Deployment, Integration, and Migration of Large SDA and SD-WAN Networks
23 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to the information provided, which statement is correct about the traffic flow between a migrated subnet and a remote location?

  • The traffic will traverse directly through Fusion and SDWAN, bypassing L2BN and BN/CP.
  • The traffic will traverse through the L2BN, Fusion, and SDWAN, bypassing BN/CP.
  • The traffic will traverse through the L2BN, BN/CP, Fusion, and SDWAN. (correct)
  • The traffic will traverse through the L2BN, BN/CP, and Fusion, but not through SDWAN.
  • In the final step of the DC CNF migration approach, what is the purpose of enabling the local C9800 WLC for fabric mode?

  • To allow the WLC to control the migration process of devices into the fabric.
  • To enable the WLC to manage the SDWAN connections for the fabric network.
  • To configure the WLC to handle traffic between the fabric and legacy networks.
  • To provision the WLC with fabric-enabled SSIDs for the APs to broadcast. (correct)
  • Which statement is correct about the traffic flow between a migrated subnet and a non-migrated subnet in the legacy network?

  • The traffic will traverse through the L2BN, BN/CP, Fusion, and the legacy site. (correct)
  • The traffic will traverse through the L2BN, Fusion, and the legacy site, bypassing BN/CP.
  • The traffic will traverse through the L2BN, BN/CP, and SDWAN, but not through Fusion or the legacy site.
  • The traffic will traverse directly through Fusion and the legacy site.
  • What happens to any temporary configurations during the final step of the DC CNF migration approach?

    <p>They are cleaned and removed from the network.</p> Signup and view all the answers

    According to the information provided, which statement is correct about the traffic flow between a non-migrated subnet in the legacy network and a remote location?

    <p>The traffic will traverse directly through Fusion and SDWAN, bypassing L2BN and BN/CP.</p> Signup and view all the answers

    What is the primary purpose of the Cisco Catalyst Center in the context of network automation and orchestration?

    <p>To provide centralized policy management and configuration automation for the entire network infrastructure</p> Signup and view all the answers

    Which of the following is a key characteristic of the SD-Access Fabric in Cisco's network architecture?

    <p>It utilizes VXLAN tunneling to abstract the underlying physical topology and enable logical network segmentation</p> Signup and view all the answers

    What is the primary role of the underlay network in the context of a Cisco SD-Access Fabric?

    <p>To establish IP-based routing and forwarding for the overlay VXLAN tunnels</p> Signup and view all the answers

    Which of the following entities within the Cisco SD-Access Fabric architecture is responsible for maintaining the mapping between end-host MAC addresses and their corresponding VXLAN tunnel endpoints?

    <p>The Fabric Control Plane</p> Signup and view all the answers

    What is the primary function of the Fabric Border Node in the Cisco SD-Access Fabric architecture?

    <p>To provide Layer 2 connectivity between the SD-Access Fabric and external networks</p> Signup and view all the answers

    What is the main purpose of the Fabric Services Node in the Cisco SD-Access Fabric architecture?

    <p>To aggregate telemetry data from the fabric and provide advanced analytics and reporting</p> Signup and view all the answers

    Which component is responsible for providing network access control and identity services in a Cisco SD-Access Fabric?

    <p>Cisco ISE</p> Signup and view all the answers

    What is the primary function of the Overlay Network in a Cisco SD-Access Fabric?

    <p>To transport different traffic types independently</p> Signup and view all the answers

    Which protocol is used for encapsulation in the data plane of a Cisco SD-Access Fabric?

    <p>VXLAN</p> Signup and view all the answers

    What is the primary function of the Underlay Network in a Cisco SD-Access Fabric?

    <p>To provide physical connectivity between devices</p> Signup and view all the answers

    Which statement accurately describes the behavior of a Cisco SD-Access Fabric from an end-user perspective?

    <p>It behaves like one large switch or router for endpoints</p> Signup and view all the answers

    Which component in a Cisco SD-Access Fabric is responsible for intent-based automation and network assurance?

    <p>Catalyst Center</p> Signup and view all the answers

    What is the role of the SD-Access Border Node in the Fabric network?

    <p>It maps the Fabric VNs (VRFs) into SD-WAN VPNs and populates the SGT in the CMD field of the Ethernet frame.</p> Signup and view all the answers

    What is the purpose of the SGT (Scalable Group Tag) in the Fabric network?

    <p>It is used to segment the traffic within the Fabric network based on security policies.</p> Signup and view all the answers

    What is the purpose of VXLAN (Virtual Extensible LAN) in the Fabric network?

    <p>It is used to encapsulate the Layer 2 Ethernet frames within a Layer 3 IP packet, enabling the creation of an overlay network.</p> Signup and view all the answers

    In the context of the Fabric network, what is the purpose of the underlay network?

    <p>It is the physical network infrastructure that provides connectivity between the Fabric nodes.</p> Signup and view all the answers

    What is the advantage of using an overlay network (such as VXLAN) in the Fabric network?

    <p>It provides a scalable and flexible way to create logical networks on top of the physical infrastructure, enabling better utilization of resources.</p> Signup and view all the answers

    What is the high-level architecture of the Fabric network, as described in the provided information?

    <p>The Fabric network is divided into multiple independent domains, with each domain having its own Border Node and Control Plane Node.</p> Signup and view all the answers

    More Like This

    SDA Commentary
    3 questions

    SDA Commentary

    LuckiestSmokyQuartz avatar
    LuckiestSmokyQuartz
    Sumber Daya Alam (SDA)
    8 questions
    Use Quizgecko on...
    Browser
    Browser