Cisco SD-Access Overlay Architecture

Cisco SD-Access Overlay Architecture

Question

Which component is part of the Cisco SD-Access overlay architecture?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Cisco SD-Access (Software-Defined Access) is a network architecture that utilizes network virtualization and segmentation to provide a secure, automated, and policy-driven network environment.

In this architecture, the overlay network is built on top of the physical underlay network. The overlay network is responsible for providing logical connectivity and policy enforcement, while the underlay network provides physical connectivity.

The Cisco SD-Access overlay network consists of three main components: border nodes, spine nodes, and leaf nodes.

  1. Border Nodes: Border nodes are responsible for providing connectivity between the SD-Access fabric and external networks or services, such as the Internet or other data centers. They serve as the gateway between the SD-Access fabric and the rest of the world, and they enforce security policies and protocols to ensure that only authorized traffic is allowed to enter or leave the fabric.

  2. Spine Nodes: Spine nodes are responsible for providing high-speed connectivity between the leaf nodes in the SD-Access fabric. They form the backbone of the fabric and are designed to be highly scalable and resilient.

  3. Leaf Nodes: Leaf nodes are responsible for providing access connectivity for end devices, such as computers, servers, or IoT devices. They are connected to the spine nodes and provide a point of attachment for end devices. Leaf nodes also enforce policies and protocols to ensure that traffic is only allowed to flow where it is authorized to go.

Cisco DNA Center is not a component of the Cisco SD-Access overlay architecture, but rather a management platform that provides centralized network management and automation capabilities for the SD-Access fabric. It can be used to configure and manage the border, spine, and leaf nodes, as well as to automate routine network tasks and enforce policies and protocols across the fabric.