Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:03,410 --> 00:00:06,620
This is a free, complete course for the CCNA.
2
00:00:06,620 --> 00:00:10,330
If you like these videos, please subscribe\n
3
00:00:10,330 --> 00:00:14,868
Also, please like and leave a comment, and\n
4
00:00:17,609 --> 00:00:21,390
In this video we will look at software-defined\nnetworking.
5
00:00:21,390 --> 00:00:25,599
In the first video of this network automation\n
6
00:00:25,599 --> 00:00:30,509
such as centralizing the control plane in\n
7
00:00:32,070 --> 00:00:39,579
So, in this video we’ll take a more in-depth\n
8
00:00:40,600 --> 00:00:44,410
We’ll cover exam topics 6.3 and 6.4.
9
00:00:44,409 --> 00:00:49,439
You’ll learn new terms like overlay, underlay,\n
10
00:00:49,439 --> 00:00:52,500
SDN that we haven’t covered yet.
11
00:00:52,500 --> 00:00:56,058
Here’s what we’ll cover in this video.
12
00:00:56,058 --> 00:00:59,570
First I’ll briefly review the points about\n
13
00:01:01,149 --> 00:01:05,760
Then I’ll introduce Cisco’s SD-Access,\n
14
00:01:07,609 --> 00:01:12,760
I’ll also introduce Cisco’s DNA Center\n
15
00:01:12,760 --> 00:01:18,520
part of SD-Access, and compare it to traditional\n
16
00:01:18,519 --> 00:01:23,189
Make sure to watch until the end of the video\n
17
00:01:23,189 --> 00:01:26,890
ExSim, the best practice exams for the CCNA.
18
00:01:26,890 --> 00:01:31,099
Let’s reviews some points about SDN.
19
00:01:31,099 --> 00:01:36,129
SDN is an approach to networking that centralizes\n
20
00:01:38,340 --> 00:01:42,299
Traditional control planes use a distributed\n
21
00:01:42,299 --> 00:01:44,780
device has its own control plane.
22
00:01:44,780 --> 00:01:49,030
The control planes of each network device\n
23
00:01:49,030 --> 00:01:54,129
each other and share routing information,\n
24
00:01:55,129 --> 00:01:58,310
That’s a distributed control plane.
25
00:01:58,310 --> 00:02:03,430
An SDN controller centralizes control plane\n
26
00:02:03,430 --> 00:02:08,159
Network devices no longer use OSPF to share\n
27
00:02:08,159 --> 00:02:12,799
share information with the controller, which\n
28
00:02:14,650 --> 00:02:19,938
Now, depending on the SDN solution the entire\n
29
00:02:19,938 --> 00:02:24,799
SDN controller, or perhaps only part of the\n
30
00:02:24,800 --> 00:02:29,130
functions on the individual network devices.
31
00:02:29,129 --> 00:02:34,579
The controller can interact programmatically\n
32
00:02:34,580 --> 00:02:39,049
Specifically it uses what we call the southbound\n
33
00:02:39,049 --> 00:02:43,120
Then there is also the northbound interface,\n
34
00:02:43,120 --> 00:02:45,840
controller using our scripts and applications.
35
00:02:45,840 --> 00:02:52,560
Okay, those are the fundamental points of\n
36
00:02:52,560 --> 00:02:57,128
And here’s one more look at the SDN architecture\n
37
00:02:58,519 --> 00:03:02,730
The applications are on top, the controller\n
38
00:03:03,840 --> 00:03:07,859
Actually, these three ‘layers’ of the\narchitecture have names.
39
00:03:07,859 --> 00:03:10,099
On top there is the application layer.
40
00:03:10,098 --> 00:03:14,438
This layer contains scripts and applications\n
41
00:03:16,780 --> 00:03:21,218
Note that this isn’t the application layer\n
42
00:03:22,218 --> 00:03:24,269
We’re not talking about the OSI model here.
43
00:03:24,269 --> 00:03:27,099
Anyway, next is the control layer.
44
00:03:27,098 --> 00:03:31,438
This contains the SDN controller that receives\n
45
00:03:32,979 --> 00:03:37,149
Although this is a separate concept from the\n
46
00:03:37,150 --> 00:03:41,090
contains the centralized control plane of\nthe network.
47
00:03:41,090 --> 00:03:44,908
And finally there is the infrastructure layer,\n
48
00:03:44,908 --> 00:03:48,028
responsible for forwarding messages across\nthe network.
49
00:03:48,028 --> 00:03:53,709
I didn’t mention these layers in earlier\n
50
00:03:53,709 --> 00:03:58,950
The application layer contains apps and scripts\n
51
00:03:58,950 --> 00:04:03,229
layer contains the SDN controller, and the\n
52
00:04:04,340 --> 00:04:09,989
Okay, so I’ve told you the basics of what\n
53
00:04:09,989 --> 00:04:12,378
looked at a specific example of SDN.
54
00:04:12,378 --> 00:04:19,110
So, let’s take a look at one, Cisco Software-Defined\nAccess.
55
00:04:19,110 --> 00:04:23,720
Cisco SD-Access is Cisco’s SDN solution\n
56
00:04:23,720 --> 00:04:28,170
So, office wired and wireless LANs, for example.
57
00:04:28,170 --> 00:04:33,819
Cisco has other SDN solutions, for example\n
58
00:04:33,819 --> 00:04:37,699
their SDN solution for automating data center\nnetworks.
59
00:04:37,699 --> 00:04:41,740
Remember when I explained spine-leaf architecture\n
60
00:04:41,740 --> 00:04:46,009
That is used extensively in ACI data center\nnetworks.
61
00:04:46,009 --> 00:04:50,529
Cisco also has SD-WAN, their SDN solution\nfor automating WANs.
62
00:04:50,529 --> 00:04:54,279
But for now let’s look at SD-Access.
63
00:04:54,279 --> 00:05:01,750
Cisco DNA, Digital Network Architecture, Center\n
64
00:05:01,750 --> 00:05:07,310
In the previous video about REST APIs we sent\n
65
00:05:08,600 --> 00:05:12,720
Okay, let’s look at the basic SD-Access\narchitecture.
66
00:05:12,720 --> 00:05:16,500
At the center, in the control layer, we have\nDNA Center.
67
00:05:16,500 --> 00:05:21,699
And then under it we have the network devices\n
68
00:05:21,699 --> 00:05:27,930
These devices form the fabric of SD-Access,\n
69
00:05:27,930 --> 00:05:33,379
In the application layer we have our scripts\n
70
00:05:33,379 --> 00:05:38,829
These could be tools we develop, third-party\n
71
00:05:38,829 --> 00:05:43,680
DNA Center itself also has a GUI that we can\nuse to control it.
72
00:05:43,680 --> 00:05:48,439
Okay, so that’s the basic architecture of\nCisco’s SD Access.
73
00:05:48,439 --> 00:05:53,081
Notice how it fits perfectly into the SDN\n
74
00:05:54,970 --> 00:05:57,300
Next let’s look at that term ‘fabric’.
75
00:05:57,300 --> 00:06:01,930
To understand the fabric, you need to understand\n
76
00:06:01,930 --> 00:06:07,240
First, the underlay is the underlying physical\n
77
00:06:07,240 --> 00:06:14,400
and wireless, which provide IP connectivity,\n
78
00:06:14,399 --> 00:06:18,679
Usually I’d use OSPF as an example, since\n
79
00:06:18,680 --> 00:06:24,629
protocol, but soon you’ll see why I chose\n
80
00:06:24,629 --> 00:06:29,209
Basically the underlay is a bunch of multilayer\n
81
00:06:29,209 --> 00:06:34,769
Then the overlay is the virtual network built\n
82
00:06:34,769 --> 00:06:41,990
For example, SD-Access uses a protocol called\n
83
00:06:41,990 --> 00:06:47,150
And fabric is the term we use to refer to\n
84
00:06:47,149 --> 00:06:50,659
the physical and virtual network as a whole.
85
00:06:50,660 --> 00:06:53,580
For example, this is the underlay network.
86
00:06:53,579 --> 00:06:57,639
The physical multilayer switches and their\n
87
00:06:57,639 --> 00:07:04,899
perhaps running IS-IS to share routing information\n
88
00:07:04,899 --> 00:07:11,250
Then the overlay network consists of VXLAN\n
89
00:07:11,250 --> 00:07:15,339
When hosts in the LAN communicate with each\n
90
00:07:19,000 --> 00:07:24,879
And the fabric refers to the physical and\n
91
00:07:24,879 --> 00:07:27,670
Both are necessary to make SD-Access work.
92
00:07:27,670 --> 00:07:32,449
Okay, now let me give a little more detail\n
93
00:07:32,449 --> 00:07:36,209
So, let’s talk about the underlay.
94
00:07:36,209 --> 00:07:40,659
The underlay’s purpose is to support the\n
95
00:07:40,660 --> 00:07:44,930
To make a virtual network of tunnels, the\n
96
00:07:44,930 --> 00:07:49,750
to reach other of course, so the underlay\nis very important.
97
00:07:49,750 --> 00:07:53,230
There are three different roles for switches\nin SD-Access.
98
00:07:53,230 --> 00:07:58,080
Those are edge node, these are switches that\n
99
00:07:59,959 --> 00:08:05,219
Then there are border nodes, which connect\n
100
00:08:05,220 --> 00:08:08,450
for example connecting to a WAN router.
101
00:08:08,449 --> 00:08:14,399
And finally there are control nodes, which\n
102
00:08:14,399 --> 00:08:17,229
Protocol, to perform various control plane\nfunctions.
103
00:08:17,230 --> 00:08:22,390
I think LISP is far beyond what you need to\n
104
00:08:22,389 --> 00:08:26,110
used for the control plane of SD-Access.
105
00:08:26,110 --> 00:08:30,800
Note that you can add SD-Access on top of\n
106
00:08:33,029 --> 00:08:39,088
This is called a brownfield deployment, when\n
107
00:08:39,089 --> 00:08:44,620
If you’re curious which hardware supports\n
108
00:08:44,620 --> 00:08:49,950
matrix’, but you don’t have to know the\n
109
00:08:49,950 --> 00:08:54,370
And also note that in this case DNA center\n
110
00:08:54,370 --> 00:08:59,009
could be a major risk to the current working\nproduction network.
111
00:08:59,009 --> 00:09:03,850
Ideally you will be using a greenfield deployment,\n
112
00:09:06,528 --> 00:09:12,299
In this case DNA center will configure the\n
113
00:09:12,299 --> 00:09:16,998
For example, all switches are layer 3 and\n
114
00:09:16,999 --> 00:09:20,909
That’s why I mentioned IS-IS in the example\nearlier.
115
00:09:20,909 --> 00:09:26,649
Additionally all links between switches are\n
116
00:09:28,500 --> 00:09:33,929
And edge nodes, so access switches, act as\n
117
00:09:33,929 --> 00:09:38,828
This is known as a routed access layer, we’ve\n
118
00:09:38,828 --> 00:09:41,409
switches that end hosts connect to.
119
00:09:41,409 --> 00:09:44,068
Let me demonstrate with a diagram.
120
00:09:46,899 --> 00:09:53,730
Notice that STP is used to avoid layer 2 loops,\n
121
00:09:53,730 --> 00:09:58,659
the distribution layer switches to provide\n
122
00:09:58,659 --> 00:10:03,870
So, to send traffic out of their local network,\n
123
00:10:09,019 --> 00:10:14,699
In an SD-access underlay, however, all connections\n
124
00:10:14,700 --> 00:10:17,790
used to exchange routing information.
125
00:10:17,789 --> 00:10:22,649
Note that STP is no longer needed, and an\n
126
00:10:22,649 --> 00:10:27,679
Instead, the access layer switches are the\n
127
00:10:27,679 --> 00:10:31,679
Now we have a routed access layer.
128
00:10:31,679 --> 00:10:36,229
Now let me briefly introduce a few aspects\n
129
00:10:36,230 --> 00:10:39,850
First, LISP provides the control plane of\nSD-Access.
130
00:10:39,850 --> 00:10:44,180
A list of mappings of EIDs to RLOCs is kept.
131
00:10:46,220 --> 00:10:53,509
EIDs, endpoint identifiers, identify end hosts\n
132
00:10:53,509 --> 00:10:58,490
locators, identify the edge switch which can\n
133
00:10:58,490 --> 00:11:02,430
Of course, there is a lot more detail to cover\n
134
00:11:02,429 --> 00:11:05,899
can see how it differs from the traditional\ncontrol plane.
135
00:11:05,899 --> 00:11:10,820
Instead of a traditional routing table to\n
136
00:11:13,509 --> 00:11:20,019
Cisco TrustSec, CTS, provides policy control\n
137
00:11:20,019 --> 00:11:25,740
Just remember that name, Cisco TrustSec, you\n
138
00:11:25,740 --> 00:11:30,528
And finally VXLAN provides the data plane\n
139
00:11:30,528 --> 00:11:33,188
actually forward traffic in the data plane.
140
00:11:33,188 --> 00:11:37,500
Let’s look at how VXLAN tunnels work with\nLISP.
141
00:11:37,500 --> 00:11:43,100
Notice that SW3 is a control node, so it is\n
142
00:11:43,100 --> 00:11:49,670
PC2 is connected to SW2, and it tells the\n
143
00:11:53,188 --> 00:11:58,659
Now PC1 wants to send traffic to PC2, so it\n
144
00:11:58,659 --> 00:12:02,610
SW1 asks SW3, how can I reach PC2?
145
00:12:02,610 --> 00:12:06,249
And SW3 informs it that PC2 is reachable via\nSW2.
146
00:12:06,249 --> 00:12:12,379
So, the message from PC1 is forwarded over\n
147
00:12:12,379 --> 00:12:15,980
Okay, that’s all I’ll say about the overlay\nfor now.
148
00:12:15,980 --> 00:12:20,558
VXLAN does more than just create tunnels,\n
149
00:12:20,558 --> 00:12:23,159
which I won’t get into in this video.
150
00:12:23,159 --> 00:12:28,669
Just know the difference between fabric, overlay,\n
151
00:12:28,669 --> 00:12:36,419
like edge node, border node, and control node,\n
152
00:12:36,419 --> 00:12:39,308
Now let’s look a bit more at DNA Center.
153
00:12:39,308 --> 00:12:42,338
DNA Center itself has two main roles.
154
00:12:42,339 --> 00:12:48,220
First, it is the SDN controller used in SD-Access,\n
155
00:12:48,220 --> 00:12:53,060
Additionally it can be a network manager in\n
156
00:12:53,059 --> 00:12:58,688
In that case, although it doesn’t provide\n
157
00:12:58,688 --> 00:13:02,620
point to monitor, analyze, and configure the\nnetwork.
158
00:13:02,620 --> 00:13:07,499
Although I will mention both purposes, for\n
159
00:13:08,948 --> 00:13:14,599
Note that DNA Center is a software application\n
160
00:13:14,600 --> 00:13:19,159
I mentioned Cisco UCS in the virtualization\n
161
00:13:19,159 --> 00:13:25,549
DNA Center has a REST API, as you already\n
162
00:13:25,549 --> 00:13:31,389
And its southbound interface supports protocols\n
163
00:13:31,389 --> 00:13:37,519
protocols Telnet, SSH, and SNMP to control\nand monitor devices.
164
00:13:37,519 --> 00:13:44,310
DNA Center enables something called intent-based\n
165
00:13:44,309 --> 00:13:49,428
Basically, the goal is to allow the engineer\n
166
00:13:49,428 --> 00:13:54,778
to DNA Center, and then DNA Center will take\n
167
00:13:57,639 --> 00:14:01,549
It simplifies the process, and allows engineers\n
168
00:14:01,549 --> 00:14:05,370
analyzing and configuring policies on devices\none at a time.
169
00:14:07,980 --> 00:14:11,990
Traditional security policies using ACLs can\n
170
00:14:11,990 --> 00:14:16,818
For example, ACLs can have thousands of entries,\n
171
00:14:16,818 --> 00:14:21,178
with time and as engineers leave and new engineers\ntake over.
172
00:14:21,178 --> 00:14:25,259
Looking at another engineer’s configurations\n
173
00:14:27,428 --> 00:14:31,389
And configuring and applying ACLs correctly\n
174
00:14:32,730 --> 00:14:38,440
DNA Center, on the other hand, allows the\n
175
00:14:38,440 --> 00:14:43,040
for example this group of users can’t communicate\n
176
00:14:43,039 --> 00:14:48,099
this server but not that server, etc, and\n
177
00:14:51,490 --> 00:14:55,278
This is what configuring policies on DNA Center\nlooks like.
178
00:14:55,278 --> 00:14:57,958
Notice on the left here we have source groups.
179
00:14:57,958 --> 00:15:02,698
Of course, you’d have to define the groups\n
180
00:15:02,698 --> 00:15:05,490
And here we have those same groups as destination.
181
00:15:05,490 --> 00:15:09,860
Up here we have the legend for the colors\nin the policy grid.
182
00:15:09,860 --> 00:15:12,558
Note that the entire grid is white now, so\ndefault.
183
00:15:12,558 --> 00:15:17,990
However, let’s say any traffic sourced from\n
184
00:15:17,990 --> 00:15:20,810
for the Test_Servers group should be permitted.
185
00:15:20,809 --> 00:15:23,818
Now, what about traffic sourced from the guest\ngroup?
186
00:15:23,818 --> 00:15:28,349
They shouldn’t be able to access our servers,\n
187
00:15:28,350 --> 00:15:30,899
How about users in the employees group?
188
00:15:30,899 --> 00:15:35,471
Maybe that depends on various factors, we\n
189
00:15:35,471 --> 00:15:39,220
we would want to make a custom policy for\nthat.
190
00:15:39,220 --> 00:15:43,149
We can go ahead and define policies like this,\n
191
00:15:43,149 --> 00:15:48,009
of creating and applying policies across the\n
192
00:15:48,009 --> 00:15:51,139
No need to configure policies on devices one\nat a time.
193
00:15:51,139 --> 00:15:55,379
I’m not showing the whole process here of\n
194
00:15:55,379 --> 00:15:59,860
engineer can write an explanation for each\n
195
00:16:01,730 --> 00:16:07,149
Okay, now let’s take a look at some of the\n
196
00:16:07,149 --> 00:16:11,730
In the menu on the left side you can see there\n
197
00:16:13,639 --> 00:16:19,379
Here we can build the network hierarchy, manage\n
198
00:16:19,379 --> 00:16:22,610
DNS servers, etc, among other things.
199
00:16:22,610 --> 00:16:28,079
Here, for example, I’m looking at one site,\nSJC-20, on a map.
200
00:16:28,078 --> 00:16:31,659
You can map your enterprise’s sites all\n
201
00:16:35,039 --> 00:16:39,419
In the policy menu you can configure policies\n
202
00:16:39,419 --> 00:16:43,669
You tell DNA Center how the network devices\n
203
00:16:43,669 --> 00:16:47,639
that into configurations on the devices in\nthe network.
204
00:16:47,639 --> 00:16:50,568
For example, here’s that group-based access\ncontrol page again.
205
00:16:50,568 --> 00:16:54,919
A simple and logical way to configure network\npolicies.
206
00:16:54,919 --> 00:16:59,849
In the provision menu we can manage our device\n
207
00:16:59,850 --> 00:17:03,220
Other services are available as well, as you\n
208
00:17:06,059 --> 00:17:10,759
In the side bar you can see that there are\n
209
00:17:10,759 --> 00:17:15,199
By default, when you add devices to DNA Center\n
210
00:17:15,199 --> 00:17:18,120
you assign them to a specific site.
211
00:17:18,119 --> 00:17:22,109
You can see their status of ‘managed’\n
212
00:17:22,109 --> 00:17:25,078
DNA Center, they are not independent devices.
213
00:17:25,078 --> 00:17:29,859
This is also the default setting when you\n
214
00:17:29,859 --> 00:17:32,909
Here you can see the compliance status of\nthe devices.
215
00:17:32,910 --> 00:17:37,370
The top device is compliant with our policies,\n
216
00:17:37,369 --> 00:17:43,918
I clicked on one of the non-compliant devices,\n
217
00:17:43,919 --> 00:17:48,049
The software image, the version of IOS, is\nnot up to date.
218
00:17:48,048 --> 00:17:54,000
The version should be 17.03.03, but currently\nit is 16.11.1c.
219
00:17:54,000 --> 00:17:57,730
We can use DNA Center to update that later\nif we want.
220
00:17:57,730 --> 00:18:03,099
And here you can see that it is also non-compliant\n
221
00:18:03,099 --> 00:18:07,439
Anyway moving on, in the assurance section\n
222
00:18:08,599 --> 00:18:12,689
You can make sure the devices are all up and\n
223
00:18:12,690 --> 00:18:16,640
For example, here I can see which devices\n
224
00:18:18,048 --> 00:18:22,558
3 of 4 devices are in good health, and 1 of\n
225
00:18:22,558 --> 00:18:26,930
Okay, that’s all we’ll look at for now,\n
226
00:18:26,930 --> 00:18:33,120
yourself you can check out the DevNet sandbox\n
227
00:18:33,119 --> 00:18:35,379
the username and password here.
228
00:18:35,380 --> 00:18:40,670
I highly recommend checking it out and looking\n
229
00:18:40,670 --> 00:18:46,340
Okay, that was a quick look at DNA Center,\n
230
00:18:46,339 --> 00:18:49,859
with all of the functions of DNA Center for\nthe CCNA.
231
00:18:49,859 --> 00:18:54,770
Basically, just understand its role as a network\n
232
00:18:54,770 --> 00:18:59,549
also understand that it can be a network management\n
233
00:18:59,549 --> 00:19:04,808
However, the exam topics do state that you\n
234
00:19:04,808 --> 00:19:07,558
device management with traditional device\nmanagement.
235
00:19:07,558 --> 00:19:13,039
Actually, I’ve covered most of these points\n
236
00:19:13,039 --> 00:19:14,589
but let’s review to make sure.
237
00:19:14,589 --> 00:19:19,808
First, let’s review some characteristics\n
238
00:19:19,808 --> 00:19:23,980
Devices are configured one-by-one via SSH\nor console connection.
239
00:19:23,980 --> 00:19:27,670
This is what we’ve been doing throughout\n
240
00:19:27,670 --> 00:19:31,288
Devices are manually configured via console\n
241
00:19:31,288 --> 00:19:33,960
This means when deploying a new device to\na network.
242
00:19:33,960 --> 00:19:39,069
You first have to manually set it up before\n
243
00:19:39,069 --> 00:19:42,579
Configurations and policies are managed per-device,\n
244
00:19:42,579 --> 00:19:45,298
There is no central management.
245
00:19:45,298 --> 00:19:49,609
New network deployments take a long time due\n
246
00:19:49,609 --> 00:19:54,109
Setting up dozens of new devices manually\n
247
00:19:54,109 --> 00:19:57,308
are more likely due to increased manual effort.
248
00:19:57,308 --> 00:20:01,918
Now, I don’t want to make it seem like traditional\n
249
00:20:01,919 --> 00:20:05,080
be aware of these potential downsides.
250
00:20:05,079 --> 00:20:09,769
Now some characteristics of DNA Center-based\nnetwork management.
251
00:20:09,769 --> 00:20:14,369
Devices are centrally managed and monitored\n
252
00:20:16,759 --> 00:20:21,879
In this video I showed you the DNA Center\n
253
00:20:21,880 --> 00:20:25,889
can be used to interact with DNA Center too.
254
00:20:25,888 --> 00:20:31,349
With DNA Center, the administrator communicates\n
255
00:20:31,349 --> 00:20:37,039
which changes those intentions into configurations\n
256
00:20:37,039 --> 00:20:40,000
Configurations and policies are centrally\n
257
00:20:42,259 --> 00:20:44,319
Software versions are also centrally managed.
258
00:20:44,319 --> 00:20:49,139
DNA Center can monitor cloud servers for new\n
259
00:20:50,829 --> 00:20:55,589
In this video you saw an example of DNA Center\n
260
00:20:57,380 --> 00:21:01,929
Finally, with DNA Center new network deployments\n
261
00:21:01,929 --> 00:21:07,420
New devices can automatically receive their\n
262
00:21:08,420 --> 00:21:12,740
Not only is this faster, human error is reduced\n
263
00:21:12,740 --> 00:21:16,000
Okay, that’s all I’ll say about this.
264
00:21:16,000 --> 00:21:19,419
Most of these points we have already covered,\n
265
00:21:19,419 --> 00:21:21,580
it is mentioned on the exam topics.
266
00:21:21,579 --> 00:21:24,369
Okay, let’s review what we covered.
267
00:21:24,369 --> 00:21:29,719
We first reviewed SDN, and I newly introduced\n
268
00:21:31,200 --> 00:21:37,048
Then, as an example of SDN, I introduced some\n
269
00:21:37,048 --> 00:21:41,569
The main takeaways from this section are the\n
270
00:21:41,569 --> 00:21:44,439
Make sure you understand those concepts.
271
00:21:44,440 --> 00:21:48,860
Then I showed you some functions of Cisco\n
272
00:21:48,859 --> 00:21:52,000
with DNA Center to traditional network management.
273
00:21:52,000 --> 00:21:57,410
Remember, DNA Center is an SDN controller\n
274
00:21:57,410 --> 00:22:03,179
be used as a general network management tool\n
275
00:22:03,179 --> 00:22:07,950
Make sure to watch until the end of the quiz\n
276
00:22:07,950 --> 00:22:10,980
ExSim, the best practice exams for the CCNA.
277
00:22:10,980 --> 00:22:14,460
Okay, let’s go to quiz question 1.
278
00:22:14,460 --> 00:22:20,190
Which of the following terms describes the\n
279
00:22:20,190 --> 00:22:24,538
Pause the video now to select the best answer.
280
00:22:24,538 --> 00:22:29,339
Okay, the answer is A, underlay.
281
00:22:29,339 --> 00:22:33,949
The underlay refers to the underlying physical\n
282
00:22:35,700 --> 00:22:38,740
The combination of underlay and overlay is\ncalled the fabric.
283
00:22:42,980 --> 00:22:46,589
In which of the following layers would you\n
284
00:22:47,929 --> 00:22:52,538
Pause the video now to select the best answer.
285
00:22:52,538 --> 00:22:57,548
Okay, the answer is B, application.
286
00:22:57,548 --> 00:23:01,940
In SDN architecture, the application layer\n
287
00:23:01,940 --> 00:23:05,620
to interact with the controller, which is\nin the control layer.
288
00:23:05,619 --> 00:23:09,719
Finally the bottom layer is the infrastructure\n
289
00:23:14,190 --> 00:23:18,538
Which of the following is a characteristic\n
290
00:23:20,630 --> 00:23:25,120
Pause the video now to select the best answer.
291
00:23:25,119 --> 00:23:31,469
Okay, the answer is B, all links between switches\nare layer 3.
292
00:23:31,470 --> 00:23:35,390
This means that spanning tree is not needed,\n
293
00:23:35,390 --> 00:23:37,519
there is no risk of layer 2 loops.
294
00:23:37,519 --> 00:23:41,500
Okay, let’s go to question 4.
295
00:23:41,500 --> 00:23:46,028
Which protocol is used to create virtual tunnels\n
296
00:23:46,028 --> 00:23:50,640
Pause the video now to select the best answer.
297
00:23:50,640 --> 00:23:55,669
Okay, the answer is D, VXLAN.
298
00:23:55,669 --> 00:23:59,250
It is used to create virtual tunnels in the\noverlay network.
299
00:23:59,250 --> 00:24:03,480
And although we didn’t cover any details\n
300
00:24:03,480 --> 00:24:06,140
extensible LAN’ is very important.
301
00:24:06,140 --> 00:24:10,049
It means that VXLAN supports many different\n
302
00:24:10,048 --> 00:24:15,009
Okay, let’s go to question 5.
303
00:24:15,009 --> 00:24:18,538
Which of the following are valid switch roles\n
304
00:24:18,538 --> 00:24:24,769
(select three) Pause the video now to select\nthe best answers.
305
00:24:24,769 --> 00:24:32,359
Okay, the answers areA, C, and D. Control,\n
306
00:24:32,359 --> 00:24:36,459
These are the three different switch roles\n
307
00:24:40,539 --> 00:24:45,839
Now let’s take a look at a bonus question \n
25298
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.