Design and Deployment using the Cisco Smart Business Architecture (SBA)

58
© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public Design and Deployment using the Cisco Smart Business Architecture (SBA) Anastasia Marchenko Systems Engineer Cisco [email protected]

Transcript of Design and Deployment using the Cisco Smart Business Architecture (SBA)

Page 1: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Design and Deployment using the Cisco

Smart Business Architecture (SBA)

Anastasia Marchenko

Systems Engineer Cisco

[email protected]

Page 2: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Design and Deployment Using SBA

• SBA WAN Overview

• SBA WAN Design Methodology

• Key Aspects of the Design

• Summary

Agenda

2

Page 3: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

The Challenge

Which platform should I choose? Many to choose from at each place in the network

ASR1000

WAE-7341

What are the best practices?

How do I manage it?

How do I put it all together?

How can I do it quickly?

How can I anticipate what

the network might need to

do in the future so I don’t

have to revisit my design

and deployment?

3

Page 4: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Cisco Smart Business Architecture

Overview

Tested

Optimized

Flexible Flexible architecture to help ensure easy migration as the organization grows

One architecture to scale for different size organizations

Multiple tiers to match your organization’s needs without changing the network architecture

A reference design, tested, and supported by Cisco

Comprehensive Seamless support for quick deployment of wired and wireless network access

for data, voice, teleworker, and wireless guest

Secure Security and high availability for corporate information resources, and Internet-facing applications

Performance Improved network performance and cost reduction through the use services like WAN optimization

4

Page 5: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Cisco SBA Design Overview

5

Page 6: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

SBA WAN Deployment Principles

Ease of Deployment: Deploy the design consistently across all products included in the architecture. The configurations used in the deployment represent a best-practice methodology to enable a fast and resilient deployment.

Flexibility and Scalability: The architecture can grow with the organization without being redesigned.

Resiliency and Security: The architecture keeps the network operating even during unplanned outages and attacks.

Easy to Manage: The deployment guidance includes configuring devices to be managed by a network management system (NMS) or as unique elements of the network.

Advanced Technology Ready: Implementing advanced technologies like collaboration is easy because the network foundation is already configured with the required baseline network services.

6

Page 7: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Borderless Networks SBA Guides for Enterprise:

MPLS WAN Deployment Guide

Layer 2 WAN Deployment Guide

VPN WAN Deployment Guide

http://www.cisco.com/go/sba

Deployment Guide Transports Usage WAN Aggregation Design

Models

MPLS WAN

MPLS L3 VPN Primary/Secondary

Dual MPLS

MPLS Dynamic

MPLS Static

Layer 2 WAN

Layer 2 WAN Primary

Trunked Demarcation

Simple Demarcation

VPN WAN Internet/DMVPN Primary/Secondary

Dual DMVPN

DMVPN Only

DMVPN Backup Dedicated

DMVPN Backup Shared

VPN Remote Site

over 3G/4G

3G/4G Internet/DMVPN

Primary/Secondary

Remote site only

Group Encrypted

Transport VPN

MPLS L3 VPN

Layer 2 WAN

Primary/Secondary

Primary

Compatible with all design

models

7

Page 8: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

WAN Design and Deployment Using SBA

• SBA WAN Overview

• SBA WAN Design Methodology

• Key Aspects of the Design

• Summary

Agenda

8

Page 9: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Hierarchical WAN Design

Core/

Distribution

Distribution

Access

Data Center /HQ

Regional hub

Spoke Site 1

Spoke Site N

...

Regional hub

Spoke Site 1’

Spoke Site N’

...

Core

Spoke Site 1

Spoke Site N

...

Data Center /HQ

SBA ≤ 500 Remote Sites

9

Page 10: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

WAN-Aggregation Reference Design

MPLS A

MPLS B

Layer 2 WAN

ISP A / ISP B

DMVPN Hub

Routers

Internet Edge

DMVPN 1 DMVPN 2

MPLS CE

Routers

Layer 2 WAN

CE Router

WAN Distribution

Layer

Core Layer

10

Page 11: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Basic Remote

Site

WAN Remote Site Designs

11

Page 12: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS

Non Redundant

MPLS WAN

MPLS + Internet

WAN

Internet WAN

Internet

DMVPN

Redundant Links

MPLS

MPLS-A MPLS-B

Internet

DMVPN

Internet

(DMVPN-1)

Internet

(DMVPN-2)

Redundant Links

& Routers

MPLS

MPLS-A MPLS-B

Internet

DMVPN

Internet

(DMVPN-1)

Internet

(DMVPN-2)

WAN Remote Site Designs (MPLS and DMVPN)

12

Page 13: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

VPLS

Non Redundant

VPLS WAN

3G/4G

Internet WAN

3G/4G

(DMVPN)

VPLS + Internet WAN

Redundant Links

VPLS Internet

(DMVPN-1)

Redundant Links

& Routers

VPLS Internet

(DMVPN-1)

MPLS + 3G/4G

Internet WAN

MPLS 3G/4G

(DMVPN) MPLS 3G/4G

(DMVPN)

WAN Remote Site Designs (L2, 3G/4G and DMVPN)

13

Page 14: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Single Router Remote Sites

Add router and transit

network and enable

HSRP

Vlan65 – wireless data

Vlan64 - data

Vlan70 – wireless voice

Vlan69 - voice

802.1q Vlan trunk (64-65, 69-70)

No HSRP

Required

Dual Router Remote Sites

Vlan65 – wireless data

Vlan64 - data

Vlan70 – wireless voice

Vlan69 - voice

Vlan99 - transit

802.1q Vlan trunk (64-65, 69-70, 99)

HSRP Vlans

Active HSRP Router

Vlan Usage Access Layer Only Designs

IP Network Assignment (Example)

Vlan65 Wireless Data Yes 10.5.50.0/24

Vlan70 Wireless Voice Yes 10.5.51.0/24

Vlan64 Data 1 Yes 10.5.52.0/24

Vlan69 Voice 1 Yes 10.5.53.0/24

Vlan99 Transit Yes (dual router only) 10.5.48.0/30

WAN Remote Site Reference Designs

Access Layer Only

14

Page 15: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Single Router Remote Sites Dual Router Remote Sites

Add distribution layer

802.1q trunk (50)

Vlan50 – router 1 link

802.1q trunk (xx-xx) 802.1q trunk (xx-xx)

data

voice

data

voice

802.1q trunk (54,99) 802.1q trunk (50,99)

Vlan54 – router 2 link

Vlan50 – router 1 link

Vlan99 – transit

802.1q trunk (xx-xx) 802.1q trunk (xx-xx)

data

voice

data

voice

(with transit network

for dual router sites)

WAN Remote Site Reference Designs

Distribution and Access Layer

15

Page 16: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Vlan102 - data

Vlan103 - voice

No HSRP

Required

802.1q trunk (54,99) 802.1q trunk (50,99)

Vlan54 – router 2 link

Vlan50 – router 1 link

Vlan99 – transit

Vlan100 - data

Vlan101 - voice

VlanWD – wireless data

Vlan106 – management)

VlanWV– wireless voice

802.1q trunk (100, 101) 802.1q trunk (102-103)

802.1q trunk (106, WD, WV)

WLAN Controller Required

for Distribution Layer Design

to Support Roaming

WAN Remote Site Reference Design

Distribution Layer Wireless LAN Integration

16

Page 17: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

WAN Design and Deployment Using SBA

• SBA WAN Overview

• SBA WAN Design Methodology

• Key Aspects of the Design

• Summary

Agenda

17

Page 18: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

WAN Edge

Connection Methods Compared

WAN

WAN Edge Router

Core/Distribution Core/Distribution Core/Distribution

Single Logical Control Plane

Port-Channel for H/A

SBA Recommended

All

No static routes

No FHRPs

WAN WAN

This Topic Is Covered in Detail in BRKCRS-2030

18

Page 19: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Optimize Convergence and Redundancy

Multichassis EtherChannel

P-to-P Link Layer 3

Provide Link Redundancy and reduce peering complexity

Tune L3/L4 load-balancing hash to achieve maximum utilization

No L3 reconvergence required when member link failed

No individual flow can go faster than the speed of an individual member of the link

VSS or 3750 Stack

IGP recalc

Channel Member Removed

Link redundancy achieved through redundant L3 paths

Flow based load-balancing through CEF forwarding across

Routing protocol reconvergence when uplink failed

Convergence time may depends on routing protocol used and the size of routing entries

19

Page 20: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

BGP AS = 65511

MPLS A AS 65401

DMVPN Hub

Router

DMVPN 1

EIGRP (100)

MPLS CE Router

EIGRP

BGP

eBGP

WAN Distribution

Layer

D 10.5.48.0/21 [90/xxxxx] via 10.4.32.18

10.5.48.0/21

Remote Site

10.4.32.18

WAN Dual-Path Route Preference

• eBGP routes are redistributed into EIGRP-100 as external routes

with default Administrative Distance =170

• Running same EIGRP AS for both campus and DMVPN network

would result in Internet path preferred over MPLS path

Incorrect Choice of Primary Path (DMVPN)

Mutual Route Redistribution

20

Page 21: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

BGP AS = 65511

MPLS A AS 65401

DMVPN Hub

Router

DMVPN 1

EIGRP (200)

MPLS CE Router

EIGRP

BGP

eBGP

WAN Distribution

Layer

D EX 10.5.48.0/21 [170/34304] via 10.4.32.2

EIGRP

EIGRP

10.5.48.0/21

Remote Site

10.4.32.2

WAN Dual-Path Route Preference

• Multiple EIGRP AS processes can be used to

provide control of the routing

EIGRP 100 is used in HQ location

EIGRP 200 over DMVPN tunnel

• Routes from EIGRP 200 redistributed into EIGRP

100 appear as external route (distance = 170)

Correct Choice of Primary Path (MPLS)

MPLS CE router#

router eigrp 100

default-metric 1000000 10 255 1 1500

EIGRP uses bandwidth and delay metrics if prefix and distance are the same.

If routes from both WAN sources are equal-cost paths use EIGRP delay to modify path preference

DMVPN hub router#

router eigrp 100

redistribute eigrp 200

21

Page 22: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

BGP AS = 65511

MPLS A AS 65401

MPLS B AS 65402

Layer 2 WAN

ISP A / ISP B

DMVPN Hub

Routers

Internet Edge

DMVPN 1

EIGRP (200)

default

DMVPN 2

EIGRP (201)

MPLS CE Routers Layer 2 WAN

CE Router

EIGRP

BGP

EIGRP

BGP

EIGRP

EIGRP

EIGRP (300)

EIGRP

EIGRP

eBGP eBGP

iBGP

WAN Distribution

Layer

WAN-Aggregation IP Routing Detail

22

Page 23: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

D EX 10.5.48.0/21 [170/xxxx] via 10.4.32.1

MPLS A

DMVPN Hub

Router

DMVPN 1

EIGRP (200)

EIGRP

BGP

eBGP

WAN Distribution Layer

EIGRP

EIGRP

10.5.48.0/21

Remote Site

10.4.32.1

D EX 10.5.48.0/21 [170/xxxx] via 10.4.32.18

10.4.32.18

WAN Dual-Path Route Preference

• After link failure, MPLS CE router learns alternate path to remote

site via distribution layer (EIGRP route)

Is Route Control Needed?

MPLS CE Router

23

Page 24: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

D EX 10.5.48.0/21 [170/xxxx] via 10.4.32.1

MPLS A

DMVPN Hub

Router

DMVPN 1

EIGRP (200)

EIGRP

BGP

eBGP

WAN Distribution

Layer

EIGRP

EIGRP

10.5.48.0/21

Remote Site

10.4.32.1

D EX 10.5.48.0/21 [170/xxxx] via 10.4.32.18

10.4.32.18

WAN Dual-Path Route Preference

• After link restore, MPLS CE router receives

BGP advertisement for remote-site route.

• Does BGP route get (re)installed in the route

table?

Is Route Control Needed?

MPLS CE Router

B 10.5.48.0/21 [20/0] via 192.168.3.2

192.168.3.2

No.

EIGRP from distribution layer remains in the table.

X

Yes.

24

Page 25: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS A AS 65401

DMVPN Hub

Router

DMVPN 1

EIGRP (200)

EIGRP

BGP

eBGP

WAN Distribution

Layer

EIGRP

EIGRP

10.5.48.0/21

Remote Site

10.4.32.1

Remote-site route is redistributed into BGP with weight = 32768

After link is restored, distribution layer route remains in table due to BGP weight

Routes from distribution layer should be blocked

Also protects from other “backdoor” and routing loop conditions

MPLS CE Router

CE-1#show ip bgp 10.5.48.0 255.255.248.0

BGP routing table entry for 10.5.48.0/21, version 1293

Paths: (3 available, best #3, table default)

Advertised to update-groups:

4 5

65401 65401, (aggregated by 65511 10.5.48.254)

192.168.3.2 from 192.168.3.2 (192.168.100.3)

Origin IGP, localpref 100, valid, external, atomic-aggregate

Local

10.4.32.1 from 0.0.0.0 (10.4.32.1)

Origin incomplete, metric 3584, localpref 100, weight 32768, valid, sourced, best

eBGP route

(no weight defined)

WAN Dual-Path Route Preference

Route Control is Needed

25

Page 26: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

router eigrp 100

distribute-list route-map BLOCK-TAGGED-ROUTES in

default-metric [BW] 100 255 1 1500

redistribute bgp 65511

route-map BLOCK-TAGGED-ROUTES deny 10

match tag 65401 65402

route-map BLOCK-TAGGED-ROUTES permit 20

Best Practice: Route Tag and Filter

• Routes are implicitly tagged when distributed from eBGP to

EIGRP with carrier AS

• Configure explicit tags for other routing protocol sources

• Use route-map to block re-learning of WAN routes via the

distribution layer (MPLS routes already known via iBGP)

Campus/ Data Center

EIGRP routes from distribution layer

iBGP

MPLS A AS 65401

MPLS B AS 65402

26

Page 27: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS A

MPLS B

Layer 2 WAN

ISP A / ISP B

DMVPN Hub

Routers

Internet Edge

DMVPN 1

EIGRP (200)

default

DMVPN 2

EIGRP (201)

MPLS CE Routers Layer 2 WAN

CE Router

EIGRP

BGP

EIGRP

BGP

EIGRP

EIGRP

EIGRP (300)

EIGRP

EIGRP

eBGP eBGP

iBGP

WAN-Aggregation Router

From WAN towards Core/Distribution

From Core/Distribution towards WAN

(Redistribute EIGRP 100)

MPLS A CE Redistribute BGP Block: MPLS-A, MPLS-B, DMVPN

Implicit tag: MPLS-A

MPLS B CE Redistribute: BGP Block: MPLS-A, MPLS-B, DMVPN

Implicit tag: MPLS-B

Layer 2 WAN CE Redistribute: EIGRP Block: DMVPN

Explicit tag: Layer 2 WAN

DMVPN 1 Hub Redistribute EIGRP Accept: Any

Explicit tag: DMVPN

DMVPN 2 Hub Redistribute EIGRP Accept: Any

Explicit tag: DMVPN

WAN-Aggregation Mutual Route Redistribution

27

Page 28: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

eBGP BGP

summary

Only requires a single WAN facing routing protocol process

router bgp 65511

bgp router-id 10.5.56.254

network 10.5.60.0 mask 255.255.255.0

network 10.5.61.0 mask 255.255.255.0

network 192.168.3.28 mask 255.255.255.252

aggregate-address 10.5.56.0 255.255.248.0 summary-only

neighbor 192.168.3.30 remote-as 65401

no auto-summary

Wired/Wireless

Data Subnets

WAN Remote-Site Routing

Single-Router, Single-Link, Access Layer only

28

Page 29: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

DMVPN

Internet

Layer 2

EIGRP (200) EIGRP

(300)

EIGRP

summary EIGRP

summary

Only requires a single WAN facing routing protocol process

router eigrp 300

network 10.4.38.0 0.0.0.255

network 10.5.0.0 0.0.255.255

passive-interface default

no passive-interface GigabitEthernet0/0.38

eigrp router-id 10.5.144.254

eigrp stub connected summary

interface GigabitEthernet0/0.38

ip summary-address eigrp 300 10.5.144.0 255.255.248.0

Includes all Remote-site

networks

Layer 2 WAN

interface

WAN Remote-Site Routing

Single-Router, Single-Link, Access Layer Only

29

Page 30: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Internet MPLS VPN

DMVPN

EIGRP (200)

EIGRP

summary

BGP

summary Requires two separate WAN

facing routing protocol processes

router bgp 65511

bgp router-id 10.5.40.254

network 10.5.44.0 mask 255.255.255.0

network 10.5.45.0 mask 255.255.255.0

network 192.168.3.20 mask 255.255.255.252

aggregate-address 10.5.40.0 255.255.248.0 summary-only

neighbor 192.168.3.22 remote-as 65401

no auto-summary

router eigrp 200

network 10.4.34.0 0.0.1.255

network 10.5.0.0 0.0.255.255

passive-interface default

no passive-interface Tunnel10

eigrp router-id 10.5.40.254

eigrp stub connected summary

interface Tunnel10

ip summary-address eigrp 200 10.5.40.0 255.255.248.0

WAN Remote-Site Routing

Single-Router, Dual-Link, Access Layer Only

30

Page 31: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN A MPLS VPN B

Internet Internet

DMVPN-2 DMVPN-1

Internet Layer 2

DMVPN

EIGRP (200)

EIGRP (201) EIGRP

(200)

BGP

summary

BGP

summary

EIGRP

summary EIGRP

summary

EIGRP

summary

EIGRP

summary

Requires two separate WAN

facing routing protocol processes

(except for dual-MPLS)

WAN Remote-Site Routing

Single-Router, Dual-Link, Access Layer Only

31

Page 32: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

DMVPN

Internet

EIGRP (200)

eBGP

EIGRP (100)

BGP

EIGRP

EIGRP

EIGRP

BGP

summary EIGRP

summary

router eigrp 100

default-metric 100000 100 255 1 1500

network 10.5.0.0 0.0.255.255

redistribute bgp 65511

passive-interface default

no passive-interface GigabitEthernet0/1.99

eigrp router-id 10.5.48.254

router eigrp 100

network 10.5.0.0 0.0.255.255

redistribute eigrp 200

passive-interface default

no passive-interface GigabitEthernet0/1.99

eigrp router-id 10.5.48.253

Transit network

Requires Separate WAN and LAN

Facing Routing Protocol Processes

One Way Redistribution Is Required.

Summary Routes Make Two-Way

Redistribution Unnecessary

One Way Route Redistribution

WAN Remote-Site Routing

Dual-Router, Dual-Link, Access Layer Only

32

Page 33: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN A MPLS VPN B

Internet Internet

DMVPN-1 DMVPN-2

Layer 2

DMVPN

Internet

eBGP eBGP

EIGRP (201)

EIGRP (200)

EIGRP (200)

EIGRP (300)

BGP

EIGRP

iBGP

BGP

EIGRP

EIGRP (100)

EIGRP (100) EIGRP

(100)

EIGRP

EIGRP

EIGRP

EIGRP

EIGRP

EIGRP

EIGRP

EIGRP

BGP

summary

EIGRP

summaries

BGP

summary

EIGRP

summary

EIGRP

summary EIGRP

summary EIGRP

summary

Requires Separate WAN and LAN

Facing Routing Protocol Processes

WAN Remote-Site Routing

Dual-Router, Dual-Link, Access Layer Only

33

Page 34: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

802.1q trunk (54,99) 802.1q trunk (50,99)

WAN

Vlan54 – router 2 link

Vlan50 – router 1 link

Vlan99 – transit

802.1q trunk (102-103) 802.1q trunk (100-

101)

802.1q trunk (50)

WAN

Vlan50 – router 1 link

802.1q trunk (100-101)

EIGRP/BGP

EIGRP

EIGRP/BGP

EIGRP

EIGRP/BGP

EIGRP EIGRP

(100)

EIGRP (100)

EIGRP/BGP

summary

EIGRP/BGP

summaries

WAN

802.1q trunk (102-103)

Requires Separate WAN and LAN Facing Routing Protocol Processes

WAN EIGRP Is Either: DMVPN (200/201)

Layer 2 WAN (300)

WAN Remote-Site Routing

Distribution/Access Layer Only

34

Page 35: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Best Practice: Implement AS-Path Filter

• Dual carrier sites can unintentionally become transit network during network failure event and causing network congestion due to transit traffic

• Design the network so that transit path between two carriers only occurs at sites with enough bandwidth

• Implement AS-Path filter to allow only locally originated routes to be advertised on the outbound updates for branches that should not be transit

Prevent Remote Site from Becoming Transit Network

router bgp 65511

neighbor 192.168.4.10 route-map NO-TRANSIT-AS out

!

ip as-path access-list 10 permit ^$

!

route-map NO-TRANSIT-AS permit 10

match as-path 10

Campus

iBGP

iBGP

R1 R2

MPLS A MPLS B

35

A B

Page 36: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Best Practice: Stub Routing

• The stub routing feature improves network stability,

reduces resource utilization, and simplifies stub router

configuration. Use at all remote sites.

• Implement stub routing to allow only locally originated

routes to be advertised on the outbound updates for

dual-router sites that should not be transit

Improve Network Stability and Prevent Transit Site

router eigrp 200

eigrp stub connected summary

Campus

EIGRP

VPLS/ DMVPN DMVPN

36

A B

Page 37: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

DMVPN

Internet

EIGRP (200)

eBGP

EIGRP (100)

R1 R2

interface Loopback0

ip address 10.5.48.254 255.255.255.255

router bgp 65511

bgp router-id 10.5.48.254

network 10.5.52.0 mask 255.255.255.0

network 10.5.53.0 mask 255.255.255.0

network 192.168.3.20 mask 255.255.255.252

aggregate-address 10.5.48.0 255.255.248.0 summary-only

neighbor 192.168.3.22 remote-as 65401

no auto-summary

interface Loopback0

ip address 10.5.48.253 255.255.255.255

router eigrp 200

network 10.4.34.0 0.0.1.255

network 10.5.0.0 0.0.255.255

passive-interface default

no passive-interface Tunnel10

eigrp router-id 10.5.48.253

eigrp stub connected summary

interface Tunnel10

ip summary-address eigrp 200 10.5.48.0 255.255.248.0

BGP

summary

Summaries are advertised via both links, but best path is via primary.

When primary link is operational both loopbacks are reachable via

primary link.

WAN Remote-Site Loopback Routing

Initial Approach – Loopbacks within Summary Route (1)

EIGRP

summary

37

Page 38: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public 38

Page 39: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public 39

Page 40: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public 40

Page 41: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

eBGP

router bgp 65511

bgp router-id 10.255.251.204

network 10.255.251.204 mask 255.255.255.255

neighbor 192.168.3.30 remote-as 65401

Loopback

interface Loopback0

ip address 10.255.251.204 255.255.255.255

WAN Remote-Site Loopback Routing

BGP Configuration for Single-Router

41

Page 42: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

DMVPN

Internet

EIGRP (200)

router eigrp 200

network 10.255.0.0 0.0.255.255

eigrp router-id 10.255.253.205

interface Loopback0

ip address 10.255.253.205 255.255.255.255

All Loopbacks

WAN Remote-Site Loopback Routing

EIGRP Configuration for Single-Router

42

Page 43: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Internet MPLS VPN

DMVPN

EIGRP (200)

Choose loopback from address

block of primary link for single-

router, dual-link remote site

interface Loopback0

ip address 10.255.251.201 255.255.255.255

router bgp 65511

bgp router-id 10.255.251.201

network 10.255.251.201 mask 255.255.255.255

neighbor 192.168.3.22 remote-as 65401

Loopback

router eigrp 200

network 10.255.0.0 0.0.255.255

eigrp router-id 10.255.251.201

All Loopbacks

WAN Remote-Site Loopback Routing

Configuration for Single-Router (MPLS with DMVPN Backup)

43

Page 44: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

DMVPN

Internet

EIGRP (200)

eBGP

EIGRP (100)

Uses the LAN facing routing

protocol process to advertise R2

loopback to R1 (and R1 loopback

to R2)

R1 R2

interface Loopback0

ip address 10.255.253.203 255.255.255.255

router eigrp 100

network 10.255.0.0 0.0.255.255

eigrp router-id 10.5.253.203

interface Loopback0

ip address 10.255.251.203 255.255.255.255

router eigrp 100

network 10.255.0.0 0.0.255.255

eigrp router-id 10.255.251.203

WAN Remote-Site Loopback Routing

Configuration for Dual-Router (MPLS with DMVPN Backup)

44

Page 45: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

MPLS VPN

DMVPN

Internet

EIGRP (200)

eBGP

EIGRP (100)

BGP

EIGRP

EIGRP

EIGRP

router bgp 65511

bgp router-id 10.255.251.203

network 10.255.251.203 mask 255.255.255.255

network 10.255.253.203 mask 255.255.255.255 router eigrp 100

network 10.255.0.0 0.0.255.255

redistribute eigrp 100 route-map LOOPBACK-ONLY

eigrp router-id 10.255.253.203

eigrp stub connected summary redistributed

ip access-list standard R1-LOOPBACK

permit 10.255.251.203

route-map LOOPBACK-ONLY permit 10

match ip address R1-LOOPBACK

Two way redistribution is required for

EIGRP WAN routing protocol (on R2)

Only the loopback addresses should be

redistributed from LAN to WAN

R1 R2 Both loopbacks need to be explicitly

listed in the BGP configuration.

WAN Remote-Site Loopback Routing

(continued) Configuration for Dual-Router (MPLS with DMVPN Backup)

45

Page 46: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

DMVPN Deployment Considerations

• VPN hub has a default route to ASA firewall’s VPN-

DMZ interface to reach the Internet

• Remote site policy requires centralized Internet access

• Enable EIGRP between VPN headend & Campus core

to propagate default to remote

• Static default (admin dist=1) remains active

• User traffic from remote sites is forwarded to VPN-

DMZ (wrong firewall interface for user traffic)

• Adjust admin distances to allow EIGRP default route

(to core)

• VPN tunnel drops

How to Accommodate Multiple Default Routers for a VPN Hub Router

VPN-DMZ

Internet Edge Block

default

default

INSIDE

OUTSIDE

default

default

default

DMVPN Hub

DMVPN spoke

Internet

46

Page 47: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

VPN-DMZ

Internet Edge Block

default

default

INSIDE

OUTSIDE default

default

default

Enable Front-Door VRF (FVRF) with DMVPN to permit two default routes

The VRF INET-PUBLIC contains the default route to VPN-DMZ Interface needed for Tunnel Establishment

A 2nd default route exists in the Global Routing Table

used by the user traffic to reach Internet

To enforce centralized tunneling the default route is advertised to spokes via Tunnel

Spoke’s tunnel drops due to 2nd default route conflict with the one learned from ISP

EIGR

P

default

DMVPN Deployment over Internet

No Split Tunneling at Remote-Site Location

Internet

VRF: INET-PUBLIC

47

Page 48: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Best Practice: VRF-Aware DMVPN

• Enable FVRF DMVPN on the Spokes

• Allow the ISP learned Default Route in the VRF INET-

PUBLIC and use for tunnel establishment

• Global VRF contains Default Route learned via tunnel.

User data traffic follows Tunnel to INSIDE interface on

firewall

• Allows for consistent implementation of corporate security

policy for all users

Keeping the Default Routes in Separate VRFs

VPN-DMZ

Internet Edge Block

default

default

INSIDE

OUTSIDE default

default

default

default

EIGR

P

Internet

VRF: INET-PUBLIC

VRF: INET-PUBLIC

48

Page 49: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Avoid Fragmentation when Tunneling

• IP fragmentation will cause CPU and memory overhead and result in lower throughput

performance

• When one fragment of a datagram is dropped, the entire original IP datagram will have to be

resent

• Use ‘mode transport’ on transform-set

‒ NHRP requires this for NAT support and it saves 20 bytes of overhead

• Avoid MTU issues with the following best practices ‒ ip mtu 1400 (WAN facing interface or tunnel)

‒ ip tcp adjust-mss 1360 (WAN facing interface or tunnel)

MTU 1500 MTU 1500 MTU 1400

Tunnel Setting (esp-aes 256 esp-sha-

hmac)

Maximum MTU Recommended

MTU

GRE/IPSec (Tunnel Mode) 1414 bytes 1400 bytes

GRE/IPSec (Transport Mode) 1434 bytes 1400 bytes

GRE+IPsec

49

Page 50: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Dialer1

VP

N T

un

ne

l

3G/4G Wireless WAN

The dialer interface provides a consistent method of configuration regardless of the chosen wireless technology.

Select 3G or 4G Technology Option 4G/LTE 3G/GSM

1. GSM Specific

Remote Site Router Configuration

1. LTE Specific

Remote Site Router Configuration

1. Finish the WAN Router Universal Configuration

2. Configure VRF Lite

3. Configure the Cellular Interface

4. Configure the Dialer interface

5. Configure VRF-Specific Default Routing

6. Apply the Access List

7. Configure ISAKMP and IPSec

8. Configure mGRE Tunnel

9. Configure EIGRP

10. Configure IP Multicast

3G/CDMA

1. CDMA Specific

Remote Site Router Configuration

Remote-Site with 3G or 4G/LTE Wireless WAN

Best Practice Uses Dialer Interface

50

Page 51: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

chat-script CDMA "" "ATDT#777" TIMEOUT 30 "CONNECT"

interface Cellular0/0/0

bandwidth 1800

no ip address

encapsulation ppp

dialer in-band

dialer pool-member 1

no peer default ip address

async mode interactive

no ppp lcp fast-start

!

interface Dialer1

bandwidth 1800

ip vrf forwarding INET-PUBLIC

ip address negotiated

ip access-group ACL-INET-PUBLIC in

encapsulation ppp

dialer pool 1

dialer idle-timeout 0

dialer string CDMA

dialer persistent

ppp ipcp address accept

!

line 0/0/0

script dialer CDMA

modem InOut

no exec

CDMA Example GSM Example chat-script GSM "" "ATDT*98*1#" TIMEOUT 30 "CONNECT“ !

interface Cellular0/0/0

bandwidth 384

no ip address

encapsulation ppp

dialer in-band

dialer pool-member 1

no peer default ip address

async mode interactive

no ppp lcp fast-start

!

interface Dialer1

bandwidth 384

ip vrf forwarding INET-PUBLIC

ip address negotiated

ip access-group ACL-INET-PUBLIC in

encapsulation ppp

dialer pool 1

dialer idle-timeout 0

dialer string GSM

dialer persistent

no ppp lcp fast-start

ppp chap hostname [email protected]

ppp chap password 7 02252D752C3323007E1F

ppp ipcp address accept

ppp timeout retry 120

ppp timeout ncp 30

!

line 0/0/0

script dialer GSM

modem InOut

no exec

R1# cellular 0/0/0 gsm profile create 1 isp.cingular chap [email protected] CINGULAR1

Router with GSM must also create a profile

Wireless WAN with 3G (GSM and CDMA)

Two PPP Encapsulation Methods

51

Page 52: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Vlan64 - data

R1#

chat-script LTE "" "AT!CALL1" TIMEOUT 20 "OK"

interface Cellular0/0/0

bandwidth 2000

no ip address

encapsulation slip

dialer in-band

dialer pool-member 1

no peer default ip address

async mode interactive

!

interface Dialer1

bandwidth 2000

ip vrf forwarding INET-PUBLIC

ip address negotiated

ip access-group ACL-INET-PUBLIC in

encapsulation slip

dialer pool 1

dialer idle-timeout 0

dialer string LTE

dialer persistent

!

line 0/0/0

script dialer LTE

modem InOut

no exec

No HSRP

Required

Ce0/0/0

VP

N T

un

nel

3G/4G Wireless WAN

R1

Direct IP requires SLIP encapsulation keyword

No PPP authentication parameters required

No profile required

Wireless WAN with 4G/LTE

Direct IP Encapsulation Instead of PPP

52

LTE recovery script recommended

Page 53: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Vlan64 - data

R1#

ip sla 100

icmp-echo 192.168.3.26 source-interface

GigabitEthernet0/0

timeout 1000

threshold 1000

frequency 15

ip sla schedule 100 life forever start-time now

track 60 ip sla 100 reachability

event manager applet ACTIVATE-3G

event track 60 state down

action 1 cli command "enable"

action 2 cli command "configure terminal"

action 3 cli command "interface cellular0/0/0"

action 4 cli command "no shutdown"

action 5 cli command "end"

action 99 syslog msg "Activating 3G interface"

IP SLA

Probe

No HSRP

Required

Ce0/0/0

3G/4G Wireless WAN

R1

R1#

14:22:14: %TRACKING-5-STATE: 60 ip sla 100 reachability Up->Down

14:22:14: %SYS-5-CONFIG_I: Configured from console by on vty0(EEM:ACTIVATE-3G)

14:22:14: %HA_EM-6-LOG: ACTIVATE-3G: Activating 3G interface

14:22:34: %LINK-3-UPDOWN: Interface Cellular0/0/0, changed state to up

14:22:34: %DIALER-6-BIND: Interface Ce0/0/0 bound to profile Di1

14:22:34: %LINEPROTO-5-UPDOWN: Line protocol on Interface Cellular0/0/0, changed state to up

14:22:40: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel10, changed state to up

14:22:40: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON

14:22:42: %DUAL-5-NBRCHANGE: EIGRP-IPv4 200: Neighbor 10.4.34.1 (Tunnel11) is up: new adjacency

Note: This method is also compatible with a dual router design (probes are sent from R2)

Wireless WAN with 3G/4G Backup

Enhanced Object Tracking (EOT) with EEM Scripts

53

Page 54: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Vlan64 - data

R1#

event manager applet TIME-OF-DAY-ACTIVATE-3G

event timer cron cron-entry "45 4 * * 1-5"

action 1 cli command "enable"

action 2 cli command "configure terminal"

action 3 cli command "interface cellular0/0/0"

action 4 cli command "no shutdown"

action 5 cli command "end"

action 99 syslog msg "M-F @ 4:45AM Activating 3G interface“

event manager applet TIME-OF-DAY-DEACTIVATE-3G

event timer cron cron-entry "15 18 * * 1-5"

action 1 cli command "enable"

action 2 cli command "configure terminal"

action 3 cli command "interface cellular0/0/0"

action 4 cli command "shutdown"

action 5 cli command "end"

action 99 syslog msg "M-F @ 6:15PM Deactivating 3G interface"

No HSRP

Required

Ce0/0/0 V

PN

Tu

nn

el

3G/4G Wireless WAN

R1

Limit connection time to reduce usage charges

EEM scripts leverage CRON

Additional scripting or enhancements can allow for manual override for weekend or after hours use.

Wireless WAN with 3G/4G Only Link

Time Based Connection with EEM Scripts

54

Page 55: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Class of Service Traffic Type DSCP Value(s) Bandwidth (%) Congestion

Avoidance

VOICE Voice traffic ef 10 (PQ)

INTERACTIVE-VIDEO Interactive video

(video conferencing)

cs4

af41

23 (PQ)

CRITICAL-DATA Highly interactive

(such as Telnet, Citrix, and Oracle thin clients)

cs3

af31

15 DSCP based

DATA Data af21 19 DSCP based

SCAVENGER

Scavenger cs1

af11

5

NETWORK-CRITICAL Routing protocols. Operations, administration and

maintenance (OAM) traffic.

cs2

cs6

3

class-default Best effort other 25 random

class-map match-any VOICE

match dscp ef

class-map match-any INTERACTIVE-VIDEO

match dscp cs4 af41

class-map match-any CRITICAL-DATA

match dscp cs3 af31

class-map match-any DATA

match dscp af21

class-map match-any SCAVENGER

match dscp cs1 af11

class-map match-any NETWORK-CRITICAL

match dscp cs2 cs6

class-map match-any BGP-ROUTING

match protocol bgp

policy-map MARK-BGP

class BGP-ROUTING

set dscp cs6

ip access-list extended ISAKMP

permit udp any eq isakmp any eq isakmp

class-map match-any NETWORK-CRITICAL

match access-group name ISAKMP

For MPLS CE routers:

For DMVPN routers:

All WAN routers:

WAN Quality of Service

Defining SBA QoS Classes of Services

55

Page 56: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

WAN Design and Deployment Using SBA

• SBA WAN Overview

• SBA WAN Design Methodology

• Key Aspects of the Design

• Summary

Agenda

56

Page 57: Design and Deployment using the Cisco Smart Business Architecture (SBA)

© 2013 Cisco and/or its affiliates. All rights reserved. BRKRST-2040 Cisco Public

Summary

• The SBA WAN design methodology allows for either a small or large scale

initial deployment.

• Flexibility is built into the WAN and remote-site design. Adding additional scale,

resiliency or capabilities is straightforward.

•The SBA WAN design uses advanced features and capabilities. Each is

documented in a prescriptive manner. ‒Route-maps ensure routing stability

‒F-VRF DMVPN permits spoke-spoke with central tunneling

‒WAAS GRE negotiated return enables shared clusters

‒EEM scripts extend capabilities of EOT

57

Page 58: Design and Deployment using the Cisco Smart Business Architecture (SBA)