What is the data policy in a Cisco SD-WAN deployment?
list of ordered statements that define node configurations and authentication used within the SD-WAN overlay
set of statements that defines how data is forwarded based on IP pocket information and specific VPNs
detailed database mapping several kinds of addresses with their corresponding location
group of services tested to guarantee devices and links liveliness within the SD-WAN overlay
1 and 3 – Configuration
4 and 5 – Orchestration
Solution:
R1
config
flow exporter Export-NetFlowENCOR
transport udp 2055
ip sla schedule 100 life forever start-time now
wr
Sw1
monitor session 11 source interface e0/2
monitor session 11 destination interface et1/1
OR
Sw10
config t
no int po2
int et0/0
channel-group 2 mode active
no shut
spanning-tree vlan 10a pri 0
R3
Int e0/1
Ip ospf priority 255
End
Copy run start
R2
Ip ospf network point-to-point
R10
Int e0/0
no int po20
channel-group 20 mode active
spanning-tree vlan 20 pri 0
Verification:-
Config t
no int po1
default int ran et0/0-2
int ran e0/0-2
switchport trunk encap dot1q
switchport mode trunk
channel-group 1 mode active
Config#int et0/1
config-if#ip ospf priority 255
R20
clear ip ospf process
yes
ip ospf priority 0
show ip access-list
ip access-list extended 151
5 permit eigrp any any
ip access-list extended 100
permit tcp 192.168.211.0 0.0.0.255 any eq 22
class-map match-any SSH
match access-group 100
policy-map CoPP
class SSH
police 8000 conform-action transmit exceed-action drop
control-plane
service-policy input CoPP