Step 1 | Choose , and click Add. |
Step 2 | Enter a name for the SD-WAN VPN topology in the Topology Name field. |
Step 3 | Click the SD-WAN Topology radio button and click Create. |
Step 4 | Configure a hub:
-
Click Add Hub.
-
From the Device drop-down list, choose a hub.
-
Click + next to the Dynamic Virtual Tunnel Interface (DVTI) drop-down list to add a dynamic VTI for the hub.
-
Click OK.
-
In the Hub Gateway IP Address field, enter the public IP address of the hub's VPN interface or the tunnel source of the dynamic VTI to which the spokes connect.
This IP address is auto populated if the interface has a static IP address. If hub is behind a NAT device, you must manually configure the post-NAT IP address.
-
From the Spoke Tunnel IP Address Pool drop-down list, choose an IP address pool or click + to create an address pool.
When you add spokes, the wizard auto generates spoke tunnel interfaces, and assigns IP addresses to these spoke interfaces from this IP address pool.
-
Click Add to save the hub configuration.
-
(Optional) To add a secondary hub, repeat Step 4a to Step 4f.
-
Check the ECMP check box to enable Equal Cost Multi-Path (ECMP) on the dynamic VTIs of hub devices with Version 10.0 or later.
All virtual access interfaces on the hub connecting to the same spoke are grouped into an ECMP zone. This feature load balances traffic through multiple paths to a spoke.
-
Click Next.
|
Step 5 | Configure spokes:
Click Add Spoke to add a single spoke device, or click Add Spokes (Bulk Addition) to add multiple spokes to your topology.
For each spoke, the wizard automatically selects the hub's DVTI as the tunnel source IP address.
Note |
If the hub’s tunnel source IP address is an IPv6 address, the wizard automatically selects the first IPv6 address of the spokes' selected interface. To edit the IPv6 address of a spoke's tunnel source, click the edit icon next to a spoke, choose an IPv6 address from the IP Address drop-down list, and click Save.
|
|
Step 6 | Configure authentication settings for the devices in the SD-WAN topology:
-
Authentication Type—For device authentication, you can use a manual pre-shared key, an auto-generated pre-shared key, or a certificate.
-
Pre-shared Manual Key—Specify the pre-shared key for the VPN connection.
-
Pre-shared Automatic Key—(Default value) The wizard automatically defines the pre-shared key for the VPN connection. Specify the key length in the Pre-shared Key Length field. The range is 1 to 127.
-
Certificate—When you use certificates as the authentication method, the peers obtain digital certificates from a CA server in your PKI infrastructure, and use them to authenticate each other.
-
Choose one or more algorithms from the Transform Sets drop-down list.
-
Choose one or more algorithms from the IKEv2 Policies drop-down list.
-
Click Next.
|
Step 7 | Configure the SD-WAN settings:
This step involves the auto generation of spoke tunnel interfaces, and BGP configuration of the overlay network.
-
From the Spoke Tunnel Interface Security Zone drop-down list, choose a security zone or click + to create a security zone to which the wizard automatically adds the spokes' auto-generated Static Virtual Tunnel Interfaces (SVTIs).
-
Check the Enable BGP on the VPN Overlay Topology check box to automate BGP configurations such as neighbor configurations between the overlay tunnel interfaces and basic route redistribution from the directly connected LAN interfaces of the hubs and spokes.
-
In the Autonomous System Number field, enter an Autonomous System (AS) number.
AS number is a unique number for a network with a single routing policy. BGP uses AS numbers to identify networks. The spoke's BGP neighbor configuration is generated based on the corresponding hub’s AS number. Range is from 0 to 65536.
-
If all the hubs and spokes are in the same region, by default, 64512 is the AS number.
-
If the primary and secondary hubs are in different regions, the primary hub and the spokes are configured with 64512 as the AS number, and the secondary hub is configured with a different AS number.
-
In the Community Tag for Local Routes field, enter the BGP community attribute to tag connected and redistributed local routes. This attribute enables easy route filtering.
-
Check the Redistribute Connected Interfaces check box and choose an interface group from the drop-down list or click + to create an interface group with connected inside or LAN interfaces for BGP route redistribution in the overlay topology.
-
Check the Enable Multiple Paths for BGP check box to allow multiple BGP routes to be used at the same time to reach the same destination. This option enables BGP to load-balance traffic across multiple links.
Note that when you enable this option, BGP multipath is enabled only for spokes.
-
(Optional) Check the Secondary Hub is in Different Autonomous System check box. This check box appears only if you have a secondary hub in this topology.
-
In the Autonomous System Number field, enter the AS number for the secondary hub.
-
In the Community Tag for Learned Routes field, enter the BGP community attribute to tag routes learned from other SD-WAN peers over the VPN tunnel. This attribute is required only for eBGP configuration when the secondary hub has a different AS number. This field appears only if you have configured two hubs in the SD-WAN topology.
-
Click Next.
|
Step 8 | Configure Advanced Settings.
-
From the Identity Sent to Peers drop-down list, choose the identity that the peers will use to identify themselves during IKE negotiations.
-
Configure TrustSec (SGT) Settings.
Enable SGT propagation over Virtual Tunnel Interfaces—Cisco TrustSec uses Security Group Tags (SGTs) to control access and enforce traffic on a network. This option enables SGT propagation over SVTIs and DVTIs of the VPN topology. To enable SGT propagation on a specific SVTI or DVTI, configure it in individual devices. Note that the Firewall Threat Defense device must be Version 10.0.0 and later.
-
Configure Bidirectional Forwarding Detection (BFD) Settings.
Enable Bidirectional Forwarding Detection Routing—BFD is a protocol for detecting forwarding path failures. This option enables BFD routing protocol on the SVTIs and DVTIs. When BFD detects a path failure, traffic is rerouted over the newly identified path. Note that the Firewall Threat Defense device must be Version 10.0.0 and later.
-
From the Interval drop-down list, choose the unit of interval, microseconds or milliseconds, at which BFD control packets are sent.
-
In the Multiplier field, enter the number of consecutive missed BFD control packets allowed before declaring that the peer is unavailable. The range is 3 to 50 packets.
-
In the Minimum Transmit and Receive Interval field, enter the minimum transmit and receive interval of the BFD control packets. The range is 50 to 999 milliseconds or 50000 to 999000 microseconds.
|
Step 9 | Click Finish to save and validate the SD-WAN topology.
You can view the topology in the Site-to-Site VPN Summary page (). After you deploy the configurations to all the devices, you can see the status of all the tunnels in this page.
|