Security Book Xe
Security Book Xe
17.x
First Published: 2019-11-22
Last Modified: 2021-12-17
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2019–2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 13 GRE Over IPsec Tunnels Between Cisco IOS XE Devices 239
Prerequisites for GRE Over IPsec Tunnels Between Cisco IOS XE Devices 240
Restrictions for GRE Over IPsec Tunnels Between Cisco IOS XE Devices 240
Information About GRE Over IPsec Tunnels Between Cisco IOS XE Devices 240
Benefits of GRE Over IPsec Tunnels Between Cisco IOS XE Devices 240
Use Case for GRE Over IPsec Tunnels Between Cisco IOS XE Devices 241
Configure GRE Over IPsec Tunnels Between Cisco IOS XE Devices 241
Configure GRE Over IPsec Tunnels Between Cisco IOS XE Devices Using the CLI 242
Monitor GRE Over IPsec Tunnels Between Cisco IOS XE Devices Using the CLI 243
Configure the Unified Threat Defense Resource Profiles Using Cisco vManage 302
Verify Unified Threat Defense Resource Profiles 303
User Documentation
• Cisco IOS XE (Cisco IOS XE SD-WAN Devices)
• Cisco IOS XE (SD-WAN) Qualified Command Reference
• User Documentation for Cisco IOS XE (SD-WAN) Release 17
Documentation Feedback
To provide feedback about Cisco technical documentation use the feedback form available in the right pane
of every online document.
These three components—authentication, encryption, and integrity—are key to securing the Cisco SD-WAN
overlay network infrastructure.
The topics on Control Plane Security Overview and Data Plane Security Overview examine how authentication,
encryption, and integrity are implemented throughout the Cisco SD-WAN overlay network. The security
discussion refers to the following illustration of the components of the Cisco SD-WAN network—the vSmart
controller, the vBond orchestrator, and the routers. The connections between these devices form the control
plane (in orange) and the data plane (in purple), and it is these connections that need to be protected by
appropriate measures to ensure the security of the network devices and all network traffic.
the Advanced Encryption Standard (AES-256) encryption algorithm to encrypt all the control traffic sent over
the connections.
The privacy and encryption in the control plane, which is offered by DTLS and TLS, provide a safe and secure
foundation for the other two security components, that is, authentication and integrity. To perform
authentication, the Cisco SD-WAN devices exchange digital certificates. These certificates, which are either
installed by the software or hard-coded into the hardware, depending on the device, identify the device and
allow the devices themselves to automatically determine which ones belong in the network and which are
imposters. For integrity, the DTLS or TLS connections run AES-256-GCM, an authenticated encryption with
associated data (AEAD) that provides encryption and integrity, which ensures that all the control and data
traffic sent over the connections has not been tampered with.
Figure 1: Cisco SD-WAN Control Plane Overview
The following are the control plane security components, which function in the privacy provided by DTLS
or TLS connections:
• AES-256-GCM: This algorithm provides encryption services.
• Digital certificates: These are used for authentication.
• AES-256-GCM: This is responsible for ensuring integrity.
software implements the standard version defined in RFC 5246. As described in the RFCs, Cisco SD-WAN
uses DTLS and TLS versions 1.2.
In the Cisco SD-WAN architecture, the Cisco SD-WAN devices use DTLS or TLS as a tunneling protocol,
which is an application-level (Layer 4) tunneling protocol. When the vSmart controllers, vBond orchestrators,
Cisco vManages, and routers join the network, they create provisional DTLS or TLS tunnels between them
as part of the device authentication process. After the authentication process completes successfully, the
provisional tunnels between the routers and vSmart controllers, and those between the vBond orchestrators
and vSmart controllers, become permanent and remain up as long as the devices are active in the network. It
is these authenticated, secure DTLS or TLS tunnels that are used by all the protocol applications running on
the Cisco SD-WAN devices to transport their traffic. For example, an OMP session on a router communicates
with an OMP session on a vSmart controller by sending plain IP traffic through the secure DTLS or TLS
tunnel between the two devices. The Overlay Management Protocol is the Cisco SD-WAN control protocol
used to exchange routing, policy, and management information among Cisco SD-WAN devices, as described
in Overlay Routing Overview.
A Cisco SD-WAN daemon running on each vSmart controller and router creates and maintains the secure
DTLS or TLS connections between the devices. This daemon is called vdaemon and is discussed later in this
article. After the control plane DTLS or TLS connections are established between these devices, multiple
protocols can create sessions to run and route their traffic over these connections—including OMP, Simple
Network Management Protocol (SNMP), and Network Configuration Protocol (Netconf)—without needing
to be concerned with any security-related issues. The session-related traffic is simply directed over the secure
connection between the routers and vSmart controllers.
• Certificates signed by a root certification authority (CA)— The trust chain associated with the root CA
needs to be present on all Cisco SD-WAN router.
In addition to standard PKI components, the Cisco SD-WAN router serial numbers and the router chassis
numbers are used in the authentication processes.
Let's first look at the PKI components that are involved in router authentication. On the Cisco XE SD-WAN
router, the public and private keys and the certificates are managed automatically, by a hardware security chip
that is built into the router called the Trust Anchor module (TAm). The TAm is a proprietary, tamper-resistant
chip that features non-volatile secure storage for the Secure Unique Device Identifier (SUDI), as well as secure
generation and storage of key pairs with cryptographic services including random number generation (RNG).
When the routers are manufactured, this chip is programmed with a signed certificate. This certificate includes
the router's public key, its serial number, and the router's private key. When the routers boot up and join the
network, they exchange their certificates (including the router's public key and serial number) with other Cisco
SD-WAN routers as part of the router authentication process. Note that the router's private key always remains
embedded in the router's Trusted Board ID chip, and it is never distributed, nor can it ever be retrieved from
the router. In fact, any brute-force attempt to read the private key causes the hardware security chip to fail,
thereby disabling all access to the router.
For vSmart controllers, vBond orchestrators, and Cisco vManage systems, the public and private keys and
the certificates are managed manually. When you boot these routers for the first time, the Cisco SD-WAN
software generates a unique private key–public key pair for each software image. The public key needs to be
signed by the CA root. The network administrator then requests a signed certificate and manually installs it
and the certificate chains on the vSmart controllers, vBond orchestrators, and Cisco vManage systems. A
typical network might have only a small handful of vSmart controllers, vBond orchestrators, and Cisco
vManages, so the burden of manually managing the keys and certificates on these routers is small.
When you place an order with Cisco using your Smart and Virtual Account, Cisco updates the Cisco Plug
and Play (PNP) Portal with the chassis and certificate serial numbers of the devices that you purchased. You
can then use Cisco vManage to sync the device information from the PNP portal using your Smart Account
credentials. Alternatively. you can also download the trusted WAN Edge serial file from the PNP portal and
upload it manually to Cisco vManage. Cisco vManage then broadcasts this information to the other controllers.
Both the authorized serial number file and the file listing the vSmart serial numbers are uploaded and installed
on vBond orchestrators. Then, during the automatic authentication process, as pairs of devices (routers and
controllers) are establishing DTLS control connections, each device compares the serial numbers (and for
routers, the chassis numbers) to those in the files installed on the router. A router allows a connection to be
established only if the serial number or serial–chassis number combination (for a router) matches. Note that
routers only make control connections to the controllers and not to other routers.
You can display the installed vSmart authorized serial numbers using the show control valid-vsmarts
command on a vSmart controllerand the show orchestrator valid-vsmarts command on a vBond orchestrator.
You can also run show sdwan control valid-vsmarts on Cisco IOS XE SD-WAN devices. You can display
the installed router authorized serial and chassis number associations using the show control valid-vedges
command on a vSmart controller and the show orchestrator valid-devices command on a vBond orchestrator
Now, let's look at how the PKI authentication components and the router serial and chassis numbers are used
to authenticate router on the Cisco SD-WAN overlay network. When vSmart controllers, vBond orchestrators,
and routers first boot up, they establish secure DTLS or TLS connections between the vSmart controllers and
the routers. Over these connections, the devices authenticate each other, using the public and private keys,
the signed certificates, and the routers serial numbers and performing a series of handshake operations to
ensure that all the devices on the network are valid and not imposters. The following figure illustrates the key
and certificate exchange that occurs when the Cisco SD-WAN devices boot. For details about the authentication
that occurs during the bringup process, see Bringup Sequence of Events.
route, and hence one DTLS or TLS connection, for each vSmart controller. Similarly, a vSmart controller
would have one kernel route and one DTLS or TLS connection for each router in its domain.
• Authentication: As mentioned, the Cisco SD-WAN control plane contributes the underlying infrastructure
for data plane security. In addition, authentication is enforced by two other mechanisms:
• In the traditional key exchange model, the Cisco vSmart Controller sends IPsec encryption keys to
each edge device.
In the pairwise keys model, the Cisco vSmart Controller sends Diffie-Hellman public values to the
edge devices, and they generate pairwise IPsec encryption keys using Elliptic-curve Diffie-Hellman
(ECDH) and a P-384 curve. For more information, see Pairwise Keys, on page 254.
• By default, IPsec tunnel connections use a modified version of the Encapsulating Security Payload
(ESP) protocol for authentication on IPsec tunnels.
• Encryption: A modified version of ESP protects a data packet's payload. This version of the protocol
also checks the outer IP and UDP headers. Hence, this option supports an integrity check of the packet,
which is similar to the Authentication Header (AH) protocol. Data encryption is done using the
AES-GCM-256 cipher.
• Integrity: To guarantee that data traffic is transmitted across the network without being tampered with,
the data plane implements several mechanisms from the IPsec security protocol suite:
• A modified version of the ESP protocol encapsulates the payload of data packets.
• The modified version of ESP uses an AH-like mechanism to check the integrity of the outer IP and
UDP headers. You can configure the integrity methods supported on each router, and this information
is exchanged in the router's TLOC properties. If two peers advertise different authentication types,
they negotiate the type to use, choosing the strongest method.
• The antireplay scheme protects against attacks in which an attacker duplicates encrypted packets.
exchanges and (n-1) keys. As an example, in a 1,000-node network, 1,000,000 key exchanges are required to
authenticate the devices, and each node is responsible for maintaining and managing 999 keys.
The discussion in the previous paragraph points out why an IKE-style key exchange does not scale as network
size increases and why IKE could be a bottleneck in starting and in maintaining data exchange on a large
network:
• The handshaking required to set up the communications channels is both time consuming and resource
intensive.
• The processing required for the key exchange, especially in larger networks, can strain network resources
and can take a long time.
The Cisco SD-WAN implementation of data plane authentication and encryption establishes SAs between
each pair of devices that want to exchange data, but it dispenses with IKE altogether. Instead, to provide a
scalable solution to data plane key exchange, the Cisco SD-WAN solution takes advantage of the fact that
the DTLS control plane connections in the Cisco SD-WAN overlay network are known to be secure. Because
the Cisco SD-WAN control plane establishes authenticated, encrypted, and tamperproof connections, there
is no need in the data plane to set up secure communications channels to perform data plane authentication.
In the Cisco SD-WAN network for unicast traffic, data plane encryption is done by AES-256-GCM, a
symmetric-key algorithm that uses the same key to encrypt outgoing packets and to decrypt incoming packets.
Each router periodically generates an AES key for its data path (specifically, one key per TLOC) and transmits
this key to the vSmart controller in OMP route packets, which are similar to IP route updates. These packets
contain information that the vSmart controller uses to determine the network topology, including the router's
TLOC (a tuple of the system IP address and traffic color) and AES key. The vSmart controller then places
these OMP route packets into reachability advertisements that it sends to the other routers in the network. In
this way, the AES keys for all the routers are distributed across the network. Even though the key exchange
is symmetric, the routers use it in an asymmetric fashion. The result is a simple and scalable key exchange
process that uses the Cisco vSmart Controller.
In Cisco SD-WAN Release 19.2.x and Cisco IOS XE SD-WAN Release 16.12.x onwards, Cisco SD-WAN
supports IPSec pairwise keys that provide additional security. When IPSec pairwise keys are used, the edge
router generates public and private Diffie-Hellman components and sends the public value to the vSmart for
distribution to all other edge devices. For more information, see IPsec Pairwise Keys, on page 253
If control policies configured on a vSmart controller limit the communications channels between network
devices, the reachability advertisements sent by the vSmart controller contain information only for the routers
that they are allowed to exchange data with. So, a router learns the keys only for those routers that they are
allowed to communicate with.
To further strengthen data plane authentication and encryption, routers regenerate their AES keys aggressively
(by default, every 24 hours). Also, the key regeneration mechanism ensures that no data traffic is dropped
when keys change.
In the Cisco SD-WAN overlay network, the liveness of SAs between router peers is tracked by monitoring
BFD packets, which are periodically exchanged over the IPsec connection between the peers. IPsec relays
the connection status to the vSmart controllers. If data connectivity between two peers is lost, the exchange
of BFD packets stops, and from this, the vSmart controller learns that the connection has been lost.
The IPsec software has no explicit SA idle timeout, which specifies the time to wait before deleting SAs
associated with inactive peers. Instead, an SA remains active as long as the IPsec connection between two
routers is up, as determined by the periodic exchange of BFD packets between them. Also, the frequency with
which SA keys are regenerated obviates the need to implement an implicit SA idle timeout.
In summary, the Cisco SD-WAN data plane authentication offers the following improvements over IKE:
• Because only n +1 keypaths are required rather than the n2 required by IKE, the Cisco SD-WAN solution
scales better as the network grows large.
• Keys are generated and refreshed locally, and key exchange is performed over a secure control plane.
The first of these components, ESP, is the standard IPsec encryption protocol. ESP protects a data packet’s
payload and its inner IP header fields both by encryption, which occurs automatically, and authentication.
For authentication, ESP performs a hash calculation on the data packet's payload and inner header fields using
AES-GCM and places the resultant hash (also called a digest) into a field at the end of the packet. (A hash is
a one-way compression.) The receiving device performs the same checksum and compares its calculated hash
with that in the packet. If the two checksums match, the packet is accepted. Otherwise, it is dropped. In the
figure below, the left stack illustrates the ESP/UDP encapsulation. ESP encrypts and authenticates the inner
headers, payload, MPLS label (if present), and ESP trailer fields, placing the hash in the ICV checksum field
at the end of the packet. The outer header fields added by ESP/UDP are neither encrypted nor authenticated.
In the Cisco SD-WAN solution, there are also modifications to ESP to enhance its behavior to cover more of
the datagram. The modifications are similar to the way that AH works. This modification performs a checksum
that includes calculating the checksum over all the fields in the packet—the payload, the inner header, and
also all the non-mutable fields in the outer IP header. AH places the resultant hash into the last field of the
packet. The receiving device performs the same checksum, and accepts packets whose checksums match. In
the figure below, the center stack illustrates the encapsulation performed by the modified version of ESP.
ESP again encrypts the inner headers, payload, MPLS label (if present), and ESP trailer fields, and now mimics
AH by authenticating the entire packet—the outer IP and UDP headers, the ESP header, the MPLS label (if
present), the original packet, and the ESP trailer—and places its calculated hash into the ICV checksum field
at the end of the packet.
For situations in which data packet authentication is not required, you can disable data packet authentication
altogether. In this case, data packets are processed just by ESP, which encrypts the original packet, the MPLS
label (if present), and the ESP trailer. This scheme is illustrated in the right stack in the figure below.
Note that Cisco SD-WAN devices exchange not only the encryption key (which is symmetric), but also the
authentication key that is used to generate the digest. Both are distributed as part of the TLOC properties for
a router.
Even though the IPsec connections over which data traffic is exchanged are secure, they often travel across
a public network space, such as the Internet, where it is possible for a hacker to launch a replay attack (also
called a man-in-the-middle, or MITM, attack) against the IPsec connection. In this type of attack, an adversary
tampers with the data traffic by inserting a copy of a message that was previously sent by the source. If the
destination cannot distinguish the replayed message from a valid message, it may authenticate the adversary
as the source or may incorrectly grant to the adversary unauthorized access to resources or services.
As a counter to such attacks, the Cisco SD-WAN overlay network software implements the IPsec anti-replay
protocol. This protocol consists of two components, both of which protect the integrity of a data traffic stream.
The first component is to associate sequence numbers with each data packets. The sender inserts a sequence
number into each IPsec packet, and the destination checks the sequence number, accepting only packets with
unique, non-duplicate sequence numbers. The second component is a sliding window, which defines a range
of sequence numbers that are current. The sliding window has a fixed length. The destination accepts only
packets whose sequence numbers fall within the current range of values in the sliding window, and it drops
all others. A sliding window is used rather than accepting only packets whose sequence number is larger than
the last known sequence number, because packets often do not arrive in order.
When the destination receives a packet whose sequence number is larger than the highest number in the sliding
window, it slides the window to the right, thus changing the range of valid sequences numbers it will accept.
This scheme protects against an MITM type of attack because, by choosing the proper window size, you can
ensure that if a duplicate packet is inserted into the traffic stream, its sequence number will either be within
the current range but will be a duplicate, or it will be smaller than the lowest current value of the sliding
window. Either way, the destination will drop the duplicate packet. So, the sequence numbering combined
with a sliding window provide protection against MITM type of attacks and ensure the integrity of the data
stream flowing within the IPsec connection.
For enterprise-wide VPNs, Cisco SD-WAN devices support MPLS extensions to data packets that are
transported within IPsec connections. The figure to the right shows the location of the MPLS information in
the data packet header. These extensions provide the security for the network segmentation (that is, for the
VPNs) that is needed to support multi-tenancy in a branch or segmentation in a campus. The Cisco SD-WAN
implementation uses IPsec UDP-based overlay network layer protocol encapsulation as defined in RFC 4023.
The security is provided by including the Initialization Vector (IV) at the beginning of the payload data in the
ESP header.
Feature Description
Enterprise Firewall with Application Awareness, on A stateful firewall with NBAR2 application detection
page 41 engine to provide application visibility and granular
control, capable of detecting 1400+ applications.
Intrusion Prevention System, on page 125 This system is backed by Cisco Talos signatures and
are updated automatically. The Intrusion Prevention
System is deployed using a security virtual image.
Feature Description
URL Filtering, on page 133 Enforces acceptable use controls to block or allow
URLs based on 82 different categories and a web
reputation score. The URL Filtering system is
deployed using a security virtual image.
Advanced Malware Protection, on page 143 Global threat intelligence, advanced sandboxing, and
real-time malware blocking to prevent breaches. It
also continuously analyzes file activity across your
extended network, so you can quickly detect, contain,
and remove advanced malware. The Advanced
Malware Protection system is deployed using a
security virtual image.
Cisco Umbrella Integration, on page 177 Cloud-delivered enterprise network security which
provides users with a first line of defense against cyber
security threats.
Supported Platforms
For UTD features that use the Security Virtual Image (Intrusion Prevention System, URL filtering, and
Advanced Malware Protection), only the following platforms are supported:
• Cisco 4351 Integrated Services Router (ISR 4351)
• Cisco 4331 Integrated Services Router (ISR 4331)
• Cisco 4321 Integrated Services Router (ISR 4321)
• Cisco 4221X Integrated Services Router (ISR 4221X)
• Cisco 4431 Integrated Services Router (ISR 4431)
• Cisco 4451 Integrated Services Router (ISR 4451)
• Cisco 4461 Integrated Services Router (ISR 4461)
• Cisco Integrated Services Router 1111X-8P (C1111X-8P)
• Cisco Integrated Services Router 1121X-8PLTEP (C1121X-8PLTEP)
• Cisco Integrated Services Router 1121X-8PLTEPWY (C1121X-8PLTEPWY)
• Cisco Integrated Services Router 1126X-8PLTEP (C1126X-8PLTEP)
• Cisco Integrated Services Router 1127X-8PLTEP (C1127X-8PLTEP)
• Cisco Integrated Services Router 1127X-8PMLTEP (C1127X-8PMLTEP)
• Cisco Integrated Services Router 1161X-8P (C1161X-8P)
• Cisco Integrated Services Router 1161X-8PLTEP (C1161X-8PLTEP)
• Cisco Catalyst 8200 Series Edge Platforms
• Cisco Catalyst 8300 Series Edge Platforms
• Cisco Cloud Services Router 1000v series (CSR 1000v) on Amazon Web Services (AWS)
• Cisco Integrated Services Virtual Router
• Cisco Catalyst 8000V Edge Software
Restrictions
• ISR 1111X-8P does not support all of the IPS signatures because it does not support the pre-compiled
rules of Snort.
• For Intrusion Prevention, URL-Filtering, and Advanced Malware Prevention (features that leverage the
Security Virtual Image), the following restrictions apply:
• ISR platforms must meet the following minimum requirements:
• 8 GB flash memory
• 8 GB DRAM
• When you create a policy for these features, you must specify a target service VPN. When you
enable these features on a single VPN, the corresponding policy is applied to both traffic from and
to the VPN. Note that this is when you specify one VPN and not a comma-separated list of VPNs.
For example, if you applied the policy to a single VPN, say VPN 3, then the security policy is applied
in both the following cases:
• Traffic from VPN 3 to VPN 2.
• Traffic from VPN 6 to VPN 3.
• By default, when a policy is applied to VPN 0 (the global VPN) and enterprise tunnels are in VPN
0, all VPN traffic that uses the enterprise tunnels are not inspected. If you want the traffic of other
VPNs to be inspected, you must explicitly specify the VPNs in the policy.
For example, in both the following cases, a VPN 0 security policy does not inspect traffic:
• Traffic originating from a service-side VPN (for example VPN 3) that is transmitted through
the enterprise tunnel. This traffic is not inspected because VPN 3 is not explicitly specified in
the policy.
• Traffic from the enterprise tunnel that is sent to the service-side VPN (for example VPN 3).
This traffic is also not inspected because VPN 3 is not explicitly specified in the policy.
• You can enable these features on service and transport VPNs. This includes VPN 0.
• The VirtualPortGroup interface for data traffic for UTD uses the 192.0.2.0/30 IP address range. The
use of the 192.0.2.0/24 subnet is defined in RFC 3330. vManage also automatically uses 192.0.2.1
and 192.0.2.2 for the data virtual private gateway in VPN 0 for UTD. You can modify this using a
CLI template on vManage to configure the device. Due to this, you should not use these IP addresses
on devices. Alternatively, you can change the routing configuration on the device to use a different
IP address from the 192.0.2.0/24 subnet.
• Cisco Catalyst 8200 Series Edge Platforms and Cisco Catalyst 8300 Series Edge Platforms must meet
the following minimum requirements to support UTD:
• 8 GB DRAM
• 16 GB M.2 USB storage
With this change, all control plane tunnels between the vSmart controller and the routers and between the
controller and vManage use TLS. Control plane tunnels to vBond orchestrators always use DTLS, because
these connections must be handled by UDP.
In a domain with multiple vSmart controllers, when you configure TLS on one of the vSmart controllers, all
control plane tunnels from that controller to the other controllers use TLS. Said another way, TLS always
takes precedence over DTLS. However, from the perspective of the other vSmart controllers, if you have not
configured TLS on them, they use TLS on the control plane tunnel only to that one vSmart controller, and
they use DTLS tunnels to all the other vSmart controllers and to all their connected routers. To have all vSmart
controllers use TLS, configure it on all of them.
By default, the vSmart controller listens on port 23456 for TLS requests. To change this:
vSmart(config)# security control tls-port number
PEER PEER
PEER PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC
TYPE PROTOCOL SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT
REMOTE COLOR STATE UPTIME
--------------------------------------------------------------------------------------------------------------------------
vedge dtls 172.16.255.11 100 1 10.0.5.11 12346 10.0.5.11 12346
lte up 0:07:48:58
vedge dtls 172.16.255.21 100 1 10.0.5.21 12346 10.0.5.21 12346
lte up 0:07:48:51
vedge dtls 172.16.255.14 400 1 10.1.14.14 12360 10.1.14.14 12360
lte up 0:07:49:02
vedge dtls 172.16.255.15 500 1 10.1.15.15 12346 10.1.15.15 12346
default up 0:07:47:18
vedge dtls 172.16.255.16 600 1 10.1.16.16 12346 10.1.16.16 12346
default up 0:07:41:52
vsmart tls 172.16.255.19 100 1 10.0.5.19 12345 10.0.5.19 12345
default up 0:00:01:44
vbond dtls - 0 0 10.1.14.14 12346 10.1.14.14 12346
default up 0:07:49:08
PEER PEER
PEER PEER PEER SITE DOMAIN PEER PRIVATE PEER PUBLIC
TYPE PROTOCOL SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT
REMOTE COLOR STATE UPTIME
---------------------------------------------------------------------------------------------------------------------------
vedge tls 172.16.255.11 100 1 10.0.5.11 12345 10.0.5.11 12345
lte up 0:00:01:18
vedge tls 172.16.255.21 100 1 10.0.5.21 12345 10.0.5.21 12345
lte up 0:00:01:18
vedge tls 172.16.255.14 400 1 10.1.14.14 12345 10.1.14.14 12345
lte up 0:00:01:18
vedge tls 172.16.255.15 500 1 10.1.15.15 12345 10.1.15.15 12345
default up 0:00:01:18
vedge tls 172.16.255.16 600 1 10.1.16.16 12345 10.1.16.16 12345
default up 0:00:01:18
vsmart tls 172.16.255.20 200 1 10.0.12.20 23456 10.0.12.20 23456
default up 0:00:01:32
vbond dtls - 0 0 10.1.14.14 12346 10.1.14.14 12346
default up 0:00:01:33
To see the listening ports, use the show control local-properties command:
vManage# show control local-properties
certificate-validity Valid
certificate-not-valid-before May 20 00:00:00 2015 GMT
certificate-not-valid-after May 20 23:59:59 2016 GMT
dns-name vbond.cisco.com
site-id 5000
domain-id 0
protocol dtls
tls-port 23456
...
...
...
number-active-wan-interfaces 1
This output shows that the listening TCP port is 23456. If you are running Cisco vManage behind a NAT,
you should open the following ports on the NAT device:
• 23456 (base - instance 0 port)
• 23456 + 100 (base + 100)
• 23456 + 200 (base + 200)
• 23456 + 300 (base + 300)
Note that the number of instances is the same as the number of cores you have assigned for the Cisco vManage,
up to a maximum of 8.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down menu to the left of the parameter field and choose one of the following:
Table 2:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Viptela device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Viptela device to a device template. For
more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Note The Configure Control Plane Security section is applicable to Cisco vManage and Cisco vSmart only.
To configure the control plane connection protocol on a Cisco vManage instance or a Cisco vSmart controller,
choose the Basic Configuration area and configure the following parameters:
Table 3:
Protocol Choose the protocol to use on control plane connections to a vSmart controller:
• DTLS (Datagram Transport Layer Security). This is the default.
• TLS (Transport Layer Security)
Control TLS Port If you selected TLS, configure the port number to use:Range: 1025 through 65535Default:
23456
Click Save
Rekey Time Specify how often a device changes the AES key used on its secure DTLS connection
to the vSmart controller. If OMP graceful restart is enabled, the rekeying time must
be at least twice the value of the OMP graceful restart timer.Range: 10 through 1209600
seconds (14 days)
Default: 86400 seconds (24 hours)
Parameter Description
Name
Authentication Select the authentication types from the Authentication List, and click the right arrow to
Type move them to the Selected List:
• ah-no-id—Enable a modified version of AH-SHA1 HMAC and ESP HMAC-SHA1
that ignores the ID field in the packet's outer IP header.
• ah-sha1-hmac—Enable AH-SHA1 HMAC and ESP HMAC-SHA1.
• none—Select no authentication.
• sha1-hmac—Enable ESP HMAC-SHA1.
Note These authentication types above are only supported on releases before Cisco IOS
XE Release 17.6.1a.
Note From Cisco IOS XE Release 17.6.1a the authentication type options have been
replaced with the following integrity types:
• esp: Enables Encapsulating Security Payload (ESP) encryption and integrity
checking on ESP header.
• ip-udp-esp: Enables ESP encryption. In addition to the integrity checks on
the ESP header and payload, the checks also include the outer IP and UDP
headers
• ip-udp-esp-no-id: Ignores the ID field in the IP header so that the Cisco
SD-WAN can work in conjunction with non-Cisco devices.
• none: Turns integrity checking off on IPSec packets. We don't recommend
using this option.
Note When you upgrade a device, that already have a Cisco Security feature template
configured, to Cisco IOS XE Release 17.6.1a, you need to edit the template and
save it without making any changes. Cisco vManage automatically updates the
authentication types based on the new integrity type options.
Click Save.
By default, IPsec tunnel connections use a modified version of the Encapsulating Security Payload (ESP)
protocol for authentication. To modify the negotiated interity types, use the following command:
By default, IPsec tunnel connections use AES-GCM-256, which provides both encryption and authentication.
Configure each authentication type with a separate security ipsec authentication-type command. The
command options map to the following authentication types, which are listed in order from most strong to
least strong:
Note The sha1 in the configuration options is used for historical reasons. The authentication options indicate over
how much of the packet integrity checking is done. They do not specify the algorithm that checks the integrity.
The authentication algorithms supported by Cisco SD-WAN do not use SHA1.
• ah-sha1-hmac enables encryption and encapsulation using ESP. However, in addition to the integrity
checks on the ESP header and payload, the checks also include the outer IP and UDP headers. Hence,
this option supports an integrity check of the packet similar to the Authentication Header (AH) protocol.
All integrity and encryption is performed using AES-256-GCM.
• ah-no-id enables a mode that is similar to ah-sha1-hmac, however the ID field of the outer IP header
is ignored. This option accommodates some non-Cisco SD-WAN devices, including the Apple AirPort
Express NAT, that have a bug that causes the ID field in the IP header, a non-mutable field, to be modified.
Configure the ah-no-id option in the list of authentication types to have the Cisco SD-WAN AH software
ignore the ID field in the IP header so that the Cisco SD-WAN software can work in conjunction with
these devices.
• sha1-hmac enables ESP encryption and integrity checking.
For information about which data packet fields are affected by these authentication types, see Data Plane
Integrity, on page 14.
Cisco IOS XE SD-WAN devices and Cisco vEdge devices advertise their configured authentication types in
their TLOC properties. The two routers on either side of an IPsec tunnel connection negotiate the authentication
to use on the connection between them, using the strongest authentication type that is configured on both of
the routers. For example, if one router advertises the ah-sha1-hmac and ah-no-id types, and a second router
advertises the ah-no-id type, the two routers negotiate to use ah-no-id on the IPsec tunnel connection between
them. If no common authentication types are configured on the two peers, no IPsec tunnel is established
between them.
The encryption algorithm on IPsec tunnel connections is AES-256-GCM.
When the IPsec authentication type is changed, the AES key for the data path is changed.
If you want to generate new IPsec keys immediately, you can do so without modifying the configuration of
the router. To do this, issue the request platform software sdwan security ipsec-rekey command on the
compromised router.
For example, the following output shows that the local SA has a Security Parameter Index (SPI) of 256:
SOURCE SOURCE
TLOC ADDRESS TLOC COLOR SPI IP PORT KEY HASH
------------------------------------------------------------------------------
172.16.255.15 lte 256 10.1.15.15 12346 *****b93a
A unique key is associated with each SPI. If this key is compromised, use the request platform software
sdwan security ipsec-rekey command to generate a new key immediately. This command increments the
SPI. In our example, the SPI changes to 257 and the key associated with it is now used:
After the new key is generated, the router sends it immediately to the vSmart(s) using DTLS or TLS. The
vSmart(s) send the key to the peer routers. The routers begin using it as soon as they receive it. Note that the
key associated with the old SPI (256) will continue to be used for a short period of time, until it times out.
To stop using the old key immediately, issue the request platform software sdwan security ipsec-rekey
command twice, in quick succession. This sequence of commands removes both SPI 256 and 257 and sets
the SPI to 258. The router then uses the associated key of SPI 258. Note, however, that some packets will be
dropped for a short period of time, until all the remote routers learn the new key.
Packets with sequence numbers that fall to the left of the sliding window range are considered old or duplicates,
and the destination drops them. The destination tracks the highest sequence number it has received, and adjusts
the sliding window when it receives a packet with a higher value.
By default, the sliding window is set to 512 packets. It can be set to any value between 64 and 4096 that is a
power of 2 (that is, 64, 128, 256, 512, 1024, 2048, or 4096). To modify the anti-replay window size, use the
replay-window command, specifying the size of the window:
To help with QoS, separate replay windows are maintained for each of the first eight traffic channels. The
configured replay window size is divided by eight for each channel.
If QoS is configured on a router, that router might experience a larger than expected number of packet drops
as a result of the IPsec anti-replay mechanism, and many of the packets that are dropped are legitimate ones.
This occurs because QoS reorders packets, giving higher-priority packets preferential treatment and delaying
lower-priority packets. To minimize or prevent this situation, you can do the following:
• Increase the size of the anti-replay window.
• Engineer traffic onto the first eight traffic channels to ensure that traffic within a channel is not reordered.
Step 1 From the Cisco vManage menu, choose Configuration > Templates.
Step 2 Click Feature Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is titled Feature.
Enter a value for the parameter, and apply that value to all devices.
Examples of parameters that you might apply globally to a group of devices
Global
are DNS server, syslog server, and interface MTUs.
Once you have created and named the template, enter the following values. Parameters marked with an asterisk
are required.
IKE Replay Window 64, 128, 256, 512, 1024, Specify the replay window size for the IPsec tunnel.
2048, 4096, 8192
Default: 512
IPsec Cipher Suite aes256-cbc-sha1 Specify the authentication and encryption to use on
the IPsec tunnel
aes256-gcm
Default: aes256-gcm
null-sha1
Perfect Forward Secrecy 2 1024-bit modulus Specify the PFS settings to use on the IPsec tunnel.
14 2048-bit modulus Choose one of the following Diffie-Hellman prime
modulus groups:
15 3072-bit modulus
1024-bit – group-2
16 4096-bit modulus
2048-bit – group-14
none
3072-bit – group-15
4096-bit – group-16
none –disable PFS.
Default: group-16
CLI Equivalent
crypto
ipsec
profile ipsec_profile_name
set ikev2-profile ikev2_profile_name
set security-association
lifetime {seconds 120-2592000 | kilobytes disable}
replay {disable | window-size {64 | 128 | 256 | 512 | 1024 | 4096 | 8192}
set pfs group {2 | 14 | 15 | 16 | none}
set transform-set transform_set_name
Release Information
Introduced in Cisco vManage for Cisco IOS XE SD-WAN Release 16.11.x.
DPD Interval Specify the interval for IKE to send Hello packets on
the connection.
Range: 10 through 3600 seconds
Default: Disabled
CLI Equivalent
crypto
ikev2
profile ikev2_profile_name
dpd 10-3600 2-60 {on-demand | periodic}
Configure IKE
Table 7: Feature History
SHA256 Support for IPSec Tunnels Cisco IOS XE Release 17.2.1r This feature adds support for
HMAC_SHA256 algorithms for
enhanced security.
Note When you create an IPsec tunnel on a Cisco IOS XE SD-WAN device, IKE Version 1 is enabled by default
on the tunnel interface.
IKE Mode Aggressive mode For IKEv1 only, specify one of the following modes:
Main mode • Aggressive mode - Negotiation is quicker, and
the initiator and responder ID pass in the clear.
• Establishes an IKE SA session before starting
IPsec negotiations.
IPsec Rekey Interval 3600 - 1209600 seconds Specify the interval for refreshing IKE keys.
Range: 1 hour through 14 days
Default: 14400 seconds (4 hours)
IKE Cipher Suite 3DES Specify the type of authentication and encryption to
use during IKE key exchange.
192-AES
Default: 256-AES
256-AES
AES
DES
IKE ID for Remote End If the remote IKE peer requires a remote end point
Point identifier, specify it.
Range: 1 through 64 characters
Default: Tunnel's destination IP address
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Click Basic Configuration.
5. Use the shutdown parameter with the yes option (yes shutdown) to shut down the tunnel.
6. Remove the ISAKMP profile from the IPsec profile.
7. Attach the IKEv2 profile with the IPsec profile.
Note Perform this step if you already have an IKEv2 profile. Otherwise, create an IKEv2 profile first.
8. Use the shutdown parameter with the no option (no shutdown) to start up the tunnel.
Note You must issue the shutdown operations in two separate operations.
Note There is no single CLI for changing the IKE version. You need to follow the sequence of steps listed in the
Change the IKE Version from IKEv1 to IKEv2 section.
Summary Steps
1. enable
2. configure terminal
3. crypto isakmp policy priority
4. encryption {des | 3des | aes | aes 192 | aes 256 }
5. hash {sha | sha256 | sha384 | md5 }
6. authentication {rsa-sig | rsa-encr | pre-share }
7. group {1 | 2 | 5 | 14 | 15 | 16 | 19 | 20 | 24 }
8. lifetime seconds
9. exit
10. exit
Disable Weak SSH Encryption Cisco vManage Release This feature allows you to disable weaker SSH
Algorithms 20.9.1 algorithms that may not comply with certain
data security standards.
Before disabling these encryption algorithms, ensure that any Cisco vEdge devices in the network are using
a software release later than Cisco SD-WAN Release 18.4.6.
b. vmanage(config-ssh-server)# commit
b. vmanage(config-ssh-server)# commit
Note This command is only applicable to Cisco vManage. Other network elements, such as Cisco IOS XE SD-WAN
devices, Cisco vEdge devices, Cisco vBond Orchestrator, and Cisco vSmart Controller do not use weak SSH
algorithms.
Verify that Weak SSH Encryption Algorithms Are Disabled Using the CLI
1. From the Cisco vManage menu, choose Tools > SSH Terminal.
2. Select the Cisco vManage device you wish to verify.
3. Enter the username and password to log in to the device.
5. Confirm that the output shows one or more of the commands that disable weaker encryption algorithms:
• no cipher aes-128-192
• no kex-algo sha1
• Zone pair—A container that associates a source zone with a destination zone and that applies a firewall
policy to the traffic that flows between the two zones.
Matching flows that are accepted can be processed in two different ways:
• Inspect—The packet's header can be inspected to determine its source address and port. When a session
is inspected, you do not need to create a service-policy that matches the return traffic.
• Pass—Allow the packet to pass to the destination zone without inspecting the packet's header at all.
When a flow is passed, no sessions are created. For such a flow, you must create a service-policy that
will match and pass the return traffic.
The following figure shows a simple scenario in which three VPNs are configured on a router. One of the
VPNs, VPN 3, has shared resources that you want to restrict access to. These resources could be printers or
confidential customer data. For the remaining two VPNs in this scenario, only users in one of them, VPN 1,
are allowed to access the resources in VPN 3, while users in VPN 2 are denied access to these resources. In
this scenario, we want data traffic to flow from VPN 1 to VPN 3, but we do not want traffic to flow in the
other direction, from VPN 3 to VPN 1.
Note From Cisco IOS XE SD-WAN Release 16.12.2r and onwards, vManage does not show ZBFW statistics for
classes that are without any value. If the statistics are "zero" for any of the configured sequences, these are
not shown on the device dashboard for zone-based firewall.
Application Firewall
The Application Firewall blocks traffic based on applications or application-family. This application-aware
firewall feature provides the following benefits:
• Application visibility and granular control
• Classification of 1400+ layer 7 applications
• Blocks traffic by application or application-family
You can create lists of individual applications or application families. A sequence that contains a specified
application or application family list can be inspected. This inspect action is a Layer 4 action. Matching
applications are blocked/denied.
Note The Application Firewall is valid only for Cisco IOS XE SD-WAN devices.
The router provides Application Layer Gateway (ALG) FTP support with Network Address Translation –
Direct Internet Access (NAT-DIA), Service NAT, and Enterprise Firewall. Service NAT support is added for
FTP ALG on the client and not on the FTP Server.
Restrictions
• You can configure up to 500 firewall rules in each security policy in Cisco vManage.
• For packets coming from Overlay to Service side, the source VPN of the packet is defaulted to the
destination VPN (service side VPN) for performing a Source Zone lookup when the actual source VPN
cannot be determined locally on the branch. For example, a packet coming from VPN2 from the far end
of a branch in a DC is routed through the Cisco SD-WAN overlay network to VPN1 of a branch router.
In this case, if the reverse route lookup for the source IP does not exist on the branch VPN1, the source
VPN for that packet is defaulted to the destination VPN (VPN1). Therefore, VPN1 to VPN1 Zone-pair
firewall policy is applied for that packet. This behaviour is expected with policy-based routing
configuration, and below are the examples of such a configuration.
Configuration Command
Note Destination ports or destination port lists cannot be used with protocols or protocol
lists.
• Define the order – Enter Edit mode and specify the priority of the conditions
• Apply zone-pairs – Define the source and destination zones for the firewall policy.
4. Click Proceed.
5. Click Create Add Firewall Policy.
6. Click Create New.
The Add Firewall Policy wizard is displayed.
Create Rules
Table 9: Feature History
Firewall FQDN Cisco IOS XE This enhancement adds support to define a firewall policy using
Support Release 17.2.1r fully qualified domain names (FQDN), rather than only IP
addresses. One advantage of using FQDNs is that they account
for changes in the IP addresses assigned to the FQDN if this
changes in the future.
Notes
• The FQDN is intended to be used for matching standalone servers in data centers or a private cloud.
When matching public URLs, the recommended match action is 'drop'. If you use 'inspect' for public
URLs, you must define all related sub-urls/redirect-urls under the FQDN pattern.
Limitations
• Maximum number of fully qualified domain name (FQDN) patterns supported for a rule under firewall
policy: 64
• Maximum number of entries for FQDN to IP address mapping supported in the database: 5000
• If a firewall policy uses an FQDN in a rule, the policy must explicitly allow DNS packets, or resolution
will fail.
• Firewall policy does not support mapping multiple FQDN's to a single IP address.
• Only two forms of FQDN are supported: full name or a name beginning with an asterisk (*) wildcard.
Example: *.cisco.com
• Cisco vManage Release 20.3.2 and earlier releases: click Add Rule.
• Inspect
• Pass
• Drop
8. If you want matches for this rule to be logged, check the Log check box.
9. Configure one or more of the following.
Note For the following parameters, you can also enter defined lists or define a list from within the window.
Section Description
Source Data Prefix(es) IPv4 prefix(es) or prefix list(s) and/or domain names (FQDN) or list(s)
Destination Data IPv4 prefix(es) or prefix list(s) and/or domain names (FQDN) or list(s)
Prefix(es)
Support for Rule Sets Cisco IOS XE Release 17.4.1a This feature allows you to create
sets of rules called rule sets. Rule
Cisco vManage Release 20.4.1
sets are a method to create multiple
rules that have the same intent. You
can also re-use rule sets between
security policies.
7. If you want matches for this rule to be logged, check the Log check box.
8. Click + next to Rule Sets.
9. Choose from existing rule sets or create a new list by clicking + New List.
• To choose from an existing rule: click the existing rule(s) and click Save.
• To create a new rule:
a. Configure a rule using one or more of the following.
Section Description
Source Data Prefix(es) IPv4 prefix(es) or prefix list(s) and/or domain names (FQDN) or list(s)
Destination Data IPv4 prefix(es) or prefix list(s) and/or domain names (FQDN) or list(s)
Prefix(es)
You can also create rule sets from outside the Security Policy Wizard as follows:
1. From the Cisco vManage menu, choose Configuration > Security.
2. Click Custom Options.
3. Click Lists.
4. Click Rule Sets.
5. Click New Rule Set.
6. You can now choose from the various parameters such as source data prefix, port, protocol, and so on.
Once you create your rule, click Save Rule to save the rule and add it to your rule set.
7. Create any additional rules that you want to add to your rule set.
8. After creating all the rules that you want for your rule set, click Save Rule Set.
Self Zone Policy Cisco IOS XE This feature allows you to define firewall policies for incoming and
for Zone-Based SD-WAN outgoing traffic between a self zone of an edge router and another zone.
Firewalls Release 16.12.1b When a self zone is configured with another zone, the traffic in this
zone pair is filtered as per the applied firewall policy.
Note For IPSEC overlay tunnels in Cisco SD-WAN, if a self zone is chosen as a zone pair, firewall sessions are
created for SD-WAN overlay BFD packets if inspect action is configured for UDP.
However, for GRE overlay tunnels, if you chose a self zone as a zone pair with the inspect action of protocol
47, firewall sessions are created only for TCP, UDP, ICMP packets; but not BFD packets.
Warning Control connections may be impacted when you configure drop action from self-zone to VPN0 and vice versa.
This applies for DTLS/TLS, BFD packets, and IPsec overlay tunnel.
1. Create security policy using Cisco vManage. For information see, Start the Security Policy Configuration
Wizard.
2. Click Apply Zone-Pairs.
3. In the Source Zone field, choose the zone that is the source of the data packets.
4. In the Destination Zone field, choose the zone that is the destination of the data packets.
Note You can choose self zone for either a source zone or a destination zone, not both.
Note When you upgrade to Cisco SD-WAN Release 20.3.3 and later releases from any previous release, traffic to
and from a service VPN IPSEC interface is considered to be in the service VPN ZBFW zone and not a VPN0
zone. This could result in the traffic getting blackholed, if you allow traffic flow only between service VPN
and VPN0 and not the intra service VPN.
You have to make changes to your ZBFW rules to accommodate this new behavior, so that the traffic flow
in your system is not impacted. To do this, you have to modify your intra area zone pair to allow the required
traffic. For instance, if you have a policy which has the same source and destination zones, you have to ensure
the zone-policy allows the required traffic.
Configure Interface Based Zones Cisco IOS XE Release 17.7.1a This feature enables you to
and Default Zone configure an interface-based
Cisco vManage Release 20.7.1
firewall policy to control traffic
between two interfaces or an
interface-VPN-based firewall
policy to control traffic between an
interface and a VPN group.
This feature also provides support
for default zone where a firewall
policy can be configured on a zone
pair that consist of a zone and a
default zone.
VPN-based policy. In addition, an interface-based zone can also be paired with a VPN-based zone and vice
versa.
Zones establish the security borders of your network. A zone defines a boundary where traffic is subjected to
policy restrictions as it crosses to another region of your network. ZBFW’s default policy between zones is
deny all. If no policy is explicitly configured, all traffic between zones is blocked.
Default Zone
A default zone enables a firewall policy to be configured on a zone pair that consist of a zone and a default
zone. You can configure a policy from a zone to a default zone, or vice versa. In Cisco SD-WAN, any VPN
or interface without an explicit zone assignment belongs to a default zone.
• If a policy is configured for a zone pair of source zone and a destination zone which are based on the
above rules, a zone-pair policy can be applied.
• If no policy is configured for the zone pair of source zoneand destination zone, packets are dropped.
• A default zone cannot be configured as both source and destination zone in a zone-pair.
• If one of the zone pair is default zone and the other is self zone, packets are passed without inspection
by default unless default zone is explicitly provisioned.
• If only one of the zone pair is a default zoneand the other is not self zone, packets are dropped by default
unless default zone is explicitly provisioned.
• Configure a ZBFW policy when you have the source zone as interface type and the destination zone as
a VPN type.
• Configure a ZBFW policy where different interfaces in the same VPN can be assigned to different zones.
• Enable the default zone policy for an interface and VPN.
Note Default zone appears in the drop-down list while selecting a zone as part of zone-pair. You can choose default
zone for either a source zone or a destination zone, but not both.
You configure Interface Based Zones and Default Zone using a CLI device template in Cisco vManage. For
information about using a device template, see Device Configuration-Based CLI Templates for Cisco IOS
XE SD-WAN Devices.
To configure Interface Based Zones and Default Zone using the CLI add-on feature template. For information
on using the CLI Add-On template, see Create a CLI Add-On Feature Template.
Configure Interface Based Zones and Default Zone Using the CLI
This section provides example CLI configurations for Interface Based Zones and Default Zones.
class class-default
vpn zone security
zone security intf3
zone security default
zone-pair security int13_def source intf3 destination default
service-policy type inspect pm_192
zone-member security intf3
interface GigabitEthernet3.103
encapsulation dot1Q 103
vrf forwarding 3
ip address 172.16.13.2 255.255.255.0
ip mtu 1496
zone-member security intf3
!
policy-map type inspect optimized TEST-opt
class type inspect TEST-seq-1-cm_
inspect
class type inspect TEST-seq-11-cm_
inspect
class class-default
drop
!
Monitor Interface Based Zones and Default Zone Using the CLI
Example 1
The following is sample output from the show policy-firewall config command to validate a configured zone
based firewall.
Zone-pair : ZP_SRC_INTF1_DIA_INTF_TEST
Source Zone : SRC_INTF1
Member Interfaces:
GigabitEthernet3.101
Destination Zone : DIA_INTF
Member Interfaces:
GigabitEthernet1
GigabitEthernet2
GigabitEthernet4
Service-policy inspect : TEST-opt
Class-map : TEST-seq-1-cm_ (match-all)
Match access-group name TEST-seq-Rule_1-acl_
Action : inspect
Parameter-map : Default
Class-map : TEST-seq-11-cm_ (match-all)
Match access-group name TEST-seq-Rule_2-acl_
Action : inspect
Parameter-map : Default
Class-map : class-default (match-any)
Match any
Action : drop log
Parameter-map : Default
Note For more information on HSL, see Firewall High-Speed Logging Overview, on page 62.
a. In the VPN field, enter the VPN that the server is in.
b. In the Server IP field, enter the IP address of the server.
c. In the Port field, enter the port on which the server is listening.
4. If you configured an application firewall policy, uncheck the “Bypass firewall policy and allow all Internet
traffic to/from VPN 0” check box in the Additional Security Policy Settings area.
5. (Optional) To configure an audit trail, enable the Audit Trail option. This option is only applicable for
rules with an Inspect action.
6. Click Save Policy to save the security policy.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, choose From Feature Template.
4. From the Device Model drop-down list, choose one of the devices.
5. Click Additional Templates.
The Additional Templates section is displayed.
6. From the Security Policy drop-down list, choose the name of the policy you configured previously.
7. Click Create to apply the security policy to a device.
8. Click … next to the device template that you created.
9. Click Attach Devices.
10. Choose the devices to which you want to attach the device template.
11. Click Attach.
Note If you are migrating from older releases to Cisco IOS XE Release 17.2 or later with Application lists and the
zone-based firewall that is configured in Cisco vManage, you must first remove the security template from
the base template and push the base template. Thereafter, reattach the security template and then push the
template to the device.
Note When a Zone based firewall template in attached to a Cisco IOS XE SD-WAN device running on Cisco IOS
XE Release 17.6.1a or later, there may be an increase in time for completion of tasks. This is due to the updates
in the software version of Cisco vManage Release 20.6.1.
172.16.0.1 209.165.202.129
192.168.0.1
255.255.0.0
Note By default, subnet 192.168.1.1/30 and 192.0.2.1/30 used for VPG0 and VPG1
(UTD) and 192.168.2.1/24 used for VPG2 (APPQOE) is configured through
Cisco vManage. Use any RFC 1918 subnet for Transport and Service VPN
configurations other than these netmask.
CLI Configuration
Note By default, subnet 192.168.1.1/30 and 192.0.2.1/30 used for VPG0 and VPG1 (UTD) and 192.168.2.1/24
used for VPG2 (APPQOE) is configured through Cisco vManage. Use any RFC 1918 subnet for Transport
and Service VPN configurations other than these netmask.
11. Create the policy map that you want to add to the zone pair.
Device(config)# policy-map type inspect fw_policy1
class cmap_1
drop
12. Create the zone pair and link the policy map to it:
Device(config)# zone-pair security employee-inet source employee destination internet
service-policy type drop fw_policy1
vManage Configuration
To configure this zone-based firewall policy in vManage NMS:
1. From the Cisco vManage menu, choose Configuration > Security.
2. Click Add Policy. The zone-based firewall configuration wizard opens.
Configure data prefix groups and zones in the Create Groups of Interest screen:
1. Click Data Prefix in the left pane.
2. In the right pane, click New Data Prefix List.
3. Enter a name for the list.
4. Enter the data prefix or prefixes to include in the list.
5. Click Add.
Click Next to move to the Apply Configuration in the zone-based firewall configuration wizard.
1. Enter a name and description for the zone-based firewall zone pair.
2. Click Add Zone Pair.
3. In the Source Zone drop-down menu, choose the zone from which data traffic originates.
4. In the Destination Zone drop-down menu, choose the zone to which data traffic is sent.
5. Click Add.
6. Click Save Policy. The Configuration > Security screen is then displayed, and the zone-based firewalls
table includes the newly created policy.
Configure Port-Scanning Detection Cisco IOS XE Release 17.4.1a This feature lets you configure
Using a CLI Template port-scanning detection and apply
Cisco vManage Release 20.4.1
a severity level (low, medium, or
high) for identifying and classifying
potential attacks using a CLI
template.
Port scanning is a way of determining the open ports on a network, which receive and send data.
To configure port-scanning detection and include severity levels, use the following commands:
• port-scan
• sense level
Note The port-scan command can detect, but not block possible port-scan attacks.
For more information on using these commands, see the port-scan and sense level commands in the Cisco
SD-WAN Command Reference Guide.
To detect port-scanning activity in your network, configure port-scanning detection on your device by copying
and pasting in the configuration as a Cisco vManage CLI template. For more information on using CLI
templates, see Create a CLI Add-On Feature Template in the Systems and Interfaces Configuration Guide,
Cisco IOS XE Release 17.x.
To generate port-scanning alerts, use Network Mapper (Nmap) commands. Nmap is an open-source tool for
network scanning and discovery. For more information on Nmap command usage and installation, see
https://nmap.org/book/man.html. Run the Nmap commands as an administrator:
1. After port-scanning detection is configured using a Cisco vManage CLI template, run the Linux Nmap
commands from the device where port-scanning detection is configured.
2. After the Nmap commands are run, you can see the port-scanning alerts generated on the router by running
the following Cisco IOS XE command:
Router# show utd engine standard logging events
3. To verify that the port-scanning configuration is applied on the router, use the following Cisco IOS XE
show command:
Router# show utd engine standard config threat-inspection
Router# show utd engine standard config threat-inspection
UTD Engine Standard Configuration:
Policy: Security
Logging level: Infomational
Port Scan:
Sense level: Medium
Firewall Cisco IOS XE This feature allows a firewall to log records with minimum impact to
High-Speed SD-WAN packet processing.
Logging Release 16.12.1b
This module describes how to configure HSL for zone-based policy firewalls.
The NetFlow collector issues the show platform software interface F0 brief command to map the
FW_SRC_INTF_ID and FW_DST_INTF_ID interface IDs to the interface name.
The following sample output from the show platform software interface F0 brief command shows that the
ID column maps the interface ID to the interface name (Name column):
Name ID QFP ID
GigabitEthernet0/2/0 16 9
GigabitEthernet0/2/1 17 10
GigabitEthernet0/2/2 18 11
GigabitEthernet0/2/3 19 12
Restrictions
• HSL is supported only on NetFlow Version 9 template.
• HSL is supported only on IPv4 destination and source IP addresses. IPv6 addresses are not supported.
• HSL supports only one HSL destination.
AAA Fields
Alert Fields
Miscellaneous
FW_CLASS_ID 51 4 Class ID
1
Internet Control Message Protocol
2
Simple Network Management Protocol
3
virtual routing and forwarding
4
Coordinated Universal Time
5
Authentication, Authorization, and Accounting
HSL Messages
The following are sample syslog messages from Cisco SD-WAN IOS XE Router:
SUMMARY STEPS
1. enable
2. configure terminal
3. parameter-map type inspect-global
4. log dropped-packets
5. log flow-export v9 udp destination ip-address port-numbervrf vrf-label
6. log flow-export template timeout-rate seconds
7. end
DETAILED STEPS
Step 3 parameter-map type inspect-global Configures a global parameter map and enters
parameter-map type inspect configuration mode.
Example:
Device(config)# parameter-map type inspect-global
Step 5 log flow-export v9 udp destination ip-address Enables NetFlow event logging and provides the IP address
port-numbervrf vrf-label and the port number of the log collector. UDP destination
and port correspond to the IP address and port on which the
Example:
netflow server is listening for incoming packets.
cEdge(config-profile)# log flow-export v9 udp
destination 10.20.25.18 2055 vrf 1
Step 6 log flow-export template timeout-rate seconds Template timeout-rate is the interval (in seconds) at which
the netflow template formats are advertised.
Example:
Device(config-profile)# log flow-export template
timeout-rate 5000
SUMMARY STEPS
1. enable
2. configure terminal
3. parameter-map type inspect parameter-map-name
4. audit-trail on
5. one-minute {low number-of-connections | high number-of-connections}
6. tcp max-incomplete host threshold
7. exit
8. policy-map type inspect policy-map-name
9. class type inspect class-map-name
10. inspect parameter-map-name
11. end
DETAILED STEPS
Step 3 parameter-map type inspect parameter-map-name Configures an inspect parameter map for connecting
thresholds, timeouts, and other parameters pertaining to
Example:
the inspect keyword, and enters parameter-map type
Device(config)# parameter-map type inspect inspect configuration mode.
parameter-map-hsl
Step 6 tcp max-incomplete host threshold Specifies the threshold and blocking time values for TCP
host-specific, denial of service (DoS) detection and
Example:
prevention.
Device(config-profile)# tcp max-incomplete host
100
Step 8 policy-map type inspect policy-map-name Creates an inspect-type policy map and enters policy map
configuration mode.
Example:
Device(config)# policy-map type inspect
policy-map-hsl
Step 9 class type inspect class-map-name Specifies the traffic class on which an action is to be
performed and enters policy-map class configuration mode.
Example:
Device(config-pmap)# class type inspect
class-map-tcp
Unified Security Policy Cisco IOS XE Release 17.6.1a This feature allows you to
configure a single unified security
Cisco vManage Release 20.6.1
policy for firewall and UTD
security features such as IPS, Cisco
URL Filtering, AMP, and
TLS/SSL.
Having a single unified security
policy simplifies policy
configuration and enforcement
becuase firewall and UTD policies
can be configured together in a
single security operation rather than
as individual policies.
Resource Limitations and Cisco IOS XE Release 17.7.1a This feature enables you to define
Device-global Configuration resource limitation options such as
Cisco vManage Release 20.7.1
Options idle timeout and session limits, and
device-global options in the policy
summary page to fine-tune a
firewall policy behaviour after a
firewall policy is implemented in
Cisco SD-WAN.
• For Cisco vManage Release 20.3.2 and earlier releases, click Add Rule.
8. From the Order drop-down list, choose the order for the rule .
9. Enter a name for the rule.
10. From the Action drop-down list, choose an action for the rule.
• Inspect
• Pass
• Drop
11. If you want matches for this rule to be logged, check the Log check box.
Note Cisco vManage supports log flow only at the rule level and not at the global level.
12. Choose an advanced inspection profile to attach to the policy. This field is available only if you have
chosen the action rule as Inspect. If you have created an advance inspection profile, this field lists all
the advance inspection profiles that you have created. Choose an advance inspection profile from the
list. For information on creating an advance inspection profile, see Create an Advanced Inspection
Profile, on page 80.
13. Click Source, and choose one of the following options:
• Object Group: Use an object group for your rule.
To create a new object group, click New Object Group List. Set the filters for matching, and then
click Save. For information on creating an object group, see Create an Object Group, on page 79.
• Filters Types: You can choose from IPv4 prefixes, prefix lists, fully qualified domain names
(FQDN), lists or Geo Location.
• Filters Types: You can choose from IPv4 prefixes, prefix lists, fully qualified domain names
(FQDN), lists or Geo Location.
Note From Cisco IOS XE Release 17.6.1a, and Cisco vManage Release 20.6.1, the applications are attached directly
to the rule the way other filters are. If configured as part of access control lists (ACLs), they are attached to
a class-map along with the source and destination.
Note You can choose self zone for either a source zone or a destination zone, but not both.
7. If you are creating a new policy using the Create New option, the DNS Security - Policy Rule
Configuration wizard is displayed.
8. Enter a policy name in the Policy Name field.
9. The Umbrella Registration Status displays the status of the API Token configuration.
10. Click Manage Umbrella Registration to add a token, if you have not added one already.
11. Click Match All VPN to keep the same configuration for all the available VPNs and continue with Step
13.
Or click Custom VPN Configuration if you need to add target service VPNs to your policy. A Target
VPNs window appears, and continue with Step 12.
12. To add target service VPNs, click Target VPNs at the top of the window.
13. Click Save Changes to add the VPN.
14. From the Local Domain Bypass List drop-down list, choose the domain bypass.
15. Configure DNS Server IP from the following options:
• Umbrella Default
• Custom DNS
16. Click Advanced to enable or disable the DNSCrypt. By default, the DNSCrypt is enabled.
17. Click Save DNS Security Policy.
The Configuration > Security window is displayed, and the DNS policy list table includes the newly
created DNS Security Policy.
1. The Policy Summary page, enter a name for the unified security policy. This field is mandatory and
can contain only uppercase and lowercase letters, the digits 0 through 9, hyphens (–), and underscores
(_). It cannot contain spaces or any other characters.
2. Enter a description for the unified security policy. This field is mandatory.
3. Enter TCP SYN Flood Limit to configure the threshold of SYN flood packets per second for each
destination address. Beyond this threshold, the TCP SYN Cookie is triggered. This number must be
less than Max Incomplete TCP Limit.
4. Enter Max Incomplete timeout limits for the firewall policy. A Max Incomplete timeout limit protects
firewall resources and keep these resources from being used up.
• In the TCP Limit field, specify the Max TCP half-open sessions allowed on a device.
• In the UDP Limit field, specify the Max UDP half-open sessions allowed on the device.
• In the ICMP Limit field, specify the Max ICMP half-open sessions allowed on the device.
5. (Optional) For Cisco IOS XE SD-WAN Release 16.12.2r and onwards, to configure high-speed logging
(HSL), enter the following details of the Netflow server that will listen for the Netflow event logs.
For more information on HSL, see Firewall High-Speed Logging Overview.
a. In the VPN field, enter the VPN that the server is in.
b. In the Server IP field, enter the IP address of the server.
c. In the Port field, enter the port on which the server is listening.
6. (Optional) To configure an audit trail, enable the Audit Trail option. This option is only applicable for
rules with an Inspect action.
7. Click Unified Logging to enable the unified logging feature.
Note Note: To enable logging for a class or policy, check the Log check box for the rule in a policy.
Note There is another kind of reclassification which is traffic driven. When FPM (First Packet Match) fails for an
application, the traffic can hit a generalized L3/L4 rule if exists. After the application is fully recognized, the
traffic is reclassified and hit the desired rule that deals with the specific application.
9. Click ICMP unreachable allow to allow ICMP unreachable packets to pass through.
10. Choose an advanced inspection profile.
You have the option to attach an advance inspection profile at a device level. This implies, all the rules
in the device that match the traffic to be inspected will be subjected to the advanced inspection profile.
Note An advanced inspection profile that is attached at a rule level is preferred over an advanced inspection profile
attached at a device level. If the rule does not have advanced inspection profile attached, and if the action is
Inspect, then the advanced inspection profile that is attached at the device level will be effective in the policy.
11. (Optional) Choose a TLS/SSL Decryption policy. This field is visible if you have configured a TLS
action in the advanced inspection profile.
12. Click Save Policy to save the unified security policy.
13. Apply the security policy to a device. For more information, see Apply a Security Policy to a Device.
Use the following command to display resource limitations and device-global configuration options on a
Cisco IOS XE SD-WAN device:
Device# show run | sec parameter-map
parameter-map type inspect-global
icmp-unreachable-allow
session-reclassify-allow
tcp syn-flood limit 5
alert on
max-incomplete tcp 10
max-incomplete udp 11
max-incomplete icmp 12
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, choose From Feature Template.
4. From the Device Model drop-down list, choose one of the devices.
5. Click Additional Templates.
The Additional Templates section is displayed.
6. From the Security Policy drop-down list, choose the name of the policy you configured previously.
7. Click Create to apply the security policy to a device.
8. Click … next to the device template that you created.
9. Click Attach Devices.
10. Choose the devices to which you want to attach the device template.
11. Click Attach.
Note If you are migrating from older releases to Cisco IOS XE Release 17.2 or later with Application lists and the
zone-based firewall that is configured in Cisco vManage, you must first remove the security template from
the base template and push the base template. Thereafter, reattach the security template and then push the
template to the device.
Note When a Zone based firewall template in attached to a Cisco IOS XE SD-WAN device running on Cisco IOS
XE Release 17.6.1a or later, there may be an increase in time for completion of tasks. This is due to the updates
in the software version of Cisco vManage Release 20.6.1.
Device# config-transaction
Device(config)# parameter-map type inspect name
Device(config)# utd-policy utd advance inspection profile-name
Device# config-transaction
Device(config)# policy-map type inspect policy-map
Device(config-pmap)# class type inspect class-map
Device(config-pmap-c)# inspect parameter-map
Device# config-transaction
Device# config-transaction
Device(config)# zone-pair security pair source src-zone destination dst-zone
Device(config-sec-zone-pair)# service-policy type inspect policy-map
Device# config-transaction
Device(config)# utd engine standard unified-policy
Device(config-utd-unified-policy)# policy policy-name
Device(config-utd-mt-policy)# threat-inspection profile ips_profile
Device(config-utd-mt-policy)# web-filter url profile urlf_profile
Device(config-utd-mt-policy)# file-inspection profile file_insp_profile
Device(config-utd-mt-policy)# tls-decryption profile tls_dec_profile
Note Existing IPS, URL, AMP and SSL/TLS security policies cannot be migrated to a unified security policy as
is. You must create new unified policies separately and attach them to an advanced inspection profile. The
advanced inspection profile can then be attached to the relevant rules in the unified NG firewall policy.
Alternatively, you can add an existing advanced inspection profile at the device level in Policy Summary
page and further optimize it.
Cisco vManage Release 20.6.x and earlier: From the Cisco vManage menu, choose Monitor > Network.
2. Click the host name of the device you want to monitor.
3. In the left pane, under Security Monitoring, choose a security feature.
Depending on what you choose, the details are displayed.
Example 2
The following is a sample output from the show utd engine standard config command . This example displays
the Unified Threat Defense (UTD) configuration.
Policy: uni-utd
VirtualPortGroup Id: 1
Policy: Balanced
Example 3
The following is a sample output from the show platform hardware qfp active feature utd config command.
This example shows the UTD datapath configuration and status.
Device# show platform hardware qfp active feature utd config
Global configuration
NAT64: disabled
Drop pkts: disabled
Multi-tenancy: disabled
Data plane initialized: yes
TLS Decryption Policy: disabled
Divert controller mode: enabled
SN threads: 12
CFT inst_id 0 feat id 4 fo id 4 chunk id 17
Max flows: 55000
Example 5
The following is a sample output from the show platform hardware qfp active feature firewall drop
command that displays the Max Incomplete UDP after the limit is crossed.
Device# show platform hardware qfp active feature firewall drop
-------------------------------------------------------------------------------
Drop Reason Packets
-------------------------------------------------------------------------------
ICMP ERR Pkt:exceed burst lmt 42
ICMP Unreach pkt exceeds lmt 305
UDP - Half-open session limit exceed 2
Flow-logging Information:
-------------------------
State : disabled
Unified Logging for Security Cisco IOS XE Release 17.7.1a This feature supports Unified
Connection Events Logging which is used to capture
Cisco vManage Release 20.7.1
information about connection
events across different security
features at different stages during
policy enablement and execution.
With Unified Logging, you can
have visibility to the log data for
Zone-based Firewall and for
Unified Threat Defense features
such as IPS, URL-F and AMP to
understand what traffic, threats,
sites or malware were blocked, and
the rules that blocked the traffic or
sessions with the associated port,
protocol or applications.
Additionally, this feature also
provides support for On-Demand
Troubleshooting. On-Demand
troubleshooting allows a user to
view the connection events of
different flows of traffic from a
device within a configured period
of time.
Note As of Cisco IOS XE Release 17.7.1a, UTD TLS-Decryption events are not reported.
Flow data about ZBFW and UTD features is captured using Netflow. Netflow records the flow data to a JSON
file which is used by Cisco vManage. The flow data can also be exported to an external collector Netflow.
Exporters are assigned to flow monitors to export data from the flow monitor cache to a remote system such
as a Netflow collector. Flow monitors can support more than one exporter. Each exporter can be customized
to meet the requirements of the flow monitor or monitors in which it is used and the Netflow collector systems
to which it is exporting data.
Cisco vManage displays the following data for the security connection events:
ZBFW
• Information about enforcement of ZBFW.
• Zone information (zone pair, source zone, and destination zone).
• Policy enforced on the connection flow.
• Action taken based on the policy on the connection flow (inspect, pass or drop).
• Status of Network Address Translation (NAT) or Port Address Translation (PAT) is enabled or not.
UTD
• Details of which UTD security features acted on a flow.
• Result of a security feature acting on a flow.
• Details of policy enforcement.
Comparison Between Unified Logging for Security Connection Events, ZBFW High Speed Logging and ZBFW
Syslog
ZBFW supports high-speed logging (HSL). HSL allows ZBFW to log records with minimum impact to packet
processing.
With HSL configured, ZBFW logs the following types of events:
• Audit—Session creation and removal notifications.
• Alert—Half-open and maximum-open TCP session notifications.
• Drop—Packet-drop notifications.
• Pass—Packet-pass (based on the configured rate limit) notifications.
For information about Firewall High-speed logging, see Firewall High-Speed Logging
In the case of Unified Logging, the log data consists of the following types:
IPS • Policy ID
• Action
• Priority
• Generator ID
• Signature ID
• Classification ID
URL-F • Policy ID
• Action
• Reason
• Category
• Reputation
• URL Hash
• App Name
Note These are the flow keys that are used for
the Unified Logging:
• IPv4 SrcAddr
• IPv4 DstAddr
• IPv4 Protocol
• Transport SrcPort
• Transport DstPort
• Routing VRF Service
Note Starting from Cisco IOS XE Release 17.9.1a, use the policy ip visibility features ulogging enable command
to manually enable or disable the unified logging fields in flexible netflow (FNF). Use the show sdwan policy
cflowd-upgrade-status command to check which features were enabled before the version upgrade. You
have to manually control the features after a version upgrade using the disable or enable commands.
For more information, see policy ip visibility command page.
Note Unified Logging for security connection events and ZBFW HSL can be enabled together. If you choose to
enable both these features, there will a considerable impact on the performance.
On-Demand Troubleshooting
The On-Demand Troubleshooting feature allows a user to view detailed information about the flow of traffic
from a device. A user can use this information for troubleshooting. For information, see On-Demand
Troubleshooting.
Note You can also use the CLI Add-on template for configure Unified Logging for security connection events. For
more information, see Create a CLI Add-On Feature Template.
Configure Unified Logging for Security Connection Events Using the CLI
This section provides example CLI configurations to configure Unified Logging for ZBFW and UTD.
ZBFW
Use this configuration to enable Unified Logging for ZBFW at a global level.
UTD
Use this configuration to enable Unified Logging for all UTD features.
Device(config)# utd engine standard unified-policy
Device(config-utd-unified-policy)# utd global
Device(config-utd-mt-global)# flow-logging all
Note flow-logging all enables Unified Logging for all UTD features. You can choose to use any of the following
options if you do not want to enable Unified Logging for all UTD features.
Configure Netflow
Use this configuration to enable Netflow to export log data of ZBFW and UTD features to an external collector.
Device(config)# flow exporter exporter-name
Device(config-flow-exporter)# description description
Device(config-flow-exporter)# destination IP address
Device(config-flow-exporter)# export-protocol netflow-v9
Device(config-flow-exporter)# transport udp udp-port
Use this configuration to enable Unified Logging for ZBFW at a rule level.
Device(config-profile)# log ?
flow Enable flow/connection events for all security policies
flow-export Configure inspect external logging parameters
Note Use ? to view the options for Unified Logging for ZBFW at a rule level.
UTD
Use this configuration to enable Unified Logging for all UTD features.
Device(config)# utd engine standard unified-policy
Device(config-utd-unified-policy)# utd global
Device(config-utd-mt-global)# flow-logging all
Note flow-logging all enables Unified Logging for all UTD features. You can choose to use any of the following
options if you do not want to enable Unified Logging for all UTD features.
Note If you are using the Connection Events option for the first time, you need to enable On-Demand
Troubleshooting. For information, see On-Demand Troubleshooting
Cisco SD-WAN Identity-Based Cisco IOS XE Release 17.9.1a This feature allows you to
Firewall Policy configure user-identity-based
Cisco vManage Release 20.9.1
firewall policies for unified security
policies.
Cisco Identity Services Engine and
Microsoft Active Directory
Services are identity providers that
authenticate and authorize device
users in the network. When Cisco
vManage and a Cisco vSmart
controller establish a connection to
the Cisco Identity Services Engine,
information about user and user
groups—that is, identity-mapping
information—is retrieved from the
Cisco Identity Services Engine.
Identity-based policies are then
distributed to Cisco IOS XE
SD-WAN devices. This identity
mapping information is used while
creating firewall policies.
Cisco ISE
Cisco ISE is an identity provider that is deployed on-premises to manage user identities and to provide services
such as authentication, authorization, and accounting.
group information. For Cisco ISE to retrieve the identity information, Microsoft Active Directory Services
must be integrated with Cisco ISE. A Microsoft Active Directory Services domain needs to be set up, and the
domain information must be configured on Cisco ISE. For information on configuring Microsoft Active
Directory Services on Cisco ISE, AD Integration for Cisco ISE GUI and CLI Login.
Cisco vManage
A connection is required from Cisco vManage to Cisco ISE, through Cisco pxGrid, to retrieve all the user
and user group information. You can use the user and user group information to create security policies in
Cisco vManage. Cisco vManage also configures the Cisco vSmart controllers so that they can communicate
with ISE directly and then pull the user and user group information. When a user logs in or logs out, Cisco
ISE tracks the login state and provides this information to the Cisco vSmart controller through Cisco pxGrid.
Cisco vManage and Cisco vSmart controller interface with the Cisco ISE pxGrid node to retrieve identity
mapping information. See Configure Cisco ISE in Cisco vManage, on page 105, Configure PxGrid in Cisco
ISE for Connectivity to Cisco vSmart, on page 105.
Management Plane
• Cisco vManage obtains the user and user-group information from Cisco ISE and pxGrid.
• An administrator authors the security policies using username and user-group.
• Cisco vManage pushes these policies to the Cisco IOS XE SD-WAN devices.
Controller Distribution
• A Cisco vSmart controller obtains the IP-to-username and user-to-user-group mappings from Cisco ISE
and pxGrid when a user logs in. A session is created.
• The Cisco vSmart controller pushes the IP-to-username and user-to-user-group mappings to the Cisco
IOS XE SD-WAN devices.
• Cisco IOS XE SD-WAN device receives flows, and enforces the configured username and
user-group-based policies.
• When a user-based identity policy is created, users must use the SAM-Account format to log in to Active
Directory.
Note If you have not completed the integration of Cisco ISE controller in Cisco vManage, a message instructs you
to complete the integration of Cisco ISE with Cisco vManage. When you have completed this integration, the
Add an Identity list link displays.
11. If you want matches for this rule to be logged, check the Log check box.
Note Cisco vManage supports log flow only at the rule level and not at the global level.
12. Choose an advanced inspection profile to attach to the policy. This field is available only if you have
chosen the action rule as Inspect. If you have created an advanced inspection profile, this field lists all
the advanced inspection profiles that you have created. Choose an advanced inspection profile from the
list. For information on creating an advanced inspection profile, see Create an Advanced Inspection
Profile, on page 80.
13. Click Source, and choose Identity as the filter type
14. Click Destination, and choose one of the following options:
• Object Group: Use an object group for your rule.
To create a new object group, click New Object Group List. Set the filters for matching, and then
click Save. For information on creating an object group, see Create an Object Group, on page 79.
• Filters Types: You can choose from IPv4 prefixes, prefix lists, fully qualified domain names
(FQDN), lists or Geo Location.
Note From Cisco IOS XE Release 17.6.1a, and Cisco vManage Release 20.6.1, the applications are attached directly
to the rule the way other filters are. If configured as part of access control lists (ACLs), they are attached to
a class-map along with the source and destination.
This section provides example CLI configurations to configure a Cisco vSmart controller to connect to Cisco
ISE.
Configure Cisco vSmart Controller connection to Cisco ISE
identity
pxgrid
server-address <name>
username <name>
password <name>
subscriptions {user-identity | sgt}
domain-name <domain-name>
vpn 0
Here is the complete configuration example for connecting a Cisco vSmart controller to Cisco ISE.
identity
pxgrid
server-address 10.27.216.141
user-name vIPtela_Inc_Regression_vsmart1644552134629
password $8$TVGuJQn$8$TVG
subscriptions user-identity
domain-name SDWAN-IDENTITY.CISCO.COM
vpn 0
!
!
For unified security policies, you can view the log data for security connection events. Security connection
events contain log data of important information when a flow passes through various security features such
as Zone-based Firewall (ZBFW) and Unified Threat Defense (UTD). The log data includes information about
security policies, and rules about traffic or sessions, along with the associated port, protocol or applications.
See Monitor Unified Logging Security Connection Events.
Example 2
The following is a sample output from the show idmgr user-sessions command executed on a Cisco vSmart
controller. This example displays the user sessions learned from ISE.
Device# show idmgr user-sessions
--------------------------------------------------------------------------------------------
TestUser0@SDWAN-IDENTITY.CISCO.COM 72.1.1.7 2022-02-18T13:00:54.372-05:00 Authenticated
Example 3
The following is a sample output from the show idmgr omp ip-user-bindings command executed on a Cisco
vSmart controller. This example displays the ip-user session bindings sent to OMP.
Device# show idmgr omp ip-user-bindings
Example 4
The following is a sample output from the show idmgr omp user-usergroup-bindings command executed
on a Cisco vSmart controller. This example displays the user-usergroup bindings sent to OMP.
Device# show idmgr omp user-usergroup-bindings
Example 5
The following is a sample output from the show uidp statistics command executed on a Cisco vSmart
controller. This example displays UIDP statistics.
Device# show uidp statistics
---------------------------------------
Add/Delete Stats
---------------------------------------
Total Users added : 22
Total Usergroups added : 12
Total SGT added : 0
Total Users deleted : 0
Total Usergroups deleted : 0
Total SGT deleted : 0
---------------------------------------
Add/Delete Error Stats
---------------------------------------
User add error : 0
Usergroup add error : 0
SGT add error : 0
User delete error : 0
Usergroups delete error : 0
SGT delete error : 0
---------------------------------------
Memory allocation error Stats
---------------------------------------
ipvrf key list create error : 0
Index list create error : 0
Memory allocation error : 0
Invalid binding event : 0
-----------------------------------------------
DB Add/Delete Bindings stats
-----------------------------------------------
Total IP User binding added : 341
Total IP User binding delete : 0
Total IP User binding add error : 0
Total IP User binding delete error : 0
Total User Usergroups binding added : 20
Total User Usergroups binding deleted : 0
Total User Usergroups binding add error : 0
Total User Usergroups binding delete error : 0
Example 6
The following is a sample output from the show uidp user-group all command executed on a Cisco vSmart
controller. This example displays UIDP user group info.
Device# show uidp user-group all
Total Usergroups : 12
-------------------------
SDWAN-IDENTITY.CISCO.COM/Builtin/Users
User Identity Groups:Employee
User Identity Groups:TestUserGroup-1
null
Unknown
sdwan-identity.cisco.com/S-1-5-32-545
S-1-5-21-787885371-2815506856-1818290038-513
SDWAN-IDENTITY.CISCO.COM/Users/Domain Users
cisco
eng
dev
mgmt
cEdge-identity#
cEdge-identity#sh uidp user-group us
cEdge-identity#sh uidp user ?
all Show all users info
ip Show user info by ip
name Show user info by user name
Example 7
The following is a sample output from the show uidp user ip command executed on a Cisco vSmart controller.
This example displays the user information by IP address.
Device# show uidp user ip 10.1.1.7
5 Unknown
6 sdwan-identity.cisco.com/S-1-5-32-545
7 S-1-5-21-787885371-2815506856-1818290038-513
8 SDWAN-IDENTITY.CISCO.COM/Users/Domain Users
Problem
The user traffic is dropped when it must actually be allowed, based on the policy.
Possible Causes
This issue arises when there may be errors while configuring the user sessions. Use the show commands to
verify the user session configuration both on the Cisco vSmart controller and on the Cisco IOS XE SD-WAN
device. See Monitor Cisco SD-WAN Identity-Based Firewall Using the CLI to view the show commands
used to monitor identity-based firewall policy.
Section
Ensure the user session information is available on the device for policy enforcement.
Configuration to configure a Cisco SD-WAN identity-based firewall on a Cisco IOS XE SD-WAN device.
class-map type inspect match-any TestID
match identity source user-group "SDWAN-IDENTITY.CISCO.COM/Users/Domain Users"
class-map type inspect match-all visFW-seq-1-cm_
match access-group name visFW-seq-Rule_1-acl_
class-map type inspect match-all visFW-seq-11-cm_
match class-map TestID
match access-group name visFW-seq-Rule_2-acl_
Geolocation-Based Cisco IOS XE Release This feature enables you to configure firewall rules
Firewall Rules for 17.5.1a for allowing or denying network traffic based on the
Allowing or Denying source and destination location instead of IP addresses.
Cisco vManage Release
Network Traffic Based on
20.5.1 This feature adds a new object group, geo, where you
Geolocation
can specify countries and continents as objects in an
Access Control List (ACL). An object group ACL
simplifies policy creation in large networks, especially
if the ACL changes frequently.
New object-group and geo commands were added.
For more information on the CLI commands, see Cisco IOS XE SD-WAN Qualified Command Reference.
This feature adds a new object group geo, where you can specify countries and continents as objects to use
in Access Control Lists (ACLs). The new geo object group is then used in the ACL to enable geolocation-based
firewall rules.
The geo object group is a collection of the following types of objects:
• Three-letter country code objects
• Two-letter continent code objects
An object group can contain a single object or multiple objects. You can nest other geolocation object groups
using the group-object command.
Note You cannot configure nested geo object groups in Cisco vManage. You can configure nested geo object groups
using only the CLI.
Data packets are classified using geolocation-based firewall rules instead of using IP addresses. When
classifying the data packet, if a firewall rule has a geolocation-based filter, an IP address lookup occurs against
the geolocation database to determine which country or continent is associated with the IP address.
Use-Case Scenario
A client (192.168.11.10) in a local area network (LAN) initiates traffic over Dedicated Internet Access (DIA)
to a destination IP addresses belonging to France (FRA) and Germany (GBR). As per the security firewall
policy, traffic to France should be inspected and that to Germany should be dropped.
Note After you have chosen a continent in a security firewall rule, all IP addresses
belonging to that particular continent code are inspected as part of the security
firewall rule.
• You can add multiple geolocation lists or geolocations using a single policy.
• When you update a geo object group, all the policies that use that geo object group are automatically
updated.
Note An empty geo object group is a geo object group that does not contain any
references to countries. To empty a geo object group, you need to remove any
references to countries within the geo object group.
• As long as a geo object group is in use inside the corresponding ACL or nested in another group, it can
neither be deleted nor emptied.
• A geo object group can be associated only with extended IPv4 ACLs and not with IPv4 standard ACLs.
Note You cannot configure both a fully qualified domain name (FQDN) and a geo as a source data prefix and as a
destination data prefix.
Configure a Geolocation List Using Configuration > Security > Custom Options
1. From the Cisco vManage menu, choose Configuration > Security.
2. From the Custom Options drop-down menu, choose Lists.
3. Click Geo Location in the left pane.
4. Click New Geo Location List.
5. Enter a name for the geolocation list.
Note If you choose a continent, you cannot choose any of the countries that are part of the continent. If you want
to choose a list of countries, choose the appropriate countries from the list.
7. Click Add.
11. From the Geo Location drop-down menu, choose one or more locations.
12. Click Save.
13. Click Destination Data Prefix to add a destination geolocation list or new geolocations.
14. Repeat Step 9 through Step 12.
15. Click Save Firewall Policy to save the security firewall rule.
16. Click Save Policy Changes.
Here, geo_ipv4_db is the name of the geodatabase file downloaded from the Cisco.com path and copied
to the bootflash device or the hard disk.
5. Create a geo object group:
Device(config)# object-group geo GEO_1
Disable received : 0
Enable failed : 0
Modify failed : 0
Disable failed : 0
IPv4 table write failed : 0
Persona write failed : 0
Country table write failed : 0
For more information on the CLI commands, see Cisco IOS XE SD-WAN Qualified Command Reference.
or
Device# copy tftp: bootflash:
The following example shows how a geo object group is defined under an extended ACL that is used in a
security firewall class map:
ip access-list extended Zone1_to_Zone1-seq-Rule_1-acl_
15 permit object-group Zone1_to_Zone1-seq-Rule_1-service-og_ object-group
Zone1_to_Zone1-seq-Rule_1-network-src-og_ geo-group Zone1_to_Zone1-seq-Rule_1-geo-dstn-og_
!
ip access-list extended Zone1_to_Zone1-seq-Rule_2-acl_
!
object-group geo Zone1_to_Zone1-seq-Rule_2-geo-dstn-og_
country GBR
!
object-group network Zone1_to_Zone1-seq-Rule_1-network-src-og_
host 192.168.11.10
!
object-group service Zone1_to_Zone1-seq-Rule_1-service-og_
ip
!
ip access-list extended Zone1_to_Zone1-seq-Rule_1-acl_
15 permit object-group Zone1_to_Zone1-seq-Rule_1-service-og_ object-group
Zone1_to_Zone1-seq-Rule_1-network-src-og_ geo-group Zone1_to_Zone1-seq-Rule_1-geo-dstn-og_
!
ip access-list extended Zone1_to_Zone1-seq-Rule_2-acl_
!
object-group geo Zone1_to_Zone1-seq-Rule_2-geo-dstn-og_
country GBR
The following example shows when a geolocation is chosen as part of a security firewall rule either in a source
or a destination data prefix from Cisco vManage, the geodatabase is added by default. If a geolocation is
removed, the geodatabase is removed from the rule.
class-map type inspect match-all Zone1_to_Zone1-seq-1-cm_
match access-group name Zone1_to_Zone1-seq-Rule_1-acl_
!
class-map type inspect match-all Zone1_to_Zone1-seq-11-cm_
match access-group name Zone1_to_Zone1-seq-Rule_2-acl_
!
policy-map type inspect Zone1_to_Zone1
! first
class Zone1_to_Zone1-seq-1-cm_
inspect
!
class Zone1_to_Zone1-seq-11-cm_
drop
!
class class-default
drop
!
parameter-map type inspect-global
alert on
log dropped-packets
multi-tenancy
vpn zone security
!
zone security Zone0
vpn 0
!
zone security Zone1
vpn 1
!
zone-pair security ZP_Zone1_Zone0_Zone1_to_Zone1 source Zone1 destination Zone0
service-policy type inspect Zone1_to_Zone1
!
geo database
The following is a sample output of the show policy-firewall config zone-pair command used for validating
geolocation configuration:
Device# show policy-firewall config zone-pair ZP_Zone1_Zone0_Zone1_to_Zone1
Zone-pair : ZP_Zone1_Zone0_Zone1_to_Zone1
Source Zone : Zone1
Destination Zone : Zone0
Service-policy inspect : Zone1_to_Zone1
Class-map : Zone1_to_Zone1-seq-1-cm_ (match-all)
Match access-group name Zone1_to_Zone1-seq-Rule_1-acl_
Extended IP access list Zone1_to_Zone1-seq-Rule_1-acl_
15 permit object-group Zone1_to_Zone1-seq-Rule_1-service-og_ object-group
Zone1_to_Zone1-seq-Rule_1-network-src-og_geo-group Zone1_to_Zone1-seq-Rule_1-geo-dstn-og_
Action : inspect
Parameter-map : Default
Class-map : Zone1_to_Zone1-seq-11-cm_ (match-all)
Match access-group name Zone1_to_Zone1-seq-Rule_2-acl_
Extended IP access list Zone1_to_Zone1-seq-Rule_2-acl_
15 permit object-group Zone1_to_Zone1-seq-Rule_2-service-og_ object-group
Zone1_to_Zone1-seq-Rule_2-network-src-og_geo-group Zone1_to_Zone1-seq-Rule_2-geo-dstn-og_
Action : drop log
Parameter-map : Default
Class-map : class-default (match-any)
Match any
Action : drop log
Parameter-map : Default
The following is a sample output of the show policy-map type inspect zone-pair sessions command used
for verifying inspected and dropped traffic:
show policy-map type inspect zone-pair sessions
Zone-pair: ZP_Zone1_Zone0_Zone1_to_Zone1
Service-policy inspect : Zone1_to_Zone1
Match: any
Drop
0 packets, 0 bytes
Based on your requirements, you can enable Snort either in IPS or IDS mode. In IDS mode, the engine inspects
the traffic and reports alerts, but does not take any action to prevent attacks. In IPS mode, in addition to
intrusion detection, actions are taken to prevent attacks.
IPS the traffic and reports events to vManage or an external log server (if configured). External third-party
monitoring tools, which supports Snort logs, can be used for log collection and analysis.
7. Click Target VPNs to add the required number of target service VPNs in the Add Target VPNs wizard.
8. Enter a policy name in the Policy Name field.
9. Choose a signature set that defines rules for evaluating traffic from the Signature Set drop-down menu.
The following options are available. Connectivity provides the least restrictions and the highest
performance. Security provides the most restrictions but can affect system performance.
• Balanced: Designed to provide protection without a significant effect on system performance.
This signature set blocks vulnerabilities with a CVSS score that is greater than or equal to 9. It also
blocks CVEs published in the last two years and that have the following rule categories: Malware
CNC, Exploit Kits, SQL Injection or blocked list.
• Connectivity: Designed to be less restrictive and provide better performance by imposing fewer
rules.
This signature set blocks vulnerabilities with a CVSS score of 10 and CVEs published in the last
two years.
• Security: Designed to provide more protection than Balanced but with an impact on performance.
This signature set blocks vulnerabilities with a CVSS score that is greater than or equal to 8. It also
blocks CVEs published in the last three years and that have the following rule categories: Malware
CNC, Exploit Kits, SQL Injection, blocked list, and App Detect Rules.
10. Choose mode of operation from the Inspection Mode drop-down menu. The following options are
available:
• Detection: Choose this option for intrusion detection mode
• Protection: Choose this option for intrusion protection mode
11. (Optional) From Advanced, choose one or more existing IPS signature lists or create new ones as needed
from the Signature Whitelist drop-down menu.
Choosing an IPS signature list allows the designated IPS signatures to pass through.
To create a new signature list, do the following:
a. Click New Signature List at the bottom of the drop-down. In IPS Signature List Name, enter a
list name consisting of up to 32 characters (letters, numbers, hyphens and underscores only).
b. In IPS Signature, enter signatures in the format Generator ID:Signature ID, separated with
commas. You also can use Import to add a list from an accessible storage location.
c. Click Save.
You also can create or manage IPS Signature lists by choosing Configuration > Security, and then
choosing Lists from Custom Options, and then choosing Signatures.
To remove an IPS Signature list from the Signature Whitelist field, click the X next to the list name
in the field.
12. (Optional) Choose an alert level for syslogs from the Alert Log Level drop-down menu. The options
are:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Info
• Debug
You must configure the address of the external log server in the Policy Summary page.
13. Click Save Intrusion Prevention Policy to add an Intrusion Prevention policy.
14. Click Next until the Policy Summary page is displayed
15. Enter Security Policy Name and Security Policy Description in the respective fields.
16. If you set an alert level when configuring the Intrusion Prevention policy, in the Additional Policy
Settings section, you must specify the following:
• External Syslog Server VPN: The syslog server should be reachable from this VPN.
• Server IP: IP address of the server.
• Failure Mode: Open or Close
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, choose From Feature Template.
4. From the Device Model drop-down list, choose one of the devices.
5. Click Additional Templates.
The Additional Templates section is displayed.
6. From the Security Policy drop-down list, choose the name of the policy you configured previously.
Note If you are migrating from older releases to Cisco IOS XE Release 17.2 or later with Application lists and the
zone-based firewall that is configured in Cisco vManage, you must first remove the security template from
the base template and push the base template. Thereafter, reattach the security template and then push the
template to the device.
Note When a Zone based firewall template in attached to a Cisco IOS XE SD-WAN device running on Cisco IOS
XE Release 17.6.1a or later, there may be an increase in time for completion of tasks. This is due to the updates
in the software version of Cisco vManage Release 20.6.1.
Note To download the signatures, vManage requires access to the following domains using port 443:
• api.cisco.com
• cloudsso.cisco.com
• dl.cisco.com
• dl1.cisco.com
• dl2.cisco.com
• dl3.cisco.com
1. From the Cisco vManage menu, choose Administration > Settings to configure IPS Signature Update.
2. Click on Edit to Enable/Disable and provide your Cisco.com Username and Password details to save
the Policy details.
Note Target VPNs are not applicable for the intrusion prevention system used in a unified security policy. The
Policy Mode can only be set at time of creation and cannot be modified after the policy has been saved.
10. (Optional) From Advanced, choose one or more existing IPS signature lists or create new ones, as
needed, from the Signature Whitelist drop-down list.
Choosing an IPS signature list allows the designated IPS signatures to pass through.
To create a new signature list, do the following:
a. Click New Signature List at the bottom of the drop-down list.
b. In the IPS Signature List Name field, enter a list name of up to 32 characters (letters, numbers,
hyphens, and underscores only).
c. In the IPS Signature, enter signatures in the format Generator ID:Signature ID, separated by
commas. You also can click Import to add a list from an accessible storage location.
d. Click Save.
You also can create or manage IPS Signature lists by choosing Configuration > Security in the left
pane, choosing Lists from Custom Options at the top-right corner of the window, and then choosing
Signatures in the left pane.
To remove an IPS Signature list from the Signature Whitelist field, click X next to the corresponding
list name.
11. (Optional) Click Alert Log Level, and choose one of the following options:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Info
• Debug
You configure the address of the external log server in the Policy Summary page.
12. Click Save Intrusion Prevention Policy.
Note A NAT direct internet access route is necessary to implement URL Filtering.
URL Filtering can either allow or deny access to a specific URL based on:
• Allowed list and blocked list: These are static rules, which helps the user to either allow or deny URLs.
If the same pattern is configured under both the allowed and blocked lists, the traffic is allowed.
• Category: URLs can be classified into multiple categories such as News, Social Media, Education, Adult
and so on. Based on the requirements, user has the option to block or allow one or more categories.
• Reputation: Each URL has a reputation score associated with it. The reputation score range is from 0-100,
and it is categorized as: high-risk (reputation score (0-20), suspicious (21-40), moderate-risk (41-60),
low-risk (61-80), and trustworthy (81-100). Based on the reputation score of a URL and the configuration,
a URL is either blocked or allowed.
When there is no allowed list or blocked list configured on the device, based on the category and reputation
of the URL, traffic is allowed or blocked using a block page. For HTTP(s), a block page is not displayed and
the traffic is dropped.
This section contains the following topics:
• Overview of URL Filtering, on page 134
• Configure and Apply URL Filtering, on page 136
• Modify URL Flitering, on page 139
• Delete URL Filtering, on page 139
• Monitor URL Filtering, on page 140
• Configure URL Filtering for Unified Security Policy, on page 140
Database Overview
By default, WAN Edge routers do not download the URL database from the cloud.
To enable the URL database download:
• prior to Cisco vManage Release 20.5, you must set the Resource Profile to High in the App-hosting
Security Feature Template.
• from Cisco vManage Release 20.5 onwards, you must enable Download URL Database on Device in
the App-hosting Security Feature Template.
Note The URL Filtering database is periodically updated from the cloud in every 15 minutes.
Filtering Options
The URL Filtering allows you to filter traffic using the following options:
Category-Based Filtering
URLs can be classified into multiple categories such as News, Social Media, Education, Adult and so on.
Based on the requirements, user has the option to block or allow one or more categories.
A URL may be associated with up to five different categories. If any of these categories match a configured
blocked category, then the request will be blocked.
Reputation-Based Filtering
In addition to category-based filtering, you can also filter based on the reputation of the URL. Each URL has
a reputation score associated with it. The reputation score range is from 0-100 and it is categorized as:
• High risk: Reputation score of 0 to 20
• Suspicious: Reputation score of 21 to 40
• Moderate risk: Reputation score of 41 to 60
• Low risk: Reputation score of 61 to 80
• Trustworthy: Reputation score of 81 to 100
When you configure a web reputation in vManage, you are setting a reputation threshold. Any URL that is
below the threshold is blocked by URL filtering. For example, if you set the web reputation to Moderate
Risk in vManage, any URL that has a reputation score below than and equal to 60 is blocked.
Based on the reputation score of a URL and the configuration, a URL is either blocked or allowed.
List-based Filtering
List-based filtering allows the user to control access by permitting or denying access based on allowed or
blocked lists. Here are some important points to note regarding these lists:
• URLs that are allowed are not subjected to any category-based filtering (even if they are configured).
• If the same item is configured under both the allowed and blocked list, the traffic is allowed.
• If the traffic does not match either the allowed or blocked lists, then it is subjected to category-based and
reputation-based filtering (if configured).
• A user may consider using a combination of allowed and blocked pattern lists to design the filters. For
example, if you want to allow www\.foo\.com but also want to block other URLs such as www\.foo\.abc
and www\.foo\.xyz, you can configure www\.foo\.com in the allowed list and www\.foo\. in the blocked
list.
Cloud-Lookup
The Cloud-Lookup feature is enabled by default and is used to retrieve the category and reputation score of
URLs that are not available in the local database.
The category and reputation score of unknown URLs are returned as follows:
IP based URLs:
• Public hosted IP — corresponding category and reputation score is received.
• Private IP like 10.<>, 192.168.<> — category is 'uncategorized' and reputation score is 100
• Non-hosted/Non-routable IP — category is 'uncategorized' and reputation score is 40
The Cloud-Lookup score is different from the on-box database for these URLs
(Unknown/Non-hosted/Non-routable/Internal URLs).
9. Choose one of the following options from the Web Categories drop-down:
• Block: Block websites that match the categories that you choose.
• Allow: Allow websites that match the categories that you choose.
10. Choose one or more categories to block or allow from the Web Categories list.
11. Choose a Web Reputation from the drop-down menu. The options are:
• High Risk: Reputation score of 0 to 20.
• Suspicious: Reputation score of 21 to 40.
• Moderate Risk: Reputation score of 41 to 60.
• Low Risk: Reputation score of 61 to 80.
• Trustworthy: Reputation score of 81 to 100.
12. (Optional) From Advanced, choose one or more existing lists or create new ones as needed from the
Whitelist URL List or Blacklist URL List drop-down menu.
Note Items on the allowed lists are not subject to category-based filtering. However, items on the blocked lists are
subject to category-based filtering. If the same item is configured under both the allowed and blocked lists,
the traffic is allowed.
To remove a URL list from the URL List field, click the X next to the list name in the field.
13. (Optional) In the Block Page Server pane, choose an option to designate what happens when a user
visits a URL that is blocked. Choose Block Page Content to display a message that access to the page
has been denied, or choose Redirect URL to display another page.
If you choose Block Page Content, users see the content header Access to the requested
page has been denied. in the Content Body field, enter text to display under this content
header. The default content body text is Please contact your Network Administrator.
If you choose Redirect URL, enter a URL to which users are redirected.
14. (Optional) In the Alerts and Logs pane, choose the alert types from the following options:
• Blacklist: Exports an alert as a Syslog message if a user tries to access a URL that is configured
in the blocked URL List.
• Whitelist: Exports an alert as a Syslog message if a user tries to access a URL that is configured
in the allowed URL List.
• Reputation/Category: Exports an alert as a Syslog message if a user tries to access a URL that
has a reputation that is configured as blocked in the Web Reputation field or that matches a blocked
web category.
Alerts for allowed reputations or allowed categories are not exported as Syslog messages.
15. You must configure the address of the external log server in the Policy Summary page.
16. Click Save URL filtering Policy to add an URL filtering policy.
17. Click Next until the Policy Summary page is displayed.
18. Enter Security Policy Name and Security Policy Description in the respective fields.
19. If you enabled Alerts and Logs, in the Additional Policy Settings section you must specify the following:
• External Syslog Server VPN: The syslog server should be reachable from this VPN.
• Server IP: IP address of the server.
• Failure Mode: Open or Close.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, choose From Feature Template.
4. From the Device Model drop-down list, choose one of the devices.
5. Click Additional Templates.
The Additional Templates section is displayed.
6. From the Security Policy drop-down list, choose the name of the policy you configured previously.
7. Click Create to apply the security policy to a device.
8. Click … next to the device template that you created.
9. Click Attach Devices.
10. Choose the devices to which you want to attach the device template.
11. Click Attach.
Note If you are migrating from older releases to Cisco IOS XE Release 17.2 or later with Application lists and the
zone-based firewall that is configured in Cisco vManage, you must first remove the security template from
the base template and push the base template. Thereafter, reattach the security template and then push the
template to the device.
Note When a Zone based firewall template in attached to a Cisco IOS XE SD-WAN device running on Cisco IOS
XE Release 17.6.1a or later, there may be an increase in time for completion of tasks. This is due to the updates
in the software version of Cisco vManage Release 20.6.1.
Note • Target VPNs are not applicable for the advanced malware protection used in a unified security policy.
• You can enable Policy Mode only when creating advanced malware protection policies. You cannot
configure the unified mode once the policy is saved.
9. Choose one or more categories to block or allow from the Web Categories drop-down list.
10. Choose the Web Reputation from the drop-down list. The options are:
• High Risk: The Reputation score is between 0 to 20.
• Suspicious: The Reputation score is between 21 to 40.
• Moderate Risk: The Reputation score is between 41 to 60.
• Low Risk: The Reputation score is between 61 to 80.
• Trustworthy: The Reputation score is between 81 to 100.
11. (Optional) From Advanced, choose one or more existing lists or create new ones, as needed, from the
Whitelist URL List or Blacklist URL List drop-down lists.
Note Items in the allowed lists are not subject to category-based filtering. However, items in the blocked lists are
subject to category-based filtering. If the same item is configured under both the allowed and blocked lists,
traffic is allowed.
You also can create or manage URL lists by choosing Configuration > Security, and then choosing
Lists from Custom Options top-right corner of the window, and then clicking Whitelist URLs or
Blacklist URLs in the left pane.
To remove a URL list from the URL List field, click X next to the list name.
12. (Optional) In the Block Page Server pane, choose an option to designate what happens when a user
visits a URL that is blocked.
If you click Block Page Content, users see the content header Access to the requested
page has been denied. In the Content Body field, enter text to display under this content
header. The default content body text is Please contact your Network Administrator.
If you click Redirect URL, enter a URL to which users are redirected.
13. (Optional) In the Alerts and Logs pane, choose alert type option:
• Blacklist: Exports an alert as a syslog message if a user tries to access a URL that is configured
in the blocked URL List.
• Whitelist: Exports an alert as a syslog message if a user tries to access a URL that is configured
in the Allowed URL List.
• Reputation/Category: Exports an alert as a syslog message if a user tries to access a URL that is
configured as blocked in the Web Reputation field or that matches a blocked web category.
Alerts for allowed reputations or allowed categories are not exported as syslog messages.
14. Configure the address of the external log server in the Policy Summary page.
15. Click Save URL filtering Policy to add an URL filtering policy.
Release Description
Cisco SD-WAN 19.1 Feature introduced. The Cisco Advanced Malware Protection (AMP) integration equips
routing and SD-WAN platforms to provide protection and visibility to cover all stages
of the malware lifecycle.
• File Reputation: The process of using a 256-bit Secure Hash Algorithm (SHA256) signature to compare
the file against the Advanced Malware Protection (AMP) cloud server and access its threat intelligence
information. The response can be Clean, Unknown, or Malicious. If the response is Unknown, and if
File Analysis is configured, the file is automatically submitted for further analysis.
Note The maximum file size that will be inspected by AMP is 10 MB.
Note File Reputation supports the following file types: ACCDB, ALZ, AMF, AMR,
ARJ, ASF, AUTORUN, BINARY_DATA, BINHEX, BMP, BZ, CPIO_CRC,
CPIO_NEWC, CPIO_ODC, DICM, DMG, DMP, EGG, EICAR, ELF, EPS,
FFMPEG, FLAC, FLIC, FLV, GIF, GZ, HLP, HWP, ICO, IMG_PCT,
ISHIELD_MSI, ISO, IVR, JAR, JARPACK, JPEG, LHA, M3U, MACHO, MAIL,
MAYA, MDB, MDI, MIDI, MKV, MNY, MOV, MP3, MP4, MPEG, MSCAB,
MSCHM, MSOLE2, MSWORD_MAC5, MSZDD, MWL, NEW_OFFICE,
NTHIVE, OGG, OLD_TAR, ONE, PCAP, PDF, PGD, PLS, PNG, POSIX_TAR,
PSD, PST, RA, RAR, REC, REG, RIFF, RIFX, RIM, RMF, RPM, RTF, S3M,
SAMI, SCRENC, SIS, SIT, SMIL, SWF, SYLKc, SYMANTEC, TIFF, TNEF,
TORRENT, UUENCODED, VMDK, WAV, WEBM, WMF, WP, WRI, XLW,
XPS, ZIP, ZIP_ENC, 7Z, 9XHIVE.
• File Analysis: The process of submitting an Unknown file to the Threat Grid (TG) cloud for detonation
in a sandbox environment. During detonation, the sandbox captures artifacts and observes behaviors of
the file, then gives the file an overall score. Based on the observations and score, Threat Grid may change
the threat response to Clean or Malicious. Threat Grid’s findings are reported back to the AMP cloud,
so that all AMP customers will be protected against newly discovered malware. File Analysis supports
a maximum file size of 10MB.
Note File analysis requires a separate Threat Grid account. For information about
purchasing a Threat Grid account, contact your Cisco representative.
• Retrospective: By maintaining information about files even after they are downloaded, we can report on
files that were determined to be malicious after they were downloaded. The disposition of the files could
change based on the new threat intelligence gained by the AMP cloud. This re-classification will generate
automatic retrospective notifications.
Note A NAT direct internet access route is necessary to apply Advanced Malware Protection Policy.
Step 1 Log into your Cisco AMP Threat Grid dashboard, and choose your account details.
Step 2 Under your Account Details, an API key may already be visible if you've created one already. If you have not, click
Generate New API Key.
Your API key should then be visible under User Details > API Key.
Step 3 From the Cisco vManage menu, choose Configuration > Security.
Step 4 In the Security screen, click the Custom Options drop-down menu and choose Threat Grid API Key.
Step 5 In the Manage Threat Grid API key dialog box, perform these steos:
a) Choose a region from the Region drop-down menu.
b) Enter the API key in the Key field.
c) Click Add.
d) Click Save Changes.
Step 1 From the Cisco vManage menu, choose Configuration > Security.
Step 2 Click Add Security Policy. The Add Security Policy wizard opens and various use-case scenarios display.
Step 3 In Add Security Policy, choose Direct Internet Access and then click Proceed.
Step 4 In the Add Security Policy wizard, click Next as needed to choose Advanced Malware Protection.
Step 5 From Advanced Malware Protection, click Add Advanced Malware Protection Policy in the drop-down menu.
Step 6 Choose Create New. The Add Advanced Malware Protection screen displays.
Step 7 In the Policy Name field, enter a name for the malware policy. The name can be up to 128 characters and can contain
only alphanumeric characters.
Step 8 Ensure Match All VPN is chosen. Choose Match All VPN if you want to apply the policy to all the VPNs, or choose
Custom VPN Configuration to input the specific VPNs.
Step 9 From the AMP Cloud Region drop down menu, choose a global region.
Step 10 From the Alerts Log Level drop down menu, choose a severity level (Critical, Warning, or Info).
Note: Because the Info severity level generates multiple notifications and can affect system performance, this level
should be configured only for testing or debugging and not for real-time traffic.
Step 11 Click File Analysis to enable Threat Grid (TG) file analysis.
Note Before you can perform this step, configure a threat grid API key as described in Configure Threat Grid API
Key.
Step 12 From the TG Cloud Region drop down menu, choose a global region.
Note Configure the Threat Grid API Key by clicking on Manage API Key or as described in Configure Threat
Grid API Key
Step 13 From the File Types List drop down menu, choose the file types that you want to be analyzed.
Step 14 From the Alerts Log Level drop down menu, choose a severity level (Critical, Warning, or Info).
Step 15 Click Target VPNs to choose the target service VPNs or all VPNs, and then click Add VPN.
Step 16 Click Save Changes. The Policy Summary screen displays.
Step 17 Click Next.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, choose From Feature Template.
4. From the Device Model drop-down list, choose one of the devices.
5. Click Additional Templates.
The Additional Templates section is displayed.
6. From the Security Policy drop-down list, choose the name of the policy you configured previously.
7. Click Create to apply the security policy to a device.
8. Click … next to the device template that you created.
9. Click Attach Devices.
10. Choose the devices to which you want to attach the device template.
Note If you are migrating from older releases to Cisco IOS XE Release 17.2 or later with Application lists and the
zone-based firewall that is configured in Cisco vManage, you must first remove the security template from
the base template and push the base template. Thereafter, reattach the security template and then push the
template to the device.
Note When a Zone based firewall template in attached to a Cisco IOS XE SD-WAN device running on Cisco IOS
XE Release 17.6.1a or later, there may be an increase in time for completion of tasks. This is due to the updates
in the software version of Cisco vManage Release 20.6.1.
c. Click OK.
Step 1 From the Cisco vManage menu, choose Monitor > Devices, and choose a device.
Cisco vManage Release 20.6.x and earlier: From the Cisco vManage menu, choose Monitor > Network, and choose a
device.
Step 2 Under Security Monitoring, click Advanced Malware Protection in the left pane.
Step 1 From the Cisco vManage menu, choose Maintenance > Security.
Step 2 Click Advanced Malware Protection.
Step 3 Choose the device or devices that you want to rekey.
Step 4 Choose Action > API Rekey.
Note • Target VPNs are not applicable for the advanced malware protection used in a unified security policy.
• You can enable Policy Mode only when creating advanced malware protection policies. You cannot
configure the unified mode once the policy is saved.
Note Because the Info severity level generates multiple notifications and can affect system performance, this level
should be configured only for testing or debugging, and not for real-time traffic.
Note Before you can perform Step 10, configure a threat grid API key as described in Configure Threat Grid API
Key.
File Analysis requires a separate Threat Grid license.
11. From the TG Cloud Region drop-down list, choose a global region.
Note Configure the Threat Grid API Key by clicking Manage API Key or as described in Configure Threat Grid
API Key.
From the File Types List drop-down list, choose the file types that you want to be analyzed.
12. From the Alerts Log Level drop-down list, choose a severity level (Critical, Warning, or Info).
13. Click Save Advanced Malware Protection Policy.
SSL/TLS Proxy Cisco IOS XE Release The SSL/TLS Proxy feature allows you to configure an edge
17.2.1r device as a transparent SSL/TLS proxy. Such proxy devices
can then decrypt incoming and outgoing TLS traffic to
enable their inspection by Unified Threat Defense (UTD)
and identify risks that are hidden by end-to-end encryption.
This feature is part of the Cisco SD-WAN Application
Quality of Experience (AppQoE) and UTD solutions.
Note TLS is the successor of SSL. This document uses the term TLS to refer to both SSL and TLS.
Today more and more apps and data reside in the cloud. As a result, majority of internet traffic is encrypted.
This may lead to malware remaining hidden and lack of control over security. The TLS proxy feature allows
you to configure edge devices as transparent TLS proxy. This feature has been integrated with Cisco Unified
Threat Defense (UTD).
TLS proxy devices act as man-in-the-middle (MitM) to decrypt encrypted TLS traffic traveling across WAN,
and send it to (UTD) for inspection. TLS Proxy thus allows devices to identify risks that are hidden by
end-to-end encryption over TLS channels. The data is re-encrypted post inspection before being sent to its
final destination.
Note If there is a delay in determining the decrypt status of the flow, the UTD configuration for fail-decrypt is
exercised.
In the subsequent sections, we have listed the benefits and limitations of each of the supported CA options to
help you make an informed decision about choosing the CA for TLS proxy.
Enterprise CA
Use this option to manage issuing certificates through an Enterprise CA or your own internal CA. For Enterprise
CA that does not support Simple Certificate Enrollment Protocol (SCEP), manual enrollment is required.
Manual enrollment involves downloading a Certificate Signing Request (CSR) for your device, getting it
signed by your CA, and then uploading the signed certificate to the device through Cisco vManage.
Benefits Limitations
• Can use your existing enterprise CA and • Maintenance creates an administrative overload.
certificate management infrastructure for
monitoring the usage, expiry, and validity of • Manual certificate deployment is required for
certificates TLS proxy
• The client trust-store need not be updated • Out-of-band management is required for tracking
the usage and expiry of certificates
• Provides a single location for managing all
certificates issued • Requires manual re-issuance of expired proxy
certificates
• Certificates can be revoked and tracked through
your own CA • If an enterprise CA certificate is revoked or
compromised, all certificates it issued are
invalidated
Benefits Limitations
• Can use your existing enterprise CA and • Maintenance creates an administrative overload.
certificate management infrastructure for
monitoring the usage, expiry, and validity of • If an enterprise CA certificate is revoked or
certificates compromised, all certificates it issued are
invalidated
• The client trust-store need not be updated
• Offers limited visibility through Cisco vManage
• Provides a single location for managing all
certificates issued • Enterprise CA have limited support for SCEP
vManage as CA
Use this option if you don't have an enterprise CA and want to use Cisco vManage to issue trust certificates.
Benefits Limitations
Benefits Limitations
Cisco IOS XE Release 17.2.1r • Cisco 4331 Integrated Services Router (ISR
4331)
• Cisco 4351 Integrated Services Router (ISR
4351)
• Cisco 4431 Integrated Services Router (ISR
4431)
• Cisco 4451 Integrated Services Router (ISR
4451)
• Cisco 4461 Integrated Services Router (ISR
4461)
• Cisco CSR 1000v Cloud Services Router
(CSR1000v)
Cisco IOS XE Release 17.3.2 • Cisco Catalyst 8300 Series Edge Platforms
• TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
The subsequent topics provide a step-by-step procedure to complete the configuration of a Cisco IOS XE
SD-WAN device as SSL/TLS Proxy.
Configure Enterprise CA
Configure Enterprise CA to issue subordinate CA certificates to the proxy device at the edge of the network.
Configure Enterprise CA
1. Download a CA certificate from your CA server in PEM or Base 64 format.
2. From the Cisco vManage menu, choose Configuration > TLS/SSL Proxy.
3. Choose Enterprise CA.
4. [Optional, but recommended] Check the Simple Certificate Enrollment Protocol (SCEP) check box.
a. Enter the SCEP server URL in the URL Base field.
b. [Optional] Enter the Challenge Password/Phrase if you have one configured.
Note If Enterprise CA is configured with SCEP, the Enterprise SCEP CA server should be reachable from transport
VPN (VPN 0).
Note This step concludes configuring enterprise CA. However, you must complete steps 8, 9, and 10 to complete
setting up the device as TLS proxy.
Note Leave the Set vManage as Intermediate CA check box not checked if you want to set vManage as CA.
3. Enter the requested details: Common Name, Organization, Organizational Unit, Locality, State/Province,
Country Code, and Email.
4. Choose the certificate validity period from the drop-down list.
5. Click Save Certificate Authority.
6. Click the Download option on the vManage as CA page to download the root certificate generated.
7. Import the downloaded certificate into your client's trustStore as a trusted root CA.
Note This step concludes configuring Cisco vManage as CA. However, you must complete steps 8, 9, and 10 to
complete setting up a device as TLS proxy.
device. This option is suitable for enterprises that have their own internal CA but would like to use Cisco
vManage to automate and manage certificate issuance and renewal.
1. From the Cisco vManage menu, choose Configuration > TLS/SSL Proxy.
2. Choose vManage as CA.
3. Check the Set vManage as Intermediate CA check box.
4. Upload the CA certificate using the Select a file option.
OR
Paste the content of the PEM-encoded CA certificate file in the Root Certificate text box.
5. Click Next.
6. Under the Generate CSR area, enter the requested details, and click Generate CSR.
The CSR field on the screen populates with the Certificate Signing Request (CSR).
7. Copy or download the CSR and upload it to the enterprise CA server to get it signed by the CA server
as the subordinate CA certificate.
Note The process to get a CSR signed by a CA server may differ from one CA to another. Follow your standard
procedure to get a CSR signed by your CA.
8. Click Next.
9. In the Intermediate Certificate text box, paste the content of the signed Cisco vManage certificate, and
click Upload.
OR
Click Select a file and upload the CSR generated in the previous step, and click Upload.
10. Verify that the finger print, which auto-populates after you upload the CSR, matches your CA certificate.
11. Click Save Certificate Authority.
Note This step concludes configuring Cisco vManage as intermediate CA. However, you must complete steps 12
and 13 to complete the configuration for setting up a device as TLS proxy.
• Network-based rules: Diverts traffic on the basis of the source or destination IP address, port, VPNs, and
application.
• URL-based rules: Decide whether to decrypt based on the URL category or reputation of the URL.The
decision is made based on the Client Hello packet.
To configure SSL decryption through a security policy, use the vManage security configuration wizard:
1. From the Cisco vManage menu, choose Configuration > Security.
2. Click Add Security Policy. The Add Security Policy wizard opens, and various use-case scenarios are
displayed.
3. In Add Security Policy, choose a scenario that supports the TLS/SSL Decryption feature (Compliance,
Guest Access, Direct Cloud Access, Direct Internet Access, or Custom).
4. Click Proceed to add an SSL decryption policy in the wizard.
5. • If this is the first time you're creating a TLS/SSL decryption policy, then you must create and apply
a policy to the device before creating security policies that can use a security policy (such as
Intrusion Prevention, URL Filtering, or Advanced Malware Protection). In the Add Security Policy
wizard, click Next until the TLS/SSL Decryption screen is displayed.
• If you want to use TLS/SSL decryption along with other security features such as Intrusion
Prevention, URL Filtering, or Advanced Malware Protection, add those features as described in
this book. Once you've configured those features, click Next until the TLS/SSL Decryption screen
is displayed.
6. Click the Add TLS/SSL Decryption Policy drop-down menu and choose Create New to create a new
SSL decryption policy. The TLS/SSL Decryption Policy Configuration wizard appears.
7. Ensure that SSL Decryption is Enabled.
8. In the Policy Name field, enter the name of the policy.
9. Click Add Rule to create a rule.
The New Decryption Rule window is displayed.
Note For branch-to-branch and branch-to-data center traffic scenarios that support service nodes, the SSL decryption
security policy must be applied in a way that prevents the SSL flow from being inspected on both the devices.
10. Choose the order for the rule that you want to create.
11. In the Name field, enter the name of the rule.
12. You can choose to decrypt traffic based on source / destination which is similar to the firewall rules or
applications which is similar to URL-Filtering rules.
• If you choose Source / Destination, enter any of the following conditions:
• Source VPNs
• Source Networks
• Source Ports
• Destination VPNs
• Destination Networks
• Destination Port
• Application/Application Family List
13. (Optional) To configure advanced settings such as server certificate checks, minimum TLS version,
and so on, expand Advanced Settings
Note By default, vManage configures the default values for each advanced setting. If you change any of these
settings, it may affect the behaviour of the decryption security policies.
• Under the Server Certificate Checks section, you can configure the following:
Expired Certificate Defines what the policy should • Drop the traffic
do if the server certificate is
expired • Decrypt the traffic
Untrusted Certificate Defines what the policy should • Drop the traffic
do if the server certificate is not
trusted • Decrypt the traffic
Unknown Revocation Status Defines what the policy should • Drop the traffic
do, if the OCSP revocation
status is unknown • Decrypt the traffic
• Under the Proxy Certificate Attributes section, you can configure the following:
RSA Keypair Modules Defines the Proxy Certificate • 1024 bit RSA
RSA Key modulus
• 2048 bit RSA
• 4096 bit RSA
• Under the Unsupported Mode Checks section, you can configure the following:
Unsupported Protocol Versions Defines what the policy should • Drop the traffic
do if an unsupported protocol
version is detected. • No Decrypt: The proxy
does not decrypt this
traffic.
Unsupported Cipher Suites Defines what the policy should • Drop the traffic
do if unsupported cipher suites
are detected. • No Decrypt: The proxy
does not decrypt this
traffic.
Failure Mode Defines what the policy should • Close: Sets the mode as
do in the case of a failure. fail-close
• Open: Sets the mode as
fail-open.
Certificate Bundle Defines whether the policy You can choose or not choose
should use the default CA this option. If you do not
certificate bundle or not choose this option, the Custom
Certificate Bundle option
appears and you must upload a
certificate by clicking Select a
file.
Note If you choose to use
or update a custom
certificate bundle for
SSL decryption,
ensure that the same
certificate bundle is
used across all
devices in the
network that have
SSL decryption
enabled.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
b. From the Create Template drop-down menu, choose From Feature Template.
c. From the Device Model drop-down menu, choose one of the devices.
d. In the Template Name field, enter a name for the device template. This field is mandatory and can
contain only uppercase and lowercase letters, the digits 0 through 9, hyphens (–), and underscores
(_). It cannot contain spaces or any other characters.
e. In the Description field, enter a description for the device template. This field is mandatory, and it
can contain any characters and spaces.
f. Continue with Step 4.
4. Click Additional Templates located directly beneath the Description field. The screen scrolls to the
Additional Templates section.
5. From the Security Policy drop-down menu, choose the name of the security policy you configured in the
above procedure.
6. Click Create (for a new template) or Update (for an existing template).
Note This procedure is applicable only if you configure the Enterprise CA for TLS proxy.
Important Ensure that the certificate you generate is a subordinate or an intermediate CA certificate. The procedure to
generate a subordinate CA certificate may differ from one enterprise CA to another. The certificate generated
in this step must have its constraint set as CA: TRUE.
Cisco IOS CA can’t be used for the TLS proxy feature as it doesn’t support generating a certificate with the
constraint set as CA: TRUE.
Verify Configuration
Use the following commands to verify the configuration for TLS proxy.
• show sdwanrunning: In Cisco vManage, run this command in CLI mode to verify if your configuration
is applied.
• show sdwan running-config: In Cisco vManage, run this command by connecting to the device CLI
through SSH.
• show crypto pki status: On your device CLI, run this command to verify that the PROXY-SIGNING-CA
is present and configured correctly on the device.
• show sslproxy statistics: On your device CLI, run this command to view TLS proxy statistics.
• show sslproxy status : On your device CLI, run this command to verify whether TLS proxy was
successfully configured and is enabled on Cisco vManage.
In the output below, Clear Mode: FALSE denotes that TLS proxy was successfully configured and
enabled on Cisco vManage
Configuration
-------------
CA Cert Bundle : /bootflash/vmanage-admin/sslProxyDefaultCAbundle.pem
CA TP Label : PROXY-SIGNING-CA
Cert Lifetime : 730
EC Key type : P256
RSA Key Modulus : 2048
Cert Revocation : NONE
Expired Cert : drop
Untrusted Cert : drop
Unknown Status : drop
Unsupported Protocol Ver : drop
Unsupported Cipher Suites : drop
Failure Mode Action : close
Min TLS Ver : TLS Version 1.1
Status
------
SSL Proxy Operational State : RUNNING
TCP Proxy Operational State : RUNNING
Clear Mode : FALSE
• show platform hardware qfp active feature utd config: On your device CLI, run this command to
verify the UTD data plane configuration. For more information on this command, see the Qualifed
Command Reference.
• show sdwan running-configuration | section utd-tls-decrypt : On your device CLI, run this command
to verify the UTD data plane configuration.
• show utd engine standard config: On your device CLI, run this command to verify the UTD service
plane configuration.
• show utd engine standard status: On your device CLI, run this command to verify the UTD service
plane configuration.
• Filter: You have the option to filter the traffic statistics by VPN, TLOC, Remote TLOC, and Remote
System IP.
• SSL Proxy View Format: You can choose to view the SSL proxy information in form of a line
graph, bar chart, or a pie chart.
• Time Range: Choose to view the information for a specified time range (1h, 3h, 6h, and so on) or
click Custom to define a time range.
5. Based on your choice, the information displays. Additional information is displayed in tabular format.
3. Choose the device (configured as Enterprise CA) for which you want to revoke or revoke and renew the
certificate.
4. Click Revoke Certificate. A pop-up window opens.
5. From the drop-down menu, choose a reason for revoking the certificate. Check the check box.
6. Revoke: To revoke the certificate, click Revoke. Beware that the revocation is permanent and cannot be
rolled back. If you choose to revoke the certificate, no additional steps are required after this step.
Note Revoking the certificate through Cisco vManage only removes the certificate from the device and invalidates
the private key. You also need to revoke this certificate from your Enterprise CA.
Revoke and Renew: To revoke the existing certificate and upload a new one to replace it, click the
Revoke and Renew. To renew a certificate after revoking it, see steps 6-11 in the Renew Certificate
section of this topic.
Renew Certificate
1. From the Cisco vManage menu, choose Configuration > Certificates.
2. Click the TLS Proxy.
You will see a list of devices configured as CA.
3. Choose the device (configured as Enterprise CA) for which you want to revoke or revoke and renew
the certificate.
4. Click Renew Certificate. A pop-up window opens.
5. Click Yes to continue with the renewal.
In the status column, the status of the certificate changes to CSR_Generated.
6. Click Download CSR.
A pop-up window opens. You can copy or download the CSR. Ensure that the certificate that you request
is downloaded in PEM format.
7. On your CA server, request a certificate and upload or paste the CSR file you generated in the previous
step.
8. Download the certificate issued by your CA in PEM format.
Important Ensure that the certificate you generate is a subordinate or an intermediate CA certificate. The procedure to
generate a subordinate CA certificate may differ from one enterprise CA to another. The certificate generated
in this step must have its constraint set as CA: TRUE.
Cisco IOS CA can’t be used for the TLS proxy feature as it doesn’t support generating a certificate with the
constraint set as CA: TRUE.
10. In the pop-up window that opens, upload or paste the PEM-encoded certificate that you generated from
your CA server in step 9.
11. Click Upload and Save.
Note Configuring a TLS/SSL Decryption policy is mandatory in a unified security policy, especially if you choose
to use the TLS action as Decrypt while creating an advanced inspection profile.
To configure TLS/SSL Decryption for a unified security policy, perform the following steps:
1. From the Cisco vManage menu, choose Configuration > Security.
2. Click Custom Options.
3. Click Policies/Profiles.
4. Click TLS/SSL Decryption in the left pane.
5. Click Add TLS/SSL Decryption Policy, and choose Create New.
6. Ensure that SSL Decryption is set to Enabled.
7. Click Policy Mode to enable the unified mode. This implies that you are creating a TLS/SSL Decryption
policy for use in the unified security policy.
8. Enter a policy name in the Policy Name field.
9. (Optional) To configure advanced settings such as server certificate checks, minimum TLS version,
and so on, expand Advanced Settings
Note By default, Cisco vManage configures the default values for each advanced setting. If you change any of these
settings, it may affect the behaviour of the decryption security policies. The Policy Mode can only be set at
time of creation and cannot be modified after the policy has been saved.
Expired Certificate Defines what the policy should • Drop the traffic by
do if the server certificate has clicking Drop
expired
• Decrypt the traffic by
clicking Decrypt
Untrusted Certificate Defines what the policy should • Drop the traffic by
do if the server certificate is not clicking Drop
trusted
• Decrypt the traffic by
clicking Decrypt
Unknown Revocation Status Defines what the policy should • Drop the traffic by
do, if the OCSP revocation clicking Drop
status is unknown
• Decrypt the traffic by
clicking Decrypt
RSA Keypair Modules Defines the Proxy Certificate • 1024 bit RSA
RSA Key modulus
• 2048 bit RSA
• 4096 bit RSA
Unsupported Protocol Defines what the policy should • Drop the traffic by
Versions do if an unsupported protocol clicking Drop
version is detected.
• Click No Decrypt so that
the proxy does not decrypt
this traffic.
Unsupported Cipher Suites Defines what the policy should • Drop the traffic by
do if unsupported cipher suites clicking Drop
are detected.
• Click No Decrypt so that
the proxy does not decrypt
this traffic.
Failure Mode Defines what the policy should • Close: Sets the mode as
do in case of a failure. fail-close
• Open: Sets the mode as
fail-open.
Certificate Bundle Defines whether the policy You can choose or not choose
should use the default CA this option. If you do not
certificate bundle or not choose this option, the Custom
Certificate Bundle option
appears and you must upload a
certificate by clicking Select a
file.
Note The Policy Mode can only be set at time of creation and cannot be modified after the policy has been saved.
• If FQDN is found to be non-malicious, then the IP address of the content provider is returned in the DNS
response. This is called a allowed list action at Umbrella Cloud.
• If the FQDN is suspicious, then the intelligent proxy unicast IP addresses are returned in the DNS
response. This is referred to as grey list action at Umbrella Cloud.
When the DNS response is received, the device forwards the response back to the host. The host will extract
the IP address from the response and send the HTTP / HTTPS requests to this IP.
Note: The intelligent proxy option has to be enabled in the Umbrella dashboard for the Umbrella Resolver to
return the intelligent proxy unicast IP addresses in the DNS response when an attempt is made to access the
domains in the grey list.
Handling HTTP and HTTPs Traffic
With Cisco SD-WAN Umbrella Integration, HTTP and HTTPs client requests are handled in the following
ways:
• If the Fully Qualified Domain Name (FQDN) in the DNS query is malicious (falls under blocked domains),
Umbrella Cloud returns the IP address of the blocked landing page in the DNS response. When the HTTP
client sends a request to this IP, Umbrella Cloud displays a page that informs the user that the requested
page was blocked and the reason for blocking the page.
• If the FQDN in the DNS query is non-malicious (falls under allowedlisted domains), Umbrella Cloud
returns the IP address of the content provider. The HTTP client sends the request to this IP address and
gets the desired content.
• If the FQDN in the DNS query falls under grey-listed domains, Umbrella Resolver returns the unicast
IP addresses of intelligent proxy in the DNS response. All HTTP traffic from the host to the grey domain
gets proxied through the intelligent proxy and undergo URL filtering.
One potential limitation in using intelligent proxy unicast IP addresses is the probability of the datacenter
going down when the client is trying to send the traffic to the intelligent proxy unicast IP address. This is a
scenario where a client has completed DNS resolution for a domain which falls under grey-listed domain and
client’s HTTP/(S) traffic is being sent to one of the obtained intelligent proxy unicast IP address. If that
datacenter is down, then the client has no way of knowing it.
The Umbrella Connector does not act on the HTTP and HTTPS traffic. The connector does not redirect any
web traffic or alter any HTTP/(S) packets.
Encrypting the DNS Packet
The DNS packet sent from the device to Umbrella Integration server must be encrypted if the EDNS information
in the packet contains information such as user IDs, internal network IP addresses, and so on. When the DNS
response is sent back from the DNS server, device decrypts the packet and forwards it to the host. You can
encrypt DNS packets only when the DNScrypt feature is enabled on the device.
The device uses the following Anycast recursive Umbrella Integration servers:
• 208.67.222.222
• 208.67.220.220
• 2620:119:53::53
• 2620:119:35::35
Auto-registration for Cisco IOS XE This feature adds the ability to register devices to Cisco Umbrella
Cisco Umbrella Release 17.2.1r using the Smart Account credentials to automatically retrieve
Cloud Services Umbrella credentials (organization ID, registration key, and
secret). This offers a more automatic alternative to manually
copying a registration token from Umbrella.
Use this procedure to configure Cisco Umbrella registration globally for all devices. The procedure retrieves
the Umbrella registration parameters automatically.
When configuring individual policies, it is also possible to configure Umbrella registration, but it can be
managed more flexibly using the following procedure:
1. From the Cisco vManage menu, choose Configuration > Security.
2. Click Custom Options and choose Umbrella Registration.
3. In the Manage Umbrella Registration dialog box, use one of the following methods to register devices
to Umbrella. The registration details are used globally.
• Cisco Umbrella Registration Key and Secret
a. Click the Get Keys to retrieve Umbrella registration parameters automatically: Organization ID,
Registration Key, and Secret.
Note To automatically retrieve registration parameters, Cisco vManage uses the Smart
Account credentials to connect to the Umbrella portal. The Smart Account
credentials are configured in Cisco vManage under Administration > Settings
> Smart Account Credentials.
b. (Optional) If the Umbrella keys have been rotated and the details that are automatically retrieved
are incorrect, enter the details manually.
7. If you are creating a new policy using the Create New option, the DNS Security - Policy Rule
Configuration wizard is displayed.
8. Enter a policy name in the Policy Name field.
9. The Umbrella Registration Status displays the status of the API Token configuration.
10. Click Manage Umbrella Registration to add a token, if you have not added one already.
11. Click Match All VPN to keep the same configuration for all the available VPNs and continue with Step
13.
Or click Custom VPN Configuration if you need to add target service VPNs to your policy. A Target
VPNs window appears, and continue with Step 12.
12. To add target service VPNs, click Target VPNs at the top of the window.
16. Click Advanced to enable or disable the DNSCrypt. By default, the DNSCrypt is enabled.
17. Click Save DNS Security Policy.
The Configuration > Security window is displayed, and the DNS policy list table includes the newly
created DNS Security Policy.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
• Copy and paste the contents of the bundle. Ensure that the certificate for Cisco vEdge devices appears
before the certificate for Cisco IOS XE SD-WAN devices.
• Click Select a File and navigate to and select the bundle that you want.
4. Click Save.
Cisco vManage pushes the certificates to all devices that support an Umbrella root certificate.
Sample configuration:
Device# config-transaction
Device(config)# parameter-map type umbrella global
Device(config-profile)#?
parameter-map commands:
dnscrypt Enable DNSCrypt
exit Exit from parameter-map
local-domain Local domain processing
no Negative or set default values of a command
public-key DNSCrypt provider public key
registration-vrf Cloud facing vrf
resolver Anycast address
token Config umbrella token
udp-timeout Config timeout value for UDP sessions
vrf Configure VRF
Per-VRF options are provided under VRF option:
Device(config)# parameter-map type umbrella global
Device(config-profile)#vrf 9
Device(config-profile-vrf)#?
vrf options:
dns-resolver DNS resolver address
exit Exit from vrf sub mode
match-local-domain Match local-domain list(if configured)
no Negate a command or set its defaults
pattern .*.salesforce.com
!
parameter-map type umbrella global
token 648BF6139C379DCCFFBA637FD1E22755001CE241
local-domain dns_bypass
dnscrypt udp-timeout 5
vrf 9
dns-resolver 8.8.8.8
match-local-domain
vrf 19
dns-resolver 8.8.8.8
no match-local-domain
vrf 29
dns-resolver umbrella
match-local-domain
vrf 39
dns-resolver umbrella
no match-local-domain
!
The following table captures the per VRF DNS packet behavior:
9 8.8.8.8 Yes
19 8.8.8.8 No
29 umbrella Yes
39 umbrella No
Note The VRFs must be preconfigured. For example, the VRFs 9,19, 29, 39 are preconfigured in the above example.
Public-key
Public-key is used to download the DNSCrypt certificate from Umbrella Integration cloud. This value is
preconfigured to
B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
which is the public-key of Umbrella Integration Anycast servers. If there is a change in the public-key and if
you modify this command, then you have to remove the modified command to restore the default value. If
you modify the value, the DNSCrypt certificate download may fail.
DNSCrypt
DNSCrypt is an encryption protocol to authenticate communications between the device and the Umbrella
Integration. When the parameter-map type umbrella is configured and enabled by default on all WAN
interfaces. DNSCrypt gets triggered and a certificate is downloaded, validated, and parsed. A shared secret
key is then negotiated, which is used to encrypt the DNS queries. For every hour this certificate is automatically
downloaded and verified for an upgrade, a new shared secret key is negotiated to encrypt the DNS queries.
To disable DNSCrypt, use the no dnscrypt command and to re-enable DNSCrypt, use the dnscrypt command.
When the DNSCrypt is used, the DNS request packets size is more than 512 bytes. Ensure that these packets
are allowed through the intermediary devices; otherwise, the response may not reach the intended recipients.
Sample umbrella dnscrypt notifications:
Device# show sdwan umbrella dnscrypt
DNSCrypt: Enabled
Public-key: B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
Certificate Update Status:
Last Successfull Attempt: 08:46:32 IST May 21 2018
Certificate Details:
Certificate Magic : DNSC
Major Version : 0x0001
Minor Version : 0x0000
Query Magic : 0x714E7A696D657555
Serial Number : 1517943461
Start Time : 1517943461 (00:27:41 IST Feb 7 2018)
End Time : 1549479461 (00:27:41 IST Feb 7 2019)
Server Public Key : 240B:11B7:AD02:FAC0:6285:1E88:6EAA:44E7:AE5B:AD2F:921F:9577:514D:E226:D552:6836
Umbrella Configuration
========================
Token: AAC1A2555C11B2B798FFF3AF27C2FB8F001CB7B2
OrganizationID: 1882034
Local Domain Regex parameter-map name: NONE
DNSCrypt: Enabled
Public-key: B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
UDP Timeout: 5 seconds
Resolver address:
1. 208.67.220.220
2. 208.67.222.222
3. 2620:119:53::53
4. 2620:119:35::35
Registration VRF: default
VRF List:
1. VRF 1 (ID: 1)
DNS-Resolver: umbrella
Match local-domain-to-bypass: Yes
2. VRF 2 (ID: 3)
DNS-Resolver: 8.8.8.8
Match local-domain-to-bypass: No
2.39
Tag : vpn39
Device-id : 010a1a2e1989da19
Description : De
vice Id recieved successfully
WAN interface : None
sdwan
interface Tunnel100001
tunnel-options tunnel-set secure-internet-gateway-umbrella tunnel-dc-preference primary-dc
source-interface GigabitEthernet0/0/0
exit
interface Tunnel100002
tunnel-options tunnel-set secure-internet-gateway-umbrella tunnel-dc-preference secondary-dc
source-interface GigabitEthernet0/0/0
exit
interface Tunnel100001
no shutdown
ip unnumbered GigabitEthernet0/0/0
no ip clear-dont-fragment
ip tcp adjust-mss 1300
ip mtu 1400
tunnel source GigabitEthernet<#/#/#>
tunnel destination dynamic
tunnel mode ipsec ipv4
tunnel protection ipsec profile if-ipsec1-ipsec-profile
tunnel vrf multiplexing
tunnel route-via GigabitEthernet<###> mandatory
exit
interface Tunnel100002
no shutdown
ip unnumbered GigabitEthernet0/0/0
no ip clear-dont-fragment
ip tcp adjust-mss 1300
ip mtu 1400
tunnel source GigabitEthernet<#/#/#>
tunnel destination dynamic
tunnel mode ipsec ipv4
tunnel protection ipsec profile if-ipsec2-ipsec-profile
tunnel vrf multiplexing
tunnel route-via GigabitEthernet<###> mandatory
exit
The show platform software umbrella f0 local-domain displays the local domain list.
Device# show platform software umbrella f0 local-domain
01. www.cisco.com
02. .*amazon.com
03. .*.salesforce.com
udp timeout: 5
Orgid:
--------
orgid: 1892929
Resolver config:
------------------
RESOLVER IP's
208.67.220.220
208.67.222.222
2620:119:53::53
2620:119:35::35
Dnscrypt Info:
--------------
public_key:
D9:2D:20:93:E8:8C:B4:BD:32:E6:A3:D1:E0:5B:7E:1A:49:C5:7F:96:BD:28:79:06:A2:DD:2E:A7:A1:F9:3D:7E
magic_key: 71 4E 7A 69 6D 65 75 55
serial number: 1517943461
Mode : IN
Resolver : 208.67.220.220
Local-Domain: True
DeviceID : 010a9b2b0d5cb21f
Tag : vpn29
The show platform hardware qfp active feature umbrella datapath memory command displays CFT
information.
Device# show platform hardware qfp active feature umbrella datapath memory
==Umbrella Connector CFT Information==
CFT inst_id 0 feat id 0 fo id 0 chunk id 4
==Umbrella Connector Runtime Information==
umbrella init state 0x4
umbrella dsa client handler 0x2
The show platform hardware qfp active feature umbrella datapath runtime command displays internal
information. For example, key index used for DNSCrypt.
Device# show platform hardware qfp active feature umbrella datapath runtime
udpflow_ageout: 5
ipv4_count: 2
ipv6_count: 2
ipv4_index: 0
ipv6_index: 0
Umbrella IPv4 Anycast Address
IP Anycast Address0: 208.67.220.220
IP Anycast Address1: 208.67.222.222
Umbrella IPv6 Anycast Address
IP Anycast Address0: 2620:119:53:0:0:0:0:53
IP Anycast Address1: 2620:119:35:0:0:0:0:35
=DNSCrypt=
key index: 0
-key[0]-
sn: 1517943461
ref cnt: 0
magic: 714e7a696d657555
Clear Command
The clear platform hardware qfp active feature umbrella datapath stats command clears the Umbrella
connector statistics in datapath.
Device# clear platform hardware qfp active feature umbrella datapath stats
Umbrella Connector Stats Cleared
Depending on the OS, run either of these two commands from the client device:
• The nslookup -type=txt debug.umbrella.com command from the command prompt of the Windows
machine
• The nslookup -type=txt debug.umbrella.com command from the terminal window or shell of the Linux
machine
Umbrella Registration
exit
!
security
umbrella
dnscrypt
!
exit
!
vpn matchAllVpn
dns-redirect umbrella match-local-domain-to-bypass
IPSEC/GRE Tunnel Routing and Cisco IOS XE Release 17.4.1a This feature allows you to use the
Load-Balancing Using ECMP SIG template to steer application
Cisco vManage Release 20.4.1
traffic to Cisco Umbrella or a Third
party SIG Provider. The application
traffic is steered to a SIG based on
a defined data policy and other
match criteria.
This feature also allows you to
configure weights for multiple
GRE/IPSEC tunnels for distribution
of traffic among multiple tunnels.
The traffic distribution enables you
to balance the load among the
tunnels. You can also configure the
weights to achieve Equal-cost
multi-path (ECMP) routing.
Support for Zscaler Automatic Cisco IOS XE Release 17.5.1a This feature automates the
IPSec Tunnel Provisioning provisioning of tunnels from Cisco
Cisco vManage Release 20.5.1
SD-WAN routers to Zscaler. Using
your Zscaler partner API
credentials, you can automatically
provisions tunnels to Zscaler
Internet Access (ZIA) Public
Service Edges. You can choose
Zscaler in the Cisco Security
Internet Gateway (SIG) and SIG
credentials feature templates to
automate tunnel provisioning.
Layer 7 Health Check for Manual Cisco IOS XE Release 17.8.1a You can create and attach trackers
Tunnels to manually created GRE or IPSec
Cisco vManage Release 20.8.1
tunnels to a SIG endpoint. Trackers
help failover traffic when a SIG
tunnel is down.
Automatic GRE Tunnels to Zscaler Cisco IOS XE Release 17.9.1a With this feature, use the Secure
Internet Gateway (SIG) feature
Cisco vManage Release 20.9.1
template to provision automatic
GRE tunnels to Zscaler SIGs. In
earlier releases, the SIG template
only supported the provisioning of
automatic IPSec tunnels to Zscaler
SIGs.
Global SIG Credentials Template Cisco IOS XE Release 17.9.1a With this feature, create a single
global Cisco SIG Credentials
Cisco vManage Release 20.9.1
template for each SIG provider
(Cisco Umbrella or Zscaler). When
you attach a Cisco SIG template to
a device template, Cisco vManage
automatically attaches the
applicable global Cisco SIG
Credentials template to the device
template.
Monitor Automatic SIG Tunnel Cisco IOS XE Release 17.9.1a Monitor security events related to
Status and Events automatic SIG tunnels using the
Cisco vManage Release 20.9.1
Security Events pane on the
Monitor > Security page, and the
Events dashboard on the
Monitor > Logs page.
Monitor automatic SIG tunnel
status using the SIG Tunnel Status
pane on the Monitor > Security
page, and the SIG Tunnels
dashboard on the Monitor >
Tunnels page.
Cisco SD-WAN edge devices support SD-WAN, routing, security, and other LAN access features that can
be managed centrally. On high-end devices, you can enable all these features while providing the scale and
performance required by large enterprises. However, on lower-end devices, enabling all the security features
simultaneously can degrade performance. To avoid the performance degradation, integrate lower-end devices
with Secure Internet Gateways (SIG) that do most of the processing to secure enterprise traffic. When you
integrate a Cisco SD-WAN edge device with a SIG, all client internet traffic, based on routing or policy, is
forwarded to the SIG. In addition, the SIG can also protect roaming users, mobile users, and BYOD users.
• Options to Integrate Your Devices with Secure Internet Gateways, on page 203
Automatic Tunnels
Using the Cisco Secure Internet Gateway (SIG) feature template, you can provision automatic IPSec tunnels
to Cisco Umbrella SIGs, or automatic IPSec or GRE tunnels to Zscaler SIGs.
Provision an automatic tunnel as follows:
1. Complete any prerequisites for the SIG.
2. Specify Cisco Umbrella or Zscaler credentials using the Cisco SIG Credentials feature template.
3. Specify the details for the tunnel to the SIGs using the Cisco Security Internet Gateway (SIG) feature
template.
In the template, define the parameters for the tunnels such as the interface name, the source interface, the
SIG provider, and so on.
4. Edit the Cisco VPN feature template that provides the service route for the devices to the internet. Add a
service route to the SIG in the Cisco VPN feature template.
5. Add feature templates to the device templates of the devices that should route traffic to the SIG.
6. Attach the device templates to the devices.
When you attach the device template, the device sets up tunnels to the SIGs and redirects traffic to it.
Zscaler Integration
You can integrate Cisco SD-WAN edge devices to Zscaler SIGs by provisioning automatic IPsec or GRE
tunnels between the edge devices and the SIGs.
Automatic IPSec Tunnels: From Cisco IOS XE Release 17.5.1a and Cisco vManage Release 20.5.1, you can
provision automatic IPSec tunnels to Zscaler Internet Access (ZIA) Public Service Edges using the Cisco
Security Internet Gateway (SIG) feature template. ZIA Public Service Edges are secure internet gateways that
can inspect and secure traffic from Cisco SD-WAN devices. The devices use Zscaler APIs to create IPSec
tunnels by doing the following:
1. Establish an authenticated session with ZIA.
2. Based on the IP address of the device, obtain a list of nearby data centres.
3. Provision the VPN credentials and location using ZIA APIs.
4. Using the VPN credentials and location, create an IPSec tunnel between the ZIA Public Service Edges
and the device.
Automatic GRE Tunnels: From Cisco IOS XE Release 17.9.1a and Cisco vManage Release 20.9.1, you can
provision automatic GRE tunnels to Zscaler Internet Access (ZIA) Public Service Edges using the Cisco
Security Internet Gateway (SIG) feature template. The devices use Zscaler APIs to create the GRE tunnels.
For information on configuring automatic tunnelling, see Configure Automatic Tunnels Using Cisco vManage,
on page 207.
Manual Tunnels
You can create a GRE or IPSec tunnel to a third-party SIG or a GRE tunnel to a Zscaler SIG by defining the
tunnel properties in the Cisco Secure Internet Gateway (SIG) feature template.
Provision manual tunnels as follows:
1. Specify the details for the tunnel to the SIG by using the Cisco Security Internet Gateway (SIG) feature
template.
In the template, define the parameters for the tunnels such as the interface name, the source interface, the
SIG provider, and so on.
2. Edit the Cisco VPN feature template that provides the service route for the devices to the internet. Add a
service route to the SIG in the Cisco VPN feature template.
3. Add feature templates to the device templates of the devices that should route traffic to the SIG.
4. Attach the device templates to the devices.
When you attach the device template, the device sets up the defined IPSec or GRE tunnels to the SIG and
redirects traffic to it.
Back-up Tunnels: You can provision up to four IPSec tunnels to the secondary data center, one for each
active tunnel that you have provisioned to the primary data center. These tunnels to the secondary data center
serve as back-up tunnels. When an active tunnel fails, the traffic toward the SIG is sent through the
corresponding back-up tunnel. When you provision two or more back-up tunnels, the traffic toward the SIG
is distributed among these tunnels, increasing the available bandwidth toward the SIG. From Cisco IOS XE
Release 17.4.1 and Cisco vManage Release 20.4.1, you can distribute the traffic equally among the back-up
tunnels to achieve an ECMP distribution, or assign different weights to the back-up tunnels so that some
tunnels carry more traffic toward the SIG than the others.
By provisioning two or more active tunnels and distributing the traffic among them, while not provisioning
any back-up tunnels, you can create an active-active setup. By provisioning a back-up tunnel for each active
tunnel, you can create an active-back-up setup.
Note This configuration does not create a sticky mapping between source IP addresses and tunnels to the SIG. If
one or more of the tunnels are down, CEF maps source IP addresses to the remaining tunnels. During this
mapping, traffic from a particular source IP address may be sent to the SIG over a tunnel that is different from
the tunnel that was previously assigned.
Manual No Yes
Minimum releases: Cisco IOS XE Release 17.8.1a and Cisco
vManage Release 20.8.1
Related Topics
Create Automatic Tunnels Using a Cisco SIG Feature Template, on page 211
Create Manual Tunnels Using Cisco SIG Feature Template, on page 220
The Cisco IOS XE SD-WAN devices of your organization connect to Cisco Umbrella or Zscaler using a
common organization account with the SIG provider. As such, it is beneficial to configure the organization
account credentials on the devices through a global template. When you modify the Cisco Umbrella or Zscaler
credentials, update only one global template for the modified credentials to take effect on the attached Cisco
IOS XE SD-WAN devices.
Note After you upgrade Cisco vManage software from Cisco vManage Release 20.8.x or earlier to Cisco vManage
Release 20.9.1 or later, the device-model-specific Cisco SIG Credentials templates created in Cisco vManage
Release 20.8.x or earlier become read-only. The read-only status allows you to only view the configured
credentials. To update the credentials configured in Cisco vManage Release 20.8.x or an earlier release, create
a Cisco SIG Credentials template for the SIG provider.
If you try to create or modify a Cisco SIG feature template, Cisco vManage prompts you to create a global
Cisco SIG Credentials template for the SIG provider.
Related Topics
Create Cisco Umbrella SIG Credentials Template, on page 208
Create Zscaler SIG Credentials Template, on page 209
Configure Tunnels
Configure Automatic Tunnels Using Cisco vManage
Prerequisites
To configure automatic tunneling to a SIG, complete the following requisites:
• Cisco Umbrella: To configure automatic tunnels to Cisco Umbrella, you can do one of the following
• For Cisco vManage to fetch the API keys, specify Smart Account credentials here: Administration >
Settings > Smart Account Credentials. Your Cisco Smart Account is the account that you use to
log in to the Cisco Smart Software Manager (CSSM) portal.
• To manually specify the API keys, generate Umbrella Management API keys. See Management
and Provisioning > Getting Started > Overview in the Cloud Security API documentation on the
Cisco DevNet portal.
Specify the generated keys in the Cisco SIG Credentials template.
• Zscaler Internet Access (ZIA): To configure automatic tunnels to Zscaler, do the following:
1. Create partner API keys on the ZIA Partner Integrations page.
2. Add the Partner Administrator role to the partner API keys.
3. Create a Partner Administrator.
4. Activate the changes.
For more information, see Managing SD-WAN Partner Keys on the Zscaler Help Center.
Field Description
Field Description
Organization ID Enter the Cisco Umbrella organization ID (Org ID) for your
organization.
For more information, see Find Your Organization ID in the Cisco
Umbrella SIG User Guide.
Field Description
Field Description
Field Description
Partner base URI This is the base URI that Cisco vManage uses in REST API calls.
To find this information on the Zscaler portal, see ZIA Help > ZIA API
> API Developer & Reference Guide > Getting Started.
Field Description
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is titled Feature.
To fetch the parameters, Cisco vManage uses your Smart Account credentials to connect to the Cisco
Umbrella portal. To manually enter the parameters, generate the values in your Umbrella account as
described here.
c. For Zscaler, enter the following details:
Field Description
Organization The name of the organization in Zscaler cloud. To find this
information in Zscaler, see Administration > Company Profile.
Partner base URI This is the Zscaler Cloud API that Cisco SD-WAN uses to connect
to Zscaler. To find this information in Zscaler, see
Administration > API Key Management.
Username Username of the SD-WAN partner account.
Password Password of the SD-WAN partner account.
Partner API key The partner API key. To find the key in Zscaler, see Zscaler Cloud
Administration > Partner Integrations > SD-WAN.
9. Click Save.
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
Note From Cisco IOS XE Release 17.6.2 and Cisco vManage Relase 20.6.2 , you can create customized trackers
to monitor the health of automatic tunnels. If you do not customize the SLA parameters, Cisco vManage
creates a default tracker for the tunnel.
Field Description
Name Enter a name for the tracker. The name can be up to 128
alphanumeric characters.
Threshold Enter the wait time for the probe to return a response before
declaring that the configured endpoint is down.
Range: 100 to 1000 milliseconds
Default: 300 milliseconds.
Interval Enter the time interval between probes to determine the status of
the configured endpoint.
Range: 20 to 600 seconds
Default: 60 seconds
API url of endpoint Specify the API URL for the SIG endpoint of the tunnel.
d. Click Add.
e. To add more trackers, repeat sub-step b to sub-step d.
Field Description
Tunnel Type Click ipsec or gre.
Note Automatic GRE tunnels are supported from Cisco IOS
XE Release 17.9.1a and Cisco vManage Release 20.9.1
and only to Zscaler ZIA.
Field Description
Interface Name (0..255) Enter the interface name.
Note If you have attached the Cisco VPN Interface IPSec
feature template to the same device, ensure that the
interface number you enter is different from what you
have entered in the IPSec template.
Tunnel Source Interface Enter the name of the source interface of the tunnel. This interface
should be the egress interface and is typically the internet-facing
interface.
Data-Center For a primary data center, click Primary, or for a secondary data
center, click Secondary. Tunnels to the primary data center serve
as active tunnels, and tunnels to the secondary data center serve
as back-up tunnels.
Source Public IP Minimum supported releases: Cisco IOS XE Release 17.9.1a and
Cisco vManage Release 20.9.1
Public IP address of the tunnel source interface that is required
to create the GRE tunnel to Zscaler.
Default: Auto.
We recommend that you use the default configuration. With the
default configuration, the Cisco IOS XE SD-WAN device finds
the public IP address assigned to the tunnel source interface using
a DNS query. If the DNS query fails, the device notifies Cisco
vManage of the failure. Enter the public IP address only if the
DNS query fails.
Field Description
Shutdown Click No to enable the interface; click Yes to disable.
Default: No.
Field Description
Track this interface for SIG Enable or disable tracker for the tunnel. By default, Cisco
vManage enables a tracker for automatic tunnels.
Default: On.
TCP MSS Specify the maximum segment size (MSS) of TPC SYN packets.
By default, the MSS is dynamically adjusted based on the
interface or tunnel MTU such that TCP SYN packets are never
fragmented.
Range: 500 to 1460 bytes
Default: None
DPD Interval Specify the interval for IKE to send Hello packets on the
connection.
Range: 0 to 65535 seconds
Default: 10
IKE Diffie-Hellman Group Specify the Diffie-Hellman group to use in IKE key exchange,
whether IKEv1 or IKEv2.
• 2 1024-bit modulus
• 14 2048-bit modulus
• 15 3072-bit modulus
• 16 4096-bit modulus
Field Description
IPsec Rekey Interval Specify the interval for refreshing IPSec keys.
Range: 300 to 1209600 seconds (1 hour to 14 days)
Default: 3600 seconds
IPsec Replay Window Specify the replay window size for the IPsec tunnel.
Options: 64, 128, 256, 512, 1024, 2048, 4096.
Default: 512
Field Description
IPsec Cipher Suite Specify the authentication and encryption to use on the IPsec
tunnel.
Options:
• AES 256 CBC SHA1
• AES 256 CBC SHA 384
• AES 256 CBC SHA 256
• AES 256 CBC SHA 512
• AES 256 GCM
• NULL SHA1
• NULL SHA 384
• NULL SHA 256
• NULL SHA 512
Perfect Forward Secrecy • Specify the PFS settings to use on the IPsec tunnel.
• Choose one of the following Diffie-Hellman prime modulus
groups:
• Group-2 1024-bit modulus
• Group-14 2048-bit modulus
• Group-15 3072-bit modulus
• Group-16 4096-bit modulus
• None: disable PFS.
Default: None
e. Click Add.
f. To create more tunnels, repeat sub-step b to sub-step e.
11. To designate active and back-up tunnels and distribute traffic among tunnels, configure the following
in the High Availability section:
Field Description
Active Choose a tunnel that connects to the primary data center.
Field Description
Active Weight Enter a weight (weight range 1 to 255) for load balancing.
Load balancing helps in distributing traffic over multiple tunnels
and this helps increase the network bandwidth. If you enter the same
weights, you can achieve ECMP load balancing across the tunnels.
However, if you enter a higher weight for a tunnel, that tunnel has
higher priority for traffic flow.
For example, if you set up two active tunnels, where the first tunnel
is configured with a weight of 10, and the second tunnel with weight
configured as 20, then the traffic is load-balanced between the
tunnels in a 10:20 ratio.
Backup Weight Enter a weight (weight range 1 to 255) for load balancing.
Load balancing helps in distributing traffic over multiple tunnels
and this helps increase the network bandwidth. If you enter the same
weights, you can achieve ECMP load balancing across the tunnels.
However, if you enter a higher weight for a tunnel, that tunnel has
higher priority for traffic flow.
For example, if you set up two back-up tunnels, where the first
tunnel is configured with a weight of 10, and the second tunnel with
weight configured as 20, then the traffic is load-balanced between
the tunnels in a 10:20 ratio.
12. (Optional) Modify the default configuration in the Advanced Settings section:
Field Description
Umbrella Primary Data-Center Cisco vManage automatically selects the primary data center closest
to the WAN edge device. If you wish to route traffic to a specific
Cisco Umbrella data center, choose the data center from the
drop-down list.
Umbrella Secondary Cisco vManage automatically selects the secondary data center
Data-Center closest to the WAN edge device. If you wish to route traffic to a
specific Cisco Umbrella data center, choose the data center from
the drop-down list.
Field Description
Primary Data-Center Automatic IPSec tunnels: Cisco vManage automatically selects the
primary data center closest to the WAN edge device. If you wish to
route traffic to a specific Zscaler data center, choose the data center
from the drop-down list.
If you choose a data center that is not in the recommended list, the
Cisco IOS XE SD-WAN device reverts to the automatically selected
data center.
Secondary Data-Center Automatic IPSec tunnels: Cisco vManage automatically selects the
secondary data center closest to the WAN edge device. If you wish
to route traffic to a specific Zscaler data center, choose the data
center from the drop-down list.
If you choose a data center that is not in the recommended list, the
Cisco IOS XE SD-WAN device reverts to the automatically selected
data center.
Field Description
Zscaler Location Name Minimum supported releases: Cisco IOS XE Release 17.9.1a and
Cisco vManage Release 20.9.1
(Optional) Enter the name of a location that is configured on the
ZIA Admin Portal.
If you do not enter a location name, the Zscaler service detects the
location based on the received traffic.
For more information about locations, see ZIA Help > Traffic
Forwarding > Location Management > About Locations.
Authentication Required See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
XFF Forwarding See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
Enable Firewall See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
Enable IPS Control See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
Enable Caution See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
Enable Surrogate IP See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
Display Time Unit See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Minute
Idle Time to Disassociation See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: 0
Enforce Surrogate IP for See ZIA Help > Traffic Forwarding > Location Management >
known browsers Configuring Locations.
Default: Off
Field Description
Refresh Time Unit See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Minute
Refresh Time See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: 0
Enable AUP See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
First Time AUP Block Internet See ZIA Help > Traffic Forwarding > Location Management >
Access Configuring Locations.
Default: Off
Force SSL Inspection See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: Off
AUP Frequency See ZIA Help > Traffic Forwarding > Location Management >
Configuring Locations.
Default: 0
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
Note The option to create trackers and monitor tunnel health is available from Cisco IOS XE Release 17.8.1a, Cisco
vManage Relase 20.8.1.
Field Description
Name Enter a name for the tracker. The name can be up to 128
alphanumeric characters.
Threshold Enter the wait time for the probe to return a response before
declaring that the configured endpoint is down.
Range: 100 to 1000 milliseconds
Default: 300 milliseconds
Interval Enter the time interval between probes to determine the status of
the configured endpoint.
Range: 20 to 600 seconds
Default: 60 seconds
API url of endpoint Specify the API URL for the SIG endpoint of the tunnel.
Note Both HTTP and HTTPS API URLs are supported.
d. Click Add.
Field Description
Tunnel Type Based on the type of tunnel you wish to create, click ipsec or gre.
Track this interface for SIG Enable or disable tracker for the tunnel. By default, Cisco
vManage enables a tracker for automatic tunnels.
Default: On.
Tunnel Source Interface Enter the name of the source interface of the tunnel. This interface
should be an egress interface and is typically the internet-facing
interface.
Field Description
Shutdown Click No to enable the interface; click Yes to disable.
Default: No.
TCP MSS Specify the maximum segment size (MSS) of TPC SYN packets.
By default, the MSS is dynamically adjusted based on the
interface or tunnel MTU such that TCP SYN packets are never
fragmented.
Range: 500 to 1460 bytes
Default: None
Field Description
Shutdown Click No to enable the interface; click Yes to disable.
Default: No.
TCP MSS Specify the maximum segment size (MSS) of TPC SYN packets.
By default, the MSS is dynamically adjusted based on the
interface or tunnel MTU such that TCP SYN packets are never
fragmented.
Range: 500 to 1460 bytes
Default: None
DPD Interval Specify the interval for IKE to send Hello packets on the
connection.
Range: 0 to 65535 seconds
Default: 10
Field Description
IKE Rekey Interval Specify the interval for refreshing IKE keys
Range: 300 to 1209600 seconds (1 hour to 14 days)
Default: 14400 seconds
IKE Cipher Suite Specify the type of authentication and encryption to use during
IKE key exchange.
Choose one of the following:
• AES 256 CBC SHA1
• AES 256 CBC SHA2
• AES 128 CBC SHA1
• AES 128 CBC SHA2
IKE Diffie-Hellman Group Specify the Diffie-Hellman group to use in IKE key exchange,
whether IKEv1 or IKEv2.
Choose one of the following:
• 2 1024-bit modulus
• 14 2048-bit modulus
• 15 3072-bit modulus
• 16 4096-bit modulus
IKE ID for Local Endpoint If the remote IKE peer requires a local end point identifier, specify
the same.
Range: 1 to 64 characters
Default: Tunnel's source IP address
IKE ID for Remote Endpoint If the remote IKE peer requires a remote end point identifier,
specify the same.
Range: 1 to 64 characters
Default: Tunnel's destination IP address
Field Description
IPsec Rekey Interval Specify the interval for refreshing IPSec keys.
Range: 300 to 1209600 seconds (1 hour to 14 days)
Default: 3600 seconds
IPsec Replay Window Specify the replay window size for the IPsec tunnel.
Options: 64, 128, 256, 512, 1024, 2048, 4096.
Default: 512
IPsec Cipher Suite Specify the authentication and encryption to use on the IPsec
tunnel.
Choose one of the following:
• AES 256 CBC SHA1
• AES 256 CBC SHA 384
• AES 256 CBC SHA 256
• AES 256 CBC SHA 512
• AES 256 GCM
• NULL SHA1
• NULL SHA 384
• NULL SHA 256
• NULL SHA 512
Perfect Forward Secrecy Specify the PFS settings to use on the IPsec tunnel.
Choose one of the following Diffie-Hellman prime modulus
groups:
• Group-2 1024-bit modulus
• Group-14 2048-bit modulus
• Group-15 3072-bit modulus
• Group-16 4096-bit modulus
• None: disable PFS.
e. Click Add.
f. To create more tunnels, repeat sub-step b to sub-step e.
10. To designate active and back-up tunnels and distribute traffic among tunnels, configure the following
in the High Availability section:
Field Description
Active Choose a tunnel that connects to the primary data center.
Active Weight Enter a weight (weight range 1 to 255) for load balancing.
Load balancing helps in distributing traffic over multiple tunnels
and this helps increase the network bandwidth. If you enter the same
weights, you can achieve ECMP load balancing across the tunnels.
However, if you enter a higher weight for a tunnel, that tunnel has
higher priority for traffic flow.
For example, if you set up two active tunnels, where the first tunnel
is configured with a weight of 10, and the second tunnel with weight
configured as 20, then the traffic is load-balanced between the
tunnels in a 10:20 ratio.
Backup Weight Enter a weight (weight range 1 to 255) for load balancing.
Load balancing helps in distributing traffic over multiple tunnels
and this helps increase the network bandwidth. If you enter the same
weights, you can achieve ECMP load balancing across the tunnels.
However, if you enter a higher weight for a tunnel, that tunnel has
higher priority for traffic flow.
For example, if you set up two back-up tunnels, where the first
tunnel is configured with a weight of 10, and the second tunnel with
weight configured as 20, then the traffic is load-balanced between
the tunnels in a 10:20 ratio.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device .
9. In the Transport & Management VPN section, under Additional Cisco VPN 0 Templates, click
Cisco Secure Internet Gateway.
10. From the Cisco Secure Internet Gateway drop-down list, choose the Cisco SIG feature template that
you created earlier.
11. Click Additional Templates.
12. In the Additional Templates section,
a. Automatic tunneling:
(Cisco vManage Release 20.8.x and earlier) From the Cisco SIG Credentials drop-down list, choose
the relevant Cisco SIG Credentials feature template.
(From Cisco vManage Release 20.9.1) Cisco vManage automatically chooses the applicable global
Cisco SIG Credentials feature template based on the Cisco SIG feature template configuration.
Note If there are any changes to the SIG credentials, for these changes to take effect, you must first remove the SIG
feature template from the device template and push the device template. Thereafter, re-attach the SIG feature
template and then push the template to the device. For information on pushing the device template, see Attach
the SIG Template to Devices.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. For the desired template, click ... and click Attach Devices.
The Attach Devices dialog box displays.
4. In the Available Devices column, choose a group and search for one or more devices, choose a device
from the list, or click Select All.
5. Click the arrow pointing right to move the device to the Selected Devices column.
6. Click Attach.
7. If the template contains variables, enter the missing variable values for each device in one of the following
ways:
• Enter the values manually for each device either in the table column or by clicking ... in the row and
clicking Edit Device Template. When you are using optional rows, if you do not want to include
the parameter for the specific device, do not specify a value.
• Click Import File to upload a CSV file that lists all the variables and defines each variable value for
each device.
8. Click Update.
7. Click Update.
Security Events
1. From the Cisco vManage menu, choose Monitor > Security.
The Security Events pane shows how many critical, major, and minor security events Cisco IOS XE
SD-WAN devices have reported to Cisco vManage during a specified time period. The information is
displayed in a bar chart.
Cisco IOS XE SD-WAN devices notify security events to Cisco vManage using NETCONF. The security
events include events related to automatic SIG tunnel creation.
2. (Optional) By default, the pane displays security event information for the past 24 hours. To modify the
time period, hover the mouse pointer over 24 Hours and choose a desired time period from the drop-down
list.
3. (Optional) View Details: Click View Details to display the Monitor > Logs > Events page, with
information filtered for the Security component.
Events Dashboard
1. From the Cisco vManage menu, choose Monitor > Logs.
2. Click Events.
Cisco vManage displays any events that WAN edge devices and controllers have notified in the past three
hours.
3. Click Filter and configure the following:
Field Description
Component Choose the Security component.
System IP To view events notified by specific WAN edge devices, choose the
system IP of the devices.
Field Description
Event name To view information about one or more specific SIG tunnel events,
choose the corresponding event names.
Tip To view Cisco Umbrella SIG tunnel events, search for
events that have ftm-tunnel in the event name. To view
Zscaler SIG tunnel events, search for events that have
ftm-zia in the event name.
Click Apply.
If the target devices or controllers notified any of the chosen events, Cisco vManage displays information
about the same.
4. (Optional) To modify the time range, click 3 hours, select a time range, and click Apply.
Cisco vManage displays event information for the modified time range.
5. (Optional) Click Export to download a CSV file containing the table data.
The file is downloaded to your browser's default download location.
6. (Optional) Click on the gear icon adjacent to Export to display the Table Settings slide-in pane. Toggle
the columns that you wish to display or hide and click Apply.
2. (Optional) Click a section of the donut chart to view detailed information about tunnels having a particular
status.
Cisco vManage displays detailed information about the tunnels in the SIG Tunnels dashboard.
3. (Optional) Click All SIG Tunnels to view the SIG Tunnels dashboard.
Note Supported for Cisco Umbrella SIG endpoints. Yet to be supported for Zscaler
ZIA Public Service Edges.
Note Supported for Cisco Umbrella SIG endpoints. Yet to be supported for Zscaler
ZIA Public Service Edges.
• Events: Number of events related to the tunnel set up, interface state change, and tracker notifications.
Click on the number to display an Events slide-in pane. The slide-in pane lists all the relevant events
for the particular tunnel.
Note If you delete an automatic SIG tunnel from a GRE or IPSec interface and later
configure an automatic SIG tunnel from the same interface, the newly configured
SIG tunnel has the same name as the tunnel that you deleted earlier. As a result,
when you configure the new tunnel, you may see SIG-tunnel-related events that
were historically reported for the tunnel that was deleted earlier, if these events
are not yet purged.
3. (Optional) By default, the table displays information for the past 24 hours. To modify the time period,
hover the mouse pointer over 24 Hours and choose a desired time period from the drop-down list.
4. (Optional) To download a CSV file containing the table data, click Export.
The file is downloaded to your browser's default download location.
5. (Optional) Hide or display table columns: Click on the gear icon adjacent to Export to display the Table
Settings slide-in pane. Toggle the columns that you wish to display or hide and click Apply.
HTTP
TUNNEL IF TUNNEL
LOCATION
RESP
NAME TUNNEL NAME ID FQDN
TUNNEL FSM STATE ID LOCATION FSM
STATE LAST HTTP REQ CODE
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The following is a sample output of the show sdwan secure-internet-gateway zscaler tunnels command
for automatic GRE tunnels:
Minimum supported release: Cisco IOS XE Release 17.9.1a
Device# show sdwan secure-internet-gateway zscaler tunnels
HTTP
TUNNEL IF TUNNEL TUNNEL FSM LOCATION
LAST HTTP RESP
NAME TUNNEL NAME ID FQDN STATE ID LOCATION FSM
STATE REQ CODE
--------------------------------------------------------------------------------------------------------------------------
Tunnel100512 192.0.2.2_Tunnel100512 102489 n/a gre-add-tunnel 46206485
location-init-state activate-req 200
Tunnel100513 192.0.2.2_Tunnel100513 102489 n/a gre-add-tunnel 46206485
location-init-state activate-req 200
Manual Configuration for GRE Cisco IOS XE Release 17.2.1r This feature lets you manually configure a
Tunnels and IPsec Tunnels GRE tunnel by using the Cisco VPN
Interface GRE template or an IPSec tunnel
by using the Cisco VPN Interface IPSec
template. For example, use this feature to
manually configure a tunnel to a SIG.
Note From Cisco IOS XE Release 17.4.1, Cisco vManage Release 20.4.1, all SIG related workflows for Automatic
and Manual Tunnels have been consolidated into the SIG template. If you are using Cisco IOS XE Release
17.4.1, Cisco vManage Release 20.4.1, or later, configure GRE or IPSec tunnels to a generic SIG, or GRE
tunnels to a Zscaler SIG, using the SIG template.
Note To configure a GRE tunnel from Cisco vManage, use the SIG Feature Template. For more information, see
Create Manual Tunnels Using Cisco SIG Feature Template. The Cisco VPN Interface GRE template is no
longer used to configure a tunnel to a SIG.
For releases prior to Cisco vManage Release 20.8.1, use the Cisco VPN Interface GRE template.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
c. Choose the type of device for which you are creating the template.
d. Choose the Cisco VPN Interface GRE template from the group of VPN templates.
e. In Basic Configuration, configure parameters as desired and then click Save.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
b. Choose the type of device for which you are creating the template.
c. Choose the Cisco VPN template in the group of VPN templates.
d. Click GRE Route.
e. Click New GRE Route.
f. Configure parameters as desired, and then click Add.
3. Perform these actions to configure a device template for the GRE interface.
a. Click Device, and then click ...and click Edit for the device template that you want to configure.
b. Click Transport & Management VPN.
c. From the Additional Cisco VPN 0 Templates list, choose the Cisco VPN Interface GRE template.
d. From the Cisco VPN Interface GRE drop-down menu, click Create Template.
e. Configure the templates as desired, and then click Save.
Note To configure a IPSec tunnel from Cisco vManage, use the SIG Feature Template. For more information, see
Create Automatic Tunnels Using Cisco SIG Feature Template. The Cisco VPN Interface IPSec template is
no longer used to configure a tunnel to a SIG.
For releases prior to Cisco vManage Release 20.8.1, use the Cisco VPN Interface IPsec template.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
c. Choose the type of device for which you are creating the template.
d. Choose the Cisco VPN Interface IPsec template from the group of VPN templates.
e. In Basic Configuration, configure parameters as desired,
f. In Advanced, specify a name for your Tracker.
g. Click Save.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
b. Choose the type of device for which you are creating the template.
c. Choose the Cisco VPN template in the group of VPN templates.
d. Click IPSEC Route.
3. Perform these actions to configure a device template for the IPsec interface.
a. Click Device, and click … and choose Edit for the device template that you want to configure.
b. Click Transport & Management VPN.
c. From the Additional Cisco VPN 0 Templates list, choose the Cisco VPN Interface IPsec template.
d. From the Cisco VPN Interface IPsec drop-down menu, click Create Template.
e. Configure the templates as desired, and then click Save.
Description
By default, a tunnel created using the SIG template pushes the tunnel vrf multiplexing command. For VPN
Interface IPSec templates, from the Application drop-down list, if you choose Secure Internet Gateway,
the command is pushed. However, after you upgrade to Cisco vManage Release 20.3.2, your feature templates
may remove the tunnel vrf multiplexing configuration. This causes your feature templates to fail when
connecting to SIG services or other external services such as cloud security services.
Workaround
Depending on which feature template you want to update, do one of the following:
Cisco VPN Interface Feature Templates
1. In Cisco vManage, edit the template.
2. From the Application drop-down menu, choose Secure Internet Gateway.
Verification
You can run the following command to verify that tunnel vrf multiplexing was added to your templates:
show sdwan running-config interface tunnelNumber
Example:
Device#sh sdwan running-config interface | begin Tunnel100001
interface Tunnel100001
no shutdown
ip unnumbered GigabitEthernet1
ip mtu 1400
tunnel source GigabitEthernet1
tunnel destination dynamic
tunnel mode ipsec ipv4
tunnel protection ipsec profile if-ipsec1-ipsec-profile
tunnel vrf multiplexing
exit
GRE Over IPsec Tunnels Between Cisco IOS XE Release 17.7.1a This feature allows you to set up
Cisco IOS XE Devices GRE over IPsec tunnels with
Cisco vManage Release 20.7.1
IKEv2 RSA-SIG authentication on
Cisco IOS XE SD-WAN devices
in the controller mode to connect
to Cisco IOS XE devices in the
autonomous mode. This set up
enables Cisco IOS XE SD-WAN
devices to use OSPFv3 as the
dynamic routing protocol and
multicast traffic across the WAN
network.
You can configure GRE over IPsec
tunnels using the CLI device
templates in Cisco vManage for
Cisco IOS XE SD-WAN devices.
• Prerequisites for GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 240
• Restrictions for GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 240
• Information About GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 240
• Benefits of GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 240
• Use Case for GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 241
• Configure GRE Over IPsec Tunnels Between Cisco IOS XE Devices, on page 241
• Configure GRE Over IPsec Tunnels Between Cisco IOS XE Devices Using the CLI, on page 242
• Monitor GRE Over IPsec Tunnels Between Cisco IOS XE Devices Using the CLI, on page 243
Use Case for GRE Over IPsec Tunnels Between Cisco IOS XE
Devices
In this sample topology, there are Cisco IOS XE devices that are located in different data centers and branches.
Two Cisco IOS XE devices in the controller mode are located in the Cisco SD-WAN network, one in a data
center and another in a branch. The other two Cisco IOS XE devices in the autonomous mode are located in
a non-SD-WAN network. A GRE over IPsec tunnel is configured to connect the Cisco IOS XE devices from
the branch on the Cisco SD-WAN network to the data center located in the non-SD-WAN network.
Note Ensure that the tunnel source is configured with the global VPN for the WAN side and the tunnel VRF
configured with the service VPN for the Service side.
about using a device template, see Device Configuration-Based CLI Templates for Cisco IOS XE SD-WAN
Devices.
See the Configure GRE Over IPsec Tunnel section in Configure GRE Over IPsec Tunnels Between
Cisco IOS XE Devices Using the CLI for a sample configuration for use in the CLI template.
Note Note: Add the crypto pki trustpoint configuration command explicitly in the Cisco vManage CLI template.
interface Tunnel100
no shutdown
vrf forwarding 11
ip address 10.10.100.1 255.255.255.0
ipv6 address 2001:DB8:0:ABCD::1
ipv6 enable
ospfv3 100 ipv4 area 0
ospfv3 100 ipv6 area 0
tunnel source GigabitEthernet4
tunnel destination 10.0.21.16
tunnel path-mtu-discovery
tunnel protection ipsec profile ikev2_TP
exit
!
crypto ikev2 policy policy1-global
proposal p1-global
!
crypto ikev2 profile cisco
authentication local rsa-sig
authentication remote rsa-sig
identity local dn
Note The configurations for GRE over IPsec tunnels for Cisco IOS XE devices in the autonomous mode are the
same as in the controller mode shown above.
Furthermore, the steps to install certification authentication for Cisco IOS XE devices in the autonomous
mode is the same as in Cisco IOS XE SD-WAN devices, and there is no requirement for you to reconfigure
crypto pki trustpoint explicitly on the Cisco IOS XE devices in the autonomous mode.
CA Certificate
Status: Available
Version: 3
Certificate Serial Number (hex): 01
Certificate Usage: Signature
Issuer:
o=CRDC
ou=CRDC-Lab
cn=vCisco-CA
Subject:
o=CRDC
ou=CRDC-Lab
cn=vCisco-CA
Validity Date:
start date: 13:41:14 UTC Feb 9 2018
end date: 13:41:14 UTC Feb 9 2038
Subject Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (4096 bit)
Signature Algorithm: SHA1 with RSA Encryption
Fingerprint MD5: 5ECA97DB 97FF1B95 DFEEB8FB DAB6656F
Fingerprint SHA1: 73A7E91E 3AB12ABE 746348E4 A0E21BE3 8413130C
X509v3 extensions:
X509v3 Key Usage: 86000000
Digital Signature
Key Cert Sign
CRL Signature
X509v3 Subject Key ID: 91C2776C 651DF253 08FA9614 D2082F99 BEBF0B00
X509v3 Basic Constraints:
CA: TRUE
X509v3 Authority Key ID: 91C2776C 651DF253 08FA9614 D2082F99 BEBF0B00
Authority Info Access:
Cert install time: 08:29:23 UTC Oct 21 2021
Associated Trustpoints: TRUST_POINT_ex TRUST_POINT_100
Storage: nvram:CRDC#1CA.cer
Example 2
The following is sample output from the show crypto ipsec sa command to display the settings used by IPsec
security associations.
Device# show crypto ipsec sa
interface: Tunnel100
protected vrf: 11
local ident (addr/mask/prot/port): (10.0.20.15/255.255.255.255/47/0)
remote ident (addr/mask/prot/port): (10.0.21.16/255.255.255.255/47/0)
current_peer 10.0.21.16 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 2674, #pkts encrypt: 2674, #pkts digest: 2674
#pkts decaps: 2677, #pkts decrypt: 2677, #pkts verify: 2677
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
inbound ah sas:
outbound ah sas:
Example 3
The following example shows the show crypto session detail command output that displays the status
information for active crypto sessions.
Device# show crypto session detail
Crypto session current status
Interface: Tunnel100
Profile: cisco
Uptime: 03:59:01
Session status: UP-ACTIVE
Peer: 10.0.21.16 port 500 fvrf: (none) ivrf: 11
Phase1_id: cn=ROUTER2,o=Internet Widgits Pty Ltd,st=Some-State,c=AU
Desc: (none)
Session ID: 1780
IKEv2 SA: local 10.0.20.15/500 remote 10.0.21.16/500 Active
Capabilities:U connid:1 lifetime:20:00:59
IPSEC FLOW: permit 47 host 10.0.20.15 host 10.0.21.16
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 1668 drop 0 life (KB/Sec) KB Vol Rekey Disabled/2294
Outbound: #pkts enc'ed 1665 drop 0 life (KB/Sec) KB Vol Rekey Disabled/2294
Example 4
The following is sample output from the show crypto key mypubkey rsa command that displays the RSA
public keys of your device.
Device# show crypto key mypubkey rsa
Key name: TRUST_POINT_100
Key type: RSA KEYS
Storage Device: private-config
Usage: General Purpose Key
Key is not exportable. Redundancy enabled.
Key Data:
30820122 300D0609 2A864886 F70D0101 01050003 82010F00 3082010A 02820101
00B4E83F ABAE87DC DB7ACBB2 844F5FD6 FF2E9E02 DE49A302 D3D7884F 0B26EE6A
D3D56275 4D733A4F 5D974061 CE8FB520 54276D6D 3B132C82 EB8A3C24 115F77F5
C38740CE 1BBD89DB 3F766728 649B63FC 2C40C3AD 251656A1 BAF8341E 1736F03D
0A0D15AF 0E9D3E94 4E2074C7 BA572CA3 95B3D664 916ADA74 281CDE07 B3DD0B42
13289610 32E611AB 2B3B4EB6 0A3573B1 F097AC2A 3720961C 97597201 3CE8171C
F02B99B4 3B7B718F 83E221E1 E172554D C2BEA127 93882766 A28C5E8C 4B83BDC5
A161597D 2C3D8E13 3BE00D8F 02D0AD55 962DF402 599580A6 F049DBF4 045D751B
A8932156 10B29D9F 037AB33F C1FC463D E59E014C 27660223 546A8B3A E6997713
CF020301 0001
% Key pair was generated at: 00:22:51 UTC Oct 27 2021
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. From the Select Devices list, choose the devices that you want to associate with the template.
4. Under Basic Information, click Security App Hosting.
5. Enter Template Name and Description.
6. Under Security Policy Parameters, customize the security policy parameters if required.
• Enable or disable the Network Address Translation (NAT) feature, based on your use case. By default,
NAT is on.
• Click the drop-down arrow to set boundaries for the policy. The default is Default.
Global: Enables NAT for all devices attached to the template.
Device Specific: Enables NAT only for specified devices. If you select Device Specific, enter the
name of a device key.
Default: Enables the default NAT policy for devices attached to the template.
• Set Resource Profile. This option sets the number of snort instances to be used on a router. The
default is Low that indicates one snort instance. Medium indicates two instances and High indicates
three instances.
• Click the drop-down arrow to set boundaries for the resource profile. The default is Global.
Global: Enables the selected resource profile for all devices attached to the template.
Device Specific: Enables the profile only for specified devices. If you select Device Specific, enter
the name of a device key.
Default: Enables the default resource profile for devices attached to the template.
7. Set Download URL Database on Device to Yes if you want to download the URL-F database on the
device. In this case, the device looks up in the local database before trying the cloud lookup.
8. Click Save.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. From the Device Model drop-down list, choose the device model.
4. From the Device Role drop-down list, choose the device role.
5. Enter Template Name and Description.
6. Scroll down the page to the configuration submenus that let you select an existing template, create a new
template, or view the existing template. For example, to create a new System template, click Create
Template.
Note In Cisco vManage Release 20.7.1 and earlier releases, Device Templates is called Device.
3. In the row of the desired device template, click ... and choose Attach Devices.
4. In the Attach Devices window, select the desired devices from the Available Devices list, and click the
right-pointing arrow to move them to the Selected Devices list.
5. Click Attach.
Step 1 From the Cisco vManage menu, choose Monitor > Devices.
Cisco vManage Release 20.6.x and earlier: From the Cisco vManage menu, choose Monitor > Network.
Step 4 Scroll to the end of the device menu, and click Real Time.
The System Information page displays.
Step 5 Click the Device Options field, and choose Security App Version Status from the menu.
Step 6 The image name is displayed in the Recommended Version column. It should match the available SVI for your router
from the Cisco downloads website.
Step 1 From the Software Download page for your router, locate the image UTD Engine for IOS XE SD-WAN.
Step 2 Click download to download the image file.
Step 3 From the Cisco vManage menu, choose Maintenance > Software Repository
Step 4 Choose Virtual Images.
Step 5 Click Upload Virtual Image, and choose either vManage or Remote Server – vManage. The Upload Virtual Image
to vManage window opens.
Step 6 Drag and drop, or browse to the image file.
Step 7 Click Upload. When the upload completes, a confirmation message displays. The new virtual image displays in the
Virtual Images Software Repository.
Note If the IPS Signature Update option is enabled, the matching IPS signature package is automatically updated
as a part of the upgrade. You can enable the setting from Administration > Settings > IPS Signature Update.
To upgrade the application hosting virtual image for a device, follow these steps:
Step 1 Follow the steps in Upload the Correct Cisco Security Virtual Image to vManage to download the recommended
version of the SVI for your router. Note the version name.
Step 2 From the Cisco vManage menu, choose Maintenance > Software Repository > Virtual Images to verify that the image
version listed under the Recommended Version column matches a virtual image listed in the Virtual Images table.
Step 3 From the Cisco vManage menu, choose Maintenance > Software Upgrade. The WAN Edge Software upgrade page
displays.
Step 4 Choose the devices you want to upgrade, and check the check boxes in the leftmost column. When you have chosen one
or more devices, a row of options display, as well as the number of rows you chose.
Step 5 When you are satisfied with your choices, choose Upgrade Virtual Image from the options menu. The Virtual Image
Upgrade dialog box displays.
Step 6 For each device you have chosen, choose the correct upgrade version from the Upgrade to Version drop-down menu.
Step 7 When you have chosen an upgrade version for each device, click Upgrade. When the update completes, a confirmation
message displays.
Secure Cisco IOS XE This feature allows you to create and install private pairwise IPsec
Communication SD-WAN session keys for secure communication between an IPsec device and
Using Pairwise Release 16.12.1b its peers.
IPsec Keys
The IPsec pairwise keys feature implements controller-based key exchange protocol between a device and
controller.
Controller-based key exchange protocol is used to create a Gateway-to-Gateway VPN (RFC7018) in either
a full-mesh topology or dynamic full-mesh topology.
The network devices set up a protected control-plane connection to the controller. The controller distributes
policies to network devices. The network devices, in turn, communicate with each other through a secure data
plane.
A pair of IPsec session keys (one encryption key and one decryption key) are configured for each pair of local
and remote transport locations (TLOC).
• Supported Platforms, on page 253
• Pairwise Keys, on page 254
• IPsec Security Association Rekey, on page 254
• Configure IPSec Pairwise Keys, on page 254
Supported Platforms
The following platforms are supported for IPSec Pairwise Keys feature:
• Cisco IOS XE SD-WAN devices
• Cisco vEdge devices
Pairwise Keys
Key exchange method combined with authentication policies facilitate pairwise key creation between two
network devices. You use a controller to distribute keying material and policies between network devices.
The devices generate private pairwise keys with each other.
IPsec devices share public keys from the Diffie-Hellman (DH) algorithm with the controllers. The controllers
relay the DH public keys to authorized peers of the IPsec device as defined by the centralized policy.
Network devices create and install private pairwise IPsec session keys to secure communication with their
peers.
Note • A pairwise-key device can form IPsec sessions with both pairwise and nonpairwise devices.
• The rekeying process requires higher control plane CPU usage, resulting in lower session scaling.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. From the Device Model drop-down menu, choose the type of device for which you are creating the
template.
4. From Basic Information, click Cisco Security feature template.
5. From Basic Configuration, click On or Off from the IPsec pairwise-keying field.
6. Alternatively, enter the pairwise key specific to the device in the Enter Key field.
7. Click Save.
Note You must reboot the Cisco IOS XE SD-WAN device for the private-key configuration to take effect.
Use the following command to verify the inbound connections on IPsec pairwise keys:
Device# show sdwan ipsec pwk inbound-connections
SOURCE
DEST LOCAL LOCAL REMOTE REMOTE
SA PKEY NONCE PKEY SS D-KEY AH
SOURCE IP PORT DEST IP
PORT TLOC ADDRESS TLOC COLOR TLOC ADDRESS TLOC COLOR PWK-SPI
INDEX ID HASH HASH HASH HASH AUTH
----------------------------------------+--------+----------------------------------------+--------+----------------+----------------+----------------+----------------+---------+------+------+------+------+------+------+----
192.168.90.3 12346 10.168.11.3
12346 10.1.0.2 lte 10.1.0.1 private1 000000
2 1 5605 70C7 17B0 F5A5 true
192.168.92.6 12346 10.168.11.3
12346 10.1.0.2 lte 10.1.0.6 default 00100B
52 1 5605 70C7 CCC2 C9E1 true
192.168.90.3 12346 10.168.12.3
12346 10.1.0.2 blue 10.1.0.1 private1 000000
5 1 B9F9 5C75 17B0 F5A5 true
192.168.92.6 12346 10.168.12.3
12346 10.1.0.2 blue 10.1.0.6 default 00100B
55 1 B9F9 5C75 A0F8 7B6B true
SA
PKEY NONCE PKEY
TLOC-ADDRESS TLOC-COLOR SOURCE-IP SOURCE PORT SPI INDEX ID
---------------+---------------+---------------------------------------+-------+-------+-----+-----+-----+-----
10.1.0.2 lte 10.168.11.3 12346 257 6 1 5605
70C7
10.1.0.2 blue 10.168.12.3 12346 257 3 1 B9F9
5C75
Device# show platform hardware qfp active feature ipsec da spi
Use the following command to display IPsec pairwise keys information on a Cisco IOS XE SD-WAN device:
Device# show sdwan security-info
Single Sign-On Using Cisco vManage Release This feature adds support for Azure Active Directory
Azure Active Directory 20.8.1 (AD) as an external identity providers (IdP) for single
(AD) sign-on of Cisco vManage users.
You can configure Azure AD as an external IdP using
Cisco vManage and the Azure AD administration
portal.
Note For Cisco vManage 20.3.x release and later, use IdP SAML metadata with 2048-bit key signature certificate
for SSO authentication because metadata with 1024-bit key signature certificate is not supported.
Network administrators must access different websites or applications to carry out their operations. To access
these websites or applications, they must have multiple sets of credentials for each website or application.
There's a possibility that they have forgotten their credentials, or someone has stolen them. With the help of
the single sign-on (SSO) technique, network administrators can now have a secured access to multiple
applications or websites with only one set of credentials.
For the SSO to work, we mainly require three components:
• Identity provider (IdP): This system stores user data, maintains and supports the authentication
mechanism, for example, Okta, ADFS, PingID, and Azure AD.
• Service provider: This system hosts the website or application of interest, for example, Cisco vManage.
• Users: People with a registered account with the IdP and the service provider.
To integrate IdPs with service providers, the SSO uses security assertion mark-up language (SAML). SAML
is an XML-based communication standard that allows you to share identities among multiple organizations
and applications.
The following steps describe the intergration of IdPs with service providers:
1. Whenever a network administrator tries to log in to a service provider using an IdP, the service provider
first sends an encrypted message to the IdP.
2. The IdP decrypts the message and validates the credentials of the network administrator by comparing
the information with the IdP's database.
3. After the validation, the IdP sends an encrypted message to the service provider. The service provider
decrypts the message from the IdP, and the administrator is allowed to access the service provider.
4. In general, IdP and service provider exchange information based on predefined standards. This standard
is a set of certificates called SAML.
After completing the above process, the administrator is redirected to the IdP portal. The administrator must
enter IdP credentials to log in to Cisco vManage.
Note The privileges for a particular administrator are provided based on the information available about that
administrator in the IdP's database.
Note Beginning with Cisco vManage Release 20.3.1, Cisco vManage no longer supports MD5 or SHA-1. All x.509
certificates handled by Cisco vManage need to use at least SHA-256 or a higher encryption algorithm.
Note Each IdP application gets a customized URL from Okta for logging in to the Okta website.
Encryption Certificate Not applicable a. Copy the encryption certificate from the
metadata you downloaded.
b. Go to www.samltool.com and click X.509
CERTS, paste there. Click Format X.509
Certificate.
c. Ensure to remove the last empty line and
then save the output (X.509.cert with
header) into a text file encryption.cer.
d. Upload the file. Mozilla Firefox may not
allow you to do the upload. Instead, you
can use Google Chrome. You should see
the certificate information after uploading
to Okta.
Note It is mandatory to use the two strings, Username and Groups, exactly as shown above. Otherwise, you may
be logged in with the default group of Basic.
6. Edit the Cisco vManage metadata file by deleting everything from <ds:Signature
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> to </ds:Signature>.
7. Edit the Cisco vManage metadata file by deleting everything from <md:KeyDescriptor
use="encryption"> to </md:KeyDescriptor>.
8. Import the new modified Cisco vManage metadata file into ADFS, and enter the entityID as Display
Name.
9. Click Next until the end.
10. Open Edit Claim Rule, and add the following four new custom rules in the exact sequence:
@RuleName = "sAMAccountName as Username" c:[Type ==
"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
Issuer == "AD AUTHORITY"]=> issue(store = "Active Directory", types
= ("Username"), query = ";sAMAccountName;{0}", param = c.Value);
@RuleName = "sAMAccountName as NameID" c:[Type ==
"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
Issuer == "AD AUTHORITY"] => issue(store = "Active Directory", types
=
("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"),
query = ";sAMAccountName;{0}", param = c.Value);
Note If you are using different naming convention for the two security groups, then you have to modify the regular
expression value "(?i)^SSO-" in the step above.
Any active directory users who are not members of the two groups will only have Basic access to Cisco
vManage.
5. Navigate to https://www.samltool.com/format_x509cert.php.
6. For Signing certificate, copy Signing certificate from “metadata” [everything between
<ds:X509Certificate> and </ds:X509Certificate>].
7. Navigate to www.samltool.com page, click X.509 CERTS > Format X.509 Certificate, and paste
the copied content
8. Save the output (“X.509 cert with header”) into a text file “Signing.cer”. Remember to remove the last
empty line.
20. Open the Edit Claim Rules window, and verify that the rules display in Assurance Transform Rules.
21. Click Finish.
22. Open Properties window of the newly created Relying Party Trust, and click Signature.
23. Click Add, and add the Signing.cer created in Step 6.
24. In the Active Directory, click General, and enter the following two security groups in the Group name
text box:
SSO-Netadmin
SSO-Operator
Note If you use different naming convention for the two security groups, then you have to modify the Regular
expression value for (?i)^SSO- mentioned in Step 19.
Note Any active directory user who is NOT a member of these two groups, will only have Basic access to Cisco
vManage.
Prerequisites:
1. In Cisco vManage, ensure that identity provider settings (Administration Settings > Identity Provider
Settings) are set to Enabled.
2. Download the Cisco vManage SAML metadata file to export to PingID.
For more information on these procedures, see Enable an Identity Provider in Cisco vManage. The steps
are the same as for configuring Okta as an IdP.
8. Under the Provide SAML details about the application you are connecting to section, configure the
following fields:
a. For Protocol Version, click SAMLv2.0.
b. On Upload Metadata, click Select File to upload the saved Cisco vManage SAML metadata file
to PingID.
PingID should be able to decode the metadata file and fill in the other fields.
c. Verify that the following fields and values are entered correctly.
Field Value
Field Value
b. Click Save.
2. Create a Cisco vManage cluster consisting of three Cisco vManage instances. See the Cluster Management
chapter in the Cisco SD-WAN Getting Started Guide.
3. Download SAML metadata based on the IDP from the first Cisco vManage instance, and save it into a
file.
4. Configure SSO for Okta, ADFS, or PingID.
5. Note and save the SAML response metadata information that you need for configuring Okta, ADFS, or
PingID with Cisco vManage.
6. In the first instance of Cisco vManage, navigate to Administration > Settings > Identity Provider
Settings > Upload Identity Provider Metadata, paste the SAML response metadata information, and
click Save.
When you log in to the Cisco vManage cluster now, the first instance of Cisco vManage redirects SSO using
an IDP. The second and third instances of the cluster also redirect SSO using IDP.
If the first instance of Cisco vManage cluster or the application server isn't available, the second and third
instances of the cluster try redirecting SSO using an IDP. However, the SSO login fails for the second and
third instances of the Cisco vManage cluster. The only option available for accessing the second and third
instances of the Cisco vManage cluster is by using the local device authentication, which is "/login.html".
Single Sign-On Using Cisco vManage Release This feature adds support for Azure Active Directory
Azure Active Directory 20.8.1 (AD) as an external identity providers (IdP) for single
(AD) sign-on of Cisco vManage users.
You can configure Azure AD as an external IdP using
Cisco vManage and the Azure AD administration
portal.
Minimum supported releases: Cisco IOS XE Release 17.8.1a and Cisco vManage Release 20.8.1
The configuration of Cisco vManage to use Azure AD as an IdP involves the following steps:
1. Export Cisco vManage metadata to Azure AD. For details, see Export Cisco vManage Metadata to Azure
AD
2. Configure SSO using Azure AD and import Azure AD metadata to Cisco vManage. For details, see
Configure Single Sign-On Using Azure AD and Import Azure AD Metadata to Cisco vManage
3. Click Enabled.
4. Click Click here to download the SAML metadata and save the contents in a text file.
Field Value
Groups netadmin
userprincipalname user.userprincipalname
Port Security Support for Cisco IOS XE Release 17.3.1a The feature allows you to configure
Switchports on Cisco IOS XE switchports on Edge platforms with
Cisco vManage Release 20.3.1
SD-WAN Devices switching modules to restrict input
Cisco SD-WAN Release 20.3.1 to an interface by limiting and
identifying MAC addresses of the
workstations that are allowed to
access the port.
Cisco C8300 series Edge platforms with SM-X-16G4M2X, and SM-X-40G8M2X switching modules:
• C8300-1N1S-6T
• C8300-1N1S-4T2X
• C8300-2N2S-6T
• C8300-2N2S-4T2X
Note If the port shuts down, all dynamically learned addresses are removed.
• You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured,
stored in the address table, and added to the running configuration. If these addresses are saved in the
configuration file, the interface does not need to dynamically relearn them when the switch restarts.
Although sticky secure addresses can be manually configured, it is not recommended.
Enable sticky learning to configure an interface to convert the dynamic MAC addresses to sticky secure MAC
addresses and to add them to the running configuration. To enable sticky learning, enter the switchport
port-security mac-address sticky command. When you enter this command, the interface converts all the
dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was
enabled, to sticky secure MAC addresses.
The sticky secure MAC addresses do not automatically become part of the configuration file, which is the
startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the
configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do
not save the configuration, they are lost.
If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses
and are removed from the running configuration.
Note switchport port-security and switchport port-security mac-address sticky configuration commands are
validated. There are other port-security commands available, but we recommend not to use them for Cisco
SD-WAN Release 20.3.1.
Configuration Example
The following example shows how to configure a secure MAC address on GigabitEthernet 1/0/1:
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# switchport port-security
Device(config-if)# switchport port-security mac-address sticky
Device(config-if)# end
Support for SGT Cisco IOS XE Release This feature enables Cisco IOS XE SD-WAN edge devices
Propagation with Cisco 17.3.1a to propagate Security Group Tag (SGT) inline tags that are
TrustSec Integration generated by Cisco TrustSec-enabled switches in the
Cisco vManage
branches to other edge devices in the Cisco SD-WAN
Release 20.3.1
network. While Cisco TrustSec-enabled switches does
classification, propagation (inline SGT tagging) and
enforcement on the branches, Cisco IOS XE SD-WAN
devices carry the inline tags across the edge devices.
SD-WAN devices support propagation of SGT. See Configure SGT Inline Tagging Using Cisco vManage,
on page 281
When Inline tagging is not used (or not possible), an SXP protocol can be used to dynamically exchange IP
address binding to SGT between Cisco IOS XE SD-WAN devices. You can also manually configure IP address
to SGT binding, statically, in Cisco vManage. See SGT Propagation Using SXP, on page 285
Enforcement of SGT is achieved using Security Group Access Control Lists (SGACL) where policies can be
dynamically or statically configured and applied to the egress traffic on the network. See SGT Enforcement,
on page 297
Prerequisites
• Branches must be equipped with Cisco TrustSec-enabled switches that are capable of handling SGT
inline tagging.
• Cisco IOS XE SD-WAN devices running on Cisco IOS XE Release 17.3.1a and later.
In this illustration, Branch 1 and Branch 2 are equipped with Cisco TrustSec-enabled switches, and these
branches are connected to the Cisco IOS XE SD-WAN devices. The Cisco TrustSec switch in Branch 1
performs SGT Inline tagging in the Ethernet CMD frame toward Edge Router 1. Edge Router 1 then
de-encapsulates the CMD frame, extracts the SGT, and propagates it over Cisco SD-WAN IPSec or GRE
tunnels. The Edge Router 2 on Cisco SD-WAN extracts the SGT from Cisco SD-WAN, generates the Ethernet
CMD frame, and copies the that is SGT received. The Cisco TrustSec switch on Branch 2 inspects the SGT,
and looks it up against the destination SGT to determine if the traffic must be allowed or denied.
The following image is an illustration of SGT being carried through in an SD-WAN packet and an additional
eight bytes of data is added to it.
Figure 9: SGT Propagation
The following table describes how SGT propagation between edge devices in the Cisco SD-WAN network
varies based on the type of edge device and software release installed on the device.
Table 56: SGT Propagation with Cisco IOS XE SD-WAN Devices of Different Releases Interconnected in Cisco SD-WAN
Cisco IOS XE Release 17.3.1a Cisco IOS XE SD-WAN device • Traffic with SGT is forwarded
with Cisco IOS XE Release 17.3.1a to the Cisco IOS XE
or later SD-WAN device.
• If Cisco TrustSec is enabled
on the Cisco IOS XE
SD-WAN device, traffic with
SGT along with the CMD
header is forwarded to the
switch. If Cisco TrustSec is
not enabled on the Cisco IOS
XE SD-WAN device, traffic
without the SGT and CMD
header is forwarded to the
switch.
Supported NIMs
The following WAN NIMs are supported for Cisco 4000 Series Integrated Services Routers platforms:
• NIM-1GE-CU-SFP
• NIM-2GE-CU-SFP
• SM-X-4x1G-1x10G
• SM-X-6X1G
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
In the CTS SGT Propagation field, click On to enable SGT propagation for inline tagging. By default,
this option is disabled.
7. Click TrustSec.
8. Enable the Cisco TrustSec SGT propagation feature. By default, this feature is disabled.
9. To use the Cisco TrustSec SGT propagation feature, from the Enable SGT Propagation drop-down
menu, choose Global, and then click On. Additional propagation options are displayed.
10. To propagate SGT in Cisco SD-WAN, set Propagate to On.
The following table displays the SGT propagation options, and the LAN to WAN and WAN to LAN
behavior based on the option you choose for SGT propagation. The options are displayed in the following
table and available to you only if you set the Enable SGT Propagation to On.
Propagate = On SGT is propagated from SGT is propagated from This is the most
LAN to WAN. WAN to LAN. common configuration.
Security Group Tag =
Usually, the SGT value
<SGT Value>
is 2 defined for Cisco
Trusted = On TrustSec devices on
Cisco Identity Services
Engine (ISE).
Propagate = On SGT is propagated from SGT is propagated from Overrides the incoming
LAN to WAN with a WAN to LAN. No effect SGT from LAN to WAN
Security Group Tag =
configured SGT value. to the incoming SGT. because Trusted is set
<SGT Value>
to Off.
Trusted = Off
Propagate = Off SGT is propagated from SGT is not added to the Overrides the incoming
LAN to WAN with a LAN packets. SGT from LAN to WAN
Security Group Tag =
configured SGT value. because Trusted is set
<SGT Value> SGT is not propagated
to Off.
to LAN.
Trusted = Off
Propagate = On SGT propagated from SGT is propagated from This can be configured
LAN to WAN with SGT WAN to LAN with SGT only on a physical
value value 0. interface if there are
existing sub interfaces.
. 0
Note Enterprise Network Compute System (ENCS) LAN and WAN ports allow propagation of SGT tags on its
physical ports. The LAN interfaces must be connected to the LAN side and the WAN interfaces must be
connected to the WAN side of the network. You must deploy Cisco Catalyst 8000V router or Integrated
Services Virtual router to process the tagging.
! VRF 1
vrf definition 1
rd 1:1
!
! VRF 2
vrf definition 2
rd 1:2
!
! sub-interface on VRF 1
interface GigabitEthernet0/0/2.2
encapsulation dot1Q 2
vrf forwarding 1
ip address 77.27.9.2 255.255.255.0
ip mtu 1500
cts manual
policy static sgt 2 trusted
!
! sub-interface on VRF 2
interface GigabitEthernet0/0/2.3
encapsulation dot1Q 3
vrf forwarding 2
ip address 77.27.19.2 255.255.255.0
ip mtu 1500
cts manual
policy static sgt 2 trusted
!
! BGP configuration
router bgp 64005
bgp log-neighbor-changes
distance bgp 20 200 20
!
! BGP neighbor VRF 1
address-family ipv4 vrf 1
network 77.27.9.0 mask 255.255.255.0
redistribute connected
redistribute static
redistribute omp
neighbor 77.27.9.1 remote-as 64006
neighbor 77.27.9.1 activate
neighbor 77.27.9.1 send-community both
exit-address-family
!
! BGP neighbor VRF 2
address-family ipv4 vrf 2
redistribute connected
redistribute static
redistribute omp
neighbor 77.27.19.1 remote-as 64006
neighbor 77.27.19.1 activate
neighbor 77.27.19.1 send-community both
exit-address-family
!
SGT Propagation Cisco IOS XE Release With this feature, Cisco IOS XE SD-WAN devices can
Using SXP and 17.5.1a exchange SGT over the overlay network using SXP. Use
SGACL Enforcement SXP when your hardware does not support Inline
Cisco vManage
propagation of SGTs.
Release 20.5.1
This feature also extends support for SGACL enforcement
on Cisco IOS XE SD-WAN devices by configuring SGACL
policies.
You can use SXP to propagate SGTs across network devices if your hardware does not support inline tagging.
Using Cisco Identity Services Engine (ISE), you can create an IP-to-SGT binding (Dynamic IP-SGT) and
then download IP-SGT binding using SXP to a Cisco IOS XE SD-WAN device for propagation of the SGT
over the Cisco SD-WAN network. See Configure SXP for Dynamic IP-SGT Binding Using Cisco vManage,
on page 288.
Alternatively, you have the option to manually configure IP-SGT binding (Static IP-SGT) and then push the
configuration to a Cisco IOS XE SD-WAN device using a CLI Add-On template to propagate SGT over the
Cisco SD-WAN network. See Configure Static IP-SGT Binding Using Cisco vManage, on page 291.
Prerequisites
• You must enable Cisco TrustSec and propagation through SXP on the devices in a Cisco SD-WAN
network.
• Cisco ISE version must be 2.6 or later.
Points to Consider
• Cisco ISE has a limit on the number of SXP sessions it can handle. Therefore, as an alternative, you can
use SXP reflector for horizontal scaling.
• Static IP-SGT configuration is based on the CLI Add-On template and not using a Feature template in
vManage.
• From Cisco IOS XE Release 17.5.1a, Cisco vManage Release 20.5.1, we recommend that you use an
SXP reflector to establish an SXP peering with Cisco IOS XE SD-WAN devices. This is because when
you use an SXP Reflector, the SXP filtering option ensures that only relevant IP-SGT bindings for the
local service side networks are pushed down to the Cisco IOS XE SD-WAN device. Overlapping or
remote entries coming though SXP can have an adverse effect on the Overlay routing. See SXP Reflectors,
on page 288
Supported NIMs
The following WAN NIMs are supported on Cisco 4000 Series Integrated Services Routers platforms:
• NIM-1GE-CU-SFP
• NIM-2GE-CU-SFP
• SM-X-4x1G-1x10G
• SM-X-6X1G
If a branch is equipped with Cisco TrustSec-enabled hardware, the branch is referred to as a TrustSec branch.
You can propagate SGTs to a TrustSec branch through inline tagging. For information about Inline Tagging,
see SGT Propagation in Cisco SD-WAN, on page 278.
If a branch is not equipped with Cisco TrustSec-enabled hardware, the branch is referred to as a non-TrustSec
branch. You can propagate SGT to a non-TrustSec branch using SXP.
In the case of a non-TrustSec branch, for SD-WAN ingress, a Cisco IOS XE SD-WAN device performs SGT
tagging based on source IP address of the packet and IP-SGT binding dynamically learned from ISE using
SXP or based on static IP-SGT binding configuration. For SD-WAN egress, the Cisco IOS XE SD-WAN
device performs a destination SGT lookup based on the destination IP address using IP-SGT bindings (received
through SXP or static configuration), and the SGT is determined. Policies for the SGT traffic on SD-WAN
egress is enforced either by downloading SGACL policies from ISE or by configuring static SGACL policies.
SXP Reflectors
SXP reflectors are used when you need to have multiple connections to communicate information about
IP-SGT bindings over a network. Because Cisco ISE has a limit on the number of SXP sessions it can handle,
as an alternative, you can use Cisco ASR1000 routers, with the SXP reflector functionality enabled for
horizontal scaling between ISE and the Cisco IOS XE SD-WAN device.
You can configure an SXP connection to an SXP reflector the same way you configure an SXP connection
to ISE. For information about configuring SXP reflector, see Configure SXP Reflector using the CLI, on page
293.
We recommend an SXP reflector to establish SXP peering with Cisco IOS XE SD-WAN devices. When you
use an SXP reflector, the SXP filtering configuration ensures that only relevant IP-SGT bindings for the local
service-side networks are pushed down to the Cisco IOS XE SD-WAN devices. Overlapping or remote entries
coming through an SXP can have an adverse effect on overlay routing.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under OTHER TEMPLATES section, choose TrustSec.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can
contain only uppercase and lowercase letters, the digits 0 - 9, hyphens (-), and underscores (_). It cannot
contain spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any of the characters and spaces.
Key Chain Name Enter a name to configure the key chain for SXP.
Log Binding Changes Click On to enable logging for IP-to-SGT binding changes.
Reconciliation Period (seconds) Enter a time (in seconds) to configure the SXP reconciliation period.
After a peer terminates an SXP connection, an internal hold-down timer starts. If the peer
reconnects before the internal hold-down timer expires, the SXP reconciliation period timer
starts. While the SXP reconciliation period timer is active, the Cisco TrustSec software retains
the SGT mapping entries learned from the previous connection and removes the invalid
entries. The default value is 120 seconds (2 minutes). Setting the SXP reconciliation period
to 0 seconds disables the timer and causes all the entries from the previous connection to be
removed.
Retry Period (seconds) Enter a time (in seconds) to configure the retry period for SXP reconnection.
Speaker Hold Time (seconds) Enter time (in seconds) to configure the global hold-time period for a speaker device.
Minimum Listener Hold Time Enter a time (in seconds) to configure the minimum allowed hold-time period for a listener
(seconds) device.
Maximum Listener Hold Time Enter a time (in seconds) to configure the maximum allowed hold-time period for a listener
(seconds) device.
Node ID Enter a node ID. A node ID is used to identify the individual devices within the network.
Mode Choose a connection mode. Local refers to the local device, and Peer refers to a peer device.
Mode Type Choose a role for the device.
Minimum Hold Enter time (in seconds) to configure the minimum hold time for the SXP connection.
Time
Maximum Hold Enter time (in seconds) to configure the maximum hold time for the SXP connection.
Time
VPN ID Enter a VPN or VRF ID for the SXP connection.
Note Maximum Hold Time and Minimum Hold Time can be configured only when you choose Mode as Local
and Mode Type as Listener, or when Mode is Peer and Mode Type is Speaker.
Only Minimum Hold Time is configurable when Mode is Local and Mode Type is Speaker or when Mode
is Peer and Mode Type is Listener.
Hold time cannot be configured if you choose Mode Type as Both (that is Listener and Speaker).
Device(config)# cts sxp connection peer 10.201.1.2 source 10.29.1.1 password key-chain mode
local both vrf 1
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under OTHER TEMPLATES section, choose CLI Add-On Template as the feature template.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can contain
only uppercase and lowercase letters, the digits 0 - 9, hyphens (-), and underscores (_). It cannot contain
spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any of the characters and spaces.
7. In the CLI Configuration area, enter the following configuration:
cts role-based sgt-map vrf instance_name {ipv4_netaddress|ipv4_netaddress/prefix} sgt
sgt-number
cts role-based sgt-map vrf instance_name host {ipv4_hostaddress} sgt sgt-number
8. Click Save to save this configuration. This configuration can now be pushed to a Cisco IOS XE SD-WAN
device for propagation of the SGT over a Cisco SD-WAN network.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under BASIC INFORMATION section, choose Cisco Security as the feature template.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can contain
only uppercase and lowercase letters, the digits 0 through 9, hyphens (-), and underscores (_). It cannot
contain spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any of the characters and spaces.
7. Configure TCP-AO key chain and keys.
Send ID Specify the send identifier for the key. Range: 0 to 255.
Receiver ID Specify the receive identifier for the key. Range: 0 to 255.
Include TCP Options This field indicates whether TCP options other than TCP-AO must be used to calculate Message
Authentication Codes (MACs).
A MAC is computed for a TCP segment using a configured MAC algorithm, relevant traffic keys, and the
TCP segment data prefixed with a pseudoheader.
When options are included, the content of all options is included in the MAC with TCP-AO's MAC field
is filled with zeroed.
When the options are not included, all options other than TCP-AO are excluded from all MAC calculations.
Accept AO Mismatch This field indicates whether the receiver must accept the segments for which the MAC in the incoming
TCP-AO does not match the MAC that is generated on the receiver.
Crypto Algorithm Specify the algorithm to be used to compute MACs for TCP segments. You can choosese one of these:
• aes-128-cmac
• hmac-sha-1
• hmac-sha-256
Key String Specify the master key for deriving the traffic keys.
The master keys must be identical on both the peers. If the master keys do not match, authentication fails
and segments may be rejected by the receiver. Range: 0 to 80 characters.
Accept Lifetime Specify the time in seconds that is entered in Cisco vManage for which the key to be accepted for TCP-AO
Local authentication is valid.
Specify the start time in the local time zone. By default, the start time corresponds to UTC time. The end
time can be specified in three ways—infinite (no expiry), duration (1 to 2147483646 sec), exact time –
(either UTC or local).
Note When you configure a key chain for an SXP connection, at least one key in the key chain must be configured
with the current time. All keys in the key chain cannot be configured completely with a future time.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under Basic Information, choose Cisco AAA as the feature template.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can
contain only uppercase and lowercase letters, the digits 0 through 9, hyphens (-), and underscores (_).
It cannot contain spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any of the characters and spaces.
7. Click Radius to configure a connection to a RADIUS server. The followin fields are displayed:
Authentication Enter the UDP destination port to use for authentication requests to the RADIUS server. If the server is not
Port used for authentication, configure the port number to be 0. Range: 0 to 65535.
Accounting Port Enter the UDP port that will be used to send 802.1X and 802.11i accounting information to the RADIUS
server. Range: 0 to 65535.
Timeout Specify how long to wait to receive a reply from the RADIUS server before retransmitting a request.
Range: 1 through 1000.
Key Enter the key the Cisco IOS XE SD-WAN device passes to the RADIUS server for authentication and
encryption. You can enter the key as a text string from—1 to 31 characters long,—and it is immediately
encrypted, or you can type an AES 128-bit encrypted key. The key must match the AES encryption key used
on the RADIUS server.
8. Click Radius Group to add a new RADIUS group. The following fields are displayed:
Parameter Description
Name
Group Name Displays the RADIUS group name. This field is automatically populated based on the VPN ID that you configure.
VPN ID Enter a VPN ID.
Source Set the interface that will be used to reach the RADIUS server.
Interface
Radius Server Choose an IP address for the RADIUS server.
9. Click Radius COA to configure the settings to accept change of authorization (CoA) requests from a
RADIUS or other authentication server, and to act on requests to a connection to the RADIUS server.
Updated policies are downloaded to the Cisco IOS XE SD-WAN device when SGACL policies are
modified on ISE and a CoA is pushed to the Cisco IOS XE SD-WAN device.
On clicking Radius COA, the following fields are displayed:
Domain Configure domain stripping at the server group level. The stripping keyword compares the incoming username
Stripping with the names oriented to the left of the @ domain delimiter.
10. Click TrustSec to configure more details for authorization. The following details are displayed:
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under OTHER TEMPLATES section,, choose CLI Add-On Template as the feature template.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can contain
only uppercase and lowercase letters, the digits 0 through 9, hyphens (-), and underscores (_). It cannot
contain spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any of any characters and spaces.
7. In the CLI configuration area, enter the following configuration:
interface gigabitethernet 1/1/3
cts role-based enforcement
cts role-based sgt-map sgt 2
8. Click Save.
This configuration can now be pushed to the Cisco IOS XE SD-WAN device for enforcement of SGACL
policies.
SGT Enforcement
SGACL policies configured on Cisco ISE, or configured using the CLI Add-On template can be applied and
SGT enforced on egress traffic both globally (on all the interfaces) or on a specific interface.
You can enforce SGT at a global level in the TrustSec feature template. See Configure SXP for Dynamic
IP-SGT Binding Using Cisco vManage, on page 288.
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
3. Choose the device for which you are creating the template.
4. Under Basic Information, choose Cisco VPN Interface Ethernet as the feature template.
5. In the Template Name field, enter a name for the feature template. This field is mandatory and can
contain only uppercase and lowercase letters, the digits 0 - 9, hyphens (-), and underscores (_). It cannot
contain spaces or any other characters.
6. In the Description field, enter a description for the feature template. This field is mandatory, and it can
contain any characters and spaces.
7. Click TrustSec.
8. In the Enable Enforcement field, click On to enable SGT enforcement on a particular interface.
Note You can enable this configuration either at an interface level in this step, or a global level using the Enable
Enforcement field in Configuring SXP for Dynamic IP/SGT using vManage, but not both.
9. In the Enter a SGT value field, enter a value that can be used as a tag for enforcement .
10. Click Save.
Note You can re-arrange the columns to view SXP and SGT information as per your preference by dragging the
column title to the desired position. If you re-arrange the columns, we recommended the Source SGT and
Destination SGT columns are set to your left hand side so that you can understand the bindings of a traffic
flow.
Using CLI
Use the following commands to monitor SXP/SGT information using the CLI.
Commands Description
show cts role-based sgt-map Displays role-based access control information (per
VRF).
(Both static and dynamic entries are shown.)
show cts role-based permissions Displays the SGACL dynamic and static entries.
show cts role-based counters Displays Security Group access control list (ACL)
enforcement statistics.
Configure Unified Threat Defense Cisco IOS XE Release 17.5.1a This feature lets you customize the
Resource Profiles amount of resources that Unified
Cisco vManage Release 20.5.1
Threat Defense features use on a
router. You can use larger resource
profiles to process packets
simultaneously. Simultaneously
processing packets reduces the
latency that security features can
introduce to the packet processing
of the device.
Unified Threat Defense features use the Snort engine to process packets. Snort is an open source network
Intrusion Prevention System, capable of performing real-time traffic analysis and packet logging on IP
networks. Unified Threat Defense deploys Snort as a single instance on the device to process packets. To
improve performance, use the Security App Hosting feature template to allow Unified Threat Defense to use
more resources.
You can use the Security App Hosting feature template to modify the resource profile as follows:
• Deploy more instances of Snort: When you enable Unified Threat Defense, the device sends each packet
from the data plane to the service plane. Unified Threat Defense serially inspects each packet. Once
inspected, Unified Threat Defense returns the packet to the data plane. Unified Threat Defense holds
each packet to analyze it. These processes introduce latency to the flow of packets that affects the
throughput of the device. To combat this latency, you can deploy more instances of Snort. With multiple
instances of Snort available, Unified Threat Defense can simultaneously process multiple packets to
reduce latency and increase throughput. This feature uses more systems resources.
• Download URL databases to the devices: This feature allows the URL Filtering feature of Unified Threat
Defense to use a downloaded URL database on the device to find a URL. If the device downloads the
database, Unified Threat Defense first uses the database on the device to find the URL. If a URL is not
in the downloaded database, Unified Threat Defense connects to the Cloud for the URL information.
This Cloud result is saved to a local cache for any subsequent requests to the same URL. This feature
requires at least 16 GB bootflash and 16 GB RAM.
Supported Platforms
Note To download the database, the device must have at least 16 GB bootflash and 16 GB RAM.
Cisco ISR4331, Cisco ISR4351, Cisco ISR4431 Cisco Yes low, medium, high
ISR4451, and Cisco ISR4461
Cisco Catalyst 8300 Series Edge Platforms Yes low, medium, high
Cisco Catalyst 8500 Series Edge Platform C8500L-8S4X Yes low, medium, high
Note In Cisco vManage Release 20.7.1 and earlier releases, Feature Templates is called Feature.
When you specify a larger resource profile, the device deploys more Snort instances to increase
throughput. The larger resource profiles also use more resources on the device. The number of Snort
instances deployed by the device differs by platform and software release.
9. Click Save.
10. Add this template to the device template.
11. Attach the device template to the device.
To view the resource usage between activated resource profiles, run the following commands:
show platform software status control-processor brief
show platform hardware qfp active datapath utilization
show utd engine standard utilization cpu
show utd engine standard utilization memory
show app-hosting resource
To view the health of one or more Snort instances and the memory usage of UTD, run the following command:
show utd engine standard status
11 permit object-group
fw-policy-seq-1-service-og_ object-group
subnet1 any
!
ip access-list extended utd-nat-acl
10 permit ip any any
!
class-map type inspect match-all
fw_policy-seq-1-cm_
match access-group name
fw_policy-seq-1-acl_
!
policy-map type inspect fw_policy
class fw_policy-seq-1-cm_
inspect
!
class class-default
pass
!
!
object-group service
fw_policy-seq-1-service-og_
ip
!
parameter-map type inspect-global
alert on
log dropped-packets
multi-tenancy
vpn zone security
!
parameter-map type umbrella global
token
A5EA676087BF66A42DC4F722C2AFD10D00256274
dnscrypt
vrf 1
dns-resolver umbrella
match-local-domain-to-bypass
!
!
zone security internet
vpn 0
!
zone security zone1
vpn 1
!
zone security zone2
vpn 2
!
zone-pair security
ZP_zone1_internet_fw_policy source zone1
destination internet
service-policy type inspect fw_policy
!
zone-pair security ZP_zone1_zone2_fw_policy
source zone1 destination zone2
service-policy type inspect fw_policy
!
app-hosting appid utd
app-resource package-profile cloud-low
app-vnic gateway0 virtualportgroup 0
threat protection
policy connectivity
logging level err
!
utd global
!
policy utd-policy-vrf-1
all-interfaces
vrf 1
threat-inspection profile intrusion_policy