Sdwan Dic
Sdwan Dic
Sdwan Dic
Access
Solutions Adoption Prescriptive Reference: Design & Deployment
Guide
August, 2020
1
Table of contents
Introduction .................................................................................................................................................................................................................. 5
About the Solution................................................................................................................................................................................................... 5
About this Guide ...................................................................................................................................................................................................... 5
Define – SD-WAN Direct Internet Access introduction ................................................................................................................................................ 6
Audience .................................................................................................................................................................................................................. 6
Purpose of this Document ....................................................................................................................................................................................... 6
Overview .................................................................................................................................................................................................................. 6
Benefits of using DIA include ................................................................................................................................................................................... 6
Prerequisites to Deploying Direct Access to the Internet ....................................................................................................................................... 6
Design – Cisco SD-WAN Direct Internet Access Use Cases .......................................................................................................................................... 8
Use Cases ................................................................................................................................................................................................................. 8
Use case #1 – DIA for remote-site internal employees ...................................................................................................................................... 8
Use case #2 - DIA for guest user access .............................................................................................................................................................. 8
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations ........................................................................................ 10
Direct Internet Access Design ................................................................................................................................................................................ 10
SD-WAN DIA Design Components ......................................................................................................................................................................... 10
Segmentation.................................................................................................................................................................................................... 11
Network Address Translation ........................................................................................................................................................................... 12
Centralized Data Policy ..................................................................................................................................................................................... 13
NAT DIA Route .................................................................................................................................................................................................. 15
How NAT DIA Routes Work .............................................................................................................................................................................. 15
Leverage centralized data policy and NAT DIA route to deploy DIA ................................................................................................................ 15
NAT Tracker ...................................................................................................................................................................................................... 17
SD-WAN DIA Failover Scenarios ............................................................................................................................................................................ 18
SD-WAN L3 Distribution Switch ............................................................................................................................................................................. 19
SD-WAN Remote-Site Design Details .................................................................................................................................................................... 19
SD-WAN Single-Router Hybrid Remote-Site Design ......................................................................................................................................... 19
SD-WAN Dual-Router Hybrid Remote-Site Design ........................................................................................................................................... 21
SD-WAN Single-Router Dual Internet Remote-Site Design .............................................................................................................................. 24
SD-WAN Dual-Router Dual Internet Remote-Site Design ................................................................................................................................ 26
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites.................................................................................................................................... 30
Prerequisites .......................................................................................................................................................................................................... 30
Process: Verify WAN Edge router prerequisites.................................................................................................................................................... 30
Step 1: Verify Cisco Edge devices in vManage.................................................................................................................................................. 30
Step 2: Configure Device Template for the Cisco WAN Edge Devices to Participate in SD-WAN Overlay ...................................................... 31
Step 3: Deploy the Device Template to the Cisco WAN Edge devices that will be used ................................................................................. 32
2
Procedure 3: Verify NAT Feature Configuration............................................................................................................................................... 38
Deploy - Cisco SD-WAN Direct Internet Access Configuration ................................................................................................................................... 42
Deploying Cisco SD-WAN DIA Configuration ......................................................................................................................................................... 42
Procedure 1: Use Case #1 - Create Centralized Data Policy to Redirect Employee Traffic ............................................................................. 42
Alternate Method to Deploy Traffic Data Policy .............................................................................................................................................. 62
Procedure 2: Use Case #2 - Create NAT DIA Route to Redirect Guest Internet .............................................................................................. 66
Configuration of System Tracker ...................................................................................................................................................................... 74
Operate - Cisco SD-WAN Direct Internet Access Monitoring..................................................................................................................................... 78
Monitor, Troubleshoot and Manage Cisco SD-WAN Direct Internet Access ........................................................................................................ 78
Step 1: Monitor DIA sessions based on the NAT Translations ........................................................................................................................ 78
Step 2: Monitor the configured data policy for traffic flow ............................................................................................................................ 79
Step 3: Understand the overall routing table for Service Side VPN for NAT DIA route .................................................................................. 80
Appendix A: New in this guide ................................................................................................................................................................................... 81
Appendix B: Hardware and software used for validation .......................................................................................................................................... 82
Appendix C: DIA Deployment Example ...................................................................................................................................................................... 83
Appendix D: Cisco WAN Edge configuration summary (Templates) .......................................................................................................................... 85
System feature template .................................................................................................................................................................................. 85
Logging feature template ................................................................................................................................................................................. 85
NTP feature template ....................................................................................................................................................................................... 86
OMP feature template...................................................................................................................................................................................... 86
VPN 1 interface Ethernet Loopback0 ............................................................................................................................................................... 86
BFD feature template ....................................................................................................................................................................................... 87
Security feature template ................................................................................................................................................................................. 87
VPN 512 feature template ................................................................................................................................................................................ 87
VPN 512 interface feature template ................................................................................................................................................................ 88
VPN 0 feature template .................................................................................................................................................................................... 88
VPN 0 BGP feature template ............................................................................................................................................................................ 89
VPN 0 Interface feature template .................................................................................................................................................................... 89
VPN 1 feature template .................................................................................................................................................................................... 96
VPN 1 Interface feature template .................................................................................................................................................................... 96
VPN 1 OSPF feature template........................................................................................................................................................................... 97
VPN 2 feature template .................................................................................................................................................................................... 98
VPN 2 Interface feature template .................................................................................................................................................................... 98
VPN 2 OSPF feature template........................................................................................................................................................................... 99
VPN 0 Datacenter feature template ............................................................................................................................................................... 100
VPN 0 Datacenter Interface feature template ............................................................................................................................................... 101
VPN 1 Datacenter feature template ............................................................................................................................................................... 102
VPN 1 Datacenter BGP feature template ....................................................................................................................................................... 103
3
VPN 1 Datacenter Interface feature template ............................................................................................................................................... 104
Datacenter device template ................................................................................................................................................................................ 105
Remote-site (branch) device template ................................................................................................................................................................ 105
Appendix E: Cisco WAN Edge CLI-equivalent configuration .................................................................................................................................... 111
Appendix F—Glossary............................................................................................................................................................................................... 145
About this guide ....................................................................................................................................................................................................... 146
Feedback & discussion......................................................................................................................................................................................... 146
4
Introduction
Introduction
Implementation flow
• The Define section discusses shortcomings of traditional central Internet model and introduces Cisco SD-WAN Direct
Internet Access.
• The Design section shows the Direct Internet Access design models used, along with an in-depth explanation of
individual components to support Direct Internet Access. This section also covers two major use cases.
• The Deploy section is divided into two parts. The first part provides information about the prerequisites necessary for
deploying Direct Internet Access. The second part discusses the automated deployment of Direct Internet Access to
support the two use cases presented within the Design section.
• The Operate section shows some of the monitoring and troubleshooting tools for the SD-WAN Direct Internet Access
features through the vManage web-based GUI.
5
Define – SD-WAN Direct Internet Access introduction
Audience
This document is intended for network design engineers, network operations personnel, and security operations personnel
who wish to implement Direct Internet Access within each remote-site to allow local breakout of Internet-bound traffic
directly from the branch.
The implementation includes one data center with two Cisco vEdge 5000 routers and four remote sites with a mix of Cisco
ISR4331, ISR4351, and vEdge1000 routers. Refer to the Cisco SD-WAN deployment guide for configuration, deployment
guidance, and background information on the SD-WAN solution.
Overview
Digital innovation is overwhelming the branch and WAN. A majority of employees and customers work in branch offices,
leading to a significant increase in devices accessing Internet-based applications. However, the digital transformation of
many enterprises is hindered owing to the adoption of legacy network architectures. The traditional WAN topology
backhauls all Internet traffic to the datacenters resulting in packet latency, drops, and jitter. In addition, the network is being
constantly challenged with high costs associated with deployment and complex management.
One of the many ways to overcome these challenges within an organization is to use Direct Internet Access (DIA) with Cisco
Software Defined WAN (SD-WAN). DIA is a component of the Cisco SD-WAN architecture in which certain Internet-bound
traffic or public cloud traffic from the branch can be routed directly to the Internet, thereby bypassing the latency of
tunneling Internet-bound traffic to a central site.
• Improved branch office user experience by providing Direct Internet Access (DIA) for employees at remote site
locations
6
Define – SD-WAN Direct Internet Access introduction
• The Cisco IOS XE SD-WAN and vEdge routers are configured using device templates in order to establish a functional
and secure overlay fabric to pass data traffic across the organization’s distributed sites. An example of template
configuration is explained in the Deploy: SD-WAN Direct Internet Access Prerequisites section of this guide.
• The network devices adjacent to the Cisco IOS SD-WAN and vEdge routers are configured.
Refer to Appendix B for the hardware models and software versions used in this guide. Refer to Appendix C for the network
topology and site ID/ IP address details ,and Appendix D for portions of the supporting network device configuration
templates. Appendix E details the CLI configurations of the WAN Edge devices deployed in this guide.
7
Design – Cisco SD-WAN Direct Internet Access Use Cases
Use Cases
Two main use cases discussed in this guide are DIA for remote-site internal employees and DIA for guest users.
8
Design – Cisco SD-WAN Direct Internet Access Use Cases
9
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
• Single-router remote site with MPLS WAN services and Internet connectivity, known as the single-router hybrid design
model.
• Dual-router remote site with MPLS WAN services and Internet connectivity using TLOC extension, known as the dual-
router hybrid design model.
• Single-router remote site with dual-Internet connections to different Internet Service Providers (ISPs), known as the
single-router dual-Internet design model.
• Dual-router remote site with dual-Internet connections to different ISPs using TLOC extension, known as the dual-
router dual-Internet design model.
These designs provide configuration and guidance for enabling localized Internet access in remote office locations.
10
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Segmentation
In DIA, segmentation is useful in keeping authenticated employee or users separate from the guest users. All SD-WAN
designs are based on the use of VPN to segment the routing table, thus allowing multiple default routes to exist on the same
WAN edge.
In SD-WAN, VPN 0, the transport VPN, is similar to a Front-Door VRF (FVRF) used in IWAN. In WAN Edge devices, each VPN is
a VRF and completely isolated from one another. All VPNs other than VPN 0 and VPN 512 are used to carry data traffic
across the overlay network. These VPNs, 1-511 and 513-65530, are referred to as service-side VPNs. For these VPNs to
operate, each one must have an operational interface (or sub-interface). The remainder of what is configured in these VPNs
depends on the network needs. You can configure features specific for the user segment, such as BGP and OSPF routing,
VRRP, QoS, traffic shaping, and policing.
As shown in figure, if the interface in VPN 0 is assigned a static IP address, a default static route can be configured in VPN 0
pointing to the ISP device as its next hop router. Alternatively, an IP address and default route could be obtained dynamically
with DHCP. After authenticating with the vBond orchestrator, the WAN edge device uses this route to authenticate itself
with vSmart controller and then establish an OMP session over the DTLS tunnel.
Once the IPsec tunnel is established between the WAN Edges, all Internet traffic from the site will use the OMP default route
learnt over the DTLS tunnels in the service side VPN to reach the Internet via datacenter, in the absence of local branch DIA.
11
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
As explained in figure 7, within the direct Internet model, segmentation is leveraged by deploying centralized data policies or
a NAT DIA route to leak Internet traffic from the service-side VPN (VPNs 0 - 511,513 - 65530) into the Internet transport VPN
(VPN 0), which allows traffic to exit directly to the Internet through the NAT- enabled interface in VPN 0.
For DIA, NAT translation for packets exiting into the internet within the branch is enabled on the WAN edge devices via NAT
overload. NAT overload is the mapping of multiple unregistered IP addresses to a single registered IP address by using
different ports. To achieve this functionality on WAN edge devices, configure NAT on all WAN transport interfaces that face
the Internet.The NAT operation on outgoing traffic is performed in VPN 0, which is always only a transport VPN. The router's
connection to the Internet is in VPN 0.
12
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
For DIA, as shown in the figure, NAT overload can be configured on the physical Internet transport interfaces connecting to
the Internet Service Provider's network. The source IP address of internal traffic destined for the Internet is translated to the
interface IP address and exits directly to the Internet. The rest of the traffic remains within the overlay network and travels
between two routers on the secure IPsec tunnels.
13
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Centralized policies are built using vManage, and then stored in its database. They are then sent via NETCONF to the vSmart
controller to become a part of vSmart configurations. The vSmart controller then uses OMP to send the policy parameters as
updates in the routing protocol to all of the WAN edge devices. WAN edge devices learn the policy and then execute them in
memory. As a result, all configurations are backed up in vManage configuration database.
In a centralized data policy, when a packet matches one of the match conditions, the associated action is taken and policy
evaluation on that packet stops. Bear this in mind as you design your policies to ensure that the desired actions are taken on
the items subject to policy, because if a packet matches no parameters in any of the sequences in the policy, it is dropped
and discarded by default.
Technical Tip: In IOS XE SD-WAN routers with two transports, the new flows hash according to ECMP and no path preference can
be set.
• Because a site-list is a grouping of many sites, you should be careful about not including a site in more than one site-
list while designing a data policy. Ensure that the site IDs across all the site lists are unique.
Techical Tip: Data policies that come from the vSmart controller are always implicitly applied in the inbound direction.
14
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
• If you are using one of routing protocols on the service-side VPN, ensure that you redistribute the NAT DIA route into
it. Refer to the deployment section for specific configuration.
• In NAT DIA, it is assumed that NAT/PAT is configured on one or more interfaces in VPN 0.
• By default, an IP static route has an administrative distance of 1, a NAT DIA route has a distance of 6, and OMP has a
distance of 251. Therefore, the NAT DIA route overwrites the OMP advertised default to prefer the local Internet exit,
instead of taking the remote data center Internet exit within a VPN.
Leverage centralized data policy and NAT DIA route to deploy DIA
This section explains the adoption of centralized data policies and NAT DIA routes to allow Internet traffic to have a local
Internet-exit within the branch for specific use cases. As both of the options explained below will help configure DIA ,
choose the one that best fits the network. For instance, to filter out traffic based on the IP prefixes and IP packet headers,
you can deploy centralized data policy (option 2), if not to allow flow of all the traffic from LAN side to exit directly to the
Internet from the branch, configure NAT DIA (option 1).
15
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
16
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Technical Tip: The other option to enable DIA on vEdge router platforms is by using Cloud onRamp for SaaS, for more information
refer to SD-WAN: Cloud onRamp for SaaS Deployment Guide. Note that this feature is not yet supported on IOS XE SD-WAN
platforms.
NAT Tracker
If the Internet or external network becomes unavailable, for example, due to a brownout, the router has no way to learn of
this disruption, and it continues to forward traffic based on the policy rules. The result is that traffic that is being forwarded
to the Internet is silently dropped. To prevent the Internet bound traffic from being dropped, configure the WAN edge
device to track the status of the transport interface, using System Tracker, If local Internet is unavailable, redirect the traffic
to the IPsec tunnel that hasn’t had its address translated using NAT.
The SD-WAN System Tracker can be configured to track the status of the transport interfaces that connect to the Internet.
The tracking feature is useful when NAT is enabled on a transport interface in VPN 0 to allow data traffic from the router to
exit directly to the Internet.
With tracking enabled, the router periodically probes the path to the Internet to determine whether it is up. When it detects
that the path is down, the router withdraws the NAT route to the Internet destination, and reroutes the traffic to the IPsec
tunnel, that doesn’t have NAT enabled. The local router continues to periodically check the status of the path to the
interface. When it detects that the path is functioning again, the router reinstalls the NAT route to the Internet.
• By default, a status probe is sent every minute (60 seconds) and only after sending three probes and receiving no
responses does the router declare that the transport interface is down. To modify this value, change the time in the
interval command to a value from 10 through 600 seconds and the number of retries to a value from 1 through 10.
• Also note that, by default, the router waits 300 milliseconds to receive a response from the Internet destination. To
modify the time to wait for a response, change the time in the threshold command to a value from 100 through 1000
milliseconds.
17
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Techical Tip: You can configure up to eight interface trackers and each transport interface must have a different tracker name
associated with it. The same tracker name cannot be used on all NAT interfaces.
In the figure below, the remote sites are classified as single and dual SD-WAN edge devices with Internet failover to central
Internet model in the event of local Internet link failure.
In the SD-WAN single-router, hybrid design model and SD-WAN dual-router hybrid design model, a failure of the local
Internet link causes failover of Internet traffic to the central Internet model. Therefore, the Internet traffic exits via the
central site or datacenter to the internet.
In the figure below, the remote sites are classified as single and dual SD-WAN edge devices with Internet failover to
secondary Internet link in the event of primary Internet link failure.
In the SD-WAN single-router, dual-Internet design model and dual-router, dual-Internet design model, redundancy allows for
local Internet connectivity to failover to the secondary local Internet connection on WAN edge device.
18
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Note that the common technical details are repeated in each section.
On the Internet facing interface, DHCP can be used to obtain an IP address from the Internet Service Provider with the WAN
edge device installing a default route into transport VPN from the ISP. Alternatively, a static IP address and static route can
be configured on the WAN edge device as done in this deployment. As shown in the figure below, the local Internet traffic
exits directly to the Internet from the branch using this route.
19
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
As discussed within the components section, to enable DIA, a centralized data policy can be configured to filter the incoming
traffic based on match/action and route the traffic from service side VPN to transport side VPN. Another solution for DIA is
to configure IP NAT route using device templates to route traffic from service side to the transport side VPN 0 NAT enabled
interface.
In figure 19, MPLS based transport tunnel is used as a backup path for all Internet traffic on failure of the local Internet
connection. A default route is advertised from the central site to roll back to the central Internet model.
20
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
On WAN edge routers, tracking the interface status is useful when NAT on the transport interface in VPN 0 allows data traffic
to flow directly to the Internet. On enabling transport tunnel tracking, the software periodically probes the path to the
Internet to determine whether it is up, based DNS or endpoint IP address. If the software detects that this path is down, the
NAT feature on the interface is disabled and all Internet traffic exits via the central Internet model. Ensure that you use an
endpoint IP address that responds to HTTP/HTTPS requests. For instance, Google DNS server 8.8.8.8 cannot be used as an
endpoint IP address.
Technical Tip: NAT tracker is currently unavailable on devices running IOS XE SD-WAN software.
On the Internet facing interface, DHCP can be used to obtain an IP address from the Internet Service Provider with the WAN
Edge device installing a default route into transport VPN from the ISP. Alternatively, a static IP address and static route can
be configured on the WAN Edge device as done in this deployment. As shown in the figure below, the local Internet traffic
exits directly to the Internet from the branch using this route.
21
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
In the figure below, NAT is enabled on the Internet transport interfaces in both the WAN edge devices. Note that here NAT is
also enabled on the TLOC interface to allow the internet traffic that hits the WAN Edge device (device with a direct MPLS
transport) to flow via the TLOC port towards the device that has the Internet transport interface. The internet traffic then
exits from the second WAN edge device (device connected to the Internet transport) directly to the Internet without being
routed to the datacenter.
22
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
As discussed in the components section, to enable DIA, a centralized data policy can be configured to filter the incoming
traffic based on match/action and route the traffic from service side VPN to transport side VPN. Another solution for DIA is
to configure IP NAT route using device templates to route traffic from service side to the transport side VPN 0, NAT-enabled
interface.
In figure 23, MPLS-based transport tunnel is used as a backup path for all Internet traffic when the local Internet connection
fails. A default route is advertised from the central site over the MPLS tunnel to roll back to the central Internet model.
23
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
On WAN edge routers, tracking the interface status is useful when NAT on the transport interface in VPN 0 allows data traffic
to flow directly to the Internet. At a minimum, the tracker name along with endpoint IP address is specified. On enabling
transport tunnel tracking, the software periodically probes the path to the Internet to determine whether it is up based
endpoint-dns-name or endpoint-IP address. If the software detects that this path is down, NAT is disabled on the interface
and all Internet traffic exits via the central Internet model. Ensure that you use an endpoint IP address that responds to
HTTP/HTTPS requests and apply only one tracker to an interface. For instance, Google DNS server 8.8.8.8 cannot be used as
an endpoint IP address.
Technical Tip: NAT tracker is currently unavailable on devices running IOS XE SD-WAN software.
On the Internet facing interface, DHCP can be used to obtain an IP address from the Internet Service Provider with the WAN
edge device installing a default route into transport VPN from the ISP. Alternatively, a static IP address and static route can
be configured on the WAN Edge device as done in this deployment. As shown in the figure below, the local Internet traffic
exits directly to the Internet from the branch using this route.
In the figure below, NAT is enabled on the Internet transport interface in both WAN Edge devices.
24
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
As discussed in the components section, to enable DIA, a centralized data policy can be configured to filter the incoming
traffic based on match/action and route the traffic from service side VPN to transport side VPN. Another solution for DIA is
to configure an IP NAT route using device templates to route traffic from service side to the transport side VPN 0, NAT-
enabled interface.
When a WAN edge router has two or more NAT interfaces, and hence two or more DIA connections to the Internet, data
traffic is forwarded on the NAT interfaces using ECMP by default. To direct data traffic to a specific DIA interface, a
25
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
centralized data policy can be configured on the vSmart controller that sets two actions—NAT and local-TLOC color. In the
local-TLOC color action, the preferred color of the TLOC that connects to the desired DIA connection is chosen. In this design
example, Internet 1 is labelled color biz-internet and Internet 2 is labelled color bronze. The local-TLOC color is set as biz-
internet with failover to bronze. When Internet 1 is down, web traffic fails over to Internet 2.
Techical Tip: On IOS XE SD-WAN routers, the traffic can be forwarded to the NAT interfaces based on ECMP, as path preference is
not yet supported on these router platforms.
On WAN edge routers, tracking the interface status is useful when NAT on the transport interface in VPN 0 allows data traffic
to flow directly to the Internet. At a minimum, the tracker name along with the endpoint IP address is specified. On enabling
transport tunnel tracking, the software periodically probes the path to the Internet to determine whether it is up based on
endpoint-dns-name or endpoint-IP address. If the software detects that this path is down, NAT is disabled on the interface
and all Internet traffic exits via the central Internet model. Ensure that you use an endpoint IP address that responds to
HTTP/HTTPS requests and apply only one tracker to an interface. For instance, Google DNS server 8.8.8.8 cannot be used as
an endpoint IP address.
Techical Tip: In this design, two different NAT tracker names must be configured and enabled under each NAT interface. NAT
must be enabled before the trackers are configured.
On the Internet facing interface, DHCP can be used to obtain an IP address from the Internet Service Provider with the WAN
edge device installing a default route into transport VPN from the ISP. Alternatively, a static IP address and static route can
26
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
be configured on the WAN edge device as done in this deployment. As shown in the figure below, the local Internet traffic
exits directly to the Internet from the branch using this route.
In the figure below, NAT is enabled on the Internet transport interface in both WAN Edge devices. Note that, NAT here is
enabled on the TLOC Interfaces to allow flow of Internet traffic via the TLOC interface to then exit directly via the Internet
transport interface of the second WAN edge device. This configuration is particularly useful in a situation where one of the
two Internet transports has failed.
27
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
As discussed in the components section, to enable DIA, a centralized data policy can be configured to filter the incoming
traffic based on match/action and route the traffic from service side VPN to transport side VPN. Another solution for DIA is
to configure IP NAT route using device templates to route traffic from service side to the transport side (VPN 0) NAT enabled
interface.
When a WAN edge router has two or more NAT interfaces, and hence two or more DIA connections to the Internet, by
default, data traffic is forwarded on the NAT interfaces using ECMP. To direct data traffic to a specific DIA interface, a
centralized data policy can be configured on the vSmart controller that sets two actions—NAT and local-TLOC color. In the
local-TLOC color action, the preferred color of the TLOC that connects to the desired DIA connection is chosen. In this design
example, Internet 1 is labelled color biz-internet and Internet 2 is labelled color bronze. The local-TLOC color is set as biz-
internet with failover to bronze. When Internet 1 is down, web traffic fails over to Internet 2.
28
Design – Cisco SD-WAN Direct Internet Access Design Components and Considerations
Note that path preference is set for the vEdge platform to biz-internet in this design. If the interface configured with color
biz-internet goes to down state, the Internet traffic automatically chooses the second Internet link (Bronze) as the DIA
path. With centralized policy configured, if the Internet link on WAN edge device wherein Biz-Internet color is configured
on the main physical interface goes down, and Internet traffic is being routed towards this router from the TLOC interface
of the neighbouring WAN edge device, the traffic will be blackholed. To prevent this, a possible solution is to configure NAT
DIA route to enable DIA with system tracker.
Techical Tip: On IOS XE SD-WAN routers, traffic forwarding to the NAT interfaces using path preference is not yet supported on
IOS XE SD-WAN platforms.
On WAN edge routers, tracking the interface status is useful when NAT on the transport interface in VPN 0 allows data traffic
to flow directly to the Internet. At a minimum, the tracker name along with endpoint IP address is specified. On enabling
transport tunnel tracking, the software periodically probes the path to the Internet to determine whether it is up based on
endpoint-dns-name or endpoint-IP address. If the software detects that this path is down, NAT is disabled on the interface
and all Internet traffic exits via the central Internet model. Ensure that you use an endpoint IP address that responds to
HTTP/HTTPS requests and apply only one tracker to an interface. For instance, Google DNS server 8.8.8.8 cannot be used as
an endpoint IP address.
Techical Tip: In this design, two different NAT tracker names must be configured and enabled under each NAT interface. NAT
must be enabled before the trackers are configured.
29
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
Prerequisites
This section of the guide focuses on the prerequisites for each remote site design which involves onboarding devices into the
vManage NMS, building and deploying templates, followed by validating NAT configuration.
https://<vManage_ipaddr_or_FQDN>:8443/
The serial file list contains both vEdge and SD-WAN XE routers. Legacy serial files for vEdge routers are available on the Cisco
SD-WAN support website. However, most of these serial files are also available within Plug and Play (PnP) Connect Portal
now.
Technical Tip: The Sync Smart Account option introduced in version 18.3 and above allows vManage to automatically connect to
the PnP Connect portal and pull up the authorized serial file. For more details, refer to the latest SD-WAN Deployment Guide.
30
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
2. In the navigation panel on the left of the screen, select Configuration > Devices.
This will bring up the Devices screen. An example is shown in the figure below.
Step 2: Configure Device Template for the Cisco WAN Edge Devices to Participate in SD-WAN Overlay
The templates used in this deployment guide are similar to those used in Cisco SD-WAN Deployment Guide. In this guide we
have one datacenter and four branches. The templates used are:
Model Template
Datacenter DC_Hybrid_Type_A_BGP
Branch_A_INET_ TLOC_SubInt_OSPF
Branch_B_INET_TLOC_VRRP
The device template, as well as the various feature templates which make up the device template, are discussed in Appendix
D. Also, to further understand the topology of each branch and datacenter design, refer to Appendix C.
However, for detailed step-by-step instructions on creating individual feature templates and device templates, refer to the
Cisco SD-WAN Deployment Guide.
31
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
Step 3: Deploy the Device Template to the Cisco WAN Edge devices that will be used
On attaching the device template to a WAN edge router, vManage attaches the configurations based on the feature
templates and pushes the configuration to the devices. There are two ways to build your feature templates: either by
entering values within the variables configured or by uploading a .csv file with a list of the variables and their values. Note
that within a feature template, the radio buttons against certain features can be configured as globally on/off or as variables
through either of the methods explained earlier.
In this deployment guide, we will only discuss the values that are being entered manually in the device temaplate.
3. Select the three dots to the right of the template, and from the drop-down menu, select Attach Devices.
4. Select the devices to which the template should be applied and click the arrow to move the device from the
Available Devices box to the Selected Devices box.
You can select multiple devices at one time by simply clicking each desired device.
32
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
5. A new screen appear, click the three dots . . . at the right and then select Edit Device Template.
33
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
In this deployment, the feature templates are configured using variables. Therefore, when you click Edit, a list of variables
and empty boxes appear.There may also be variables with check boxes to check/uncheck for on/off values.
All text boxes must be filled in. Check boxes can be left unmarked. For check boxes, checked means “Yes” and unchecked
means “No”. If you leave a text field empty, the text box will be highlighted red when you try to move to the next page. Fill
in the variables using information from the table below.
Because you will be configuring DIA later, ensure that NAT is enabled on all interfaces that face Internet transport.
Shutdown(vpn1_lan_int1_shutdown)
Interface Cost(vpn1_ospf_interface_cost) 1
Address(vpn1_ospf_area_range_address_0) 10.30.13.0/30
Address(vpn0_inet_next_hop_ip_addr) 30.30.1.2
Address(vpn0_mpls_next_hop_ip_addr) 10.30.23.1
Preference(vpn_if_tunnel_ipsec_preference) 100
IP MTU(vpn0_mpls_mtu) 1500
Shutdown(vpn0_mpls_int_shutdown)
Preference(vpn_if_tunnel_ipsec_preference) 100
IP MTU(vpn0_inet_mtu) 1500
34
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
Variable Value
Shutdown(vpn0_mpls_int_shutdown)
Hostname(system_host_name) BR3-WAN-Edge1
Latitude(system_latitude) 37.3541
Longitude(system_longitude) -97.335
Port Offset(system_port_offset) 0
Port Hopping(system_port_hop)
NAT
Shutdown(vpn_lan_parent_int_shutdown)
Shutdown(vpn2_lan_int2_shutdown)
Interface Cost(vpn1_ospf_interface_cost) 1
Address(vpn1_ospf_area_range_address_0) 10.30.12.0/30
Technical Tip: In dual-transport scenarios with TLOC extension, enable NAT on both, the TLOC interface and the physical Internet
facing Interface. For more information, refer to the Design section of this document.
35
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
8. Repeat Steps 6 – 8 for the other WAN edge devices. You can find the templates for the rest of the branches in
Appendix D.
9. Before proceeding, ensure that you download the .csv file by clicking the down arrow on the upper right corner
of the screen. The .csv file should be populated with the values you have filled in so far. If you deploy the
configuration, and if for any reason there is an error in one of the input variables, the configuration may fail to
deploy. When you come back to this page, all the values will be gone, and you will need to enter them again.
If you downloaded the populated .csv file, upload it by selecting the up arrow. Then you can select … to the
right of the desired device and select Edit Device Template. Your latest values will be populated in the text
boxes. You can then modify any input values and try to deploy the configuration again.
36
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
The next screen will indicate that the Configure action will be applied to device attached to the template. An example is shown
in the figure below.
If you forget to add values for a device, you will get an error and won't be able to proceed until that is corrected.
37
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
Select the device in the left-hand panel to view the configuration associated with them, which will be pushed to the WAN
Edge router (Config Preview tab). Click Configure Devices and confirm configuration changes on the device and then click
OK.
The configuration pushed to all WAN edge devices in this deployment guide from the configuration template is shown in
Appendix E.
11. In the Task View screen verify if the templates were successfully pushed to the device based on the status.
Click the arrow next to a device to view the deployment logs. If you encounter errors while applying a device
template, you’ll see the error logs here.
12. Navigate to Configuration > Templates and click on the three dots to the right of the device template you
wish to enable NAT for. Click Change Device Values.
38
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
13. Enable NAT within the Update Device Template tab. Here we have enabled NAT under the Internet transport
interface, Ge0/0/2.
39
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
40
Deploy - Cisco SD-WAN Direct Internet Access Prerequisites
Alternatively, you can also edit an existing feature template to enable/disable NAT globally. In this deployment, one of the
feature templates used to configure features within VPN 0 Internet facing Interface is BR_INET_INT.
15. To edit the feature template, click Edit within the configured feature template and configure NAT globally.
Technical Tip: On SD-WAN XE devices, enabling NAT creates an additional line of NAT overload command within the
configuration. The NAT overload feature works the same way on both vEdge and SD-WAN XE devices.
41
Deploy - Cisco SD-WAN Direct Internet Access Configuration
• Configure NAT DIA route or configure a centralized data policy to accomplish DIA.
Configure NAT DIA routing: Configure an IP NAT route to perform route lookup to redirect traffic from the service-side VPN
to the transport-side VPN.
Configure centralized data policy: Configure centralized data policies within vManage. These policies are provisioned on a
vSmart controller and are applied only to the vSmart controller. The effects of the policy reflect on the WAN edge routers.
[Optional] Configure a (System tracker) transport interface tracker: Configure a global interface tracker (system tracker)
within system template and apply it to the transport NAT-enabled interface. This configuration helps redirect traffic to the
tunnel on the transport interface, that is not NAT-enabled, if the Internet or external network becomes unavailable. Also, in
a design scenario that has dual-internet exits, if the internet link that is not enabled with NAT is down, the Internet traffic
can still traverse via the second Internet NAT-enabled interface.
This section addresses both the use cases.The network is deployed such that in each design scenario, VRF 1 or VPN 1 are
dedicated for employee traffic and VRF 2 or VPN 2 for guest traffic. In this deployment network, a centralized data policy is
used to allow DIA for all employee traffic and the NAT DIA route type is configured to allow Internet access for guest traffic.
However, either of these DIA configurations can be configured irrespective of the type of traffic based on the requirement.
The guide also covers the configuration of a system tracker to enable fallback on vEdge router platforms, on configuring NAT
DIA route.
Procedure 1: Use Case #1 - Create Centralized Data Policy to Redirect Employee Traffic
To route the specific employee web traffic from service-side VPN to transport-side VPN, a centralized data policy is built. This
policy is configured on the vSmart controller and the result of the policy is pushed into the affected WAN Edge routers based
on the site list.
1. Login to the vManage web console using the IP address or fully qualified domain name of your vManage
instance. For example:
https://vManage_ip_addr_or_FQDN:8443/
42
Deploy - Cisco SD-WAN Direct Internet Access Configuration
3. Click the Add Policy tab within the centralized policy to navigate to groups of interest.
43
Deploy - Cisco SD-WAN Direct Internet Access Configuration
The groups of Interest configured here will help you create specific lists such as Prefix list, VPN list, list of Site IDs and more.
Use these lists later within the centralized data policy to filter the incoming traffic and to reflect the result of the policy on
specific VPNs and site IDs.
In this DIA deployment, centralized data policy is built to filter traffic based on the prefix list configured (i.e.source data
prefix) and this policy is then applied to the vSmart controller. The result of the policy is pushed from vSmart controller to
the WAN edge devices based on the list of site IDs configured within the centralized data policy. Within the affected WAN
edge devices, all traffic entering specific VPNs that are a part of the VPN list, is filtered based on its source data prefix
configured within the policy match statement, and routed to the transport-side interface, VPN 0.
• Site ID list
• VPN list
44
Deploy - Cisco SD-WAN Direct Internet Access Configuration
1. Click New Data Prefix List. Enter a name for the Data Prefix List (Data_Prefix_BR_112002).
45
Deploy - Cisco SD-WAN Direct Internet Access Configuration
46
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Note that prefix lists configured can be used to match source or destination data prefixes. These lists in this guide are
configured to match source data prefixes. All the employee traffic from the IOS XE SD-WAN devices is added under a
single data prefix and a separate data prefix is created for vEdge devices.
Note that a separate data prefix list of 10.10.0.0/16 is created in this deployment for the purpose of building a separate
data policy to show how path preference is set in vEdge router platforms. Also, a separate data prefix list
Overlay_Traffic is created. This is to be used later in the policy within a sequence rule to allow flow of Internal traffic
across SD-WAN overlay network.
An example of data prefix list build for each of the branches is provided below.
The data prefix lists built are summarized in the following tableList of data prefixes
Data Prefix List Name Add Data Prefix
Data_Prefix_BR_112002 10.10.0.0/16
Overlay_Traffic 10.0.0.0/8
The data prefixes are deployed based on the policy deployed in this document.
Site ID List
Within list type site, create a new site list. If you already have a site list defined that you will apply the DIA policy to, skip
this section. Here’s an example of creating site lists for each of the branches.
An example of the list of Site ID’s for each of the branches, along with the necessary steps are mentioned below.
47
Deploy - Cisco SD-WAN Direct Internet Access Configuration
48
Deploy - Cisco SD-WAN Direct Internet Access Configuration
The Site ID lists that are built are summarized in the following table:
List of Sites
Site List Name Add Site
Site_ID_BR_112002 112002
Site_ID_BR_112003 112003
Site_ID_BR_112004 112004
Site_ID_BR_112005 112005
Alternatively, the Site IDs can be added under a single Site List separated by commas as shown below.
49
Deploy - Cisco SD-WAN Direct Internet Access Configuration
VPN List
Within list type VPN, create a new VPN list. This VPN list includes the service VPN IDs you will apply the policy to. If you
already have a VPN list defined that you will apply the DIA policy to, skip this section. Here’s an example of creating VPN
lists.
50
Deploy - Cisco SD-WAN Direct Internet Access Configuration
51
Deploy - Cisco SD-WAN Direct Internet Access Configuration
List of VPNs
VPN List Name VPN
VPN_1 1
Once the lists are created, proceed to the next page and configure the traffic rules for the policy.
3. Click the Next button twice at the bottom of the page to arrive at the Configure Traffic Rules page.
52
Deploy - Cisco SD-WAN Direct Internet Access Configuration
4. To create a new data policy, click Add Policy. Next, select Create New from the drop-down list.
53
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Technical Tip: Alternatively, the entire traffic data policy can be configured using the custom option found on the top right of the
main policy page and then later imported into the centralized policy. Within the Traffic Data tab, there is an Import option under
Configure Traffic Rules, to import an existing traffic policy. For more information, refer to the section Alternate method to
deploy traffic data policy.
5. Create the new traffic policy and enter the traffic data policy name and policy description. The details are
summarized in the following table:
6. From the right pane, click Sequence Type and choose Custom from the list of available types of data policy.
54
Deploy - Cisco SD-WAN Direct Internet Access Configuration
7. Under Custom, click on Sequence Rule and add the created groups of interests under Match condition. The
lists are added as part of the match condition within the data policy. Within the Action tab, click Accept and
add NAT VPN 0. Click Save Match and Actions.
55
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Here’s an example of how the traffic data policy can be created. Two separate sequence rules are added to allow DIA,
and a separate sequence rule is configured before the DIA sequence rule to maintain the flow of internal branch to
branch or branch to datacenter traffic across SD-WAN overlay network.
In the following screenshot, the first sequence rule accepts the flow of internal traffic based on the destination prefix,
and the second sequence rule is configured to enable DIA for SD-WAN XE platforms based on source data prefix.
The third sequence rule allows DIA for vEdge router platforms based on the source data prefix. Within the tab Action,
path preference is set using Local TLOC List.
56
Deploy - Cisco SD-WAN Direct Internet Access Configuration
8. If a packet matches none of the parameters configured in any of the sequences within the policy, it is dropped
and discarded by default. To avoid packet drops, within the tab Custom, modify the Default Action and click
Accept.
57
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Technical Tip: If a centralized policy is already configured with a traffic data policy embedded in it, then you can either edit the
existing data policy to include additional sequence rules, as listed earlier, to enable DIA or add a new traffic data policy under
same centralized data policy to enable DIA. However, preview the policy configuration to ensure that the order of traffic data
policy is correct and does not break the flow of overlay traffic.
58
Deploy - Cisco SD-WAN Direct Internet Access Configuration
2. By default, the data policy applies to all data traffic passing through the WAN edge router. To have the
data policy apply only to the traffic coming from the service side, select the From Service option.
3. Choose the sites that you want the data policy to be applied to by selecting one or more site lists.
4. Choose the service VPNs that you want the data policy to be applied to by selecting one or more VPN
lists.
59
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Techical Tip: For all data-policy policies that you apply, the site IDs across all the site lists must be unique. That is, the site lists
must not contain overlapping site IDs. An example of overlapping site IDs is when two site lists, site-list 1 containing site-id 1-
100, and site-list 2 containing site-id 70-130. Here, sites 70 through 100 are part of both lists. If you were to apply these two site
lists to two different data-policy policies, the attempt to commit the configuration on the vSmart controller would fail.
12. Click Preview to view the configured policy. The policy is displayed in CLI format.
60
Deploy - Cisco SD-WAN Direct Internet Access Configuration
14. Within CONFIGURATION | POLICIES tab, the newly created policy is added under the Centralized Policy
section.
15. To activate the centralized policy, click the three dots at the right of the policy screen and select Activate.
61
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Once activated, the policy is pushed into the vSmart controller. Next, based on the site ID list, the results of the data policy
are pushed to the designated WAN Edge devices via OMP.
62
Deploy - Cisco SD-WAN Direct Internet Access Configuration
2. Click Custom Options on the top right and navigate to Traffic Policy under Centralized Policy.
3. The configured lists are added under the Match/Action condition within the traffic data policy.
63
Deploy - Cisco SD-WAN Direct Internet Access Configuration
4. Next, import the configured traffic data policy to centralized data policy. Navigate back to Centralized Policy
and click Policies.
5. On the CONFIGURATION | POLICIES page, navigate to Configure Traffic Rules, and click Import Existing
to import an existing traffic data policy.
64
Deploy - Cisco SD-WAN Direct Internet Access Configuration
7. The traffic policy is attached to the centralized data policy. Click Next to provide a name to the new centralized
data policy and attach VPN/Sites.
65
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Procedure 2: Use Case #2 - Create NAT DIA Route to Redirect Guest Internet
In this procedure, a NAT DIA route is configured to route all remote-site guest Internet traffic from service side VPN 2 to
VPN 0, which will allow the traffic to exit directly to the local Internet.
66
Deploy - Cisco SD-WAN Direct Internet Access Configuration
2. Click the Feature tab. Find the desired feature template (BR_VPN1_Static _Routing).
3. Click three dots (…) to the right of the feature template and select Copy from the drop-down list.
67
Deploy - Cisco SD-WAN Direct Internet Access Configuration
4. In the pop-up window, enter a Template Name (BR_VPN2_NAT_DIA_Route) and Description (Branch VPN2
NAT route configuration)
5. Click Copy.
Once a copy of the template is generated, find the newly-created template (BR_VPN2_NAT_DIA_Route). To
do so, click the three dots (…) next to the desired template and select Edit.
Ensure that the following parameters are set within the template:
Template BR_VPN2_NAT_DIA_Route
Section Parameter Type Variable/Value
Basic configuration VPN Global 2
68
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Based on the configuration above, when a packet hits an interface within Service VPN or VPN 2, the packet is forwarded to
the NAT-enabled transport VPN (VPN 0) interface. The packet then exists directly to the Internet. To understand how NAT
DIA configuration works in detail, refer to the Design Section of this guide. See Appendix D for all the templates used within
this guide.
Step 2: Redistribute the NAT DIA Route into the Routing Protocol
In this guide OSPF is running between the LAN or service side of each WAN edge device and L3 distribution switch.
Therefore, proceed to redistribute the NAT DIA route into the routing protocol.
7. To redistribute the NAT DIA route into OSPF, copy the existing OSPF feature template, BR_VPN1_OSPF as
done earlier in step 3.
69
Deploy - Cisco SD-WAN Direct Internet Access Configuration
8. Enter a new name for the template (BR_VPN2_OSPF_NAT_REDISTRIBUTE) along with a description
(Branch LAN VPN 2 OSPF with NAT redistribute) and click Copy.
70
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Template BR_VPN2_OSPF_NAT_REDISTRIBUTE
Section Parameter Type Variable/Value
Basic Configuration Router ID Device Specific vpn2_ospf_router_id
71
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Click Save Changes to add the redistribute NAT statement into the template.
1. Under Service VPN next to VPN, select the feature template modified to include the NAT DIA route
(BR_VPN2_NAT_DIA_Route)
2. Under Service VPN next to OSPF, select the feature template modified to redistribute the NAT route into OSPF
(BR_VPN2_OSPF_NAT_REDISTRIBUTE).
Here’s an example of the device template with the new feature templates attached to it.
72
Deploy - Cisco SD-WAN Direct Internet Access Configuration
Based on the configuration added, 0.0.0.0/0 route is installed into the IOS-XE Routing Information base as a 'nat-dia' type.
This route is then redistributed into OSPF protocol on the LAN side.
Once the templates are pushed through the configuration, this is how they would appear.
router-id 10.30.31.31
default-information originate
73
Deploy - Cisco SD-WAN Direct Internet Access Configuration
ecmp-hash-key layer4
router
ospf
router-id 10.10.12.12
default-information originate
redistribute omp
redistribute nat
Technical tip: To track the status of the Internet transport link when a NAT DIA route is used for local Internet exit, a system
tracker can be configured on vEdge router platforms. This eliminates the issue of internet traffic blackholing when an internet
link is down.
14. Find the WAN Edge System template (System_Template), click … on the far right of the screen and select
the Copy option.
74
Deploy - Cisco SD-WAN Direct Internet Access Configuration
15. Enter a new name for the template (System_Template_Interface_Tracker) and description (System
Template to track the Internet Interfaces)
75
Deploy - Cisco SD-WAN Direct Internet Access Configuration
17. Generate a copy of the previously used interface feature templates by clicking the copy option as explained
earlier. Next, enter the name/description for the generated template and attach the tracker to each of these
generated feature templates.
In this guide, the following templates were used in remote-sites. These templates were copied to create a new
template.
76
Deploy - Cisco SD-WAN Direct Internet Access Configuration
BR_BRONZE_INT BR_BRONZE_INT_DIA
BR_BRONZE_SUBINT BR_BRONZE_SUBINT_DIA
The new template is edited such that the tracker is enabled on each Internet facing interface.
Template BR_BRONZE_INT
Section Parameter Type Variable/Value
Advanced Tracker Global nat_tracker
Template BR_INET_SUBINT
Section Parameter Type Variable/Value
Advanced Tracker Global nat_tloc_tracker
Template BR_INET_INT
Section Parameter Type Variable/Value
Advanced Tracker Global nat_tracker
Template BR_BRONZE_SUBINT
Section Parameter Type Variable/Value
Advanced Tracker Global nat_tloc_tracker
Note, to associate each of the trackers to only one NAT-enabled Internet-facing interface. The same tracker cannot be used
on two NAT-enabled Internet facing interfaces within the same device.
Technical Tip: System Tracker and path preference using local-TLOC color is not yet supported on IOS XE SD-WAN release. These
features are currently supported only on vEdge router platforms.
77
Operate - Cisco SD-WAN Direct Internet Access Monitoring
• Understand the interface status and routing table for service-side VPN for NAT DIA route
1. Navigate to Monitor > Network on the left pane and click the WAN edge device you wish to monitor.
2. In the panel on the left, select Real Time and a screen appear with Device Options. Click the box next to the
device options. This populates a list of options that can be chosen to monitor, troubleshoot, and manage your
device and the features deployed on it.
The figure below shows an example of NAT translations being monitored on the WAN Edge device using the IP NAT
Translation option.
78
Operate - Cisco SD-WAN Direct Internet Access Monitoring
Technical Tip: The device options populated to monitor NAT translations are different for vEdge router platforms. In the vEdge
platform, use the IP NAT Filters option to verify the NAT translation filters.
Note, you can also view NAT translations from the CLI mode on the routers. To do so, navigate to Tools > SSH and click the
desired WAN edge device.
The basic show commands to view NAT translations include – show ip nat translations and show ip nat statistics on SD-
WAN XE platforms, and show ip nat filter | tab on vEdge router platforms.
1. Navigate to Monitor > Network on the left pane and click the WAN edge device you wish to monitor.
2. In the panel on the left, select Real Time and a screen will appear with Device Options. Click the box next to
the device options. This shows a list of options that can be chosen to monitor, troubleshoot, and manage your
device and the features deployed on it.
In the example figure below, packets/bytes of traffic hitting the data policy embedded within the centralized policy are
monitored on the WAN Edge device.
Use CLI commands, such as show (sdwan) policy from vSmart controllers to view the policy and to monitor the flow of
traffic, show (sdwan) policy data-policy-filter.
Technical Tip: To determine whether the data policy is sending packets via DIA path or SD-WAN overlay, you can use the CLI
command - show sdwan app-fwd dpi flows on SD-WAN XE devices or show app dpi flows on vEdge platform. This command
output, will display the type of application and whether that packet was IPsec encapsulated or not.
79
Operate - Cisco SD-WAN Direct Internet Access Monitoring
Step 3: Understand the overall routing table for Service Side VPN for NAT DIA route
Using vManage NMS dashboard, you can monitor for traffic flow through the policy based on the overall packets/bytes.
1. Navigate to Monitor > Network available on the left pane and click on the WAN edge device you wish to
monitor.
2. Select Real time and pop-up screen will appear with device options. Click the tab next to the device options. A
You will then see a list of options that can be chosen to monitor, troubleshoot, and manage your device and
the features deployed on it.
The example below shows the monitoring of IP routes for the WAN Edge device.
Note, you can also filter the view populated on the vManage dashboard.
Technical Tip: The option to view routes on SD-WAN XE devices via vManage NMS is yet to be added. You can view the routes, by
navigating to Tools > SSH Terminal. Next, click the WAN Edge device and enter CLI command show ip route.
80
Appendix A: New in this guide
81
Appendix B: Hardware and software used for validation
82
Appendix C: DIA Deployment Example
The following figure is a high-level overview of the example network in this deployment guide.
In this topology, there is one data center and 4 remote sites. The transports shown are one MPLS and two Internet Service
Providers. The SD-WAN controllers are deployed using Cisco’s cloud-managed service and reachable via Internet transport.
On the U.S. West Coast there is one vManage, one vSmart controller and one vBond orchestrator.
Each of the WAN edge devices are running SD-WAN code, configured using the templates similar to those used in the SD-
WAN deployment guide and the devices are a part of the SD-WAN overlay network.
The following table explains the system IP addresses and site ID’s chosen for this deployment guide.
BR1-WAN-Edge1 10.255.241.11
Branch 1/ West 112002
BR1-WAN-Edge2 10.255.241.12
BR2-WAN-Edge1 10.255.241.21
Branch 2/ West 112003
BR2-WAN-Edge2 10.255.241.22
83
Appendix C: DIA Deployment Example
BR4-WAN-Edge1 10.255.241.41
The following table explains the color used for each transport in this deployment guide.
The LAN side of each branch contains devices configured within the private IP address range of 10.0.0.0/8 subnet.
84
Appendix D: Cisco WAN Edge configuration summary (Templates)
Template: System
This feature template is optional, deploy it based on your individual use cases. It will help monitor the network.
85
Appendix D: Cisco WAN Edge configuration summary (Templates)
The Cisco WAN Edge router syncs the time to an NTP server. For this deployment guide the NTP server time.nist.gov was
used.
You should be careful to use only known and trusted NTP servers.
86
Appendix D: Cisco WAN Edge configuration summary (Templates)
The default BFD hello interval is 1,000 milliseconds. The BFD hello interval controls how fast the network converges in the
case of an IPsec tunnel failure. The shorter the BFD hello interval, generally the faster the network recognizes a failure of
one of the Cisco vEdge Cloud routers within the transit VPC and selects an alternate path.
Template: VPN/VPN
87
Appendix D: Cisco WAN Edge configuration summary (Templates)
88
Appendix D: Cisco WAN Edge configuration summary (Templates)
vpn0_mpls_next_hop_ip_addr
Template: BGP
Description: VPN0 Template for BGP configuration for WAN Edge devices
89
Appendix D: Cisco WAN Edge configuration summary (Templates)
Description: VPN1 LAN Parent Service Side Interface Template for WAN Edge devices
90
Appendix D: Cisco WAN Edge configuration summary (Templates)
Restrict Global On
BGP Global On
NTP Global On
Clear-Don’t- Global On
Fragment
91
Appendix D: Cisco WAN Edge configuration summary (Templates)
Restrict Global On
BGP Global On
NTP Global On
Clear-Don’t-Fragment Global On
BGP Global On
92
Appendix D: Cisco WAN Edge configuration summary (Templates)
NTP Global On
Clear-Don’t-Fragment Global On
Description: VPN0 INET Transport Sub Interface Template for WAN Edge devices
BGP Global On
NTP Global On
93
Appendix D: Cisco WAN Edge configuration summary (Templates)
Clear-Don’t-Fragment Global On
BGP Global On
NTP Global On
Clear-Don’t-Fragment Global On
94
Appendix D: Cisco WAN Edge configuration summary (Templates)
BGP Global On
NTP Global On
Clear-Don’t-Fragment Global On
95
Appendix D: Cisco WAN Edge configuration summary (Templates)
96
Appendix D: Cisco WAN Edge configuration summary (Templates)
Description: VPN1 LAN Interface Template with VRRP for WAN Edge devices
Template: OSPF
97
Appendix D: Cisco WAN Edge configuration summary (Templates)
98
Appendix D: Cisco WAN Edge configuration summary (Templates)
Description: VPN2 LAN Interface Template with VRRP for WAN Edge devices
Template: OSPF
Description: VPN2 OSPF Template with NAT Redistribute WAN Edge devices
99
Appendix D: Cisco WAN Edge configuration summary (Templates)
100
Appendix D: Cisco WAN Edge configuration summary (Templates)
vpn0_mpls_next_hop_ip_addr
Restrict Global On
BGP Global On
NTP Global On
101
Appendix D: Cisco WAN Edge configuration summary (Templates)
BGP Global On
NTP Global On
Clear-Don’t-Fragment Global On
102
Appendix D: Cisco WAN Edge configuration summary (Templates)
Template: BGP
103
Appendix D: Cisco WAN Edge configuration summary (Templates)
104
Appendix D: Cisco WAN Edge configuration summary (Templates)
Description: vEdge Template Branch DC MPLS and INET – Static to CE and BGP to LAN
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 DC_VPN0
DC_INET_Interface
VPN512 VPN512_Template
BGP DC_VPN1_BGP
DC_VPN1_Int2
Banner Banner_Template
105
Appendix D: Cisco WAN Edge configuration summary (Templates)
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 BR_VPN0_Dual_Transport
BR_BRONZE_SUBINT_DIA
BR_WAN_PARENT_INT
BR_TLOC_INT
BR_LAN_PARENT_INT
VPN512 VPN512_Template
OSPF BR_VPN1_OSPF
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
106
Appendix D: Cisco WAN Edge configuration summary (Templates)
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 BR_VPN0_Dual_Transport
BR_BRONZE_INT_DIA
BR_WAN_PARENT_INT
BR_TLOC_INT
BR_LAN_PARENT_INT
VPN512 VPN512_Template
VPN1 BR_VPN1_BASE
OSPF BR_VPN1_OSPF
VPN2 BR_VPN2_NAT_DIA_ROUTE
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
107
Appendix D: Cisco WAN Edge configuration summary (Templates)
VPN0 BR_VPN0_Dual_Transport
BR_MPLS_SUBINT
BR_TLOC_INT
BR_LAN_PARENT_INT
VPN512 VPN512_Template
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 BR_VPN0_Dual_Transport
BR_MPLS_INT
BR_TLOC_INT
BR_LAN_PARENT_INT
108
Appendix D: Cisco WAN Edge configuration summary (Templates)
VPN512 VPN512_Template
OSPF BR_VPN1_OSPF
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 BR_VPN0_Dual_Transport
BR_MPLS_INT
BR_LAN_PARENT_INT
VPN512 VPN512_Template
OSPF BR_VPN1_OSPF
109
Appendix D: Cisco WAN Edge configuration summary (Templates)
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
Logging Logging_Template
NTP NTP_Template
BFD BFD_Template
OMP OMP_Template
Security Security_Template
VPN0 BR_VPN0_Dual_Transport
BR_BRONZE_INT
BR_LAN_PARENT_INT
VPN512 VPN512_Template
VPN1 BR_VPN1_BASE
OSPF BR_VPN1_OSPF
VPN2 BR_VPN2_NAT_DIA_ROUTE
OSPF BR_VPN2_OSPF_NAT_REDISTRIBUTE
110
Appendix E: Cisco WAN Edge CLI-equivalent configuration
111
Appendix E: Cisco WAN Edge CLI-equivalent configuration
no shutdown
send-path-limit 16
ecmp-limit 16
graceful-restart
!
security
ipsec
replay-window 4096
authentication-type sha1-hmac ah-sha1-hmac
!
!
vpn 0
name "Transport VPN"
dns 208.67.220.220 secondary
dns 208.67.222.222 primary
ecmp-hash-key layer4
interface ge0/0
description "LAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/1
description "Bronze Interface"
ip address 20.50.1.1/30
nat
!
tracker nat_tloc_tracker
tunnel-interface
encapsulation ipsec preference 0
color bronze
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
mtu 1496
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
interface ge0/2
description "WAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/2.101
description "TLOC Interface"
ip address 10.104.1.1/30
mtu 1446
tloc-extension ge0/1
no shutdown
!
interface ge0/2.102
description "INET Interface"
ip address 10.104.2.1/30
nat
112
Appendix E: Cisco WAN Edge CLI-equivalent configuration
!
tracker nat_tracker
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
mtu 1496
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
ip route 0.0.0.0/0 10.104.2.2
ip route 0.0.0.0/0 20.50.1.2
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
router
ospf
router-id 10.10.11.11
auto-cost reference-bandwidth 100000
default-information originate
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/0.10
cost 1
network point-to-point
authentication type message-digest
authentication message-digest message-digest-key 22 md5
$8$yqv1qBnH6ubDEPAb0itVNam9DmlWsmLuMeWt0Re9HxE=
exit
range 10.10.13.0/30
exit
!
!
interface ge0/0.10
description Employee
ip address 10.10.13.2/30
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 2
name "Service VPN"
ecmp-hash-key layer4
router
ospf
router-id 10.10.12.12
113
Appendix E: Cisco WAN Edge CLI-equivalent configuration
114
Appendix E: Cisco WAN Edge CLI-equivalent configuration
115
Appendix E: Cisco WAN Edge CLI-equivalent configuration
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
mtu 1496
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
interface ge0/2
description "WAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/2.101
description "Bronze subinterface"
ip address 10.104.1.2/30
nat
!
tracker nat_tloc_tracker
tunnel-interface
encapsulation ipsec preference 0
color bronze
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
mtu 1496
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
interface ge0/2.102
description "TLOC Interface"
ip address 10.104.2.2/30
mtu 1446
tloc-extension ge0/1
no shutdown
!
ip route 0.0.0.0/0 10.104.1.1
ip route 0.0.0.0/0 30.50.1.2
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
router
ospf
router-id 10.10.12.12
auto-cost reference-bandwidth 100000
116
Appendix E: Cisco WAN Edge CLI-equivalent configuration
default-information originate
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/0.30
cost 1
network point-to-point
authentication type message-digest
authentication message-digest message-digest-key 22 md5
$8$sHj+89X3B5p2Vlaj3ELIUD+X/s5KhroSDnk43yzf4hk=
exit
range 10.10.0.0/16
exit
!
!
interface ge0/0.30
description "Employee traffic"
ip address 10.10.24.2/30
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 2
name "Service VPN"
ecmp-hash-key layer4
router
ospf
router-id 10.10.12.12
auto-cost reference-bandwidth 100000
default-information originate
timers spf 200 1000 10000
redistribute omp
redistribute nat
area 0
interface ge0/0.40
cost 1
network point-to-point
authentication type message-digest
authentication message-digest message-digest-key 22 md5
$8$vbKeCR/oQ+jbLMuFhu0xxlD/yM1dsXanYf094G3l7uw=
exit
range 10.10.25.0/30
exit
!
!
interface ge0/0.40
description vpn1_lan_int2_description
ip address 10.10.25.2/30
no shutdown
!
ip route 0.0.0.0/0 vpn 0
omp
advertise connected
advertise static
!
!
vpn 512
name "Management VPN"
interface mgmt0
description "Management Interface"
ip address 100.119.118.13/24
117
Appendix E: Cisco WAN Edge CLI-equivalent configuration
no shutdown
!
!
118
Appendix E: Cisco WAN Edge CLI-equivalent configuration
!
no ip dhcp use class
ip name-server 208.67.220.220 208.67.222.222
ip route 0.0.0.0 0.0.0.0 10.101.2.2 1
ip route 0.0.0.0 0.0.0.0 20.20.1.2 1
ip http authentication local
ip http server
ip http secure-server
no ip igmp ssm-map query dns
ip nat inside source list nat-dia-vpn-hop-access-list interface GigabitEthernet0/0/1.102 overload
ip nat translation tcp-timeout 3600
ip nat translation udp-timeout 60
ip nat route vrf 2 0.0.0.0 0.0.0.0 global
no ip rsvp signalling rate-limit
ipv6 unicast-routing
no ipv6 mld ssm-map query dns
cdp run
interface GigabitEthernet0
description Management Interface
no shutdown
arp timeout 1200
vrf forwarding Mgmt-intf
ip address 100.119.118.8 255.255.255.0
ip redirects
ip mtu 1500
mtu 1500
negotiation auto
exit
interface GigabitEthernet0/0/0
description LAN Parent Interface
no shutdown
arp timeout 1200
no ip address
ip redirects
ip mtu 1504
mtu 1504
negotiation auto
exit
interface GigabitEthernet0/0/0.10
no shutdown
encapsulation dot1Q 10
vrf forwarding 1
ip address 10.20.21.2 255.255.255.0
ip mtu 1500
vrrp 1 address-family ipv4
vrrpv2
address 10.20.21.1
priority 100
timers advertise 1000
track omp shutdown
exit
exit
interface GigabitEthernet0/0/0.20
no shutdown
encapsulation dot1Q 20
vrf forwarding 2
ip address 10.20.22.2 255.255.255.0
ip mtu 1500
ip ospf 2 area 0
ip ospf authentication message-digest
ip ospf network point-to-point
ip ospf cost 2
ip ospf dead-interval 40
ip ospf hello-interval 10
ip ospf message-digest-key 22 md5 7 013057175804575D72
119
Appendix E: Cisco WAN Edge CLI-equivalent configuration
ip ospf priority 1
ip ospf retransmit-interval 5
vrrp 2 address-family ipv4
vrrpv2
address 10.20.22.1
priority 100
timers advertise 1000
track omp shutdown
exit
exit
interface GigabitEthernet0/0/1
no shutdown
no ip address
exit
interface GigabitEthernet0/0/1.101
no shutdown
encapsulation dot1Q 101
ip address 10.101.1.1 255.255.255.252
ip mtu 1446
exit
interface GigabitEthernet0/0/1.102
no shutdown
encapsulation dot1Q 102
ip address 10.101.2.1 255.255.255.252
ip tcp adjust-mss 1350
ip mtu 1496
ip nat outside
exit
interface GigabitEthernet0/0/2
description MPLS Interface
no shutdown
arp timeout 1200
ip address 20.20.1.1 255.255.255.252
ip redirects
ip tcp adjust-mss 1350
ip mtu 1500
mtu 1500
negotiation auto
exit
interface Tunnel2
no shutdown
ip unnumbered GigabitEthernet0/0/2
no ip redirects
ipv6 unnumbered GigabitEthernet0/0/2
no ipv6 redirects
tunnel source GigabitEthernet0/0/2
tunnel mode sdwan
exit
interface Tunnel102001
no shutdown
ip unnumbered GigabitEthernet0/0/1.102
no ip redirects
ipv6 unnumbered GigabitEthernet0/0/1.102
no ipv6 redirects
tunnel source GigabitEthernet0/0/1.102
tunnel mode sdwan
exit
clock timezone UTC 0 0
logging persistent size 104857600 filesize 10485760
logging buffered 512000
no logging rate-limit
logging persistent
aaa authentication login default local
aaa authorization exec default local
multilink bundle-name authenticated
120
Appendix E: Cisco WAN Edge CLI-equivalent configuration
121
Appendix E: Cisco WAN Edge CLI-equivalent configuration
no border
color biz-internet
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
no allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
interface GigabitEthernet0/0/2
tunnel-interface
encapsulation ipsec preference 0 weight 1
no border
color mpls restrict
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
vmanage-transaction vmanage-transaction-id 2019-05-27T08:30:07.034+00:00
omp
no shutdown
send-path-limit 16
ecmp-limit 16
graceful-restart
timers
holdtime 60
advertisement-interval 1
graceful-restart-timer 43200
eor-timer 300
exit
address-family ipv4 vrf 1
advertise ospf external
122
Appendix E: Cisco WAN Edge CLI-equivalent configuration
advertise connected
advertise static
!
address-family ipv4 vrf 2
advertise connected
advertise static
!
!
!
licensing config enable false
licensing config privacy hostname false
licensing config privacy version false
licensing config utility utility-enable false
netconf-yang cisco-ia blocking cli-blocking-enabled
bfd color mpls
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd color biz-internet
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd app-route multiplier 6
bfd app-route poll-interval 120000
security
ipsec
rekey 86400
replay-window 4096
authentication-type sha1-hmac ah-sha1-hmac
!
!
nacm cmd-read-default deny
nacm cmd-exec-default deny
123
Appendix E: Cisco WAN Edge CLI-equivalent configuration
124
Appendix E: Cisco WAN Edge CLI-equivalent configuration
negotiation auto
exit
interface GigabitEthernet0/0/0.10
no shutdown
encapsulation dot1Q 10
vrf forwarding 1
ip address 10.20.21.3 255.255.255.0
ip mtu 1500
vrrp 1 address-family ipv4
vrrpv2
address 10.20.21.1
priority 100
timers advertise 1000
track omp shutdown
exit
exit
interface GigabitEthernet0/0/0.20
no shutdown
encapsulation dot1Q 20
vrf forwarding 2
ip address 10.20.22.3 255.255.255.0
ip mtu 1500
ip ospf 2 area 0
ip ospf authentication message-digest
ip ospf network point-to-point
ip ospf cost 1
ip ospf dead-interval 40
ip ospf hello-interval 10
ip ospf message-digest-key 22 md5 7 141443180F0B7B797769
ip ospf priority 1
ip ospf retransmit-interval 5
vrrp 2 address-family ipv4
vrrpv2
address 10.20.22.1
priority 100
timers advertise 1000
track omp shutdown
exit
exit
interface GigabitEthernet0/0/1
no shutdown
no ip address
exit
interface GigabitEthernet0/0/1.101
no shutdown
encapsulation dot1Q 101
ip address 10.101.1.2 255.255.255.252
ip tcp adjust-mss 1350
ip mtu 1496
exit
interface GigabitEthernet0/0/1.102
no shutdown
encapsulation dot1Q 102
ip address 10.101.2.2 255.255.255.252
ip mtu 1446
exit
interface GigabitEthernet0/0/2
description INET Interface
no shutdown
arp timeout 1200
ip address 30.20.1.1 255.255.255.252
ip redirects
ip tcp adjust-mss 1350
ip mtu 1496
ip nat outside
125
Appendix E: Cisco WAN Edge CLI-equivalent configuration
mtu 1500
negotiation auto
exit
interface Tunnel2
no shutdown
ip unnumbered GigabitEthernet0/0/2
no ip redirects
ipv6 unnumbered GigabitEthernet0/0/2
no ipv6 redirects
tunnel source GigabitEthernet0/0/2
tunnel mode sdwan
exit
interface Tunnel101001
no shutdown
ip unnumbered GigabitEthernet0/0/1.101
no ip redirects
ipv6 unnumbered GigabitEthernet0/0/1.101
no ipv6 redirects
tunnel source GigabitEthernet0/0/1.101
tunnel mode sdwan
exit
clock timezone UTC 0 0
logging persistent size 104857600 filesize 10485760
logging buffered 512000
no logging rate-limit
logging persistent
aaa authentication login default local
aaa authorization exec default local
multilink bundle-name authenticated
spanning-tree extend system-id
spanning-tree mode rapid-pvst
no crypto ikev2 diagnose error
router ospf 2 vrf 2
area 0 range 10.20.22.0 255.255.255.0 advertise
auto-cost reference-bandwidth 100000
timers throttle spf 200 1000 10000
router-id 10.21.21.21
compatible rfc1583
default-information originate
distance ospf external 110
distance ospf inter-area 110
distance ospf intra-area 110
redistribute omp subnets
redistribute nat-route dia
!
no router rip
line aux 0
login authentication default
stopbits 1
!
line con 0
login authentication default
speed 115200
stopbits 1
!
line vty 0 4
login authentication default
transport input ssh
!
line vty 5 80
login authentication default
transport input ssh
!
diagnostic bootup level minimal
sdwan
126
Appendix E: Cisco WAN Edge CLI-equivalent configuration
interface GigabitEthernet0/0/0
exit
interface GigabitEthernet0/0/0.10
exit
interface GigabitEthernet0/0/0.20
exit
interface GigabitEthernet0/0/1.101
tunnel-interface
encapsulation ipsec preference 0 weight 1
no border
color mpls restrict
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
no allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
interface GigabitEthernet0/0/1.102
tloc-extension GigabitEthernet0/0/2
exit
interface GigabitEthernet0/0/2
tunnel-interface
encapsulation ipsec preference 0 weight 1
no border
color biz-internet
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
allow-service all
no allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
vmanage-transaction vmanage-transaction-id 2019-05-25T23:22:20.21+00:00
omp
127
Appendix E: Cisco WAN Edge CLI-equivalent configuration
no shutdown
send-path-limit 16
ecmp-limit 16
graceful-restart
timers
holdtime 60
advertisement-interval 1
graceful-restart-timer 43200
eor-timer 300
exit
address-family ipv4 vrf 1
advertise ospf external
advertise connected
advertise static
!
address-family ipv4 vrf 2
advertise connected
advertise static
!
!
!
licensing config enable false
licensing config privacy hostname false
licensing config privacy version false
licensing config utility utility-enable false
netconf-yang cisco-ia blocking cli-blocking-enabled
bfd color mpls
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd color biz-internet
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd app-route multiplier 6
bfd app-route poll-interval 120000
security
ipsec
rekey 86400
replay-window 4096
authentication-type sha1-hmac ah-sha1-hmac
!
!
nacm cmd-read-default deny
nacm cmd-exec-default deny
128
Appendix E: Cisco WAN Edge CLI-equivalent configuration
129
Appendix E: Cisco WAN Edge CLI-equivalent configuration
130
Appendix E: Cisco WAN Edge CLI-equivalent configuration
131
Appendix E: Cisco WAN Edge CLI-equivalent configuration
stopbits 1
!
line con 0
login authentication default
speed 115200
stopbits 1
!
line vty 0 4
login authentication default
transport input ssh
!
line vty 5 80
login authentication default
transport input ssh
!
sdwan
interface GigabitEthernet0/0/0
tunnel-interface
encapsulation ipsec preference 200 weight 1
no border
color mpls restrict
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
interface GigabitEthernet0/0/1
exit
interface GigabitEthernet0/0/1.10
exit
interface GigabitEthernet0/0/1.20
exit
interface GigabitEthernet0/0/2
tunnel-interface
encapsulation ipsec preference 100 weight 1
no border
color biz-internet
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
allow-service all
132
Appendix E: Cisco WAN Edge CLI-equivalent configuration
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
vmanage-transaction vmanage-transaction-id 2019-05-18T19:47:26.607+00:00
omp
no shutdown
send-path-limit 16
ecmp-limit 16
graceful-restart
timers
holdtime 60
advertisement-interval 1
graceful-restart-timer 43200
eor-timer 300
exit
address-family ipv4 vrf 1
advertise connected
advertise static
!
address-family ipv4 vrf 2
advertise connected
advertise static
!
!
!
licensing config enable false
licensing config privacy hostname false
licensing config privacy version false
licensing config utility utility-enable false
netconf-yang cisco-ia blocking cli-blocking-enabled
bfd color mpls
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd color biz-internet
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd app-route multiplier 6
bfd app-route poll-interval 120000
security
ipsec
rekey 86400
replay-window 4096
authentication-type sha1-hmac ah-sha1-hmac
!
!
nacm cmd-read-default deny
nacm cmd-exec-default deny
133
Appendix E: Cisco WAN Edge CLI-equivalent configuration
viptela-system:system
system
gps-location latitude 37.409284
gps-location longitude -121.928528
device-groups BRANCH Primary UG5 US West v1000
system-ip 100.255.241.41
overlay-id 1
site-id 112005
port-offset 1
control-session-pps 300
admin-tech-on-failure
sp-organization-name "ENB-Solutions - 21615"
organization-name "ENB-Solutions - 21615"
no port-hop
track-transport
track-default-gateway
console-baud-rate 115200
vbond 10.10.60.2 port 12346
!
service internal
no service pad
service password-encryption
service timestamps debug datetime msec
service timestamps log datetime msec
no service tcp-small-servers
no service udp-small-servers
hostname BR4-WAN-Edge1
username admin privilege 15 secret 9 $9$3VEF3VAI3lMM3E$awMmxogwHvRdxoHA5u1utUOAmKPBUvUbkD4PnwNWmWk
vrf definition 1
description Service VPN
rd 1:1
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
!
vrf definition 2
description Service VPN
rd 1:2
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
!
vrf definition Mgmt-intf
description Management VPN
rd 1:512
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
!
no ip dhcp use class
ip route 0.0.0.0 0.0.0.0 10.40.34.2 1
ip route 0.0.0.0 0.0.0.0 10.40.35.2 1
no ip igmp ssm-map query dns
no ip rsvp signalling rate-limit
ipv6 unicast-routing
no ipv6 mld ssm-map query dns
134
Appendix E: Cisco WAN Edge CLI-equivalent configuration
interface GigabitEthernet0
description Management Interface
no shutdown
arp timeout 1200
vrf forwarding Mgmt-intf
ip address 100.119.118.10 255.255.255.0
ip redirects
ip mtu 1500
mtu 1500
negotiation auto
exit
interface GigabitEthernet0/0/0
description WAN Parent Interface
no shutdown
arp timeout 1200
no ip address
ip redirects
ip mtu 1504
mtu 1504
negotiation auto
exit
interface GigabitEthernet0/0/0.10
no shutdown
encapsulation dot1Q 10
vrf forwarding 1
ip address 10.40.4.2 255.255.255.252
ip mtu 1500
ip ospf 1 area 0
ip ospf authentication message-digest
ip ospf network point-to-point
ip ospf cost 1
ip ospf dead-interval 40
ip ospf hello-interval 10
ip ospf message-digest-key 22 md5 7 06055E324F41584B56
ip ospf priority 1
ip ospf retransmit-interval 5
exit
interface GigabitEthernet0/0/0.20
no shutdown
encapsulation dot1Q 20
vrf forwarding 2
ip address 10.40.5.2 255.255.255.252
ip mtu 1500
ip ospf 2 area 0
ip ospf authentication message-digest
ip ospf network point-to-point
ip ospf cost 1
ip ospf dead-interval 40
ip ospf hello-interval 10
ip ospf message-digest-key 22 md5 7 03070A180500701E1D
ip ospf priority 1
ip ospf retransmit-interval 5
exit
interface GigabitEthernet0/0/1
description Bronze Interface
no shutdown
arp timeout 1200
ip address 10.40.34.1 255.255.255.252
ip redirects
ip tcp adjust-mss 1350
ip mtu 1500
mtu 1500
negotiation auto
exit
interface GigabitEthernet0/0/2
135
Appendix E: Cisco WAN Edge CLI-equivalent configuration
136
Appendix E: Cisco WAN Edge CLI-equivalent configuration
line aux 0
login authentication default
stopbits 1
!
line con 0
login authentication default
speed 115200
stopbits 1
!
line vty 0 4
login authentication default
transport input ssh
!
line vty 5 80
login authentication default
transport input ssh
!
sdwan
interface GigabitEthernet0/0/0
exit
interface GigabitEthernet0/0/0.10
exit
interface GigabitEthernet0/0/0.20
exit
interface GigabitEthernet0/0/1
tunnel-interface
encapsulation ipsec preference 0 weight 1
no border
color bronze
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
hello-tolerance 12
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
interface GigabitEthernet0/0/2
tunnel-interface
encapsulation ipsec preference 0 weight 1
no border
color biz-internet
no last-resort-circuit
no low-bandwidth-link
control-connections
no vbond-as-stun-server
vmanage-connection-preference 5
port-hop
carrier default
nat-refresh-interval 5
hello-interval 1000
137
Appendix E: Cisco WAN Edge CLI-equivalent configuration
hello-tolerance 12
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
exit
exit
vmanage-transaction vmanage-transaction-id 2019-05-28T00:54:15.496+00:00
omp
no shutdown
send-path-limit 16
ecmp-limit 16
graceful-restart
timers
holdtime 60
advertisement-interval 1
graceful-restart-timer 43200
eor-timer 300
exit
address-family ipv4 vrf 1
advertise ospf external
advertise connected
advertise static
!
address-family ipv4 vrf 2
advertise connected
advertise static
!
!
!
licensing config enable false
licensing config privacy hostname false
licensing config privacy version false
licensing config utility utility-enable false
netconf-yang cisco-ia blocking cli-blocking-enabled
bfd color mpls
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd color biz-internet
hello-interval 1000
no pmtu-discovery
multiplier 7
!
bfd app-route multiplier 6
bfd app-route poll-interval 120000
security
ipsec
rekey 86400
replay-window 4096
authentication-type sha1-hmac ah-sha1-hmac
!
!
nacm cmd-read-default deny
nacm cmd-exec-default deny
138
Appendix E: Cisco WAN Edge CLI-equivalent configuration
139
Appendix E: Cisco WAN Edge CLI-equivalent configuration
tunnel-interface
encapsulation ipsec
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
shutdown
!
interface 10ge0/3
description "INET Interface"
ip address 10.2.57.1/30
tunnel-interface
encapsulation ipsec preference 12
color biz-internet
allow-service all
allow-service bgp
no allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
ip route 0.0.0.0/0 10.2.56.2
ip route 0.0.0.0/0 10.2.57.2
!
vpn 1
name "Service VPN 1"
ecmp-hash-key layer4
router
bgp 65113
router-id 10.100.102.102
propagate-aspath
address-family ipv4-unicast
network 10.2.35.0/30
maximum-paths paths 2
redistribute omp
!
neighbor 10.2.25.1
description Agg-Switch2
no shutdown
remote-as 65112
timers
keepalive 3
holdtime 9
!
password $8$EvJJRIC08Ufsso+3a4HFbKenlrhAToPCBiyA2RWRLY4=
address-family ipv4-unicast
!
140
Appendix E: Cisco WAN Edge CLI-equivalent configuration
!
neighbor 10.2.35.1
description Agg-Switch1
no shutdown
remote-as 65112
timers
keepalive 3
holdtime 9
!
password $8$y86gFxlTwDb3aczIjc9BLYaCWQvaNi6q4ovLL1DL4fs=
address-family ipv4-unicast
!
!
!
!
interface 10ge0/0
description "To DC1-SW2 G1/0/6"
ip address 10.2.35.2/30
no shutdown
!
interface 10ge0/1
description "To DC1-SW1 G1/0/5"
ip address 10.2.25.2/30
no shutdown
!
omp
advertise bgp
!
tcp-optimization
!
vpn 512
name "Management VPN"
interface mgmt0
description "Management Interface"
ip address 100.119.118.12/24
no shutdown
!
!
141
Appendix E: Cisco WAN Edge CLI-equivalent configuration
142
Appendix E: Cisco WAN Edge CLI-equivalent configuration
ip address 10.2.46.1/30
tunnel-interface
encapsulation ipsec preference 10
color mpls restrict
no control-connections
allow-service all
allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
allow-service ospf
no allow-service stun
allow-service https
!
clear-dont-fragment
tcp-mss-adjust 1350
no shutdown
bandwidth-upstream 1000000
bandwidth-downstream 1000000
!
ip route 0.0.0.0/0 10.2.46.2
ip route 0.0.0.0/0 10.2.47.2
!
vpn 1
name "Service VPN 1"
ecmp-hash-key layer4
router
bgp 65113
router-id 10.100.101.101
propagate-aspath
address-family ipv4-unicast
network 10.2.24.0/30
maximum-paths paths 2
redistribute omp
!
neighbor 10.2.24.1
description Agg-Switch1
no shutdown
remote-as 65112
timers
keepalive 3
holdtime 9
!
password $8$VFBpKDv+e+ZUW1UZYKifUSJVwaLYhI1QyjWZnqdg8Ak=
address-family ipv4-unicast
!
!
neighbor 10.2.34.1
description Agg-Switch2
no shutdown
remote-as 65112
timers
keepalive 3
holdtime 9
!
password $8$iRmY15bjPLQyJWVUfdv32zpfTK2i+Z7MHMSL2RmWGTI=
address-family ipv4-unicast
!
!
!
!
interface 10ge0/0
143
Appendix E: Cisco WAN Edge CLI-equivalent configuration
144
Appendix F—Glossary
Appendix F—Glossary
DIA Direct Internet Access
145
About this guide
THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF
THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS
SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE
DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo,
DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco
Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE,
CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,
Cisco Systems Capital, the Cisco Systems logo, Cisco Unified Computing System (Cisco UCS), Cisco UCS B-Series Blade Servers,
Cisco UCS C-Series Rack Servers, Cisco UCS S-Series Storage Servers, Cisco UCS Manager, Cisco UCS Management Software,
Cisco Unified Fabric, Cisco Application Centric Infrastructure, Cisco Nexus 9000 Series, Cisco Nexus 7000 Series. Cisco Prime
Data Center Network Manager, Cisco NX-OS Software, Cisco MDS Series, Cisco Unity, Collaboration Without Limitation,
EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQuick Study, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers,
Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet,
Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the
word partner does not imply a partnership relationship between Cisco and any other company. (0809R)
146