BRKENT-2060 - Cisco SD-WAN Cloud OnRamp For Multicloud
BRKENT-2060 - Cisco SD-WAN Cloud OnRamp For Multicloud
BRKENT-2060 - Cisco SD-WAN Cloud OnRamp For Multicloud
BRKENT-2060
Question:
what is this time slot about?
95,212,800 seconds
1,586,880 minutes
26,448 hours
1,102 days
Answer: … since last CL EMEA in Barcelona 2020
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Cloud OnRamp solves your cloud problems
Automation Operations
Site-to-Site, Site-to- Cloud Audit, Monitoring,
Cisco
Cloud, Cloud-to-Cloud Prediction and Recommendation
Cloud
OnRamp
Security App Performance
Cloud Security, SIG, On-Prem Service Directory Integration, Mid-
Mile Optimization
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
• Introduction
• Site-to-cloud:
design, automation, performance, security
• Conclusion
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Cisco Webex App
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install the Webex App or go directly to the Webex space Enter your personal notes here
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Your voice matters!
Live poll during this session.
https://app.sli.do/event/d71oy65sDmvgK1YB67RkoU
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Introduction
Cisco SD-WAN – Building Blocks
Cisco SD-WAN
Multicloud Security Analytics
BRKNTW-2210
Cisco SD-WAN Cloud OnRamp
Cisco SD-WAN Cloud OnRamp delivers unified policy with IaaS integrations, optimal application experience with
SaaS optimization, and automated, cloud-agnostic branch connectivity with cloud hub and cloud interconnect.
Multicloud SaaS
Cloud Hub Cloud Cloud
Interconnect OnRamp for
THIS SESSION SaaS
AWS TGW
Megaport Microsoft 365
Azure vWAN
Equinix Webex
Google NCC
Custom App
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Introduction: Cloud Hub (aka IaaS)
Cisco delivers cloud trifecta
with top 3 cloud providers
Greater automation
Automate SD-WAN extension to the cloud
with just a few clicks in vManage
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Introduction: Cloud Interconnect
• Colocation
Cisco Cisco
SD-WAN
fabric
vManage
SD-WAN
fabric
vManage • CSP-independent
MVE MVE NE NE
• SDN driven
Enterprise site Enterprise site Enterprise site Enterprise site
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Your voice matters!
Live poll during this session.
https://app.sli.do/event/d71oy65sDmvgK1YB67RkoU
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Site-to-cloud
Same design principle for all CSPs
BGP CSP Host VPC 1
Tunnel Network
Entity in EU Host VPC n
C8000v
SD-WAN
SD-WAN Routers
Fabric
BGP CSP Host VPC 1
Tunnel Network
Entity in US Host VPC n
AZ1
Transit VPC
AZ2
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
18
Your Main benefit: single UI for SD-WAN and Cloud
Same workflow
for all CSPs!
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Segmentation
Mapping different SD-WAN networks with different cloud VPCs
ENG
VPC AWS TGW
ENG
Cisco c8kv
SD-WAN
Cisco c8kv HR
HR SD-WAN VPC
VPC
Topics to consider:
• Automated in vManage single UI
• Overlapping IP addresses
Under the hood: different route tables on TGW
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
SD-WAN on AWS
Design details for AWS
• 3 different Solutions supported today
US-West-1
• AWS Cloud WAN support coming soon
Host VPC Host VPC • All – automated in Cisco vManage!
AWS
TGW
IPSec or GRE tunnels
(next slide with details)
SD-WAN TVPC
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Different connectivity options to AWS TGW available today
vManage vManage Custom automation
SD-WAN via VPN Attachment SD-WAN via TGW Connect SD-WAN via VPC Attachment
Host VPC1 Host VPC1
Host VPC1
AZ1 AZ1
VPC Transit VPC VPC Transit VPC
Attachment VPN AZ1 Attachment VPC
VPC Transit VPC
Attachment Attachment
AZ2 Attachment Connect AZ2
Attachment
AZ2
AZ1
AWS Transit AZ1
AWS Transit
Gateway Gateway
AZ1
AWS Transit
Gateway
AZ2 AZ2
AZ2
• SD-WAN Routers in Transit VPC establish BGP over • GRE tunnel to TGW instead of IPSec: 5 instead of • No dynamic routing between SD-WAN routers and TGW
IPSec tunnels to TGW 1.25 Gbps • SD-WAN Routers in Transit VPC have TGW as next hop for
• Automated workflow including inter-region use case • Usage of private IP for GRE tunnel possible cloud routes
with Cloud onRamp for Multicloud • Automated as Cloud onRamp for Multicloud • Scales up to 50 Gbps TGW Limit.
• AWS TGW Limit of 1.25 Gbps for one IPSec Tunnel • C8kv VM performance depends on the AWS VM type
• No Cloud onRamp automation, custom automation needed
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Adoption: Customer Case Study
https://aws.amazon.com/partners/success/engie-cisco/
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
SD-WAN on Azure
Cisco SD-WAN integration with Microsoft vWAN
Azure Azure
Different Terminology Monitor Monitor
vWAN, vHub and VNet Cisco vManage
Branch DC Branch
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Multiple vHubs per Azure Region From 20.11
Problem SW Release
CoR Azure vWAN solution supports only one vHub in single
region. For large scale deployments would like to extend the
SD-WAN Fabric to more than one vHub per Region as
Region 1 Region 2
Single vHub can only scale up to 1000 sites per region.
Solution Route-table
Azure Virtual WAN vHub
Route-table
vHub
c8kv
c8kv
• Cloud OnRamp for Multi-Cloud now supports customers to Azure Backbone
deploy Cloud Gateways into multiple Virtual Hubs within the Route-table
Route-table vHub
same region vHub VHUB
Route-table
c8kv
c8kv
c8kv
• Cloud Gateways (c8kv) will advertise all VNets connected to all
the vHubs, and we can direct traffic flows using SD-WAN
Centralized policies.
Caveats
• No segmentation
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Azure Express Route as Transport with SD-WAN in a Click
Problem Statement:
• NVAs (c8kv) inside the vHub can only have two interfaces.
One is for the service VPN and the other is for transport.
• Currently, the default template assigns a color of default to
the transport interface. This means only TLOC with public
colors can form tunnels to the NVA with public IPs.
• Express Route is a private link that uses a private IP address
since the default template color is a public category that by
nature tries to form the tunnels in public space where the
express route can't reach.
Solution:
Change the color of GE1 of the NVAs inside the vHub from
default to a private color. It allows the usage of both Express
Route and Public Internet as SD-WAN transports.
Benefits:
• redundant paths from edge locations to Azure Workload
VNets
Private Colors: Public Colors: • higher throughput and lower latency
metro-ethernet 3g, lte
mpls biz-internet If two ends have a private color: private IP address used for SD-WAN connection.
private1-private6 public-internet If endpoint has public color: public IP is used.
blue, green, red
gold, silver, bronze BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Adoption: CoR on Azure
• Azure examples:
Adecco, URC Vietnam
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
SD-WAN on GCP
GCP Technical Design: High Level for site-to-cloud and site-to-site use cases
Control/ SD-WAN Fabric
Management Google Region 1
Cloud APIs
S2C Transit VPC
Device Traffic App Workload VPC
Config Policy Policy
WAN VPC
BGP VPC
SD-WAN Site 1 Peering Workload VPC
GCR
c8kv
SD-WAN Site 2
Interconnect VPC
GCR S2S Transit VPC
for SDCI from 20.9
SD-WAN Overlay
Workload VPC
WAN VPC
BGP VPC
SD-WAN Site 3 Peering Workload VPC
GCR
c8kv
S2C Transit VPC
SD-WAN Site N
Google Region N
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Google Network Connectivity Center (NCC)
GCP Networking is different - global virtual networks that are truly global:
1. create a VPC network
2. create a subnet in the US, put your US VM in it
3. create a subnet in Singapore, put your Singapore VM in it
Non-technical reason: source and dest. IP must be in GCP
Details:
• Hub-and-spoke model
• Pure Connectivity Management
• Data plane – direct SD-WAN tunnel
between two c8kv in different regions
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Customizing Cloud onRamp
Problem definition
• You successfully deployed CoR for Multicloud with 1,001 Routes from SD-WAN
Transit VPC, AWS TGW and two SD-WAN Routers AZ1 to AWS TGW via BGP
TGW
• AWS TGW gets all routes, but you want to send only AZ2
Host VPC
few of them to TGW.
Cisco CSR
VPC
Attachment
Host VPC
AZ1
Transit VPC
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Let’s look at the configs
Router Config
route-map AWS_TGW_CSR_ROUTE_POLICY deny 1
CLI Add-On Template
match as-path 15
! route-map AWS_TGW_CSR_ROUTE_POLICY permit 110
route-map AWS_TGW_CSR_ROUTE_POLICY permit 11 match as-path 250
match as-path 25 !
!
route-map AWS_TGW_CSR_ROUTE_POLICY deny 65535
Result
route-map AWS_TGW_CSR_ROUTE_POLICY deny 1
match as-path 15
!
route-map AWS_TGW_CSR_ROUTE_POLICY permit 11
match as-path 25
!
route-map AWS_TGW_CSR_ROUTE_POLICY permit 110
match as-path 250
!
route-map AWS_TGW_CSR_ROUTE_POLICY deny 65535
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Performance
Performance in the cloud
Scale options:
• Horizontal Scale = spin up many VMs
• Single VM Scale = use the top instance type
Questions to consider:
• Packet size: Jumbo / Large / IMIX
• Automation for horizontal scale
• Cloud Limitations (may be not visible at the first look)
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Performance Details for C8kv on AWS
Performance
• With SD-WAN v17.9/20.9 c8kv can use c5n.18xlarge
VM type
Caveats
• 17.7 perf improvement is achieved with AWS
Multi-TxQs, means a setup with 8 SD-WAN
IPsec Tunnels. Same apply to c5n.18x in 17.9.
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Performance Details for C8kv on Google Cloud
GCP Horizontal Scale
17.9 introduces ability to spin up up to 8 Catalyst
8000v SD-WAN routers as a part of Cloud
Gateway creation, which address high bandwidth
requirements for GCP.
Caveats
• Number of c8kv routers per region is between
2 and 8.
• Static configuration, no dynamic scale (yet)
based on utilization or other KPIs.
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Example with 8 x C8kv on Google Cloud
Host VPC 1 Host VPC 2
10.24.0.0/16 10.25.0.0/16
VPC Peering
s2c-vpc • Two BGP sessions for redundancy
10.76.0.160/27
BGP
• .161 is the default gateway for s2c VPC
.167
• We do not have technical data for scale
beyond this point.
R2
• Assumption – GCP is not a bottleneck
wan-vpc
10.76.0.128/27
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Performance on Azure
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Security
SD-WAN Security – Overview
SASE
vManage vAnalytics SecureX Identity services ZTNA 3rd Party Eco-System
Identity
Zero Trust
Internet
Unified Policy
SIG Management
Cisco SD-WAN
Distributed Security
Fabric
Enforcement
URL TLS
NGFW Filtering
IPS AMP Proxy
Secure Internet
HQ Gateway
Embedded
SD-WAN Security
Stack
Fabric
Data Center Branches
Visibility & Reporting
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
AWS: Centralized Firewall Design
Host
Host VPC1
VPC2
Requirements
AWS us-west App1 App2 East-west, north-south traffic must go
through firewall
Shared services VPC
Benefits
AZ1 •Scalable solution
FTDv-1
… AWS TGW
•SD-WAN and security from one hand
Public internet
Host
AWS us-west Host VPC1
VPC2 From Host VPC to SD-WAN
App1 App2
Host VPC ➔ AWS TGW ➔ GWLB ➔ FTDv ➔ TGW ➔ SD-WAN
Shared services VPC
AZ1
Returning traffic
FTDv-1
SD-WAN ➔ AWS TGW ➔ GWLB ➔ FTDv ➔ TGW ➔ Host VPC
… AWS TGW
FTDv = Secure Firewall Threat Defense Virtual (aka FTDv / NGFWv) Geneve = Generic Network Virtualization Encapsulation
GWLB = AWS Gateway Load Balancer AZ = Availability Zone (AWS data center)
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
For Your
Packet flow: Details for shared services VPC Reference
Step 2: TGW routes to GWLB endpoint – shared services route table Step 5: Firewall decapsulates GENEVE, inspects the
10.102.0.0/16 local packet, re-encaps and sends it back to GWLB
0.0.0.0/0 vpce-XYZ FW-Endpoint-Service-AZ1 10.102.3.91
Step 6: GWLB removes GENEVE header and forwards
Step 3: GWLB endpoint routes traffic to GWLB using AWS PrivateLink packet to the appropriate GWLB endpoint
Step 4: GWLB routes traffic to a firewall using GENEVE
Target Group: FW-Target-Group-Geneve with 4 firewalls: Step 7: GWLB endpoint sends packet to TGW
10.102.3.174 MC-FTD-IFT-1 6081 us-west-AZ1
10.102.13.67 MC-FTD-IFT-2 6081 us-west-AZ1
…
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Connecting SD-WAN
Host
AWS us-west Host VPC1
VPC2 VPN or connect attachment for SD-WAN VPC
App1 App2
Shared services VPC BGP between AWS TGW and SD-WAN routers
AZ1
FTDv-1
AWS TGW
Cisco Catalyst 8000V as SD-WAN router
…
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Site-to-Site over CSP
Site-to-Site over Cloud Service Provider
Reduced provisioning
Created in less than 5
time from months, to 5
minutes using vManage
minutes
CSP
Dedicated, global
connectivity provisioned
Backbone Reduced latency from
via CSP backbone Los Angeles 560ms to 200ms
Premium, low-latency
Reduced cost from
MPLS-like performance SD-WAN $10K/mo to $2K/mo
with Pay-as-you-Go model
Fabric
Sydney
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Supported cloud networking integrations
Multicloud integration
Cloud agnostic
backbone
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Multi Region Fabric solves many Multicloud S2S Challenges
BR/regional hub
ER/branch
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Multi Region Fabric simplifies Multicloud Design
Route Table Entry on Edge Router for 10.211.1.11 on the “east side”
Reg1-Sub1-ER1#sh ip ro vrf 10
...
m 10.211.1.11 [251/0] via 101.1.1.1, 06:58:01, Sdwan-system-intf
...
Reg1-Sub1-ER1#
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Use Case 1: Redundancy / Load Balancing
MRF Region 1 MRF Backbone Area
US West
X
C8kv BR San
Francisco
C8kv
ER
101.1.1.1
Border router 2 configuration:
Subregion 1 system
San Jose C8kv BR system-ip 103.1.1.1
site-id 103
Los Angeles region 1
103.1.1.1
subregion 2
C8kv
ER !
role border-router
organization-name mrf-multicloud-demo
Subregion 2 vbond 44.227.177.103
San Diego !
Route Table Entry on Edge Router for 10.211.1.11 on the “east side”
Reg1-Sub1-ER1#sh ip ro vrf 10
...
m 10.211.1.11 [251/0] via 103.1.1.1, 06:58:01, Sdwan-system-intf
...
Reg1-Sub1-ER1# BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Use Case 2: Isolate a subregion with a simple control policy
policy
MRF Region 1 MRF Backbone Area control-policy block-reg1-sub1
sequence 1
US West C8kv BR
match route
region-enhanced region 1
San
X
region-enhanced subregion 1
C8kv Francisco !
ER
action reject
Subregion 1 !
San Jose C8kv BR !
sequence 2
Los Angeles match tloc
region-enhanced region 1
C8kv
region-enhanced subregion 1
ER
!
action reject
Subregion 2 !
San Diego !
default-action accept
!
Regional-vSmart !
apply-policy
region 1
role border-router
control-policy block-reg1-sub1 out
!
! 55
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Audit simplifies daily operations
Cloud Audit
• State check
vManage vs. Cloud
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Demo:
Cloud Audit
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
For Your
Two types:
• On-demand
• Periodic – every 2 hours
Can be fixed on GCP with one click Audit can NOT fix
• Deletion of the hub or the spokes • Removal of a cloud gateway or any of its
• Deletion of Google cloud routers components
• Deletion of site-to-cloud peering of VPCs • Issues with host VPCs with overlapping CIDRs
mapped to VPNs in vManage • Issues with site-to-site VPCs
• Deletion of VPC peering of VPCs that are • Issues with site-to-cloud VPCs
mapped to other VPCs in vManage • Issues with WAN VPCs
• Missing custom routes
• Missing BGP sessions
• Stale BGP sessions
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
App Integration
Creating a bridge between cloud apps and SD-
WAN via Google Service Directory
GCP Service
Directory
App “traffic=video”
Use Case Summary Devops
Netops
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Summary
Call to Action
• GitHub:
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Cisco Webex App
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install the Webex App or go directly to the Webex space Enter your personal notes here
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Complete your Session Survey
• Please complete your session survey
after each session. Your feedback
is important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (open from Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events Mobile App or
by logging in to the Session Catalog and clicking the
"Attendee Dashboard” at
https://www.ciscolive.com/emea/learn/sessions/session-catalog.html
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Cisco Cloud OnRamp solves your cloud problems
Automation Operations
Site-to-Site, Site-to- Cloud Audit, Monitoring,
Cisco
Cloud, Cloud-to-Cloud Predictions
Cloud
OnRamp
Security App Performance
Cloud Security, SIG, On-Prem Service Directory Integration, Mid-
Mile Optimization
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Continue
Agenda Your Education
BRKENT-2060 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Thank you