12-16-2024 01:56 AM - edited 12-16-2024 06:55 PM
Hi All
I'm working on a SD-WAN Hub-and-Spoke Topology, but i want to avoid traffic flow between spoke to spoke, for example : the DC site using VPN 100, and the branch A using VPN 10, branch B using VPN 20, in this circumstances i need to route-leaking between 100-10、100-20, but now the routing table on VPN 100 will allow traffic from 10 forward to 20
Because of the default route advertise from the DC site, branch can easily route through anyway via VPN 100, because VPN 100 need to have every VPN's route in the fabric
Is there any way that i can prevent traffic between 10 and 20 without using SD-WAN ZBFW ?
thanks for answering
Solved! Go to Solution.
12-16-2024 10:46 PM
since you receive default route toward hub then we can not prevent spoke to spoke traffic without ACL
you need to use Local Data Policy in both Spoke
https://www.networkacademy.io/ccie-enterprise/sdwan/explicit-access-control-list-acl
MHM
12-17-2024 01:46 PM
Hi,
I don't know how many sites you have. But one option could be to list remote branches and in centralized data policy you select drop action.
There is no way to filter this without manually written access-list.
12-16-2024 02:02 AM
What I get you want to make traffic via Hub only ? Or something else
MHM
12-16-2024 06:24 PM
Yes, even though i am using hub and spoke topology, but i need to avoid any traffic from spoke to spoke via Hub
12-16-2024 10:46 PM
since you receive default route toward hub then we can not prevent spoke to spoke traffic without ACL
you need to use Local Data Policy in both Spoke
https://www.networkacademy.io/ccie-enterprise/sdwan/explicit-access-control-list-acl
MHM
12-16-2024 02:09 AM
You can solve this with a centralised policy that prevents spoke originated TLOC and OMP routes to be advertised to other spokes combined with a centralized data policy that restricts spoke-spoke traffic through the hub.
12-16-2024 06:54 PM
Yes I am using centralized policy to make sure there was no TLOC and Route exchange between spoke-spoke, but because of the default route that learn from the DC site, spoke-spoke can still communicate via DC
12-16-2024 02:12 AM
You dont need ZBFW, you can achieve this with Control Policy
12-16-2024 07:40 PM
hi sir
Could you please explain specific which function to use in control policy ?
12-16-2024 06:46 PM - edited 12-16-2024 06:57 PM
Because of the default route advertise from the DC site, branch can easily route through anyway via VPN 100, because VPN 100 need to have every VPN's route in the fabric
12-17-2024 01:46 PM
Hi,
I don't know how many sites you have. But one option could be to list remote branches and in centralized data policy you select drop action.
There is no way to filter this without manually written access-list.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide