High Availability
High Availability
High Availability
Highly Available
Wide Area Network Design
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Your speaker
• David Prall
• Principal Systems Engineer
• World Wide Enterprise Networking
• [email protected]
• CCIE 6508 (R&S/SP/Security)
• Started at Cisco July 10, 2000
• Washington, DC
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKRST-2042
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Goals
• Efficiently utilize available bandwidth
• Dynamically respond to all types of disruptions
• Leverage most effective design
techniques that meet the design
requirements
• Review today’s technology
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Where Can Outages Occur?
Link or Device Failure
MPLS - SP A
C-A-R2 Link or Device Degraded
C-A-R1 C-A-R4
C-A-R3
HQ-W1 BR-W1
MPLS - SP B
HQ-W2 BR-W2
C-B-R1 C-B-R4
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Defining Availability
Availability Downtime / Year
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Building Highly Available WANs
Redundancy and Path Diversity Matter
Downtime
SINGLE Downtime Downtime 99.90%*
per Year 99.95%*
per Year per Year
ROUTER, MPLS 4 Hours 8 Hours Internet
SINGLE PATH 4–9 Hours 22 Minutes 46 Minutes
ISR ISR
Branch WAN
HA Solution
99.995% 99.995% 99.995%
SINGLE
ROUTER, 26+ Minutes
DUAL PATHS MPLS MPLS MPLS Internet Internet Internet
DUAL
ROUTERS, 5+ Minutes
MPLS MPLS MPLS Internet Internet Internet
DUAL PATHS
ISR ISR ISR ISR ISR ISR
* Typical MPLS and Business Grade Broadband Availability SLAs and Downtime per Year, calculated with Cisco AS DAAP tool.
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Deployment Options
MPLS/MPLS
MPLS/Internet
MPLS/LTE
Internet/Internet
Internet/LTE
MPLS MPLS
Internet Internet LTE/LTE
LTE LTE
100’s of Combinations
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Agenda
• Introduction
• Cisco IOS and IP Routing
• Multiple Links/Multiple Paths
• Load Sharing
• Convergence Techniques
• Design and Deployment
• Final Wrap Up
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Routing Table Basics
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
• How is administrative
distance used to 10.0.14.0/24 10.0.14.0/24 10.0.14.0/25
determine which route 10.0.14.128/25
These Two Routes
should be installed? Are Identical
EIGRP Internal = 90
• Only identical routes OSPF = 110
are compared EIGRP Internal Installed
• Identical prefixes with router#show ip route 10.0.14.0 255.255.255.0
Routing entry for 10.0.14.0/24
different prefix lengths Known via "eigrp 1", distance 90, metric 307200, type internal
are not the same route Redistributing via eigrp 1
Last update from 10.0.121.2 on Ethernet0/1, 00:01:32 ago
• The route from the Routing Descriptor Blocks:
* 10.0.121.2, from 10.0.121.2, 00:01:32 ago, via Ethernet0/1
protocol with the lower Route metric is 307200, traffic share count is 1
administrative distance Total delay is 2000 microseconds, minimum bandwidth is 10000 Kbit
Reliability 255/255, minimum MTU 1500 bytes
is installed Loading 1/255, Hops 1
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Route Selection
OSPF EIGRP OSPF
• What about longest prefix
comparison?
10.0.14.0/24 10.0.14.0/24 10.0.14.0/25
• Only identical routes are 10.0.14.128/25
These Two Routes
compared Are Identical
• Identical prefixes with
different prefix lengths
are not the same route
OSPF Installed
• The route with the longest Longer Prefixes
prefix is router#show ip route 10.0.14.0 255.255.255.0 longer-prefixes
installed 10.0.0.0/8 is variably subnetted, 9 subnets, 3 masks
D 10.0.14.0/24 [90/307200] via 10.0.121.2, 00:01:35, Ethernet0/1
O 10.0.14.0/25 [110/20] via 10.0.122.2, 00:00:50, Ethernet0/2
O 10.0.14.128/25 [110/20] via 10.0.122.2, 00:00:50, Ethernet0/2
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Load Sharing
• Assume the same routing process attempts to install two routes for the
same destination in the RIB
• The routing process may allow the second route to be installed based on
its own rules
IGP OSPF IS-IS EIGRP
Route Cost Must be equal to Must be equal to Must be less than the
installed route installed route variance times the
lowest cost installed
route
Maximum Paths Must be fewer than maximum-paths configured under the routing
process (default = 4, maximum = 32)
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Agenda
• Introduction
• Cisco IOS and IP Routing
• Convergence Techniques
• Interface Detection
• Routing Protocols
• Static Routing and EOT
• First Hop Redundancy Protocols
• Cisco SD-WAN (Viptela)
• Design and Deployment
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Interface Detection – Carrier-Delay
• Carrier-delay
• If a link goes down and comes back up before the carrier delay timer expires, the
down state is effectively filtered, and the rest of the software on the router is not
aware that a link-down event occurred.
• Imposes a default 2 second pause before processing interface events
• Disabling carrier-delay speeds convergence upon interface events
• Disabling carrier-delay can increase control-plane usage during repetitive
interface events (flapping)
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Interface Detection - Dampening
• Dampening
• Imposes a logarithmic delay based on interface events
• Coupled with carrier-delay, dampening protects the control-plane from
repetitive events by increasing the delay before processing up events
should the interface flap.
#conf t
(config-if)#interface GigabitEthernet1
(config-if)#carrier-delay 0
(config-if)#dampening
(config-if)#end
#show dampening interface
1 interface is configured with dampening.
No interface is being suppressed.
Features that are using interface dampening:
IP Routing
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Agenda
• Introduction
• Cisco IOS and IP Routing
• Convergence Techniques
• Interface Detection
• Routing Protocols
• Static Routing and EOT
• First Hop Redundancy Protocols
• Cisco SD-WAN (Viptela)
• Design and Deployment
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Routing Protocol Timers INFORMATIONAL
BGP 60 180
EIGRP
5 (60) 15 (180)
(< T1)
IS-IS
10 (3.333) 30 (10)
(DIS)
OSPF
10 (30) 40 (120)
(NBMA)
R2
R1 R4
R3
EIGRP
~ 1s 15 (180) 15 (180) Never
(< T1)
IS-IS
~ 1s 30 (10) 30 (10) Never
(DIS)
OSPF
~ 1s 40 (120) 40 (120) Never
(NBMA)
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Routing Protocol Neighbor Behavior
Adjust Hello Timers
R2
R1 R4 BR-W1
R3
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Drivers for BFD
• Link-layer detection misses some types of outages
• e.g. Control Plane failure
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Routing Protocol Neighbor Behavior
Bidirectional Forwarding Detection
interface GigabitEthernet4
ip address 10.3.255.9 255.255.255.252
bfd interval 50 min_rx 50 multiplier 3
router eigrp 1
network 10.3.0.0 0.0.255.255
bfd all-interfaces
(Gi2)
R1#show bfd neighbors details
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int R1
10.3.255.10 4104/1 Up Up Gi4 (Gi4)
Session state is UP and using echo function with 50 ms interval. interface GigabitEthernet2
Session Host: Software ip address 172.17.2.9 255.255.255.254
OurAddr: 10.3.255.9 bfd interval 333 min_rx 333 multiplier 3
Handle: 2 router bgp 65000
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 3 neighbor 172.17.2.8 fall-over bfd
Received MinRxInt: 1000000, Received Multiplier: 3
R2
Holddown (hits): 0(0), Hello (hits): 1000(1371)
Rx Count: 985, Rx Interval (ms) min/max/avg: 34/1978/1226 last: 290 ms ago
Tx Count: 1372, Tx Interval (ms) min/max/avg: 71/1137/879 last: 721 ms ago
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: EIGRP CEF
Uptime: 00:20:06
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
C bit: 0
Multiplier: 3
My Discr.: 1
- Length: 24
- Your Discr.: 4104
Configured in milliseconds (ms)
Min tx interval: 1000000 - Min rx interval: 1000000 Displayed in microseconds (µs)
Min Echo interval: 50000
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Routing Protocol Neighbor Behavior
Bidirectional Forwarding Detection
interface GigabitEthernet4
ip address 10.3.255.9 255.255.255.252
bfd interval 50 min_rx 50 multiplier 3
router eigrp 1
network 10.3.0.0 0.0.255.255
bfd all-interfaces
(Gi2)
<show bfd neighbors details cont’d>
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int R1
172.17.2.8 4102/1 Up Up Gi2 (Gi4)
Session state is UP and using echo function with 333 ms interval. interface GigabitEthernet2
Session Host: Software ip address 172.17.2.9 255.255.255.254
OurAddr: 172.17.2.9 bfd interval 333 min_rx 333 multiplier 3
Handle: 1 router bgp 65000
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 3 neighbor 172.17.2.8 fall-over bfd
Received MinRxInt: 1000000, Received Multiplier: 3
R2
Holddown (hits): 0(0), Hello (hits): 1000(6076)
Rx Count: 4977, Rx Interval (ms) min/max/avg: 4/1970/1069 last: 491 ms ago
Tx Count: 6077, Tx Interval (ms) min/max/avg: 754/1180/879 last: 655 ms ago
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: BGP CEF
Uptime: 01:29:04
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
C bit: 0
Multiplier: 3
My Discr.: 1
- Length: 24
- Your Discr.: 4102
Configured in milliseconds (ms)
Min tx interval: 1000000 - Min rx interval: 1000000 Displayed in microseconds (µs)
Min Echo interval: 333000
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Routing Protocol Neighbor Behavior
Detecting Unreachable Neighbor (Hello Timers vs. BFD)
100% Packet Loss
R1 R2
(Link Up)
EIGRP Default: Elapsed Time Between 10 – 15 Sec
R1#show clock
*09:58:27.716 UTC Sat Jan 27 2018
R1# 12.896
*Jan 27 09:58:40.612: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor
10.3.255.10 (GigabitEthernet4) is down: holding time expired seconds
BFD: Elapsed Time Between 100 - 150 ms with 50ms interval
R1#show clock
*09:35:44.408 UTC Sat Jan 27 2018
R1#
*Jan 27 09:35:45.571: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD
session ld:4101 handle:2,is going Down Reason: ECHO FAILURE
*Jan 27 09:35:45.575: %BFD-6-BFD_SESS_DESTROYED: BFD-SYSLOG: 1.172
bfd_session_destroyed, ld:4101 neigh proc:EIGRP, handle:2 act
*Jan 27 09:35:45.580: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor seconds1
10.3.255.10 (GigabitEthernet4) is down: BFD peer down notified
1 injecting 100% loss after hitting show clock in the lab BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Agenda
• Introduction
• Cisco IOS and IP Routing
• Convergence Techniques
• Interface Detection
• Routing Protocols
• Static Routing and EOT
• First Hop Redundancy Protocols
• Cisco SD-WAN (Viptela)
• Design and Deployment
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
EOT, Static Routing, and DDR
• Enhanced Object Tracking (EOT)
• Static Routing Options
• Floating Static Routes
• Reliable Static Routing (RSR) using EOT
• Dial on Demand Routing (DDR)
• EEM Script
• DMVPN State Tracking
• More information:
• http://cs.co/ddrbackup
• Expands to https://www.cisco.com/c/en/us/support/docs/dial-access/dial-on-demand-routing-ddr/10213-backup-main.html
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Enhanced Object Tracking (EOT)
Local Significance
Track Options Syntax
Line-Protocol State track object-number interface type number line-protocol
of Interface track 1 interface serial 2/0 line-protocol
IP-Routing State of track object-number interface type number ip routing
Interface track 2 interface ethernet 1/0 ip routing
IP-Route track object-number ip route IP-Addr/Prefix-len reachability
Reachability track 3 ip route 10.16.0.0/16 reachability
Threshold* of IP- track object-number ip route IP-Addr/Prefix-len metric threshold
Route Metrics track 4 ip route 10.16.0.0/16 metric threshold
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Static Host Route Guarantees probe
Reliable Static Routing destination only reachable via desired
path
Tracking IP SLA track 4 list boolean or
object 400
object 401 Permanent to guarantee probes only utilize
track 400 ip sla 400 reachability desired path. Stay down when down.
track 401 ip sla 401 reachability
ip sla 400
icmp-echo 10.100.100.100 source-ip 10.1.2.120
IP SLA IP SLA
timeout 100
frequency 10
ip sla schedule 400 life forever start-time now
ip sla 401
icmp-echo 10.100.200.100 source-ip 10.1.2.120
(.9) (.9) timeout 100
frequency 10
ip sla schedule 401 life forever start-time now
!
ip route 10.100.100.100 255.255.255.255 Ethernet 0/1 192.168.101.9 permanent
ip route 10.100.200.100 255.255.255.255 Ethernet 0/1 192.168.101.9 permanent
ip route 10.100.0.0 255.255.0.0 192.168.101.9 track 4
192.168.101.8/29 192.168.201.8/29
BR-W1 ip route 10.100.0.0 255.255.0.0 192.168.201.9 200
BR-W1#
*Mar 12 03:57:28.367: %TRACKING-5-STATE: 400 ip sla 400 reachability Up->Down Unable to Reach
*Mar 12 03:57:37.374: %TRACKING-5-STATE: 401 ip sla 401 reachability Up->Down
IP SLA
*Mar 12 03:57:38.137: %TRACKING-5-STATE: 4 list boolean or Up->Down IP SLA IP SLA
Responders
(.9) (.9)
192.168.101.8/29 192.168.201.8/29
ip sla 610
Unable to Reach icmp-echo 2001:DB8::12 source-interface GigabitEthernet0/1.99
threshold 1000
IP SLA IP SLA frequency 10
Responder ip sla schedule 610 life forever start-time now
WAN RTR track 600 list threshold percentage
WAN RTR
<snip additional tracked objects>
object 610
2001:DB8:B::5 threshold percentage down 40 up 60
track 610 ip sla 610
event manager applet DISABLE-STATIC-IPv6 Don’t forget to reenable
event track 600 state down
action 1 cli command "enable"
BR RTR action 2 cli command "configure terminal"
action 3 cli command "no ipv6 route ::/0 2001:DB8:B::5"
action 4 cli command "end"
action 99 syslog msg “DEFAULT IPv6 ROUTE DISABLED"
BR-RTR#
14:22:14: %TRACKING-5-STATE: 610 ip sla 610 state Up->Down
14:22:14: %TRACKING-5-STATE: 600 list threshold percentage Up->Down
14:22:14: %SYS-5-CONFIG_I: Configured from console by on vty0(EEM:DISABLE-STATIC-IPv6)
14:22:14: %HA_EM-6-LOG: DISABLE-STATIC-IPv6: DEFAULT IPv6 ROUTE DISABLED
15.4(1)T added Reliable Static Routing
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Black Hole Route Detection ip sla 110
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
EEM Script
LTE Backup with Event Tracking ip sla 100
icmp-echo 192.168.4.22 source-interface GigabitEthernet0/1
threshold 1000
frequency 15
ip sla schedule 100 life forever start-time now
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
First Hop Redundancy Protocols (FHRP)
Failure Protection for the First Hop IP Router
• Hot Standby Router Protocol (HSRP)
• v2 IPv4 and IPv6
BR-W1 BR-W2
• Virtual Router Redundancy Protocol (VRRP)
• RFC5798 (v3 IPv4 and IPv6), RFC3768 (v2 IPv4), RFC2338 (v1)
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Drivers for FHRPs
• Provide routing redundancy for access layer
• How to handle failover when end-hosts have only a single IP default gateway and
cached ARP entry
• Provide routing redundancy for devices that depend on static routing
• Some firewalls do not support dynamic routing
• Independent of routing protocols
• Works with any routing protocol and static routing
• Capable of providing sub-second failover
• Provides load sharing capabilities (GLBP) transparent to end host
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Hot Standby Routing Protocol (HSRP)
interface FastEthernet0/0
ip address 10.1.2.2 255.255.255.0 interface FastEthernet0/0
standby version 2 ip address 10.1.2.3 255.255.255.0
standby 4 ip 10.1.2.1 standby version 2
standby 4 priority 110 Active Standby standby 4 ip 10.1.2.1
standby 4 preempt Router Router standby 4 preempt
BR-W1 BR-W2
standby 6 ipv6 autoconfig (.2)
HSRP
(.3)
standby 6 ipv6 autoconfig
standby 6 priority 110 VIP (.1) standby 6 preempt
standby 6 preempt ipv6 address 2001:DB8:5:1::2/64
ipv6 address 2001:DB8:5:1::1/64
Default Gateway: (.1)
DG MAC: MAC VIP
BR-W1#show standby brief
P indicates configured to preempt.
|
Interface Grp Pri P State Active Standby Virtual IP
Fa0/0 4 110 P Active local 10.1.2.3 10.1.2.1
Fa0/0 6 110 P Active local FE80::A8BB:CCFF:FE00:3400
FE80::5:73FF:FEA0
:6
BR-W2#show standby brief
Interface Grp Pri P State Active Standby Virtual IP
Fa0/0 4 100 P Standby 10.1.2.2 local 10.1.2.1
Fa0/0 6 100 P Standby FE80::A8BB:CCFF:FE00:3300
HSRP—Global IPv6 Addresses Available local FE80::5:73FF:FEA0
for Static Deployments :6
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Hot Standby Routing Protocol (HSRP)
Active
Local Router
BR-W1 BR-W2
HSRP
Failures (.2)
(.1)
(.3)
VIP
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Hot Standby Routing Protocol (HSRP)
Complex Failure
Upstream/Remote Requires
“Enhanced Object
Failures Tracking (EOT)”
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Gateway Load Balancing Protocol (GLBP) BR-W1#show run int fa0/0
interface FastEthernet0/0
ip address 10.1.2.2 255.255.255.0
AVG = Active Virtual Gateway glbp 4 ip 10.1.2.1
glbp 4 preempt
SVG = Standby Virtual Gateway glbp 4 weighting 110 lower 100
glbp 6 ipv6 autoconfig
AVF = Active Virtual Forwarder glbp 6 preempt
glbp 6 weighting 110 lower 100
ipv6 address 2001:DB8:5:1::1/64
BR-W1#show glbp brief
Interface Grp Fwd Pri State Address Active router Standby router
Fa0/0 4 - 100 Active 10.1.2.1 local 10.1.2.3
Fa0/0 4 1 - Active 0007.b400.0401 local -
AVG SVG Fa0/0 4 2 - Listen 0007.b400.0402 10.1.2.3 -
Fa0/0 6 - 100 Active FE80::7:B4FF:FE00:600
AVF A AVF B local FE80::A8BB:CCF
BR-W1 BR-W2
GLBP F:FE00:3400
(.2) (.3)
Fa0/0 6 1 - Active 0007.b400.0601 local -
VIP (.1) (.1) VIP Fa0/0 6 2 - Listen 0007.b400.0602 FE80::A8BB:CCFF:FE00:3400
-
BR-W2#show glbp brief
Interface Grp Fwd Pri State Address Active router Standby router
Fa0/0 4 - 100 Standby 10.1.2.1 10.1.2.2 local
Fa0/0 4 1 - Listen 0007.b400.0401 10.1.2.2 -
Fa0/0 4 2 - Active 0007.b400.0402 local -
Default Gateway: Default Gateway: (.1) Fa0/0 6 - 100 Standby FE80::7:B4FF:FE00:600
(.1) DG MAC: AVF B FE80::A8BB:CCFF:FE00:3300
DG MAC: AVF A local
Fa0/0 6 1 - Listen 0007.b400.0601 FE80::A8BB:CCFF:FE00:3300
-
Fa0/0 6 2 -
BRKRST-2042 Active 0007.b400.0602 local
© 2019 Cisco and/or its affiliates. -Public BRKRST-2042
All rights reserved. Cisco 57
Gateway Load Balancing Protocol (GLBP)
AVG = Active Virtual Gateway
SVG = Standby Virtual Gateway
AVF = Active Virtual Forwarder
BR-W2#
*May 26 19:09:14.260: %GLBP-6-STATECHANGE: FastEth0/0 Grp 4 state Standby -> Act
ive
*May 26 19:09:15.326: %GLBP-6-FWDSTATECHANGE: FastEth0/0 Grp 4 Fwd 1 state Liste
n -> Active
*May 26 19:09:15.826: %GLBP-6-STATECHANGE: FastEth0/0 Grp 6 state Standby -> Act
ive AVG
*May 26 19:09:16.856: %GLBP-6-FWDSTATECHANGE: FastEth0/0 Grp 6 Fwd 1 state Liste
n -> Active AVF A
BR-W1 BR-W2
GLBP AVF B
Local (.2) (.3)
(.1) VIP
Failures
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
GLBP with Enhanced Object Tracking
AVG = Active Virtual Gateway
SVG = Standby Virtual Gateway
AVF = Active Virtual Forwarder
Complex Failure
Requires
Upstream/Remote “Enhanced Object
Failures Tracking (EOT)”
Requires “Enhanced
Object Tracking”
AVF A
BR-W1 AVG
AVF A
BR-W2 BR-W1 AVG BR-W2
GLBP AVF B GLBP AVF B
(.2) (.3) (.2) (.3)
(.1) (.1) VIP
VIP
Branch
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Enhanced Object Tracking (EOT)
Tracking IP SLA
ip sla 100
Lo0 Lo0
icmp-echo 10.100.100.100 source-ip 10.1.2.2
10.100.100.100 10.100.200.100 timeout 100
frequency 10
IP SLA IP SLA ip sla schedule 100 life forever start-time now
ip sla 200
icmp-echo 10.100.200.100 source-ip 10.1.2.2
timeout 100
frequency 10
ip sla schedule 200 life forever start-time now
ip route 10.100.100.100 255.255.255.255 FastEthernet0/1 192.168.101.9 permanent
ip route 10.100.200.100 255.255.255.255 FastEthernet0/1 192.168.101.9 permanent
BR-W1#show ip sla statistics
IPSLA operation id: 100
Latest RTT: 1 milliseconds
AVF A AVF B Latest operation start time: *04:42:11.444 UTC Tue Feb 17 2009
Latest operation return code: OK
BR-W1 BR-W2
GLBP Number of successes: 46
(.2) (.3) Number of failures: 0
VIP (.1) (.1) VIP Operation time to live: Forever
IPSLA operation id: 200
Latest RTT: 1 milliseconds
Latest operation start time: *04:42:11.356 UTC Tue Feb 17 2009
Latest operation return code: OK
Number of successes: 24
Number of failures: 0
Operation time BRKRST-2042
to live: Forever© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Enhanced Object Tracking
Tracking IP SLA
BR-W1#
track 100 ip sla 100 reachability BR-W1#show glbp
track 200 ip sla 200 reachability FastEthernet0/0 – Group 4
track 1 list boolean or State is Active
1 state change, last state change 00:09:59
object 100 IP SLA IP SLA Virtual IP address is 10.1.2.1
object 200 Hello time 3 sec, hold time 10 sec
interface FastEthernet0/0 Next hello sent in 2.336 secs
ip address 10.1.2.2 255.255.255.0 Redirect time 600 sec, forwarder timeout 14400 sec
Preemption enabled, min delay 0 sec
glbp 4 ip 10.1.2.1 Active is local
glbp 4 priority 110 Standby is 10.1.2.3, priority 105 (expires in 7.808 sec)
glbp 4 preempt Priority 110 (configured)
glbp 4 weighting 110 lower 100 Weighting 110 (configured 110), thresholds: lower 100,
glbp 4 load-balancing weighted upper 110
Track object 1 state Up decrement 20
glbp 4 weighting track 1 decrement 20 Load balancing: weighted
Group members:
AVF A AVF B aabb.cc00.0110 (10.1.2.2) local
aabb.cc00.0410 (10.1.2.3)
BR-W1 BR-W2 There are 2 forwarders (1 active)
GLBP
(.2) (.3) Forwarder 1
VIP (.1) (.1) VIP State is Active
<SNIP>
Forwarder 2
State is Listen
<SNIP>
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Enhanced Object Tracking
Composite Failure BR-W1#
*Feb 17 05:17:25: %TRACKING-5-STATE: 100 ip sla 100 state Up->Down
*Feb 17 05:17:25: %TRACKING-5-STATE: 200 ip sla 200 state Up->Down
*Feb 17 05:17:26: %TRACKING-5-STATE: 1 list boolean or Up->Down
*Feb 17 05:17:38: %GLBP-6-FWDSTATECHANGE: FastEth0/0 Grp 4 Fwd 1 state
Active -> Listen
BR-W2#show glbp IP SLA IP SLA
FastEthernet0/0 – Group 4
State is Standby
1 state change, last state change 00:28:16
Virtual IP address is 10.1.2.1
BR-W1 Remains Hello time 3 sec, hold time 10 sec
Next hello sent in 1.856 secs
Active Virtual Redirect time 600 sec, forwarder timeout 14400 sec
Unable to Reach
Preemption enabled, min delay 0 sec Either
Gateway (AVG) Active is 10.1.2.2, priority 110 (expires in 10.400 sec)
Standby is local IP SLA
Priority 105 (configured) Responder
Weighting 110 (configured 110), thresholds: lower 100, upper 110
AVF A
Track object 1 state Up decrement 20
AVG
Load balancing: weighted AVF B
BR-W2 Becomes Group members:
BR-W1
GLBP
BR-W2
aabb.cc00.0110 (10.1.2.2) (.2) (.3)
Active Virtual aabb.cc00.0410 (10.1.2.3) local (.1) VIP
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Overlay Management Protocol (OMP)
vSmart • TCP based extensible control plane protocol
• Runs between WAN Edge routers and vSmart
controllers and between the vSmart controllers
- Inside TLS/DTLS connections
• Leverages address families to advertise
reachability for TLOCs, unicast/multicast
vSmart vSmart
destinations (statically/dynamically learnt service
side routes), service routes (L4-L7), BFD stats
(TE and H-SDWAN) and Cloud onRamp for SaaS
probe stats (gateway)
- Uses attributes
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Bidirectional Forwarding Detection (BFD)
WAN Edge
• Path liveliness and quality measurement detection
protocol
- Up/Down, loss/latency/jitter, IPSec tunnel
MTU
• Runs between all WAN Edge routers in the
WAN Edge WAN Edge
topology
- Inside IPSec tunnels
- Operates in echo mode
- Automatically invoked at IPSec tunnel establishment
- Cannot be disabled
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Path Quality and Liveliness Detection
Multiplier (n)
• Each WAN Edge router sends BFD hello
packets for path quality and liveliness
detection
- Packets echoed back by remote site
Internet
Remote Site
MPLS Regional
Path 2 Data Center
LTE
Path1: 10ms, 0% loss, 5ms jitter
Path2: 200ms, 3% loss, 10ms jitter
Path3: 140ms, 1% loss, 10ms jitter IPSec Tunnel
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Transport Redundancy - Meshed
WAN Edge routers are directly connected to all
the transports
- No need for L2 switches front-ending the WAN
MPLS Internet Edge routers
When transport goes down, WAN Edge routers
detect the condition and bring down the tunnels
built across the failed transport
WAN Edge WAN Edge - BFD times out across tunnels
Both WAN Edge routers still draw the traffic for
the prefixes available through the SD-WAN
fabric
If one of the WAN Edge routers fails (dual
failure), second WAN Edge router takes over
forwarding the traffic in and out of site
- Both transport are still available
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Transport Redundancy – TLOC Extension
WAN Edge routers are connected only to their
respective transports
MPLS Internet WAN Edge routers build IPSec tunnels across
directly connected transports and across the
transports connected to the neighboring WAN
Edge router
WAN Edge WAN Edge - Neighboring WAN Edge router acts as an
underlay router for tunnels initiated from the
other WAN Edge
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Path and Remote-End Redundancy
WAN Edge routers leverage BFD for
Data
Center
detecting tunnel liveliness
• If intermediate network path through the
SD-WAN fabric fails or if the remote-end
WAN Edge router (e.g. data center) fails,
MPLS Internet BFD hellos will time out and remote site
WAN Edge router will bring down its
relevant IPSec tunnels
• Traffic will be rerouted after the failed
condition had been detected
- BFD hello timer and multiplier can be
Remote tweaked for faster detection
Site
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
SD-WAN Demo
Summary of Convergence Techniques
Excellent Option
R2
R1 R4 SubOptimal Option
R3
Bad Option
Effectiveness of Various Techniques for Different Outage Types
Link Down Link Up Link Up Upstream Upstream
Neighbor Down Loss ~5% Blackhole Brownout
Routing
Protocols
EOT2
RSR3 using
EOT (w/IP
SLA)
SD-WAN
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Dual WAN (MPLS—Dual Carrier)
PE-CE Protocol: BGP 10.100.0.0/16 10.1.2.0/24
HQ- HQ-W1
Branch
192.168.201.8/29
HQ-W2
HQ-CORE1#show ip route
D EX 10.1.2.0/24 [170/258816] via 10.1.1.110, 02:24:22, Vlan10
[170/258816] via 10.1.1.210, 02:24:22, Vlan10
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Dual WAN (MPLS—Dual Carrier)
PE-CE Protocol: BGP Layer 3 Campus Locations
• IGP (EIGRP examples) 10.100.0.0/16 10.1.2.0/24
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Dual WAN (MPLS—Dual Carrier)
Mutual Route Redistribution Detail
Routes into EIGRP
HQ-W1#
router eigrp networkers
address-family ipv4 unicast autonomous-system 65110
topology base
10.1.1.0/2
redistribute bgp 65110 metric 45000 100 255 1 1500
4 address-family ipv6 unicast autonomous-system 65110
topology base
redistribute bgp 65110 metric 45000 100 255 1 1500
BR
HQ-W1
AS 65100 Routes into BGP
HQ-CORE1
eBGP HQ-W1#
EIGRP
iBGP
10.1.2.0/24
10.1.1.0/2
router bgp 65110
address-family ipv4
eBGP
redistribute eigrp 65110 route-map BLOCK-TAGGED-ROUTES
AS 65200 address-family ipv6
HQ-W2
BR redistribute eigrp 65110 route-map BLOCK-TAGGED-ROUTES
HQ-CORE2
!
BGP Redistribution to
route-map BLOCK-TAGGED-ROUTES deny 10
10.100.0.0/16
IGP automatically tags match tag 65100 65200
routes with neighbor route-map BLOCK-TAGGED-ROUTES permit 20
AS Number !
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Dual WAN (MPLS—Dual Carrier)
PE-CE Protocol: BGP Layer 2 Single Router Branch
10.100.0.0/16 10.1.2.0/24
• Neighbor AS or
AS-PATH EIGRP eBGP eBGP
• Weight
BR-W1#show ip bgp
• Local Preference
• AS-PATH length Network Next Hop Metric LocPrf Weight Path
• Origin
* 10.100.0.0/16 192.168.201.9 0 65200 65200 ?
• Med
*> 192.168.101.9 0 65100 65100 ?
BR-W1#show ip route
B 10.100.0.0/16 [20/0] via 192.168.101.9, 00:34:00
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Dual WAN (MPLS—Dual Carrier)
PE-CE Protocol: BGP Layer 2 Single Router Branch
10.100.0.0/16 10.1.2.0/24
• maximum-paths 2 HQ-
CORE1
HQ-W1
192.168.101.8/29
BR-W1
relax
EIGRP eBGP eBGP
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
DUAL WAN (MPLS + Internet)
PE-CE Protocol: BGP, Tunnel Protocol: EIGRP
• Headquarters WAN Edge
EIGRP BGP BGP
Headquarters Core
A-R1 MPLS - SP A A-R4
•
HQ-CORE1 HQ-W1 BR-W1
EIGRP
HSRP
results in EIGRP external Internet
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
DUAL WAN (MPLS + Internet)
PE-CE Protocol: BGP, Tunnel Protocol: EIGRP
• Single Router Branch WAN Edge
• W1 learns HQ route via eBGP and EIGRP Internal
• eBGP Administrative Distance preferred
EIGRP BGP BGP
10.100.0.0/16 10.1.2.0/24
10.1.1.0/24
HQ-W1
HQ-CORE1
192.168.101.8/2
9 BR-W1
VPN Tunnel
EIGRP
BR-W1#show ip route
B 10.100.100.0/24 [20/0] via 192.168.101.9, 04:48:58
B 10.100.200.0/24 [20/0] via 192.168.101.9, 03:44:06
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
DUAL WAN (MPLS + Internet)
PE-CE Protocol: BGP, Tunnel Protocol: EIGRP
Dual Router Branch WAN Edge
EIGRP BGP BGP
• 10.100.0.0/16 10.1.2.0/24
10.1.1.0/24
HSRP
EIGRP
• No redistribution configured
Internet
• HSRP Primary is on W1
10.0.1.0/29
EIGRP
BR-W1#show ip route
B 10.100.100.0/24 [20/0] via 192.168.101.9, 04:48:58
B 10.100.200.0/24 [20/0] via 192.168.101.9, 03:44:06
BR-W2#show ip route
Branch to HQ Traffic D 10.100.100.0/24 [90/26882816] via 10.0.1.1, 00:10:56, Tunnel1
D 10.100.200.0/24 [90/26882816] via 10.0.1.1, 00:10:57, Tunnel1
Flows Across MPLS BR-W1#show standby brief
P indicates configured to preempt.
|
Interface Grp Pri P State Active Standby Virtual IP
Fa0/1 1 110 P Active local 10.1.2.220 10.1.2.1
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
DUAL WAN (MPLS + Internet)
PE-CE Protocol: BGP, Tunnel Protocol: EIGRP
• How to force HQ to Branch traffic across MPLS (primary)?
• Adjust administrative distance EIGRP BGP BGP
EIGRP
HSRP
distance 195 10.0.1.0 0.0.0.7 Internet
Worst Case
10.1.1.0/24
•
MPLS - SP A
EIGRP
HSRP
• End to end convergence time as Internet
• 10.1.1.0/24
unchanged at BR-W1
EIGRP
HSRP
Internet
EIGRP
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Key Takeaways
• Outages can manifest in many different ways. Network design should be
based on application requirements to survive various outages.
• Cisco IOS has inherent load sharing capabilities. Analyze your network
topology and use these to your advantage.
• End-to-end convergence time is a critical metric. Understand how
localized topology changes affect end-to-end resiliency.
• Multiple links/paths not only increase network reliability but can improve
application performance.
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Key Takeaways
• IP SLA based monitoring can detect outage types that are virtually
undetectable by traditional “hello based” techniques.
• BFD is a lightweight tool for speeding convergence of all protocols.
• Cisco SD-WAN permits full utilization of available bandwidth and path
selection based on current real time characteristics.
• Most effective network designs incorporate a combination of convergence
techniques
• Cisco SD-WAN utilizes these features, while simplifying deployment and
management, and increasing application availability.
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKRST-2042
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Complete your online
session survey
• Please complete your Online Session
Survey after each session
• Complete 4 Session Surveys & the Overall
Conference Survey (available from
Thursday) to receive your Cisco Live T-
shirt
• All surveys can be completed via the Cisco
Events Mobile App or the Communication
Stations
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Continue Your Education
BRKRST-2042 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Thank you