CSR in Aws CVD
CSR in Aws CVD
August 2014
Table of Contents
Navigator......................................................................................................................................1
Use Cases............................................................................................................................... 1
Scope..................................................................................................................................... 1
Proficiency.............................................................................................................................. 1
Related Cisco Validated Design............................................................................................... 1
Introduction..................................................................................................................................2
Technology Use Cases................................................................................................................ 2
Deployment Details.......................................................................................................................9
Deploying CSR in AWS............................................................................................................ 9
Appendix D: References.............................................................................................................47
Table of Contents
Navigator
Navigator
The Navigator helps you determine the applicability of this guide by summarizing its key elements: the scope
or breadth of the technology covered, the proficiency or experience recommended, and the documents
related to this guide. This section is a quick reference only. For more details, see the Introduction.
Use Cases
This guide addresses the following technology use cases:
Deploying Cisco Cloud Services Router (CSR) 1000V Series in Amazon Web Services (AWS)
For more information, see the Technology Use Cases section in this guide.
Scope
This guide covers the following areas of technology and products:
Cisco CSR 1000V Series
Dynamic Multipoint VPN (DMVPN)
AWS
For more information, see the Design Overview section in this guide.
Proficiency
This guide is for people with the following technical proficienciesor equivalent experience:
CCNA Routing and Switching1 to 3 years installing, configuring, and maintaining routed and
switched networks
CCNA Service Provider1 to 3 years installing, configuring, and maintaining routed and switched
networks
page 1
Introduction
Introduction
Technology Use Cases
Organizations typically connect to their applications through a single VPN tunnel between their data center
and AWS. With the Cisco CSR 1000V Series deployed in AWS, every enterprise- and branch-office location
can now have direct VPN access into the AWS-hosted applications without back-hauling through an existing
data center. This approach reduces latency, eliminates the need for expensive private WAN services, avoids
per-VPN-tunnel costs that Amazon charges, and even allows AWS to participate in existing route-based VPN
topologies.
AWS does not provide VPN connectivity between VPCs in discrete AWS regions, making multiregion
cloud deployments complex. By deploying a Cisco CSR 1000V Series Router in each regions VPC and
interconnecting Cisco CSR 1000V Series Routers through a VPN, enterprises can create a global, secure
network topology within the AWS cloud.
page 2
Figure 2 - Hybrid cloud overlay connecting cloud, headquarters, field offices, and teleworkers
Introduction
The Cisco CSR 1000V Series is part of a family of platforms that includes the latest edge, branch-office,
service, and telecommuting routers, providing the ideal platform on which to build a fully connected
enterprise network. Together, these platforms provide easy multi-homing over any carrier service offering,
a single routing control plane with minimal peering to the provider, automatic site-to-site IPSec tunnels, and
comprehensive threat-defense.
Figure 2 shows how dynamically created tunnels help avoid bottlenecks by connecting the AWS hosted, fully
connected hybrid cloud.
If your organization wants a highly available VPN cloud with geographically disparate headend routers, you
can place the headend routers in separate AWS data centers. The full mesh of dynamically created tunnels
makes it possible to avoid potential bottlenecks and increased bandwidth costs associated with cloud-based
headend routers by allowing spoke-to-spoke traffic (Figure 3). Only traffic destined for the application
servers in the cloud flows through the headend routers.
page 3
Figure 4 - Highly available enterprise overlay with fully redundant AWS cloud router
Introduction
In addition to high availability at the head-end, the Cisco CSR 1000V Series Router can provide high
availability within the AWS VPC. You can place multiple Cisco CSR 1000V Series Routers in separate
availability zones with a set of instances using that CSR 1000v as their default route. When maintenance is
required on one of the Cisco CSR 1000V Series Routers, traffic can be routed from the CSR 1000v in one
availability zone to the CSR 1000V in the other availability zone, either manually or automatically, through
active monitoring. Each of the two Cisco CSR 1000V Series Routers can route to any other spoke in the
Cisco DMVPN network as well as to other CSR 1000V Routers within AWS.
page 4
Deploying Cisco CSR in AWS
For design purposes, Cisco CSR is thought of as sitting between the subnet outer and the instance (Figure
6). However, because of the network mechanics of an AWS VPC, the CSR sits parallel to the actual
instances (Figure 7). For this reason, for the traffic to flow through the CSR, a subnet route pointing to the
CSR must be added or the default gateway of each of the instances must be changed to the CSR.
page 5
Figure 7 - Actual placement of CSR in VPC
page 6
Figure 9 - Single subnet deployment
Reader Tip
For more information, see the following topic:
http://www.cisco.com/c/en/us/td/docs/routers/CSR1000/software/aws/CSRaws/
awsinstall.html
Maximum
number of
network
interfaces
supported
EC2 per instance
compute Virtual Memory (EC2-VPC
Instance type units cores required Platform I/O only)
Standard Medium 2 1 3.75 GB 32-bit Moderate 2
(m1.medium) 64-bit
Standard Large 8 2 (with 7.5 GB 64-bit Moderate 4
(m1.large) 2 ECUs
each)
Standard XL (m1. 8 4 (with 15 GB 64-bit High 4
xlarge) 2 ECUs
each)
M3 Extra Large 13 4 (with 15 GB 64 bit High 4
(m3.xlarge) 3.25
ECUs
each)
page 7
Table 2 - AMI instance specifications (hourly billed)
page 8
Deployment Details
Deployment Details
PROCESS
Step 2: Click Start VPC Wizard, and then select VPC with Single Public Subnet Only.
Step 3: Create the required subnets in the VPC, with the following properties:
page 9
Default subnet10.0.0.0/24 (mapped to public IP)
Deployment Details
Additional subnets0.0.1.0/24 and 10.0.2.0/24. These are private IPs and could be the inside
facing interfaces for the CSR.
Step 4: Create a security group for the CSR, with the following properties:
NameSSH-ACCESS
TCP port 22 trafficPermitted inbound
SSH access to CSR for managementEnabled
page 10
Step 5: Locate the CSR product page.
Deployment Details
Step 6: Launch the CSR into a region.
page 11
Step 7: Choose instance type. Notes:
Deployment Details
See Tables 1 and 2 for supported instance types.
The minimum requirements are m1.medium for 10Mbps and m1.large for 50 Mbps.
ECU stands for Elastic Compute Unit, Amazons proprietary way of measuring CPU capacity.
Almost all EC2 instances are hyperthreaded
Step 8: Launch CSR into the previously created VPC, and use the following properties:
Automatically assign a public IP to your instancesEnabled
Shared tenancyDefault
Dedicated tenancy (dedicated hardware) offers predictable performance for an increased price.
page 12
Step 10: Associate a private key with the CSR. Notes:
Deployment Details
You can create a new pair if desired.
Key pair is a private key and a public key.
You must provide the private key in order to authenticate and connect to the instance. The public
key is stored on AWS
Step 11: Monitor the instance. The instance typically takes 5-10 minutes to deploy. The status will change to
2/2/ checks passed.
Tech Tip
The AWS System Log for the CSR instance will be incomplete; however, this does not
imply an unsuccessful boot.
Step 12: Verify the CSR in the VPC. SSH into the CSR instance using this IP. Login as ec2-user. No
password is required.
ssh -i <key file> ec2-user@<ip address>
page 13
Deployment Details
Tech Tip
If you are using Windows Putty SSH client, follow instructions here:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/putty.html
This public IP is a 1:1 NAT to the private IP performed by the Internet Gateway for the VPC and is transparent
to user.
Caution
Automatic public IP assignment is only available during launch. Rebooting CSR will
disassociate the public IP and the instance will become inaccessible.
To ensure that the IP is persistent across reboots, associate the CSR instance with an
Elastic IP.
If youre using a single subnet deployment as shown in Figure 9, skip steps 15-17.
page 14
Step 15: Attach the network interface.
Deployment Details
Step 16: Configure IP address.
page 15
DMVPN Design: Disallowing
Deployment Details
This design uses a single DMVPN, dual-hub configuration, EIGRP as the Cisco DMVPN routing protocol,
and OSPF as the enterprise routing protocol. The AWS Cisco CSR 1000V Series Routers are configured
as DMVPN spokes and EIGRP stub routers. The DMVPN hub routers, typically located in the enterprise
headquarters locations, advertise a default route to the Cisco DMVPN spokes and advertise the AWS
subnets to the rest of the enterprise. Cisco DMVPN Phase 3 with Next Hop Resolution Protocol (NHRP)
redirection is configured to provide spoke-to-spoke tunnel support. This configuration allows AWS
application in different Amazon VPCs to communicate directly with each other. Additionally, enterprise
branch-office sites can be part of the same Cisco DMVPN, allowing path optimization where the branch
office can use secure, direct access to the AWS-hosted applications without having to transit the
headquarters network.
page 16
DMVPN Design: Disallowing Direct Internet Access from Spokes
PROCESS
Configuring Hub
1. Configure ISAKMP and IPsec
2. Configure the mGRE tunnel
3. Configure EIGRP
4. Configure OSPF
Step 1: Configure the Internet security association and key management protocol (ISAKMP) policy.
A transform set is an acceptable combination of security protocols, algorithms, and other settings to apply to
IPsec-protected traffic. Peers agree to use a particular transform set when protecting a particular data flow.
Step 5: The IPsec profile creates an association between an ISAKMP profile and an IPsec transform-set.
crypto ipsec profile ipsec-prof
set transform-set xform
page 17
DMVPN Design: Disallowing Direct Internet Access from Spokes
Procedure 2: Configure the mGRE tunnel
Tech Tip
Configure the IP MTU to 1400 and the ip tcp adjust-mss to 1360. There is a 40 byte
difference that corresponds to the combined iP and TCP header length.
Step 3: DMVPN uses multipoint GRE (mGRE) tunnels. This type of tunnel requires a source interface only.
Use the same source interface that you use to connect to the Internet. Enabling encryption on this interface
requires the application of the IPsec profile configured in the previous procedure.
interface Tunnel0
tunnel source GigabitEthernet1
tunnel mode gre multipoint
tunnel key 1
tunnel protection ipsec profile ipsec-prof
Step 5: The DMVPN hub router acts in the role of NHRP server for all of the spokes. NHRP is used by
remote routers to determine the tunnel destinations for peers attached to the mGRE tunnel.
interface Tunnel0
ip nhrp map multicast dynamic
ip nhrp map 172.24.0.2 199.66.188.28
ip nhrp network-id 1
ip nhrp redirect
page 18
The tunnel interface is the only EIGRP interface, and you need to explicitly list its network range.
OSPF is used to distribute the routes from the DMVPN network into the local enterprise routing tables.
router ospf 1
redistribute static subnets route-map static2ospf
Step 3: This should be a summary route of the DMVPN network and all of the networks that exist at the
spokes.
ip route 172.24.0.0 255.255.0.0 Null0
PROCESS
Spoke Configuration
1. Configure a front door VRF
2. Configure ISAKMP and IPsec
3. Configure the mGRE tunnel
4. Configure EIGRP
To improve security, you can deploy a front-door VRF to separate the externally facing interface required
to terminate the tunnel from the internal network. However, deploying a Front-Door VRF in AWS presents
particular challenges because of the lack of console access. Specifically, IOS removes the address from an
interface when it is added to a VRF. You can use the Embedded Event Manager to programmatically add the
interface to the VRF, and then reconfigure the interface even though communication to the CSR is lost.
page 19
Step 1: Create a VRF.
page 20
DMVPN Design: Disallowing Direct Internet Access from Spokes
Procedure 3: Configure the mGRE tunnel
Step 3: Configure NHRP. Specify the IP addresses of the hub routers below.
interface Tunnel0
ip nhrp network-id 1
ip nhrp nhs 172.24.0.1 nbma 199.66.188.27 multicast
ip nhrp nhs 172.24.0.2 nbma 199.66.188.28 multicast
ip nhrp shortcut
All interfaces on the router are EIGRP interfaces, but only the DMVPN tunnel interface is non-passive. The
network range must include all interface IP addresses either in a single network statement or in multiple
network statements. All DMVPN spoke routers should run EIGRP stub routing to improve network stability
and reduce resource utilization.
router eigrp 1
network 172.24.0.0
passive-interface default
no passive-interface Tunnel1
eigrp stub connected
page 21
DMVPN Design: Direct Internet
Deployment Details
PROCESS
page 22
DMVPN Design: Direct Internet Access from AWS Spokes
Procedure 2: Configure ISAKMP and IPsec
A transform set is an acceptable combination of security protocols, algorithms, and other settings to apply to
IPsec-protected traffic. Peers agree to use a particular transform set when protecting a particular data flow.
The IPsec profile creates an association between an ISAKMP profile and an IPsec transform-set.
crypto ipsec profile ipsec-prof
set transform-set xform
Tech Tip
Configure the IP MTU to 1400 and the ip tcp adjust-mss to 1360. There is a 40 byte
difference that corresponds to the combined iP and tcP header length.
page 23
Step 2: Configure the tunnel.
The DMVPN hub router acts in the role of NHRP server for all of the spokes. NHRP is used by remote routers
to determine the tunnel destinations for peers attached to the mGRE tunnel.
interface Tunnel0
ip nhrp map multicast dynamic
ip nhrp map 172.24.0.2 199.66.188.28
ip nhrp network-id 1
ip nhrp redirect
The tunnel interface is the only EIGRP interface, and you need to explicitly list its network range. The routes
for the enterprise network are redistributed into OSPF to be sent to the spokes.
router eigrp 1
network 172.24.0.0
passive-interface default
no passive-interface Tunnel1
redistribute ospf 1 metric 10000 10 255 1 1500 route-map ospf2eigrp
OSPF is used to distribute the routes from the DMVPN network into the local enterprise routing tables.
router ospf 1
redistribute static subnets route-map static2ospf
This should be a summary route of the DMVPN network and all of the networks that exist at the spokes.
ip route 172.24.0.0 255.255.0.0 Null0
page 24
Step 3: Define access lists for the route maps.
PROCESS
Configuring Spoke
1. Configure ISAKMP and IPsec
2. Configure the mGRE tunnel
3. Configure EIGRP
page 25
DMVPN Design: Direct Internet Access from AWS Spokes
Procedure 2: Configure the mGRE tunnel
All interfaces on the router are EIGRP interfaces, but only the DMVPN tunnel interface is non-passive. The
network range must include all interface IP addresses either in a single network statement or in multiple
network statements. All DMVPN spoke routers should run EIGRP stub routing to improve network stability
and reduce resource utilization.
router eigrp 1
network 172.24.0.0
passive-interface default
no passive-interface Tunnel1
eigrp stub connected
page 26
VPC Gateway Redundancy
Cisco CSR 1000v runs as an EC2 instance and is launched from the AWS marketplace. Figure 11 shows
a notional view of the CSR 1000v in an AWS VPC. By using the VPC routing table, traffic from the EC2
instances will be forwarded through the CSR 1000v so that services can be applied.
Since the CSR 1000v runs as an EC2 instance, it can rely on native EC2 high availability mechanisms in
the event of underlying compute hardware issues. In this case, the CSR would be restarted and recovery
times would be on the order of minutes. For designs that require fast convergence, the CSR 1000v can be
deployed in a redundant pair with failover between them.
In typical Ethernet environments, gateway redundancy is provided by protocols such as hot standby router
protocol (HSRP) and virtual router redundancy protocol (VRRP). These protocols present a pair of routers as
a single virtual IP address that can be used by hosts as their default gateway. HSRP and VRRP use link local
multicast packets for peer status monitoring and active gateway selection.
In an AWS VPC environment, link local multicast and broadcast traffic are not supported. This section will
discuss an alternate gateway redundancy option for the CSR 1000v when used in an AWS VPC.
page 27
Deployment Details
This topology uses a single availability zone and two VPC subnets. Each CSR has a single Ethernet interface
that is connected to the public VPC subnet. This public subnet has a VPC route table with a default route
target of the Internet gateway. Each CSR has a VPN tunnel to Internet. These tunnels would typically
terminate at another VPN device located on the enterprise network. Finally, a GRE tunnel is configured
between the local CSRs. This GRE tunnels allows the CSRs to exchange BFD control packets that are used
for peer failure detection.
Tech Tip
Configuration of BFD requires a premium license.
Since the CSR is not directly connected to the private subnet, a static route for the private subnet is added
to each CSR. This static route points the address of the VPC router on the public subnet. This address
will always be the first usable address of a subnet. For example, the VPC router address for the subnet
172.24.2.0/25 will be 172.24.2.1.
Other topologies, including multiple availability zones, single or multi subnet VPCs, multiple VPN tunnels, and
multiple CSR Ethernet interfaces, are possible and would be applicable to this solution.
EIGRP is used as the routing protocol, but other routing protocol could be used. The primary purpose of the
routing protocol is to register as a BFD client. BFD requires at least one client protocol before it will initiate
neighbor discovery. An additional benefit of the GRE tunnel and the routing protocol is that they can be used
to establish a back-up path in case of VPN tunnel failures.
The EC2 instances reside in a private subnet with its own VPC route table. The default route for this subnet
will have a target of the network interface of one of the CSRs. Because the VPC route table only allows for
one active target per route, only one CSR is in the egress traffic path for this subnet. Ingress traffic flow over
the VPN tunnels is determined by the remote VPN devices, so it is possible that CSR-B is the active ingress
path or that load sharing is being done between CSR-A and CSR-B. In this example, ingress and egress
traffic is initially being forwarded through CSR-A, as shown in Figure 13.
page 28
Figure 13 - Initial traffic flow
For the ingress traffic flow, the remote VPN device will need to detect that the VPN tunnel terminated at CSR-A
is no longer available. This can be done using traditional VPN tunnel high availability techniques such as routing
protocols (with or with out BFD) and Internet key exchange (IKE) dead peer detection.
For the egress traffic direction, CSR-B will detect the failure of CSR-A and modify the VPC route table to redirect
traffic to CSR-B. This is accomplished using BFD over the GRE tunnel and an EEM applet.
When CSR-A fails, BFD will timeout, generating a log message on CSR-B. An example BFD peer down message
when using EIGRP is as follows:
%DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor 172.24.33.1 (Tunnel33) is down: BFD peer down
notified
EEM is an event detection and automation technology available the CSR. In this scenario, an EEM applet is
configured to run whenever the BFD peer down log message is generated.
page 29
Figure 15 - EEM applet triggered with BFD peer down
The CSR cannot access the AWS EC2 API directly. This requires use of a helper VM with the AWS EC2 CLI
tools installed. CSR-B will SSH into the helper EC2 VM and run the ec2-replace-route command.
Tech Tip
Restrict access of the VM to the local subnet in order to avoid compromise.
Amazon Linux EC2 instances have the CLI tools installed by default. Other Linux distributions will require
manual installation. Because the CSR is using SSH, it will require Linux account credentials to log into the
VM.
Tech Tip
By default, Amazon Linux disables password authentication, but it can be enabled by
editing the /etc/ssh/sshd_config file to include a line with PasswordAuthentication yes
Finally, the AWS CLI tools will need to be configured with AWS account credentials in order to provide the
necessary privileges for the ec2-replace-route command. For a link to the AWS documentation on setting
up the AWS EC2 CLI tools, see Appendix D.
page 30
Figure 16 - EEM Applet used in Figure 13
The route table ID and network interface ID can be found using the AWS console.
page 31
Figure 17 - Route table ID in the AWS console
The EEM configuration on CSR-A and CSR-B will be nearly the same. The only required difference would the
ENI environment variable, which should be set to the network interface ID of the local CSR.
Figure 19 shows CSR-B modifying the VPC Route table for the default route.
page 32
Figure 19 - EEM applet modifying the VPC route table
page 33
Appendix A: Product List
page 34
Appendix B: Technical Feature
NAT gives the inside AWS instances direct access to the Internet using the elastic IP address of the Cisco
CSR 1000V Series Router. Because the outside interface of the CSR 1000V is not assigned the elastic IP
address directly, a second NAT is done from the AWS internal address to the actual elastic IP address.
page 35
Appendix B: Technical Feature Supplement
Tech Tip
Remember to open the ports within the Amazon Security Group for the static NAT
entries.
Tech Tip
Port 22 is used for CSR for access and should not be NATed.
When directly accessing services in the cloud service provider or when more granular security is needed,
you can configure ZBFWs on the Cisco CSR 1000v in order to extend the enterprise security policy to the
AWS VPC. The following configuration defines three zones: inside, outside, and tunnel. Protocol inspection
is used to inspect and allow traffic between zones. An ACL is used to define ports for which protocol
inspection is not available. Because there is no need for traffic to flow below the tunnel and the outside
interface, it is not allowed.
page 36
match protocol ssh
page 37
Step 5: Configure interfaces in the security zones.
ACLs can be used to protect the router from outside traffic. The following ACL prevents all traffic except
what is required to remotely manage the router, create the tunnel, and perform DHCP on the outside
interface.
Tech Tip
You can further limit SSH access by applying a vty access class. If the Gig1 interface
is in a VRF path, be sure to use the vrf-also command option with the access-class
command (access-class 34 in vrf-also).
page 38
Appendix B: Technical Feature Supplement
Tech Tip
Policy must be reconciled between interface ACLs and ZBFWs when both are used
simultaneously.
IP SLA is used tool to generate synthetic traffic to gather network performance metrics such as delay and
loss. The following example will monitor the two spokes from the hub.
page 39
Appendix C: Sample
page 40
33343730 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
page 41
tunnel source GigabitEthernet1
page 42
action 1.0 cli command enable
CSR-B
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no platform punt-keepalive disable-kernel-core
platform console virtual
!
hostname CSR-B
!
boot-start-marker
boot-end-marker
!
aaa new-model
!
aaa authentication login default local
aaa authorization exec default local
!
aaa session-id common
!
subscriber templating
!
multilink bundle-name authenticated
!
crypto pki trustpoint TP-self-signed-3088625601
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3088625601
revocation-check none
rsakeypair TP-self-signed-3088625601
!
crypto pki certificate chain TP-self-signed-3088625601
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33303838 36323536 3031301E 170D3134 30343031 31333033
34375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 30383836
32353630 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100C354 8092363B B6FAEDA3 C86D3E6D 098BE68E 816A817B 91E11086 284F01EE
71252DBC 6EBC5498 ACDB7CD2 7EA49F68 7FFCDEC1 5E3B0C7B 1802431F CD0EC583
page 43
1D8A1636 DA0DBB46 3D57587A FCA519AE 75054641 96AB1491 EE23A624 E95D442D
page 44
tunnel protection ipsec profile default
page 45
Appendix C: Sample Configuration for VPC Gateway Redundancy
page 46
action 2.1 cli command $PASS
end
!
Appendix D: References
Appendix D: References
External Cisco CSR 1000v Product Page:
http://www.cisco.com/go/cloudrouter/
page 47
Feedback
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, DESIGNS) IN THIS MANUAL ARE PRESENTED AS IS,
WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS
SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR
DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS
DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL
ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
B-0000AWS14-1 08/14