Sdwan Xe Gs Book
Sdwan Xe Gs Book
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2019–2024 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 2 What's New in Cisco IOS XE (SD-WAN) and Cisco Catalyst SD-WAN Releases 3
Server Recommendations 34
Device Configuration Reset of Cisco IOS XE Catalyst SD-WAN devices after Adding or Removing
Modules 34
On-Site Bootstrap Process for Cisco Catalyst SD-WAN Devices 35
On-Site Bootstrap Process for Cisco vEdge 5000 using SHA2 Enterprise Certificates 37
Generate a Bootstrap File For Cisco IOS XE Catalyst SD-WAN Devices Using the CLI 42
One Touch Provisioning: Onboard Cisco IOS XE Catalyst SD-WAN Devices Using Generic Bootstrap
Configuration 43
Installing Cisco SD-AVC, Cisco vManage 20.1.1 and Earlier 47
Enabling SD-AVC on Cisco SD-WAN Manager 48
Enable SD-AVC on Cisco IOS XE Catalyst SD-WAN Devices 49
Install Cisco SD-AVC, Cisco vManage Release 20.3.1 and Later 50
Enable Cisco SD-AVC, Cisco vManage Release 20.3.1 and Later 50
Enable SD-AVC on Cisco IOS XE Catalyst SD-WAN Devices 51
Enable Cisco SD-AVC Cloud Connector, through Cisco Catalyst SD-WAN Manager Release
20.13.x 52
Software Installation and Upgrade for Cisco IOS XE Routers 58
Before You Begin 59
Download Cisco IOS XE Catalyst SD-WAN Software for Cisco IOS XE SD-WAN Release 16.12
and Earlier 60
Install the Cisco IOS XE Catalyst SD-WAN Software for Cisco IOS XE SD-WAN Release 16.12
and Earlier 61
Configure IOS XE Router Using CLI 63
Add IOS XE Devices to the Plug and Play Portal 66
CHAPTER 5 Install and Upgrade Cisco IOS XE Catalyst SD-WAN Release 17.2.1r and Later 89
Overview 375
Support Articles 375
Feedback Request 377
Disclaimer and Caution 377
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Related References
• Cisco Catalyst SD-WAN Control Components Compatibility Matrix and Server Recommendations
• Cisco Catalyst SD-WAN Device Compatibility
User Documentation
• User Documentation for Cisco IOS XE Catalyst SD-WAN Release 17
• User Documentation for Cisco SD-WAN Release 20
Documentation Feedback
To provide feedback about Cisco technical documentation use the feedback form available in the right pane
of every online document.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Cisco is constantly enhancing the Cisco Catalyst SD-WAN solution with every release and we try and keep
the content in line with the latest enhancements. The following links includes release-wise new and modified
features that are documented in the Configuration, Command Reference, and Hardware Installation guides.
For information on additional features and fixes that were committed to the Cisco Catalyst SD-WAN solution,
see the Resolved and Open Bugs section in the Release Notes.
What's New in Cisco IOS XE Catalyst SD-WAN Release 17.x
What's New in Cisco IOS XE Catalyst SD-WAN Release 16.x
What's New in Cisco SD-WAN (vEdge) Release 20.x
What's New in Cisco SD-WAN (vEdge) Release 19.x
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Support for the TLS 1.3 Cisco IOS XE Catalyst This feature adds support for the Transport
Protocol for Cisco Catalyst SD-WAN Release 17.13.1a Layer Security (TLS) 1.3 protocol for Cisco
SD-WAN Control Catalyst SD-WAN control connections.
Cisco Catalyst SD-WAN
Connections
Manager Release 20.13.1
Cost and complexity become even more prohibitive for legacy networks in the face of today’s requirements,
including:
• Rigorous end-to-end security
• Disparate transport networks
• High-bandwidth cloud applications that are hosted in multiple data centers
• Ongoing increase in the number of mobile end users
• Any-to-any connectivity over fluid topologies
• Unique needs of particular businesses
This division of labor allows each networking layer to focus on what it does best. The control plane manages
the rules for the routing traffic through the overlay network, and the data plane passes the actual data packets
among the network devices. The control plane and data plane form the warp and weft of a flexible, robust
fabric that you weave according to your needs, on your schedule, over existing circuits.
Cisco SD-WAN Manager provides a simple, yet powerful, set of graphical dashboards for monitoring network
performance on all devices in the overlay network, from a centralized monitoring station. In addition, Cisco
SD-WAN Manager provides centralized software installation, upgrade, and provisioning, whether for a single
device or as a bulk operation for many devices simultaneously.
Cisco Catalyst SD-WAN is ideally suited to the needs of cloud networking. Cisco Catalyst SD-WAN virtual
IP fabric supports software services that streamline and optimize cloud networking, allowing you to take full
advantage of the power of the overlay network for individual cloud applications.
Note • Cisco SD-WAN Controllers are purpose-built, custom stacks. Although open-source Linux components
are used, our custom operating system stacks bear no resemblance to the open-source Linux components
used. The Linux components are not subject to the same hardening requirements as the custom operating
system stacks that they are used in.
• The root access is disabled on Cisco SD-WAN Controllers and cannot be accessed from the user space.
• We meet compliance standards and requirements, such as, FedRAMP, FIPS, and CC. This compliance
should be considered as proof of the security validation of our operating systems.
• We follow a secure development lifecycle outlined here.
• We also follow a well-defined process run by the Cisco Product Security Incident Response Team (PSIRT)
to address any new exploits or attacks, such as, CVE.
• If you are still concerned about the platform security of Cisco SD-WAN Controllers, we recommend
that you conduct an independent penetration testing through third parties.
Cisco Catalyst SD-WAN uses time-tested and proven elements of networking in innovative ways to build the
secure, virtual IP fabric. These networking elements include:
• Using routing and routing advertisements to establish and maintain the flow of traffic throughout the
network.
• Layer 3 segmentation, sometimes called virtual routing and forwarding (VRF), to isolate different flows
of traffic. This is useful to separate traffic from different customers or different business organizations
within an enterprise.
• Peer-to-peer concepts to set up and maintain bidirectional connections between pairs of protocol entities
• Authentication and encryptions
• Policies for routing and data traffic
With five simple steps, Cisco Catalyst SD-WAN virtual IP fabric transforms a complex legacy network into
an easy-to-manage, scalable network:
• Step 1: Separate transport from the service side of the network
• Step 2: Centralize routing intelligence and enable segmentation
The Cisco Catalyst SD-WAN fabric builds on the route reflector model by centralizing routing intelligence.
Essentially, all prefixes learned from the service side on a router are advertised to a centralized controller,
which then reflects the information to other routers over the network's control plane. The controllers do not
handle any of the data traffic; they are involved only in control plane communication.
This approach has many benefits:
• The centralized controller can use inexpensive or commodity servers for control plane processing.
• The routers can use off-the-shelf silicon, allowing cost benefits from economies of scale.
• Scale challenges associated with full-mesh routing on the transport side of the network are eliminated.
• The network administrator can create multiple segments without the need for complex signaling protocols.
For example, in the figure here, all Px prefixes can be part of one VPN, while all Sx prefixes can be part
of a different VPN.
Note The centralized controller only “influences” routing on the routers. The controller does not participate in every
flow going through the network, nor does it participate in routing on the service side. This design allows the
routers to have local intelligence—enough intelligence to make local site decisions quickly.
• The controller optimizes user experience by influencing transport link choice based on SLA or other
attributes. The network administrator can color transport links (such as gold and bronze), and allow
applications to map the colors to appropriate transport links.
• The network administrator can map business logic from a single centralized point.
• The network can react faster to planned and unexpected situations, such as routing all traffic from high-risk
countries through an intermediate point.
• The network can centralize services such as firewalls, IDPs, and IDSs. Instead of distributing these
services throughout the network at every branch and campus, the network administrator can centralize
these functions, achieving efficiencies of scale and minimizing the number of touch points for provisioning.
Cisco Catalyst SD-WAN centralizes and significantly simplifies provisioning and management through Cisco
SD-WAN Manager. Cisco SD-WAN Manager provides an easy-to-use, graphical dashboard from which you
can monitor, configure, and maintain all Cisco vEdge devices and links in the overlay network. For example,
the GUI dashboard provides a templated view of various configurations to ease provisioning a service, so all
common elements, such as AAA and company-specific servers, can be pushed to multiple devices with a
single click, from a single point.
This approach has many benefits:
• The network administrator provisions and manages the network as a whole, efficiently and easily, as
opposed to a piece-meal approach that deals with individual devices one at a time.
• The network administrator has improved network visibility (for example, viewing network-wide VPN
statistics) from a single point.
• Troubleshooting tasks are simplified and presented visually, instead of requiring network administrators
to read lengthy configurations and output from individual devices.
Of these four components, the edge router can be a Cisco Catalyst SD-WAN hardware device or software
that runs as a virtual machine, and the remaining three are software-only components. The Cloud router, Cisco
SD-WAN Manager, and Cisco SD-WAN Controller software runs on servers, and the Cisco SD-WAN Validator
software runs as a process (daemon) on a edge router.
The figure below illustrates the components of Cisco Catalyst SD-WAN. The sections below describe each
component in detail.
vmanage-admin account is created during the initial device or controller setup. Cisco SD-WAN Manager uses
this secure channel for monitoring, configuring, and managing each of the following:
• Edge devices
• Cisco SD-WAN Manager nodes in a cluster
• Cisco SD-WAN Validator
• Cisco SD-WAN Controllers
As noted, the vmanage-admin user accounts do not have any password associated with them, so Cisco SD-WAN
Manager uses a passwordless procedure to log in to the account. To accomplish this, Cisco SD-WAN Manager
generates an asymmetric encryption public-private key pair. During deployment of an edge device into the
Cisco Catalyst SD-WAN fabric, or of a controller instance, Cisco SD-WAN Manager copies the public key
that it has generated to the edge device or instance. It sends the public key using a proprietary protocol, within
a secure channel—a DTLS or TLS tunnel.
The activity that Cisco SD-WAN Manager performs using the vmanage-admin account appears in syslog
messages and in the output of certain show commands. The syslog messages are logged with the same level
of detail as activities performed through any other user account. The level of syslog detail depends on the
syslog configuration of the device.
Cisco SD-WAN Manager requires the vmanage-admin account on devices in the fabric in order to monitor,
configure, and manage the devices. Removing, disabling, or altering this account on a device would prevent
Cisco SD-WAN Manager from performing these activities, and is not supported.
• Key reflection and rekeying: The Cisco SD-WAN Controller receives data plane keys from an edge
router and reflects them to other relevant edge routers that need to send data plane traffic.
• Policy engine: The Cisco SD-WAN Controller provides rich inbound and outbound policy constructs to
manipulate routing information, access control, segmentation, extranets, and other network needs.
• Netconf and CLI: Netconf is a standards-based protocol used by Cisco SD-WAN Manager to provision
a Cisco SD-WAN Controller. In addition, each Cisco SD-WAN Controller provides local CLI access
and AAA.
The Cisco SD-WAN Controller maintains a centralized route table that stores the route information, called
OMP routes, that it learns from the edge routers and from any other Cisco SD-WAN Controllers in the Cisco
Catalyst SD-WAN overlay network. Based on the configured policy, the Cisco SD-WAN Controller shares
this route information with the Cisco edge network devices in the network so that they can communicate with
each other.
The Cisco SD-WAN Controller is a software that runs as a virtual machine on a server configured with ESXi
or VMware hypervisor software. The Cisco SD-WAN Controller software image is a signed image that is
downloadable from the Cisco Catalyst SD-WAN website. A single Cisco Catalyst SD-WAN root-of-trust
public certificate is embedded into all Cisco SD-WAN Controller software images.
During the initial startup of a Cisco SD-WAN Controller, you enter minimal configuration information, such
as the IP addresses of the controller and the Cisco SD-WAN Validator. With this information and the
root-of-trust public certificate, the Cisco SD-WAN Controller authenticates itself on the network, establishes
a DTLS control connection with the Cisco SD-WAN Validator, and receives and activates its full configuration
from Cisco SD-WAN Manager if one is present in the domain. (Otherwise, you can manually download a
configuration file or create a configuration directly on the Cisco SD-WAN Controller through a console
connection.) The Cisco SD-WAN Controller is now also ready to accept connections from the edge routers
in its domain.
To provide redundancy and high availability, a typical overlay network includes multiple Cisco SD-WAN
Controllers in each domain. A domain can have up to 20 Cisco SD-WAN Controllers. To ensure that the OMP
network routes remain synchronized, all the Cisco SD-WAN Controllers must have the same configuration
for policy and OMP. However, the configuration for device-specific information, such as interface locations
and addresses, system IDs, and host names, can be different. In a network with redundant Cisco SD-WAN
Controllers, the Cisco SD-WAN Validator tells the Cisco SD-WAN Controllers about each other and tells
each Cisco SD-WAN Controller which edge routers in the domain it should accept control connections from.
(Different edge routers in the same domain connect to different Cisco SD-WAN Controllers, to provide load
balancing.) If one Cisco SD-WAN Controller becomes unavailable, the other controllers automatically and
immediately sustain the functioning of the overlay network.
• Control plane connection: Each Cisco SD-WAN Validator has a persistent control plane connection in
the form of a DTLS tunnel with each Cisco Catalyst SD-WAN Controller in its domain. In addition, the
Cisco SD-WAN Validator uses DTLS connections to communicate with edge routers when they come
online, to authenticate the router, and to facilitate the router's ability to join the network. Basic
authentication of an edge router is done using certificates and RSA cryptography.
• NAT traversal: The Cisco SD-WAN Validator facilitates the initial orchestration between edge routers
and Cisco SD-WAN Controllers when one or both of them are behind NAT devices. Standard peer-to-peer
techniques are used to facilitate this orchestration.
• Load balancing: In a domain with multiple Cisco SD-WAN Controllers, the Cisco SD-WAN Validator
automatically performs load balancing of edge routers across the Cisco SD-WAN Controllers when
routers come online.
Cisco SD-WAN Validator is a software module that authenticates the Cisco SD-WAN Controllers and the
edge routers in the overlay network and coordinates connectivity between them. It must have a public IP
address so that all Cisco vEdge devices in the network can connect to it. (It is the only Cisco vEdge device
that must have a public address.)
Cisco SD-WAN Validator orchestrates the initial control connection between Cisco SD-WAN Controllers
and edge routers. It creates DTLS tunnels to the Cisco SD-WAN Controllers and edge routers to authenticate
each node that is requesting control plane connectivity. This authentication behavior assures that only valid
customer nodes can participate in the Cisco Catalyst SD-WAN overlay network. The DTLS connections with
Cisco SD-WAN Controllers are permanent so that the Cisco SD-WAN Validator controller can inform the
Cisco SD-WAN Controllers as edge routers join the network. The DTLS connections with edge routers are
temporary; once the Cisco SD-WAN Validator has matched a edge router with a Cisco Catalyst SD-WAN
Controller, there is no need for the Cisco SD-WAN Validator and the edge router to communicate with each
other. The Cisco SD-WAN Validator shares only the information that is required for control plane connectivity,
and it instructs the proper edge routers and Cisco SD-WAN Controllers to initiate secure connectivity with
each other. The Cisco SD-WAN Validator maintains no state.
To provide redundancy for the Cisco SD-WAN Validator, you can create multiple Cisco SD-WAN Validator
entities in the network and point all edge routers to those Cisco SD-WAN Validators. Each Cisco SD-WAN
Validator maintains a permanent DTLS connection with each Cisco Catalyst SD-WAN Controller in the
network. If one Cisco SD-WAN Validator becomes unavailable, the others are automatically and immediately
able to sustain the functioning of the overlay network. In a domain with multiple Cisco SD-WAN Controllers,
the Cisco SD-WAN Validator pairs a edge router with one of the Cisco SD-WAN Controllers to provide load
balancing.
To illustrate this, the figure here shows an edge router and an existing router that are connected by a standard
Ethernet interface. These two routers appear to each other to be Layer 3 end points, and if routing is needed
between the two devices, OSPF or BGP can be enabled over the interface. Standard router functions, such as
VLAN tagging, QoS, ACLs, and route policies, are also available on this interface.
The components of an edge router are:
• DTLS control plane connection: Each edge router has one permanent DTLS connection to each Cisco
SD-WAN Controller it talks to. This permanent connection is established after device authentication
succeeds, and it carries encrypted payload between the edge router and the Cisco SD-WAN Controller.
This payload consists of route information necessary for the Cisco SD-WAN Controller to determine
the network topology, and then to calculate the best routes to network destinations and distribute this
route information to the edge routers.
• OMP (Overlay Management Protocol): As described for the Cisco SD-WAN Controller, OMP runs inside
the DTLS connection and carries the routes, next hops, keys, and policy information needed to establish
and maintain the overlay network. OMP runs between the edge router and the Cisco SD-WAN Controller
and carries only control information.
• Protocols: The edge router supports standard protocols, including OSPF, BGP, VRRP, and BFD.
• Routing Information Base (RIB): Each edge router has multiple route tables that are populated
automatically with direct interface routes, static routes, and dynamic routes learned via BGP and OSPF.
Route policies can affect which routes are stored in the RIB.
• Forwarding Information Base (FIB): This is a distilled version of the RIB that the CPU on the edge router
uses to forward packets.
• Netconf and CLI: Netconf is a standards-based protocol used by Cisco SD-WAN Manager to provision
a edge router. In addition, each edge router provides local CLI access and AAA.
• Key management: Edge routers generate symmetric keys that are used for secure communication with
other edge routers, using the standard IPsec protocol.
• Data plane: The edge router provides a rich set of data plane functions, including IP forwarding, IPsec,
BFD, QoS, ACLs, mirroring, and policy-based forwarding.
The edge router has local intelligence to make site-local decisions regarding routing, high availability (HA),
interfaces, ARP management, ACLs, and so forth. The OMP session with the Cisco SD-WAN Controller
influences the RIB in the edge router, providing non-site-local routes and the reachability information necessary
to build the overlay network.
The hardware edge router includes a Trusted Board ID chip, which is a secure cryptoprocessor that contains
the private key and public key for the router, along with a signed certificate. All this information is used for
device authentication. When you initially start up a edge router, you enter minimal configuration information,
such as the IP addresses of the edge router and the Cisco SD-WAN Validator. With this information and the
information on the Trusted Board ID chip, the edge router authenticates itself on the network, establishes a
DTLS connection with the Cisco SD-WAN Controller in its domain, and receives and activates its full
configuration from Cisco SD-WAN Manager if one is present in the domain. Otherwise, you can manually
download a configuration file or create a configuration directly on the edge router through a console connection.
Cipher Suites
For control connections, Cisco Catalyst SD-WAN automatically selects one of the following cipher suites:
• TLS-AES-256-GCM-SHA384
• TLS-AES-128-GCM-SHA256
• TLS-AES-128-CCM-8-SHA256
• TLS-AES-128-CCM-SHA256
site-id 100
domain-id 1 protocol tls
protocol-version TLS1_3
cipher-name TLS_AES_256_GCM_SHA384 private-ip 10.0.5.19
private-port 23556
public-ip 10.0.5.19
public-port 23556
org-name vIPtela Inc Regression
state up [Local Err: NO_ERROR] [Remote Err: NO_ERROR] uptime 0:00:01:24
hello interval 1000
hello tolerance 12000
controller-grp-id 0 shared-region-id-set N/A peer-session-id 0xdba4a2f8
Tx Statistics- hello 86
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 0
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0 Rx Statistics-
hello 86
connects 0
registers 0
register-replies 0
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
vmanage-to-peer 0
register-to-vmanage 0
This command displays information about control plane connection attempts initiated by the local device on
Cisco IOS XE Catalyst SD-WAN devices.
Device# show sdwan control connection-history detail
site-id 0
domain-id 0 protocol dtls
protocol-version DTLS1_2
cipher-name ECDHE-RSA-AES256-GCM-SHA384
private-ip 10.0.12.26
private-port 12346
public-ip 10.0.12.26
public-port 12346
UUID/chassis-number eb8844be-f58f-4bd3-b8c2-4f8cbc78131c
state tear_down [Local Err: ERR_DISCONNECT_VBOND] [Remote Err: NO_ERROR] downtime
2023-10-13T20:06:44+0000
repeat count 0 previous downtime N/A
Tx Statistics- hello 17
connects 0
registers 2
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 1
teardown-all 0
vmanage-to-peer 0
register-to-vmanage 0 Rx Statistics-
hello 17
connects 0
registers 0
register-replies 2
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
vmanage-to-peer 0
register-to-vmanage 0
This command displays information about control plane connection attempts initiated by a Cisco IOS XE
Catalyst SD-WAN device toward Cisco Catalyst SD-WAN Validator and Cisco Catalyst SD-WAN Controller.
Device# show control connections detail""
------------------------------------------------------------------------------------------------
Tx Statistics-
--------------
hello 603
connects 0
registers 0
register-replies 0
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
teardown-all 0
vmanage-to-peer 1
register-to-vmanage 0
create-cert-reply 0
Rx Statistics-
--------------
hello 603
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 0
vmanage-to-peer 0
register-to-vmanage 1
create-cert 0
------------------------------------------------------------------------------------------------
Tx Statistics-
--------------
hello 589
connects 0
registers 0
register-replies 0
challenge 0
challenge-response 1
challenge-ack 0
teardown 0
teardown-all 0
vmanage-to-peer 1
register-to-vmanage 0
create-cert-reply 0
Rx Statistics-
--------------
hello 589
connects 0
registers 0
register-replies 0
challenge 1
challenge-response 0
challenge-ack 1
teardown 0
vmanage-to-peer 0
register-to-vmanage 1
create-cert 0
Cloud onRamp for SaaS calculates an application performance value called the Viptela Quality of Experience
(vQoE) for enterprise cloud applications. The vQoE value weighs loss and latency using a formula customized
for each application. For example, email applications tolerate latency better than video applications do, and
video applications tolerate loss better than email does. The vQoE value ranges from zero to ten, with zero
being the worst quality and ten being the best.
You enable Cloud onRamp for SaaS in Cisco SD-WAN Manager with a few clicks of the mouse, and then
you access the Cloud onRamp dashboard in Cisco SD-WAN Manager for continuous visibility into the
performance of individual applications.
• Network visiblity:
• Network availability and circuit availability: Display network availability and correlate network
and circuit availability.
• Tunnel performance: Display key performance indicators such as loss, latency and jitter over various
Cisco Catalyst SD-WAN tunnels.
• Carrier usage views: Display providers and their network characteristics.
You can provision the following controllers using the Cisco Catalyst SD-WAN Portal:
• Cisco SD-WAN Manager
• Cisco Catalyst SD-WAN Validator
• Cisco Catalyst SD-WAN Controller
Note Beginning with Cisco vManage Release 20.9.1, a link to the Cisco Catalyst SD-WAN Portal is added from
the Cisco Catalyst SD-WAN menu. From the Cisco Catalyst SD-WAN menu, click SD-WAN Portal to access
the Cisco Catalyst SD-WAN Portal for provisioning, monitoring, and maintaining Cisco SD-WAN Controllers.
For more information on the Cisco Catalyst SD-WAN Portal, see the Cisco Catalyst SD-WAN Portal
Configuration Guide.
Cisco SD-AVC
Beginning with the 18.4 release, Cisco Catalyst SD-WAN incorporates Cisco Software-Defined Application
Visibility and Control (SD-AVC) to provide:
• Recognition of network application traffic for visibility, analytics, application-aware routing, and
application-based policies, such as QoS and application-based firewall policy.
• Analytics at the network level.
Cisco SD-AVC operates on Cisco IOS XE Catalyst SD-WAN devices in the network, and the Cisco SD-AVC
network service operates as a container within Cisco SD-WAN Manager.
Note All relevant Cisco SD-AVC functionality is accessed through the Cisco SD-WAN Manager interface. Cisco
Catalyst SD-WAN does not support the use of a separate SD-AVC interface.
The goal of our design is to create a private network so that Router-1 and Router-2 can be next to each other
from a Layer 3 perspective and so that hosts connected to each of these routers can communicate through the
private network.
6. From Cisco SD-WAN Manager CLI, create a configuration for each Cisco Catalyst SD-WAN Controller
and vEdge router in the overlay network:
a. Configure a system IP address, which is similar to the router ID address on a traditional router,
identifying the Cisco vEdge device with an address that is independent of any of the interfaces on the
device. System IP addresses must be pre-allocated and must be unique across each vEdge router and
Cisco Catalyst SD-WAN Controller. These addresses need not be routable through the network.
b. Configure site IDs for the various sites in the overlay network. In our example, vEdge-1 is at site-100
and vEdge-2 is at site-200. The Cisco Catalyst SD-WAN Controller can be collocated at a site, or it
can be in its own site.
c. Configure domain IDs. This is an optional step to create clusters. For our example, configure the
domain-ID as 1.
d. Configure the IP address or DNS name for the Cisco SD-WAN Validator server and the Cisco Catalyst
SD-WAN Controller.
e. Configure WAN interfaces on vEdge-1 and vEdge-2. VPN 0 is the VPN reserved for WAN transport
interfaces. IP addresses can be automatically obtained through DHCP. Alternatively, you can configure
a default gateway and DNS explicitly.
f. By default, DTLS and IPsec are enabled on the WAN interfaces.
g. Save the configuration.
When the Cisco SD-WAN Controllers join the network, they are authenticated by the Cisco SD-WAN Validator,
and when vEdge routers join the network, they are authenticated by both the Cisco SD-WAN Validator and
the Cisco SD-WAN Controllers. These devices then connect to Cisco SD-WAN Manager, which downloads
the configuration to them.
Example Configuration on vEdge-1:
system
host-name vEdge-1
system-ip 1.0.0.1
domain-id 1
site-id 100
vbond 75.1.1.1 local
!
vpn 0
interface ge 0/0
ip address 75.1.1.1/24
tunnel-interface
color default
no shutdown
ip route 0.0.0.0/0 75.1.1.254
!
The remaining sections in this article describe how to configure other common functionality on vEdge routers
and Cisco SD-WAN Controllers. Typically, you configure all functionality at one time, in the configuration
that you create on Cisco SD-WAN Manager and that is downloaded to the device when it joins the overlay
network. However, to highlight the different functionalities, this article describes the various portions of the
configuration separately.
1. Configure interfaces on vEdge-1 towards the existing traditional router. Assign IP address and put the
interface in a non-default VPN. In our example, this is VPN 1. Do the same on vEdge-2.
2. Configure OSPF or BGP on the vEdge routers towards the existing routers
3. Commit
To check for standard IP reachability, routes, and next hops at the local site, use the standard ping, traceroute,
and various show commands on Cisco SD-WAN Manager or from the CLI of the device (if you have a direct
connection to the device):
Example Configuration for the Host or Service-side VPN:
vpn 1
router
ospf
redistribute omp
area 0
interface ge 0/1
exit
exit
!
!
interface ge 0/1
ip address 10.1.2.12/24
no shutdown
!
At this point, vEdge-1 is able to learn about the prefixes from site-200, and vEdge-2 is able to learn about
prefixes from site-100. Because all the prefixes are part of VPN 1, the hosts in site-100 and site-200 have
reachability with one another. From a Cisco Catalyst SD-WAN overlay network point of view, this reachability
is possible because vEdge-1 advertises a vRoute consisting of the address 10.100.0.0/24 and the TLOC color
of default, which we write as {75.1.1.1, default }, to the Cisco Catalyst SD-WAN Controller. In turn, the
Cisco Catalyst SD-WAN Controller advertises this vRoute to vEdge-2. The same process happens with prefix
10.200.0.0/24 on vEdge-2.
automatically starts to use this IPsec tunnel. Once a tunnel is up, BFD automatically starts on the tunnel. This
is done to ensure fast data plane convergence in the event of a failure in the transport network.
The setup of the IPsec data plane happens automatically. No configuration is necessary. Multiple show
commands are available to check the SAs and the state of the IPsec tunnel.
Advanced Options
Now that we have looked at basic routing, security, and policy, we can start adding various other elements to
the network. You are encouraged to look at the Software category to add elements such as High Availability,
Convergence, BFD, QoS, ACLs, segmentation, and advanced policy.
Domain ID
A domain is a logical grouping of edge routers and Cisco SD-WAN Controllers that demarcate the span of
control for the Cisco SD-WAN Controllers. Each domain is identified by a unique integer, called the domain
ID. Currently, you can configure only one domain in a Cisco Catalyst SD-WAN overlay network.
Within a domain, edge routers can connect only with the Cisco SD-WAN Controllers in their own domain.
The Cisco SD-WAN Validator is aware of which Cisco SD-WAN Controllers are in which domain, so that
when new edge routers come up, the Cisco SD-WAN Validator can point those routers to the Cisco SD-WAN
Controllers in the proper domain. However, the Cisco SD-WAN Validator is never a member of a domain.
Within a domain, there is full synchronization of routing information among the Cisco SD-WAN Controllers
and edge routers, and there is scope for route aggregation and summarization. An organization can divide up
its network into domains to serve desired business purposes. For example, domains can correspond to a large
geographic area or to data centers so that each data center and the branches for which it is responsible are
contained within a single domain.
OMP Routes
On Cisco SD-WAN Controllers and edge routers, OMP advertises to its peers the routes and services that it
has learned from its local site, along with their corresponding transport location mappings, which are called
Transport Locations (TLOCs). These routes are called OMP routes, to distinguish them from standard IP
routes. It is through OMP routes that the Cisco SD-WAN Controllers learn the network topology and the
available services.
Cisco Catalyst SD-WAN control plane architecture uses three types of OMP routes:
• OMP routes: Prefixes that establish reachability between end points that use
the OMP-orchestrated transport network. OMP routes can represent services in a central data center,
services at a branch office, or collections of hosts and other end points in any location of the overlay
network. OMP routes require and resolve into TLOCs for functional forwarding. In comparison with
BGP, an OMP route is the equivalent of a prefix carried in any of the BGP AFI/SAFI fields.
• TLOCs: Identifiers that tie an OMP route to a physical location. The TLOC is the only entity of the OMP
routing domain that is visible to the underlying network, and it must be reachable via routing in the
underlying network. A TLOC can be directly reachable via an entry in the routing table of the physical
network, or it must be represented by a prefix residing on the outside of a NAT device and must be
included in the routing table. In comparison with BGP, the TLOC acts as the next hop for OMP routes.
• Service routes: Identifiers that tie an OMP route to a service in the network, specifying the location of
the service in the network. Services include firewalls, Intrusion Detection Systems (IDPs), and load
balancers.
Note The maximum OMP routes supported are 140K on the C1131X_8PW devices. When there are more than
140K OMP routes, the device crashes due to the out of memory issue.
Site ID
A site is a particular physical location within the Cisco Catalyst SD-WAN overlay network, such as a branch
office, a data center, or a campus. Each site is identified by a unique integer, called a site ID. Each Cisco
vEdge device at a site is identified by the same site ID. So within a data center, all the Cisco SD-WAN
Controllers and any edge routers are configured with the same site ID. A branch office or local site typically
has a single edge router, but if a second one is present for redundancy, both routers are configured with the
same site ID.
System IP Address
Each edge router and Cisco Catalyst SD-WAN Controller is assigned a system IP address, which identifies
the physical system independently of any interface addresses. This address is similar to the router ID on a
regular router. The system IP address provides permanent network overlay addresses for edge routers and
Cisco SD-WAN Controllers, and allows the physical interfaces to be renumbered as needed without affecting
the reachability of the Cisco vEdge device. You write the system IP address as you would an IPv4 address,
in decimal four-part dotted notation.
TLOC
A TLOC, or transport location, identifies the physical interface where a edge router connects to the WAN
transport network or to a NAT gateway. A TLOC is identified by a number of properties, the primary of which
is an IP address–color pair, which can be written as the tuple {IP-address, color}. In this tuple, IP address is
the system IP address and color is a fixed text string that identifies a VPN or traffic flow within a VPN. OMP
advertised TLOCs using TLOC routes.
Additional Information
For a description of the elements in a Cisco Catalyst SD-WAN overlay network, see Components of the Cisco
Catalyst SD-WAN Solution. For an understanding of how you put together an overlay network using Cisco
Catalyst SD-WAN software and hardware, see Constructing a Basic Network Using Cisco Catalyst SD-WAN
Components. For examples of how the components of the overlay network work, see the Validated Examples.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Generate a Bootstrap File For Cisco Cisco IOS XE Catalyst SD-WAN This feature enables you to generate
IOS XE Catalyst SD-WAN Devices Release 17.3.1a a minimum bootstrap configuration
Using the CLI file directly on a device, that
enables a device to reconnect to the
controller in case the full
configuration is ever lost or
removed.
• Upgrade Memory and vCPU Resources on a Virtual Machine Hosting Cisco Catalyst SD-WAN Manager,
on page 77
• Use Software Maintenance Upgrade Package on Cisco IOS XE Catalyst SD-WAN Devices, on page 79
Server Recommendations
This topic links to the hardware recommendations for the Cisco SD-WAN Validator server, vEdge Cloud
router server, Cisco SD-WAN Manager server, and Cisco SD-WAN Controller server: Cisco Catalyst SD-WAN
Controller Compatibility Matrix and Recommended Computing Resources.
OIR Support
Online Insertion and Removal (OIR) enables you to replace parts in a Cisco device without affecting the
system operation. When a module is inserted, power is available on the module, and it initializes itself to start
working.
Hot swap functionality allows the system to determine when a change occurs in the unit's physical configuration,
and reallocate the unit's resources to allow all interfaces to function adequately. This feature allows interfaces
on the module to be reconfigured while other interfaces on the router remain unchanged.
The software performs the necessary tasks involved in handling the removal and insertion of the module. A
hardware interrupt is sent to the software subsystem when a hardware change is detected, and the software
reconfigures the system as follows:
• When a module is inserted, it is analyzed and initialized in such a way that the end user can configure it
properly. The initialization routines used during OIR are the same as those called when the router is
powered on. System resources, also handled by software, are allocated to the new interface.
• When a module is removed, the resources associated with the empty slot must either be freed or altered
to indicate the change in its status.
If the configuration file is on both an inserted USB drive and on the bootflash, a device gives priority to the
configuration file on the bootflash.
Device Requirements
A device that you configure by using the on-site bootstrap process must meet these requirements:
• A supported Cisco Catalyst SD-WAN image must be installed on the device
• The device must be in in its factory state with no added configuration
4. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
5. Click Feature Templates and create a template for the device.
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
Note As an alternative to this step, you can copy the contents of the MIME file from the pop-up window to a text
file, save the text file with the name ciscosdwan.cfg (case sensitive), and then skip to Step 8.
Note For hardware devices, use the bootstrap file name as ciscosdwan.cfg. This file is generated by Cisco
SD-WAN Manager and includes UUID, but does not include OTP. For software devices (CSR and ISRv),
and OTP-authenticated devices such as ASR1002-X, use the bootstrap file name as
ciscosdwan_cloud_init.cfg. This file contains the OTP but not the UUID validation for
ciscosdwan_cloud_init.cfg.
Note This is the configuration file for the on-site bootstrap process.
9. Copy the ciscosdwan.cfg file to a bootable USB drive or to the bootflash of the device.
Note The file must be named exactly as shown or the device will not read it.
10. If you are using a USB drive, plug the USB drive into the device.
11. Boot the device.
The device reads the configuration file from the USB drive or the bootflash and uses the configuration
information to come up on the network. The device give priority to a configuration file that is on its
bootflash.
On-Site Bootstrap Process for Cisco SD-WAN Release 20.3.1 By default, a Cisco vEdge 5000
Cisco vEdge 5000 using SHA2 device uses an SHA1 certificate for
Cisco vManage Release 20.3.1
Enterprise Certificates authentication with controllers in
the overlay network. With this
feature, you can authenticate the
device using an OTP and a Public
Key, and install an SHA2 enterprise
certificate on the device. By
authenticating the device using an
OTP and a Public Key and
installing an SHA2 enterprise
certificate, you can bypass SHA1
certificate authentication and secure
the device against SHA1
vulnerabilities.
A Cisco vEdge 5000 device is equipped with a Trusted Platform Module (TPM 1.2) and uses SHA1 certificates
for authentication while connecting to the overlay network. For information on the bootstrap process using
SHA1 certificates, see On-Site Bootstrap Process for Cisco Catalyst SD-WAN Devices.
From Cisco Catalyst SD-WAN Release 20.3.1, while bootstrapping a Cisco vEdge 5000 device and connecting
the device to the overlay network, you can authenticate the device using a One Time Password (OTP) and a
Public Key, and install an SHA2 enterprise certificate on the device. By authenticating the device using an
OTP and a Public Key and installing an SHA2 enterprise certificate, you can bypass SHA1 certificate
authentication and secure the device against SHA1 vulnerabilities.
How Cisco vEdge 5000 is Authenticated using OTP and Public Key
1. Enter the public key for the device on Plug and Play Connect and generate the serial.viptela
file.
2. Upload the serial.viptela file to Cisco SD-WAN Manager.
3. Cisco SD-WAN Manager generates a random authentication token for the device. Cisco SD-WAN
Manager encrypts the authentication token using the device public key and populates it as the OTP in
the <chassis>.config file.
4. Download the <chassis>.config file to a bootable USB drive and insert the USB drive into the
device after performing a factory reset.
5. The device reads the <chassis>.config file, reads the encrypted digest from the OTP field, decrypts
the digest using the device private key and obtains the authentication token.
6. The device disables AVNET/TPM1.2 SHA1 certificate authentication.
7. The device authenticates itself with Cisco SD-WAN Manager using the authentication token and
establishes a control connection.
8. Cisco SD-WAN Manager pushes the initial configuration into the device.
9. Cisco SD-WAN Manager pushes the SHA2 enterprise certificate for the device and installs the certificate
on the device.
10. Device reauthenticates itself to controllers using the SHA2 enterprise certificate and connects to
controllers.
Points to Consider
• After a Cisco vEdge 5000 device is authenticated with Cisco SD-WAN Validator or Cisco SD-WAN
Manager using OTP, do not reboot the device until the SHA2 enterprise certificate is installed and
validated. If the device reboots before the Enterprise Certificate is validated, restart the bootstrap procedure.
• After a signed SHA2 enterprise certificate is installed on a Cisco vEdge 5000 device and the bootstrapping
process is complete, if you perform a software reset, a configuration reset, or a factory reset, bootstrap
the device again.
• Every time you generate the Cloud-Init(Encrypted OTP) bootstrap configuration, you must download
the new configuration file to a bootable USB drive.
Prerequisites
1. Ensure Enterprise Certificate authorization is configured.
a. From the Cisco SD-WAN Manager menu, choose Administration > Settings.
b. Click Hardware WAN Edge Certificate Authorization.
(If you are using Cisco Catalyst SD-WAN Manager Release 20.12.x or earlier, click Edit.)
c. Ensure that Enterprise Certificate (signed by Enterprise CA) is selected and click Save.
2. Ensure that the public key entry for the device is available on the PNP server before generating the
serial.viptela file. For more information, see View or Add Public Key for a Cisco vEdge 5000
Device.
3. If a Cisco vEdge 5000 device is connected to the overlay network using SHA1 certificates, you must
invalidate and remove the device from the overlay network before configuring the use of OTP, Public
Key, and SHA2 enterprise certificate for authentication.
Bootstrap Procedure
The on-site bootstrap process involves generating a bootstrap configuration file that loads from a bootable
USB drive. When the Cisco vEdge 5000 device boots, it uses the information in the configuration file to
connect to the overlay network.
1. From the Cisco SD-WAN Manager menu, choose Configuration > Devices > WAN Edge List.
2. Click Upload WAN Edge List.
3. In the Upload WAN Edge List dialog box, select the the Cisco vEdge 5000 serial number file to upload.
Select Validate the uploaded vEdge list and send to controllers and click Upload.
The WAN Edge List is uploaded to controllers.
The Cisco vEdge 5000 device is added to the WAN Edge List.
4. Attach the device to a device configuration template.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. Click Device and select a template.
c. For the desired template, click ... and choose Attach Devices. The Attach Devices dialog box opens.
d. In the Available Devices column, select a group, and search to select the Cisco vEdge 5000 device.
e. Click the arrow pointing right to move the device to the Selected Devices column.
f. Click Attach.
Configuration template is scheduled for the device.
c. For the selected device, click ... and choose Generate Bootstrap Configuration.
d. In the Generate Bootstrap Configuration dialog box, select Cloud-Init(Encrypted OTP) and
click OK.
e. Click Download to download the bootstrap configuration and save the file with a filename in the
<ChassisNumber>.cfg format.
f. Copy the <ChassisNumber>.cfg file to a bootable USB drive.
Note • The USB drive must be of the FAT-32 format for Cisco vEdge 5000 device to recognize and auto-mount
the drive.
• Copy the <ChassisNumber>.cfg file to the home or parent directory of the USB drive.
6. Send the Cisco vEdge 5000 serial number file and OTP information to controllers.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates > WAN Edge
List.
b. Click Send to Controllers to synchronize the WAN Edge list on all controllers.
The device serial number file and OTP information are sent to controllers.
c. (Optional) Verify the WAN Edge List on controllers using the command show orchestrator
valid-vedges hardware-installed-serial-number prestaging.
vbond# show orchestrator valid-vedges hardware-installed-serial-number prestaging
HARDWARE
INSTALLED SUBJECT
SERIAL SERIAL
CHASSIS NUMBER SERIAL NUMBER VALIDITY ORG
NUMBER NUMBER
---------------------------------------------------------------------------------------------------------
193A0122170001 deaedf5d39919454fdfcc8470eccd8d8 valid vIPtela Inc Regression
prestaging N/A
7. Perform a factory reset of the Cisco vEdge 5000 device with a default image of Cisco SD-WAN Release
20.3.1 or later.
8. When the Cisco vEdge 5000 device is ‘Up’ (indicated by a status of ‘System: Up’ on the LCD display),
insert the USB drive with <ChassisNumber>.cfg file.
The device reads the <ChassisNumber>.cfg file from the USB drive. Organization-name, Cisco
SD-WAN Validator IP address, OTP token, and Enterprise root-ca are retrieved from the configuration
file.
a. (Optional) Issue the show control local-properties command on the device to verify the information
retrieved from the configuration file.
b. (Optional) If the device WAN interface is not assigned an IP address through DHCP, configure a
static IP address and the routing information required to reach controllers.
The device connects to Cisco SD-WAN Validator and Cisco SD-WAN Manager after authentication
using the OTP.
The device obtains the System IP address and the site ID from Cisco SD-WAN Manager configuration
templates. If templates are not configured on Cisco SD-WAN Manager, configure the required system
configuration on the device.
After the device connects to Cisco SD-WAN Manager, Cisco SD-WAN Manager retrieves the Enterprise
Certificate Signing Request (CSR). From the Cisco SD-WAN Manager menu, choose Configuration >
Certificates > WAN Edge List, the device certificate state is shown as CSR.
9. Download CSR.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates.
b. Select the Cisco vEdge 5000 device for which to sign a certificate.
c. For the selected device, click ... and select View Enterprise CSR.
d. To download the CSR, click Download.
10. Send the certificate to a third-party signing authority and have them sign it.
11. To install the certificate on the device, perform the following steps:
a. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates > Controllers.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
b. Click Install Certificate button located in the upper-right corner of the screen.
c. In the Install Certificate screen, paste the certificate into the Certificate Text field, or click Select
a File to upload the certificate in a file.
d. Click Install.
The installed certificate serial number of the device is updated on the controllers.
From the Cisco SD-WAN Manager menu, choose Configuration > Certificates > WAN Edge List,
the device certificate state is shown as installed.
12. (Optional) Check the WAN Edge list on the controller to confirm that the device serial number is
installed.
vbond# show orchestrator valid-vedges hardware-installed-serial-number 12399910
HARDWARE
INSTALLED SUBJECT
SERIAL SERIAL SERIAL
CHASSIS NUMBER NUMBER VALIDITY ORG NUMBER NUMBER
--------------------------------------------------------------------------------
193A0122170001 18DB5D4F valid vIPtela Inc Regression 12399910 N/A
Outcome
• The Cisco vEdge 5000 device is added to the overlay network and connected to the controllers using the
SHA2 Enterprise Certificate.
• The device will use the installed SHA2 Enterprise Certificate after a reboot, a software upgrade, or a
software downgrade to Cisco SD-WAN Release 20.3.1 or a later release. Use of SHA1 certificates is
disabled.
Prerequisites
• The controller root certificate is installed on the Cisco IOS XE Catalyst SD-WAN device, to authenticate
the device.
• The device is physically connected to the WAN through one of its interfaces.
Procedure
1. On the Cisco IOS XE Catalyst SD-WAN device, establish connectivity to Cisco SD-WAN Manager, by
configuring the following:
• System IP address
• Domain ID
• Site ID
• sp-organization-name
• organization-name
• Cisco SD-WAN Validator IP address and port number
• Tunnel with encapsulation configured as either GRE or IPSEC
Example:
system
system-ip 10.0.0.10
domain-id 1
site-id 200
admin-tech-on-failure
sp-organization-name CiscoISR
organization-name CiscoISR
vbond 10.0.100.1 port 12346
!
interface Tunnel1
no shutdown
ip unnumbered GigabitEthernet0/1/0
tunnel source GigabitEthernet0/1/0
tunnel mode sdwan
exit
sdwan
interface GigabitEthernet0/1/0
tunnel-interface
encapsulation ipsec
exit
exit
commit
2. Use show sdwan control connections to verify connectivity to the Cisco SD-WAN Manager, Cisco
SD-WAN Controller, and Cisco SD-WAN Validator.
3. Use the request platform software sdwan bootstrap-config save command to save a bootstrap file to
the device bootflash.
Example:
Device#request platform software sdwan bootstrap-config save
Saving bootstrap file 'bootflash:/ciscosdwan.cfg'...
Done
One Touch Provisioning: Cisco IOS XE Catalyst You can generate a generic bootstrap configuration
Onboard Cisco IOS XE SD-WAN Release 17.4.1a on Cisco SD-WAN Manager and use this
Catalyst SD-WAN configuration to onboard multiple Cisco IOS XE
Cisco vManage Release 20.4.1
Devices Using Generic Catalyst SD-WAN devices. When you boot a
Bootstrap Configuration device with the generic bootstrap configuration,
the device is listed on Cisco SD-WAN Manager
as an unclaimed WAN edge device. To complete
the onboarding, claim the device on Cisco
SD-WAN Manager and attach a device template
that configures the system IP address and site ID.
To use generic bootstrap configuration to onboard a device, you must have a Dynamic Host Configuration
Protocol (DHCP) server in the branch network where you are installing the device. The generic bootstrap
configuration does not assign an IP address to the WAN interface. Instead, the configuration enables a DHCP
client on the WAN interface so that the interface can acquire an IP address from a DHCP server in the branch
network.
Onboard a Cisco IOS XE Catalyst SD-WAN Device using Generic Bootstrap Configuration
1. Enable One Touch Provisioning:
a. From the Cisco SD-WAN Manager menu, choose Administration > Settings.
b. Check if One Touch Provisioning is Enabled. If Enabled, go to Step 2.
c. If One Touch Provisioning is Disabled, click Edit.
d. For the Enable Claim WAN Edges setting, choose Enabled and click Save.
2. From the Cisco SD-WAN Manager menu, choose Configuration > Devices > WAN Edge List.
3. Click Export Bootstrap Configuration.
a. In the Export Bootstrap Configuration dialog box, enter the VPN0 Interface name.
Note The VPN 0 interface name may vary among Cisco IOS XE Catalyst SD-WAN device models. Specify the
interface name based on the model you wish to onboard.
Device# reload
Note Performing a config reset generates a new type 6 master key. Therefore, ensure that the current password
protecting the bootstrap configuration file is in plaintext and does not contain any type 6 keys. If the bootstrap
configuration password contains type 6 keys, it will cause the device reset to fail.
• On the Cisco SD-WAN Validator, you can view the unclaimed WAN edge devices by using the
command show orchestrator unclaimed-vedges.
• In Cisco SD-WAN Manager, you can view the unclaimed WAN edge devices by selecting
Configuration > Devices > Unclaimed WAN Edges.
If the device is not listed as an unclaimed WAN edge device, check whether the device can connect
to the Cisco SD-WAN Validator and correct any connectivity issues.
Result
The device connects to Cisco SD-WAN Controllers and is added to the overlay network.
To verify that the device has established control connections and is part of the overlay network, from the
Cisco SD-WAN Manager menu, choose Monitor > Overview and click the number in the WAN Edges area.
Note In Cisco vManage Release 20.6.x and earlier: To verify that the device has established control connections
and is part of the overlay network, from the Cisco SD-WAN Manager menu, choose Dashboard > Main
Dashboard and click WAN Edge devices in the Summary Pane.
Remove a Cisco IOS XE Catalyst SD-WAN Device Onboarded Using Generic Bootstrap Configuration
1. Detach device from templates:
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. Click Device Templates and select the template attached to the device.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. For the selected template, click ... and choose Detach Devices.
d. In the Available Devices column, select the device to be detached from the template.
e. Click the arrow pointing right to move the device to the Selected Devices column.
f. Click Detach.
2. Connect to the device using SSH. From the device SSH terminal, shut down the VPN 0 WAN interface
by using the following commands:
Device(config)# interface vpn0-interface-name
Device(config-if)# shutdown
Note Beginning with Cisco vManage Release 20.3.1/Cisco IOS XE Catalyst SD-WAN Release 17.3.1a, the Cisco
SD-AVC installation has changed. See Install Cisco SD-AVC, Cisco vManage Release 20.3.1 and Later, on
page 50.
Overview
Beginning with the 18.4 release, Cisco Catalyst SD-WAN can optionally incorporate Cisco Software-Defined
Application Visibility and Control (SD-AVC) on Cisco IOS XE Catalyst SD-WAN devices. The SD-AVC
network service operates as a container within Cisco SD-WAN Manager.
Cisco vManage 18.4 on a cloud-based server, provided fully The SD-AVC package is pre-installed by the
configured by the Cisco cloud operations team Cisco cloud operations team.
Cisco vManage 18.4 on a self-managed cloud or local server Install the SD-AVC package as described
below.
Upgrading from an earlier version of Cisco SD-WAN Install the SD-AVC package as described
Manager to Cisco vManage 18.4 below.
Procedure
1. Ensure that the downloaded SD-WAN image is compatible with your version of Cisco SD-WAN Manager.
a. Display the checksum for the compatible image, using the following API:
https://[vManage-IP-address]/dataservice/sdavc/checksum
Example: https://10.0.0.1/dataservice/sdavc/checksum
b. Verify that the checksum of the downloaded image matches this.
3. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management page.
4. For the desired host (the Cisco SD-WAN Manager portal on which you are enabling SD-AVC), click …
and choose Edit.
5. In the Edit Cisco SD-WAN Manager dialog box, enter the username and password, using Cisco SD-WAN
Manager credentials.
6. Select the checkbox for Enable SD-AVC. Click Update.
7. Cisco SD-WAN Manager prompts you to confirm before rebooting the device to apply the changes to the
device. Click OK to confirm.
8. After the reboot, Cisco SD-WAN Manager comes up automatically and displays progress on the SD-AVC
activation. Wait for the activation to complete.
9. (Optional) After installation is complete, you can verify that Cisco SD-WAN Manager has the SD-AVC
virtual service installed and operating correctly.
a. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management.
b. In Service Configuration, in Cisco SD-WAN Manager row of the table, verify that the SD-AVC shows
a green checkmark.
For information about Cisco SD-WAN Manager commands, see Cisco SD-WAN Manager Command Reference
documentation.
Prerequisites
• A template exists for the Cisco IOS XE Catalyst SD-WAN device (example: Cisco ASR 1001-X, Cisco
ISR 4321).
• TCP port 10501 destination traffic must be permitted.
Procedure
1. From the Cisco SD-WAN Manager menu, choose Configuration > Policies.
2. Click Localized Policy.
3. To add a policy and enable Application, follow the steps below:
a. Click Add Policy.
b. Click Next on the several screens (Create Groups of Interest, Configure Forwarding Classes/QOS,
Configure Access Control Lists, Configure Route Policy) until the Policy Overview screen.
c. In the Policy Overview screen, enter a policy name and policy description.
d. Select Application.
4. To add the localized Policy to the device template, follow the steps below:
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. For the device on which you have to enable SD-AVC, click … and select Edit from the menu.
c. Click Additional Templates.
d. Add the localized policy created in an earlier step of this procedure.
e. Click Update and proceed through the next screens to push the updated template to the device.
5. (Optional) After pushing the update to the device, you can check the status of SD-AVC on the device
with one of the following commands.
show avc sd-service info summary
or
show avc sd-service info connectivity
Note Cisco SD-AVC must operate on only one Cisco SD-WAN Manager instance. In a Cisco SD-WAN Manager
cluster, enable Cisco SD-AVC on only one instance of Cisco SD-WAN Manager.
Note The Edit Manager pop-up window provides an option for disabling the application server. After disabling
the application server, you cannot later enable other services using this method. If you need to disable the
application server, do not do this at the same time that you enable other features.
4. Enter the username and password, using Cisco SD-WAN Manager credentials. Reboot the device to apply
the changes.
5. After the reboot, Cisco SD-WAN Manager comes up automatically and displays progress on the SD-AVC
activation. Wait for the activation to complete.
6. (optional) After installation is complete, you can verify that Cisco SD-WAN Manager has the SD-AVC
virtual service installed and operating correctly.
a. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management.
b. Click Service Configuration, in the Cisco SD-WAN Manager row of the table, verify that SD-AVC
shows a green checkmark.
Prerequisites
• A template exists for the Cisco IOS XE Catalyst SD-WAN device (example: Cisco ASR 1001-X, Cisco
ISR 4321).
• TCP port 10501 destination traffic must be permitted.
Procedure
1. From the Cisco SD-WAN Manager menu, choose Configuration > Policies.
2. Click Localized Policy.
3. To add a policy and enable Application, follow the steps below:
a. Click Add Policy.
b. Click Next on the several screens (Create Groups of Interest, Configure Forwarding Classes/QOS,
Configure Access Control Lists, Configure Route Policy) until the Policy Overview screen.
c. In the Policy Overview screen, enter a policy name and policy description.
d. Select Application.
e. Save the policy.
4. To add the localized Policy to the device template, follow the steps below:
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. For the device on which you have to enable SD-AVC, click … and select Edit from the menu.
c. Click Additional Templates.
d. Add the localized policy created in an earlier step of this procedure.
e. Click Update and proceed through the next screens to push the updated template to the device.
5. (Optional) After pushing the update to the device, you can check the status of SD-AVC on the device
with one of the following commands.
show avc sd-service info summary
or
show avc sd-service info connectivity
Cisco SD-AVC Cisco IOS XE When enabling Cloud onRamp for SaaS to manage Office 365
Cloud Connector Catalyst SD-WAN traffic, you can limit best path selection to apply only to some
Release 17.3.1a Office 365 traffic, according to the Office 365 traffic categories
defined by Microsoft, or to include all Office 365 traffic.
Cisco vManage
Release 20.3.1 The Cisco SD-AVC Cloud Connector provides support for this
functionality.
Update to the Cisco vManage Beginning with this release, enabling the Cloud Connector
SD-AVC Cloud Release 20.10.1 requires a cloud gateway URL and a one-time password (OTP)
Connector instead of a client ID and client secret.
Enablement
Other requirements:
Enable SD-AVC in cluster
management, as described here.
Other requirements:
Enable SD-AVC in cluster
management, as described here.
Notes:
In this scenario, the SD-AVC
components operate differently than
in earlier releases. Consequently,
running the request nms all status
command on the Cisco SD-WAN
Manager instance shows that the
“NMS SDAVC server” component
is not enabled. This is expected
behavior, and does not indicate any
problem with SD-AVC. Note that
the “NMS SDAVC gateway”
component shows as enabled.
Other requirements:
Before enabling the Cloud
Connector, enable SD-AVC in
cluster management, as described
here.
Other requirements:
Enable SD-AVC in cluster
management, as described here.
Note If Cisco SD-WAN Manager is cloud-hosted by Cisco, this option does not appear and Cloud Connector is
enabled automatically.
3. (This step applies to Cisco vManage Release 20.10.1 and later, and is handled automatically if Cisco
SD-WAN Manager is Cisco-hosted.)
See the Before You Begin section that precedes these steps for details about the requirements for enabling
the SD-AVC Cloud Connector in different scenarios. As noted there, enable SD-AVC in cluster management
before enabling the Cloud Connector.
If you need to enter the cloud gateway URL, use: https://datamanagement-us-01.sdwan.cisco.com/validate_
sdavc/
If you need to use the Cisco Catalyst SD-WAN Portal to get the OTP, see the Cisco Catalyst SD-WAN
Portal Configuration Guide for details.
If you need to open a TAC case to receive the OTP, open https://mycase.cloudapps.cisco.com/case. The
workflow for receiving the OTP requires the following:
• Entitlement information.
• Smart Account.
• Virtual Account.
• The organization name configured in Cisco SD-WAN Manager.
• Cisco SD-WAN Manager geographic location: Americas, European Union (EU), or Asia-Pacific
(APAC).
• Technology: Use Cisco Catalyst SD-WAN On-Prem for an on-prem installation or Cisco Catalyst
SD-WAN - Cisco-Hosted for a Cisco-hosted installation.
• SubTechnology: Use SDWAN Cloud Infra.
4. (For Cisco vManage Release 20.9.x and earlier releases) Enter the following credentials:
• Client ID
Note Click (i) for Client ID and open the Cisco API Console page in a browser window
to create Cloud Connector credentials if you do not already have credentials.
• Client Secret
• Organization Name: Use the descriptive name that you entered on the Cisco API Console page in
the Name of your application field.
5. (Releases earlier than Cisco vManage Release 20.10.1) For Affinity, you can select a geographical location
for storing the Cloud Connector data. For organizations located in Europe, it is recommended to change
the location to Europe, in accordance with EU General Data Protection Regulation (GDPR) regulations.
6. For Telemetry, you can optionally disable the collection of telemetry data.
Note If Cisco SD-WAN Manager is cloud-hosted by Cisco, this option does not appear and telemetry is enabled
automatically.
Note For Cisco IOS XE Catalyst SD-WAN devices from Cisco IOS XE Catalyst SD-WAN Release 17.8.1a, if a
device boots using the .bin file after a PnP or auto-install process completes, the device comes up with its
day-0 configuration. The device then reloads automatically and goes into install mode.
• The updated device list is uploaded to Cisco SD-WAN Manager and sent to the Cisco SD-WAN Validator.
To do so:
1. Obtain the router's chassis and board ID serial number by issuing the show crypto pki certificates
CISCO_IDEVID_SUDI command at the system prompt. If running Release 16.6.1 or earlier on an
ASR series router, issue the show sdwan certificate serial command.
2. Add the router's serial number to Plug and Play (PnP) Connect portal. See Add the IOS XE Router
to the PnP Portal section for more details..
3. From the Cisco SD-WAN Manager menu, choose Configuration > Devices. Click Sync Smart
Account to download the updated device list to Cisco SD-WAN Manager and send it to the Cisco
SD-WAN Validator.
• Device configuration templates are created and attached to the router using Cisco SD-WAN Manager
Configuration > Templates. This ensures that the router can obtain a configuration and establish full
control connections when it comes up.
• If the router exceeds the unidirectional encrypted bandwidth of 250 Mbps and if the HSECK9 license is
not already installed, the license file is copied to the router's bootflash and license installed on the router
license install file path.
• The ASR 1000 series, ISR 1000 series, and ISR 4000 series router is running the required version of the
ROM monitor software (ROMMON), as shown in the following table. To verify the ROMMON version
running on the router, issue the show rom-monitor or show platform command at the system prompt.
• The ISRv router is running the minimum required version of the CIMC and NFVIS software, as shown
in the following table:
Download Cisco IOS XE Catalyst SD-WAN Software for Cisco IOS XE SD-WAN
Release 16.12 and Earlier
Download the Cisco IOS XE Catalyst SD-WAN Software
To download the Cisco IOS XE Catalyst SD-WAN software from the Cisco site:
1. Go to https://www.cisco.com.
2. Click Support & Downloads from the menu on the left side.
3. In the Products and Downloads page, in the Downloads search box, choose Software-Defined WAN
(SD-WAN).
4. In the Select a Product page, from the right-most pane, choose XE SD-WAN Routers.
Install the Cisco IOS XE Catalyst SD-WAN Software for Cisco IOS XE SD-WAN
Release 16.12 and Earlier
All new Cisco IOS XE Catalyst SD-WAN devices ships with the Cisco IOS XE Catalyst SD-WAN software
already installed.
If you have an existing Cisco IOS XE Catalyst SD-WAN device, follow these steps to install the Cisco IOS
XE Catalyst SD-WAN software. The router reboots with the Cisco IOS XE Catalyst SD-WAN image.
1. Download the Cisco IOS XE Catalyst SD-WAN software image from the Cisco site.
2. Upload the Cisco IOS XE Catalyst SD-WAN software image from the file server to the bootflash of
the device. Sample syntax for FTP is given below:
Device# (config)# ip ftp source-interface interface
Device# copyftp:// username:password@server-IP/file-location bootflash:
TFTP:
Device(config)# ip tftp source-interface interface
Device(config)# ip tftp blocksize 8192
Device(config)#exit
Device#copy tftp: bootflash:
SCP (assumes SSH is enabled):
Device# configure terminal
Device# (config)# ip scp server enable
FileServer$ scp filenameusername@router-IP:/filename
7. Add a boot variable that points to the Cisco IOS XE Catalyst SD-WAN image.
Device(config)# boot system flash bootflash:
SDWAN-image
Device(config)# exit
ISR4K# write memory
8. Verify that the BOOT variable points to the Cisco IOS XE Catalyst SD-WAN image.
11. Verify that the config-register is set to 0x2102 or that it will be set to 0x2102 at the next reboot.
Device# show bootvar
15. At the login prompt, log in with the default username and password as admin.
The default password can be used once and then must be changed. If the initial configuration session
times out or if the session is interrupted or terminated before the password is changed and saved,
subsequent login attempts fail. To restore login access to the device, you must reset the password to its
default value through the local console in ROMMON mode. Then the initial provision process must be
restarted. For information about restoring the password, see Recover the Default Password, on page
68.
16. Stop PnP and allow the Cisco IOS XE Catalyst SD-WAN packages to install:
ISR4K# pnpa service discovery stop
17. Configure the upgrade on Cisco IOS XE Catalyst SD-WAN device using request platform software
sdwan software upgarde-confirm.
Router# request platform software sdwan software upgrade-confirm
Router#
*Sep 21 00:26:29.242: %INSTALL-5-INSTALL_START_INFO: R0/0: install_engine: Started
install commit PACKAGE
*Sep 21 00:26:30.153: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install commit PACKAGE
Router#
18. Ensure output of show sdwan software shows CONFIRMED state as user and no other value.
Router# sh sdwan software
VERSION ACTIVE DEFAULT PREVIOUS CONFIRMED TIMESTAMP
-------------------------------------------------------------------------------
16.12.1b.0.4 true true true user 2019-09-21T00:24:22-00:00
19. Configure the Cisco IOS XE Catalyst SD-WAN device using request platform software sdwan
software reset.
Router# request platform software sdwan software reset
Note Once you have installed this image, remember to use the command config-transaction to open CLI
configuration mode. The config terminal command is not supported on Cisco Catalyst SD-WAN routers.
Note Downgrading to fresh install of old image versions is not supported. You can only downgrade to a previous
existing version of old image. For example, if you have never installed Cisco IOS XE Catalyst SD-WAN
16.10.3 on your Cisco IOS XE Catalyst SD-WAN device, and if you try to downgrade from Cisco IOS XE
Catalyst SD-WAN 16.11.1 release to Cisco IOS XE Catalyst SD-WAN 16.10.3 release then this operation is
unsupported and results in unpredictable behavior. However, if you had a 16.10.3 image installed previously,
then you could reactivate it by using the request platform software sdwan activate command.
Note Data is migrated from an existing Cisco Catalyst SD-WAN image to a new Cisco Catalyst SD-WAN image
only during an upgrade. After an upgrade is completed, there is no migration of data between different versions
of installed images for both Cisco IOS XE Catalyst SD-WAN and Cisco vEdge devices. For example, if you
had installed 19.2.4 previously, and 20.3.2 is your current active image, then if you activate the 19.2.4 image,
the additional configurations from 20.3.2 will not be migrated to 19.2.4.
If your IOS Ex router is connected to a DHCP server and you are not using PnP, or if your IOS XE router is
not connected to a DHCP server on the WAN, configure the router manually using the CLI as shown in the
following steps.
You also can configure the hostname by using the system host-name hostname command. Configuring
the hostname is optional, but it is recommended because this name in included as part of the prompt in the
CLI and it is used on various Cisco SD-WAN Manager screens to refer to the device. This command is not
available on the device CLI but it is available when using the CLI device template.
1. Connect to the router using a management console.
2. Stop PnP to allow access to the CLI:
Device# pnpa service discovery stop
Cisco SD-WAN Manager uses the system IP address to identify the device so that the NMS can download
the full configuration to the device.
5. Configure the numeric identifier of the site where the device is located:
Device(config-system)# site-id site-id
6. Configure the IP address of the Cisco SD-WAN Validator or a DNS name that points to the Cisco
SD-WAN Validator. The Cisco SD-WAN Validator's IP address must be a public IP address, to allow
the router to reach the Cisco SD-WAN Validator.
Device(config-system)# vbond (dns-name | ip-address)
7. Configure the organization name, which is the name that is included in the certificates on all devices in
the overlay network. This name must be the same on all devices.
Device(config-system)# organization-name name
8. Configure the tunnel interface to use for overlay connectivity. Ensure that the tunnel interface ID does
not conflict with any other interface IDs that may be auto-assigned by Cisco SD-WAN Manager. You
can verify this in configuration preview.
Device(config)# interface Tunnel #
Device(config-if)# ip unnumbered wan-physical-interface
Device(config-if)# tunnel source wan-physical-interface
Device(config-if)# tunnel mode sdwan
Note • If you are using Cisco SD-WAN Manager feature templates for your configuration, a tunnel interface
is automatically assigned based on the WAN interface used.
• If you switch to Cisco SD-WAN Manager mode from CLI mode, the tunnel interface you configured
may change because Cisco SD-WAN Manager automatically assigns a tunnel interface number based
on the WAN interface used. This change in tunnel number can cause the tunnel to go down before it
comes up again when the configuration is pushed.
9. If the router is not connected to a DHCP server, configure the IP address of the WAN interface:
Device(config)# interface GigabitEthernet #
Device(config)# ip address ip-address mask
Device(config)# no shut
Device(config)# exit
12. If the Cisco SD-WAN Validator address was defined as a hostname, configure DNS:
Device(config)# ip domain lookup
Device(config)# ip name-server dns-server-ip-address
14. If you are using a certificate signed by your enterprise root CA, install the certificate:
Device# request platform software sdwan root-cert-chain install bootflash: certificate
15. Verify that the control connections are up and the router is validated.
Device# show sdwan control connections
PEER PEER PEER SITE DOMAIN PEER PEER PRIV PEER PEER PUB
CONTROLLER
GROUP
PROXY STATE UPTIME ID
------------------------------------
up 1:19:51:40 0
up 1:19:51:45 0
up 1:19:51:38 0
You can now configure SD-WAN features on the router using Cisco SD-WAN Manager templates.
On Premises ZTP Server for Cisco IOS XE Catalyst This feature extends the on-premise Plug
Cisco Catalyst SD-WAN SD-WAN Release 17.3.1a and Play implementation support to Cisco
IOS XE Catalyst SD-WAN routers.
Cisco vManage Release 20.3.1
Note When devices are due for Return Materials Authorization (RMA), the device details are with Cisco PNP.
However, you cannot delete these devices from the RMA list in Cisco SD-WAN Manager. Instead Cisco
SD-WAN Manager administrator can mark the devices returned as invalidated as per RMA.
For information abour Cisco IOS XE Release 17.2 and later, see Install and Upgrade Cisco IOS XE Release
17.2 and Later.
2. Take either of these actions to verify that the ROMmon file that you loaded or transferred appears in the
directory output:
a. If you loaded the ROMmon file into the device bootflash, enter the following command:
b. If you transferred the ROMmon file by using the Cisco SD-WAN Manager CLI, enter the following
command:
vManage# dir bootflash:vmanage-admin
4. Upgrade (or downgrade) the ROMmon file on your device by using the upgrade command as shown in
the following examples:
• Example upgrade command if you loaded the ROMmon file into the device bootflash:
Device# upgrade rom-monitor filename bootflash: C1100-rommon-169-1r-SPA.pkg R0
• Example upgrade command if you transferred the ROMmon file by using Cisco SD-WAN Manager
CLI:
vManage# upgrade rom-monitor filename
bootflash:vmanage-admin/C1100-rommon-169-1r-SPA.pkg R0
5. After a series of messages pertaining to the upgrade display and the router prompt displays, enter the
following command to reload the router:
Device# Reload
6. Enter the following command and verify that the output shows the new ROMmon version:
ISR4K# Show rom-monitor R0
Note To perform factory-reset on a Cisco IOS XE Catalyst SD-WAN ASR 1000 router, ensure that the router is
booted in subpackages mode. Execute show version command and check the output for system image file to
determine the booted image.
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
4. Power the device down and then back up so that your update takes effect.
5. Log in to the device with the user name and the password as admin.
6. In the local console of the device, enter SD-WAN config mode.
7. Enter the following command to set the config-register value to 0x2102:
Device# confreg 0x2102
• For Cisco IOS XE SD-WAN 16.10 releases earlier than release 16.10.4 or for Cisco IOS XE
SD-WAN 16.12 releases earlier than 16.12.2:
Device# request platform software sdwan software reset
10. After the device comes back up, configure a new admin password.
Note All controller devices of the same type must run the same software version. That is, all Cisco SD-WAN
Manager instances must run the same software version, all Cisco SD-WAN Controllers must run the same
software version, and all Cisco SD-WAN Validators must run the same version.
• To install software on a vEdge Cloud router, see Create vEdge Cloud VM Instance on AWS, Create
vEdge Cloud VM Instance on ESXi, or Create vEdge Cloud VM Instance on KVM. During the process
of creating the VM, you install the vEdge Cloud.ova file.
• To install software on a Cisco SD-WAN Manager, see Create Cisco SD-WAN Manager VM Instance on
ESXi or Create Cisco SD-WAN Manager Instance on KVM. During the process of creating the VM, you
install vManage.ova file.
• To install software on a Cisco Catalyst SD-WAN Controller, see Create Cisco Catalyst SD-WAN
Controller VM Instance on ESXi or Create Cisco Catalyst SD-WAN Controller VM Instance on KVM.
During the process of creating the VM, you install the vSmart.ova file.
• To install software on a hardware vEdge router, nothing is required. All vEdge hardware routers ship
with the software already installed.
Note Cisco Catalyst SD-WAN releases starting with Releases 18.4.5, 19.2.2, and 20.1.1 have a security lockout.
When any of these software versions (or later) are installed and activated on a device, a 30-day timer is set
for the removal of any old images that were previously installed on the device. After the timer expires, the
old images are deleted. For example, if you install and activate Release 18.4.5, a 30-day timer starts on the
previously installed Release 19.2.1 image, but not on Release 19.2.2. Similarly if you install and activate
Release 19.2.2, a 30-day timer starts on the previously installed Release 18.4.4 image, but not on Release
18.4.5.
You can continue to activate an older image that is already installed, before the 30-day timer runs out. If the
device restarts before the 30-day timer expires, the timer is reset.
See Cisco Catalyst SD-WAN Command Reference guide for more information.
• request software secure-boot set- Makes the system immediately delete old images* without waiting
the 30 days.
• request software secure-boot status- Displays the installed old images*.
• request software secure-boot list- Prints a list of all old images* that are installed.
Note Cisco SD-WAN Manager downgrade is not supported. Ensure that you take a snapshot of the VM prior to
upgrading Cisco SD-WAN Manager. To rollback to an earlier Cisco SD-WAN Manager release, revert to the
snapshot.
For additional information and caveats regarding software upgrades, see Release Notes.
Note From Cisco Catalyst SD-WAN Control Components Release 20.13.1, for a Cisco
vEdge device, the control session rate for Datagram Transport Layer Security
(DTLS) increases to 4000 pps only for the duration of upgrade and is reset to the
original value after the upgrade is complete.
• If the new software images are located on an FTP server, ensure that the FTP server can handle concurrent
file transfers.
• If the new software images are in the image repository on Cisco SD-WAN Manager, ensure that the
WAN in which Cisco SD-WAN Manager is located has sufficient capacity for concurrent file transfers.
• You cannot include Cisco SD-WAN Manager in a group software upgrade operation. You must upgrade
and reboot Cisco SD-WAN Manager server by itself.
• In a group software upgrade operation, you can upgrade up to 40 Cisco vEdge devices or Cisco IOS XE
Catalyst SD-WAN devices and reboot or activate upto 100 Cisco vEdge devices or Cisco IOS XE Catalyst
SD-WAN devices simultaneously (when the new image is available locally). These maximum numbers
assume that Cisco SD-WAN Manager is idle and only upgrade and reboot operations are being carried
out. In case of other management tasks occuring on Cisco SD-WAN Manager at the same time, the
number of available sessions reduces.
• When you are setting a software image to be the default software image, activate it first, before making
it the default image.
The software upgrade package names for Releases 16.1 and later have the following format, where x.x.x
represents the release version. The strings mips64 and x86_64 represent the underlying chip architecture.
• vEdge router hardware—viptela-x.x.x-mips64.tar.gz
• Cisco SD-WAN Validator, vEdge Cloud router, and Cisco Catalyst SD-WAN
Controller—viptela-x.x.x-x86_64.tar.gz
• Cisco SD-WAN Manager—vmanage-x.x.x-x86_64.tar.gz
For Releases 15.4 and earlier, the software upgrade packages are in files with the extension .tar.bz2, or in the
case of the vEdge 100 router, .tar.gz. The package names have the following format, where x.x.x represents
the release version. The strings mips64 and x86_64 represent the underlying chip architecture.
• vEdge router—viptela-x.x.x-mips64.tar.bz2
• Cisco SD-WAN Validator and Cisco Catalyst SD-WAN Controller—viptela-x.x.x-x86_64.tar.bz2
• Cisco SD-WAN Manager—vmanage-x.x.x-x86_64.tar.bz2
4. If you select Cisco SD-WAN Manager, the Upload Software to Cisco SD-WAN Manager dialog box
opens.
a. Click Browse to select the software images or Drag and Drop the images for vEdge routers, Cisco
SD-WAN Controllers, or Cisco SD-WAN Manager.
b. Click Upload to add the images to Cisco SD-WAN Manager repository.
5. If you select Remote Server, the Location of Software on Remote Server dialog box opens.
a. Enter the version number of the software image.
b. Enter the URL of the FTP or HTTP server on which the images reside.
c. Click OK to point to the software images on the remote host.
6. If you select Remote Server – Cisco SD-WAN Manager, the Upload Software to Cisco SD-WAN Manager
dialog box opens.
a. Enter the hostname of the Cisco SD-WAN Manager server.
b. Click Browse to select the software images or Drag and Drop the software image for vEdge routers,
Cisco SD-WAN Controllers, or Cisco SD-WAN Manager.
c. Click Upload to add the images to Cisco SD-WAN Manager repository.
The added software images are listed in Cisco SD-WAN Manager repository table and are available for
installing on the devices. The table displays the name and type of image, when it was updated, and the URL.
For the desired software version, click ... and select Delete to delete the software version added to the list.
If the upgrade does not complete successfully within 60 minutes, it times out.
If the control connection to Cisco SD-WAN Manager does not come up within 15 minutes, Cisco SD-WAN
Manager automatically reverts the device to the previously running software image.
If the control connection between the device and Cisco SD-WAN Manager does not come up within 15
minutes, Cisco SD-WAN Manager automatically reverts the device to the previously running software image.
4. Confirm, within the configured upgrade confirmation time limit, that the software upgrade was successful:
If you do not issue this command within this time limit, the device automatically reverts to the previous
software image.
We recommend copying the image to local storage before installing, but you can specify the image location
in one of the following ways:
• The image file is on the local server:
/directory-path/
You can use the CLI's autocompletion feature to complete the path and filename.
• The image file is on an FTP server.
ftp://hostname/
• The image file is on an HTTP server.
http://hostname/
• The image file is on a TFTP server.
tftp://hostname/
5. Perform a reset. This resets the device, deleting any existing configuration. The device starts in day zero
configuration.
vEdge# request software reset
Note Only memory or vCPU increase is allowed. After the memory or vCPU is upgraded, you cannot downgrade.
1. Check the current configuration on Cisco SD-WAN Manager using the command show system status.
vManage#show system status
Personality: vmanage
Model name: vmanage
Services: None
vManaged: false
Commit pending: false
Configuration template: None
vCPU 16 32
Memory 32 G 64 G or 128 G
Memory 64 G 128 G
Personality: vmanage
Model name: vmanage
Services: None
vManaged: false
Commit pending: false
Configuration template: None
Chassis serial number: None
6. Use the following command to reconfigure Cisco SD-WAN Manager to use the new disk size.
request nms application-server resize-data-partition
For more details about the cluster upgrade processes, see Cisco Catalyst SD-WAN Manager Cluster Creation
and Troubleshooting guide.
Support for Cisco IOS XE This feature enables support for a Software Maintenance Upgrade
Software Catalyst SD-WAN (SMU) package that can be installed on Cisco IOS XE Catalyst
Maintenance Release 17.9.1a SD-WAN devices. The SMU package provides a patch fix or a
Upgrade Package security resolution to a released Cisco IOS XE image. Developers
Cisco vManage
can build this package that provides a fix for a reported issue
Release 20.9.1
without waiting for the fix to become available in the next release.
SMU Support for Cisco IOS XE Added support for Cisco ISR 1100 and ISR 1100X Series
Cisco ISR1100 and Catalyst SD-WAN Integrated Services Routers.
ISR1100X Series Release 17.11.1a
Routers
Cisco vManage
Release 20.11.1
Cisco IOS XE Catalyst SD-WAN • Cisco ISR 1000 Series Integrated Services Routers
Release 17.9.1a and later
• Cisco IR1101 Integrated Services Router Rugged
• Cisco ISR 4000 series Integrated Services Routers
• Cisco ASR 1000 Series Aggregation Services Routers
• Cisco Catalyst 8500 Series Edge Platforms
• Cisco Catalyst 8500L Series Edge Platforms
• Cisco Catalyst 8000v Series Edge Platforms
Cisco IOS XE Catalyst SD-WAN Cisco ISR 1100 and ISR 1100X Series Integrated Services Routers
Release 17.11.1a and later
To install an SMU image on a Cisco IOS XE Catalyst SD-WAN device, follow these steps:
1. Download an SMU image for your release from the Cisco site, https://software.cisco.com.
2. Perform one of the following actions to upload an SMU image:
• Upload an SMU image by adding the image to the device software repository using Cisco SD-WAN
Manager. For more information about adding, viewing, and activate an SMU image, see Manage
Software Maintenance Upgrade Images, on page 82.
• Upload an SMU image by copying the image to the bootflash of your device using the CLI. For more
information about installing and activating an SMU image using the CLI, see Manage Software
Maintenance Upgrade Images Using the CLI, on page 83.
Note The device reboot occurs based on whether the SMU image type is hot or cold.
For more information about the SMU package types, see SMU Types, on page
81.
If the SMU image is compatible with the Cisco IOS XE Software image on the device, the upgrade task
is successful and the SMU image is installed and activated on the device. If the upgrade task is not
successful, the device automatically reverts to the state that it was in before the SMU image activation.
The following are the steps to deactivate and remove an SMU image from a Cisco IOS XE Catalyst SD-WAN
device:
1. Deactivate a currently active SMU image on a Cisco IOS XE Catalyst SD-WAN device and wait for the
status to change from "Active" to "Installed" in Cisco SD-WAN Manager.
If the SMU image deactivation on a device fails, the device automatically reverts to the state that it was
in before the image deactivation.
2. Remove an SMU image from a device and have the base image version (Cisco IOS XE image version)
on the device.
Ensure that you deactivate the SMU image before you remove it.
Cisco SD-WAN Manager receives several notifications during the SMU image upgrade and you receive
success or failure messages, as applicable. Use the Task View window to see these messages.
SMU Types
An SMU type describes the effect of an installed SMU package on a Cisco IOS XE Catalyst SD-WAN device.
The following are the SMU package types:
• Hot SMU (non-reload): Enables an SMU package to take effect after an SMU image activation without
rebooting (reloading) the Cisco IOS XE Catalyst SD-WAN device.
• Cold SMU (reload): Enables an SMU package to take effect after rebooting (reloading) the Cisco IOS
XE Catalyst SD-WAN device.
Note When an SMU image is activated and deactivated, the device reboot may be triggered based on non-reload
or reload SMU types. A non-reload SMU type does not trigger a device reboot, but a reload SMU type triggers
a device reboot.
3. Upgrade an SMU image using the Cisco SD-WAN Manager software upgrade window.
See the Cisco SD-WAN Manager Upgrade the Software Image on a Device procedure in the Cisco Catalyst
SD-WAN Monitoring and Operations guide. Note the following points about the SMU image that you
choose to upgrade:
• In the devices table, the Available SMUs column displays the number of SMU images that are
available for the current base image version.
• View a list of all available SMU versions and the upgrade images for a device by clicking a desired
entry under the Available SMUs column. In the Available SMUs dialog box, you can view the SMU
versions, SMU types, and the state of an SMU version.
The SMU version is in the format base_image_version.cdet_id.
• In the Upgrade dialog box, optionally check Activate and Reboot to activate an SMU image and
perform a reboot of the Cisco IOS XE Catalyst SD-WAN device automatically.
After you check the Activate and Reboot check box, Cisco SD-WAN Manager installs and activates
the SMU image on a device and triggers a reload based on the SMU type. For more Information
about activating a software image, see the Cisco SD-WAN Manager Activate a Software Image
procedure in the Cisco Catalyst SD-WAN Monitoring and Operations guide.
After a successful upgrade of an SMU image, the Cisco IOS XE Catalyst SD-WAN device sends a
corresponding success message.
Note When an SMU image is activated and deactivated, the device reboot may be triggered based on non-reload
or reload SMU types. A non-reload SMU type does not trigger a device reboot, but a reload SMU type triggers
a device reboot.
3. Install an SMU image from the bootflash of your device and perform a compatibility check for the device
and SMU package version.
Device# request platform software sdwan smu install file-path
4. Activate the SMU image on a Cisco IOS XE Catalyst SD-WAN device.
request platform software sdwan smu activate build-number.smu-defect-id
Device#
5. Confirm the upgrade of the SMU image within the configured confirmation time limit.
Device# request platform software sdwan smu upgrade-confirm
Note If you don’t issue this command on the device within the time limit that is specified in the upgrade-confirm
minutes command, the device automatically reverts to the state that it was in before the SMU image activation.
Note If you do not issue this command on the device within the time limit specified in the upgrade-confirm minutes
command, the image deactivation fails and the device automatically reverts to the state that it was in before
the SMU image deactivation.
The following examples show commands that you can use to manage the SMU image operations.
• Check the upgrade and confirm the configuration:
show sdwan running system
• Execution commands:
• request platform software sdwan smu install bootflash:
c8000v-universalk9.2022-08-17_23.44_mcpre.24042.CSCvq24042.SSA.smu.bin
--------------------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------------------
The output shows that an SMU image is installed and activated from the bootflash file system. You
can track the time that is left for rollback of an SMU image from the Auto abort timer value. This
value displays the time that is left for the Auto abort timer to expire and the device to roll back.
Example 2:
The following example shows the output after using the request platform software sdwan smu
deactivate command to deactivate an SMU image.
Device# request platform software sdwan smu deactivate 17.09.01a.0.247.CSCvq24042
smu_deactivate: START Mon Mar 5 21:54:06 PST 2021
smu_deactivate: Deactivating SMU
Executing pre scripts....
The output shows that an SMU image is deactivated from the device.
The following is a sample output from the show install summary command after deactivating an
SMU image.
Device# show install summary
[ R0 ] Installed Package(s) Information:
State (St): I - Inactive, U - Activated & Uncommitted,
C - Activated & Committed, D - Deactivated & Uncommitted
--------------------------------------------------------------------------------
Type St Filename/Version
--------------------------------------------------------------------------------
IMG C 17.09.01a.0.247
SMU D bootflash: c8000v-universalk9.2022-08-17_23.44_mcpre.24042.CSCvq24042.SSA.smu.bin
--------------------------------------------------------------------------------
Auto abort timer: active , time before rollback - 00:04:57
--------------------------------------------------------------------------------
The following sample output shows the output of deactivating an SMU image after confirming that
the SMU image can be deactivated using the request platform software sdwan smu
upgrade-confirm command.
Device# request platform software sdwan smu deactivate 17.09.01a.0.247.CSCvq24042
CSCvq24042:SUCCESS
SUCCESS: install_deactivate /bootflash/c8kv_hot.bin Thu Aug 25 17:47:33 UTC 2022
The following is a sample output from the show install summary command after removing an SMU
image.
Device# show install summary[ R0 ] Installed Package(s) Information:
State (St): I - Inactive, U - Activated & Uncommitted,
C - Activated & Committed, D - Deactivated & Uncommitted
--------------------------------------------------------------------------------
Type St Filename/Version
--------------------------------------------------------------------------------
IMG C 17.09.01a.0.247
--------------------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------------------
Example 3:
The following is a sample output from the show install package command to view the metadata of
an SMU image such as, SMU type, SMU ID, SMU defect ID, and so on.
Device# show install package bootflash:
c8000v-universalk9.2022-08-17_23.44_mcpre.24042.CSCvq24042.SSA.smu.bin
Name: c8000v-universalk9.2022-08-17_23.44_mcpre.24042.CSCvq24042.SSA.smu.bin
Version: 17.09.01a.0.247.1660805065
Platform: C8000V
Package Type: SMU
Defect ID: CSCvq24042
Package State: Inactive
Supersedes List: {}
SMU Fixes List: {}
SMU ID: 24042
SMU Type: non-reload
SMU Compatible with Version: 17.09.01a.0.247
SMUImpact:
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Install and Upgrade Cisco IOS XE Catalyst SD-WAN This feature supports the use of a
Release 17.2.1r single "universalk9" image to
deploy Cisco IOS XE Catalyst
SD-WAN and Cisco IOS XE
functionality on all the supported
devices. This universalk9 image
supports two modes - Autonomous
mode (for Cisco IOS XE features)
and Controller mode (for Cisco
Catalyst SD-WAN features) .
Cisco Catalyst 8000V Edge Cisco IOS XE Catalyst SD-WAN Support added for the Cisco
SoftwarePlatform Release 17.4.1a Catalyst 8000V Edge Software
platform. Upgrading Cisco
CSR1000V or Cisco ISRv
platforms to Cisco IOS XE Catalyst
SD-WAN Release 17.4.1a includes
upgrading to the platform type to
the Cisco Catalyst 8000V.
Starting with Cisco IOS XE Catalyst SD-WAN Release 17.2.1r, use the universalk9 image to deploy both
Cisco IOS XE Catalyst SD-WAN and Cisco IOS XE on Cisco IOS XE Catalyst SD-WAN devices.
Starting Cisco IOS XE Catalyst SD-WAN Release 17.2.1r, UCMK9 image is not available.
This release helps in seamless upgrades of both the Cisco Catalyst SD-WAN and non Cisco Catalyst SD-WAN
features and deployments.
Access the Cisco IOS XE and Cisco IOS XE Catalyst SD-WAN functionality through Autonomous and
Controller execution modes, respectively. The Autonomous mode is the default mode for the routers and
includes the Cisco IOS XE functionality. To access Cisco IOS XE Catalyst SD-WAN functionality, switch
to the Controller mode. You can use the existing Plug and Play Workflow to determine the mode of the device.
• Platforms Supported in Controller Mode, on page 90
• Cisco IOS XE Image Compatibility, on page 91
• Upgrade Considerations, on page 91
• Restrictions, on page 92
• Self-Signed Trustpoint, on page 93
• Introducing Autonomous and Controller Mode, on page 93
• Software Installation for Cisco IOS XE Routers, on page 94
• Plug and Play in Cisco IOS XE Catalyst SD-WAN Release 17.2.1r and Later Releases, on page 96
• Non-PnP Onboarding, on page 99
• Mode Discovery and Mode Change with Bootstrap Files, on page 101
• Reset Controller Mode Configuration, on page 103
• Mode Switching: Additional Information, on page 104
• Verify Controller and Autonomous Modes, on page 105
• Change the Console Port Access After Installation, in Controller Mode, on page 106
• Upgrade to Cisco IOS XE Release 17.2.1r or Later, on page 108
• Downgrade from Cisco IOS XE Catalyst SD-WAN Release 17.2.1r or Later Releases, on page 111
• Restore Smart Licensing and Smart License Reservation, on page 113
• Onboard Cisco Catalyst 8000V Edge Software Hosted by a Cloud Service, Using PAYG Licensing, on
page 114
• Bootstrap Process for Cisco Catalyst SD-WAN Cloud-Hosted Devices, on page 116
• Troubleshooting, on page 117
• * For Cisco Catalyst SD-WAN use case, non-LI and non-payload encryption image types are not supported.
• ** For non Cisco Catalyst SD-WAN use case, non-LI and non-payload encryption image types are
supported (universalk9_noli, universalk9_npe, universalk9_npe_noli).
Upgrade Considerations
The following Cisco IOS XE Catalyst SD-WAN devices support multirate interfaces and support the 1GE
SFP (optical and CU) and 10GE SFP+ (optical and CU) modules on their 10G interfaces ports:
• Cisco ASR 1001-HX Router
• Cisco Catalyst 8500-12X4QC
• Cisco Catalyst 8500-12X
These devices support auto-negotiation on 10G interfaces ports with 1GE SFP (optical and CU) modules. The
following notes apply to auto-negotiation in both SD-WAN and non-SD-WAN modes:
• For releases before Cisco IOS XE 17.6.1a, auto-negotiation can be configured using the CLI.
• For releases before Cisco IOS XE 17.6.1a, if you use the CLI or Cisco Catalyst SD-WAN to reboot a
device with a 10G interface that includes a 10GE SFP+ module, that interface will not come up. In this
situation, use Cisco Catalyst SD-WAN or the CLI to configure no negotiation auto for the
interface, then reboot the device.
• From Cisco IOS XE Release 17.6.3a, auto neg values for auto-negotiation are pushed to 10G interfaces
on supported devices through feature templates. Ensure that you know which SFP module is on which
10G interface on a device so that you can properly configure the feature template.
• From Cisco IOS XE Release 17.6.3a, the negotiation auto command is not supported on a 10G
interface that includes a 10GE SFP+ module.
• From Cisco IOS XE Release 17.6.3a, the no negotiation auto command with the default OFF
option must be sent through a feature template to all 10G interfaces that include a 10GE SFP+ module.
Otherwise, the template push fails.
• Before upgrading to Cisco IOS XE Release 17.6.3a, use a feature template, a CLI add-on feature templates,
or the CLI to apply no negotiation auto to all 10G interfaces that include a 10GE SFP+
module.
• If you upgrade to Cisco IOS XE Release 17.6.3a from a release in which auto-negotiation was enabled
on a 10G interface that includes a 10GE SFP+ module, that interface will not come up. In this situation,
use the CLI to configure no negotiation auto for the interface after the upgrade completes.
• Before upgrading to Cisco Catalyst SD-WAN Manager Release 20.12.1 or Cisco IOS XE Catalyst
SD-WAN Release 17.12.1a or later releases, contact Cisco TAC to check and drop any non-compatible
indexes. Non-compatible old index can impact successful upgrade to newer version.
Restrictions
Restrictions for single "universalk9" image
• Dual-IOSd is supported only in autonomous mode.
• Images without payload encryption and NO-LI (universalk9_npe, universalk9_noli, universalk9_npe_noli)
images are not supported in controller mode. Only universalk9 images are supported.
• After onboarding and determining the mode of operation, changing from Controller mode to Autonomous
mode or vice-versa, results in the loss of configuration.
• Reset button functionality is not supported in controller mode on Cisco ISR 1000 series Integrated Service
Routers. The reset button does not function to restore a golden image or configuration in controller mode.
• Auto-install (Python and TCL scripts) and ZTP—Autoinstall and ZTP are not supported in controller
mode. If DHCP discovers an attempt to install using either of these processes, a mode change to
Autonomous mode is triggered.
• WebUI—In controller mode, WebUI is not supported and an error message is displayed, if used.
Self-Signed Trustpoint
A self-signed trustpoint is generated and loaded to a Cisco IOS XE Catalyst SD-WAN device when the device
boots up. If this trustpoint is deleted for any reason, you can generate and load a new trustpoint by rebooting
the device. The new key may be different than the deleted one.
Table 10:
Install Software on Cisco ASR, Cisco ISR and Cisco ENCS Platforms
Refer to the following documents for installation instructions:
• Cisco ISR 1000 Series Integrated Services Router
• Cisco ISR 4000 Series Integrated Services Routers
• Cisco ASR 1000 Series Aggregation Services Routers
• Installing Cisco Enterprise NFVIS on Cisco ENCS 5100 and ENCS 5400
Support for the Cisco Catalyst Cisco IOS XE Catalyst SD-WAN This feature introduces support for
8000V Edge Software Platform on Release 17.7.1a managing a Cisco Catalyst 8000V
OpenStack Train Edge software platform hosted in
the OpenStack cloud computing
platform "Train" release.
Beginning with Cisco IOS XE Catalyst SD-WAN Release 17.4.1a, Cisco Catalyst SD-WAN supports the
Cisco Catalyst 8000V virtual router platform, which replaces the Cisco CSR1000V and Cisco ISRv. Installing
the Cisco Catalyst 8000V in an Cisco Catalyst SD-WAN environment requires Cisco vManage Release 20.4.1
or later.
Download the Cisco Catalyst 8000V software image that is appropriate for your method of deployment. For
example, this can be an OVA file for ESXi, or a QCOW2 image for OpenStack or KVM. Do not choose an
ISO image. Have the image ready to upload to the Cisco SD-WAN Manager software image repository. The
file name begins with: c8000v-universalk9
Note To operate with Cisco Catalyst SD-WAN, the device must be in controller mode. When starting the device
in controller mode, boot the device using the bootflash:packages.conf file.
For complete information about the platform, including installation in KVM, ESXi, and OpenStack
environments, see the Cisco Catalyst 8000V Edge Software Installation and Configuration Guide. For
information about creating a bootstrap file for onboarding the Cisco Catalyst 8000V into Cisco Catalyst
SD-WAN, see Bootstrap Process for Cisco Catalyst SD-WAN Cloud-Hosted Devices.
Clean Install
We recommend a clean install of the Cisco Catalyst 8000V. This ensures support for all features, provides
the most up-to-date licensing, and ensures that devices and the controller stay synchronized. For cases where
upgrade is necessary, see the procedure in Upgrade to Cisco IOS XE Release 17.2.1r or Later.
Note After a clean install of the Cisco Catalyst 8000V, it is not possible to downgrade the device to a release earlier
than Cisco IOS XE Catalyst SD-WAN Release 17.4.1a.
OpenStack
Installing a Cisco Catalyst 8000V on the OpenStack Train release requires using a Cisco IOS XE Catalyst
SD-WAN Release 17.7.1a or later image for the Cisco Catalyst 8000V.
Cisco does not support installing a Cisco Catalyst 8000V on OpenStack using an earlier image, or installing
on OpenStack using an earlier image and upgrading to Cisco IOS XE Catalyst SD-WAN Release 17.7.1a.
Note If you created and scheduled a device template on Cisco vManage Release 20.3.x and upgraded Cisco SD-WAN
Manager to Cisco vManage Release 20.4.1 or later before onboarding the target device, when you onboard
the device using PNP or ZTP, the template push fails. To avoid this failure, reschedule the template after
upgrading the Cisco SD-WAN Manager software and then onboard the device.
Note If the ZTP process for a device is interrupted because the device reloads or power cycles, the ZTP process
does not restart and the device comes online with the Cisco SD-WAN Manager image that was in its original
configuration. In this situation, upgrade the device to the desired Cisco SD-WAN Manager release manually.
Note For more information, refer to the Plug and Play Support Guide.
When you upgrade to Cisco IOS XE Catalyst SD-WAN Release 17.2.1r or later, on a Cisco device that already
runs a Cisco IOS XE or Cisco Catalyst SD-WAN image, the device starts in autonomous mode or controller
mode depending on the configured controller.
Plug and Play (PnP) deployment include the following discovery process scenarios:
Table 12:
Autonomous Cisco Digital Plug and Play No Plug and Play No Mode
Network Connect Discovery change
Architecture or on-premise plug
(DNA) and play server
discovery
Autonomous Cisco SD-WAN Plug and Play Yes Plug and Play Mode change
Manager Connect Discovery to controller
mode
Controller Cisco DNA Plug and Play No Plug and Play Mode change
Connect Discovery to
or on-premise plug autonomous
and play server mode
discovery
Controller Cisco SD-WAN Plug and Play Yes Plug and Play No mode
Manager Connect Discovery change
Day 0 WAN Interface Automatic Cisco IOS XE Catalyst SD-WAN This feature enables a device to
IP Detection using ARP Release 17.7.1a automatically learn about the
available IP addresses and default
Cisco SD-WAN Release 20.7.1
gateway information when a DHCP
Cisco vManage Release 20.7.1 server is not available. The device
assigns an IP address to its WAN
interface, and then contacts the PnP
server and begins the PnP
onboarding process.
Typically, the WAN interface on a Cisco IOS XE Catalyst SD-WAN device or Cisco vEdge device is configured
as a DHCP client, and this interface receives an IP address and gateway server information from the DHCP
server during the plug-and-play (PnP) onboarding process.
If the DHCP server is not available, the device automatically learns about the available IP addresses and
default gateway information by using Address Resolution Protocol (ARP) packets. If an IP address that the
device learns allows a successful connection to the PnP server, the device continues with the PnP onboarding
process.
Note This feature applies only to day zero deployments and is enabled by default.
For automatic IP address detection, a device uses 8.8.8.8 or 8.8.4.4 as the DNS server to resolve
devicehelper.cisco.com or ztp.cisco.com. The PnP process then attempts to reach devicehelper.cisco.com or
ztp.cisco.com to continue onboarding.
Note An IP address that a device automatically detects is not preserved during reboots of the device that occur
before the PnP onboarding completes. In such cases, an IP address is assigned automatically when the PE
router ARP cache expires.
Non-PnP Onboarding
Creating a Cisco Catalyst SD-WAN Bootstrap Configuration File
See On-Site Bootstrap Process for Cisco Catalyst SD-WAN Devices and Generate a Bootstrap File For Cisco
IOS XE Catalyst SD-WAN Devices Using the CLI for information about generating a bootstrap file.
Note • The bootstrap file (ciscosdwan.cfg) is generated by Cisco SD-WAN Manager, and has UUID, but no
OTP.
• For software devices (Cisco Catalyst 8000V Edge Software, Cisco Cloud Services Router 1000V Series,
and Cisco ISRv), and for OTP-authenticated devices such as the Cisco ASR1002-X, use the bootstrap
file ciscosdwan_cloud_init.cfg. This file has OTP but no UUID validation.
Autonomous Mode
The controller-mode disable command switches the device to autonomous mode.
Device# controller-mode disable
Controller Mode
Note To switch the device to the controller-mode, boot the system using either the bootflash:/*.bin or
bootflash:/packages.conf file.
Note If bootflash:core or harddisk:core contain core files (files containing information about process crashes), move
the files to another location before changing the device to controller mode. If these files remain in the
bootflash:core or harddisk:core directories, Cisco SD-WAN Manager displays an alarm after onboarding the
device. You can move the files to any other directory on the device other than a core directory.
Notes
Note Description
Bundle mode If device is booted with bundle mode (Super packages), after reboot,
the image gets automatically expanded and activated to prepare the
router for SDWAN operation. Devices with 4GB RAM may require an
additional reboot to free up space in /bootflash. The following devices
with 4GB RAM need reload:
• Cisco ISR 4451
• Cisco ISR 4431
• Cisco ISR 4461
• Cisco ISR 4351
• Cisco ISR 4331
• Cisco ISR 4321
Viewing the contents of the You cannot view the contents of the bootflash:/.sdwaninstaller directory
bootflash:/.sdwaninstaller directory of a Cisco IOS XE Catalyst SD-WAN device in either of the following
conditions:
• The device is in controller mode.
or
• The device is in autonomous mode and using Cisco IOS XE
Catalyst SD-WAN Release 17.6.1a or later.
Note If your Cisco IOS XE Catalyst SD-WAN device is already running an older Cisco Catalyst SD-WAN
configuration version and when you upgrade your device from Cisco IOS XE Catalyst SD-WAN Release
16.x to Cisco IOS XE Catalyst SD-WAN Release 17.2.1r or later , the device boots up in autonomous mode.
To prevent the device from booting up in autonomous mode, before performing the device upgrade, ensure
that you remove the stale Cisco Catalyst SD-WAN configuration file from the bootflash.
Detailed steps to delete all Cisco Catalyst SD-WAN artifacts from bootflash:
delete /force bootflash:/ciscosdwan*.cfg
delete /force /recursive bootflash:/.sdwaninstallerfs
delete /force /recursive bootflash:/.sdwaninstaller
delete /force /recursive bootflash:/.sdwaninternal
delete /force /recursive bootflash:/sdwan
delete /force /recursive bootflash:/vmanage-admin
delete /force /recursive bootflash:/.cdb_backup
delete /force /recursive bootflash:/.installer/active
delete /force /recursive bootflash:/.installer
On a device that already runs a Cisco Catalyst SD-WAN image, after upgrading to a Cisco IOS XE Catalyst
SD-WAN Release 17.2.1r or later image, the device boots up in controller mode.
Note Installing the Cisco Catalyst 8000V on OpenStack requires using the Cisco Catalyst 8000V image for Cisco
IOS XE Catalyst SD-WAN Release 17.7.1a or later.
Use the controller-mode enable command to switch from autonomous to controller mode and the
controller-mode disable command to switch from controller mode to autonomous mode.
To switch modes using CLI, ensure that the appropriate configuration files mentioned in the table below are
present. After the device boots up, the configuration present in the configuration file is applied. The device
reads the configuration file and uses the configuration information to come up on the network.
Note On a Cisco CSR1000v device (for Cisco IOS XE Release 17.2 or later) and a Cisco Catalyst 8000V (for Cisco
IOS XE Release 17.4 or later) image deployment, if you want to boot up the device in controller mode, load
the bootstrap file generated by Cisco SD-WAN Manager by bootstrap (ESXi, KVM, and OpenStack) or
user-data (AWS) or custom-data (Azure and GCP).
The following fields must be present in the ciscosdwan_cloud_init.cfg bootstrap file:
• otp
• uuid
• vbond
• org
Note When the device mode is switched from autonomous to controller, the startup configuration and the information
in NVRAM (certificates), are erased. This action is equivalent to running the write erase command.
Note When the device mode is switched from controller to autonomous, all Yang-based configuration is preserved
and can be reused if you switch back to controller mode.
Note When the device is in Day N configuration and is reloaded, the presence of a bootstrap file does not impact
the device operating mode.
Note You cannot view the contents of the bootflash:/.sdwaninstaller directory and .sdwanistallerfs file of a Cisco
IOS XE Catalyst SD-WAN device in either of the following conditions:
• The device is in controller mode.
or
• The device is in autonomous mode and using Cisco IOS XE Catalyst SD-WAN Release 17.6.1a or later.
Directory, more, copy and delete operations are not allowed when the file and directory are hidden in
controller-mode.
To erase the Cisco Catalyst SD-WAN configuration of the current active image, use the following CLI:
Device# request platform software sdwan config reset
%WARNING: Bootstrap file doesn't exist and absence of it can cause loss of connectivity to
the controller.
For saving bootstrap config, use:
request platform software sdwan bootstrap-config save
Proceed to reset anyway? [confirm]
Backup of running config is saved under /bootflash/sdwan/backup.cfg
WARNING: Reload is required for config-reset to become effective.
Note The warning listed in the above configuration is visible only on Cisco IOS XE Catalyst SD-WAN Release
17.3.1a and later images.
For the changes to take effect, you must reload the router after running the CLI. Running this CLI ensures
the configuration for the currently installed version is wiped along with crypto keys and the device enters the
day zero workflow after the reload.
If the device is not set up to use PnP for onboarding, then it reads the configuration file in the bootflash and
uses the configuration information to come up on the network. If the device is setup to use PnP onboarding,
then after reload, the PnP discovery will start again.
Note In the case of public clouds, just like a fresh install, additional bootstrap configuration is provisioned that
allows you to login to the instance.
Note In public cloud and NFVIS environments, ensure that a latest day-zero bootstrap configuration file (exported
from Cisco SD-WAN Manager) is available in a supported location and following standard file naming
conventions (example: bootflash:/ciscosdwan_cloud_init.cfg file), before the configuration reset operation is
performed.
Warning Failure to follow save the bootstrap file in these environments cause loss of virtual machine connectivity.
Autonomous Controller Contents of NVRAM and the startup configuration are erased.
Configuration is not be restored. Device is reverted to Day zero
configuration. Previous running configuration is stored in
bootflash.
Note When you switch from autonomous mode to
controller mode, and switch back to autonomous
mode, the Cisco IOS XE configuration is not
restored because the startup configuration is empty.
You have to manually restore configuration from
the backup.
Controller Autonomous CDB contents are erased (for subsequent mode switches) and
Cisco IOS configuration are not restored (as startup configuration
is empty). You have to manually restore configuration from the
backup.
/tmp/chassis/local/rp/chasfs/etc/device_managed_mode : [controller]
/tmp/fp/chasfs/etc/device_managed_mode : [controller]
Device# show version | inc Last reload
Last reload reason: Enabling controller-mode
/tmp/chassis/local/rp/chasfs/etc/device_managed_mode : [autonomous]
/tmp/fp/chasfs/etc/device_managed_mode : [autonomous]
Device# show version | inc Last reload
Last reload reason: Enabling autonomous-mode
Note If the device is in controller mode, the show sdwan running-config command does not display the following
information:
• All service commands under /native/service except tcp-small-servers, udp-small-servers, tcp-keepalives-in,
and tcp-keepalives-out
• Configurations under line VTY except for transport, access-class, and ipv6 access-class
• IPv6 unicast routing configuration
• Commands in /native/enable
2. Disable controller mode. Enter the following command and follow the prompts to complete the command.
Device# controller-mode disable
3. After the device restarts, enter enable to enter privileged EXEC mode.
Router> enable
• serial: This option specifies that the device is accessed through the serial port on the virtual machine
(VM).
Note • Use this option only if your hypervisor supports serial port console access.
• If the device configuration is stored as a Cisco SD-WAN Manager device
template and is attached to the device using Cisco SD-WAN Manager, enter
the command
Device(config)# platform console serial
to the CLI add-on feature template. For more information on CLI Add-On
Feature Templates see, Cisco Catalyst SD-WAN Systems and Interfaces
Configuration Guide. This helps in avoiding Cisco SD-WAN Manager
removing the serial port when the device template is attached to the device.
• auto: (This option has been deprecated and is not recommended.) This option specifies that the device
console is detected automatically. This is the default setting during the initial installation boot process.
For additional information, see Booting the Cisco CSR 1000v as the VM.
9. Change the device back to controller mode. Enter the following command and follow the prompts to
complete the command.
Device# controller-mode enable
Cisco IOS XE Catalyst SD-WAN Release 17.4.1a Cisco IOS XE SD-WAN 17.3.1a or later
Cisco IOS XE SD-WAN 17.2.2 or later
Cisco IOS XE SD-WAN 16.12.4a or later
Note • To upgrade a Cisco CSR1000V or
Cisco ISRv router to Cisco IOS XE
Catalyst SD-WAN Release 17.4.1a
from a release not listed here
requires first upgrading to one of
these releases.
• Upgrading a Cisco CSR1000V or
Cisco ISRv router to Cisco IOS XE
Catalyst SD-WAN Release 17.4.1a
includes upgrading to the Cisco
Catalyst 8000V.
Cisco IOS XE Catalyst SD-WAN Release 17.2.1r Cisco IOS XE SD-WAN 16.12.x
Cisco IOS XE SD-WAN 16.11.x
Cisco IOS XE SD-WAN 16.10.x
Cisco IOS XE SD-WAN 16.9.x
Table 17: All Routers Supported by Cisco Catalyst SD-WAN Except Cisco CSR1000V, Cisco ISRv, and Cisco Catalyst 8000V
Cisco IOS XE Catalyst SD-WAN Release 17.4.1a Cisco IOS XE SD-WAN 17.3.1a or later
Cisco IOS XE SD-WAN 17.2.1 or later
Cisco IOS XE SD-WAN 16.12.4a or later
Cisco IOS XE Catalyst SD-WAN Release 17.2.1r Cisco IOS XE SD-WAN 16.12.x
Cisco IOS XE SD-WAN 16.11.x
Cisco IOS XE SD-WAN 16.10.x
Cisco IOS XE SD-WAN 16.9.x
Use the following procedures to upgrade your device to Cisco IOS XE Catalyst SD-WAN Release 17.2.1r or
later images.
Note Do not delete the existing image to ensure that you have a rollback option.
Note If an upgrade fails, do not attempt to reactivate the new software image. Instead, remove the new software
image, identify and correct any configuration settings that might have caused the failure, and try the upgrade
procedure again. If the issue persists, contact Cisco for assistance.
Note When upgrading to Cisco IOS XE Catalyst SD-WAN Release 17.4.1a from Cisco IOS XE Releases 17.3.1a
or earlier, we recommend that you do not make any changes to the device configuration using CLI, while a
feature template is detached. Starting Cisco IOS XE Catalyst SD-WAN Release 17.4.1a, we use Cisco Catalyst
SD-WAN assisted upgrades. In this upgrade procedure, Cisco Catalyst SD-WAN saves the device configuration
before the upgrade. If the configuration on the device, that is modified using CLI is not same as on Cisco
Catalyst SD-WAN, then the device has inconsistent configuration after the upgrade.
For example, if you configure the BGP AS number of a device to a different value using CLI, the device can
have inconsistent configuration and the upgrade fails. If the upgrade is performed when the device is in CLI
mode, then you must revert the BGP AS number to the original value and then upgrade the device. Therefore,
we recommend that you upgrade the device using Cisco Catalyst SD-WAN.
Note Beginning with Cisco IOS XE Catalyst SD-WAN Release 17.5.1a, if you are upgrading the firmware for a
device on which the primary tunnel interface is a cellular interface and the backup tunnel interface is a gigabit
interface, use the gigabit interface as the primary interface for the firmware upgrade.
For information about configuring the priority of a tunnel interface, see the vmanage-connection-preference
command in Cisco Catalyst SD-WAN Command Reference. An interface that is configured with a higher
preference value has a higher priority.
Note If the deployment is on a public cloud service, such as Amazon Web Services (AWS), failure to save the
configuration before upgrading manually can cause an unrecoverable loss of connectivity with the device. In
contrast to a hardware device, there may be no way to gain any type of console access to the virtual router.
1. Use the following command to make a backup copy of the Cisco IOS XE Catalyst SD-WAN configuration:
show running-config | redirect bootflash:/sdwan/ios.cli
2. Use the following command to make a backup copy of the Cisco Catalyst SD-WAN running configuration:
show sdwan running-config | redirect bootflash:/sdwan/sdwan.cli
Upgrade Procedure
1. Download the Cisco IOS XE Release 17.2 image for your device from https://software.cisco.com
2. Upload the image to the device.
3. Install the new software. Example:
Device# request platform software sdwan software install
bootflash:/isr4300-universalk9.17.2.1.SPA.bin
4. Activate the software. The device reloads when the activation is complete. Example:
Device# request platform software sdwan software activate 17.2.01r.9.3
6. (Optional) To ensure that the new version is preserved if software reset required, use the following
command. Example:
Device# request platform software sdwan software set-default 17.2.01r.9.3
7. Verify the upgrade using request platform software sdwan software upgrade-confirm.
Device# request platform software sdwan software upgrade-confirm
Note From 17.6.1 release, you cannot perform another install, activate or deactivate operation for an image or a
Software Maintenance Update (SMU), when the upgrade-confirm function is pending for an existing operation.
Note In controller mode, use the config-transaction command to enter global configuration mode. The configuration
terminal command is not supported in Controller mode.
Cisco IOS XE SD-WAN Release Cisco IOS XE Catalyst SD-WAN Device boots up in controller mode
16.12 and earlier (ucmk9) Release 17.2.1r (universalk9) and configuration is preserved.
Cisco IOS XE Release 16.12 and Cisco IOS XE Catalyst SD-WAN Device boots up in autonomous
earlier (universalk9) Release 17.2.1r (universalk9) mode and configuration is
preserved (via startup
configuration).
Example:
VERSION ACTIVE DEFAULT PREVIOUS CONFIRMED TIMESTAMP
----------------------------------------------------------------------------------
16.10.400.0.0 false true true auto 2019-11-20T04:40:05-00:00
17.3.1.0.102822 true false false auto 2020-07-31T11:01:22-00:00
2. Activate the image. This resets the device, deleting any existing configuration. The device starts in day
zero configuration.
Device# request platform software software activate desired-build
Example:
Device# request platform software software activate 16.10.400.0.0
Example:
VERSION ACTIVE DEFAULT PREVIOUS CONFIRMED TIMESTAMP
----------------------------------------------------------------------------------
16.10.400.0.0 false true true auto 2019-11-20T04:40:05-00:00
17.3.1.0.102822 true false false auto 2020-07-31T11:01:22-00:00
2. If necessary, remove an existing software image to provide space for loading a new software image.
Device# request platform software sdwan software remove previous-installed-build
Example:
Device# request platform software sdwan software remove 16.10.400.0.0
3. Download the software image for the downgrade and copy it to the device bootflash.
4. Install the downloaded image.
Device# request platform software sdwan software install bootflash:/desired-build
Example:
Device# request platform software sdwan software install
bootflash:/isr1100be-universalk9.17.02.01a.SPA.bin
5. Display the currently installed images, which now include the new image.
Device# show sdwan software
VERSION ACTIVE DEFAULT PREVIOUS CONFIRMED TIMESTAMP
----------------------------------------------------------------------------------
17.02.01a.0.211 false true true auto 2020-03-30T09:34:04-00:00
6. Activate the new image. This resets the device, deleting any existing configuration. The device starts in
day zero configuration.
Example:
Device# request platform software sdwan software 17.02.01a.0.211 clean
Cisco IOS XE Catalyst SD-WAN Cisco IOS XE SD-WAN Release Device boots up with ucmk9 image
Release 17.2.1r(universalk9) in 16.12 and earlier (ucmk9) and configuration is restored if the
controller mode uckm9 image was previously
installed on the device.
Downgrading to a fresh install of old
image versions brings the device to
Day 0 configuration. To proceed, use
the clean option at activation.
Cisco IOS XE Catalyst SD-WAN Cisco IOS XE Release 17.1.1 and Device boots up with universalk9
Release 17.2.1r (universalk9) in earlier (universalk9) image and configuration is restored.
autonomous mode
Note • Downgrading directly from controller mode to Cisco IOS XE Amsterdam Release 17.1.x or earlier
universalk9 or other non Cisco Catalyst SD-WAN images is not supported. To downgrade from controller
mode to earlier IOS XE images, switch to autonomous mode and follow the downgrade process.
• Downgrading directly from autonomous mode to Cisco IOS XE SD-WAN 16.12 or earlier ucmk9
SD-WAN images is not supported. To downgrade from autonomous mode to earlier Cisco IOS XE
Catalyst SD-WAN images, switch to controller mode and follow the downgrade process.
3. Set the required crypto throughput using platform hardware throughput crypto crypto-value.
4. Save the configuration using write memory in privileged EXEC mode.
5. Reload the device and verify that the new crypto throughput value is applied using the show platform
hardware throughput crypto command.
Note This procedure is applicable to Cisco Catalyst 8000V hosted by Amazon Web Services (AWS).
1. From the Cisco SD-WAN Manager menu, choose Configuration > Devices, and click Add PAYG WAN
Edges.
2. In the Add PAYG WAN Edges dialog box, enter the number of PAYG devices to onboard into Cisco
Catalyst SD-WAN, select the Validate check box, and click Add.
The Task View page opens, showing the progress as Cisco SD-WAN Manager creates logical devices.
Note Validating causes Cisco SD-WAN Manager to publish the list of devices to the Cisco Catalyst SD-WAN
Validator and Cisco Catalyst SD-WAN Controller controllers in the network.
3. After the Task View page shows the logical devices have been created successfully, choose
Configuration > Devices to view the new logical devices on the Devices page.
Note The Chassis Number column shows the unique identifier for each logical device.
4. For the logical devices that you have created, click … and choose Generate Bootstrap Configuration.
5. (Optional) Attach a device template to the logical devices that you have created.
6. In the Generate Bootstrap Configuration dialog box, click Cloud-Init and then click OK.
The Generate Bootstrap Configuration dialog box shows the content of the bootstrap configuration,
which includes the UUID of the logical device, and includes the configuration details provided by the
device template if you have attached one.
Note The UUID corresponds to the identifier in the Chassis Number column in the Devices table.
7. There are different methods for loading the bootstrap configuration onto a C8000V instance on a cloud
service. The method you use depends on the cloud service. We recommend to click Download in the
Generate Bootstrap Configuration dialog box to save a copy of the bootstrap configuration.
8. In the cloud services portal, create a PAYG instance of the Cisco Catalyst 8000V. When configuring the
instance, use the bootstrap configuration that you created in Cisco SD-WAN Manager. The details of how
to load the Cisco Catalyst SD-WAN bootstrap configuration onto the instance are specific to the cloud
services provider.
Note On AWS, the workflow for bringing up an instance includes a user data step that enables loading the bootstrap
configuration.
9. On the cloud service platform, start the Cisco Catalyst 8000V instance using the bootstrap configuration
from an earlier step.
When the Cisco Catalyst 8000V instance boots up, it joins the Cisco Catalyst SD-WAN overlay
automatically. In Cisco SD-WAN Manager, on the Devices page, this Cisco Catalyst 8000V instance
shows a green medal icon in the State column and In Sync in the Device Status column.
Note On the Devices page, for logical devices that have not joined the Cisco Catalyst SD-WAN overlay, the State
column shows a dotted-circle icon.
Note The UUID corresponds to the identifier in the Chassis Number column in the Devices table.
Note Ensure that the bootstrap configuration does not include more interfaces than the virtual device instance has
in the cloud environment.
4. There are different methods for loading the bootstrap configuration onto a device instance on a cloud
service. The method you use depends on the cloud service. We recommend that you click Download in
the Generate Bootstrap Configuration dialog box to save a copy of the bootstrap configuration.
You can use the bootstrap configuration when setting up a device instance in the cloud service. The
configuration enables the device instance to connect to Cisco Catalyst SD-WAN.
For information about onboarding a Cisco Catalyst 8000V in a private cloud, see the following:
• Cisco Catalyst 8000V Edge Software Installation And Configuration Guide, Installing in KVM
Environments
• Cisco Catalyst 8000V Edge Software Installation And Configuration Guide, Installing in VMware ESXi
Environment
• Cisco Catalyst 8000V Edge Software Installation And Configuration Guide, Installing in OpenStack
For example bootstrap configuration files for the Cisco Catalyst 8000V, see Cisco Catalyst 8000V Cloud
Initialization Files.
Troubleshooting
Troubleshooting Software Installation
Router Loads the Previous Software Version After Booting
Problem
A router starts up using the previously installed software version.
Conditions
A router using Cisco IOS XE has two or more software versions installed.
Possible Causes
If the router begins booting up, and power cycles during the bootup, it may reboot using the previously installed
software version.
Note Cisco IOS XE devices have a mechanism that preserves the previously installed software version. As a
safeguard against getting stuck during bootup with a corrupted software image, a device can fall back to the
previously installed software version. This fallback can also occur if the device experiences a power cycle
during bootup. In this case (power cycle during bootup), you can reboot the device to load the latest software.
Solutions
1. Check the active and inactive system software versions for a device using one of the following procedures:
• Cisco SD-WAN Manager procedure:
a. From the Cisco SD-WAN Manager menu, choose Monitor > Devices.
b. Click a device name in the Hostname column.
c. In the left pane, click Real Time.
d. In the Device Options field, enter Software Versions.
A table displays the installed software versions and indicates which version is active.
• CLI procedure:
a. Execute the show sdwan software command in privileged EXEC mode to view the current
active software version and the previous version.
b. Execute the show version command on the device, in privileged EXEC mode.
If the device is using the latest installed software version, the command output shows
bootflash:packages.conf.
If the device is using the previous software version, the command output shows
bootflash:prev_packages.conf.
2. Reboot the device and check the loaded system software again.
3. If the device boots again with the previous software version (bootflash:prev_packages.conf), contact Cisco
TAC for assistance.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
You are prompted to choose a persona for a Cisco SD-WAN Manager server the first time that the server
boots up after Cisco SD-WAN Manager is installed. The prompt appears in the command line as follows:
1) COMPUTE_AND_DATA
2) DATA
3) COMPUTE
Select persona for vManage (1, 2 or 3):
When you see this prompt, type 1 to choose the Compute + Data persona, 2 to choose the Compute persona,
or 3 to choose the Data persona. Then type y at the Are you sure prompt that displays to confirm your
choice.
When you determine which persona to configure for a server, be aware that a Cisco SD-WAN Manager cluster
supports any of the following deployments of nodes:
• Three Compute+Data nodes
• Three Compute+Data nodes and three Data nodes
• Three Compute nodes and three Data nodes (supported only in an upgrade from an existing deployment)
The prompt is followed by a list of available storage devices, each of which is preceded by a number. Type
the number that corresponds to the storage device that you want to use for the server.
After you choose a storage device, you are prompted whether to format it. Type y to format the storage device,
or type n to skip formatting. If you format a storage device, all data on the device is permanently deleted.
1. The Cisco SD-WAN Manager software starts on a server in the data center.
2. The Cisco SD-WAN Validator starts on a server in the DMZ.
3. The Cisco SD-WAN Controller starts on a server in the data center.
4. Cisco SD-WAN Manager and the Cisco SD-WAN Validator authenticate each other, Cisco SD-WAN
Manager and the Cisco SD-WAN Controller authenticate each other, and the Cisco SD-WAN Controller
and the Cisco SD-WAN Validator securely authenticate each other.
5. Cisco SD-WAN Manager sends configurations to the Cisco SD-WAN Controller and the Cisco SD-WAN
Validator.
6. The routers start in the network.
7. The routers authenticate themselves with the Cisco SD-WAN Validator.
8. The routers authenticate themselves with Cisco SD-WAN Manager.
9. The routers authenticate themselves with the Cisco SD-WAN Controller.
10. Cisco SD-WAN Manager sends configurations to the routers.
To bring up the hardware and software components in a Cisco Catalyst SD-WAN overlay network, a transport
network (also called a transport cloud), which connects all the routers and other network hardware components,
must be available. Typically, these components are in data centers and branch offices. The only purpose of
the transport network is to connect all the network devices in the domain. The Cisco Catalyst SD-WAN
solution is agnostic with regards to the transport network, and, therefore, can be any type, including the internet,
Multiprotocol Label Switching (MPLS), Layer 2 switching, Layer 3 routing, and Long-Term Evolution (LTE),
or any mixture of transports.
For hardware routers, you can use the Cisco Catalyst SD-WAN zero-touch provisioning (ZTP) SaaS to bring
up the routers. For more information on automatic process to bring-up hardware in the overlay network, see
Prepare Routers for ZTP.
Table 20:
4. Check for a confirmation email from Symantec that your request has been received.
5. Check for an email from Symantec that Viptela has approved your request and the
certificate is signed.
6. From the Cisco SD-WAN Manager menu, choose Configuration > Devices, and
check if the certificate has been installed.
7. From the Cisco SD-WAN Manager menu, choose Configuration > Templates:
a. Create a configuration template for the Cisco SD-WAN Validator.
b. Attach the template to Cisco SD-WAN Validator.
8. From the Cisco SD-WAN Manager menu, choose Monitor > Overview, and verify
that the Cisco SD-WAN Validator is operational.
Cisco vManage Release 20.6.x and earlier: From the Cisco SD-WAN Manager
menu, choose Dashboard > Main Dashboard, and verify that the Cisco SD-WAN
Validator is operational.
4. Check for a confirmation email from Symantec that your request has been received.
5. Check for an email from Symantec that Viptela has approved your request and the
certificate is signed.
6. From the Cisco SD-WAN Manager menu, choose Configuration > Devices, check
that the certificate has been installed.
7. From the Cisco SD-WAN Manager menu, choose Configuration > Templates:
a. Create a configuration template for Cisco Catalyst SD-WAN Controller.
b. Attach the template to Cisco Catalyst SD-WAN Controller.
8. From the Cisco SD-WAN Manager menu, choose Monitor > Overview, and verify
that Cisco Catalyst SD-WAN Controller is operational.
Cisco vManage Release 20.6.x and earlier: From the Cisco SD-WAN Manager
menu, choose Dashboard > Main Dashboard, and verify that Cisco Catalyst
SD-WAN Controller is operational.
Step 4: Configure 1. From the Cisco SD-WAN Manager menu, choose Configuration > Devices > WAN
the router. Edge List, upload the router authorized serial number file.
2. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates >
WAN Edge List, check that the router's chassis and serial number are in the list.
3. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates >
WAN Edge List, authorize each router by marking it Valid in the Validity column.
4. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates >
WAN Edge List, send the WAN Edge list to the controller devices.
5. From the Cisco SD-WAN Manager menu, choose Configuration > Templates:
a. Create a configuration template for the router.
b. Attach the template to the router.
Table 21:
Workflow Procedure
1 Plan out your overlay network. See Components of the Cisco Catalyst
SD-WAN Solution.
Workflow Procedure
Workflow Procedure
The following sections explain what happens under the covers, during the automatic portion of the bring-up
process. This explanation is provided to help you understand the detailed workings of the Cisco Catalyst
SD-WAN software so that you can better appreciate the means by which the Cisco Catalyst SD-WAN solution
creates a highly secure overlay framework to support your networking requirements.
The Cisco SD-WAN Controllers and Cisco SD-WAN Validators learn the serial and chassis numbers during
the initial configuration of these devices:
• Cisco SD-WAN Controller authorized serial numbers—The Cisco SD-WAN Manager learns the serial
numbers for all Cisco SD-WAN Controllers that are allowed to be in the network while it is creating a
CSR and installing the signed certificate. You download these serial numbers to Cisco SD-WAN Validator,
and Cisco SD-WAN Validator pushes them to the Cisco Catalyst SD-WAN Controller during the automatic
authentication process.
• vEdge authorized serial number file—This file contains the serial and chassis numbers of all the vEdge
routers that are allowed to be in the network. You upload this file to Cisco SD-WAN Validators and
Cisco SD-WAN Controllers.
In addition to the device serial and chassis numbers, the automatic validation and authentication procedure
depends on having each device configured with the same organization name. You configure this name on
Cisco SD-WAN Manager, and it is included in the configuration file on all devices. The organization name
must be identical on all the devices that belong to a single organization (the name is case-sensitive). The
organization name is also included in the certificate for each device, which is created either by Cisco Catalyst
SD-WAN or by an enterprise root CA.
When Cisco SD-WAN Controller comes up, it initiates a connection to Cisco SD-WAN Validator, which is
how Cisco SD-WAN Validator learns about Cisco SD-WAN Controller. These two devices then automatically
begin a two-way authentication process—Cisco SD-WAN Controller authenticates itself with , and Cisco
SD-WAN Validator authenticates itself with Cisco SD-WAN Validator. The two-way handshaking between
the two devices during the authentication process occurs in parallel. However, for clarity, the figure here,
which is a high-level representation of the authentication steps, illustrates the handshaking sequentially. If
the authentication handshaking succeeds, a permanent DTLS communication channel is established between
the Cisco SD-WAN Controller and Cisco SD-WAN Validator devices. If any one of the authentication steps
fails, the device noting the failure tears down the connection between the two devices, and the authentication
attempt terminates.
The Cisco SD-WAN Controller knows how to reach Cisco SD-WAN Validator, because one of the parameters
that you provision when you configure it is the IP address or DNS name of Cisco SD-WAN Validator. Cisco
SD-WAN Validator is primed to respond to requests from Cisco SD-WAN Validator because:
• It knows that its role is to be the authentication system, because you included this information in the
Cisco SD-WAN Validator configuration.
• You downloaded the Cisco SD-WAN Controller authorized serial numbers from Cisco SD-WAN Manager
to Cisco SD-WAN Validator.
If Cisco SD-WAN Validator has not yet started when Cisco SD-WAN Controller initiates the authentication
process, Cisco SD-WAN Controller periodically attempts to initiate a connection until it is successful.
Below is a more detailed step-by-step description of how the automatic authentication occurs between Cisco
SD-WAN Controller and Cisco SD-WAN Validator.
To initiate a session between Cisco SD-WAN Controller and Cisco SD-WAN Validator, Cisco SD-WAN
Controller initiates an encrypted DTLS connection to Cisco SD-WAN Validator. The encryption is provided
by RSA. Each device automatically generates an RSA private key‒public key pair when it boots.
Over this encrypted channel, Cisco SD-WAN Controller and Cisco SD-WAN Validator authenticate each
other. Each device authenticates the other in parallel. For our discussion, let's start with Cisco SD-WAN
Controller authentication of Cisco SD-WAN Validator:
1. Cisco SD-WAN Validator sends its trusted root CA signed certificate to the Cisco SD-WAN Controller.
2. Cisco SD-WAN Validator sends the vEdge authorized serial number file to the Cisco SD-WAN Controller.
3. Cisco SD-WAN Controller uses its chain of trust to extract the organization name from the certificate and
compares it to the organization name that is configured on Cisco SD-WAN Controller. If the two
organization names match, Cisco SD-WAN Controller knows that the organization of Cisco SD-WAN
Validator is proper. If they do not match, Cisco Catalyst SD-WAN Controller tears down the DTLS
connection.
4. Cisco Catalyst SD-WAN Controller uses the root CA chain to verify that the certificate has indeed been
signed by the root CA (either Symantec or the enterprise CA). If the signature is correct, Cisco Catalyst
SD-WAN Controller knows that the certificate itself is valid. If the signature is incorrect, Cisco Catalyst
SD-WAN Controller tears down the DTLS connection.
After performing these two checks, Cisco SD-WAN Controller authentication of Cisco SD-WAN Validator
is complete.
In the other direction, Cisco SD-WAN Validator authenticates Cisco SD-WAN Controller:
1. Cisco SD-WAN Controller sends its trusted root CA signed certificate to Cisco SD-WAN Validator.
2. Cisco SD-WAN Validator uses its chain of trust to extract Cisco SD-WAN Controller serial number from
the certificate. The number must match one of the numbers in the Cisco SD-WAN Controller authorized
serial number file. If there is no match, Cisco SD-WAN Validator tears down the DTLS connection.
3. Cisco SD-WAN Validator uses its chain of trust to extract the organization name from the certificate and
compares it to the organization name that is configured on Cisco SD-WAN Validator. If the two
organization names match, the Cisco SD-WAN Validator knows that the organization of Cisco SD-WAN
Controller is proper. If they do not match, Cisco SD-WAN Validator tears down the DTLS connection.
4. The Cisco SD-WAN Validator uses the root CA chain to verify that the certificate has indeed been signed
by the root CA (either Symantec or the enterprise CA). If the signature is correct, Cisco SD-WAN Validator
knows that the certificate itself is valid. If the signature is incorrect, Cisco SD-WAN Validator tears down
the DTLS connection.
After performing these three checks, the Cisco SD-WAN Validator authentication of Cisco SD-WAN Validator
is complete.
After the bidirectional authentication completes between the two devices, the DTLS connection between Cisco
SD-WAN Validator and Cisco SD-WAN Controller transitions from being a temporary connection to being
a permanent connection, and the two devices establish an OMP session over the connection.
In a domain that has multiple Cisco SD-WAN Controllers for redundancy, this process repeats between each
pair of Cisco SD-WAN Controller and Cisco SD-WAN Validator devices. In coordination with Cisco SD-WAN
Validator, Cisco SD-WAN Controllers learn about each other and they synchronize their route information.
It is recommended that you connect the different Cisco SD-WAN Controller to the WAN network through
different NAT devices for higher availability.
A Cisco SD-WAN Validator has only as many permanent DTLS connections as the number of Cisco SD-WAN
Controllers in the network topology. These DTLS connections are part of the network's control plane; no data
traffic flows over them. After all Cisco SD-WAN Controllers have registered themselves with Cisco SD-WAN
Validator, Cisco SD-WAN Validator and Cisco SD-WAN Controllers are ready to validate and authenticate
the vEdge routers in the Cisco Catalyst SD-WAN network.
After performing these three checks, Cisco SD-WAN Controller2 authentication of Cisco SD-WAN Controller1
is complete.
Now, Cisco SD-WAN Controller1 authenticates Cisco SD-WAN Controller2, performing the same steps as
above.
1. First, Cisco SD-WAN Controller2 sends its trusted root CA signed certificate to Cisco SD-WAN
Controller1.
2. Cisco SD-WAN Controller1 uses its chain of trust to extract the Cisco SD-WAN Controller2's serial
number. The number must match one of the numbers in the Cisco SD-WAN Controller authorized serial
number file. If there is no match, Cisco SD-WAN Controller1 tears down the DTLS connection.
3. Cisco SD-WAN Controller1 uses its chain of trust to extract the organization name from the certificate
and compares it to the locally configured organization name. If the two organization names match, Cisco
SD-WAN Controller2 knows that the organization of Cisco SD-WAN Controller2 is proper. If they do
not match, Cisco SD-WAN Controller1 tears down the DTLS connection.
4. Cisco SD-WAN Controller1 uses the root CA chain to verify that the certificate has indeed been signed
by the root CA (either Symantec or the enterprise CA). If the signature is correct, Cisco SD-WAN
Controller2 knows that the certificate itself is valid. If the signature is incorrect, Cisco SD-WAN Controller1
tears down the DTLS connection.
After performing these three checks, Cisco SD-WAN Controller1 authentication of Cisco SD-WAN Controller2
is complete, and the temporary DTLS connection between the two devices becomes permanent.
After all the Cisco SD-WAN Controllers have registered themselves with , Cisco SD-WAN Validator and
Cisco SD-WAN Controllers are ready to validate and authenticate the vEdge routers in the Cisco Catalyst
SD-WAN network.
When a Cisco vEdge device comes up, how does it automatically discover Cisco SD-WAN Manager and
Cisco Catalyst SD-WAN Controller and establish connections with them? It does so with help from Cisco
SD-WAN Validator. The initial configuration on the Cisco vEdge router contains the Cisco SD-WAN Validator
system’s IP address (or DNS name). Using this information, the Cisco vEdge router establishes a DTLS
connection with Cisco SD-WAN Validator, and the two devices authenticate each other to confirm that they
are valid Cisco vEdge devices. Again, this authentication is a two-way process that happens automatically.
When the authentication completes successfully, Cisco SD-WAN Validator sends the Cisco vEdge router the
IP addresses of Cisco SD-WAN Manager and Cisco Catalyst SD-WAN Controller. Then, the Cisco vEdge
router tears down its connection with Cisco SD-WAN Validator and begins establishing secure DTLS
connections with the othe two devices.
Figure 16: Automatic Authentication of Cisco vEdge Router and Cisco SD-WAN Validator
After you boot Cisco vEdge routers and manually perform the initial configuration, they automatically start
looking for their Cisco SD-WAN Validator. Cisco SD-WAN Validator and Cisco SD-WAN Controllers are
able to recognize and authenticate the Cisco vEdge routers in part because you have installed the Cisco vEdge
authorized device list file on both these devices.
After you boot a Cisco vEdge router, you manually perform the initial configuration, at a minimum setting
the IP address of DNS name of Cisco SD-WAN Validator. The Cisco vEdge router uses this address information
to reach Cisco SD-WAN Validator. Cisco SD-WAN Validator is primed to respond to requests from a Cisco
vEdge router because:
• It knows that its role is to be the authentication system, because you included this information in the
initial Cisco SD-WAN Validator configuration.
• As part of the initial configuration, you installed the Cisco vEdge authorized serial number file on Cisco
SD-WAN Validator.
If Cisco SD-WAN Validator has not yet started when a Cisco vEdge router initiates the authentication process,
the Cisco vEdge router periodically attempts to initiate a connection until the attempt succeeds.
Below is a more detailed step-by-step description of how the automatic authentication occurs between Cisco
SD-WAN Validator and a Cisco vEdge router.
First, the Cisco vEdge router initiates an encrypted DTLS connection to the public IP address of Cisco SD-WAN
Validator. The encryption is provided by RSA. Each device automatically generates an RSA private key‒public
key pair when it boots. Cisco SD-WAN Validator receives the Cisco vEdge router's original interface address
and uses the outer IP address in the received packet to determine whether the Cisco vEdge router is behind a
NAT. If it is, Cisco SD-WAN Validator creates a mapping of the Cisco vEdge router's public IP address and
port to its private IP address.
Over this encrypted DTLS channel, the Cisco vEdge router and Cisco SD-WAN Validator proceed to
authenticate each other. As with other device authentication, the Cisco vEdge router and Cisco SD-WAN
Validator authenticate each other in parallel. We start our discussion by describing how the Cisco vEdge
router authenticates Cisco SD-WAN Validator:
1. Cisco SD-WAN Validator sends its trusted root CA signed certificate to the Cisco vEdge router.
2. The Cisco vEdge router uses its chain of trust to extract the organization name from the certificate and
compares it to the organization name that is configured on the router itself. If the two organization names
match, the Cisco vEdge routers knows that the organization of Cisco SD-WAN Validator is proper. If
they do not match, the Cisco vEdge router tears down the DTLS connection.
3. The Cisco vEdge router uses the root CA chain to verify that the certificate has indeed been signed by the
root CA (either Symantec or the enterprise CA). If the signature is correct, the Cisco vEdge router knows
that the certificate itself is valid. If the signature is incorrect, the Cisco vEdge router tears down the DTLS
connection.
After performing these two checks, the Cisco vEdge router knows that Cisco SD-WAN Validator is valid,
and its authentication of Cisco SD-WAN Validator is complete.
In the opposite direction, Cisco SD-WAN Validator authenticates the Cisco vEdge router:
1. Cisco SD-WAN Validator sends a challenge to the Cisco vEdge router. The challenge is a 256-bit random
value.
2. The Cisco vEdge router sends a response to the challenge that includes the following:
• Cisco vEdge serial number
• Cisco vEdge chassis number
3. Cisco SD-WAN Validator compares the serial and chassis numbers to the list in its Cisco vEdge authorized
device list file. The numbers must match one of the number pairs in the file. If there is no match, Cisco
SD-WAN Validator tears down the DTLS connection.
4. Cisco SD-WAN Validator checks that the signing of the 256-bit random value is proper. It does this using
the Cisco vEdge router's public key, which it extracts from the router's board ID certificate. If the signing
is not correct, Cisco SD-WAN Validator tears down the DTLS connection.
5. Cisco SD-WAN Validator uses the root CA chain from the Cisco vEdge routers board ID certificate to
validate that the board ID certificate is itself valid. If the certificate is not valid, Cisco SD-WAN Validator
tears down the DTLS connection.
After performing these three checks, Cisco SD-WAN Validator knows that Cisco vEdge router is valid, and
its authentication of the router is complete.
When the two-way authentication succeeds, Cisco SD-WAN Validator performs the final step of its
orchestration, sending messages to the Cisco vEdge router and Cisco Catalyst SD-WAN Controller in parallel.
To the Cisco vEdge router, Cisco SD-WAN Validator sends the following:
• The IP addresses of Cisco SD-WAN Controllers in the network so that the Cisco vEdge router can initiate
connections to them. The address can be public IP addresses, or for the controllers that are behind a NAT
gateway, the addresses are a list of the public and private IP addresses and port numbers. If the Cisco
vEdge router is behind a NAT gateway, Cisco SD-WAN Validator requests that the Cisco vEdge router
initiate a session with Cisco Catalyst SD-WAN Controller.
• Serial numbers of Cisco SD-WAN Controllers that are authorized to be in the network.
To Cisco Catalyst SD-WAN Controller, Cisco SD-WAN Validator sends the following:
• A message announcing the new Cisco vEdge router in the domain.
• If the Cisco vEdge router is behind a NAT gateway, Cisco SD-WAN Validator sends a request to Cisco
Catalyst SD-WAN Controller to initiate a session with the Cisco vEdge router.
Then, the Cisco vEdge router tears down the DTLS connection with the Cisco SD-WAN Validator.
Authentication between the Cisco vEdge Router and Cisco SD-WAN Manager
After the Cisco vEdge router and Cisco SD-WAN Validator have authenticated each other, the Cisco vEdge
router receives its full configuration over a DTLS connection with Cisco SD-WAN Manager:
1. The Cisco vEdge router establishes a DTLS connection with Cisco SD-WAN Manager.
2. Cisco SD-WAN Manager server sends the configuration file to the Cisco vEdge router.
3. When the Cisco vEdge router receives the configuration file and activates its full configuration.
4. The Cisco vEdge router starts advertising prefixes to Cisco SD-WAN Controller.
If you are not using Cisco SD-WAN Manager, you can log in to the Cisco vEdge router and either manually
load its configuration file or manually configure the router.
Below is a more detailed step-by-step description of how the automatic authentication occurs between a Cisco
vEdge router and Cisco SD-WAN Manager.
First, the Cisco vEdge router initiates an encrypted DTLS connection to the IP address of Cisco SD-WAN
Manager. The encryption is provided by RSA. Each device automatically generates an RSA private key‒public
key pair when it boots. Cisco SD-WAN Manager receives the Cisco vEdge router's original interface address
and uses the outer IP address in the received packet to determine whether the Cisco vEdge router is behind a
NAT. If it is, Cisco SD-WAN Manager creates a mapping of the Cisco vEdge router's public IP address and
port to its private IP address.
Over this encrypted DTLS channel, the Cisco vEdge router and Cisco SD-WAN Manager proceed to
authenticate each other. As with other device authentication, the Cisco vEdge router and Cisco SD-WAN
Manager authenticate each other in parallel. We start our discussion by describing how the Cisco vEdge router
authenticates Cisco SD-WAN Manager:
1. Cisco SD-WAN Manager sends its trusted root CA signed certificate to the Cisco vEdge router.
2. The Cisco vEdge router uses its chain of trust to extract the organization name from the certificate and
compares it to the organization name that is configured on the router itself. If the two organization names
match, the Cisco vEdge routers knows that the organization of Cisco SD-WAN Manager is proper. If they
do not match, the Cisco vEdge router tears down the DTLS connection.
3. The Cisco vEdge router uses the root CA chain to verify that the certificate has indeed been signed by the
root CA (either Symantec or the enterprise CA). If the signature is correct, the Cisco vEdge router knows
that the certificate itself is valid. If the signature is incorrect, the Cisco vEdge router tears down the DTLS
connection.
After performing these two checks, the Cisco vEdge router knows that Cisco SD-WAN Manager is valid, and
its authentication of Cisco SD-WAN Manager is complete.
In the opposite direction, Cisco SD-WAN Manager authenticates the Cisco vEdge router:
1. Cisco SD-WAN Manager sends a challenge to the Cisco vEdge router. The challenge is a 256-bit random
value.
2. The Cisco vEdge router sends a response to the challenge that includes the following:
• Cisco vEdge serial number
• Cisco vEdge chassis number
• Cisco vEdge board ID certificate (for a hardware Cisco vEdge router) or the signed certification (for
a Cisco vEdge Cloud router)
• 256-bit random value signed by the Cisco vEdge router's private key
3. Cisco SD-WAN Manager compares the serial and chassis numbers to the list in its Cisco vEdge authorized
device list file. The numbers must match one of the number pairs in the file. If there is no match, Cisco
SD-WAN Managerthe Cisco SD-WAN Manager NMS tears down the DTLS connection.
4. Cisco SD-WAN Manager checks that the signing of the 256-bit random value is proper. It does this using
the Cisco vEdge router's public key, which it extracts from the router's board ID certificate. If the signing
is not correct, Cisco SD-WAN Manager tears down the DTLS connection.
5. Cisco SD-WAN Manager uses the root CA chain from the Cisco vEdge routers board ID certificate to
validate that the board ID certificate is itself valid. If the certificate is not valid, Cisco SD-WAN Manager
tears down the DTLS connection.
After performing these three checks, Cisco SD-WAN Manager knows that Cisco vEdge router is valid, and
its authentication of the router is complete.
When the two-way authentication succeeds, Cisco SD-WAN Manager server sends the configuration file to
the Cisco vEdge router. When the Cisco vEdge router receives the configuration file, it activates its full
configuration and starts advertising prefixes to Cisco SD-WAN Controller.
Figure 21: Authentication of Cisco SD-WAN Controller and Cisco Cisco vEdge Router
In this section below, is a more detailed step-by-step description of how the automatic authentication occurs
between Cisco SD-WAN Controller and a Cisco vEdge router.
To initiate a session between Cisco SD-WAN Controller and a Cisco vEdge router, one of the two devices
initiates an encrypted DTLS connection to the other. The encryption is provided by RSA. Each device
automatically generates an RSA private key‒public key pair when it boots.
The authentication between Cisco SD-WAN Controller and a Cisco vEdge router is a two-way process that
occurs in parallel. Let's start our discussion with how Cisco SD-WAN Controller authenticates a Cisco vEdge
router:
1. Cisco SD-WAN Controller sends a challenge to the Cisco vEdge router. The challenge is a 256-bit random
value.
2. The Cisco vEdge router sends a response to the challenge that includes the following:
• Cisco vEdge serial number
• Cisco vEdge chassis number
• Cisco vEdge board ID certificate
• 256-bit random value signed by the Cisco vEdge router's private key
3. Cisco SD-WAN Controller compares the serial and chassis numbers to the list in its Cisco vEdge authorized
device list file. The numbers must match one of the number pairs in the file. If there is no match, Cisco
SD-WAN Controller tears down the DTLS connection.
4. Cisco SD-WAN Controller checks that the signing of the 256-bit random value is proper. It does this
using the Cisco vEdge router's public key, which it extracts from the router's board ID certificate. If the
signing is not correct, Cisco SD-WAN Controller tears down the DTLS connection.
5. Cisco SD-WAN Controller uses the root CA chain from the Cisco vEdge routers board ID certificate to
validate that the board ID certificate is itself valid. If the certificate is not valid, Cisco SD-WAN Controller
tears down the DTLS connection.
6. Cisco SD-WAN Controller compares the response with the original challenge. If the response matches
the challenge that Cisco SD-WAN Validator issued, authentication between the two devices occurs.
Otherwise, Cisco SD-WAN Controller tears down the DTLS connection.
After performing these three checks, Cisco SD-WAN Controller knows that Cisco vEdge router is valid, and
its authentication of the router is complete.
In the other direction, the Cisco vEdge router authenticates Cisco SD-WAN Controller:
1. Cisco SD-WAN Controller sends its trusted root CA signed certificate to the Cisco vEdge router.
2. The Cisco vEdge router uses its chain of trust to extract Cisco SD-WAN Controller's serial number from
the certificate. The number must match one of the numbers in the Cisco SD-WAN Controller authorized
serial number file. If there is no match, the Cisco vEdge router tears down the DTLS connection.
3. The Edge router uses its chain of trust to extract the organization name from the certificate and compares
it to the organization name that is configured on the Cisco vEdge router. If the two organization names
match, the Cisco vEdge router knows that the organization of Cisco SD-WAN Controller is proper. If
they do not match, the Cisco vEdge router tears down the DTLS connection.
4. The Cisco vEdge router uses the root CA chain to verify that the certificate has indeed been signed by the
root CA (either Symantec or the enterprise CA). If the signature is correct, the Cisco vEdge router knows
that the certificate itself is valid. If the signature is incorrect, the Cisco vEdge router tears down the DTLS
connection.
After performing these three checks, the Cisco vEdge authentication of Cisco SD-WAN Controller is complete.
The DTLS connection that is used for authentication now becomes a permanent (nontransient) connection,
and the two devices establish an OMP session over it that is used to exchange control plane traffic.
This authentication procedure repeats for each Cisco SD-WAN Controller and each Cisco vEdge router that
you introduce into the overlay network.
Each Cisco vEdge router in the network must connect to at least one Cisco SD-WAN Controller. That is, a
DTLS connection must be successfully established between each Cisco vEdge router and one Cisco SD-WAN
Controller. The Cisco SD-WAN network has the notion of a domain. Within a domain, it is recommended
that you have multiple Cisco SD-WAN Controllers for redundancy. Then each Cisco vEdge router can connect
to more than one Cisco SD-WAN Controller.
Over the OMP session, a Cisco vEdge router relays various control plane–related information to Cisco
SD-WAN Controller so that Cisco SD-WAN Controller can learn the network topology:
• The Cisco vEdge router advertises the service-side prefixes and routes that it has learned from its local
static and dynamic (BGP and OSPF) routing protocols.
• Each Cisco vEdge router has a transport address, called a TLOC, or transport location, which is the
address of the interface that connects to the WAN transport network (such as the Internet) or to the NAT
gateway that connects to the WAN transport. Once the DTLS connection comes up between the Cisco
vEdge router and Cisco SD-WAN Controller, OMP registers the TLOCs with Cisco SD-WAN Controller.
• The Cisco vEdge router advertises the IP addresses of any services that are located on its service-side
network, such as firewalls and intrusion detection devices.
Cisco SD-WAN Controller installs these OMP routes in its routing database and advertises them to the other
Cisco vEdge routers in the Cisco Catalyst SD-WAN overlay network. Cisco SD-WAN Controller also updates
the Cisco vEdge router with the OMP route information that it learns from other Cisco vEdge routers in the
network. Cisco SD-WAN Controller can apply inbound policy on received routes and prefixes before installing
them into its routing table, and it can apply outbound policy before advertising routes from its routing table.
Port Offset
When multiple Cisco vEdge devices are installed behind a single NAT device, you can configure different
port numbers for each device so that the NAT can properly identify each individual device. You do this by
configuring a port offset from the base port 12346. For example, if you configure a device with a port offset
of 1, that device uses port 12347. The port offset can be a value from 0 through 19. The default port offset is
0.
For NAT devices that can differentiate among the devices behind the NAT, you do not need to configure the
port offset.
Port Hopping
In the context of a Cisco Catalyst SD-WAN overlay network, port hopping is the process by which devices
try different ports when attempting to establish connections with each other, in the event that a connection
attempt on the first port fails. After such a failure, the port value is incremented and the connection attempt
is retried. The software rotates though a total of five base ports, waiting longer and longer between each
connection attempt.
If you have not configured a port offset, the default base port is 12346, and port hopping is done sequentially
among ports 12346, 12366, 12386, 12406, and 12426, and then returning to port 12346.
If you have configured a port offset, that initial port value is used and the next port is incremented by 20. For
example, for a port configured with an offset of 2, port hopping is done sequentially among ports 12348,
12368, 12388, 12408, and 12428, and then returning to port 12348.
Incrementing the ports by 20 ensures that there is never any overlap among the possible base port numbers.
Cisco vEdge devices use port hopping when attempting to establish connections to Cisco SD-WAN Manager,
Cisco SD-WAN Validator, and Cisco SD-WAN Controllers. You can also manually request a Cisco vEdge
device to port-hop.
Cisco SD-WAN Controllers and Cisco SD-WAN Manager instances are normally installed behind a properly
behaving NAT device, so port hopping is generally not needed and generally does not occur on these devices.
Cisco SD-WAN Validators always connect to other Cisco vEdge devices using port 12346. They never use
port hopping.
To describe how port hopping works, we use an example of a Cisco vEdge device with the default base port
of 12346. When a router has attempted to connect to another Cisco vEdge device but the connection does not
succeed within a certain time, the router hops to the next base port and tries establishing the connection on
that port.
Note As port-hop is the default configuration, the devices request the Cisco SD-WAN Validator for a new control
connection. When the new control connection is established, the edge devices start transmitting TLOC updates
to the peer. TLOC update messages could be lost during unstable control connections and IPSec security
association between the devices and the peer may not be in sync, which results in a BFD session failure.
To avoid this issue, we recommend that you configure no port-hop or static entries on data center devices.
You can either have all edges connected to a single Cisco SD-WAN Validator or balance the edges between
two Cisco SD-WAN Validators by changing the order of the IP in the below command.
For static entries, you can configure the IP addresses on a data center device in the following command:
system
vbond <vBond FQDN>
vpn 0
host <vBond FQDN> ip <vBond ip1> <vBond ip2>
Note If you choose to configure no port-hopping, then use the following command:
system
no port-hop
External triggers like change of System IP, change of Color on TLOC while adding TLOC can trigger port-hop,
even though no port-hop is configured.
If the first connection attempt on the initial base port does not succeed after about 1 minute, the router hops
to port 12366. After about 2 minutes, it hops to port 12386; after about 5 minutes, it hops to port 12406; and
after about 6 minutes, it hops to port 12426. Then the cycle returns to initial port, 12346.
With a full-cone NAT device, the source ports for all connections initiated by a given Cisco vEdge device
remain consistent across all sessions initiated by the Cisco vEdge device. For example, if the router initiates
a session with public source port 12346, this is the port used for all communication.
and in some cases the BFD sessions on the Cisco vEdge device might shut down and restart. This behavior
occurs because of port hopping: When one device loses its control connection to another device, it port hops
to another port in an attempt to re-establish the connection.
Two examples illustrate when this might occur:
• When Cisco SD-WAN Validator crashes, Cisco SD-WAN Manager might take down all connections to
the Cisco vEdge devices. The sequence of events that occurs is as follows: When Cisco SD-WAN
Validator crashes, Cisco SD-WAN Manager might lose or close all its control connections. Cisco SD-WAN
Manager then port hops, to try to establish connections to the Cisco SD-WAN Controllers on a different
port. This port hopping on Cisco SD-WAN Manager shuts down and then restarts all its control
connections, including those to the Cisco vEdge devices.
• All control sessions on all Cisco SD-WAN Controllers go down, and BFD sessions on the Cisco vEdge
devices remain up. When any one of the Cisco SD-WAN Controllers comes back up, the BFD sessions
on the routers go down and then come back up because the Cisco vEdge devices have already port hopped
to a different port in an attempt to reconnect to Cisco SD-WAN Controllers.
Note Changing the Cisco SD-WAN Controller graceful-restart timers result in an OMP peer flap, independent
of whether or not port-hop is enabled. We recommend that you change Cisco SD-WAN Controller
graceful-restart timers with redundant Cisco SD-WAN Controller peering (where only a single Cisco
SD-WAN Controller configuration is changed at a time) or during a maintenance period when a data plane
disruption can be tolerated.
devices in the network might use, which are the default base ports and the four base ports that the router can
port-hop among.
Note Port hopping is generally not needed on Cisco SD-WAN Controllers and on Cisco SD-WAN Manager.
For additional details regarding DTLS, TLS, and IPsec ports for Cisco Catalyst SD-WAN device connections,
see Firewall Port Considerations
For Cisco vEdge devices configured to use DTLS tunnels, which use UDP, at a minimum you must open the
five base ports that are used by a Cisco vEdge device with a default port offset of 0. Specifically, you open:
• Port 12346
• Port 12366
• Port 12386
• Port 12406
• Port 12426
If you have configured a port offset value on any of the Cisco vEdge devices, you also need to open the ports
configured with the port offset value:
• Port (12346 + port offset value)
• Port (12366 + port offset value)
• Port (12386 + port offset value)
• Port (12406 + port offset value)
• Port (12426 + port offset value)
Note Cisco SD-WAN Validators do not support multiple cores. Cisco SD-WAN Validators always use DTLS
tunnels to establish control connections with other Cisco vEdge devices, so they always use UDP. The UDP
port is 12346.
The following table lists the port used by each vCPU core for Cisco SD-WAN Manager. Each port is
incremented by the configured port offset, if offset is configured.
Cisco SD-WAN Manager clusters use the following ports for communication among the NMSs that comprise
the cluster:
Application server Bidirectional TCP 80, 443, 7600, 8080, 8443, 57600
The port offset can be a value from 0 through 19. The default port offset is 0.
In the following example, vEdge-1 uses the default port offset of 0, and on vEdge-2 the port offset is set to
1.
Figure 25: Example of Port Offset Configuration
In this example:
• vEdge-1 attempts to connect first using base port 12346. If that attempt is not successful, the router
attempts port 12366, 12386, 12406 and 12426.
• vEdge-2 has a port offset of 1, so the first port it attempts to connect on is 12347 (12346 plus offset of
1). If it fails to connect using port 12347, the router hops by increments of 20 and attempts to connect
on ports 12367, 12387, 12407, and 12427.
One reason to use this command is if the router's control connections are up, but BFD is not starting. The
request port-hop command restarts the control connections on the next port number, and BFD should then
also start.
Download Software
You can download Cisco Catalyst SD-WAN software from the Cisco Software Download site. The direct
link for downloading Cisco Catalyst SD-WAN software is here.
Download the following components, and any other software that you need for your Cisco Catalyst SD-WAN
installation. The Cisco SD-WAN Controllers operate as virtual machines on a server.
Component Comments
Cisco SD-WAN Validator Appears as vEdge Cloud router on the download page because the Cisco
SD-WAN Validator is deployed as a Cisco vEdge device.
Cisco SD-WAN Manager Appears as Cisco SD-WAN Controller Software on the download page
Cisco Catalyst SD-WAN Controller Appears as Cisco SD-WAN Controller Software on the download page
Note Default route with non-zero prefix is not supported on vEdge routers.
In Release 16.2, Cisco SD-WAN Manager web servers support the following ciphers:
• TLS_ECDHE_ECDSA_WITH_AES_128_<wbr/>CBC_SHA
• TLS_ECDHE_RSA_WITH_AES_128_<wbr/>CBC_SHA
• TLS_RSA_WITH_AES_128_CBC_SHA
If you are using the VMware vCenter Server to create the Cisco SD-WAN Manager VM instance, follow the
same procedure.
Launch vSphere Client and Create Cisco Catalyst SD-WAN Manager VM Instance
1. Launch the VMware vSphere Client application, and enter the IP address or name of the ESXi server,
your username, and your password. Click Login to log in to the ESXi server.
The system displays the ESXi screen.
2. Click File > Deploy OVF Template to deploy the virtual machine.
3. In the Deploy OVF Template screen, enter the location to install and download the OVF package. This
package is the vmanage.ova file that you downloaded from the Support page. Click Next.
4. Click Next to verify OVF template details.
5. Enter a name for the deployed template and click Next.
6. Click Next to accept the default format for the virtual disks.
7. From the Destination Networks drop-down list, select the destination network for the deployed OVF
template, and click Next.
8. In the Ready to Complete screen, click Finish to complete deployment of the Cisco SD-WAN Manager
VM instance.
The system has successfully created the VM instance with the parameters you just defined and displays the
vSphere Client screen with the Getting Started tab selected. By default, this includes one vNIC. This vNIC
is used for the tunnel interface.
The system displays the vSphere Client screen with Getting Started selected.
1. In the left navigation bar of the vSphere Client, select the Cisco SD-WAN Manager VM instance that you
just created, and click Edit virtual machine settings.
2. In the Cisco SD-WAN Manager – Virtual Machine Properties screen, click Add to add a new vNIC for
the management interface. Then click OK.
3. Click Ethernet Adapter for the type of device you wish to add. Then click Next.
4. In the Adapter Type drop-down, select VMXNET3 for the vNIC to add. Then click Next.
5. In the Ready to Complete screen, click Finish.
6. The Cisco SD-WAN Manager – Virtual Machine Properties screen opens showing that the new vNIC is
being added. Click OK to return to the vSphere Client screen.
7. If the Cisco SD-WAN Manager instance is part of a cluster, repeat Steps 2 through 6 to create a third
vNIC. This vNIC is used for the Message Bus.
Connect Cisco Catalyst SD-WAN Manager VM Instance to Cisco Catalyst SD-WAN Manager
Console
1. In the left navigation bar of the vSphere Client, select the Cisco SD-WAN Manager VM instance that you
just created, and click Power on the virtual machine. The Cisco SD-WAN Manager virtual machine is
powered on.
2. Select the Console tab, to connect to the Cisco SD-WAN Manager console. The Cisco SD-WAN Manager
console is displayed. Log in to Cisco SD-WAN Manager.
3. Select the storage device to use.
4. Select hdc, which is the new partition you added for the Cisco SD-WAN Manager database.
5. Confirm that you want to format the new partition, hdc. The system then reboots and displays the Cisco
SD-WAN Manager instance.
6. To connect to the Cisco SD-WAN Manager instance using a web browser, configure an IP address on the
Cisco SD-WAN Manager instance:
a. Log in to Cisco SD-WAN Manager.
b. In the management VPN, VPN 512, configure an IP address on interface eth0. Specify an IP address
that is reachable on your network. If necessary, add a default route:
# config
(config)# vpn 512
(config)# ip route prefix/length next-hop-ip-address
(config-vpn-512)# interface eth0
(config-interface-eth0)# ip address ip-address
(config-interface-eth0)# no shutdown
(config-interface-eth0)# commit and-quit
#
7. To connect to the Cisco SD-WAN Manager instance, type the following string in the URL:
https:// ip-address :8443/
8. Log in.
Note Starting from Cisco Catalyst SD-WAN Manager Release 20.12.1, you can commit the configuration before
rebooting a control manage device through Cisco SD-WAN Manager.
4. Provide the existing storage path box, click Browse to find the Cisco SD-WAN Manager software
image.
a. In the OS Type field, select Linux.
b. In the Version field, select the Linux version that you are running.
c. Click Forward.
5. Specify Memory and CPU based on your network topology and number of sites, and click Forward.
6. Select Customize configuration before install, and click Finish.
7. Select Disk 1 in the left navigation bar.
a. Click Advanced Options.
b. In the Disk Bus field, choose IDE (staring Cisco vManage Release 20.3.1, choose SCSI).
c. In the Storage Format field, choose qcow2.
d. Click Apply to create the VM instance with the parameters you defined. By default, this VM instance
includes one vNIC, which is used for the tunnel interface.
8. In the Cisco SD-WAN Manager Virtual Machine window, click Add Hardware to add a new virtual
disk for the Cisco SD-WAN Manager database.
9. In the Add New Virtual Hardware screen, specify the following for the new virtual disk:
a. In Create a disk image on the computer's hard drive, specify the disk capacity for the Cisco SD-WAN
Manager database to be 100GB.
b. In the Device Type field, specify IDE disk (staring Cisco vManage Release 20.3.1, specify SCSI
disk) for the virtual storage.
c. In the Storage Format field, specify qcow2.
d. Click Finish to complete the creation of a new virtual disk with a capacity of 100 GB.
10. In the Cisco SD-WAN Manager Virtual Machine screen, click Add Hardware to add another vNIC
for the management interface.
11. In the Add New Virtual Hardware screen, click Network.
a. In the Host Device field, select an appropriate host device.
b. Click Finish.
The newly created vNIC is listed in the left pane. This vNIC is used for the management interface.
12. If the Cisco SD-WAN Manager instance is a part of a cluster, repeat Steps 10 and 11 to create a third
vNIC. This vNIC is used for the Message Bus.
13. In the Cisco SD-WAN Manager Virtual Machine screen click Begin Installation in the top upper-left
corner of the screen.
14. The system creates the virtual machine instance and displays the Cisco SD-WAN Manager console.
15. At the login prompt, log in with the default username, which is admin, and the default password, which
is admin. The system prompts you to select the storage device to use.
16. Select hdc, which is the new partition you added for the Cisco SD-WAN Manager database.
17. Confirm that you want to format the new partition, hdc. The system reboots and displays the Cisco
SD-WAN Manager instance.
18. To create a Cisco SD-WAN Manager cluster, repeat Steps 1 through 17 to create a VM for each Cisco
SD-WAN Manager instance.
2. In the management VPN, VPN 512, configure an IP address on interface eth0. Specify an IP address that
is reachable on your network. If necessary, add a default route:
# config
(config)# vpn 512
(config)# ip route prefix/length next-hop-ip-address
(config-vpn-512)# interface eth0
(config-interface-eth0)# ip address ip-address
(config-interface-eth0)# no shutdown
(config-interface-eth0)# command and-quit
#
3. To connect to the Cisco SD-WAN Manager instance, type the following string in the URL:
https:// ip-address :8443/
4. Log in with the username admin and the password admin.
Note For a Cisco SD-WAN Managercluster, you must configure each Cisco SD-WAN Manager instance in the
cluster individually, from the Cisco SD-WAN Manager server itself using CLI mode or ESXi console.
b. Click Validator. (If you are using Cisco Catalyst SD-WAN Manager Release 20.12.1 or earlier, click
Edit.)
c. In the Validator DNS/IP Address: Port field, enter the DNS name that points to Cisco SD-WAN
Validator or the IP address of Cisco SD-WAN Validator and the port number to use to connect to it.
d. Click Save.
You can now issue CLI commands to configure Cisco SD-WAN Manager.
The following features are mandatory for Cisco SD-WAN Manager operation. Configure these features
from the CLI mode.
• Authentication, Authorization, and Accounting (AAA)
• Security
• System-wide parameters
• Transport VPN (VPN 0)
• Management VPN (for out-of-band management traffic)
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password encrypted-password
!
!
logging
disk
enable
!
!
!
snmp
no shutdown
view v2
oid 1.3.6.1
!
community private
view v2
authorization read-only
!
trap target vpn 0 10.0.1.1 16662
group-name Cisco
community-name private
!
trap group test
all
level critical major minor
exit
exit
!
vpn 0
interface eth1
ip address 10.0.12.22/24
tunnel-interface
color public-internet
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
allow-service netconf
no allow-service ntp
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 10.0.12.13
!
vpn 512
interface eth0
ip 172.16.14.145/23
no shutdown
!
ip route 0.0.0.0/0 172.16.14.1
!
Note All controller devices must have a certificate installed on them to be able to join the overlay network.
To automate the certificate generation and installation process, configure the name of your organization and
certificate authorization settings before adding the controller devices to the network.
For more information on configuring certificate settings, see Certificates.
3. Enter the timeout value, in minutes. This value can be from 10 to 180 minutes.
4. Click Save.
The client session timeout value applies to all Cisco SD-WAN Manager servers in a Cisco SD-WAN Manager
cluster.
Launch vSphere Client and Create a Cisco Catalyst SD-WAN Validator VM Instance
1. Launch the VMware vSphere Client application, and enter the IP address or name of the EXSi server,
your username, and your password. Click Login to log in to the ESXi server.
2. Click File > Deploy OVF Template to deploy the virtual machine.
3. In the Deploy OVF Template page, enter the location to install and download the OVF package. This
package is the vedge.ova file that you downloaded from Cisco. Then click Next.
4. Click Next to verify OVF template details.
5. Enter a name for the deployed template and click Next. The figure below specifies a name for the Cisco
SD-WAN Validator instance.
6. Click Next to accept the default format for the virtual disks.
7. Click Next to accept your destination network name as the destination network for the deployed OVF
template. For this instance, CorpNet is the destination network.
8. In the Ready to Complete page, click Finish. The figure below shows the name for the Cisco SD-WAN
Validator instance.
The system has successfully created the VM instance with the parameters you just defined and displays the
vSphere Client page with Getting Started selected. By default, this includes one vNIC. This vNIC is used
for the management interface.
Start the Cisco Catalyst SD-WAN Validator VM Instance and Connect to the Console
1. In the left navigation bar of the vSphere Client, select the Cisco SD-WAN Validator virtual machine
instance you created, and click Power on the virtual machine. The Cisco SD-WAN Validator virtual
machine is powered on.
2. Select Console to connect to the Cisco SD-WAN Validator console.
3. At the login prompt, log in with the default username, which is admin, and the default password, which
is admin.
What's Next
See Configure Cisco Catalyst SD-WAN Validator.
4. For Provide the existing storage path, click Browse to find the Cisco SD-WAN Validator software
image.
a. For OS Type, choose Linux.
b. For Version, choose the Linux version that you are running.
c. Click Forward.
5. Specify Memory and CPU based on your network topology and the number of sites, and click Forward.
6. Check Customize configuration before install. Then click Finish.
7. Choose Disk 1 in the left navigation bar. Then:
a. Click Advanced Options.
b. For Disk Bus, choose IDE.
8. In the vEdge Cloud Virtual Machine page, click Add Hardware to add a second vNIC for the tunnel
interface.
9. In the Add New Virtual Hardware page, click Network.
a. In the Host Device, choose an appropriate Host device.
b. Click Finish.
The newly created vNIC is listed in the left pane. This vNIC is used for the tunnel interface.
10. In the Cisco SD-WAN Validator Virtual Machine page, click Begin Installation in the top upper-left
corner of the page.
11. The system creates the virtual machine instance and displays the Cisco SD-WAN Validator console.
12. In the login page, log in with the default username, which is admin, and the default password, which
is admin.
What's Next
See Configure Cisco Catalyst SD-WAN Validator.
2. Log in as the user admin, using the default password, admin. The CLI prompt is displayed.
3. Enter configuration mode:
vBond#config
vBond(config)#
Configuring the hostname is optional, but is recommended because this name in included as part of the
prompt in the CLI and it is used on various Cisco SD-WAN Manager screens to refer to the device.
5. Configure the system IP address:
vBond(config-system)#system-ip ip-address
Cisco SD-WAN Manager uses the system IP address to identify the device so that the NMS can download
the full configuration to the device.
6. Configure the IP address of Cisco SD-WAN Validator. Cisco SD-WAN Validator's IP address must be
a public IP address, to allow all Cisco vEdge devices in the overlay network to reach Cisco SD-WAN
Validator:
vBond(config-system)#vbond ip-address local
In Releases 16.3 and later, the address can be an IPv4 or an IPv6 address. In earlier releases, it must be
an IPv4 address. A Cisco SD-WAN Manager is effectively a vEdge router that performs only the
orchestrator functions. The local option designates the device to be Cisco SD-WAN Validator, not a
vEdge router. Cisco SD-WAN Validator must run on a standalone virtual machine (VM) or hardware
router; it cannot coexist in the same device as a software or hardware vEdge router.
7. Configure a time limit for confirming that a software upgrade is successful:
vBond(config-system)#upgrade-confirm minutes
The time can be from 1 through 60 minutes. If you configure this time limit, when you upgrade the
software on the device, Cisco SD-WAN Manager (when it comes up) or you must confirm that a software
upgrade is successful within the configured number of minutes. If the device does not received the
confirmation within the configured time, it reverts to the previous software image.
8. Change the password for the user "admin":
vBond(config-system)#user admin password password
Note The IP address must be a public address so that all devices in the overlay network can reach Cisco SD-WAN
Validator.
After the overlay network is up and operational, create a Cisco SD-WAN Validator configuration template
on the Cisco SD-WAN Manager that contains the initial configuration parameters. Use the following Cisco
SD-WAN Manager feature templates:
• System feature template to configure the hostname, system IP address, and Cisco SD-WAN Validator
functionality.
• AAA feature template to configure a password for the "admin" user.
• VPN Interface Ethernet feature template to configure the interface in VPN 0.
In addition, it is recommended that you configure the following general system parameters:
• From the Cisco SD-WAN Manager menu, choose Administration > Settings and configure Organization
name.
• From the Cisco SD-WAN Manager menu, choose Configuration > Templates. From System configuration
template drop-down, select create template and configure Timezone, NTP servers, and device physical
location.
• Click Additional Templates and from banner feature template drop-down, select Create Template.
Configure Login banner.
• From System feature configuration template drop-down, select Create Template and configure disk and
server parameters.
• From AAA feature configuration template drop-down, select Create Template and configure AAA,
RADIUS and TACACS servers.
• Click Additional Templates and from SNMP feature template drop-down, select Create Template and
configure SNMP.
Note The IP address must be a public address so that all devices in the overlay network can reach Cisco SD-WAN
Validator.
organization-name "Cisco"
clock timezone America/Los_Angeles
vbond 11.1.1.14 local
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password encrypted-password
!
!
logging
disk
enable
!
!
vpn 0
interface ge0/0
ip address 11.1.1.14/24
no shutdown
!
ip route 0.0.0.0/0 11.1.1.1
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
What's Next
See Add Cisco SD-WAN Validator to the Overlay Network.
Configuration Prerequisites
Security Prerequisites
Before you can configure Cisco SD-WAN Validators in the Cisco SD-WAN overlay network, you must have
generated a certificate for Cisco SD-WAN Validator, and the certificate must already be installed on the
device. See Generate a Certificate.
Variables Spreadsheet
The feature templates that you create will most likely contain variables. To have Cisco SD-WAN Manager
populate the variables with actual values when you attach a device template to a device, either enter the values
manually or click Import File in the upper right corner to load an Excel file in CSV format that contains the
variables values.
In the spreadsheet, the header row contains the variable name and each row after that corresponds to a device,
defining the values of the variables. The first three columns in the spreadsheet must be (in the order listed
below):
• csv-deviceId—Serial number of the device (used to uniquely identify the device).
• csv-deviceIP—System IP address of the device (used to populate the system ip address command).
• csv-host-name—Hostname of the device (used to populate the system hostname command).
You can create a single spreadsheet for all devices in the overlay network— routers, Cisco SD-WAN
Controllers, and Cisco SD-WAN Validators. You do not need to specify values for all variables for all devices.
Security Security
Management VPN (for out-of-band management traffic) VPN, with the VPN ID set to 512
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
11. Create feature templates for each feature that you want to enable on Cisco SD-WAN Validators:
a. Create Archive and Banner templates
b. Create one Interface Ethernet template for each additional Ethernet interface you want to configure
on the Cisco SD-WAN Validator. Do not create any tunnel interfaces, or tunnels of any kind, for
Cisco SD-WAN Validators.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
8. Click Create. The new device template is listed in the Templates table. The Feature Templates column
shows the number of feature templates that are included in the device template, and the Type column
shows "Feature" to indicate that the device template was created from a collection of feature templates.
To create device templates by entering a CLI text-style configuration directly on Cisco SD-WAN Manager:
1. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
2. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
Cisco SD-WAN Manager generates the CSR, retrieves the generated certificate, and automatically installs it
on Cisco SD-WAN Validator. The new controller device is listed in the Controller table with the controller
type, hostname of the controller, IP address, site ID, and other details.
Note The ztp-server should be csr-cert signed from either cisco-pki or symantec
(Digicert).
Note Some operating systems, including Microsoft Windows, may add carriage return
special characters (such as ^M) at the end of each line in this file. Use a text editor
to remove these characters before you upload the file.
• For releases beginning with Cisco SD-WAN Release 20.3.1 on Cisco vEdge devices, a JSON file that
contains the router chassis information that the Cisco SD-WAN Validator that acts as the ZTP server
requires. This file is extracted from the PNP portal downloaded zip bundled device file. The JSON file
contains the following information for each router:
• Organization name as specified in the device certificate
• Certificate information
• Router chassis number
• Router serial number
• Validity (either valid or invalid)
• Cisco SD-WAN Validator IP address
• Cisco SD-WAN Validator port number (optional)
Note Before upgrading edge devices, ensure that your on-premises ZTP server is using
the same release number (or higher) as the Cisco SD-WAN Controller release
that you are using for Cisco SD-WAN Manager, Cisco SD-WAN Controller, and
Cisco SD-WAN Validator. For example, before upgrading from Cisco vManage
Release 20.6.x to Cisco vManage Release 20.9.x, ensure that the ZTP server is
using release 20.9 or later.
From Cisco SD-WAN Release 20.4.1, if Multi-Tenancy is enabled in controller profile on the PNP
portal, the JSON file also contains the SP Organization Name.
For Cisco SD-WAN Release 20.3.1, download the Chassis ZIP file from the PNP portal and extract the
JSON file from it. Use the following command to upload the JSON file to the ZTP server:
vBond# request device-upload chassis-file JSON-file-name
{
"version": "1.1",
"organization": "vIPtela Inc Regression",
"overlay": "vIPtela Inc Regression",
"root_cert_bundle":"-----BEGIN CERTIFICATE-----
<certificate>
----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----
<certificate>
----END CERTIFICATE-----",
"controller_details": {
"primary_ipv4":"10.0.12.26",
"primary_port":"12346"
},
"chassis_list": [{
"chassis": "JAE214906FZ",
"SKU": "ASR1002-HX",
"HWPID": "ASR1002-HX",
"serial_list": [{
"sudi_subject_serial": "JAE214906FX",
"sudi_cert_serial": "021C0203",
"HWPID": "ASR1002-HX"}]
}
],
"timestamp": "2019-10-21 23:40:02.248"
}
From Cisco SD-WAN Release 20.3.2, you need not extract the JSON file from the Chassis ZIP file that
you download from the PNP portal. Use the request device-upload chassis-file command to upload the
serialFile.Viptela file downloaded from the PNP portal to the ZTP server. The ZTP server
extracts the JSON file from serialFile.Viptela and loads the chassis entries into the database.
vBond# request device-upload chassis-file /home/admin/serialFile.viptela
Uploading chassis numbers via VPN 0
Copying ... /home/admin/serialFile.viptela via VPN 0
file: /tmp/tmp.DkaQ18u3aM/viptela_serial_file
PnP
Verifying public key received from PnP against production root cert
is_public_key_ok against production root ca: O = Cisco, CN = MMI Signer STG - DEV error
20 at 0 depth lookup:unable to get local issuer certificate
Verifying public key received from PnP against engineering root cert
is_public_key_ok against engineering root ca: OK
Signature verified for viptela_serial_file
final file: /tmp/tmp.DkaQ18u3aM/viptela_serial_file
Removing unsigned file (cisco_cert.cer).
Signature verification Suceeded.
Success: Serial file is /tmp/tmp.DkaQ18u3aM/viptela_serial_file
INFO: Input File specified was '/usr/share/viptela/chassis_numbers.tmp'
INFO: Root Cert File is /home/admin/vIPtela Inc Regression.crt
INFO: # of complete chassis entries written: 19
Json to CSV conversion succeeded!
Successfully loaded the chassis numbers file to the database.
Optionally, you can configure the Cisco vEdge device information manually using the request device command.
3. Log in to the Cisco vEdge device using the default username, which is admin, and the default password,
which is admin. The CLI prompt is displayed.
4. Configure the Cisco vEdge device to be a top-level Cisco SD-WAN Validator:
vBond# config
vBond(config)# system vbond ip-address local ztp-server
The IP address must be a public address so that the Cisco SD-WAN Validator is reachable by all Cisco
SD-WAN Controllers and Cisco vEdge devices through the transport network. The local option indicates
that this Cisco vEdge device is acting as the Cisco SD-WAN Validator. It is this option that starts the
Cisco SD-WAN Validator software process on the Cisco vEdge device. The ztp-server option establishes
this Cisco SD-WAN Validator as the ZTP server.
5. Configure an IP address for the interface that connects to the transport network:
vBond(config)# vpn 0 interface ge slot/port
vBond(config-ge)# ip address prefix/length
vBond(config-ge)# no shutdown
10. Sign CSR manually and generate certificate via PNP Connect Cisco PKI or Symantec via Cloud Ops.
11. Install Certificate:
vbond_ztp# request certificate install/home/admin/vbond_ztp.cer
12. Ensure Cisco IOS XE Catalyst SD-WAN has Cisco root-ca-cert or Symantec root-ca-cert in root-ca
chain.
13. Check clock on vBond_ZTP and Cisco IOS XE Catalyst SD-WAN.
14. Upload the JSON file that contains the router chassis information to the ZTP server:
vBond# request device-upload chassis-file path
path is the path to a local file or a file on a remote device that is reachable via FTP, TFTP, HTTP, or
SCP.
15. Verify that the list of Cisco vEdge device chassis numbers are present on the Cisco SD-WAN Validator
using one of the following commands:
What's Next
See Deploy the Cisco Catalyst SD-WAN Controller.
vContainer Host
The support for vContainer Host is deferred. For more information on vContainer host, refer to deferral notice.
Launch vSphere Client and Create a Cisco Catalyst SD-WAN Controller VM Instance
1. Launch the VMware vSphere Client application, and enter the IP address or name of the ESXi server,
your username, and your password. Click Login to log in to the ESXi server.
The system displays the ESXi screen.
2. Click File > Deploy OVF Template to deploy the virtual machine.
3. In the Deploy OVF Template screen, enter the location to install and download the OVF package. This
package is the vsmart.ova file that you downloaded from Cisco. Then click Next.
4. Click Next to verify OVF template details.
5. Enter a name for the deployed template and click Next. The figure below specifies a name for the Cisco
SD-WAN Controller instance.
6. Click Next to accept the default format for the virtual disks.
7. Click Next to accept your destination network as the destination network for the deployed OVF template.
In the figure below, CorpNet is the destination network.
8. In the Ready to Complete page, click Finish. The figure below shows the name for the Cisco SD-WAN
Controller instance.
The system has successfully created the VM instance with the parameters you just defined and displays the
vSphere Client page with Getting Started selected. By default, this includes one vNIC. This vNIC is used
for the tunnel interface.
Start the Cisco Catalyst SD-WAN Controller VM Instance and Connect to the Console
1. In the left navigation bar of the vSphere Client, select the virtual machine instance you just created, and
click Power on the virtual machine. The Cisco SD-WAN Controller virtual machine is powered on.
2. Select Console to connect to the Cisco SD-WAN Controller console.
3. At the login prompt, log in with the default username, which is admin, and the default password, which
is admin.
What's Next
See Configure Cisco Catalyst SD-WAN Controller.
4. In Provide the existing storage path field, click Browse to find the Cisco SD-WAN Controller software
image.
5. Specify Memory and CPU based on your network topology and the number of sites, and click Forward.
6. Select Customize configuration before install. Then click Finish.
7. Select Disk 1 in the left navigation bar. Then:
a. Click Advanced Options.
b. In the Disk Bus field, select IDE.
c. In the Storage Format field, select qcow2.
d. Click Apply to create the VM instance with the parameters you just defined. By default, this includes
one vNIC. This vNIC is used for the tunnel interface.
8. In the Cisco SD-WAN Controller Virtual Machine page, click Add Hardware to add a second vNIC
for the management interface.
9. In the Add New Virtual Hardware page, click Network.
a. In the Host Device field, select an appropriate host device.
b. Click Finish.
The newly created vNIC is listed in the left pane. This vNIC is used for the management interface.
10. In the Cisco SD-WAN Controller Virtual Machine page, click Begin Installation in the top upper-left
corner of the screen.
11. The system creates the virtual machine instance and displays the Cisco SD-WAN Controller console.
12. At the login prompt, log in with the default username, which is admin, and the default password, which
is admin.
What's Next
See Configure Cisco Catalyst SD-WAN Controller.
controller devices (the Cisco SD-WAN Validator, Cisco SD-WAN Manager, and Cisco SD-WAN Controller
devices).
For the overlay network to be operational and for the Cisco SD-WAN Controllers to participate in the overlay
network, do the following:
• Configure a tunnel interface on at least one interface in VPN 0. This interface must connect to a WAN
transport network that is accessible by all Cisco vEdge devices. VPN 0 carries all control plane traffic
among the Cisco vEdge devices in the overlay network.
• Ensure that the Overlay Management Protocol (OMP) is enabled. OMP is the protocol responsible for
establishing and maintaining the Cisco Catalyst SD-WAN control plane. It is enabled by default, and
you cannot disable it. When you edit the configuration from the CLI, do not remove the omp configuration
command.
You create these initial configuration by using SSH to open a CLI session to the the Cisco SD-WAN Controller.
After you have created the initial configuration, you create the full configuration by creating configuration
templates on the Cisco SD-WAN Manager NMS and then attaching them to the Cisco SD-WAN Controllers.
When you attach the configuration template to the Cisco SD-WAN Controllers, the configuration parameters
in the templates overwrite the initial configuration.
In this initial configuration, you should assign a system IP address to the Cisco SD-WAN Controller. This
address, which is similar to the router ID on non-Cisco SD-WAN routers, is a persistent address that identifies
the controller independently of any interface addresses. The system IP is a component of the device's TLOC
address. Setting the system IP address for a device allows you to renumber interfaces as needed without
affecting the reachability of the Cisco vEdge device. Control traffic over secure DTLS or TLS connections
between Cisco SD-WAN Controllers and vEdge routers and between Cisco SD-WAN Controllers and Cisco
SD-WAN Validator is sent over the system interface identified by the system IP address. In the transport VPN
(VPN 0), the system IP address is used as the device's loopback address. You cannot use this same address
for another interface in VPN 0.
Note For the overlay network to function properly and predictably, the policies configured on all Cisco SD-WAN
Controllers must be identical.
Configuring the hostname is optional, but is recommended because this name in included as part of the
prompt in the CLI and it is used on various Cisco SD-WAN Manager pages to refer to the device.
5. Configure the system IP address. In Releases 16.3 and later, the IP address can be an IPv4 or an IPv6
address. In earlier releases, it must be an IPv4 address. Releases 19.1 and later do not allow the
configuration of IPv6 unique local addresses. In these releases, configure IPv6 addresses from the
FC00::/7 prefix range.
Note Starting from Cisco Catalyst SD-WAN Control Components Release 20.9.x release, you can configure unique
local IPv6 addresses. Prior to this release, you can configure IPv6 addresses from the FC00::/7 prefix range.
vSmart(config-system)#system-ip ip-address
The Cisco SD-WAN Manager uses the system IP address to identify the device so that the NMS can
download the full configuration to the device.
6. Configure the numeric identifier of the site where the device is located:
vSmart(config-system)# site-id site-id
7. Configure the numeric identifier of the domain in which the device is located:
vSmart(config-system)# domain-id domain-id
8. Configure the IP address of the Cisco Catalyst SD-WAN Validator or a DNS name that points to the
Cisco Catalyst SD-WAN Validator. The Cisco Catalyst SD-WAN Validator's IP address must be a
public IP address, to allow all Cisco vEdge devices in the overlay network to reach it.
vSmart(config-system)# vbond (dns-name | ip-address)
The time can be from 1 through 60 minutes. If you configure this time limit, when you upgrade the
software on the device, Cisco SD-WAN Manager (when it comes up) or you must confirm that a software
upgrade is successful within the configured number of minutes. If the device does not receive the
confirmation within the configured time, it reverts to the previous software image.
10. Change the password for the user "admin":
vSmart(config-system)# user admin password password
Note You must configure a tunnel interface on at least one interface in VPN 0 in order for the overlay network to
come up and for Cisco SD-WAN Controller to be able to participate in the overlay network. This interface
must connect to a WAN transport network that is accessible by all Cisco vEdge devices. VPN 0 carries all
control plane traffic among the Cisco vEdge devices in the overlay network.
12. Configure a color for the tunnel to identify the type of WAN transport. You can use the default color
(default), but you can also configure a more appropriate color, such as mpls or metro-ethernet,
depending on the actual WAN transport.
vSmart(config-tunnel-interface)# color color
After the overlay network is up and operational, create a Cisco SD-WAN Controller configuration template
on the Cisco SD-WAN Manager that contains the initial configuration parameters. Use the following Cisco
SD-WAN Manager feature templates:
• System feature template to configure the hostname, system IP address, and Cisco SD-WAN Validator
functionality.
• AAA feature template to configure a password for the "admin" user.
• VPN Interface Ethernet feature template to configure the interface, default route, and DNS server in VPN
0.
In addition, it is recommended that you configure the following general system parameters:
• From the Cisco SD-WAN Manager menu, select Administration > Settings and configure Organization
name.
• From the Cisco SD-WAN Manager menu, select Configuration > Templates and configure the following:
• For NTP and System feature configuration template, configure Timezone, NTP servers, and device
physical location.
• For Banner feature template, configure Login banner.
• For Logging feature configuration template, configure Logging parameters.
• For AAA feature configuration template, configure AAA, and RADIUS and TACACS+ servers.
• For SNMP feature configuration template, configure SNMP.
all
level critical major minor
exit
exit
!
vpn 0
interface eth1
ip address 10.0.12.22/24
tunnel-interface
color public-internet
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
allow-service netconf
no allow-service ntp
no allow-service stun
!
no shutdown
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
!
What's Next
See Add the Cisco SD-WAN Controller to the Overlay Network.
Configuration Prerequisites
Security Prerequisites
Before you can configure Cisco SD-WAN Controllers in the Cisco overlay network, you must have generated
a certificate for Cisco SD-WAN Controller, and the certificate must already be installed on the device. See
Generate a Certificate.
Variables Spreadsheet
The feature templates that you create will most likely contain variables. To have Cisco SD-WAN Manager
populate the variables with actual values when you attach a device template to a device, either enter the values
manually or click Import File in the upper right corner to load an Excel file in CSV format that contains the
variables values.
In the spreadsheet, the header row contains the variable name and each row after that corresponds to a device,
defining the values of the variables. The first three columns in the spreadsheet must be (in order):
• csv-deviceId—Serial number of the device (used to uniquely identify the device).
• csv-deviceIP—System IP address of the device (used to populate the system ip address command).
• csv-host-name—Hostname of the device (used to populate the system hostname command).
You can create a single spreadsheet for all devices in the overlay network— routers, Cisco SD-WAN
Controllers, and Cisco SD-WAN Validators. You do not need to specify values for all variables for all devices.
Security Security
Management VPN (for out-of-band management traffic) VPN with the VPN ID set to 512
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
template. Optional parameters are generally grayed out. A plus sign (+) is displayed to the right when
you can add multiple entries for the same parameter.
6. Enter a template name and description. These fields are mandatory. You cannot use any special characters
in template names.
7. For each required parameter, choose the desired value, and if applicable, select the scope of the parameter.
Select the scope from the drop-down menu to the left of each parameter field.
8. Click the plus sign (+) below the required parameters to set values for additional parameters, if applicable.
9. Click Create.
10. Create feature templates for each of the required features listed in the previous section. For the transport
VPN, use the template called VPN-vSmart and in the VPN Template section, set the VPN to 0, with a
scope of Global. For the management VPN, use the template called VPN- and in the VPN Template
section, set the VPN to 512, with a scope of Global.
11. Create any additional feature templates for each optional feature that you want to enable on Cisco
SD-WAN Controllers.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
b. For templates that have Sub-Templates, click the plus (+) sign or the Sub-Templates title to display
a list of sub-templates. As you select a sub-template, the name of the sub-template along with a
drop-down is displayed. If the sub-template is mandatory, its name is marked with an asterisk.
c. Select the desired sub-template.
8. Click Create. The new device template is listed in the Templates table. The Feature Templates column
shows the number of feature templates that are included in the device template, and the Type column
shows "Feature" to indicate that the device template was created from a collection of feature templates.
To create device templates by entering a CLI text-style configuration directly on Cisco SD-WAN Manager:
1. From the Cisco SD-WAN Manager menu, select Configuration > Templates.
2. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
3. For the desired device template, click ..., and select Attach Devices.
4. In the Attach Devices window, select the desired Cisco SD-WAN Controller from the Available Devices
column, and click the right-pointing arrow to move them to the Selected Devices column. You can select
one or more controllers. Click Select All to choose all listed controllers.
5. Click Attach.
6. Click Next.
7. To preview the configuration that is about to be sent to Cisco SD-WAN Controller, in the left pane, click
the device. The configuration is displayed in the right pane, in the Device Configuration Preview window.
8. To send the configuration in the device template to Cisco SD-WAN Controllers, click Configure Devices.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
Cisco SD-WAN Manager automatically generates the CSR, retrieves the generated certificate, and installs it
on Cisco SD-WAN Controller. The new controller is listed in the Controller table with the controller type,
hostname of the controller, IP address, site ID, and other details.
Note If Cisco SD-WAN Controller and Cisco SD-WAN Validator have the same system IP addresses, they do not
appear in Cisco SD-WAN Manager as devices or controllers. The certificate status of Cisco SD-WAN Controller
and Cisco SD-WAN Validator is also not displayed. However, the control connections still successfully comes
up.
What's Next
See Deploy the vEdge Routers.
Support for Deploying Cisco Cisco IOS XE Catalyst SD-WAN Starting from this release, Cisco
Catalyst 8000V Instances for Release 17.4.1a Catalyst 8000V instances can be
Supported Cloud Services Provider deployed on Cloud Services
Platforms Provider portals such as Google
Cloud Platform, Microsoft Azure
and Amazon Web Services.
Support for Deploying Cisco Cisco IOS XE Catalyst SD-WAN Starting from this release, Cisco
Catalyst 8000V Instances on Release 17.5.1a Catalyst 8000V instances can be
Alibaba Cloud deployed on Alibaba Cloud.
For information on supported instances of Cisco Catalyst 8000V and how to deploy them on the supported
cloud service provider portals, see the following links:
• Deploying Cisco Catalyst 8000V Edge Software on Amazon Web Services
• Deploying Cisco Catalyst 8000V Edge Software on Microsoft Azure
• Deploying Cisco Catalyst 8000V Edge Software on Google Cloud Platform
• Cisco Catalyst 8000V Edge Software Deployment Guide for Alibaba Cloud
Features
The following Cisco Catalyst 8000V features are not supported in an Alibaba Cloud deployment when operating
as part of Cisco Catalyst SD-WAN:
Cisco Catalyst SD-WAN Cloud onRamp Connect the Cisco Catalyst 8000V to Cisco Catalyst SD-WAN
integration by creating a bootstrap file, as described in Create a Bootstrap
File for a Cisco Catalyst 8000V Instance Using Cisco Catalyst
SD-WAN, on page 191. Deployment by Cloud onRamp is not
supported.
Create a Bootstrap File for a Cisco Catalyst 8000V Instance Using Cisco Catalyst
SD-WAN
1. For instructions on creating a bootstrap file for a cloud-hosted device, using Cisco SD-WAN Manager,
see Bootstrap Process for Cisco Catalyst SD-WAN Cloud-Hosted Devices.
2. In the Alibaba Cloud portal, create an instance of the Cisco Catalyst 8000V. When configuring the instance,
use the bootstrap configuration that you created in Cisco SD-WAN Manager.
1. For software vEdge Cloud routers, create a VM instance, either on an AWS server, or on an ESXi or a
KVM hypervisor.
2. For software vEdge Cloud router, install a signed certificate on the router. In Releases 17.1 and later,
Cisco SD-WAN Manager can act as a Certificate Authority (CA) and can automatically generate and
installed signed certificates on vEdge Cloud router. In earlier releases, send a certificate signing request
to Symantec and then install that certificate on the router so that the router can be authenticated on and
can participate in the overlay network.
3. From Cisco SD-WAN Manager, send the serial numbers of all vEdge Cloud routers to Cisco SD-WAN
Controllers and Cisco SD-WAN Validators in the overlay network.
4. Create a full configuration for the vEdge Cloud router. You do this by creating a Cisco SD-WAN Manager
template for Cisco SD-WAN Validator and attaching that template to the orchestrator. When you attach
the Cisco SD-WAN Manager template, the initial minimal configuration is overwritten.
5. Prepare hardware vEdge Cloud router for automatic provisioning , which is done using the Cisco Catalyst
SD-WAN zero-touch provisioning (ZTP) tool. The ZTP process allows hardware routers to join the overlay
network automatically.
Starting with Release 18.2.0, vEdge Cloud routers that are hosted in countries affected by United States
government embargoes cannot connect to overlay network controllers (Cisco SD-WAN Validators, Cisco
SD-WAN Managers, and Cisco SD-WAN Controllers) that are hosted in the Cisco cloud. Any vEdge Cloud
router from an embargoed country that attempts to connect to one of these controllers will be disabled. (The
vEdge Cloud routers can, however, connect to controllers that are hosted in other clouds). As a result, when
a vEdge Cloud router initially attempts to connect to a controller in the Cisco cloud, the router might not come
up and might remain in a pending state if the Cisco SD-WAN Validator and theCisco SD-WAN Manager are
unable to communicate with each other or if the Cisco cloud server is down.
Create a VPC
Plan your network address blocks carefully before creating the VPC. Once you create a VPC, you cannot
modify it. To make any changes to the network addressing, you must delete the VPC and create a new one.
1. Log in to AWS. In the Networking section of the AWS home page, click VPC.
2. On the page that opens, click Start VPC.
3. On the Select a VPC Configuration page, select VPC with Public and Private Subnets.
4. On the VPC with Public and Private Subnets screen:
a. In IP CIDR Block, enter the desired IP addressing block. The VPC can use addresses only in this
ange.
b. Specify a public subnet and a private subnet from within the IP CIDR block.
c. In Elastic IP Allocation ID, enter the address of your Internet gateway. This gateway translates internal
traffic for delivery to the public Internet.
d. Add endpoints for S3 only if you need extended storage space, such as for a large database.
e. To use the AWS automatic registration of IP addresses to DNS, enable DNS hostnames.
f. Select the desired Hardware tenancy, either shared or dedicated. You can share your AWS hardware
with other AWS clients, or you can have dedicated hardware. With dedicated hardware, the device
assigned to you can host only your data. However, the cost is higher.
g. Click Create VPC.
Wait a few minutes until the VPC Dashboard displays the VPC Successfully Created message.
The infrastructure is now complete and ready for you to deploy applications, appliances, and the vEdge Cloud
router. Click the links on the left to see the subnets, route tables, internet gateways, and NAT address translation
points in the VPC.
1. Choose an Amazon Machine Image (AMI). The Cisco Catalyst SD-WAN AMI has a name in the format
release-number-vEdge; for example, 16.1.0-vEdge. The Cisco Catalyst SD-WAN AMI is private. Contact
your Cisco Catalyst SD-WAN sales representative, who can share it with you.
2. Choose the Cisco Catalyst SD-WAN AMI, then click Select.
3. The Choose an Instance Type screen appears. Determine which instance type best meets your needs,
according to the following table. The minimum requirement is 2 vCPUs.
Table 24: Table 1: EC2 Instance Types that Support the vEdge Cloud router
c3.2xlarge 8 15 2 x 80 SSD
4. Select the preferred instance type, then click Next: Configure Instance Details.
4.
Note Starting from Cisco SD-WAN Release 20.5.1, a Cisco vEdge Cloud router VM with the default username
and password (admin/admin) cannot be deployed on AWS. Therefore, when you deploy a Cisco vEdge Cloud
router VM using a third-party cloud provider, ensure that you use the following cloud configuration to continue
using the default credentials.
hostname: vedge
write_files:
- content: "vedge\n"
owner: root:root
path: /etc/default/personality
permissions: '0644'
- content: "1\n"
owner: root:root
path: /etc/default/inited
permissions: '0600'
- path: /etc/confd/init/zcloud.xml
content: |
<config xmlns="http://tail-f.com/ns/config/1.0">
<system xmlns="http://viptela.com/system">
<aaa>
<user>
<name>admin</name>
<password>$6$9ac6af765f1cd0c0$jRM/rCPsQ56JlDU/1s9H7zhhksy/FZHv37zDJkzM6h/IU/FsnTcBuLwV3AVI5kCnfX9wYmqP8CsGk.4PrjC22/</password>
<group>netadmin</group>
</user>
</aaa>
</system>
</config>
This cloud configuration configures the VM with admin/admin credentials, and forces a password
change on your first login.
5. Click Next: Add Storage.
6. The Add Storage page opens. You do not need to change any settings on this screen. Click Next: Tag
Instance.
7. The Tag Instance page opens. Enter your desired Key and Value, and then click Next: Configure
Security Group.
8. The Configure Security Group page opens. Add rules to configure your firewall settings. These rules
apply to outside traffic coming into your vEdge Cloud router.
a. Below Type, select SSH.
b. Below Source, select My IP.
10. Click Review and Launch. The Review Instance Launch screen opens. Click Launch.
11. Select Proceed without a key pair, click the acknowledgement check box, then click Launch Instances.
12. Wait a few minutes, the instance initializes. The vEdge Cloud router is now running. The first interface,
eth0, is always the management interface. The second interface, ge0/0, appears in VPN 0, but you can
configure it to be in a different VPN.
Router# config
Entering configuration mode terminal
Router(config)# vpn 0 interface ge0/3 mtu 2000
Router(config-interface-ge0/3)# commit
Commit complete.
vEdge(config-interface-ge0/3)# end
vEdge# show interface
IF IF
TCP
AF ADMIN OPER ENCAP
SPEED MSS RX TX
VPN INTERFACE TYPE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR
MBPS DUPLEX ADJUST UPTIME PACKETS PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 ipv4 10.66.15.15/24 Up Up null service 1500
00:0c:29:db:f0:62 1000 full 1420 0:14:05:30 546018 545562
0 ge0/1 ipv4 10.1.17.15/24 Up Up null service 1500
00:0c:29:db:f0:6c 1000 full 1420 0:14:21:42 0 10
0 ge0/2 ipv4 - Down Up null service 1500
00:0c:29:db:f0:76 1000 full 1420 0:14:22:10 0 0
0 ge0/3 ipv4 10.0.20.15/24 Up Up null service 2000
00:0c:29:db:f0:80 1000 full 1920 0:14:21:42 0 10
0 ge0/6 ipv4 172.17.1.15/24 Up Up null service 1500
00:0c:29:db:f0:9e 1000 full 1420 0:14:21:42 0 10
0 ge0/7 ipv4 10.0.100.15/24 Up Up null service 1500
00:0c:29:db:f0:a8 1000 full 1420 0:14:21:42 773 708
0 system ipv4 172.16.255.15/32 Up Up null loopback 1500
00:00:00:00:00:00 0 full 1420 0:14:21:54 0 0
0 loopback3 ipv4 10.1.15.15/24 Up Up null transport 2000
00:00:00:00:00:00 10 full 1920 0:14:21:46 0 0
1 ge0/4 ipv4 10.20.24.15/24 Up Up null service 2000
00:0c:29:db:f0:8a 1000 full 1920 0:14:21:38 52038 52079
1 ge0/5 ipv4 172.16.1.15/24 Up Up null service 1500
00:0c:29:db:f0:94 1000 full 1420 0:14:21:38 0 8
512 eth0 ipv4 10.0.1.15/24 Up Up null service 1500
00:50:56:00:01:05 0 full 0 0:14:21:39 28926 29663
What's Next
See Install Signed Certificates on vEdge Cloud Routers.
2. In the right pane, select Cisco vEdge Cloud router (3 NICs) (Staged).
3. In the Cisco vEdge Cloud router (3 NICs) (Staged) screen, click Basics in the left pane to configure
basic settings for the vEdge Cloud router VM:
a. In the VM Name field, enter a name for the vEdge Cloud router VM instance.
b. In the Username field, enter the name of a user who can access the VM instance.
c. In the Authentication type field, select either Password or SSH public key.
d. If you selected password, enter, and then confirm, your password. You use the username and
password to open SSH session to the VM instance.
e. If you selected SSH public key, see https://docs.microsoft.com/en-us/azu...reate-ssh-keys for
instructions about how to generate an SSH key pair for Linux VMs.
f. In the Subscription field, select Pay-As-You-Go from the drop-down menu.
g. In the Resource Group field, click Create new to create a new resource group, or click Use existing
to select an existing resource group from the drop-down menu.
h. In the Location field, select the location in which you wish to bring up the vEdge Cloud router VM
instance.
i. Click OK.
4. In the left pane, click vEdge Settings to configure the vEdge Cloud router infrastructure settings.
5. In the Infrastructure Settings pane:
a. Click Size. In the Choose a size pane, select D3_V2 Standard for the instance type and click Select.
This is the recommended instance type.
b. Click Storage Account. In the Choose storage account pane, click Create New to create a new
storage account or select one of the listed storage accounts. Then click OK.
c. Click Public IP Address. In the Choose public IP address pane, click Create New to create a
new public IP address, or select one of the listed public IP address to use for the public IP subnet.
Then click OK.
d. In the Domain Name field, select vedge from the drop-down menu.
e. Click Virtual Network. In the Choose virtual network pane, click Create New to create a new
virtual network (VNET), or select an existing VNET to launch the vEdge Cloud instance in. Then
click OK.
f. If you selected an existing VNET, use the drop-down menu to choose available subnets within the
VNET. Then click OK.
You must have three subnets available within the VNET; otherwise, the vEdge Cloud router VM
instance will fail to launch. Also, ensure that route tables associated with your VM subnets have a
user-defined route (UDR) towards the service subnet of the vEdge Cloud router. The UDR ensures
that the VM subnets use the vEdge Cloud router as the gateway. See the example topology below.
Figure 26: Example Topology of VNET with VM Subnets
g. If you created a new VNET, define the address space within that VNET. Then click OK in the
Subnets pane.
Cisco Catalyst SD-WAN prepopulates subnet names and assigns IP addresses per subnet from the
VNET address space you defined. If you plan to connect your VNET instances through the service
subnet associated to the vEdge Cloud router, you do not need to make updates to the route table.
6. In the Summary pane, click OK. The Summary pane validates and displays the configuration you defined
for the vEdge Cloud router VM instance.
7. Click Buy to purchase. Then click Purchase in the Purchase pane.
Note Cisco Catalyst SD-WAN offers only a Bring Your Own License (BYOL) for the vEdge Cloud router, so you
are not actually purchasing the Viptela product. You are charged hourly for the VNET instance.
The system creates the vEdge Cloud router VM instance and notifies you that the deployment has
succeeded.
8. Click the vEdge VM instance you just created.
The system displays the public IP address and DNS name of the vEdge Cloud router VM instance.
9. SSH into the public IP address of the vEdge Cloud router VM instance.
10. At the login prompt, log in with the username and password you created in Step 3. To view the vEdge
Cloud router default configuration, enter the following command:
vEdge# show running-config
When you create a vEdge Cloud router VM, the security group configuration shown below is applied
to the NIC associated with the public subnet. This security group does not restrict traffic from specific
sources, but it does restrict specific services. Custom services for TCP and UDP that need to be enabled
for Cisco Catalyst SD-WAN control protocols are also automatically configured. You can change the
security group configuration to suit your requirements.
ge0/1 Service subnet Connects the vEdge Cloud router as a gateway device
What's Next
See Install Signed Certificates on vEdge Cloud Routers.
4. In the Advanced Properties MTU drop-down, change the vSwitch MTU to the desired value. The range
is 2000 to 9000. Then click OK.
Table 25:
Note The traffic destined to VRRP IP is not forwarded by ESXi, since VRRP MAC address is not learned by the
Virtual Software Switch of ESXi associated with the vEdge Ethernet interface. This is due to the limitation
of the VMWare ESXi, which does not allow multiple unicast MAC address configuration on vNIC. As a
workaround, place the vNIC in promiscuous mode and perform MAC filtering in the software. To let Cisco
vEdge software place interface in promiscuous mode, Virtual Software Switch port-group or switch
configuration must be changed to allow the same. Be aware that ESXi VSS forwards all packets to all virtual
machines that are connected to the port-group or switch. This can have an adverse performance impact on the
ESXi Host other virtual machines. This might also have an adverse effect on the vEdge packet processing
performance. Design your network carefully to avoid performance impact.
What's Next
See Install Signed Certificates on vEdge Cloud Routers.
4. In Provide the existing storage path field, click Browse to find the vEdge Cloud software image.
a. In the OS Type field, select Linux.
b. In the Version field, select the Linux version you are running.
c. Click Forward.
5. Specify Memory and CPU based on your network topology and the number of sites. Click Forward.
6. Select Customize configuration before install. Then click Finish.
7. Select Disk 1 in the left navigation bar. Then:
a. Click Advanced Options.
b. In the Disk Bus field, select IDE.
c. In the Storage Format field, select qcow2.
d. Click Apply to create the VM instance with the parameters you just defined. By default, this includes
one vNIC. This vNIC is used for the management interface.
Note Cisco Catalyst SD-WAN software supports VMXNET3 and Virtio vNICs. It is recommended, however, that
you use the Virtio vNICs.
8. In the vEdge Cloud Virtual Machine screen, click Add Hardware to add a second vNIC for the tunnel
interface.
9. In the Add New Virtual Hardware screen, click Network.
a. In the Host Device field, select an appropriate host device.
b. Click Finish.
The newly created vNIC is listed in the left pane. This vNIC is used for the tunnel interface.
10. Create an ISO file to include a cloud-init configuration for the vEdge Cloud router.
Note Starting from Cisco SD-WAN Release 20.7.1, the cloud-init configuration file should only contain the minimum
configuration required for setting up control connections to Cisco SD-WAN Manager. Other configuration
such as the VPN0 and clear-text passwords should be pushed through the Add-On CLI template on Cisco
SD-WAN Manager.
11. In the Virtual Machine Manager screen, click Add Hardware to attach the ISO file you created.
12. In the Add New Virtual Hardware screen:
a. Click Select managed or other existing storage.
b. Click Browse and select the ISO file you created.
c. In the Device type field, select IDE CDROM.
d. Click Finish.
13. To allow the interface to carry jumbo frames (packets with an MTU of 2000 bytes), configure the MTU
for each virtual network (vnet) and virtual bridge NIC-containing VNET (virbr-nic) interface to a value
in the range of 2000 to 9000:
a. From the VM shell, issue the following command to determine the MTU on the vnet and virbr-nic
interfaces:
user@vm:~$ ifconfig -a
virbr1-nic Link encap:Ethernet HWaddr 52:54:00:14:4e:6f
BROADCAST MULTICAST MTU:1500 Metric
RX packets:0 errors:0 dropped:0 ovreruns:0 frame:0
TX packets:0 errors:0 dropped:0 ovreruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:0 (0.0 B) TX bytes:0 (0.0B)
...
vnet0 Link encap:Ethernet HWaddr fe:50:56:00:10:1e
inet6 addr: fe80::fc50:56ff:fe00:11e/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:167850 errors:0 dropped:0 overruns:0 frame:0
TX packets:663186 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:19257426 (19.2 MB) TX bytes:42008544 (42.0 MB)
...
14. In the vEdge Cloud Virtual Machine page, click Begin Installation in the top upper-left corner of the
screen.
15. The system creates the virtual machine instance and displays the vEdge Cloud console.
16. At the login prompt, log in with the default username, which is admin, and the default password, which
is admin. To view the vEdge Cloud router default configuration, enter the following command:
vEdge# show running-config
Note that the Cisco Catalyst SD-WAN software supports VMXNET3 and Virtio vNICs. It is recommended,
however, that you use the Virtio vNICs.
Table 26:
What's Next
See Install Signed Certificates on Edge Cloud Routers.
By default, the WAN Edge Cloud Certificate Authorization is automated. This is the recommended setting.
If you use third-party certificate authorization, configure certificate authorization to be manual:
1. From the Cisco SD-WAN Manager menu, select Administration > Settings.
2. Click Hardware WAN Edge Certificate Authorization. (If you are usingCisco Catalyst SD-WAN
Manager Release 20.12.1 or ealier, click Edit.
3. In the Security, select Enterprise Certificate (signed by Enterprise CA).
4. Click Save.
b. To automatically validate the vEdge routers and send their serial numbers to the controllers, click and
select the checkbox Validate the Uploaded vEdge List and Send to Controllers. If you do not select
this option, you must individually validate each router in the Configuration > Certificates > vEdge
List page.
4. Click Upload.
During the process of uploading the vEdge authorized serial number file, the Cisco SD-WAN Manager
generates a token for each vEdge Cloud router listed in the file. This token is used as a one-time password
for the router. The Cisco SD-WAN Manager sends the token to the Cisco SD-WAN Validator and the Cisco
SD-WAN Controller.
After the vEdge authorized serial number file has been uploaded, a list of vEdge routers in the network is
displayed in the vEdge Routers Table in the Configuration > Devices page, with details about each router,
including the router's chassis number and its token.
You can generate a bootstrap configuration file that contains information for an individual router or for multiple
routers.
Starting from Releases 17.1, you can also have Symantec generate signed certificates that you install manually
on each router, as described later in this article, but this method is not recommended.
Note In Cisco SD-WAN Release 20.5.1, the cloud-init bootstrap configuration that you generate for the Cisco
vEdge Cloud router cannot be used for deploying Cisco vEdge Cloud router 20.5.1. However, you can use
the bootstrap configuration for deploying Cisco vEdge Cloud router 20.4.1 and the earlier versions.
Starting from Cisco Catalyst SD-WAN Manager Release 20.12.1, the system Organization Name
cannot contain a comma. Comma is not allowed during the device configuration.
• For a vEdge Cloud router on a VMware hypervisor, select Encoded String to generate an encoded
string.
3. To generate a bootstrap configuration file individually for each vEdge Cloud router:
a. Click WAN Edge List, select the desired vEdge Cloud router.
b. For the desired vEdge Cloud router, click ..., and select Generate Bootstrap Configuration.
c. In the Generate Bootstrap Configuration window, select the file format:
• For a vEdge Cloud router on a KVM hypervisor or on an AWS server, select Cloud-Init to
generate a token, Cisco SD-WAN Validator IP address, vEdge Cloud router UUID, and
organization name.
• For a vEdge Cloud router on a VMware hypervisor, select Encoded String to generate an encoded
string.
Note Beginning with Cisco vManage Release 20.7.1, there is an option available when generating a bootstrap
configuration file for a Cisco vEdge device, enabling you generate two different forms of the bootstrap
configuration file.
• If you are generating a bootstrap configuration file for a Cisco vEdge device that is using Cisco Catalyst
SD-WAN Release 20.4.x or earlier, then check the The version of this device is 20.4.x or earlier check
box.
• If you are generating a bootstrap configuration for a Cisco vEdge device that is using Cisco SD-WAN
Release 20.5.1 or later, then do not use the check box.
d. Click Download to download the bootstrap configuration. The bootstrap configuration is downloaded
in a .cfg file.
Then use the contents of the bootstrap configuration file to configure the vEdge Cloud router instance in
AWS, ESXi, or KVM. For example, to configure a router instance in AWS, paste the text of the Cloud-Init
configuration into the User data field:
By default, the ge0/0 interface is the router's tunnel interface, and it is configured as a DHCP client. To use
a different interface or to use a static IP address, and if you did not attach a device configuration template to
the router, change the vEdge Cloud router's configuration from the CLI. See Configuring Network Interfaces.
3. Send the certificate to a third-party signing authority, to have them sign it.
4. Import the certificate into the device:
a. From the Cisco SD-WAN Manager menu, select Configuration > Certificates.
b. Click Controllers, and select Install Certificate.
c. In the Install Certificate page, paste the certificate into the Certificate Text field, or click Select a
File to upload the certificate in a file.
d. Click Install.
5. Issue the following REST API call, specifying the IP address of your Cisco SD-WAN Manager:
https://vmanage-ip-address/dataservice/system/device/sync/rootcertchain
Create the vEdge Cloud Router Bootstrap Configuration from the CLI
It is recommended that you generate the vEdge Cloud router's bootstrap configuration using Cisco SD-WAN
Manager. If, for some reason, you do not want to do this, you can create the bootstrap configuration using the
CLI. With this process, you must still, however, use Cisco SD-WAN Manager. You collect some of this
information for the bootstrap configuration from Cisco SD-WAN Manager, and after you have created the
bootstrap configuration, you use Cisco SD-WAN Manager to install the signed certificate on the router.
Installing signed certificates by creating a bootstrap configuration from the CLI is a three-step process:
1. Edit the router's configuration file to add the DNS name or IP address of the Cisco SD-WAN Validator
and your organization name.
2. Send the router's chassis and token numbers to Cisco SD-WAN Manager.
3. Have Cisco SD-WAN Manager authenticate the vEdge Cloud router and install the signed certificate on
the router.
To edit the vEdge Cloud router's configuration file from the CLI:
1. Open a CLI session to the vEdge Cloud router via SSH. To do this in Cisco SD-WAN Manager, select
Tools > SSH Terminal page, and select the desired router.
2. Log in as the user admin, using the default password, admin. The CLI prompt is displayed.
3. Enter configuration mode:
vEdge# config
vEdge(config)#
4. Configure the IP address of the Cisco SD-WAN Validator or a DNS name that points to the Cisco SD-WAN
Validator. The Cisco SD-WAN Validator's IP address must be a public IP address:
vEdge(config)# system vbond (dns-name | ip-address)
To send the vEdge Cloud router's chassis and token numbers to Cisco SD-WAN Manager:
1. Locate the vEdge Cloud router's token and chassis number:
a. From the Cisco SD-WAN Manager menu, select Configuration > Devices.
b. Click WAN Edge List, locate the vEdge Cloud router.
c. Make a note of the values in the vEdge Cloud router's Serial No./Token and Chassis Number columns.
Issue the show control local-properties command on the router to verify the Cisco SD-WAN Validator IP
address, the organization name the chassis number, and the token. You can also verify whether the certificate
is valid.
Finally, have Cisco SD-WAN Manager authenticate the vEdge Cloud router and install the signed certificate
on the router.
If you are using automated vEdge Cloud certificate authorization, which is the default, the Cisco SD-WAN
Manager uses the chassis and token numbers to authenticate the router. Then, Cisco SD-WAN Manager
automatically installs a certificate on the router and the router's token changes to a serial number. You can
display the router's serial number in the Configuration > Devices page. After the router's control connections
to Cisco SD-WAN Manager come up, any templates attached to the router are automatically pushed to the
router.
If you are using manual vEdge Cloud certificate authorization, after you configure the vEdge Cloud router
instance, follow this procedure to install a certificate on the router:
1. Install the enterprise root certificate chain on the router:
vEdge# request root-cert-chain install filename [vpn vpn-id]
After you install the root chain certificate on the router, and after Cisco SD-WAN Manager receives the
chassis and token numbers, Cisco SD-WAN Manager generates a CSR.
2. Download the CSR:
a. From the Cisco SD-WAN Manager menu, select Configuration > Certificates.
b. For the selected vEdge Cloud router for which to sign a certificate, click ... and select View CSR.
c. To download the CSR, click Download.
3. Send the certificate to a third-party signing authority, to have them sign it.
4. Import the certificate into the device:
a. From the Cisco SD-WAN Manager menu, select Configuration > Certificates.
b. Click Controllers and select Install Certificate.
c. In the Install Certificate page, paste the certificate into the Certificate Text field, or click Select a
File to upload the certificate in a file.
d. Click Install.
5. Issue the following REST API call, specifying the IP address of your Cisco SD-WAN Manager:
https://vmanage-ip-address/dataservice/system/device/sync/rootcertchain
path is the full path and filename where you want to upload the CSR. The path can be in a directory on
the local device or on a remote device reachable through FTP, HTTP, SCP, or TFTP. If you are using
SCP, you are prompted for the directory name and filename; no file path name is provided. When prompted,
enter and then confirm your organization name. For example:
vEdge# request csr upload home/admin/vm9.csr
Uploading CSR via VPN 0
Enter organization name : Cisco
Re-enter organization name : Cisco
Generating CSR for this vEdge device
........[DONE]
Copying ... /home/admin/vm9.csr via VPN 0
CSR upload successful
https://certmanager.<wbr/>websecurity.symantec.com/<wbr/>mcelp/enroll/index?jur_hash=<wbr/>f422d7ceb508a24e32ea7de4f78d37<wbr/>f8
4. In the Select Certificate Type drop-down, select Standard Intranet SSL and click Go. The Certificate
Enrollment page is displayed. Cisco Catalyst SD-WAN uses the information you provide on this form to
confirm the identity of the certificate requestor and to approve your certificate request. To complete the
Certificate Enrollment form:
a. In the Your Contact Information section, specify the First Name, Last Name, and Email Address of
the requestor.
b. In the Server Platform and Certificate Signing section, select Apache from the Select Server Platform
drop-down. In the Enter Certificate Signing Request (CSR) box, upload the generated CSR file, or
copy and paste the contents of the CSR file. (For details about how to do this, log in to
support.viptela.com. Click Certificate, and read the Symantec certificate instructions.)
c. In the Certificate Options section, enter the validity period for the certificate.
d. In the Challenge Phrase section, enter and then re-enter a challenge phrase. You use the challenge
phrase to renew, and, if necessary, to revoke a certificate on the Symantec Customer Portal. It is
recommended that you specify a different challenge phrase for each CSR.
e. Accept the Subscriber Agreement. The system generates a confirmation message and sends an email
to the requestor confirming the certificate request. It also sends an email to the Cisco to approve the
CSR.
5. After Cisco approves the CSR, Symantec sends the signed certificate to the requestor. The signed certificate
is also available through the Symantec Enrollment portal.
6. Install the certificate on the vEdge Cloud router:
vEdge# request certificate install filename [vpn vpn-id]
The file can be in your home directory on the local device, or it can be on a remote device reachable
through FTP, HTTP, SCP, or TFTP. If you are using SCP, you are prompted for the directory name and
filename; no file path name is provided.
7. Verify that the certificate is installed and valid:
vEdge# show certificate validity
After you have installed the certificate on the vEdge Cloud router, the Cisco SD-WAN Validator is able to
validate and authenticate the router, and the router is able to join the overlay network.
What's Next
See Send vEdge Serial Numbers to the Controller Devices.
Only authorized routers can join the overlay network. The controller devices Cisco SD-WAN Manager, Cisco
SD-WAN Controllers and Cisco SD-WAN Validators learn which routers are authorized to join the overlay
network from the router-authorized serial number file. This is a file that you receive from Cisco. The router
authorized serial number file lists the serial numbers and corresponding chassis numbers for all authorized
routers. Upload the file to one of the Cisco SD-WAN Manager in your network, and it then distributes the
file to the controllers.
When you upload the router serial number file, you can place the routers in one of these states:
• Invalid: When you power on the routers, they are not authorized to join the overlay network.
• Staging: When you power on the routers, they are validated and authorized to join the overlay network,
and can establish connections only to the control plane. Over the control plane, the routers receive their
configuration from Cisco SD-WAN Manager. However, the routers are unable to establish data plane
connections, so they cannot communicate with other routers in the network. The Staging state is useful
when you are preparing routers at one location and then sending them to different sites for installation.
Once the routers reach their final destination, you change their state from Staging to Valid, to allow the
routers to establish data plane connections and to fully join the overlay network.
• Valid: When you power on the routers, they are validated and authorized to join the overlay network,
and they are able to establish both control plane and data plane connections in the network. Over the
control plane, the routers receive their configuration from Cisco SD-WAN Manager. Over the data plane,
they are able to communicate with other routers. The Valid state is useful when the routers are being
installed at their final destination.
Note To successfully send a router serial number file to Cisco Catalyst SD-WAN Manager in Cisco vManage
Release 20.10.1 and earlier, ensure that the file is installed in /home/admin or /home/vmanage-admin.
Using credentials other than admin or vmanage-admin to send a router serial number file will result in an
error.
Ensure you have an active connection to the PnP (Plug and Play) Connect portal and an active Smart Account
and Virtual Account. You have to also use a CCO ID that is associated as the Smart Account or Virtual
Account admin of the account, on PnP Connect portal.
Note PnP Connect Sync is only applicable to .csv file upload. It does not affect the .viptela file (which is downloaded
from the PnP Connect portal) upload process.
Note You will be allowed to enable PnP Connect Sync only once you enter the Smart Account credentials.
Either the Serial number or SUDI number is mandatory for Cisco IOS XE Catalyst SD-WAN
devices, along with chassis number. Cisco ASR1002-X is an exception and does not need Serial
or SUDI numbers, it can be onboarded with only the chassis number on the .csv file.
c. To view your device details in Cisco SD-WAN Manager, go to Tools > SSH Terminal. Choose
your device and use one of the following command-
show certificate serial (for vEdge devices)
show sdwan certificate serial (for Cisco IOS XE Catalyst SD-WAN devices)
d. Enter the specific device details in the downloaded .csv file.
4. To upload the .viptela or .csv file on Cisco SD-WAN Manager click Choose file and upload the file that
contains the product ID, serial number and chassis number of your device.
Note If you have enabled PnP Sync Connect, the .csv file can contain upto 25 devices. If you have more than 25
devices, you can split them and upload multiple files.
5. Check the check box next to Validate the uploaded vEdge List and send to controllers.
6. Click Upload.
7. You should now see your device listed in the table of devices.
If you have enabled the PnP Sync Connect previously, your device will also reflect on the PnP Portal.
A list of routers in the network is displayed, showing detailed information about each router. To verify that
the routers are in the Valid state, select Configuration > Certificates.
A list of routers in the network is displayed, showing detailed information about each router. To verify that
the routers are in the Invalid state, from the Cisco SD-WAN Manager menu, select Configuration >
Certificates.
1. From the Cisco SD-WAN Manager menu, select Configuration > Certificates.
2. Click WAN Edge List.
3. In the Validate column, click Staging for each router.
4. Click Send to Controller.
5. When you are ready to have the router join the data plane in the overlay network, in the Validate column,
click Valid for each router, and then click Send to Controller. Placing the routers in the Valid state allows
them to establish data plane connections and to communicate with other routers in the overlay network.
Note Log In to a Device for the First Time: When you first deploy a Cisco Catalyst SD-WAN overlay network,
log in to the Cisco SD-WAN Validator, Cisco SD-WAN Manager, and Cisco SD-WAN Controller to manually
create the device's initial configuration. Routers are shipped with a factory default configuration. If you choose
to modify this configuration manually, log in through the router's console port.
For the overlay network to be operational and for the vEdge routers to be able to participate in the overlay
network, you must do the following:
• Configure a tunnel interface on at least one interface in VPN 0. This interface must be connected to a
WAN transport network that is accessible to all Cisco vEdge devices. VPN 0 carries all control plane
traffic between the Cisco vEdge devices in the overlay network.
• Ensure that the Overlay Management Protocol (OMP) is enabled. OMP is the protocol responsible for
establishing and maintaining the Cisco Catalyst SD-WAN control plane. It is enabled by default, and
you cannot disable it. If you edit the configuration from the CLI, do not remove the omp configuration
command.
• Ensure that BFD is enabled. BFD is the protocol that the transport tunnels on vEdge routers use for
transmitting data traffic through the overlay network. BFD is enabled by default, and cannot be disabled.
If you edit the configuration from the CLI, do not remove the bfd color command.
• Configure the IP address of DNS name of your network's Cisco SD-WAN Validator.
• Configure the IP address of the router.
Note The DNS cache timeout should be proportional to the number of Cisco SD-WAN
Validator IP addresses that DNS has to resolve, otherwise the control connection
for Cisco SD-WAN Manager may not occur during a link failure. This is because,
when there are more than six IP addresses (this is the recommended number since
the default DNS cache timeout is currently two minutes) to be checked, the DNS
cache timer expires even as the highest preferred interface tries all Cisco SD-WAN
Validator IP addresses, before failing over to a different color. For instance, it
takes about 20 seconds to attempt to connect to one IP address. So, if there are
eight IP addresses to be resolved, the DNS cache timeout should be 20*8=160
seconds or three minutes.
You should also assign a system IP address to each vEdge router. This address, which is similar to the router
ID on non-Cisco vEdge devices, is a persistent address that identifies the router independently of any interface
addresses. The system IP is a component of the device's TLOC address. Setting the system IP address for a
device allows you to renumber interfaces as needed without affecting the reachability of the Cisco vEdge
device. Control traffic over secure DTLS or TLS connections between Cisco SD-WAN Controllers and vEdge
routers and between Cisco SD-WAN Controllers and Cisco SD-WAN Validators is sent over the system
interface identified by the system IP address. In the transport VPN (VPN 0), the system IP address is used as
the loopback address of the device. You cannot use the same address for another interface in VPN 0.
You can also configure other features and functions required for your network topology.
You configure vEdge routers by creating configuration templates on the Cisco SD-WAN Manager. For each
configuration templates, you create one or more feature templates, which you then consolidate into a vEdge
router device template. You then attach the device template to a vEdge router. When the vEdge router joins
the overlay network, the Cisco SD-WAN Manager automatically pushes the configuration template to the
router.
It is strongly recommended that you create the full configuration for vEdge routers by creating configuration
templates on the Cisco SD-WAN Manager. When the Cisco SD-WAN Manager discovers a router in the
overlay network, it pushes the appropriate configuration template to the device. The configuration parameters
in the configuration template overwrite the initial configuration.
Note In Cisco vManage Release 20.7.x and earlier releases, Feature Templates is called Feature.
b. Description
c. Site ID
d. System IP
e. Timezone
f. Hostname
g. Console baud rate (vEdge hardware routers only)
h. GPS location
For information about configuration templates and parameters, see the Cisco SD-WAN Manager configuration
help articles for your software release.
Next, create a device template that incorporates all the feature templates for the vEdge router:
1. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
2. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
3. From the Create Template drop-down list, select From Feature Template.
4. From the Device Model drop-down, select the type of device for which you are creating the device
template. Cisco SD-WAN Manager displays the feature templates for the device type you selected.
Required templates are indicated with an asterisk (*).
5. Enter a name and description for the device template. These fields are mandatory. The template name
cannot contain special characters.
6. In the Transport & Management VPN section, under VPN 0, from the drop-down list of available
templates, select the desired feature template. The list of available templates shows the ones that you have
previously created.
7. To include additional feature templates in the device template, in the remaining sections, select the feature
templates in turn, and from the drop-down list of available templates, select the desired template. The list
of available templates are the ones that you have previously created. Ensure that you select templates for
all mandatory feature templates and for any desired optional feature templates.
8. Click Create to create the device template.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
3. For the selected template, click ... and select Attach Device.
4. In the Attach Device window, either search for a device or select a device from the Available Device(s)
column.
5. Click the arrow pointing right to move the device to the Selected Device(s) column on the right.
6. Click Attach.
When Cisco SD-WAN Manager discovers that the vEdge router has joined the overlay network, it pushes the
configuration template to the router.
8. Attach the device template to the vEdge router to activate the MCC/MCN.
9. In the right pane, select the VPN-Interface-Cellular template.
10. For Shutdown click No, to enable the cellular interface.
11. Save the VPN-Interface-Cellular feature template.
12. Repush the device template to the vEdge router. This is the device template that you pushed in Step 8.
Note If you configure a vEdge router manually from the CLI and then the router later becomes managed by a Cisco
SD-WAN Manager, when the Cisco SD-WAN Manager discovers the router, it pushes the router's configuration
from the Cisco SD-WAN Manager server to the router, overwriting the existing configuration.
For vEdge Cloud routers, use SSH to open a CLI session to the router. For hardware vEdge routers, connect
to the router via the management console.
Configuring the hostname is optional, but is recommended because this name in included as part of the
prompt in the CLI and it is used on various Cisco SD-WAN Manager pages to refer to the device.
5. Configure the system IP address. Starting from Releases 16.3 and later, the IP address can be an IPv4
or an IPv6 address. In earlier releases, it must be an IPv4 address.
vEdge(config-system)#system-ip ip-address
Cisco SD-WAN Manager uses the system IP address to identify the device so that the NMS can download
the full configuration to the device.
6. Configure the numeric identifier of the site where the device is located:
vEdge(config-system)# site-id site-id
8. Configure the IP address of the Cisco SD-WAN Validator or a DNS name that points to the Cisco
SD-WAN Validator. The IP address of the Cisco SD-WAN Validator must be a public IP address, to
allow all Cisco vEdge devices in the overlay network to reach the Cisco SD-WAN Validator:
vEdge(config-system)# vbond (dns-name | ip-address)
The time can be from 1 through 60 minutes. If you configure this time limit, when you upgrade the
software on the device, the Cisco SD-WAN Manager (when it comes up) or you must confirm that a
software upgrade is successful within the configured number of minutes. If the device does not received
the confirmation within the configured time, it reverts to the previous software image.
10. Change the password for the user "admin":
vEdge(config-system)# user admin password password
Note You must configure a tunnel interface on at least one interface in VPN 0 in order for the overlay network to
come up and for the Cisco SD-WAN Manager to be able to participate in the overlay network. This interface
must connect to a WAN transport network that is accessible by all Cisco vEdge devices. VPN 0 carries all
control plane traffic among the Cisco vEdge devices in the overlay network.
12. Configure a color for the tunnel to identify the type of WAN transport. You can use the default color
(default), but you can also configure a more appropriate color, such as mpls or metro-ethernet,
depending on the actual WAN transport.
vEdge(config-tunnel-interface)# color color
13. Configure a default route to the WAN transport network:
vEdge(config-vpn-0)# ip route 0.0.0.0/0 next-hop
After the overlay network is up and operational, create a vEdge configuration template on the Cisco SD-WAN
Manager that contains the initial configuration parameters. Use the following Cisco SD-WAN Manager feature
templates:
• System feature template to configure the hostname, system IP address, and Cisco SD-WAN Validator
functionality.
• AAA feature template to configure a password for the "admin" user.
• VPN-Interface-Ethernet feature template to configure the interface in VPN 0.
In addition, it is recommended that you configure the following general system parameters:
• From the Cisco SD-WAN Manager menu, select Administration > Settings and configure Organization
name.
• From the Cisco SD-WAN Manager menu, select Configuration > Templates. For the NTP and System
feature configuration templates, configure Timezone, NTP servers, and device physical location.
• For the Banner feature configuration template, configure Login banner.
• For the Logging feature configuration template, configure Logging parameters.
• For the AAA feature configuration template, configure AAA, and RADIUS and TACACS+ servers.
• For the SNMP feature configuration template, configure SNMP.
omp
no shutdown
gradeful-restart
advertise bgp
advertise connected
advertise static
!
security
ipsec
authentication-type ah-sha1-hmac sha1-hman
!
!
snmp
no shutdown
view v2
oid 1.3.6.1
!
community private
view v2
authorization read-only
!
trap target vpn 0 10.0.1.1 16662
group-name Cisco
community-name private
!
trap group test
all
level critical major minor
exit
exit
!
vpn 0
interface ge0/0
ip address 184.111.20.2/24
tunnel-interface
encapsulation ipsec
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stune
!
no shutdown
bandwidth-upstream 60
bandwidth-downstream 60
!
interface ge0/1
no shutdown
!
interface ge0/2
no shutdown
!
ip route 0.0.0.0/0 184.111.20.1
!
vpn 1
router
bgp 111000
neighbor 172.16.1.20
no shutdown
remote-as 111000
password $4$LzLwZj1ApK4zj4BgLEFXKw==
!
!
ospf
timers spf 200 1000 10000
area 0
interface ge0/1
authentication type message-direct
authentication message-digest message-digest-key 1 md5 $4$LzLwZj1ApK4zj4BgLEFXKw==
exit
exit
!
!
!
To collect data streams from a WAN Edge router in the overlay network, perform the following steps.
Collecting data streams also requires that VPN 512 be configured in your Cisco Catalyst SD-WAN network.
1. From the Cisco SD-WAN Manager menu, select Administration > Settings.
2. Click Data Stream. (If you are using Cisco Catalyst SD-WAN Manager Release 20.12.1 or earlier, click
Edit.)
3. Enable Data Stream.
4. From Cisco vManage Release 20.4.1, choose one of the following IP Address Type options:
• Transport: Click this option send the data stream to the transport IP address of the Cisco SD-WAN
Manager node to which the device is connected.
• Management: Click this option send the data stream to the management IP address of the Cisco
SD-WAN Manager node to which the device is connected.
• System: Click this option to send the data stream to the internally configured system IP address of
theCisco SD-WAN Manager node to which the device is connected.
In a Cisco SD-WAN Manager cluster deployment, we recommend that you choose System so that
the data stream is collected from edge devices that are managed by all Cisco SD-WAN Manager
instances in the cluster.
• The edge or gateway router at the site where the hardware vEdge router is located must be able to reach
public DNS servers. We recommend that the router be configured to reach the Google public DNS servers.
• For Cisco vEdge devices, the edge or gateway router at the site must be able to reachztp.viptela.com.
• For Cisco IOS XE Catalyst SD-WAN devices, the edge or gateway router at the site must be able to
reach ztp. local-domain.
• A network cable must be plugged into the interface that the hardware router uses for ZTP. These interfaces
are:
• For Cisco vEdge 1000 routers: ge0/0
• For Cisco vEdge 2000 routers: ge2/0
• For Cisco vEdge 100 series routers: ge0/4
• For Cisco IOS XE Catalyst SD-WAN devices, there is no specific interface that is used for connection
to the ZTP server. The router attempts to obtain a DHCP IP address on one interface at a time. It
uses the first interface on which it obtains the DHCP IP address to resolve the domain name ztp.
local-domain to the IP address of the ZTP server.
b. For Cisco vEdge devices, and for Cisco IOS XE Catalyst SD-WAN devices from Cisco IOS XE
Catalyst SD-WAN Release 17.7.1a, if no DHCP server is present, the router does not receive a
DHCP offer. In this situation, the router initiates an automatic IP address detection process (also
referred to as auto-IP). This process examines the ARP packets on the subnetwork and, from these
packets, it infers the IP address of the ZTP interface. Then, the ZTP process continues with Step 3.
For Cisco IOS XE Catalyst SD-WAN devices before Cisco IOS XE Catalyst SD-WAN Release
17.7.1a, if no DHCP server is present, the ZTP process does not continue.
3. The router contacts a DNS server to resolve the hostname ztp.viptela.com (for Cisco vEdge devices)
or ztp. local-domain (Cisco IOS XE Catalyst SD-WAN devices) and receives the IP address of the Cisco
Catalyst SD-WAN ZTP server
4. The router connects to the ZTP server. The ZTP server verifies the vEdge router and sends the IP address
of the Cisco SD-WAN Validator. This Cisco SD-WAN Validator has the same Organization name as
the vEdge router.
5. The router establishes a transient connection to the Cisco SD-WAN Validator and sends its chassis ID
and serial number. (At this point in the ZTP process, the router does not have a system IP address, so
the connection is established with a null system IP address.) The Cisco SD-WAN Validator uses the
chassis ID and serial number to verify the router. The Cisco SD-WAN Validator then sends the IP
address of Cisco SD-WAN Manager to the router.
6. The router establishes a connection to and is verified by Cisco SD-WAN Manager. Cisco SD-WAN
Manager sends the router its system IP address.
7. The router re-establishes a connection to the Cisco SD-WAN Validator using its system IP address.
8. The router re-establishes a connection to Cisco SD-WAN Manager using its system IP address.
For Cisco vEdge devices, if necessary, Cisco SD-WAN Manager pushes the proper software image to
the vEdge router. As part of the software image installation, the router reboots.
9. After the reboot, the router reestablishes a connection to the Cisco SD-WAN Validator, which again
verifies the router.
10. The router establishes a connection to Cisco SD-WAN Manager, which pushes the full configuration
to the router. (If the router has rebooted, it re-establishes a connection to Cisco SD-WAN Manager.)
11. The router joins the organization's overlay network.
Note For the ZTP process to succeed, Cisco SD-WAN Manager must contain a device configuration template for
the vEdge router. If the Cisco SD-WAN Manager instance has no template, the ZTP process fails. Ignore the
device-model and ztp-status display in the configuration preview and intent configuration. This information
is visible after you push the configuration on device side.
• vpn 0 interface ip dhcp-client—Enables DHCP on one of the interfaces in VPN 0, which is the transport
interface. Note that the actual interface in the default configuration varies by router model. This interface
must be connected to the Internet, MPLS, metro Ethernet, or other WAN network.
Warning: For ZTP to work, do not modify or delete either of these configuration commands before you connect
the vEdge router to a WAN.
Note In Release 16.3, you cannot use the LTE USB dongle on a vEdge 1000 router for ZTP.
The vEdge 100m router supports software Releases 16.1 and later. If the vEdge 100m router is running Release
16.2.10 or later, we recommend, when performing ZTP, that Cisco SD-WAN Manager also be running Release
16.2.10 or later.
The vEdge 100wm router supports software Releases 16.3 and later.
The default configuration that is shipped on wireless hardware vEdge routers includes the following commands
that allow the ZTP process to occur automatically on the cellular interface:
• system vbond ztp.viptela.com: Configure the initial Cisco SD-WAN Validator to be the Cisco Catalyst
SD-WAN ZTP SaaS server.
• vpn 0 interface cellular0 ip dhcp-client : Enable DHCP on one of the cellular interface called cellular0
in VPN 0, which is the transport interface. This interface must be connected to the cellular network.
• vpn 0 interface cellular0 technology : Associate a radio access technology (RAT) with the cellular
interface. In the default configuration, the RAT is set to lte. For ZTP to work, you must change this value
to auto.
• vpn 0 interface cellular0 profile 0: Enable automatic profile selection. For firmware-dependent mobile
carriers, the automatic profile uses the firmware default values. For other carriers, the automatic profile
uses the Mobile Country Code/Mobile Network Code (MCC/MNC) values on the SIM card. One exception
is the vEdge 100m-NT: The automatic profile tries OCN MVNO APN before the firmware default, which
is NTT Docomo. If the router finds a matching entry, it autocreates profile 16, which is used for the ZTP
connection. To check which profile is being used for the active ZTP connection, look at the Active profile
entry in the show cellular sessions command output.
The profile 0 configuration command recognizes the MCCs and MCNs listed in the vEdge SKU
Information table. If your MCC/MNC is supported, you do not need to configure them in the Cellular
Profile feature template or with the profile command. If your MCC/MNC is not supported, you must
configure them manually, using the Cellular-Profile configuration template or the profile CLI command.
If you need to use Cisco SD-WAN Manager configuration templates to create the portions of the default
configuration that allow ZTP to occur automatically, use the VPN-Interface-Cellular feature template. In the
template the Profile ID field is set to 0 and the tunnel interface is enabled. Starting from Releases 16.3.1 and
later, the Technology field has been added, and the default value is "lte". To match the vEdge router's ZTP
cellular0 configuration, change the value to "auto".
Click Advanced, to view the default cellular MTU configuration is 1428 bytes:
The following guidelines help to troubleshoot issues that can occur when using ZTP from a wireless router:
• For ZTP to work correctly, ensure that you are using the correct SIM with the correct modem model
(SKU).
• If the default profile APN is not configured correctly, the ZTP process does not work correctly. If ZTP
does not work, issue the show cellular status command to display the error. If an error occurs, configure
the appropriate APN and retry the ZTP process.
• For SKUs that do not have default profile APN configurations, such as Generic (MC7304) and North
America (MC7354) SKUs, if the automatic profile selection does not detect the APN on the SIM card,
configure the profile, including an APN. If the router has a second circuit that has access to Cisco
SD-WAN Manager, add the profile information, including the APN, to the feature configuration template
and then push the device template to the cellular router. Otherwise, configure the profile on the cellular
router from the CLI, including an APN.
• To check whether the router is unable to detect the SIM card, issue the show cellular status command.
Check for the SIM Read error. To correct this problem, insert the SIM card correctly in the router.
• In Release 16.3.0, after you run ZTP on a cellular router, the cellular interface is in a no shutdown state
Because of this, Cisco SD-WAN Manager is unable to push a device configuration template to the router.
To correct this problem, from the CLI on the router, configure the cellular interface state to be in shutdown
state.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Specify a Region and Subregion Cisco IOS XE Catalyst SD-WAN You can specify both a region and
When Deploying a Device Release 17.13.1a a subregion when deploying a
device.
Cisco Catalyst SD-WAN Control
Components Release 20.13.1
Note If you haven't configured these, the Quick Connect workflow directs you to the Administration > Settings
window in Cisco SD-WAN Manager to complete the prerequisite configuration.
Subregions
From Cisco Catalyst SD-WAN Manager Release 20.13.1, you can specify both a region and subregion when
deploying a device.
Note Every time you add new devices to the PnP portal, you need to resync Cisco SD-WAN Manager with the
Smart Account or the Virtual Account for the new devices to appear in Cisco SD-WAN Manager.
After the device information is transferred to Cisco SD-WAN Manager, you can configure Cisco SD-WAN
Manager overlay.
Note For more information about the Cisco PnP portal and its role in onboarding devices for Cisco SD-WAN
Manager, see the following reference documentation:
• Cisco Plug and Play Support Guide for Cisco SD-WAN Products
• Plug n Play Onboarding Workflow
Note For more information about configuring the vEdge routers to join the overlay network automatically, see
Prepare Routers for ZTP.
• You don't want to use the auto sync option, which requires you to sync your Smart Account with Cisco
SD-WAN Manager
• Your Cisco SD-WAN Manager instance is unable to connect with the Cisco PnP portal
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Transfer the device information to Cisco SD-WAN Manager by manually uploading the authorized serial
number file to Cisco SD-WAN Manager. For more information about manually uploading the WAN Edge
router serial numbers, see Upload WAN Edge Router Authorized Serial Number File.
Note For the complete procedure to deploy Cisco Catalyst SD-WAN Device (IOS XE)s using the CLI bootstrap
configuration, see On-Site Bootstrap Process for Cisco SD-WAN Devices.
Note If you upload devices to Cisco SD-WAN Manager the manual upload method, you need to complete the
additional step of deploying them using the CLI bootstrap configuration that the Quick Connect workflow
generates. For more information about generating a bootstrap configuration file that loads to a device, see
On-Site Bootstrap Process for Cisco SD-WAN Devices.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Cisco SD-WAN Manager Cisco IOS XE Catalyst Simplifies adding Cisco SD-WAN Manager
Persona-based Cluster SD-WAN Release 17.6.1a servers to a cluster by identifying servers
Configuration based on personas. A persona defines what
Cisco SD-WAN Release 20.6.1
services run on a server.
Cisco vManage Release 20.6.1
can communicate with remaining nodes through SSH. If two nodes fail, the GUI of an active node on
which a user is already logged in allows read-only operations, but new logins to the GUI are not permitted.
• When logged in using a single sign-on (SSO) user with netadmin privilege, user cannot perform any of
the cluster or disaster recovery operations using the SSO user. For any cluster operations like add, delete
node, or enable SD-AVC, Cisco SD-WAN Manager expects any local username and password part of
the net-admin group. In case of multitenancy, only admin user can update the SD-AVC. Other users even
with netadmin privileges cannot update SD-AVC.
Note From Cisco vManage Release 20.11.1, some alarms display the hostname as localhost during the cluster setup
for the first time as the system-ip/hostname is not configured in Cisco SD-WAN Manager. When the
system-ip/hostname is configured, the alarms display the correct hostname.
Configure the IP Address for Releases Before Cisco vManage Release 20.6.1
Configure the IP address of a Cisco SD-WAN Manager server before you add the server to the cluster. To do
so for releases before Cisco vManage Release 20.6.1, follow these steps:
1. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management and click
Service Configuration.
The Cisco SD-WAN Manager server reboots and displays the Cluster Management window.
Configure the IP Address for Cisco vManage Release 20.6.1 and Later Releases
Configure the IP address of a Cisco SD-WAN Manager server before you add the server to the cluster. To do
so from Cisco vManage Release 20.6.1, perform the following steps.
Perform this procedure on the primary Cisco SD-WAN Manager server (which has the Compute+Data persona).
1. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management.
The Cluster Management window is displayed. The table on this window lists the Cisco SD-WAN
Manager servers that are in the cluster.
2. Click ... adjacent to the Cisco SD-WAN Manager server to configure and click Edit.
The Edit vManage dialog box is displayed.
3. In the Edit vManage dialog box, perform the following actions.
Note You cannot change the persona of a server. So the Node Persona options are disabled.
a. From the vManage IP Address drop-down list, choose an out-of-band static IP address to assign to
the server.
b. In the Username field, enter the user name for logging in to the server.
c. In the Password field, enter the password for logging in to the server.
d. (Optional) Click Enable SD-AVC if you want Cisco Software-Defined Application Visibility and
Control (SD-AVC) to run on the server.
Cisco SD-AVC is a component of Cisco Application Visibility and Control (AVC). It can be enabled
on only one Cisco SD-WAN Manager server. The server on which it is enabled must have the
Compute+Data or the Compute persona. Cisco SD-AVC cannot be enabled on a server that has the
Data persona.
Note If Cisco SD-WAN Manager is set up as a cluster and the cluster crashes as a result of a reboot or upgrade,
the connection to the edge device is reset and the custom app ceases to function.
To resolve this and to resume operation, redefine the custom application name with a new, unique name. For
more information to define custom applications, see the Define Custom Applications Using Cisco Catalyst
SD-WAN Manager chapter of the Cisco Catalyst SD-WAN Policies Configuration Guide.
e. Click Update.
The server reboots and displays the Cluster Management window.
Cisco SD-WAN Manager Cisco IOS XE Catalyst Simplifies adding Cisco SD-WAN Manager
Persona-based Cluster SD-WAN Release 17.6.1a servers to a cluster by identifying servers
Configuration based on personas. A persona defines what
Cisco SD-WAN Release 20.6.1
services run on a server.
Cisco vManage Release 20.6.1
The following sections provide information about adding a Cisco SD-WAN Manager server to a cluster in
various Cisco SD-WAN Manager releases.
Add a Cisco SD-WAN Manager Server to a Cluster for Releases Before Cisco vManage Release 20.6.1
To add a new Cisco SD-WAN Manager server to a cluster for releases before Cisco vManage Release 20.6.1,
perform the following steps on the primary Cisco SD-WAN Manager server.
Before you begin, ensure that the default IP address of the Cisco SD-WAN Manager server has been changed
to an out-of-band IP address as described in Configure the Cluster IP Address of a Cisco Catalyst SD-WAN
Manager Server, on page 239.
1. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management and click
Service Configuration.
2. Click Add Manager.
The Edit Manager window opens.
3. In the Manager IP Address field, select an IP address to assign to the Cisco SD-WAN Manager server.
4. Enter the username and password for logging in to the Cisco SD-WAN Manager server.
5. Enter the IP address of the Cisco SD-WAN Manager server that you are adding to the cluster.
6. Specify the username and password for the new Cisco SD-WAN Manager server.
7. Select the services to be run on the Cisco SD-WAN Manager server. You can select from the services
listed below. Note that the Application Server field is not editable. The Cisco SD-WAN Manager
Application Server is the local Cisco SD-WAN Manager HTTP web server.
• Statistics Database: Stores statistics from all the Cisco Catalyst SD-WAN devices in the network.
• Configuration Database: Stores all the device and feature templates and configurations for all the
Cisco Catalyst SD-WAN devices in the network.
• Messaging Server: Distributes messages and shares state among all the Cisco SD-WAN Manager
cluster members.
8. Click Add.
The Cisco SD-WAN Manager server that you just added reboots before joining the cluster.
Note • In a cluster, we recommend that you run at least three instances of each service.
• When you add the first two compute or compute+data nodes to the cluster, the host node’s
application-server is unavailable. The following message is displayed on the host node’s GUI, before
the application-server shuts down in the host node: \Node added to the cluster. The operation
may take up to 30 minutes and may cause application-server to restart in between. Once
the application server is back online, the post cluster operation progress can be viewed
under tasks pop-up\.
• Starting Cisco IOS XE Catalyst SD-WAN Release 17.12.1a, ensure that you disable the HTTP/HTTPs
Proxy option in the Cisco SD-WAN Manager settings, before adding a node to the cluster.
Add a Cisco SD-WAN Manager Server to a Cluster for Cisco vManage Release 20.6.1 and Later Releases
From Cisco vManage Release 20.6.1, a cluster supports any of the following deployments of nodes:
• Three Compute+Data nodes
• Three Compute+Data nodes and three Data nodes
Note DATA nodes should be added only after 3 node cluster with CONFIG+DATA
is added.
• Three Compute nodes and three Data nodes (supported only in an upgrade from an existing deployment)
Note If the Edit Manager dialog box opens, configure an out-of-band IP address for the server, as described in
Configure the Cluster IP Address of a Cisco Catalyst SD-WAN Manager Server, on page 239, and then repeat
this procedure for adding a server.
Alternatively:
1. From the Cisco SD-WAN Manager menu, choose Administration > Cluster Management and click
Service Configuration.
2. Click ... adjacent to the Cisco SD-WAN Manager server and choose Device Connected.
3. If a device is connected to Cisco SD-WAN Manager from a cluster, ensure that you do not configure the
data stream hostname to the Cisco SD-WAN Manager system IP address. However, you can configure
the management IP address on VPN 512 or the internet public IP address on VPN 0. For information
about data stream troubleshooting tools, see Data Stream Troubleshooting Tools FAQ.
• From Cisco vManage Release 20.6.1, you can change the IP address to another IP address that appears
in the vManage IP Address drop-down list, change the Cisco SD-AVC setting, or change the
username and password if the server credentials have changed.
5. Click Update.
Note • If you do not know the default credentials of the configuration database, contact your Cisco support
representative to retrieve the credentials.
• You cannot use a previous username.
• Passwords can include only a mix of characters A to Z ( upper or lowercase), digits 0 to 9, and special
characters @, #, and *.
Example
• For Cisco SD-WAN Release 20.1.1 and earlier:
request nms configuration-db update-admin-user username neo4j
password ******** newusername myusername newpassword mypassword
• For releases from Cisco SD-WAN Release 20.1.2:
request nms configuration-db update-admin-user
Enter current user name: neo4j
Note After a configuration database admin user update, if you are unable to view a specific Cisco SD-WAN Manager
instance, use the request nms application-server restart command to restart the application server on that
Cisco SD-WAN Manager instance again.
Note Starting from Cisco SD-WAN Release 20.6.1, when using the request nms configuration-db
update-admin-user command to update the admin user credentials, provide the same inputs (old username,
password and the new username, password) across all the nodes in the Cisco SD-WAN Manager cluster. You
must execute the request nms configuration-db update-admin-user command one node at a time. We
recommend that you do not push the CLI to all the nodes at the same time because the NMS services will
restart for the new configuration to take effect.
Note This restriction applies for single Cisco SD-WAN Manager instances and for Cisco SD-WAN Manager
clusters. This restriction is not related to software upgrades or downgrades on network devices.
To downgrade your Cisco SD-WAN Manager version, contact your Cisco support representative.
Cisco SD-WAN Manager Cluster Cisco IOS XE Catalyst SD-WAN This feature outlines the upgrade
Upgrade Release 17.3.1a procedure for Cisco SD-WAN
Manager servers in a cluster.
Cisco SD-WAN Release 20.3.1
Cisco vManage Release 20.3.1
Check for Database Schema Cisco Catalyst SD-WAN Manager Updated the request nms
Violation Release 20.13.1 application-server status
command to indicate whether there
is a schema violation in the
configuration database. You can
check for violations before
upgrading a cluster.
If these prerequisites are not met or if another error occurs during the upgrade the activation of the image fails
and a file named upgrade-context.json is created in the /opt/data/extra-packages/image-version folder on each
node in the cluster. You can provide this file to your Cisco representative for assistance with resolving the
issue.
Note The copy to Cisco SD-WAN Manager can be done using SCP using CLI using the VPN 512 interface.
4. For upgrades from Cisco vManage Release 20.3.1 or later, activate the current image on each Cisco
SD-WAN Manager server using the following command. All servers reboot simultaneously.
Note • Starting from Cisco vManage Release 20.1.1, before upgrading the configuration database, ensure that
you verify the database size. We recommend that the database size is less than or equal to 5 GB. To
verify the database size, use the following diagnostic command:
Enabled: true
Status: not running
Note After activating a new image on a Cisco SD-WAN Manager host server, the server reboots. After the reboot,
for approximately 30 minutes, the output of the request nms configuration-db status command shows
Enabled: false even on a node that has the configuration database enabled, while NMS services are being
migrated to a containerized form.
b. On the node to upgrade, as determined in the previous step, enter the following:
request nms configuration-db upgrade
6. Enter your login credentials, if prompted. Login credentials are prompted in releases earlier than Cisco
vManage Release 20.3.1 if all the Cisco SD-WAN Manager servers establish control connection with
each other. After a successful upgrade, all the configuration database services are UP across the cluster,
and the application server is started.
You can check the database upgrade logs at the following location:
vmanage-server:/var/log/nms/neo4j-upgrade.log.
2. Verify that all the services have stopped. It is normal for the request nms all stop command to display
a message about failing to stop a service if it takes too long. So use the following command to verify
that everything is stopped before proceeding further:
request nms all status
3. Start the Statistics database on each device that is configured to run it. Wait for the service to start each
time before proceeding to the next Cisco SD-WAN Manager device.
4. Verify that the service is started before proceeding to start it on the next Cisco SD-WAN Manager.
After the service starts, perform step 3 to start the Statistics database on the next Cisco SD-WAN
Manager device. After all the Cisco SD-WAN Manager devices have the Statistics database running,
proceed to the next step.
request nms statistics-db status
5. Start the Configuration database on each device that is configured to run it. Wait for the service to start
each time before proceeding to the next Cisco SD-WAN Manager device.
request nms configuration-db start
6. For releases earlier than Cisco vManage Release 20.3.1, verify that the service has started before
proceeding to start it on the next Cisco SD-WAN Manager device. Go to vshell and tail a log file to
look for a message that the database is online. After confirming, go to step 5 to start the Configuration
database on the next Cisco SD-WAN Manager device. After all the Cisco SD-WAN Manager devices
have the Configuration database running, proceed to the next step.
tail -f -n 100 /var/log/nms/vmanage-neo4j-out.log
7. Start the Coordination server on each device. Wait for the service to start each time before proceeding
to the next Cisco SD-WAN Manager device.
request nms coordination-server start
8. Verify that the service is started before proceeding to start it on the next Cisco SD-WAN Manager
device. After verifying, go to step 7 to start the Coordination server on the next Cisco SD-WAN Manager
device. After the Coordination server runs on all the Cisco SD-WAN Manager devices, proceed to the
next step.
request nms coordination-server status
9. Start the Messaging server on each device. Wait for the service to start each time before proceeding to
the next Cisco SD-WAN Manager device.
request nms messaging-server start
10. Verify that the service has started before proceeding to start the service on the next Cisco SD-WAN
Manager device. After verifying, go to step 9 to start the Messaging server on the next Cisco SD-WAN
Manager device. After the Messaging server runs on all the Cisco SD-WAN Manager devices, proceed
to the next step.
request nms messaging-server status
11. Start the Application server on each device. Wait for the service to start each time before proceeding
to the next Cisco SD-WAN Manager device.
request nms application-server start
12. For Cisco vManage Release 20.3.1 and later releases, start the server-proxy service on each Cisco
SD-WAN Manager device:
request nms server-proxy start
To verify that the service is fully started, open the GUI of that Cisco SD-WAN Manager device. After
the GUI is fully loaded and you are able to log in, start the server-proxy service on the next Cisco
SD-WAN Manager device.
13. Restart the NMS cloud services on each device. Wait for the services to start each time before proceeding
to the next Cisco SD-WAN Manager device.
You can verify that the cloud services are running by entering the following commands:
request nms cloud-agent status
request nms cloud-agent-v2 status
Verify that the service has started before proceeding to start it on the next Cisco SD-WAN Manager
device. After verifying, start the cloud services on the next Cisco SD-WAN Manager device. After the
cloud services run on all the Cisco SD-WAN Manager devices, continue to the next step.
14. To verify that there are no errors and everything has loaded cleanly, tail the log files.
If you experience issues when upgrading to Cisco vManage Release 20.6.1 or later, contact your Cisco support
representative for assistance.
Note Consider bringing up the services manually as described in this section whenever you have to reboot a Cisco
SD-WAN Manager device, or after an upgrade.
Starting from Cisco IOS XE Catalyst SD-WAN Release 17.10.1a, a device-data-collector service container
is added. The following is a sample output for the command, request nms device-data-collector.
Device# request nms device-data-collector
Possible completions:
diagnostics Run diagnostics on NMS component
jcmd Run jcmd on NMS component
restart Restart NMS component
start Start NMS component
status Status of NMS component
stop Stop NMS component
From Cisco vManage Release 20.6.1, if a Cisco SD-WAN Manager node is reachable when you remove it
from a cluster, Cisco SD-WAN Manager automatically performs a factory reset operation on the removed
node to ensure that the node does not join the cluster again. If a Cisco SD-WAN Manager node is unreachable
when you remove it from a cluster, a factory reset operation is not performed on the node. In this situation,
the node is added back to the cluster automatically when the node becomes reachable. To prevent the node
from being added back to the cluster, enter the command request software reset from the CLI of the node
after the node is removed from the cluster.
To remove a Cisco SD-WAN Manager node from a cluster, follow these steps:
1. From the Cisco SD-WAN Manager, choose Administration > Cluster Management and click Service
Configuration.
2. Click … adjacent to the Cisco SD-WAN Manager instance that you want to remove and click Remove.
The Remove Manager dialog box opens.
3. Enter the username and password to confirm the removal of the device from the network.
4. Click Remove.
The Cisco SD-WAN Manager instance is removed from the cluster, the certificates for that Cisco SD-WAN
Manager are deleted, and Cisco SD-WAN Manager undergoes a factory reset.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
• Controllers tab—Install certificates and download the device serial numbers to the Cisco SD-WAN
Validator.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers
tab is renamed as the Control Components tab to stay consistent with Cisco
Catalyst SD-WAN rebranding.
• Send to Cisco SD-WAN Validator—Send the controller serial numbers to the Cisco SD-WAN
Validator.
• Install Certificate—Install the signed certificates on the controller devices. This button is available
only if you select Manual in Administration > Settings > Certificate Signing by Symantec.
• Export Root Certificate—Display a copy of the root certificate for the controller devices that you
can download to a file.
• Table of controller devices in the overlay network—To re-arrange the columns, drag the column
title to the desired position.
• Certificate status bar—Located at the bottom of the screen, this bar is available only if you select
Server Automated in Administration > Settings > Certificate Authorization. It displays the states
of the certificate installation process:
• Device Added
• Generate CSR
• Waiting for Certificate
• Send to Controllers
A green check mark indicates that the step has been completed. A grey check mark indicates that the
step has not yet been performed.
• Search box—Includes the Search Options drop-down, for a Contains or Match string.
• Refresh icon—Click to refresh data in the device table with the most current data.
• Export icon—Click to download all data to a file, in CSV format.
• Show Table Fields icon—Click the icon to display or hide columns from the device table. By default,
all columns are displayed.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the Send to Validator button in the Controllers tab. A controller's serial number is sent only once
to the Cisco SD-WAN Validator. If all serial numbers have been sent, when you click Send to Validator,
an error message is displayed. To resend a controller's serial number, you must first select the device and
then select Invalid in the Validity column.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
After the serial numbers have been sent, click the Tasks icon in the Cisco SD-WAN Manager toolbar to
display a log of the file download and other recent activities.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. In the Install Certificate window, select a file, or copy and paste the certificate text.
3. Click Install to install the certificate on the device. The certificate contains information that identifies the
controller, so you do not need to select the device on which to install the certificate.
4. Repeat Steps the steps above to install additional certificates.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. In the Export Root Certificate window, click Download to export the root certificate to a file.
3. Click Close.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the More Actions icon to the right of the row, and click View CSR to view the certificate signing
request (CSR).
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the More Actions icon to the right of the row, and click View Device CSR to view the certificate
signing request (CSR).
For a Cisco IOS XE Catalyst SD-WAN device where trustpoint has been configured, clicking the More
Actions icon allows you to view three options:
• View Device CSR
• Generate Feature CSR
• View Feature CSR
Note Cisco SD-WAN Manager will generate alarms only if device certificate is installed through Cisco SD-WAN
Manager. If you install certificate manually, Cisco SD-WAN Manager will not generate alarms for certificate
expiration.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the More Actions icon to the right of the row and click View Certificate.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
Note Cisco vManage Release 20.9.1 and later releases: Clicking Renew Device CSR resets the RSA private and
public keys, and generates a CSR that uses a new key pair. Cisco SD-WAN Manager also resets RSA private
and public keys before generating a new CSR in Cisco vManage Release 20.6.4 and later Cisco vManage
20.6.x releases.
Cisco SD-WAN Manager releases other than the above-mentioned releases: Clicking Renew Device CSR
generates a CSR using the existing key pair.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the More Actions icon to the right of the row and click Reset RSA.
3. Click OK to confirm resetting of the device's RSA key and to generate a new CSR with new public or
private keys.
Invalidate a Device
1. In the Controllers tab, select a device.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
2. Click the More Actions icon to the right of the row and click Invalidate.
3. Click OK to confirm invalidation of the device.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
3. For the desired device, click ... and choose View Certificate to view the installed certificate.
Certificate Revocation
Table 32: Feature History
Certificate Revocation Cisco IOS XE Catalyst SD-WAN This feature revokes enterprise
Release 17.7.1a certificates from devices based on
a certificate revocation list that
Cisco SD-WAN Release 20.7.1
Cisco SD-WAN Manager obtains
Cisco vManage Release 20.7.1 from a root certificate authority.
Cisco SD-WAN Manager revokes the certificates that are included in a certificate revocation list (CRL) that
Cisco SD-WAN Manager obtains from a root certificate authority (CA).
When you enable the Certificate Revocation feature and provide the URL of the CRL to Cisco SD-WAN
Manager, Cisco SD-WAN Manager polls the root CA at a configured interval, retrieves the CRL, and pushes
the CRL to Cisco IOS XE Catalyst SD-WAN devices, Cisco vEdge devices, Cisco SD-WAN Validators, and
Cisco SD-WAN Controllers in the overlay network. Certificates that are included in the CRL are revoked
from devices.
When certificates are revoked, they are marked as not valid. Device control connections remain up until the
next control connection flap occurs, at which time device control connections are brought down. To bring a
device control connection back up, reinstall a certificate on the device and onboard the device.
When Cisco SD-WAN Manager revokes certificates from devices, the devices are not removed from the
overlay network, but they are prevented from communicating with other devices in the overlay network. A
peer device rejects a connection attempt from a device whose certificate is in the CRL.
Note Starting from Cisco vManage Release 20.11.1, connections through the VPN 512 are supported.
Procedure
1. From the Cisco SD-WAN Manager menu, choose Administration > Settings.
2. In the Administration Settings window, click Edit next to Certificate Revocation List.
The certificate revocation options appear.
3. Click Enabled.
4. In the CRL Server URL field, enter the URL of the CRL that you created on your secure server.
5. In the Retrieval Interval field, enter the interval, in hours, at which Cisco SD-WAN Manager retrieves
the CRL from your secure server and revokes the certificates that the CRL designates.
Enter a value from 1 to 24. The default retrieval interval is 1 hour.
6. Click Save.
Cisco SD-WAN Manager immediately retrieves the CRL and revokes the certificates that the CRL
designates. From then on, Cisco SD-WAN Manager retrieves the CRL according to the retrieval interval
period that you specified.
Configure Third-party CA Cisco IOS XE Catalyst SD-WAN Using Cisco SD-WAN Manager,
Certificates to Cisco IOS XE Release 17.13.1a conveniently upload and push
Catalyst SD-WAN devices using generic third-party CA certificates
Cisco Catalyst SD-WAN Manager
Cisco SD-WAN Manager to Cisco IOS XE Catalyst
Release 20.13.1
SD-WAN devices with a Trustpoint
name. The provisioning is executed
via configuration groups parcel,
with the status readily viewable in
monitoring.
The CA certificates authenticate the server identities and prevent unauthorized access. The Cisco IOS XE
Catalyst SD-WAN devices use CA certificates to establish and manage secure connections with different
servers in a network. When you upload a CA certificate to Cisco SD-WAN Manager, the Cisco IOS XE
Catalyst SD-WAN device uses this certificate information from the configuration group parcels in verifying
and authenticating the connections it establishes with servers across a network, thus improving the overall
security and integrity of your network traffic.
Note The CA certificates isn't suited for SSL-based access with router trusted roots.
Note When you login into Cisco SD-WAN Manager as a provider, you can't upload
and manage CA certificates.
Upload CA Certificates
1. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates.
2. Click the CA Cert tab.
3. Click Add CA Certificate.
4. In the Add CA Certificate pane, enter Certificate Name.
Note Spot the Expiration Date in the Device Group table for your CA certificate and perform more Actions by
clicking the . . . icon.
Delete CA Certificates
1. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates.
2. Click the CA Cert tab.
3. In the Device Group table, select the CA certificate to delete.
4. Click Delete.
Note Alternate method to delete a CA certificate: click the ... icon in the Actions column and click Delete.
Field Description
Field Description
6. Click Save.
7. Deploy the devices associated to the configuration group. For more information, see Deploy Devices.
Note When you modify a certificate from the Device Group table, the changes won't be mirrored on the device.
This is due to the certificate's association with a TrustPoint. To update the certificate, it's necessary to remove
the existing TrustPoint that contains the certificate information. Subsequently, create a new TrustPoint and
add the certificate to it. Finally, deploy the changes to the device for the certificates to take effect.
Deleting certificates from the Certificates tab doesn't automatically delete the associated TrustPoint. To delete
the TrustPoint, you must manually delete and then save the changes to the TrustPoint.
CRL-Based Quarantine
Table 35: Feature History
CRL-Based Quarantine Cisco vManage Release 20.11.1 With this feature you can
quarantine SD-WAN edge devices
based on a certificate revocation list
that Cisco SD-WAN Manager
obtains from a certificate authority.
Note The certificate revocation list (CRL)-based quarantine feature is disabled by default.
• Cisco SD-WAN Manager revokes the certificates that are included in a certificate revocation list (CRL).
Cisco SD-WAN Manager obtains this list from a certificate authority (CA).
• At defined intervals, Cisco SD-WAN Manager polls the CRL server for the latest CRL. On receiving
the list, Cisco SD-WAN Manager analyzes it to determine which SD-WAN edge device is to be
quarantined.
• Cisco SD-WAN Manager checks if the serial numbers of certificates for each valid SD-WAN edge device
in the network match the serial numbers of certificates within the CRL. On finding a match, the certificates
on the SD-WAN edge devices are not removed to enable the SD-WAN edge devices to retain a control
connection to Cisco SD-WAN Manager.
For each Cisco SD-WAN Controller that is quarantined, Cisco SD-WAN Manager generates notifications for
the controller.
Note The CRL server connects to Cisco SD-WAN Manager through VPN 0 or VPN 512.
Note If the CRL is disabled in earlier releases, the CRL remains disabled after upgrading to the Cisco vManage
Release 20.11.1. If the CRL was enabled in a release prior to Cisco vManage Release 20.11.1, then after
upgrading to Cisco vManage Release 20.11.1, the certificate revocation option is enabled with VPN0 as the
default.
Support for Managing Root CA Cisco IOS XE Catalyst SD-WAN This feature enables you to add and
Certificates in Cisco SD-WAN Release 17.4.1a manage root certificate authority
Manager (CA) certificates.
Cisco SD-WAN Release 20.4.1
Cisco vManage Release 20.4.1
Enterprise Certificates
In Cisco IOS XE SD-WAN Release 16.11.1 and Cisco SD-WAN Release 19.1, enterprise certificates were
introduced. Enterprise certificates replace the controller certificates authorization used previously.
Note When using enterprise certificates for Cisco SD-WAN Controllers, ensure that you use root certificates with
an RSA key that is at least 2048 bit.
Note For purposes of certificate management, the term controller is used to collectively refer to Cisco SD-WAN
Manager, the Cisco Catalyst SD-WAN Controller, and the Cisco Catalyst SD-WAN Validator.
Note For more information about enterprise certificates, see the Cisco Catalyst SD-WAN Controller Certificates
and Authorized Serial Number File Prescriptive Deployment Guide.
Use the Certificates page to manage certificates and authenticate WAN edge and controller devices in the
overlay network.
Two components of the Cisco Catalyst SD-WAN solution provide device authentication:
• Signed certificates are used to authenticate devices in the overlay network. Once authenticated, devices
can establish secure sessions between each other. It is from Cisco SD-WAN Manager that you generate
these certificates and install them on the controller devices—Cisco SD-WAN Manager, Cisco SD-WAN
Validators, and Cisco SD-WAN Controllers.
• The WAN edge authorized serial number file contains the serial numbers of all valid vEdge and WAN
routers in your network. You receive this file from Cisco Catalyst SD-WAN, mark each router as valid
or invalid, and then from Cisco SD-WAN Manager, send the file to the controller devices in the network.
Install the certificates and the WAN edge authorized serial number file on the controller devices to allow the
Cisco Catalyst SD-WAN overlay network components to validate and authenticate each other and thus to
allow the overlay network to become operational.
Support for Secondary Cisco IOS XE Catalyst SD-WAN This optional feature allows you to
Organizational Unit Release 17.2.1r configure a secondary
organizational unit when
Cisco SD-WAN Release 20.1.1
configuring the certificates. If
specified, this setting is applied to
all controllers and edge devices.
Support for Subject Alternative Cisco IOS XE Catalyst SD-WAN This feature enables you to
Name (SAN) Release 17.4.1a configure subject altenative name
(SAN) DNS Names or uniform
Cisco SD-WAN Release 20.4.1
resource identifiers (URIs). It
Cisco vManage Release 20.4.1 enables multiple host names and
URIs to use the same SSL
certificate.
Support for Specifying Any Cisco Catalyst SD-WAN Control When configuring controller
Organization for WAN Edge Cloud Components Release 20.11.1 certificate authorization for
Device Enterprise Certificates enterprise certificates on WAN
edge cloud devices, you can specify
any organization in the
Organization field. You are not
limited to names such as Viptela
LLC, vIPtela Inc, or Cisco
Systems. This enables you to use
your organization’s certificate
authority name or a third-party
certificate authority name.
Support for Certificates Without Cisco IOS XE Catalyst SD-WAN Enterprise certificates that you
the Organizational Unit Field Release 17.12.1a install on devices do not require the
Organizational Unit (OU) field to
Cisco Catalyst SD-WAN Control
be defined. Earlier, this field was
Components Release 20.12.1
used as part of the authentication
of a device.
Note In the 16.11/19.1 release, enterprise certificates were introduced. Enterprise certificates replace the controller
certificates authorization that were used previously. An independent organization handles the signing of
enterprise certificates.
Use the Configuration > Certificates page to manage certificates and authenticate WAN edge and controller
devices in the overlay network.
Two components of the Cisco Catalyst SD-WAN solution provide device authentication:
• Signed certificates are used to authenticate devices in the overlay network. Once authenticated, devices
can establish secure sessions between each other. It is from Cisco SD-WAN Manager that you generate
these certificates and install them on the controller devices—Cisco SD-WAN Manager instances, Cisco
SD-WAN Validators, and Cisco SD-WAN Controller.
• WAN edge authorized serial number file contains the serial numbers of all valid vEdge and WAN routers
in your network. You receive this file from Cisco Plug and Play (PnP), mark each router as valid or
invalid, and then from Cisco SD-WAN Manager, send the file to the controller devices in the network.
You must install the certificates and the WAN edge authorized serial number file on the controller devices to
allow the Cisco Catalyst SD-WAN overlay network components to validate and authenticate each other and
thus to allow the overlay network to become operational.
Note For purposes of certificate management, the term controller refers collectively to Cisco SD-WAN Manager,
Cisco SD-WAN Controller, and Cisco SD-WAN Validator.
Once you reset a WAN edge device, you have to install the enterprise root certificate manually on the device.
If you perform an upgrade, your certificate is retained.
Note Cisco SD-WAN Manager supports only Base 64 encoded certificates. Other formats, such as DER, encoded
are not supported.
For example, the PEM extension is used for different types of X.509v3 files that contain ASCII (Base64)
armored data prefixed with a --BEGIN ... line.
3. Click Set CSR Properties if you want to specify custom certificate properties. The following properties
appear:
• Domain Name: Network domain name
• Organizational Unit
Note Organizational Unit is a noneditable field. The organization unit must be the
same as the organization name used in Cisco SD-WAN Manager.
Note For devices using Cisco IOS XE Catalyst SD-WAN Release 17.9.3a or later
releases of Cisco IOS XE Release 17.9.x, or Cisco IOS XE Catalyst SD-WAN
Release 17.12.1a or later, the certificates that you install on the devices do not
require the Organizational Unit field to be defined. However, if a signed certificate
includes the Organizational Unit field, the field must match the organization name
configured on the device. This addresses the policy of the Certification Authority
Browser Forum (CA/Browser Forum), as of September 2022, to stop including
an organizational unit in signed certificates. Despite the change in policy of the
CA/Browser Forum, some certificate authorities might still include an
organizational unit in the signed certificate.
• Secondary Organization Unit: This optional field is only available in Cisco IOS XE Release 17.2
or Cisco SD-WAN Release 20.1.x and onwards. Note that if this optional field is specified, it will
be applied to all controllers and edge devices.
Note If a signed certificate includes the Organizational Unit field or the Secondary
Organizational Unit field, one of these fields must match the organization name
configured on the device. This addresses the policy of the Certification Authority
Browser Forum (CA/Browser Forum), as of September 2022, to stop including
an organizational unit in signed certificates. Despite the change in policy of the
CA/Browser Forum, some certificate authorities might still include an
organizational unit in the signed certificate.
• Organization
• City
• State
• Email
• 2-Letter Country Code
• Subject Altenative Name (SAN) DNS Names: (optional) You can configure multiple host names
to use the same SSL certificate. Example: cisco.com and cisco2.com
• Subject Altenative Name (SAN) URIs: (optional) You can configure multiple uniform resource
identifiers (URIs) to use the same SSL certificate. Example: cisco.com and support.cisco.com
Note The certificates that you install on devices in the Cisco Catalyst SD-WAN overlay
do not require the Organizational Unit field to be defined. However, if a signed
certificate includes the Organizational Unit field, the field must match the
organization name configured on the device.
• Revoke Enterprise Certificate: This option removes the enterprise certificate from the device
and moves it back to prestaging. The device has only Cisco SD-WAN Validator and Cisco SD-WAN
Manager controls up.
For a Cisco IOS XE Catalyst SD-WAN device, click ... and choose an action:
• View Feature CSR:
• Copy the CSR available from the Cisco IOS XE Catalyst SD-WAN device.
• Sign the certificate using the enterprise root certificate from a certifying authority.
• Upload the signed certificate on Cisco SD-WAN Manager using the Install Feature Certificate
operation.
Cisco SD-WAN Manager automatically discovers on which hardware edge the certificate
needs to be installed. After you install feature certificate, the option View Feature Certificate
is available.
• View Feature Certificate: After you install the feature certificate, you can view the feature
certificate and download it.
• Revoke Feature Certificate: This option removes the feature certificate or trustpoint information
from the Cisco IOS XE Catalyst SD-WAN device. After revoking a certificate, all actions against
devices are not available. To view all actions for a device, ensure that you configure logging
information of the device to a Transport Layer Security (TLS) profile with authentication type as
server, and then configure back to mutual. Alternatively, to view the actions, reset Cisco IOS XE
Catalyst SD-WAN device to factory default configuration.
To reset a device to factory default:
• From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
• Create a device template with the factory-default template.
The factory-default template is, Factory_Default_feature-name_Template. See Create a Device
Template from Feature Templates for information about creating a device template with
feature template.
10. Click Install Certificate or Install Feature Certificate to upload the signed certificate.
The certificate must be a signed certificate. Initially, the state is CSR Generated.
The state changes to Certificate Installed when successfully installed.
11. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates. You can see enterprise
certificate columns, including the device type, chassis-id, enterprise serial number, and enterprise
certificate date.
Note In a multi-tenant scenario, if you configure CSR properties manually and if you are using Cisco Catalyst
SD-WAN Control Components Release 20.11.1 or later, then ensure that devices in the network are using
Cisco IOS XE Catalyst SD-WAN Release 17.11.1a or later. In a single-tenant scenario, this is not required.
In a multi-tenant scenario, if you configure CSR properties manually, then when you are ready to generate a
CSR for a tenant device, enter the tenant's organization name in the Secondary Organizational Unit field
described below. In a multi-tenant scenario, if you are generating a CSR for a service provider device, this is
not required.
Note Organizational Unit is a noneditable field. This field is auto-filled with the
organization name that you have configured for Cisco SD-WAN Manager in
Administration > Settings > Organization Name.
• Secondary Organizational Unit: This optional field is only available in Cisco IOS XE Release 17.2
or Cisco SD-WAN Release 20.1.x and onwards. Note that if this optional field is specified, it will
be applied to all controllers and edge devices.
• Organization: Beginning with Cisco vManage Release 20.11.1, when configuring controller certificate
authorization for enterprise certificates on WAN edge cloud devices, you can specify any organization
in this field. You are not limited to names such as Viptela LLC, vIPtela Inc, or Cisco Systems.
This enables you to use your organization’s certificate authority name or a third-party certificate
authority name. The maximum length is 64 characters, and can include spaces and special characters.
Cisco SD-WAN Manager validates the name when you enter it.
• City
• State
• Email
• 2-Letter Country Code
• Subject Altenative Name (SAN) DNS Names: (optional) You can configure multiple host names
to use the same SSL certificate. Example: cisco.com and cisco2.com
• Subject Altenative Name (SAN) URIs: (optional) You can configure multiple uniform resource
identifiers (URIs) to use the same SSL certificate. Example: cisco.com and support.cisco.com
5. Paste an SSL certificate into the Certificate field or click Select a file and navigate to an SSL certificate
file.
6. (Optional) In the Subject Alternative Name (SAN) DNS Names field, you can enter multiple host names
to use the same SSL certificate.
Example: cisco.com and cisco2.com
7. (Optional) In the Subject Alternative Name (SAN) URIs field, you can enter multiple URIs to use the
same SSL certificate.
Example: cisco.com and support.cisco.com
This is helpful for an organization that uses a single certificate for a host name, without using different
subdomains for different parts of the organization.
Note If you need to generate a bootstrap configuration, use the Configuration > Devices page, click …, and choose
Generate Bootstrap Configuration.
Note Beginning with Cisco vManage Release 20.7.1, there is an option available when generating a bootstrap
configuration file for a Cisco vEdge device, enabling you generate two different forms of the bootstrap
configuration file.
• If you are generating a bootstrap configuration file for a Cisco vEdge device that is using Cisco Catalyst
SD-WAN Release 20.4.x or earlier, then check the The version of this device is 20.4.x or earlier check
box.
• If you are generating a bootstrap configuration for a Cisco vEdge device that is using Cisco SD-WAN
Release 20.5.1 or later, then do not use the check box.
Device Support
Use Case: Cisco-Hosted Cloud Overlays with Software Version 19.x and Above
Prerequisites
Cisco SD-WAN Manager and the controllers should all be running the same software version.
On the Configuration > Devices > Controllers page, ensure that the OOB IP address and credentials are
updated for all the controllers.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
You can verify the software version for the new or expired overlays without having control connections using
SSH.
1. SSH to each of the controllers and the version should show during the SSH process.
2. You do not need to actually have the credentials work, therefore you can run this on a controller where
the credentials do not work.
Repeat this process for all the controllers in the overlay to make sure.
3. Customer Smart Account credentials need to be ready using either of the following methods:
a. Email and request the customer contact from PnP trigger notifications to individually email you and
provide the Smart Account credentials.
or
b. Email and request the customer contact to log on to Cisco SD-WAN Manager and add them. Also
ensure that you ask the customer for their IPs tobe added to the allowed list..
Ensure that if asking the customer to provide their customer contact to log on, this step is done after
asking the customer for their IPs to be added to the allowed list, so that they can reach the Cisco
SD-WAN Manager GUI, be be able to log in, and input their Smart Account credentials.
To find your Smart Account credentials, from the Cisco SD-WAN Manager menu, choose
Administration > Settings > Smart Account Credentials .
Enter the user name and password and click Save.
Note Cisco SD-WAN Manager displays an error if the Smart Account credentials are not added. Check the
prerequisites.
4. Set the validity period to 1 year for POCs, 2 years for production overlays in the drop-down.
5. Set Certificate Retrieve Interval to 1 minute and press Save.
Note Currently there is no customer email field to notify customers about approval because the certificates are
auto-approved as soon as the CSR request is done.
6. From this step onwards, the process is the same as for the Symantec/Digicert controllers in the Cisco
SD-WAN Manager GUI.
From the Cisco SD-WAN Manager menu, choose Configuration > Certificates and click Controllers.
Click … and choose Generate CSR.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
The operation status shows the CSR sent for signing, the certificate signed and installed automatically
without needing human intervention.
7. The certificates are installed automatically. If successful, the Configuration > Certificates > Controllers
page shows the following:
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
8. Ensure that the control connections have come up to the controllers on the Cisco SD-WAN Manager
dashboard.
Use Case: Migration of an Active Existing Overlay from Digicert to Cisco PKI
Controller Certificates During Certificate Renewal
Prerequisites
Cisco SD-WAN Manager, controllers, and vEdges should all have their control connections up.
Ensure OOB IP address and credentials are updated in Configuration > Devices > Controllers.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
Migrate an Active Existing Overlay from Digicert to Cisco PKI Controller Certificates
1. In Cisco SD-WAN Manager, verify that the control connections to controllers and Cisco vEdge devices
are up.
If the control connections are not up, migrating from Digicert to Cisco PKI cannot proceed.
If the control connections are only partially up, that is some Cisco vEdge devices are control down, then
those Cisco vEdge devices will not be able to automatically reconnect to the controllers if their control
comes up after the certificates have been moved to Cisco PKI.
If it is a case of expired certificates and control connections are down, then certificates need to be renewed
on Digicert first and control connections need to be brought up before migrating them to the Cisco PKI
controller certificates.
2. Verify that the software version of the controllers is 19.x or later.
How to Verify the Software Version for the Active Existing Overlays (with Valid Control Connections
to Controllers) Using Cisco SD-WAN Manager
a. From the Cisco SD-WAN Manager menu, choose Maintenance > Software Upgrade.
b. Click Manager and check the Current Version column. Verify that it is 19.x or later.
If the control connections are up and Cisco SD-WAN Manager and controller versions are not 19.x
or later, then upgrade them first (Cisco vEdge devices need not be upgraded) before migration to
Cisco PKI can be done.
Note It is mandatory that controllers upgraded to 19.x should immediately have their certificates renewed with
Cisco PKI as part of the upgrade; they cannot be allowed to run with the existing Symantec certificates even
if those certificates are going to remain valid.
c. After verifying the prerequisites, check that the Cisco PKI root-CA has been propagated to all the
controllers and the Cisco vEdge devices. This requires SSH access to the controllers.
1. SSH into the Cisco SD-WAN Manager and controllers and run the following command: show
certificate root-ca-cert | include Cisco.
If the output is blank or does not show the result, escalate to the cloud infrastructure team.
d. Customer Smart Account credentials need to be ready by either of the following methods:
1. Email and request the customer contact from a PnP trigger notification to individually email you
and provide the Smart Account credentials.
or
2. Email and request your customer contact to log on to the Cisco SD-WAN Manager themselves
and add them. Also ensure that you ask for the customer IPs to be added to the allowed list.
Ensure that if asking the customer to provide, this step is done after asking the customer for their
IPs to be added to the allowed list, so that they can reach the Cisco SD-WAN Manager GUI, be
able to log on, and input the Smart Account Credentials.
To view the Smart Account credentials, from the Cisco SD-WAN Manager menu, choose
Administration > Settings and see the Smart Account Credentials section.
3. Enter the username and password and click Save.
Once all the prerequisites have been satisfied, follow the Runbook to Request and Install Cisco
PKI Certificates procedure to request CSRs and get the Cisco certificates installed. Verify that
all the control connections to the controllers and the Cisco vEdge devices have come back up. If
not, then escalate to the cloud infrastructure team.
Note Cisco SD-WAN Manager displays an error if the Smart Account credentials are not added. Check the
prerequisites.
4. Set the validity period to 1 year for POCs, 2 years for production overlays in the drop-down.
5. Set Certificate Retrieve Interval to 1 minute and press Save.
Note Currently there is no customer email field to notify customers about approval because the certificates are
auto-approved as soon as the CSR request is done.
6. From this step onwards, the process is the same as for the Symantec/Digicert controllers in the Cisco
SD-WAN Manager GUI.
From the Cisco SD-WAN Manager menu, choose Configuration > Certificates and click Controllers
. Click … and choose Generate CSR.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
The operation status shows the CSR sent for signing, the certificate signed and installed automatically
without requiring intervention.
7. The certificates are installed automatically. If successful, the Configuration > Certificates > Controllers
page shows the following:
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
8. Ensure that the control connections have come up to the controllers on the Cisco SD-WAN Manager
dashboard.
9. Set the Certificate Retrieve Interval to 1 minute.
10. Click Sync Root Certificate to migrate the Cisco vEdge devices or Cisco IOS XE Catalyst SD-WAN
devices in Cisco SD-WAN Manager to Cisco pki. This support available from 19.2.1 version or later.
Prerequisites
The prerequisites are the same in the above cases, except that you use the manual method for installing the
certificates.
Runbook
1. From the Cisco SD-WAN Manager menu, choose Administration > Settings. In the Controller Certificate
Authorization section, verify that it is set to Manual.
2. Generate the CSRs for the controllers.
From the Cisco SD-WAN Manager menu, choose Configuration > Certificates and click Controllers.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, The Controllers tab is renamed as Control
Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
Note Cisco Catalyst SD-WAN supports SAN DNS names, from Cisco IOS XE SD-WAN release 16.11 and Cisco
SD-WAN release 19.1.
11. Optionally, in the Subject Alternative Name (SAN) URIs field, enter the URIs of resources to which
the certificate trust should be extended. If you enter more than one URI, separate each URI with a space
or a comma.
Enter each URI in scheme:value format, where scheme is the protocol for accessing the resource and
value is the resource. For example, https://example.example.com or
scp://example.example.com.
Note Cisco Catalyst SD-WAN supports SAN URIs beginning with Cisco IOS XE SD-WAN release 16.11 and
Cisco SD-WAN release 19.1.
In a standard overlay network, Cisco Catalyst SD-WAN edge devices initiate direct connections to the Cisco
SD-WAN Controllers (Cisco SD-WAN Manager and Cisco SD-WAN Controllers) and exchange control
plane information over these connections. The WAN edge devices are typically located in branch sites and
connect to the Cisco SD-WAN Controllers over the internet. As a result, Cisco SD-WAN Manager and Cisco
SD-WAN Controllers are also connected directly to the internet.
For security, or other reasons, you may not want the Cisco SD-WAN Controllers to have direct internet
connections. In such a scenario, you can deploy a reverse proxy between the Cisco SD-WAN Controllers and
the WAN edge devices. The reverse proxy acts as an intermediary to pass control traffic between the Cisco
SD-WAN Controllers and the WAN edge devices. Instead of communicating directly with Cisco SD-WAN
Manager and the Cisco SD-WAN Controllers, the WAN edge devices communicate with the reverse proxy,
and the reverse proxy relays the traffic to and from Cisco SD-WAN Manager and Cisco SD-WAN Controllers.
The following figure illustrates a reverse proxy deployed between a WAN edge device and Cisco SD-WAN
Manager and the Cisco SD-WAN Controllers.
You can deploy a reverse proxy in both single-tenant and multi-tenant Cisco Catalyst SD-WAN deployments.
The TLOC communicates with the reverse proxy on its public IP address and port, regardless of public or
private TLOC.
On the reverse proxy you must provision a certificate that is signed by the CA that has signed the certificate
of the Cisco SD-WAN Controllers. This certificate is used by the reverse proxy to verify the WAN edge
devices.
To generate a Certificate Signing Request (CSR) for the reverse proxy and have it signed by Cisco, do as
follows:
1. Run the following command on the reverse proxy:
proxy$ openssl req -new -days 365 -newkey rsa:2048 -nodes -keyout Proxy.key -out Proxy.csr
Property Description
Country Name (2 letter Any country code.
code)
Example: US
Organizational Unit Name Use the “organization” name configured on the overlay.
Example: cisco-sdwan-12345
Note Starting from Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, the Controllers tab is renamed as the
Control Components tab to stay consistent with Cisco Catalyst SD-WAN rebranding.
3. For the desired Cisco SD-WAN Manager instance or Cisco SD-WAN Controller, click … and click Add
Reverse Proxy.
The Add Reverse Proxy dialog box appears.
4. To map a private IP address and port number to a proxy IP address and port number, do as follows:
a. Click Add Reverse Proxy.
b. Enter the following details:
Private IP The private IP address is the IP address of the transport interface in VPN 0.
Private Port This is the port used to establish the connections that handle control and traffic
in the overlay network. The default port number is 12346.
Proxy IP Proxy IP address to which private IP address must be mapped.
Proxy Port Proxy port to which the private port must be mapped.
c. If the Cisco SD-WAN Manager instance or Cisco SD-WAN Controller has multiple cores, repeat
Step 4 a and Step 4 b for each core.
5. To delete a private IP address-port number to proxy IP address-port number mapping, find the mapping
and click the trash icon.
6. To save the reverse proxy settings, click Add.
To discard the settings, click Cancel.
7. In the Security feature template attached to the Cisco SD-WAN Manager instance or Cisco SD-WAN
Controller, choose TLS as the transport protocol.
After you configure reverse proxy settings on a Cisco SD-WAN Manager instance or a Cisco SD-WAN
Controller, WAN edge devices in the overlay network are provisioned with a certificate for authentication
with the reverse proxy.
1. When a reverse proxy is deployed, Cisco Catalyst SD-WAN Validator shares the details of the reverse
proxy with the WAN edge devices.
2. On learning about the reverse proxy, a WAN edge device initiates the installation of a signed certificate
from Cisco SD-WAN Manager.
3. After the certificate is installed, the WAN edge device uses the certificate for authentication with the
reverse proxy and connects to the reverse proxy.
Note Before you disable reverse proxy, delete any private IP address-port number to proxy IP address-port number
mappings that you have configured for Cisco SD-WAN Manager instances and Cisco SD-WAN Controller.
See Configure Reverse Proxy Settings on Cisco Catalyst SD-WAN Controllers for information about deleting
the mappings.
1. From the Cisco SD-WAN Manager menu, choose Administration > Settings.
2. For the Reverse Proxy setting, click Edit.
3. For Enable Reverse Proxy, click Disabled.
4. Click Save.
Monitor Private and Proxy IP Addresses of Cisco SD-WAN Controllers and WAN Edge Devices
1. From the Cisco SD-WAN Manager menu, choose Monitor > Devices.
Cisco vManage Release 20.6.x and earlier: From the Cisco SD-WAN Manager menu, choose Monitor >
Network.
2. Click on the hostname of a Cisco SD-WAN Manager instance, Cisco SD-WAN Controller, or a WAN
edge device.
3. In the left pane, click Real Time.
4. From the Device Options drop-down list, choose Control Connections.
In the table that appears, the entries in the Private IP and Private Port columns are the private IP address
and port number of the transport interface in VPN 0. The entries in the Public IP and Public Port columns
are the proxy IP address and port number.
vsmart1#
Example: View Mapping of SD-WAN Controller Private IP Address and Port Number to Proxy IP
Address and Port Number on Cisco Catalyst SD-WAN Validator
The following is a sample output from the execution of the show orchestrator reverse-proxy-mapping
command on a Cisco SD-WAN Validator. In the command output, the entries in the PROXY IP and PROXY
PORT columns are the proxy IP address and port number. The entries in the PRIVATE IP and PRIVATE
PORT columns are the private IP address and port number of the transport interface in VPN 0.
vbond# show orchestrator reverse-proxy-mapping
PRIVATE PROXY
-----------------------------------------------------------------------------
vbond#
Example: View Mapping of SD-WAN Controller Private IP Address and Port Number to Proxy IP
Address and Port Number on a WAN Edge Device
The following is a sample output from the execution of the show sdwan control connections
command on a Cisco IOS XE Catalyst SD-WAN device. In the command output, check the entry in the
PROXY column for a Cisco SD-WAN Manager instance or a Cisco SD-WAN Controller. If the entry is Yes,
the entries in the PEER PUBLIC IP and PEER PUBLIC PORT are the proxy IP address and port number.
Device# show sdwan control connections
PEER PEER
CONTROLLER
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Device#
On a Cisco vEdge device, you can obtain a similar output by executing the command show control connections.
Example: View Signed Certificate Installed on a WAN Edge Device for Authentication with Reverse
Proxy
The following is a sample output from the execution of the show sdwan certificate reverse-proxy command
on a Cisco IOS XE Catalyst SD-WAN device.
Device# show sdwan certificate reverse-proxy
------------------
Certificate:
Data:
Version: 1 (0x0)
Validity
Modulus:
00:e2:45:49:53:3a:56:d4:b8:70:59:90:01:fb:b1:
44:e3:73:17:97:a3:e9:b7:55:44:d4:2d:dd:13:4a:
a8:ef:78:14:9d:bd:b5:69:de:c9:31:29:bd:8e:57:
09:f2:02:f8:3d:1d:1e:cb:a3:2e:94:c7:2e:61:ea:
e9:94:3b:28:8d:f7:06:12:56:f3:24:56:8c:4a:e7:
01:b1:2b:1b:cd:85:4f:8d:34:78:78:a1:26:17:2b:
a5:1b:2a:b6:dd:50:51:f8:2b:13:93:cd:a6:fd:f8:
71:95:c4:db:fc:a7:83:05:23:68:61:15:05:cc:aa:
60:af:09:ef:3e:ce:70:4d:dd:50:84:3c:9a:57:ce:
cb:15:84:3e:cd:b2:b6:30:ab:86:68:17:94:fa:9c:
1a:ab:28:96:68:8c:ef:c8:f7:00:8a:7a:01:ca:58:
84:b0:87:af:9a:f6:13:0f:aa:42:db:8b:cc:6e:ba:
c8:c1:48:d2:f4:d8:08:b1:b5:15:ca:36:80:98:47:
32:3a:df:54:35:fe:75:32:23:9f:b5:ed:65:41:99:
50:b9:0f:7a:a2:10:59:12:d8:3e:45:78:cb:dc:2a:
95:f2:72:02:1a:a6:75:06:87:52:4d:01:17:f2:62:
8c:40:ad:29:e4:75:17:04:65:a9:b9:6a:dd:30:95:
34:9b
99:40:af:23:bb:cf:7d:59:e9:a5:83:78:37:02:76:83:79:02:
b3:5c:56:e8:c3:aa:fc:78:ef:07:23:f8:14:19:9c:a4:5d:88:
07:4d:6e:b8:0d:b5:af:fa:5c:f9:55:d0:60:94:d9:24:99:5e:
33:06:83:03:c3:73:c1:38:48:45:ba:6a:35:e6:e1:51:0e:92:
c3:a2:4a:a2:e1:2b:da:cd:0c:c3:17:ef:35:52:e1:6a:23:20:
af:99:95:a2:cb:99:a7:94:03:f3:78:99:bc:76:a3:0f:de:04:
7d:35:e1:dc:4d:47:79:f4:c8:4c:19:df:80:4c:4f:15:ab:f1:
61:a2:78:7a:2b:6e:98:f6:7b:8f:d6:55:44:16:79:e3:cd:51:
0e:27:fc:e6:4c:ff:bb:8f:2d:b0:ee:ed:98:63:e9:c9:cf:5f:
d7:b1:dd:7b:19:32:22:94:77:d5:bc:51:85:65:f3:e0:93:c7:
3c:79:fc:34:c7:9f:40:dc:b1:fc:6c:e5:3d:af:2d:77:b7:c3:
88:b3:89:7c:a6:1f:56:35:3b:35:66:0c:c8:05:b5:28:0b:98:
19:c7:b0:8e:dc:b7:3f:9d:c1:bb:69:f0:7d:20:95:b5:d1:f0:
06:35:b7:c4:64:ba:c4:95:31:4a:97:03:0f:04:54:6d:cb:50:
2f:31:02:59
Device#
On a Cisco vEdge device, you can obtain a similar output by executing the command show certificate
reverse-proxy.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Cisco DNA Software subscriptions for Cisco Catalyst SD-WAN gives the flexibility to consume the latest
technology, either on the Cloud or On-Premises across the entire routing stack. Cisco DNA Software
subscriptions provide customers with four key benefits:
• Investment protection of software purchases through software-services-enabled license portability
• Software suites that address typical customer use-case scenarios at an attractive price
• Flexible licensing models to smoothly distribute your software spending over time
• Access to new technology from Cisco
Cisco DNA licenses offer both portability and flexibility to move from cloud management (Cisco SD-WAN
Manager) to on-premises management (Cisco DNA Center) and across hardware platforms.
For information about Cisco DNA Software subscriptions, including a comparison of subscription types, see
Cisco DNA Software for SD-WAN and Routing.
• Restrictions for Cisco Catalyst SD-WAN Licensing, on page 296
• Configure Cisco Catalyst SD-WAN Licensing, on page 296
• Verifying Call Home Configuration, on page 298
• Cisco CSR1000V, Cisco Catalyst 8000V, and Cisco Integrated Services Virtual Router (ISRv) devices
operating with a throughput of more than 250 Mbps require Cisco Smart Licensing, as described in this
section.
Note The Pay-As-You-Grow (PAYG) license has throughput of upto 20 Mbps only.
You can purchase Cisco Catalyst SD-WAN licenses by placing a sales order. For more information, contact
your Cisco sales team.
Configure Licensing for Cisco CSR1000V, Cisco Catalyst 8000V, and Cisco ISRv Routers
For virtual routers such as the Cisco CSR1000V, Cisco Catalyst 8000V, and Cisco Integrated Services Virtual
Router (ISRv), if you want more than 250 Mbps throughput, perform one of the following configurations to
configure the call-home profile and then perform the other steps to configure a Smart License.
Default Configuration
For platforms other than the Cisco Catalyst 8000V, the following call-home configuration is a part of the
default configuration. This minimal configuration is applicable for direct cloud access either using the Smart
Call Home Transport Gateway or using the HTTPS proxy, where the device reaches out to the cloud-hosted
Cisco SSM service. You can verify whether this configuration is applied by executing the show running-config
all command.
call-home
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
For Cisco Catalyst 8000V platforms, the following call-home configuration is part of the default configuration:
smart license url default
license smart transport smart
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
Note For detailed information about call-home profile for Cisco CSR1000V and Cisco ISRv devices, see Configuring
Call Home Profile for Cisco CSR1000V.
Note For information about restoring Smart Licensing when a device switches from autonomous to controller mode
and back to autonomous mode again, see Restore Smart Licensing and Smart License Reservation.
Allow-Service
If you configure call-home to use a service-side interface, and not VPN0, for connectivity to the Cisco Smart
Licensing portal, you do not need to configure allow-service.
If you use VPN0 for connectivity to the Cisco Smart Licensing portal, configure allow-service as follows:
allow-service http
Periodic configuration info message is scheduled every 17 day of the month at 14:07
Periodic inventory info message is scheduled every 17 day of the month at 13:52
Alert-group Severity
------------------------ ------------
crash debugging
inventory normal
Syslog-Pattern Severity
------------------------ ------------
.* major
Data Privacy:
Sending Hostname: yes
Callhome hostname privacy: DISABLED
Smart Licensing hostname privacy: DISABLED
Version privacy: DISABLED
Transport:
Type: Callhome
Registration:
Status: UNREGISTERED
Export-Controlled Functionality: NOT ALLOWED
License Authorization:
Status: No Licenses in Use
Note the throughput level of 250000 kb/s when the license is in the Unregistered state.
Utility:
Status: DISABLED
Data Privacy:
Sending Hostname: yes
Callhome hostname privacy: DISABLED
Smart Licensing hostname privacy: DISABLED
Version privacy: DISABLED
Transport:
Type: Callhome
Registration:
Status: REGISTERED
Smart Account: InternalTestDemoAccount8.cisco.com
Virtual Account: RTP-CSR-DT-Prod
Export-Controlled Functionality: ALLOWED
Initial Registration: SUCCEEDED on May 19 04:49:46 2020 UTC
Last Renewal Attempt: None
Next Renewal Attempt: Nov 15 04:49:45 2020 UTC
Registration Expires: May 19 04:44:44 2021 UTC
License Authorization:
Status: AUTHORIZED on May 19 04:49:49 2020 UTC
Last Communication Attempt: SUCCEEDED on May 19 04:49:49 2020 UTC
Next Communication Attempt: Jun 18 04:49:49 2020 UTC
Communication Deadline: Aug 17 04:44:48 2020 UTC
Note that the Throughput level is 200000000 kb/s after the license enters the Registered state.
Utility:
Status: DISABLED
Data Privacy:
Sending Hostname: yes
Callhome hostname privacy: DISABLED
Smart Licensing hostname privacy: DISABLED
Version privacy: DISABLED
Transport:
Type: Callhome
Registration:
Status: REGISTERING - REGISTRATION IN PROGRESS
Export-Controlled Functionality: NOT ALLOWED
Initial Registration: FAILED on May 19 04:40:14 2020 UTC
Failure reason: Fail to send out Call Home HTTP message.
Next Registration Attempt: May 19 04:46:34 2020 UTC
License Authorization:
Status: No Licenses in Use
Miscellaneus:
Custom Id: <empty>
Note If the configuration fails, to begin with, check the reachability of the Cisco SSM portal from the device,
whether you are out of licenses, and whether your token and account is valid.
For an On-Prem or a Satellite CSSM where a manual or periodic sync updates the license information to the
cloud, the destination address http CLI must point to the corresponding Satellite CSSM service.
License Management Cisco IOS XE Catalyst Cisco Catalyst SD-WAN operates together with Cisco Smart
for Smart Licensing SD-WAN Release Software Manager (Cisco SSM) to provide license
Using Policy, Using 17.5.1a management through Cisco SD-WAN Manager. Cisco
Cisco SD-WAN SD-WAN Manager shows available DNA licenses, assigns
Cisco vManage
Manager licenses to devices, and reports license consumption to Cisco
Release 20.5.1
SSM.
Support for License Cisco IOS XE Catalyst With this feature, you can manage Cisco Catalyst SD-WAN
Management Offline SD-WAN Release licenses through a Cisco SD-WAN Manager instance that
Mode and Compliance 17.6.1a is not connected to the internet. To synchronize license and
Alarms compliance information between Cisco SD-WAN Manager
Cisco vManage
and Cisco SSM, you must periodically download
Release 20.6.1
synchronization files from Cisco SD-WAN Manager and
upload the files to Cisco SSM.
This feature also introduces compliance alarms that alert
you if devices in the Cisco Catalyst SD-WAN network are
not yet licensed.
Support for Postpaid Cisco IOS XE Catalyst For postpaid Managed Services License Agreement (MSLA)
MSLA License Billing SD-WAN Release program licenses, Cisco Catalyst SD-WAN supports two
Models 17.8.1a distinct billing models for licenses—committed (MSLA-C)
and uncommitted (MSLA-U). The procedure for assigning
Cisco vManage
a postpaid license enables you to choose one of these two
Release 20.8.1
MSLA license types.
Support for License Cisco IOS XE Catalyst If you configure Cisco SD-WAN Manager to use a proxy
Management Using a SD-WAN Release server for internet access, Cisco SD-WAN Manager uses
Proxy Server 17.9.1a the proxy server to connect to Cisco SSM or an on-prem
SSM.
Cisco vManage
Release 20.9.1
Support for Managing Cisco IOS XE Catalyst Cisco SD-WAN Manager supports management of device
Licenses Using Cisco SD-WAN Release licenses, using a Cisco SSM on-prem license server. This
Smart Software 17.9.1a is useful for organizations that use Cisco SSM on-prem to
Manager On-Prem accommodate a strict security policy that does not permit
Cisco vManage
devices to communicate with Cisco SSM over a direct
Release 20.9.1
internet connection.
Supported Licenses
Cisco SD-WAN Manager supports a subset of the license entitlements by default. The license entitlement
types include the following:
• Pre-paid
• A la carte: These entitlements are delievered based on orders in Cisco Commerce Workspace (CCW).
• Enterprise agreement (EA): These entitlements are delivered by reporting on the EA workspace.
• Post-paid
• MSLA-U: These entitlements are delievered based on orders in CCW.
• MSLA-C: These entitlements are delievered based on orders in CCW.
For information about Smart Licensing Using Policy, see Smart Licensing Using Policy for Cisco Enterprise
Routing Platforms.
For information about Managed Service License Agreements, see MSLA on Cisco Sales Connect.
Supported Entitlements
A license may include more than one entitlement. Each entitlement included with a license provides a specific
functionality, such as routing features or a specific traffic throughput. The applicability of these entitlements
on a particular device depends on the Cisco IOS XE software release operating on the device, and on the
operation mode of the device, which can be autonomous or controller mode.
Your organization's Smart Account shows the entitlements included in each associated license.
Cisco SD-WAN Manager manages the following types of entitlements.
• DNA entitlements (for example, DNA Routing Advantage Tier 1)
• High Security (HSEC)
Other entitlements may appear in the Smart Account, but are not managed by Cisco SD-WAN Manager.
Examples may include network stack entitlements, IP Base, App, Sec, Perf, Boost, DNA Essentials for
SDWAN, and DNA Advantage for SDWAN.
Note DNA Essentials for SDWAN (SDWAN-DNA-E) and DNA Advantage for SDWAN (SDWAN-DNA-A) are
considered obsolete entitlement types and are not managed by Cisco SD-WAN Manager.
Supported Devices
License management using Cisco SD-WAN Manager supports Cisco IOS XE Catalyst SD-WAN devices and
Cisco vEdge devices.
For each of these modes, you can assign licenses to device in Cisco SD-WAN Manager in the same way.
Multitenancy
Cisco Catalyst SD-WAN infrastructure can support multiple organizations, which share the resources of Cisco
SD-WAN Controllers, while operating independently of one another. This arrangement is called multitenancy.
It enables a service provider to support multiple customers using the same Cisco SD-WAN Controllers, and
enables the service provider to manage the tenants using Cisco SD-WAN Manager. Cisco Catalyst SD-WAN
isolates each tenant’s data to ensure that each tenant has access only to the resources relevant to their
organization. The service provider can use Cisco SD-WAN Manager to view all resources, and each tenant
can separately log in to Cisco SD-WAN Manager to view their own resources. For more information about
multitenancy, see Cisco SD-WAN Multitenancy in the Cisco Catalyst SD-WAN Systems and Interfaces
Configuration Guide, Cisco IOS XE Release 17.x.
When using Cisco Catalyst SD-WAN with multitenancy, the service provider chooses the mode of
synchronizing license information with a Cisco license server: online mode, offline mode, or on-prem mode.
When you choose on-prem mode, the Cisco SSM on-prem license server stores the license information for
the licenses that Cisco SD-WAN Manager manages. This includes the licenses that each tenant has chosen to
manage. When a tenant configures a Cisco Smart Account and chooses licenses to manage in Cisco SD-WAN
Manager, Cisco SD-WAN Manager sends a request to the Cisco SSM on-prem license server to retrieve the
relevant license information from Cisco SSM. Cisco SD-WAN Manager receives the license information from
the Cisco SSM on-prem license server and makes the licenses available for the tenant to use.
Offline mode provides the ability to keep Cisco SD-WAN Manager license management in synchronization
with the Cisco SSM server when the Cisco SD-WAN Manager server is not connected to the internet. This
is accomplished through the following steps:
1. In Cisco SSM, generate a license summary file containing the details of all available license entitlements.
2. Upload the license summary file into Cisco SD-WAN Manager.
Note Even before uploading a license summary file into Cisco SD-WAN Manager, you can use Cisco SD-WAN
Manager to assign default entitlements to devices in the network. These assignments are reconciled with the
available entitlements after the license summary file is uploaded to Cisco SD-WAN Manager.
3. In Cisco SD-WAN Manager, periodically generate a license report to upload to Cisco SSM, indicating
license assignment.
4. Receive an acknowledgement file from Cisco SSM after uploading the license report.
5. Upload the acknowledgement file into Cisco SD-WAN Manager.
Figure 30: Upload and Receive Acknowledgement Files From Cisco SD-WAN Manager and Cisco SSM
By default, Cisco SD-WAN Manager requires this synchronization within an interval of 90 days. If you do
not complete this synchronization within that period, an alert appears in the License Management dashboard.
Some licenses might require synchronization more frequently:
• Prepaid licenses: A report is required every three months.
• Postpaid licenses: A report is required each month.
Failover
In a high availability scenario with more than one Cisco SD-WAN Manager instance, the Cisco SD-WAN
Manager instances keep their license information synchronized. If one of the instances fails, the redundant
Cisco SD-WAN Manager instance continues to perform license management operations using the previously
synchronized license information.
Assigning Licenses to Devices Before Providing Smart Account Details to Cisco SD-WAN Manager
The recommended workflow for using offline mode is the following:
1. Enable offline mode in Cisco SD-WAN Manager.
See Enable Offline Mode.
2. Provide your Smart Account details to Cisco SD-WAN Manager.
See Generate a Cisco SSM License Summary File and Upload It into Cisco SD-WAN Manager.
3. In Cisco SD-WAN Manager, assign licenses to devices.
4. Periodically, generate a usage report file in Cisco SD-WAN Manager to upload to Cisco SSM. This report
provides information about the licenses that you have assigned in Cisco SD-WAN Manager.
See Generate a Usage Report File in Cisco SD-WAN Manager and Synchronize with Cisco SSM.
In some scenarios, such as during a trial period, you can delay the step of providing Smart Account details to
Cisco SD-WAN Manager, and begin assigning licenses to devices. When you generate the usage report file
for the first time and upload it to Cisco SSM, Cisco SSM prompts you to select the relevant virtual account.
For information about using a proxy server, see Configure HTTP/HTTPS Proxy Server in the Cisco SD-WAN
Systems and Interfaces Configuration Guide, Cisco IOS XE Release 17.x.
Figure 32: Cisco Catalyst SD-WAN Manager Using a Cisco SSM On-Prem License Server
When operating in on-prem mode, Cisco SD-WAN Manager synchronizes license information with the Cisco
SSM on-prem license server every 24 hours. During this synchronization, Cisco SD-WAN Manager receives
any updates to available licenses and it sends license usage reports to the Cisco SSM on-prem license server.
You can synchronize licenses at any time—see Synchronize Licenses, on page 318.
For information about configuring the frequency of synchronization between the Cisco SSM on-prem license
server and Cisco SSM, see the documentation for Cisco SSM on-prem. The Cisco Smart Software Manager
On-Prem Data Sheet provides a link to the Cisco SSM on-prem software on the Cisco Software Download
site. The product documentation is available through the Cisco Software Download site.
Both of these methods address the need to transfer license information between Cisco SSM and Cisco SD-WAN
Manager. Wherever it is possible to use the on-prem mode, this mode provides the significant benefit of
reducing the maintenance overhead of transferring files manually between Cisco SD-WAN Manager and
Cisco SSM, as is necessary for offline mode.
For information about configuring user permissions, see Role-Based Access Control in the Cisco Catalyst
SD-WAN Systems and Interfaces Configuration Guide, Cisco IOS XE Release 17.x.
Verify Cisco Catalyst SD-WAN Manager Connectivity to the Cisco IoT Control Center
1. From the Cisco SD-WAN Manager menu, choose Monitor > Overview.
2. In the Summary area, click Manager. A dialog box opens and displays the Cisco SD-WAN Manager
instances.
3. For each Cisco SD-WAN Manager instance, perform the following steps:
a. Click … and choose SSH Terminal.
b. Log in using your Cisco SD-WAN Manager credentials.
c. Use the nslookup command to verify connectivity to a domain over VPN 0. Here, you have to verify
Cisco SD-WAN Manager 's connectivity to the domain sdo.jasper.com.
If the output shows external IP addresses, it confirms that Cisco SD-WAN Manager has connectivity
to the domain. If the output indicates that the command cannot resolve the domain, it indicates that
Cisco SD-WAN Manager does not have connectivity to the domain.
The following is an example indicating connectivity to a domain:
Device#nslookup vpn 0 sdo.jasper.com
nslookup in VPN 0:
Server: 10.1.0.1
Address 1: 10.1.0.1 dns.google
Name: sdo.jasper.com
Address 1: 10.1.0.2 apmx-prod1-vip.jasper.com
Note If a device appears in the device list but is not currently intended for use, it is not
necessary to assign a license.
• Virtual accounts:
Ensure that the licenses in Cisco SSM that you are managing with Cisco SD-WAN Manager are organized
into virtual accounts (VA).
• License details that do not appear in Cisco SD-WAN Manager:
When assigning licenses to devices, have Cisco SSM available to view license details that do not appear
in Cisco SD-WAN Manager.
• Isolated networks:
License management by Cisco SD-WAN Manager does not support isolated networks.
Note From Cisco vManage Release 20.9.1, Cisco SD-WAN Manager supports installing
HSEC licenses, and we recommend using Cisco SD-WAN Manager to install
these licenses. (See Manage HSEC Licenses.) If you are using an earlier release
of Cisco SD-WAN Manager, and if you are installing an HSEC license on a
device manually, the following scenario may occur. If (a) the device transport
mode is CSLU mode instead of Smart mode, and (b) the device is connected
directly to Cisco SSM, the HSEC license installation may fail. As a workaround,
push the device template to the device again, which can restore the device transport
mode to Smart mode, enabling installation of the HSEC license.
Note This step describes the most common case, which is managing licenses in Online mode. For other modes, the
details of this step differ.
After you provide credentials, Cisco SD-WAN Manager connects to the Smart Account and receives the
information about available licenses in the account. After you begin using Cisco SD-WAN Manager for
license management, Cisco SD-WAN Manager reports license assignments back to Cisco SSM to keep
license details synchronized between Cisco SD-WAN Manager and Cisco SSM.
See Enter Smart Account Credentials in Cisco Catalyst SD-WAN Manager, on page 317.
4. In Cisco SD-WAN Manager, select the Virtual Accounts to use, within the Smart Account.
Cisco SD-WAN Manager downloads the details of available licenses in the selected Virtual Accounts.
There are options to manage only prepaid licenses, only postpaid licenses, or both, in the selected Virtual
Accounts.
Note Configuring Cisco SD-WAN Manager to manage compatible licenses requires confirmation before proceeding.
Note In Cisco vManage Release 20.8.x and earlier, to configure the license reporting mode, from the Cisco SD-WAN
Manager menu, choose Administration > License Management. Click Sync Licenses & Refresh Devices
and choose a license reporting mode. Then continue with the procedure for synchronizing licenses, Synchronize
Licenses, on page 318.
Note Changing the mode causes Cisco SD-WAN Manager to permanently clear any license information that it is
currently storing.
• Online
• Offline
• On-prem
Enter the following information for the Cisco SSM on-prem server:
Field Description
3. Click Save.
Verify Cisco Catalyst SD-WAN Manager Connectivity to the Cisco SSM Server
Before You Begin
• Ensure that Cisco SD-WAN Manager has connectivity to the internet through VPN 0.
• In a multitenant scenario, only the provider has access to Cisco SD-WAN Manager. In this scenario, the
provider performs this procedure.
• apx.cisco.com
• swapi.cisco.com
If the output shows external IP addresses, it confirms that Cisco SD-WAN Manager has connectivity
to the domain. If the output indicates that the command cannot resolve the domain, it indicates that
Cisco SD-WAN Manager does not have connectivity to the domain.
The following is an example indicating connectivity to each domain:
Device#nslookup vpn 0 apx.cisco.com
nslookup in VPN 0:
Server: 10.1.0.1
Address 1: 10.1.0.1 dns.google
Name: apx.cisco.com
Address 1: 10.1.0.2 apmx-prod1-vip.cisco.com
Name: swapi.cisco.com
Address 1: 10.2.0.1 swapi.cisco.com
Address 2: 1234:5678:90ab::1 swapi.cisco.com
Field Description
5. Click Save.
Cisco SD-WAN Manager authenticates the Smart Account credentials, and on successful authentication,
saves the credentials in the database.
Synchronize Licenses
Before You Begin
• Use this procedure if the reporting mode is online or on-prem. For offline mode, see Configure Offline
Mode.
• You use this procedure to specify Smart Account and Virtual Account information, or synchronize
licenses on-demand, which is useful if you have recently added licenses to your Smart Account and want
to bring those licenses into Cisco SD-WAN Manager.
• Ensure licenses belong to the correct Smart Accounts or Virtual Accounts on Cisco SSM.
When the selected Smart Accounts and Virtual Accounts are registered with Cisco SD-WAN Manager,
Cisco SD-WAN Manager fetches and synchronizes the license information with Cisco SSM, and reports
usage of the licenses in these accounts.
Synchronize Licenses, Cisco Catalyst SD-WAN Manager Release 20.13.1 and Later
1. From the Cisco SD-WAN Manager menu, choose Administration > License Management.
2. Click Sync Licenses & Refresh Devices.
The Sync Licenses & Refresh Devices pane opens.
The Reporting mode field shows the current reporting mode. To change the reporting mode, open
Administration > Settings > License Reporting. For additional information, see Configure the License
Reporting Mode, on page 315.
3. In the Sync Licenses & Refresh Devices pane, configure the following:
Note If these details are already configured, you can skip this step and proceed to the next step to synchronize
licenses again. This is useful if you have recently added licenses to your Smart Account and want to bring
those licenses into Cisco SD-WAN Manager.
Item Description
Select Smart/Virtual Accounts to Fetch/Sync Select the Smart Accounts or Virtual Accounts for
Licenses which Cisco SD-WAN Manager must fetch licenses
from the Cisco SSM. Cisco SD-WAN Manager also
reports license usage for the licenses in these
accounts.
Note Selecting an Smart Account
automatically selects all the Virtual
Accounts under the Smart Account.
4. Click Sync.
Note If these details are already configured, you can skip this step and proceed to the next step to synchronize
licenses again. This is useful if you have recently added licenses to your Smart Account and want to bring
those licenses into Cisco SD-WAN Manager.
Item Description
Select Smart/Virtual Accounts to Fetch/Sync Select the Smart Accounts or Virtual Accounts for
Licenses which Cisco SD-WAN Manager must fetch licenses
from the Cisco SSM. Cisco SD-WAN Manager also
reports license usage for the licenses in these
accounts.
Note Selecting an Smart Account
automatically selects all the Virtual
Accounts under the Smart Account.
Advanced > Type of Licenses Choose the type of licenses that must be fetched by
Cisco SD-WAN Manager from among the license
types that may belong to the selected Smart
Accounts and Virtual Accounts.
Select one of the following:
• Prepaid
• Postpaid
• Mixed (both Prepaid and Postpaid)
4. Click Sync.
Type of licenses Choose the type of licenses that must be fetched by Cisco SD-WAN Manager
from among the license types that belong to the selected Smart Accounts and
Virtual Accounts.
Select one of the following:
• Prepaid
• Postpaid
Postpaid > Choose MSLA-U for MSLA licenses using the uncommitted billing model. Only
MSLA Type this MSLA type is supported.
License To use a new template, enter a unique name for the template.
Template Name
To use an existing template, do the following:
a. Turn on the Use existing license template toggle.
b. Choose an existing template.
Note The template preview shows the smart account name, virtual
account name, subscription ID, and license name.
Virtual Account Choose the virtual account from which you wish to assign a license to the device.
License Choose a license or licenses to apply to the device. If you have enabled Multiple
Entitlements in the Sync Licenses & Refresh Devices dialog box, you can assign
up to three licenses to the device.
Note • Select a license that belongs to the Virtual Account you have
selected. On Cisco SSM, you can check the licenses that are
available in a Virtual Account.
• Check the device license applicability matrix in the Cisco DNA
Software for SD-WAN and Routing Ordering Guide to ensure
that you assign a license that is applicable to the device.
Different device models support different throughputs.
If you apply an incompatible license, the license may have no
effect on device behavior. However, Cisco SD-WAN Manager
records the consumption of the license.
• When assigning licenses, Cisco SD-WAN Manager shows the
throughput entitlement levels as tiers. Select the tier that
matches the license you have purchased. If you purchased a
license with a throughput expressed as a throughput value, find
the tier that corresponds to the throughput that the license
provides.
For details about the throughput levels of various tiers, see the
Cisco DNA Software for SD-WAN and Routing Ordering
Guide.
The list includes the predefined licenses that Cisco SD-WAN Manager provides,
together with the licenses in the virtual account that you have chosen, that meet
the MSLA type and subscription ID criteria.
• In Cisco vManage Release 20.7.x and earlier, the following options appear:
Are you using Check this check box if you wish to apply an MSLA license. By default, the
utility-based check box is unchecked.
licensing
(MSLA)?
Template Name To use a new template, enter a unique name for the template.
To use an existing template, do the following:
a. Turn on the Use existing template toggle.
b. Choose an existing template.
Virtual Account Choose the virtual account from which you wish to assign a license to the device.
License Choose license to apply to the device. If you have enabled Multiple Entitlements
in the Sync Licenses & Refresh Devices dialog box, you can assign up to three
licenses to the device.
Note • Select a license that belongs to the Virtual Account you have
selected. On Cisco SSM, you can check the licenses that are
available in a Virtual Account.
• Check the device license applicability matrix in the Cisco
DNA Software for SD-WAN and Routing Ordering Guide
to ensure that you assign a license that is applicable to the
device. Different device models support different throughputs.
If you apply an incompatible license, the license may have
no effect on device behavior. However, Cisco SD-WAN
Manager records the consumption of the license.
• When assigning licenses, Cisco SD-WAN Manager shows
the throughput entitlement levels as tiers. Select the tier that
matches the license you have purchased. If you purchased a
license with a throughput expressed as a throughput value,
find the tier that corresponds to the throughput that the license
provides.
For details about the throughput levels of various tiers, see
the Cisco DNA Software for SD-WAN and Routing Ordering
Guide.
Subscription ID Choose the subscription ID to be used to track the license consumption. The
subscription ID field is displayed only for the following conditions:
• if mode is postpaid.
• if mode is mixed and MSLA is true and if there are any subscriptions
available.
• In Cisco vManage Release 20.8.1 and later, the following options appear:
Template To use a new template, enter a unique name for the template.
Name
To use an existing template, do the following:
a. Turn on the Use existing template toggle.
b. Choose an existing template.
Virtual Choose the virtual account from which you wish to assign a license to the device.
Account
MSLA Type Choose MSLA-U for MSLA licenses using the uncommitted billing model. Only
this MSLA type is supported.
License Choose a license or licenses to apply to the device. If you have enabled Multiple
Entitlements in the Sync Licenses & Refresh Devices dialog box, you can assign
up to three licenses to the device.
Note • Select a license that belongs to the Virtual Account you have
selected. On Cisco SSM, you can check the licenses that are
available in a Virtual Account.
• Check the device license applicability matrix in the Cisco DNA
Software for SD-WAN and Routing Ordering Guide to ensure
that you assign a license that is applicable to the device. Different
device models support different throughputs.
If you apply an incompatible license, the license may have no
effect on device behavior. However, Cisco SD-WAN Manager
records the consumption of the license.
• When assigning licenses, Cisco SD-WAN Manager shows the
throughput entitlement levels as tiers. Select the tier that matches
the license you have purchased. If you purchased a license with
a throughput expressed as a throughput value, find the tier that
corresponds to the throughput that the license provides.
For details about the throughput levels of various tiers, see the
Cisco DNA Software for SD-WAN and Routing Ordering Guide.
The list includes the predefined licenses that Cisco SD-WAN Manager provides,
together with the licenses in the virtual account that you have chosen, that meet
the MSLA type and subscription ID criteria.
• In Cisco vManage Release 20.7.x and earlier, the following options appear:
Are you using Check this check box if you wish to apply an MSLA license. By default, the
utility-based check box is unchecked.
licensing
(MSLA)?
Template Name To use a new template, enter a unique name for the template.
To use an existing template, do the following:
a. Turn on the Use existing template toggle.
b. Choose an existing template.
Virtual Account Choose the virtual account from which you wish to assign a license to the device.
License Choose license to apply to the device. If you have enabled Multiple Entitlements
in the Sync Licenses & Refresh Devices dialog box, you can assign up to three
licenses to the device.
Note • Select a license that belongs to the Virtual Account you have
selected. On Cisco SSM, you can check the licenses that are
available in a Virtual Account.
• Check the device license applicability matrix in the Cisco
DNA Software for SD-WAN and Routing Ordering Guide
to ensure that you assign a license that is applicable to the
device. Different device models support different throughputs.
If you apply an incompatible license, the license may have
no effect on device behavior. However, Cisco SD-WAN
Manager records the consumption of the license.
• When assigning licenses, Cisco SD-WAN Manager shows
the throughput entitlement levels as tiers. Select the tier that
matches the license you have purchased. If you purchased a
license with a throughput expressed as a throughput value,
find the tier that corresponds to the throughput that the license
provides.
For details about the throughput levels of various tiers, see
the Cisco DNA Software for SD-WAN and Routing Ordering
Guide.
Subscription ID Choose the subscription ID to be used to track the license consumption. The
subscription ID field is displayed only for the following conditions:
• if mode is postpaid.
• if mode is mixed and MSLA is true and if there are any subscriptions
available.
6. Click Save.
The license is assigned and you are returned to License Management > Device tab. In the table listing the
devices, entries are made in the following columns in accordance with the license assignment:
• Template Name: name of the template used to assign the license
• Virtual Account: name of Virtual Account to which license belongs
• MSLA:
• True for an MSLA license
• False for an a la carte or EA license
Note Starting with Cisco Catalyst SD-WAN Manager Release 20.13.1, Mixed mode
is not supported.
• Subscription ID: The subscription ID used for billing purposes in case of a postpaid license. For a prepaid
license, this column has a blank entry.
Note Changing the mode from online to offline, or from offline to online causes Cisco SD-WAN Manager to
permanently clear any license information that it is currently storing.
Note If you are configuring offline mode for the first time, we recommend uploading a license summary file. See
Generate a Cisco SSM License Summary File and Upload It into Cisco Catalyst SD-WAN Manager.
Generate a Cisco SSM License Summary File and Upload It into Cisco Catalyst SD-WAN Manager
Generating a license summary file in Cisco SSM and uploading the file to Cisco SD-WAN Manager brings
all of the license information from your Cisco smart account into Cisco SD-WAN Manager.
1.
Note Generating a license summary file in the Cisco SSM portal is outside the scope of Cisco Catalyst SD-WAN
documentation and is subject to change.
2. Locate the option for downloading a synchronization file for device controllers. Specify Cisco SD-WAN
Manager as the controller type, and include all virtual accounts.
3. Download the license summary file, which is in tar.gz format.
4. From the Cisco SD-WAN Manager menu, choose Administration > License Management.
5. Click Overview.
6. Click Sync Licenses & Refresh Devices.
7. Click the Offline option.
8. In the Attach License File area, click the option to upload a file. Browse to the license summary file and
upload it.
9. Click Sync.
Generate a Usage Report File in Cisco Catalyst SD-WAN Manager and Synchronize with Cisco SSM
When managing licenses with Cisco SD-WAN Manager in the offline mode, use manually generated files to
enable Cisco SD-WAN Manager to provide information about license assignment to Cisco SSM.
To generate a usage report file in Cisco SD-WAN Manager, upload it to Cisco SSM, receive an
acknowledgement file from Cisco SSM, and upload the acknowledgement file to Cisco SD-WAN Manager,
perform the following steps.
1. From the Cisco SD-WAN Manager menu, choose Administration > License Management.
2. Click Reporting.
3. In the table, in the row with the Cisco Smart Account, click … and choose Generate Report to generate
the usage report file.
When you generate a report, the Cisco Catalyst SD-WAN Controller starts a 48-hour timer. If you do not
upload an acknowledgement file from Cisco SSM within that time, an alert appears in the License
Management Overview dashboard.
4. In Cisco SSM, upload the usage report file.
Note The details of procedures in the Cisco SSM portal are outside the scope of this documentation and subject to
change.
Note In a scenario where you have not yet generated a license summary in Cisco SSM and uploaded it to Cisco
SD-WAN Manager, Cisco SSM prompts you to select a virtual account. After you have generated a license
summary in Cisco SSM and uploaded it to Cisco SD-WAN Manager, Cisco SD-WAN Manager has the virtual
account information that it needs to associate licenses with the correct virtual account.
For information about the scenario of assigning licenses to devices before providing Smart Account details
to Cisco SD-WAN Manager, see Information About Offline Mode
.
5. From the Cisco SD-WAN Manager menu, choose Administration > License Management.
6. Click Reporting.
7. In the table, in the row with the Cisco Smart Account, click … and choose Upload Ack to upload the
acknowledgement file from Cisco SSM.
Top 5 licenses Lists the top 5 licenses in use and shows the usage percentage for each license.
License Usage vs The dashlet features a bar chart with stacked columns.
Availability
The chart uses two stacked columns for each of the three license packages
Advantage, Essentials, and Premier.
For each package, the column on the left represents the count of used licenses;
the column on the right represents the count of available licenses.
The stacked segments in each column represent a particular license tier (such as
Tier 0 or Tier 1). The segment for each tier is of a different color, as identified in
the legend.
License and Devices This section provides the following details for each license assigned:
Overview
• Name (for example, Routing DNA Essentials: Tier 0)
• Number of Licensed Devices: Number of devices to which this license is
assigned.
• Number of Total Licenses: Sum of the number of licenses assigned and
number of licenses available.
• Last Assigned On: Date and time when the license was most recently
assigned.
Troubleshooting-General
The following is general troubleshooting information for managing licenses using Cisco SD-WAN Manager.
Problem
When you enter Smart Account credentials, Cisco SD-WAN Manager displays an error saying, “Failed to
authenticate Smart Account credentials.”
Possible Causes
Incorrect Smart Account credentials
Solutions
Verify that you have entered the Smart Account credentials correctly on the Administration > License
Management page, using the Sync Licenses & Refresh Devices button.
Problem
When you enter Smart Account credentials on the Administration > License Management page, using the
Sync Licenses & Refresh Devices button, Cisco SD-WAN Manager displays an error saying that the Cisco
Smart Account server is unreachable.
Possible Causes
• Problem with connectivity between Cisco SD-WAN Manager and the Cisco SSM on-prem license server
• Problem with Cisco SSM on-prem license server operation
• Incorrect credentials for the Cisco SSM on-prem license server
• Incorrect credentials for the Smart Account
Solutions
1. Verify that Cisco SD-WAN Manager has connectivity to the Cisco SSM on-prem server.
2. Verify that the Cisco SSM on-prem license server is operational.
3. If you have administration permissions, verify that you have entered the correct credentials for the Cisco
SSM on-prem license server on the Administration > Settings page, in the License Reporting section.
4. Verify that you have entered the Smart Account credentials correctly on the Administration > License
Management page, using the Sync Licenses & Refresh Devices button.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Manage HSEC Cisco IOS XE Catalyst This feature enables you to install high security (HSEC)
Licenses SD-WAN Release licenses on devices managed by Cisco SD-WAN Manager.
17.9.2a An HSEC license is required to enable devices to support
encrypted traffic throughput of 250 Mbps or higher.
Cisco vManage
Release 20.9.2
• Synchronizing license information between Cisco SSM and Cisco SD-WAN Manager requires one of
the following:
• Online method: Internet access for Cisco SD-WAN Manager.
Cisco SD-WAN Manager must be able to connect to Cisco SSM.
• Offline method: Access to your Cisco SSM account through an internet-connected web browser.
Installing HSEC Cisco SD-WAN Manager does not query devices to determine whether they have an
licenses using Cisco HSEC license installed. If you install an HSEC license on a device without using Cisco
SD-WAN Manager SD-WAN Manager, then Cisco SD-WAN Manager does not account for that license,
and continues to list the device as eligible for an HSEC license. If you use Cisco
SD-WAN Manager to install the same HSEC license that has already been installed
outside of Cisco SD-WAN Manager, there is no change to the license. If you use Cisco
SD-WAN Manager to install a different HSEC license on the device, the device will
have two HSEC licenses installed.
You can use the show license authorization command on a device to check whether
the device has an HSEC license installed.
Uninstalling an Cisco SD-WAN Manager does not support uninstalling an HSEC license from a device.
HSEC license If you need to do this to release the license for use elsewhere, contact Cisco TAC for
assistance. If you uninstall the HSEC license from a device with assistance from TAC,
Cisco SD-WAN Manager will not be able to correctly report the HSEC license status
for the device.
Restriction Description
Generic HSEC The introduction of Cisco Digital Network Architecture (Cisco DNA) licensing changed
entitlement tag how entitlement tags work for HSEC licenses. Instead of tagging licenses according
to a router model (for example, ISR_4331_Hsec), HSEC licenses are generic, tagged
as DNA_HSEC.
Note This change does not apply to the Cisco Catalyst 8000V.
For devices using Cisco IOS XE Release 17.6.1a or later, use an HSEC license with
a generic DNA_HSEC entitlement tag rather than a license tagged according to the
router model. However, if you have an HSEC license tagged according to a specific
router model, you can use one of the following workarounds to use the license with
Cisco IOS XE Release 17.6.1a or later or to convert the license:
• Option 1: Install a smart license authorization code (SLAC) for a device-specific
HSEC license in offline mode. To do this, use the procedures described in the
following sections of Smart Licensing Using Policy for Cisco Enterprise Routing
Platforms:
Generating and Downloading SLAC from CSSM to a File
Installing a File on the Product Instance
• Option 2: Convert a device-specific HSEC license to a DNA_HSEC license, as
follows:
1. Order a DNA-HSEC-UPGD= license, at no charge, from the Cisco Commerce
Workspace.
2. Convert the device-specific HSEC license to a DNA_HSEC license, using
the Converting a Device-Specific HSECK9 License procedure described in
Smart Licensing Using Policy for Cisco Enterprise Routing Platforms.
3. Install a SLAC on the device to enable you to use the DNA_HSEC license.
• Option 3: Downgrade the device to a release earlier than Cisco IOS XE Release
17.6.1a, install the HSEC license, then upgrade the Cisco IOS XE software to a
later release. The router continues to use the installed HSEC license.
Note If an HSEC-compatible device already has an HSEC license installed by Cisco SD-WAN Manager, then the
device is not selectable.
9. Review the summary and then click Assign to begin the synchronization. Cisco SD-WAN Manager
loads the requested licenses from Cisco SSM and assigns them to the devices.
10. The process of loading and assigning licenses may take several minutes. You can monitor the progress
by viewing the Cisco SD-WAN Manager task list.
11. After the HSEC licenses have been loaded and assigned, to install them, use the Install HSEC Licenses,
on page 339 procedure.
Note The details of procedures in the Cisco SSM portal are outside the scope of this documentation and subject to
change.
a. Upload the file that you downloaded from Cisco SD-WAN Manager. The procedure is identical to
uploading a usage report file, as described in License Management Offline Mode.
b. Download the Acknowledgement file.
This file contains the HSEC licenses required for the devices that you selected.
14. From the Cisco SD-WAN Manager menu, choose Workflows > Workflow Library.
15. Click the Sync and Install HSEC Devices workflow.
16. Click Sync Licenses and then click Next.
17. Click Offline and then click Next.
18. On the HSEC Device Activation Overview page, click Next.
19. Click Upload Process and then click Next.
20. On the Upload Smart License Authorization Code File page, upload the acknowledgement file that
you downloaded from Cisco SSM.
21. Click Summary.
The process of loading and assigning licenses may take several minutes. You can monitor the progress
by viewing the Cisco SD-WAN Manager task list.
After the HSEC licenses have been loaded and assigned, to install them, use the Install HSEC Licenses, on
page 339 procedure.
Column Description
Possible Cause
The following scenario may cause Cisco SSM to have two licenses assigned to a device:
1. You have have installed a PID-specific HSEC license on a device using Cisco IOS XE Catalyst SD-WAN
Release 17.6.x or earlier.
2. You upgrade the device to use Cisco IOS XE Catalyst SD-WAN Release 17.9.1a or later.
3. You perform a license synchronization using Cisco SD-WAN Manager.
Solution
Reload the device. When the device restarts, confirm that it is using only the Cisco DNA software subscription
HSEC license.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Cisco Catalyst SD-WAN Support Cisco IOS XE Catalyst SD-WAN Starting from this release, Cisco
for the Cisco ASR 1006-X Platform Release 17.5.1a Catalyst SD-WAN supports the
with an RP3 Module Cisco ASR 1006-X platform with
Cisco vManage Release 20.5.1
a Cisco ASR 1000 Series Route
Processor 3 module installed.
Note Cisco Catalyst SD-WAN supports this configuration only when the Cisco ASR 1006-X and RP3 module are
ordered as a unit for operation with Cisco Catalyst SD-WAN.
Hardware Configuration
The Cisco ASR 1006-X operates with Cisco Catalyst SD-WAN in the following configuration.
CC0 Cisco ASR1000-MIP100 carrier card + 1 or 2 EPA cards in the subslots of the carrier
Note See below for supported EPA cards.
When using only one EPA card in the carrier, you can place the EPA
card in either subslot.
CC1 Cisco ASR1000-MIP100 carrier card + 1 or 2 EPA cards in the subslots of the carrier
Note See below for supported EPA cards.
When using only one EPA card in the carrier, you can place the EPA
card in either subslot.
For information about installing the ASR1000-MIP100 carrier card and EPA cards, see the Cisco ASR 1000
Series Modular Interface Processor Hardware Installation Guide.
• The RP3 module requires ROM monitor (ROMmon) software version 16.9(5r) or later.
Onboarding Workflow
1. Verify that the Cisco ASR 1006-X meets the requirements described in Hardware Configuration and ROM
Monitor Software Version.
2. Follow the Plug and Play onboard procedures described in the Cisco Plug and Play Support Guide for
Cisco SD-WAN Products.
3. Follow the Cisco Catalyst SD-WAN onboarding procedure described in Plug and Play Onboarding
Workflow.
Note In tables listing devices, Cisco SD-WAN Manager does not distinguish between the Cisco ASR 1006-X
chassis and the RP3 module installed in the chassis. A single row in the table shows the combined information
for both.
1. (Perform this step only if you have applied a feature template to the current device (which is now faulty),
and if you want to save the existing configuration to use it on the replacement device.)
Save the device settings file for the RP3 module.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. Click … for the template that is attached to the Cisco ASR 1006-X containing the RP3 module, and
choose Export CSV to download the device settings CSV file.
2. In the Cisco Plug and Play (PnP) Connect web portal, remove the current Cisco ASR 1006-X chassis.
Note The PnP Connect web portal is linked to Cisco commerce workspace (CCW), facilitating automatic registration
of the serial numbers and PIDs of purchased devices in the PnP Connect web portal. For more information
see the Cisco Plug and Play Support Guide for Cisco SD-WAN Products, and the RMA topic in the Cisco
Network Plug and Play Connect Capability Overview.
Note The functionality of the PnP Connect web portal is subject to change, and is outside the scope of this document.
For additional details, see the PnP Connect web portal documentation.
In the PnP Connect web portal, use Devices > Delete Selected Device, or the equivalent, to remove the
current Cisco ASR 1006-X chassis.
3. In the Cisco Plug and Play (PnP) Connect web portal, add the replacement Cisco ASR 1006-X chassis.
a. In the PnP Connect web portal, choose Devices > Add Device, or the equivalent, and select the
option to enter new device details.
b. Enter the serial number for the replacement Cisco ASR 1006-X chassis.
Note You can use the show pnp version command on the Cisco ASR 1006-X router to display the serial number.
c. Add the SUDI serial number and certificate serial number of the RP3 module.
Note If the RP3 module is mounted in a working chassis, you can use the show sdwan certificate serial command
to display these serial numbers.
4. Remove the entry for the current Cisco ASR 1006-X chassis in Cisco SD-WAN Manager.
a. In Cisco SD-WAN Manager, detach the current device template from the current Cisco ASR 1006-X
chassis.
b. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates.
c. In the row with the current Cisco ASR 1006-X, in the Validate column, click Invalid, and OK.
5. From the Cisco SD-WAN Manager menu, choose Configuration > Devices and click Sync Smart
Account.
Cisco SD-WAN Manager loads the details of the replacement Cisco ASR 1006-X chassis from your
Smart Account.
6. If you saved a CSV file in an earlier step, edit the file to update it with the device ID of the replacement
chassis.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Devices > WAN Edge List.
b. Copy device ID of the new chassis from the Chassis Number column in the device list.
c. Open the CSV file in a text editor or spreadsheet application, and edit the csv-deviceId value in the
first column, updating it to use the device ID of the new chassis.
7. Attach a device template to the replacement Cisco ASR 1006-X. Use the same device template that was
used for previous chassis. If you saved a CSV file in an earlier step, use it in the substeps that follow.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. In the row of the template that was previously attached to the current chassis, click More Actions
(…) and choose Attach Devices.
d. In the Available Devices pane, select the replacement chassis and move it to the Selected Devices
pane.
e. Click Attach. The Configuration Templates page opens.
f. If you saved a CSV file in an earlier step, click the up arrow button to upload a CSV file.
g. If you saved a CSV file in an earlier step, in the Upload CSV File pop-up window, select the CSV
file edited in a previous step, and click Upload. The values stored in the CSV file are copied to the
device template.
h. Click Next.
i. Click Configure Devices to push the device template to the replacement Cisco ASR 1006-X chassis.
The task status shows this task as Scheduled because the replacement device is not yet reachable.
b. In the row of the Cisco ASR 1006-X, click More Options (…) and choose Generate Bootstrap
Configuration.
c. In the pop-up window, click the Cloud-Init radio button.
d. Click Download to download the configuration file.
e. Rename the downloaded file to: ciscosdwan.cfg
9. Copy the bootstrap file (ciscosdwan.cfg) created in an earlier step, to a USB flash drive, and plug this
into the current RP3 module.
10. If the current Cisco ASR 1006-X chassis is still operating, power it down.
11. Remove the modules and cards (RP3 module, ESP200 module, MIP100 carrier cards, EPA cards) from
the current Cisco ASR 1006-X chassis.
12. Connect the USB flash drive, which has the configuration file saved in an earlier step, to the RP3 module.
13. Install the modules and cards in the new Cisco ASR 1006-X chassis.
For information about RP3 module installation, see the Cisco ASR 1000 Route Processor 3 Installation
and Configuration Guide.
For information about MIP100 and EPA installation, see the Cisco ASR 1000 MIP and EPA Hardware
Installation Guide.
14. Power up the replacement Cisco ASR 1006-X router.
15. After the router is powered up, execute the controller-mode reset command on the router to reset the
RP3 module.
When the RP3 module starts, the following occurs:
• The RP3 module loads the configuration from the ciscosdwan.cfg file on the USB flash drive.
• The RP3 module boots up in controller mode.
Note From Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, controller mode is not
supported.
• When the connection to the controller is established, the controller pushes the device template,
which was in Scheduled state, to the RP3 module.
Prerequisites
• The Cisco ASR 1006-X with an RP3 module (which is now faulty) has been onboarded in Cisco SD-WAN
Manager.
Note In tables listing devices, Cisco SD-WAN Manager does not distinguish between the Cisco ASR 1006-X
chassis and the RP3 module installed in the chassis. A single row in the table shows the combined information
for both.
1. (Perform this step only if you have applied a feature template to the current device (which is now faulty),
and if you want to save the existing configuration to use it on the replacement device.)
Save the device settings file for the RP3 module.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
b. Click Device Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. Click More Options (…) for the template that is attached to the Cisco ASR 1006-X containing the
RP3 module, and choose Export CSV to download the device settings CSV file.
3. In the Cisco Plug and Play (PnP) Connect web portal, update the SUDI serial number and certificate serial
number within the Cisco ASR 1006-X entry, to use the serial numbers of the replacement RP3 module.
Note The PnP Connect web portal is linked to Cisco commerce workspace (CCW), facilitating automatic registration
of the serial numbers and PIDs of purchased devices in the PnP Connect web portal. For more information
see the Cisco Plug and Play Support Guide for Cisco Catalyst SD-WAN Products, and the RMA topic in the
Cisco Network Plug and Play Connect Capability Overview.
Note The functionality of the PnP Connect web portal is subject to change, and is outside the scope of this document.
For additional details, see the PnP Connect web portal documentation.
a. In the PnP Connect web portal, choose Devices > Edit Device and select the Cisco ASR 1006-X entry
for the device that contains the RP3 module that is being replaced.
b. In the Cisco ASR 1006-X entry, delete the SUDI serial number and certificate serial number of any
existing RP3 module entries (there may be more than one).
c. Add the SUDI serial number and certificate serial number for the replacement RP3 module.
d. Save the update.
4. In Cisco SD-WAN Manager, remove the current RP3 module and add the replacement RP3 module.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Certificates.
b. In the row with the Cisco ASR 1006-X device containing the RP3 module, in the Validate column,
click Invalid, and OK.
The task view indicates when the process is complete.
c. Click Send to Controllers.
d. From the Cisco SD-WAN Manager menu, choose Configuration > Devices.
e. In the row with the Cisco ASR 1006-X device containing the RP3 module, click More Options (…)
and choose Delete WAN Edge.
f. From the Cisco SD-WAN Manager menu, choose Configuration > Devices and click Sync Smart
Account.
Cisco SD-WAN Manager loads the details of the replacement RP3 module. At this point, before you
have physically replaced the RP3 module, the device table shows the following in the row of the Cisco
ASR 1006-X device:
• Device Model: ASR1006-X
• Chassis Number: No change to the chassis number
• Serial No./Token: Updated to show the serial number of the replacement RP3 module, as loaded
from the Smart Account
5. Attach a device template to the replacement Cisco ASR 1006-X. Use the same device template that was
used for previous chassis. If you saved a CSV file in an earlier step, use it in the substeps that follow.
a. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. In the row of the template that was previously attached to the current chassis, click More Actions
(…) and choose Attach Devices.
d. In the Available Devices pane, select the replacement chassis and move it to the Selected Devices
pane.
e. Click Attach. The Configuration Templates page opens.
f. If you saved a CSV file in an earlier step, click the up arrow button to upload a CSV file.
g. If you saved a CSV file in an earlier step, in the Upload CSV File pop-up window, select the CSV
file and click Upload. The values stored in the CSV file are copied to the device template.
h. Click Next.
i. Click Configure Devices to push the device template to the replacement Cisco ASR 1006-X chassis.
The task status shows this task as Scheduled because the replacement device is not yet reachable.
6. Copy the bootstrap file (ciscosdwan.cfg) created in an earlier step, to a USB flash drive, and plug this into
the replacement RP3 module.
7. Remove the previous RP3 module from the Cisco ASR 1006-X chassis, and install the replacement RP3
module.
For information about RP3 module installation, see the Cisco ASR 1000 Route Processor 3 Installation
and Configuration Guide.
When the RP3 module starts, the following occurs:
• The RP3 module loads the configuration from the ciscosdwan.cfg file on the USB flash drive.
• The RP3 module boots up in controller mode.
Note From Cisco IOS XE Catalyst SD-WAN Release 17.13.1a, controller mode is not
supported.
• When the connection to the controller is established, the controller pushes the device template, which
was in Scheduled state, to the RP3 module.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
API Cross-Site Request Forgery Cisco IOS XE Catalyst SD-WAN This feature adds protection against
Prevention Release 16.12.1b Cross-Site Request Forgery (CSRF)
that occurs when using Cisco
Cisco Catalyst SD-WAN Release
Catalyst SD-WAN REST APIs.
19.2.1
This protection is provided by
including a CSRF token with API
requests. You can put requests on
an allowed list so that they do not
require protection if needed.
this token, Cisco SD-WAN Manager rejects the request, unless the endpoint is included on an allowed list.
(For assistance with adding endpoints to an allowed list, open a case with the Cisco TAC or escalation support
team.)
Note However, some of the GET API's and all the POST APIs of Cisco SD-WAN Manager, which are not on an
allowed list require Cross-Site Request Forgery (CSRF) token authentication.
Token Use
The following sections describe how the token is used with the API when you use API docs or third party
applications.
API Docs
Cisco SD-WAN Manager automatically generates a token and appends the token to every request that you
send from the Cisco SD-WAN Manager API Docs page. This process requires no action from you, and you
will not notice any difference from previous releases in how the API Docs page operates.
If there are API requests that you want to exclude from this token-based authentication, you can request that
these API endpoints be included in an allowed list by opening a case with the Cisco TAC or escalation support
team.
Method 1
In the first method, the session you create is stored in the cookies.txt file and the same session can be used
for all subsequent requests, using the jsessionid that the file contains. This is the recommended method.
1. To log in to Cisco SD-WAN Manager, use the following example command and modify the URL according
to your IP address:
sampleuser$ TOKEN=$(curl "https://209.165.200.254/dataservice/client/token" -X GET -b
cookies.txt -s -insecure)
2. After logging in to Cisco SD-WAN Manager, obtain a token by making a request, where vManage_IP is
the IP address of your Cisco SD-WAN Manager server. You can obtain a token in string format or in
JSON format.
To obtain a token in string format, use the following URL:
https://vManage_IP/dataservice/client/token
To obtain a token in JSON format (beginning with Cisco IOS XE SD-WAN Release 16.12 and Cisco
SD-WAN Release 19.2), use the following URL:
https://vManage_IP/dataservice/client/token?json=true
The token that these calls return is valid for the rest of your current session. The following example shows
requests for obtaining a token:
Command for obtaining a token in string format:
sampleuser$ TOKEN=$(curl "https://vManage_IP/dataservice/client/token" -X GET -b
cookies.txt -s -insecure)
{"token":"56CF324A8F67993B6FCCF57302068B0756DA8703BE712EEA18D4D9055B11312843F9D30B48A3902320FFAA8659AD01202A63"}
3. In the header of each subsequent API request in the current session, include the X-XSRF-TOKEN key,
with a value that consists of the token that you generated.
The following examples show a GET request and a POST request that include a generated token in the
header:
Command:
sampleuser$ curl "https://vManage_IP/dataservice/server/info" -b cookies.txt -silent
-insecure -H "X-XSRF-TOKEN: $TOKEN"
Output:
{"Achitecture":"amd64","Available processors":2}
Command
sampleuser$ curl
"https://vManage_IP/dataservice/settings/configuration/emailNotificationSettings" -X
POST -b cookies.txt -silent -insecure -H "X-XSRF-TOKEN: $TOKEN" -d
'{"enabled":true,"from_address":"test@mydomain.com","protocol":"smtp","smtp_server":"a.com",
"smtp_port":25,"reply_to_address":"test@test.com","notification_use_smtp_authentication":false}='
Output:
{"data":[{"enabled":true,"notification_use_email_setting_authentication":false,"notification_use_smtp_authentication":false}]}
4. To prevent memory leaks, you must logout after each API call, including the token, starting from Cisco
SD-WAN Release 19.2.1.
The following example shows how you can logout:
Command:
sampleuser$ curl "https://vManage_IP/logout" -b cookies.txt -insecure -H
"X-XSRF-TOKEN:$TOKEN"
Output:
Replaced cookie JSESSIONID="DcOke5mqix_15qCpWA1blIJVAMnVg3lDMU4ABRgVinvalid" for domain
209.165.200.254, path /, expire 0
< set-cookie: JSESSIONID=DcOke5mqix_15qCpWA1blIJVAMnVg3lDMU4ABRgVinvalid
Note To verify that you have logged out of the session, check the jsessionid and ensure that it ends with 'invalid'.
Method 2
In the second method, the session you create is not stored and you must create a new session for each request.
1. After logging in to Cisco SD-WAN Manager, obtain a token by making a request, where vManage_IP is
the IP address of your Cisco SD-WAN Manager server. You can obtain a token in string format or in
JSON format.
To obtain a token in string format, use the following URL:
https://vManage_IP/dataservice/client/token
To obtain a token in JSON format (beginning with Cisco IOS XE SD-WAN Release 16.12 and Cisco
SD-WAN Release 19.2), use the following URL:
https://vManage_IP/dataservice/client/token?json=true
The token that these calls return is valid for the rest of your current session. The following example shows
requests for obtaining a token:
Command for obtaining a token in string format:
sampleuser$ curl --user admin:admin https://vManage_IP/dataservice/client/token --insecure
2. In the header of each subsequent API request in the current session, include the X-XSRF-TOKEN key,
with a value that consists of the token that you generated.
The following examples show a GET request and a POST request that include a generated token in the
header:
Command:
sampleuser$ curl "https://vManage_IP/dataservice/server/info" -H "Cookie:
JSESSIONID=pSwrx3AEWokiDO1TkFiOjgSehp-ITNdFn7Xj9PsL.c331d01e-91d7-41cc-ab90-b629c2ae6d97"
--insecure -H "X-XSRF-TOKEN=
FC5B19BB3521EE20CFBDCD3CEDCC48F50CB1095C9654407936029E9C0EF99FEAE50440B60E49F7CD4A0BAB5307C2855F2E0C"
Output:
{"Achitecture":"amd64","Available processors":2}
Command
sampleuser$
"https://vManage_IP/dataservice/settings/configuration/emailNotificationSettings" -H
"Cookie:
JSESSIONID=pSwrx3AEWokiDO1TkFiOjgSehp-ITNdFn7Xj9PsL.c331d01e-91d7-41cc-ab90-b629c2ae6d97"
--insecure -H "X-XSRF-TOKEN=
FC5B19BB3521EE20CFBDCD3CEDCC48F50CB1095C9654407936029E9C0EF99FEAE50440B60E49F7CD4A0BAB5307C2855F2E0C"
-X POST --insecure -d
'{"enabled":true,"from_address":"test@mydomain.com","protocol":"smtp","smtp_server":"a.com",
"smtp_port":25,"reply_to_address":"test@test.com","notification_use_smtp_authentication":false}='
Output:
{"data":[{"enabled":true,"protocol":"smtp","smtp_server":"a.com","from_address":"test@mydomain.com",
"smtp_port":25,"notification_use_smtp_authentication":false,"reply_to_address":"test@test.com"}]}
3. To prevent memory leaks, you must logout after each API call, including the token, starting from Cisco
SD-WAN Release 19.2.1.
The following example shows how you can logout:
Command:
sampleuser$ curl "https://vManage_IP/logout" -b cookies.txt --insecure -H
"X-XSRF-TOKEN:$TOKEN"
Output:
Replaced cookie JSESSIONID="DcOke5mqix_15qCpWA1blIJVAMnVg3lDMU4ABRgVinvalid" for domain
209.165.200.254, path /, expire 0
< set-cookie: JSESSIONID=DcOke5mqix_15qCpWA1blIJVAMnVg3lDMU4ABRgVinvalid
Note To verify that you have logged out of the session, check the jsessionid and ensure that it ends with 'invalid'.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Deploy Cisco Cisco vManage This feature enables you to deploy the Cisco SD-WAN
SD-WAN Controllers Release 20.6.1 Controllers (Cisco SD-WAN Manager, Cisco SD-WAN
in Azure Controller, and Cisco Catalyst SD-WAN Validator) in a
Microsoft Azure environment.
You can deploy the following Cisco SD-WAN Controllers in an Azure environment: Cisco SD-WAN Manager,
Cisco SD-WAN Controller, and Cisco SD-WAN Validator.
The following illustration shows the architecture of the Azure region, virtual network, security group, and so
on, and it shows where the Cisco SD-WAN Controllers function within the architecture.
Figure 35: Cisco SD-WAN Controllers in Azure
Note The procedures described here apply to the three types of Cisco SD-WAN Controllers— Cisco SD-WAN
Manager, Cisco SD-WAN Controller, and Cisco SD-WAN Validator. Where applicable, we indicate where
the instructions are different for specific controllers.
Note In DHCP configurations, IPv6 Unique Local Addresses (ULA) are assigned to the interface in some instances.
Cisco SD-WAN Validator is designed to drop the packets with source or destination as the ULA addresses.
In an Azure setup, to allow packets with these addresses on the device, configure the
enable-ipv6-unique-local-address command to enable or disable these addresses.
Note For definitive information about tasks in Azure, see the Azure documentation.
2. Create a new private container in the storage account. Choose a storage account in the region where you
intend to deploy the controller.
Note For information about choosing the blob type, see Azure documentation.
4. Create a new image, selecting the VHD file uploaded in the previous step.
When creating an image, ensure that you complete the following actions:
• Choose a valid subscription.
• Choose an existing resource group or create a new one.
• Enter a name and region for the image.
• For OS, choose Linux.
• For VM generation, choose Gen 1.
• For account type, choose Premium SSD.
• For host caching, choose read/write
• For encryption, choose the default settings.
• Optionally, you can enter a tag to categorize the image.
Note For definitive information about tasks in Azure, see the Azure documentation.
Note A resource group is a logical construct in Azure that includes all of the resources
that you have deployed across regions. We recommend defining one resource
group for each Cisco Catalyst SD-WAN overlay.
3. Associate the newly created NSG with the subnets created in an earlier step.
Note For definitive information about tasks in Azure, see the Azure documentation.
Note For information about how to locate custom images, see the Azure documentation.
• For the VM size, select an option with the number of CPUs and memory that you want to use for the
controller.
For information about Cisco SD-WAN Controller-device compatibility and server requirements, see
Cisco SD-WAN Controller Compatibility Matrix and Server Recommendations.
• Choose an authentication type (for example, SSH public key, or password) and provide the credentials,
as required.
• For disk resources, do one of the following:
• If you are deploying a Cisco Catalyst SD-WAN Controller or a Cisco Catalyst SD-WAN
Validator, no additional disk resources are required beyond the default.
• If you are deploying a Cisco SD-WAN Manager controller, choose one disk.
• Choose the Premium SSD option and default encryption.
• Choose a disk size of 1 TiB (called P30 in Azure) or larger.
For server recommendations relevant to controllers in Azure, see Cisco SD-WAN Controller
Compatibility Matrix and Server Recommendations.
• Configure the disk host caching as read/write.
• For networking details, choose the virtual network, the subnets, and the NSG that you created in
earlier steps.
• For the public IP address, choose the following options:
• SKU: Basic
• Assignment: static
• Optionally, you can enable advanced boot diagnostics (a management option) to create an additional
storage account in the resource group for storing diagnostics logs.
• (Controller releases 20.6.1 and later) Optionally, you can use the custom data feature (an advanced
option) to enter commands for the VM to execute when rebooting.
• Optionally, you can add a tag to categorize the controller.
2. After creating the VM, create additional network interfaces (NICs) for the VM.
Create the network interfaces in the resource group that you created in an earlier task.
• If you are deploying a Cisco SD-WAN Controller or Cisco SD-WAN Validator, create one additional
network interface.
• If you are deploying a Cisco SD-WAN Manager controller, create two additional network interfaces.
• If you are deploying a Cisco SD-WAN Manager controller in a cluster, see Cluster Management and
Deploy Cisco Catalyst SD-WAN Manager for additional information about Cisco SD-WAN Manager
out-of-band interfaces.
When creating a network interface, ensure that you complete the following actions:
• Specify the virtual network, subnets, and NSG created in earlier tasks.
• Associate NIC 1 with subnet 1.
If you are deploying a Cisco SD-WAN Manager controller, associate NIC 2 with subnet 2.
If you are using a Cisco SD-WAN Manager cluster, associate NIC 3 with subnet 3.
Note Associating a NIC with a subnet enables the VM to connect to the subnet.
• For each NIC, enter the tag used for the controller that you are deploying.
3. Create a static public IP for all of the controllers to use, and associate this public IP with NIC 1.
Note Use the IP configurations option in Azure to create the public IP.
When creating a public IP, ensure that you complete the following actions:
• For assignment, choose static.
• Use the associate option to specify NIC 1.
Note For definitive information about tasks in Azure, see the Azure documentation.
1. Using the Azure portal, add inbound security rules to the NSG created in an earlier task, to allow inbound
traffic from the IP ranges needed for the following:
• Establishing control connections between each of the Cisco SD-WAN Controller. If the controllers
lack connectivity to each other, the control plane and data plane cannot operate.
• Accessing the controllers using HTTPS or SSH protocols.
For the NSG, use the option to add inbound security rules. Using the rules, allow all of the controller VM
IP addresses, to enable the required connectivity between the Cisco SD-WAN Controller.
When creating a new inbound security rule, ensure that you complete the following actions:
• Specify IP ranges, protocol, and so on.
• For the action of the rule, choose the option to allow the traffic.
2. To verify connectivity, log in to the VM using the NIC 0 public IP of Cisco SD-WAN Manager.
The following excerpt of the request nms all status command output shows that the application
server is active:
vmanage# request nms all status
NMS service proxy
Enabled: true
Status: running PID:2881 for 9479s
NMS service proxy rate limit
Enabled: true
Status: running PID:4359 for 9521s
NMS application server
Enabled: true
Status: running PID:6131 for 9419s
...
4. After installing the controllers, follow the steps in Cisco SD-WAN Overlay Network Bring-Up
Process to establish the control connections for the controllers and to verify that each controller is
operational.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Deploy Cisco Cisco vManage This feature enables you to deploy the Cisco SD-WAN
SD-WAN Controllers Release 20.6.1 Controllers (Cisco SD-WAN Manager, Cisco Catalyst
in AWS SD-WAN Controller, and Cisco SD-WAN Validator) in an
Amazon AWS environment.
You can deploy the following Cisco SD-WAN Controllers in an Amazon Web Services (AWS) environment
using Amazon Machine Images (AMI): Cisco SD-WAN Manager, Cisco SD-WAN Controller, and Cisco
SD-WAN Validator.
The AMI images that Cisco provides to you are for your use only. Do not share them with others. You can
do the following:
• You can deploy the number of controllers as per your order quantity. For example, if you have ordered
50 Cisco SD-WAN Manager controller PIDs, then you can deploy only 50 Cisco SD-WAN Manager
controllers within your AWS account.
• You can copy the AMI between regions and your own separate AWS accounts, if you do not exceed the
quantity of PIDs ordered.
• After the initial deployment of the controllers, you are responsible for any upgrades or downgrades.
The following illustration shows the architecture of the AWS region, virtual private cloud (VPC), security
group, and so on, and it shows where the Cisco SD-WAN Controllers function within the architecture.
Figure 36: Cisco SD-WAN Controllers in AWS
• Infrastructure issues: You are responsible for infrastructure management, monitoring, and
troubleshooting. After the controllers are provisioned and running in your cloud account, Cisco
does not provide support for cloud infrastructure-related issues.
• Software upgrade: Controller software upgrade doesn't require AMI images. You can download the
controller images from the Cisco software download site and upgrade the controller software as described
in the Manage Software Upgrade and Repository chapter of the Cisco Catalyst SD-WAN Monitor and
Maintain Configuration Guide.
Note The procedures described here apply to the three types of Cisco SD-WAN Controllers—Cisco SD-WAN
Manager, Cisco SD-WAN Controller, and Cisco SD-WAN Validator. We indicate the difference in the
instructions for specific controllers wherever applicable.
3. Cisco CloudOps team verifies the information and shares the requested AMIs to your AMI inventory in
the US-WEST-2 region.
Note The AMI images that the CloudOps team provides are for your use only. Do not share them with others. If
the images are shared with others, Cisco reserves the right to remove the images and take any necessary action
to prevent the images from being shared.
Note For definitive information about tasks in AWS, see the AWS documentation.
2. Create the necessary resources required for the VPC, to form the environment for running the controller
instances:
• The security group must contain the following:
• Source public IP address of the user NOC center to access the controllers for management
purpose.
• Address 0.0.0.0/0 for all TCP/UDP ports for TLS/DTLS for all edges to join the controllers.
• Enable public IPs each controller to reach other controllers.
3. Associate the newly created security group with the subnets created in Step 1.
4. Create an internet gateway and associate it with the VPC.
5. Create a routing table and associate it with the VPC. Add a default route entry pointing to the internet
gateway.
Note For definitive information about tasks in AWS, see the AWS documentation.
Note For information about how to locate custom images, see the AWS documentation.
• For the virtual machine size, select an option with the number of CPUs and memory that you want
to use for the controller. For Cisco SD-WAN Controller-device compatibility and Cisco SD-WAN
Controller server requirements, see Cisco SD-WAN Controller Compatibility Matrix and Server
Recommendations.
• Choose an authentication type (for example, SSH public key, or password) and provide the credentials,
as required.
• For disk resources, perform one of the following:
• If you are deploying a Cisco SD-WAN Controller or a Cisco SD-WAN Validator, no additional
disk resources are required beyond the default.
• If you are deploying a Cisco SD-WAN Manager controller, choose one disk.
• Choose the Premium SSD option and default encryption.
• Choose a disk size of 1 TB (General Purpose SSD gp2) or larger.
For server recommendations relevant to controllers in AWS, see Cisco SD-WAN Controller
Compatibility Matrix and Server Recommendations.
• Configure the disk host caching as read/write.
• For networking details, choose the VPC, the subnets, and the security group that you created in
earlier steps. Each virtual machine must have two network interfaces, one for the VPN 512
management subnet and one for the VPN 0 tunnel subnet.
• Assign an Elastic IP address to the VPN 0 and VPN 512 network interfaces of each controller.
• (Optional) Enable advanced boot diagnostics (a management option) to create an additional
storage account in the resource group for storing diagnostics logs.
• For Cisco SD-WAN Controller Release 20.6.1 and later, you can optionally use the custom data
feature to enter commands for the virtual machine to execute when rebooting.
• (Optional) Add a tag to categorize the controller.
2. After creating the virtual machine, create additional network interfaces (NICs) for the virtual machine.
Create the network interfaces in the resource group that you created in an earlier task.
• If you are deploying a Cisco SD-WAN Controller or Cisco SD-WAN Validator, create one additional
network interface.
• If you are deploying a Cisco SD-WAN Manager controller, create two additional network interfaces.
• If you are deploying a Cisco SD-WAN Manager controller in a cluster, see Cluster Management and
Deploy Cisco SD-WAN Manager for additional information about Cisco SD-WAN Manager
out-of-band interfaces.
3. When creating a network interface, ensure that you complete the following actions:
• Specify the VPC, subnets, and the security group created in Task 2.
• Associate NICs with subnets.
Example: Associate NIC 1 with subnet 1.
• If you are deploying a Cisco SD-WAN Manager controller, associate NIC 2 with subnet 2.
• If you are using a Cisco SD-WAN Manager cluster, associate NIC 3 with subnet 3.
Note Associating a NIC with a subnet enables the virtual machine to connect to the
subnet.
• For each NIC, enter the tag used for the controller that you are deploying.
4. Create a static public IP for all the controllers to use, and associate this public IP with NIC 1.
Note Use the IP configuration option in AWS to create the public IP.
5. When creating a public IP, ensure that you complete the following actions:
• For assignment, choose static.
• Use the associate option to specify NIC 1.
8. Restart the virtual machine. Confirm in the AWS portal that the virtual machine has restarted.
Note For definitive information about tasks in AWS, see the AWS documentation.
2. For the security group, use the option to add inbound security rules. Using the rules, allow all the controller
virtual machine IP addresses, to enable the required connectivity between the Cisco SD-WAN Controllers.
When creating a new inbound security rule, ensure that you complete the following actions:
• Specify IP ranges, protocol, and so on.
• For the action of the rule, choose the option to allow the traffic.
3. To verify the connectivity, log in to the virtual machine using the NIC 0 public IP of Cisco SD-WAN
Manager.
4. After installing the controllers, follow the steps in Cisco SD-WAN Overlay Network Bring-Up
Process to establish the control connections for the controllers and to verify that each controller is
operational.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
Overview
This chapter provides links to documents authored by Cisco subject matter experts (SMEs). They aim to help
you resolve technical issues without requiring a support ticket. If these documents are unable to resolve your
issue, we recommend visiting the applicable Cisco Community. There is a wealth of information and advice
available from fellow Cisco customers who may have experienced this issue already and provided a solution.
If you are not able to find a resolution on the Community, it may be best that you raise a support ticket at
Cisco Support. In cases where a support ticket has to be raised, these documents provide guidance about the
data that should be collected and added to the support ticket. Specify the support document you referred, and
TAC can create an improvement request with the document owner.
Support Articles
The documents in this section were created using specific software and hardware listed in the Components
Used section of each article. However, this does not mean that they are limited to what is listed in Components
Used, and generally remain relevant for later versions of software and hardware. Note that there could be
some changes in the software or hardware that can cause commands to stop working, the syntax to change,
or GUIs and CLIs to look different from one release to another.
The following are the support articles associated with this technology:
Document Description
Configure SD-AVC on Cisco Catalyst This document describes how to configure Software
SD-WAN Defined-Application Visibility and Control (SD-AVC) on a
Software-Defined Wide Area Network (SD-WAN).
HSEC License FAQs for Cisco Catalyst This document describes a few queries about the HSEC
SD-WAN license for the autonomous and SD-WAN modes.
Configure HSECK9 License on cEdge This document describes how to install and troubleshoot
SD-WAN XE HSECK9 licenses on SD-WAN XE cEdges.
Understand the Web Certificate For Cisco This document describes the difference between the Web
Catalyst SD-WAN Manager Certificate and the Controller Certificates on the Cisco
Catalyst SD-WAN solution. This document also explains in
detail the Web Certificate and clarifies the use between these
two types of certificates.
How To Generate Self-Signed Web Certificate This document describes how to generate and install a
For Cisco Catalyst SD-WAN Manager self-signed web certificate when the existing one is expired
on an on-prem Cisco SD-WAN Manager. Cisco does not
sign web certificates for such deployments, customers have
to sign it by own Certificate Authority (CA) or some
third-party CA.
Replace a cEdge RMA Router This document describes how to replace a failed cEdge unit
with another one. This consists of a copy of the configuration
from the failed router to the replacement router, the removal
of this cEdge, and the addition of the new router into the
network. This process is similar to vEdge replacement
however, the copy option is missed in Cisco SD-WAN
Manager for cEdges.
Upgrade Cisco Catalyst SD-WAN cEdge This document describes the process to upgrade or
Router with the Use of CLI or Cisco Catalyst downgrade an SD-WAN cEdge (Cisco Edge) router in
SD-WAN Manager Controller mode from the Command Line (CLI) and from
Cisco SD-WAN Manager.
Configure Basic Parameters to Form Control This document describes the basic configuration and correct
Connections on cEdge commit order to onboard a cEdge to a Software-Defined
Wide Area Network (SD-WAN) overlay.
Cisco Catalyst SD-WAN Control Traffic This document describes how to calculate control traffic
Overhead User Guide overhead on an SD-WAN overlay deployment.
Deploy a CSR1000v/C8000v on Google Cloud This document describes the procedure to deploy and
Platform configure a Cisco Cloud Services Router 1000v (CSR1000v)
and Catalyst 8000v (C800v) Edge Router on Google Cloud
Platform (GCP).
Document Description
Transfer Files between a cEdge and Cisco This document describes how to transfer files between a
Catalyst SD-WAN Manager remote cEdge and a local Cisco SD-WAN Manager through
CLI.
Transfer Files between a vEdge and Cisco This document describes how to transfer files between a
Catalyst SD-WAN Manager remote vEdge and a local Cisco SD-WAN Manager through
CLI.
Quick Start Guide - Data Collection for Various This document describes several SD-WAN issues along
Cisco Catalyst SD-WAN Issues relevant data that must be collected in advance before you
open a TAC case to improve the speed of troubleshooting
and/or problem resolution. This document is broken up into
two main technical sections: Cisco SD-WAN Manager and
Edge routers. Relevant outputs and command syntax are
provided dependent upon the device in question.
Feedback Request
Your input helps. A key aspect to improving these support documents is customer feedback. Note that these
documents are owned and maintained by multiple teams within Cisco. If you find an issue specific to the
document (unclear, confusing, information missing, etc):
• Provide feedback using the Feedback button located at the right panel of the corresponding article. The
document owner will be notified, and will either update the article, or flag it for removal.
• Include information regarding the section, area, or issue you had with the document and what could be
improved. Provide as much detail as possible.
Note To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst
SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release
20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN
Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN
Validator, Cisco vSmart to Cisco Catalyst SD-WAN Controller, and Cisco Controllers to Cisco Catalyst
SD-WAN Control Components. See the latest Release Notes for a comprehensive list of all the component
brand name changes. While we transition to the new names, some inconsistencies might be present in the
documentation set because of a phased approach to the user interface updates of the software product.
The Cisco SD-WAN Manager API documentation is provided as part of the Cisco SD-WAN Manager software,
at the URL https://vmanage-ip-address/apidocs. (More accurately, the full URL includes the Cisco SD-WAN
Manager port number, https://vmanage-ip-address:8443/apidocs.) vmanage-ip-address is the IP address of
the Cisco SD-WAN Manager server.
API calls are provided for the following categories of operations:
• Certificate Management
• Configuration
• Device and Device Inventory
• Monitoring
• Real-Time Monitoring
• Troubleshooting Tools
Note Starting from Cisco SD-WAN Release 20.6.1, Cisco SD-WAN Manager supports below API limits:
• API Rate-limit: 100/second
• Bulk API Rate-limit: 48/minute
Real-time monitoring of APIs is CPU intensive and should be used for troubleshooting purposes only. They
should not be used continuously for active monitoring of the devices.
For each group of API calls, click Show/Hide to list the individual calls and the URL for each call. Each call
shows its response class, required parameters, and response messages (status codes).
Click Try It Out, to display the request URL for each API call and the format of the response body. The
request URL consists of the Cisco SD-WAN Manager's URL, followed by /dataservice. For example,
https://10.0.1.32:8443/dataservice/device/interface/statistics/ge0/0?deviceId=172.16.255.11
Below are a few examples of the URLs to use for API calls:
Table 44:
Before you can replace the vEdge router in Cisco SD-WAN Manager, Cisco SD-WAN Manager must have
learned the chassis number and serial number of the replacement vEdge router.
• If the replacement vEdge router is a router that you have previously received, such as a router that part
of your spares inventory, Cisco SD-WAN Manager will have already learned the router's chassis and
serial number when you previously uploaded the serial number file to Cisco SD-WAN Manager.
• If you initiated an RMA process and have received a new router as a replacement, you need to upload
the updated version of the authorized vEdge serial number file to Cisco SD-WAN Manager.
To replace a failed router using Cisco SD-WAN Manager, perform the following steps:
1. Copy the configuration from the failed router to the replacement router.
2. Invalidate the failed router. Invalidating a router deactivates its certificate and thus removes it from the
overlay network.
3. Validate the replacement router, to activate its certificate.
The new router is a complete replacement for the failed router, its configuration is identical to that of the failed
router. (Remember, though, that each router has a unique chassis number and a unique serial number in its
certificate.) After you copy the configuration from the failed router to the replacement, both routers have the
same configurations, including the same IP address. Two routers with the same IP address cannot be present
in the network at the same time, one router must be in valid state on Cisco SD-WAN Manager and the other
must be in invalid state—or both routers must be in invalid state.
If you attempt to validate a router that has the same IP address as another router in the network, an error
message is displayed, and the validation process is terminated.
Release Information
Introduced in Cisco SD-WAN Manager in Release 15.4.
A. Copy the configuration from the device that you are replacing
1. From the Cisco SD-WAN Manager menu, choose Configuration > Devices.
2. In the list of devices, locate the device to be replaced. In the row of the device, click … and choose
Running Configuration.
Note If Cisco SD-WAN Manager cannot reach the device, skip to step 4 for instructions on logging in to the device
directly to copy the configuration information.
3. Copy the text of the configuration and paste it into a text editor.
The configuration information is useful especially if you choose the manual deployment method for
onboarding the new replacement device.
4. If the device is not reachable by Cisco SD-WAN Manager, log in to the device directly and use the
following commands on the device to display the configuration information. Copy the configuration
information from the output.
• Display the running configuration and save the output to a text file.
show running-config | redirect bootflash:sdwan/ios.cli
• Display the SD-WAN running configuration and save the output to a text file.
show sdwan running-config | redirect bootflash:sdwan/sdwan.cli
Note This step causes any control connections to the device to be lost.
Note You can use the show sdwan certificate serial command on the device to display this information.
2. Add the new device to the inventory using one of the methods described in the Cisco Catalyst SD-WAN
Getting Started Guide.
Note The methods for adding a new device to the inventory are relevant to onboarding devices in general. They
are not unique to replacing a device.
D. Apply a device template to the new device, using the same device template that was applied to the device
that is being replaced
1. From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
2. In the row for the template that was used for the device being replaced, click … and choose Export CSV.
The CSV file shows the parameters for each device to which the template is attached.
3. Review the exported CSV file.
• If the new device is identical to the device being replaced, you do not need to update any of the
parameters in the CSV file.
• If the new device is not identical to the device being replaced, then optionally, you can update
parameter values in the CSV file to match the new device, as required. For example, if the replacement
device uses a different interface numbering, as compared with the device being replaced, you can
update the parameter that specifies interface numbering.
Note In Cisco vManage Release 20.7.x and earlier releases, Device Templates is called Device.
c. In the row for the template that was used for the device being replaced, click … and choose Attach
Devices.
d. In the Attach Devices window, move the replacement device to the Selected Devices pane and click
Attach.
e. Optionally, you can update parameters in the template before applying it to the device, using one of
the following methods:
• In the row of the replacement device, click … and choose Edit Device Template. Edit any
parameters, as needed.
• Upload the CSV file that you downloaded and edited to update the parameters for the replacement
device. To upload the CSV file, click Upload (up arrow button) and navigate to the CSV file.
Note The methods for onboarding a new device to the inventory are relevant to onboarding devices in general.
They are not unique to replacing a device.
Note To configure the new device, you can use the configuration files that you saved
earlier in part A.
Note The manual deployment method requires installing a root certificate authority
(CA) for the new device.
For information, see the Cisco Catalyst SD-WAN: WAN Edge Onboarding guide.
For information about installing a root CA, see the Enterprise Certificates section of the Cisco Catalyst
SD-WAN Getting Started Guide.
• From the Cisco SD-WAN Manager menu, select Maintenance > Device Reboot to reboot a device.
• From the Cisco SD-WAN Manager menu, select Configuration > Templates to manage templates:
• Attach devices to a device template.
• Detach devices from a device template.
• Change the variable values for a device template that has devices attached to it.