cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
696
Views
0
Helpful
9
Replies

Service Chaining Question

sybrand struwig
Level 1
Level 1

I have setup service chaining from site 20 vpn 10 to site 101 vpn 20 using vpn 40 at site 10 and vice versa (tested working), but what if there are resources at site 10 that also need to access vpn 20 from vpn 10 via the local firewall. How would I accomplish the required configuration?

viptela-policy:policy
 control-policy vpn20-inter-vpn10-40
    sequence 1
     match route
      vpn-list VPN_20
      prefix-list _AnyIpv4PrefixList
     !
     action accept
      export-to vpn-list Corp_FW
     !
    !
  default-action accept
 !
 control-policy site20-fw-site101
    sequence 1
     match route
      site-list Site_101
      prefix-list _AnyIpv4PrefixList
     !
     action accept
      set
       service  netsvc1 vpn 40
      !
     !
    !
  default-action accept
 !
 control-policy vpn10-inter-vpn20-40
    sequence 1
     match route
      vpn-list VPN_10
      prefix-list _AnyIpv4PrefixList
     !
     action accept
      export-to vpn-list PoS_FW
     !
    !
    sequence 11
     match route
      vpn-list VPN_40_FW
      prefix-list _AnyIpv4PrefixList
     !
     action accept
      export-to vpn-list VPN_10
     !
    !
  default-action accept
 !
 control-policy site101-fw-site20
    sequence 1
     match route
      site-list Site_20
      prefix-list _AnyIpv4PrefixList
     !
     action accept
      set
       service  netsvc2 vpn 40
      !
     !
    !
  default-action accept
 !
 lists
  site-list Site_10
   site-id 10 
  !
  site-list Site_101
   site-id 101 
  !
  site-list Site_20
   site-id 20 
  !
  vpn-list Corp_FW
   vpn 10 
   vpn 40 
  !
  vpn-list PoS_FW
   vpn 20 
   vpn 40 
  !
  vpn-list VPN_10
   vpn 10 
  !
  vpn-list VPN_20
   vpn 20 
  !
  vpn-list VPN_40_FW
   vpn 40 
  !
  prefix-list _AnyIpv4PrefixList
   ip-prefix 0.0.0.0/0 le 32 
  !
 !
!
apply-policy
 site-list Site_10
  control-policy vpn10-inter-vpn20-40 in
 !
 site-list Site_101
  control-policy site101-fw-site20 out
  control-policy vpn20-inter-vpn10-40 in
 !
 site-list Site_20
  control-policy site20-fw-site101 out
  control-policy vpn10-inter-vpn20-40 in
 !
!
Virtual.JPG 

 

1 Accepted Solution

Accepted Solutions

I managed to figure it out, I was using a dual edge site design and had add an extra interface for the 2nd edge and apply the acl to that interface as well.

View solution in original post

9 Replies 9

sybrand struwig
Level 1
Level 1

DC2-Core#traceroute vrf 10 10.20.101.1
Type escape sequence to abort.
Tracing the route to 10.20.101.1
VRF info: (vrf in name/id, vrf out name/id)
1 10.10.20.2 21 msec
10.10.20.3 12 msec
10.10.20.2 18 msec
2 10.100.40.2 50 msec 50 msec 59 msec
3 10.100.40.1 65 msec 88 msec 81 msec
4 10.100.40.6 76 msec 79 msec 98 msec
5 10.20.101.2 93 msec 126 msec 136 msec
6 10.20.101.1 135 msec * 168 msec
DC2-Core#

sybrand struwig
Level 1
Level 1

BR1-Switch#traceroute vrf 20 10.10.20.1
Type escape sequence to abort.
Tracing the route to 10.10.20.1
VRF info: (vrf in name/id, vrf out name/id)
1 10.20.101.2 12 msec
10.20.101.3 11 msec
10.20.101.2 27 msec
2 10.100.40.6 81 msec 70 msec 68 msec
3 10.100.40.5 75 msec 121 msec 110 msec
4 10.100.40.2 95 msec 117 msec 117 msec
5 10.10.20.3 103 msec 135 msec 116 msec
6 10.10.20.1 141 msec * 170 msec
BR1-Switch#

husseino
Cisco Employee
Cisco Employee

You should used policy based routing with localized policies on site 10 routers.

Thanks for pointing me in the right direction, so in a nutshell I should setup a localized routing policy?

 

This is not working, I can't find any documentation on this. Anyone?

 

husseino
Cisco Employee
Cisco Employee

Yes, in localized policy you can match a prefix and modify the next hop for local firewall. Also, you will need use route leaking in VPN template depending on the traffic bidirectional flows

I have created a Local Routing Policy and attaced it to Site 10 but traffic swill go directly through to VPN 20

viptela-policy:policy
data-policy _VPN_10_site_10_vpn_10_to_vpn_20
vpn-list VPN_10
sequence 1
match
destination-ip 10.20.101.0/24
!
action accept
set
next-hop 10.100.40.1
!
!
!
default-action accept
!
control-policy vpn20-inter-vpn10-40
sequence 1
match route
vpn-list VPN_20
prefix-list _AnyIpv4PrefixList
!
action accept
export-to vpn-list Corp_FW
!
!
default-action accept
!
control-policy site20-fw-site101
sequence 1
match route
site-list Site_101
prefix-list _AnyIpv4PrefixList
!
action accept
set
service netsvc1 vpn 40
!
!
!
default-action accept
!
control-policy vpn10-inter-vpn20-40
sequence 1
match route
vpn-list VPN_10
prefix-list _AnyIpv4PrefixList
!
action accept
export-to vpn-list PoS_FW
!
!
sequence 11
match route
vpn-list VPN_40_FW
prefix-list _AnyIpv4PrefixList
!
action accept
export-to vpn-list vpn_10_20
!
!
default-action accept
!
control-policy site101-fw-site20
sequence 1
match route
site-list Site_20
prefix-list _AnyIpv4PrefixList
!
action accept
set
service netsvc2 vpn 40
!
!
!
default-action accept
!
lists
site-list Site_10
site-id 10
!
site-list Site_101
site-id 101
!
site-list Site_20
site-id 20
!
vpn-list Corp_FW
vpn 10
vpn 40
!
vpn-list PoS_FW
vpn 20
vpn 40
!
vpn-list VPN_10
vpn 10
!
vpn-list VPN_20
vpn 20
!
vpn-list VPN_40_FW
vpn 40
!
vpn-list vpn_10_20
vpn 10
vpn 20
!
prefix-list _AnyIpv4PrefixList
ip-prefix 0.0.0.0/0 le 32
!
!
!
apply-policy
site-list Site_10
data-policy _VPN_10_site_10_vpn_10_to_vpn_20 from-tunnel
control-policy vpn10-inter-vpn20-40 in
!
site-list Site_101
control-policy site101-fw-site20 out
control-policy vpn20-inter-vpn10-40 in
!
site-list Site_20
control-policy site20-fw-site101 out
control-policy vpn10-inter-vpn20-40 in
!
!

DC1-Core#traceroute vrf 10 10.20.101.1
Type escape sequence to abort.
Tracing the route to 10.20.101.1
VRF info: (vrf in name/id, vrf out name/id)
1 10.10.10.2 15 msec
10.10.10.3 33 msec
10.10.10.2 21 msec
2 10.20.101.2 48 msec 61 msec 47 msec
3 10.20.101.1 98 msec * 99 msec
DC1-Core#

I managed to figure it out, I was using a dual edge site design and had add an extra interface for the 2nd edge and apply the acl to that interface as well.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: