on 08-23-2024 09:14 AM
Cisco SD-WAN solution builds an overlay WAN network that operates over standard network transport services. The SDWAN solution is based on the principle of separating the control and data planes of the WAN. The control-plane manages the rules for routing traffic through the overlay network, while the data-plane securely transports the actual data packets between the network devices. On the data-plane the virtualized network runs as an overlay on cost-effective hardware, whether physical routers or virtual machines routers, called vEdge or cEdge (Viptela routers are called “vEdge” and Cisco XE SDWAN routers are called “cEdge”). The following figure shows the SD-WAN components overview.
Cisco SD-WAN Solution Architecture
SD-WAN Manager is the Network Management System (NMS) component of SDWAN. The SD-WAN Manager centralizes the provisioning, management, and monitoring functions of the SD-WAN network. It provides an easy-to-use graphical dashboard, with capabilities to monitor, configure, and maintain all SD-WAN devices and links in the overlay network. The SD-WAN Manager NMS also offers these capabilities on a northbound REST API interface, which can be consumed by other systems such as Orchestration, Service Assurance, etc.
The centralized Controllers oversee the control plane of the SD-WAN network. The SD-WAN Controller devices centralize all routing and policy intelligence in the overlay, following a model similar to the "route reflector" in BGP. The Controllers do not take any part in the data plane; they are dedicated exclusively to the control plane and influencing the networking behavior of the SD-WAN routers.
The Controllers is the centralized brain of the Cisco SD-WAN solution, controlling the flow of data traffic throughout the network. The Controllers works with the SD-WAN Validator to authenticate Cisco SD-WAN devices as they join the network and to orchestrate connectivity among the WAN Edge routers.
The major components of the Controllers are listed below
Each Controller can support up to 5,400 connections with WAN Edge routers having a single transport, and each router connects to two of them by default. With 2 modes of transport at each branch, the site means a single Controllers can support up to approx. 2000 connections. This brings a scale of 8,000 connections to the Banking Network Solutions with 4 pairs of SD-WAN Validators.
In addition to the Controllers, the SD-WAN control plane also includes the SD-WAN Validator. The main role of the SD-WAN Validator devices is to automatically identify and validate all other SD-WAN Controllers and devices when they join the overlay network. The SD-WAN Validator is used for authentication, validation, and orchestration of the control plane connections between the SD-WAN Validators and WAN Edge. SD-WAN Validator maintains connections to SD-WAN Validator, SD-WAN Manager, and an initial transient connection to WAN Edge.
The SD-WAN Validator automatically orchestrates connectivity between WAN Edge routers and Controllers. If any WAN Edge router or Controllers is behind a NAT, the SD-WAN Validator also serves as an initial NAT-traversal orchestrator.
Note : In the Banking Network Solutions, initially the WAN Edge and Controllers would be using a private IP network and hence would not be behind a NAT. In Future, once the Internet transport is added, the NAT will be enabled for the WAN Edge and the Controllers in the DC/DR/NDR respectively.
Major functions of SD-WAN Validator are -
Each SD-WAN Validator server can manage up to about 1,500 WAN Edge routers at a time in the overlay network. This brings scale to 3,000 WAN edge routers with 2 SD-WAN Validators. A Cisco SD-WAN domain can have up to 8 SD-WAN Validators in the Banking Network Solutions network.
The WAN Edge available as a hardware appliance sits at a physical site and provides secure data plane connectivity among the sites over the WAN transports. It is responsible for traffic forwarding, security, encryption, Quality of Service (QoS), routing protocols such as Border Gateway Protocol (BGP), and Open Shortest Path First (OSPF).
The major function of the WAN Edge is listed below.
This design guide serves as a comprehensive resource for implementing Cisco SD-WAN for Banking And Financial Services Industry . It acts as a companion document to the associated design and deployment guides tailored for enterprise networks, providing insights into the specific considerations and requirements relevant to banking/financial institutions.
The document focuses on the deployment of Cisco Software-Defined WAN (SD-WAN) solutions within the context of banking/financial organizations. For additional resources such as deployment guides, design guides, and white papers, please refer to the following:
Cisco Enterprise Networking design guides: Cisco Design Zone
This document is intended for network architects, IT administrators, security professionals, and stakeholders involved in the planning, deployment, and management of SD-WAN solutions within banking/financial institutions. It provides specialized guidance and best practices tailored to address the unique challenges and regulatory requirements of the banking/financial vertical.
Banking Network Solutions is one of the major BSFI organization that has a network of over 6000+ branches and 10000+ ATMs spread across the region. They are revamping their current Wide Area Network (WAN) and have chosen to implement a Software Defined – WAN (SD-WAN) solution for their WAN infrastructure connecting their Data Centers, Branch locations, Support Offices, and ATMs. The primary drivers for this initiative include operational simplicity, application-aware networking, and a robust and secure WAN Infrastructure.
From a solution architecture perspective, Banking Network Solutions is adopting Cisco's SD-WAN solution, leveraging the latest advances in software-defined networking technology. The SD-WAN solution separates the network’s control plane from the data plane, providing centralized configuration management and monitoring across the network. This approach offers agility, reduces deployment times, enhances visibility, secures traffic flows, and ensures policy policing and enforcement.
The Cisco SDWAN solution enables Banking Network Solutions to create a scalable SD-WAN-based network to effectively connect branch sites to Data Center sites hosting mission-critical applications. The solution streamlines site deployment through a template-based configuration approach and offers comprehensive network monitoring capabilities. Redundancy is ensured from both control and data plane perspectives, with active controllers deployed in Data Center sites and backup controllers in Disaster Recovery (DR) sites. Hardware-level redundancy, including box or link redundancy, is also available where applicable.
Application-aware routing is proposed to prioritize traffic for critical applications based on predefined SLA parameters. A Hub and Spoke Topology is proposed for communication across the SDWAN fabric, ensuring efficient traffic flow. Additionally, to maintain secure traffic flows, all data traversing the SD-WAN overlay is encrypted using IPsec, providing end-to-end security for Banking Network Solutions' network infrastructure.
Banking Network Solutions operates across the country with a network of over 6000+ branches. The organization has a primary Data Center (DC), a Disaster Recovery (DR) site, and an additional Disaster Recovery site (NDR). Currently, mission-critical applications are hosted centrally in DC locations.
To ensure uninterrupted access to business applications, Banking Network Solutions' branches are connected to the data center sites over an MPLS network that spans across 6000+ locations spread across the country. This MPLS network serves as the backbone for facilitating secure and reliable communication between the branches and the central data center, enabling efficient access to critical applications and services.
Below is the high level summary of existing Data Centre Design:
Routing Protocols:
Network Connections:
Traffic Forwarding:
Routing Configurations:
Core Network:
Data Center Interconnections:
At the Data Center (DC), there are dual MPLS links from eight different service providers, functioning as active and secondary links, terminating on different MPLS Customer Edge (CE) routers.
Banking Network Solutions - Existing DC Architecture
Banking Network Solutions - Existing DR Architecture
Banking Network Solutions - Existing NDR Architecture
In Banking Network Solutions, the network infrastructure serves various critical applications and services essential for financial institutions' operations and customer service. These include, but are not limited to:
In the Banking Network Solutions, Cisco SD-WAN plays a crucial role in providing secure, reliable, and optimized connectivity for these applications and services. It ensures efficient traffic routing, application performance optimization, and robust security measures to protect sensitive financial data and comply with regulatory requirements. Additionally, SD-WAN enables seamless integration with cloud services, improves operational efficiency, and enhances the overall user experience for both employees and customers.
End-to-End Segmentation for Security:
Compliance Requirements:
Network and Service Level Resiliency:
Management of Network Services and Infrastructure:
Control and Complexity:
Digital Transformation and Innovation:
Business Process Alignment:
Addressing these challenges requires a strategic approach that emphasizes security, compliance, resilience, efficiency, and innovation. By investing in advanced networking technologies, cybersecurity solutions, regulatory compliance measures, and business-aligned strategies, financial institutions can build resilient and future-ready networks that support their digital transformation journey while safeguarding sensitive financial data and ensuring regulatory compliance.
SD-WAN offers several key benefits for financial institutions, enabling them to enhance network performance, security, agility, and cost-effectiveness. Some of the primary benefits include:
Improved Network Performance:
Enhanced Security:
Increased Agility and Flexibility:
Cost Savings:
Business Continuity and Disaster Recovery:
Support for Cloud Services and Applications:
Overall, SD-WAN offers financial institutions a strategic advantage by optimizing network performance, enhancing security, improving agility, and reducing costs. By embracing SD-WAN technology, financial institutions can modernize their network infrastructure, accelerate digital transformation initiatives, and deliver superior customer experiences while maintaining compliance with regulatory requirements.
The decision by Banking Network Solutions to migrate to SD-WAN coincides with the refreshing of legacy router platforms within their branch locations, driven by the need to adapt to evolving networking technologies and enhance operational efficiency. The primary motivation behind this strategic move is the centralized configuration and policy management offered by SD-WAN solutions, which alleviates the requirement for additional staffing to deploy and maintain the banking network's wide-area network.
Furthermore, Banking Network Solutions recognizes the added benefits of SD-WAN, particularly the Application Visibility (AV) and Application Aware Routing (AAR) features provided by Cisco Catalyst SD-WAN. These features enable the bank to optimize bandwidth utilization across sites with multiple MPLS and/or Internet transports, ensuring efficient and reliable application performance.
Moreover, the bank anticipates future advantages from integrating with cloud-based security services through Secure Access Service Edge (SASE), as well as enabling Direct Internet Access (DIA) from branch locations for accessing Software-as-a-Service (SaaS) applications and facilitating guest access. This forward-looking approach ensures that Banking Network Solutions remains at the forefront of technological innovation while enhancing network security and user experience across its operations.
Overall, Cisco SD-WAN architecture is designed to provide centralized control, intelligent traffic routing, and secure connectivity for distributed enterprises, improving application performance, reducing costs, and enhancing user experience across the WAN.
This section provides high level overview of Banking Network Solutions SD-WAN deployment. SD-WAN technology will provide an end-to-end segmented overlay network using a centralized control plane and a hub and spoke encrypted data plane. SD-WAN solution provides secure encrypted transport over any layer 3 network, regardless of the underlying transport.
The Banking Network Solutions SD-WAN network delivers secure end-to-end network virtualization. The Overlay Management Protocol (OMP) centrally updates all routes and policy information for each network segment. All of the components mutually authenticate each other, and all of the WAN Edge devices are authorized before they are allowed into the network. Every packet across the data plane, control plane, and management plane that flows through the network is authenticated and encrypted using Secure Sockets Layer (SSL) and IP Security (IPSec) technologies.
Control plane components such as SD-WAN Manager, SD-WAN Validator, and Controllers will be located in the DC and DR locations. WAN Edge routers from remote sites are required to connect to the control plane hosts at both DC and DR for redundancy. WAN Edge routers in the DC, DR, and branch establish the overlay IPsec tunnel for data plane traffic via MPLS transport underlay networks. These MPLS transports are provided by various service providers in Banking Network Solutions existing network. All branch sites are classified into different types depending on number of MPLS & Internet transport links and number of WAN Edge routers present in branch. Any traffic from the SD-WAN branch sites will directly reach the controllers located in DC/DR using the secure DTLS tunnels they establish and for the data plane, it will be forwarded into the DC/DR.
The control plane traffic exchanged amongst the SD-WAN controllers will also use DTLS connections. The figure below provides the Banking Network Solutions SD-WAN Architecture at a high level.
SD-WAN Overview – Banking Network Solutions
The following figure shows the layout of the Data Center site showing the physical connectivity after migrating to SD-WAN.
In the DC, DR, and NDR sites, the following design considerations apply:
The following figure shows the layout of the Data Center site showing the logical connectivity after migrating to SD-WAN.
The following figure shows the layout of the DR site showing the physical connectivity after migrating to SD-WAN.
The following figure shows the layout of the NDR site showing the logical connectivity after migrating to SD-WAN.
Head-End SD-WAN Router Design
Banking Network Solutions realized early in the design process that they would need to use two methods of scaling the data plane of the head-end SD-WAN routers at the data center locations – vertical scaling and horizontal scaling. Both are necessary for the data centers to be able to handle the expected number of SD-WAN tunnels from all the branch sites, as well as the desired aggregated head-end throughput of up to 40 Gbps per data center.
Vertical scaling involves deploying head-end routers which can handle higher throughput and higher SD-WAN tunnel capacity. Throughput of SD-WAN routers is expressed in terms of millions of packets per second (Mpps) and gigabits per second (Gbps). This reflects the fact that throughput is constrained by how many packets per second the SD-WAN router can process. Hence the larger the packet size (for example 1,400 bytes), the higher the throughput in Gbps. Likewise, the lower the packet size (for example 64 bytes), the lower the throughput in Gbps. Actual customer networks do not have just one packet size. Therefore, for realistic throughput numbers, a mixture of packet sizes is used, based upon experience with existing customer networks. This is referred to as IMIX traffic. Hence, Banking Network Solutions based their decision as to the platform choice for their data center head-end routers on throughput capacity of the platform with IMIX traffic.
Throughput is also based on the features enabled on the SD-WAN router platforms. Since Banking Network Solutions has requirements for SAIE (formerly known as DPI) / statistics collection, they based their decision as to the platform of choice for their data center head-end routers on the combination of feature sets which include IPsec encapsulation on the SD-WAN overlay tunnels, Quality of Service (QoS), DPI, and Flexible NetFlow (FNF) collection and export.
After discussing platform choices with their Cisco account team, Banking Network Solutions decided to implement ASR 1002-HX Series platforms as head-end SD-WAN routers within each of the data centers within each of the overlays.
Banking Network Solutions decided to maintain the existing eight regional MPLS provider circuits and the Internet circuit within each data center. Therefore, each SD-WAN head-end router has a WAN transport (VPN 0) tunnel interface connection to each of the four regional MPLS service providers, through their respective MPLS CE routers. In addition to this, each head-end SD-WAN router has a WAN transport (VPN 0) tunnel interface connection to the Internet via the Internet Edge firewall within the data center. Hence, each data center head-end SD-WAN router is configured with 3 TLOCs.
The following figure shows the TLOC colors implemented at the head-end (and branch) routers for the Banking Network Solutions SD-WAN network.
Service Provider |
Tloc Color |
Regional MPLS Provider1 |
Private1, Private2 |
Regional MPLS Provider2 |
|
Regional MPLS Provider3 |
|
Regional MPLS Provider4 |
|
Regional MPLS Provider5 |
|
Regional MPLS Provider6 |
|
Regional MPLS Provider7 |
|
Regional MPLS Provider8 |
|
Internet Service Provider |
Biz-Internet |
WAN Transport Identification:
WAN Transport Methods:
Dual Homed MPLS Links:
Service Provider Combinations:
The organization uses multiple MPLS providers but does not extend each provider as a separate transport on the SD-WAN headend. Instead, the following approach is adopted:
Aggregation of MPLS Links:
TLOC Configuration:
Simplified Management:
Redundancy and Load Balancing:
This method leverages the strengths of multiple service providers while maintaining a streamlined and manageable SD-WAN architecture.
WAN Transport Type |
Service Provider |
DC |
DR |
NDR |
|||
Router-1 |
Router-2 |
Router-1 |
Router-2 |
Router-1 |
Router-2 |
||
MPLS |
Regional MPLS Provider1 |
X |
X |
- |
X |
- |
X |
MPLS |
Regional MPLS Provider2 |
- |
X |
- |
X |
X |
- |
MPLS |
Regional MPLS Provider3 |
X |
X |
X |
- |
X |
X |
MPLS |
Regional MPLS Provider4 |
X |
- |
X |
X |
X |
X |
MPLS |
Regional MPLS Provider5 |
X |
X |
- |
X |
X |
X |
MPLS |
Regional MPLS Provider6 |
X |
X |
- |
X |
X |
- |
MPLS |
Regional MPLS Provider7 |
X |
- |
X |
X |
- |
- |
MPLS |
Regional MPLS Provider8 |
- |
X |
X |
X |
- |
- |
Internet |
Internet Service Provider |
X |
X |
X |
X |
X |
X |
TLOC Color Restriction in a Hub-and-Spoke Topology
Color Value |
Color Type |
Option |
Transport Description |
private1 |
Private |
restrict |
MPLS - 1 |
private2 |
Private |
restrict |
MPLS - 2 |
biz-internet |
Public |
no restrict |
Internet |
Site Type |
Site Description |
Colors |
Site Type-1 |
Single router Dual MPLS Links |
Private1, private2 |
Site Type-2 |
Single router with one MPLS & one 4G link (MPLS) |
Private1, private2 |
Site Type-3 |
Dual Router with Dual MPLS Links |
Private1, private2 |
Site Type-4 |
Single Router with one MPLS Link & one Internet |
Private1, biz-internet |
Site Type-5 |
Single Router with one MPLS & one 4G Link (Internet) |
Private1, biz-internet |
Site Type-6 |
Dual Router with one MPLS Link & one Internet |
Private1, biz-internet |
TLOC Color Restriction in a Hub-and-Spoke Topology
TLOC Color Restriction in a Hub-and-Spoke Topology
Banking Network Solutions are deployed On-Prem SD-WAN Controllers in both the Data Center (DC) and Disaster Recovery (DR) locations.
The resources required to run the controller instances on VMware vSphere ESXi server vary depending on the number of devices to be deployed in the overlay network.
As per Banking Network Solutions requirements, the server recommendation for the control elements per Data Center location is as follows:
Controller/VM |
vCPUs |
RAM |
OS Volume |
Additional |
# of instances |
# of vNICs |
SD-WAN Manager |
32 vCPUs |
128 GB |
20 GB |
10TB |
6 |
3 (tunnel interface, management, cluster) |
SD-WAN Validator |
4 vCPUs |
8 GB |
10 GB |
NA |
4 |
2 (tunnel interface, management) |
SD-WAN Controller |
8 vCPUs |
16 GB |
10 GB |
NA |
6 |
2 (tunnel interface, management) |
The tested and recommended limit of supported Cisco SD-WAN Validators instances in a single Cisco Catalyst SD-WAN overlay is eight.
Physical Deployment – UCSC
Physical Deployment – UCSC
SD-WAN Manager Network Management System
SD-WAN Manager Services Distribution
vManage 1 |
vManage 2 |
vManage 3 |
vManage 4 |
vManage 5 |
vManage 6 |
|
Application Server |
P |
P |
P |
P |
P |
P |
Statistics Database |
P |
P |
P |
|||
Configuration Database |
P |
P |
P |
|||
Messaging Server |
P |
P |
P |
|||
SDAVC |
Optional |
Optional |
Optional |
Optional |
Optional |
Optional |
Note: Control connections will be formed on all vManage instances
SD-WAN Controller
Affinity settings will be utilized to establish redundancy and synchronization between the Controllers deployed in the DC and DR locations, enhancing network reliability and continuity.
SD-WAN Validator
Firewall Port Consideration
The controllers would be placed behind the firewall in DC & DR network, certain ports must be opened on the firewalls so that devices in the Cisco SD-WAN overlay network can exchange traffic.
Port details are mentioned in the following diagram
Source device |
Source port |
Destination device |
Destination port |
SD-WAN Manager/SD-WAN Validator (DTLS) |
Core1 = UDP 12346 |
SD-WAN Validator |
UDP 12346 |
SD-WAN Manager (DTLS) |
UDP 12346 |
SD-WAN Validator |
UDP 12346 |
SD-WAN Manager (DTLS) |
UDP 12346 |
SD-WAN Manager |
UDP 12346 |
SD-WAN Validator (DTLS) |
UDP 12346 |
SD-WAN Validator |
UDP 12346 |
WAN Edge (DTLS) |
UDP 12346+n, 12366+n, 12386+n, 12406+n, and 12426+n, where n=0-19 and represents the configured offset |
SD-WAN Validator |
UDP 12346 |
WAN Edge (DTLS) |
UDP 12346+n, 12366+n, 12386+n, 12406+n, and 12426+n, where n=0-19 and represents the configured offset |
SD-WAN Manager/SD-WAN Validator |
Core1 = UDP 12346 |
SD-WAN Manager (TLS) |
TCP random port number > 1024 |
SD-WAN Validator |
TCP 23456 |
SD-WAN Manager (TLS) |
TCP random port number > 1024 |
SD-WAN Manager |
TCP 23456 |
SD-WAN Validator (TLS) |
TCP random port number > 1024 |
SD-WAN Validator |
TCP 23456 |
WAN Edge (TLS) |
TCP random port number > 1024 |
SD-WAN Manager/SD-WAN Validator |
Core1 = TCP 23456 |
WAN Edge (IPsec) |
UDP 12346+n, 12366+n, 12386+n, 12406+n, and 12426+n, where n=0-19 and represents the configured offset |
WAN Edge |
UDP 12346+n, 12366+n, 12386+n, 12406+n, and 12426+n, where n=0-19 and represents the configured offset |
Design Recommendation:
TLOC-Extension Port Range:
Ports for SD-WAN Manager Clustering and Disaster Recovery
For an SD-WAN Manager cluster, the following ports may be used on the cluster interface of the controllers. Ensure the correct ports are opened within firewalls that reside between cluster members.
SD-WAN Manager Service |
Protocol/Port |
Direction |
Application Server |
TCP 80, 443, 7600, 8080, 8443, 57600 |
bidirectional |
Configuration Database |
TCP 5000, 7474, 7687 |
bidirectional |
Coordination Server |
TCP 2181, 2888, 3888 |
bidirectional |
Message Bus |
TCP 4222, 6222, 8222 |
bidirectional |
Statistics Database |
TCP 9200, 9300 |
bidirectional |
Tracking of device configurations (NCS and NETCONF) |
TCP 830 |
bidirectional |
Cloud Agent |
TCP 8553 |
bidirectional |
Cloud Agent V2 |
TCP 50051 |
bidirectional |
SD-AVC |
TCP 10502, 10503 |
bidirectional |
If disaster recovery is configured, ensure that the following ports are opened over the out-of-band interface across the data centers between the primary and standby cluster:
Summary of ports needed for SD-WAN Manager disaster recovery
SD-WAN Manager Service |
Protocol/Port |
Direction |
Disaster Recovery |
TCP 8443, 830 |
bidirectional |
These design principles ensure a standardized and efficient network architecture across all branch locations within Banking Network Solutions' SD-WAN infrastructure, promoting scalability, security, and ease of management.
Banking Network Solutions operates 6000 + branch sites, each varying in size and design to cater to different operational requirements.
Large/Regional Branch Sites:
Medium-Sized Branch Sites:
The following figure shows the high-level branch type 1 design
Below are the design considerations for Branch Site type 1.
WAN Edge Device Configuration:
WAN Facing Ports:
LAN Facing Port:
The following figure shows the high-level branch type 2 design
Below are the design considerations for Branch Site type 2 with MPLS transport with TLOC extension.
WAN Edge Device Configuration:
TLOC Extensions:
WAN Facing Ports:
LAN Facing Port:
TLOC-Extension Ports:
The following figure shows the high-level branch type 3 design
Below are the design considerations for Branch Site type 3 with One MPLS transport and One 4G/MPLS Transport
WAN Edge Device Configuration:
WAN Facing Ports:
LAN Facing Port:
The following figure shows the high-level branch type 4 design
Below are the design considerations for Branch Site Type-4 with MPLS and Internet transport.
WAN Edge Device Configuration:
WAN Facing Ports:
LAN Facing Port:
The following figure shows the high-level branch type 5 design
Below are the design considerations for Branch Site type 5 with MPLS transport with TLOC extension.
Devices: 2 WAN Edge devices
Transports:
Topology and Connectivity:
Port Configurations:
WAN Facing Ports:
LAN Facing Port:
TLOC-Extension Port:
This template ensures clarity and organization in presenting the design considerations for Branch Site Type 5 configurations involving multiple WAN Edge devices and dual transports
The following figure shows the high-level branch type 6 design
Below are the design considerations for Branch Site Type-6 with MPLS and one 4G Internet transport.
Device Type: Single WAN edge device
Transports:
Port Configuration:
WAN Facing Ports:
LAN Facing Port:
This setup ensures effective management of MPLS and 4G Internet transports, with clearly defined WAN and LAN facing ports tailored to specific VPN assignments and internal traffic segregation using dot1q sub-interfaces.
Hierarchical SD-WAN – MRF ( Multi-Region Fabric) – Design Option 1
Benefits of MRF
Cisco SD-WAN Multi-Region Fabric offers Banking Network Solutions the capabilities to enhance, scale up, and, more importantly, simplify their Cisco SD-WAN fabric across regions. Cisco SD-WAN Multi-Region Fabric helps you:
In summary, the deployment of a multi-region fabric Cisco Catalyst SD-WAN design in a hierarchical structure empowers Banking Network Solutions to modernize their network infrastructure, meet evolving demands, and adapt to future challenges effectively.
Multiple Overlay – Design Option 2
In planning for future scalability, Banking Network Solutions can explore the option of deploying multiple overlays, replicating the successful design strategy employed in their single overlay infrastructure. This approach ensures scalability by accommodating increased network demands, provides redundancy and resilience to mitigate downtime, optimizes performance through traffic segregation, facilitates geographic expansion while maintaining reliability, streamlines management with proper tools and strategies, and ensures readiness for evolving technology and business needs, thus offering a robust and adaptable network architecture for long-term growth.
Benefits of Multiple Overlays:
Multiple SDWAN Overlay – Option A
Multiple SDWAN Overlay - Option B
When designing a Cisco SD-WAN solution for the Banking Networking Solutions, ensuring high availability and redundancy is crucial to maintain the continuous operation of critical financial services and applications. Here are key considerations for implementing high availability and redundancy in a Cisco SD-WAN deployment
Dual-Active Edge Routers :
Active-Standby Edge Routers:
Redundant WAN Links :
Application-Aware Routing :
Active-Active Data Centers :
Controller Redundancy :
Resilient Control Plane :
Monitoring and Alerting :
By implementing these high availability and redundancy measures, financial institutions can ensure continuous operation of their SD-WAN infrastructure, minimize downtime, and maintain service reliability for critical financial services and applications.
In the Banking Network Solutions infrastructure, there are a total of 12 SD-WAN Manager instances distributed between the primary Data Center (DC) and the Disaster Recovery (DR) site:
DC SD-WAN Manager Cluster:
DR SD-WAN Manager Cluster:
IP Space Configuration:
Tunnel Interface Shutdown:
Configuration and Certification:
Database Backup:
Standby SD-WAN Manager Restoration:
By following these measures, Banking Network Solutions can maintain high availability and resilience in their SD-WAN management infrastructure, ensuring continuous network operations even in the face of unforeseen challenges or disasters.
SD-WAN Controller Deployment:
Deployment Strategy:
Affinity Group and Redundancy:
SD-WAN Validator Deployment:
Redundancy and Grouping Strategy:
Cold-Standby Instances:
SD-WAN Head-End scalability is crucial for ensuring your network can handle growing bandwidth demands, increasing numbers of sites, and diverse traffic patterns. Here's an overview of key approaches to achieve SD-WAN Head-End scalability:
Vertical Scaling:
Horizontal Scaling:
Scalability Considerations – Controllers
Note: For Banking Network Solutions SDWAN, Two - 6 Node SD-WAN Manager Clusters are deployed. Active Cluster (DC) and Cold Standby Cluster (DR)
Note: For Banking Network Solutions SDWAN, Horizontal scale out model with 8 SD-WAN Controllers are deployed. 4 SD-WAN Controller in DC and 4 SD-WAN Controller in DR along with controller affinity.
Note: For Banking Network Solutions SDWAN, Horizontal scale out model with 8 SD-WAN Validator is deployed. 4 SD-WAN Validator in DC and 4 SD-WAN Validator in DR
There is a limit on the number of BFD session tunnels that each cEdge router can accommodate. A BFD session tunnel is defined as an active IPsec data plane tunnel.
Note: For Banking Network Solutions SDWAN Hub and Spoke topology, to reduce the number of tunnels built on DC WAN edge routers
SD-WAN deployments can utilize various topologies to connect different network locations and optimize traffic flow.
In the Banking Network Solutions SD-WAN solution, the hub-and-spoke topology will be used. In a hub-and-spoke topology, the WAN Edge routers at DC/DR/NDR site will act as the hubs that receive the data traffic from all the branch sites. Once they receive the data they would redirect the traffic to the appropriate destinations. This topology reduces the number of IPsec tunnels by restricting direct IPsec tunnels between all the branches and hence spoke routers do not need to spend their CPU for these tunnels. Hub-and-spoke topologies save on tunnel capacity since tunnels are only built to the hub routers. It is also beneficial from the administrative point of view in applying centralized policies at WAN Edge hub routers to control the traffic between all sites.
The following diagrams illustrate HUB(DC) & Spoke / Partial Mesh topologies
SD-WAN Topology – Hub/Spoke
SD-WAN Topology – Partial Mesh
The choice between Hub and Spoke and Partial Mesh Tunnels depends on your specific needs and network characteristics:
In Banking Network Solutions, the choice of Hybrid Tunnels topology was made to have Voice traffic between Contact Centre locations required to avoid latency.
By understanding the advantages and limitations of each topology and carefully considering your specific needs, you can choose the most appropriate SD-WAN architecture for your organization.
SD-WAN policy Design
In SD-WAN policy design, various elements are used to define how traffic is handled, routed, and controlled across the network. Here are some key components:
These components work together to define the behavior, routing decisions, and quality of service parameters for traffic traversing the SD-WAN environment. By carefully configuring and managing these elements within SD-WAN policies, organizations can ensure optimal performance, reliability, and security for their network traffic.
In Banking Network Solutions, many networks/routes will be advertised into the SD-WAN overlay network from the data centres. Below are some of the routes that we would receive from the DC/DR/NDR.
As the prefixes will be large and change any time, the routes received on the service side at DC/DR/NDR will be matched with OSPF Tags.
The following design considerations apply:
SD-WAN Control Policy for DC/DR/NDR Route Preference to Group 1 branches
SD-WAN Control Policy for DC/DR/NDR Route Preference to Group 2 branches
Branch Site |
Service VPN |
DC OSPF Tag |
DR OSPF Tag |
NDR OSPF Tag |
100 |
10 |
510 |
610 |
710 |
200 |
20 |
520 |
620 |
720 |
300 |
30 |
530 |
630 |
730 |
SD-WAN Control Policy for OSPF - OMP Tagging and Route Loop Avoidance.
Cisco SD-WAN Direct Internet Access is a solution that improves the user experience for SaaS applications at remote sites by eliminating the performance degradations related to backhauling Internet traffic to central data centers. DIA allows control of Internet access on a per VPN basis.
Direct Internet Access
This section explains how the Internet Access at branches will be replaced by Direct Internet Access (DIA) provided by Cisco SD-WAN edges. Internet access at DCs will not use SD-WAN Edges since it is normally handled by dedicated devices in the DMZ within the Data Centers.
Benefits of using DIA include :
Cisco SD-WAN Direct Internet Access is characterized by providing different options and large flexibility to customers. DIA can be controlled by routing, by policy or by a combination of the two and it can be also redirected to a cloud-based security solution (like Cisco Umbrella). Different options for primary and backup path can be used. This section first describes the general principles for branch DIA.
Branch DIA
Branch DIA covers two main use cases, branch internal employees and guest. As shown in the figure, branch (remote-site) employees are allowed direct access to the Internet for cloud- based applications and user web access. This is achieved by configuring the WAN edge routers as an Internet exit point. Internal employee Internet traffic uses the directly connected Internet transport for direct Internet access, while the corporate traffic uses the SDWAN tunnels to the destination.
Branch Internal User DIA Traffic
Branch users access the Internet directly for user web access and cloud-based applications, without routing their traffic via the internal network and through the Hub sites.
In general DIA use, segmentation is useful in keeping authenticated employee or users separate from the guest users and it is achieved by assigning users and guests to different SDWAN service VPNs.
For DIA, NAT translation for packets exiting into the internet within the branch is enabled on the WAN edge devices via NAT. NAT is a required feature when providing a local breakout.
The NAT type used can be of different types: overload (i.e. NAT interface) or NAT pool or loopback. The most common is NAT overload that is the mapping of multiple unregistered IP addresses to a single registered IP address by using different ports. NAP pool allows a larger and configurable pool of public IP to be used. NAT loopback use the loopback interface on the inside. The NAT operation on outgoing traffic is performed in VPN 0, which is always only a transport VPN. The router's connection to the Internet is in VPN 0.
There are two ways in which traffic from the service VPNs (user or guest) can be redirected to the DIA on VPN0:
Guest Access
Cisco SD-WAN provides an easy and secure way to create an isolated Guests segment that is isolated from the enterprise network and has its own security policies. Typical DIA traffic policies include:
Security
Cisco SD-WAN allows pushing the security stack directly on the WAN edge devices onsite. This reduces the need for security appliances at every branch, by providing inbuilt security features which include DNS security, Application-aware firewall, URL filtering, IPS/IDS, and Advanced Malware Protection (AMP).
In addition, instead of enabling the security stack at the WAN edge routers, the DIA feature allows for routing the traffic through a cloud security provider. In this case, the traffic from a particular remote site is routed to the cloud security provider through point-to-point IPsec tunnels. The cloud security provider then pushes the traffic through the predefined security policies and route it out to the Internet.
In the Banking Network Solutions application prioritization and Quality of Service (QoS) are crucial for ensuring optimal performance and reliability of critical financial applications. Here are key considerations for implementing application prioritization and QoS in a Cisco SD-WAN deployment:
The QoS feature on the Edge routers works by examining packets entering at the edge of the network. The localized data policy can be used to:
A class map can be configured for each output queue to specify the bandwidth, buffer size, and packet loss priority (PLP) of the output queues. This allows the Edge to determine how to prioritize data packets for transmission to the destination. Depending on the priority of the traffic and configuration, the Edge router assigns packets higher or lower bandwidth, buffer levels, and drop profiles.
In Banking Network Solutions following Four Class QoS model will be deployed. Banking Network Solutions Critical/Non-Critical applications are differentiated based on the IP details for classification.
Class |
Class-1 |
Class-2 |
Class-3 |
Class-4 |
Traffic type |
Control/Priority Traffic |
Critical Subnet Traffic |
Non-Critical Subnet Traffic |
Best Effort/Default |
BW Allocation |
10% |
40% |
20% |
30% |
Typical Expected Business Traffic |
Control/Priority Traffic |
Interactive Video, Mission critical applications, Financial transactions |
E-mail, Client Server transactions, Intranet applications, Streaming Audio/Video |
Web browsing, FTP, LAN-to-LAN data transfer |
Application Identification:
Traffic Prioritization:
Traffic Shaping and Policing:
Class-Based QoS :
Dynamic Path Selection :
Application Performance Monitoring :
Continuous Optimization :
This feature allows to apply a Quality of Service (QoS) policy on individual tunnels, ensuring that branch offices with smaller throughput are not overwhelmed by larger aggregation/hub sites. Per-tunnel QoS on a hub allows to shape tunnel traffic to individual spokes. It also differentiates individual data flows going through the tunnel or the spoke for policing.
Per-tunnel QoS for Cisco SD-WAN provides the following benefits -
Few restrictions of per-tunnel QoS feature to be noted as below -
Per-Tunnel QoS
In Banking Network Solutions, per-tunnel QoS will be deployed to take advantage of above-mentioned features as primarily Banking Network Solutions network topology is Hub and Spoke type.
By implementing these best practices for application prioritization and QoS in a Cisco SD-WAN deployment, Banking Network Solutions can ensure reliable and responsive delivery of critical Banking applications, improve user experience, and maintain business continuity even during periods of high network congestion or degraded performance.
VPN Segmentation:
Service VPN Segmentation in Banking Network Solutions' SD-WAN
Following their SD-WAN migration, Banking Network Solutions implemented network segmentation using up to four Service VPNs for enhanced security.
Service VPN Descriptions:
Site ID – Planned/Utilised in DC WAN Edge Routers
Traffic Engineering
Traffic engineering plays a crucial role in optimizing network performance and ensuring efficient utilization of resources in the financial sector. When deploying Cisco SD-WAN in this vertical, several key traffic engineering features should be leveraged:
Dynamic Path Selection:
Application-Aware Routing:
By leveraging dynamic path selection, application-aware routing traffic engineering features in Cisco SD-WAN, financial institutions can optimize network performance, ensure reliable connectivity for critical transactions, and enhance user experience across the network infrastructure.
BFD Path Quality
BFD is used not only to detect blackout conditions but is also used to measure various path characteristics such as loss, latency, and jitter. These measurements are compared against the configured thresholds defined by the application-aware routing policy, and dynamic path decisions can be made based on the results in order to provide optimal quality for business-critical applications.
For measurements, the WAN Edge router collects packet loss, latency, and jitter information for every BFD hello packet. This information is collected over the poll-interval period, which is 10 minutes by default, and then the average of each statistic is calculated over this poll-interval time. A multiplier is then used to specify how many poll-interval averages should be reviewed against the SLA criteria. By default, the multiplier is 6, so 6 x 10-minute poll-interval averages for loss, latency, and jitter are reviewed and compared against the SLA thresholds before an out-of-threshold decision is made. The calculations are rolling, meaning, on the seventh poll interval, the earliest polling data is discarded to accommodate the latest information, and another comparison is made against the SLA criteria with the newest data.
Since statistical averages are used to compare against configured SLA criteria, how quickly convergence happens depends on how far out of threshold a parameter is. Using default settings, the best case is an out-of-threshold condition that occurs after 1 poll interval is completed (10 minutes) and in the worst case, it occurs after 6 poll intervals are completed (60 minutes). When an out-of-threshold condition occurs, traffic is moved to a more optimal path.
The following figure shows an example when an out-of-threshold condition is recognized when latency suddenly increases. When latency jumps from 20 ms to 200 ms at the beginning of poll-interval 7, it takes 3 poll intervals of calculations before the latency average over 6 poll intervals crosses the configured SLA threshold of 100 ms.
You may want to adjust application route poll-interval values, but you need to exercise caution, since settings that are too low can result in false positives with loss, latency, and jitter values, and can result in traffic instability. It is important there is enough BFD hellos per poll interval for the average calculation, or large loss percentages may be incorrectly tabulated when one is lost. In addition, lowering these timers can affect overall scale and performance of the WAN Edge router.
For 1 second hellos, the lowest application route poll-interval that should be deployed is 120 seconds. With 6 intervals, this gives a 2-minute best case and 12-minute worst case before an out-of-threshold is declared and traffic is moved from the current path. Any further timer adjustments should be thoroughly tested and used cautiously.
Note: You may want to adjust application route poll-interval values, but you need to exercise caution, since settings that are too low can result in false positives with loss, latency, and jitter values, and can result in traffic instability.
Deployment
When deploying Cisco SD-WAN in the financial sector, it's essential to consider various deployment aspects to ensure a successful implementation. Here are key considerations for each phase of the deployment process:
Implementation Prerequisites :
Deployment Considerations:
Deployment by Branch Size:
Large, Medium & Small Branch Sites: Require 3 Service VPNs (Employee, ATM, Monitoring)
Optional: Service VPN 40 (Guest) if customer-facing representatives are present. Business decision to offer Service VPN 40 (Guest) in select small branches based on cost-effectiveness.
Future Considerations:
Key Takeaways:
Site ID Planning for DC Routers |
|||
DC Name |
DC Code |
Group Range |
Site-ID range |
DC |
10 |
1-9 |
101-109 |
DR |
20 |
1-9 |
201-209 |
NDR |
30 |
1-9 |
301-309 |
Site ID for DC/DR/NDR WAN Edges |
||
Site Name |
Hostname |
Site ID |
DC |
DC-cEdge01 |
101 |
DC-cEdge02 |
||
DC-cEdge03 |
102 |
|
DC-cEdge04 |
||
DR |
DR-cEdge01 |
201 |
DR-cEdge02 |
||
DR-cEdge03 |
202 |
|
DR-cEdge04 |
||
NDR |
NDR-cEdge01 |
301 |
NDR-cEdge02 |
||
NDR-cEdge03 |
302 |
|
NDR-cEdge04 |
Site ID – Planned/Utilised For SD-WAN Manager, Controller & Validator
Site Name |
Hostname |
Site ID |
Hostname |
Site ID |
Hostname |
Site ID |
DC |
DC-Manager01 |
131 |
DC-Controller01 |
121 |
DC-Validator01 |
111 |
DC-Manager02 |
DC-Controller02 |
122 |
DC-Validator02 |
112 |
||
DC-Manager03 |
DC-Controller03 |
123 |
DC-Validator03 |
113 |
||
DC-Manager04 |
DC-Controller04 |
124 |
DC-Validator04 |
114 |
||
DC-Manager05 |
DC-Controller05 |
125 |
DC-Validator05 |
115 |
||
DC-Manager06 |
DC-Controller06 |
126 |
DC-Validator06 |
116 |
||
|
|
|
||||
DR |
DR-Manager01 |
231 |
DR-Controller01 |
221 |
DR-Validator01 |
211 |
DR-Manager02 |
DR-Controller02 |
222 |
DR-Validator02 |
212 |
||
DR-Manager03 |
DR-Controller03 |
223 |
DR-Validator03 |
213 |
||
DR-Manager04 |
DR-Controller04 |
224 |
DR-Validator04 |
214 |
||
DR-Manager05 |
DR-Controller05 |
225 |
DR-Validator05 |
215 |
||
DR-Manager06 |
DR-Controller06 |
226 |
DR-Validator06 |
216 |
For Group-1 Branch Routers
Site ID Planning for Group-1 Branch Routers |
||||
Grp ID (1) |
Reg Code (2) |
Site Type (2) |
Site Code (4) |
Site ID Range (9) |
1 |
01-99 |
11-99 |
0001-9999 |
10111001-199999999 |
For Group-2 Branch Routers
Site ID Planning for Group-1 Branch Routers |
||||
Grp ID (1) |
Reg Code (2) |
Site Type (2) |
Site Code (4) |
Site ID Range (9) |
2 |
01-99 |
11-99 |
0001-9999 |
20111001-299999999 |
System IP (Persistent IPv4 address)
In Banking Network Solutions, System IP will be following the below guidelines:
System IP for Controllers |
|
Site Location |
System IP Range |
DC |
10.237.1.0/25 |
DR |
10.237.2.0/25 |
DC |
DR |
Branch Locations |
|
System IP for Controllers |
10.237.1.0/25 |
10.237.2.0/25 |
|
System IP for DC Routers |
10.237.3.0/25 |
10.237.4.0/25 |
|
System IP for Branch Routers |
10.237.11.0/24-10.237.250.0/24 |
SD-WAN Controller IP Addressing – SD-WAN Manager
SD-WAN Manager IP Addressing |
||||||||
Site Name |
Hostname |
Site ID |
System IP |
VPN 0 IP |
VPN 0 GW |
Cluster Interface IP |
VPN 512 IP |
VPN 512 GW |
DC |
DC-Manager01 |
131 |
10.237.1.31 |
10.255.2.36 |
10.255.2.33 |
10.255.2.68 |
10.255.2.106 |
10.255.2.97 |
DC-Manager02 |
10.237.1.32 |
10.255.2.37 |
10.255.2.33 |
10.255.2.69 |
10.255.2.107 |
10.255.2.97 |
||
DC-Manager03 |
10.237.1.33 |
10.255.2.38 |
10.255.2.33 |
10.255.2.70 |
10.255.2.108 |
10.255.2.97 |
||
DC-Manager04 |
10.237.1.34 |
10.255.2.39 |
10.255.2.33 |
10.255.2.71 |
10.255.2.109 |
10.255.2.97 |
||
DC-Manager05 |
10.237.1.35 |
10.255.2.40 |
10.255.2.33 |
10.255.2.72 |
10.255.2.110 |
10.255.2.97 |
||
DC-Manager06 |
10.237.1.36 |
10.255.2.41 |
10.255.2.33 |
10.255.2.73 |
10.255.2.111 |
10.255.2.97 |
||
|
||||||||
DR |
DR-Manager01 |
231 |
10.237.2.31 |
10.255.5.36 |
10.255.5.33 |
10.255.5.68 |
10.255.5.106 |
10.255.5.65 |
DR-Manager02 |
10.237.2.32 |
10.255.5.37 |
10.255.5.33 |
10.255.5.69 |
10.255.5.107 |
10.255.5.65 |
||
DR-Manager03 |
10.237.2.33 |
10.255.5.38 |
10.255.5.33 |
10.255.5.70 |
10.255.5.108 |
10.255.5.65 |
||
DR-Manager04 |
10.237.2.34 |
10.255.5.39 |
10.255.5.33 |
10.255.5.71 |
10.255.5.109 |
10.255.5.65 |
||
DR-Manager05 |
10.237.2.35 |
10.255.5.40 |
10.255.5.33 |
10.255.5.72 |
10.255.5.110 |
10.255.5.65 |
||
DR-Manager06 |
10.237.2.36 |
10.255.5.41 |
10.255.5.33 |
10.255.5.73 |
10.255.5.111 |
10.255.5.65 |
SD-WAN Controller IP Addressing – SD-WAN Controllers
Controllers IP Addressing |
|||||||
Site Name |
Hostname |
Site ID |
System IP |
VPN 0 IP |
VPN 0 GW |
VPN 512 IP |
VPN 512 GW |
DC |
DC-Contoller01 |
10.237.1.21 |
121 |
10.255.2.42 |
10.255.2.33 |
10.255.2.112 |
10.255.2.97 |
DC-Contoller02 |
10.237.1.22 |
122 |
10.255.2.43 |
10.255.2.33 |
10.255.2.113 |
10.255.2.97 |
|
DC-Contoller03 |
10.237.1.23 |
123 |
10.255.2.44 |
10.255.2.33 |
10.255.2.114 |
10.255.2.97 |
|
DC- Contoller04 |
10.237.1.24 |
124 |
10.255.2.45 |
10.255.2.33 |
10.255.2.115 |
10.255.2.97 |
|
DC- Contoller05 |
10.237.1.25 |
125 |
10.255.2.46 |
10.255.2.33 |
10.255.2.116 |
10.255.2.97 |
|
DC-Contoller06 |
10.237.1.26 |
126 |
10.255.2.47 |
10.255.2.33 |
10.255.2.117 |
10.255.2.97 |
|
|
|||||||
DR |
DR-Contoller01 |
10.237.2.21 |
221 |
10.255.5.42 |
10.255.5.33 |
10.255.5.112 |
10.255.5.97 |
DR-Contoller02 |
10.237.2.22 |
222 |
10.255.5.43 |
10.255.5.33 |
10.255.5.113 |
10.255.5.97 |
|
DR-Contoller03 |
10.237.2.23 |
223 |
10.255.5.44 |
10.255.5.33 |
10.255.5.114 |
10.255.5.97 |
|
DR-Contoller04 |
10.237.2.24 |
224 |
10.255.5.45 |
10.255.5.33 |
10.255.5.115 |
10.255.5.97 |
|
DR-Contoller05 |
10.237.2.25 |
225 |
10.255.5.46 |
10.255.5.33 |
10.255.5.116 |
10.255.5.97 |
|
DR-Contoller06 |
10.237.2.26 |
226 |
10.255.5.47 |
10.255.5.33 |
10.255.5.117 |
10.255.5.97 |
SD-WAN Controller IP Addressing - SD-WAN Validator
SD-WAN Validator IP Addressing |
|||||||
Site Name |
Hostname |
Site ID |
System IP |
VPN 0 IP |
VPN 0 GW |
VPN 512 IP |
VPN 512 GW |
DC |
DC-Validator01 |
10.237.1.11 |
111 |
10.255.2.4 |
10.255.2.1 |
10.255.2.118 |
10.255.2.97 |
DC-Validator02 |
10.237.1.12 |
112 |
10.255.2.5 |
10.255.2.1 |
10.255.2.119 |
10.255.2.97 |
|
DC-Validator03 |
10.237.1.13 |
113 |
10.255.2.6 |
10.255.2.1 |
10.255.2.120 |
10.255.2.97 |
|
DC-Validator04 |
10.237.1.14 |
114 |
10.255.2.7 |
10.255.2.1 |
10.255.2.121 |
10.255.2.97 |
|
DC-Validator05 |
10.237.1.15 |
115 |
10.255.2.8 |
10.255.2.1 |
10.255.2.122 |
10.255.2.97 |
|
DC-Validator06 |
10.237.1.16 |
115 |
10.255.2.9 |
10.255.2.1 |
10.255.2.123 |
10.255.2.97 |
|
|
|||||||
DR |
DR-Validator01 |
10.237.2.11 |
211 |
10.255.5.4 |
10.255.5.1 |
10.255.5.118 |
10.255.5.118 |
DR-Validator02 |
10.237.2.12 |
212 |
10.255.5.5 |
10.255.5.1 |
10.255.5.119 |
10.255.5.118 |
|
DR-Validator03 |
10.237.2.13 |
213 |
10.255.5.6 |
10.255.5.1 |
10.255.5.120 |
10.255.5.118 |
|
DR-Validator04 |
10.237.2.14 |
214 |
10.255.5.7 |
10.255.5.1 |
10.255.5.121 |
10.255.5.118 |
|
DR-Validator05 |
10.237.2.15 |
215 |
10.255.5.8 |
10.255.5.1 |
10.255.5.122 |
10.255.5.118 |
|
DR-Validator06 |
10.237.2.16 |
216 |
10.255.5.9 |
10.255.5.1 |
10.255.5.123 |
10.255.5.118 |
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: