Private Application Access

Feature history for private application access

Table 1. Feature History

Feature

Release Information

Description

Private Application Access

Cisco IOS XE Catalyst SD-WAN Release 17.18.2

Cisco Catalyst SD-WAN Manager Release 20.18.2

This integration allows Cisco Secure Routers and the Catalyst SD-WAN solution to automatically establish secure connections to Cisco Secure Access. Remote users in a hybrid work environment can seamlessly and securely access private applications located behind SD-WAN.

Controlled Availability: Contact your Cisco account team before deploying this feature.

Private application access

Private application access using Cisco SD-WAN Manager is a secure connection that enables remote Cisco IOS XE Catalyst SD-WAN devices and Cisco secure routers to access private applications through Cisco Secure Access.

BGP route advertisement and IPSec tunnels

Remote users require secure access to private applications hosted behind the WAN edge device. To facilitate this, Border Gateway Protocol (BGP) prefixes are exchanged with the Secure Service Edge (SSE)'s with Cisco Secure Access as the provider, enabling dynamic route learning to the private applications located behind the WAN edge. Traffic destined for these private applications is routed over secure IPSec tunnels established between the WAN edge and the SSE provider. These tunnels operate within service VPN. By advertising BGP routes, a secure and dynamic channel is created between the network behind the WAN edge and the SSE provider, which carries service-side traffic.

Figure 1. Private application access architecture

Secure private application access for multi-region network

This example of an architecture for secure private application access describes routing policies for integrating a multi-region SD-WAN overlay network with Cisco Secure Access to facilitate secure access to private applications. The design emphasizes on:

  • redundancy

  • optimal path selection

  • critical traffic symmetry.

Architecture overview

Figure 2. Example generic topology: SD-WAN hubs deployed in Active/Active Model

The topology can span across multiple SSE regions. The core components of the topology are:

  • RA users: End-users connecting remotely to the network through Cisco Secure Client.

  • SSE regions: Each region hosts a primary and a secondary data center. These data centers are interconnected via an internal BGP backbone with Multi-region Backhaul capabilities. For more information, see Cisco SASE Design Guide.

  • SD-WAN Hubs: Each region can contain multiple hub routers. These hubs operate under distinct AS numbers.

  • Applications: Private applications can be hosted behind the hub or spoke routers within the SD-WAN network.

    Application in US region is app1, application in EMEA region is app2, and application in APJC region is app3.

Connectivity and interoperability

  • SSE to SD-WAN hubs: Each SD-WAN hub connects to its closest Cisco Secure Access Region through redundant IPsec tunnels. For example, SD-WAN hub in US region connects to the SSE US region and vice versa.

    Active tunnels terminate on the active SSE data center, while standby tunnels connect to a redundant standby data center within the same region.

    Within the primary data center, there can be multiple active ECMP tunnels from a SD-WAN hub router to provide a higher throughput.

  • SD-WAN hubs to remote sites: A full mesh SD-WAN overlay tunnel provides connectivity between the SD-WAN hubs and remote SD-WAN users.

Routing policies and traffic management

The routing design prioritizes redundancy, regional preference, and maintains traffic symmetry to prevent packet drops by SSE firewalls.

  • Unique regional application routes are advertised from each hub to its nearest SSE PoP (Point of Presence) regions.

  • Remote access VPN pool routes are advertised from all SSE regions towards the SD-WAN Hubs.

  • Remote users terminating in SSE US region can access applications in any SD-WAN region. All traffic, both incoming and outgoing, follows a symmetric path, using only the active tunnels for connectivity if the primary tunnels are active. If the primary tunnels are not active, then the secondary tunnels are used.

  • Remote access pool IP routes are advertised from all SSE regions, each with a community tag indicating its priority based on the local region and neighboring regions. For example, VPN pool routes for a remote user in US region are advertised with priority 0 in US region, priority 2 in EMEA region, and priority 4 in APJC region, reflecting the distance from the user’s original region.

  • These prioroities can be used to maintain routing controls and loop preventions.

The table displays how each region advertises the same remote VPN pool IP addresses with different priority values, depending on their proximity to other regions. These fixed priorities are built into the Cisco Secure Access BGP stack: the farther a prefix is from its original region, the higher its priority number. This logic is automatically applied when SSE PoP (Point of Presence) regions advertise routes from other regions. Routes within the local region always have a priority of '0'. For more information on how Cisco Secure Access handles traffic, see Dynamic Routing with BGP.

RA VPN pool prefix community value

US Region

EMEA Region

APJC Region

x

32644:0 (local)

32644:2

32644:4

y

32644:2

32644:0 (local)

32644:4

z

32644:4

32644:2

32644:0(local)

Usage guidelines for private application access

Regions

  • Each WAN edge device can have 10 active and 10 backup tunnels.

  • Each SSE region can have one Network Tunnel Group with 40 active and 40 backup tunnels.

Multi-region Backhaul

By default, Multi-region Backhaul feature is enabled on Cisco Secure Access as part of the automation which helps control routing using communities advertised by SSE. For more information, see Cisco SASE Design Guide.

BGP configurations

By default, Cisco SD-WAN Manager configures a deny-all policy for BGP to ensure controlled route advertisement between the Cisco SD-WAN overlay and Cisco Secure Access. You must manage any modifications to the BGP route-map configurations created during the workflow using the CLI Add-On Template.

Unique SSE credentials and organization ID across multiple Cisco SD-WAN Manager instances

If there are two Cisco SD-WAN Manager instances in the SD-WAN overlay, each Cisco SD-WAN Manager instance has its own SSE credentials and organization ID and the tunnel is unique to that instance. The SSE tunnels cannot be shared across Cisco SD-WAN Manager instances.

NAT interface and tunnel-route-via configurations

When a NAT interface is removed from a configuration group and is used as the tunnel-route-via interface in the private application feature, the tunnel-route-via interface becomes invalid. This makes the tunnels that relied on the NAT interface unreachable. The tunnel status appears as unreachable on both the monitoring dashboard and the SSE portal.

If a NAT interface used as a tunnel-route-via interface is removed:

  1. Deploy the policy group once again so that the first available NAT interface is selected. If there are no NAT interfaces, then Cisco SD-WAN Manager displays an error.

  2. Update a valid NAT interface manually, and then deploy the policy group.

This ensures that the tunnel-route-via interface is valid and tunnels remain operational after you make any changes to the NAT interfaces in the configuration group.

BGP hold time

BGP determines the maximum duration for traffic black holing based on its hold time, which is set to 180 seconds (3 minutes) by default.

Workflow for private application access

The private application access workflow automates configurations on a Cisco IOS XE Catalyst SD-WAN device.

Before you begin

  • Ensure that a configuration group with a defined VPN is associated to the selected WAN edge devices and deployed.

    You can configure all route policies using configuration groups. However, you must configure the incoming route policy for the SSE neighbor through the CLI Add-On template.

  • Ensure that you add valid Cisco Secure Access credentials in Administration > Settings > Cloud Credentials.

  • Configure the DNS server on Cisco SD-WAN Manager to connect to Cisco Secure Access

Procedure


Step 1

From the Cisco SD-WAN Manager menu, choose Workflows > Workflow Library.

Step 2

Click the Configure Secure Private Application Access Connectivity workflow.

Step 3

Follow the on-screen instructions to complete the private application access workflow.

Field

Description

Segment (VPN)

Select the service VPN hosting the application from the drop-down list.

If you don't have a configuration group with a defined VPN, you can define your own segment in the editable field here. Ensure that you deploy the segment in the configuration group.

Cisco Secure Access Region

Choose the SSE regionfrom the drop-down list. The SSE region that you choose must be close to the SD-WAN hub hosting the application.

The regions are available in the drop-down list only if valid Cisco Secure Access credentials are added to the Administration Settings page.

Tunnel Configuration

Click Add tunnel pair to add additional tunnel pairs to the configuration.

By default, the tunnel source is a system created loopback interface for ECMP support. The tunnel route-via interface is the first NAT'ed physical WAN interface on the edge device. Based on the WAN edge device's configuration groups which has configured NAT, the tunnel pair is auto detected.

Click the edit icon for a tunnel pair to change the primary and secondary tunnel source and destination interfaces.

BGP ASN

Enter the local BGP AS number associated to the region that you choose. Each region is associated to only one ASN.

AS number of the SD-WAN hub site should not match the SSE AS number.

If you create another workflow with the same region, the AS number is autopopulated and non-editable.

In Route Policy

Specify a name for the inbound routes.

Out Route Policy

Specify a name for the outbound routes.

The route policy name is the name of the routing policy used to exchange routes between Cisco SD-WAN and Cisco Secure Access.

The route policy name creates a CLI add-on policy with deny all policy by default. We recommend that you use CLI Add-On Template to change the route policy and BGP configurations to control route advertisements.

Step 4

Optionally you can associate the feature to a Policy Group.

Step 5

You can review the summary and click Create Connectivity.


After you create connectivity, Cisco SD-WAN Manager creates a private application access feature under policy group.

What to do next

Click Configuration > Policy Groups, select the associated policy group, and click Deploy to establish the tunnel connectivity.

Monitor SIG/SSE Tunnels

Use the security operations dashboard to monitor the status and performance of SSE tunnels.

  1. From the Cisco SD-WAN Manager menu, choose Monitor > Security.

    The SIG/SSE Tunnel Status pane shows the following information using a donut chart:

    • Total number of SIG/SSE tunnels that are configured.

    • The number of SIG/SSE tunnels that are up and down.

    • The number of SIG/SSE tunnels that are in a degraded state.

      Degraded state indicates that the SIG tunnel is up but the Layer 7 health of the tunnel as detected by the tracker does not meet the configured SLA parameters. Traffic is not routed through the tunnel.

  2. (Optional) Click a section of the donut chart to view detailed information about tunnels having a particular status.

    Cisco SD-WAN Manager displays detailed information about the tunnels in the SIG/SSE Tunnels dashboard.

  3. (Optional) Click All SIG/SSE Tunnels to view the SIG/SSE Tunnels dashboard.

Troubleshooting Using Cisco SD-WAN Manager

You can troubleshoot provisioning errors or view the remote tunnel status using the audit logs. For more information, see View Audit Log Information.