Teccld-2107 (2020)
Teccld-2107 (2020)
Exchange
Design, Deploy and Debug your
Secure Multicloud Access using
Automation and Assurance
Dinesh Ranjit, Technical Architect SAE/CSP
TECCLD-2107
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• Secure Agile Exchange ( SAE) Overview
• SAE Planning
• SAE Design
• SAE Infrastructure
---- Break ----
• SAE Deployment
• End to End Service Chains
• SAE Assurance and Day2 Service Operation.
• Shared Endpoint Gateway and Half Service Chains
• Stitching Service Chains and Shared End Point Gateway
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Secure Agile Exchange (SAE)
Overview
Today’s Global Enterprise Network
MPLS Core
Moscow
Russia
Clichy
San Jose France
USA Kansas City Tokyo
USA Japan
Shanghai
China
Bangalore
India
Sao Paulo
Brazil
Johannesburg
South Africa
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Challenges of multi-cloud access by disparate
user groups
Business Challenges
SaaS
Private Private
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Multi-Cloud Access Changes the Network
Data Center Centric Multi-Cloud Centric with Cloud Edge
Mainframe/
Servers Data
Network/Security Center
Perimeter
Public
Internet
Cloud
WAN Security Edge SaaS
Campus/ Data
SAAS SaaS
Branch Center Secure Agile Exchange
in the Cloud Edge
Internet
Cloud 2
Cloud 1
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cloud Edge is the New Network Hub
SaaS Virtualized network services can be automatically
deployed on demand.
Customers
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Gartner Paper (Aug 2019)
• The legacy data center model is becoming obsolete due
to cloud adoption
• Defines SASE (Secure Access Service Edge) (”sassy”).
• “Tromboning” traffic is inefficient and costly, inspection
engines should be located closest to the where the data
is stored.
• The enterprise network perimeter is no longer a location
but more a set of capabilities delivered from the cloud.
[Link]
and-security-conver
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Secure Agile Exchange Peering Architecture
Cisco
SAE
Consumer Zones Provider Zones
Zones Zones
Orchestration Software
WAN
Branches
WAN
Physical Network Functions Physical Network Functions Data Center
Partners
Nexus9k
Foundation Architecture
Mobile Employees
Internet
VNFs
Customers Internet
CSP CSP CSP
SaaS
NFV Infrastructure
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Secure Agile Exchange (SAE)
Cisco
SAE
Consumer Zones Provider Zones
1. SD-WAN/SD-Branch Neutral
• Support Meraki
NSO Zones
2. Design/Policy flexibility
Zones
Orchestration
Software
Branches
WAN
• Route leaking
WAN • Half chains
Data
Center
• Multi-cloud interconnectivity
Partners N9K Switching • Endpoint Add/delete to VNF
Fabric
• PNF blob(SAE 2.1)*
Mobile
Nexus Nexus9k
9K Switching 3. Orchestration support
Workers
• NSO license available
Internet • Physical device mgmt
Cisco & 3rd Party VNF • OOB switch
Users
C C C
Internet • ASR, FTD
SaaS
S S S • Day2 automation via NED
NFV
P Infrastructure
P P
(separate SKU)
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
SAE HUB
London
Frankfurt
Chicago
Beijing
San Jose Washington, DC Tokyo
Miami
Architecture Overview:
Global Network Access Points (Hubs) Singapore
Utilizing global SAE hubs allows Enterprises to
deploy resources in proximity to their user
population which reduces latency for digital
communication, provide an internet first
consumption model, includes both hybrid and Sao Paulo
multi-cloud usage, and facilitates decreased
network traffic through appropriate distribution
of the Hubs.
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
SAE Building Blocks
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
SAE Solution Stack
SAE Solution GUI
Site 1
Site 2
Switching
ESC VNF ESC
Life Cycle
Manager Switching
Roadmap
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAE Component Stack
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
SAE Component Stack
Nexus Fabric
• Nexus Standalone or Spine/Leaf or ACI
• Support for VLAN and/or VXLAN,
• Support for ITD
• Multi-Tenancy with VRFs
• Full redundancy with port-channels and VPC
VNF VNF CSP-5200/5400 VNF VNF
Nexus 9K
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
SAE Component Stack
PNF
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
SAE Component Stack
Nexus 9K
PNF
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
SAE Component Stack
Elastic Services
Controller
FTDc PFTD VNF Lifecycle Manager (VNFM)
VNF CSP VNF FTDc • Instantiate individual and/or groups of VNFs
• Provision Day0 configurations and network
Nexus 9K objects
• Monitor VNF health and perform recovery
PNF
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
SAE Component Stack
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Cloud Services Platform
CSP 5216/5228 CSP 5436/5444/5456
24 SSD or HDD Slots
8^ SSD or HDD Slots
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
System Overview – NSO and ESC
• Model-driven, end-to-end
Network Ops and Service service lifecycle and
customer experience
Engineering Provisioning Developers focused
• Seamless integration
with existing and future
OSS/BSS environment
Orchestrator (NSO)
Network Services
Service Manager
CDB Package • Loosely-coupled and
Manager modular architecture
Device Manager
leveraging open APIs and
standard protocols
Device Abstraction ESC (VNFM)
• Orchestration across
VNF Lifecycle VNF Service
NED NED NED • multi-domain and multi-
Manager Monitoring
layer for network-wide,
centralized policy and
services
Multi-domain Networks
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Network Element Drivers (NED’s) - Multivendor
Abstraction
A NED abstracts
Network Ops and Service • Underlying protocol and
Engineering Provisioning Developers data-models
• Error-handling
The NED computes the
ordered sequence of device-
Orchestrator (NSO)
Network Services
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Industry’s Broadest Multivendor Support
Over 100 Supported NEDs — Customization
Available
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Virtualization - Scale Up, Out and Down
1 Service Engine
• 40 cores
• 40 Gbps SCALE-UP
• 100k SSL TPS More cores & IO
1 Service Engine
Equal Cost Multipath Load Balancing NED
• 4 cores
• 4 Gbps
• 10k SSL TPS SCALE-OUT More CSPs & VNFs
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
SAE Assurance Journey
Assurance
• monitoring
Monitoring • SLA
• threshold
• Periodic/Scheduled
• recovery Actions
Health-check health-check
• ad-hoc action to
Validation check the packet
path when invoked
• After service chain
instantiation, prove
packet path is same
as service chain path
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Benefits of SAE
85%
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Use Case 1: Onboard a new partner
• Select or Create a Service chain • Network team creates design & configuration
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Use Case 2: Onboard a new application
• Select or Create a Service Chain • Network team creates design & configuration,
deploys and hardware for network connectivity
• Deploy Service chain at Site
• Security team opens ports & protocols required
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
NFV TCO
Use case: Financial securities company doing a Firewall refresh.
Physical FW vs NFV
CapEx Savings $ 400k (~30%)
Total NFV/VNF
Solution Total PNF Cost $ 1,419,282 Cost $ 1,000,000 $ 419,282
Power Power/Unit Watts 1,200 1,050
Total Watts for Units 21,600 6,300 15,300
Cost/KwH $0.10 $0.10
Cost/unit $1,046.40 $915.60
Total power cost $ 18,835 $ 5,494 $ 13,338
RU 3RU*18 54 2RU*6 12 38
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
SAE Planning
Consumer Zones VPN Provider Zones
Users Internet
Viptela 5Gbps
Branch
6Gbps
SAE
CORE
ITD
Legacy DMVPN
DMVPN 2.5Gbps
8Gbps Shared Colo
Sites Services
Legacy 300Mbps
MPLS
Sites SAE
10Gbps
Interconnect
(DCI)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Access to app hosted in Cloud
Effects, when traffic back-hauled to DC to apply security policies
• Hair pinning/tromboning of traffic
• Adds latency
• Increases BW requirements
• Increase transport costs
DMVPN
SP
Router Data Center
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
SAE: Centralized Secure Policy Application to
Traffic Flows- Virtual Only
Co Location Center
CSP SP
Router
DMVPN SP
Router Nexus9k
SP
Router Data Center
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
SAE: Centralized Secure Policy Application to
Traffic Flows- Physical & Virtual
Co Location Center
CSP SP
Router
Nexus9k
DMVPN SP
Router
ASRc ASRp SP
Router Data Center
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
SAE Workflow
Discover & Infrastructure Deploy
Assess Design Setup Service
Sites
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Consumer Zones Service Chain
300Mbps MPLS
Secure Agile Exchange
1vCPU 4GB RAM
2vCPU 8GB RAM
Threat Anti- CSRv
Next-Gen PAN FW
Intelligence Malware IPS
6Gbps Core/Enh
8vCPU 12GB RAM SD-WAN
8vCPU 12GB RAM
8vCPU 12GB RAM Threat Anti- Next-Gen PAN FW vEdge
8vCPU 16GB RAM Intelligence Malware IPS
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Provider Zones Service Chain
8Gbps
Secure Agile Exchange
Internet
8vCPU 16GB RAM
8vCPU 16GB RAM
1vCPU 4GB RAM CSRv
1vCPU 4GB RAM Load Threat Anti- IPS PAN FW
Balancer Intelligence Malware
Colo
Services
Load
Balancer
1Gbps Azure
2vCPU 8GB RAM
1vCPU 4GB RAM
CSRv
Threat Anti- IPS PAN FW
Intelligence Malware
8Gbps
AWS
8vCPU 16GB RAM
8vCPU 16GB RAM
1vCPU 4GB RAM CSRv
Load Threat Anti- IPS PAN FW
1vCPU 4GB RAM Balancer Intelligence Malware
2Gbps DCI
4vCPU 9GB RAM Backbone
4vCPU 4GB RAM
Threat Anti- IPS PAN FW CSRv
Intelligence Malware
47 vCPU 105GB RAM
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
SAE Design
SAE Workflow
Discover & Infrastructure Deploy
Assess Design Setup Service
Sites
DMVPN
Internet
BRANCH Application
Unable to access application Unable to ping server hosted in Cloud
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
End–to-End Service Chain Traffic Flow
CSRv ASAv CSRv
DMVPN Internet
Gateway
Gateway
[Link] Router [Link]
Router
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
End–to-End Service Chain – Traffic Flow Configuration
x.x.x.x
[Link] AS:Y:Y [Link]
AS:38 ASAv AS:138
CSRv VLAN A VLAN B CSRv
Consumer Provider
DMVPN eBGP eBGP
VLAN 138 Internet
VLAN 38
eBGP
eBGP
Gateway
Gateway
[Link] Router [Link]
Router
Test Agent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
CSR 1000v Resource Sizing
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
ASAv Sizing
ASAv Specifications
Feature ASAv5 ASAv10 ASAv30 ASAv50
Virtual CPUs 1 1 4 8 Ordering Information: In Cisco Commerce Workspace (CCW) Order the Base Selection
1 GB (Denoted by “K9” in the Part Number), Followed by the Desired License Type
Memory 2 GB 8 GB 16 GB
minimum
1.5 GB
maximum
Minimum disk storage4 8 GB 8 GB 16 GB 16 GB Part Number Description
Stateful inspection throughput L-ASAV5S-K9= 8-pack Cisco ASAv5 (100 Mbps) selection
100 Mbps 1 Gbps 2 Gbps 10 Gbps
(maximum)1
Stateful inspection throughput
50 Mbps 500 Mbps 1 Gbps 5 Gbps L-ASAV5S-STD-8 8-pack Cisco ASAv5 (100 Mbps) with all firewall features licensed
(multiprotocol)2
Advanced Encryption Standard (AES) L-ASAV10S-K9= Cisco ASAv10 (1 Gbps) selection
30 Mbps 125 Mbps 1 Gbps 3 Gbps
VPN throughput3
Connections per second 8,000 20,000 60,000 120,000
L-ASAV10S-STD Cisco ASAv10 (1 Gbps) with all firewall features licensed
Concurrent sessions 50,000 100,000 500,000 2,000,000 L-ASAV10S-STD-16 16-pack Cisco ASAv10 (1 Gbps) with all firewall features licensed
VLANs 25 50 200 1024
L-ASAV30S-K9= Cisco ASAv30 (2 Gbps) selection
Bridge groups 12 25 100 250
L-ASAV30S-STD Cisco ASAv30 (2 Gbps) with all firewall features licensed
IPsec VPN peers 50 250 750 10,000
Cisco AnyConnect® or clientless VPN L-ASAV30S-STD-4 4-pack Cisco ASAv30 (2 Gbps) with all firewall features licensed
50 250 750 10,000
user sessions
Cisco Unified Communications phone L-ASAV50S-K9= Cisco ASAv50 (10 Gbps) selection
50 250 1000 Not tested
proxy
L-ASAV50S-STD Cisco ASAv50 (10 Gbps) with all firewall features licensed
Cisco Cloud Web Security users 250 1,000 5000 Not tested
High availability Active/standby L-ASAV50S-STD-4 4-pack Cisco ASAv50 (10 Gbps) with all firewall features licensed
Modes Routed and transparent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Palo Alto Sizing
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Virtual Network Function ( VNF) Catalog
VNF Catalog
vCPU Memory (GB) Storage (GB) Vendor
16 56 2046 Palo Alto
8 16 2046 Palo Alto
2 8 2046 Palo Alto
8 16 10 F5
2 4 10 F5
1 4 8 Cisco
1 4 8 Cisco
2 4 8 Cisco
App Catalog
12 96 2.4 Cisco
7 64 1.5 Cisco
4 4 50 Cisco
4 32 250 Infloblox
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
ASAv VNF Profile/Template
VNF Template
hostname $VD_ASA_HOSTNAME
nameif $MGMT_IF
ip address $VD_ASA_NICID_0_IP_ADDRESS
$VD_ASA_NICID_0_IP_MASK
username $VFIREWALL_USERNAME
password $VFIREWALL_PASSWORD
privilege 15
ssh [Link] [Link] $MGMT_IF
router bgp $VD_ASA_ASNUMBER
bgp router-id $VD_ASA_NICID_0_IP_ADDRESS
license smart register idtoken $LICENSE_TOKEN force
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Service Design → Virtual Services/VNFD
CPU
Storage
Description HA
Virtual Service
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Service Catalog → Virtual Service
Instance/VNFD-Deployment
• Catalog of various services
• Day0 Configuration
• Configuration parameter changes
• Day1 Configuration
Name
Virtual Service Instance
Day0 File /DMVPN
Virtual Service Flavor
E.g. DMVPN CSR-
Day1(Optional)
2.5 GBPS/Security Configuration/DMVPN
users Disable Web
Traffic
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Virtual Service Instance
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Service Design → Service Chain / NSD
Description
Virtual Service
Flavor1/IPBASE
Profile
Virtual Service
Flavor Flavor2/APPX
Physical
Service
Type Affinity-Rule
Service Chain
Affinity Scope Consumer-End
E.g. Branch-Cloud
Switch Provider-End
External
Connection Chain-End
Connection
PRE-ITD-End
*NSD=Network
POST-ITD-END Service Descriptor
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Service Chains
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Service Catalog → Service Chain Instance/NSD-
Deployment
Catalog of various service-chains
• Different Services
• Configuration parameter changes
Service Chain
Catalog Flavor
Virtual Service Instance
E.g. DMVPN-Internet Name
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Service Chain Instance
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
SAE Infrastructure
SAE Workflow
Discover & Infrastructure Deploy
Assess Design Setup Service
Sites
3
1
vCPU2 vCPU2
3
1
vCPU3 vCPU3
3
1
C
C
C
CIMC
CIMC
CIMC
vCPU4 vCPU4
3
1
1
1
vCPU5 vCPU5
vCPU6 vCPU6
vCPU7 vCPU7
NSO
vCPU8 vCPU8
vCPU9 vCPU9
CSP5456
CSP5456
CSP5216
vCPU10 vCPU10
Nexus 93180
vCPU11 vCPU11
vCPU12 vCPU12
vCPU13 vCPU13
1
1
vCPU14 vCPU14
2
2
vCPU15 vCPU15
Intel XL710
Intel XL710
SIP
vCPU16 vCPU16
vCPU17 vCPU17
vCPU18 vCPU18
vCPU19 vCPU19
vCPU20 vCPU20
3
3
vCPU21 vCPU21
1
4
OOB
4
4
ESC - HA
1
vCPU22 vCPU22
2
5
Intel XL710
Intel XL710
vCPU23 vCPU23
2
Intel X520
3
6
vCPU24 vCPU24
M
MGMT
M
C C C M
C C C M
MGMT
vCPU1 vCPU1
4
2
vCPU2 vCPU2
4
2
vCPU3 vCPU3
C
C
4
2
CIMC
CIMC
CIMC
4
2
vCPU4 vCPU4
TECCLD-2107
2
2
vCPU5 vCPU5
vCPU6 vCPU6
vCPU7 vCPU7
Example SAE Physical Buildout
vCPU8 vCPU8
vCPU9 vCPU9
CSP5456
CSP5216
CSP5456
vCPU10 vCPU10
NSO - HA
Nexus 93180
vCPU11 vCPU11
vCPU12 vCPU12
vCPU13 vCPU13
1
1
vCPU14 vCPU14
2
2
vCPU15 vCPU15
SIP
Intel XL710
Intel XL710
vCPU16 vCPU16
vCPU17 vCPU17
vCPU18 vCPU18
ESC
vCPU19 vCPU19
vCPU20 vCPU20
3
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
vCPU21 vCPU21
1
4
vCPU22 vCPU22
2
5
Intel XL710
Intel XL710
60
2
vCPU23 vCPU23
Intel X520
3
6
vCPU24 vCPU24
SAE Standalone - Wiring Topology
• Wire 2 N9K-C93180YC-FX to 2 CSP5K CSP Pnic Pnic- Port- N9K Port- Interface
type channel/S Channel
RIOV
csp-9-48 enp7s0f0 X710 DATA-PC LEAF3-R4 port- Ethernet1/1
channel15
csp-9-48 enp7s0f1 X710 DATA-PC LEAF4-R4 port- Ethernet1/1
channel15
csp-9-48 enp7s0f2 X710 HA-PC LEAF3-R4 port- Ethernet1/2
channel16
csp-9-48 enp7s0f3 X710 HA-PC LEAF4-R4 port- Ethernet1/2
channel16
csp-9-48 enp3s0f0 X520 SRIOV LEAF3-R4 Ethernet1/5
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
SAE Spine Leaf - Wiring topology
• Wire 2 N9K-C93180YC-FX to 2 N9K-C9364C
• Wire 2 N9K-C93180YC-FX to 2 CSP5K
Cluster 1 Cluster 2
Spine1 Spine2
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
SAE Demo Topology- Infrastructure • Management Domain will be a separate domain from the
SAE Core (Data & Service Plane) for remote management
N93180-1 N93180-2 .
• Dual Switches (N93180) in VPC Pair
• Dual CSP5K - (Min For Management Applications)
Data-PC
Data-PC • NSO-HA SAE Service Orchestration
SRIOV-1 SRIOV-2 SRIOV-1 SRIOV-2
• ESC-HA ( VNF Life Cycle Management
NSO HA • Netrounds Controller for Traffic Assurance- Synthetic
Pair
Traffic Monitoring
NSO1 NSO2
• Live Action – SAE Assurance –Active Traffic Monitoring
ESC HA
Pair
ESC-1 ESC-2
Netrounds
Controller
Live Action
Agent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
SAE SITE Infrastructure Discovery
START/SEED N9k
DEVICE IP
Authgroup of SEED
SWITCH AUTHGROUP
N9k Switch
Authgroup of CSP
CSP AUTHGROUP
Device
SERVER PROFILE
CSP TYPE CSP’s with Identical
Connection
CLUSTER NAME
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
End–to-End Service Chain – External End Point
CSRv ASAv CSRv
DMVPN Internet
eBGP
eBGP
Gateway
Gateway
[Link] Router [Link]
Router
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
SAE SITE – External End Point
Name
Remote BGP
Number
SAE SITE External End
Point External End Point
Peer IP ADDRESS
External Endpoint
Peer Netmask
VLAN
VPN TUNNEL
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Break
Agenda
• Secure Agile Exchange ( SAE) Overview
• SAE Planning
• SAE Design
• SAE Infrastructure
---- Break ----
• SAE Deployment
• End to End Service Chains
• SAE Assurance and Day2 Service Operation.
• Shared Endpoint Gateway and Half Service Chains
• Stitching Service Chains and Shared End Point Gateway
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
SAE Deployment
End to End Service Chains
SAE Workflow
Discover & Infrastructure Deploy
Assess Design Setup Service
Sites
Gateway
Gateway
[Link] Router [Link]
Router
eth2 eth3
eth1 eth4
Test Agent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Service Chain - End to End
Service Chain
Instance
Service Chain
Instance Flavor
End to End
Resource-
Zones
Device-Names
Variables
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Branch connectivity to application in the Cloud
ASAv
CSRv CSRv
DMVPN Internet
Gateway
Gateway
[Link] Router [Link]
Router
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
SAE Deployment
SAE Assurance and Day2 Service Operation.
SAE Service - Validation/Monitoring with
Netrounds VNF Test Agent
4x Network namespaces (vNICs)
Service Endpoints
(SD-WAN / IPSec)
[Link] [Link]
[Link] [Link]
Branch
Router Firewall
IPS
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Service Chain Monitoring – DMVPN to Internet
x.x.x.x
AS:Y:Y
[Link] ASAv [Link]
VLAN A VLAN B
CSRv CSRv
Gateway
Gateway
[Link] Router [Link]
Router
eth2 eth3
eth1 eth4
Test Agent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Service Chain Active Traffic Monitoring – Live Action
x.x.x.x
AS:Y:Y
ASAv
VLAN B
CSRv
DMVPN Internet
eBGP
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
SAE Service Chain – Day 2 operation
-Disable Web Access
ASAv
CSRv CSRv
DMVPN Internet
Gateway
Gateway
[Link] Router [Link]
Router
eth2 eth3
eth1 eth4
Test Agent
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
SAE Deployment
Shared Endpoint Gateway and Half
Service Chains
Consumer Zones VPN Provider Zones
Users Internet
Viptela 5Gbps
Branch
6Gbps
SAE
CORE
ITD
Legacy DMVPN
DMVPN 2.5Gbps
8Gbps Shared Colo
Sites Services
Legacy 300Mbps
MPLS
Sites SAE
10Gbps
Interconnect
(DCI)
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Consumer Zones SAE Consumer and Provider Service Chain Provider Zones
Internet
2.5 Gbps
ASAv
Employees
5Gbps
PAN
5Gbps
Partners
SAE
CORE
Direct
Connect
Sites 300Mbps 10 Gbps
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
SAE Service Chain Connectivity
Internet VPN Management PAN
Users Domain
Internet /
VPLS
Direct
Connect
Sites ASAv PAN
PAN PAN
CSRv CSRv
PAN PAN
ISE
PAN
PAN CSRv CSRv PAN
MPLS
CSRv CSRv CSRv
Internet
PAN
PAN CSRv PAN
PAN
CSRv
DMVPN DMVPN CSRv CSRv
Sites cEdge
Colo Shared
Services
Internet / DCI
VPLS Backbone
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Inbound Service Chain Design
500Mbps PAN
MPLS
Secure Agile Exchange
CSRv
PAN Direct
10Gbps PAN Connect
Sites
CSRv ITD CSRv
ITD
6Gbps Core/Enh
SD-WAN
cEdge
500Mbps VPN
Users
ISE ASAv
MX450 MX450
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Outbound Service Chain Design
PAN
8Gbps
Secure Agile Exchange
PAN
Internet
CSRv
1Gbps PAN
Colo
Services
PAN
8Gbps PAN
Azure
CSRv CSRv
ITD ITD
PAN
8Gbps PAN
AWS
CSRv ITD CSRv
ITD
10Gbps DCI
Backbone
CSRv
1Gbps PAN
Management
Domain
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Static Chains
End to End chain Requirements - 4 chains/24 vCPU
* Each VNF – 2 vCPU
CSR ASAv CSR
Employee
VLAN A VLAN
[Link] eBGP
CSR [Link]
CSR
ASAv
Employee
VLAN B VLAN
[Link] eBGP
[Link]
CSR
PAFW VM Series CSR
Partner VLAN C
VLAN
[Link] eBGP
CSR
CSR [Link]
Partner VLAN D
VLAN
[Link] eBGP
[Link]
PAFW VM Series
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Dynamic Access using Chain Stitching
[Link] eBGP
[Link]
CSR
PAFW CSR
Partner VLAN 41
VLAN
[Link] eBGP
[Link]
Benefit:
✓ Access to additional providers simplified
✓ Savings on compute resources
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Dynamic Access enablement using Chain Stitching
Consumer Chain < ------ > Provider Chain Requirements – 3 chains/10 vCPU
* Each VNF – 2 vCPU
Employee AWS
CSR ASAv Chain VRF Chain VRF
Employee
VLAN 40 VLAN
CSR
PAFW
Partner VLAN 41
VLAN
[Link]
[Link] eBGP
Partner Azure
Chain VRF Chain VRF
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
SAE Deployment
Stitching Service Chains and Shared End
Point Gateway
SAE Half Chain Use Case
vRouter vFirewall
(CSR) (paloalto)
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
VNF Sharing Consumer: Logical view
SAE Scope
VPC:
Switch AWS
Employees
Route
Leak
VPC:
Azure
Cable
Packet Flow
eBGP
SVI on 9K
Route leak
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
SAE Debug and
Troubleshooting
SAE – Peeking Under the Hood PAN
SAE
Solution
GUI VNF
CSP-5xxx
Nexus 9xxx
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
System Requirements NSO SAE CFP with GUI.
• NSO + Core Function Pack + GUI can be installed on any Ubuntu/RedHat/CentOS
System.
OS Ubuntu Red Hat CentOS MacOSX
Minimum CPU-8 Cores CPU-8 Cores CPU-8 Cores CPU-8 Cores
Server RAM-24 GB RAM-24 GB RAM-24 GB RAM-24 GB
Configuration Disk-300GB Disk-300GB Disk-300GB Disk-300GB
Version 16.04.4 LTS 7.3 (Maipo) 7.4 (Core) 10.12.6
17.10
18.04 LTS
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
NSO/SAE CFP Troubleshooting
• NSO + Core Function Pack Installation
• NSO is installed on Ubuntu/CentOS as system installation and SAE Core Function Pack is
installed post NSO installation .
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
NSO SAE CFP Installation Troubleshooting
Problem
System Installation failed with following error
nso-4.7.1-cisco-sae-core-fp-1.0.0-9/installer/core-FP-installer$ ./[Link]
PLAY ***************************************************************************
Solution
Check NSO Host is reachable and re run installation .
Problem
Packages failed to come up, oper-status of some packages are down
Solution:
Check ulimit on NSO system set to allow 65535 open file systems.
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
NSO SAE CFP Logs Troubleshooting
• Enable Logs - detailed logging is disabled in NSO SAE CFP by default. Please enable logs as below:
set devices global-settings trace raw
set java-vm java-logging logger [Link] level level-all
set python-vm logging level level-debug
Components and logs - SAE-Site Components and logs can be seen as below
.
Component Logs
Placement [Link]
Image [Link]
Discovery [Link]
[Link]
N9k ned-cisco-nx-*.trace
CSP netconf-csp-*.trace
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
ESC - Troubleshooting
Login to ESC Device ( VIP for HA )
Logs are located under: sudo cd /var/log/esc
Component Logs
Main ESC log [Link]
VNF deployment [Link]
VIM manager vimmanager/[Link]
Monitoring and Action mona/[Link]
Extensive Documentation for Deployment, Debugging and Troubleshooting for ESC available in
below link:
[Link]
controller-esc/[Link]
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
ESC - Troubleshooting Commands
ESC-5.0 and above CLI
ESC version esc_version
Operation/maintenance mode escadm op_mode show
escadm op_mode set --mode MAINTENANCE
escadm op_mode set --mode OPERATION
current configurations escadm dump(dump in yaml format)
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Cloud Services Platform(CSP)-5xxx-
Troubleshooting
• CSP-5xxx used in SAE environment are being pre configured with connectivity to Nexus
N9k
• VNF Deployment is deployed and monitored by ESC
• NSO SAE Service performs Infra Discovery based on configuration in N9k and CSP.
• NSO SAE Service initiates deployment of VNF on CSP after performing resource request
checks.
Extensive Documentation for Deployment, Debugging and Troubleshooting for CSP-5xxx
available in below link:
[Link]
[Link]
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Nexus 9xxx - Troubleshooting
• N9Ks used in SAE environment are being configured by NSO CFP. Therefore, avoid
configure N9K out-of-band. All N9K configuration should be done via SAE CFP.
• If N9K is out-of-sync with NSO CFP, make sure to sync it with NSO CFP by issue
command
request devices fetch-ssh-host-keys
request device sync-from
[Link]
[Link]
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Nexus N9xxx - Troubleshooting
Main routing protocol used in SAE is BGP. Commands useful to debug in Nexus N9k
show ip route
show bgp all
show bgp sessions
show ip bgp summary
show ip bgp neighbor
show ip bgp neighbor <IP-address-of-neighbor> routes
clear ip bgp *
terminal monitor
debug ip bgp events
show ip bgp regexp ^$
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
VNF Troubleshooting - Scenario PAN
Solution :
Check VNF deployment has appropriate config needed to bootup :
1. day0 destination ( ASAv, FTDv - day0-config, CSR - iosxe-config , AVISE - avi_meta_se.yml, etc. )
2. day0 file has the minimum configuration $NICID_0_IP_ADDRESS, $NICID_0_CIDR_ADDRESS, $NICID_0_GATEWAY gateway etc.
3. Verify the values are assigned that will be reachable by ESC and NSO .
Problem: After service is deployed , VNF SSH authentication failure and plan is failed.
Solution :
Check authgroups provided for the VNF correct them if needed, verify the connection is fine from NSO. Delete the service and create
a new service.
or
Check connectivity and correct authgroup if incorrect. Perform replay of ESC notifications after ESC has sent VM_ALIVE as below.
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
SAE Solution Recovery Mechanism:
• SAE Solution offers various recovery mechanisms:
• SAE-Site Actions :
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
SAE Solution Cleanup
• SAE Solution offers various cleanup operations in event deletion of specific SAE
Services fail
• SAE Cleanup Actions are offered as below options :
• NSO CDB cleanup
• Network Wide cleanup ( with more option )
( more)
SAE Site Actions Cleanup Command Description
action-status-cleanup Clear sae-action-status records
compute-cleanup Will cleanup leftover data for compute day1 service
endpoint-gateway-vnf-cleanup with more Will cleanup leftover data for endpoint-gateway-
vnf service
service-chain-cleanup with more Will cleanup leftover data for service-chain service
stitching-service-cleanup with more Will cleanup leftover data for stitching service
vnf-manager-cleanup with more Will cleanup leftover data for vnf-manager service
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
SAE Deployment Best Practice
• Setup NTP on NSO,ESC, CSP, N9k nodes and other nso-unmanaged devices , ensure ntp is enabled and time
synch performed . Preferred to have these devices in same Time Zone.
• Controllers for VNF – FMC, AVI Controller, Panorama etc to be spun as pre-requisite.
• Individual IP address subnet for Management Pool and Data pool , with licensing enabled (optional). Provide
proxy configuration for vnf’s and nso-unmanaged devices to reach internet when needed.
• Check on NSO-SAE-Site-Status plan before proceeding to next steps , during multiple create and delete
operations .
• Multiple SAE Cluster – Spine-Leaf switch method - Infra-Discovery, each cluster needs to have a unique CSP
type name.
• SAE Customizations ( custom templates available from NSO for users to perform any custom operation on
specific devices managed by NSO.
• After every deletion operation please ensure there are no stale data left behind on any device and NSO plan
status is cleared for the particular operation.
• Perform Cleanup operations as described in SAE Solution Cleanup for any deletion failures.
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
SAE Roadmap and References
SAE Completed Releases
SAE 1.1 Q2’19(Apr) SAE 1.2 July ‘19 SAE 2.0 Q3’19
Platform
UI/UX • Production UI
• Chain health status
• 1.1 Catchup release • Image management
• VNF image update
(Different • Infra discovery
AC/release)
• Physical device
Focus orchestration
• Rockwell requirements • Increased Ecosystem
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
SAE Release and Roadmap
SAE 2.0.1 Q4’19 SAE 2.0.2 Q1’20 SAE 2.1 Q2’20 SAE 2.2 Q3’20
(Jan CY20 release) (Mar 20) (June 2020) (Sept 2020)
• Bug Fixes • QCOW2 packaging • VNF with Day2 recovery • SAE as a Service
Core • Customer UX risk
with VNF licensing
• vNIC bandwidth control
• PNF anywhere
• Control plane Network
Assurance
(CX EX commit
dependency)
capabilities • Spine-Leaf config • ACI Integration
fix
• Checkpoint onboarding
Hardware • CSP 2.6: • TPM support on CSP in • CSP 2.7 • CSP 2.8
Platform • LLDP
enhancement
2.6 • Storage
Virtualization/NFS
• Intel SmartNIC(N3000
FPGA)
• 100G o IPSEC & TLS acceleration
o Mellanox (pure possible through N3000
UI/UX bandwidth)
(Different
AC/release) • Operational updates • Health & status • SAE Wizard • SaaS portal
• UI parity with CLI for enhancements • ACI support(VXLAN enhancements
notifications details)
Focus
• Maintenance release • Pre SAE as a Service • Launch SAE as a Service
• Customer wins
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Secure Agile Exchange Build Out
MVP
Base:
• 6 x CSP 5000 CSP5000 N9K-C9364C
• 2 x N9K 9364C (NXOS)
• 4 x N9K 93180YC-FX (NXOS)
Spine
MGT
• 2 x CSP 5000
• 2 x ISR 4221
• 2 x N9K 93180YC-FX
• 2 x NSO N9K-C93180YC-FX
Leaf
FTD4120
Cloud Data
Edge Center Internet WAN
Core
Edge Edge Edge
AZ1 AZ2
Net Comp
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Secure Agile Exchange ACI Fabric
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Services for Secure Agile Exchange Portfolio
Discovery & Evaluation Solution Test & Validation Business Critical Services
(Annual Subscription) (Annual Subscription) (Annual Subscription)
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAE Solution Overview - click here
Ask SAE :
ask-sae-external@[Link]
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Secure Agile Exchange Key Takeaways !!!
• Secure Agile Exchange enables multi-cloud journey for customers
• Capitalize on the transformation in consumption model
• Considerable WAN cost savings
• Cloud service provider and WAN technology agnostic
• Turn-key with user friendly Graphical User Interface
• Programmable, customizable and extensible to fit into existing OSS/BSS
stack
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on [Link]/emea.
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Engage with us NOW so you can put to
action what you learnt today
Enabling Secure access to multiple clouds
is absolutely EASY!
TECCLD-2107 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Thank you