Cisco Sdwan
Cisco Sdwan
Cisco Sdwan
(Hands-on Experiences)
Internet
Best
Users Applications Effort
WAN
Branch/Campus
Data Center
Then the Way We Worked Changed
Mobile Users
Applications Moving to Not One Cloud, But Many
DC/Private Cloud
Mobile Users
IaaS
Legacy WAN Architecture
IaaS SaaS
• Peer-to-peer control plane
DC1 DC2 (DR)
• Lack of application visibility
• Complex Routing protocol
prorogate for all (N^2) DCI
complexity
• Localize management
• Not scalable
• Impossible to support multiple ISP1(
ISP2
(MPLS/FTTH)
transport MPLS)
• Complex Operations
• High Cost - TCO to operate the
Network
Branch1 Branch2 Branch3
Những hạn chế của mạng WAN truyền thống
STT Yếu tố hạn chế Ảnh hưởng đến mạng/IT
Ảnh hưởng đến ứng dụng, users và IT luôn phải giám sát, review, nâng cấp
1 Thiếu Băng thông WAN thường xuyên
Bị động và ảnh hưởng dịch vụ, mở rộng kinh doanh
Không tận dụng các loại đường Hạn chế trong việc chia sẽ và tận dụng các loại đường truyền khác nhau
2
truyền hiện tại (như MPLS, Internet, LTE, Leased-line,...)
Khả năng nhận diện và Không đánh giá được chất lượng ứng dụng trên các đường truyền WAN,
3
performance của ứng dụng ảnh hưởng hiệu suất của users.
4 Bảo mật Khả năng gia tăng bảo mật tại các Branches, bảo mật cho các ứng dụng
Mở rộng kết nối trực tiếp đến Đánh giá chất lượng đường truyền, ứng dụng để gia tăng hiệu suất truy cập
5
các ứng dụng trên Cloud các ứng dụng trên Cloud.
Quản trị, cấu hình local, không Chi phí vận hành cao, quản lý các Sites phức tạp
6
tập trung Thời gian & công sức quản trị, vận hành, xử lý sự cố.
7 Khó mở rộng các Sites nhanh Ảnh hưởng đến yêu cầu Business và khả năng linh động Sites
8 Chi phí Chi phí vận hành mạng WAN cao (đường truyền, nhân sự, thời gian, issue)
© 2 014 C isco an d/or its a ffil iates. All rig hts re served . Ci sco Syste ms 7
Evolution of the WAN
Cloud delivered WAN with operational
5 simplicity & analytics
End-point flexibility:
• Physical or virtual Cloud Delivered Analytics
1 • Rich services or lite
• Branch, Agg, Cloud
4 Application QoE
USERS 6
Cloud
SD-WAN … Use-Cases
WAN
L EA RN I N G
DC
DNA Center
I N T EN T C O N T EX T
SaaS
Intent- based
Network Infrastructure
vDC
THINGS
S EC U RI T Y
Transport Independent Superior security architecture –
2 WAN Fabric
3 cloud based & on-prem
Cisco Fabric Architectures
Multitenant/ Rich Highly
Cloud-Delivered Analytics Automated
USERS
SDWAN
Cloud
OnRamp
.… IoT
ACI
DC Fabric
DEVICES
APPs
SDA Fabric DC
(branch & campus)
SDWAN Fabric
IaaS
THINGS SaaS
End-to-end Context
SD-WAN Solution Overview
Cisco SD-WAN Introductions
Cisco SD-WAN Solution
Built on Intent-based Networking for the WAN
Transport Independence
Internet MPLS 4G LTE
End-point flexibility
(Physical or Virtual)
Data Center Campus Branch Public Cloud
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Integrated Security
Cisco SD-WAN Solution
Application Secure
Visibility Traffic Per-Segment Perimeter Cloud Cloud Transport
& SLA Engineering Topologies FW/IPS/URL Path Accel Hub
Analytics
Application Policies
Routing Security Segmentation QoS Multicast Svc Insertion Survivability
Monitoring
Delivery Platform
Operations
MPLS
3G/4G-LTE
Colocation
Branch
Internet
Intelligent recommendations
Cisco vAnalytics
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Simplify migration to the cloud
Application quality of experience
Cloud Cloud
Providers Applications
Campus
Branch
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems IaaS/SaaS
Easier to deploy, manage and operate
Centralized cloud managed fabric
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Reduce complexity for remote sites
Single rich services branch platform
SD-WAN
Unified
Communications
Easy to deploy and manage
services on-demand
Application Application
hosting
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems Optimization
End-point flexibility
XE-SDWAN: Expanding Impact of IBN for WAN
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Comprehensive threat protection
Integrated security
VPN 1
Cloud
Router IPSec VPNVPN
3 2 Data Center
Tunnel
VPN 3
Cloud
VPN 4 Security
Internet MPLS
Meet industry compliance with end-to-end Corporate
segmentation Data Center
4G/LTE
Reduce attack surface with cloud and on-
prem security Small Office
Home Office
Talos threat intelligence protects all users
devices
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Campus Branch
Gia tăng an toàn trên SD-WAN với các tính năng bảo mật
Cisco
Enterprise Firewall
Classification of +1400 layer 7 apps
Cisco URL-Filtering
Security Web reputation score using 82+ web
categories
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
Hours instead of weeks and months
Cisco SD-WAN Benefits and Values
© 20 19 Cisco and/or its affiliates . All r ights rese rved. Cisco Sys tems
SD-WAN Solution Overview
Technical
Cisco SD-WAN Solution Principals
vManage
APIs
Management/
Orchestration Plane
3rd Party
vBond Automation
vAnalytics
vSmart Controllers
Control Plane
MPLS 4G
INET
Edge Routers
Data Plane
Cloud Data Center Campus Branch CoLo
Cisco SD-WAN Solution Principals
Network Policy / Forwarding:
• Configuration Points, Control Points,
Enforcement Points, Centralize
Serosity
• Up to 1 Gbps • Up to 10 Gbps
• Up to 100 Mbps
• 8 ports (WAN/LAN) • Modular 1/10GB Ports
• Up to 200 Mbps • Up to 6 Gbps • Up to 20 Gbps • 5 ports (WAN/LAN)
• Next-gen connectivity • Modular • High-performance • 4G LTE & Wireless vEdge 5000
• Performance • Integrated service service w/hardware
flexibility containers assist
• Compute with UCS E • Hardware & software
redundancy • Up to 20 Gbps
• Modular 1/10GB Ports
▪ Strong authentication
- PKI certificates, 2048bit keys
▪ Highly encrypted tunnels
- DTLS/TLS AES256
- White-list model
X.509 Certificate
DTLS/TLS
▪ Ubiquitous Deployment
Control Tunnel - Automatic NAT mitigation
Secure Bring-up With Approval
▪ Cisco generates overlay with unique Organization Name.
▪ Add devices chassis and serial numbers stored in the customer portal.
▪ Customer import ".viptela: 256bit hash file to the controller
▪ Validate each device
Edge
Router
Permanent
DTLS/TLS Control
Org Name Tunnel
Config
Establish Cloud Edge Router Identity
config
system
Certificate system-ip system ip
Authority site-id xxx
vManage organization-name “org name”
vbond xx.xx.xx.xx
Edge Cloud
Untrusted Zone
IF, IF,
Sub-IF Sub-IF
MPLS
Service Transport
(VPNn) (VPN0)
IF, IF,
Sub-IF Sub-IF Internet
Out-of-band Management
(VPN512) • VPNs are isolated from each other, each VPN has its
own forwarding table
IF
• Reachability within VPN is automatically advertised
by the OMP
Edge VPNs and Security Zoning
OMP OMP
MPLS
VPN 20 VPN 0 VPN 20
Centralized Encryption Key Distribution
▪ Each Edge advertises its local IPsec encryption keys as vSmart ▪ Can be rapidly rotated
OMP TLOC attributes Controllers
▪ Symmetric encryption keys used asymmetrically
▪ Encryption keys are per-transport
OMP OMP
Update Update
Local
Local
Transport1
Edge-A Edge-B
Transport2
Remote
Remote
▪ Each Edge advertises its own AES256 IPSec encryption key in control plane updates
▪ IPSec encryption keys are distributed by the vSmart Controllers to all Edges part of a given virtual topology
▪ IPSec encryption keys are frequently rotated (default 24h), new keys are advertised in control plane
updates
End to End Security
vSmart
▪ Each Edge advertises its local
Controllers
IPsec encryption key
Edge Edge
Router Transports
Transports
Transports Router
Remote
Local IPSec AES256-GCM
ESPv3
Remote Local
Site 1 Site 2
Traffic Encrypted
with Key 2 ▪ Symmetric encryption IPsec AES256-GCM
ESPv3, AES256-CBC is used for multicast
Control Plane Traffic Encrypted
with Key 1 ▪ Traffic Encryption and Authentication Header
DTLS/TLS
▪ Tunnel Liveliness Detection (BFD)
▪ Anti-Replay Protection
▪ Rekey 24 hours
DDoS Protection for Edge Routers
vBond
Authenticated
Sources
vSmart vManage
CPU
Implicitly SD-WAN IPSec
Trusted
Sources Control Plane Policing:
Edge ▪ 300pps per flow
▪ 5,000pps
Packet
Explicitly Forwarding
Defined
Sources
Cloud Security
Deny except:
Unknown 1. Return packets matching flow entry (DIA enabled)
Sources 2. DHCP, DNS, ICMP
Other * Can manually enable :SSH, NETCONF, NTP, OSPF, BGP, STUN
DDoS Protection for Controllers
vBond
Authenticated
Sources
vSmart vManage
CPU
Edge
Control Plane Policing:
▪ 500pps per flow
▪ 10,000pps
vManage
Packet
Forwarding
Unknown vSmart
Sources Note: vBond control plane policing is the
same as Edge
Other
Deny except:
DHCP, DNS, ICMP, NETCONF
Data Plane + Local Control Plane Integrated Control and Data Plane
O(n) Control Complexity O(n^2) Control Complexity
High Scale Limited Scale
Overlay Management Protocol (OMP)
vSmart • TCP based extensible control plane protocol
• Runs between WAN Edge routers and vSmart
controllers and between the vSmart controllers
- Inside TLS/DTLS connections
SD-WAN Fabric
TLOCs advertised to vSmarts
with TLOCs as
Edge
in OMP TLOC routes
tunnel endpoints
IPSec
IPSec
Local TLOCs
IPSec (System IP, Color, Encap
MPLS INET
Pub IP/Port, Priv IP/Port)
Edge Edge
Dynamic (OSPF/BGP)
Dynamic (OSPF/BGP) • OMP learns and translates
Static
Static routing information across the
Connected overlay
-
Connected
OMP routes, TLOC routes,
Site2 network service routes
Site1 vSmart - Unicast and multicast address
Overlay families
Management - IPv4 and IPv6 (future)
Protocol
Site3 • Distribution of data-plane
Site4 security parameters and
Connected policies
Connected
Static
Static
• Implementation of control
Dynamic (OSPF/BGP)
Dynamic (OSPF/BGP)
(routing) and VPN membership
policies
Overlay Routing: Network Service Routes
Service
Firewall
TLOCs, Colors Site-IDs and System IP
• TLOC Color used as static identifier for:
• TLOC Interface on Edge device
• Underlay network attachment
• The specific color used is categorized as Private or Public
• Private Colors [mpls, private1-6, metro-ethernet]
• All other colors are public [red, blue,…, public-ethernet,…]
• Private vs Public color is highly significant
vpn 0 vpn 0
interface ge0/0 interface ge0/0
tunnel-interface IPsec Tunnel / BFD Session tunnel-interface
carrier carrier2 carrier carrier4
color mpls color mpls
Transport Locators Colors
Public
T3 T4 T1 T2
Public
T1 T3 T1 T3
T2 T4 T2 T4
Edge Edge Edge Edge
Private
Public
T1, T3 – Public Color T2, T4 – Private Color
T1, T3 – Public Color T2, T4 – Public Color
T1 T3 T2 T4
T1 T3 T2 T4
T1 T4 T2 T3
T1 T4 T2 T3
Color restrict
Color - Control plane tag used for IPSec tunnel establishment logic will prevent attempt to establish IPSec tunnel
to TLOCs with different color
Cisco SD-WAN Topology SITE-ID
vbond61
vsmart66
100.65.0.0/16 MPLS 100.64.0.0/16 INET
vsmart67
TLOC
SYSTEM-IP COLOR
• Unique
Site 3 identifierper-device. Site 4 Site 5 • Each tunnel interface is assigned a “color”
• Router-id for BGP, OSPF
Fabric Operation
Fabric Walk-Through
OMP Update:
vSmart ▪ Reachability – IP Subnets, TLOCs
OMP
▪ Security – Encryption Keys
DTLS/TLS Tunnel
▪ Policy – Data/App-route Policies
IPSec Tunnel
OMP OMP
BFD Update Update
Policies
OMP OMP
Update Update
Edge1 Edge2
T1
Transport1 T3
T3 T4 TLOCs TLOCs T1 T2
T4
T2
VPN1 VPN2 Transport2 VPN1 VPN2
BGP, OSPF, BGP, OSPF,
Connected, Connected,
Static A B C D Static
Subnets Subnets
NAT Traversal Combinations
Public Symmetric
Symmetric Symmetric
Direct IPSec Tunnel No Direct IPSec Tunnel (traffic traverses hub) Mostly Encountered
NAT Traversal – Dual Sided Full Cone
vBond
NAT Detection
Administrator Installer
ZTP/PNP Identity Trust
Server
vManage
DHCP /
Static IP
TPM
Edge
Identity
vSmart vBond (X.509)
Zero Touch Provisioning – vEdge / cEdge
ZTP /PnP Control and Policy
Server Elements
3 5
Full Registration and
1 Configuration
Assumption: 4
▪ DHCP on Transport Side (WAN)
▪ DNS to resolve ztp.viptela.com* ▪ Authentication
▪ DNS to resolve devicehelper.cisco.com*
▪ Push the configuration
* Factory default config ▪ Enforce the version
Edge
Provisioning – Cloud Edge
1 Cloud-Init
VM
NSO 3
Provisioning
(vBranch FP) Tool
5
Full Registration and
2
Configuration
4
Assumption:
▪ DHCP on Transport Side (WAN)
▪ DNS to resolve vBond IP
Edge Cloud
* Factory default config
Automatic IP Detection (Auto IP) for vEdge
ZTP.VIPTELA.COM
Edge PE
Google
8.8.8.8, 8.8.4.4
OpenDNS
208.67.222.222, 208.67.220.220
Level 3 Public DNS Server Addresses
209.244.0.3, 209.244.0.4, 4.2.2.1, 4.2.2.2,
4.2.2.3, 4.2.2.4
ZTP Support for Static IP
#cloud-boothook
system
personality vedge
device-model vedge-C1111-8PLTEEA
host-name SITE1_ISR1K
system-ip
site-id
10.10.10.10
501
organization-name "CustomerXYZ - 12345"
• Supported on SD-WAN XE only
console-baud-rate 9600
vbond 64.1.1.2 port 12346
!
• Useful in situations where ZTP is a
!
!
requirement, but DHCP is not enabled on CE
interface GigabitEthernet0/0/0
no shutdown
ip address 192.168.10.10 255.255.255.0
to PE link (whether MPLS or Internet)
• Upon bootup, SD-WAN XE router will search
exit
!
ip route 0.0.0.0 0.0.0.0 192.168.10.1
Failed
2 Upgrade 1 vManage
Attach Template
Active Software A Rollback
Available Software B
Activate 3
Available Software C Connectivity
2 Lost
1 Available Software D
Rollback
3
vEdge Router vEdge Router
Application Quality of
Experience
Application Visibility
Deep Packet Inspection
Over 3000+ application
App 1
App 2
✓ App Firewall
✓ Traffic prioritization
✓ Transport selection
Tunnel Liveliness Detection
IPSec security
IPSec security
associations
associations
Transports
Transports
Transports
vEdge vEdge
IPSec
Site 1 Site 2
INET
Path 2
App A MPLS
INET
Path1: 10ms, 0% loss, 2ms jitter
Path2: 200ms, 3% loss 5ms jitter
Path3: 140ms, 1% loss 3ms jitter
Optimal Throughput
Application Security and Service Insertion
Conformance and Compliance
▪ Single-touch centralized vSmart
security policy Controllers
- Access Control List
App
- Application Firewalling Policies
ACL / Transports
Transports ACL /
App App
Transports
Network Service
Nodes Data traffic
Control Plane
Optimal Secure Cloud Application Experience
Balanced Approach Between Cost and User Experience
▪ Geographically regionalized vSmart ▪ Local secure cloud
secure cloud application Controllers application access
access App
Policies
Transports
Transports
Transports
Regional DC/Colo
vEdge
Regional DC/Colo
Firewall
Internet
Cloud
Applications
Common Data Plane Communication
SLA SLA
90 days
• Real-time visibility
• Historical Visibility
vManage • Troubleshooting Tools
Licensing • Capacity Utilization
Part of Enterprise License • Network Utilization
vAnalytics – Customer Data
Data Transfer and Storage
• Client authenticated and data securely
vAnalytics transmitted from vManage to vAnalytics
Clusters Data Lake
• Data storage isolation between customers
• No PII (Personal Identifiable Information) is
collected
Data Correlation and Algorithms
• Only management data (stats, flows)
information collected
• All algorithms visualization done on a per-
customer basis
• IP Addresses collected for provider look-ups
• Peer benchmarking (future use cases) only
on a group basis. No individual customer
data used
vAnalytics Main Dashboard
Network Availability App vQoE
Carrier
App Bandwidth
Performance
Tunnel
App Anomalies
Performance
Application Forecasting
Circuit Forecasting
Cloud onRamp for SaaS / IaaS
Shifts in Enterprise Workloads
IaaS SaaS
ISP1 ISP1
SD-WAN SD-WAN
ISP2 Fabric MPLS Fabric
Data Center Data Center
Remote Site Remote Site
Cloud
• One Virtual WAN Edge router per
Data Center VPC/VNET
- No multicast support, can’t form VRRP
- No router redundancy
SD-WAN
• Virtual WAN Edge routers join the fabric, all
Fabric
Campus fabric services are extended to the IaaS
Remote Site instances, e.g. multipathing, segmentation
and QoS
- For multipathing, can combine AWS Direct
Connect or Azure ExpressRoute with direct
Branch internet connectivity
Cloud onRamp for IaaS - AWS
Standard IPSec + BGP
(2x) SD-WAN • VGW for host VPCs
VPC
BGP <-> OMP
AZ1
• Gateway VPC per-region
- Multiple for scale
VPC
AZ2
VGW
• Standard based IPSec
AZ1 INET - Connectivity redundancy
Host VPC WAN Edge
MPLS
• BGP across IPSec tunnels for route
AZ2 Direct advertisement
VPC WAN Edge Connect - Active/active forwarding
AZ1 - BGP into OMP redistribution
Gateway VPC
Advertise default route to host
VGW VPCs
AZ2
• Optional Direct Connect
Host VPC
AWS Region
vManage
Cloud onRamp for IaaS - Azure
Standard IPSec + BGP
(2x) SD-WAN • VPN GW for host VNETs
VNET
BGP <-> OMP
AS1
• VNET Gateway per-region
- Multiple for scale
VNET
VPN
AS2 GW • Standard based IPSec
INET - Connectivity redundancy
Host VNET WAN Edge
AS
MPLS
• BGP across IPSec tunnels for route
Express advertisement
-
VNET WAN Edge Route Active/active forwarding
GW
AS1 - BGP into OMP redistribution
VNET Gateway
Advertise default route to host
VPN
GW VNETs
AS2
• Optional Express Route
Host VNET
Azure Region
vManage
Cloud onRamp for IaaS Dashboard
• Centralized provisioning
wizard on vManage
• No need to operate
marketplace
Questions
Direct Internet Access and
Branch Security
SD-WAN – Branch Security
I need to protect my sensitive I need to protect my company I want to reduce expenses and I want to leverage the local
data (card holder data, patient against liability and prevent provide better user experience internet path for all internet
data) against data breaches guest users from disrupting my for cloud apps. If I open up my traffic; I need to protect
before during and after a network when browsing the branch office to the internet I myself against potential
transaction. internet via guest wi-fi. increase the attack surface and threats coming into my
I need to protect my network. network.
On-site Services
© 2018 Cis co and/or its affiliates . All rights reserved . Cisco Systems
URL Filtering Requests for “risky” domain requests
© 2018 Cis co and/or its affiliates . All rights reserved . Cisco Systems
App-aware Firewall SaaS
Internet
• Application visibility and granular control
by category or individual application
Inspect policy allows
• 1400+ applications classified only return traffic to be Outside Zone
allowed and drops any
• Prevent lateral movements of threats new connections
(e.g. printing service should not create
new connections to employee network)
Edge Device
• PCI compliance
Inside IoT
Users Zone Zone Devices
Service-VPN 1 Service-VPN 2
© 2018 Cis co and/or its affiliates . All rights reserved . Cisco Systems
Roadmap
Advanced Malware 1HCY19
Protection(AMP)
AMP
ThreatGrid
© 2018 Cis co and/or its affiliates . All rights reserved . Cisco Systems
Cisco Umbrella Cisco Umbrella
DNS-layer Enforcement
Safe Blocked
• Leading security efficacy for malware, requests requests
phishing, and unacceptable requests by
blocking based on DNS requests
• Supports DNScrypt
© 2018 Cis co and/or its affiliates . All rights reserved . Cisco Systems
Manage and Monitor by vManage
Security Profiles
Customer Persona Security Profile Platform requirements
Untrusted Zone
IF, IF,
Sub-IF Sub-IF
MPLS
Service Transport
(VPNn) (VPN0)
IF, IF,
Sub-IF Sub-IF Internet
Out-of-band Management
(VPN512) • VPNs are isolated from each other, each VPN has its
own forwarding table
IF
• Reachability within VPN is automatically advertised
by the OMP
End to End Segmentation
Interface
▪ Isolated virtual private networks across any VPN 1
IPSec
transport Tunnel
VLAN VPN 2
▪ VPN mapping is based on physical vEdge Router VPN 3
interface, 802.1Q VLAN tag or a mix of both
Prefix
Site 1
IF
IF
Transports
Transports
VPN 1 Use Cases
IF
▪ Security Zoning
VPN 2 802.1q
IF ▪ Compliance
VPN 3
▪ Guest WiFi
802.1q Data Center
▪ Multi-Tenancy
Site 2 ▪ Extranet
Full-Mesh Hub-and-Spoke
• Each VPN can have it’s own topology
- Full-mesh, hub-and-spoke, partial-mesh,
point-to-point, etc…
VPN1 VPN2 • VPN topology can be influenced by
leveraging control policies
- Filtering TLOCs or modifying next-hop
TLOC attribute for routes
FW
• Service can be L3 routed or L2 bridged
VPN1 • Service can be singly or dually connected
VPN1 (Firewall trust zones) to the advertising vEdge
• Control or data policies are used to insert the
VPN1 service node into the matching traffic forwarding
Regional
Data path
Hub
Center - Match on 6-tuple of DPI signature
MPLS INET - Applied on ingress/egress vEdge
Remote 4G
Office
* For data policy only. Control policy enforced on vSmart.
Multiple Services Chaining
vSmart
Policy
Advertisement*
Traffic Path • vEdge routers with connected L4-L7 service make
Control Plane Service advertisement
Advertisement - Service route OMP address family
- Services VPN labels
FW IDS
• Services are advertised in specific VPN
• Services can be L3 routed or L2 bridged
VPN1
• Services can be singly or dually connected to the
VPN1 advertising vEdges
VPN1
Regional
• Control or data policies are used to insert the
Hub Data service nodes into the matching traffic forwarding
Center path
MPLS INET
- Match on 6-tuple of DPI signature
4G - Applied on ingress/egress/service vEdge
Remote
Office
* For data policy only. Control policy enforced on vSmart.
Questions
SD-WAN Controllers Component,
Design & Deployment
vManage, vSmart, vBond
Controller Deployment Models
vManage
vSmart vBond
Cisco Private
Cloud Cloud
Cloud-Delivered On-Prem
AWS, MS-Azure KVM, ESXi
Controller Tenancy
Single Tenant Multi Tenant
vManage vBond vManage vBond
1 1 1 2 3 1 2 3
VM VM VM VM
VM/ VM/
Container Container
1 1 2 3
Export Import
Cloud
Cloud Network
Network
Edge
DMZ
DMZ
DC Perimeter
DC Perimeter Core Firewall
Core Firewall
CE
CE
MPLS INET
MPLS INET
vEdge
Remote DC
vEdge INET vEdge
MPLS
On-Prem Controller
On-Premise
Controller
Remote DC
vEdge INET vEdge
MPLS L3 Switch
or Router
How to Deployed
On-Premise Controllers
Requirements On-Premise Controller
1. Production Two (2) Servers (refer to sizing guide)
2. Five (5) Controllers (Server1: VM, VS1, VB1. Server2: VS2, VB2)
6. Download Image and install control component (Refer to step by step guide)
7. Configure basic configuration and settings (Refer to the controller basic configuration)
8. Request for the Certificate and approve by Cisco Team (Cisco SD-WAN Champion or Account Team)
Firewall
Hash
DNS 2 permanent connection
Hash
per-transport
1 transient connection 1 permanent connection
# Tunnels
OSPF/BGP
WAN Edge WAN Edge VRRP Grp 1 Edge
A B A B
VRRP Grp 2
VLAN 1
Service
Site Router Site Router VLAN 2
Side
MPLS Internet
MPLS Internet MPLS Internet
Transport
WAN WAN WAN WAN
Side
WAN WAN
Edge Edge Edge Edge Edge Edge
A B A B A B
Transport Redundancy – TLOC Extension
Site Network
TLOC Extension Configuration
Advertise 2.2.18.0/30
to the MPLS. Next
hop 2.2.16.3
VE120-A VE120-B
INT MPLS
vpn 0 vpn 0
dns 8.8.4.4 secondary dns 8.8.4.4 secondary
dns 8.8.8.8 primary dns 8.8.8.8 primary
! !
interface ge0/1 interface ge0/1
mtu 1504 mtu 1504
no shutdown no shutdown
! !
interface ge0/1.2 interface ge0/1.1
ip address 2.2.18.6/30 ip address 2.2.18.2/30
tloc-extension ge0/0 tloc-extension ge0/0
! !
no shutdown ge0/0 no shutdown
ge0/0
! 2.2.15.3/24 2.2.16.3/24 !
interface ge0/1.1 ge0/1.1 ge0/1.1
interface ge0/1.2
ip address 2.2.18.1/30 2.2.18.1/30 2.2.18.2/30 ip address 2.2.18.5/30
tunnel-interface tunnel-interface
encapsulation ipsec encapsulation ipsec
color mpls restricted color gold
…… ge0/1.2 ge0/1.2
……
no shutdown 2.2.18.6/30 2.2.18.5/30 no shutdown
! VE120-A VE120-B !
ip route 0.0.0.0/0 2.2.15.1 ip route 0.0.0.0/0 2.2.16.1
ip route 0.0.0.0/0 2.2.18.2 ip route 0.0.0.0/0 2.2.18.6
Questions
Policy Framework
Policy Framework
vManage
VPN Membership
(Fabric Routing+Segmentation)
OMP OMP
Data Policy:
Extensive Policy-based Routing
Control Policy: and Services
Routing and Services
App-Route Policy:
VPN 1
WAN
App-Aware SLA-based Routing
VPN 2
VPN 1
WAN
VPN 2
• Control Policies are applied at vSmart: Tailors routing information advertised to Edge endpoints
• App-Route Policies are applied at Edge: SLA-driven path selection for applications
5 4
Data Plane Complexity is O(n^2)
¹ Assumes single WAN Edge per-site
Topology – Centralized Hub and Spoke
1 M
• SD-WAN tunnels only between spoke WAN
Edge nodes and headend WAN Edge nodes
• M tunnel scale at spoke WAN Edge
• N¹ tunnel scale at hub WAN Edge
T1 T2 • Doubled tunnel scale in case of dual
transports
• High tunnel capacity WAN Edge at the hub
• Low tunnel capacity WAN Edge at the spoke
1 2 3 N
• Control policies are applied and executed on vSmart to influence routing in the Overlay domain
• Problem:
Overlay with a dis-contiguous data plane and endpoints need to communicate end-to-end
App-Route Policies
Centralized Policy for enabling SLA-driven routing on Edge endpoints
• App-route policies:
• Applied on vSmart
• Advertised to and executed on Edge
• Monitors SLAs for active overlay paths to direct Applications along qualified paths
• Allows for the use of L3/L4 keys or DPI Signatures for application identification
4G/LTE
mpls
#
VPN 1
public-internet Broadband
VPN 2
lte
Data Policies
Policy-driven Routing and Service Enablement
• Data policies:
• Applied on vSmart
• Advertised to and executed on Edge
• A Data policy acts on an entire VPN and is not interface-specific
• Data Policies are used to enable the following functions and services:
• Application Pinning
• NAT/DIA
• Classification, Policing and Marking
• and more …
• The Data Policy is a very powerful tool for any type of data plane centered traffic management
Questions
Pre-Sale Guideline
DNA Licenses Offering
Cisco SD-WAN Solution pricing
Cloud Management
Cisco vManage*
License for
Hardware License
desired
price features
Bandwidth
DNA Premier
DNA Advantage Single
SKU
3/5 Year Subscription