larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Cisco Software-Defined Wide Area Networks: Designing, Deploying and Securing Your Next Generation WAN with Cisco SD-WA

EPUB (Watermarked)

Not for Sale
  • About
  • Description
  • Sample Content
  • Updates

Features

  • Straight from Cisco’s own architects: the SD-WAN experts who train Cisco and partner engineers
  • Explains Cisco SD-WAN’s value, components, inner workings, practical configuration, and support
  • Includes use cases and case studies demonstrating Cisco SD-WAN at work in cloud and premises environments
  • Covers all CCNP Enterprise SD-WAN (ENSDWI 300-415) exam objectives, and organized to promote efficient exam prep
  • Includes access code for two full CCNP Enterprise ENSDWI 300-415 practice tests

  • Copyright 2021
  • Pages: 608
  • Edition: 1st
  • EPUB (Watermarked)
  • ISBN-10: 0-13-653316-7
  • ISBN-13: 978-0-13-653316-0

This is the eBook edition of Cisco Software-Defined Wide-Area Networks. This eBook does not include access to the companion website with practice exam that comes with the print edition. Access to the video mentoring is available through product registration at Cisco Press; or see the instructions in the back pages of your eBook. 

This study guide from Cisco Press will help you learn, prepare, and practice for exam success. This guide is built with the objective of providing assessment, review, and practice to help ensure you are prepared for your certification exam.

  • Master Cisco Implementing Cisco SD-WAN Solutions (ENSDWI 300-415) exam topics
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with exam preparation tasks


Cisco Software-Defined Wide-Area Networks presents you with an organized test preparation routine using proven series elements and techniques. Key Topic tables help you drill on key concepts you must know thoroughly. Chapter-ending Review Questions help you to review what you learned in the chapter.

Cisco Software-Defined Wide-Area Networks focuses specifically on the objectives for the Implementing Cisco SD-WAN Solutions (ENSDWI 300-415) exam. Four leading Cisco technology experts share preparation hints and test-taking tips, helping you improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

Well regarded for its level of detail, assessment features, comprehensive design scenarios, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The official study guide helps you master all the topics on the Implementing Cisco SD-WAN Solutions (ENSDWI 300-415) exam, including:

  • Architecture
  • Controller Deployment
  • Router Deployment
  • Policies
  • Security and Quality of Service
  • Management and Operations


Cisco Software-Defined Wide-Area Networks is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit http://www.cisco.com/web/learning/index.html

Table of Contents

Introduction     xix
Chapter 1  Introduction to Cisco Software-Defined Wide Area Networking (SD-WAN)     1
Networks of Today     1
Common Business and IT Trends     4
Common Desired Benefits     5
High-Level Design Considerations     7
Introduction to Cisco Software-Defined WAN (SD-WAN)     9
    Transport Independence     10
    Rethinking the WAN     12
Use Cases Demanding Changes in the WAN     13
    Bandwidth Aggregation and Application Load-Balancing     13
    Protecting Critical Applications with SLAs     14
    End-to-End Segmentation     15
    Direct Internet Access     15
    Fully Managed Network Solution     16
Building an ROI to Identify Cost Savings     17
Introduction to Multidomain     18
    Cloud Trends and Adoption     19
Summary     21
Review All Key Topics     22
Key Terms     22
Chapter Review Questions     22
Chapter 2  Cisco SD-WAN Components     25
Data Plane     27
Management Plane     32
Control Plane     34
Orchestration Plane     36
Multi-Tenancy Options     38
Deployment Options     38
Summary     39
Review All Key Topics     39
Key Terms     40
Chapter Review Questions     40
References     42
Chapter 3  Control Plane and Data Plane Operations     43
Control Plane Operations     44
    Overlay Management Protocol     47
       OMP Routes     48
       TLOC Routes     52
       Service Routes     54
    Path Selection     56
    OMP Route Redistribution and Loop Prevention     58
Data Plane Operations     65
    TLOC Colors     66
    Tunnel Groups     70
    Network Address Translation     73
       Full Cone NAT     74
       Symmetric NAT     75
       Address Restricted Cone NAT     76
       Port Restricted Cone NAT     77
    Network Segmentation     81
    Data Plane Encryption     83
    Data Plane Encryption with Pairwise     86
Summary     88
Review All Key Topics     88
Key Terms     89
Chapter Review Questions     89
References     90
Chapter 4  Onboarding and Provisioning     91
Configuration Templates     93
Developing and Deploying Templates     97
Onboarding Devices     101
    Manual Bootstrapping of a WAN Edge     102
    Automatic Provisioning with PNP or ZTP     103
Summary     105
Review All Key Topics     106
Chapter Review Questions     106
References     107
Chapter 5  Introduction to Cisco SD-WAN Policies     109
Purpose of Cisco SD-WAN Policies     109
Types of Cisco SD-WAN Policies     110
       Centralized Policy     110
       Centralized Policies That Affect the Control Plane     111
       Centralized Policies That Affect the Data Plane     112
    Localized Policy     112
    Policy Domains     113
Cisco SD-WAN Policy Construction     115
Types of Lists     118
Policy Definition     119
Cisco SD-WAN Policy Administration, Activation, and Enforcement     122
    Building a Centralized Policy     122
    Activating a Centralized Policy     125
Packet Forwarding Order of Operations     127
Summary     128
Review All Key Topics     129
Define Key Terms     129
Chapter Review Questions     129
Chapter 6  Centralized Control Policies     133
Centralized Control Policy Overview     134
Use Case 1: Isolating Remote Branches from Each Other     136
    Use Case 1 Review     149
Use Case 2: Enabling Branch-to-Branch Communication Through Data Centers     149
    Enabling Branch-to-Branch Communication with Summarization     150
    Enabling Branch-to-Branch Communication with TLOC Lists     152
    Use Case 2 Review     168
Use Case 3: Traffic Engineering at Sites with Multiple Routers     169
    Setting TLOC Preference with Centralized Policy     171
    Setting TLOC Preference with Device Templates     177
    Use Case 3 Review     179
Use Case 4: Preferring Regional Data Centers for Internet Access     180
    Use Case 4 Review     188
Use Case 5: Regional Mesh Networks     188
    Use Case 5 Review     195
Use Case 6: Enforcing Security Perimeters with Service Insertion     195
    Use Case 6 Review     202
Use Case 7: Isolating Guest Users from the Corporate WAN     202
    Use Case 7 Review     206
Use Case 8: Creating Different Network Topologies per Segment     206
    Use Case 8 Review     210
Use Case 9: Creating Extranets and Access to Shared Services     211
    Use Case 9 Review     222
Summary     223
Review All Key Topics     223
Define Key Terms     224
Chapter Review Questions     224
Reference     226
Chapter 7  Centralized Data Policies     227
Centralized Data Policy Overview     228
Centralized Data Policy Use Cases     228
    Use Case 10: Direct Internet Access for Guest Users     230
       Use Case 10 Review     242
    Use Case 11: Direct Cloud Access for Trusted Applications     243
       Use Case 11 Review     253
    Use Case 12: Application-Based Traffic Engineering     253
       Use Case 12 Review     260
    Use Case 13: Protecting Corporate Users with a Cloud-Delivered Firewall     261
       Use Case 13 Review     269
    Use Case 14: Protecting Applications from Packet Loss     269
       Forward Error Correction for Audio and Video     270
       Packet Duplication for Credit Card Transactions     274
       Use Case 14 Review     280
Summary     280
Review All Key Topics     281
Define Key Terms     282
Chapter Review Questions     282
References     284
Chapter 8  Application-Aware Routing Policies     285
The Business Imperative for Application-Aware Routing     286
The Mechanics of an App-Route Policy     286
Constructing an App-Route Policy     287
Monitoring Tunnel Performance     294
       Liveliness Detection     295
       Hello Interval     295
       Multiplier     297
    Path Quality Monitoring     298
       App-Route Poll Interval     298
       App-Route Multiplier     300
Mapping Traffic Flows to a Transport Tunnel     304
    Packet Forwarding with Application-Aware Routing Policies     304
       Traditional Lookup in the Routing Table     305
       SLA Class Action     306
Summary     315
Review All Key Topics     316
Define Key Terms     316
Chapter Review Questions     316
Chapter 9  Localized Policies     319
Introduction to Localized Policies     319
Localized Control Policies     320
Localized Data Policies     334
Quality of Service Policies     338
    Step 1: Assign Traffic to Forwarding Classes     339
    Step 2: Map Forwarding Classes to Hardware Queues     341
    Step 3: Configure the Scheduling Parameters for Each Queue     341
    Step 4: Map All of the Schedulers Together into a Single QoS Map     342
    Step 5: Configure the Interface with the QoS Map     343
Summary     346
Review All Key Topics     347
Chapter Review Questions     347
Chapter 10  Cisco SD-WAN Security     349
Cisco SD-WAN Security: Why and What     349
Application-Aware Enterprise Firewall     352
Intrusion Detection and Prevention     360
URL Filtering     367
Advanced Malware Protection and Threat Grid     372
DNS Web Layer Security     377
Cloud Security     381
vManage Authentication and Authorization     384
    Local Authentication with Role-Based Access Control (RBAC)     384
    Remote Authentication with Role-Based Access Control (RBAC)     387
Summary     389
Review All Key Topics     389
Define Key Terms     389
Chapter Review Questions     389
Chapter 11  Cisco SD-WAN Cloud onRamp     393
Cisco SD-WAN Cloud onRamp     393
Cloud onRamp for SaaS     394
Cloud onRamp for IaaS     412
Cloud onRamp for Colocation     429
    Why Colocation?     432
    How It Works     432
    Service Chaining for a Single Service Node     434
    Service Chaining for Multiple Service Nodes     436
    Service Chaining and the Public Cloud     436
       Infrastructure as a Service     438
       Software as a Service     438
       Redundancy and High Availability     440
       Service Chain Design Best Practices     440
    Configuration and Management     442
       Cluster Creation     442
       Image Repository     449
       Service Chain Creation     449
    Monitoring     454
Summary     455
Review All Key Topics     456
Define Key Terms     456
Chapter Review Questions     456
Chapter 12  Cisco SD-WAN Design and Migration     459
Cisco SD-WAN Design Methodology     459
Cisco SD-WAN Migration Preparation     460
Cisco SD-WAN Data Center Design     462
    Transport-Side Connectivity     463
    Loopback TLOC Design     465
    Service-Side Connectivity     466
Cisco SD-WAN Branch Design     469
    Complete CE ReplacementSingle Cisco SD-WAN Edge     470
    Complete CE ReplacementDual Cisco SD-WAN Edge     471
    Integration with Existing CE Router     475
    Integration with a Branch Firewall     476
    Integration with Voice Services     478
Cisco SD-WAN Overlay and Underlay Integration     480
    Overlay Only     480
    Overlay with Underlay Backup     481
    Full Overlay and Underlay Integration     485
Summary     490
Review All Key Topics     490
Chapter Review Questions     490
Chapter 13  Provisioning Cisco SD-WAN Controllers in a Private Cloud     493
SD-WAN Controller Functionality Recap     493
Certificates     496
vManage Controller Deployment     501
    Step 1: Deploy vManage Virtual Appliance on VMware ESXi or KVM     503
    Step 2: Bootstrap and Configure vManage Controller     506
    Step 3/4: Set Organization Name and vBond Address in vManage; Install Root CA Certificate     506
    Step 5: Generate, Sign, and Install Certificate onto vManage Controller     511
vBond Controller Deployment     513
    Step 1/2/3: Deploy vBond Virtual Machine on VMware ESXi; Bootstrap and Configure vBond Controller; Manually Install Root CA Certificate on vBond     514
    Step 4/5: Add vBond Controller to vManage; Generate, Sign, and Install
Certificate onto vBond Controller     516
vSmart Controller Deployment     518
    Step 1/2/3: Deploy vSmart Virtual Machine from Downloaded OVA; Bootstrap and Configure vSmart Controller; Manually Install Root CA Certificate on vSmart     519
    Step 4/5: Add vSmart Controller to vManage; Generate, Sign, and Install Certificate onto vSmart Controller     520
Summary     523
Review All Key Topics     524
Define Key Terms     524
Chapter Review Questions     524
References     526
Appendix A:  Answers to Chapter Review Questions     527
Appendix B:  Example 7-17     539
Glossary of Key Terms     553
Index     557



Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020