Cisco IWAN Lab Guide
Cisco IWAN Lab Guide
This lab highlights the overall topology of the IWAN solution. This lab guide focuses on both physical and logical configurations.
Upon completion of this topology lab, you will have a thorough understanding of IWAN.
NOTE: The IWAN 4D Series of lab offerings are very extensive. As such, they require considerable computer resource allocation
on the backend. This limits the number of simultaneously running demos.
In order to ensure that the labs are available when needed for design workshop and proof of value engagements, please ensure
that you are not reserving the labs for longer than required. The ability exists to schedule and start any of these labs on demand as
needed. We appreciate your support in maximizing availability and optimizing usage of these demos.
The lab topology includes four distinct locations. Each location connects to two separate types of transport and subscribes to both
MPLS and Internet services. HQ/DC and Branch 1 split the transport links between two routers for added hardware resiliency,
while Branch 2 and Branch 3 terminate both links into a single router. A dual router configuration results in the difference of
99.999% resiliency/uptime vs. 99.995% resiliency/uptime in protection against device failure.
The HQ/DC site has local 198.18.128.X/18 prefixes for DC servers and appliances. Most servers include 133 in the third octet,
represented by 198.18.133.X/18. Routed links between the core switch and the routers at the edge, as well as between the core
switch and the CA, leverage 198.19.0.X/30. The third octet is the site ID—the HQ/DC represents site 0.
Leveraging the third octet in this way is a common setup for each location. Device loopback addresses leverage the 172.31.X.Y/32
space, where X is the site identifier and Y is a unique number for the site. HQ/DCs have loopbacks falling in the 172.31.0.X/32
range. The switch at this location is the only routable switch in our lab and it uses 172.31.0.0/32 for its loopback address. Router 1
at HQ/DC and other locations has a loopback ending in X.1. Router 2, where present, such as HQ/DC and BR1, has a loopback
ending in X.2. The Master Controller for PfRv3 has the loopback address of 172.31.0.5. Loopback addresses are important to note
as we look at verification output.
Branch 1
As illustrated in the bottom left hand side of the topology, the third octet is our site ID and therefore Branch 1 represents site 1. The
Branch 1 location hosts the 198.19.1.X/24 and 198.20.1.X/24 prefixes. Router 1 has a loopback interface with an address of
172.31.1.1/32, while Router 2 has a loopback interface with the address 172.31.1.2/32. This site has a host machine, PC11, with
the address of 198.19.1.11. PC11 uses an HSRP gateway address of 198.19.1.254, configured on the edge routers for first hop
redundancy. You can RDP to this PC, and others, from the jumpbox, PC01, in the HQ/DC. This generates additional traffic.
Branch 2
Branch 2 represents site 2. Our Branch 2 location hosts the 198.19.2.X/24 and 198.20.2.X/24 prefixes. Router 1 is the only router
at this site and has a loopback with and address of 172.31.2.1/32. This site has two host machines that we can log into if
necessary—PC21 on the internal private network and PC22 connecting on the Guest network. PC22 is segmented from our
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 152
Cisco dCloud
network and only has access to the outside Internet. The 198.20.2.X/24 segment leverages an external WAAS virtual instance. In
most remote site deployments, this runs as an integrated service on the router. This leveraging is not available in this lab, since
this lab uses all virtual routers.
Branch 3
Branch 3 includes basic router connectivity for both the Internet and MPLS circuits, as well as for simplified IWAN provisioning.
This lab illustrates the deployment of a site using centralized management capabilities and an IWAN wizard.
HQ/DC
HQ/DC centralizes the DHCP and DNS for all non-guest branch networks. The Guest network at Branch 2 retrieves DHCP and
external DNS settings from a DHCP pool configured on BR2-WAN1. The Domain Controller, 198.18.133.1 in the HQ/DC, is also
the internal DNS Server and retrieves its DNS from an external DNS server. The vPod GW router, in HQ/DC, connects the demo to
the Internet in the role of the NTP Master.
Although distributed Internet connectivity is present at each of the locations, Internet Traffic for Branch1 is forced out through the
HQ/DC, leveraging the traditional model of centralized Internet services and security. The Direct Internet Attach (DIA) door is open
at Branch 2 for both the internal secure VLANs and the Guest Network. The option exists to use the distributed connectivity at the
remote site edge (by network, by location) in order to accommodate demand for distributed connectivity. This demand is often
associated with the rollout of public cloud based SaaS applications.
To accentuate this, part of the lab focuses on remote site guest services that allow for DIA at Branch 2 (which helps limit traffic
over WAN links), as well as looking at accommodating internal secure networks accessing DIA.
Challenges
Duplicate route entries present the potential for conflict. Using virtual routing tables helps to avoid a default route pointing out of
both the local Internet and MPLS circuits for simplified connectivity. Conflicts with the default route will also lead to challenges with
VPN connectivity over each of the underlying transports. Another conflict could occur with the default route being recorded
dynamically by the routing protocol, which is leveraged over the DMVPN tunnels and pointing out of the overlay.
This could possibly occur in situations where a customer prefers centralized Internet connectivity, or attempts to leverage
centralized connectivity as a backup to DIA. You could solve this problem by creating a static route to the public address of the
hub, or configuring a default route, but that solution limits you to routing traffic through the hub, which is problematic for voice,
video or other peer-to-peer applications.
Dynamic Multipoint Virtual Private Networks (DMPVN) include simple Hub and Spoke design, but with the added benefits of
dynamic tunnel establishment between spokes for direct transport capabilities. Manually adding routes to spokes to accommodate
spoke-to-spoke dynamic VPN tunnel establishment would not scale, since remote site addresses are dynamically assigned via
DHCP from the provider, which makes route prediction nearly impossible.
Solutions
Front Door VRF (Virtual Routing and Forwarding), or fVRF, provides a solution. fVRF virtualizes routing within devices by creating
separate virtual routing forwarding tables on the devices. By hiding the Internet Route connectivity at each Internet termination
point within a dedicated VRF (VRF ISP1 and VRF ISP2) leveraging VRF/VRF-Lite, the default routes contained within these VRFs
are also hidden from each other and from the global routing table. This eliminates competing routing information within the global
default routing table, leaving only the default route pointing out of the tunnel, forcing centralization of Internet services.
Using a DMPVN overlay design, there is no need to exchange routing with providers. All that is necessary is a default route out to
the next hop Provider Edge (PE) for each hidden circuit, as well as a mechanism to permit overlay tunnels to see and use default
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 152
Cisco dCloud
routes to establish DMVPN connectivity to other sites. VRF is a requirement for all underlying transport, as it enables the desired
flexibility and convenience of simplified provider migrations.
With the exception of external facing interfaces, every other interface is part of the default VRF/routing table. The VPN Tunnel
configuration allow the VRF tunnels to leverage the dedicated VRFs configured on the external facing interfaces to establish VPN
connectivity over the provided transport. This is the Front Door VRF.
IP Addresses
IWAN design uses DMVPN running separate DMVPN tunnel instances for Public and Private transport. Public Tunnel interfaces
use interface Tunnel 100 (IP addressing space 172.29.X.1/16) at each site. MPLS tunnel interfaces leverage interface Tunnel 200
(IP addressing space 172.30.X.1/16).
The unique address for each device correlates to the branch number, with third octet changing to match:
Video Resources
Several videos are available to walk you through the LAB, and are accessible using the link below:
• https://salesconnect.cisco.com/#/search/IWAN%25204D/undefined
• Lab 3: DMVPN
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 152
Cisco dCloud
Lab Topology
This demonstration includes several server virtual machines. Most of the servers are fully configurable using the administrative
level account. Administrative account details are included in the script steps where relevant and in the server details table.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 152
Cisco dCloud
Lab Preparation
Follow the steps below to schedule your demonstration and configure your demonstration environment.
1. Browse to dcloud.cisco.com, select the location closest to you, and then login with your Cisco.com credentials.
3. Verify your connection from the demonstration location before performing any demonstration scenario. [Show Me How]
4. Verify your demonstration has a status of Active under My Demonstrations on the My Dashboard page in the dCloud UI.
5. Connect to the lab environment using Cisco AnyConnect (Recommended) [Show Me How] and a local RDP client. [Show Me
How]
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 152
Cisco dCloud
Lab Steps
1. Once VPN connectivity has been established, RDP to PC01 and leverage MTPuTTY on the workstation.
Figure 4. Using native RDP client after VPN into the demo
NOTE: Before launching MTPuTTY, make sure it is not already open as part of any previous sessions. Do not use or modify any of
the settings in putty.exe, as this could cause problems.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 152
Cisco dCloud
3. View devices in the pane on the left by selecting Servers from the View menu.
NOTE: The default username/password information for each of the devices is admin/C1sco12345.
Some devices connect via VTY while most connect via CON. Routers that connect via VTY need to log in before proceeding.
4. When opening devices, pay attention to the preferred order by referencing the tabs from left to right.
6. Close out the Server View preview panel. This lab uses load/send script capability within MTPuTTY to make it easy to issue
commands across multiple devices for verification.
NOTE: Some commands referencing interface specifics might not be valid for all devices and therefore we will ignore the
generated output errors.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 152
Cisco dCloud
2. Clear selected devices and select all border routers (BR1-WAN1, BR1-WAN2, BR2-WAN1, HQ-DC-WAN1, HQ-DC-WAN2).
NOTE: BR3-WAN1 is not used until later in the lab when we showcase an IWAN Wizard deployment leveraging Cisco Prime
Infrastructure.
3. Discuss the purpose of each verification command prior to sending the script and reviewing.
• sh ip int br | ex una
• sh ip vrf interface
• sh ip route
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 152
Cisco dCloud
• Walk through performing a basic show ip interface brief | exclude unassigned to compare CLI output to the diagram.
• Run sh run int X/X | in Eth|address|vrf to illustrate how VRF configuration is applied to interfaces on the border routers.
• Illustrate interface to VRF mappings by looking at the output of show ip vrf interface.
• Viewing the routing tables for both VRF instances along with the static VRF based static route and the global default
routing table.
NOTE: Errors may exist in the output for script 001, as not all routers have the same interface naming.
HQ-DC-WAN1
1. Start by reviewing the configuration for the routers in the data center. Two physical interfaces exist, as well as the configured
tunnel interface and loopback.
NOTE: Interface Tunnel 0 and Interface Tunnel 1 were created dynamically. They are associated with PfRv3 and Multicast
configuration, respectively.
2. Turning on WAAS integration capability on our head-end border routers creates the AppNav-Compress1 and AppNav-
UnCompress1 interfaces. AppNav allows load sharing across all available physical and virtual optimization resources. The
AppNav integration also optimizes asymmetric traffic flows—a critical consideration when adding optimization capabilities into
an Active/Active WAN environment.
3. VRF configuration is very simple and straightforward. Type the vrf definition name and assign a route distinguisher (rd
x:x).
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 152
Cisco dCloud
5. After configuration, the interface to VRF mapping is evident in the show ip vrf interfaces output.
NOTE: Even though VRF naming conventions are locally significant, ensure they match across all devices to simplify template
configuration. In VRF, verification and troubleshooting uses VRF as the keyword, followed by the specific VRF name configured.
Outside of leveraging the VRF to provide hidden routing information for our tunnels to leverage as part of the front door VRF
configuration, VRF is not necessary throughout the rest of the environment.
6. Enter show ip route vrf. The routing table is now virtualized and ready for the DMVPN overlay.
7. Outside of the connected interface, the only other route is a static default route that was setup using ip route vrf ISP1 0.0.0.0
0.0.0.0 198.51.100.1.
NOTE: You have the option of using a static route or leveraging routing with the provider to obtain a default route. Routing with the
provider limits you in achieving complete transport independence.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 152
Cisco dCloud
8. Next, show a familiar ip route statement to provide visibility into the global table. This part of the lab runs EIGRP and learning
routes from HQ-DC-Core-SW, as well as each of the locations over the DMVPN tunnel.
NOTE: Quickly review the same configuration output on the other routers. It is recommended that you view HQ-DC-WAN1, HQ-
DC-WAN2 and BR2-WAN1 outputs.
HQ-DC-WAN2
This router has two physical interfaces, as well as our configured tunnel interface and loopback.
NOTE: Interface Tunnel 0 and Interface Tunnel 1 were created dynamically. They are associated with PfRv3 and Multicast
configuration, respectively.
1. Turning on WAAS integration capability on our head-end border routers creates the AppNav-Compress1 and AppNav-
UnCompress1 interfaces, which form the optimization cluster between the two borders.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 152
Cisco dCloud
NOTE: Although this may not be necessary in your environment, it is a recommended best practice and ignoring can cause
undesired complications.
3. Focusing on transport independent design, treat all underlying networks equally to provide future flexibility for migration.
NOTE: The VRF names are locally significant and the route distinguisher (rd) is in the form of X:X.
4. The VRF is applied to the interface using the vrf forwarding command.
5. The show ip vrf interfaces output shows the VRF to interface mapping.
6. The VRF specific routing table is virtualized now virtualized and ready for the overlay to realize transport independence.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 152
Cisco dCloud
7. Outside of the connected interface, the only other route is a static default route that was setup using ip route vrf ISP2 0.0.0.0
0.0.0.0 203.0.113.1.
8. Notice in the global default routing table, EIGRP is running and learning routes from Core SW1, as well as each of the
locations over the DMVPN tunnel.
BR1-WAN1
This router has three physical interfaces. One interface connects to the underlay network and two connect Router 1 to Router 2
and to the host PC11. It is necessary to have a shared segment for PfRv3 Master Branch to Branch border router communications.
NOTE: Interface Tunnel 0 and Interface Tunnel 1 were created dynamically. They are associated with PfRv3 and Multicast
configuration, respectively.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 152
Cisco dCloud
2. The VRF is applied to the interface using the vrf forwarding command.
3. The show ip vrf interfaces output shows the VRF to interface mapping.
4. The VRF specific routing table is virtualized and ready for overlay.
5. Outside of the connected interface, the only other route is a static default route that was setup using ip route vrf ISP1 0.0.0.0
0.0.0.0 198.51.100.5.
6. Looking at the global default routing table we can see that we are running EIGRP and are learning routes for each of the
locations over the DMVPN tunnel. You can also see that this site is taking advantage of centralized Internet connectivity.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 152
Cisco dCloud
BR1-WAN2
This router has three physical interfaces. One interface connects to the underlay network and two connect Router 1 to Router 2
and to the host PC11.
NOTE: Interface Tunnel 0 and Interface Tunnel 1 were created dynamically. They are associated with PfRv3 and Multicast
configuration, respectively.
2. The VRF is applied to the interface using the vrf forwarding command.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 152
Cisco dCloud
3. The show ip vrf interfaces output shows the VRF to interface mapping.
4. The routing table is now virtualized and ready for the DMVPN overlay.
5. Outside of the connected interface the only other route is a static default route that was setup using ip route vrf ISP2 0.0.0.0
0.0.0.0 203.0.113.5.
6. Looking at the global default routing table, we can see that This part of the lab runs EIGRP and learning routes from HQ-DC-
Core-SW, as well as each of the locations over the DMVPN tunnel. This site also takes advantage of centralized Internet
connectivity.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 152
Cisco dCloud
BR2-WAN1
This router has five physical interfaces. You could leverage three logical sub-interfaces for our inside network configuration in the
real world. This would be typical of a router on a stick deployment model. The sub-interfaces act as gateways for each of the VLAN
segments specific to this site. Logical or physical configuration does not affect the design, keeping it as simple as by using
separate physical interfaces with virtual routers.
NOTE: Interface Tunnel 0 and Interface Tunnel 1 were created dynamically. They are associated with PfRv3 and Multicast
configuration, respectively.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 152
Cisco dCloud
2. The VRF is applied to the interface using the vrf forwarding command. You could also issue a show run int e0/3 to look at the
vrf forwarding for the Guest Network interface.
3. The show ip vrf interfaces output shows the VRF to interface mappings. The guest network interface uses to the same ISP1
VRF as the outside Internet ISP interface. This prevents that segment from mixing with private segments, and allows traffic to
route out locally. This is a relevant use case for initial Direct Internet Attach (DIA) provisioning.
4. Now we have three separate routing tables on the router. The VRF specific routing tables are virtualized and ready for the
DMVPN overlay.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 152
Cisco dCloud
5. Outside of the connected interfaces the only other routes are static default routes that were setup for each VRF using ip route
vrf ISP1 0.0.0.0 0.0.0.0 198.51.100.9 and ip route vrf ISP2 0.0.0.0 0.0.0.0 203.0.113.9.
6. The global default routing table runs EIGRP and learning routes from each of the locations over the tunnels. Equal cost
multipath routing (ECMP) over the DMVPN tunnels is not necessary for Active/Active configuration, as PfRv3 provides load-
balancing capability for unclassified traffic.
NOTE: The delay on the interface tunnel 100 is set to a higher value then the MPLS overlay path. This also occurs with DMVPN
configuration. You will take a closer look at EIGRP routing configuration on all devices after discussing the DMVPN configuration.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 152
Cisco dCloud
• Right click the terminal window and select Clear Scrollback. Clear the terminal and scrollback in each MTPuTTY tab
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 152
Cisco dCloud
Lab 3: DMVPN
During this lab, you perform a basic show run interface tunnel and look at the DMVPN Tunnel configuration on the aggregation
and remote site routers. The lab also looks at show ip nhrp brief and show ip nhrp detail to illustrate how NHRP dynamically
maps tunnel addresses to physical addresses on the Next Hop Servers (NHS).
This lab focuses on the configuration independent of encryption capabilities, as encryption is simply an added layer of
configuration for security purposes. Although DMVPN is DMVPN without encryption services, you should not overlook or downplay
security.
Lab Steps
1. Load 002_DMVPN_Tunnel_Configuration.
3. Discuss the purpose of each verification command prior to sending the script and reviewing.
NOTE: At a minimum, it is recommended that you review HQ-DC-WAN1, HQ-DC-WAN2, and BR2-WAN1.
HQ-DC-WAN1
2. Assign the unique IP Address within the 172.29.X.X/16 subnet (ip address 172.29.0.1).
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 152
Cisco dCloud
NOTE: It is recommended to set the Tunnel MTU to 1400 (ip mtu 1400) and to configure ip tcp adjust-mss to 1360. The IP and
TCP headers combine for 40 bytes of overhead, so the typical MSS value reported by network clients will be 1460 with 1500 byte
MTU. This design includes encrypted tunnels with a 1400 byte MTU, so the MSS used by endpoints should be configured to be
1360 to minimize any impact of fragmentation.
The bottom half of the tunnel configuration illustrates that DMVPN uses multipoint GRE (mGRE) tunnels (tunnel mode gre
multipoint). This type of tunnel requires a source interface only (tunnel source g1). The source interface that connects to the
Internet is the same as the one assigned to VRF ISP1, leveraging the vrf forwarding command.
3. Set the tunnel vrf command to the VRF defined previously for Front Door VRF.
NOTE: This command is not making the tunnel part of the VRF, as we have not issued vrf forwarding under this interface. This
command allows the tunnel to get priority treatment from the VRF since the tunnel source is an interface belonging to that VRF.
The tunnel remains part of the global routing table, but will have permission to use the VRF to establish overlay DMVPN tunnel
connectivity.
4. Look at the Next Hop Resolution Protocol (NHRP) portion of the configuration.
NOTE: The DMVPN hub router takes on the role of NHRP server or NHS for all of the spokes. NHRP is leveraged by spoke
routers to determine the tunnel destinations for remote peers attached to the mGRE tunnel. This allows for dynamic tunnel
configuration between the spokes when needed to provide for full mesh connectivity without the administrative overhead
associated with configuring and managing tunnels between all devices. On the hub, use the command ip nhrp map multicast
dynamic to discover the spoke tunnel address to real address mappings and to create the database.
NHRP requires all devices within a DMVPN cloud to use the same network ID (ip nhrp network-id 100) and authentication key (ip
nhrp authentication CISCO). The NHRP cache hold time should be configured to 600 seconds (ip nhrp holdtime 600). The ip
nhrp redirect command allows the DMVPN hub to notify spoke routers that a more optimal path may exist to a destination network.
This may be required for DMVPNnm spoke-spoke direct communications. When leveraging this command, DMVPN leverages a
Phase III deployment model. Before DMVPN Phase III commands became available, a workaround is necessary to redirect routing
to accomplish spoke-to-spoke connectivity.
5. EIGRP relies on a multicast transport and requires NHRP to add routers automatically to the multicast NHRP mappings.
NOTE: You encourage follow up one-on-one design workshops if this overview is used as part of a one-to-many design
clinic/demand generation event.
The additional configuration under the tunnel interface accommodates other optional services, such as, site-to-site multicast
transport, Per Tunnel QoS, and AVC.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 152
Cisco dCloud
6. The output of show ip nhrp brief shows two dynamically established tunnels, one for each of our remote sites, as well as
actual addresses registered and mapped.
NOTE: Since we allow direct site-to-site VPN Tunnel establishment between spoke sites in the configuration, this information will
later be shared by the NHRP server (NHS) when the remote site spokes attempt to establish direct site communications.
NOTE: The spoke is able to tell the hub the speed of its connection so the hub shapes traffic to the spoke at the subscribed rate to
avoid traffic saturation.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 152
Cisco dCloud
8. The show dmvpn output provides yet another view of the mapping.
NOTE: Quickly review the same configuration output on the other routers. Briefly look at the other hub and BR2-WAN1.
HQ-DC-WAN2
2. Assign the unique IP Address within the 172.30.X.X/16 subnet (ip address 172.30.0.1).
3. Set the Tunnel MTU to 1400 (ip mtu 1400) and to configure ip tcp adjust-mss to 1360.
The bottom half of the tunnel configuration illustrates how DMVPN uses multipoint GRE (mGRE) tunnels (tunnel mode gre
multipoint). This type of tunnel requires a source interface only (tunnel source g1). The source interface is the same as the one that
connects to the Internet.
4. Set the tunnel vrf command to the VRF defined previously for Front Door VRF.
NOTE: This command allows the tunnel to get priority treatment from the VRF since the tunnel source is an interface belonging to
that VRF. The tunnel remains part of the global routing table, but will have permission to use the VRF to establish overlay DMVPN
tunnel connectivity.
NHRP requires all devices within a DMVPN cloud to use the same network ID (ip nhrp network-id 200) and authentication key (ip
nhrp authentication CISCO). The NHRP cache holdtime should be configured to 600 seconds (ip nhrp holdtime 600). The ip nhrp
redirect command allows the DMVPN hub to notify spoke routers that a more optimal path may exist to a destination network,
which may be required for DMVPN spoke-spoke direct communications.
NOTE: You encourage follow up one-on-one design workshops if this overview is used as part of a one-to-many design
clinic/demand generation event.
A follow-up design session may be necessary to discuss DMVPN phases, scaling, and design options based on your specific
requirements. Not every organization allows spoke-to-spoke connections. While this lab leverages DMVPN Phase 3, other options
are supported.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 152
Cisco dCloud
6. The output of show ip nhrp brief illustrates two dynamically established tunnels, one for each of our remote sites, as well as
actual addresses registered and mapped.
NOTE: Given that we have allowed direct site-to-site VPN Tunnel establishment between spoke sites as a result of our
configuration, this information will later be shared by the NHRP server when the remote site spokes attempt to establish direct site
communications.
NOTE: The spokes notify the hub of their subscribed rate, allowing the hub to leverage per tunnel QoS, shaping to the spoke to
avoid spoke saturation.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 152
Cisco dCloud
8. Look at the show dmvpn output for another view of the mapping.
BR2-WAN1
BR2-WAN1 has connections to both hubs. Differences exist on the spoke side, taking advantage of static mappings to each hub
over the dedicated DMVPN transport networks. A partial or entire configuration is applied to each spoke, contingent on whether
they are single attached or dual attached.
1. For Interface Tunnel 100, set the interface bandwidth in Kilobits to equal 20Mbps (bandwidth 20000).
2. Assign our unique IP Address within the 172.29.X.X/16 subnet (ip address 172.29.2.1).
3. Set the Tunnel MTU to 1400 (ip mtu 1400) and configure ip tcp adjust-mss to 1360.
The bottom half of the tunnel configuration illustrates how DMVPN uses multipoint GRE (mGRE) tunnels (tunnel mode gre
multipoint). This type of tunnel requires a source interface only (tunnel source g1). The source interface is the same as the one that
connects to the Internet.
4. Set the tunnel vrf command to the VRF defined previously for Front Door VRF.
NOTE: This command allows the tunnel to get priority treatment from the VRF since the tunnel source is an interface belonging to
that VRF. The tunnel remains part of the global routing table, but will have permission to use the VRF to establish overlay DMVPN
tunnel connectivity.
NHRP requires several additional configuration statements to define the NHRP server (NHS) and NHRP map statements for the
DMVPN hub router mGRE tunnel IP address.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 152
Cisco dCloud
EIGRP relies on a multicast transport and therefore spoke routers require the NHRP static multicast mapping (ip nhrp map
multicast 198.51.100.2).
5. For the Next Hop Resolution Protocol Server (NHS) value, use the mGRE tunnel address for the DMVPN hub router (ip nhrp
nhs 172.29.0.1).
6. On the spoke, configure static mappings to the hub (ip nhrp map 172.29.0.1 198.51.100.2).
NHRP requires all devices within a DMVPN cloud to use the same network ID (ip nhrp network-id 100) and authentication key (ip
nhrp authentication CISCO). The NHRP cache holdtime should be configured to 600 seconds (ip nhrp holdtime 600). For a phase
III style deployment, we want to configure the ip nhrp shortcut command to enable shortcut switching when building spoke-to-
spoke tunnels. The ip nhrp registration no-unique command is not needed in our topology, but has been included to show you the
command that would be required if you are using DHCP allocated addressing from the provider.
7. Since this single router terminates both circuits, look at Interface Tunnel 200, as well.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 152
Cisco dCloud
8. The output of show ip nhrp brief illustrates two static tunnels pointing to our hubs, as well as, actual addresses registered
and mapped.
10. The show dmvpn output provides another view of the mapping.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 152
Cisco dCloud
NOTE: Minimize the potential perceived complexity of the configuration by highlighting the repetitiveness of spoke router
configuration. The only things that are unique are the ip address and the bandwidth statements. Introduce the value of templates
and automation tools for simplified deployment. You will show an IWAN Wizard deployment for Branch 3 leveraging Cisco Prime
Infrastructure.
DMVPN is the most complex portion of the IWAN design, especially when adding the encryption related configuration. The
configuration is slightly simplified by repetition and can be made into a template for simplified deployment through Prime
Infrastructure or rolled out leveraging an automated deployment model through a number of tools and services.
11. Look at the encryption configuration. Although verification commands are sent to all routers, the configuration is repetitive,
enabling you to look at another border router to get a complete picture of the encryption policy.
14. Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 152
Cisco dCloud
• sh crypto ipsec sa
Next, look at the crypto IKEv2 keyring and profile configuration and the phase 2 IPsec configuration parameters. A specific line
under the tunnel configuration enables encryption and that completes the security capability addition to our DMVPN tunnels,
allowing you to protect data and to ensure confidentiality over public transport. When complete, empty the crypto counters and look
at the IPSec SA specifics.
15. Send script 003. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 152
Cisco dCloud
BR2-WAN1
The crypto keyring defines a pre-shared key (or password) valid for IP sources that are reachable within a particular VRF. The key
is configured as ‘cisco123’ leveraging wildcard address 0.0.0.0 0.0.0.0 for this pre-shared key. This allows the same password to
apply to any IP source authenticating. In order to provide additional security one could leverage certificates in the place of pre-
shared keys. You can definitely cover this configuration in more detail during a one-on-one design session.
• Diffie-Hellman group: 5
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 152
Cisco dCloud
3. To illustrate leveraging IKEv2 proposal defaults, move onto the IKEv2 profile configuration.
The IKEv2 profile creates an association between an identity address, a VRF, and a crypto keyring. A wildcard address within a
VRF is referenced with 0.0.0.0. The profile also defines what method of key sharing will be used on this router with authentication
local and what methods will be accepted from remote locations with authentication remote. The pre-share keyword is used with the
keyring defined in the previous output.
4. DPD is essential in order to facilitate fast convergence and for spoke registration to function properly in case a DMVPN hub is
restarted. The IWAN design recommends you set the remote site DPD timer to 40 seconds with five for a second retry. This
command must be configured for spoke routers only.
5. Next, configure phase 2 parameters and specify an IPSec transform set. A transform set is an acceptable combination of
security protocols, algorithms and other settings to apply to IPsec-protected traffic. Peers agree to use a particular transform
set when protecting a particular data flow.
Although DMVPN supports both tunnel mode (mode tunnel) and transport mode (mode transport), transport mode is highly
recommended for most situations, except when the GRE tunnel endpoints are different from the crypto tunnel endpoints such as
with a Dual Tier design. In that case, tunnel mode is required.
The IPsec profiles bring the entire configuration together by creating an association between an IKEv2 profile and an IPsec
transform-set. This is what will be applied under the tunnel interfaces. The security-association replay window-size is set to 512 or
1024 if supported to accommodate out of order packets that might result from the implementation of Low Latency Queuing (LLQ)
which is part of our QoS policy.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 152
Cisco dCloud
8. The output associated with this command provides a different look at the IPsec profile configuration.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 152
Cisco dCloud
10. The show crypto ipsec sa output shows IPsec security associations and encrypted packets.
11. Next, review our EIGRP named mode routing configuration next.
14. Discuss the purpose of each verification command prior to sending the script and reviewing.
• sh ip eigrp interface
• sh ip eigrp neighbor
• sh ip access-list DMVPN-100-SPOKES
• sh ip access-list DMVPN-200-SPOKES
• sh ip route eigrp
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 152
Cisco dCloud
15. Start by looking at the enabled EIGRP interfaces followed by the neighbor relationships that have been established over the
enabled links. You will then turn our attention to the EIGRP related configuration. Check to see whether there is any prefix-list
or route-maps configured as part of the EIGRP filtering process. Look at the routing table for routes learned via EIGRP.
16. Send script 004. Once complete review the verification output on all edge devices or at a minimum on both Hubs and BR2-
WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 152
Cisco dCloud
HQ-DC-WAN1
2. There are two interfaces enabled on HQ-DC-WAN1. One is connected to the Core Switch and other is the tunnel.
3. The router is peering with both remote sites 1 and 2 over the tunnel. It is also peering with HQ-DC-CORE-SW.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 152
Cisco dCloud
The routing configuration on the Border Hub Routers are a little more involved as we are applying inbound and outbound
distribute-lists to the interfaces to protect against suboptimal routing. To send routing updates out of these interfaces, advertise all
directly connected networks as internal routes and leverage passive-interface default with no passive-interface for tunnel100 and
g2. Again, our EIGRP router-id is set to loopback 0 which is in accordance with best practices. Let us look at the route-maps and
associated configuration referenced as part of the distribute-list commands to get a better feel for what is happening with this
configuration.
4. Start by classifying routes tied to this tunnel by leveraging an ACL. This ACL will be used as part of our route-map
configuration.
5. For scalability and simplified identification, we are using dotted decimal notations for route tagging where the routes we tag will
match the DMVPN subnet of 172.29.0.0.
Route-maps work very similar to ACLs and Prefix-lists given that they are sequential in nature and leverage deny and permit
statements. They also have an implicit deny all at the end.
6. Map the route-map output back to the distribute-lists and the access-list from earlier. All routes sourced from our DMPVN
spokes are tagged with 172.29.0.0.
7. Override the implicit deny and leverage a permit statement to allow everything else in. The routes sent into the LAN are
tagged with a tag of 172.29.0.0. Any routes that have been tagged by the other DMVPN network are blocked with a tag of
172.30.0.0, preventing them from coming into this router from the LAN. Everything else is permitted and tagged going out of
the tunnel interface with a tag of 172.29.0.0. This configuration is an extremely scalable way to protect against suboptimal
routing to ensure that we only learn routes from intended sources.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 152
Cisco dCloud
8. You can see that we are learning routes from the other routers in HQ/DC and HQ-DC-CORE-SW. You also see that routes are
being learned over our DMVPN Tunnel interface from both remote sites.
HQ-DC-WAN2
2. You have two interfaces enabled on HQ-DC-WAN2. One is connected to the Core Switch and other is our tunnel.
3. The router is peering with both remote sites 1 and 2 over the tunnel. It is also peering with HQ-DC-CORE-SW.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 152
Cisco dCloud
The routing configuration on the Border Hub Routers is a little more complicated, as we are applying inbound and outbound
distribution-lists to the interfaces to protect against suboptimal routing. Advertise all directly connected networks as internal routes
and leverage passive-interface default with no passive-interface for tunnel200 and g2 to send routing updates out of these
interfaces. The EIGRP router-id is set to loopback 0, in accordance with best practices. Look at the route-maps and associated
configuration referenced as part of the distribute-list commands to get a better feel for what is happening with this configuration.
4. Start by classifying routes tied to this tunnel by leveraging an ACL. This ACL is part of our route-map configuration.
5. For scalability and simplified identification, use dotted decimal notations for route tagging where the tagged routes match the
DMVPN subnet of 172.30.0.0.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 152
Cisco dCloud
Route-maps work very similar to ACLs and Prefix-lists given that they are sequential in nature and leverage deny and permit
statements. They also have an implicit deny all at the end. Next, map the route-map output back to the distribute-lists and the
access-list that we recently viewed. Notice the tagging of all routes sourced from our DMPVN spokes with a tag of 172.30.0.0. You
override the implicit deny and leverage a permit statement to allow everything else in. When we send the routes to into the LAN we
tag all routes with a tag of 172.30.0.0. You then block any routes that have been tagged by the other DMVPN network with a tag of
172.29.0.0 from coming into this router from the LAN. Everything else is permitted and tagged going out of the tunnel interface with
a tag of 172.30.0.0. This configuration is an extremely scalable way to protect against suboptimal routing to ensure that we only
learn routes from intended sources.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 152
Cisco dCloud
6. Routes from the other routers are being learned in HQ/DC and HQ-DC-CORE-SW. Routes are being learned over our
DMVPN Tunnel interface from both remote sites.
BR1-WAN1
2. Three interfaces are enabled on BR1-WAN1. Two are connected to the shared LAN between the two edge routers and the
other is our tunnel.
3. The router is peering with HQ-DC-WAN1 over the tunnel. It is also peering with BR1-WAN2 over both internal interfaces.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 152
Cisco dCloud
The routing configurations on the Spoke Routers also have an outbound distribute-list applied to the tunnel interface. You will look
at this in more detail in just a minute to see what it is doing. Advertise all directly connected networks as internal routes and
leverage passive-interface default with no passive-interface for tunnel100, e0/1 and e0/2 to send routing updates out of these
interfaces. The EIGRP router-id is set to the loopback 0 address, which is in accordance with best practices. The last line of
configuration tells us that we have configured the spoke routers as EIGRP Stubs advertising connected, summarized and
redistributed routes. The Leak-Map at the end of the command matches on a Route-Map that has no match entries meaning that it
matches everything. This allows us to override the default Stub Router behavior of not being able to advertise routes learned. Let
us look at the route-maps and associated configuration referenced as part of the distribute-list commands and the Leak-Map to get
a better feel for what is happening with this configuration.
4. Start by classifying tunnel subnets for each of the tunnels. This prefix-list will be used as part of our route-map configuration to
avoid sending the tunnel addressing out of our tunnel that we learned from our neighbor.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 152
Cisco dCloud
5. For scalability and simplified identification, use dotted decimal notations for route tagging and matching, where the routes we
match will match the tags of 172.29.0.0 and 172.30.0.0.
Mapping this output back to the end of the EIGRP Stub command statement we see a line for route-map LEAK-EIGRP permit
1000 with nothing matching under it. This means match everything and allow it. The distribute-list that we looked at a moment ago
maps to route-map BRANCH-OUT. You can see that we are blocking the router from advertising routes that have a tag of
172.29.0.0 and 172.30.0.0, which are routes learned from the Hub Border Routers and other Remote Sites through the Hubs. You
just finished reviewing this configuration on the Hub Border Routers. You are also blocking tunnel routes 172.30.0.0/16 learned
from BR1-WAN2 from being advertised. This is what that prefix-list TUNNEL-ROUTES is matching. You then permit everything
else again with an empty permit route-map statement. This configuration is an extremely scalable way to protect against
suboptimal routing. With this configuration in place one spoke at a site can share routes with another spoke, but spokes with this
configuration will not share specific routes with tags and tunnel addressing learned by the other router out of the tunnel interface.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 152
Cisco dCloud
6. You are learning routes over the tunnel as well as from BR1-WAN2.
BR1-WAN2
2. Three interfaces are enabled on BR1-WAN2. Two are connected to the shared LAN between the two edge routers and the
other is our tunnel.
3. The router is peering with HQ-DC-WAN2 over the tunnel. It is also peering with BR1-WAN1 over both internal interfaces.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 152
Cisco dCloud
The routing configurations on the Spoke Routers also have an outbound distribute-list applied to the tunnel interface. You will look
at this in more detail in just a minute to see that it is doing the same thing that BR-WAN1 is doing. Advertise all directly connected
networks as internal routes and leverage passive-interface default with no passive-interface for tunnel100, e0/1 and e0/2 to send
routing updates out of these interfaces. The EIGRP router-id is set to the loopback 0 address, which is in accordance with best
practices. The last line of configuration tells us that we have configured the spoke routers as EIGRP Stubs advertising connected,
summarized and redistributed routes. The Leak-Map at the end of the command matches on a Route-Map that has no match
entries meaning that it matches everything. This allows us to override the default Stub Router behavior of not being able to
advertise routes learned. Let us look at the route-maps and associated configuration referenced as part of the distribute-list
commands and the Leak-Map to get a better feel for what is happening with this configuration.
4. Similarly to BR1-WAN1, start by classifying tunnel subnets for each of the tunnels. This prefix-list will be used as part of our
route-map configuration to avoid sending the tunnel addressing out of our tunnel that we learned from our neighbor.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 49 of 152
Cisco dCloud
5. For scalability and simplified identification, use dotted decimal notations for route tagging and matching, where the routes we
match will match the tags of 172.29.0.0 and 172.30.0.0.
Mapping this output back to the end of the EIGRP Stub command statement we see a line for route-map LEAK-EIGRP permit
1000 with nothing matching under it. This means match everything and allow it. The distribute-list that we looked at a moment ago
maps to route-map BRANCH-OUT. You can see that we are blocking the router from advertising routes that have a tag of
172.29.0.0 and 172.30.0.0, which are routes learned from the Hub Border Routers and other Remote Sites through the Hubs. You
just finished reviewing this configuration. You are also blocking tunnel routes 172.29.0.0/16 learned from BR1-WAN1 from being
advertised. This is what that prefix-list TUNNEL-ROUTES is matching. You then permit everything else again with an empty permit
route-map statement. This configuration is an extremely scalable way to protect against suboptimal routing. With this configuration
in place one spoke at a site can share routes with another spoke, but spokes with this configuration will not share specific routes
with tags and tunnel addressing learned by the other router out of the tunnel interface.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 50 of 152
Cisco dCloud
6. You are learning routes over the tunnel and from BR1-WAN1.
7. Move over to BR2-WAN1. You will notice that the configuration is again very repetitive making it perfect for creating templates
for simplified deployment models.
8. You have two interfaces enabled on BR2-WAN1 and both are the tunnels.
9. As expected the router is peering with HQ-DC-WAN1 and HQ-DC-WAN2 over the tunnels.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 51 of 152
Cisco dCloud
The routing configurations on the Spoke Routers also have an outbound distribute-list applied to the tunnel interface. You will look
at this in more detail in just a minute to see that it is doing the same thing that BR-WAN1 and BR-WAN2 were doing. Advertise all
directly connected networks as internal routes and leverage passive-interface default with no passive-interface for tunnel100, e0/1
and e0/2 to send routing updates out of these interfaces. The EIGRP router-id is set to the loopback 0 address, which is in
accordance with best practices. The last line of configuration tells us that we have configured the spoke routers as EIGRP Stubs
advertising connected, summarized and redistributed routes. Notice that we are not leveraging a Leak-Map at the end of the
command to match on a Route-Map that has no match entries. Since there is no other routing device connected over the LAN,
there is no need to override the default Stub Router behavior of not being able to advertise routes learned. Let us look at the route-
maps and associated configuration referenced as part of the distribute-list command to get a better feel for what is happening with
this configuration.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 52 of 152
Cisco dCloud
10. Just as we did on BR1-WAN1 and WAN2, we will start by classifying tunnel subnets for each of the tunnels. This prefix-list will
be used as part of our route-map configuration to avoid sending the tunnel addressing out of our tunnel that we learned from
our neighbor. This configuration is actually not necessary given there is no Leak-Map and other router sharing the tunnel
routes of the other tunnel.
11. Once again for scalability and simplified identification we are using dotted decimal notations for route tagging and matching,
where the routes we match will match the tags of 172.29.0.0 and 172.30.0.0. Again given the absence of the Leak-Map and
other router sharing routes learned this configuration is not necessary but creates no harm.
The distribute-list that we looked at a moment ago maps to route-map BRANCH-OUT. You are blocking the router from
advertising routes that have a tag of 172.29.0.0 and 172.30.0.0, which are routes learned from the Hub Border Routers and other
Remote Sites through the Hubs. You just finished reviewing this configuration. You are blocking tunnel routes 172.29.0.0/16 and
172.30.0.0/16 learned from future adjacently configured routers from being advertised. This is what that prefix-list TUNNEL-
ROUTES is matching. You then permit everything else again with an empty permit route-map statement. This configuration is an
extremely scalable way to protect against suboptimal routing. With this configuration in place and the addition of the Leak-Map, a
device participating in EIGRP at the site can share routes with this device, but spokes with this configuration will not share specific
routes with tags and tunnel addressing learned by the other device out of the tunnel interface.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 53 of 152
Cisco dCloud
12. You are learning routes over tunnel 200, which has a lower delay setting. Any other spoke router leverages the same
configuration seen previously.
13. Let us see NHRP go to work next by leveraging traceroute from one remote site to another.
• ‘Select None’ to clear all router checkboxes and select BR1-WAN1 ONLY.
14. Discuss the purpose of each verification command prior to sending the script and reviewing.
• clear ip nhrp
• traceroute 198.19.2.1
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 54 of 152
Cisco dCloud
15. Start by clearing dynamic NHRP associations and look at NHRP status on the router.
16. Look at ikev2 sa output and perform back-to-back traceroutes to BR2-WAN1 internal host PC21 IP Address 198.19.2.21. You
should see that the first time we issue traceroute we go to the hub and the second time we go direct.
18. Send script 005. Once complete review the verification output on BR1-WAN1.
BR1-WAN1
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 55 of 152
Cisco dCloud
A static association to the Hub exists through Tunnel 100. Using traceroute, the first hop hits the hub and travels to the spoke.
1. Use the up arrow key to issue the command again. The second time goes directly from spoke to spoke. This is the NHRP
Phase 3 deployment model at work.
2. Use the up arrow key to look at show ip nhrp brief again. Notice the dynamic entries for both the tunnel endpoint associated
with BR2-WAN1 and Branch 2 internal network 198.19.2.0/25.
3. Use the up arrow key several times to find the show crypto ikev2 sa command. Looking at our ikev2 SAs we see the
bidirectional security associations. These real addresses where learned from the NHRP Server.
4. Close out with a two-minute review of the following slide covering best practices associated with:
• Transport settings
• Routing protocols
• Internet security
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 56 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 57 of 152
Cisco dCloud
2. Load script 006_PfRv3_Configuration. Select all 6 routers including the Master Controller HQ-DC-MC.
3. Discuss the purpose of each verification command prior to sending the script and reviewing.
Performance Routing (PfR) delivers intelligent path selection. Devices play four roles in PfRv3 configuration:
• Hub Master Controller (MC) - The master controller at the hub-site, which can be either a data center or headquarters.
All policies are configured on the hub MC. It acts as master controller for domain and makes optimization decisions.
• Hub Border Routers - The border controllers at the hub-site. WAN interfaces terminate in the hub border routers which
are also acting as DMVPN Next Hop Resolution servers. A PfRv3 path name is enabled on the tunnel interfaces of these
routers. You can configure more than one WAN interface on the same device. You can also have multiple hub border
devices like we do in our topology.
• Branch Master Controller - The branch master controller is the master controller at the branch-site. There is no policy
configuration on this device. It receives policy from the Hub MC. This device acts as master controller for that site and is
responsible for making optimization decisions.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 58 of 152
Cisco dCloud
• Branch Border Router - The border device at the branch-site. There is no configuration other than enabling of PfRv3
border MC on the device. The WAN overlay interface that terminates on the device is detected automatically.
NOTE: When you have a single router at a remote site it will need to be configured as both a Branch Master Controller and a
Branch Border Router. Let look at our Hub Master Controller first where the bulk of the configuration lives. You will see the
simplified, centralized policy definition and control that gets pushed out to rest of the domain.
4. Send script 006. Once complete review the verification output on the HQ-DC-MC first followed by the Aggregation routers and
then the branches.
HQ-DC-MC
The bulk of the PfRv3 configuration happens on the Hub Master Controller. Domain policies are defined on the Hub Master
Controller and sent over the peering infrastructure to all MC peers at each site. Policies can be defined per application, or per
DSCP. You cannot mix and match DSCP and application based policies in the same class group, but multiple class groups can be
configured in a sequential order. Traffic that does not match any of the classification and match statements falls into a default
group, which we can either be load balanced or controlled to influence primary path selection tied to SLAs.
1. Start by specifying the domain name or number (domain 10) that will match on all of our devices.
2. Under vrf default, define the role of the device. On the Hub MC, the role was configured as master hub.
3. Set the source-interface to our loopback0 interface and specify a site-prefixes prefix-list that contains a list of site prefixes
that our internal to our DC environment and that we can disregard.
4. Configure an enterprise-prefix prefix-list for those prefixes that we want to learn and control.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 59 of 152
Cisco dCloud
The default monitor interval is 30 seconds. You can lower the monitor interval for some of critical applications in order to achieve a
fast failover to the secondary path (quick monitor). In a real world example, you might not choose to enable quick monitor for all of
the configured DSCP values, since there are multiple class groups configured and the syntax is pretty straight-forward.
Specify the class group using class followed by a unique name and sequence number. Under the class group, match on either
applications or dscp values and assign a built in policy or a custom policy template followed by path preference. The PUBLIC and
MPLS key words for path options are configured under the tunnel interfaces on the Hub Border Routers.
• best-effort
• bulk-data
• low-latency-data
• real-time-video
• scavenger
• voice
HQ-DC-WAN1
1. Use the same domain number and under vrf default to assign the role as border.
2. Specify the source interface to be loopback0 and point to the location specific master loopback/source address.
3. Issue a show run interface tunnel100 | in interface|domain to see what is configured under the tunnel interface.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 60 of 152
Cisco dCloud
HQ-DC-WAN2
1. Use the same domain number and under vrf default we assign the role as border.
2. Specify the source interface to be loopback0 and we point to the location specific master loopback/source address.
3. Issue a show run interface tunnel200 | in interface|domain to see what is configured under the tunnel interface.
BR1-WAN1
1. Use the same domain number and under vrf default we assign the role as border.
2. Specify the source interface to be loopback0 and we point to the loopback of BR1-WAN2 as master for this site.
BR1-WAN2
BR1-WAN2 is both a branch master and a border. The border configuration is similar to what we have already looked at with the
exception that we specify the master as being local. You then go on to specify our second role as master branch. Again we specify
our source-interface as loopback0 and point to the Hub Master Controller.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 61 of 152
Cisco dCloud
BR2-WAN1
BR2-WAN1, being a single router in remote site 20, acts as both a border and a master branch router.
This is all that it takes to get PfRv3 up and running. The PfRv3 solution is more focused on applications. It provides a simple way to
provision policies based on the application (classification based on Cisco's deep packet inspection engine NBAR2). It provides
visibility into applications by integrating with Unified Monitoring (Performance Monitor) which is a built in function. Application
visibility includes bandwidth, performance, correlation to QoS queues, etc. It monitors performance metrics per DSCP rather than
monitoring on a per-flow or per-prefix basis.
When Application based policies are used, the MC will use a mapping table between the Application Name and the DSCP
discovered. This reduces the number of records significantly. PfRv3 also relies on performance data measured on the existing data
traffic on all paths whenever it can, thereby reducing the need of synthetic traffic which was the case in the past. Furthermore, the
measurement data is not exported unless there is a violation, which further reduces control traffic and processing of those records.
Unified Monitors (Performance Monitors) are automatically configured and activated in the background by PfRv3.
There is no need for manual configuration. Performance Monitor definitions are pre-defined on the Hub MC and distributed to
branch BRs using the domain infrastructure. Three different Performance Monitors are automatically enabled on all Border Routers
in the domain:
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 62 of 152
Cisco dCloud
• Choose Select None and then Select only the Master Controller HQ-DC-MC ONLY.
2. Discuss the purpose of each verification command prior to sending the script and reviewing.
3. Look at the overall status and policy of the master, followed by a look into the details of the traffic classes.
4. Send script 007. Once complete review the verification output on the HQ-DC-MC.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 63 of 152
Cisco dCloud
5. From the output, notice that you are up and operational. You can also see that borders at the bottom are both up. Notice that
the PUBLIC and MPLS keywords were learned from the hub border routers.
6. Look at the specific details associated with the policy template selected for each class group.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 64 of 152
Cisco dCloud
7. See whether the traffic class is controlled and in policy based on performance status. You can see both previous and current
service providers, the bandwidth utilization and the reason for the last route change. Let us scroll to the bottom and look at the
summary.
Here we can quickly see destination site prefixes along with DSCP values. You also see whether the traffic is currently controlled
and which provider/interface is being leveraged.
8. Looks like our PfRv3 configuration is working nicely. Move onto border router verification next.
• Choose Select None and then Select all five Border Routers.
9. Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 65 of 152
Cisco dCloud
10. You will look at the overall border status and site prefixes learned. You will follow that by taking a look into the details of the
traffic classes and finish up with a glance at the channels.
11. Send script 008. Once complete review the verification output on the border routers. Cover thoroughly on one router and then
only look at border status and site-prefixes output on the others.
HQ-DC-WAN1
1. Notice that the router Border status is up and that it has a connection with the MC. You also see the local tunnel interface as
well as the other Border reachable via dynamic tunnel 0.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 66 of 152
Cisco dCloud
2. This command show the site prefixes associated with the various site IDs.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 67 of 152
Cisco dCloud
3. This is similar to the command that was viewed on the master. You can see the present state, primary interface and backup
interface for various traffic classes. You also see the associated channel-ids for primary and backup connections. Let us look
at those channels next.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 68 of 152
Cisco dCloud
4. Notice the channel send/receive probes and packet details from this configuration output.
5. Launch a WebEx on PC11, come back to HQ-DC-MC, and hit our up arrow key to see the traffic-classes summary again.
NOTE: There RDP connection shortcuts on the desktop of our jumpbox PC01.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 69 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 70 of 152
Cisco dCloud
1. The Master Controller might take some time to learn the application and the health of the network prior to leveraging the
preferred path. As you can see PfR learns the application and things are working as expected as long as the SLAs have been
met.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 71 of 152
Cisco dCloud
• Select router BR2-WAN1. You are reviewing this configuration to highlight that both Prime Infrastructure and LiveAction
can push out the configuration if required.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 72 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 73 of 152
Cisco dCloud
As can be seen from this output we can configure multiple flow exporters on the router with each pointing to a different destination
and utilizing a different relevant port number. The flow record is standard and leverages collect application name for integration
with NBAR2. The flow monitor ties the record and exporter together and gets applied in both ingress and egress directions on
relevant interfaces. Both Cisco Prime Infrastructure and LiveAction can be used to push out this template configuration which is the
same on all devices.
As part of this review point we are going to look at how we can leverage Easy Performance Monitoring (EZPM) to provide
additional application visibility. The Performance Monitoring style configuration greatly simplifies the entire previous separate
configuration that was at one time required to gain visibility into applications and application health. You will look at this method of
configuration from our Prime Infrastructure management console as part of the next review point. As part of this review we will
login to Prime Infrastructure to see the results of configuring for enhanced visibility into our application environment. Enabling FNF
with NBAR2 is not required for PfRv3 to do its job. Again, Unified Monitors (Performance Monitors) are automatically configured
and activated in the background by PfRv3 for the Intelligent Path Selection functionality. There is no need for manual configuration
to make this work. Performance Monitor definitions are pre-defined on the Hub MC and distributed to branch BRs using the domain
infrastructure. You are configuring an explicit instance of Unified Monitoring for enhanced visibility within tools such as Prime
Infrastructure.
NOTE: Certain monitoring and reporting applications might not be able to leverage EZPM and we may still need to configure FNF
with NBAR2 integration. Traditional NetFlow (also called Classic NetFlow) and NetFlow version 5 are not suitable for AVC
solutions because they can report only L3 and L4 information. When possible, it is highly recommended to migrate to Flexible
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 74 of 152
Cisco dCloud
NetFlow with NBAR as outlined in the CVD guide ‘ Application Monitoring Using NetFlow’:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Dec2013/CVD-ApplicationMonitoringUsingNetFlowDesignGuide-
DEC13.pdf
In the past, typical network traffic could easily be identified using well known port numbers. Today, many applications are carried
on the network as HTTP and HTTPS, so identifying applications by their well-known port number is no longer sufficient. Cloud
applications and services such as WebEx, SalesForce.com, and Microsoft Office 365 are delivered over HTTP and HTTPS using
the same ports as other web-based traffic such as Netflix, Hulu, Pandora, and iTunes. In addition, many applications such as
voice, video, and Microsoft Exchange use dynamic ports and therefore are not uniquely identifiable by their port numbers alone.
Network administrators need enhanced visibility into different types of traffic that use well-known and dynamic port numbers.
Network Based Application Recognition (NBAR) is an intelligent classification engine in Cisco IOS Software that can recognize a
wide variety of applications, including web-based and client/server applications. NBAR uses deep packet inspection to look within
the transport layer payload in order to determine the associated application.
NBAR2 is the next-generation architectural evolution of NBAR. NBAR2 or Next Generation NBAR is part of the Cisco AVC
solution, which enables greater classification and visibility of network traffic flows. NBAR2 is a stateful, deep packet inspection
technology based on the Cisco Service Control Engine (SCE) with advanced classification techniques, greater accuracy, and many
more application signatures supporting over 1000 applications and sub-classifications. NBAR2 includes Cisco’s cross platform
deep packet inspection (DPI) and field extraction technology and is currently supported on Cisco ASR 1000 and ISR G2 as well as
ISR4K platforms. The heuristic analysis engine allows NBAR2 to identify applications regardless of their ports and can identify
applications such as Skype, Youtube, and BitTorrent. Support for NBAR2 protocol packs (PP) provides the ability to update and
add application signatures while the routers are service independent of full Cisco IOS Software updates. New protocol packs with
new application signatures are typically released every month. Application categorization uses NBAR2 attributes to group similar
applications in order to simplify application management for both classification and reporting.
FNF integrates seamlessly with NBAR and is enabled to gather data by using “application name” as a key field within a FNF flow
record (Note: Point this it in the Flow Record output). The application identification provided by NBAR is more effective than using
the TCP/UDP well-known-port mapping. If leveraging FNF w/ NBAR2 you would leverage the following steps:
Flexible NetFlow (FNF) requires the explicit configuration of a flow record that consists of both key fields and non-key fields. This
procedure provides guidance on how to configure a user-defined flow record that includes all of the TNF fields (key and non-key)
as well as additional FNF fields (key and non-key). The resulting flow record includes the full subset of TNF fields used in classic
NetFlow deployments.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 75 of 152
Cisco dCloud
The NetFlow data that is stored in the cache of the network device can be more effectively analyzed when exported to an external
collector. Creating a flow exporter is only required when exporting data to an external collector. This procedure may be skipped if
data is analyzed only on the network device.
Most external collectors use Simple Network Management Protocol (SNMP) to retrieve the interface table from the network device.
Ensure that you have completed the relevant SNMP procedures for your platform.
NOTE: Different NetFlow collector applications support different export version formats (v5, v9 IPFIX) and expect to receive the
exported data on a particular UDP or TCP port (ports 2055, 9991, 9995, 9996 are popular). The NetFlow RFC 3954 does not
specify a specific port for collectors to receive Netflow data.
The network device must be configured to monitor the flows through the device on a per-interface basis. The flow monitor must
include a flow record and optionally one or more flow exporters if data is to be collected and analyzed. After the flow monitor is
created, it is applied to device interfaces. The flow monitor stores flow information in a cache, and the timer values for this cache
are modified within the flow monitor configuration. It is recommended that you set the timeout active timer to 60 seconds, which
exports flow data on existing long-lived flows.
A best practice for NetFlow is to monitor all inbound and outbound traffic to the network device. This method covers all traffic
regardless of encryption or application optimization.
NOTE: Be sure to apply the flow monitor to all device interfaces, including port-channel, tunnel, and sub-interfaces.
Once you have logged in launch Google Chrome and perform a search for Cisco IWAN YouTube and click on any of the links to
play a video.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 76 of 152
Cisco dCloud
Now that this is playing go back to PC01 terminal window for HQ-DC-MC and either up arrow key or type in show domain 10
master traffic-classes summary.
Now go back to PC01 and launch Cisco Prime Infrastructure by double clicking the Firefox shortcut on the desktop. Leveraging
Firefox for Prime will ensure a consistent experience and will prevent you from running into issues. If you forget and naturally go
back to Chrome and to the second tab you will see a reminder to use Firefox for Cisco Prime Infrastructure. Please use Chrome for
everything else.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 77 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 78 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 79 of 152
Cisco dCloud
Go to Dashboard General
th
Clicking on the Service Assurance option 6 from the left should provide additional visibility into the applications such as webex,
youtube, rtp and http that are running. It might take a while for Youtube to show up.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 80 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 81 of 152
Cisco dCloud
You might also want to look at the Service Health tab located under the Overview tab header.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 82 of 152
Cisco dCloud
Close out with a quick review of AVC Readiness Assessment and NBAR protocol pack details under the services menu before
moving on to WAAS and Akamai.
Hover over Services menu and then click on Readiness Assessment to view device capabilities:
This output provides us with visibility into whether AVC is supported and activated on the device. Let us also take a moment to
explore one click AVC and QoS activation.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 83 of 152
Cisco dCloud
Within this services section we can enable and disable AVC and QoS with a single click of a button. You will not go through this
now, but will take a closer look at this simplified deployment when we configure BR3 using the IWAN Wizard.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 84 of 152
Cisco dCloud
For those who are not familiar with Cisco Wide Area Application Services (WAAS), it is a comprehensive, cost-effective, cloud-
ready WAN optimization solution, which accelerates applications (and is vendor validated), optimizes bandwidth, provides local
hosting of branch IT services, and enables cloud services, all with comprehensive network integration options.
®
Cisco Intelligent WAN (IWAN) with Akamai Connect is a fully integrated solution from Cisco and Akamai that provides the next
generation application and network optimization. It integrates the best-in-class advanced WAN optimization and intelligent caching
techniques directly into the Cisco Integrated Services Routers with Application Experience (ISR-AX) at the branch office. It
effectively extends the Akamai Intelligent Platform across the last mile from the Internet directly into the branch office with edge
caching, thus significantly offloading traffic from the WAN and providing an unparalleled user experience over bandwidth-
constrained networks. Akamai Connect turbo charges the application optimization features of IWAN, providing faster content
delivery regardless of device, connectivity, or cloud, including the corporate private cloud and the public Internet cloud, where most
business traffic traverses.
Cisco WAAS provides the following capabilities to improve application performance over the WAN:
1. Transport optimization - Cisco WAAS uses a variety of Transport Flow Optimization (TFO) features to optimize TCP
traffic intercepted by the WAAS devices
2. Compression – Cisco WAAS use Data Redundancy Elimination and persistent Lempel-Ziv (LZ) compression to minimize
the amount of bandwidth consumed by data transmitted over your WAN.
3. Application Acceleration – Cisco WAAS provides application specific acceleration capabilities to minimize the impact of
latency in key business applications.
4. HTTP(s) Object caching – Cisco WAAS has integrated Akamai caching functions into its software stack to provide
significant WAN offload in addition to the compression techniques above.
The result of all of the above improves the user experience and enables consolidation of costly distributed infrastructures. Cisco
WAAS is deployed on the Cisco Wide Area Virtualization Engine (WAVE) family of appliances, on a virtual instance on any ESXi
4.1 and later platform (vWAAS), or as part of ISR-AX which can be deployed virtually on Cisco UCS-E or natively on an ISR-4000
series router (ISR-WAAS). On ISRG2 routers we also support a native deployment option on a Service Ready Engine (SRE). A
WAAS deployment typically involves the following recommended elements:
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 85 of 152
Cisco dCloud
• AppNav functionality to handle asymmetric flows and load sharing across multiple virtualization engine instances
Although deploying WAAS on the ISR is the most commonly chosen deployment option by our customers, we are unable to
demonstrate that deployment within this topology. Our lab is built from virtual routers, switches and workstations and therefore we
are not in a position to display integrated engines given that we do not have real hardware. This will not impact us as we can
leverage all appliances integrated in the real world and since they all run the same software everything outside of the deployment
at branch 2 will look the same.
Bring up the topology diagram and have the attendees look at the printouts. It is very important for you to understand that this lab
environment has been setup to show the seamless integration of WAAS/Akamai as part of the overall IWAN solution. The setup is
not intended to showcase performance testing and impact associated with files be downloaded and speed of page loads. The
WAN links are set with high bandwidth and there is minimal delay in this lab environment to showcase performance benefits
outside of the reporting framework.
As yo can see our central manager is running in HQ/DC as a virtual instance. You have two virtual engines in this location, running
AppNav-XE capability on the edge routers in software. Again, AppNav allows us to address asymmetric flows and load sharing
across multiple virtualization engine instances. The edge routers form a cluster for optimal integration of application optimization
into the IWAN design. You then have a virtual appliance out at Branch 2 to optimize traffic going from the site to HQ/DC and out
through the directly attached Internet. Cisco WAAS supports transparent interception and redirection using AppNav, WCCP, vPath,
or PBR. This is great for introducing optimization capabilities without having disrupted services by putting appliances in line.
AppNav is the preferred deployment option on ISR 4Ks, ASRs and CSRs, but since we don’t have real hardware we are using
WCCP redirection at branch 2.
You will start by looking at the Central Manager, which is the third automatically loaded tab from the left in your Chrome browser on
PC01.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 86 of 152
Cisco dCloud
Once you have logged in navigate to the AppNav Clusters menu option and click on HQ-DC.
As can see your Hub Border edge routers are part of a cluster and have full connectivity to both appliances. You have a lot of
flexibility in how you configure the appliances and can dedicate them for specific functions if you choose to do so as we have done
here. This is obviously not a requirement and we just want to demonstrate that it is possible.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 87 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 88 of 152
Cisco dCloud
Let us navigate to the Devices menu next and click on All Devices.
As you can see, all devices are operational and healthy. You can also see that Akamai connect has been enabled for our
optimization engine in Branch 2.
Enabling Akamai integration was simply done with a click of a button. Let us look at that next. Click on the icon next to br2-waas.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 89 of 152
Cisco dCloud
Checking the box next to Enable Akamai Connect is all you have to do.
Let us look at some of the dashboards and reports next to see how we the optimization solution is performing in our environment.
As a reminder, this lab environment has been setup to show the seamless integration of WAAS/Akamai as part of the overall IWAN
solution. The setup is not intended to showcase performance testing and impact associated with files be downloaded and speed of
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 90 of 152
Cisco dCloud
page loads. The WAN links are set with high bandwidth and there is minimal delay in this lab environment to effectively showcase
performance benefits outside of the reporting framework.
NOTE: Cisco WAAS Central Manager Device Dashboard can be used to display a series of reports. There are toggles on many
of these reports that you can explore. Below are some of sample reports that can be generated from Cisco WAAS CM. You will
want to choose which reports to run through given session time constraints. Perhaps a brief overview of each report displayed will
suffice.
Traffic Analysis:
a. The Original Traffic over Time chart displays a graph of the amount
of original and pass-through traffic.
3. Throughput Summary
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 91 of 152
Cisco dCloud
Optimization Charts:
1. Compression Summary
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 92 of 152
Cisco dCloud
a. The Traffic Summary Over Time chart displays a graph of the amount of original or optimized traffic, depending on
the selected tab, and you can include pass-through traffic by checking the Pass-Through check box. You can
customize the chart by choosing specific applications to include; the default is all traffic.
One of the nice features here is that you can change the timeframe from the last hour to the last day, week, month or to a custom
duration. You can also choose to download reports in either Excel or PDF formats to share with others. Let us do it now. Click on
the PDF icon in the toolbar.
This will open the file in a separate tab. Do the same for Excel. This will download a Statistics.zip file to the download folder.
For Akamai Connect Caching results we can navigate to Monitor and click on Akamai Connect.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 93 of 152
Cisco dCloud
Here will find additional reports to see the impact that Akamai connect is having. You can also download the PDF like we did for
the previous report to check it out.
NOTE: Encourage follow up one-on-one design session workshops if this overview is part of a demand generation event.
You have obviously not covered many aspects of this solution given time constraints. You would love to come out to your site to
show you how leveraging application optimization capabilities as part of the IWAN solution will create an improved and consistent
experience for your remote site workers.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 94 of 152
Cisco dCloud
Discuss the purpose of each verification command prior to sending the script and reviewing.
Whenever we have public facing interfaces touching the Internet, security is obviously a big concern. Depending on whether or not
there are plans for direct Internet access we can choose between deploying Access-Lists (ACLs) or move forward with a full blown
firewall configuration to protect our edge. You are going to start by looking at BR1-WAN1 as we are not allowing direct Internet
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 95 of 152
Cisco dCloud
access from this remote site. Under these circumstances we have addressed security concerns by leveraging an ACL in the
inbound direction under our G0/0 interface. Let us look at the access-list and its application under the interface now.
• Send script 011. Once complete review the verification output on BR2-WAN1.
BR2-WAN1
The first three lines of configuration are to accommodate encryption. Line 40 permit udp any nay eq bootpc has no application in
our lab, but would be required if receiving DHCP addressing from the provider. The next four lines are to optionally allow ICMP
traffic. Line 90 is also optional and configured to allow traceroute. Line 100 closes out the ACL with an explicit vs. implicit deny ip
any. This has been configured in the lab for troubleshooting purposes and is obviously not required. As you can see the ACL is
applied to the interface using the ip access-group ACL-INET-PUBLIC in command. Rather than using a simple ACL it might be
beneficial to configure a Zone Based Policy Firewall configuration to protect traffic going from the router and coming to the router.
This ensures a consistent configuration across all sites and allows us to simply add Direct Internet Attach capability if it becomes
important in the future.
Let us jump over to Branch 2, BR2-WAN1, and look. Branch 2 has been configured to allow for direct Internet Access for the
internal and Guest Networks. You will focus our attention on the Guest Network VLAN and traffic coming from host PC22 first.
Under these circumstances the Cisco Stateful IOS Zone Based Policy Firewall (ZFW) replaces the static ACL configured on the outside public
interface of this router. The e0/3 internal facing interface is mapped to the same VRF as the outside interface to ensure they share the same
routing table. Each of these two interfaces has then been assigned as a Zone member of a unique Zone. You have configured INSIDE-GUEST
and OUTSIDE as our two Zones. Other interfaces including e0/2, e0/4, Tunnel 100, Tunnel 200 are all configured to be part of zone INSIDE. All
interfaces that belong to the same zone pass traffic without the need for rules or permissions. All interfaces not assigned to a Zone belong to
the default Zone. For our configuration Segments belonging to the same Zone, default or otherwise will allow us to pass traffic between
segments without any issues. Zone to zone traffic such as INSIDE-GUEST to OUTSIDE, OUTSIDE to INSIDE-GUEST, INSIDE to OUTSIDE and
OUTSIDE to INSIDE must be explicitly permitted leveraging a class-map inspect and policy-map inspect configuration framework very similar to
what we are used to with Modular QoS configuration. Notice the keywords type inspect. Let us look at this configuration next.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 96 of 152
Cisco dCloud
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 97 of 152
Cisco dCloud
You will start by looking at how the Zones are defined and then we will examine the class-map policy-map configuration
framework. Rather than applying a service policy to an interface like we do with QoS, we apply a service policy to a Zone-Pair, so
we will look at that next. Last we will look at how the configuration is activated by applying the zones to the interfaces.
• Send script 012. Once complete review the verification output on BR2-WAN1.
BR2-WAN1
Outside of configuring the zone by issuing zone security followed by a unique name, there isn’t much more we need to do as part
of this step.
Figure 166. show run | sec class-map type inspect match-any INSIDE-GUEST output
The only difference between this class-map configuration and the one that we use for QoS are the keywords ‘type inspect’ which
mean that this class-map is to be used with Zone Based Policy Firewall. You can see that we have used match-any vs. match all
and have decided to match on protocols http, https, DNS and ICMP. You have allowed ICMP, but you can be very specific with this
configuration matching on applications or even ACLs to limit what is accessible.
Figure 167. show run | sec policy-map type inspect INSIDE-GUEST output
Again, the only difference between this policy-map configuration and the one that we use for QoS are the keywords ‘type inspect’
which mean that this policy-map is to be used with Zone Based Policy Firewall. After calling on the class-map under the policy-map
we can define the action that we want to take. You can Drop, Pass or Inspect. The difference between Pass and Inspect is
whether we maintain state information for the traffic flows to accommodate return traffic. You have allowed RDP traffic in from the
outside to host PC22 as part of an Outside to Inside classification given that it is completely isolated from our internal network. You
will look at that configuration in just a bit. All other traffic coming from the OUTSIDE will not be allowed to come in unless there is
state information and therefore leverage inspect within this policy going from INSIDE-GUEST to OUTSIDE. Typically you will want
to inspect traffic going between zones. Notice that under the default class class-default we explicitly drop all traffic that does not
match. Dropping traffic for class class-default is the default behavior.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 98 of 152
Cisco dCloud
A zone pair represents two defined zones and identifies the source and destination zones where a unidirectional firewall policy-
map is applied. This configuration uses zone-pair INSIDE-GUEST and this is where our policy-map is applied. Without defining a
class-map, policy-map and zone-pair for OUTSIDE source to INSIDE-GUEST destination, we are only allowing established traffic
originating from INSIDE-GUEST to OUTSIDE to return back through from the OUTSIDE to the INSIDE-GUEST zone segment.
Although we have the classification and policy configured and ready to be applied leveraging our zone-pair, we have yet to assign
interfaces to zones to complete the configuration.
The last step is to enable the firewall by applying the configuration to the interface using the zone-member security zone name
command.
It is important to note that the router itself is defined by Cisco IOS Software using the fixed name self as a separate security Zone.
The Self Zone is the exception to the default deny-all policy. All traffic destined to or originating from the router itself (local traffic)
on any interface is allowed until traffic is explicitly denied using Zone Based Policy firewall rules. In other words, any traffic flowing
directly between defined zones and the router’s IP interface addresses is implicitly allowed and is not initially controlled by zone
firewall policies.
This default behavior of the Self Zone ensures that connectivity to the router’s management interfaces and the function of routing
protocols is maintained when an initial Zone Firewall configuration is applied to the router. Specific rules that control traffic to the
Self Zone are required. When we configure a Zone Based Policy Firewall rule that includes the self zone, traffic between the self
zone and the other defined zones is immediately restricted in both directions. You have this configured since the previous ACL
protection on the external facing interface is no longer valid or relevant. Let us look.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 99 of 152
Cisco dCloud
You will start by taking a look at the ACLs leveraged to classify INSPECT and PASS traffic. You will then see how these are
applied to the class-maps that are then configured under the policy-map ACL-IN-POLICY. Last we will look at the zone-pair
specific to traffic coming in from the OUTSIDE to the external interface Self Zone.
• Send script 013. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 100 of 152
Cisco dCloud
BR2-WAN1
You can quickly see from the output that we have three ACLs configured:
• ACL-RTR-IN
• DHCP-IN
• ESP-IN
DHCP and ESP have intentionally been broken out as they cannot be inspected and must be passed. Let us look at the class-map
configuration next followed by the policy-map configuration for a clearer look.
Figure 172. show run | sec class-map type inspect match-any PASS-ACL-IN output
Figure 173. show run | sec class-map type inspect match-any INSPECT-ACL-IN output
There is nothing new to discuss with this portion of the configuration. You are simply mapping the ACLs to the class-maps for
policy-map assignment.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 101 of 152
Cisco dCloud
Figure 174. show run | sec policy-map type inspect ACL-IN-POLICY output
You inspect the traffic classified in our inspect ACL tied to this first class-map and pass ESP and DHCP traffic as part of the
second class-map as it cannot be inspected and needs to be configured with a “pass” action in the policy, using separate ACL and
class-maps. You have configured log in addition to drop under the default class. You will want to avoid doing this in production.
Next we will look at our policy configuration From Self Zone to Outside.
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 102 of 152
Cisco dCloud
You will start by taking a look at the ACLs leveraged to classify INSPECT and PASS traffic. You will then see how these are
applied to the class-maps that are then configured under the policy-map ACL-OUT-POLICY. Last we will look at the zone-pair
specific to traffic going from the routers Self-Zone to the OUTSIDE Zone.
• Send script 014. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 103 of 152
Cisco dCloud
BR2-WAN1
You can quickly see from the output that we have three ACLs configured:
• ACL-RTR-OUT
• DHCP-OUT
• ESP-OUT
DHCP and ESP have intentionally been broken out as they cannot be inspected and must be passed. ISAKMP should be
configured with the “inspect” action and thus needs to be broken out with a separate ACL and class-maps for inbound and
outbound policies. Port TCP 8080 is being leveraged for communications to Cisco Youb Security (CWS). This Access-list entry
(ACE) could be locked down further and has been left loose given that this is a lab environment. Let us look at the class-map
configuration next followed by the policy-map configuration for a more detailed look.
Figure 178. show run | sec class-map type inspect match-any PASS-ACL-OUT output
Figure 179. show run | sec class-map type inspect match-any INSPECT-ACL-OUT output
There is nothing new to discuss with this portion of the configuration. You are simply mapping the ACLs to the class-maps for
policy-map assignment.
Figure 180. show run | sec policy-map type inspect ACL-OUT-POLICY output
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 104 of 152
Cisco dCloud
You inspect the traffic classified in our inspect ACL tied to this first class-map and pass ESP and DHCP traffic as part of the
second class-map as it cannot be inspected and needs to be configured with a “pass” action in the policy, using separate ACL and
class-maps.
With the firewall configuration in place we are now protected and ready to allow guest users Internet access. The only challenge
that remains is that we are using non-routable 198.19.2.128/25 addressing internally and therefore need to use NAT to overload to
the outside E0/0 interface IP address.
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 105 of 152
Cisco dCloud
You will start by looking at the global NAT configuration and then will look under the interfaces to see how interfaces are enabled
to take part in NAT.
• Send script 015. Once complete review the verification output on BR2-WAN1.
BR2-WAN1
You can see that we are using traditional NAT and have configured an Inside to Outside translation. Notice that we are referencing
a source list GUEST-NAT which is the classification ACL matching 198.19.2.128/25. At the end of the NAT statement prior to
specifying the overload command, we specify that this configuration is tied to the VRF ISP1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 106 of 152
Cisco dCloud
The last step is to specify the ip nat inside and ip nat outside statements under the interfaces.
Our next step is to perform verification. Leverage the RDP shortcut on jumpbox PC01 to connect to PC22 in BR2 by double
clicking on it. Access to this PC is actually going out of our simulated Internet in HQ-DC and to a NAT translation for RDP on the
BR2-WAN1 Router as this host is completed isolated from the rest of our network for security purposes.
Open up a browser and perform some Google searches. You can also navigate to your favorite site or join the WebEx that you
started on PC011 in Branch 1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 107 of 152
Cisco dCloud
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 108 of 152
Cisco dCloud
You will start by looking at the NAT translations and specifically those for VRF ISP1. Next we will issue the show policy-map type
inspect zone-pair sessions command to see what sessions are in the works.
• Send script 016. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 109 of 152
Cisco dCloud
BR2-WAN1
You can see that we are effectively PATing to outside interface from host 198.19.2.222.
Figure 189. show policy-map type inspect zone-pair sessions output (Truncated)
You can see from the output that we are hitting the classes and currently have sessions open and established.
Let us review the Direct Internet Attach configuration for the internal network use case next.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 110 of 152
Cisco dCloud
You saw Cisco Cloud Youb Security working already as we performed Google searches on Guest PC22, but Let us look at this a
little more closely by navigating to some blocked sites. You will also review the configuration that made this solution integration
possible.
Open up a new tab in Chrome on Guest PC22 and do a search for gambling usa
As you can see, sites on the history of gambling or gambling law are permitted while gambling sites are blocked. Click on one of
the links with a next to it to view the error that you get.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 111 of 152
Cisco dCloud
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 112 of 152
Cisco dCloud
Now that we have seen content security capabilities in action, Let us look at the configuration on the router. You will start by
looking at the global configuration followed by how we apply it to the external interface. You will then run a few verification
commands.
• Send script 017. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 113 of 152
Cisco dCloud
BR2-WAN1
As you can see we have already created the ‘INSIDE’ zone. You have put a note in the description of the zone to ensure that we
don’t forget to add the security zone to the tunnels.
Figure 194. show run | sec class-map type inspect match-any INSIDE_TO_OUTSIDE_CMAP
You have classified the majority of the traffic out there with this class-map.
Figure 196. Show run | sec zone-pair security INSIDE_TO_OUTSIDE source INSIDE destination OUTSIDE
Last to final step in the firewall configuration prior to assigning the zone configuration to the interfaces was to create the zone-pair
which is where we apply the policy.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 114 of 152
Cisco dCloud
The last step was to apply the configuration under the interface using the zone-member security command.
Even the firewall is in place for the internal users, we are not using it. The default route is being learned via EIGRP and points back
out of the tunnel interface. Even after we add that static route pointing out of the interface and to the next hop PE address, we still
will not be able to translate the internal addressing to external addressing without configuring NAT. Also, remember, we need to
leverage PBR to get the return traffic back in from the VRF table into the global table.
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
• sh ip access-list VLAN-INT
• sh ip access-list INET-VLAN-INTVRF-RETURN-FROM-NAT
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 115 of 152
Cisco dCloud
You will look at the access-list leveraged to classify internal traffic for NAT and then at our ip nat statement that is overloading to
the e0/0 interface. You will then look at the access-list being leveraged as part of the PBR route-map to look at the originating
source IP information to that will be set to return to the global routing table.
• Send script 019. Once complete review the verification output on BR2-WAN1.
BR2-WAN1
As you can see we are matching on the internal networks 198.19.2.0 and 198.20.2.0.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 116 of 152
Cisco dCloud
You have added inside to outside NAT/PAT statement to overload to e0/0. It is important to note we have yet to include a default
route pointing out of this interface to the next hop IP, so this statement along with adding ip nat inside to e0/2 and e1/0 does
nothing at this time.
Figure 200. show run ip access-list (for PBR) and PBR configuration output
Once we do decide to add the ip route pointing out locally we will need to bring the traffic back from the VRF into the global table
after passing Zone Based Policy Firewall and NAT rules. Notice the set global command.
Applying PBR is as simple using ip policy route-map to apply the route-map under the interface where the traffic ingresses.
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
• sh ip route
• config t
• sh ip route
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 117 of 152
Cisco dCloud
Script 20 and 21 are used to add and remove the static route pointing out of the direct Internet attached interface. Let us add the
route now, test connectivity out and then remove the route once we are done.
• Send script 020. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 118 of 152
Cisco dCloud
BR2-WAN1
Figure 203. show run | sec cws global and sh run interface e0/0 | in int|cws output
As you can see the configuration matches what we reviewed in the PowerPoint portion of this design clinic. You are leveraging the
group ‘iwan-lab’ to get our policy from the CWS portal.
Figure 204. show cws session active and show cws session history X output
It makes more sense to view the session information from the CWS portal, but at least you can see that it is working from the
router itself and CLI can be used to troubleshoot if absolutely necessary.
th
After launching Chrome on Guest PC22 the 4 tab from the left will be a CWS verification provided by navigating to
http://whoami.scansafe.net again we see that we are leveraging the ‘iwan-lab’ group to obtain our policy.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 119 of 152
Cisco dCloud
th
Let us navigate to the CWS portal next by looking at the 5 and last tab from the left. The username and password information to
log into CWS with the username/password of [email protected] / %C1sco12345
When we first login we will presented with three main areas of focus:
• Reports
• Dashboard
• Youb Policy
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 120 of 152
Cisco dCloud
Click on the > after Reports and expand the IWAN Mega Lab folder. Click the download button to download and review each of
the reports briefly. These are some custom reports that filter the output to be specific to this demo’s instance. (Several dCloud
demos use the CWS account. The normal reports will return results encompassing all of these accounts. These custom reports will
focus on this demo’s traffic.)
Next we will click on the Dashboard selection within the menu at the top to see All Blocks. You can also leverage the drop down
menu in the right hand corner to view Facebook Usage, Spyware Blocks, Youb Filter Blocks and Youb Virus Blocks.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 121 of 152
Cisco dCloud
Let us click on the Youb Filtering option within the menu at the top next. From this output we see that group “iwan-lab” uses filter
“iwan2” for controlling content. Let us choose the filters selection under the Management sub-menu to see what has been
configured under this filter.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 122 of 152
Cisco dCloud
Here you can see that we are filtering the common stuff, but have many filtering options available.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 123 of 152
Cisco dCloud
Up until now we have been centralizing all Internet connectivity for our inside users and forcing them to come back to HQ-DC
through the gateway there. Let us review the Zone Based Policy Firewall configuration we have in place for preparation of the
Direct Internet Attach Internal User use case.
• Select BR2-WAN1.
Discuss the purpose of each verification command prior to sending the script and reviewing.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 124 of 152
Cisco dCloud
• Send script 018. Once complete review the verification output on BR2-WAN1.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 125 of 152
Cisco dCloud
BR2-WAN1
You add the route that points out of the interface and to the next hop IP address of the PE. You have also leveraged a track
statement that is configured on this router and that tracks reachability so we can use the route through the tunnel in situations
where the interface might still be up, but reachability is down. Notice that the new route is now static.
Go to PC21, open DOS and do a tracert –d 198.51.100.9 to the next hop PE. Browse the net if you want.
Load and send script 021_Remove_Internal_DIA_Default_Route_BR2 to BR2-WAN1 and verify everything is back to normal.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 126 of 152
Cisco dCloud
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 127 of 152
Cisco dCloud
NOTE: Encourage a follow up one-on-one design workshops if this overview is part of a demand generation event.
Again, we can’t cover everything today, but we would love to come in to show you how to leverage distributed Internet for your
workforce in addition to your guest users. There are many design points we can cover based on your needs. Keep in mind that we
are still working to get the cloud connector functionality on the ISR4K and availability is right around the corner. This has been a
journey and although we have been doing the CWS Cloud Connector on ISRG2s and ASAs for quite some time we are finalizing
QA testing on the ISR4K line. “
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 128 of 152
Cisco dCloud
1. Highlight the Dynamic Network Topology view and the IWAN wizard deployment of BR3 WAN edge to illustrate how the
repetitive nature of the configuration is used to simplify the deployment.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 129 of 152
Cisco dCloud
BR3-WAN1
1. Enter sh ip int br to confirm that the BR3-WAN1 configuration is leveraging the base configuration.
2. If you see Tunnel interfaces, reset and reload the base configuration by sending the script
_Reset_Branch3_To_Base_Configuration
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 130 of 152
Cisco dCloud
3. Once the router is back up, navigate to the Network Device List in Prime Infrastructure. Check the box next to BR3-WAN1 and
click Sync.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 131 of 152
Cisco dCloud
5. Point out the Network Topology found under Maps. BR3 is not connected.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 132 of 152
Cisco dCloud
8. Choose to deploy an IWAN Branch and Single Router and select the CUSTOM templates.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 133 of 152
Cisco dCloud
NOTE: There are several options built in and more customized options that can be defined and available for selection based on
individual use cases. This lab allows you to deploy some or all of the IWAN building blocks. This example deploys all using custom
templates built using the repetitive configuration for each spoke.
9. Select BR3-WAN1 from the list. Click Next at the bottom of the screen.
10. On the feature tab, enter unique information for BR3-WAN1. The tab includes default information, which can be adjusted
depending on the branch and bandwidth value.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 134 of 152
Cisco dCloud
11. Click Apply and then click on the CLI Preview Tab to review the choices.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 135 of 152
Cisco dCloud
13. The PfR configuration section displays. Select BR3-WAN1 from the list.
14. Select the Feature tab and enter the IP address of the loopback of the MC – 172.31.0.5 and the PfRv3 Authentication
password (CISCO).
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 136 of 152
Cisco dCloud
18. Select the Feature tab. Defaults values exist for the interface role (LAN/WAN) and the Bandwidth parameters for the Internet
and MPLS Links.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 137 of 152
Cisco dCloud
21. AVC needs no configuration. Review the CLI Preview and click Next.
NOTE: The configuration is applied in the terminal window of BR3-WAN1. Do not leave the IWAN Wizard page until the
deployment has completed.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 138 of 152
Cisco dCloud
23. When deployment complete, navigate to your Network Device List in Prime Infrastructure and sync BR3-WAN1.
25. When the sync is complete, navigate to the Network topology view under Maps.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 139 of 152
Cisco dCloud
Let us change the layout to Hierarchical and Expand the view by clicking the + icon.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 140 of 152
Cisco dCloud
26. This should be a powerful demonstration of the ability of Prime Infrastructure to simplify the configuration and deployment.
Issue a few of the scripts on BR3-WAN1 (000, 001, 002, 003, 004, 005, etc.) for further illustration.
Figure 242. Load and Run 000, 001, 002, 003, 004, 005 scripts
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 141 of 152
Cisco dCloud
LiveAction
1. RDP to PC11 in Branch 2, 198.19.2.11 by leveraging the RDP shortcut on PC01. If prompted, login as
administrator/C1sco12345.
2. The WAN Impairment application should be up and running. If it is not, double click the WAN Impairment Toggle icon on the
desktop of PC11. The window toggles the WAN impairment On/Off throughout this demonstration.
NOTE: The WAN Impairment window might not properly load its first time started. If it shows up as just a grey screen or if the
countdown timer reads 0 seconds, close the script and re-launch it per the shortcut on the desktop. If possible, check the state of
the WAN Impairment Toggle window an hour prior to presenting this demonstration, as this application is what causes PfR to make
changes to the routing paths in the network.
By default, the WAN Impairment Toggle application is set to add and then remove packet loss impairment for DSCP ef and af41
traffic to the MPLS path through the network from Branch 1 to simulate a brownout condition. This creates periods of optimal and
suboptimal routing through the network for PfRv3 to manage and for LiveAction to report on. If you need to turn the impairment off,
bear in mind that it may take a few minutes for PfR to change the network’s pathing state. This is by design and leveraged to avoid
impact associated with flapping situations. You will simply need to make sure that the Cycle Toggling the Impairment is
unchecked and that the WAN Impairment State is Off to bring the MPLS network back to a healthy state.
3. Return to Jumpbox PC01 and double click the LiveAction icon on the desktop. This application takes a while to load. If
possible, login to it prior to presenting the workshop.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 142 of 152
Cisco dCloud
LiveAction is Cisco’s preferred management platform for IWAN end-to-end flow visualization. LiveAction supports PfRv3 and adds
PfR dashboard, workflows, and configuration function - in addition to PfR path change visualization. This functionality allows
businesses to take advantage of the improved path control in PfRv3, faster troubleshooting, and large-scale configuration and
change management functions.
4. After login, navigate to the flow tab located just below the high-level menu options and within the topology preview window.
Each smaller circle within the large circle represents an interface. The top half of the smaller circle is ingress and the bottom half is
egress.
NOTE: If no flows are present, or the nodes are grayed out, right click each node and select Refresh Device.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 143 of 152
Cisco dCloud
6. Right click on the circle and choose Zoom to Device to make it appear bigger. Use the +/- magnifier icon buttons to zoom
back out or back in.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 144 of 152
Cisco dCloud
8. From the Flow tab, select the *DefaultFilterGroup option from the Filter dropdown menu. Click the Refresh icon available
as one of the Flow tab options to update the topology with flows.
9. The arrows between the devices represent traffic flows going through the network. Mouse over a merged flow for more
information about these conversations (source, destination, port number, bytes, etc.).
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 145 of 152
Cisco dCloud
10. Click on the Table icon next to the Refresh icon for a tabular list of all of the flows.
11. Click on the All Flow Types dropdown to display the different flow filters available. Select All Flow Types.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 146 of 152
Cisco dCloud
Real traffic flows display activity in the environment. You can create custom filters to target (or remove) certain traffic patterns from
the LiveAction topology display.
12. On the Filter dropdown menu, select the *PfR-Default-HideSmartProbes filter to remove any flows related to PfR’s smart
probes.
13. With the traffic filter set, select the color pattern used to identify the different flows. Select DSCP from the Color Filter
dropdown menu to organize and color the flows displayed by their DSCP values.
14. If the screen does not automatically refresh, click the Refresh button to update the LiveAction topology.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 147 of 152
Cisco dCloud
During normal operations, we can see that traffic is being load balanced (default PfR behavior) across both the Internet and MPLS
networks between the branch locations and HQ. At this point, there are several traffic flows between each location and HQ-DC.
15. Point out the direction EF traffic (shown in dark blue), is taking as it intelligently routes through the network. Light blue
represents the best effort (BE) class.
NOTE: This might vary if you have not turned off the WAN Impairment tool. You may want to turn off WAN impairment prior to the
PfRv3 Live portion of the design workshop.
16. Look at the Dashboard view to for PfR details. Click on Dashboard in the upper left-hand side of the screen.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 148 of 152
Cisco dCloud
17. From there we will click on the WAN-PfR Dashboard option at the very right. Select the 1hr or 4hr time range in the upper
right-hand corner of the dashboard.
Let us review a simple three-step process for troubleshooting a service provider brownout and how PfRv3 reroutes the application
traffic over the backup path.
18. In the Top 10 Alerts by Site Pair section of this Dashboard (in the upper right-hand corner), double-click the Branch-1 to HQ
Alert bar option.
19. This Alerts by Site Pair report shows periods of normal and impaired traffic flow. Your display will be different as this report is
depending on when the WAN Impairment Toggle script toggled the impairment on and off.
20. For best viewing, select 1h or 6h from the time ranges in the top right corner of the window and then click Execute Report.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 149 of 152
Cisco dCloud
21. In the lower part of the window right-click Branch-1 and navigate to Drill Down on Specific Flow > Alerts by App Group
(DSCP) Report.
22. Select a time range, 1h or 6h, and click Execute Report. This shows VIDEO and VOICE traffic having packet loss.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 150 of 152
Cisco dCloud
23. Right-click VOICE and navigate to Drill Down on Specific Flow > Alerts by Service Provider Report to find out which
service provider is causing the issue.
24. The Alert by Service Provider report shows that MPLS service provider is the one having the packet loss problem.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 151 of 152
Cisco dCloud
25. The following workflow identifies the site-to-site alert characteristic, the applications affected and the service provider having
the network issues.
26. Close out the session with the Next Steps slide. Provide the link to the survey and information on how customers can go about
scheduling a follow up one-on-one design session with the team. Let the customer know that we will be sending them the Box
Folder invitation to access all of the presentation content (PDF format of PPT, Diagrams, Running Configurations) based on
survey responses.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 152 of 152