed state, and the business can request the status of the requested intent as well.
Similarly, statistics on the usage of the requested intent are provided to the business
layer using application-based metrics such as number of devices, accumulated data
usage, and availability statistics, some of the most often used key performance indi-
cators for the business.
Within the same example, this step provides a positive status back to the business
that the requested intent is operating as requested and provides an aggregated over-
view on availability and bandwidth usage to the business. The new IoT application is
running successfully on the network.
These individual steps are executed for every requested intent. A large network can
quickly have hundreds of requested intents to be added and run on the network. In
addition to the requirement that these steps can run in parallel for different intents, the
network must also be able to validate whether the requested intents are still working as
expected. Therefore these steps, including the validation, are run in a continuous loop
(shown by the dotted arrows in Figure 5-1) to validate whether the network is operating
and working as designed. This allows the network to provide intelligent support to the
operation teams on the performance and operation of the network.
The first three steps of IBN are common in today’s campus networks. They are com-
monly deployed where automation is gaining momentum using a wide range of automa-
tion tools. The key difference between classic networks and an Intent-Based Network is
that with IBN there is automated validation of the changes made to the configuration.
The testing and validation of a configuration, also in operation, is unique to Intent-Based
Networking and raises the quality and capability of the network.
Another key difference is that for IBN all steps and communication are based on APIs
and models, conforming to Cisco DNA’s design principles. This provides a new unique
approach to the network, where applications can now automatically request intent to the
Intent-Based Networking Designs 83
network without the network operations team requiring to perform these changes. The
feedback, based on the assurance, is also provided via APIs, so the same applications can
validate that the requested intent is working as operated.
These two aspects of IBN—automatically validating changes of the network, as well as
providing the network as a platform to software engineers—allow the enterprise to use
the network in new, intuitive ways and enable the digital business.
Before the two Intent-Based designs are described, it is important to be aware that both
designs have a certain set of requirements in common:
All policies for endpoints are pushed from this policy server into the network. This
is key to enable intent onto a network, as the intent for an endpoint can change over
time based on circumstances.
For a specific policy to be set to an access port (or wireless network), it is necessary
to know which endpoint is connecting to the network. Network Access Control (using
IEEE 802.1X standard or MAC Authentication Bypass) is required to identify the end-
point requesting access to the network and to provide it with the proper authorization
onto the network (by sending specific policies to the switch using RADIUS). A RADIUS
deployment, such as Cisco Identity Services Engine, is thus required for IBN.
■ Feedback from network: One of the true distinctions between a classic campus net-
work as described in Chapter 1, “Classic Campus Network Deployments,” and IBN
is the feedback of the status of the network back to the controller. In other words,
within an IBN the network devices provide feedback to the controller about the
network’s state. This feedback is used to validate whether the network is accomplish-
ing the intent required. This feedback is of course received programmatically or via
telemetry. Several methods and technologies are available to provide this feedback.
The technical details for feedback are described in Appendix A, “Campus Network
Technologies.”
SDA
Software-Defined Access (SDA) is one of the latest technologies introduced in campus
networks. It is the most complete technology (or actually a combination of technologies)
that can enable Intent-Based Networking on your network.
The key concept of SDA is that there is a single, fixed underlay network and one or more
overlay networks (running on top of the underlay). This concept in itself is not new; it
is the founding principle for any network where encapsulating and decapsulating data
allows the data to be abstracted from the different OSI layers. This principle is also used
for VPNs over the Internet, CAPWAP tunnels for wireless communication, and within
datacenters.
The principle of an underlay and overlay network can best be described using a common
technology in enterprise networks—the Cisco Remote Access VPN solution based on
Cisco AnyConnect. This technology allows end users to connect securely to the enter-
prise network via a less secure network (Internet).
This is realized by creating specific group policies (and pools of IP addresses) on the
VPN headend device (a Cisco ASA firewall or Cisco Firepower Threat Defense firewall).
Users use the AnyConnect client to connect to the VPN headend over the Internet. Based
on the authentication and authorization, users are allocated a specific internal IP address
and the policies determining their access to the enterprise network. The user’s endpoint
uses the internal IP address to communicate with the enterprise network. This is accom-
plished by encapsulating the internal IP addresses into an outer packet destined to the
VPN headend.
At the VPN headend, the packet is decapsulated and routed into the enterprise network.
A similar path is realized for return traffic. The enterprise network only knows that the IP
address of that user needs to be sent to the VPN headend. The VPN headend takes the
internal traffic and encapsulates it in an outer packet with the destination of the public IP
address of the end user.
In this example, the underlay network is the Internet, and the overlay network is the
specific VPN group policy that the user is assigned to with the appropriate IP pool.
SDA takes the same principle but then applies it internally to the campus network. SDA
calls the underlay network a campus network, and it uses virtual networks on top of the
Intent-Based Networking Designs 85
underlay to logically separate endpoints. In other words, there are no VLANs within an
SDA fabric. Figure 5-2 provides an overview of an SDA network.
Client
External
VN Green
Network
Control
Edge Node Edge Node Node
Client
VN Red (Access Switch) (Access Switch)
Virtual Network Red Fabric
(Overlay) (Underlay Network)
SDA uses its own terminology to describe the roles and functions the switches (or in
some cases routers) perform within the SDA fabric:
■ Fabric: A fabric is the foundation of the overlay network, which is used to imple-
ment the different virtual networks that run within a network. A fabric is a logically
defined grouping of a set of switches within the campus network, for example, a
single location. The fabric encompasses the protocols and technologies to transport
data from the different virtual networks over an underlay network. Because the
underlay network is IP based, it is relatively easy to stretch the underlay network
across fiber connections on the campus (connecting multiple buildings into a single
fabric) or even across a WAN (such as MPLS or an SD-WAN), factoring in specific
requirements for SDA. These requirements are explained in Appendix A, “Campus
Network Technologies.”
■ The underlay network: The underlay network is an IPv4 network that connects all
nodes within the fabric. An internal routing protocol (within an SDA-campus IS-IS is
commonly used, although OSPF is also possible) exchanges route information within
86 Chapter 5: Intent-Based Networking
the fabric between the nodes. The underlay network is used to transport the data
from the different virtual networks to the different nodes.
■ Edge node: The edge node is used to allow endpoints to connect to the fabric. It
essentially provides the same function as the access switch layer in a classic campus
network topology. From an SDA perspective, the edge node is responsible for encap-
sulating and decapsulating the traffic for that endpoint in the appropriate virtual
network. It also provides the primary role of forwarding traffic from the endpoint to
the rest of the network.
■ Border node: A fabric is always connected with external networks. The border node
is used to connect the different virtual networks to external networks. It is essential-
ly the default gateway of the virtual network to external networks. As each virtual
network is logically separated, the border node maintains a connection to the exter-
nal network for each individual virtual network. All traffic from the external network
is encapsulated and decapsulated to a specific virtual network, so that the underlay
network can be used to transport that data to the correct edge node.
■ Control node: The control node is a function that cannot be related to a function
within an existing classic campus network topology. The control node is responsible
for maintaining a database of all endpoints connected to the fabric. The database
contains information on which endpoint is connected to which edge node and within
which virtual network. It is the glue that connects the different roles. Edge nodes
and border nodes use the control node to look up the destination of a packet on the
underlay network to forward the inner packet to the right edge node.
www.myserver.com
PC1 (209.165.200.225)
SW1
10.0.0.4
Edge Node
192.168.0.0/30
.2
.1
VN Green: 10.0.0.0/24 Internet
.5 CSW1
.6
192.168.0.4/30 Border and
Control Node
SW2
PC2 Edge Node
10.0.0.5
In this SDA fabric there are three switches. The CSW1 switch provides the Border and
Control functionality, while SW1 and SW2 are edge node devices in this fabric. Both SW1
and SW2 have an IP link to the CSW switch, using 192.168.0.0/30 and 192.168.0.4/30
subnets. There is a virtual network (VN) named green on top of the underlay network,
which uses the IP network 10.0.0.0/24 for clients. PC1 has IP address 10.0.0.4, and PC2 has
IP address 10.0.0.5. The default gateway for VN Green is 10.0.0.1.
CSW1 maintains a table of endpoints connected to the fabric and how to reach them. To
explain the concept and operations, Table 5-3 describes the required contents for this
example.
1. After DNS resolution, the PC sends a TCP SYN packet to the default gateway
(10.0.0.1) for destination 209.165.200.225.
2. SW1 as edge switch receives this packet and, as it is an anycast gateway (see
Appendix A, “Campus Network Technologies” for more details), the packet is
analyzed.
3. SW1 performs a lookup on the CSW1 (as control node) for the destination
209.165.200.225.
4. CSW1 returns a response for the lookup ip-address 192.168.0.1 (IP address of border
node).
5. SW1 then encapsulates the complete TCP SYN packet in an SDA underlay network
packet with source IP address 192.168.0.2 and destination address 192.168.0.1 and
uses the global routing table to forward this new packet.
6. CSW1 receives the encapsulated underlay packet from SW1 and decapsulates it. It
then, as border router, uses the routing table of VN Green to forward the traffic to
the Internet.
8. The incoming SYN-ACK packet is received by CSW1 in the VN Green network. The
destination of the packet is 10.0.0.4.
88 Chapter 5: Intent-Based Networking
9. CSW1 performs a lookup to the control node for VN Green and IP address 10.0.0.4
and gets 192.168.0.2 as the underlay destination.
10. CSW encapsulates the SYN-ACK packet for 10.0.0.4 into an underlay packet with
destination 192.168.0.2.
12. SW1 decapsulates the packet, recognizes it is for PC1 (IP 10.0.0.4 ) on VN Green,
and forwards, based on a local table, the packet to the proper access port.
13. PC1 receives the SYN-ACK packet and responds with an ACK to further establish
the TCP flow. The principle of lookup is repeated by SW1 for each packet received
from or sent to PC1.
An SDA-based topology is very powerful and capable in enabling IBN. The underlay net-
work is set up only once, when the SDA network is created. In addition, there is increased
flexibility in adding or removing edge nodes when required (as it is essentially a router
in the underlay); all the endpoints are connected to one or more virtual networks. These
virtual networks can easily be added or removed from the SDA network, without ever
impacting the underlying network. This process of addition or removal can easily be pro-
grammed in small building blocks that automation can use. The Cisco DNA center solu-
tion is used to deploy and manage an SDA-based network.
Classic VLAN
Although SDA was designed and built for Cisco DNA and is meant to solve some prob-
lems on classic campus networks, not all enterprises can readily implement SDA in their
network. One of the main reasons is that there are some requirements on the network
hardware and topology to enable SDA. This is not only Cisco DNA Center but also a
full Identity Services Engine deployment as well as specific hardware such as the Cisco
Catalyst 9000 series access switches. Although the Catalyst 3650/3850 are capable of
running an SDA network, there are some limitations to that platform, such as an IP ser-
vices license and a limited number of virtual networks.
However, if you look at an SDA through a conceptual looking glass, it is possible to rep-
licate, with some limitations, the same concepts of SDA using classic VLANs and VRF-
Lite. It allows an organization to transform to IBN while also preparing the infrastructure
for SDA to take advantage of the concepts within SDA. Table 5-4 provides an overview of
the concepts used in SDA compared to the technologies that can be used for IBN within
a classic VLAN-based campus network.
Intent-Based Networking Designs 89
Table 5-4 Overview of Design Choices for SDA and Campus Alternative
SDA Network Classic Campus Network
Endpoints are, based on identity, assigned Endpoints are assigned to a VLAN and SGT.
to a virtual network and an SGT.
Each virtual network has its own routing VRF-Lite can be used to logically separate IP
table and IP space. networks and have each VRF instance its own
routing table.
The provisioning of virtual networks is easy With automation tools, it is easy to program-
because the underlay is created only once matically add and remove VLANs on uplinks
and virtual networks can be added and as well as SVIs on the distribution switch.
removed without interrupting the underlay.
Routed links in the underlay are used to In a collapsed-core campus network, there is
remove Spanning Tree and Layer 2 com- no need for Spanning Tree, or a single Spanning
plexities. Tree instance can be run to prevent loops.
An underlay network is used to stretch a This is not possible without an encapsulation
fabric over multiple physical locations. protocol in classic networks.
A control node is used for lookup of end- This is not required as existing protocols like
points. ARP can be used.
With some limitations (specific conditions) it is possible to enable an IBN design using clas-
sic VLAN technologies. Limitations for such a design are a collapsed-core design, ability
to assign SGT, and VLANs using a policy server as well as preferably no Spanning Tree or a
single Spanning Tree instance. If you take these limitations, Figure 5-4 provides an intent-
based design based on a classic collapsed-core campus network topology and VRF-lite.
www.myserver.com
PC1 (209.165.200.225)
10.0.0.4
SW1
PortChannel
VLAN Allowed VLANs: 100,201
201
DSW1
Internet
VLAN PortChannel
Allowed VLANs: 100,201
201
PC2 SW2
10.0.0.5
Interface VLAN201
vrf forwarding green
ip address 10.0.0.1 255.255.255.0
ip route vrf green 0.0.0.0.0.0.0.0 gateway
In this design PC1 and PC2 still have the same IP address but are now assigned into
VLAN 201 instead of virtual network green. VLAN 201 is configured on the DSW1 with
IP network 10.0.0.0/24 and a default gateway of 10.0.0.1 for the endpoints. The SGTs have
remained the same: Employee for PC1 and Guest for PC2.
The principle of SGT ACLs to restrict traffic within a VRF is the same. In both SDA as
well as classic, the SGT ACL is pushed from the policy server to the access switch where
the endpoint is connected.
Although the end goal is logically separating traffic between endpoints, using SGT for
microsegmentation, there are some limitations and restrictions on a classic VLAN over an
SDA topology.
■ Spanning Tree: It is not preferred to run Spanning Tree on the network, as each
change in a VLAN can trigger a Spanning Tree recalculation, resulting in blocked
traffic for a period of time. If it is required to run Spanning Tree, then run a single
instance of Spanning Tree in MST mode, so that adding a VLAN does not trigger a
new STP topology as with per-VLAN Spanning Tree.
■ Management VLAN and VRF: It is required to have a dedicated VLAN and man-
agement VRF to be able to create or remove new VLANs. This VLAN may never be
removed from trunks and networks, as this is essentially the underlay network. The
automation tool that generates and provides the configuration communicates with all
devices in this management VLAN.
■ Configuration via automation tool only: The configuration of the campus net-
work can only be executed via the automation tool. This is generally true for
any environment that there should only be a single truth for the provisioning of a
network. In an IBN based on classic VLANs, this is more important as the automa-
tion tool will generate the VLAN identifiers automatically based on the virtual
networks to be deployed. Although it is common in enterprises to statically define
and assign VLANs, in this design that concept needs to be removed for automation
to work.
■ Build your own automation: With SDA, a lot of automation and configuration is
executed by Cisco DNA Center in the background. With this design, an automation
tool needs to be installed and configured by the network team to provide similar
functionality. This can require some custom coding and testing before running the
solution in production. This could be Cisco DNA Center with templates or another
tool that provides automation functionality.
In summary, both mechanisms (SDA and classic VLAN) work quite similarly, and when
you take certain precautions and keep the limitations in mind, it is feasible to start with
IBN based on a classic collapsed-core topology. Part 2, “Transforming to an Intent-Based
Network,” provides more details on limitations, drawbacks, and when which technology
fits best for transforming a campus network to IBN.
Summary
Cisco Digital Network Architecture describes the requirements and operations of a net-
work infrastructure of an enterprise at a functional or abstract level. Cisco DNA achieves
this abstract description by dividing the requirements of the enterprise network into sev-
eral functions and design principles. It does not describe how to use or implement that
network architecture.
This set of intents (that are deployed on the network) are defined dynamically based on
which endpoints are connected to the network. As soon as an intent is not required any-
more, its configuration is removed automatically from the network infrastructure.
Although IBN itself is not based on Cisco Digital Network Architecture, its description
and methodology are so similar to Cisco DNA that you can state it is a perspective of
Cisco DNA. IBN describes how a network based on Cisco DNA can be configured and
92 Chapter 5: Intent-Based Networking
operated by the network operations team. Figure 5-5 describes the systematic approach
IBN describes in providing intents to the network (by defining Intents as repetitive pieces
of configuration).
Business
Translation
Activation Assurance
translates steps into validates intent based on
configuration. feedback and telemetry.
Network Infrastructure
Figure 5-5 is similar to Cisco DNA, and IBN is based on six steps in a continuous loop:
2. Request steps; the intent is translated into a set of configuration changes to be executed.
5. Validation & metrics; the analytics component validates the received network-driven
feedback with the requested intents to validate that the requested intents are operat-
ing as requested and designed.
6. Intent-Based feedback; business-outcome based values are used to report on the sta-
tus of the requested intent and its operation.
Summary 93
Two Designs
Two network designs are available to implement IBN:
■ Cisco Software Defined Access (SDA) is based on Cisco DNA and is the most com-
plete technology that can enable IBN on the campus network, but Cisco SDA does
have specific requirements on the network infrastructure devices (and Cisco DNA
Center).
■ Classic VLANs with VRF-Lite can be used, with limitations, as an alternative to SDA
for those organizations that are not (yet) able to meet the requirements of SDA.
IBN itself, and therefore both designs, relies on three key requirements on the campus
network to be successful:
■ Feedback from network: IBN relies heavily on the feedback that network
infrastructure devices provide back to the analytics component; it is used to
validate whether the requested intents are operating as designed and requested.
SWIM, 167
switch upgrades, 169
C
availability of resources, 150–151 calls (API), matching to tools, 219
campus networks
B Agile software engineering
methodology, 33–34
baselines, 187–188 Cloud Edge infrastructures, 30–32
classic VLAN, 193–199 cloud infrastructures, 30–32
SDA, 188–189 cloud-managed networks, 19–20
LAN automation, 189–190 collapsed core/two-tier topologies,
manual configuration, 8–9
190–193 complexity of, 28–29
bootstrap templates, 170–172 connected devices (IoT/non-user
border nodes operated devices), 26–27
dynamic VLAN, 190 development of, 23–26
SDA, 86 DevOps, 32–34
BPDU (Bridge Protocol Data Unit) digitalization, 35
packets, 16–17 functional layers, 4
BPDU Guard, 17–18 access layer, 4
breakouts core layer, 5–6
central controller with distribution layer, 4–5
central breakout deployments, hardware, inventories, 133–134, 152
12–13
IBN, transitioning to, 129
FlexConnect deployments,
access port configuration, 135
13–14
action plans, 143–146
local controller with local breakout
deployments, 13 Assurance process, 162–166
budget (prioritizing challenges in IBN automation, 166–167
transitions), 142 baselines, 187–199
build pipelines (automated), 33 challenges to day-to-day
building blocks (architecture operations, 129–132, 145
frameworks), 46–47, 231 change procedures, 149
business classic VLAN, 184–187
architectures, 41–42, 230 configuration standardization,
communication plans 222 160–162
processes and digitalization, 238 converting intents, 200–202
supported apps/portals (communica- day-0 operations, 169–172
tion plans), 223 day-1 operations, 174
central controller with 325
I security, 204–211
feedback
IBN (Intent-Based Networking), 77, intent-based feedback, 82
213–215). See also Cisco DNA network-driven feedback,
Activation process, 81 81–84, 93
API, 215–217 intent
calls, matching to tools, 219 defined, 78–80
concept API definitions, 218 example of, 78
definitions, 218 intent-based feedback, 82
generalizing network intents, network-based intents, 79–80
217–218 overview of, 78–79
identifying network intents, requesting, 81
217
metrics, 82
network Intent service catalogs,
microsegmentation, 83, 93
219–223
network analytics, 111, 120–121
architecture frameworks, IBN impact
on, 232 Ansible, 118–119
access requests, 233–235 application behavior analytics,
112–113
analytics, 232
DNAC Assurance, 113–115
automation, 232
NetBrain, 117–118
Cloud Service Management,
232 network function analytics,
111–112
infrastructure, 232–235
network services availability,
Assurance process, 81–82, 162–166
112
classic VLAN, 88–91
Prime Infrastructure, 115–117
collapsed core/two-tier topologies,
trend analysis, 112
89–90
validation of Intent, 111
design requirements, 83–84
IBN (Intent-Based Networking) 333
processes/responsibilities
P (organizational maturity), 139
product/vendor selection, 149
PacketFence, 158
proof of concepts/pilots
pilots/proof of concepts
(communication plans), 222
(communication plans), 222
protocols
playbooks and Ansible, 107
distance-vector routing protocol, 299
PnP (Plug-n-Play), 288, 319
link-state routing protocol, 299–300
APIC-EM and, 284–285
MSTP, 310
day-0 operations, 169–171
routing protocols, 298–300, 319
DHCP option 43, 285–286
RSTP, 310
DNAC and, 286
SNMP, 312–314, 320
Pokemon Go, 215
STP, 308–310
policies
VTP, 311–312, 320
Cisco DNA, 66–67
Puppet Enterprise, 103–105
policy-centric networks, port-
centic to policy-centric design Python and ZTP, 288
migration, 155–159
portals, business-supported apps/
portals (communication plans), 223
Q
ports QoS (Quality of Service), use case,
access port configuration, 135, 28–29
196, 207 quality checks (organizational
port-centic to policy-centric design maturity), 139
migration, 155–159 quid pro quo, change management,
routed ports 274–275
Cisco DNA, 68–69
switchports versus, 68–69 R
shared switch configuration, 135
RACI matrix, 141
switchports
RADIUS,
Cisco DNA, 68–69
RADIUS (Remote Access DialUp
routed ports versus,
Services), 293–295, 319
68–69
IEEE 802.1X, 292–293
uplink port configuration, 196
RADIUS servers, 158
positivity, change management, 281
authorization rules, 157
Prime Infrastructure, 97–100,
115–117, 170 IEEE 802.1X network access
control standard, 196, 205
prioritizing challenges in IBN
transitions, 142–143 redundancy, handling, 16–19
340 repetitive operations (organizational maturity)
S training, 210–211
transitioning to SDA, 209–210
SBB (Solution Building Blocks), 47 incident response example,
scalability, extended IBN security, 223–224
210 IoC, 223–224
Scalable Group Tags. See SGT networks, 29
SDA (Software-Defined Access), 84, servers (RADIUS), 293
181–184, 284 service catalogs (network intents),
baselines, 188–189 219–220
LAN automation, 189–190 business-supported apps/portals, 223
manual configuration, 190–193 pilots/proof of concepts, 222
successes 341