on 09-16-2019 10:47 AM - edited on 01-21-2021 05:59 AM by Kureli Sankar
Cisco’s software-defined wide area network (SD-WAN) solution allows user to quickly and seamlessly establish an overlay fabric to connect an enterprise’s data centers, branch and campus locations, as well as colocation facilities in order to improve the network’s speed, security, and efficiency.
This configuration example is designed to be used in combination with the official Cisco SD-WAN End-to-End Deployment Guide.
This configuration guide assumes that the following has already been setup and configured:
vEdge (vBond), vManage, vSmart:
https://software.cisco.com/download/home/286320995/type
This configuration example only covers the process of installing the SD-WAN controller software images on a VMWare ESXI instance, establishing the transport and management networks for the three controllers to communicate, and ensuring that each controller has a valid certificate installed. This configuration does not go over the process of creating/applying configuration templates or adding edge devices, through vManage.
The Cisco SD-WAN Solution is compatible with all Cisco ASR 1000 Series Routers, ISR 1000 Series Routers, ISR 4000 series routers, vEdge Routers, CSR, and ISRv.
A Cisco DNA Essentials license is necessary in order to implement the SD-WAN solution.
This diagram describes the topology of the configuration which is covered by this setup guide.
Command | Purpose | |
Step 1 | vmanage# configure terminal | Enters global configuration mode |
Step 2 | vmanage(config)# system | System parameter information |
Step 2.a | vmanage(config-system)# host-name name | Specifies name of the device |
Step 3 |
vmanage(config-system)# system-ip IP Address |
An IP address used internally by the network to identify each device. This is similar to a router ID. These must be private addresses that are unused anywhere else in the network.
Example: vManage: 1.1.1.1 vSmart: 1.1.1.2 vBond:1.1.1.3 |
Step 4 |
vmanage(config-system)# organization-name <Press Enter> (<Organization name>): name |
Name of your organization. It must be identical on all the devices in your overlay network, and it must match the name in the certificates for all network devices
Example: (<Organization name>): Cisco systems |
Step 5 | vmanage(config-system)# sp-organization-name
<Press Enter> (<Organization name>): name |
Name of your service provider. must be identical on all the devices in your overlay network, and it must match the name in the certificates for all network devices
Example: (<Organization name>): My Service Provider |
Step 6 | vmanage(config-system)# site-id number |
Numeric identifier of the site in the overlay network. The site ID must be the same for all devices that reside in the same site (i.e. site ID remains the same for vManage, vSmart & vBond).
Example: site-id 100 |
Step 7.a
Step 7.b |
vmanage(config-system)# vbond IP address (for vManage &vSmart only)
vmanage(config-system)# vbond IP address local vbond (for vBond only) |
IP address of the vBond orchestrator. Must be a public IP address.
Example: vbond 128.x.x.x
Configure this device to act as the vBond orchestrator.
Example: vbond 128.x.x.x local vbond |
Step 8 | vmanage(config-system)# commit | Activate the commands in the configuration |
A summary of the above commands, with an example configuration:
configure terminal hostname vmanage system-ip 1.1.1.1 organization-name Cisco sp-organization-name MyServiceProvider site-id 100 vbond 128.0.0.3 commit
4. Once the controllers are setup, configure the transport VPN on vManage, vSmart and vBond with the help of the following commands:
Command | Purpose | |
Step 1 |
vmanage# conf t vmanage(config)# vpn 0 |
This is the WAN facing interface i.e. transport VPN |
Step 2 |
vmanage(config-vpn-0)# interface eth0 (for vManage and vSmart)
vbond(config-vpn-0)# interface ge0/0 (for vBond only) |
Enters the configuration mode for an Ethernet WAN interface |
Step 3 |
vmanage(config-interface-eth0)# ip address IP address (enter IP address with a CIDR prefix. Example: 128.0.0.5/24 )
vmanage(config-interface-eth0)# no shut |
Sets the IP address for the specified Ethernet interface
Enables the Ethernet interface, changing its state from administratively down to administratively up |
Step 4 |
vmanage(config-interface-eth0)# tunnel-interface
vmanage(config-tunnel-interface)# allow-service all
vmanage(config-tunnel-interface)# commit vmanage(config-tunnel-interface)# exit vmanage(config-interface-eth0)# exit
For vBond: vbond(config-interface-ge0/0)# tunnel-interface
vbond(config-tunnel-interface)# encapsulation ipsec
vbond(config-tunnel-interface)# allow-service all
vbond(config-tunnel-interface)# commit vbond(config-tunnel-interface)# exit vbond(config-interface-ge0/0)# exit |
Configure the interface to be a secure DTLS or TLS WAN transport connection
Configure the services that are allowed to run over the WAN connection in VPN 0 |
Step 5 |
vmanage(config-vpn-0)# ip route 0.0.0.0/0 IP address vmanage(config-vpn-0)# commit |
Establish a static route to the gateway IP address
Example: ip route 0.0.0.0/0 128.0.0.1 |
A summary of the above commands, with an example configuration:
configure terminal for vManage and vSmart vpn 0 interface eth0 ip address 128.0.0.5/24 no shutdown tunnel-interface allow-service all commit
exit
exit
ip route 0.0.0.0/0 128.0.0.1
commit
configure terminal for vBond vpn 0 interface ge0/0 ip address 128.0.0.3/24 no shutdown tunnel-interface
encapsulation ipsec allow-service all commit exit exit ip route 0.0.0.0/0 128.0.0.1 commit
NOTE: There are many free options for creating and signing certificates, and each will work with the SD-WAN controllers, however, this guide will cover how to do so using the xca certificate-signing software, which is also available for free.
NOTE: In order to use a different workstation to sign certificates in the future, you must export the original RootCA certificate as a “File” and then for the Export Option select “PEM + Key” to get a single PEM file containing the certificate contents as well as the private key
Upon completing the controller setup and certificate installation, the vManage web console dashboard should indicate that each of the three controllers (vManage, vSmart, and vBond) are up and reachable. Additionally, the dashboard should indicate that there are no invalid certificates.
The Certificate Configuration page on the web console should also indicate that the certificate has been installed on vBond and that vBond has been updated for vSmart and vManage. All three controllers should have a certificate serial and their vEdge List Status should be in “Sync”.
Using the “show control connections” command while an SSH connection to one of the controllers has been established can be useful in troubleshooting connection issues between controllers. The command should return a list of successful connections to the other controllers.
Troubleshoot Control Connections: https://community.cisco.com/t5/networking-documents/sd-wan-routers-troubleshoot-control-connections/ta-p/3813237
Hi
I already have on-Prem controllers set up and ASR joined to it. Until now my testing has been limited to local test network. Now I want to test this further and join ASR through Internet. Do you know of some best practises document on how to position different controller personas on-prem. I've read many documents and I am still not sure where in the network should I position my controllers. I assume vBond needs to be somewhere in the DMZ with a public IP address to be reachble via the internet. vManage and vSmart can probably be inside behind the NAT. Now, I suppose I need 1:1 NAT and certain ports opened.
Is there any guide/resource explaining this in detail?
Hi
Did you find solution to this problem?
Regards
Hello hadhaliw,
Thank you for sharing this document. The deployment is done as per this document. The challenge is where to place the controllers so that they can be accessed from service provider’s network. Do not want to leak Dc routes on service provider’s network.
Controllers are installed on Service Side VPN.
Regards
Although we do not have any document that describes the best practices for controller placement, the beauty of our SD-WAN solution is that it gives you a lot of flexibility in where you can place your controllers.
If, however, the goal is to prevent DC routes from leaking to the service provider network then we would recommend placing your controllers behind a firewall and NAT their addresses on the firewall. This would only advertise the NATed addresses to the service provider network. It's also worth mentioning that only vSmart is responsible for knowing routes and advertising them to edge devices within the network, and that vBond still needs to be reachable by an edge router that has not yet joined the SD-WAN fabric in order for the onboarding process to work.
@hadhaliw Do you have routable "system-ip" and use that for management instead of vpn512 interface? What is recommended?
I am a bit confused on the new version (19.2.1) of controllers when you add vbond in the vmanage settings menu it says "vBond management IP address". What IP is that? System IP, VPN512 or VPN0 IP (pre-NAt, post-NAT). I am aware that system IP is under VPN0 and could be used for management but, I suppose that is not recommended.
Thanks
Rudi
Furthermore can you elaborate on the IP assignment for vBond when all controllers sit on private IPs and have 1:1 NAT. I am following design as described in one of the ciscolive presentation with controllers in two seperate private networks with all having private to public 1:1 mapping and NAT on firewall. vManage and vSmart sit on 192.168.20.0/24 with both having public color and communicate locally. Both have vBond public IP (1.1.1.1) in their system configuration. vBond sits on 192.168.10.0/24.
Now, the guide on cisco page says "Configure an interface in VPN 0, to connect to the Internet or other WAN transport network. In Releases 16.3 and later, the IP address can be an IPv4 or an IPv6 address. In earlier releases, it must be an IPv4 address. Ensure that the prefix you configure for the interface contains the IP address that you configure in the vbond local command."
My post-NAT public IP of vBond is 1.1.1.1 and it maps to 192.168.10.1/24. On the vBond the VPN0 interface would have IP 192.168.10.1/24 configured and tunnel interface command with public color. However, the system config has "vbond 1.1.1.1 local" command. vManage, vSmart and all routers point to vbond 1.1.1.1.
Is that correct? Note that all IPs are arbitrary.
Thanks
Rudi
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: