! Verify LISP registrations on the control plane node show lisp site show lisp instance-id * ipv4 server show lisp instance-id * ethernet server ! Verify on fabric edge show lisp instance-id * ipv4 database show lisp instance-id * ethernet database CODE_BLOCK: ! Verify LISP registrations on the control plane node show lisp site show lisp instance-id * ipv4 server show lisp instance-id * ethernet server ! Verify on fabric edge show lisp instance-id * ipv4 database show lisp instance-id * ethernet database CODE_BLOCK: ! Verify LISP registrations on the control plane node show lisp site show lisp instance-id * ipv4 server show lisp instance-id * ethernet server ! Verify on fabric edge show lisp instance-id * ipv4 database show lisp instance-id * ethernet database CODE_BLOCK: 1. Client (10.10.10.50, SGT=5) → Server (10.20.20.100) 2. Fabric Edge receives frame 3. Edge does LISP Map-Request → CPN returns Border Node RLOC 4. Edge encapsulates in VXLAN: Outer IP: Src=172.16.1.10 (Edge) → Dst=172.16.1.1 (Border) VXLAN Header: VNI=8188 (L3 VN), SGT=5 (GPO extension) Inner IP: Src=10.10.10.50 → Dst=10.20.20.100 5. Packet routes across IS-IS underlay 6. Border decapsulates, checks SGT against SGACL policy 7. Border forwards to external network CODE_BLOCK: 1. Client (10.10.10.50, SGT=5) → Server (10.20.20.100) 2. Fabric Edge receives frame 3. Edge does LISP Map-Request → CPN returns Border Node RLOC 4. Edge encapsulates in VXLAN: Outer IP: Src=172.16.1.10 (Edge) → Dst=172.16.1.1 (Border) VXLAN Header: VNI=8188 (L3 VN), SGT=5 (GPO extension) Inner IP: Src=10.10.10.50 → Dst=10.20.20.100 5. Packet routes across IS-IS underlay 6. Border decapsulates, checks SGT against SGACL policy 7. Border forwards to external network CODE_BLOCK: 1. Client (10.10.10.50, SGT=5) → Server (10.20.20.100) 2. Fabric Edge receives frame 3. Edge does LISP Map-Request → CPN returns Border Node RLOC 4. Edge encapsulates in VXLAN: Outer IP: Src=172.16.1.10 (Edge) → Dst=172.16.1.1 (Border) VXLAN Header: VNI=8188 (L3 VN), SGT=5 (GPO extension) Inner IP: Src=10.10.10.50 → Dst=10.20.20.100 5. Packet routes across IS-IS underlay 6. Border decapsulates, checks SGT against SGACL policy 7. Border forwards to external network CODE_BLOCK: ! Verify VXLAN tunnels show vxlan tunnel show vxlan vni show nve peers show nve vni CODE_BLOCK: ! Verify VXLAN tunnels show vxlan tunnel show vxlan vni show nve peers show nve vni CODE_BLOCK: ! Verify VXLAN tunnels show vxlan tunnel show vxlan vni show nve peers show nve vni CODE_BLOCK: interface Vlan100 ip address 10.10.10.1 255.255.255.0 mac-address 0000.0c9f.f001 ! same on EVERY edge ip helper-address 10.1.1.50 lisp mobility dynamic CODE_BLOCK: interface Vlan100 ip address 10.10.10.1 255.255.255.0 mac-address 0000.0c9f.f001 ! same on EVERY edge ip helper-address 10.1.1.50 lisp mobility dynamic CODE_BLOCK: interface Vlan100 ip address 10.10.10.1 255.255.255.0 mac-address 0000.0c9f.f001 ! same on EVERY edge ip helper-address 10.1.1.50 lisp mobility dynamic CODE_BLOCK: ! Verify SGT assignment show cts role-based sgt-map all show authentication sessions interface Gi1/0/5 details ! Verify SGACL enforcement show cts role-based permissions show cts role-based counters CODE_BLOCK: ! Verify SGT assignment show cts role-based sgt-map all show authentication sessions interface Gi1/0/5 details ! Verify SGACL enforcement show cts role-based permissions show cts role-based counters CODE_BLOCK: ! Verify SGT assignment show cts role-based sgt-map all show authentication sessions interface Gi1/0/5 details ! Verify SGACL enforcement show cts role-based permissions show cts role-based counters
- Spanning tree across every VLAN — blocking redundant paths, unpredictable failovers
- HSRP/VRRP at distribution — 50% of gateway capacity wasted on standby
- Manual VLAN trunking — extending L2 domains creates broadcast storms and kills mobility
- Static ACLs for segmentation — thousands of lines tied to IPs that change when endpoints move
- EID (Endpoint Identifier) — the endpoint's IP or MAC address
- RLOC (Routing Locator) — the loopback IP of the fabric edge switch
- Endpoint authenticates (802.1X or MAB via ISE)
- Fabric edge sends LISP Map-Register → "EID 10.10.10.50 (SGT=5) is behind RLOC 172.16.1.10"
- CPN stores the mapping, sends Map-Notify ack
- When another fabric node needs that endpoint → Map-Request to CPN
- CPN responds with Map-Reply containing the RLOC
- Runs directly over L2 (not IP) — avoids recursive routing issues
- Better multi-topology routing support
- Simpler ECMP behavior for parallel fabric links
- Catalyst Center auto-provisions IS-IS adjacencies via LAN Automation
- L2 VNI (per VLAN segment) — intra-subnet traffic
- L3 VNI (per VN/VRF) — inter-subnet traffic across the fabric
- No HSRP/VRRP/GLBP — 100% uplink utilization
- Local switching — nearest edge handles routing, no hair-pinning
- Seamless mobility — same gateway regardless of which edge the endpoint connects to
- No SXP needed — SGT propagates automatically with every VXLAN frame
- No inline tagging hardware dependency — any VXLAN-capable switch carries SGTs
- Consistent enforcement — SGT available at both source and destination edge
- Separate VNs for corporate, IoT, guest
- Full VRF isolation — no cross-VN traffic without fusion router or border extranet policy
- Finance (SGT 20) reaches finance servers but not HR
- Contractors (SGT 10) get internet but no internal resources
- Fusion router — routes between VNs with firewall inspection
- Extranet policy on border — selective route leaking via Catalyst Center (preferred in 2026)
- Shared services VN — dedicated VN reachable by all others via policy
- TCAM capacity (Cat 9300 vs 9500 limits)
- Route table size per VRF
- DHCP relay per VRF per subnet
- CAPWAP control plane
- Client auth coordination with ISE
- LISP Map-Register on behalf of wireless clients