BRKCRS-2117 - 2019 Barcelona
BRKCRS-2117 - 2019 Barcelona
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKCRS-2117
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
BRKCRS-2117
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
About the jargon…
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Cisco SD-WAN Solution Overview
Applying SDN Principles To The Wide Area Network
vManage
MANAGEMENT
vBond
ORCHESTRATION ANALYTICS
Control Plane
(Containers or VMs)
CONTROL
Data Plane
(Physical or Virtual)
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Orchestration Plane
vBond Orchestrator
vBond
Main
MANAGEMENT Characteristics
API • Orchestrates control and
ORCHESTRATION ANALYTICS management plane
• First point of authentication
• Distributes list of vSmarts/
vManage to all vEdge routers
CONTROL
• Facilitates NAT traversal
• Requires public IP Address
Secure IPSEC Data Channel INET MPLS 4G
Secure DTLS Control Channel
[could sit behind 1:1 NAT]
• Highly resilient
• Multitenant or single tenant
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Management Plane
vManage
vBond Main
Characteristics
MANAGEMENT
• Single pane of glass for
API Day0, Day1 and Day2
ANALYTICS
operations
ORCHESTRATION
• Centralized provisioning
• Multitenant or single tenant
• Policies and Templates
CONTROL
• Troubleshooting and
Monitoring
Software upgrades
Secure DTLS Control Channel
Secure IPSEC Data Channel INET MPLS 4G •
• GUI with RBAC
• Programmatic interfaces
(REST, NETCONF)
Data Center Campus Branch Home Office • Highly resilient
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Control Plane
vSmart Controller
vBond
Main
MANAGEMENT Characteristics
API • Facilitates fabric discovery
ORCHESTRATION ANALYTICS • Disseminates control plane
information between vEdges
• Distributes data plane and app-
aware routing policies to the
CONTROL vEdge routers
• Implements control plane policies
Secure IPSEC Data Channel INET MPLS 4G
Secure DTLS Control Channel
• Dramatically reduces control
plane complexity
• Highly resilient
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Data Plane
vEdge Router Main
Characteristics
vBond
• WAN edge router
MANAGEMENT • Provides secure data plane with
remote vEdge routers
API
• Establishes secure control plane
ORCHESTRATION ANALYTICS with vSmart controllers (OMP)
• Implements data plane and
application aware routing
policies
CONTROL
• Exports performance statistics
• Leverages traditional routing
protocols like OSPF, BGP and
Secure DTLS Control Channel
Secure IPSEC Data Channel INET MPLS 4G
VRRP
• Support Zero Touch
Deployment
Data Center Campus Branch Home Office • Physical or Virtual form factor
(100Mb, 1Gb, 10Gb, 20Gb+)
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Network Architecture
Typical SDWAN Deployment Architecture
Private Cloud Site Enterprise Controllers Virtual Private Cloud SaaS
App
Servers
SDWAN Servers
VPC VPC
Headend
VPC VPC
Distro
Switch
V V
CE
Routers
MPLS1 INET
V = Virtual Router
Single
Legacy Dual Router
Router
Branch Branch
Branch
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Controller Deployment
Cloud-Delivered Control
Flexible Deployment Options
Cisco Cloud Ops MSP Ops Team Enterprise IT
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Controller Deployment
NIC0 NIC1
Cloud or on premise
deployment
Separate interfaces for control
VPN0 VPN512 and management
vBond
Separate VPNs for control and
management
Control Management
Interface Interface
- Zone-based security
Minimal configuration for bring-
up
ESXi, KVM, AWS, MS Azure - Connectivity, System IP, Site
ID, Org-Name, vBond IP (local)
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Controller Deployment
NIC0 NIC1
Cloud or on premise
deployment
Separate interfaces for control
VPN0 VPN512
vSmart
and management
Separate VPNs for control and
management
Control Management
Interface Interface - Zone-based security
Minimal configuration for bring-
up
ESXi, KVM, AWS, MS Azure - Connectivity, System IP, Site
ID, Org-Name, vBond IP
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Typical Controller Deployment
NIC0 NIC1 NIC2
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Controller Communication Principles
• The vBond is a special control element because it acts as a STUN server
for the network to allow vEdges to sit behind NAT devices
• To work properly, the other control elements (vManage, vSmart) need to
communicate to vBond through NAT as well.
• vSmarts and vManages can communicate with each other either through
NAT or un-NATed connections
• NAT must be 1:1 with no PAT
• The choice of deployment model is dependent on security posture vs
network complexity tradeoff.
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Significance of Interface (TLOC) Color
Private Colors
• Color is an abstraction used to identify individual WAN Metro-ethernet
transport as PUBLIC or PRIVATE mpls
private1
private2
• Colors are KEYWORDS not free form LABELS private3
private4
• Used for automation and policy writing private5
private6
• “Color” dictates the use of private-ip vs public-ip (dest) for
Public Colors
Tunnel Establishment when there is NAT present
• Example: 3g
lte
• If two ends have a private color: private IP address/port used for biz-internet
DTLS/TLS or IPSec public-internet
blue
• If endpoint has public color: Public IP is used for DTLS/TLS or IPSec green
red
gold
silver
bronze
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Controllers Public Cloud Deployment
Controllers Communication
• 1 (2)
(1) 2 vSmart and vManage point
to the vBond IP address
1 - NATed public IP address
• 3 vBond learns interface private
(3)
2 4
Public and NATed public IP address of
1:1 1:1 1:1
Cloud NAT NAT NAT vSmart and vManage
- Private is pre-NAT, public is post-
NAT
• 4 vSmart and vManage use NATed
(4)
public IP addresses for
3 communication
- vSmart and vManage use public color
vBond vSmart vManage (default)
- Public color to public color uses
Public IP address (post-NAT) Private IP address (pre-NAT) Public Color public IP address
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Controllers Public Cloud Deployment
1 vEdge 1 vEdge points to the vBond NATed
• (1)
public IP
- vBond NATed public IP address is
MPLS
2 INET reachable through MPLS (direct or via
Data Center) and Internet transports
Data Center
2 vEdge communicates with vSmart
• (2)
and vManage using NATed public IP
1:1 1:1 1:1
NAT NAT NAT address
Public Cloud
- Private color to public color uses public
IP address, public color to public color
uses public IP address
- vSmart and vManage NATed public IP
Public Color
addresses are reachable through MPLS
Private Color vBond vSmart vManage (direct or via Data Center) and Internet
Public IP address (post-NAT) Private IP address (pre-NAT)
transports
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
On-Prem Controllers Hybrid Deployment
Controllers Communication • 2 vSmart and vManage point to
1 (2)
(1)
the vBond IP address
- NATed public IP address
1 • 3 vBond learns interface private
(3)
2 and NATed public IP address of
DMZ 1:1 1:1 1:1 vSmart and vManage
Firewall NAT NAT NAT
- Private is pre-NAT, public is post-
NAT
4
• 4 vSmart and vManage use
(4)
interface private IP addresses for
3 communication
- vSmart and vManage use private
color (non-default)
vBond vSmart vManage
- Private color to private color uses
private IP address
Public IP address (post-NAT) Private IP address (pre-NAT) Private Color
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
On-Prem Controllers Hybrid Deployment
1 • 1 vEdge points to the vBond FQDN that
(1)
vEdge resolves to both public and private IP
MPLS
addresses
2 Private IP Public IP
Data MPLS
Center INET
Core Internet
Switch
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Firewall Rules for On-Prem Controllers
UDP/12346-12445 UDP/12346-12445
UDP/12346 UDP/12346 UDP/12346-13065 TCP/23456-23555 TCP/ Ephemeral UDP/12346-13065
UDP/12346-12445
TCP/Ephemeral UDP/12346-12445
UDP/12346-12445 TCP/Ephemeral
Firewall DMZ
WAN Edge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Example Controller System Deployment
Service Side: Mgmt subnet OOB
VPN 512 Management Access Mgmt
VPN512 VPN512 VPN512
CSP5216
3 VM Redundant vM vS vB
DMZ
FW
(3x)
Cluster VPN0 VPN0 VPN0
Public IP Address
Transport Side: Tunnel
Transport subnet Private IP Address
I/Fs on VPN0
Transport CE Termination
A SR1002X A SR1002 A SR1002 A SR1002 A SR1002 A SR!002X
or
vM vS 0/0
Public IPs or Default Route vB vM vS
MPLS INET
Same Design
in backup DCs
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Controllers Connectivity and Scale
5400
vBond vSmart Con* vManage
1500 1500 1500 2000 2000 2000
Con Con Con 5400 5400 Dev Dev Dev
Con* Con*
x6 x6
x20
1 permanent connection
per-transport per vSmart
DNS Up to max-control-connections
Hash
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Onboarding
Certificate-Based Trust
Administrator • Bi-directional certificate-based trust between all
Signed
Defined
vEdge List elements
Controllers
- Public or Enterprise PKI
vManage • White-list of valid vEdges and controllers
- Certificate serial number as unique identification
vBond vSmart
vEdge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Controllers Identity and Trust
Device Certificate • Controller identity is provided by the digicert
signed certificate (1-2 yr lifetime)
Root
Identity - Alternatively can use Enterprise CA. Requires
Enterprise Root cert on all other controllers
and vEdge routers
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
vEdge Cloud ⟺ vBond, vSmart, vManage
Validate: Root trust, Validate: Root trust, Validate: Root trust, • vManage root cert is distributed to controllers
certificate serial certificate serial certificate serial
org-name org-name org-name • vManage issues certificate identity
• vBond, vSmart and vManage validate:
vBond vSmart vManage
- Trust for vEdge certificate root CA
Root Root Root
- Certificate serial numbers against authorized white-
list (from vManage)
- Organization name (received certificate OU) against
locally configured one
Signed
Signed
Signed
• vEdge validates:
- Trust for vBond, vSmart and vManage certificate
root CA
- Organization name (received certificate OU) against
vEdge
locally configured one
Root Signed • Persistent DTLS/TLS connection comes up
between vEdge and vSmart/vManage
DTLS - vEdge is a client
Validate: Root trust,
org-name DTLS/TLS
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Zero Touch Provisioning – SDWAN Router
Control and Policy
Zero Touch Provisioning
Elements
Server
2 3
5
1 Full Registration and
Configuration
4
Assumption:
• DHCP on Transport Side (WAN)
• DNS to resolve ztp.viptela.com/
devicehelper.cisco.com*
SDWAN Appliance
* Factory default config
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Control Plane Sessions
• Secure Channel to SD-WAN Controllers. DTLS only
• Viptela Primitives
• Operates over DTLS/TLS authenticated and • Permanent
vManage
secured tunnels • Multiple Sessions
vEdge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Routing Design
Understanding SDWAN Routing
vEdge vSmart vEdge
Registration Update Registration Update
A T1 T2 T3 B T1 T2 T3
System IP System IP
10.0.0.1 B T1 T2 T3 A T1 T2 T3 10.0.0.10
A B
TLOCs SP Peer or
GW Router
SP Peer or
GW Router
TLOCs
Default Default
T1 T1
Default Default
INET MPLS 4G
T2 T2
Def Def
vpn0 T3 T3 vpn0
Underlay Network (e.g. BGP)
Site ID 1 Site ID 10
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Overlay Management Protocol Overview
• TCP based extensible control plane protocol
vSmart2
• Runs between vEdge routers and vSmart
controllers and between the vSmart
controllers
- Inside permanent TLS/DTLS connections
- Automatically enabled on bringup
vSmart1 vSmart3
• vSmarts create full mesh of OMP peers
• Distribution of data-plane security parameters
and policies
• Implementation of control (routing) and VPN
vEdge vEdge membership policies
OMP Peers
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Overlay Routing: Service Routes
• Service routes are routes
originating from outside the
Dynamic (OSPF/BGP)
Dynamic (OSPF/BGP) SDWAN
Static
Static
Connected
Connected • i.e. “LAN” routes
Site2 • Redistributed to/from OMP
Site1 vSmart
Overlay • OMP learns and translates
Management routing information across the
Protocol overlay
Site3
- OMP routes, TLOC routes,
Site4
network service routes
Connected
Connected - Unicast and multicast address
Static
Static families
Dynamic (OSPF/BGP)
Dynamic (OSPF/BGP) - IPv4 and IPv6 (March 2019)
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Overlay Routing: OMP Routes
• Routes learnt from local service
side
vSmart
• Advertised to vSmart
controllers
MPLS INET • Most prominent attributes:
OMP Update - TLOC
- Site-ID
vEdge - Label
- Tag
- Preference
Connected
Service - Originator System IP
Static Side - Origin Protocol
- Origin Metric
Dynamic (OSPF/BGP)
- AS PATH
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Overlay Routing: TLOC Routes
• Routes connecting locations to
physical networks
vSmart • Advertised to vSmart
controllers
OMP Update
IPsec
IPsec Local TLOCs
IPsec (System IP, Color, Encap)
MPLS INET
vEdge vEdge
vEdge vEdge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Transport Colors
T3 T4 T1 T2
T3 T4
Internet1 T1 T2 Internet
T1 T3
T3 vEdge vEdge
T1
vEdge vEdge T2 T4
T2 T4
MPLS
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
SysIP: 10.0.0.1
TLOC Color: Internet
IPSEC Public
G0/0 WAN
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Site Design &
Deployment
Deployment Sequence
vManage
Data Center
vSmart vBond B Branch Campus
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Deploying SDWAN – Routing Overview
Data Center Core Cloud Controllers
DC Routes DC Routes
0/0 0/0
OSPF/BGP/EIGRP*
• Transition hubs
• Overlay Site Routing
• Legacy Site Routing
SD-WAN • DC Access
SD-WAN
Tunnel
Tunnel
WAN • Hub & Spoke Migration
Approach
• Regionalization
Non-SDWAN
Networks SD-WAN *EIGRP support available March 2019
OSPF/BGP/EIGRP* Networks
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Data Center Routing
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Branch Migration – In place
Traditional SD-WAN
Local
MPLS MPLS INET prefixes
OMP
Remote
prefixes*
OMP-to-BGP/OSPF
Router WAN Edge
BGP/OSPF-to-OMP
L2 L2 Local
OSPF/BGP OSPF/BGP
prefixes
OSFP/BGP
Remote
L3 Switch L3 Switch prefixes*
Local
MPLS INET MPLS INET prefixes
OMP
TLOC Remote
Extension prefixes*
OMP-to-BGP/OSPF
Router Router WAN Edge
BGP/OSPF-to-OMP
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Device Template Structure
Site Router Configuration
• Specific to one device-type.
(e.g. vEdge100, ISR4321)
• Basic Information
• Additional Templates
• Housekeeping, logging servers, localized policy
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Centralized Device Configuration via Templates
https://www.youtube.com/watch?v=4hMMfM8OsoY
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Frequently-used Feature Templates
For Your
Reference
• System - Configure basic system information, site ID, system IP, time zone, • OSPF (optional) - Configure router ID, distance, areas, OSPF interfaces,
hostname, device groups, GPS coordinates, port hopping, and port offset. reference bandwidth, default information originate, metrics, metric type, and SPF
timers.
• Logging - Configure logging to disk and/or to a remote logging server.
• VPN Interface configuration - Configure interface name and status, static or
dynamic IPv4 and v6 address, DHCP helper, NAT, VRRP, shaping, QoS,
• AAA - Specify authentication method, order. Configure Radius, TACACs, or local
authentication, including local user groups with different read/write permissions. ingress/egress Access Control List (ACL) for IPv4 and 6, policing, static Address
Resolution Protocol (ARP), 802.1x, duplex, MAC address, IP Maximum
Transmission Unit (MTU), Transmission Control Protocol Maximum Segment Size
• BFD - Specify BFD app-route multiplier and poll interval and specify the hello and (TCP MSS), TLOC extension, and more. In the case of the transport VPN, configure
BFD multiplier for each transport. tunnel, transport color, allowed protocols for the interface, encapsulation,
preference, weight, and more.
• OMP - Change graceful restart timers, advertisement and hold timers; change
number of paths advertised; configure AS overlay number; set local redistribution • VPN interface bridge (optional) - Configure layer 3 characteristics of a bridge
into OMP; and change the number of equal-cost paths installed in the router. interface, including IPv4 address, DHCP helper, ACLs, VRRP, MTU, and TCP MSS.
• Security - Change the rekey time, anti-replay window, and authentication types • DHCP server (optional) - Configure DHCP server characteristics, such as
for IPSec. address pool, lease time, static leases, domain name, default gateway, DNS
servers, and TFTP servers.
• Archive (optional) - Archive the full running configuration onto a file server within
a time period specified. • Banner (optional) - Configure the login banner or message-of-the-day banner.
• NTP (optional) - Configure NTP servers and authentication if required. • Policy (optional) - Attach a localized policy.
• VPN - Change ECMP hash, add DNS servers, advertise protocols (BGP, static, • SNMP (optional) - Configure SNMP parameters, including SNMP device name
connected, OSPF external) from the VPN into OMP, add IPv4 or v6 static routes, and location, SNMP version, views, and communities, and trap groups.
service routes, and GRE routes.
• Bridge (optional) - Define layer 2 characteristics of a bridge, including the VLAN
• BGP (optional) - Configure the AS number, router ID, distance, maximum paths, ID, MAC address aging, maximum MAC addresses, and physical interfaces for the
neighbors, redistribution of protocols into BGP, hold time, and keepalive timers. bridge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Deployment Planning
Port Numbering, System IP
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Deployment Planning
Site ID
• Site ID is a unique identifier for the
SITE location
• Value from 1 – 4294967295.
• Carried in OMP updates.
• Same ID for all vEdges residing in the
same site
• Site could be a branch, campus, DC
etc.
Site Types Definition
• Required attribute to join the overlay
Service-sites – eg. Firewall Type 1
• Choose Site ID allocation schema Sites with Direct Internet Access Type 2
carefully
Lower BW Sites Type 3
• Critical attribute use to scope Policy
application (site, range of sites, etc) Higher BW Sites Type 4
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Example Design For Your
Reference
HUB1-MPLS- HUB1-INET-
ASR1002HX-1 ASR1002HX-2
Site ID: 100 SiteID:
Org-name: 100
mycorp-61205 Org-name:
System IP:10.100.0.1 mycorp-
VPN 1 VPN 0
VPN 0 VPN 1 61205
SystemIP:
WAN IF: Int GigE 0/0/1 WAN IF: Int GigE 0/0/3:
10.100.0.2
WAN IP: 192.168.6.1 WAN IP: 192.168.146.10
Bandwidth Up: 1000 Mbps Bandwidth Up: 300 Mbps
Bandwidth Dn: 1000 Mbps INTERNET Bandwidth Dn: 300 Mbps
VRF default
Network Policy
Control Data
Affects Control Plane Affects Data Plane
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Centralized Policy
Centralized Policy refers to policy provisioned on vSmart controllers. There are two
types:
— Control Policy: Affects the routing in the overlay network-wide
Filter or modify information that is stored in the vSmart controller routing table
Filter advertisements made by the vSmart controller to the dataplane elements.
Control Policy is always on the vSmart controller. Never pushed to the vEdge routers
— Data Policy: Affects the flow of traffic throughout the VPN segments in the network
Apply to the flow of data traffic
Permit or restrict access based either on a 6-tuple match or on VPN membership
These policies are pushed to the affected vEdge routers
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Localized Policy
Localized Policy refers to policy provisioned on dataplane routers. There are two types:
— Local Control Policy: underlay route policies on the service or transport networks
Implement traditional BGP or OSPF routing behaviours required to interface to the service or
transport networks at the local site.
— Local Data Policy: Affects the flow of traffic throughout the VPN segments in the
network
Access lists applied to a specific interface(s) on the router.
Simple access lists permit and restrict access based on a 6-tuple match.
Access lists for class of service (CoS) marking, queuing, policing, route-mapping and SPANning,
Control how data traffic flows out of and in to the router's interfaces and interface queues
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Policy Distribution
vManage
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
vSmart Policy Construction
Lists Policy Definition Policy Application
• data-prefix-list – list of • App-route-policy is used together • Apply-policy is used in
prefixes for use with a data- with sla-classes for application- conjunction with a site-list to
aware-routing determine where policies are
policy
• Cflowd-template configures the applied
• Prefix-list – list of prefixes for cflowd agents on the vEdge nodes
use with any other policy
• Control-policy expresses OMP
• Site-list – list of site-ids for routing control
use in policy and apply-policy
• Data-policy provides vpn-wide
• Tloc-list – list of tlocs for use policy-based routing
in policy • Vpn-membership-policy controls
• Vpn-list – list of vpns for use in vpn membership across nodes
policy
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Policy Creation Workflow in vManage
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
High Availability and
Redundancy
Site Redundancy - Routed
Redundant pair of vEdge routers operate in
active/active mode
SD-WAN
Fabric vEdge routers are one or more Layer 3 hops away
from the hosts
Standard OSPF/BGP/EIGRP* routing protocols are
running between the redundant pair vEdge routers
vEdge A vEdge B and the site router
Bi-directional redistribution between OMP and
OSPF/BGP and vice-versa on the vEdge routers
Site
Router
- OSPF DN bit, BGP SoO community
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Transport Redundancy – TLOC Extension
vEdge routers are connected only to their
respective transports
MPLS Internet vEdge routers build IPSec tunnels across
directly connected transports and across the
transports connected to the neighboring vEdge
router
vEdge vEdge - Neighboring vEdge router acts as an underlay
router for tunnels initiated from the other vEdge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Internet and MPLS TLOC-Extension (Static)
ISP A MPLS
Static
Route to T2
NAT: tloc-extension ge0/0
T4->T1 0/0 0/0
ge0/0 ge0/0
T1 T3
VPN0 ge0/1 0/0 ge0/1 VPN0
VPN0 T2 VPN0
VPN0 T4 VPN0
ge0/2 0/0 ge0/2
vEdge 1 vEdge 2
tloc-extension ge0/0
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Controllers Redundant Deployment
• Controllers are distributed across multiple
Public Cloud private data centers
Region A Region B • Active-active, vManage is cold-standby
Export Import
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Control Redundancy - vBond
Cisco Region A Region B
Cloud vBond orchestrators have a whole view of the
devices allowed on the network
Multiple vBonds can be deployed for Function
and Geographic redundancy
vBonds vBonds
vEdges pick vBond via DNS
Control Plane
DNS round-robin is utilized
Data Plane vEdge will try first entry, then second, and so on
vEdge to vBond connection
MPLS 4G
INET DNS Temporary
Server
Stateless
vBonds maintain view of load on vSmarts
Delivers list of vSmart’s to use
Branch Campus Data Center
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Control Redundancy - vSmart
vSmart vSmart controllers exchange OMP
Controllers messages and have identical view of the
Control Plane SD-WAN fabric
Data Plane
vEdge routers connect to up to three vSmart
controllers for redundancy
Cloud
Data Center Single vSmart controller failure has no
impact, other registered vSmart still available
If all vSmart controllers fail or become
MPLS 4G
Data Center unreachable, vEdge routers will continue
INET operating on a last known good state for a
configurable amount of time (min of re-key
Small Office timer and GR timer)
Home Office
- No updates to reachability
Campus - No IPSec rekey
Branch - No policy changes propagation
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Controllers Regional Affinity (Optional)
AMER EMEA
vManage vBond Group2
Group1 vSmart
vSmart APAC
vBond vBond
Group3
Group 2,1
vSmart
FQDN AMER Group 1,2 FQDN EMEA
WAN Edge
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Control Redundancy - vManage
DC1 DC2
vManage
Cluster
vManage servers form a cluster for
Export Import
redundancy and high availability
Management Plane
All servers in the cluster act as active/active
Data Plane
nodes
- All members of the cluster must be in the
Cloud same DC / metro area
Data Center
For geo-redundancy, vManage servers
operate in active/standby mode
4G
Data Center - Not clustered
MPLS
- Database replication between sites is needed
INET
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
vManage Snapshots and Recovery
Best Practices
DC1
Snapshots
• vManage data volume periodically backed-up in
active DC. Period is based on change frequency.
• vSmart and vBond are stateless (state can be re-
created). No need to snapshot.
Recovery
• New volumes created from backed-up data
volume
• New vManage instances created and attached to
new volume (can be in cold standby – loaded and DC2
ready to start)
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Closing
Cisco SD-WAN Platform Options
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Summary
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Your SD-WAN learning map at CLEUR
Monday Tuesday Wednesday Thursday Friday
TECCRS-2014 BRKRST-2560
Deep Dive BRKRST-2559
Analytics / ML
On-prem
deployment BRKCRS-2117
BRKCRS-2112
Design
Serviceability
Deployment
TECCRS-2191 BRKCRS-2114
Deployment / BCP BRKCRS-2111 Security
Migration
TECSEC-2355
Security BRKRST-2558 BRKCRS-2113
BRKCRS-2110 SD-WAN as a Cloud on Ramp
The foundation Managed Service
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKCRS-2117
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Continue Your Education
BRKCRS-2117 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Thank you