<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ask the Expert- SD-WAN fundamentals and implementation in SD-WAN and Cloud Networking</title>
    <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912562#M1023</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/299806"&gt;@rbncarvalho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The approach is right, you differentiate the interfaces by advertising them in separate services. You would then link those services with a site list, so you can advertise the respective service (untrusted interface/zone) to the remote offices or towards the DC or HQ (trusted interface/zone). That way, remote offices will only see the service pointing to the right interface so the traffic does not get dropped. Please note that the site lists are supposed to be planned properly for this to be in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ability to advertise services via OMP allows you to place the firewall at any point in the network as long as its within the SD-WAN fabric. That being said, the advantage of this approach is to designate any specific place (being a regional hub or a colo facility - so delay and jitter are reduced and application performance impact minimized/improved/optimized) to place/deploy/install the firewall appliances or any other device providing the service you are advertising, reducing then expenses for dedicated firewalls in remote offices. Its an sweet spot between centralized FW in a DC - consuming DC's computing and BW resources - and dedicated FW per remote office (high expenses involved for appliances).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the case of the Hub-and-Spoke topology, would be advantageous to place the FW in the hub, and its the natural place where the traffic flow is headed and does not incur in awkward/confusing/complex redirecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall can be either transparent or routed. I personally have bad experiences with transparent firewalls, they are stateful devices anyway (regardless of the mode they operate) and its important to know where they are so you are able to pinpoint problems and troubleshoot efficiently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you provide outputs? What can you see when you issue "show omp services" command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Thu, 22 Aug 2019 19:30:26 GMT</pubDate>
    <dc:creator>David Samuel Penaloza Seijas</dc:creator>
    <dc:date>2019-08-22T19:30:26Z</dc:date>
    <item>
      <title>Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3910571#M1008</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;This topic is a chance to discuss more about &lt;/EM&gt;&lt;/STRONG&gt;SD-WAN, it's foundations and inner mechanisms as well as its correct design and implementation to achieve desired business outcomes. Software-Defined WAN (SD-WAN), is a popular technology and this event is aimed to help engineers/customers/partners understand the benefits and possible advantages that its implementation can bring.&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;STRONG&gt;To participate in this event, please use the&lt;/STRONG&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/reply-button.png" border="0" alt="Join the Discussion : Cisco Ask the Expert" width="75" height="27" /&gt;button below&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;to ask your questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#00CCFF"&gt;Ask questions from Monday 19th to Friday 30th of August, 2019&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Featured expert&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="david.png" style="width: 90px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/18196i92C3B859F41709C7/image-dimensions/90x135?v=v2" width="90" height="135" role="button" title="david.png" alt="david.png" /&gt;&lt;/span&gt;David Samuel Peñaloza Seijas&amp;nbsp;&lt;/STRONG&gt;works as a Senior Network Consulting Engineer at Verizon Enterprise Solutions in the Czech Republic. Previously, he worked as a Network Support Specialist in the IBM Client Innovation Center in the Czech Republic. David is an expert interested in all topics related to networks. However, he focuses mainly on data centers, enterprise networks, and network design, including software-defined networking (SDN). David has a long relationship with Cisco. He has been a Cisco Instructor for the Cisco Academy and was recognized as a Cisco Champion and a&amp;nbsp;&lt;A href="https://learningnetwork.cisco.com/community/about/cisco-designated-vips" target="_self"&gt;Cisco Designated VIP&lt;/A&gt;&amp;nbsp;for 2017, 2018 and 2019. David holds a CCNP R&amp;amp;S, CCDP, CCNA Security, CCNA CyberOps and a CCNA SP certification. Currently, he is preparing for a CCDE.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;David&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the &lt;A href="https://community.cisco.com/t5/sd-wan/bd-p/discussions-sd-wan" target="_self"&gt;SD-WAN&lt;/A&gt; community.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Find other events&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=technology-support" target="_self"&gt;https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=technology-support&amp;nbsp;&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FFCC00"&gt;&lt;SPAN&gt;&lt;STRONG&gt;**Helpful votes Encourage Participation! **&lt;BR /&gt;Please be sure to rate the Answers to Questions&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 00:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3910571#M1008</guid>
      <dc:creator>Cisco Moderador</dc:creator>
      <dc:date>2019-08-21T00:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911095#M1009</link>
      <description>&lt;P&gt;Are there any best practices regarding MSP design specifically with access into the SP cloud for privately addressed services, such as a cucm cluster within a customer vrf? Is it possible to use something such as a vedge 5000 to aggregate multiple customers on the public side and split them into vrfs back toward the SP mpls while still keeping a separate control plane instance per customer (vmanage)?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 19:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911095#M1009</guid>
      <dc:creator>Seth Beauchamp</dc:creator>
      <dc:date>2019-08-20T19:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911826#M1014</link>
      <description>&lt;P&gt;Hello Seth,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The common SD-WAN deployment in SP networks can be divided in the following 2 groups:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Customer dedicated vManage&lt;/LI&gt;&lt;LI&gt;Shared vManage - Multitenancy&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Each one of them with their advantages and drawbacks. One of the advantages of the shared vManage is to have a centralized platform with all the customers properly segmented within the controller (i.e. multitenancy). This translates into less devices/servers/controllers deployed, thus, less resources used. It does fit into low-scale deployments with several customers having a handful of sites to support. Might be even ideal for PoCs as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main drawback of it being scalability:&amp;nbsp;Each vSmart controller supports a limit of around 5400 control connections (and those are shared when deployed in multitenancy mode), please note that each TLOC will establish a control connection. Furthermore, doing the math by increasing the number of TLOCs in each vEdge will cut down that limit substantially:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;One TLOC - 5400 vEdges&lt;/LI&gt;&lt;LI&gt;Two TLOCs - 2700 vEdges&lt;/LI&gt;&lt;LI&gt;Three TLOCs - 1800 vEdges&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Each vManage controller supports a limit of around 2700 vEdges routers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the services: Usually this is done via L3VPNs in the underlay, leaked into the transport VPN (0) via a vEdge deployed as a CE device in the MPLS network in a management tenant, also could be called control center (vManage, vSmart, vBond and Management vEdge). It could be implemented specifically for a customer (like the one you have mentioned - only existing services in a customer VPN) or shared services offered to all the customers (a "services" VPN to host services like DNS or NTP, for instance).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;Is it possible to use something such as a vedge 5000 to aggregate multiple customers on the public side and split them into vrfs back toward the SP mpls while still keeping a separate control plane instance per customer (vmanage)?&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;This would imply deploying a device to work in the overlay to aggregate that traffic, similar to what a PE does currently in the underlay. In all honesty, I have not seen this deployment, usually the overlay - either per customer or per group of customers - is deployed to operate as separate/segmented as possible from the underlay (MPLS/DIA transport). The goal is to provide each of the customers with their own/dedicated environment, using vSmart, vManage and vEdges as your segmentation tools (vBond can be shared between customers in a multitenancy deployment), while using the underlay (which is already shared between customers) purely as a transport, and leaking prefixes to the transport VPN (using BGP) as needed to provide a service or a set of services to the customer requesting them.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope this is useful!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;David&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 10:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911826#M1014</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-27T10:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911967#M1017</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="MsoNormal"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306681"&gt;@David Samuel Penaloza Seijas&lt;/a&gt;, t&lt;SPAN style="font-family: inherit;"&gt;hanks for sharing your knowledge on this session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="MsoNormal"&gt;&lt;SPAN style="mso-ansi-language: EN-US;"&gt;Could you please help to answer the following question from&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="mso-ansi-language: EN-US;"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/891658"&gt;@jackfarrer&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="MsoNormal"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="MsoNormal"&gt;&lt;SPAN style="mso-ansi-language: EN-US;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="qq.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/43546i4DBF4D2F1FF24026/image-size/large?v=v2&amp;amp;px=999" role="button" title="qq.png" alt="qq.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="MsoNormal"&gt;&lt;SPAN style="mso-ansi-language: EN-US;"&gt;Official post &lt;A href="https://community.cisco.com/t5/sd-wan/vsmart-image-will-not-load-in-vcontainer/m-p/3908254/highlight/false#M997" target="_self"&gt;link&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 00:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3911967#M1017</guid>
      <dc:creator>Hilda Arteaga</dc:creator>
      <dc:date>2019-08-22T00:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912178#M1020</link>
      <description>&lt;P&gt;Hi&amp;nbsp; &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306681"&gt;@David Samuel Penaloza Seijas&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to figure out how to use service insertion, and the main difficulty here is the redirection policy itself, as well as how the FW should be placed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've have the Hub router announcing two different services, netsvc1 and netsvc2 which are inside and outside interfaces of the firewall. I'm doing it like this because you cannot have multiple "FW" type service on the same VPN, so only one IP can be announced, and I confess that I don't have the knowledge on how to have the FW inspecting ou applying rules on one interface and send the traffic back on the same interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that this policy is a Custom Control Policy, and such policy needs to coexist with the Custom Topology policies in place, for Hub and Spoke topology.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have some information or experience in implementations like this, and how should the FW work, routed or transparent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've watched David Klebanov videos on this, but it's not clear how the FW is placed here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also even though the vSmart receives the services, they are not reflected back to the routers participating on that service VPN, you can see the label towards the destination remains the same, even though on the vSmart the label for that specific service is different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for any help you may provide,&lt;/P&gt;&lt;P&gt;I salute you for this initiative&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 09:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912178#M1020</guid>
      <dc:creator>rbncarvalho</dc:creator>
      <dc:date>2019-08-22T09:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912223#M1021</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/891658"&gt;@jackfarrer&lt;/a&gt;&amp;nbsp;- not a docker expert here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems to me that despite the fact you have created the 20G drive, the storage driver is not able to see it and therefore it cannot mount it when you try to install the image. I could be blatantly wrong on this (the special device raises some questions), apologies in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you able to provide more logs? Is there anything else observed by you?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will try to replicate your intent and come back with my results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 11:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912223#M1021</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-22T11:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912348#M1022</link>
      <description>&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I'm not a Docker expert either, so I'm not sure where to go to get any additional logs or information.&amp;nbsp; I did have issues with the second drive on the vManage server I spun up.&amp;nbsp; I used qemu-img to create the image, but the vManage server was not able to find a partition and would constantly reboot.&amp;nbsp; I ended up attaching the image to a basic Linux VM and using fdisk to partition it and then attached it back to the vManage and it was then able to format it.&amp;nbsp; I tried the same process with the vContainer, but the result was the same, the image install failed.&amp;nbsp; When I drop to vshell on the vContainer and try to run any of the normal Docker commands, I get the message that it cannot connect to the Docker daemon even though the messages log shows the daemon was started.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;local7.info: Aug 16 17:55:45 vcontainer SYSMGR[329]: %Viptela-vcontainer-SYSMGR-6-INFO-200017: Started daemon docker @ pid 725 in vpn 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Permissions on the path for the second drive are locked down to root with execute for everyone else, so I'm not sure if that's an issue or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;drwx--x--x 11 root root 4096 Aug 16 17:58 docker&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm also not sure if the standard Docker commands are applicable here,&amp;nbsp;since the image install is done via the Viptela CLI&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 14:14:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912348#M1022</guid>
      <dc:creator>jackfarrer</dc:creator>
      <dc:date>2019-08-22T14:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912562#M1023</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/299806"&gt;@rbncarvalho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The approach is right, you differentiate the interfaces by advertising them in separate services. You would then link those services with a site list, so you can advertise the respective service (untrusted interface/zone) to the remote offices or towards the DC or HQ (trusted interface/zone). That way, remote offices will only see the service pointing to the right interface so the traffic does not get dropped. Please note that the site lists are supposed to be planned properly for this to be in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ability to advertise services via OMP allows you to place the firewall at any point in the network as long as its within the SD-WAN fabric. That being said, the advantage of this approach is to designate any specific place (being a regional hub or a colo facility - so delay and jitter are reduced and application performance impact minimized/improved/optimized) to place/deploy/install the firewall appliances or any other device providing the service you are advertising, reducing then expenses for dedicated firewalls in remote offices. Its an sweet spot between centralized FW in a DC - consuming DC's computing and BW resources - and dedicated FW per remote office (high expenses involved for appliances).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the case of the Hub-and-Spoke topology, would be advantageous to place the FW in the hub, and its the natural place where the traffic flow is headed and does not incur in awkward/confusing/complex redirecting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall can be either transparent or routed. I personally have bad experiences with transparent firewalls, they are stateful devices anyway (regardless of the mode they operate) and its important to know where they are so you are able to pinpoint problems and troubleshoot efficiently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you provide outputs? What can you see when you issue "show omp services" command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 19:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912562#M1023</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-22T19:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912788#M1027</link>
      <description>&lt;P&gt;To add to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306681"&gt;@David Samuel Penaloza Seijas&lt;/a&gt;&amp;nbsp;excellent explanation, here are some more considerations for you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/299806"&gt;@rbncarvalho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As David mentioned, the firewall could be placed anywhere. However, remember that service chaining is a special form of forwarding where we bypass the normal forwarding logic. For this reason, the firewall, or the service that is provided, needs to be "directly connected" to a vEdge. What does that mean? It doesn't mean that the service needs to be physically connected to the vEdge but that the vEdge must be in the same subnet as the service. There can be no L3 hops between the vEdge and the service. You can either stretch L2 by having a switch in between or you can tunnel traffic, for example by using IPSec towards the FW. I recommend you read my blog if you want to see an example of a service chaining topology:&amp;nbsp;&lt;A href="http://lostintransit.se/2019/08/20/the-tale-of-the-mysterious-traceroute/" target="_blank"&gt;http://lostintransit.se/2019/08/20/the-tale-of-the-mysterious-traceroute/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you advertise a service from a vEdge, it gets advertised to the vSmart(s). Services are NOT reflected to the other vEdges in the network. What you do is to create a control or data policy that based on your match criteria modifies vRoutes that get advertised from the vSmart to the vEdges. Keep in mind that the service VPNs used are actually also services. VPNs are identified by labels and packets sent in data plane are encapsulated with MPLS label. Let's say that we have a route 10.0.0.0/24 in VPN 10 and it has label 1003. Now, when you enforce the service for traffic destined to 10.0.0.0/24, what happens is that the label changes to say 1005. This will also mean that the TLOC (next-hop) changes to be for example a DC instead of a branch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How does this all work under the covers? When the traffic flow starts, normal forwarding is used where the service label has been applied. When traffic reaches vEdge where FW is located, we can't use normal forwarding as that would just send the traffic onwards. The vEdge looks at the label and sends traffic towards the FW, when traffic returns back, normal forwarding, according to IP route lookup occurs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you hairpin traffic on a FW? Absolutely yes depending on the FW of course. You don't necessarily need two interfaces. It depends on the design. Are you just filtering traffic between branches or between branches and say a DC? If you have two interfaces, you need to advertise to services. Like you said yourself, you could do this by advertising netsvc1 and netsvc2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have access to the SD-WAN mastery course, I recommend you check David Klebanov's videos on service chaining. I also recommend you read through the following links:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.4/07Policy_Applications/02Service_Chaining" target="_blank"&gt;https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.4/07Policy_Applications/02Service_Chaining&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.4/07Policy_Applications/02Service_Chaining/Service_Chaining_Configuration_Examples" target="_blank"&gt;https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.4/07Policy_Applications/02Service_Chaining/Service_Chaining_Configuration_Examples&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 05:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912788#M1027</guid>
      <dc:creator>daniel.dib</dc:creator>
      <dc:date>2019-08-23T05:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912830#M1033</link>
      <description>Daniel,&lt;BR /&gt;&lt;BR /&gt;Thanks a ton for complementing! Fantastic contribution!</description>
      <pubDate>Fri, 23 Aug 2019 06:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3912830#M1033</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-23T06:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913171#M1040</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254558"&gt;@daniel.dib&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306681"&gt;@David Samuel Penaloza Seijas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for helping to solve this question&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913171#M1040</guid>
      <dc:creator>Hilda Arteaga</dc:creator>
      <dc:date>2019-08-23T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913173#M1041</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;I have a multi-tenant lab, and I'm trying to work with Ansible but I'm getting errors because of the multi-tenant, I would like to know if someone was able to work with Ansible and multi-tenant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 16:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913173#M1041</guid>
      <dc:creator>juraj.papic</dc:creator>
      <dc:date>2019-08-23T16:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913197#M1042</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/167983"&gt;@juraj.papic&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please elaborate more your statement? what kind of error? what are you trying to do/achieve? are you able to provide logs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 16:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913197#M1042</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-23T16:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913912#M1051</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/306681"&gt;@David Samuel Penaloza Seijas&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/254558"&gt;@daniel.dib&lt;/a&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your feedback.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've managed to get the service insertion to work, but I had to do it without the custom control policy because I have a custom topology in place and the Site ID were in use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However I used a data policy for this, and thanks to your inputs this started to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you guys for your support.&lt;/P&gt;&lt;P&gt;Best Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Rúben&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 09:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913912#M1051</guid>
      <dc:creator>rbncarvalho</dc:creator>
      <dc:date>2019-08-26T09:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913986#M1052</link>
      <description>&lt;P&gt;Question around control machine limits and ztp:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We’re looking at a fairly large SD-WAN rollout and I was wondering on limits of the controllers around bfd sessions, control connections etc.&amp;nbsp;&amp;nbsp; We’ll most likely have a hub and spoke type configuration as “branches” do not need connectivity between each other.&amp;nbsp; What I’m trying to find information on is how many bfd type sessions a “hub vEdge” device can accommodate in additional to the capacity of vSmarts around control connections to begin to look at sizing things appropriately (including failover of one “Hub” or vSmart device and how this plays into overall design of the overlay control plane).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; With respect to ztp, if we would like to deploy our own certificates (in house CA) would we need to “touch” each vEdge before shipping to remote site (or have on-site personnel install a certificate on the device) before the vEdge contacts vBond?&amp;nbsp; Is ztp possible with self-signed certificate requirement?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 12:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3913986#M1052</guid>
      <dc:creator>kenneth.meyers</dc:creator>
      <dc:date>2019-08-26T12:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914328#M1055</link>
      <description>&lt;P&gt;We are a SP looking to use a compute cluster where we deploy one vedge cloud per customer. We would like to put all customers in a shared underlay for the transport interface, that is a single vlan with a /24 and each vedge gets an IP in that subnet. We also would like our customers to have access to their own vManage to make changes. A danger I see here is a customer changing their vedge cloud transport IP to an IP that overlaps with another customer, allowing customer A to bring down customer B. What could I do to prevent that?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 22:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914328#M1055</guid>
      <dc:creator>Seth Beauchamp</dc:creator>
      <dc:date>2019-08-26T22:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914522#M1058</link>
      <description>Those are fantastic new! Glad we could help somehow :D&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Aug 2019 09:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914522#M1058</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-27T09:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914533#M1059</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161796"&gt;@Seth Beauchamp&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;We would like to put all customers in a shared underlay for the transport interface, that is a single vlan with a /24 and each vedge gets an IP in that subnet. We also would like our customers to have access to their own vManage to make changes.&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;Being an MSP where your business is about offering transport and sharing the same infrastructure with all your customers, this is always a risk. That being said, there are techniques (mostly relying ion virtualization) to segment your customers so their failure domain is contained and separated, hence, not affecting other customers sharing the same infrastructure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you trying to save IP addresses? Allowing the customers to share the same broadcast domain is dangerous, involves fate sharing. Unless you can enforce it somewhere else in the infrastructure (many access lists or similar tools) can only be cumbersome and posse as a highly complex operational model. Is there a hard constraint? is there any other reason behind this request? cant you simply segment them through subnetting? maybe even PVLANs come to my mind if you need/must go down this road, alas, it would not prevent a customer from using an unauthorized IP address and affecting some other customer's operation. The best is always to keep them "together but not scrambled" - with their own playground.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 09:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914533#M1059</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-27T09:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914573#M1060</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/288948"&gt;@kenneth.meyers&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Effectively, as you have mentioned, one of the ways to scale the solution is to rely on a hierarchical model to restrict the tunnels between sites - the solution works in an any-to-any fashion which taxes scalability as the state is held in the network even if those tunnels are not needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quoting a previous reply in this thread:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;The main drawback of it being scalability: as each vSmart controller supports a limit of around 5400 control connections (and those are shared when deployed in multitenancy mode), please note that each TLOC will establish a control connection. Furthermore, doing the math by increasing the number of TLOCs in each vEdge will cut down that limit substantially:&lt;BR /&gt;&lt;BR /&gt;One TLOC - 5400 vEdges&lt;BR /&gt;Two TLOCs - 2700 vEdges&lt;BR /&gt;Three TLOCs - 1800 vEdges&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the vEdge BFD session limits:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="8FrbqgCywvRAraQlIWCAhmhbtgQ.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/43871iF838436F3E179361/image-size/large?v=v2&amp;amp;px=999" role="button" title="8FrbqgCywvRAraQlIWCAhmhbtgQ.png" alt="8FrbqgCywvRAraQlIWCAhmhbtgQ.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I know, the ZTP process relies on certificates signed by a CA, being Symantec or your&amp;nbsp;enterprise root CA chain, which is then installed in vManage (and all vEdges would need to have the root certificate as well - which means touching them). Have not seen this being accomplished with a self-signed certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 14:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914573#M1060</guid>
      <dc:creator>David Samuel Penaloza Seijas</dc:creator>
      <dc:date>2019-08-27T14:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert- SD-WAN fundamentals and implementation</title>
      <link>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914601#M1062</link>
      <description>&lt;P&gt;Thanks David,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Would it be safe to assume that a "HUB" type vEdge device would have the same scaling limitations as the vSmart controllers previously mentioned.&lt;/P&gt;&lt;PRE&gt;One TLOC - 5400 vEdges&lt;BR /&gt;Two TLOCs - 2700 vEdges&lt;BR /&gt;Three TLOCs - 1800 vEdges&lt;/PRE&gt;&lt;P&gt;In the hierarchical model we're wondering how many "spoke vEdges" can connect to the "HUB vEdge" before we start taxing the capabilities of the Hub device with respect to BFD and IPSEC sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 11:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/sd-wan-and-cloud-networking/ask-the-expert-sd-wan-fundamentals-and-implementation/m-p/3914601#M1062</guid>
      <dc:creator>kenneth.meyers</dc:creator>
      <dc:date>2019-08-27T11:40:38Z</dc:date>
    </item>
  </channel>
</rss>

