Part I Introduction to Cisco DNA
Chapter 1 Why Transform Your Business Digitally?
Digitally Transforming Industries
Digital Media and Entertainment
Digital Transportation Services
Digitally Transforming Businesses
Transforming the Customer Experience
Transforming the Employee Experience
Transforming Business Operations
Driving Digital Transformation with the Internet of Things
Chapter 2 The Business Value of Cisco DNA
Business Requirements of the Network Architecture
Business Value of Cisco Digital Network Architecture
Reducing Costs Through Automation, Virtualization, and Programmable Hardware
Mitigating Risks with Integrated Security and Compliance
Revealing Actionable Insights Through Analytics
Accelerating Business Agility Through Open APIs
Chapter 3 Designing for Humans
Technology Versus User-Experience
Design Thinking Philosophy and Principles
Cisco Design Thinking Framework
Problem to Be Solved Statement
The Cisco Design Thinking Journey for Cisco DNA
Chapter 4 Introducing the Cisco Digital Network Architecture
Requirements to Reduce Complexity and Costs
Requirement to Increase Operational Flexibility
Intelligent Feedback Mechanism
Application, User, and Device Awareness
Security and Compliance Requirements
Overview of the Cisco DNA Components
Cisco DNA Infrastructure Domains
Extending the Concept of Network Fabrics in Cisco DNA
The Role of the Cloud in Cisco DNA
Cloud for Automation and Management
Connecting the Building Blocks: APIs
Chapter 5 The Cisco Digital Network Architecture Blueprint
Relationship Between Cisco DNA Policies and Business Intent
Automating Cisco DNA—Controllers
Automating Transport and Network Functions Infrastructure
Maintaining a View of the Infrastructure Functions and Connected Endpoints
Instantiating and Maintaining Cisco DNA Services
Relationships in Cisco DNA: Revisiting Domains, Scopes, and Fabrics
Service Definition and Orchestration
Relationship Between the Controllers and the Service Definition and Orchestration Component
On-Premises and Off-Premises Agnosticism—Revisiting the Cloud
Application Hosting in the Cloud and the Evolution of the DMZ
Leveraging the Cloud for Cisco DNA Controllers and Analytics
Part II Cisco DNA Programmable Infrastructure
Chapter 6 Introduction to Cisco DNA Infrastructure
Exploring Cisco DNA Infrastructure
The Evolving Network, and Why It Matters
Requirements: The Need for Change
Requirements: The Need for Speed (of Change)
Requirements: The Need for Simplicity
Requirements: The Need for Continuity
Cisco DNA Infrastructure Solutions
The Emergence of Virtualization
Chapter 7 Hardware Innovations
The Importance of Hardware in a Software-Defined World
Delving Deeper: How Chips Are Designed and Built
Drivers of Chip Design and Density
When Good Chips Go Bad: What Can Go Wrong in Chip Design
When Good Chips Need to Get Better: Designing the Next Generation
Now We Speak the Same Language!
What’s Happening in the World of Networks
How Traditional Network ASICs Process Packets
Traffic Handling with CPUs and FPGAs
Flexible Switching Silicon: UADP
UADP Use Cases—Current, and Future
Introducing the Future: UADP 2.0 and 3.0
So What’s Common Across All of These Variants of UADP?
Wireless: Providing Innovation for Mobility
Chapter 8 Software Innovations
The Importance and Evolution of Networking Software
Cisco IOS: Origins and Evolution
Evolution of the Cisco IOS Data Plane
Evolution of the Cisco IOS Control Plane
Evolution of the Cisco IOS Management Plane
Evolution of Cisco Networking Software
The Evolution of Cisco IOS to IOS XE
Container Framework and Application Hosting
Cisco IOS XE: Bringing It All Together
Cisco IOS XE: Simplification with a Single Release Train
Cisco IOS XE: Software Maintenance Upgrades
The Issue with Software Upgrades
Cisco IOS XE: Platform Support
Protecting Platforms and Networks: Trustworthy Systems
Trustworthy Systems: An Overview
Possible Attacks: IOS Modifications
Attack Mitigation with Trustworthy Systems
Defense: Image Validation and Signing
Understanding Boot Sequence Attacks
Protecting Device Integrity from the Ground Up with Secure Boot
Ensuring Device Identity with the Secure Unique Device Identifier
The Move to Intuitive Networking
Chapter 9 Protocol Innovations
Networking Protocols: Starting at the Bottom with Ethernet
Power Protocols: Power over Ethernet, to 60 Watts and Beyond!
The Future of Power over Ethernet
25G Ethernet—The New Kid on the Block
Ethernet Evolving: This Is Not Your Father’s Ethernet!
Networking Protocols: Moving Up the Stack to Layer 2
Networking Protocols: Moving Up the Stack to Layer 3
First-Hop Reachability Protocols: HSRP and VRRP
Networking Protocols Today: Summary
Networking Protocols for the New Era of Networking
VXLAN: A Next-Generation Encapsulation Technology
IS-IS: The Evolution of Underlay Routing
LISP: The Evolution of Overlay Host Reachability
LISP to Address the Host Mobility and Scale Needs of the Next-Generation Network
Examination of LISP Roaming Operation
Summing Up: LISP As a Next-Generation Overlay Control Plane
Scalable Group Tags: The Evolution of Grouping and Policy
Scalable Group Tags for Group-Based Policies
SGT Transport End-to-End Across the Network
Bringing It All Together: What Next-Generation Protocols Within the Network Allow Us To Build
Chapter 10 Cisco DNA Infrastructure—Virtualization
Benefits of Network Function Virtualization
Use Cases for Network Function Virtualization
Virtualization to Connect Applications in VPCs
Virtualization of Multicloud Exchanges
Overview of an NFV System Architecture
Hypervisor Scheduling and NUMA
Input/Output Technologies for Virtualization
Challenges and Deployment Considerations of Network Function Virtualization
Oversubscribing the Physical Hardware Resources
Optimizing Server Configurations
Selecting the Right I/O Technique
Multi-tenancy and Multi-function VNFs
Network Segmentation Architecture
Policy-based Path Segmentation
Control Plane–based Segmentation
Multihop Path Isolation Techniques
Single-Hop Path Isolation Techniques
Cisco DNA Cloud for Applications
Cisco DNA Cloud for Automation
Chapter 12 Introduction to Cisco DNA Automation
Reduce Total Cost of Ownership
Scale Your Infrastructure, Not Your IT Department
Enable Applications to Directly Interact with the Network
Is Cisco DNA Automation the Same as SDN?
Centralized Versus Distributed Systems
Imperative Versus Declarative Control
Chapter 13 Device Programmability
Chapter 14 Cisco DNA Automation
The Increasing Importance of Automation
Current Impediments to Automation
Classifying Network Automation Tasks
Infrastructure and Cisco DNA Service Automation
Standard and Nonstandard Automation Tasks
The Role of Controllers in Cisco DNA Automation
Leveraging Abstractions in Cisco DNA to Deliver Intent-Based Networking
Domain Controllers Versus Control Plane Protocols
Automating Your Network with Cisco DNA Center
Device Discovery, Inventory, and Topology
Day 0 Operations—Standardizing on Network Designs
Standardizing Settings for Supporting Network Functions
Reserving and Managing IP Address Pools
Standardizing Service Provider QoS Profiles
Characterizing Wireless LAN Profiles
Standardizing on Network Designs
Automating the Deployment of Network Elements and Functions
Day N Operations—Automating Lifecycle Operations
Chapter 15 Introduction to Cisco DNA Analytics
Cisco DNA Analytics, Opportunities and Challenges
Brief History of Network Analytics
The Role of Network Analytics in Cisco DNA
Chapter 16 Cisco DNA Analytics Components
The Cisco DNA Telemetry Architecture
Limitations of Today’s Telemetry Protocols
The Evolution of Cisco DNA Telemetry: Model-Driven Telemetry
The Traditional Analytics Approach
The Need for Analytics Engines
Application Development Simplification
The Role of the Cloud for Analytics
Chapter 17 Cisco DNA Analytics Engines
Why a Cisco DNA Analytics Engine?
NDP Security and High Availability
It’s All About Quality of Data
Data Center Visibility with Cisco Tetration Analytics
Cisco Tetration Analytics Architecture
The Benefits of Cisco Tetration Analytics
The Cisco Strategy for Virtualization in the Enterprise
Cisco Enterprise Network Functions Virtualization
Details on Virtualization Hardware
NFVIS: An Operating System Optimized for Enterprise Virtualization
Cisco Integrated Services Virtual Router
Cisco Adaptive Security Virtual Appliance
Cisco Virtual Wide Area Application Services
Cisco Prime Virtual Network Analysis Module
Cisco Virtual Wireless LAN Controller
Service Chaining and Sample Packet Flows
Transparent Versus Routed Service Chains
Cisco DNA Center (Network Level)
Configuring and Monitoring of an NFVIS Host Using Traditional Mechanisms
Virtualizing Connectivity to Untrusted Domains: Secure Agile Exchange
Motivation for the Cisco SAE Solution
Running Virtualized Applications and VNFs Inside IOS XE
Chapter 19 Cisco DNA Software-Defined Access
The Challenges of Enterprise Networks Today
Software-Defined Access: A High-Level Overview
SD-Access: A Fabric for the Enterprise
Capabilities Offered by SD-Access
SD-Access High-Level Architecture and Attributes
SD-Access Control Plane Nodes, a Closer Look
SD-Access Fabric Border Nodes, a Closer Look
SD-Access Wireless Integration
SD-Access Case Study, Summing Up
Chapter 20 Cisco DNA Application Policy
Managing Applications in Cisco DNA Center
What Happens “Under the Hood”?
Translating Business Intent into Application Policy
Cisco DNA Infrastructure Software Requirements for Application Policy
“Holy Grail” Classification and Marking Policy
Cisco DNA Infrastructure Platform-Specific Requirements for Application Policy
Application Classification and Marking Policies
Sub-Line Rate Hierarchical QoS Policies
Enterprise-to-Service Provider Mapping
Switching Platform Requirements
Application Classification and Marking Policies
Wireless Platform Requirements
Application Classification and Marking Policies
Internal System QoS (Wireless Access Points)
Chapter 21 Cisco DNA Analytics and Assurance
Introduction to Cisco DNA Assurance
The Architectural Requirements of a Self-Healing Network
Distributed On-Device Analytics
Guided Troubleshooting and Remediation
Automated Troubleshooting and Remediation
Cisco DNA Center Analytics and Assurance
NDP Contextual Correlation and Time Machine
Chapter 22 Cisco DNA Encrypted Traffic Analytics
Encrypted Malware Detection: Defining the Problem
Encrypted Malware Detection: Defining the Solution
ETA: Use of IDP for Encrypted Malware Detection
ETA: Use of SPLT for Encrypted Malware Detection
Encrypted Malware Detection: The Solution in Action
Encrypted Malware Detection: Putting It All Together