0% found this document useful (0 votes)
143 views

SD Wan Guide Line

Uploaded by

Akash Tiwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
143 views

SD Wan Guide Line

Uploaded by

Akash Tiwari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Cisco Extended Enterprise SD-WAN

Design Guide
January 2020

Cisco Systems, Inc. www.cisco.com


THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS DESCRIBED IN THIS DOCUMENT ARE SUBJECT TO
CHANGE WITHOUT NOTICE. THIS DOCUMENT IS PROVIDED “AS IS.”
ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENT ARE PRESENTED WITHOUT WARRANTY
OF ANY KIND, EXPRESS, IMPLIED, OR STATUTORY INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR
TRADE PRACTICE. IN NO EVENT SHALL CISCO BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, PUNITIVE,
EXEMPLARY, OR INCIDENTAL DAMAGES UNDER ANY THEORY OF LIABILITY, INCLUDING WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OF OR INABILITY TO USE THIS DOCUMENT, EVEN IF
CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for
the latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at
www.cisco.com/go/offices.
©
2020 CISCO SYSTEMS, INC. ALL RIGHTS RESERVED

ii
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Scope and Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Why Extend SD-WAN to IoT Edge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Remote Point-of-Sale Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Direct Internet Access and SD-WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Warehouses and Distribution Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Unique Value Propositions of the CVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Extended Enterprise Solution Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Solution Design Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Solution Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Cisco Validated Hardware and Software Components . . . . . . . . . . . . . . . . . . . . . . 7
Cisco SD-WAN Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Non-carpeted Remote Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
IOS XE SD-WAN Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
WAN Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Service Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
SD-WAN Deployment Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Cloud Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
On-Prem Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Multi-Tenancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Overlay Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Hub-and-Spoke Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Non-Carpeted Remote Sites Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Very Small Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Transport Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Service Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Small Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Transport Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Service Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Medium Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Transport Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Cisco Systems, Inc. www.cisco.com

iii
Service Side. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Large Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Transport Side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Service Side. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Message Flow Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Onboarding Cisco IR1101 with Plug and Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Onboarding Cisco IR1101 with Bootstrap Configuration. . . . . . . . . . . . . . . . . . . . . . 24
Security Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Authenticity of Cisco IR1101 IOS XE SD-WAN Router . . . . . . . . . . . . . . . . . . . . . . . 24
Secure Control Channel between IOS XE SD-WAN Router and vManage . . . . . . . . 25
Secure Data Communication Channel between IOS XE SD-WAN Routers . . . . . . . . 25
Segmenting Data Traffic among Different Services . . . . . . . . . . . . . . . . . . . . . . . . . 26
Filtering Undesired Traffic and Directing Traffic to Firewalls with ACLs. . . . . . . . . . . 27
User and Device Profiles and Design Recommendations . . . . . . . . . . . . . . . . . . . . . 27
QoS Design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
SD-WAN QoS Design Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Order of Applying Polices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
SD-WAN QoS Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Comply SLA over WAN with Application Aware Routing . . . . . . . . . . . . . . . . . . . . . 32
Scale and Dimension. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
SD-WAN Controller Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Remote Sites Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Server Hardware Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Cisco vManage Single-Pane-of-Glass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Events and Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Network Monitoring and Assurance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Sotware Image Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
vAnalytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

iv
Cisco Extended Enterprise SD-WAN
Design Guide
Introduction
Extended enterprise is the extension of enterprise network to non-carpeted spaces in harsh environments that can span
across geographies. Typical examples include remote point-of-sale (POS), warehouses, distribution centers, remote
sites, kiosks, remote ATM sites, production centers, storage spaces, and outdoor spaces, all connected over private or
public Wide Area Networks (WAN) networks. This requires thousands of miles of remotely located assets to be managed
alongside information technology (IT) infrastructure with a central management platform as the single pane of glass.

The enterprise landscape is continuously evolving. Businesses are embracing digital transformation and rapidly adopting
technology to increase productivity, reduce costs, and transform the customer experience. Legacy WAN architectures
are facing major challenges under this evolving landscape. Legacy WAN architectures typically consist of multiple MPLS
transports, or an MPLS paired with an Internet or LTE used in an active/standby fashion, most often with Internet or
software-as-a-service (SaaS) traffic being backhauled to a central data center or regional hub for Internet access. Issues
with these architectures include inefficient bandwidth usage, high bandwidth costs, application downtime, poor SaaS
performance, complex operations, complex workflows for cloud connectivity, long deployment times and policy
changes, limited application visibility, and difficulty in securing the network.

Customers are using a fragmented WAN to support critical business functions. Multiple connections were being
controlled by several routers, all from different service providers. This created a complex IT environment where
applications were manually rerouted in case of link failure. The proposed extended enterprise Software-Defined Wide
Area Networking (SD-WAN) solution in this Cisco Validated Design (CVD) is based on the principles of Software Defined
Access (SDA).

SD-WAN is part of a broader technology of software-defined networking (SDN). SDN is a centralized approach to
network management which abstracts the underlying network infrastructure from its applications. This decoupling of data
plane forwarding and control plane allows customers to centralize the intelligence of the network and allows for more
network automation, operations simplification, and centralized provisioning, monitoring, and troubleshooting. Cisco
SD-WAN applies these principles of SDN to the WAN.

Customers can quickly establish Cisco SD-WAN overlay fabric to connect data centers, branches, campuses, and
colocation facilities to improve network speed, security, and efficiency. Cisco SD-WAN is an on-prem and
cloud-delivered, highly-automated, secure, scalable, and application-aware with rich analytics.

This CVD outlines the steps for both IT and operations teams to accomplish their business goals by realizing unified
SD-WAN-based management for enterprise and extended enterprise deployments with the Cisco IR1101 Integrated
Services Router Rugged (Cisco IR1101).

Scope and Audience


This design guide provides an overview of the requirements driving the evolution of extended enterprise network designs
followed by a discussion of the latest technologies and designs that are available for building an extended network to
address those requirements. It is a companion to the associated Implementation Guides (IGs) for Extended Enterprise
networks, which provide configurations explaining how to deploy the most common implementations of the designs
described in this guide. The intended audience includes technical decision makers, solution architects, and field

Cisco Systems, Inc. www.cisco.com

1
Cisco Extended Enterprise SD-WAN Design Guide

Introduction

personnel who want to understand the Cisco extended enterprise solution offerings, the available technology options,
reference design blueprints, and the leading practices for designing the best network for the needs of an extended
enterprise.

This guide provides:

 A reference design for extending the enterprise network with the Cisco SD-WAN to remote non-carpeted locations.

 Design of a centralized policy matrix using the Cisco SD-WAN.

 Design details for segmentation of extended enterprise endpoint points such as cameras, phones, laptops, and
others.

 The companion implementation guide provides step-by-step guidance on how to deploy and manage Cisco IR1101
IOS XE SD-WAN ruggedized router devices using the Cisco SD-WAN.

For associated deployment guides, design guides, and white papers, see the following URLs and References, page 35:

 Cisco Enterprise Networking design guides:


https://www.cisco.com/go/designzone

 Cisco Enterprise SD-WAN design guides:


https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf

 Cisco IoT Solutions design guides:


https://www.cisco.com/go/iotcvd

 Cisco extended enterprise solution overview, design guides, and implementation guides:

— https://www.cisco.com/c/en/us/solutions/enterprise/design-zone-industry-solutions/index.html#~stickynav=1

— https://www.cisco.com/go/extendedenterprise

Why Extend SD-WAN to IoT Edge


The traditional role of the WAN was to connect users at the branch or campus to applications hosted on servers in the
data center. Dedicated MPLS circuits were used to help ensure security and reliable connectivity. This no longer works
in a digital world where applications are moving out of the data center into the cloud, and the users consuming those
applications are increasingly mobile and using a diverse set of traditional IT and IoT endpoint devices.

The Cisco SD-WAN solution is an enterprise-grade WAN architecture overlay that enables digital and cloud
transformation for enterprises. It fully integrates routing, security, centralized policy, and orchestration into large-scale
networks. It is cloud-delivered, highly-automated, secure, scalable, and application-aware with rich analytics. The Cisco
SD-WAN technology addresses the problems and challenges of common WAN deployments. Some of the benefits
include:

 Centralized management and policy management, as well as operational simplicity, resulting in reduced change
control and deployment times.

 A mix of MPLS and low-cost broadband or any combination of transports in an active/active fashion, optimizing
capacity and reducing bandwidth costs.

 A transport-independent overlay that extends to the data center, branch, or cloud.

 Deployment flexibility. Due to the separation of the control plane and data plane, controllers can be deployed on
premises, in the cloud, or in a combination of both.

 Robust and comprehensive security, which includes strong encryption of data, end-to-end network segmentation,
router and controller certificate identity with a zero-trust security model, control plane protection, application
firewall, and other network services.

2
Cisco Extended Enterprise SD-WAN Design Guide

Introduction

 Seamless connectivity to the public cloud and movement of the WAN edge to the branch.

 Application visibility and recognition and application-aware policies with real-time service-level agreement (SLA)
enforcement.

 Rich analytics with visibility into applications and infrastructure, which enables rapid troubleshooting and assists in
forecasting and analysis for effective resource planning.

Enterprise IT prefers to have seamless WAN connectivity, management, and uniform security policies across all carpeted
and non-carpeted enterprise remote WAN locations, which requires extending the reach of SD-WAN.

Use Cases
Figure 1 illustrates various customer objectives and challenges in digitizing extended enterprise environments. A few
example use cases are discussed below.

Figure 1 Customer Objectives and Challenges in Digitizing Extended Enterprise Environments

Customer objectives Customer challenges

1. Reduce security 2. Gain 3. Extend connectivity 4. Meet 5. Innovate 1. Security 2. IT + OT 3. ROI 4. Control and 5. Business process –
risk for devices in speed and to rugged, compliance and and concerns complexity people - tech – digital
noncarpeted areas agility noncarpeted areas regulatory goals dierentiate twins

Remote ATMs Warehouses Distribution centers Ports Remote POS

258554
Remote Point-of-Sale Systems
With the advent of cloud computing, cloud-based POS systems serve businesses across energy, utility, retail, wholesale,
healthcare, hospitality, sports industries, and so on. Many companies would like to set up remote POS systems in several
locations for their customers to make payments for products, services, and utilities. At the authorized payment locations,
customers can conveniently pay using several different forms of payment. Multiple endpoints such as payment machines,
cameras, and emergency alarm systems are deployed at the POS location. Due to complete dependency of site
operations on WAN connectivity, these remote POS systems require redundant WAN links (LTE/Internet) connecting
enterprise backhaul.

However, the remote POS systems require ruggedized networking products because often they are in areas that are
dusty, damp, or without air conditioning. Being located in harsh environments, ruggedized SD-WAN compatible WAN
routers such as Cisco IR1101 with redundant WAN connectivity are the preferred choice for these deployments.

Direct Internet Access and SD-WAN


Today, Direct Internet Access (DIA) is more economical than traditional MPLS and leased lines. With many applications
moving to cloud, it makes more sense to reach out to the cloud applications with a local Internet breakout (DIA) than a
traditional centralized data center approach for enterprise Internet connectivity. This model is being adopted by many

3
Cisco Extended Enterprise SD-WAN Design Guide

Introduction

enterprises. Another prominent use case is site-to-site mesh connectivity between remotes sites. All these bring in the
need for additional security at the branch office and a policy-based centralized WAN management model. Other needs
for these remote sites/branches are redundant LTE WAN links over secured private APN. Often these remote sites are
located in non-carpeted spaces. The Cisco IR1101 is a ruggedized SD-WAN compatible WAN router that becomes the
default choice for such extended enterprise deployments.

Warehouses and Distribution Centers


Many eCommerce companies have warehouses spread across the globe. Often located in remote locations, these
warehouses need redundant and secure WAN connectivity of different topologies between them. The harsh
environmental conditions, need for policy driven interconnect options, and need for redundant LTE WAN connectivity
prevailing in these extended enterprise deployments make the Cisco IR1101 a highly suitable choice.

Unique Value Propositions of the CVD


The extended enterprise SD-WAN solution, which is documented in this design guide, provides a design foundation for
incorporating a broad set of technologies, features, and applications to help customers extend enterprise IT services to
remote outdoor spaces. This CVD incorporates industry best practices to solve targeted common customer use cases.
Most important, the proposed design has been comprehensively validated by Cisco engineers to help ensure a faster,
reliable, and fully predictable deployment.

The unique value propositions of this CVD are:

 The design and deployment details in the CVD are tailored explicitly for extended enterprise WAN management use
cases.

 The CVD proposes cost effective and generic design blueprints for WAN connected extended enterprise use cases.

 The CVD evaluates usage of LTE WAN as an alternative for expensive MPLS.

 The solution in this CVD features the following:

— Unified template and policy driven management

— Multi-topology (star and hub-and-spoke) WAN interconnections

— WAN redundancy including LTE and Internet

— Multi-services (voice, video, and data) network

— End-to-end security (device integrity, device authentication, secured data channel, secured control channel,
segmentation, firewall, and intrusion detection)

— Scalable architecture for both control and data

— Supports multiple deployment options for management, data center, and remote site

— Ruggedized routers and switches for outdoor deployments

Additional value adds of the CVD due to the choice of solution components such as Cisco IR1101, Cisco SD-WAN
management, and Cisco IE switches include:

 Cisco IR1101 is a ruggedized SD-WAN compatible WAN router suitable for extended enterprise deployments.

 Due to their cost effectiveness and availability, LTE (backward compatible) connections are preferred over
MPLS/leased lines in most of the remote site locations of extended enterprise. Also, dual LTE (primary and backup)
WAN transport including private APN are important value adds. Availability of dual LTE and dual SIM in Cisco IR1101
makes it a default choice for extended enterprise.

 Use of ruggedized IE switches on the service side in the remote sites caters to non-carpeted deployment needs.
Using OSPF/EiGRP as the service side routing protocol adds additional flexibility in management and scale.

4
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

 Single-pane-of-glass management for enterprise and extended enterprise SD-WAN is an important customer
requirement. This CVD leverages a common SD-WAN controller for managing both enterprise WAN network with
vEdge WAN routers and extended enterprise networks with Cisco IR1101 WAN routers.

 Both on-prem and cloud deployed Cisco vManage are part of the CVD.

Extended Enterprise Solution Design


The extended enterprise SD-WAN design is flexible enough to suit any harsh outdoor requirement. There is no “one size
fits all.” This document serves as a reference design for typical very small, small, medium, and large remote site
requirements.

This section discusses the design considerations and the solution architecture of extended enterprise.

Design Considerations
The following are design considerations for the extended enterprise SD-WAN solution:

 Extended enterprise locations have harsh outdoor environments. Thus devices used in these deployments need to
be ruggedized.

 This extended enterprise design guide serves as a reference design/blueprint for different extended enterprise
SD-WAN deployments.

 As an extension to the enterprise network, extended enterprise is a brown field deployment with the following
considerations:

— Entire network is IT managed, with a single-pane-of-glass management for the enterprise and extended
enterprise network.

— Common infrastructure (backhaul network, DHCP, DNS, NMS, firewalls, and internet connection) is shared by
both the enterprise and extended enterprise.

— Security and QoS policies of the enterprise should be extendable to the extended enterprise.

— Scaling and dimensioning considerations of the enterprise infrastructure need to consider the extended
enterprise.

 Being geographically dispersed across campuses and cities, the extended enterprise requires a distributed solution
architecture. Different deployment examples include campus and branch, kiosks, service desks, etc.

 Support for different logical topologies for communication including peer-to-peer, hub-and-spoke, and mesh
networks.

 Extended enterprise security considerations include policy-driven authentication of network devices, access control,
and isolation of networks and services.

 Scaling considerations include a cost effective incremental/modular architecture that suits different network sizes.

 WAN link optimization considerations:

— Optimal usage WAN links for reducing OPEX is essential.

— Appropriate choice of WAN links for different traffic types according to their traffic requirement and dynamic
WAN link condition.

— Differentiated QoS treatment for different extended enterprise traffic types matching their traffic characteristics.

5
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

 Appropriate design for high-availability and resiliency at various levels in the network is needed.

 Overall simplicity is important and ease of deployment (plug-and-play) for network devices and management should
be considered.

Solution Design Overview


Figure 2 shows the extended enterprise cloud-hosted SD-WAN solution architecture and Figure 6 shows on-prem
hosted extended enterprise SD-WAN solution architecture.

6
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Figure 2 Extended Enterprise Cloud Hosted SD-WAN Solution Architecture

Cisco PNP Connect Cisco PNP


(Day0 automation) Connect

Cloud hosted
Cloud hosted applications
Applications

Public/Private Cloud Internet Firewall

Cisco Unified Communications


vManage
Manager / Cisco Video
Surveillance Manager
Cisco DMZ
vBond vSmart Data Center
Firewall
Cloud hosted SD -WAN QFP

DC Switch
SD-WAN Cloud
Data Center QFP
IOS XE SD-WAN router

Internet

LTE

Internet Internet

Cellular
Cellular
Cellular
WAN Connectivity
Remote Site-1 Remote Site-K Remote Site-N
Transport Side GE WAN
FE Cisco IR1101 IOS vEdg
vEdge
IOS XE SD-WAN router Cisco IR1101 IOS 100
XE SD-WAN router
XE SD-WAN router
FE LAN FE LAN
L2 Switch
IE2000/4000/5000 IE2000/4000/5000
Service router / Switch Cat IE 3x00 Series
Cat IE 3x00 Series
Service Side

258517
Carpeted Remote Sites
Non-Carpeted Remote Sites

Solution Components
The overall Cisco SD-WAN solution is an overlay that integrates routing, security, policy driven management, and
orchestration of a large WAN network. Different components in the Cisco SD-WAN extended enterprise network include
the SD-WAN controllers, network data center, non-carpeted remote sites, the WAN routers (CE router), and the transport
side and service side networks of the CE router. In extended enterprise Cisco SD-WAN architecture, the Cisco IR1101
is positioned as the CE router or IOS XE SD-WAN router.

Cisco Validated Hardware and Software Components


The hardware and software components validated for extended enterprise SD-WAN solution are shown in Table 1.

7
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Table 1 Extended Enterprise SD-WAN Hardware and Software Components

Role Cisco Platform Version Description


Data center WAN Cisco ISR4321 IOS XE SD-WAN Cisco 4000 family ISRs support SDWAN feature
routers 16.12.1d with diverse WAN transport. Refer to the
enterprise guide for other Cisco SD-WAN
compatible routers.
Extended enterprise Cisco IR1101, IOS XE SD-WAN Rugged Integrated Services Router with Dual
remote site WAN Expansion module 16.12.1 LTE, Dual SIM, SDWAN managed, Edge
routers compute, and GPS

Extended enterprise Cisco IE 2000, Cisco IE 15.2(7)E0 Ruggedized Industrial Ethernet Switches with
Service Side 4000, Cisco IE 5000 PoE capability
Switch/Router series
Cisco Catalyst IE 3200, 16.12.1
Cisco Catalyst IE 3300,
Cisco Catalyst IE 3400
series
SD-WAN controller vBond, vSmart, 19.2 Software defined Wide Area Network.
vManage (SD-WAN) is part of software-defined
networking (SDN) technology. SDN is a
centralized approach for network management
which abstracts the underlying network
infrastructure from its applications. SD-WAN
applies these principles to WAN.

Cisco SD-WAN Controllers


The Cisco SD-WAN Controllers have three components:

 Cisco vBond orchestrator assists in plug-and-play provisioning of the Cisco IR1101 IOS XE SD-WAN routers and
onboarding them into the SD-WAN overlay. The orchestrator is the first point of authentication following a white-list
model. The orchestration plane assists in automatic onboarding of the known SD-WAN routers into the SD-WAN
overlay. It also orchestrates the secure data plane connectivity between the IOS XE SD-WAN router by distributing
crypto key information, allowing for a very scalable, IKE-less architecture. The Cisco vBond orchestrator informs the
list of vSmart and vManage components to the Cisco IR1101 IOS XE SD-WAN routers. Being the first to be contacted
by IOS XE SD-WAN router, vBond requires a public IP. This is a critical component in the system and therefore
requires redundancy.

 Cisco vManage NMS is the centralized manager responsible for all provisioning, configurations, dashboards for
monitoring, analytics, and maintenance of the entire SD-WAN network including the SD-WAN management
components and Cisco IR1101 IOS XE SD-WAN routers. Cisco vManage is a single-pane-of glass for Day 0, Day 1,
and Day 2 operations. It is highly scalable and has multi-tenant capability. It provides a user-friendly GUI interface
for policy and template configuration and deployment.

 Cisco vSmart is the central control unit responsible for topology building, traffic flow decisions, and control
commands across the network. It facilitates fabric discovery, distributes policies to the IOS XE SD-WAN routers, and
implements centralized control plane policies. As the heart of the control network, Cisco vSmart needs to have built
in redundancy. The TCP-based Overlay Management Protocol (OMP) runs between the Cisco IR1101 IOS XE
SD-WAN router and the vSmart controller apart from running between vSmart controllers.

8
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Data Center
The data center hosts the common infrastructure components and application servers in the extended enterprise
network. Application servers are selectively accessible to end-points hosted at remote sites based on the segmentation
or access policy.

The data center can have multiple public and private WAN connectivity. The IOS XE SD-WAN routers on the remote sites
connect the data center over the WAN networks. Depending on the requirement, as illustrated later in this document,
different models of routers, such as the Cisco ASR 100x, Cisco ISR4xxx, and Cisco CSR1000V, can be selected as the
data center WAN router. Refer to the enterprise design guide for data center router selection:
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/EE/DG/ee-dg.html

Various health monitoring and maintenance functionality of the IOS XE SD-WAN router and functionality of the SD-WAN
overlay connections such as routing, security, and traffic policy are managed by the SD-WAN management system
(Cisco vManage). Both the transport and service side connectivity of the data center IOS XE SD-WAN router are also
manged by the SD-WAN management system.

Non-carpeted Remote Sites


The extended enterprise network consists of a large number of non-carpeted remote sites such as kiosks, service desks,
branch offices, warehouses, and so on. Each remote site can have multiple WAN connectivity, with the type and number
of connections depending on the specific requirement. Various remote site models are depicted in the next section.

Each remote site is connected to one or more WAN network using Cisco IR1101 IOS XE SD-WAN router(s). As depicted
in Figure 2, the WAN side of the IOS XE SD-WAN router is called the Transport side and branch side of the router is called
Service Side.

IOS XE SD-WAN Router


The Cisco IR1101 plays the role of IOS XE SD-WAN (Cisco customer edge) router for extended enterprise remote sites
It is centrally managed by SD-WAN controllers. Based on the control information from vSmart, the Cisco IR1101 IOS XE
SD-WAN routers handle the data plane traffic routing and policy implementation. The IOS XE SD-WAN router functions
include secure network connectivity between the sender and receiver WAN edge, secure control plane connectivity
(OMP) to vSmart controller, secure communication channel (NETCONF) with vManage network manager, policy
implementation, export of telemetry to Cisco vManage, and implementation of traditional routing and redundancy
protocols on the transport and service side, such as BGP, OSPF, EiGRP, and VRRP based on routes and policy information
distributed from central vSmart. It also supports plug-and-play onboarding. Once configured, all local configurations at
Cisco IR1101 are retained and tunnels are up until timeout, irrespective of vManage connectivity.

Cisco IR1101 (Figure 3) is the recommended WAN router for all extended enterprise remote sites that require ruggedized
equipment and LTE (backward compatible) with redundancy (dual LTE, dual SIM). Cisco IR1101 is part of Cisco IoT
networking gateway portfolio.

The salient features of the Cisco IR1101 IOS XE SD-WAN router relevant for extended enterprise use cases are listed
below.

Cisco IR1101 IOS XE SD-WAN Router Salient Features


 Cisco SD-WAN compatible

 Form factor: compact, DIN rail mounting

 Fanless device

 Low average power consumption of 10W

 Interfaces support: dual LTE, dual SIM, 1GE SFP WAN, 4FE and 1GE SFP LAN

 Automatic carrier selection (US and Europe LTE carrier support), fast LTE switchover in three minutes

9
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

 Ruggedized: purpose built for harsh environments -40 to 75°C, IP30, salty-fog-tolerant

 Zero-touch deployment with Cisco plug-and-play and operational visibility

 Secure-boot, application-level firewall

 Future-proofed for 5G

Figure 3 Cisco IR1101 with Expansion Module

I/O ports LTE module

SFP GE LAN on Expansion


expansion module module
VPN LED
Copper
GE WAN on
base module
Four FE
LAN ports

SFP
GE WAN

258518
RS-232 Mini-USB LTE module
serial port console

Refer to the Cisco IR1101 Datasheet for technical specifications:


https://www.cisco.com/c/en/us/products/collateral/routers/1101-industrial-integrated-services-router/datasheet-c7
8-741709.html

WAN Connectivity
WAN connectivity is a critical component in the remote site design, as most of the application servers are hosted in the
data center. The remote sites need continuous access to these application servers for their operations. Thus redundant
WAN connectivity and easy to manage WAN control network are crucial. This ability to monitor WAN link status and select
best suited link for routing different kinds of traffic is vital. To cater to these requirements, it is recommended to deploy
the Cisco SD-WAN solution with the Cisco IR1101 as WAN router at the remote site.

WAN Router Transport Side


The WAN side of the Cisco IR1101 is called the transport side. Multiple simultaneous WAN connections can coexist. All
WAN interfaces and sub-interfaces are grouped under Transport VPN 0. Both static routes and dynamic routing protocol
configurations are possible for the transport VPN 0. DTLS/TLS connections to vBond/vSmart/vManage and IPSec/GRE
tunnels to remote sites are initiated from this VPN.

Each tunnel termination point on the IOS XE SD-WAN router that connects into a transport network is represented by a
transport location information (TLOC). TLOC route is the logical tunnel termination point on the IOS XE SD-WAN. Each
TLOC route is uniquely identified by a three-tuple, namely tunnel IP address, link color, and encapsulation (GRE/IPSec).
The TLOC-tuples are advertised to the vSmart controller. A number of other link-related parameters are associated with
the TLOC routes. An active BFD session must be associated with each IOS XE SD-WAN TLOC, then only the TLOC is
considered active. As mentioned earlier IPSec/GRE tunnels are established between TLOCs of remote sites.

10
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

The IOS XE SD-WAN routers securely connect to IOS XE SD-WAN routers with IPSec tunnels at other sites. The
Bidirectional Forwarding Detection (BFD) protocol is enabled by default and will run over each of these tunnels, detecting
loss, latency, jitter, and path failures. For scale and performance reasons, in case of Cisco IR1101 IOX XE SD-WAN router,
it is recommended to limit BFD sessions to 50.

Each Cisco IR1101 can have up to four TLOCs. Both IPSec and GRE encapsulation can be selected between two remote
sites over a single WAN link; in that case, two TLOCs will be created, one for each tunnel interface, with the same IP and
color but different encapsulation. Both IPSec and GRE encapsulate/tunnel the traffic. In addition, IPSec channels encrypt
the payloads. IPSec is preferred when sending sensitive data over public networks, while GRE can be used for private
networks.

Table 2 VPNs on IOS XE SD-WAN Router

VPN Number Description Interfaces/sub-interfaces


VPN 0 (reserved) Transport VPN WAN interfaces
VPN 512 (reserved) Management VPN Local management interface
VPN (0-65530 except reserved) Service VPN Service side interfaces

WAN Router Service Side


The LAN/local side of the Cisco IR1101 IOS XE SD-WAN is called the service side. To isolate services (segmentation)
from each other, a service VPN can be created for each service type such as VOIP and IP camera. VPNs are isolated from
one another and each have their own forwarding table. User data traffic is carried in the service VPN. A service VPN can
be associated with one or more interfaces/SVI on the local side. Note that the Cisco IR1101 service side FE ports are
switched ports, so sub-interfaces cannot be created; however multiple SVIs can be created to associate with multiple
VPNs. An interface/SVI can be associated with only one VPN.

Note: Sub-interfaces cannot be created for the switched ports, however SVIs can be created.

Routing protocols can run on the service side for the local routes to get dynamically detected and advertised to other
remote sites via vSmart. Multiple features can be enabled on the service VPNs such as OSPF, EiGRP, VRRP, QoS, etc.

Service Switch
The Cisco IR1101 has four FE ports on the base module for the service side connectivity. For small sites that have a
maximum of four end nodes, the end nodes can be directly connected to Cisco IR1101 FE ports. For large sites a service
switch can be added to increase Ethernet port density. To cater to non-carpeted environments Cisco IE switches are
recommended. A brief comparison of the possible ruggedized Industrial Ethernet switch models is shown in Table 3. In
the current design service switches are manually configured and managed.

11
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Table 3 Service Side Ruggedized Industrial Switch Comparison

Product Cisco IE Cisco IE Cisco IE Cisco IE Cisco IE Cisco IE Cisco IE


Family 2000 IP67 3200 3300 3400 4000 4010 5000
series series series series series series
Form Factor Wall Fixed DIN Modular DIN Advanced DIN Rail Rack mount Rack mount
mountable Rail Rail Modular DIN
Rail
Total 18 10 Expandable Expandable Up to 20 Up to 28 28
Ethernet to 26 ports to 26 ports Gigabit Gigabit
Ports of GE of GE Ethernet Ethernet
ports ports
PoE/PoE+ Yes (8) Yes (8) Yes (up to Yes (up to Yes (8 (GE), Yes (24), Yes (12),
24), Power 24), Power 240W 385W 360W
budget - budget -
360W 480W
Routing No No Partly Partly Yes Yes Yes
protocols (OSPF) (OSPF)
OSPF/EiGR
P/BGP
Stacking No No No No No No Yes
support

MTBF 374,052 613,125 633,420 549,808 591, 240 429,620 390,190

hours hours hours hours hours hours hours


Product ID: Product ID: Product ID: Product ID: Product ID:
Cisco IE-3300-8T IE-3400-8T IE-4000-8G IE-4010-4S
2S-E 2S-E T4G-E 24P
IE-3200-8P
2S-E

SD-WAN Deployment Models


The SD-WAN controllers can be cloud-hosted or on-premise hosted. Figure 4 shows a cloud-hosted extended
enterprise deployment.

Cloud Deployment
Cloud hosted SD-WAN controllers are hosted by Cisco.

On-Prem Deployment
In the on-prem model, the SD-WAN components are installed on virtualized hardware. vManage NMS, vBond
orchestrator, and vSmart controller can all be deployed on VMs. In the on-prem model, the SD-WAN components are
protected by a data center firewall. Similarly, cloud-hosted SD-WAN is protected by a cloud firewall. Figure 6 shows an
on-prem hosted extended enterprise deployment.

Block diagrams of cloud and on-prem hosted SD-WAN are shown in Figure 4 and Figure 5 respectively.

12
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Figure 4 Cloud Hosted SD-WAN Deployment

258519
Figure 5 On-Prem Hosted SD WAN Deployment
258520

13
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Figure 6 Extended Enterprise On-Prem Hosted SD-WAN Solution Architecture

Cisco PNP Connect


(Day0 automation) Cisco PNP
Connect

Cloud hosted
Cloud Hosted Applications
Applications
SD-WAN
vManage
vMana

vBond
vBon vSmart
vSm
On -Prem Hosted SD -WAN

Internet Firewall
Cisco Unified Communications
Manager / Cisco Video
Surveillance Manager

Data Center

Data Center QFP


Firewall
DC Switch
Internet
QFP

Internet IOS XE SD-WAN router Data Center

LTE Internet
Internet

Cellular Cellular
WAN Connectivity Cellular
Remote Site-1 Remote Site-K Remote Site-N
Transport Side
GE WAN
IOS XE SD-WAN router FE Cisco IR1101 IOS vEdge
vEdg
Cisco IR1101 IOS
XE SD-WAN router XE SD-WAN router 100
FE LAN FE LAN
L2 Switch
IE2000/4000/5000 IE2000/4000/5000
Service router / Switch Cat IE 3x00 Series Cat IE 3x00 Series
Service Side

258521
Non-Carpeted Remote Sites Carpeted Remote Sites

Multi-Tenancy
Cisco SD-WAN supports dedicated and multi-tenancy deployment modes. The network owner can chose one of the
models based on their requirements. With the multi-tenancy model one can manage multiple customers, called tenants,
from a single Cisco vManage NMS running in multi-tenant mode. All tenants share the vBond orchestrator and service
provider domain name. Each tenant can have its own subdomain. Each tenant has its own set of vSmart controllers and
manages its own set of Cisco SD-WAN routers. A vManage NMS needs to be configured into one of the modes
(dedicated/multi-tenant) during the initial configuration and the mode is not a convertible process after the initial
configuration. In multi-tenant mode, multiple isolated overlay networks can coexist managed by a single Cisco vManage
(or cluster), thus providing network isolation between the tenants. Multi-tenancy is not validated as part of this CVD.

14
Cisco Extended Enterprise SD-WAN Design Guide

Extended Enterprise Solution Design

Overlay Topologies
With SD-WAN arbitrary topologies can be configured for the connections between the sites. Various topologies can be
full mesh, partial mesh, hub-and-spoke, or point-to-point. Different topologies can be configured for different VPNs.
Thus multiple topologies can coexist between the same network sites. In general for the extended enterprise use cases,
hub-and-spoke and partial-mesh are suitable.

Hub-and-Spoke Topology
Hub-and-spoke is a controlled connectivity topology with minimal tunnels that is beneficial from a security perspective.
For the extended enterprise use cases where the application servers are installed at a central location in the data center,
hub-and-spoke topology is appropriate for the data path. In this case each remote site is a spoke that logically connects
with the data center hub as shown in Figure 7.

Figure 7 Hub-and-Spoke Topology with Cisco IR1101 and SD-WAN

vManage

Remote Site 2 Campus /


Data Center

Cisco IR1101

Cisco IR1101 Cisco IR1101


Cisco IR1101

Remote Site 1 Remote Site 4

258522
Remote Site 3

Mesh Topology
Secure full and partial mesh topologies can easily be configured with SD-WAN. Multiple coexisting topologies can also
be configured. A mesh topology as shown in Figure 8 improves peer-to-peer performance by avoiding multi-hop path.
In peer-to-peer communication applications can benefit from the shortest-path, improving bandwidth efficiency and
latency. A few possible use cases suitable for mesh topology are sharing distributed resources such as file servers,
storage, database, and printers across multiple sites.

15
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Figure 8 Mesh Topology with Cisco IR1101 and SD-WAN

vManage

Remote Site 2 Campus /


Data Center

Cisco IR1101

Cisco IR1101
Cisco IR1101
Cisco IR1101

Remote Site 1 Remote Site 4

258523
Remote Site 3

Non-Carpeted Remote Sites Design


Depending on the size and requirements of a remote site four different remote site designs are proposed as shown in
Table 4.

As all operations at the remote site are WAN link dependent, dual WAN link is recommended in all designs.

In this guide public IP address is considered for each tunnel endpoint (LTE and Internet) on both the remote site and data
center side. Thus no NAT is needed to reach any tunnel endpoint (VPN0).

Note: For details on NAT considerations and design refer to the Cisco SD-WAN Design Guide:
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf

Dynamic IP address allocation is considered for LTE connections. Default gateway and DNS IP are obtained during the
IP allocation.

IP address allocation for the service side endpoints (camera, IP phone, computers, and so on) can be configured local
or centralized. In case of local IP allocation, DHCP server is configured at Cisco IR1101. In case of central IP allocation,
DHCP relay is configured at Cisco IR1101 pointing to DHCP server at the data center.

Similarly, internal DNS server for the service side endpoints is also located at the data center and DNS IP is configured
at the Cisco IR1101 gateway’s service VPN side to point to the enterprise DNS server.

Usually LTE networks are charged based on usage and monthly subscription, not based on the connection time. Thus in
case of dual LTE, Equal-Cost Multipath (ECMP) is configured. ECMP enables load sharing and fault tolerance. The ECMP
uses Layer 4 source and destination IP and port, protocol, and DSCP as the hash key for path selection and load sharing.
Note that ECMP takes effect only when both link are selected having equal priority.

16
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Table 4 Remote Site Network Sizing

Very Small Small Medium Large


Number of end points Up to 4 5 to 8 >8 >8
WAN dependency High High Very High Very High
LAN Switch NA Small Medium High
dependency
POE needed No Yes Any Any

Table 5 Remote Site Network Design Recommendations

Very Small Small Medium Large


WAN Links Dual LTE Dual LTE or Dual LTE or Dual LTE or

LTE + Internet LTE + Internet LTE + Internet


WAN Router Single Single Redundant Redundant
Service switch Not required Single Single Redundant

Very Small Site


Table 4 shows a remote site size classification chart. Very small sites have up to four endpoints, with high WAN
dependency and no Power over Ethernet (PoE) requirement. Figure 9 shows a recommended design of a very small site.
This design is suitable for remote sites such as ATM booths and unmanned payment centers or POS.

17
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Figure 9 Very Small Remote Site Design

LTE
Cisco IR1101 ISO
XE SD-WAN router FE-3, FE-4
SVI-3, VPN 3

FE-2
SVI-2,
-2, VPN 2

FE-1
VPN 0 SVI-1, VPN 1

LTE

258524
Transport Side
In this architecture WAN connectivity is provided by a single Cisco IR1101 WAN router. WAN connectivity has WAN
redundancy with dual active/active LTE connections. Cisco IR1101 has two LTE modules, one on the base module and
the other on the expansion module. Both LTE physical links are grouped under the VPN 0 (transport VPN). Refer to the
previous section for LTE link IP address allocation. Each cellular tunnel endpoint is represented by a TLOC. It is
recommended to enable IPSec encryption for each cellular TLOC.

Service Side
Cisco IR1101 has four FE ports on the service side; up to four endpoints can be directly connected. All FE ports are
switched ports, no sub-interfaces can be created for these interfaces. One or more interfaces can be configured under
one service VPN. In this case we recommend a separate service VPN for each service type that needs to be isolated.

Table 6 Example Service VPN Configuration for a Remote Site

Service Type FE Number Service VPN Number


Voice 1 1
Video 2 2
Internet 3 and 4 3

Small Site
Per the classification shown in Table 4, small sites have five to eight endpoints. Similar to very small sites, they have high
WAN dependency. In addition, they can have PoE requirements. Figure 10 shows a recommended design for a small site.
Remote sites such as kiosks and manned payment centers can be of this category.

18
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Figure 10 Small Remote Site Design

LTE
LTE Base Cisco IR1101 IOS
DHC IE 2000/4000/5000,
P IP XE SD-WAN router
, Ga Cat IE 3x00 Series
tewa
y
GE Expansion (SFP/Copper)
G

SVI-1, VLAN 10, VPN 2


S
a
and SVI-2, VLAN 20, VPN 1
se
Ba
/GE P, VPN 0
LTE PI
/ D HC
LTE or ti c
Sta eway
t
Internet Ga

258525
Transport Side
Small sites are configured with a single Cisco IR1101 WAN router and a service side switch. The transport side in
Figure 10 shows a combination of LTE and Internet WAN link. All WAN links are configured under VPN0. The Internet
connection quality and price can vary based on the type of the connection. Usually the LTE links are expensive compared
to Internet links. Also, Internet links provide higher bandwidth. In some other cases where dedicated Internet connections
are used, the price of LTE can be lower. Thus depending on the bandwidth requirement and price, one of the WAN links
can be chosen as the preferred path and the other as the backup path. Both load balance and preferred path can be
achieved with prefix-based route selection. Refer to an earlier section for LTE link IP address allocation. Each cellular
tunnel endpoint is represented by a TLOC. It is recommended to enable IPSec encryption for each cellular TLOC. Static
IP, default route, and DNS are considered for Internet WAN link. Depending on the inherent reliability of the Internet
connection, encryption for Internet TLOC is considered. All transport side interfaces are included in VPN0.

Service Side
As the number of endpoints is greater than the FE ports on the Cisco IR1101, a ruggedized service switch is positioned
at the service side. The other reason for a service switch could be need for PoE at the service side to connect end
devices. For creating service VPN, multiple SVI can be created on the downlink FE interface. Different SVI can be
associated with different service VPN. For each service type that needs isolation, separate service VPN should be
created.

Medium Site
The third category as per Table 4 is medium site. These are sites that have more than eight endpoints, very high WAN
dependency, medium LAN switch dependency, and need PoE. Enterprise branch offices with limited staff can be
classified into this category. Figure 11 depicts the recommended network diagram of a medium remote site.

19
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Figure 11 Medium Remote Site Design


Cisco IR1101 IOS
XE SD-WAN router OSPF Area

LTE LTE Base


DHCP IP,
Gateway IE4000 / Cat IE 3x00 Series

LTE or
Internet

258526
Cisco IR1101 IOS
XE SD-WAN router

Transport Side
For medium sites, dual Cisco IR1101 WAN routers are recommended, with each WAN router having WAN connectivity
(either LTE or Internet). This model provides redundancy for the WAN link and WAN router. Refer to an earlier section for
LTE link IP address allocation. Each cellular tunnel endpoint is represented by a TLOC. It is recommended to enable IPSec
encryption for each cellular TLOC. Static IP, default route, and DNS are considered for Internet WAN link. Depending on
the inherent reliability of the Internet connection, encryption for Internet TLOC is considered. All transport side interfaces
are included in VPN0.

Service Side
As per classification in Table 4, these sites have medium level LAN dependency. A ruggedized Industrial Ethernet switch
is positioned on the service side to connect the endpoints. The service side switch remains a single point of failure in
this design. As shown in Figure 11, the OSPF area covering the service side network is created. Unequal-cost load
balancing with preference to WAN router having preferred WAN (based on cost and bandwidth) is considered.

Apart from this prefix path affinity and application aware routing can also be configured, which are discussed later in this
document. As discussed earlier in other deployment models, multiple service VPNs are created for traffic
isolation/segmentation.

In this deployment configuration, the uplink side of the service switch is a Layer 3 connectivity to Cisco IR1101.
Segmentation can be provided on the service switch uplink to the router interface by configuring VRF-lite and separating
route interfaces within the routing table. Thus the SD-WAN VPN segmentation is extended with VRF-lite on the service
switch. On the Layer 2 side of the service switch different service endpoints should be separated with different VLANs
mapping to corresponding VRFs, thus end-to-end segmentation is ensured.

Large Site
As per Table 4 sites with more than eight endpoints with very high WAN and LAN dependency and possible PoE
requirements are classified as large sites. Typical examples of a large site could be warehouses and large distribution
centers. The recommended network diagram of a large site is shown in Figure 12.

20
Cisco Extended Enterprise SD-WAN Design Guide

Non-Carpeted Remote Sites Design

Figure 12 Large Remote Site Design


Cisco IR1101 IOS
XE SD-WAN router

LTE Base
LTE
DHCP IP, Gateway

IE5000 Series Stacked

VRRP

LTE or
Internet

258527
Cisco IR1101 IOS
XE SD-WAN router

Transport Side
For the large site deployment scenarios, similar to medium sites, on the transport side redundancy is provided both for
WAN router and WAN link. Dual WAN router Cisco IR1101 and dual WAN link, one router with LTE and other router with
Internet, is proposed. However, additional WAN links can be added (up to a maximum of four LTE and two Internet) based
on the requirements. Refer to Transport Side, page 20 subsection in Medium Site, page 19 for additional details.

Service Side
In this design redundancy is proposed for the service side switch. Dual service switches are configured in a stack as
shown in Figure 12. A routing network with OSPF can be configured between Cisco IR1101 and the service switch stack
for redundancy and load-sharing across the WAN routers. Alternately, a Layer 2 network with Virtual Router Redundancy
Protocol (VRRP) can be configured on the service side. The WAN router having the preferred WAN link is configured with
higher VRRP priority. Also, VRRP configures the preferred WAN router as the master and others as backup. The master
WAN edge router automatically becomes the default gateway for hosts at the branch.

A prefix list containing the default route can be created for VRRP to track on it. On failure of WAN link or router, or on
failure of reachability to default route, the backup router becomes the master, thus enabling failover path for the hosts.
For load-sharing, two VRRP groups can be created based on prefixes. Each group can have different preferred VRRP
priority for selecting the WAN link and thus enabling load-sharing.

When a Layer 2 network is configured on the service side, service VPN segmentation is terminated at the Cisco IR1101
WAN edge router. The segmentation can be extended to the service side by configuring separate service VLANs for each
service type and mapping to the corresponding VPN/VRF.

The choice of OSPF or VRRP is a typical Layer 3 versus Layer 2 decision that depends on the service side network
requirement. If local router need to be distributed into WAN, then OSPF is preferable. OSPF provides load-sharing,
however it has a much longer switchover time with the default being 40 seconds. VRRP is primarily meant for redundancy
and has a much shorter failover time of 1 to 3 seconds.

Other redundancy options such as STP and Port-Channel are not considered for the service side as they are not
supported with Cisco SD-WAN.

Note: If case of Dual-IOS XE SD-WAN router sites: For the proper functioning of Deep Packet Inspection (DPI), it is
important for traffic to be symmetric; that is, DPI should be able to see both request and response traffic. In other words,
paths for both request and response need to be same.

21
Cisco Extended Enterprise SD-WAN Design Guide

Message Flow Diagrams

Note: With TLOC-extension the WAN link of one WAN router can be shared by another WAN router. Currently
TLOC-extension is not supported with the Cisco IR1101 router.

Message Flow Diagrams


When a customer with a Customer Smart Account orders Cisco IOS XE-based IR1101 WAN Edge routers, the device
identity information, such as a serial number, is automatically added to the Customer Smart Account and can later be
imported to Cisco PNP connect.

To provide administrative control over the environment, the Cisco SD-WAN solution leverages a white-listing model that
allows administrators to revoke certificates from the environment, reject devices with valid certificates, and generate new
certificates as determined by their security policy. The vManage white-list is populated by synchronizing with a customer
smart account.

No pre-shared keys are used in SD-WAN network. Every element in the solution must have a unique device certificate
issued by a trusted Certificate Authority (CA).

Cisco IOS XE-based IR1101 WAN edge routers use Secure Unique Device Identifier (SUDI) and are trustworthy systems.
During manufacturing the SUDI certificate is installed on the Cisco IR1101 routers. The SUDI is an X.509v3 certificate
with an associated key-pair that is protected in hardware. SUDI certificates are used to authenticate Cisco IR1101 routers
during the PNP process.

Cisco IR1101 router installations with Internet access that are able to reach Cisco PNP connect can be securely
onboarded to vManage with no manual intervention, as shown in Figure 13. For deployments where a Cisco IR1101 WAN
edge router cannot reach Cisco PNP connect, a bootstrap configuration can be generated from vManage NMS, manually
loaded to the Cisco IR1101 router, and securely onboarded to vManage, as shown in Figure 14.

22
Cisco Extended Enterprise SD-WAN Design Guide

Message Flow Diagrams

Onboarding Cisco IR1101 with Plug and Play


Figure 13 Cisco IR1101 Onboarding Workflow with PNP

Create and associ


4 device template
5
Sync Smart Account

Cisco PNP SD-WAN


3 Connect Manager
2

7
8

Note: Alternately for Step 3


and Step 4, device info can 9 Device Operational
be manually provided
6 Plugin Cisco IR1101 with
SD-WAN PNP agent

258528
and SUDI certificate

23
Cisco Extended Enterprise SD-WAN Design Guide

Security Design

Onboarding Cisco IR1101 with Bootstrap Configuration


Figure 14 Cisco IR1101 Onboarding Workflow with Bootstrap

Create and associate


4 device template
Manually generate
Sync Smart Account 5 6
bootstrap config
Cisco PNP SD-WAN
3
Connect Manager
2

Note: Alternately for Step 3 Plugin Cisco IR1101 with 9 Device Operational
and Step 4, device info can SD-WAN
- PNP agent
be manually provided and SUDI certificate
Manually configure
e

258529
bootstrap config 8

For more information about onboarding the Cisco IR1101 SD-WAN router, see:
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sd-wan-wan-edge-onboarding-deploy-guide-
2019dec.pdf

Security Design
In the Extended Enterprise 2.0 SD-WAN solution, security is ensured at multiple levels, including:

 Authenticity of Cisco IR1101 IOS XE SD-WAN router

 Secure control channel between IOS XE SD-WAN routers and vManage controller

 Secure data communication channel between IOS XE SD-WAN routers

 Segmenting data traffic among different services

 Filtering undesired traffic and directing traffic to firewalls with ACLs

Authenticity of Cisco IR1101 IOS XE SD-WAN Router


 Cisco IR1101 runs Cisco IOS XE-based SD-WAN image. Cisco IR1101 devices are factory loaded with Secure
Unique Device Identifier (SUDI) certificates. The SUDI is an X.509v3 certificate with an associated key-pair that is
protected in hardware.

 Key trustworthy technologies of Cisco IOS XE-based SD-WAN edge devices include image signing, secure boot,
runtime defenses, and the Cisco Trust Anchor module (TAm). These protect against counterfeit hardware and
software modification, help enable secure, encrypted communications, and help enable Plug-and-Play (PnP).

 Trustworthiness of Virtual Network Functions (VNF) for SD-WAN can be trusted as long as the appliance hardware
has the proper built-in security features, such as a TAm, to enforce hardware-anchored Secure Boot.

24
Cisco Extended Enterprise SD-WAN Design Guide

Security Design

 Secure Onboarding of Cisco IR1101 is depicted in Message Flow Diagrams, page 22.

Secure Control Channel between IOS XE SD-WAN Router and vManage


All Day 0, Day 1, and Day N control plane communications between the IOS XE SD-WAN router and SD-WAN controllers
(vBond, vSmart, vManage) are protected by a standards-based secure Datagram Transport Layer Security (DTLS) or
Transport Layer Security (TLS 1.2) channels. DTLS uses UDP and TLS uses TCP. Only DTLS is supported to connect
vBond and both DTLS/TLS can be used to connect vSmart/vManage servers. NETCONF management protocol is used
by vManage to communicate with both vSmart and IOS XE SD-WAN router. OMP management protocol is used by
vSmart to communicate with IOS XE SD-WAN router. Both NETCONF and OMP communications are protected by
DTLS/TLS.

Similarly, all communications between the SD-WAN controllers are secured by DTLS tunnels. The SD-WAN CVD design
guide lists the ports to be opened for DTLS/TLS communication
(https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf).

It may be noted that the IOS XE SD-WAN router establishes individual DTLS/TLS connections to the vSmart controllers
over each transport link.

Figure 15 Secure Data and Control Plane Communication Channels between SD-WAN Components

258555

Secure Data Communication Channel between IOS XE SD-WAN Routers


1. Before a pair of IOS XE SD-WAN routers can exchange data traffic, they establish an IPsec connection between
them, which they use as a secure communications channel, and then the routers authenticate each other over this
connection. As with the control plane, the data plane also uses keys to perform device authentication.

25
Cisco Extended Enterprise SD-WAN Design Guide

Security Design

2. In a traditional IPsec environment, key exchange is handled by the Internet Key Exchange (IKE) protocol. Cisco
SD-WAN implements a simple and scalable key exchange process that does not use per-pair keys for secured
authentication between each pair of IOS XE SD-WAN routers and it dispenses with IKE altogether. For details refer to:
https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.1/05Security

3. To further strengthen data plane authentication and encryption, vEdge routers regenerate their AES keys
aggressively (by default, every 24 hours). Also, the key regeneration mechanism ensures that no data traffic is
dropped when keys change.

Segmenting Data Traffic among Different Services


As with encryption, traffic isolation is another key element of any compliance strategy. Many regulatory agencies require
traffic isolation and firewalling in addition to encryption in order to be compliant. As an example, Payment Card Industry
(PCI) compliance mandates that, should a malicious user intercept traffic not intended for them, it should not be readable.
Likewise, if a malicious user were to gain access to an unauthorized segment of a PCI-compliant network, they should
be limited in the destinations they are allowed to access from that segment.

Figure 16 SD-WAN Secured and Segmented Data Plane Communication

VPN 1

VPN
1
VPN 3
VPN 4
SD-WAN Egress of Cisco IR1101 @Remote site N
IPSec/GRE
Tunnel (VPN0)

VPN 1

N1 N1 N1 N1
VP VP VP VP
VPN

VPN 1 VPN 1
1
N1 N1 N1 N1
VP VP VP VP

VPN 2
VPN 2 SD-WAN VPN 3
VPN 2
VPN 3 IPSec/GRE
VPN 4
Tunnel (VPN0) VPN 3
VPN 4
VPN 4
N1
VP

Egress of IOS XE SD-WAN

258530
Ingress of Cisco IR1101 router @Data Center
@Remote site 1

1. Cisco SD-WAN solution with IOS XE SD-WAN router provides data plane segmentation.

2. In the SD-WAN solution, Virtual Private Networks (VPNs) provide segmentation. Segmentation is initiated in the
control plane, but it is enforced within the data plane. As traffic enters the IOS XE SD-WAN router, it is assigned to
a VPN. Each VPN is assigned a numerical value (0-65530, where 0 and 512 are reserved for system use). Each VPN
is isolated from one another and each have their own forwarding table. An interface or sub-interface is explicitly
configured under a single VPN and cannot be part of more than one VPN. The router advertises these VPN values to
the control plane via OMP. Hence, users in one VPN cannot (by default) transmit data to another VPN without explicit
configuration allowing the traffic. Different VPN types (transport, management, service) are listed in Table 2.

3. As shown in the Figure 16, the service VPNs are encapsulated with in the encrypted transport VPN0.

26
Cisco Extended Enterprise SD-WAN Design Guide

Security Design

4. As a user transmits data across the WAN, the WAN Edge router will append the user’s service VPN (in the form of a
label) to the traffic. The label, identifies which VPN the user's traffic belongs to when it reaches the remote
destination. As the remote router decapsulates the encrypted data, the label is used to determine the VPN to which
traffic should be delivered.

5. The SD-WAN service isolation/segmentation ends at the end of Layer 3 transport, VRFs are created for each service
VPN. Within the service network the isolation should be extended manually with VLANs. Each VRF is mapped to a
service VLAN.

Filtering Undesired Traffic and Directing Traffic to Firewalls with ACLs


One of the final pieces to security strategy on the data plane is protection through firewalls. A firewall ensures that user
traffic is restricted to authorized destinations as well as providing auditing in the event of a security incident. ACL rules
can be configured to filter unwanted traffic and always forward selective traffic to a firewall before it can be routed to the
destination.

User and Device Profiles and Design Recommendations


Table 7 lists highly possible user profiles that we have created as an example that illustrates the key design concepts and
also shows the power of the Cisco SD-WAN in orchestrating this policy.

27
Cisco Extended Enterprise SD-WAN Design Guide

Security Design

Table 7 User and Device Profile Samples and Design Recommendations

User/Device Role Policy Requirements Design Recommendation


Profile
Security cameras This profile belongs to devices that Must be able to only Hub-and-Spoke
perform security function, for communicate with VSM
example, cameras. server in the data center. Allow access only to VSM
Must not be able to server.
communicate with
anything else in the Prefer Internet over LTE.
network.
IP phones This profile belongs to IP phones. Can communicate with IP Hub-and-Spoke
phones across all locations
via the CUCM located at Load balance across WAN,
the DC. delay and jitter sensitive
Application Aware Routing
(AAR), QoS Low Latency
Queue (LLQ)
Employee This is a user profile associated with The employees must be Partial Mesh
computer employee computers. Only able to access application
employees can login to computers servers in the data center QoS Weighted Round
designated for them. All employee and shared resources in Robin Queue (WRR), only
computers are of same category. peer remote locations. predefined destination
ports allowed, access to
Internet blocked
Utility computer This is a user profile associated with The utility computer must Hub-and-Spoke access to
(ATM, POS) utility computers, such as ATM be able talk to utility Internet/Cloud.
machines and utility payment servers located in the data
gateways. center/cloud. It cannot Only predefined
access any other system. destinations allowed, WRR
with dedicated bandwidth
quote
CUCM Server This is again a device profile for a This device profile is Hub-and-Spoke
VOIP Call Manager, a server that allowed to communicate Load sharing across
manages the VOIP phone with the IP phones WAN, delay and jitter
communications. present in the remote sensitive (AAR), QoS
sites. LLQ
Video This is a device profile for a Video The security cameras Hub-and-Spoke
Security Security Server which manages the need to access the
Server security cameras. video server for the
management purposes.
Also, a contractor needs
to access the video
server to access the
content, if needed.
Guest This group is assigned to The guests can access Need to go through
computers accessible to guests for Internet via DC, all guest firewall (localized ACL)
Internet browsing. traffic must go through QoS best effort, No
physical firewall located access to internal
at DC. systems, restrict video
streaming such as You
tube.

28
Cisco Extended Enterprise SD-WAN Design Guide

QoS Design

QoS Design
This section covers the IOS-XE SD-WAN Cisco IR1101 QoS design details such as QoS considerations, QoS design
steps, and recommendation for traffic classification and marking.

SD-WAN QoS Design Considerations


This section describes the various considerations that the operator must take into account while designing a QoS policy
for the extended enterprise SD-WAN network:

 Classification and Marking should be applied to all traffic types in the entire network hierarchy, irrespective of
available WAN bandwidth and expected traffic.

 Police traffic by defining QoS exceed policy. Use tail drop for loss sensitive traffic, otherwise use RED. In case of
RED, linear drop probability, i.e., X% queue depth results in X% drop probability.

 Limit total strict priority queuing traffic (LLQ) to 33% of link capacity to bound application response time of
non-priority applications. LLQ queue is not subjected to policer. Bandwidth allocated to Q0 is dedicated. The
remaining bandwidth is distributed between Q1 to Q7 with a WRR algorithm.

 To limit processing overhead, limit classification only for desired applications and application sets from application
list. Remaining traffic will be considered as scavenger traffic and treatment will be provided accordingly.

Order of Applying Polices


Figure 17 shows the order of applying policies as the traffic traverses from ingress to egress. This is an extract from the
Cisco Enterprise SD-WAN Design Guide. The first three steps (policy applications) happen at the ingress before the
traffic reaches the routing engine. The last two steps, scheduling and shaping (5 and 6), happen on the egress side at
the exit of the traffic. It may be noted that the traffic classification, marking, and policer configurations applied by
localized policy at step 1 are overwritten by centralized policy applied on step 3. Based on monitored SLA, the application
aware routing (AAR) selects only those WAN interfaces that meet the (loss, latency, jitter) quality criteria. For more
information, see:
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf

29
Cisco Extended Enterprise SD-WAN Design Guide

QoS Design

Figure 17 Policy Order of Operations on a IOS XE SD-WAN Router

258556
SD-WAN QoS Design
In a SD-WAN, QoS can be configured by defining policies. As a general principle GUI-based menu driven QoS policy is
preferred to CLI-based policy.

The following are the design recommendations:

1. The first step in QoS is Application Recognition. The IOS-XE SD-WAN image has a Deep Packet Inspection (DPI)
Engine. It can recognize and classify traffic of a large set of applications such as Facebook, ms-office-365, twitter,
etc. In addition, six tuple ACLs can be configured to classify any traffic to the desired category. Thus incoming traffic
is classified into different QoS forwarding classes.

2. Several QoS policies such as classifications, marking, policing, and remarking can be defined in both centralized and
localized data policies. Considering the use cases for extended enterprise, most of the QoS requirements are
common across all remote sites, thus centralized data policy is recommended for classification, marking, policing,
and remarking. The other advantage with centralized data policy is classification/grouping can be done based on a
number of predefined standard applications and application family. Also, centralized data policy is applied after
localized policy as shown in Figure 17, overwriting the localized policy. Hence centralized data policy has a higher
preference. A single policer can only be defined with centralized data policy, however in the case of differing
bandwidth WAN links, different policers might be preferable. In such a scenario, a local policer can be defined for
each WAN link.

3. To avoid complexity of operations, it is recommended not to define classification, marking, and remarking using
localized policy.

4. Queueing and scheduling based on specific traffic characteristics such as bandwidth requirement, burst nature,
sensitivity to jitter, latency, and packet loss are configurable only with localized policy.

5. A total of eight output queues are supported by SD-WAN for scheduling, of which queue0 is a Low Latency Queue
(LLQ) and remaining seven are Weighted Round Robin Queue (WRR) queues. Network control and real time traffic
which is sensitive to latency such as real time voice can be mapped to this queue. Realtime control traffic such as
DTLS, TLS, BFD, Routing protocols are auto mapped to queue0 the LLQ. Remaining applications can be classified
into multiple groups and mapped to separate queues for desired scheduling treatment.

6. The QoS forwarding classes are mapped to appropriate output queue.

30
Cisco Extended Enterprise SD-WAN Design Guide

QoS Design

7. Centralized policy is applied to a group of sites and VPN list, whereas localized policy apply to a group of interfaces.
Thus, centralized QoS policy (classification, marking, and policing) is applied to the configured service VPNs. And
localized QoS policy (queueing) is applied to configured WAN interfaces through device and interface templates.

8. vManage maps QoS-map configurations to Cisco IOS XE policy-map configurations.

9. QoS policy can be applied to the inbound traffic (from service side to transport side) or outbound traffic (from tunnel
to service side) or on all directions. Considering the much higher bandwidth on the service side compared to the
WAN side, QoS policy is essential in the LAN to WAN direction.

10. Configure shaping rate, the aggregate traffic transmission rate on the interface, to be less than line rate. According
to published survey results (https://www.tomsguide.com/us/best-mobile-network,review-2942.html), typical
carrier uplink speeds for major LTE Cellular networks vary from 10 to 15Mbps. Hence the suggested shaping rate
for LTE Cellular interface is 10Mbps. Similarly, configure shaping rate for other WAN networks, such as Internet,
based on the service provider agreement. This will ensure that maximum transmission speed does not go beyond
permitted limit and bandwidth allocation % across the queues which are computed based on aggregate traffic
transmission rate on the interface.

A sample QoS configuration is shown in Table 8, Table 9, and Table 10. SD camera traffic is limited to 1Mbps and HD
camera to 4Mbps. For low speed uplinks such as cellular, only SD cameras are permitted.

31
Cisco Extended Enterprise SD-WAN Design Guide

QoS Design

Table 8 Extended Enterprise Traffic Policer

Name Burst Exceed Rate


Policer-SD-Camera-1MB-drop 2000,0000 Drop 1000,000
Policer-HD-Camera-4MB-drop 8000,0000 Drop 4000,000

In case of WRR queues, the bandwidth % indicates the maximum bandwidth allocated to the class. The unused
bandwidth from any WRR queue is distributed to other classes.

Table 9 Extended Enterprise Traffic QoS Map for Internet WAN

Class DSCP Scheduling Bandwidth % Drop Queue Policer


Type Action
Voice EF/46 Priority 10 Tail 0 NIL
Queuing (PQ)
Broadcast-Video CS5/40 Weighted 20 Tail 1 Policer-HD-
Round Robin Camera-4M
Queueing B-drop
(WRR)
Network-Control CS6/48 WRR 5 Tail 2 NIL
Signalling CS3/24 WRR 5 Tail 3 NIL
OAM CS2/16 WRR 10 Tail 4 NIL
Scavenger CS1/8 WRR 50 Random 5 NIL
Early Drop
(RED)

Table 10 Extended Enterprise Traffic QoS Map for Celluar WAN

Class DSCP Scheduling Bandwidth % Drop Queue Policer


Type Action
Voice EF/46 Priority 10 Tail 0 NIL
Queuing (PQ)
Broadcast-Video CS5/40 Weighted 60 Tail 1 Policer-SD-
Round Robin Camera-1M
Queueing B-drop
(WRR)
Network-Control CS6/48 WRR 5 Tail 2 NIL
Signalling CS3/24 WRR 5 Tail 3 Policer-Half
MB- remark
OAM CS2/16 WRR 10 Tail 4 OneMB-dro
p
Scavenger CS1/8 WRR 10 Random 5 OneMB-dro
Early Drop p
(RED)

Comply SLA over WAN with Application Aware Routing


Application aware routing (AAR) is another data policy tool that can improve application performance. The operation

32
Cisco Extended Enterprise SD-WAN Design Guide

Scale and Dimension

steps for AAR are shown below. Figure 17 shows the order of application for AAR.

The design and operation of AAR:

 Application-aware routing policies are configured as part of a centralized policy. It affects traffic on a WAN edge
router that is flowing from the service (LAN) side to the transport tunnel (WAN) side.

 Up to four SLA classes can be defined with certain loss, jitter, and delay values.

 Multiple WAN link tunnels of a remote-site are monitored by BFD protocol and are calibrated for loss, latency, and
jitter. BFD is also used to detect link failures.

 In real time, packets of uplink traffic are matched and classified into different classes of SLA (loss, latency, and jitter).

 Traffic is load-balanced across all tunnels meeting the SLA class. If no tunnels meet the SLA, the traffic is sent
through any available tunnel.

 If preferred colors are specified in the policy, then traffic will be sent through the preferred color tunnels as long as
the SLA is met. If no tunnels meet the SLA, the traffic is sent through any available tunnel.

 If a backup-SLA preferred color is specified, then that tunnel is used when there are no paths that meet the SLA.

 A strict keyword can be used in the policy, which means if no tunnel can meet the SLA, the traffic is dropped.

Based on the guidelines published in Implementing Quality of Service Over Cisco MPLS VPNs:
http://www.ciscopress.com/articles/article.asp?p=471096&seqNum=6

The recommended SLA guidelines for different services of the Extended Enterprise SD-WAN solution are shown in
Table 11.

Table 11 SLA Guidelines for Different Services

SLA-ClassList Name Traffic Type Loss (%) Latency (ms) Jitter (ms)
SLA-1 Voice 1 150 30
SLA-2 Streaming-Video 2 300 500
SLA-3 Network-Control 3 500 500
Signalling
Network-Management
SLA-4 Scavenger 5 500 500

Scale and Dimension

SD-WAN Controller Scale


The SD-WAN controller provides a scalable solution with a horizontal scale-out model. As published in the Cisco
SD-WAN 19.1 release notes, in a vManage NMS cluster each vManage server is validated for a scale of 2,000 devices
(WAN edge) and up to six vManage server instances can be spawned in a cluster. Similarly, a single vSmart instance
supports up to 2,700 connections and a single vBond instance supports up to 1,500 connections. Overall a vManage
NMS cluster can manage up to 10,000 devices (WAN edge routers). For more information:
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/vManage-Help/vmanage-help-16-11/administration.html

33
Cisco Extended Enterprise SD-WAN Design Guide

Cisco vManage Single-Pane-of-Glass

Remote Sites Scale


As illustrated earlier, multiple architectures are proposed matching the need for very small, small, medium, and large size
remote sites. The number of endpoints supported at the remote site depends on the availability of Ethernet ports on the
service side for connecting end-devices. Considering a mixture of single and dual WAN routers at the remote sites, 5,000
to 10,000 remote sites or WAN edge routers can be managed by a vManage cluster deployment.

Server Hardware Recommendations


Server hardware specifications for different size of deployments can be found at:
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xe-gs-book.pdf

The document provides the hardware recommendations for the vBond orchestrator server, vManage Network
Management System (NMS) server, and vSmart controller server. The specification varies based on the number of
devices in the overlay network. The specification covers the vCPU, RAM, OS Volume, number of NIC cards, and network
bandwidth requirement.

Cisco vManage Single-Pane-of-Glass


Cisco vManage provides a single-pane-of-glass management to manage all controller components and both enterprise
and extended enterprise WAN edge devices. The comprehensive vManage GUI has dashboard, monitor, configuration,
tools, maintenance, administration, and analytics as the top-level menus.

Dashboard
Dashboard screens provide an at-a-glance view of the overall health of the SD-WAN overlay network. Dashboard
screens showing Cisco IR1101 status include main dashboard and VPN dashboard. Multi-level zoom-in and navigation
is supported from various dashboard views.

The main dashboard shows a birds-eye-view of the health status of controllers, remote site WAN connectivity, WAN
transport interface health and bandwidth distribution, WAN edge router health, top applications, and tunnel endpoints
status monitored for application-aware routing.

The VPN dashboard shows the health of various VPN groups/VPN segments and top applications transiting.

Events and Alarms


The alarms pane shows the system-wide active and cleared alarms, severity wise alarm classification and distribution
over a date and time range, impacted sites, and severity. Hierarchical multi-level zoom-in is supported. The events pane
shows system-wide statistics and histograms for the received events.

Network Monitoring and Assurance


The status of Cisco IR1101 IOS XE SD-WAN router and links in the overlay network can be viewed in a GIS map with
geo-location. Multiple filters help to filter the view to the parts of the network of interest.

Sotware Image Management


Cisco vManage maintains a software image repository for WAN edge devices and controllers. Images of Cisco IR1101
IOS XE SD-WAN router can be uploaded to vManage server or a link to an image on a remote server can be provided.
An operator can trigger a software upgrade for controllers and WAN edge devices.

34
Cisco Extended Enterprise SD-WAN Design Guide

References

vAnalytics
Based on DPI and cflowd (traffic flow monitoring), assorted telemetry is collected from across the network and analytics
are generated. Some of the analytics and views include:

 Availability—Site and network availability

 Bandwidth usage—Identification of top network bandwidth using sites. The drill-down view shows top sources,
destinations, and applications using network bandwidth.

 Application performance—Application to tunnel-binding and performance information

 Anomaly detection—Baseline of application usage. Anomaly detection based on overall application usage/by
family/by site.

 Carrier performance—Performance of carriers and tunnels by latency, loss, or jitter. Application performance by
carrier.

References
 Cisco Enterprise Networking design guides:
https://www.cisco.com/go/designzone

 Cisco IoT Solutions design guides:


https://www.cisco.com/go/iotcvd

 Cisco extended enterprise solution overview and design and implementation guides:

— https://www.cisco.com/c/en/us/solutions/enterprise/design-zone-industry-solutions/index.html#~stickynav=1

— https://www.cisco.com/go/extendedenterprise

 Cisco Enterprise SD-WAN design guides:


https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf

 Cisco SD-WAN product documentation security section:


https://sdwan-docs.cisco.com/Product_Documentation/Software_Features/Release_18.1/05Security

 Cisco SD-WAN vManage Help, Cisco IOS XE Gibraltar 16.11.x, Cisco SD-WAN Release 19.1:
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/vManage-Help/vmanage-help-16-11/administration.html

 Cisco SD-WAN Getting Started Guide:


https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xe-gs-book.pdf

 Cisco IR1101 Datasheet:


https://www.cisco.com/c/en/us/products/collateral/routers/1101-industrial-integrated-services-router/datasheet
-c78-741709.html

 Onboarding Cisco IR1101 with Plug and Play:


https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/sd-wan-wan-edge-onboarding-deploy-gui
de-2019dec.pdf

 Implementing Quality of Service Over Cisco MPLS VPNs:


http://www.ciscopress.com/articles/article.asp?p=471096&seqNum=6

 Beyond the Network: SD-WAN and The Golden Gate Bridge:


https://www.cisco.com/c/dam/en/us/solutions/collateral/cisco-on-cisco/podcast-transcript-material-sdwan-brid
ge.pdf

35
Cisco Extended Enterprise SD-WAN Design Guide

References

 Fastest Wireless Network 2019: It’s Not Even Close:


https://www.tomsguide.com/us/best-mobile-network,review-2942.html

36

You might also like