Cisco DNA Center and Fusion Router
Cisco DNA Center and Fusion Router
Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Functionality of a Fusion Device in DNA SD-Access Solution
Configure
Network Diagram
Configurations
Step 1. Configure the Hand-off link from DNAC
Step 2. Verify Configurations pushed by DNAC on Border Routers
Step 3. Configure allowas-in on Border Routers
Step 4. Configure Fusion Routers
Step 5. Configure VRF Leaking on Fusion Router
Verify
Step 1. Verify eBGP Peering Between Fusion and Border Routers
Step 2. Verify iBGP Peering Between both Fusion Routers
Step 3. Verify Prefixes in BGP table and Routing Table
Manual Configuration for Border Redundancy
SDA-Border-1
SDA-Border-2
Simplify Fusion Configuration with the use of Templates
Variable Definition
Template Example
Fusion 1
Fusion 2
Introduction
This document describes how to configure Fusion Routers in a Cisco Software-Defined Access
(SDA) solution.
Prerequisites
Requirements
Note: Setup is required as per Supported Devices which can be found at Link to relase notes
Components Used
Background Information
In the Cisco SD-Access solution, devices are managed and configured by Cisco DNA Center. In
general, all parts of the SD-Access fabric can be, and normally are, configured and managed by
Cisco DNA Center. The Fusion device is outside the fabric, though, and so is configured manually.
Border Automation, discussed next, is a feature within Cisco DNA Center that can automate the
Border configuration for handoff of VRFs to the Fusion devices.
On occasion, for reasons typically related to compatibility with current configuration, Border
Automation is not suitable, and so the handoff from the Border to the Fusion device can also be
configured by hand. An understanding of the configuration that is used helps illustrate important
details about the optimal configuration and operation of the overall system.
As mentioned previously, the shared services must be made available to all virtual networks
(VN’s) on the Campus. This is achieved with the creation of Border Gateway Protocol (BGP)
peerings from the Border Routers to the Fusion Routers. On the Fusion Router the fabric VRF’s
subnets that need access to these shared services are leaked into the GRT, or a shared services
VRF, and vice-versa. Route maps can be used to help contain routing tables to subnets specific to
SD-Access Fabric.
Note: SD-Access Border Nodes do not support summary routes that overlap with SD-Access
IP Pools. Summary routes that overlap with IP Pools must be filtered in routing
advertisements from Fusion devices to Border Nodes.
Configure
The configuration details given here are with respect to the network topology shown next. This
network topology is not a recommended topology for deployments. It is used here solely to
facilitate the presentation of the configuration samples provided. For the recommended
deployment designs, see the Design Zone for Cisco Digital Network Architecture.
Network Diagram
The topology used for this article consists of two Border Routers both configured as External
Borders and two Fusion Routers with a connection to each respective Border Router.
Configurations
Within the step of assigning devices a role of Border Router while it is added to the Fabric, a hand-
off link can be created. At layer 2 it is a trunk link connected to the Fusion Router. The next steps
are needed:
1. Configure Local AS Number for BGP. This Autonomous System (AS) number is used to
configure the BGP process on the Border Routers.
2. Add interface under Transit. This interface is the direct connection between Border and Fusion
Router. (Te 1/0/8 on Border in this example).
3. Configure Remote AS Number. This AS number is used on Border Routers for neighbor
statements towards Fusion Router to configure External BGP (eBGP) peers.
4. Select all the Virtual Networks (VRFs) for which VRF leaking is required on Fusion Router.
This Section covers the verification of configuration on Border Routers related to BGP protocol.
SDA-Border-1
interface Loopback1021
description Loopback Border
vrf forwarding Campus
ip address 172.16.10.1 255.255.255.255
end
interface Loopback1022
description Loopback Border
vrf forwarding Univ
ip address 172.16.20.1 255.255.255.255
end
SDA-Border-2
Because of the VRF leaking on the Fusion Router, address-family ipv4 for VRF Campus learns the
route originated by VRF Univ (172.16.20.0/24). Both originating and learning router have the same
BGP AS number (65005) though. To overcome BGP loop prevention mechanisms, and
accept/install the routes on Border Routers, allowas-in must be configured for the peerings with
the Fusion Router:
SDA-Border1
SDA-Border2
Note: Command allowas-in must be used with precaution as it can cause loops. When you
use only one Fusion device that both Borders peer with, filtering is needed to make sure
locally originated routes are not accepted back into the AS from the Fusion peer - within the
same VN. If that happens the eBGP path is preferred to the locally originated path due to
max weight for eBGP paths.
This section illustrates the manual configuration for the Fusion routers.
SDA-Fusion-1
Configure the link towards Border Router as a trunk to match the vlan configuration on the Border-
1:
interface GigabitEthernet2/8
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 3006, 3007
switchport mode trunk
end
interface Vlan3007
vrf forwarding Campus
ip address 10.50.50.26 255.255.255.252
end
interface Vlan3006
vrf forwarding Univ
ip address 10.50.50.22 255.255.255.252
end
interface GigabitEthernet2/2
description SDA-Fusion1--->SDA-Fusion2
ip address 10.90.90.1 255.255.255.252
end
Advertise DHCP server subnet under global address-family where the DHCP server IP is
10.10.10.10:
interface GigabitEthernet2/35
description connection to DHCP server
ip address 10.10.10.9 255.255.255.252
end
SDA-Fusion-2
Configure the link towards Border Router. If an interface on Fusion is L3 instead of trunk -
configure subinterfaces:
interface GigabitEthernet0/0/0.3001
encapsulation dot1Q 3001
vrf forwarding Campus
ip address 10.50.50.2 255.255.255.252
end
interface GigabitEthernet0/0/0.3003
encapsulation dot1Q 3003
vrf forwarding Univ
ip address 10.50.50.10 255.255.255.252
end
interface GigabitEthernet0/0/2
ip address 10.90.90.2 255.255.255.252
negotiation auto
end
router bgp 65004 neighbor 10.90.90.1 remote-as 65004 ! address-family ipv4 neighbor 10.90.90.1
activate exit-address-family
The configuration for VRF leaking is identical for both Fusion Routers SDA-Fusion-1 and SDA-
Fusion-2.
First, configure VRF leaking between the two VRFs (Campus and Univ), use route-traget import:
Verify
This section contains verification steps to ensure that the previous configuration has taken effect
correctly.
SDA-Border-1 ------Peering--------SDA-Fusion-1
--------------------------------------------------
------------------------------------------------------------------------------
SDA-Fusion-1 ------Peering--------SDA-Fusion-2
---------------------------------------------------------------
SDA-Border-1
B 10.10.10.8/30 [20/0] via 10.50.50.2, 01:02:19 <<< RIB entry for DHCP Server
pool prefix
B 172.16.10.0/24 [200/0], 1w6d, Null0 <<< Null entry created by
"aggregate-address" BGP configuration
B 172.16.20.0/24 [20/0] via 10.50.50.2, 01:02:27 <<< RIB entry for VRF Univ
Prefix
---------------------------------------------------------------------
B 10.10.10.8/30 [20/0] via 10.50.50.10, 01:02:29 <<< RIB entry for DHCP Server
pool prefix
B 172.16.10.0/24 [20/0] via 10.50.50.10, 01:02:34 <<< RIB entry for VRF Campus
prefix
B 172.16.20.0/24 [200/0], 1w6d, Null0 <<< Null entry created by
"aggregate-address" BGP configuration
SDA-Fusion-1
SDA-Fusion1#show ip bgp
SDA-Fusion1#show ip route
----------------------------------------------------------------------------
SDA-Fusion2#show ip bgp
SDA-Fusion2#show ip route
------------------------------------------------------------------------------
-------------------------------------------------------------------------------
SDA-Border-1
interface Vlan31
description vrf interface to SDA-Border-2
vrf forwarding Campus
ip address 10.31.1.1 255.255.255.252
!
interface Vlan33
description vrf interface to SDA-Border-2
vrf forwarding Univ
ip address 10.33.1.1 255.255.255.252
!
router lisp
!
instance-id 4099
service ipv4
eid-table vrf Campus
route-import database bgp 65005 route-map DENY-Campus locator-set rloc_a0602921-91eb-4e27-a294-
f88949a1ca37 <<< pushed by DNAC if Border is (also) Internal
!
instance-id 4103
service ipv4
eid-table vrf Univ
route-import database bgp 65005 route-map DENY-Univ locator-set rloc_a0602921-91eb-4e27-a294-
f88949a1ca37
!
ip community-list 1 permit 655370 <<< community-list matching tag 655370 - pushed by DNAC
!
route-map DENY-Campus deny 5 <<< route-map pushed by DNAC and used in route-import
match ip address prefix-list Campus
!
route-map DENY-Campus deny 10
match ip address prefix-list l3handoff-prefixes
!
route-map DENY-Campus deny 15
match community 1 <<< match on community-list 1 to deny iBGP prefixes to be imported into LISP
!
route-map DENY-Campus deny 25
match ip address prefix-list deny_0.0.0.0
!
route-map DENY-Campus permit 30
!
route-map tag_local_eids permit 5 <<< route-map we need to create in order to tag the routes
advertised to the iBGP peer
set community 655370 <<< setting community/tag to 655370
!
SDA-Border-2
interface Vlan31
description vrf interface to SDA-Border-1
vrf forwarding Campus
ip address 10.31.1.2 255.255.255.252
!
interface Vlan33
description vrf interface to SDA-Border-1
vrf forwarding Univ
ip address 10.33.1.2 255.255.255.252
!
router lisp
!
instance-id 4099
service ipv4
eid-table vrf Campus
route-import database bgp 65005 route-map DENY-Campus locator-set rloc_677c0a8a-0802-49f9-99cc-
f9c6ebda80f3 <<< pushed by DNAC
!
instance-id 4103
service ipv4
eid-table vrf Univ
route-import database bgp 65005 route-map DENY-Univ locator-set rloc_677c0a8a-0802-49f9-99cc-
f9c6ebda80f3
!
Next are the Variables the are required to be defined based on your deployment design. In this
example, the configurations and VNs are based on the previous topology that have two VNs,
Campus and Univ.
Variable Definition
interface_Fusion1: GigabitEthernet2/8
interface_Fusion2: GigabitEthernet0/0/0
Global_prefixes = 10.10.10.8/30
FUSION_BGP_AS = 65004
BORDER_BGP_AS = 65005
For VN1:
VN1 = Campus
Fusion1_VN1_VLAN = 3007
Fusion2_VN1_VLAN = 3001
VN1_prefixes = 172.16.10.0/24
Fusion1_VN1_IP = 10.50.50.26
Fusion1_VN1_MASK = 255.255.255.252
Fusion2_VN1_IP = 10.50.50.2
Fusion2_VN1_MASK = 255.255.255.252
VN1_RD = 4099
VN1_ border1_neighbor_IP = 10.50.50.25
VN1_border2_neighbor_IP = 10.50.50.1
For VN2:
VN2 = Univ
Fusion1_VN2_VLAN = 3006
Fusion2_VN2_VLAN = 3003
VN2_prefixes = 172.16.20.0/24
Fusion1_VN2_IP = 10.50.50.22
Fusion1_VN2_MASK = 255.255.255.252
Fusino2_VN2_IP2 = 10.50.50.10
Fusion2_VN2_MASK = 255.255.255.252
VN2_RD = 4100
VN2_border1_neighbor_IP = 10.50.50.21
VN2_border2_neighbor_IP = 10.50.50.9
Template Example
Fusion 1
interface $interface_Fusion1
switchport
switchport mode trunk
switchport trunk allowed vlan add $Fusion1_VN1_VLAN, $Fusion1_VN2_VLAN
!
vlan $Fusion1_VN1_VLAN
no shut
!
vlan $Fusion1_VN2_VLAN
no shut
!
vrf definition $VN1
rd 1:$VN1_RD
!
address-family ipv4
route-target export 1:$VN1_RD
route-target import 1:$VN1_RD
route-target import 1:$VN2_RD
exit-address-family
!
vrf definition $VN2
rd 1:$VN2_RD
!
address-family ipv4
route-target export 1:$VN2_RD
route-target import 1:$VN2_RD
route-target import 1:$VN1_RD
exit-address-family
!
interface Vlan $Fusion1_VN1_VLAN
vrf forwarding $VN1
ip address $Fusion1_VN1_IP $Fusion1_VN1_MASK
!
interface Vlan $Fusion1_VN2_VLAN
vrf forwarding $VN2
ip address $Fusion1_VN2_IP $Fusion1_VN2_MASK
!
router bgp $FUSION_BGP_AS
bgp log-neighbor-changes
!
address-family ipv4
exit-address-family
!
address-family ipv4 vrf $VN1
neighbor $VN1_border1_neighbor_IP remote-as $BORDER_BGP_AS
neighbor $VN1_border1_neighbor_IP update-source Vlan $Fusion1_VN1_VLAN
neighbor $VN1_border1_neighbor_IP activate
exit-address-family
!
address-family ipv4 vrf $VN2
neighbor $VN2_border1_neighbor_IP remote-as $BORDER_BGP_AS
neighbor $VN2_border1_neighbor_IP update-source $Fusion1_VN2_VLAN
neighbor $VN2_border1_neighbor_IP activate
exit-address-family
Fusion 2
interface $interface_Fusion2.$Fusion2_VN1_VLAN
encapsulation dot1Q $Fusion2_VN1_VLAN
vrf forwarding $VN1
ip address $Fusion2_VN1_IP2 $Fusion2_VN1_MASK
!
interface $interface_Fusion2.$Fusion2_VN2_VLAN
encapsulation dot1Q $Fusion2_VN2_VLAN
vrf forwarding $VN2
ip address $Fusion2_VN2_IP2 $Fusion2_VN2_MASK
!
vlan $Fusion2_VN1_VLAN
no shut
!
vlan $Fusion2_VN2_VLAN
no shut
!
vrf definition $VN1
rd 1:$VN1_RD
!
address-family ipv4
route-target export 1:$VN1_RD
route-target import 1:$VN1_RD
route-target import 1:$VN2_RD
exit-address-family
!
vrf definition $VN2
rd 1:$VN2_RD
!
address-family ipv4
route-target export 1:$VN2_RD
route-target import 1:$VN2_RD
route-target import 1:$VN1_RD
exit-address-family
!
router bgp $FUSION_BGP_AS
bgp log-neighbor-changes
!
address-family ipv4
exit-address-family
!
address-family ipv4 vrf $VN1
neighbor $VN1_border2_neighbor_IP remote-as $BORDER_BGP_AS
neighbor $VN1_border2_neighbor_IP update-source $interface_Fusion2.$Fusion2_VN1_VLAN
neighbor $VN1_bordre2_neighbor_IP activate
exit-address-family
!
address-family ipv4 vrf $VN2
neighbor $VN2_border2_neighbor_IP remote-as $BORDER_BGP_AS
neighbor $VN2_border2_neighbor_IP update-source $interface_Fusion2.$Fusion2_VN2_VLAN
neighbor $VN2_border2_neighbor_IP activate
exit-address-family