Beginning with the Cisco SD-AVC 3.0.0 release, SD-AVC connects to a cloud service provided by Cisco that improves traffic
classification. The server addresses used by public internet sites and services change continually. Cisco Cloud Connector
uses the latest information available to improve SD-AVC classification of traffic previously classified only in generic terms.
For example, without Cloud Connector enabled, traffic from a web application using an unknown server might be classified simply
as SSL, without any additional details. When enabled, Cloud Connector might be able to provide additional up-to-date details
about this traffic.
To benefit from this service, enable the Cloud Connector in SD-AVC.
By default, SD-AVC shares telemetry with the cloud service to improve classification throughout the network.
The Cloud Connector setup enables you to specify the location for storing telemetry data for each network segment. This provides
the flexibility to store telemetry data for different segments in different locations, and assists in compliance with EU General
Data Protection Regulation (GDPR) regulations.
Enabling Cloud Connector in SD-AVC also enables the MS Office 365 Web Service, which was configured separately in earlier
SD-AVC releases.
Source
|
Description
|
Cloud Updates
|
Provides application data from multiple external sources.
|
MS Office 365 Web Service
|
Provides domain names used by Microsoft Office 365. Click the View Details button for details about each domain.
See Office 365 Traffic Categories.
Note
|
Beginning with SD-AVC 3.0.0, MS Office 365 Web Service operates through Cloud Connector. When Cloud Connector is enabled,
MS Office 365 Web Service is automatically enabled also.
In earlier releases, this component was called MS Office 365 Connector.
|
|
Telemetry Data Collection
The NBAR component of SD-AVC is configured to automatically connect and transmit telemetry data, in near real time, to Cisco.
Telemetry information will be used by Cisco to improve SD-AVC functionality and facilitate development of new features that
result in increased value. Telemetry information is transported securely to keep customer data private. Data collected includes
general administrative information (such as SD-AVC IP address and telemetry status), cache rules (such as application name,
IP addresses, and socket rating), unclassified and generic traffic (such as SSL and HTTP), analytics protocol discovery (such
as number of active flows, number of TCP flows, and number of DNS flows), device information (such as deployed engine versions),
and protocols information (such as application name and application attributes). Users may opt out of data collection for
certain telemetry categories by turning this feature off in the “Settings” tab on the “Cloud Connector” page.
Office 365 Traffic Categories
Cloud Connector receives information from Microsoft about domains and L3/L4 combinations (IP ranges, port, and L4 protocol)
used for Office 365 traffic. Microsoft indicates the traffic category (Optimize, Allow, or Default) for each domain and L3/L4
combination. (See Microsoft 365 Network Connectivity Principles.) Cisco SD-AVC identifies traffic from each of the domains and L3/L4 combinations as Office 365 traffic, and assigns it the
traffic category provided by Microsoft
You can use the Office 365 traffic category when creating traffic policy, enabling you to apply policy decisions based on
Office 365 traffic categorization. Recognizing Office 365 traffic by the L3/L4 combination offers the special advantage of
first-packet classification, allowing traffic policy to be applied from the first packet of a flow.
Device requirement: To use Office 365 categories, devices must be using Cisco IOS XE Amsterdam 17.3.1 or later.
Policy example using Office 365 traffic categories: The following policy, configured on a device in the network, uses Office 365 traffic categories optimize and allow.
class-map match-any optimize
match traffic-category optimize
class-map match-all allow
match traffic-category allow
!
policy-map type epbr epbr-policy-return
parameter default flow-stickness
class optimize
set ipv4 vrf traffic next-hop 10.0.0.254
class allow
set ipv4 vrf traffic next-hop 10.0.0.254
interface GigabitEthernet0/0/1
service-policy type epbr input epbr-policy