Cisco SD-WAN Hands-On Training - LABs - 6.8-Print
Cisco SD-WAN Hands-On Training - LABs - 6.8-Print
Cisco SD-WAN Hands-On Training - LABs - 6.8-Print
Day 3 7.
8.
Control Policy Lab
Data Policy Lab
9. Application Aware Routing Policy Lab
10. Control Policy Challenge Lab (Unguided)
Open the Putty application – CLI of the vEdge routers can be accessed here
All vEdges have username/password = admin/admin
*Note: When you are connected via Anyconnect, you can also SSH/HTTPS to vManage and the
vEdges on the Management IP addresses directly from your laptop
1
4/23/18
dCloud Topology
DAY 1
ZTP Lab
2
4/23/18
3
4/23/18
config
vpn 0
interface ge0/0
no shut
commit
*TASK
On the vEdge, configure “no shut” on VPN 0, interface ge0/0 (which has the default “ip dhcp-client”)
4
4/23/18
Rollback
After completing ZTP. We will decommission and rollback the vEdge config to get ready for the next lab
5
4/23/18
Rollback Cont.
• This step prepares the vEdge for initial connection to vManage (next lab)
6
4/23/18
*Be careful with the organization-name, there are white spaces, and case sensitive
7
4/23/18
Verification
• Exit Config mode and verify the control plane is up to vManage and vSmart
vedge# show control connections
PEER PEER CONTROLLER
PEER PEER PEER SITE DOMAIN PEER PRIV PEER PUB GROUP
TYPE PROT SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT LOCAL COLOR STATE UPTIME ID
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vsmart dtls 12.12.12.12 10 1 198.18.1.12 12346 198.18.1.12 12346 biz-internet up 0:00:13:47 0
vmanage dtls 10.10.10.10 10 0 198.18.1.10 12346 198.18.1.10 12346 biz-internet up 0:00:13:47 0
• Show the IPSec tunnels established on the vEdge (*Note: you may not have BFD sessions unless you add
a color to the TLOC, can you add color “biz-internet” under the tunnel-interface on ge0/0)
vedge# show bfd sessions
SOURCE TLOC REMOTE TLOC DST PUBLIC DST PUBLIC DETECT TX
SYSTEM IP SITE ID STATE COLOR COLOR SOURCE IP IP PORT ENCAP MULTIPLIER INTERVAL(msec) UPTIME TRANSITIONS
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10.1.0.1 100 up biz-internet biz-internet 100.64.4.2 172.16.11.2 12386 ipsec 7 1000 0:00:17:12 0
10.1.0.2 100 up biz-internet biz-internet 100.64.4.2 172.16.13.2 12386 ipsec 7 1000 0:00:17:12 0
10.2.0.1 200 up biz-internet biz-internet 100.64.4.2 172.16.21.2 12386 ipsec 7 1000 0:00:17:12 0
10.2.0.2 200 up biz-internet biz-internet 100.64.4.2 172.16.23.2 12386 ipsec 7 1000 0:00:17:12 0
10.3.0.1 300 up biz-internet biz-internet 100.64.4.2 100.64.3.2 9240 ipsec 7 1000 0:00:17:12 0
10.3.0.2 300 up biz-internet biz-internet 100.64.4.2 100.64.3.2 12346 ipsec 7 1000 0:00:17:12 0
• A few commands to help you troubleshoot if connection did not come up *See instructor
• show control connections-history
• show control local-properties
• show run vpn 0
• show run system
• show ip route vpn 0
• ping vpn 0 198.18.1.11
Verification Cont.
• A few commands to help you troubleshoot if connection did not come up *See instructor
• show control connections-history
• show control local-properties
• show run vpn 0
• show run system
• show ip route vpn 0
• ping vpn 0 198.18.1.11
8
4/23/18
9
4/23/18
• This lab tuned the hello interval on the TLOCs to 1 hello every 100ms, and the IPSec tunnel will only go
down if 8 consecutive BFD packets are missed in a row (or 800ms)
10
4/23/18
DAY 2
CLI Template Lab
11
4/23/18
VARIABLES VALUES
HOSTNAME BR2-VEDGE1
LAT 32.79
LONG -96.77
SYSIP 10.4.0.1
SITEID 400
MPLS-GW-IP 172.16.4.1
MPLS-IP-MASK 172.16.4.2/30
VPN-512-IP-MASK 198.18.134.106/18
VPN-512-GW-IP 198.18.128.1
VPN10-INT-IP-MASK 10.4.254.10/24
VPN20-INT-IP-MASK 10.4.20.1/24
VPN30-INT-IP-MASK 10.4.40.1/24
12
4/23/18
13
4/23/18
14
4/23/18
Note: Entering the key is deceiving, all this is, is a detailed description for the operator who ends up inputting the
value to have a better idea of what it is they’re inputting. This is a free form text area.
Make sure you click add after you’ve created the default route and next hop, otherwise it won’t save.
15
4/23/18
16
4/23/18
Note: you can advertise ospf in two places, either from the OMP process which does it
for all VPNs, or on a per-VPN-basis.
17
4/23/18
Note: don’t forget to click add when you create the area/interface and redistribute.
18
4/23/18
19
4/23/18
20
4/23/18
*TLOC-Extension Lab
(Unguided - time permitting)
Verification:
Make sure all interfaces are up
Make sure control plane connections are up on the extended-TLOC
Make sure BFD is up on the TLOC-extension
Make sure OMP routes reflect the additional route on the new transport from each vEdge
Hints:
Make sure there is routing to the TLOC-extension segment on the MPLS side
Make sure there is NAT on the Internet transport
21
4/23/18
172.16.23.0/30
172.16.10.0/30
Controllers
Internet
MPLS Transport
Transport
ZTP
AS 100
AS 200
172.16.3.0/30
TLOC Extension
BR1
.2 ge0/0
VEDGE1 ge0/0 .2 ge0/0 .2
BR1 ge0/1
ge0/1 ge0/1 System-IP
System-IP .2 10.20.20.0/24 .1 VEDGE2 BR2
ge0/2
10.4.0.1
10.3.0.1 .1
ge0/2
.2
System-IP VEDGE1
10.10.10.0/24
.10 ge0/2
ge0/3 .2 ge0/3 .3 10.3.0.2 10.4.254.0/24
VRRP .1
.254 OSPF
10.3.0.0/24 .21
10.4.0.0/24
Dallas .21
Los Angeles
BR1– Site ID 300 BR2– Site ID 400
Test Host Test Host
** Note this is not the actual configuration for the lab – just an example.
Please refer to the LAB diagram for actual IP addresses **
vpn 0 vpn 0
ip route 10.5.52.52/32 100.65.51.1
interface ge0/0 interface ge0/0
description MPLS tunnel description INET tunnel
ip address 100.65.51.1/30 Add route to ip dhcp-client
tunnel-interface reach br1- nat
encapsulation ipsec ! Do not forget
vedge2 mpls NAT
color mpls restrict tunnel end-point tunnel-interface
max-control-connections 1 encapsulation ipsec
[service list] MPLS INET color biz-internet restrict
! max-control-connections 1
interface ge0/1 [service list]
description INET tunnel !
ip address 10.5.51.51/24 interface ge0/1
! ip address 10.5.51.52/24
tunnel-interface ge0/0 ge0/0 tloc-extension ge0/0
encapsulation ipsec 100.65.51.1/24 dhcp no shutdown
color biz-internet restrict ge0/1 ge0/1 !
max-control-connections 1 10.5.51.51/24 10.5.51.52/24 interface ge0/2
[service list] description MPLS tunnel
! ip address 10.5.52.52/24
interface ge0/2 tunnel-interface
ip address 10.5.52.51/24 ge0/2 ge0/2 encapsulation ipsec
tloc-extension ge0/0 10.5.52.51/24 10.5.52.52/24 color mpls restrict
no shutdown br1-vedge1 br1-vedge2 max-control-connections 1
! [service list]
ip route 0.0.0.0/0 100.65.51.2 !
ip route 0.0.0.0/0 10.5.51.52 ip route 0.0.0.0/0 10.5.52.51
22
4/23/18
DAY 3
Control Policy Lab
23
4/23/18
24
4/23/18
25
4/23/18
26
4/23/18
Verification
Check all the vEdges and verify if:
• From branches,
• BFD sessions are only built to the DCs (use “show bfd sessions” from vEdges)
• Only default routes are in the routing table and only to the preferred DC (use
“show ip routes vpn 10”, “show omp routes”)
• From DCs,
• Should see all the routes from the Branches
• Should have all BFD sessions (tunnels) from all the branches
• Should NOT have BFD sessions to the other DC – is it there?
• Need to add a policy to address this requirement*
• Hint:
• From Configuration -> Policies -> Custom Options (top right) -> Topology
• Add Topology -> Custom Control (Route & TLOC)
• Sequence Type -> TLOC
• Accept TLOC from AllBranches
• Reject TLOC from AllDC
• Default Accept
• Add this to the vSmart Policy, then apply it to Site List AllDC
27
4/23/18
28
4/23/18
29
4/23/18
Add another +Sequence Rule, Match on ICMP (protocol 1) -> Action “Accept”
-> Set Local-TLOC MPLS
Add another +Sequence Rule, Match on TCP (protocol 6) & Port 22 -> Action “Accept”
-> Set Local-TLOC biz-internet
30
4/23/18
Go to Traffic Rules -> under Traffic Data -> Add Policy -> Import Existing ->
Import the Data Policy you just created
31
4/23/18
Verification
• Check vSmart policy on the vEdge
• show policy from-vsmart
• Use counters to verify traffic is being matched
• Use traffic simulator on vManage to show where the traffic should
be going
• Use ”show app cflowd flows” to see the path traffic takes
• Fail MPLS/Internet to make sure the redundant path works and
traffic can still pass even if it was intended to be sent on MPLS
32
4/23/18
33
4/23/18
SLA Classes
On vManage -> Configuration -> Policies -> Custom Options -> Lists
• Select SLA Class -> Add the below SLA Classes:
• new_voice_video (latency=150ms; loss=1%; jitter=35ms)
• new_business_app (latency=300ms; loss=2%)
• new_default (latency=500ms; loss=5%)
34
4/23/18
Go to Traffic Rules -> under Application Aware Routing -> Add Policy -> Import
Existing -> Import the AAR Policy you just created
Go to Traffic Application -> Application Aware Routing -> Select Site-List (AllDC
and AllBranches) & VPN-List (10)
35
4/23/18
36
4/23/18
Corporate VPN 10
Wkst-1 Host FW Host FW DC2 – Site ID 200
DC1 – Site ID 100
dCloud-GW
San Jose Chicago
vBond
vManage
Controllers
Internet
MPLS Transport
Transport
ZTP
vSmart
AS 100
AS 200
172.16.3.0/30
vEdge
BR1
.2 ge0/0
VEDGE1 ge0/0 .2 ge0/0 .2
BR1 ge0/1
ge0/1 ge0/1 System-IP
System-IP .2 10.20.20.0/24 .1 VEDGE2 BR2
ge0/2
10.4.0.1
10.3.0.1 .1 10.10.10.0/24
ge0/2
.2
System-IP VEDGE1
.10 ge0/2
ge0/3 .2 ge0/3 .3 10.3.0.2 10.4.254.0/24
VRRP .1
.254 OSPF
10.3.0.0/24 .21
10.4.0.0/24
Dallas .21
Los Angeles
BR1– Site ID 300 BR2– Site ID 400
Test Host Test Host
37
4/23/18
IOT/PCI VPN 20
DC1 – Site ID 100 Test Host Test Host DC2 – Site ID 200
dCloud-GW
San Jose Chicago
.10 .10
10.1.20.0/24 10.2.20.0/24
.2 VRRP .1 .3 VRRP .1
.2 .3
System-IP DC1 DC1 System-IP System-IP DC2 DC2 System-IP
10.1.0.1 VEDGE1 VEDGE2 10.1.0.2 10.2.0.1 VEDGE1 VEDGE2 10.2.0.2
vBond
vManage
Controllers
GuestWifi VPN 40
DC1 – Site ID 100
dCloud-GW
San Jose
vBond
vManage
Controllers
38
4/23/18
Connectivity Tests
39