Managing.secure.cisco.sd WAN.branch.with.SASE
Managing.secure.cisco.sd WAN.branch.with.SASE
AppQoE with Quality of Service (QoS), FEC, Packet Duplication and TCP Optimization
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4
Lab Environment
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5
Cisco SD-WAN
Architecture and Key Functions
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco SD-WAN Architecture
vManage
Management/
APIs Orchestration Plane
3rd Party
vAnalytics
Automation
MPLS 4G
INET
WAN Edge Routers
Data Plane
Cloud Data Center Campus Branch SOHO
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
8
Management Plane
Management Plane
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9
Orchestration Plane
Orchestration Plane
vManage
Cisco vBond
APIs
3rd Party
vAnalytics • Orchestrates control and
Automation
management plane
vBond • First point of authentication
(white-list model)
vSmart Controllers • Distributes a list of vSmarts/
vManage to all WAN Edge
MPLS 4G routers
INET • Facilitates NAT traversal
WAN Edge Routers
• Requires public IP Address
[could sit behind 1:1 NAT]
• Highly resilient
Cloud Data Center Campus Branch SOHO
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10
Control Plane
Control Plane
vManage
Cisco vSmart
APIs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11
Data Plane Data Plane
Physical/Virtual
WAN Edge
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
12
vAnalytics
vAnalytics
vManage
APIs
• Cloud-based analytics engine
3rdParty
vAnalytics
Automation
• Optional solution element
• Opt-in customer model
vBond • Analyze fabric telemetry
• Capacity projections
vSmart Controllers • SLA violation trends
4G • Utilization anomaly detection
MPLS
INET
• Application QoE
WAN Edge Routers • Carrier grading
• Data anonymization
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13
Programmatic API
vManage REST
APIs
• Programmatic control over all
3rd Party
vAnalytics aspects of vManage
Automation
administration
vBond • Secure HTTPS interface
• GET, PUT, POST, DELETE
vSmart Controllers methods
• Authentication and
MPLS 4G
authorization
INET
WAN Edge Routers • Bulk API calls
• Python scripting
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
14
Cisco SD-WAN Terminology
• Transport Side – Controller or vEdge Interface connected to the underlay/WAN network
• Always VPN 0
• Traffic typically tunneled/encrypted, unless split-tunneling is used
WAN Edge
Connected
Service
Static Side
Dynamic
(OSPF/EIGRP/BGP)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
15
Cisco SD-WAN Terminology (Cont.)
• Site-ID – Identifies the Source Location of an advertised prefix
• Configured on every WAN Edge
• Does not have to be unique, but then assumes same location
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
16
Overlay Management Protocol (OMP)
vSmart
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
17
Transport Locators (TLOCs)
vSmarts advertise TLOCs to
vSmart all WAN Edges*
(Default)
Full Mesh
SD-WAN Fabric TLOCs advertised to vSmarts
(Default)
WAN Edge
Local TLOCs
WAN Edge (System IP, Color, Encap.)
WAN Edge
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
18
SD-WAN Fabric Operation
OMP Update:
vSmart ▪ Reachability – IP Subnets, TLOCs
▪ Security – Encryption Keys
OMP
▪ Policy – Data/App-route Policies
DTLS/TLS Tunnel
OMP OMP
IPSec Tunnel Update Update
BFD OMP Policies OMP
Update Update
Transport1
WAN Edge WAN Edge
TLOCs TLOCs
VPN1 VPN2 Transport2 VPN1 VPN2
BGP, OSPF, BGP, OSPF,
Connected, Connected,
Static A B C D Static
Subnets Subnets
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19
Cisco SD-WAN
Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Policy Overview
Policy
Control Data
Affects Control Plane Affects Data Plane
• Clear separation exists between control plane and data plane policies
• Clear separation exists between centralized and localized functions
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
24
Policy Distribution
Data Policy Control Policy
App Aware Routing Policy VPN Membership Policy Local Policies
OMP OMP
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
25
Policy Building Blocks
• Assemble the three building blocks to configure vSmart policies: Groups of Interest,
Policy Definition, and Policy Application.
Groups of Interest Policy Definition Policy Application
Out
In
Control Policy
Localized
Deployment From Tunnel Direction Data Policy
Site-ID
VPN
WAN Edge
(Site-ID) Data Policy
VPN1 VPN2
From
Service Site-ID
VPN
AAR Policy
LAN1 (from-service only)
LAN2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
27
Cisco SD-WAN
Centralized Policy
Configuration
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Adding a Centralized Policy
Select Centralized Policy and click Add Policy in the Cisco vManage Configuration | Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
29
Step1a: Create Groups of Interest
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
30
Step1b: Create Groups of Interest – Prefix Lists
1
3
4
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
31
Step1c: Create Groups of Interest – TLOC Lists
1 4
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
32
Step2a: Define a Topology (Control Policy)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
33
Step2b: Define a Topology – Simple Hub and Spoke
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
34
Step3a: Configure Traffic Rules (Data Policy)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
35
Step3b: Configure Traffic Rules (Data Policy)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
36
Step4: Apply Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
37
Activating and Editing Policies
Editing Policies
You can only activate one centralized policy at once. Make sure it includes all needed
policies (Control, Data, App-Route, VPN Membership)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
38
Cisco SD-WAN
Control Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Control Policies
• Configured on vManage. Enabled and enforced on vSmart controllers.
They do not get forwarded to WAN Edge routers.
• Control policies operate on OMP routing information received from or sent to
WAN Edge routers. They can filter OMP updates or modify various attributes.
• Control policies can be very powerful tool changing routing behavior of the entire
SD-WAN fabric
• Control policies are used to enable many services, such as:
- Arbitrary VPN Topologies
- Service Chaining
- Traffic Engineering
- Extranet VPNs
- Service and Path affinity
- …
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
40
Control Policy – Arbitrary VPN Topologies
• Problem: Different VPNs must be provided with different connectivity based on
applications being serviced in each VPN
VPN 1: CRM System = Hub and Spoke, VPN 2: Voice = Full Mesh
• Solution: Deploy control policy to control VPN topology
Control Policy
VPN1 VPN2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
41
Control Policy – Arbitrary VPN Topologies (Cont.)
policy apply-policy
lists site-list Branches
site-list Branches control-policy ArbitraryTopology out
site-id 1-3
!
vpn-list CRM
Control Policy
vpn 1
!
vSmart
VPN1
control-policy ArbitraryTopology
Data Center
sequence 10
match route VPN1 VPN1
vpn-list CRM
site-list Branches
Cisco SD-WAN
!
action reject
! Site1 Site3
! VPN2 Site2 VPN2
default-action accept
VPN1 VPN2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
42
Control Policy Example – Data Center Priority
• Problem: Prefer main data center over DR data center. If main data center fails, traffic
should reroute to DR data center.
• Solution: Deploy control policy to influence TLOC priority
Control Policy
Policy Details:
vSmart Main DR
DC DC
Set higher preference on main data
center TLOCs than on DR data
center TLOCs
Cisco SD-WAN
Preference is set on all TLOC
colors using TLOC list
Site1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
43
Control Policy Example – Data Center Priority (Cont.)
policy
lists
site-list Branches
site-id 1-10
tloc-list Main-DC-tlocs Control Policy
tloc-id 10.1.1.1 biz-internet
tloc-id 10.1.1.1 mpls
vSmart Main DR
control-policy prefer-Main-DC DC DC
sequence 10
match tloc
tloc-list Main-DC-tlocs
action accept
set preference 50
Cisco SD-WAN
default-action accept
apply-policy Site1
site Branches
control-policy prefer-Main-DC out
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
44
Control Policy Example – Service Chaining
• Problem: Certain departments require Firewall protection when interacting with data
center networks, while other departments do not
• Solution: Deploy a service chained Firewall service per-VPN
Firewall
Control Policy
Advertise Firewall Service Policy Details:
vSmart Regional Hub
VPN1 - Protected Regional hub advertises
availability of Firewall service
Cisco SD-WAN
Bi-directionally modify TLOC next
hop attribute for VPN1 traffic
Data between Site10 and Data Center
VPN2 - Open
Site10 Center to point at regional hub TLOCs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
45
Control Policy Example – Service Chaining (Cont.)
! Applied on Regional Hub policy
vpn 1 lists
service netsvc1 address 10.0.1.1 site-list fw-inspected
site-id 10
!
Data apply-policy
VPN2 - Open
Site10 Center site-list fw-inspected
control-policy fw-service out
!
VPN1 - Protected VPN2 - Open
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
46
Control Policy Example – Service Chaining (Cont.)
! Applied on Regional Hub policy
vpn 1 lists
service netsvc2 address 10.0.2.1 site-list dc
site-id 1
!
Data
VPN2 - Open apply-policy
Site10 Center site-list dc
control-policy fw-service-
VPN1 - Protected VPN2 - Open return out
!
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
47
Control Policy Example – Shared Services
• Problem: Services residing in a VPN must be shared across users residing in multiple
other VPNs. Some VPNs don’t need access to shared services.
• Solution: Deploy control policy with route exports.
Control Policy
vSmart
VPN100 Policy Details:
Site2
Export VPN2 and VPN3 routes into
VPN1 shared service VPN100, and vice
versa
Cisco SD-WAN
VPN2 VPN1 cannot communicate with
Site1 VPN2, VPN3 or VPN100
Site3
VPN2 Site4
VPN1 VPN3
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
50
Control Policy Example – Shared Services (Cont.)
policy control-policy extranet
lists sequence 10
site-list all-extranet-sites match route
site-id 1-4 vpn-list extranet-clients
action accept
vpn-list extranet-clients
export-to vpn 100
vpn-id 2-3 !
prefix-list extranet-srv-prefix sequence 20
ip-prefix 10.1.1.1/32 match route
Control Policy vpn 100
prefix-list extranet-srv-prefix
action accept
vSmart export-to vpn-list extranet-clients
VPN100 !
Site2 !
default-action accept
VPN1 !
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
51
Hierarchical Control Policy
Region 2
Hub2
10.0.0.2
Hub1
10.0.0.1
Cisco SD-WAN
Region 1 Hub3
10.0.0.3
BFD Session
Region 3
Needed tasks:
• Limit BFD sessions to intra-region and between hubs
• Adapt routing to support desired topology
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
52
Hierarchical Control Policy – Region 1
control-policy hub1 control-policy region1-spokes
sequence 1 sequence 1
match tloc match tloc
site-list region2-3-spokes site-list region2-3
action reject action reject
! !
sequence 5 sequence 5
match route match route
site-list region2-spokes site-list region2-3
action accept action accept
set set
tloc 10.0.0.2 color gold tloc 10.0.0.1 color gold
! !
sequence 10 default-action accept
match route
site-list region3-spokes
apply-policy
action accept
site-list hub1
set
control-policy hub1 out
tloc 10.0.0.3 color gold
site-list region1-spokes
!
control-policy region1-spokes out
default-action accept
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
53
Cisco SD-WAN
VPN Membership Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
VPN Membership Policy
• The default behavior of the OMP architecture is to advertise any configured
VPN to any node where it is configured
- Automatically establishes connectivity without unnecessary configuration and
operational overhead
• Certain VPNs may be of a sensitive nature, such that their membership must
be tightly controlled
• The VPN Membership Policy serves to restrict the distribution of VPN
information from vSmart to those that are explicitly approved
- Both Whitelist and Blacklist behavior can be established
• With a VPN Membership Policy, a node not explicitly allowed to participate in
a VPN may have the VPN configured, but will only see local connectivity and
routing information
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
55
VPN Membership Policy Example
• Problem: Prevent a site from learning reachability for a VPN, even though this same VPN
is locally defined on the WAN Edge router
• Solution: Deploy VPN membership policy to filter OMP advertisements
VPN1 VPN2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
56
Lab Activity
• Lab 1: Implementing Control Policies
• Lab 2: Configuring Service Chaining
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
57
Cisco SD-WAN
Data Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Policies
• Data policies are configured on vManage, enabled on vSmart controllers and
enforced on WAN Edge routers.
• Data policies allow easier fine-grain traffic controls when compared to
control policies.
• Certain objectives can be equally achieved by both control and data policies.
Control policies act on OMP routing advertisements, data policies act on
application traffic characteristics.
• Data policies are used to enable many services, such as:
- Transport Selection, TE
- DIA
- Service Chaining
- QoS
- cFlowd
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
59
Data Policy Example – Path Preference
• Problem: Send critical applications over MPLS transport and non-critical applications
over Internet transport
• Solution: Deploy data policy to set transport for relevant traffic
Data Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
60
Data Policy Example – Path Preference (Cont.)
data-policy prefer_mpls lists
vpn-list vpn10 data-prefix-list DC-Servers
sequence 5 ip-prefix 10.1.1.0/24
match data-prefix-list Clients
destination-data-prefix-list DC- ip-prefix 10.10.1.0/24
Servers !
source-data-prefix-list Clients site-list Site1-2
! site-id 1-2
action accept !
set vpn-list vpn10
local-tloc-list vpn 10
color mpls !
! !
sequence 10
match
destination-data-prefix-list Clients apply-policy
source-data-prefix-list DC-Servers site-list Site1-2
action accept data-policy prefer_mpls from-service
set
local-tloc-list
color mpls
default-action accept
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
61
Direct Internet Access (DIA)
Different options for enabling DIA:
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
62
Option 1: NAT VPN Route - cEdge
Use case: Send all traffic in a Guest VPN via DIA.
Prerequisite: NAT enabled on the outside interface.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
63
Option 1: NAT VPN Route - vEdge
vpn 2
• NAT route does not get redistributed into
ip route 0.0.0.0/0 vpn 0
OMP
vpn 2
router
bgp 65000 • Service side redistribution into OSPF or
address-family ipv4-unicast BGP is supported
redistribute nat
vpn 2
router
ospf
redistribute nat
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
64
Option 1: NAT VPN Route – vEdge (Cont.)
BR1-VEDGE1# show ip route vpn 2
Codes Proto-sub-type:
IA -> ospf-intra-area, IE -> ospf-inter-area, E1 -> ospf-external1, E2 -> ospf-external2,
e -> bgp-external, i -> bgp-internal
Codes Status flags:
F -> fib, S -> selected, I -> inactive,
B -> blackhole, R -> recursive
PROTOCOL NEXTHOP NEXTHOP NEXTHOP
VPN PREFIX PROTOCOL SUB TYPE IF NAME ADDR VPN TLOC IP COLOR ENCAP STATUS
------------------------------------------------------------------------------------------------------------
-
2 0.0.0.0/0 nat - ge0/1 - 0 - - - F,S
2 0.0.0.0/0 omp - - - - 10.1.0.1 mpls ipsec -
2 0.0.0.0/0 omp - - - - 10.1.0.1 biz-internet ipsec -
2 0.0.0.0/0 omp - - - - 10.1.0.2 mpls ipsec -
2 0.0.0.0/0 omp - - - - 10.1.0.2 biz-internet ipsec -
2 10.2.0.0/24 omp - - - - 10.2.0.1 mpls ipsec F,S
2 10.2.0.0/24 omp - - - - 10.2.0.1 biz-internet ipsec F,S
2 10.2.0.0/24 omp - - - - 10.2.0.2 mpls ipsec F,S
2 10.2.0.0/24 omp - - - - 10.2.0.2 biz-internet ipsec F,S
2 10.3.0.0/24 connected - ge0/3 - - - - - F,S
2 10.10.10.0/24 omp - - - - 10.1.0.1 mpls ipsec F,S
2 10.10.10.0/24 omp - - - - 10.1.0.1 biz-internet ipsec F,S
2 10.10.10.0/24 omp - - - - 10.1.0.2 mpls ipsec F,S
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
65
Option 2: Centralized Data Policy
• Problem: Local Internet exit needs to be provided to guest WiFi users. Guest WiFi users
need to be isolated from corporate users.
• Solution: Deploy a data policy in guest VPN with a network address translation
Data Policy
Policy Details:
Internet
vSmart VPN1 – Corporate Define NAT on transport side
interface
Cisco SD-WAN Data Policy
DIA
NAT Force matching traffic in guest WiFi
DIA
Data VPN through a locally defined NAT
Center VPN2 – Guest on transport side interface
Site NAT
VPN1 – Corporate VPN2 – Guest
Data Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
66
Option 2: Centralized Data Policy (Cont.)
apply-policy
site-list Site1-2
data-policy guest-wifi from-
Data Policy
service
site-list Site1-2
Internet site-id 1-2
vSmart VPN1 – Corporate !
vpn-list guest-vpn
vpn 2
Cisco SD-WAN Data Policy
DIA policy data-policy guest-wifi
DIA NAT
vpn-list guest-vpn
Data sequence 10
VPN2 – Guest
Site Center action accept
NAT nat use-vpn 0
!
VPN1 – Corporate VPN2 – Guest
!
Data Policy default-action drop
!
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
67
Tracking Transport Interface Status - vEdge
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
68
Cisco SD-WAN
Application Aware Routing
Policies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Aware Routing
vManage
• Enforce SLA compliant path for
applications of interest App Aware Routing Policy
App A path must have
• Other applications will follow latency <150ms and loss <2%
active/active behavior across all vSmart Controllers
paths
Internet
WAN WAN
Edge Edge
Path 2 MPLS
App A
4G LTE
Path1: 10ms, 0% loss
Path2: 200ms, 3% loss
Path3: 140ms, 1% loss IPSec Tunnel
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Control Plane 70
Bidirectional Forwarding Detection (BFD)
Multiplier = 7
BFD Probe
• Each vEdge router generates BFD packet every • Hello interval and multiplier determine how
“hello” interval many BFD packets need to be lost to declare
IPSec tunnel down
• Path liveliness and quality measurement detection
protocol. Up/Down, loss/latency/jitter, IPSec • Multiplier = 7 by default
tunnel MTU
• BFD packets are generated for each transport
individually. Timers can be adjustment for quicker
detection. Fully customizable per-vEdge, per-
color
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
71
BFD - Transport SLA Monitoring
App-Route Multiplier (6)
• Each vEdge router generates BFD packet • Poll interval determines the average path
every “hello” interval for path quality quality measurement (loss, latency, jitter)
• BFD packets are generated for each transport • App-route multiplier determines the average
individually. Timers can be adjusted for path quality measurement across the poll
quicker detection. intervals
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
72
Brownout Detection - Algorithm
Avg. (B1 + B2 + B3 + B4 + B5 + B6) = Mean
Mean recalculated every Bucket completion cycle
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
73
App-route Policy Path Convergence
160
140
120
SLA-Class Latency Threshold
100 Actual Latency
80
60
Mean Latency
40
20
0
Bucket 1 Bucket 2 Bucket 3 Bucket 4 Bucket 5 Bucket 6
• Current Mean Latency is 20ms, when Latency jumps to 150ms as Bucket 1 collection starts
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
74
Application Aware Routing Policy Example
• Problem: Critical applications traffic needs to take SLA compliant path through the
network to achieve better user quality of experience
• Solution: Deploy Application Aware Routing policy for critical application traffic
Application Aware Routing Policy
Critical Application Policy Details:
Site2
Application Aware
Define SLA class for acceptable
Routing Policy SLA thresholds for loss, latency
vSmart
and jitter
Cisco SD-WAN
Non-Critical Application
Apply SLA class to the application
aware routing policy matching on
Site1 the application traffic of interest
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
77
Application Aware Routing Policy Example (Cont.)
apply-policy lists
site-list spokes app-list voice
app-route-policy voice-priority app-family audio_video
site-list spokes
site-id 1-5
Application Aware Routing Policy
vpn-list vpn10
Critical Application vpn 10
Site2 policy
Application Aware sla-class sla-voice
Routing Policy latency 150
vSmart
loss 1
Cisco SD-WAN !
Non-Critical Application app-route-policy voice-priority
vpn-list vpn10
sequence 1
Site1 match
app-list voice
Non-Critical Application Critical Application !
action
Application Aware Routing Policy sla-class sla-voice preferred-
SLA Path
color mpls
Non-SLA Path
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
78
Cisco SD-WAN
cFlowd Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
cFlowd Policy Example
• Problem: Need to generate application traffic flow records for monitoring and visibility
• Solution: Deploy cFlowd flow export
Flow Collector
Data policy with cFlowd export
VPN1
Policy Details:
Data Center
vSmart VPN1
Define cFlowd template with
export destination IP address
and TCP/UDP port
Cisco SD-WAN Data Policy
Include cFlowd export in the
Site2 data policy matching on
VPN2
Site1 application traffic of interest
VPN1 VPN2
Data Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
80
cFlowd Policy Configuration
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
81
cFlowd Policy Configuration (Cont.)
• Create a Cflowd Policy to specify Collector information.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
82
Lab Activity
• Lab 3: Implementing Data Policies
• Lab 4: Implementing Application Aware Routing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
83
Cisco SD-WAN
Security Use-Cases
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional model
Internet
Network:
Centralized
Security:
Single place to enforce
policies and protection
MPLS VPN
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
85
Today’s model
Internet / SaaS
Network:
Decentralized
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
86
The Attack Surface
NO SECURITY
Inside-out threats
Users and devices request access to
Remote infrastructure and applications
BASIC/NO SECURITY
Access
EXISTING SECURITY
User
Internal threats
Campus IOT Users Mobile
(guests) devices
Traffic must be encrypted and access must
be segmented end to end
Branch
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
87
SD-WAN Exposes New Security Challenges
DIRECT INTERNET ACCESS EXPOSES INGRESS & EGRESS POINTS
External Threats
SaaS IaaS
BASIC/NO SECURITY
Corporate Users (guests)
Software
Devices/IOT Internal Threats
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
88
Challenges with Point-Solution Security
RIGHT SECURITY IN THE RIGHT PLACE
BASIC/NO SECURITY
Corporate Secure DIA/DCA Users (guests)
Software Visibility into all Decrypting traffic
Devices/IOT ONLY traffic and protects for malware
On-Prem against internal detection
Secure Security and external increases edge
WAN access threats device footprint
end-to-end
SD-WAN Fabric
Best balance of Complex & costly
On-Prem security and user
Cisco integrated
to deploy and
solution
WAN Existing Security Separate Separate Cloud & Cloud
and Cloud experience for manage using
eliminates these
Edge Device Stack in DMZ Security Appliance Cisco
Security
SD-WAN Service direct internet different solutions
Security access cons
or vendors
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
89
Cisco SD-WAN
On-prem. Security
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Deployment Use Case - On-prem. Security
Use case: Cloud and DIA Use Case: Industry Use Case: Guest
Compliance Services
On-Prem
DNS/web layer
Firewall Firewall
security Firewall IPS URL
Filtering
IPS DNS/web layer
vManage AMP/TG AMP/TG security
Cloud
Service-Chain
Employee Guest
On-Demand
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
91
Enterprise Firewall App Aware
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ent. Firewall App Aware
SaaS
Internet
• PCI compliance
Service-VPN 1 Service-VPN 2
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
96
Ent. Firewall App Aware: Intra-Zone Security
Zone1 Zone1
SD-WAN
VPN1 VPN1
Fabric
Action: D I P
D - Drop
I – Inspect
Host Host
P – Pass Host Host
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
97
Ent. Firewall App Aware: Inter-Zone Security
vSmart
WAN Edge WAN Edge
VPN1-VPN2
Route Leaking
Zone1 Zone2 Zone1
SD-WAN VPN1
VPN1 VPN2
Fabric
Action: D I P
D - Drop
I – Inspect
Host Host
P – Pass Host Host
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
98
Ent. Firewall App Aware Policy Building Blocks
• Source zone
• Destination zone
• Zone Pairs
• Zone-based firewall policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
99
Security Policy Configuration
vManage >> Configuration >>Security >> Add Security Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
100
Ent. Firewall App Aware Policy Configuration
Create zones and zone-pairs by clicking on ‘Apply Zone-Pairs’.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
101
Ent. Firewall App Aware Policy Configuration
Create zones by selecting ’New Zone List’ or select existing zones.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
102
Ent. Firewall App Aware Policy Configuration
Next step is to configure sequence rules for zone-pairs.
Options available:
• Protocol
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
103
Ent. Firewall App Aware Policy Configuration
Create a sequence rule by configuring a Match condition.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
104
Ent. Firewall App Aware Policy Configuration
Choose Actions for the match condition – It can be Pass, Inspect or Drop.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
105
Configuration - Policy Summary
Make sure “Bypass firewall policy and allow all Internet traffic to/from VPN0 “ is unchecked.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
106
Configuration – Device Template
Go to Additional Templates section and choose the Security Policy Template.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
107
Lab Activity
• Lab 5: Implementing Zone Based Enterprise Firewall
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
108
Intrusion Prevention (IPS/IDS)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Intrusion Prevention
(IPS/IDS)
• Snort IPS is the most widely deployed
engine in the world
• PCI compliance
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
110
Intrusion Prevention – Configuration Workflow
• Find the compatible Security App Hosting Image Version
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
111
Upload Security App Hosting Image
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
112
Intrusion Prevention – Policy Configuration
• Attach VPNs
• Configure fail-open/fail-close
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
113
Policy Configuration (Cont.)
Choose a signature set (Connectivity/Balanced/Security).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
114
Policy Configuration (Cont.)
Choose a mode of operation (Detection/Protection).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
115
Policy Configuration (Cont.)
Choose a Signature Whitelist (optional).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
116
Policy Configuration (Cont.)
Choose an Alert Level for Syslog.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
117
Security App Hosting Profile
Create a Security App Hosting feature template.
Select a Resource Profile for UTD engine.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
118
IPS/IDS Signature Update
• Specify the username and password to use for signature package download from CCO.
• Specify how often vManage should download and check the signature packages.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
119
URL-Filtering (URL-F)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
URL-Filtering Requests for “risky” domain requests
URL Filtering
• 82+ Web Categories with dynamic
updates
White/Black lists of
custom URLs
• Block based on Web Reputation score
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
121
URL-Filtering Policy Configuration
• Web categories
• Allow
• Block
• Web Reputation
• Whitelist URLs
• Blacklist URLs
• Block Page
• Local block page
• Redirect URL
• Alerts
• Attach VPNs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
122
URL-F Policy Configuration
Specify Web Categories to Block (or) Allow.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
123
URL-F Policy Configuration (Cont.)
Specify a lower permissible threshold for Web Reputation score.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
124
URL-F Policy Configuration (Cont.)
(Optional) Click on Advanced and specify the list of custom URLs to be whitelisted or blacklisted.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
125
URL-F Policy Configuration (Cont.)
• (Optional) Specify the Block page server details (Block Page Content).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
126
URL-F Policy Configuration (Cont.)
(Optional) Specify when Syslog alerts should be generated (Whitelist/Blacklist/Reputation/Category).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
127
Lab Activity
• Lab 6: Implementing Intrusion Prevention System and URL-Filtering
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
128
Advanced Malware Protection
(AMP)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Malware
Protection (AMP) AMP
ThreatGrid
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
130
Advanced Malware Protection (AMP)
AMP
1. Snort file pre-processor on the device
identifies file download.
2. Computes SHA256, looks up the hash
in local cache.
Internet
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
131
Advanced Malware Protection and ThreatGrid (AMP & TG)
AMP 1. If the response from AMP is
4 unknown, WAN edge checks for
active content.
2. If active content is found, and
config allows for export, WAN
edge sends it to ThreatGrid for
2
sandboxing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
132
AMP Terminology
• File Reputation
File Reputation is the process in which a SHA256 is looked up against the AMP cloud to access
threat intelligence information.
• File Analysis
File Analysis is the process of submitting a file that the AMP cloud has determined is
DISP_UNKNOWN and ACTION_SEND to the ThreatGrid cloud for detonation in a
sandbox. During the detonation, the sandbox will capture artifacts, observe behaviors, and give
the sample an overall score of abnormal behaviors.
• Retrospection
Retrospection is the process of receiving a change in file reputation intelligence from ThreatGrid
or from TALOS.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
133
vManage – AMP/TG Policy Configuration
AMP and TG configuration available in the same security policy configuration tab.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
134
vManage – Threat Grid API Key Configuration
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
135
UTD Integration with TLS/SSL
Proxy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
TLS/SSL Proxy
• Selectively proxy and decrypt TLS flows
based on L3/L7 rules
On-site Services
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
137
TLS/SSL Decryption (MiTM Proxy)– Solution
Overview
• More Apps/Data-cloud hosted
• Internet going dark
• >80% Internet traffic encrypted Why do you need it ?
• Lack of security control
Data Centre • Malware hidden in encrypted
traffic
Applications
• URL request intercepted
Internet • Server certificate checked
• Proxy resigns server
Certificate
How does it work? • User traffic redirected via
HQ Destined Traffic
proxy
Employee Internet Traffic • Decrypt and inspect
G0/0/0
• Re-encrypt and send
10 101 10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
138
Configuration Workflow
• NTP configuration to sync clock across devices (also the controllers)
• vManage as CA configuration
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
140
Comparison between CA options
Enterprise CA configuration Enterprise CA with SCEP configuration
Benefits Limitations Benefits Limitations
• Certificates can be revoked • Manual certificate deployment • Certificate deployment to TLS • Offers limited visibility
and tracked through your own is required for TLS proxy Proxy can be automated through Cisco vManage
CA • Requires manual re-issuance
of expired proxy certificates
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
141
Configuring CA for TLS Proxy -
Using Enterprise CA w/o SCEP
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enterprise CA – Solution Overview
vManage
IOS
PKI
Enterprise CA Sub CA
CERT
Manager
Client Hello Client Hello
Proxy Cert Server Cert
Proxy Proxy
SSL Session SSL Session
Server Client
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
143
Enterprise CA - Configuration
For the demonstration purposes we are going to use Microsoft CA server.
Prerequisite: CA Server and devices seeking the certificate should be in time sync.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
144
Enterprise CA – Configuration (Cont.)
Step 2: Select the Enterprise CA option.
with SCEP
without SCEP
1. Automatically download CSR for your device
2. Get it signed by your CA
3. Automatically upload the signed cert back on device
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
145
Enterprise CA – Configuration (Cont.)
• Step 3: Get the CA certificate from the CA server.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
146
Enterprise CA – Configuration (Cont.)
• Step 4: Upload CA certificate in PEM format. Save configured certificate authority.
• Step 5.2: Create a new or use one of the already configured security policies.
• Step 5.3: Navigate to the TLS/SSL Decryption tab. Click Add SSL Policy.
Note: Either IPS / URL-F or AMP need to be configured to be able to create Security Policy with TLS/SSL Decryption.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
148
Security Policy Configuration (Cont.)
• Step 5.4: Enable SSL Decryption and provide a policy name.
• Step 5.5: Click on Add rule under Network tab for Network based decryption rules.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
149
Security Policy Configuration (Cont.)
• Step 5.6: Provide Rule Name and corresponding Action.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
150
Security Policy Configuration (Cont.)
• Step 5.8: Under Applications tab one can limit decryption based on defined app-list.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
151
Security Policy Configuration (Cont.)
• Step 5.9: Click on Add Rule under URLs tab to create domain-based decryption rules.
• Step 5.10: Provide a Rule Name and details like Source VPN and TLS/SSL Profile.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
152
Security Policy Configuration (Cont.)
• Step 5.11: Create a new TLS/SSL Profile for the corresponding VPN.
• Step 5.12: Specify various domain categories under various actions and save the
TLS/SSL profile.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
153
Configuring CA for TLS Proxy -
Using vManage as CA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
vManage as CA – Solution Overview vManage
IOS
PKI
Sub CA
CERT
Manager
Client Hello Client Hello
Proxy Cert Server Cert
Proxy Proxy
SSL Session SSL Session
Server Client
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
155
vManage as CA – Configuration
Step 1: Select vManage as CA option.
Step 2: Fill the fields and select the validity of the CA Certificate. Click Save CA.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
156
vManage as CA – Configuration (Cont.)
Step 4: Download and import generated root certificate into the clients’ trust
store as root CA.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
157
vManage as CA – Configuration (Cont.)
Step 5: Configure the Security policy as described in the previous section.
Step 6: Attach configured security policy to the template. Once deployed, certificates
will be configured automatically.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
158
vManage as CA – Configuration (Cont.)
Step 7: To Revoke or renew the certificate, go to Configuration → Certificates → TLS
Proxy tab.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
159
Configuring CA for TLS Proxy -
Using vManage as Intermediate CA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
vManage as Intermediate CA – vManage SSL Initial Config
IOS
PKI
Sub CA
CERT
Manager
Client Hello Client Hello
Proxy Cert Server Cert
Proxy Proxy
SSL Session SSL Session
Server Client
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
161
vManage as Intermediate CA – Configuration (Cont.)
Step 1: Select vManage as CA and tick Set vManage as Intermediate CA checkbox.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
162
vManage as Intermediate CA – Configuration (Cont.)
• Step 3: In the Generate CSR tab, update the fields with desired values and click on
Generate CSR.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
165
Lab Activity
• Lab 7: Implementing Advanced Malware Protection
• Lab 8: UTD Integration with SSL Proxy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
166
Secure Access Service Edge
(SASE)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure Access Service Edge (SASE)
• Gartner
The Future of Network Security is in the Cloud
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
175
Historic traffic flows
Led to the age of perimeter-based security and networking
Network:
Internet
Centralized
MPLS VPN
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
176
Changes in the types of traffic and destinations
Have inverted the traffic model
Internet
Problems: SaaS IaaS
Private cloud Browsing
• Cost
• Performance TRAFFIC TRAFFIC
MPLS VPN
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
177
A more modern approach
Internet / SaaS
Network:
Optimized routing from
anywhere to the cloud
SD-WAN DIA/DCA
Security:
Enforced at the cloud edge
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
178
SASE Starts with Security but Includes More
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
179
Cisco SASE – Connect, Control and Converge
Converge
Connect Control
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
180
Cisco Umbrella
DNS-layer Security
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Where Does Umbrella Fit?
Malware
C2 Callbacks
Phishing
AV AV AV AV AV Port agnostic
HQ BRANCH ROAMING
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
182
Cisco Umbrella Evolution
OpenDNS Umbrella Cisco Cisco Umbrella adds Cisco Umbrella adds
for Business enterprise acquisition security functionality SWG, CDFW, and
internet CASB functionality plus
security SDWAN integration
DNS DNS +
Set of security
resolution Security
services integrated
in the cloud Multi-function security
and SD-WAN
SIG
SASE
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
183
It all Starts with DNS
Traffic redirection - DNS Policy
DNS based redirection Resolvers Internet
Selective Proxy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
184
DNS-layer Security
• Safe request:
Umbrella resolves the DNS query,
Safe Malicious
returning IP of requested domain request request
• Malicious request:
Umbrella replies with IP of our
block page
• Risky request:
Umbrella replies with IP of our
selective proxy for further inspection
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
185
DNS-layer Security - Workflow
Safe Blocked
request request
WAN Edge
Cisco
DNS Request (1)
Umbrella
Internet
DNS Response (4)
• Comes with Umbrella at DNA-E/A (no enforcement, • Comes with DNA Advantage
only monitoring) • Comes as part of embedded security in an IOSXE SD-WAN
• Enforcement with Umbrella SIG Essentials in DNA-P Cisco router with 8GB memory
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
187
DNS-layer Integration – Configuration steps
1. Generate and retrieve API key/secret from Umbrella dashboard.
2. Create a security policy template for Umbrella DNS Security.
3. Create a device template that includes the security policy template.
4. Attach the device template to the device.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
190
Step 1: Which API key to use
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
191
Step 1: Which API key to use (Cont.)
DNS provisioning
SIG tunnel
provisioning
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
192
DNS-layer Integration - Configuration Workflow
• Generate and copy Network Devices API key/secret from Umbrella dashboard.
• Locate and save ORG ID from the Umbrella URL.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
193
DNS-layer Integration - Configuration Workflow (Cont.)
• In vManage, navigate to Configuration -> Security -> Custom Options -> Umbrella Registration.
• Populate your Org ID + REG key/secret values.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
194
DNS-layer Integration - Configuration Workflow (Cont.)
• Add Security Policy -> Custom -> Add/Modify DNS Security Policy.
• Specify Target VPNs and optionally define Local Domain Bypass List.
DNSCrypt option enables us to encrpyt DNS traffic with EDNS (Device ID and Client IP) data.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
195
DNS-layer Integration - Configuration Workflow (Cont.)
• Deploy a defined security policy on the Edge devices using a device configuration template.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
196
DNS-layer Integration - Verification
• Verify successful Umbrella integration by navigating to Monitor -> Network -> {select a device} Real
Time -> Umbrella Device Registration.
Two tabs: DNS Re-direct count and Local Domain Bypass count.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
198
Umbrella – DNS Policy Overview
• In Umbrella, navigate to Deployments -> Core Identities -> Network Devices.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
199
Umbrella – DNS Policy Configuration
• Navigate to Policies -> Management -> DNS Policies and click Add.
When the DNS Policies page opens for the first time, it only lists the Default
policy, which should be configured as your policy of last resort.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
200
Umbrella – Set up a Policy Wizard
• Select the Policy wizard components you'd like enabled and determine how Umbrella will block
threats.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
201
Umbrella – Set up a Policy Wizard
• Select the identities you wish to apply this policy to.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
202
Umbrella – Configure the policy
• A progress bar appears listing the step you are on and the number of steps remaining until you've fully
configured the policy.
The steps available here are determined by the choices you made in step one Set up the Policy Wizard.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
203
Umbrella – Configure Security Settings
• Click Add New Setting. Define Name Setting and click Create.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
204
Umbrella – Configure Security Settings (Cont.)
• Define categories to be blocked.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
205
Umbrella – Limit Content Access
• Content Categories organize websites into categories based on the type of information served by the
site. Select appropriate one or define a custom one.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
206
Umbrella – Configure Application Settings
• Select applications you'd like to block identities from accessing. Create a new Application list.
If an application should
override a block, then
change the block action
to allow.
Note: You must enable SSL Decryption in order Application filtering to work. If not already
done, you must also download and install the Cisco Umbrella root certificate.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
207
Umbrella – Configure Destination Lists
• Destination lists control identity access (allow / block) to specific internet destinations. Destinations
supported are:
• Blocked – Domains and URLs. For URLs, you must also enable the intelligent proxy, SSL decryption and install
the Cisco Umbrella root certificate.
• Allowed - Domain, IP address (IPv4), or CIDR.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
208
Umbrella – Configure File Analysis
• When enabled, Umbrella inspects inbound files for malware using anti-virus signatures and AMP file
reputation before the files are downloaded. Enable File Inspection.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
209
Umbrella – Configure Block Page Settings
• Block Page settings let you set the appearance of the block page that displays when a request is
made to access a web page that is blocked by policy settings.
Note: Not all categories can be bypassed. If access is blocked for a Security or Malware category,
the site is considered malicious and should not be accessed under any circumstances.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
210
Umbrella – Configure Block Page Settings (Cont.)
Add a Bypass User
• A bypass user can bypass block pages by authenticating against the block page.
Note: Not all categories can be bypassed. If access is blocked for a Security or Malware
category, the site is considered malicious and should not be accessed under any circumstances
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
211
Umbrella – Review and save your policy
• The last step of the Policy wizard is the Policy Summary page, which lists the policy's current
configuration. Review it and click Save.
Note: Once the DNS policy is saved, it may take upwards of five minutes for the policy to
replicate through Umbrella’s global infrastructure and start taking effect.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
212
Umbrella – Enable Advanced Settings
SSL Decryption, IP-Layer Enforcement, SafeSearch,…
• Once the configured policy is saved, click on the dropdown icon on the far right to expand advanced
configuration possibilities.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
213
Umbrella – Enable Advanced Settings (Cont.)
SSL Decryption
• Allows the intelligent proxy to inspect traffic over HTTPS and block custom URLs in destination lists.
Note: Umbrella logs are CSV formatted, compressed (gzip), and saved every ten minutes.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
215
DNS Policy Tester
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
218
Activity Search
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
219
Lab Activity
• Lab 9: Implementing DNS Security with Cisco Umbrella
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
220
Cisco Umbrella
Secure Internet Gateway (SIG)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Connection Methods
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
222
Enforcement that works together
Internet/
SaaS
DEVICE EDGE
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
224
Policy Outcome Flow
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
225
Policies
Internet
DNS blocks:
Domains in a Destination List
CDFW allows:
Allows port 80/443
Outcome
1. DNS policy evaluated NAT
Block page IP
Blocked site 1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
226
Policies
Internet
DNS allows:
Domains in a Destination List
CDFW blocks:
Blocks a range of suspicious IPs,
including one matching a domain in
the DNS Destination List
NAT
Outcome DEST. LIST 172.2.2.2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
227
Policies
Internet
DNS allows:
Destination List, some sites
matching shopping 4a SWG allow
CDFW allows:
All 80/443 and port 21
4a
SWG allows/blocks:
NAT
Shopping
DEST. LIST 80/443/21 SHOPPING
Outcome 80/443
3b
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
228
Policies Non-HTTP Policy Verdict
Internet
DNS allows:
Domains in a Destination List, some
sites matching shopping 4a
SWG allow
CDFW allows: CDFW Allow
All 80/443 and port 21
4a
SWG allows/blocks:
NAT
Shopping Port 21
DEST. LIST 80/443/21 SHOPPING
Outcome 80/443
3b
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
229
SIG – Configuration Workflow
• Umbrella can be seamlessly integrated into Cisco SD-WAN using feature and device templates in
vManage.
• Generate an API secret/key pair from the Umbrella dashboard.
• Locate and save ORG ID from the Umbrella URL
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
233
SIG – Configuration Workflow (Cont.)
• Optionally add your Smart Account credentials to vManage to enable automatic retrieval of Umbrella
Organization ID, (Registration) API Key, and Secret.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
234
SIG – Configuration Workflow (Cont.)
• Configure a Cisco SIG Credentials feature template (either manually enter the Umbrella Organization
ID, Registration Key, and Secret values or use the ‘Get Keys’ button if you have connected your Cisco
Smart Account)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
235
SIG – Configuration Workflow (Cont.)
• Configure a Cisco Secure Internet Gateway (SIG) feature template.
Define IPsec tunnels and set the IKEv2/IPsec parameters.
Auto Tunnel
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
236
SIG – Configuration Workflow (Cont.)
• Identify High Availability Pairs.
HA Pairs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
237
20.4
Weighted Load-Balancing
ECMP
Feature
Cisco Load balancing is done by flow pinning, where a
ECMP ECMP
flow is dictated by hashing the 4 Tuple
IPsec
IPsec
load-balancing load-balancing
1:1 1:1
Source IP + Destination IP + Source Port + Destination
Port.
vManage Branch
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
238
SIG – Configuration Workflow (Cont.)
• Add a Service Route that will redirect all traffic in the VPN to SIG.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
239
20.4
Cisco
Use case
Umbrella
As a network admin, I want only my certain app traffic from
Branch 1 routed to Umbrella and all traffic from Branch 2, this
allows me to optimize for my WAN capacity.
Feature
Offers Customers flexibility to select which applications O365
IPsec
IPsec
• All Traffic
Github
send traffic to Umbrella
Google Services
• Customers can limit which types of traffic is routed through
Umbrella according to their preferences
• Leverage DPI for app-classification within Data policy
Branch 1 Branch 2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
240
SIG – Configuration Workflow (Cont.)
• Create a Data Policy and selectively match traffic of interest that you would like to send to SIG.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
241
SIG – Configuration Workflow (Cont.)
• Attach the feature templates to the device templates you wish to deploy the Umbrella SIG on.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
242
SIG – Configuration Workflow (Cont.)
• Confirm in the Umbrella Dashboard that your tunnels are active.
• You are now ready to begin configuring your SIG Cloud FW/SWG security policy!
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
243
SIG High Availability and
Redundancy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Failover Conditions
Data center (DC) Issues
There are situations when the Umbrella Umbrella
service itself experiences issues
2
Umbrella DC 2
DC 1
In this case, there are multiple instances
1 3
Availability
• 99.9% guaranteed uptime; hybrid Waltham office SF office
Anycast is used for availability
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
245
IPSec Tunnel Data Center Failover
• Data centers divided into regions
• Regions have defined DR sites
IPSEC Capacity
• >250 Mbps/tunnel in each direction (IMIX) with
Los Angeles Palo Alto
ongoing development to increase capacity 146.112.67.8 146.112.66.8
Primary Secondary
• Multiple tunnels can be deployed to support
higher capacity In case of primary failure,
uses secondary DC in the
Availability same region
Dallas TX
Automatic
Branch
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
247
20.4
1Gbps Aggregate
from a single device
250Mbps
250Mbps
250Mbps
250Mbps
• Cisco SD-WAN ECMP load-balances traffic between
IPsec tunnels
vManage Branch
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
248
20.5
Use case
• As a security admin, I need to make sure our
security architecture complies with the regional
compliance requirements.
• Our regional branches in APJC/Europe requires
that cloud data-center should be hosted within a
particular region/country.
Feature
• Starting 20.5 release, vManage provides the
flexibility for customers to select the umbrella data-
center of their choice.
• Drop-Down list with a pre-populated list of Umbrella
DC’s a customer can pick to meet their regional
compliance.
• Flexibility to auto-select closest data-centers as a
default option or manually select the data-centers of
your choice.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
249
Cloud-delivered Firewall
(CDFW)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud-delivered Firewall (CDFW)
Internet
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SD-WAN ON/OFF NETWORK DEVICES 251
251
Outbound Firewall Functionality
Inbound Outbound
Inbound
VPN Access Control
Branch to branch VS Security features
WAF DLP Compliance
Outbound
IDS/IPS Proxy features
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
252
Firewall Policy
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
253
Firewall Policy Rule
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
254
Firewall Policy Rule (Cont.)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
255
L7 NBAR2 Based Capability
Use-case: blocking of non-HTTP/S applications
Example:
• Customer needs to block Tor
• While DNS helps, Tor doesn’t always send DNS queries
• SWG cannot intercept as traffic is not HTTP/S
• L7 Firewall provides coverage here
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
256
Application Visibility and Control (AVC)
Cloud-delivered firewall
Secure web gateway
Granular control of web apps
• Layer 7 Application Visibility and Control
DNS-layer security over HTTP/S (ports 80/443):
• Extends visibility, protection, control to:
• Visibility into cloud apps • Block uploads to cloud
used in organization storage apps - Non-web (non-HTTP/S) traffic
• Identify potential risk • Block posts/shares to social - Apps that use hard-coded IP addresses
and block specific apps media apps and do not perform DNS lookup
(16K apps discoverable) • Block attachments - Apps where signature-based detection
to webmail apps (not based on IP, domain, URL) is required
• Tenant restrictions to detect and block
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
257
Activity Search Reporting
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
259
Secure Web Gateway (SWG)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Don’t we already do this with DNS?
• Anatomy of a URL
https://video.google.co.uk:80/videoplay?docid=-7246927612831078230&hI=en#00h02m30s
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
261
HTTPS Inspection
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
262
HTTPS traffic and URL visibility requirements
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
263
HTTPS Inspection
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
264
Secure Web Gateway (SWG)
Internet/
SaaS
SaaS app
• Category or URL filtering for content e.g. O365
control
App visibility and granular controls
Direct
•
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
265
Web Policy
Rules
Rulesets
Ruleset
Settings
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
266
Content Control
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
267
Granular App Control
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
268
Granular App Control (Cont.)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
269
File Type Control
• Blocking file downloads by type
• File Detection on a combination of
• File Extension
• File Signature
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
270
File Type Control (Cont.)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
271
File Analysis
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
272
Full URL Tracking and Reporting
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
273
Activity Search for SWG
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
277
Cloud Access Security Broker
(CASB)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Secure CASB types
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
279
Use-case: Protect use of cloud apps
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
280
Cisco Cloud Access Security Broker (CASB)
• Addressing Shadow IT
• Cloud anti-malware, providing cloud
app data security
• Cloud DLP, providing cloud app
data protection
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
281
Addressing Shadow IT Challenges
Integrated technology from Cloudlock within Umbrella
View SaaS app activity > Understand risk info for apps > Block unapproved apps
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
282
App Discovery and Control
Visibility into shadow IT and control of cloud apps
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
283
App Discovery & Blocking - Workflow
1 Identify apps in App Discovery
Select the “Edit app controls”
2 link under the app
Presentation
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
284
Tenant Controls
Select the instance(s) of Core SaaS applications that can
be accessed by all users or by specific groups/individuals
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
285
Tenant Controls (Cont.)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
286
Lab Activity
• Lab 10: Configure Umbrella SIG
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
291
Cisco SD-WAN
Application Quality of
Experience (AppQoE)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
AppQoE = Application Quality of Experience
Main Goal: provide enhanced application experience in SD-WAN.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
303
Implementing QoS
Data Policy
vManage Classification of application traffic into
QoS forwarding classes (queues)
vSmart
Ingress Interface Egress Interface
QoS Forwarding QoS
Classes Scheduler Out
FC Q
Application
FC Q
Traffic
FC Q
Egress Interface
Ingress Interface
Q1
Q2
- Unused bandwidth is distributed
between Q1-Q7
Q7
Classification Queuing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
305
Shaping
• Egress physical or sub-interfaces
- Interface-level
• Conforming to shaping rate: Forward
- There are tokens in the bucket
Rate
• Exceeding shaping rate: Queue Tokens
Token Bucket
- There are no tokens in the bucket
- Weighted Round-Robin WAN Edge
Egress Interface
Ingress Interface
Classification Shaping Queuing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
306
Policing
• Ingress and Egress Policing
- Interface or sub-Interface
• Classification
- [Sub] interface, 6 tuple or DPI
Rate
- Local or central data policy Tokens
• Conforming to policing rate: Forward Token Bucket
Egress Interface
Ingress Interface
• Burst Rate: Configurable
- Token bucket depth
802.1p
DSCP
DSCP
DSCP
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
308
Forward Error Correction (FEC)
• Protects against packet loss • Supports multiple transports
• Protocol (TCP/UDP) agnostic • Can be invoked dynamically
• Operates per-tunnel • Applied with data policy
5 6 1 2
7 8 3 4
Sender Receiver
SD-WAN Tunnel
FEC Header 309
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
FEC Modes
• Adaptive FEC
• FEC-adaptive implies that the corresponding packets will be subjected to FEC only
if the tunnels that they go through have been deemed lossy.
• We rely on BFD infrastructure that calculates the loss on the tunnel in terms of lost
BFD packets per PFR poll interval.
• Adaptive FEC will start to work by 2% packet loss. This value is also hard coded in
18.4 release and is not configurable.
• Please note, that FEC adaptive option is currently supported only for vEdge routers
and not on Cisco IOS XE SD-WAN (cEdge) routers.
• FEC Always
• FEC-always implies that the corresponding packets will be subjected to the FEC
algorithm ALWAYS and will not depend on our estimation of whether the tunnel is
lossy or not.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
310
Packet Duplication
• Protects against packet loss • Operates over multiple tunnels
• Protocol (TCP/UDP) agnostic • Applied with data policy
Flow1 .... 2 1 D
2 D
1 2 1 .... 2 1
Flow2 .... 2 1 2 1 2 1
.... 2 1
D D
• Allows duplicating all packets for critical traffic (i.e. credit card / ATM transactions) and sending the
duplicated packets over a second path.
• Works well when the amount of critical traffic is far less than the capacity of the network.
• In case of multiple circuits, we choose the best performing circuit (least amount of loss) to replicate the
packets to.
• Notes:
- Works only over multiple tunnels
- Duplicates are discarded on receiver
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
311
TCP Optimization
Optimized
TCP Connections TCP Connection TCP Connections
SD-WAN
Fabric
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
312
Multi-Cloud Application
Optimization -
Cloud onRamp for SaaS
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SaaS Adoption & Key Challenges
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
314
How are customers accessing SaaS today?
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
315
Optimize SaaS with
SD-WAN for No DIA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
316
Quality Probing for
Single DIA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
317
SaaS applications &
vQoE scores
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
318
Optimize SaaS with
Cloud onRamp for
Dual DIA
Best
Performing
• Cloud onRamp continuously monitors the Loss/
Latency
edge to SaaS performance on both the
DIA paths
ISP1 ISP2
• Cloud onRamp picks the best performing
path based on the performance metrics
(loss & delay)
MPLS 4G
Datacenter
INET
Remote Site
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
319
Cloud onRamp for SaaS -
Configuration
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Settings for Cloud onRamp
• Enable Cloud onRamp.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
321
Cloud onRamp for SaaS Dashboard
• Applications enabled will be shown here.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
322
Applications
• Select Applications and VPNs
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
323
Gateways
• Select Gateways.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
324
Client Sites
• Select Client sites.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
325
DIA Sites
• Select DIA sites.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
326
Cloud onRamp for IaaS
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Why extend SD-WAN to the Cloud?
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
328
Cloud onRamp for IaaS
Public Cloud (AWS & Azure) connectivity solution consumable through the vManage platform
Public cloud credentials
IaaS instances vManage invokes added along with other
mapped to instantiation of information to instantiate
VPNs in the WAN Edge vManage WAN Edge GWs
Cisco SD-WAN instances and adds
overlay routers to overlay Platform
IaaS instances
MPLS
Branch
IaaS instances
Cloud GW
New instances
automatically
added and Public Cloud Provider 1 Region 1
Internet
reachable
through the
DC
Cisco SD-WAN
overlay
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
329
Multi-Cloud onRamp for IaaS
Standard IPSec + BGP SD-WAN Standard IPSec + BGP
(2x) (2x)
VPC VNET
BGP <-> OMP BGP <-> OMP
AZ1
AS1
VPC VNET
VPN
VGW
AZ2 GW AS2
AZ1 INET
Host VPC WAN Edge WAN Edge
Host VNET
AS
MPLS
VGW VPN
AZ2 GW AS2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud onRamp for Co-Location as SaaS Gateway
Regional Hub/CoLo
CSP5444 VNFs
1
Cat9500-40 GW
• Service Group:
Router->Firewall->Cloud
SD-WAN • Policy:
Cloud onRamp for SaaS Gateway
Cloud onRamp
for CoLo 2
DIA • Policy:
1 2 Cloud onRamp for SaaS DIA
Remote
Site
vManage
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
332
Cisco
How Does it Work? vManage/ vBond
Cisco CSP5444 #2
Netconf
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
333
Lab Activity
• Lab 11: Implementing Cloud OnRamp for SaaS
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
334
Licensing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco DNA SD-WAN Licensing
Use Case Based Packaging
Flexible Policy by
Common SD-WAN architectures Network analytics and visibility Identity SAML or AD
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
336
Cisco DNA SD-WAN Licensing (Cont.)
Capability Based Packaging
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
337
Roadmap
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
339
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential