Knowee
Questions
Features
Study Tools

Which policy construct is used in Cisco SD-Access to identify a source or a destination of a traffic flow?IP addressSGTMAC addresspolicy tag

Question

Which policy construct is used in Cisco SD-Access to identify a source or a destination of a traffic flow?

  • IP address
  • SGTM
  • MAC address
  • policy tag
🧐 Not the exact question you are looking for?Go ask a question

Solution

The correct answer is policy tag.

Explanation:

In Cisco Software-Defined Access (SD-Access), policy constructs are utilized to efficiently manage and control network traffic. One of the key components in this framework is the policy tag. Policy tags serve as identifiers for classes of devices or users, enabling precise management of security and quality of service (QoS) policies across the network.

Unlike traditional methods that rely solely on IP or MAC addresses, which can be static and less flexible, policy tags allow for dynamic assignment based on user roles or device types. This enhances network segmentation and visibility, as policy tags can be applied regardless of the physical or virtual environment. By employing policy tags, Cisco SD-Access is able to provide a more granular and context-aware approach to traffic flow identification, which is critical in modern network management for supporting multiple types of traffic and applications.

In summary, while IP addresses and MAC addresses identify devices at a network layer, the policy tag is a higher-level construct that abstracts the endpoint details, allowing for more effective policy enforcement and traffic management in an SD-Access architecture.

This problem has been solved

Similar Questions

Which among the following is a solution for mobility-aware flow rule placement in SDIoT? a. Mobility-Flow b. Mobile-Flow c. Mobi-Flow d. M-Flow

How does Cisco Umbrella differentiate which policy to apply for incoming DNS requests?

Which Cisco IOS command applies the CPPr policy to the host subinterface?policy-mapclass-mapservice-policypolice

6.Question 6Which rule option is used to match based on the direction of network traffic?1 pointsidmessageflowcontent

Flow control takes place at which layer?a.Networkb.applicationc.transportd.data linke.physical

1/1

Upgrade your grade with Knowee

Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.