The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes a comprehensive guide for connecting Cisco Secure Access with SD-WAN routers, focusing on secure private app access.
Note: The configurations listed here are developed for UX1.0 and 17.9/20.9 versions of SD-WAN.
This guide presents a structured walkthrough of these key steps:
Figure 1: Cisco SD-WAN and SSE Zero Trust Approach
SSE with SD-WAN
This guide focuses on design consideration and deployment best practices for NTG interconnect. In this guide, SD-WAN controllers are deployed in the cloud and WAN Edge routers are deployed at the data center and are connected to atleast one internet circuit.
Private app tunnels, offered by Cisco Secure Access, provide secure connectivity to private applications for users connecting through Zero Trust Network Access (ZTNA) and VPN as a Service (VPNaaS). These tunnels enable organizations to securely link remote users to private resources hosted in data centers or private clouds.
Using IKEv2 (Internet Key Exchange version 2), these tunnel groups establish secure, bidirectional connections between Cisco Secure Access and SD-WAN routers. They support high availability through multiple tunnels within the same group and offer flexible traffic management via both static and dynamic routing (BGP).
The IPsec tunnels can carry traffic from various sources, including:
This approach allows organizations to securely route all types of private application traffic through a unified, encrypted channel, enhancing both security and operational efficiency.
Cisco Secure Access, as part of Cisco Security Service Edge (SSE) solution, simplifies IT operations through a single, cloud-managed console, unified client, centralized policy creation, and aggregated reporting. It incorporates multiple security modules in one cloud-delivered solution, including ZTNA, Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Firewall as a Service (FWaaS), DNS security, Remote Browser Isolation (RBI) and much more. This comprehensive approach mitigates security risks by applying zero trust principles and enforcing granular security policies
Figure 2: Traffic Flow between Cisco Secure Access and Private App
SSE Private App Traffic Flow
The solution described in this guide addresses comprehensive redundancy considerations, encompassing both the SD-WAN router in the data center and the Network Tunnel Group (NTG) on the Security Service Edge (SSE) side. This guide focuses on an Active/Active SD-WAN hub deployment model, which helps maintain uninterrupted traffic flow and ensures high availability.
It is recommended that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
This guide describes the solution using an Active/Active design model for SD-WAN head-end routers. An Active/Active design model in the context of SD-WAN head-end routers assumes two routers in a data center, both connected to the Security Service Edge (SSE) Network Tunnel Group (NTG), as illustrated in Figure 3. In this scenario, Both SD-WAN routers in the data center (DC1-HE1 and DC1-HE2) actively handle traffic flow. They achieve this by sending the same AS Path Length (ASPL) to the internal DC neighbor. As a result, traffic from within the DC load balances between the two head-ends.
Each head-end router can establish multiple tunnels to SSE Points of Presence (POPs). The number of tunnels varies based on your requirements and SD-WAN device model. In this design:
These head-end routers form BGP neighborships over the tunnels towards the SSE. Through these neighborships, the head-ends advertise private application prefixes to their SSE neighbors, enabling secure and efficient routing of traffic to private resources.
Figure 3: SD-WAN to SSE Active/Active Deployment Model
SD-WAN to SSE Active/Active Deployment Model
An Active/Standby design designates one router (DC1-HE1) as always active, while the secondary router (DC1-HE2) remains on standby. Traffic consistently flows through the active head-end (DC1-HE1) unless it completely fails. This deployment model has a drawback: if the primary tunnel to SSE goes down, traffic switches to the secondary SSE tunnels which is only via DC1-HE2, causing any stateful traffic to reset.
In the Active/Standby model, BGP AS-Path Length is used to steer traffic both within the DC and towards the SSE. DC1-HE1 sends prefix updates to the SSE BGP neighbor with an ASPL of 2, while DC1-HE2 sends updates with an ASPL of 3. The internal DC neighbor of DC1-HE1 advertises prefixes with a shorter AS path length than DC1-HE2, ensuring traffic preference for DC1-HE1. (Customers can choose other attributes or protocols to influence traffic preference.)
Customers can select either an Active/Active or Active/Standby deployment model based on their specific requirements.
Figure 4: SD-WAN to SSE Active/Standby Deployment Model
SD-WAN to SSE Active/Standby Deployment Model
This section describes the procedure:
Note: This configuration is based on an Active/Active deployment model
How to configure Network Tunnel Group is not be covered in the guide. Please review this reference.
Navigate to Cisco Secure Access and ensure that the Network Tunnel Groups (NTGs) are provisioned. For the current design, we need to provision NTGs in two different Points of Presence (POPs). In this guide, we use NTGs in the US (Virginia) POP and US (Pacific Northwest) POP.
Note:The names and locations of POPs can vary, but the key concept is to have multiple NTGs provisioned in locations that are geographically close to your data center. This approach helps optimize network performance and provides redundancy.
Figure 5: Cisco Secure Access Network Tunnel Group
Cisco Secure Access Network Tunnel Group
Figure 6: Cisco Secure Access Network Tunnel Group List
Secure Access Network Tunnel Group list
Make sure you have noted tunnel passphrase (which is shown only one time during tunnel creation).
Note: Step 6 in Add a Network Tunnel Group
Also make a note of Tunnel Group attributes which we use during our IPSec configuration. The screenshot (Figure 6) is taken from a lab enviorment for a production scenario create NTG groups as per the design or usage recommendation.
Figure 7: Secure Access Network Tunnel Group US (Virginia)
Secure Access Network Tunnel Group US (Virginia)
Figure 8: Secure Access Network Tunnel Group US (Pacific Northwest)
Secure Access Network Tunnel Group US (Pacific Northwest)
The figure 8 shows only 4 tunnels on both primary and secondary hubs. However, a maximum of 8 tunnels has been successfully tested in a controller environment. The maximum tunnel support can vary depending on the hardware device you use and the current SSE tunnel support. For the most up-to-date information, please refer to the official documentation: https://docs.sse.cisco.com/sse-user-guide/docs/secure-access-network-tunnels and the release note of the respective hardware device.
An example for an 8-tunnel setup is provided here.
Figure 8a: NTG Tunnels up to 8 tunnels
SSE NTG up to 8 tunnels
This procedure demonstrates how to connect a Network Tunnel Group (NTG) using feature templates on Cisco Catalyst SD-WAN Manager 20.9 and Cisco Catalyst Edge Router running 17.9 release.
Note:This guide assumes an existing SD-WAN overlay deployment with either a hub-and-spoke or fully meshed topology, where hubs serve as access entry points for private applications hosted in the data center. This procedure can also be applied to branch or cloud deployments.
Before proceeding, ensure the prerequisites are met:
Figure 9: Cisco Catalyst SD-WAN Manager: Head end control connections
Figure 10: Cisco Catalyst SD-WAN Manager: Head end BGP Summary
To configure SD-WAN interconnect with Network Tunnel Group (NTG) using Manual IPSec Method, complete these steps:
Note: Repeat this step for the required number of Tunnels for the deployment.
Please refer to the official documentation for Tunnel Limitation: https://docs.sse.cisco.com/sse-user-guide/docs/secure-access-network-tunnels
These steps detail the process for connecting DC1-HE1 (Data Center 1 Head-End 1) to the SSE Virginia Primary Hub. This configuration establishes a secure tunnel between the SD-WAN router in the data center and the Cisco Secure Access Network Tunnel Group (NTG) located in the Virginia Point of Presence (POP)
Step 1: Create IPSec Feature Template
Create an IPSec Feature Template to define the parameters for the IPSec tunnel that connects SD-WAN head end router to the NTG.
Figure 11: IPsec Feature Template: Basic Configuration
IPsec Feature Template: Basic Configuration
Interface Name: It can be any of your choice
IPv4 Address: SSE listens to 169.254.0.0/24based on the requirement you can divide the subnet to your choice, as a best practice please use with /30. In this guide we leave out the first block for future use.
IPsec Source Interface: Define a VPN0 Loopback Interface that is unique for the current IPsec interface. For consistency and troubleshooting purpose its recommended to keep the same numbering.
Tunnel Route-via Interface: Point the interface which can be used as underlay to reach SSE (must have internet access)
IPsec Destination: Primary Hub IP Address
Refer Figure 7: Secure Access Network Tunnel Group US (Virginia) this is 35.171.214.188
TCP MSS: This shoud be 1350 (Reference: https://docs.sse.cisco.com/sse-user-guide/docs/supported-ipsec-parameters)
Example: DC1-HE1 towards SSE Virginia Primary Hub
Interface Name: ipsec201
Description: Loopback for IPSEC tunnel to Cisco
IPv4 address: 169.254.0.x/30
IPsec Source Interface: Loopback201
Tunnel Route-via Interface: GigabitEthernet1
IPsec Destination IP Address/FQDN: 35.xxx.xxx.xxx
TCP MSS: 1350
Figure 12: IPsec Feature Template: IKE IPSEC
IPsec Feature Template: IKE IPSEC
DPD Interval: Keep this default
IKE Version: 2
IKE Rekey Interval: 28800
IKE Cipher: Default which is AES-256-CBC-SHA1
IKE DH Group: 14 2048-bit Modulus
Preshared Key: Passphrase
IKE ID for local End Point: Tunnel Group ID
Refer Figure 7: Secure Access Network Tunnel Group US (Virginia) this is mn03lab1+201@8167900-638880310-sse.cisco.com
Note: Each tunnel must have unique Endpoint for this; use "+loopbackID" Example: mn03lab1+202@8167900-638880310-sse.cisco.com, mn03lab1+203@8167900-638880310-sse.cisco.com and so on.
IKE ID for Remote End Point: Primary Hub IP Address
IPsec Cipher Suite: AES 256 GCM
Perfect Forward Secrecy: None
Example:
IKE Version: 2
IKE Rekey Interval: 28800
IKE Cipher: AES-256-CBC-SHA1
IKE DH Group: 14 2048-bit Modulus
Preshared Key: *****
Note: Step 6 in Add a Network Tunnel Group
IKE ID for local End Point: mn03lab1@8167900-638880310-sse.cisco.com
IKE ID for Remote End Point: 35.171.xxx.xxx
IPsec Cipher Suite: AES 256 GCM
Perfect Forward Secrecy: None
Repeat the steps to configure the required tunnels for both the primary and secondary Secure Access hubs.For a 2x2 setup, you would create four tunnels in total:
Now that the templates are created, we would use them on the service side vrf show in figure 13 and the loopback defined attached on the global vrf shown in figure 14.
Figure 13: Catalyst SD-WAN Manager: Head end VPN1 Template 2x2
Catalyst Manager: Head end VPN1 Template
Step 2: Define the Loopback in Global VRF
Configure a loopback interface in the global VRF (Virtual Routing and Forwarding) table. This loopback serves as the source interface for the IPSec tunnel created in Step 1.
All the loopback referenced in Step 1 must be defined in Global VRF.
IP Address can be defined in any RFC1918 range.
Figure 14: Catalyst SD-WAN Manager: VPN0 Loopback
Catalyst Manager: VPN0 Loopback
Use BGP feature template define BGP neighborship for all the tunnel interfaces. Refer respective Network Tunnel Groups BGP configuration in Cisco secure access portal to configure BGP values.
Figure 15: Secure Access Network Tunnel Group US (Virginia)
Secure Access Network Tunnel Group US (Virginia)
In this example, we use the information from Figure 15 (box 1) to define BGP using a feature template..
Figure 16: Catalyst SD-WAN Manager BGP Neighbor
Catalyst SD-WAN Manager BGP Neighbor
Configuration generated using the feature template:
router bgp 998
bgp log-neighbor-changes
!
address-family ipv4 vrf 1
network 10.10.128.1 mask 255.255.255.255
neighbor 169.254.0.5 remote-as 64512
neighbor 169.254.0.5 description SSE Neighbor1
neighbor 169.254.0.5 ebgp-multihop 5
neighbor 169.254.0.5 activate
neighbor 169.254.0.5 send-community both
neighbor 169.254.0.5 next-hop-self
neighbor 169.254.0.9 remote-as 64512
neighbor 169.254.0.9 description SSE Neighbor2
neighbor 169.254.0.9 ebgp-multihop 5
neighbor 169.254.0.9 activate
neighbor 169.254.0.9 send-community both
neighbor 169.254.0.9 next-hop-self
neighbor 169.254.0.105 remote-as 64512
neighbor 169.254.0.105 description SSE Neighbor3
neighbor 169.254.0.105 ebgp-multihop 5
neighbor 169.254.0.105 activate
neighbor 169.254.0.105 send-community both
neighbor 169.254.0.105 next-hop-self
neighbor 169.254.0.109 remote-as 64512
neighbor 169.254.0.109 description SSE Neighbor4
neighbor 169.254.0.109 ebgp-multihop 5
neighbor 169.254.0.109 activate
neighbor 169.254.0.109 send-community both
neighbor 169.254.0.109 next-hop-self
neighbor 172.16.128.2 remote-as 65510
neighbor 172.16.128.2 activate
neighbor 172.16.128.2 send-community both
neighbor 172.16.128.2 route-map sse-routes-in in
neighbor 172.16.128.2 route-map sse-routes-out out
maximum-paths eibgp 4
distance bgp 20 200 20
exit-address-family
DC1-HE1#
DC1-HE1#show ip route vrf 1 bgp | begin Gateway
Gateway of last resort is not set
35.0.0.0/32 is subnetted, 1 subnets
B 35.95.175.78 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
44.0.0.0/32 is subnetted, 1 subnets
B 44.240.251.165 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
100.0.0.0/8 is variably subnetted, 17 subnets, 2 masks
B 100.81.0.58/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.59/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.60/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.61/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.62/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.63/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.64/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
B 100.81.0.65/32 [20/0] via 169.254.0.9, 3d01h
[20/0] via 169.254.0.5, 3d01h
DC1-HE1#show ip bgp vpnv4 all summary
BGP router identifier 172.16.100.232, local AS number 998
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
169.254.0.5 4 64512 12787 13939 3891 0 0 4d10h 18
169.254.0.9 4 64512 66124 64564 3891 0 0 3d01h 18
169.254.0.13 4 64512 12786 13933 3891 0 0 4d10h 18
169.254.0.17 4 64512 12786 13927 3891 0 0 4d10h 18
172.16.128.2 4 65510 83956 84247 3891 0 0 7w3d 1
DC1-HE1#show ip interface brief | include Tunnnel
Tunnel1 192.168.128.202 YES TFTP up up
Tunnel4 198.18.128.11 YES TFTP up up
Tunnel100022 172.16.100.22 YES TFTP up up
Tunnel100023 172.16.100.23 YES TFTP up up
Tunnel100201 169.254.0.6 YES other up up
Tunnel100202 169.254.0.10 YES other up up
Tunnel100301 169.254.0.14 YES other up up
Tunnel100302 169.254.0.18 YES other up up
An Active/Active implementation would have a multipath from the core switch which is connected to both SD-WAN head ends.
Figure 17: Active/Active Scenario for BGP Neighbor
Active/Active BGP Neighbor
An Active/Stanby implementation would have a one active path from the core switch to SD-WAN head ends due to ASPL prepending (which is done using a route map to the neighbor).
Figure 18: Active/Standby Scenario for BGP Neighbor
Active/Standby BGP Neighbor
Revision | Publish Date | Comments |
---|---|---|
1.0 |
26-Feb-2025
|
Initial Release |