Okay. Welcome back to the second demo, which is group based policy micro segmentation
leverage leveraging the Mist cloud. So remember, we just build a fabric, a campus fabric,
IP-Clos.
We did that just, a couple of minutes ago, and we now have full, telemetry from, from the
campus side of it. So you notice that access two here now is fully green, and we've got
some nice, nice telemetry coming in. A couple things that, I I really wanna show as well,
and I'll include this in this particular, piece of the demonstration is EVP and insights,
switch insights. This is really valuable information, deep seated telemetry that,
customers can use to determine the state of the network.
And, what we see here is we've got access to and for of course, we could we can go back
in time, over the last, you know, twenty four hours, seven days, last sixty minutes to
just to take a look at what's happening. And you we see here, of of course, it's very
important when BGP peer state changes. That's something that we absolutely want to
understand. Why did it go from, you know, established to active or active back to
established.
Certainly established is what we wanna see. This is the the latest, update from, the
cloud. So the cool thing is is that, you know, the the campus fabric, once it's built, we
can leverage, once again, the the telemetry across these links to, pull into into the Mist
UI to make, discernible information for the end user. So let's jump into a group-based
policy.
First of all, what I want to do is I want to verify that my desktops can communicate. So
I'm gonna go ahead and hit ten nine nine.
Let's do a traceroute first of all. Let's do a traceroute to ten nine nine nine nine nine
nine.
First of all, let's ping it.
Alright. We're able to ping that. Good deal. Okay. So the trace route probably didn't
work because I don't have TTL turned on. So, we've got our ping going here. I'm able to
ping obviously back to the workstation.
Okay. I'm able to ping out to the Internet.
Good deal there. And let's go ahead and trace route back to Internet again just to make
sure that I am using, the path that I want to use, which is ten nine nine nine nine dot
one. Okay. Good deal. Alright. So, let's keep the ping going there.
I'll keep this ping, to the Internet. Let's just do that. Okay. So, what we're gonna do
is we're gonna build a policy through the Mist UI, and using a template based
construct.
So here if we look at, we go to organizational switch templates, what's cool about
templates is that we can build pre build information, whether the system's operational or
not. We talked about that earlier in the campus fabric build. But here we've got
predefined not predefined. We've got we've got defined policies based on what we call
group based policy tags.
So a GBP tag is a standard, mechanism to share tagging information across an EVPN/VXLAN
network.
So remember, we've got access one and access two. They're connected to this fabric. We've
got desktop one, desktop two connected back through access one and access two, and they're
routing through this EVPN VXLAN network. The VXLAN header itself has a sixteen bit tag,
and that's where the group based policy construct resides.
So what Juniper has done, we've done this for some time, we fall into, really fall into
standards. We we believe that this is the right approach for us and for our customers is
to leverage standards that are already built so that we don't have to reinvent the
wheel.
So what we've done here is we've built, some current tags and which are which are
relatively straightforward. So for instance, guest Wi Fi, that entire network, which is a
VLAN ten o one one o three three, irrespective of where it's located, will have this tag,
one zero three one zero, three three. Our contractors that are coming in can have a
different type of tag based on maybe an IP subnet. So the way that GBP can be associated,
it can be associated with a MAC address.
It could be associated with, an IP address, a range of IP addresses. It could be
associated with a VLAN, and, also a port. So you can actually create a VLAN port
combination.
So what we're what you're looking at here are tags that are that are defined, and they're
defined through this interface. And you could see that this is actually relatively
straightforward. Now what makes it even easier is you come down here to our to our switch
policy, and and we basically say, look, contractors can't talk to developers or IT
staff.
And and so by default, that's gonna block them, but they'll be able to access everything
else. IT staff and developers, we certainly want them to communicate. And the reason why I
have this here is because the desktops that I'm gonna communicate from, or between are,
desktop one is part of IT staff. It's part of that particular subnet, ten nine nine nine
nine.
And, desktop two is part of developer subnet, which is ten eight eight eight eight. So
what I want to do is really just have my allow all policy, and I'm gonna build a new, tag
for desktop one, and we're going to assign to its particular IP address. Now we can use a
this is going to be, think of this as almost like a host IP address. Let's assign that
ninety nine, and then we'll assign desktop to eighty eight. Okay. Remember they are in
distinctly different, subnets, although the subnets by default can communicate amongst
themselves.
Okay. So we're pretty much doing like an override to that particular, switch policy which
we're gonna create right now. So we're gonna call this we're gonna call this desktop. So
what I wanna do here is basically select from a group of options here.
I'm gonna say select desktop one. We're gonna go desktop one, talking to desktop two, and
we're going to block that. Now I could have multiple devices here. I I can really be
pretty flexible in how I build the switch policy.
Okay. So that makes sense. If you look at it, it makes sense. It's human readable
format.
We're in pretty good shape, and we are still pinging from, desktop one out to the
Internet. Obviously we we wouldn't expect that to change. And we've got, desktop two ping
desktop one. So let's go ahead and push out this policy.
Alright. So I'm gonna go back over here to our, active ping, and we should see this
policy any second here stop.
And it looks like it has.
Okay. Cool. So I'm still able to ping the Internet from desktop one, that hasn't affected
me.
And I can't ping ten eight eight eight eight eight eight, and I can't obviously do that
here either. So, you know, although I should be able to ping other, you know, other
devices and other subnets here from this workstation, I'm just not gonna be able to ping
the host ten nine nine nine nine. Right? And that's because of our policy. So this was a
pretty high level overview of group based policy. We've imported that into the NIST cloud.
It pushes the policy down to the respective devices, the access switches that are are,
layer three boundary supporting VXLAN layer two, layer three gateway capability.
Really exciting stuff. Hopefully, this has been educational for you. Thank you for
spending time.