Transcription of SD-Access Segmentation Design Guide - Cisco
{{id}} {{{paragraph}}}
S Cisco VALIDATED DESIGNSD-Access Segmentation Design GuideMay 2018 Table of ContentsCisco Validated DesignTable of ContentsIntroduction ..1 Intent-based networking and Segmentation ..2 Understanding virtual networks and SGTs in SD-Access ..4 Enforcement of traffic destined external to the fabric ..9 Defining network segments ..16 Virtual networks or scalable group tags ..17 Use ..21 Manufacturing ..22 Healthcare ..24 PCI and retail ..26 Electric power ..26 Appendix A: Network Segmentation overview: A brief history ..28 VLANs and private VLANs ..28 Virtual routing and forwarding instances.
Protection, and Cisco Stealthwatch® providing network visibility, and Cisco Identity Services Engine providing policy and secured network access for authorized users, guests, and IoT devices are all effective in providing a “defense-in-depth” strategy to protect an organization. Once adopted, the focus shifts to defining an
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}