Transport Layer Security Tunnel Support

Transport layer security tunnels

A transport layer security tunnel is a secure communication protocol that

  • enables the controller to reach a public cloud automatically

  • encrypts all data sent over the TCP connection, and

  • ensures reliable and secure communication between the controller and Digital Network Architecture (DNA) on Cloud.

Cisco plug and play solution

The Cisco Catalyst 9800 Series Wireless Controller requires direct access to a public cloud to implement the teleworker solution using Cisco OfficeExtend Access Points (OEAPs). With the introduction of Transport Layer Security (TLS) tunnel support from Cisco IOS XE Amsterdam 17.3.2 onwards, the controller can now reach a public cloud automatically. This helps Cisco Catalyst Center on Cloud to establish TLS communication channels with the controller to monitor and manage wireless solutions.

The TLS connection ensures that the configuration and telemetry are reliably and securely communicated between the controller and the Digital Network Architecture (DNA) on Cloud. The TLS tunnel encrypts all the data that is sent over the TCP connection. The TLS tunnel provides a more secure protocol across the internet. After the controller discovery, the Cisco Catalyst Center on Cloud uses Cisco DNA Assurance and Automation features to manage the controller centrally.

The Cisco Plug and Play solution is a converged solution that provides a highly secure, scalable, seamless, and unified zero-touch deployment experience.

Plug-n-Play Agent

The Cisco Plug and Play (PnP) agent is an embedded software component that is present in all the Cisco network devices that support simplified deployment architecture. The PnP agent understands and interacts only with a PnP server. The PnP agent, using DHCP, DNS, or other such methods, tries to acquire the IP address of the PnP server with which it wants to communicate. After a server is found and a connection is established, the agent communicates with the PnP server to perform deployment-related activities.

For more information on Cisco Plug and Play, see the Cisco Plug and Play Feature Guide.

The Transport Layer Security Tunnel (TLS) over PnP feature is supported on the following controllers:

  • Cisco Catalyst 9800-80 Wireless Controller

  • Cisco Catalyst 9800-40 Wireless Controller

  • Cisco Catalyst 9800-L Wireless Controller

Configure a transport layer security tunnel

Establish a secure TLS tunnel to protect data exchanged between network devices.
Use this procedure when you need to secure traffic between devices using a TLS tunnel, typically in environments requiring encrypted communication for compliance or security reasons.

Procedure


Step 1

Enter global configuration mode.

Example:

Device# configure terminal

Step 2

Configure a crypto TLS tunnel channel.

Example:

Device(config)# crypto tls-tunnel TLS-tunnel-name

Example:

Device(config)# crypto tls-tunnel cloud-primary

Step 3

Specify the server IPv4 address, IPv6 address, or URL name and the port number.

Example:

Device(config-crypto-tls-tunnel)# server ipv4 server-ipv4-address port port-number

Example:

Device(config-crypto-tls-tunnel)# server ipv4 172.31.255.255 port 4043

The server can be specified as an IPv4 address, IPv6 address, or URL. The port number must be in the range 1025-65535.

Step 4

Specify the overlay interface and interface number.

Example:

Device(config-crypto-tls-tunnel)# overlay interface interface-name

Example:

Device(config-crypto-tls-tunnel)# overlay interface Loopback0

An overlay interface is a logical, multiaccess, multicast-capable interface. It encapsulates Layer 2 frames in IP unicast or multicast headers.

Step 5

Specify the LAN interface type, number, and the priority rank.

Example:

Device(config-crypto-tls-tunnel)# local-interface interface-name priority priority-rank

Example:

Device(config-crypto-tls-tunnel)# local-interface vlan 1 priority 1

Currently, the tunnel supports only one WAN interface with priority 1 and does not support the list of WAN interfaces with multiple priorities.

Step 6

Specify a preshared key and password options.

Example:

Device(config-crypto-tls-tunnel)# psk id identity key psk-key

Example:

Device(config-crypto-tls-tunnel)# psk id test key

Step 7

Specify the trustpoints for use with the RSA signature authentication method.

Example:

Device(config-crypto-tls-tunnel)# pki trustpoint trustpoint-label sign-or-verify

Example:

Device(config-crypto-tls-tunnel)# pki trustpoint tsp1 sign

Use the certificate from the trustpoint for signing or verifying. If the sign or verify keyword is not specified, the trustpoint is used for both signing and verification. Authentication can be done using either pre-shared key (PSK) or PKI (certificate based).

Step 8

(Optional) Enable common criteria mode (FIPS mode).

Example:

Device(config-crypto-tls-tunnel)# cc-mode

Indicates a common criteria mode, which is a Federal Information Processing Standards (FIPS) mode.

Step 9

Enable the TLS tunnel.

Example:

Device(config-crypto-tls-tunnel)# no shutdown

Step 10

Return to privileged EXEC mode.

Example:

Device(config-crypto-tls-tunnel)# end

The TLS tunnel is now configured and enabled, providing secure encrypted communication between devices.