CISCO Catalyst Center Validated Profile Financial Vertical User Guide

September 14, 2024
Cisco

CISCO Catalyst Center Validated Profile Financial Vertical

Solution Overview

This guide focuses on creation and validation of Cisco SD-Access and Cisco SD- WAN-based deployment for a large-scale financial vertical. This deployment uses an Independent-Domain model, where the Cisco SD-WAN controller and Catalyst Center are independently managed and not integrated. This guide can be used as a reference document for finance network deployments.
Financial organizations operate hundreds of branches throughout the world, ranging from small ATMs to large corporate offices.
While each site has its own special requirements, the financial vertical needs standardized and secure network connectivity, simplified network operations and maintenance, highly failure-resilient systems, and a consistent policy implementation across the entire organization.
Using features such as Catalyst Center three-node high availability and disaster recovery for resiliency, the resulting solution provides high uptimes, lower operating costs, streamlined workflows, performance optimization, and secure end-to-end connectivity.

System and Network Resiliency

The financial vertical solution can handle failures at multiple layers, from low-level device and link failures, to controller failures, to even data center outages. Catalyst Center provides system resiliency with features such as high availability and disaster recovery.
Cisco SD-Access and SD-WAN also offer network resiliency with support of dual SD-Access borders, dual Cisco SD-WAN WAN edges, fabric nodes with stacks and Stack Wise Virtual Link (SVL), and wireless controllers in SSO and N+1.

Security

The solution leverages the built-in security features as well as the integration of Cisco ISE and Catalyst Center to provide highly secure and segmented systems.
Cisco ISE is the policy engine that simplifies the delivery of security to the network and provides support for Group-Based Policy (GBP). Cisco GBP dynamically organizes endpoints into logical groups, using scalable group tags (SGTs). SGTs are assigned based on business decisions using a richer context than simply an IP address. SGTs are easier to understand and manage. The number of group-based rules is dramatically less than an equivalent set of rules based on IP addresses. Cisco ISE also performs AAA functions with network devices and end clients.
Catalyst Center scales the network and still restricts access to critical applications in the fabric while improving situational awareness on the network. After Cisco ISE is integrated with Catalyst Center, Catalyst Center retrieves the Group-Based Policy from Cisco ISE to protect applications from unauthorized endpoints and clients. Cisco ISE gathers real-time contextual information from networks, users, and devices for Cisco Catalyst Assurance. This integration simplifies the advanced security needs of the financial institution that strives to prevent fraud and protect confidential data. The integration facilitates the provisioning of network access, accelerates security operations, and consistently enforces policy anywhere in the network.
Cisco GBP and the identity-based access control features (IEEE 802.1X/MAC authentication bypass, site-level MACsec encryption, FQDN-based certificates) help achieve the security needs of the financial vertical.

Network Segmentation

Network segmentation is essential for protecting critical business assets. Catalyst Center provides a simplified approach, called macro segmentation, to protect data between virtual networks (VNs). Catalyst Center also provides the framework for deploying micro segmentation using group-based access control for endpoints within VNs.
The concept of network segmentation is not new, but it has evolved significantly over recent years. Initially, network segmentation was defined as the process of breaking up one flat network or broadcast domain into smaller segments with virtual LANs (VLANs).

As requirements were established to extend network segments across organizations regardless of location, the concept of VN or Virtual Routing and Forwarding (VRF) instances was used to implement Layer 3 isolation between network segments.
Isolation is inherent, as each VRF maintains its own routing and forwarding, thereby creating a virtual network. Isolation is attained because routes contained in one VRF are not present in another, thereby limiting communications between them. With Cisco GBP, segmentation is no longer performed based on VLANs or VRFs with IP addressing and routing. Instead, Cisco GBP relies on the use of role- or group-based membership, regardless of IP addressing, to create policies that allow segmentation of the network.

Simplify Network Operations

Catalyst Center provides an intent-based solution to automate workflows such as network device provisioning, software image management (SWIM), and inventory management. Catalyst Center also pushes the organization’s intent as policies across all sites.
The solution allows Switch Virtual Interface (SVI) number reuse for the Layer 3 connections between the fabric borders and gateways and provides the framework for administrators to standardize SVI assignments in each border. Catalyst Center also provides actionable information about the network’s health using Assurance, such as Assurance dashboards for network, client, and critical issues. The capability to drill down to a single device or client simplifies the troubleshooting process.

Robust Network and Connectivity

Cisco SD-WAN is an overlay WAN architecture that connects multiple sites through a single fabric. The Cisco SD-WAN architecture consists of separate orchestration, management, control, and data planes. The Cisco vBond controller provides for the automatic onboarding of the SD-WAN routers into the SD-WAN overlay. The Cisco vManage controller is responsible for central configuration and monitoring. The Cisco vSmart controller is responsible for the centralized control plane of the SD-WAN network. The WAN edge establishes secure data-plane connectivity with other WAN edges.
The Cisco SD-WAN edges connect to SD-Access sites across the Cisco SD-WAN fabric using Cisco SD-Access IP transit to maintain a standard and secure connectivity throughout the network. In the Independent-Domain deployment model, Cisco vManage and Catalyst Center do not communicate with each other. Cisco SD-Access VNs are connected to Cisco SD-WAN virtual private networks (VPNs) using VRF-Lite. This allows the VN from two SD-Access sites to communicate across Cisco SD-WAN. External Border Gateway Protocol (eBGP) is configured between SD-WAN WAN edges and Cisco SD-Access borders to exchange routes within the VN/VPN.

Centralized Policy Management

There are differences in numbers between Catalyst Center systems endpoint scale and Cisco ISE scale. With multiple geographic and distant branches and sites worldwide, large Cisco ISE deployments, such as in the financial vertical, can benefit by integrating multiple Catalyst Center clusters with a single Cisco ISE. Cisco supports multiple Catalyst Center clusters per Cisco ISE deployment to better utilize Cisco ISE and also provides a centralized policy management plane for multiple Catalyst Centers. In a multiple Catalyst Center deployment, the first Catalyst Center system serves as the author node for Group-Based Access Policy. The author node manages scalable groups, access contracts, policies, and VNs. Creation, modification, or deletion of these policy and security elements is only possible on the author node. Additional reader nodes are independent systems that manage separate sets of network devices. The reader node does not manage local VNs or Group-Based Access Policy. Reader nodes only have read-only visibility of VNs and scalable groups.

Network Services

Trading floor architectures largely use multicast protocols for their data and video feed services. Catalyst Center and Cisco SD-WAN provide the framework to enable multicast from hubs to branches.

Hardware and Software Specifications

The solution is tested with the hardware and software listed in the following table. For the complete list of hardware supported, see the Cisco Software- Defined Access Compatibility Matrix.

Table 1: Hardware and Software Profile Summary

Role| Hardware Platform| Software Release| Software Release
---|---|---|---
Cisco DNA Center Controller| DN2-HW-APL-L, DN2-HW-APL-XL| 2.3.3.7| 2.3.5.6
Cisco Identity Service Management, RADIUS Server| Physical/Virtual Appliance| 3.0 Patch 6, 3.1 Patch 3| 3.2 Patch 2
Cisco SD-WAN NMS

Controller

| vManage| 20.6.1| 20.6.1
Cisco SD-Access Control Plane Node| C9500| 17.6.6a| 17.6.6a, 17.9.4a
Cisco SD-Access Fabric Border Node| C9500| 17.6.6a| 17.6.6a, 17.9.4a
Cisco SD-Access Fabric Edge Node| C9200, C9300| 17.6.6a| 17.6.6a, 17.9.4a
Cisco Wireless Controller| AireOS

C9800-40

| 8.10MR8

17.6.6a

| 8.10MR9

17.6.6a, 17.9.4a

Cisco SD-WAN WAN Edge| ASR1002-X, ISR4331| 17.6.5a| 17.6.5a
Cisco Stealth watch Controller| Physical/Virtual Appliance| 7.1.2| 7.3.2

Solution Use Case Scenarios

The following use cases were validated on the financial vertical profile using the topology defined in Topology.

  • Implement intent-based networking using Catalyst Center and Cisco SD-Access.
    • Administrators should be able to automate and simplify network device provisioning.
    • Administrators should be able to maintain and monitor inventory and resolve problems easily.
    • Administrators should be able to use Catalyst Center SWIM to upgrade multiple devices, such as switches, routers, and wireless controllers.
  • Integrate multiple Catalyst Centers with a single Cisco ISE.
    • Administrators should be able to create, modify, and delete intent-based policy on the Author node and automatically synchronize to the Reader node.
    • Administrators should be able to request promotion to the Author node from the Catalyst Center Reader node.
  • Connect multiple geographic and distant sites using Cisco SD-WAN.
    • Administrators should be able to configure Cisco SD-WAN to connect between campus and branches.
    • Administrators should be able to configure the Cisco SD-WAN WAN edge to connect to the SD-Access fabric via IP transit.
    • Administrators should be able to configure inline SGT propagation on the Cisco SD-WAN WAN edge to maintain end-to-end using Cisco Trust Sec.
    • Administrators should be able to use Cisco SD-WAN vManage to upgrade the Cisco SD-WAN WAN edge image.
  • System and network resiliency.
    • The network should recover from device or link failure automatically with minimal impact on existing applications, traffic, and users.
    • Administrators should be able to configure Catalyst Center in three-node HA mode. In case of services or node failure in Catalyst Center, the system should recover without user intervention.
    • Administrators should be able to configure disaster recovery in Catalyst Centers that reside in different data centers. In case of multiple node failures or irrecoverable network issues, Cisco disaster recovery should trigger automatic failover to Catalyst Center in a different data center.
    • Administrators should be able to upgrade or perform maintenance activities with Catalyst Center disaster recovery configured.
    • Administrators should be able to fail over to the standby Catalyst Center.
    • Administrators should be able to configure multiple Policy Administration Node (PAN), Policy Service Node (PSN), and Cisco Platform Exchange Grid (pxGrid) in a Cisco ISE distributed deployment.
    • Administrators should be able to upgrade to a major release or apply new patches to a Cisco ISE distributed deployment without impacting users and devices.
    • Administrators should be able to back up, one time or on schedule, Catalyst Center controller configuration and data.
    • Administrators should be able to restore Catalyst Center controller configuration and data.
  • Configure integrated network intent across the entire organization.
    • Administrators should be able to create VNs across the organization to achieve consistent macro segmentation.
    • Administrators should be able to apply multiple SGTs for a single VN and create group-based access policy for micro segmentation traffic within a VN.
    • Administrators should be able to configure dot1x authentication for wired and wireless clients.
    • Administrators should be able add or remove new groups of users via an add/remove VN, and then associate or disassociate the IP pool to the VN.
  • Configure enhanced security to protect sensitive financial data.
    • To prevent unauthorized access, administrators should be able to enable Closed Auth Onboarding (dot1x) for wired and wireless devices and users.
    • Administrators should be able to configure secure site-level fabric traffic with MACsec.
    • To provide tighter security, administrators on Catalyst Center should be able to apply trusted CA FQDN-based certificates.
    • Administrators should be able to integrate Stealth watch with Catalyst Center for threat detection, threat containment, and SSA for ETA automation.
    • Administrators should be able to create granular role-based users and use audit logging to monitor Catalyst Center activities.
    • Administrators should be able to audit policy changes, deployment of policy changes, status of deployment, the user who initiate the changes, and when.
  • Monitor network and client health using Assurance and analytics.
    • Network administrators should be able to monitor the state of the network, wired users, and wireless users from a single pane of glass.
    • Network administrators should be able to examine severe, critical, and other ongoing issues with the network and devices and follow the suggested actions in Assurance to resolve the issues.
    • Network administrators should be able to monitor the health of the wired and wireless users and devices connected to the network.
    • Network administrators should be able to look at a single device, wired user, or wireless user and retrieve detailed information.
    • Network administrators should be able to see detailed application data usage.
    • Network administrators should be able to use sensors to monitor wireless network health.

Topology

The test topology for the financial vertical includes four Catalyst Centers. They are deployed across multiple data centers and configured with Catalyst Center disaster recovery. Data center 1 has the main Catalyst Center cluster. Data center 2 has the recovery Catalyst Center cluster for Catalyst Center disaster recovery. Data center 3 houses the witnesses. Each data center has two Catalyst Center deployments, one as multiple Catalyst Center Authors and another as a Reader. Cisco ISE Policy Administration Node (PAN) and Policy Service Node (PSN) are distributed across Data center 1 and Data center 2. Cisco SD-WAN controllers are in Data center 1.
There are multiple fabric sites connected via Cisco SD-WAN WAN edge over the SD-WAN fabric. The sites are described as follows:

  • The larger main site has dual borders, dual non-collocated CPs, and wireless LAN controllers. The medium main site has dual borders, collocated CPs, and wireless LAN controllers.
  • The small sites have dual fabric-in-a-box with embedded wireless LAN controllers.
  • The mini sites have fabric-in-a-box with embedded wireless LAN controllers.
  • All fabric sites have SD-Access multicast with ASM overlay, SSM underlay, and native multicast. External RPs are in the main sites. Between the main sites, MSDP peering is used to communicate site-specific multicast sources.

The following figure illustrates the logical topology of the solution test bed.

Figure 1: Solution Test Topology

Scale

Solution test verified the scale numbers listed in the following table. For the hardware capacity, see the Cisco DNA Center Data Sheet.

Category Value
Device inventory 2000
Number of devices per fabric site 1 to 500
Number of VNs per site 3 to 64
Number of WLCs per site 2 per HA
Number of fabric sites 450
Number of APs per site Up to 1000
Number of endpoints 100,000 (60,000 wireless, 20,000 guest, 20,000 wired)
Number of SSIDs 4
Number of SGTs 500
Traffic profile Unicast and multicast

Solution Key Notes

This section describes technical notes that are useful for deploying the solution.

Multiple Catalyst Center

Large Cisco ISE deployments, such as the financial vertical, can benefit by integrating multiple Catalyst Center clusters with a single Cisco ISE. Catalyst Center supports multiple Catalyst Center clusters per Cisco ISE deployment to better utilize Cisco ISE and provide a centralized policy management plane for multiple Catalyst Centers. For more information, see Support for Multiple Cisco DNA Center Clusters with a Single Cisco ISE System.

  • The multiple Catalyst Center package is not bundled with the release software image and must be downloaded separately.
  • The first Catalyst Center integrated with Cisco ISE becomes the Author node. The Author node is the source of truth for all SD-Access policy information. Changing the Author node is not recommended; therefore, decide which Catalyst Center is the Author node during bring-up.
  • Subsequent integrations of Catalyst Centers (up to three) to Cisco ISE become Reader nodes. It is best to add a newly deployed Catalyst Center as a Reader node. If there is any existing policy data, do not integrate that node with Cisco ISE.
  • All Catalyst Centers in a multiple Catalyst Center deployment must run the same version of software.

Cisco SD-WAN

With fabric sites and branches throughout the world, Cisco SD-WAN provides a robust transport for connectivity between Cisco SD-Access site underlay and overlay. Using inline SGT tagging, SGTs are maintained end to end, allowing for consistent policy enforcement throughout the domain and at the fabric edges. The following figure shows the SD-Access SD-WAN integration with inline SGT tagging.

Figure 2: SD-Access SD-WAN Integration with Inline SGT

  • After Cisco SD-WAN controllers are up and WAN edges are onboarded and managed by the Cisco SD-WAN controller, integration with the Cisco SD-Access network is achieved via IP transit L3 handoff on the fabric borders with VRF lite and eBGP.
  • Layer 3 MTU alignment between fabric borders and the WAN edge is confirmed to consistently ensure end-to-end large packet forwarding.
  • Enabling Trust Sec with cts manual causes the interface to flap momentarily.
  • If the SD Access border is a Cisco Catalyst switch, configuring cts manual followed bypolicy static sgt trusted on the SD-Access border switchport enables CTS on all VLANs of the trunk link. On the SD-WAN edge, cts manualis configured on the parent physical interface and cts manual followed by policy static sgt trusted is configured on the sub interfaces. The is the SGT value to apply to untagged or untrusted incoming traffic.

Layer 3 Multicast from Hubs to Branches

Trading floor architectures use multicast protocols for data and video feed services. Catalyst Center and Cisco SD-WAN provide the framework to enable multicast from hubs to branches. The following figure shows the Layer 3 multicast topology.

Figure 3: Solution Test Multicast Topology

The financial vertical has native multicast enabled on the main, small, and mini sites. SD-Access native multicast relies on Source Specific Multicast (SSM) in the underlay; therefore, SSM configurations are configured on the fabric nodes, intermediate nodes, and SD-WAN WAN edges. Multicast Rendezvous Point (RP) is external to the SD-Access fabric. MSDP peering is enabled to communicate site-specific multicast sources to remote multicast RP. A replicator is configured in the SD-WAN WAN edge.
Multicast is enabled on the service VPN sub interfaces of the SD-WAN WAN edges, which are in turn connected to the underlay network in the fabric borders. This topology ensures complete end-to-end native multicast configuration throughout the fabric nodes and SD-WAN WAN edges.

Telemetry

Catalyst Center uses telemetry to collect device and client data and provides network health information in Assurance.

  • To enable the telemetry connection, devices are discovered with NETCONF.
  • For devices that are already discovered without NETCONF, they are rediscovered with NETCONF, followed by an Update the Telemetry Settings with Force option.
  • When Catalyst Center uses the FQDN certificate to collect device telemetry, devices must run Cisco IOS 17.5.1.

Role-Based Access Control and Audit Log

Financial organizations need granular access control based on roles. Catalyst Center supports role-based access control (RBAC) to define custom roles that permit or restrict user access to certain functions. For more information, see Cisco DNA Center User Role Permissions. Catalyst Center generates event-based audit logs that can be used to monitor user activity.

  • Only a SUPER-ADMIN-ROLE user can define custom roles. By default, Catalyst Center comes with an admin role that already has these permissions.
  • Audit logs are filtered by date and time.
  • Audit logs are published on external log servers for further processing and storage

Catalyst Center Disaster Recovery

Network resiliency is important to the financial sector. Catalyst Center disaster recovery provides data center failure protection. For more information, see Implement Disaster Recovery.

  • The same security certificate is installed on both the main and recovery sites.
  • With an FQDN-based certificate, the system name must be the same on both the main and recovery sites.
  • Catalyst Center disaster recovery maintains the complete event history on its GUI. Notifications are enabled for email, log server, and web server.
  • The Cisco DNA Center Security Best Practices Guide describes the best practices for setting up disaster recovery. The guide also explains which TCP and UDP ports must unblocked if the main and recovery sites are across a firewall.
  • Catalyst Center disaster recovery works with a round-trip time (RTT) delay of 350 ms.
  • Assurance data is not replicated across the clusters. Devices start sending Assurance data to new, active Catalyst Center clusters after failover has completed.

References

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2021–2024 Cisco Systems, Inc. All rights reserved.

Customer Support

Americas Headquarters
Cisco Systems, Inc.
San Jose, CA 95134-1706
USA
Asia Pacific Headquarters
Cisco Systems(USA)Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals