Home > SDN Solution

SDN Solution

April 25th, 2017 Go to comments

Question 1

Explanation

Cisco Application Policy Infrastructure Controller (APIC)
The infrastructure controller is the main architectural component of the Cisco ACI solution. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring. The APIC appliance is a centralized, clustered controller that optimizes performance and unifies operation of physical and virtual environments. The controller manages and operates a scalable multitenant Cisco ACI fabric.

Reference: http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/application-policy-infrastructure-controller-apic/datasheet-c78-732414.html

Question 2

Explanation

A northbound interface is an interface that allows a particular component of a network to communicate with a higher-level component. Conversely, a southbound interface allows a particular network component to communicate with a lower-level component.

northbound_southbound.jpg

The northbound APIs on an SDN controller enable applications and orchestration systems to program the network and request services from it.

Southbound interfaces are implemented with a Service Abstraction Layer (SAL) which speak to network devices using SNMP and CLI (Command Line Interface) of the elements that make up the network. The main functions of SAL are:
+ Expose device services and capabilities to apps
+ Determine how to fulfill requested service irrespective of the underlying protocol

Note:
+ An API is a method for one application (program) to exchange data with another application.
+ Interface here refers to the “software interface”, not the physical interfaces.

Question 3

Explanation

The APIC-EM platform delivers many significant benefits. For example, it:

+ Creates an intelligent, open, programmable network with open APIs
+ Can help customers save time, resources, and costs through advanced automation services
+ Can transform business-intent policies into dynamic network configuration
+ Provides a single point for network-wide automation and control

Reference: http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/application-policy-infrastructure-controller-enterprise-module/datasheet-c78-730594.html

Question 4

Explanation

Cisco APIC-EM supports the following policy analysis features:
+ Inspection, interrogation, and analysis of network access control policies.
+ Ability to trace application specific paths between end devices to quickly identify ACLs in use and problem areas.
+ Enables ACL change management with easy identification of conflicts and shadows -> Maybe B is the most suitable answer.

Reference: http://www.cisco.com/c/en/us/td/docs/cloud-systems-management/application-policy-infrastructure-controller-enterprise-module/1-2-x/config-guide/b_apic-em_config_guide_v_1-2-x/b_apic-em_config_guide_v_1-2-x_chapter_01000.pdf

The ACL trace tool can only help us to identify which ACL on which router is blocking or allowing traffic. It cannot help identify redundant/shadow rules.

Note:

Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) is a Cisco Software Defined Networking (SDN) controller, which uses open APIs for policy-based management and security through a single controller, abstracting the network and making network services simpler. APIC-EM provides centralized automation of policy-based application profiles.

Reference: CCNA Routing and Switching Complete Study Guide

Cisco Intelligent WAN (IWAN) application simplifies the provisioning of IWAN network profiles with simple business policies. The IWAN application defines business-level preferences by application or groups of applications in terms of the preferred path for hybrid WAN links. Doing so improves the application experience over any connection and saves telecom costs by leveraging cheaper WAN links.

Shadow rules are the rules that are never matched (usually because of the first rules). For example two access-list statements:

access-list 100 permit ip any any
access-list 100 deny tcp host A host B

Then the second access-list statement would never be matched because all traffic have been already allowed by the first statement. In this case we call statement 1 shadows statement 2.

Question 5

Explanation

The ACL Path Analysis tool in APIC-EM can help to identify where the traffic was blocked in the transmission.

Path_trace_tool_APIC-EM.jpg

Comments (6) Comments
  1. Xee
    May 25th, 2017

    Hello 9tut, Any knowledge base for it?

  2. Anonymous
    June 28th, 2017

    Аni
    any basic tutorial?

  3. Аni
    June 28th, 2017

    Any basic tutorial

  4. seyf
    October 3rd, 2017

    q5 is A or C ???

  5. Oscar.W
    November 18th, 2017

    pleasss!! Can someone lend me latest dumps for CCNA exam, I’m going to take the ccna exam this Monday :)

  6. Lateef
    November 21st, 2017

    How was your exam? @Oscar
    @Others, you can pay $10 on udemy and get complete access to tutotials of this topic. Look for Chris Bryant CCNA.

Add a Comment