Cisco Virtual Update Cisco Sdwan Viptela
Cisco Virtual Update Cisco Sdwan Viptela
Cisco Virtual Update Cisco Sdwan Viptela
Per Jensen
[email protected]
June 27th 2018
Agenda
Overview
Selective “Deep-Dive”
Bonus
Licensing
Overview
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Intent-based networking for the branch and WAN
Transport
independence
Learning
Centralized cloud Application quality
managed fabric of experience
Intent Context
Security
End-point Integrated
flexibility security
Cisco SD-WAN
Intent-based networking for the branch and WAN
Better user experience
4x Improved application
experience
Deploy applications in minutes on any platform
with consistent application performance
Greater agility
40% WAN opex
savings B ra nch Simplify the deployment and operation of
your WAN and get faster performance
using less bandwidth
Selective “Deep-Dive”
Bonus
Licensing
Cisco SD-WAN Solution Elements
Orchestration Plane
Orchestration Plane
vManage
Cisco vBond
APIs
3rd Party
vAnalytics • Orchestrates control and
Automation
management plane
vBond • First point of authentication
(white-list model)
vSmart Controllers • Distributes list of vSmarts/
vManage to all vEdge routers
MPLS 4G
• Facilitates NAT traversal
INET • Requires public IP Address
vEdge Routers
[could sit behind 1:1 NAT]
• Highly resilient
vEdge vEdge
VS
Note: vEdge routers need not connect to all vSmart Controllers
Controllers
Deployment Methodology
On-Premise Hosted
vBond vManage vSmart vSmart vBond vManage vSmart vSmart
VM VM
vEdge 100
VM Throughput: VM
Physical Server 2x vCPU 500Mb/s
4x vCPU 1Gb/s
8x vCPU 1.5Gb/s
Agenda
Overview
Selective “Deep-Dive”
Bonus
Licensing
BFD
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bidirectional Forwarding Detection (BFD)
vEdge
• Path liveliness and quality measurement detection
protocol
- Up/Down, loss/latency/jitter, IPSec tunnel MTU
• Runs between all vEdge and vEdge Cloud routers in
the topology
- Inside IPSec tunnels
vEdge vEdge
- Operates in echo mode
- Automatically invoked at IPSec tunnel establishment
- Cannot be disabled
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Full Cone NAT
vEdge1 (192.168.1.1) NAT (Full Cone) vBond (203.0.113.1) vEdge2 (198.51.100.1)
Src=192.168.1.1:12346 Src=192.0.2.1:12346,
Dst=203.0.113.1:12346 Dst=203.0.113.1:12346
Src=203.0.113.1:12346 Src=203.0.113.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:12346
Src=192.168.1.1:12346 Src=192.0.2.1:5678,
Dst=203.0.113.1:12346 Dst=203.0.113.1:12346
Src=203.0.113.1:12346 Src=203.0.113.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:5678
Src=198.51.100.1:12346
Dst=192.0.2.1:5678
X
Src=192.168.1.1:12346 Src=192.0.2.1:5678,
Dst=198.51.100.1:12346 Dst=198.51.100.1:12346
Src=198.51.100.1:12346 Src=198.51.100.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:5678
• Any external host can send packet to internal IP address if the internal device initiates a
connection to the external host using previously created address mappings
Port Restricted Cone NAT
vEdge1 (192.168.1.1) NAT (Port Restricted Cone) vBond (203.0.113.1) vEdge2 (198.51.100.1)
Src=192.168.1.1:12346 Src=192.0.2.1:5678,
Dst=203.0.113.1:12346 Dst=203.0.113.1:12346
12346
Src=203.0.113.1:12446
12446
Dst=192.0.2.1:5678
X
Src=203.0.113.1:12346 Src=203.0.113.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:5678
• Similar to Address restricted cone NAT with ports added to the mapping
Symmetric NAT
vEdge1 (192.168.1.1) NAT (Symmetric) vBond (203.0.113.1) vEdge2 (198.51.100.1)
Src=192.168.1.1:12346 Src=192.0.2.1:5678,
Dst=203.0.113.1:12346 Dst=203.0.113.1:12346
Src=203.0.113.1:12346 Src=203.0.113.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:5678
Src=192.168.1.1:12346 Src=192.0.2.1:9012
9012,
9012
Dst=198.51.100.1:12346 Dst=198.51.100.1:12346
Src=198.51.100.1:12346 Src=198.51.100.1:12346
Dst=192.168.1.1:12346 Dst=192.0.2.1:9012
Src=198.51.100.1:12346
Dst=192.0.2.1:5678
X
• Request from the same internal IP address and port to a specific destination IP
address and port is mapped to a unique external source IP address and port
• Only an external host that receives a packet from an internal host can send a
packet back
NAT Traversal Combinations
Side A Side B IPSec Tunnel Status
Public Public
Public Symmetric
Symmetric Symmetric
Direct IPSec Tunnel No Direct IPSec Tunnel (traffic traverses hub) Mostly Encountered
NAT Traversal – Dual Sided Full Cone
vBond
NAT Detection • vBond discovers post-NAT
IP1’ IP2’
public IP and communicates
Port1 Port2 back to vEdges
vSmart - STUN Server
• vEdges notify vSmart of their
post-NAT public IP address
NAT Filter: NAT Filter:
Any source IP/Port Any source IP/Port • NAT devices enforce no filter
IP1’ Full Full IP2’ - Full-cone NAT
Port1 Cone Cone Port2
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Policy Framework
vManage
NETCONF/YANG
OMP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
End-to-End Segmentation
VPN 1
Interface VPN1 SD-WAN VPN1 Interface
IPSec VPN 2
VLAN VPN2 Tunnel VPN2 VLAN
VPN 3
Ingress Egress
vEdge vEdge
• Segment connectivity across fabric w/o • Labels are used to identify VPN for
reliance on underlay transport destination route lookup
• vEdge routers maintain per-VPN routing • Interfaces and sub-interfaces (802.1Q
table tags) are mapped into VPNs
Topologies
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Arbitrary VPN Topologies
Full-Mesh Hub-and-Spoke
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Visibility and Recognition
Cloud
Data Center App 1
App 2
App 3,000
Data Center vEdge Router
MPLS 4G
INET
App Firewall
Small Office
Home Office Traffic prioritization
Campus
Transport selection
Branch
Critical Applications SLA
vEdge Routers continuously vManage App Aware Routing Policy
perform path liveliness and App A path must have:
Latency < 150ms
quality measurements Loss < 2%
Jitter < 10ms
Internet
Remote Site
MPLS Regional
Path 2 Data Center
4G LTE
Path1: 10ms, 0% loss, 5ms jitter
Path2: 200ms, 3% loss, 10ms jitter
Path3: 140ms, 1% loss, 10ms jitter IPSec Tunnel
Cloud Adoption
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Direct Internet Access
• Can use one or more local DIA exits or
Internet backhaul traffic to the regional hub through
the SD-WAN fabric and exit to Internet from
there
- Per-VPN behavior enforcement
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Site Redundancy - Routed
Redundant pair of vEdge routers operate in
active/active mode
SD-WAN
Fabric vEdge routers are one or more Layer 3 hops away
from the hosts
Standard OSPF or BGP routing protocols are
running between the redundant pair vEdge routers
vEdge A vEdge B and the site router
Bi-directional redistribution between OMP and
OSPF/BGP and vice versa on the vEdge routers
Site
Router
- OSPF DN bit, BGP SoO community
vEdge B
VRRP Active vEdge responds to ARP requests
vEdge A
VRRP Active VRRP Standby for the virtual IP with its physical interface MAC
VRRP
address
- No virtual MAC
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Simplified Management
Single Pane Of Glass Operations Rich Analytics
Power Tools
Selective “Deep-Dive”
Bonus
Licensing