Cisco Secure Sd-Wan (Viptela) - Single Dcv1: Americas Headquarters
Cisco Secure Sd-Wan (Viptela) - Single Dcv1: Americas Headquarters
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
About
Topology
Note OSPF is running in the DC and Branch 2 in VPN 10. All other segments are using static routing/VRRP.
e0124tNPiS
V
DtseTI(
)PI
01.0210C
.1.0D
1X
0h1c.0214n0.a3.0rB
31
1
Device Addresses
System IP Interface IP
vSmart1 198.18.1.12
vSmart1 198.18.1.22
Get Started
Сonnect to the workstation with Cisco AnyConnect VPN and the local RDP client on your laptop
Note Deploy a branch using vManage configuration templates and Viptela’s Zero Touch Provisioning (ZTP)
service.
The ZTP process simulated in this lab, using default configuration from the factory, for the vEdge in
Branch 2.
The only difference is the out of band VPN 512 configuration. This is configured for the demo user to
be able to log in to the vEdge. The ZTP transport (ge0/0) in this case is in shutdown mode. A no shut
will be done to simulate connecting vEdge to the transport.
vManage Overview
Procedure
Step 4 Load the vManage dashboard. Talk about network level monitoring capabilities including:
• Up/Down Status of all Viptela components
• vEdge Health
• Applications/Flow Visibility
• Transport Health Visibility
Step 5 Click the number associated with WAN Edge to view operational devices.
Configuring Templates
Note Multiple preconfigured templates are available. We use the preconfigured BranchType2 template to
illustrate how a customer can use a template to facilitate and simplify the roll out of a new branch site.
Procedure
Step 1 In the main menu in the sandwich icon on top-left corner, select Configuration > Templates, and then select
the Device Templates tab.
Step 2 Click the three dots (…) in the far right column for BranchType2Template-vEdge and select Attach Devices.
Step 3 In the Available Devices pane, find and select the device with chassis-id/UUID of
52c7911f-c5b0-45df-b826-3155809a2a1a. Click the arrow to move the selected device to the Selected Devices
pane. Click Attach
Step 4 Click the three dots (…) in the far right column and select Edit Device template.
Step 5 Show that the device values can be updated from this window. However, we use a .csv file to populate the
device in the remainder of this scenario. Click Cancel when done.
Step 6 Click .
Step 7 Click Choose File. Navigate to \Desktop\SD-WAN Demo\csvConfigFiles and select
BranchType2Template.csv. Click Open.
Step 11 Wait for few seconds until the device status changes from In Progress to Done - Scheduled.
Step 1 From the desktop, double-click the Python script named TurnUp-BR2-INET-Connection.py.
Note At this time, there is no policy defined for the overlay and hence we have full-mesh connectivity
across all three VPNs (10, 20, 40).
Step 5 Click Control Connections. Validate that control sessions are established to vSmart and vManage.
Step 6 To validate IP reachability within Branch2 VPN10, ping the VPN10 test host at 10.4.10.10. Open the
mRemoteNG application.
Note (Optional) after running ZTP, you can confirm that DIA has been enabled over the Branch2-Clients
for VPN 10-40. Do this by checking the clients over mRemoteNG where RDP is already
preconfigured.
Step 9 Return to the vManage browser tab. From the main menu, select Monitor > Geography.
Step 10 Hover your mouse over devices on the map to see the device details.
Step 11 From the main menu, select Monitor > Devices. From the device list, select BR2-VEDGE1.
Step 12 To view granular application network profile data, click SAIE Applications.
Note Before checking SAIE, it may take 15 minutes after performing ZTP to see output.
Step 13 Click 1h
Note If data does not display, adjust the custom window to a shorter date range.
Step 14 Click Interface. Click 1h to see utilization of the interfaces on the Edge device.
Step 1 From the vManage main menu, select Monitor > Devices.
Step 2 Click BR2-VEDGE1.
Step 3 Click Tunnel.
The next screen shows IPSec tunnels are established to the DC and the remote Branch-1 (full mesh).
Note The results of the trace routes in this scenario illustrate a direct (i.e. spoke-to-spoke) path taken from
Branch2 to hosts within VPNs 10 and 20 at Branch1.
Step 6 For Destination IP enter 10.3.10.10, from VPN select VPN 10, and from Source/Interface for VPN 10
select the only available option. Click Start.
Note The output on your screen may not be exactly like the screen shown in the guide. If traceroute times
out, please retry, this is an expected behavior.
Step 7 For Destination IP* enter 10.3.20.10, for VPN select VPN 20, and for Source/Interface for VPN 20 select
the only available option. Click Start.
Note The output on your screen may not be exactly like the screen shown in the guide.
Configure Policies
Procedure
Step 4 Click on Activate one more time over the configuration to be pushed, and then wait until the policy activation
status changes to Success.
Note The policy is applied to the vSmart controllers. vSmart will process the policy and advertise the
correct TLOC and route information to the appropriate vEdge routers to achieve the expected result.
Step 5 From the main menu, select Monitor > Devices. Click BR2-VEDGE1.
Step 6 Click Tunnel
Note Point out that only tunnels to the DC vEdges are in an operational UP state.
The tunnels highlighted on your screen may not be exactly like the screen shown in the guide.
However, the tunnels to the DC vEdges will be the only tunnels in an operational/up state.
Note Point out that the inter-branch traffic path now traverses the DC for VPN 20.
The output on your screen may not be exactly like the screen shot shown in the guide.
Step 9 To de-activate the policy, from the main menu, select Configuration > Policies.
Step 10 Click the three dots (…) to the right of the StrictHub-n-Spoke policy name policy, and then click Deactivate
two times.
Note The policy status changes from In Progress to Success, and the policy is successfully removed from
vSmart-1 and vSmart-2. Full mesh connectivity has been restored.
Step 4 When the policy has successfully pushed to each vSmart, the activation status changes to Success.
Step 1 From the main menu, select Monitor > Devices. Click BR2-VEDGE1.
Step 2 Click Troubleshooting, and then click Trace Route.
Step 3 For Destination IP enter 10.3.10.10, for VPN select VPN 10, and for Source/Interface for VPN 10 select
the only available option. Click Start.
Note If the output yields no results, click Start again or redo the entire trace route steps above.
The output on your screen may not be exactly like the screen shown in the guide.
Step 4 To de-activate the policy, from the main menu select Configuration > Policies.
Step 5 Click the three dots (…) to the right of the MultiTopologyPolicy policy name and click Deactivate.
Procedure
Step 4 In the main menu, select Monitor > Devices. Click BR2-VEDGE1.
Note You can see that traffic between branches is being rerouted through the data center where a firewall
is inspecting traffic.
Step 7 For Destination IP enter 10.3.20.10, for VPN select VPN 20, and for Source/Interface for VPN 20 select the
only available option. Click Start.
Note If the output yields n/a results, click Start again or redo the entire trace route steps above.
The output on your screen may not be exactly like the screenshot that is shown in the guide.
The policy status changes from In Progress to Success, and the policy is successfully removed from each
vSmart.
Procedure
Step 6 Validate the connectivity from BR2-VEDGE1 to the test host in Branch3 in VPN 20 using the destination IP
of 10.3.20.10. Click Ping.
Step 8 Click the three dots (…) to the right of the MultiTopologyPlusACL policy and select Activate.
Note You can revise the configuration being pushed to the controllers to make this policy successfully.
Click Activate one more time:
Step 16 Validate there is no connectivity from Branch2 in VPN 20 using the destination IP of 10.3.20.10. Click
Ping.
Note The ping fails due to centralized ACL blocking communication between the branches for PCI/IOT
segment.
Step 17 To de-activate the policy, in the main menu, select Configuration > Policies.
Step 18 Click the three dots (…) to the right of the MultiTopologyPlusACL policy name and select Deactivate.
The policy status changes from In Progress to Success, and the policy is successfully removed from vSmart-1
and vSmart-2. Full mesh connectivity has been restored.
Note These values are much lower than the SLA definitions defined for the app-route policies.
Step 10 Scroll to the right to see the columns showing Mean Loss, Mean Latency, and Mean Jitter for each of the
tunnels on MPLS and Internet.
Note Simulate Flows provides a simulation on what IPSec tunnels will used for the defined flow based
on policies and transport performance measurements.
Note This shows that the traffic class with DSCP of 46 will go over MPLS as it meets the SLA (latency
<= 50msec) and is the preferred color.
WAN Impairment
Procedure
Step 1 Open a new tab in Chrome and click the WAN Impairment bookmark.
Note You can go back to Monitor > Devices > BR2-VEDGE1, select Real Time, Select App Routes
Statistics. On Select Filter, click Do Not Filter, and finally confirm how much Mean Loss, and
Latency values have increased:
Step 5 Return to the WAN Impairment Tool browser tab and click Remove Latency. Close the browser tab.
Step 6 To de-activate the policy, from the main menu, select Configuration > Policies.
Step 7 Click the three dots (…) to the right of the MultiTopologyPlusAppRoute policy name and select Deactivate.
Note The policy status changes from In Progress to Success, and the policy is successfully removed from
vSmart-1 and vSmart-2. Full mesh connectivity has been restored.
Remember It may take 15 minutes after the demo has fully launched to start seeing dashboard activity for the
SD-WAN Security dashboard, please plan accordingly. If after 20 minutes, the dashboard hasn’t populated
(this is a known issue that will be fixed in the next release), please start a new session.
View Templates
Procedure
Step 3 From the main menu, select Configuration > Templates > Device Templates.
Step 4 Click the three dots (…) to the right of CSR_BranchType1Template-CSR and then select View.
Step 5 Click Additional Templates to jump to the bottom of the page, where Security Policy is listed.
Note Notice the Security Policy and the Container Profile. The Container runs the snort IPS engine.
Procedure
Step 3 Click Firewall. Click the three dots (…) to the right of BRANCH-DIA-GUEST and select View to see the
firewall rules in effect.
Note Due to a visual bug in vManage, the implicit deny rule (called Drop) shows above the other rules.
It will NOT take effect before the configured rules.
Notice that this firewall is zone-based and is configured to inspect traffic from the Guest VPN to
the Outside.
The rules are allowing traffic from the branch subnets and the traffic is being inspected.
Step 5 Click Intrusion Prevention. Click the three dots (…) to the right of Branch-DIA-IPS and select .
Value Proposition: Notice that there is only 1 VPN targeted, which is the Guest VPN. We can select a security
posture as well as detect or protect against attacks. The SD-WAN IPS is based on Snort which uses Cisco
Talos signatures, and while not as granular as the full Firepower offering should meet 99% of remote office
needs.
Step 8 Click URL Filtering. Click the three dots (…) for Branch-DIA-URL-Filter and select View.
Note The URL Filtering policy is functionally like the expanded Cisco Web Security Appliance (WSA)
offering. Though not as granular as the full WSA appliance, the URL Filtering offering in SD-WAN
Security allows you to customize category/reputation, specify a block page (or redirect per something
like ISE), as well as to customize a whitelist/blacklist.
Value Proposition: Advanced Malware Protection (AMP) provides cloud-based file reputation checking,
while Threat Grid's behavior-based deep file analysis can help detect and stop zero-day and polymorphic
malware threats.
Step 10 Click Advanced Malware Protection. Click the three dots (…) for BRANCH-DIA-AMP and select View.