LTRSPG-2518: Sandeep Sharma - Product Manager Nilesh Khade - Software Engineer
LTRSPG-2518: Sandeep Sharma - Product Manager Nilesh Khade - Software Engineer
LTRSPG-2518: Sandeep Sharma - Product Manager Nilesh Khade - Software Engineer
1
Learning Objective
Key Solution Components
Topology
Get Started
Scenario 1: Zero Touch Site Bring Up
Scenario 2: BFD/IPSec based Strict Hub-n-Spoke
Scenario 3: Multi-Topology/Different Topologies Per VPN
Scenario 4: Service Insertion FW (Regional/DC Firewall )
Scenario 5: Application Firewalling using Centralized Policies
Scenario 6: Application Aware Routing
Scenario 7: SD-WAN Security Overview (Optional)
2
Learning Objectives
Benefits
4
Topology
This content includes preconfigured users and components to illustrate the scripted
scenarios and features of the solution. Most components are fully configurable with
predefined administrative user accounts. You can see the IP address and user account
credentials to use to access a component by clicking the component icon in the
Topology menu of your active session and in the scenario steps that require their use.
The topology includes 1 Datacenter and 2 Remote Branches. The topology has 3
different VPN/VRF Segments.
5
Figure 1. Topology
OSPF is running in the DC and Branch 2 in VPN 10. All other segments are using static
routing/VRRP
Table 1 : Host IPs for testing data plane connectivity
6
Table 2: Device Addresses
7
Get Started
2. For best performance, connect to the workstation with Cisco AnyConnect VPN
and the local RDP client on your laptop
8
Scenario 1. Zero Touch Site Bring Up
Management solutions are a crucial part of making Fast IT into a reality. The Cisco-SD
Wan solution can effectively be managed on premise, in the cloud or with provider-
managed offerings. One should not have to sacrifice critical solution capabilities based on
the desire for a simplified control point.
vManage also provides open Northbound REST APIs that drive core network automations
solutions and efficient operation.
Additionally, the vEdge routers also support a number of South-bound protocols that will
enable your team to extend benefits to both Greenfield and Brownfield environments.
This scenario provides an overview of the Manage Branch Sites component to show the
customer how devices are securely detected and provisioned leveraging automation
through ZTP
Challenge
Automated and adaptive provisioning to accelerate time to market and reduce costs
Objective
9
Steps
DIALOG DEMONSTRATION STEPS
Deploy a branch using vManage 1.Connect to Workstation 1 and launch the Chrome browser.
configuration templates and Viptela’s Zero 2.Click the bookmark for Viptela vManage and click through the
Touch Provisioning (ZTP) service. security warnings to proceed to the vManage service.
3.Log in to vManage using username admin and password
The ZTP process simulated in this lab, using admin.
default configuration from the factory, for the
vEdge in Branch 2.
Configuring Templates
Various preconfigured templates will be 5.Click on Configuration icon and select Templates from the
shown. We will select the preconfigured drop-down menu.
BranchType2 template to illustrate how a
customer can use a template to facilitate
and simplify the rollout of a new branch
site.
10
6.Click on the three dots (…) in the right most column for
BranchType2Template-vEdge. From the drop-down, select
the option Attach Devices.
11
11. Click the Cancel button to go back to the previous page.
12. Click on the upload icon ( Up arrow) for uploading the
CSV file.
13. Click Choose File.
14. A Prebuilt CSV file named BranchType2Template.csv is in
the folder \Desktop\SD-WAN Demo\csvConfigFiles on
Workstation 1.
15. Click Open.
16. Click Upload.
17. To populate the values for the variables based on the
uploaded CSV file, click Next.
18. Click the tab in the left column with BR2-VEDGE1 label to
see the full configuration for validation.
19. Click Configure Devices.
12
20. Wait for few seconds until the device status changes from
In Progress to Done – Scheduled.
13
23.Return to the vManage dashboard. The BR2-VEDGE1 will
come up and the dashboard will show total of Five (5) Edge
devices are operational.
14
vSmart and vManage.
15
33.Click on Interface in left column menu and then click 1h to
see utilization of the interfaces on the edge devices.
16
Scenario 2. Hub and Spoke Topology
Enterprises may not need a full mesh topology and would like to have a pure Hub-n-
SpokeIPSec/BFD topology. This w ill provide the scalability and simplicity for the
branches. A simple policy activation will convert full mesh connectivity to Strict Hub-n-
Spoke.
In this case, we will create a fabric with IPSec tunnels only getting established between
the spokes and the DCs. Based on policy we will not establish any IPSec tunnels
between the branches.
For corporate VPN 10, we will only advertise the branch routes to the DCs and not to
other Branches. The DCs are advertising default routes and hence when a branch needs
to talk to other branches, they will take the default to the DCs. The DC vEdges then
route the traffic back to the other remote Branches.
For the PCI/IOT segment (VPN 20), we will advertise the routes between the Branches
by setting the next-hop pointing to the DCs TLOCs. This is being done to provide Hub-
n-Spoke communication between the Branches through the DCs as there is no default
route being advertised from the DCs.
For guest WiFi VPN 40, we don’t need any communication between the branches. We
will restrict the route exchange between sites for VPN 40. There will be only one static
default route in VPN 40 providing direct internet access.
Challenge
Arbitrary topology creation and management is a complex task and may require touching
all the branches and/or the provider involved.
Objective
17
DIALOG DEMONSTRATION STEPS
1. Go to vManage. Click on the Monitor > Network.
2. Select BR2-VEDGE1.
18
7. In the Destination IP* filed, type 10.3.10.10, from the
VPN dropdown,select VPN 10 and from the
Source/Interface for VPN10,select the only available
option from drop-down menu.
8. Click Start.
19
Configure Policies
12. From the menu, select Configuration > Policies.
13. Click on the three dots (…) for StrictHub-n-Spoke.
14. Select Activate.
20
17. Validate Strict Hub-n-Spoke topology by selecting
Monitor > Network .
18. Select BR2-VEDGE1
21
NOTE: If you have observe now the inter- 20. Select Troubleshooting from the left column.
branch traffic now traverses the DC for 21. Select Trace Route.
VPN20. 22. Trace the route from BR2 to BR1 by entering
10.3.20.10 and selecting VPN 20.
23
Scenario 3. Multi-Topology - Different Topologies Per VPN
Enterprises may have multiple VPN segments and may need different connectivity
models/topologies. The default in Cisco SD-WAN is to have full mesh for all VPNs. In
scenario 2 we demonstrated how you can restrict ALL VPNs to be Hub-n-Spoke.
In this scenario we will demonstrate the following topologies for different VPNs using
policies.
Corporate VPN 10 – Full Mesh
PCI/IOT VPN 20 – Hub-n-Spoke
GuestWiFI VPN 40 – DIA ONLY in Branches
Challenge
Arbitrary topology creation and management is a complex task and may require touching
all the branches and/or involving the provider
Objective
24
DIALOG DEMONSTRATION STEPS
Result shows direct path between 1. Go to vManage. Click on the Monitor > Network.
Branch1 and Branch2 for VPN 10. 2. Select BR2-VEDGE1.
3. Select Troubleshooting from the left column.
4. Select Trace Route.
5. Enter 10.3.10.10 as the destination IP.
6. Select VPN 10 from drop down menu.
7. Click on Start button.
Result shows direct connectivity between 8. Do the same for VPN20 using destination IP of
Branch1 and Branch2 for VPN20 10.3.20.10.
9. From the menu, select Configuration > Policies .
10. Click on the three dots(…) to the right of
MultiTopologyPolicy.
Validate Full Mesh for VPN 10 and Hub-n- 13. From the menu, select Monitor > Network.
Spoke for VPN 20 14. Click BR2-VEDGE1.
25
15. Select Troubleshooting from the left column and then
click Trace Route.
26
18. Deselect the current source interface.
19. In the Destination IP* field, type 10.3.20.10, from the
VPN dropdown, select VPN 20 and from the
Source/Interface for VPN 20, select the only available
option from drop-down menu.
20. Click Start.
27
Scenario 4. Service Insertion – Regional/DC Firewall
When new branches are added from an acquired entity, the enterprise may initially want
the direct branch to branch communication to go through the FW in the DC or a
Colo/Regional facility hosting FW services.
Using Cisco SD-WAN one can place service anywhere in the network and, based on
policies, can make certain flows/sites have traffic go through those services.
Challenge
Arbitrary topology creation and management is a complex task and may require touching
all the branches and/or involving the provider. Previously, Firewall or any other service
had to sit in path but with service insertion the Firewall could sit in any of the enterprise
locations.
Simple activation of policy from central vManage. Results in simpler operations, reduced
cost and reduction in time/effort.
Ubiquitous deployment of security controls via firewall and IPS service insertion
policies.
Objective
Have to deploy/define FWs in DC1 and DC2 for corporate VPN 10.
Based on policy have the Branch to Branch traffic go through the Firewall for corporate
VPN 10.
28
DIALOG DEMONSTRATION STEPS
Result shows direct path between 1. From the menu, select Configuration > Policies.
Branch1 and Branch2 for VPN 10. 2. Click the three dots(…) to the right of the policy named
MultiTopologyPlusFWInsertion.
3. Select Activate.
29
8. From the left column, select Troubleshooting.
9. Select Trace Route.
10. In the Destination IP* field, type 10.3.10.10, from the
VPN dropdown, select VPN 10 and from the
Source/Interface for VPN 10, select the only available
option from drop-down menu.
11. Click Start.
30
15. From the menu, select Monitor > Policies .
16. Click the three dots (…) to the right of the
MultiTopologyPlusFWInsertion policy.
17. Select Deactivate.
31
Scenario 5. Application Firewalling using Centralized Policies
In this scenario, implement the policy as a centralized data policy where based on
source and destination prefix match, traffic between BR1 and BR2 is dropped in VPN 20.
The PCI/IOT segment only requires connectivity to DC from remotes. More granular
matches can be done to limit certain applications and allow other applications to flow
between the branches.
Challenge
Simple activation of policy from central vManage results in simpler operations, reduced
cost, and reduction in time and effort.
Consistent and centralized policy deployment reduces the risk of missed policy
application and human error.
32
Objective
Deploy additional data policy to drop traffic between Branch 1 and Branch
The Multi-Topology control policy must remain in place
33
5. Validate Connectivity from BR2-VEDGE1 to test host in
Branch1 in VPN 10 by entering destination ip
10.3.10.10
6. Click Ping.
34
4. Click Activate on the Pop up.
36
Scenario 6. Application Aware Routing
With fast deployment model and flexible topologies, any type of circuit could be
deployed, which provides the ability to direct different types of traffic over different
types of links. Video could go over the internet, mission critical applications can go over
MPLS. LTE could be circuit of last resort. This provides path diversity and high
availability.
In thislab, some of the applications have already had SLAs defined and are pinned to the
MPLS. Some applications have been pinned to the internet transport
37
The policy is applied to ALL sites, so the policy has impact on all the traffic received and
sent by BR2-VEDGE1. More traffic is received than sent by the BR2-VEDGE1. Look at
the traffic received by BR2-VEDGE1 on the mpls interface and the internet interface.
You will observe the traffic received switch from the mpls interface to internet interface
after the latency impairment on the MPLS transport.
Challenge
Dynamic path selection based on transport performance is complex to deploy and hard
to update policies on demand
Simple activation of policy from central vManage. Results in simpler operations, reduced
cost and reduction in time and effort.
Objective
Define SLA based policies and re-route traffic as the transport network conditions
change.
39
11. Scroll to the right to see the columns showing (Mean
and Average) Latency, Loss and Jitter for each of the
tunnels on MPLS and Internet.
40
WAN Impairment
20. Open new tab in Chrome and click the WAN
Impairment bookmark
41
23. When latency has been added, to show internet
transport, wait 1 minute and then run the test again.
42
Scenario 7. SD-WAN Security Overview (Optional)
The remote offices all utilize a Guest Internet VPN which allows customers to browse the
internet via Direct Internet Access. SD-WAN Security policy has been activated on this
guest VPN to protect them. Cisco SD-WAN Security can provide protection against
known and unknown malware threats with AMP and Threat Grid.
Challenge
Objective
43
Steps
1. Click on the Dashboard button and then Security to view the SD-WAN Security
dashboard.
2. Click the small down arrow in the first widget and adjust time frame to 1 hour and
click Search.
44
4. To the right of BranchType1Template-CSR click the three dots (…) and then
select View.
5. After the page loads, click Additional Templates which will go to the bottom,
where Security Policy is listed.
6. Click Cancel.
45
SD-WAN Security Policies
8. To the right of Branch-DIA-Security policy, click the three dots (…) and View
46
11. Click Cancel to go back to the SD-WAN Security Policy.
12. Click Intrusion Prevention to see how the IPS rules are set up.
13. Click on the three dots (…) to the right of the Branch-DIA-IPS policy and click
View.
47
16. Click on URL Filtering at the top
17. Click the three dots (…) next to the URL Filtering policy and select View.
48
19. Click Advanced Malware Protection.
20. Click the three dots (…) next to the BRANCH-DIA-AMP and then select View.
49
Disclaimer
This training document is to familiarize with Cisco SD-WAN solution Although the lab
design and configuration examples could be used as a reference, it’s not a real design,
thus not all recommended features are used, or enabled optimally. For the design
related questions please contact your representative at Cisco, or a Cisco partner.
50