25-SDWAN Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C MSR610[810][830][1000S][2600][3600] Routers Configuration Guides(V7)-R6749-6W10025-SDWAN Configuration Guide
Table of Contents
Related Documents
01-SDWAN configuration
Title Size Download
01-SDWAN configuration 590.96 KB

Contents

SDWAN overview·· 1

About SDWAN· 1

SDWAN network model 1

SDWAN packet formats· 2

Control packet format 2

Data packet format 3

BGP extensions· 4

BGP IPv4 tunnel-encap-ext address family· 4

BGP EVPN routes· 5

Channel establishment 5

Control channel establishment 6

Data channel establishment 6

Route advertisement 7

Traffic forwarding· 9

IPsec-protected SDWAN tunnels· 9

SDWAN tunnel establishment with NAT traversal 10

About this feature· 10

Control channel establishment 11

Data channel establishment 12

Configuring SDWAN·· 14

SDWAN tasks at a glance· 14

Configuring site and device identification information· 14

Specifying a site for the device· 14

Specifying an ID and system IPv4 address for the device· 15

Configuring an SDWAN client 15

Configuring an SDWAN server 16

Configuring an SDWAN tunnel 17

Testing TTE connection connectivity· 18

About testing TTE connection connectivity· 18

Restrictions and guidelines for testing TTE connection connectivity· 19

Using BFD to test TTE connection connectivity· 19

Using keepalive to test TTE connection connectivity· 19

Configuring BGP to advertise IPv4 tunnel-encap-ext routes· 20

Restrictions and guidelines for BGP IPv4 tunnel-encap-ext route advertisement 20

Enabling BGP to advertise BGP IPv4 tunnel-encap-ext routes· 20

Configuring BGP IPv4 tunnel-encap-ext route settings· 20

Maintaining BGP sessions· 22

Using BGP EVPN IP prefix advertisement routes to advertise routes for a VPN instance· 22

Configuring a CPE· 22

Configuring an RR· 23

Configuring traffic rerouting and load balancing by using the Priority-Color attribute· 24

Configuring next hop recursion based on only the Priority-Color attribute for IP prefix advertisement routes  26

Configuring SDWAN network intercommunication over an EVPN VXLAN network· 28

Configuring SDWAN network intercommunication with an EVPN L3VPN over SRv6 network· 29

Specifying the post-NAT public IP address and port number for tunneled packets· 31

Simplifying the QoS configuration on a hub-spoke network· 32

Display and maintenance commands for SDWAN· 33

SDWAN configuration examples· 34

Example: Establishing SDWAN tunnels with NAT traversal 34

Example: Establishing SDWAN tunnels on demand· 42

 


SDWAN overview

About SDWAN

Software-defined WAN (SDWAN) is a VPN technology that applies SDN technologies to WAN. The control plane uses SSL and MP-BGP to advertise transport tunnel endpoint (TTE) information to set up SDWAN tunnels between sites and uses MP-BGP to advertise private routes between sites. The data plane uses UDP to encapsulate and forward data packets and uses security mechanisms such as IPsec to secure data transmission. SDWAN provides secure and reliable interconnection services for geographically dispersed enterprise networks and data centers.

SDWAN network model

As shown in Figure 1, SDWAN contains the following components:

·     Customer provided edge (CPE)—Edge device at a customer site.

·     Route reflector (RR)—Used to reflect TTE information and private routes between CPEs.

·     Transport network (TN)—Service provider WAN that connects sites. A transport network can be a service provider VPN or the Internet public network. A transport network is identified by its transport network ID or name. Transport networks are the fundamentals to construct SDWAN overlay network.

·     Routing domain (RD)—Domain that contains transport networks that are reachable at Layer 3. SDWAN tunnels can be established only between CPEs or between CPEs and RRs in the same routing domain.

·     Site ID—A site ID is a string of digits used to uniquely identify a site in the SDWAN network. The network controller allocates site IDs to all sites.

·     Device ID—A device ID uniquely identifies an SDWAN-capable device (or SDWAN device) at a site. Typically, a site contains one or two SDWAN devices.

·     SDWAN tunnel—Point-to-multipoint logical channel established among SDWAN devices. One site transmits traffic to another site over an SDWAN tunnel.

·     Secure Sockets Layer (SSL) connection—In the SDWAN network, a CPE and an RR establish an SSL connection to exchange TTE information for control channel establishment.

·     Transport tunnel endpoint (TTE)—Endpoint that connects an SDWAN device to a transport network and endpoint of an SDWAN tunnel. Device TTE information includes the site ID, transport network ID (TN ID), private IP address, public IP address, and tunnel encapsulation mode.

·     TTE connection—Point-to-point logical connection established between TTEs. An SDWAN tunnel can hold multiple TTE connections.

Figure 1 SDWAN network model

 

SDWAN packet formats

SDWAN supports control packets and data packets.

·     SDWAN control packets are used for NAT traversal. The device uses SDWAN control packets to advertise its public IP address translated after NAT to remote devices. For more information about NAT traversal, see "SDWAN tunnel establishment with NAT traversal."

·     SDWAN data packets are used to forward user packets.

Control packet format

As shown in Figure 2, an SDWAN control packet contains the following components:

·     Data portion.

·     IPsec header (optional).

·     12-byte SDWAN header.

·     8-byte outer UDP header. The destination port number in the UDP header is the SDWAN UDP port number. By default, the port number is 4799.

·     20-byte outer IP header.

The SDWAN header contains the following fields:

·     Type—Type of the packet. The length for this field is 8 bits. For an SDWAN control packet, the value is 1.

·     Subtype—Subtype of the control packet. The length for this field is 8 bits. If the value is 1, the packet is a NAT address probe request packet.

·     Version—Version number of SDWAN protocol packets. The value is fixed at 0.

·     Reserved—Reserved field. The value is fixed at 0.

·     Length—Length of the SDWAN header. The length for this field is 16 bits. The value is fixed at 12 in the current software version.

·     TTE ID—Identifies a TTE. The length for this field is 32 bits.

Figure 2 SDWAN control packet format

 

Data packet format

As shown in Figure 3, an SDWAN data packet contains the following components:

·     Original data packet.

·     IPsec header (optional).

·     12-byte SDWAN header.

·     8-byte outer UDP header. The destination port number in the UDP header is the SDWAN UDP port number. By default, the port number is 4799.

·     20-byte outer IP header.

The SDWAN header contains the following fields:

·     Type—Type of the packet. The length for this field is 8 bits. For an SDWAN data packet, the value is 2.

·     Protocol—Type of the inner data packet. The length for this field is 8 bits. If the value is 1, the packet is an IPv4 packet. If the value is 2, the packet is an IPv6 packet.

·     Length—Length of the SDWAN header. The length for this field is 16 bits. The value is fixed at 12 in the current software version.

·     VN ID—VN ID of the VPN instance to which the SDWAN data packet belongs. The length for this field is 32 bits. If the packet belongs to the public instance, the value for this field is all zeros.

·     Flow ID—Flow ID of the SDWAN data packet. The length for this field is 32 bits. To mark packets with a flow ID, use the remark flow-id command. If no flow ID is marked, the value for this field is all zeros. For more information about the remark flow-id command, see QoS commands in ACL and QoS Command Reference.

Figure 3 SDWAN data packet format

 

BGP extensions

BGP IPv4 tunnel-encap-ext address family

To support SDWAN, BGP defines a new address family called BGP IPv4 tunnel-encap-ext address family. This address family is a subsequent address family of the IPv4 address family. The subsequent address family identifier (SAFI) is 74. Routes exchanged under this address family are IPv4 tunnel-encap-ext routes. IPv4 tunnel-encap-ext routes can include the following information in the Multiprotocol Reachable NLRI (MP_REACH_NLRI) attribute:

·     TTE information—Includes site ID, transport network ID, public IP address, private IP address, tunnel encapsulation mode, and QoS information. CPEs use the information to set up data channels between each other.

·     SaaS path quality information—Includes link delay, jitter, packet loss ratio, and CQI. RIR uses the information to select the optimal path for application traffic.

Figure 4 MP_REACH_NLRI attribute in IPv4 tunnel-encap-ext routes

 

 

As shown in Figure 4, the MP_REACH_NLRI attribute in IPv4 tunnel-encap-ext routes contains the following fields:

·     Flags—BGP attribute flags. The value is 0x90, which indicates that this attribute is an optional nontransitive attribute that includes complete information.

·     Type Code—BGP attribute type. The value is 14.

·     Length—Length of the MP_REACH_NLRI attribute.

·     AFI—Address family identifier. The value is 1, which represents IPv4 address family.

·     SAFI—Subsequent address family identifier. The value is 74, which represents IPv4 tunnel-encap-ext address family.

·     Next hop network address—Next hop IP address.

·     Number of SNPAs—Number of Subnetwork Point of Attachments (SNPAs) in the subsequent field. If the value is 0, the attribute does not include an SNPA.

·     NLRI—Network layer reachability information.

Network layer reachability information in the MP_REACH_NLRI attribute includes the following fields:

·     NLRI Type—Type of NLRI. If the value is 1, this field includes IPv4 TTE information. If the value is 2, this field includes SaaS path quality information. If the value is 3, this field includes IPv6 TTE information. If the value is 4, this field includes QoS TTE information.

·     NLRI Length—Length of NLRI.

·     Protocol—Protocol stack of NLRI. The value is 2.

·     Prefix Type—Prefix type of NLRI. The value is 1.

·     Prefix Length—Prefix length of NLRI.

·     Prefix—Prefix information of NLRI. For TTE information, the value is the TTE ID. For SaaS path quality information, the value is the site ID and device ID.

·     Data Type—Type of the data portion in NLRI. The value is 2.

·     Data Length—Length of the data portion in NLRI.

·     Data—Data portion in NLRI. This field includes detailed TTE information or SaaS path quality information.

BGP EVPN routes

You can deploy SDWAN across VPNs. A CPE advertises VPN routes to other CPEs in the format of BGP EVPN IP prefix advertisement routes. To support SDWAN, the following extensions are added to BGP EVPN routes:

·     SDWAN encapsulation is added to the TUNNEL_ENCAPSULATION_ATTRIBUTE attribute. SDWAN-encapsulated IP prefix advertisement routes can be forwarded only between the devices that are enabled to advertise BGP EVPN routes in SDWAN encapsulation.

·     A VN ID is added to the NLRI field of IP prefix advertisement routes. The VN ID is used to differentiate private routes in different VPN instances.

Channel establishment

As shown in Figure 5, an SDWAN network supports control channels and data channels.

Figure 5 SDWAN channels

 

Control channel establishment

A control channel is established between an RR and a CPE to advertise TTE information and private routes. The establishment process is as follows:

1.     The CPE and RR establish an SSL connection (control channel). The CPE is the SSL client, also referred to as the SDWAN client. The RR is the SSL server, also referred to as the SDWAN server.

2.     The CPE and RR exchange TTE information.

3.     After receiving TTE information from each other, the CPE and RR compare the routing domain, group ID, and transport network in the received TTE information with those in the local TTE information.

¡     If the routing domains, group IDs, and transport networks are the same, the CPE and RR establish an SDWAN tunnel (control channel) between them.

¡     If the routing domains, group IDs, or transport networks are different, the CPE and RR do not establish an SDWAN tunnel between them.

4.     The CPE and RR each automatically add the user network routes (UNRs) destined for the system IP address of the peer device to the local routing table.

5.     The CPE and RR establish a BGP connection (control channel) under the IPv4 tunnel-encap-ext address family based on their system IP addresses.

Data channel establishment

A data channel is established between two CPEs to transmit data packets. The establishment process is as follows:

1.     The CPEs use IPv4 tunnel-encap-ext routes to advertise TTE information to an RR.

2.     The RR reflects the TTE information of each CPE to the other CPE.

3.     When each CPE receives TTE information reflected by the RR, they store the TTE information.

4.     Each CPE sends the VPN routes learned from the local site to the RR through SDWAN-encapsulated IP prefix advertisement routes.

5.     The RR reflects the IP prefix advertisement routes received from a CPE to the other CPE.

6.     Each CPE looks up the locally stored TTE information for an IP prefix advertisement route reflected by the RR based on the next hop address of that route. If a matching TTE information entry is found, the CPE compares the routing domain, group ID, and transport network in the matching TTE information with the local routing domain, group ID, and transport network.

¡     If the routing domains, group IDs, and transport networks are all the same, the CPE establishes a connection to the TTE and establishes an SDWAN tunnel for the TTE connection.

¡     If the routing domains, group IDs, or transport networks are different, the CPE does not establish a connection to the TTE or establish an SDWAN tunnel.

To secure data transmission, use IPsec to encrypt data packets.

If the RR fully reflects IP prefix advertisement routes, each pair of CPEs in the same routing domain will establish SDWAN tunnels. In such a network, all sites can access one another. Potential data security risks exist. In addition, excessive number of devices in a routing domain brings great pressure on device performance and network bandwidth.

To resolve the above mentioned issues, the network administrator can configure export routing policies to filter IPv4 tunnel-encap-ext routes or SDWAN-encapsulated IP prefix advertisement routes on the RR. With the policies, the RR selectively reflects TTE information and IP prefix advertisement routes only to some of the CPEs. Only CPEs received the TTE information and IP prefix advertisement routes can establish SDWAN tunnels between them. CPEs that do not receive the TTE information or IP prefix advertisement routes cannot establish SDWAN tunnels. In this way, the SDWAN devices can establish SDWAN tunnels on demand. Establishing SDWAN tunnels on demand not only conserves device resources, but also isolates tenants by not establishing tunnels for them.

Route advertisement

As shown in Figure 6, inter-site route advertisement in an SDWAN network includes the following processes:

1.     Each site advertises private routes to its local CPE.

2.     CPEs advertise routes to each other.

3.     Each CPE advertises private routes received from another site to its local site.

Then, the sites have routes to reach one another.

Figure 6 Route advertisement

 

Advertising private routes from local site to local CPE

The local site uses static routing, RIP, RIPng, OSPF, OSPFv3, IS-IS, IPv6 IS-IS, EBGP, or IBGP to advertise the private routes of the local site to the local CPE. The routes are standard IPv4 or IPv6 routes.

Advertising routes from local CPE to remote CPEs

1.     When the local CPE learns private routes from the local site, it stores the routes to the routing table of the corresponding VPN instance.

2.     The CPE adds RD and export targets to the standard IPv4 or IPv6 routes, converts the routes to BGP EVPN IP prefix advertisement routes, and advertises the routes to an RR. The next hop address of the routes is the system IP address of the local CPE.

3.     The RR reflects the received IP prefix advertisement routes to remote CPEs.

4.     When a remote CPE receives the IP prefix advertisement routes reflected by the RR, it matches the export targets in the IP prefix advertisement routes with the import targets of local VPN instances. If a matching VPN instance is found, the remote CPE accepts the IP prefix advertisement routes and adds the routes to the routing table of the VPN instance.

Advertising routes from remote CPEs to remote sites

The supported routing methods are the same as the routing methods for advertising routes from the local site to the local CPE. A remote site can use multiple methods to learn private routes from its CPE. The methods include static routing, RIP, RIPng, OSPF, OSPFv3, IS-IS, IPv6 IS-IS, EBGP, and IBGP.

Traffic forwarding

In an SDWAN network, when a CPE receives a customer packet, it looks up the routing table for the output interface and next hop based on the destination IP address of the packet. The CPE forwards the packet differently according to the output interface.

·     If the output interface is a local interface on the CPE, the CPE directly forwards the packet out of the interface to the next hop according to the forwarding table.

·     If the output interface is an SDWAN tunnel interface, the CPE forwards the packet as follows:

a.     Obtains the TTE ID of the next hop address according to the next hop address in the forwarding table.

b.     Obtains TTE connection information based on the TTE IDs of the local device and next hop.

c.     Adds SDWAN encapsulation to the packet according to the TTE connection information. The SDWAN header includes the VN ID of the VPN instance to which the data packet belongs. Packets of different VPN instances can be recursed to the same SDWAN tunnel. In this case, the VN ID in the SDWAN header is used to differentiate the VPN instances, as shown in Figure 7.

d.     Forwards the packet out of the physical output interface bound to the SDWAN tunnel.

When the remote CPE receives and decapsulates the SDWAN packet, it looks up the routing table of the matching VPN instance according to the VN ID and forwards the packet.

Figure 7 SDWAN traffic forwarding

 

IPsec-protected SDWAN tunnels

To ensure confidentiality and integrity for data transmitted over SDWAN tunnels, the device supports using IPsec to protect SDWAN packets. For this purpose, the following extensions are added to IPsec:

·     SDWAN IPsec profile.

·     Sharing a pair of IPsec SAs among multiple SDWAN tunnels.

For more information about IPsec, see Security Configuration Guide.

SDWAN tunnel establishment with NAT traversal

About this feature

As shown in Figure 8, users at branch sites use private IP addresses so as to conserve IP address resources. After NAT devices translate the private IP addresses to public IP addresses, users at one branch site can access other sites.

IP addresses of the packets sent by a CPE will change after the packets pass through a NAT device. If the CPE cannot obtain its post-NAT public IP address, it cannot establish an SDWAN tunnel with the other CPE or with the RR. To resolve this issue, use one of the following methods:

·     Configure Session Traversal Utilities for NAT (STUN) in the SDWAN network. For more information about STUN, see Layer 3—IP Services Configuration Guide.

·     Specify the post-NAT public IP address and port number for the source IP address and port number of tunneled packets on the CPE. If the RR is behind a NAT device, perform this task on the RR.

STUN uses the client/server model. Typically, use CPEs as STUN clients and use the RR as the STUN server. The clients exchange packets with the server to identify whether NAT devices exist in the SDWAN network. If NAT devices exist, the clients obtain their public IP addresses and port numbers translated after NAT.

After a CPE (STUN client) obtains its public IP address and port number translated after NAT, it uses this public IP address to establish an SDWAN tunnel with the other CPE. If two CPEs cannot establish a direct data channel between them, you must deploy a NAT transfer on the transport network for the CPEs to communicate with each other.

Figure 8 SDWAN tunnel establishment with NAT traversal

 

This following information uses Figure 9 to illustrate the control channel and data channel establishment processes.

Figure 9 SDWAN tunnel establishment with NAT traversal (deployed with a NAT transfer)

 

Control channel establishment

As shown in Figure 9, control channels are established in the following process:

1.     The STUN clients and STUN server exchange STUN protocol packets. Each STUN client obtains the local NAT type, public IP address (public IP address translated after NAT when the STUN client accesses the STUN server), and port number.

2.     The SDWAN clients and SDWAN server establish SSL connections. Then, they exchange TTE information, including the NAT type and public IP addresses obtained through STUN.

3.     When CPE 1, CPE 2, and the NAT transfer receive TTE information from the RR, they compare the routing domain in the TTE information with the routing domain in the local TTE information. If the routing domains are the same one, they establish SDWAN tunnels destined for the RR. The destination IP address of the tunnels is the public IP address in the TTE information of the RR. If the routing domains are different, they do not establish SDWAN tunnels.

4.     When the RR receives TTE information from CPE 1, CPE 2, and the NAT transfer, it compares the routing domain in the TTE information with the routing domain in the local TTE information. If the routing domains are the same one, the RR establishes SDWAN tunnels separately to CPE 1, CPE 2, and the NAT transfer.

If the NAT transfer belongs to the public network, the RR establishes an SDWAN tunnel destined for the public IP address of the NAT transfer. The public IP address is the public IP address in the TTE information of the NAT transfer.

If the NAT type in the TTE information of CPE 1 and CPE 2 is full cone NAT, the RR establishes SDWAN tunnels destined for the public IP addresses of the CPEs. The public IP addresses are the public IP addresses in the TTE information of the CPEs.

If the NAT type in the TTE information of CPE 1 and CPE 2 is port restricted full cone NAT, restricted full cone NAT, or symmetric NAT, the RR cannot access CPE 1 or CPE 2 through the public IP addresses of the CPEs in the TTE information. The RR cannot establish SDWAN tunnels to the CPEs according to the currently obtained TTE information. To establish SDWAN tunnels from the RR to the CPEs:

a.     CPE 1 and CPE 2 periodically send SDWAN control packets to the RR through the SDWAN tunnels established from the CPEs to the RR.

b.     The RR uses the outer source IP addresses of the received SDWAN control packets as the public IP addresses of the CPEs. The RR establishes SDWAN tunnels destined for the public IP addresses.

5.     After SDWAN tunnel establishment, CPE 1, CPE 2, the NAT transfer, and the RR add user network routes (UNRs) destined for the system IP addresses of peer devices.

6.     CPE 1, CPE 2, the NAT transfer, and the RR establish BGP connections (control channels) under the IPv4 tunnel-encap-ext address family based on the system IP addresses.

Data channel establishment

As shown in Figure 9, data channels are established in the following process:

1.     After CPE 1, CPE 2, the NAT transfer, and the RR establish BGP connections (control channels), CPE 1, CPE 2, and the NAT transfer advertise TTE information to the RR through IPv4 tunnel-encap-ext routes. The RR reflects the TTE information to its BGP neighbors.

2.     The CPEs compare their NAT types to determine whether they can establish direct data channels. Table 1 shows the data channel compatibility for different NAT types.

¡     If the CPEs can establish a direct data channel, the establishment procedure is the same as step 4 in "Control channel establishment."

¡     If the CPEs cannot establish a direct data channel, you must deploy a NAT transfer in the network. The CPEs each establish a data channel to the NAT transfer. Inter-CPE data is first forwarded to the NAT transfer through a data channel. Then, the NAT transfer forwards the data to the destination CPE through the other data channel. The procedure for establishing a data channel between a CPE and a NAT transfer is the same as that for establishing an SDWAN tunnel between a CPE and an RR. For more information, see step 4 in "Control channel establishment."

Table 1 Data channel compatibility for different NAT types

CPE 1 NAT type

CPE 2 NAT type

Support for CPE-CPE direct tunnels

NAT transfer required for CPE intercommunication

Non-NAT

Full cone NAT

×

Non-NAT

Port restricted full cone NAT or restricted full cone NAT

×

Non-NAT

Symmetric NAT

×

Non-NAT

Unknown type

×

Non-NAT

Static NAT

×

Full cone NAT

Full cone NAT

×

Full cone NAT

Port restricted full cone NAT or restricted full cone NAT

×

Full cone NAT

Symmetric NAT

×

Full cone NAT

Unknown type

×

Full cone NAT

Static NAT

×

Port restricted full cone NAT or restricted full cone NAT

Port restricted full cone NAT or restricted full cone NAT

×

Port restricted full cone NAT or restricted full cone NAT

Symmetric NAT

×

Port restricted full cone NAT or restricted full cone NAT

Unknown type

×

Port restricted full cone NAT or restricted full cone NAT

Static NAT

×

Symmetric NAT

Symmetric NAT

×

Symmetric NAT

Unknown type

×

Symmetric NAT

Static NAT

×

Unknown type

Unknown type

×

 

 


Configuring SDWAN

SDWAN tasks at a glance

To configure SDWAN, perform the following tasks:

1.     Configuring site and device identification information

a.     Specifying a site for the device

b.     Specifying an ID and system IPv4 address for the device

2.     Configuring an SDWAN client

3.     Configuring an SDWAN server

4.     (Optional.) Configuring IPsec-protected SDWAN tunnels

For more information, see IPsec in Security Configuration Guide.

5.     (Optional.) Configuring SDWAN tunnels with NAT traversal

For more information, see NAT in Layer 3—IP Services Configuration Guide.

6.     Configuring an SDWAN tunnel

7.     Testing TTE connection connectivity

8.     Configuring BGP to advertise IPv4 tunnel-encap-ext routes

9.     Using BGP EVPN IP prefix advertisement routes to advertise routes for a VPN instance

¡     Configuring a CPE

¡     Configuring an RR

¡     (Optional.) Configuring traffic rerouting and load balancing by using the Priority-Color attribute

¡     (Optional.) Configuring next hop recursion based on only the Priority-Color attribute for IP prefix advertisement routes

10.     Configuring SDWAN network intercommunication over an EVPN VXLAN network

11.     Configuring SDWAN network intercommunication with an EVPN L3VPN over SRv6 network

12.     (Optional.) Specifying the post-NAT public IP address and port number for tunneled packets

13.     (Optional.) Simplifying the QoS configuration on a hub-spoke network

Configuring site and device identification information

Specifying a site for the device

About this task

A site ID uniquely identifies a site in an SDWAN network.

You can specify a site name for a site to describe the site location and function to better identify the site in the SDWAN network. A site name does not uniquely identify a site. You can specify the same name for multiple devices.

Restrictions and guidelines

Different site roles have different functions. A site role change will cause SDWAN tunnel flapping and interrupt ongoing services. As a best practice, complete role configuration before the SDWAN network runs services.

Procedure

1.     Enter system view.

system-view

2.     Specify the ID of the site to which the device belongs.

sdwan site-id site-id

By default, no site ID is specified for the device.

3.     Specify the name of the site to which the device belongs.

sdwan site-name site-name

By default, no site name is specified for the device.

4.     Specify the role of the site to which the device belongs.

sdwan site-role { cpe | nat-transfer | rr } *

By default, no site role is specified for the device.

All SDWAN devices at the same site must be assigned the same site role.

Specifying an ID and system IPv4 address for the device

About this task

A device ID uniquely identifies a device at a site.

The device uses the system IPv4 address to set up BGP sessions with other devices. In an RIR scenario, the system IPv4 address is also used as the inner destination IPv4 address of probe packets sent by the NQA client in NQA link connectivity probes. For more information about RIR, see Layer 3—IP Routing Configuration Guide.

Procedure

1.     Enter system view.

system-view

2.     Assign an ID to the device.

sdwan device-id device-id

By default, no ID is assigned to the device.

3.     Specify a system IPv4 address for the device.

sdwan system-ip interface-type interface-number

By default, no system IPv4 address is specified for the device.

The system IPv4 address must be unique in the SDWAN network.

For this command to take effect, you must specify a loopback interface that has an IPv4 address.

Configuring an SDWAN client

About this task

In an SDWAN network, the CPEs, NAT transfer, and RRs exchange TTE information through SSL connections. The CPEs and NAT transfer act as SDWAN clients and the RRs act as SDWAN servers.

Perform this task to specify an SSL client policy on a CPE or NAT transfer for the CPE or NAT transfer to establish SSL connections with RRs. After SSL connection establishment, the CPE or NAT transfer advertises its local TTE information to RRs. The RRs advertise their local TTE information to the CPE or NAT transfer. After TTE information exchange, the CPE or NAT transfer can establish SDWAN tunnels to the RRs.

Restrictions and guidelines

Only one SSL client policy can be applied to an SSL connection. If you execute the sdwan ssl-client-policy command multiple times, the most recent configuration takes effect and it takes effect only on SSL connections established after the modification.

Prerequisites

Complete the SSL client policy settings. For more information about SSL client policies, see SSL configuration in Security Configuration Guide.

Procedure

1.     Enter system view.

system-view

2.     Specify an SDWAN server on the CPE or NAT transfer.

sdwan server system-ip system-ip-address { ip ipv4-address | ipv6 ipv6-address } [ port port-number ] [ vpn-instance vpn-instance-name ]

By default, no SDWAN servers are specified on a CPE or NAT transfer.

3.     Specify an SSL client policy on the CPE or NAT transfer for the CPE or NAT transfer to establish SSL connections with RRs (SDWAN servers).

sdwan ssl-client-policy policy-name

By default, no SSL client policy is specified on a CPE or NAT transfer for the CPE or NAT transfer to establish SSL connections with RRs (SDWAN servers).

Configuring an SDWAN server

About this task

Perform this task to allow an RR to establish SSL connections with CPEs or the NAT transfer and advertise its local TTE information to the CPEs or NAT transfer. The CPEs or NAT transfer also advertise their local TTE information to the RR through the SSL connections. After TTE information exchange, the RR and the CPEs or NAT transfer will establish SDWAN tunnels based on the TTE information.

The device supports the following modes for SSL connection establishment:

·     Simple mode—To use this mode, you do not need to specify an SSL server policy on the RR. The RR uses the self-signed certificate and the default settings of the SSL parameters to establish SSL connections with the CPEs or NAT transfer. The configuration for this mode is simple, but this mode is less secure than the secure mode.

·     Secure mode—To use this mode, you must specify an SSL server policy on the RR and configure PKI domain settings. The configuration for this mode is complex, but this mode is more secure than the simple mode.

Restrictions and guidelines

Only one SSL server policy can be applied to an SSL connection. If you execute the sdwan ssl-server-policy command multiple times, the most recent configuration cannot take effect automatically. For the configuration to take effect, you must execute the undo sdwan server enable command and then the sdwan server enable command to re-enable the SDWAN server.

Prerequisites

To use the secure mode, first complete the SSL server policy settings. For more information about SSL server policies, see SSL configuration in Security Configuration Guide.

Procedure

1.     Enter system view.

system-view

2.     Enable SDWAN server on the RR.

sdwan server enable

By default, SDWAN server is disabled on an RR.

3.     Specify a TCP port number for the SDWAN server on the RR.

sdwan server port port-number

By default, the TCP port number of the SDWAN server is 2004.

4.     (Optional.) Specify an SSL server policy on the RR for the RR to establish SSL connections with CPEs or the NAT transfer (SDWAN clients).

sdwan ssl-server-policy policy-name

By default, no SSL server policy is specified on an RR for the RR to establish SSL connections with CPEs or the NAT transfer.

Configuring an SDWAN tunnel

About this task

After one CPE exchanges TTE information with another CPE or an RR, it compares the local TTE information with the received TTE information to determine whether to establish an SDWAN tunnel with the latter device.

·     If they have the same routing domain, group ID, and transport network, they establish an SDWAN tunnel between them.

·     If they have different routing domains, group IDs, or transport networks, they cannot establish an SDWAN tunnel.

Restrictions and guidelines

For information about tunnel configuration and tunnel interface commands, see tunneling in Layer 3—IP Services Configuration Guide.

You can specify a source UDP port number for SDWAN tunneled packets both in system view and in tunnel interface view.

·     The source UDP port number specified in system view applies to all SDWAN tunnel interfaces.

·     The source UDP port number specified in tunnel interface view applies only to a tunnel interface.

For a tunnel interface, the source UDP port number specified in tunnel interface view takes precedence over that specified in system view. If no source UDP port number is specified in tunnel interface view, the source UDP port number specified in system view applies.

Procedure

1.     Enter system view.

system-view

2.     (Optional.) Specify a global source UDP port number for SDWAN tunneled packets.

sdwan encapsulation global-udp-port port-number

By default, the global source UDP port number for SDWAN tunneled packets is 4799.

3.     Create an SDWAN tunnel interface in UDP encapsulation mode and enter tunnel interface view.

interface tunnel tunnel-number mode sdwan udp [ ipv6 ]

For packet tunneling to succeed, the two ends of a tunnel must use the same tunnel mode.

4.     Specify a physical output interface for SDWAN tunneled packets.

tunnel out-interface out-interface-type out-interface-number

By default, no output interface is specified for tunneled packets. If ECMP routes exist, the device randomly selects an output interface to forward tunneled packets.

5.     Assign an interface ID to the SDWAN tunnel interface.

sdwan interface-id interface-id

By default, no interface ID is assigned to an SDWAN tunnel interface.

6.     (Optional.) Specify a source UDP port number for SDWAN tunneled packets.

sdwan encapsulation udp-port port-number

By default, the source UDP port number of SDWAN tunneled packets is the global source UDP port number for SDWAN tunneled packets.

7.     Specify a routing domain for the SDWAN tunnel.

sdwan routing-domain domain-name id domain-id

By default, no routing domain is specified for an SDWAN tunnel.

8.     (Optional.) Specify a group ID for the SDWAN tunnel.

sdwan group-id group-id

By default, no group ID is specified for an SDWAN tunnel.

9.     Specify a transport network for the SDWAN tunnel.

sdwan transport-network network-name id network-id [ restrict ]

By default, no transport network is specified for an SDWAN tunnel.

10.     Specify a source IP address for the SDWAN tunnel. Choose one of the following options:

¡     Specify a source IP address for the tunnel.

source { ipv4-address | ipv6-address }

The specified IP address is used as the source address of SDWAN tunneled packets.

¡     Specify a source interface to provide source IP address for the tunnel.

source interface-type interface-number

The IP address of the specified interface is used as the source IP address of SDWAN tunneled packets.

By default, no source IP address is configured for an SDWAN tunnel.

Testing TTE connection connectivity

About testing TTE connection connectivity

Use BFD or keepalive to test the connectivity of TTE connections on an SDWAN tunnel. When a TTE connection fails, the device can quickly detect the failure and handle the failure issue accordingly, for example, switch the traffic on the TTE connection to other TTE connections.

When BFD is used, the local device periodically sends BFD control packets to the remote device over all TTE connections on an SDWAN tunnel. If the device does not receive any BFD control packets from the remote device over a TTE connection within the detection period, it determines that the TTE connection is unreachable to the remote device. For more information about BFD, see High Availability Configuration Guide.

When keepalive is used, the local device sends keepalive requests to the remote device over all TTE connections on an SDWAN tunnel at the specified keepalive interval.

·     If the local device receives a keepalive response from the remote device over a TTE connection within a keepalive interval, it determines that the TTE connection is reachable to the remote device.

·     If the local device cannot receive a keepalive response from the remote device on a TTE connection within a keepalive interval, it resends a keepalive request. If the local device still cannot receive a response within the keepalive interval multiplied by the maximum keepalive attempts, it determines that the TTE connection is unreachable to the remote device. The device no longer forwards packets through the TTE connection.

Restrictions and guidelines for testing TTE connection connectivity

If BFD is used to test the connectivity of TTE connections on an SDWAN tunnel, you must use the sdwan bfd enable command at both ends of the SDWAN tunnel.

If the sdwan bfd enable command is used on an SDWAN tunnel interface, the device determines the connectivity of TTE connections on that SDWAN tunnel based on the BFD detection result. If this command is not used on an SDWAN tunnel interface, the device determines the connectivity of TTE connections on that SDWAN tunnel based on the keepalive result.

Using BFD to test TTE connection connectivity

1.     Enter system view.

system-view

2.     Create an SDWAN tunnel interface in UDP encapsulation mode and enter tunnel interface view.

interface tunnel tunnel-number [ mode sdwan udp [ ipv6 ] ]

3.     Configure the device to use BFD to test the connectivity of TTE connections on the SDWAN tunnel.

sdwan bfd enable [ template template-name ]

By default, BFD is not used to test the connectivity of TTE connections on an SDWAN tunnel. The device uses keepalive packets to test the connectivity of TTE connections on an SDWAN tunnel.

Using keepalive to test TTE connection connectivity

1.     Enter system view.

system-view

2.     Create an SDWAN tunnel interface in UDP encapsulation mode and enter tunnel interface view.

interface tunnel tunnel-number [ mode sdwan udp [ ipv6 ] ]

3.     Configure keepalive for the SDWAN tunnel.

sdwan keepalive interval interval [ retry retries ]

By default, the keepalive interval is 10 seconds and the maximum number of keepalive attempts is 3.

In an RIR-SDWAN network, set the keepalive interval within the range of 1 to 5 seconds as a best practice.

Configuring BGP to advertise IPv4 tunnel-encap-ext routes

Restrictions and guidelines for BGP IPv4 tunnel-encap-ext route advertisement

For more information about BGP commands in this task, see Layer 3—IP Routing Command Reference.

Enabling BGP to advertise BGP IPv4 tunnel-encap-ext routes

1.     Enter system view.

system-view

2.     Enable a BGP instance and enter BGP instance view.

bgp as-number [ instance instance-name ]

By default, BGP is disabled and no BGP instances exist.

3.     Specify a CPE or RR as a peer.

peer { group-name | ipv4-address [ mask-length ] } as-number as-number

4.     Create the BGP IPv4 tunnel-encap-ext address family and enter BGP IPv4 tunnel-encap-ext address family view.

address-family ipv4 tnl-encap-ext

5.     Enable BGP to exchange BGP IPv4 tunnel-encap-ext routes with a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } enable

By default, BGP does not exchange BGP IPv4 tunnel-encap-ext routes with peers or peer groups.

Configuring BGP IPv4 tunnel-encap-ext route settings

Controlling BGP IPv4 tunnel-encap-ext route advertisement and reception

1.     Enter system view.

system-view

2.     Enter BGP instance view

bgp as-number [ instance instance-name ]

3.     Enter BGP IPv4 tunnel-encap-ext address family view.

address-family ipv4 tnl-encap-ext

4.     Apply a routing policy to routes received from or advertised to a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } route-policy route-policy-name { export | import }

By default, no routing policies are applied to routes received from or advertised to peers or peer groups.

5.     Set the maximum number of routes that can be received from a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } route-limit prefix-number [ { alert-only | discard | reconnect reconnect-time } | percentage-value ] *

By default, the number of routes that can be received from a peer or peer group is not limited.

Configuring BGP IPv4 tunnel-encap-ext route attributes

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP IPv4 tunnel-encap-ext address family view.

address-family ipv4 tnl-encap-ext

4.     Set the local router as the next hop for routes advertised to a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } next-hop-local

The default settings are as follows:

¡     BGP sets the local router as the next hop for all routes advertised to an EBGP peer or peer group.

¡     BGP does not set the local router as the next hop for EBGP routes advertised to an IBGP peer or peer group.

5.     Set a preferred value for routes received from a peer or peer group

peer { group-name | ipv4-address [ mask-length ] } preferred-value value

By default, the preferred value is 0 for routes received from a peer or peer group.

6.     Permit the local AS number to appear in routes from a peer or peer group and set the number of appearances.

peer { group-name | ipv4-address [ mask-length ] } allow-as-loop [ number ]

By default, the local AS number is not allowed in routes from peers.

Configuring BGP route reflection

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP IPv4 tunnel-encap-ext address family view.

address-family ipv4 tnl-encap-ext

4.     Configure the device as an RR and specify a CPE or NAT device as its client.

peer { group-name | ipv4-address [ mask-length ] } reflect-client

By default, no RR or clients are configured.

5.     (Optional.) Enable BGP IPv4 tunnel-encap-ext route reflection between clients.

reflect between-clients

By default, BGP IPv4 tunnel-encap-ext route reflection between clients is enabled.

6.     (Optional.) Configure the cluster ID of the RR.

reflector cluster-id { cluster-id | ipv4-address }

By default, an RR uses its own router ID as the cluster ID.

Configuring community attributes

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP IPv4 tunnel-encap-ext address family view.

address-family ipv4 tnl-encap-ext

4.     Advertise the COMMUNITY attribute to a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } advertise-community

By default, the device does not advertise the COMMUNITY attribute to peers or peer groups.

5.     Advertise the extended community attribute to a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] } advertise-ext-community

By default, no extended community attribute is advertised to any peers or peer groups.

Maintaining BGP sessions

Perform the following tasks in user view:

·     Reset BGP sessions of the BGP IPv4 tunnel-encap-ext address family.

reset bgp [ instance instance-name ] { as-number | ipv4-address [ mask-length ] | all |external | group group-name | internal } ipv4 tnl-encap-ext

·     Soft-reset BGP sessions of the BGP IPv4 tunnel-encap-ext address family.

refresh bgp [ instance instance-name ] { ipv4-address [ mask-length ] | all | external | group group-name | internal } { export | import } ipv4 tnl-encap-ext

Using BGP EVPN IP prefix advertisement routes to advertise routes for a VPN instance

Configuring a CPE

About this task

In an SDWAN network, CPEs use BGP EVPN IP prefix advertisement routes to advertise site VPN routes. You must configure the CPEs to advertise BGP EVPN routes in SDWAN encapsulation.

If multiple VPN instances are deployed in the SDWAN network, you must perform the following tasks on the CPEs for each VPN instance:

·     In VPN instance IPv4 or IPv6 address family view, enable EVPN to advertise SDWAN routes. This feature advertises VPN routes in the routing table of the VPN instance as BGP EVPN IP prefix advertisement routes in SDWAN encapsulation.

·     In VPN instance view, specify a VN ID for the VPN instance. When VPN routes are advertised as IP prefix advertisement routes, the routes include the VN ID of the VPN instance. The VN ID is used to differentiate packets of different VPN instances.

·     In BGP EVPN address family view, configure the device to advertise EVPN routes in SDWAN encapsulation to an RR.

Restrictions and guidelines

On a CPE, use the evpn sdwan routing-enable command in conjunction with the peer advertise encap-type sdwan command for a VPN instance. If you do not use both of the commands, the CPE cannot advertise the routes of the VPN instance to an RR.

Procedure

1.     Enter system view.

system-view

2.     Enter VPN instance view.

ip vpn-instance vpn-instance-name

3.     Specify a VN ID for the VPN instance.

sdwan vn-id vn-id

By default, the VN ID of a VPN instance is 0.

4.     Enter VPN instance IPv4 address family view or VPN instance IPv6 address family view.

¡     Enter VPN instance IPv4 address family view.

address-family ipv4

¡     Enter VPN instance IPv6 address family view.

address-family ipv6

5.     Enable EVPN to advertise SDWAN routes.

evpn sdwan routing-enable

By default, EVPN cannot advertise SDWAN routes.

6.     Return to system view.

quit

quit

7.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

8.     Enter BGP EVPN address family view.

address-family l2vpn evpn

9.     Configure the device to advertise BGP EVPN routes in SDWAN encapsulation to an RR.

peer { group name | ipv4-address [ mask-length ] } advertise encap-type sdwan

By default, the device does not advertise BGP EVPN routes in SDWAN encapsulation to an RR.

Configuring an RR

About this task

In an SDWAN network, an RR reflects site VPN routes among CPEs. You must enable the RR to advertise BGP EVPN routes in SDWAN encapsulation to the CPEs.

Procedure

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP EVPN address family view.

address-family l2vpn evpn

4.     Configure BGP route reflection:

a.     Configure the device as an RR and specify the CPEs as its clients.

peer { group-name | ipv4-address [ mask-length ] } reflect-client

By default, no RR or clients are configured.

b.     (Optional.) Enable BGP EVPN route reflection between clients.

reflect between-clients

By default, BGP EVPN route reflection between clients is enabled.

c.     (Optional.) Configure the cluster ID of the RR.

reflector cluster-id { cluster-id | ipv4-address }

By default, an RR uses its own router ID as the cluster ID.

d.     (Optional.) Create a reflection policy for the RR to filter reflected BGP EVPN routes.

rr-filter ext-comm-list-number

By default, an RR does not filter reflected BGP EVPN routes.

e.     (Optional.) Enable the RR to change the attributes of routes to be reflected.

reflect change-path-attribute

By default, an RR cannot change the attributes of routes to be reflected.

5.     Configure the device to advertise BGP EVPN routes in SDWAN encapsulation to a CPE.

peer { group name | ipv4-address [ mask-length ] } advertise encap-type sdwan

By default, the device does not advertise BGP EVPN routes in SDWAN encapsulation to a CPE.

Configuring traffic rerouting and load balancing by using the Priority-Color attribute

About the Priority-Color attribute

The Priority-Color attribute is a BGP extended community attribute. It is used only in SDWAN-encapsulated EVPN routes. In an SDWAN network, you can add backup routes for an EVPN route by adding the Priority-Color extended community attribute. Thus, when the data channel fails, traffic can bypass the data channel.

The Priority-Color extended community attribute is the format of Priority:Site ID:Device ID or Priority:Site ID. The value of priority determines the priority of the backup path, the smaller the value, the higher the priority. The site ID and device ID identify one or multiple bypass sites (SDWAN devices).

Working mechanism of the Priority-Color attribute

If an IP prefix advertisement route does not contain a Priority-Color attribute, only one route can be added to the BGP-VPN instance routing table or the VPN instance IP routing table. The route's next hop is the next hop of the IP prefix advertisement route. If the next hop is not reachable, the IP prefix advertisement route fails, and thus traffic forwarding to the IP prefix fails.

If an IP prefix advertisement route contains Priority-Color attributes, the device can add one primary route and multiple backup routes to the BGP-VPN instance routing table. If the Priority-Color attributes contain device IDs, the device generates a backup route based on each Priority-Color attribute. If the Priority-Color attributes do not contain device IDs, the device generates a backup route based on each SDWAN device in the site identified by the site ID in each Priority-Color attribute. The primary and backup routes use the same prefix. When a backup route is added to the VPN instance IP routing table, the next hop is the system IP of the device identified by the site ID and device ID in the Priority-Color attribute.

When the primary route is reachable, the primary route is added to the VPN instance IP routing table. When the primary route fails, the optimal backup route is added to the VPN instance IP routing table. The optimal backup route is determined as follows:

1.     The backup route with the highest priority is the optimal backup route. The priority of a backup route is determined by the priority value in the Priority-Color attribute that generated the backup route, the smaller the priority value, the higher the priority.

2.     If multiple backup routes have the same priority, the backup route with the lowest next hop IP address is the optimal route.

In BGP-VPN IPv4 or IPv6 unicast address family, if BGP load balancing is enabled by using the balance command, all optimal backup routes with the same priority are added to the VPN instance IP routing table for load balancing, regardless of the primary route's state.

In BGP load balancing, the priority value of the primary route is regarded as 0. The primary route and the backup routes with priority value of 0 are all added to the VPN instance IP routing table for load balancing. When the primary route fails, the primary route does not participate in load balancing any longer. If no backup routes with priority value of 0 exist, only the primary route is added to the VPN instance IP routing table and no load balancing can be performed. After the primary route fails, all backup routes with the same, smallest priority value are added to the VPN instance IP routing table for load balancing.

For more information about BGP load balancing, see BGP configuration in Layer 3—IP Routing Configuration Guide.

Priority-Color attribute application

In an SDWAN network as shown in Figure 10, an RR reflects BGP routes among CPE 1, CPE 2, and CPE 3. SDWAN tunnels are established between CPEs.

Figure 10 Priority-Color attribute application diagram

 

CPE 2 advertises the IP prefix routes of the local site to the RR. When reflecting the routes to CPE 1, the RR can use a routing policy to add Priority-Color attributes to EVPN routes. The site ID and device ID in the Priority-Color attribute are those of CPE 3 (the bypass site). After CPE 1 receives these IP prefix advertisement routes, it adds the routes to the BGP-VPN instance routing table and generates a primary route and a backup route for each of the IP prefixes:

·     The primary route recurses to the SDWAN tunnel between CPE 1 and CPE 2.

·     The backup route recurses to the SDWAN tunnel between CPE 1 and CPE 3.

When the link between CPE 1 and CPE 2 is normal, CPE 1 adds the primary route to the VPN instance IP routing table. After CPE 1 receives the traffic destined for the site of CPE 2, CPE 1 recurses the traffic to the SDWAN tunnel between CPE 1 and CPE 2.

When the link between CPE 1 and CPE 2 fails, the primary route fails as a result. CPE 1 adds the backup route to the VPN instance IP routing table. After CPE 1 receives the traffic destined for the site of CPE 2, CPE 1 recurses the traffic to the SDWAN tunnel between CPE 1 and CPE 3. CPE 3 then forwards the traffic to CPE 2. In this way, the traffic bypasses the failed link.

To use the links attached to CPE 3 to forward the traffic between CPE 1 and CPE 2 for load balancing, you can perform the following tasks:

·     On the RR, set the priority value of the Priority-Color attribute to 0.

·     On CPE 1, set the number of BGP routes for load balancing to a number equal to or greater than 2.

When CPE 1 receives traffic destined for the site attached to CPE 2, it forwards the traffic to both the SDWAN tunnels connected to CPE 2 and CPE 3 for load balancing.

Restrictions and guidelines

To use the Priority-Color extended community attribute for load balancing, you must use the balance command in BGP-VPN IPv4 unicast address family view or BGP-VPN IPv6 unicast address family view on CPEs. For more information about the balance command, see BGP commands in Layer 3—IP Routing Command Reference.

Procedure (RR)

1.     Enter system view.

system-view

2.     Create a routing policy and a node and enter routing policy node view.

route-policy route-policy-name { deny | permit } node node-number

3.     (Optional.) Configure if-match clauses.

For more information about if-match clauses, see routing policy configuration in Layer 3—IP Routing Configuration Guide.

4.     Configure Priority-Color extended community attributes for BGP routes.

apply extcommunity priority-color priority-color&<1-32> [ additive ]

By default, no Priority-Color extended community attributes are configured for BGP routes.

5.     Return to system view.

quit

6.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

7.     Enter BGP EVPN address family view.

address-family l2vpn evpn

8.     Apply the routing policy to add the Priority-Color extended community attributes to the EVPN routes for a peer or peer group.

peer { group-name | ipv4-address [ mask-length ] | ipv6-address [ prefix-length ] } route-policy route-policy-name { export | import }

By default, no routing policy is applied to a peer or peer group.

Configuring next hop recursion based on only the Priority-Color attribute for IP prefix advertisement routes

About this task

By default, the device performs next hop recursion for IP prefix advertisement routes based on both the NEXT_HOP and Priority-Color attributes after it receives these routes if these routes have the Priority-Color attribute. The next hop recursion procedure is as follows for an IP prefix advertisement route:

·     Typically, the address in the NEXT_HOP attribute is the system IP address of a remote CPE. The device looks up for a matching TTE connection based on the address. The SDWAN tunnel interface of the matching TTE connection is the next hop output interface obtained through next hop recursion for the IP prefix advertisement route.

·     Each Priority-Color attribute includes the site ID information of a remote CPE or the site ID and device ID information of a remote CPE. The device looks up for matching TTE connections based on the information. The SDWAN tunnel interfaces of the matching TTE connections are the next hop output interfaces obtained through next hop recursion for the IP prefix advertisement route based on the Priority-Color attributes.

When the device receives packets that match an IP prefix advertisement route, it forwards the packets as follows:

·     If BGP load balancing is not configured, the device forwards the packets over an SDWAN tunnel obtained through next hop recursion based on the NEXT_HOP attribute of the IP prefix advertisement route. When that SDWAN tunnel is not available, the device uses the SDWAN tunnel obtained through next hop recursion based on the Priority-Color attribute to forward the packets.

·     If BGP load balancing is configured, the device can forward the packets over the following SDWAN tunnels for load balancing:

¡     The SDWAN tunnel obtained through next hop recursion based on the NEXT_HOP attribute of the IP prefix advertisement route.

¡     The SDWAN tunnels obtained through next hop recursion based on the Priority-Color attributes of the IP prefix advertisement route.

The Priority-Color attribute is easy to configure, and the device can flexibly control the SDWAN forwarding path through this attribute. To perform next hop recursion for IP prefix advertisement routes that have the Priority-Color attribute based on only the Priority-Color attribute, use the feature in this section. With this feature, when the device receives packets that match an IP prefix advertisement route, it forwards the packets to an SDWAN tunnel obtained through next hop recursion based on only the Priority-Color attribute. In this way, the forwarding path is not restricted by the NEXT_HOP attribute of the IP prefix advertisement route. To adjust the forwarding path, you only need to modify the Priority-Color attribute.

Restrictions and guidelines

This feature takes effect only on SDWAN-encapsulated IP prefix advertisement routes that have the Priority-Color attribute.

Procedure

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP EVPN address family view.

address-family l2vpn evpn

4.     Configure next hop recursion based on only the Priority-Color attribute for SDWAN-encapsulated IP prefix advertisement routes.

evpn-sdwan nexthop-recursive priority-color-only

By default, the device performs next hop recursion first based on the NEXT_HOP attribute and then the Priority-Color attribute for an IP prefix advertisement route that has the Priority-Color attribute after it receives that route.

Configuring SDWAN network intercommunication over an EVPN VXLAN network

About this task

As shown in Figure 11, CPE 1 and CPE 2 belong to different SDWAN networks that are connected over an EVPN VXLAN network. ASBR 1 and ASBR 2 belong to the SDWAN networks and EVPN VXLAN network. Tenants at site 1 and site 2 communicate with one another over the EVPN VXLAN network.

Figure 11 Network diagram for SDWAN network intercommunication over an EVPN VXLAN network

 

For SDWAN networks to communicate with each other over an EVPN VXLAN network, use the peer re-originated command on the edge devices of the SDWAN networks, in this example, on ASBR 1 and ASBR 2. When this command is used, ASBR 1 and ASBR 2 process IP prefix advertisement routes as follows:

·     When ASBR 1 or ASBR 2 receives an SDWAN-encapsulated IP prefix advertisement route, it performs the following operations to ensure that the route can be received and forwarded by a peer in the EVPN VXLAN network:

a.     Replaces the next hop address of the route with the local address.

b.     Converts the route into a VXLAN-encapsulated IP prefix advertisement route.

·     When ASBR 1 or ASBR 2 receives a VXLAN-encapsulated IP prefix advertisement route, it performs the following operations to ensure that the route can be received and forwarded by a peer in the SDWAN network:

a.     Replaces the next hop address of the route with the local address.

b.     Converts the route into an SDWAN-encapsulated IP prefix advertisement route.

Private routes at one site attached to an SDWAN network can reach the remote site attached to the other SDWAN network over the SDWAN networks and EVPN VXLAN network, so that tenants at the sites can communicate with one another.

Restrictions and guidelines

The device advertises only reoriginated BGP routes received from a peer specified by using the peer re-originated command to other peers. As a result, when the device receives VXLAN-encapsulated IP prefix advertisement routes from the peer, it cannot advertise the routes to other peers in the EVPN VXLAN network. For the device to advertise both original and reoriginated BGP routes to peers or peer groups, execute the peer advertise original-route command on the device. For more information about the peer advertise original-route command, see SRv6 VPN commands in Segment Routing Command Reference.

Prerequisites

Complete EVPN VXLAN settings on the ASBRs to ensure that the ASBRs can exchange VXLAN-encapsulated BGP EVPN routes with BGP peers and perform Layer 2 and Layer 3 forwarding for VXLAN traffic. For more information about EVPN VXLAN configuration, see EVPN Configuration Guide.

Complete SDWAN settings on the ASBRs to ensure that the ASBRs can perform the following operations:

·     Establish SDWAN tunnels with the RRs and CPEs in the same routing domain.

·     Exchange BGP IPv4 tunnel-encap-ext routes with other SDWAN devices.

·     Use SDWAN-encapsulated IP prefix advertisement routes to advertise VPN routes of the local site.

Procedure (ASBR)

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP EVPN address family view.

address-family l2vpn evpn

4.     Replace the L3 VXLAN ID, RD, and route targets (optional) of IP prefix advertisement routes received from an RR or EVPN VXLAN peer.

peer { group-name | ipv4-address [ mask-length ] } re-originated [ ip-prefix ] [ replace-rt ]

By default, the device does not modify the BGP EVPN routes that are received from peers or peer groups.

For more information about this command, see EVPN commands in EVPN Command Reference.

Configuring SDWAN network intercommunication with an EVPN L3VPN over SRv6 network

About this task

As shown in Figure 12, site 1 and site 2 must traverse an SDWAN network and an EVPN L3VPN over SRv6 network to communicate with each other. The CPE belongs to the SDWAN network. The ASBR belongs to both the SDWAN network and the EVPN L3VPN over SRv6 network. The PE belongs to the EVPN L3VPN over SRv6 network.

Figure 12 SDWAN network intercommunication with an EVPN L3VPN over SRv6 network

 

For the SDWAN network to communicate with the EVPN L3VPN over SRv6 network, use the peer re-originated command on the ASBR, the edge device of the SDWAN network. When this command is used, the ASBR processes IP prefix advertisement routes as follows:

·     When the ASBR receives an SDWAN-encapsulated IP prefix advertisement route, it performs the following operations to ensure that the route can be received and forwarded by the PE in the EVPN L3VPN over SRv6 network:

a.     Replaces the next hop address of the route with the local address.

b.     Converts the route into an SRv6-encapsulated IP prefix advertisement route.

·     When the ASBR receives an SRv6-encapsulated IP prefix advertisement route, it performs the following operations to ensure that the route can be received and forwarded by the CPE in the SDWAN network:

a.     Replaces the next hop address of the route with the local address.

b.     Converts the route into an SDWAN-encapsulated IP prefix advertisement route.

Private routes at site 1 can reach site 2 over the SDWAN network and the EVPN L3VPN over SRv6 network, so that tenants at the sites can communicate with one another.

Restrictions and guidelines

The device advertises only reoriginated BGP routes received from a peer specified by using the peer re-originated command to other peers. For the device to also advertise original BGP routes to peers or peer groups, execute the peer advertise original-route command on the device. For more information about the peer advertise original-route command, see SRv6 VPN commands in Segment Routing Command Reference.

On the ASBR, make sure the device learns the received SRv6-encapsulated and SDWAN-encapsulated IP prefix advertisement routes to the routing table of the same VPN instance.

For tenants to communicate with one another across an SDWAN network and an EVPN L3VPN over SRv6 network, make sure the tenants belong to the same VPN instance.

Prerequisites

Complete EVPN L3VPN over SRv6 settings on the ASBR to ensure that the ASBR can exchange SRv6-encapsulated BGP EVPN routes with the PE. For more information about EVPN L3VPN over SRv6 configuration, see Segment Routing Configuration Guide.

Complete SDWAN settings on the ASBR to ensure that the ASBR can perform the following operations:

·     Establishes SDWAN tunnels with the RRs and CPEs in the same routing domain.

·     Exchanges BGP IPv4 tunnel-encap-ext routes.

·     Uses SDWAN-encapsulated IP prefix advertisement routes to advertise VPN routes of the local site.

Procedure (ASBR)

1.     Enter system view.

system-view

2.     Enter BGP instance view.

bgp as-number [ instance instance-name ]

3.     Enter BGP EVPN address family view.

address-family l2vpn evpn

4.     Modify the encapsulation type and route information of the IP prefix advertisement routes received from a CPE or PE.

peer { group-name | ipv4-address [ mask-length ] } re-originated [ ip-prefix ] [ replace-rt ]

By default, the device does not modify the BGP EVPN routes that are received from peers or peer groups.

For more information about this command, see EVPN commands in EVPN Command Reference.

Specifying the post-NAT public IP address and port number for tunneled packets

About this task

Use this feature on a CPE or RR if the CPE or RR is behind a NAT device and the NAT device is configured with static NAT. With this feature, you do not need to configure STUN to detect the post-NAT public IP address and port number for the source IP address and port number of tunneled packets on the CPE or RR.

Restrictions and guidelines

Using this feature on a tunnel interface causes the device to disconnect all existing TTE connections established to the tunnel interface. The device will reestablish these TTE connections based on the specified post-NAT public IP address and port number.

As a best practice, do not configure this feature if the public network cannot actively access the internal network.

Procedure

1.     Enter system view.

system-view

2.     Create an IPv4 SDWAN tunnel interface in UDP encapsulation mode and enter tunnel interface view.

interface tunnel tunnel-number mode sdwan udp

For packet tunneling to succeed, the two ends of a tunnel must use the same tunnel mode.

3.     Specify the post-NAT public IP address and port number for the source IP address and port number of tunneled packets.

sdwan nat-global-ip global-address global-port global-port

By default, the post-NAT public IP address and port number are not specified for the source IP address and port number of tunneled packets.

Simplifying the QoS configuration on a hub-spoke network

About this task

In the SDWAN scenario, a large number of spoke devices exist in a hub-spoke network. To configure a QoS policy for each hub-spoke SDWAN tunnel, you need to manually configure and apply a QoS policy on the hub device in the central site each time a spoke device is added for a branch site. If the QoS policies for the SDWAN tunnels from the central site to the branch sites are the same except for the rate limiting settings, you can simplify QoS policy configuration on the hub device by executing this task on the spoke devices.

After you execute this task on a spoke device, the spoke device will send a QoS TTE route to the peer hub device during hub-spoke data channel establishment. This route carries the user profile and traffic rate limit information specifies in this task. Assume you specify a user profile on the spoke. The specified user profile will be advertised by BGP to the peer hub device along with the TTE information. The peer hub device will apply the local user profile that has the same name as the advertised user profile to the outbound direction of the hub-spoke SDWAN tunnel. If the user profile is not configured on the peer hub device or the user profile does not contain any configuration, the SDWAN tunnel will not be affected.

Restrictions and guidelines

If the user profile applied to the hub device has inbound QoS settings, those settings do not take effect on the SDWAN tunnel from the hub to the spoke. For example, the qos car inbound command configured in user profile view does not take effect on the hub-spoke SDWAN tunnel.

On the hub device, execute the qos lr outbound command with the peer-advertise-bandwidth keyword specified in the view of the user profile applied to the SDWAN tunnel. This configuration enables the hub device to accept the rate limit settings advertised from the peer spoke device. If you do not do so, the traffic rate limit specified by the qos bandwidth downstream command on the spoke device does not take effect on the hub device. For more information about the qos lr outbound command in user profile view, see QoS commands in ACL and QoS Command Reference.

Prerequisites

Before you perform this task, complete the following tasks on the hub device:

·     Create the specified user profile.

·     Configure QoS policy, traffic policing, traffic shaping, traffic rate limiting, or priority queue settings for the user profile as needed.

For more information about user profiles, see Security Configuration Guide.

Procedure

1.     Enter system view.

system-view

2.     Create a UDP-encapsulated SDWAN tunnel and enter tunnel interface view.

interface tunnel tunnel-number mode sdwan udp [ ipv6 ]

Configure the same tunnel mode at both sides of a tunnel. Otherwise, the tunnel cannot transmit packets correctly.

3.     Specify the user profile to be applied to the outbound direction of the peer tunnel interface.

qos apply user-profile profile-name downstream

By default, the user profile to be applied to the outbound direction of the peer tunnel interface is not specified. For more information about this command, see QoS commands in ACL and QoS Command Reference.

4.     (Optional.) Set the traffic rate limit to be applied to the outbound direction of the peer tunnel interface.

qos bandwidth downstream bandwidth-value

By default, the traffic rate limit to be applied to the outbound direction of the peer tunnel interface is not set. For more information about this command, see QoS commands in ACL and QoS Command Reference.

Display and maintenance commands for SDWAN

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display BGP IPv4 tunnel-encap-ext routes.

display bgp [ instance instance-name ] routing-table ipv4 tnl-encap-ext [ peer ipv4-address { advertised-routes | received-routes } [ statistics ] | [ route-type { tte | tte-ipv6 | saas-path } ] [ { tnlencap-route route-length | tnlencap-prefix } [ advertise-info ] ] | statistics ]

Display IPv4 or IPv6 unicast routes generated based on Priority-Color extended community attributes in the specified BGP-VPN instance routing table.

display bgp [ instance instance-name ] routing-table { ipv4 | ipv6 } [ unicast ] vpn-instance vpn-instance-name system-ip

Display IPv4 or IPv6 unicast routes generated based on Priority-Color extended community attributes in all BGP-VPN instance routing tables.

display bgp [ instance instance-name ] routing-table { vpnv4 | vpnv6 } system-ip

Display SDWAN server status on an RR.

display sdwan server status

Display SSL connection status on a CPE.

display sdwan peer-connection status [ system-ip system-ip-address ] [ ipv4 | ipv6 ]

Display TTE information for sites.

display sdwan site-tte [ site-id site-id ] [ verbose ] [ ipv4 | ipv6 ]

Display TTE connection information on the device.

display sdwan tte connection [ site-id site-id | system-ip system-ip-address ] [ reachable | unreachable ] [ ipv4 | ipv6 ]

Clear TTE connection information.

reset sdwan tte connection [ interface interface-type interface-number [ site-id site-id device-id device-id interface-id interface-id ] ]

 

SDWAN configuration examples

Example: Establishing SDWAN tunnels with NAT traversal

Network configuration

As shown in Figure 13:

·     The sites are attached to the CPEs to access the SDWAN network. The sites can communicate with each other over the SDWAN network.

·     Site 1 and site 4 belong to VPN instance vpn1, and site 2 and site 3 belong to VPN instance vpn2. Users in different VPN instances are isolated.

·     Deploy STUN between the CPEs and RR to detect whether NAT devices exist between them and identify the NAT type. The CPEs act as STUN clients and the RR acts as the STUN server.

·     The SDWAN clients and SDWAN server establish SSL connections to complete control channel establishment.

·     The RR reflects TTE information and private routes received from the control channels among the CPEs for the CPEs to establish data channels and advertise private routes.

·     Configure IPsec to protect traffic transmitted over SDWAN tunnels.

Figure 13 Network diagram

 

Device

Interface

IP address

Device

Interface

IP address

CE 1

GE1/0/1

10.1.1.1/24

CE 2

GE1/0/2

10.1.2.1/24

CE 3

GE1/0/1

10.1.3.1/24

CE 4

GE1/0/2

10.1.4.1/24

CPE 1

Loop0

1.1.1.10/32

CPE 2

Loop0

1.1.1.30/32

 

GE1/0/1

10.1.1.2/24

 

GE1/0/1

10.1.3.2/24

 

GE1/0/2

10.1.2.2/24

 

GE1/0/2

10.1.4.2/24

 

GE1/0/3

11.1.1.1/24

 

GE1/0/3

14.1.1.1/24

 

GE1/0/4

12.1.1.1/24

 

GE1/0/4

13.1.1.1/24

STUN server

Loop0

6.6.6.1/32

RR

Loop0

1.1.1.20/32

 

Loop1

6.6.6.2/32

 

GE1/0/3

11.1.1.2/24

 

GE1/0/3

14.1.1.2/24

 

GE1/0/4

13.1.1.2/24

 

GE1/0/4

12.1.1.2/24

 

 

 

 

Prerequisites

Use FTP or TFTP to transfer the required certificate files to a storage medium on the SDWAN server.

Use the pki import command to import the CA certificate and local certificate to the specified PKI domain on the SDWAN server.

Procedure

1.     Assign IP addresses to interfaces, as shown in Figure 13.

2.     Configure OSPF to advertise routes for interfaces.  The CPEs and RR do not need to advertise routes for the interfaces that provide system IP addresses.

3.     Configure site and device identification information:

# Configure CPE 1.

<CPE1> system-view

[CPE1] sdwan site-id 20

[CPE1] sdwan site-name beijing

[CPE1] sdwan site-role cpe

[CPE1] sdwan device-id 20

[CPE1] sdwan system-ip loopback0

[CPE1] sdwan encapsulation udp-port 3000

# Configure CPE 2.

<CPE2> system-view

[CPE2] sdwan site-id 30

[CPE2] sdwan site-name nanjing

[CPE2] sdwan site-role cpe

[CPE2] sdwan device-id 30

[CPE2] sdwan system-ip loopback0

[CPE2] sdwan encapsulation udp-port 3000

# Configure the RR.

<RR> system-view

[RR] sdwan site-id 10

[RR] sdwan site-name shanghai

[RR] sdwan site-role rr

[RR] sdwan device-id 10

[RR] sdwan system-ip loopback0

[RR] sdwan encapsulation udp-port 3000

4.     Establish an SSL connection between each CPE (SDWAN client) and the RR (SDWAN server):

# Configure CPE 1.

[CPE1] ssl client-policy plc1

[CPE1-ssl client-policy plc1] prefer-cipher rsa_aes_256_cbc_sha

[CPE1-ssl client-policy plc1] undo server-verify enable

[CPE1] sdwan ssl-client-policy plc1

[CPE1] sdwan server system-ip 1.1.1.20 ip 200.200.200.10 port 1234

# Configure CPE 2.

[CPE2] ssl client-policy plc1

[CPE2-ssl client-policy plc1] prefer-cipher rsa_aes_256_cbc_sha

[CPE2-ssl client-policy plc1] undo server-verify enable

[CPE2] sdwan ssl-client-policy plc1

[CPE2] sdwan server system-ip 1.1.1.20 ip 200.200.200.10 port 1234

# Configure the RR.

[RR] pki domain dm1

[RR-pki-domain-1] public-key rsa general name dm1 length 2048

[RR-pki-domain-1] undo crl check enable

[RR-pki-domain-1] quit

[RR] ssl server-policy plc1

[RR-ssl-server-policy-plcl] pki-domain dm1

[RR-ssl-server-policy-plcl] quit

[RR] sdwan server port 1234

[RR] sdwan ssl-server-policy plc1

[RR] sdwan server enable

5.     Configure the BGP connection between each CPE and the RR and configure the CPEs and RR to advertise IPv4 tunnel-encap-ext routes to their peers:

# Configure CPE 1.

[CPE1] bgp 100

[CPE1-bgp-default] peer 1.1.1.20 as-number 100

[CPE1-bgp-default] peer 1.1.1.20 connect-interface Loopback0

[CPE1-bgp-default] address-family ipv4 tnl-encap-ext

[CPE1-bgp-default-ipv4] peer 1.1.1.20 enable

[CPE1-bgp-default-ipv4] quit

[CPE1-bgp-default] qui

# Configure CPE 2.

[CPE2] bgp 100

[CPE2-bgp-default] peer 1.1.1.20 as-number 100

[CPE2-bgp-default] peer 1.1.1.20 connect-interface Loopback0

[CPE2-bgp-default] address-family ipv4 tnl-encap-ext

[CPE2-bgp-default-ipv4] peer 1.1.1.20 enable

[CPE2-bgp-default-ipv4] quit

[CPE2-bgp-default] qui

# Configure the RR.

[RR] bgp 100

[RR-bgp-default] peer 1.1.1.10 as-number 100

[RR-bgp-default] peer 1.1.1.10 connect-interface Loopback0

[RR-bgp-default] peer 1.1.1.30 as-number 100

[RR-bgp-default] peer 1.1.1.30 connect-interface Loopback0

[RR-bgp-default] address-family ipv4 tnl-encap-ext

[RR-bgp-default-ipv4] peer 1.1.1.10 enable

[RR-bgp-default-ipv4] peer 1.1.1.30 enable

[RR-bgp-default-ipv4] peer 1.1.1.10 reflect-client

[RR-bgp-default-ipv4] peer 1.1.1.30 reflect-client

[RR-bgp-default-ipv4] quit

[RR-bgp-default] qui

6.     Configure SDWAN tunnels:

# Configure CPE 1.

[CPE1] interface tunnel 1 mode sdwan udp

[CPE1-Tunnel1] source gigabitethernet 1/0/3

[CPE1-Tunnel1] tunnel out-interface gigabitethernet 1/0/3

[CPE1-Tunnel1] sdwan routing-domain rda id 10

[CPE1-Tunnel1] sdwan transport-network tna id 10

[CPE1-Tunnel1] sdwan interface-id 35

[CPE1-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/3

# Configure CPE 2.

[CPE2] interface tunnel 2 mode sdwan udp

[CPE2-Tunnel1] source gigabitethernet 1/0/4

[CPE2-Tunnel1] tunnel out-interface gigabitethernet 1/0/4

[CPE2-Tunnel1] sdwan routing-domain rda id 10

[CPE2-Tunnel1] sdwan transport-network tnb id 20

[CPE2-Tunnel1] sdwan interface-id 30

[CPE2-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/4

# Configure the RR.

[RR] interface tunnel 1 mode sdwan udp

[RR-Tunnel1] source  gigabitethernet 1/0/3

[RR-Tunnel1] tunnel out-interface gigabitethernet 1/0/3

[RR-Tunnel1] sdwan routing-domain rda id 10

[RR-Tunnel1] sdwan transport-network tna id 10

[RR-Tunnel1] sdwan interface-id 30

[RR-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/3

[RR-Tunnel1] quit

[RR] interface tunnel 2 mode sdwan udp

[RR-Tunnel2] source gigabitethernet 1/0/4

[RR-Tunnel2] tunnel out-interface gigabitethernet 1/0/4

[RR-Tunnel2] sdwan routing-domain rda id 10

[RR-Tunnel2] sdwan transport-network tnb id 20

[RR-Tunnel2] sdwan interface-id 40

[RR-Tunnel2] ip address unnumbered interface gigabitethernet 1/0/4

[RR-Tunnel2] quit

7.     Configure STUN:

# On CPE 1, enable STUN client on tunnel interface Tunnel 1, and specify the IP address and port number of the STUN server connected to the STUN client.

[CPE1-Tunnel1] stun client destination-ip 6.6.6.1 destination-port 20000

[CPE1-Tunnel1] quit

# On CPE 2, enable STUN client on tunnel interface Tunnel 2, and specify the IP address and port number of the STUN server connected to the STUN client.

[CPE2-Tunnel2] stun client destination-ip 6.6.6.1 destination-port 20000

[CPE1-Tunnel2] quit

# On the RR, enable STUN server and specify the IP address, alternative IP address, and UDP port number of the STUN server.

[RR] stun server ip 6.6.6.1 port 20000 alternative-ip 6.6.6.2

8.     Configure IPsec-protected SDWAN tunnels:

# Configure CPE 1.

[CPE1] ipsec transform-set tran1

[CPE1-transform-set-tran1] encapsulation-mode transport

[CPE1-transform-set-tran1] esp encryption-algorithm 3des-cbc

[CPE1-transform-set-tran1] esp authentication-algorithm md5

[CPE1-transform-set-tran1] quit

[CPE1] ipsec profile prf1 sdwan

[CPE1-ipsec-profile-sdwan-prf1] transform-set tran1

[CPE1-ipsec-profile-sdwan-prf1] quit

[CPE1] interface tunnel 1

[CPE1-Tunnel1] tunnel protection ipsec profile prf1

# Configure CPE 2.

[CPE2] ipsec transform-set tran1

[CPE2-transform-set-tran1] encapsulation-mode transport

[CPE2-transform-set-tran1] esp encryption-algorithm 3des-cbc

[CPE2-transform-set-tran1] esp authentication-algorithm md5

[CPE2-transform-set-tran1] quit

[CPE2] ipsec profile prf1 sdwan

[CPE2-ipsec-profile-sdwan-prf1] transform-set tran1

[CPE2-ipsec-profile-sdwan-prf1] quit

[CPE2] interface tunnel 2

[CPE2-Tunnel2] tunnel protection ipsec profile prf1

# Configure the RR.

[RR] ipsec transform-set tran1

[RR-transform-set-tran1] encapsulation-mode transport

[RR-transform-set-tran1] esp encryption-algorithm 3des-cbc

[RR-transform-set-tran1] esp authentication-algorithm md5

[RR-transform-set-tran1] quit

[RR] ipsec profile prf1 sdwan

[RR-ipsec-profile-sdwan-prf1] transform-set tran1

[RR-ipsec-profile-sdwan-prf1] quit

[RR] interface tunnel 1

[RR-Tunnel1] tunnel protection ipsec profile prf1

[RR-Tunnel1] quit

[RR] interface tunnel 2

[RR-Tunnel2] tunnel protection ipsec profile prf1

[RR-Tunnel2] quit

9.     Configure VPN instances on the CPEs for the CEs to access the CPEs:

# Configure CPE 1.

[CPE1] ip vpn-instance vpn1

[CPE1-vpn-instance-vpn1] route-distinguisher 1:1

[CPE1-vpn-instance-vpn1] vpn-target 1:1 import-extcommunity

[CPE1-vpn-instance-vpn1] vpn-target 1:1 export-extcommunity

[CPE1-vpn-instance-vpn1] sdwan vn-id 100

[CPE1-vpn-instance-vpn1] quit

[CPE1] ip vpn-instance vpn2

[CPE1-vpn-instance-vpn2] route-distinguisher 2:2

[CPE1-vpn-instance-vpn2] vpn-target 2:2 import-extcommunity

[CPE1-vpn-instance-vpn2] vpn-target 2:2 export-extcommunity

[CPE1-vpn-instance-vpn2] sdwan vn-id 200

[CPE1-vpn-instance-vpn2] quit

[CPE1] interface gigabitethernet 1/0/1

[CPE1-GigabitEthernet1/0/1] ip binding vpn-instance vpn1

[CPE1-GigabitEthernet1/0/1] quit

[CPE1] interface gigabitethernet 1/0/2

[CPE1-GigabitEthernet1/0/2] ip binding vpn-instance vpn2

[CPE1-GigabitEthernet1/0/2] quit

# Configure CPE 2.

[CPE2] ip vpn-instance vpn1

[CPE2-vpn-instance-vpn1] route-distinguisher 1:1

[CPE2-vpn-instance-vpn1] vpn-target 1:1 import-extcommunity

[CPE2-vpn-instance-vpn1] vpn-target 1:1 export-extcommunity

[CPE2-vpn-instance-vpn1] sdwan vn-id 100

[CPE2-vpn-instance-vpn1] quit

[CPE2] ip vpn-instance vpn2

[CPE2-vpn-instance-vpn2] route-distinguisher 2:2

[CPE2-vpn-instance-vpn2] vpn-target 2:2 import-extcommunity

[CPE2-vpn-instance-vpn2] vpn-target 2:2 export-extcommunity

[CPE2-vpn-instance-vpn2] sdwan vn-id 200

[CPE2-vpn-instance-vpn2] quit

[CPE1] interface gigabitethernet 1/0/1

[CPE1-GigabitEthernet1/0/1] ip binding vpn-instance vpn2

[CPE1-GigabitEthernet1/0/1] quit

[CPE1] interface gigabitethernet 1/0/2

[CPE1-GigabitEthernet1/0/2] ip binding vpn-instance vpn1

[CPE1-GigabitEthernet1/0/2] quit

10.     Establish EBGP peer relationship between the CPE and CE for each site and import VPN routes to BGP IPv4 unicast address family view:

# Configure CE 1.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.1.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.1.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CE 2.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.2.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.2.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CE 3.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.3.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.3.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CE 4.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.4.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.4.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CPE 1.

[CPE1] bgp 100

[CPE1-bgp-default] ip vpn-instance vpn1

[CPE1-bgp-default-vpn1] peer 10.1.1.1 as-number 200

[CPE1-bgp-default-vpn1] address-family ipv4 unicast

[CPE1-bgp-default-ipv4-vpn1] peer 10.1.1.1 enable

[CPE1-bgp-default-ipv4-vpn1] import-route direct

[CPE1-bgp-default-ipv4-vpn1] quit

[CPE1-bgp-default-vpn1] quit

[CPE1-bgp-default] ip vpn-instance vpn2

[CPE1-bgp-default-vpn2] peer 10.1.2.1 as-number 200

[CPE1-bgp-default-vpn2] address-family ipv4 unicast

[CPE1-bgp-default-ipv4-vpn2] peer 10.1.2.1 enable

[CPE1-bgp-default-ipv4-vpn2] import-route direct

[CPE1-bgp-default-ipv4-vpn2] quit

[CPE1-bgp-default-vpn1] quit

[CPE1-bgp-default] quit

# Configure CPE 2.

[CPE2] bgp 100

[CPE2-bgp-default] ip vpn-instance vpn1

[CPE2-bgp-default-vpn1] peer 10.1.3.1 as-number 200

[CPE2-bgp-default-vpn1] address-family ipv4 unicast

[CPE2-bgp-default-ipv4-vpn1] peer 10.1.3.1 enable

[CPE2-bgp-default-ipv4-vpn1] import-route direct

[CPE2-bgp-default-ipv4-vpn1] quit

[CPE2-bgp-default-vpn1] quit

[CPE2-bgp-default] ip vpn-instance vpn2

[CPE2-bgp-default-vpn2] peer 10.1.4.1 as-number 200

[CPE2-bgp-default-vpn2] address-family ipv4 unicast

[CPE2-bgp-default-ipv4-vpn2] peer 10.1.4.1 enable

[CPE2-bgp-default-ipv4-vpn2] import-route direct

[CPE2-bgp-default-ipv4-vpn2] quit

[CPE2-bgp-default-vpn1] quit

[CPE2-bgp-default] quit

11.     Use BGP EVPN IP prefix advertisement routes to advertise VPN routes for each site:

# Configure CPE 1.

[CPE1] bgp 100

[CPE1-bgp-default] ip vpn-instance vpn1

[CPE1-vpn-instance-vpn1] address-family ipv4

[CPE1-vpn-ipv4-vpn1] evpn sdwan routing-enable

[CPE1-vpn-ipv4-vpn1] quit

[CPE1-vpn-instance-vpn1] quit

[CPE1-bgp-default] ip vpn-instance vpn2

[CPE1-vpn-instance-vpn2] address-family ipv4

[CPE1-vpn-ipv4-vpn2] evpn sdwan routing-enable

[CPE1-vpn-ipv4-vpn2] quit

[CPE1-vpn-instance-vpn2] quit

[CPE1-bgp-default] quit

[CPE1-bgp-default] address-family l2vpn evpn

[CPE1-bgp-default-evpn] peer 1.1.1.20 enable

[CPE1-bgp-default-evpn] peer 1.1.1.20 advertise encap-type sdwan

[CPE1-bgp-default-evpn] quit

# Configure CPE 2.

[CPE2] bgp 100

[CPE2-bgp-default] ip vpn-instance vpn1

[CPE2-vpn-instance-vpn1] address-family ipv4

[CPE2-vpn-ipv4-vpn1] evpn sdwan routing-enable

[CPE2-vpn-ipv4-vpn1] quit

[CPE2-vpn-instance-vpn1] quit

[CPE2-bgp-default] ip vpn-instance vpn2

[CPE2-vpn-instance-vpn2] address-family ipv4

[CPE2-vpn-ipv4-vpn2] evpn sdwan routing-enable

[CPE2-vpn-ipv4-vpn2] quit

[CPE2-vpn-instance-vpn2] quit

[CPE2-bgp-default] quit

[CPE2-bgp-default] address-family l2vpn evpn

[CPE2-bgp-default-evpn] peer 1.1.1.20 enable

[CPE2-bgp-default-evpn] peer 1.1.1.20 advertise encap-type sdwan

[CPE2-bgp-default-evpn] quit

# Configure the RR.

[RR] bgp 200

[RR-bgp-default] address-family l2vpn evpn

[RR-bgp-default-evpn] undo policy vpn-target

[RR-bgp-default-evpn] peer 1.1.1.10 enable

[RR-bgp-default-evpn] peer 1.1.1.10 reflect-client

[RR-bgp-default-evpn] peer 1.1.1.10 advertise encap-type sdwan

[RR-bgp-default-evpn] peer 1.1.1.30 enable

[RR-bgp-default-evpn] peer 1.1.1.30 reflect-client

[RR-bgp-default-evpn] peer 1.1.1.30 advertise encap-type sdwan

Verifying the configuration

# Display SDWAN TTE connection on CPE 1, CPE 2, and the RR. This step uses CPE 1 as an example. Verify that CPE 1 has established TTE connections to the RR and CPE 2.

[CPE1] display sdwan tte connection

Destination SiteID/DevID/IfID/SysIP: 10/10/30/1.1.1.20

Destination IP/port: 11.1.1.2/3000

Source IP/port/IfID: 11.1.1.1/3000/20

 

Destination SiteID/DevID/IfID/SysIP: 10/10/40/1.1.1.20

Destination IP/port: 13.2.1.1/3000

Source IP/port/IfID: 11.1.1.1/3000/20

 

Destination SiteID/DevID/IfID/SysIP: 30/30/20/1.1.1.30

Destination IP/port: 13.2.1.1/3000

Source IP/port/IfID: 11.1.1.1/3000/20

Number of connections: 3

# Display routing table information on CPE 1 and CPE 2. This step uses CPE 1 as an example. Verify that CPE 1 has generated the route destined for CE 4.

[CPE1] display ip routing-table vpn-instance vpn1

 

Destinations : 14       Routes : 14

 

Destination/Mask   Proto   Pre Cost        NextHop         Interface

0.0.0.0/32         Direct  0   0           127.0.0.1       InLoop0

10.1.1.0/24        Direct  0   0           10.1.1.1        GE1/0/1

10.1.1.2/32        Direct  0   0           127.0.0.1       InLoop0

10.1.1.255/32      Direct  0   0           10.1.1.1        GE1/0/1

10.1.2.0/24        Direct  0   0           10.1.2.1        GE1/0/2

10.1.2.2/32        Direct  0   0           127.0.0.1       InLoop0

10.1.2.255/32      Direct  0   0           10.1.2.1        GE1/0/2

10.1.4.1/24        BGP     255 0           1.1.1.30        Tun1

127.0.0.0/8        Direct  0   0           127.0.0.1       InLoop0

127.0.0.1/32       Direct  0   0           127.0.0.1       InLoop0

127.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

224.0.0.0/4        Direct  0   0           0.0.0.0         NULL0

224.0.0.0/24       Direct  0   0           0.0.0.0         NULL0

255.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

# Verify that CE 1 and CE 4 can access each other and CE 2 and CE 3 can access each other. (Details not shown.)

Example: Establishing SDWAN tunnels on demand

Network configuration

As shown in Figure 14:

·     The sites are attached to the CPEs to access the SDWAN network. Users at site 1 can communicate with users at site 2 and site 3 over the SDWAN network. Users at site 2 cannot communicate with users at site 3 over the SDWAN network.

·     In the SDWAN network, the SDWAN clients and SDWAN server establish SSL connections to complete control channel establishment.

·     The RR uses export routing policies to reflect TTE information and private routes only between CPE 1 and CPE 2 and between CPE 1 and CPE 3. The RR reflects only TTE information between CPE 2 and CPE 3, and it does not reflect private routes between CPE 2 and CPE 3.

·     Configure IPsec to protect traffic transmitted over SDWAN tunnels.

Figure 14 Network diagram

 

Device

Interface

IP address

Device

Interface

IP address

CE 1

GE1/0/1

10.1.1.1/24

CE 2

GE1/0/2

10.1.2.1/24

CE 3

GE1/0/1

10.1.3.1/24

CPE 2

Loop0

1.1.1.20/32

CPE 1

Loop0

1.1.1.10/32

 

 

10.1.2.2/24

 

GE1/0/1

10.1.1.2/24

 

 

12.1.1.2/24

 

GE1/0/2

11.1.1.2/24

RR

Loop0

1.1.1.100/32

CPE 3

Loop0

1.1.1.30/32

 

GE1/0/1

11.1.1.1/24

 

GE1/0/1

10.1.3.2/24

 

GE1/0/2

12.1.1.1/24

 

GE1/0/2

13.1.1.2/24

 

GE1/0/3

13.1.1.1/24

 

Prerequisites

Use FTP or TFTP to transfer the required certificate files to a storage medium on the SDWAN server.

Use the pki import command to import the CA certificate and local certificate to the specified PKI domain on the SDWAN server.

Procedure

1.     Assign IP addresses to interfaces, as shown in Figure 14.

2.     Configure OSPF to advertise routes for interfaces. The CPEs and RR do not need to advertise routes for the interfaces that provide system IP addresses.

3.     Configure site and device identification information:

# Configure CPE 1.

<CPE1> system-view

[CPE1] sdwan site-id 10

[CPE1] sdwan site-name beijing

[CPE1] sdwan site-role cpe

[CPE1] sdwan device-id 10

[CPE1] sdwan system-ip loopback0

[CPE1] sdwan encapsulation udp-port 3000

# Configure CPE 2.

<CPE2> system-view

[CPE2] sdwan site-id 20

[CPE2] sdwan site-name nanjing

[CPE2] sdwan site-role cpe

[CPE2] sdwan device-id 20

[CPE2] sdwan system-ip loopback0

[CPE2] sdwan encapsulation udp-port 3000

# Configure CPE 3.

<CPE3> system-view

[CPE3] sdwan site-id 30

[CPE3] sdwan site-name wuhan

[CPE3] sdwan site-role cpe

[CPE3] sdwan device-id 30

[CPE3] sdwan system-ip loopback0

[CPE3] sdwan encapsulation udp-port 3000

# Configure the RR.

<RR> system-view

[RR] sdwan site-id 100

[RR] sdwan site-name shanghai

[RR] sdwan site-role rr

[RR] sdwan device-id 100

[RR] sdwan system-ip loopback0

[RR] sdwan encapsulation udp-port 3000

4.     Establish an SSL connection between each CPE (SDWAN client) and the RR (SDWAN server):

# Configure CPE 1.

[CPE1] ssl client-policy plc1

[CPE1-ssl client-policy plc1] prefer-cipher rsa_aes_256_cbc_sha

[CPE1-ssl client-policy plc1] undo server-verify enable

[CPE1] sdwan ssl-client-policy plc1

[CPE1] sdwan server system-ip 1.1.1.10 ip 200.200.200.10 port 1234

# Configure CPE 2.

[CPE2] ssl client-policy plc1

[CPE2-ssl client-policy plc1] prefer-cipher rsa_aes_256_cbc_sha

[CPE2-ssl client-policy plc1] undo server-verify enable

[CPE2] sdwan ssl-client-policy plc1

[CPE2] sdwan server system-ip 1.1.1.20 ip 200.200.200.10 port 1234

# Configure CPE 3.

[CPE3] ssl client-policy plc1

[CPE3-ssl client-policy plc1] prefer-cipher rsa_aes_256_cbc_sha

[CPE3-ssl client-policy plc1] undo server-verify enable

[CPE3] sdwan ssl-client-policy plc1

[CPE3] sdwan server system-ip 1.1.1.30 ip 200.200.200.10 port 1234

# Configure the RR.

[RR] pki domain dm1

[RR-pki-domain-1] public-key rsa general name dm1 length 2048

[RR-pki-domain-1] undo crl check enable

[RR-pki-domain-1] quit

[RR] ssl server-policy plc1

[RR-ssl-server-policy-plcl] pki-domain dm1

[RR-ssl-server-policy-plcl] quit

[RR] sdwan server port 1234

[RR] sdwan ssl-server-policy plc1

[RR] sdwan server enable

5.     Configure the BGP connection between each CPE and the RR and configure the CPEs and RR to advertise IPv4 tunnel-encap-ext routes to their peers:

# Configure CPE 1.

[CPE1] bgp 100

[CPE1-bgp-default] peer 1.1.1.100 as-number 100

[CPE1-bgp-default] peer 1.1.1.100 connect-interface Loopback0

[CPE1-bgp-default] address-family ipv4 tnl-encap-ext

[CPE1-bgp-default-ipv4] peer 1.1.1.100 enable

[CPE1-bgp-default-ipv4] quit

[CPE1-bgp-default] qui

# Configure CPE 2.

[CPE2] bgp 100

[CPE2-bgp-default] peer 1.1.1.100 as-number 100

[CPE2-bgp-default] peer 1.1.1.100 connect-interface Loopback0

[CPE2-bgp-default] address-family ipv4 tnl-encap-ext

[CPE2-bgp-default-ipv4] peer 1.1.1.100 enable

[CPE2-bgp-default-ipv4] quit

[CPE2-bgp-default] quit

# Configure CPE 3.

[CPE3] bgp 100

[CPE3-bgp-default] peer 1.1.1.100 as-number 100

[CPE3-bgp-default] peer 1.1.1.100 connect-interface Loopback0

[CPE3-bgp-default] address-family ipv4 tnl-encap-ext

[CPE3-bgp-default-ipv4] peer 1.1.1.100 enable

[CPE3-bgp-default-ipv4] quit

[CPE3-bgp-default] quit

# Configure the RR.

[RR] bgp 100

[RR-bgp-default] peer 1.1.1.10 as-number 100

[RR-bgp-default] peer 1.1.1.10 connect-interface Loopback0

[RR-bgp-default] peer 1.1.1.20 as-number 100

[RR-bgp-default] peer 1.1.1.20 connect-interface Loopback0

[RR-bgp-default] peer 1.1.1.30 as-number 100

[RR-bgp-default] peer 1.1.1.30 connect-interface Loopback0

[RR-bgp-default] address-family ipv4 tnl-encap-ext

[RR-bgp-default-ipv4] peer 1.1.1.10 enable

[RR-bgp-default-ipv4] peer 1.1.1.20 enable

[RR-bgp-default-ipv4] peer 1.1.1.30 enable

[RR-bgp-default-ipv4] peer 1.1.1.10 reflect-client

[RR-bgp-default-ipv4] peer 1.1.1.20 reflect-client

[RR-bgp-default-ipv4] peer 1.1.1.30 reflect-client

[RR-bgp-default-ipv4] quit

[RR-bgp-default] quit

6.     Configure SDWAN tunnels:

# Configure CPE 1.

[CPE1] interface tunnel 1 mode sdwan udp

[CPE1-Tunnel1] source gigabitethernet 1/0/2

[CPE1-Tunnel1] tunnel out-interface gigabitethernet 1/0/2

[CPE1-Tunnel1] sdwan routing-domain rda id 10

[CPE1-Tunnel1] sdwan transport-network tna id 10

[CPE1-Tunnel1] sdwan interface-id 10

[CPE1-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/2

# Configure CPE 2.

[CPE2] interface tunnel 1 mode sdwan udp

[CPE2-Tunnel1] source gigabitethernet 1/0/2

[CPE2-Tunnel1] tunnel out-interface gigabitethernet 1/0/2

[CPE2-Tunnel1] sdwan routing-domain rda id 10

[CPE2-Tunnel1] sdwan transport-network tnb id 20

[CPE2-Tunnel1] sdwan interface-id 20

[CPE2-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/2

# Configure CPE 3.

[CPE3] interface tunnel 1 mode sdwan udp

[CPE3-Tunnel1] source gigabitethernet 1/0/2

[CPE3-Tunnel1] tunnel out-interface gigabitethernet 1/0/2

[CPE3-Tunnel1] sdwan routing-domain rda id 10

[CPE3-Tunnel1] sdwan transport-network tnb id 30

[CPE3-Tunnel1] sdwan interface-id 30

[CPE3-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/2

# Configure the RR.

[RR] interface tunnel 1 mode sdwan udp

[RR-Tunnel1] source gigabitethernet 1/0/1

[RR-Tunnel1] tunnel out-interface gigabitethernet 1/0/1

[RR-Tunnel1] sdwan routing-domain rda id 10

[RR-Tunnel1] sdwan transport-network tna id 10

[RR-Tunnel1] sdwan interface-id 110

[RR-Tunnel1] ip address unnumbered interface gigabitethernet 1/0/1

[RR-Tunnel1] quit

[RR] interface tunnel 2 mode sdwan udp

[RR-Tunnel2] source gigabitethernet 1/0/2

[RR-Tunnel2] tunnel out-interface gigabitethernet 1/0/2

[RR-Tunnel2] sdwan routing-domain rda id 10

[RR-Tunnel2] sdwan transport-network tnb id 20

[RR-Tunnel2] sdwan interface-id 120

[RR-Tunnel2] ip address unnumbered interface gigabitethernet 1/0/2

[RR-Tunnel2] quit

[RR] interface tunnel 3 mode sdwan udp

[RR-Tunnel3] source gigabitethernet 1/0/3

[RR-Tunnel3] tunnel out-interface gigabitethernet 1/0/3

[RR-Tunnel3] sdwan routing-domain rda id 10

[RR-Tunnel3] sdwan transport-network tnb id 30

[RR-Tunnel3] sdwan interface-id 130

[RR-Tunnel3] ip address unnumbered interface gigabitethernet 1/0/3

[RR-Tunnel3] quit

7.     Configure IPsec-protected SDWAN tunnels:

# Configure CPE 1.

[CPE1] ipsec transform-set tran1

[CPE1-transform-set-tran1] encapsulation-mode transport

[CPE1-transform-set-tran1] esp encryption-algorithm 3des-cbc

[CPE1-transform-set-tran1] esp authentication-algorithm md5

[CPE1-transform-set-tran1] quit

[CPE1] ipsec profile prf1 sdwan

[CPE1-ipsec-profile-sdwan-prf1] transform-set trf1

[CPE1-ipsec-profile-sdwan-prf1] quit

[CPE1] interface tunnel 1

[CPE1-Tunnel1] tunnel protection ipsec profile prf1

# Configure CPE 2.

[CPE2] ipsec transform-set tran1

[CPE2-transform-set-tran1] encapsulation-mode transport

[CPE2-transform-set-tran1] esp encryption-algorithm 3des-cbc

[CPE2-transform-set-tran1] esp authentication-algorithm md5

[CPE2-transform-set-tran1] quit

[CPE2] ipsec profile prf1 sdwan

[CPE2-ipsec-profile-sdwan-prf1] transform-set trf1

[CPE2-ipsec-profile-sdwan-prf1] quit

[CPE2] interface tunnel 1

[CPE2-Tunnel1] tunnel protection ipsec profile prf1

# Configure CPE 3.

[CPE3] ipsec transform-set tran1

[CPE3-transform-set-tran1] encapsulation-mode transport

[CPE3-transform-set-tran1] esp encryption-algorithm 3des-cbc

[CPE3-transform-set-tran1] esp authentication-algorithm md5

[CPE3-transform-set-tran1] quit

[CPE3] ipsec profile prf1 sdwan

[CPE3-ipsec-profile-sdwan-prf1] transform-set trf1

[CPE3-ipsec-profile-sdwan-prf1] quit

[CPE3] interface tunnel 1

[CPE3-Tunnel1] tunnel protection ipsec profile prf1

# Configure the RR.

[RR] ipsec transform-set tran1

[RR-transform-set-tran1] encapsulation-mode transport

[RR-transform-set-tran1] esp encryption-algorithm 3des-cbc

[RR-transform-set-tran1] esp authentication-algorithm md5

[RR-transform-set-tran1] quit

[RR] ipsec profile prf1 sdwan

[RR-ipsec-profile-sdwan-prf1] transform-set trf1

[RR-ipsec-profile-sdwan-prf1] quit

[RR] interface tunnel 1

[RR-Tunnel1] tunnel protection ipsec profile prf1

[RR-Tunnel1] quit

[RR] interface tunnel 2

[RR-Tunnel2] tunnel protection ipsec profile prf1

[RR-Tunnel2] quit

[RR] interface tunnel 3

[RR-Tunnel3] tunnel protection ipsec profile prf1

[RR-Tunnel3] quit

8.     Configure VPN instances on the CPEs for the CEs to access the CPEs:

# Configure CPE 1.

[CPE1] ip vpn-instance vpn1

[CPE1-vpn-instance-vpn1] route-distinguisher 1:1

[CPE1-vpn-instance-vpn1] vpn-target 1:1 import-extcommunity

[CPE1-vpn-instance-vpn1] vpn-target 1:1 export-extcommunity

[CPE1-vpn-instance-vpn1] sdwan vn-id 100

[CPE1-vpn-instance-vpn1] quit

[CPE1] interface gigabitethernet 1/0/1

[CPE1-GigabitEthernet1/0/1] ip binding vpn-instance vpn1

[CPE1-GigabitEthernet1/0/1] quit

# Configure CPE 2.

[CPE2] ip vpn-instance vpn1

[CPE2-vpn-instance-vpn1] route-distinguisher 1:1

[CPE2-vpn-instance-vpn1] vpn-target 1:1 import-extcommunity

[CPE2-vpn-instance-vpn1] vpn-target 1:1 export-extcommunity

[CPE2-vpn-instance-vpn1] sdwan vn-id 100

[CPE2-vpn-instance-vpn1] quit

[CPE1] interface gigabitethernet 1/0/1

[CPE1-GigabitEthernet1/0/1] ip binding vpn-instance vpn1

[CPE1-GigabitEthernet1/0/1] quit

# Configure CPE 3.

[CPE3] ip vpn-instance vpn1

[CPE3-vpn-instance-vpn1] route-distinguisher 1:1

[CPE3-vpn-instance-vpn1] vpn-target 1:1 import-extcommunity

[CPE3-vpn-instance-vpn1] vpn-target 1:1 export-extcommunity

[CPE3-vpn-instance-vpn1] sdwan vn-id 100

[CPE3-vpn-instance-vpn1] quit

[CPE3] interface gigabitethernet 1/0/1

[CPE3-GigabitEthernet1/0/1] ip binding vpn-instance vpn1

[CPE3-GigabitEthernet1/0/1] quit

9.     Establish EBGP peer relationship between the CPE and CE for each site and import VPN routes to BGP IPv4 unicast address family view:

# Configure CE 1.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.1.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.1.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CE 2.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.2.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.2.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CE 3.

<CE1> system-view

[CE1] bgp 200

[CE1-bgp-default] peer 10.1.3.2 as-number 100

[CE1-bgp-default] address-family ipv4 unicast

[CE1-bgp-default-ipv4] peer 10.1.3.2 enable

[CE1-bgp-default-ipv4] import-route direct

[CE1-bgp-default-ipv4] quit

[CE1-bgp-default] quit

# Configure CPE 1.

[CPE1] bgp 100

[CPE1-bgp-default] ip vpn-instance vpn1

[CPE1-bgp-default-vpn1] peer 10.1.1.1 as-number 200

[CPE1-bgp-default-vpn1] address-family ipv4 unicast

[CPE1-bgp-default-ipv4-vpn1] peer 10.1.1.1 enable

[CPE1-bgp-default-ipv4-vpn1] import-route direct

[CPE1-bgp-default-ipv4-vpn1] quit

[CPE1-bgp-default-vpn1] quit

[CPE1-bgp-default] quit

# Configure CPE 2.

[CPE2] bgp 100

[CPE2-bgp-default] ip vpn-instance vpn1

[CPE2-bgp-default-vpn1] peer 10.1.2.1 as-number 200

[CPE2-bgp-default-vpn1] address-family ipv4 unicast

[CPE2-bgp-default-ipv4-vpn1] peer 10.1.2.1 enable

[CPE2-bgp-default-ipv4-vpn1] import-route direct

[CPE2-bgp-default-ipv4-vpn1] quit

[CPE2-bgp-default-vpn1] quit

[CPE2-bgp-default] quit

# Configure CPE 3.

[CPE3] bgp 100

[CPE3-bgp-default] ip vpn-instance vpn1

[CPE3-bgp-default-vpn1] peer 10.1.3.1 as-number 200

[CPE3-bgp-default-vpn1] address-family ipv4 unicast

[CPE3-bgp-default-ipv4-vpn1] peer 10.1.3.1 enable

[CPE3-bgp-default-ipv4-vpn1] import-route direct

[CPE3-bgp-default-ipv4-vpn1] quit

[CPE3-bgp-default-vpn1] quit

[CPE3-bgp-default] quit

10.     Use BGP EVPN IP prefix advertisement routes to advertise VPN routes for each site:

# Configure CPE 1.

[CPE1] ip vpn-instance vpn1

[CPE1-vpn-instance-vpn1] address-family ipv4

[CPE1-vpn-ipv4-vpn1] evpn sdwan routing-enable

[CPE1-vpn-ipv4-vpn1] quit

[CPE1-vpn-instance-vpn1] quit

[CPE1] bgp 100

[CPE1-bgp-default] address-family l2vpn evpn

[CPE1-bgp-default-evpn] peer 1.1.1.100 enable

[CPE1-bgp-default-evpn] peer 1.1.1.100 advertise encap-type sdwan

[CPE1-bgp-default-evpn] quit

# Configure CPE 2.

[CPE2] ip vpn-instance vpn1

[CPE2-vpn-instance-vpn1] address-family ipv4

[CPE2-vpn-ipv4-vpn1] evpn sdwan routing-enable

[CPE2-vpn-ipv4-vpn1] quit

[CPE2-vpn-instance-vpn1] quit

[CPE2] bgp 100

[CPE2-bgp-default] address-family l2vpn evpn

[CPE2-bgp-default-evpn] peer 1.1.1.100 enable

[CPE2-bgp-default-evpn] peer 1.1.1.100 advertise encap-type sdwan

[CPE2-bgp-default-evpn] quit

# Configure CPE 3.

[CPE3] ip vpn-instance vpn1

[CPE3-vpn-instance-vpn1] address-family ipv4

[CPE3-vpn-ipv4-vpn1] evpn sdwan routing-enable

[CPE3-vpn-ipv4-vpn1] quit

[CPE3-vpn-instance-vpn1] quit

[CPE3] bgp 100

[CPE3-bgp-default] address-family l2vpn evpn

[CPE3-bgp-default-evpn] peer 1.1.1.100 enable

[CPE3-bgp-default-evpn] peer 1.1.1.100 advertise encap-type sdwan

[CPE3-bgp-default-evpn] quit

11.     Configure the RR to reflect SDWAN-encapsulated IP prefix advertisement routes and use export routing policies to control the RR to not reflect IP prefix advertisement routes between CPE 2 and CPE 3:

# Create ACLs.

[RR] acl basic name cpe2

[RR-acl-ipv4-basic-cpe2] rule permit source 10.1.2.0 0.0.0.255

[RR-acl-ipv4-basic-cpe2] quit

[RR] acl basic name cpe3

[RR-acl-ipv4-basic-cpe3] rule permit source 10.1.3.0 0.0.0.255

[RR-acl-ipv4-basic-cpe3] quit

# Create routing policies.

[RR] route-policy denycpe2 deny node 10

[RR-route-policy-denycpe2-10] if-match ip address acl name cpe2

[RR-route-policy-denycpe2-10] quit

[RR] route-policy denycpe2 permit node 20

[RR-route-policy-denycpe2-20] quit

[RR] route-policy denycpe3 deny node 10

[RR-route-policy-denycpe3-10] if-match ip address acl name cpe3

[RR-route-policy-denycpe3-10] quit

[RR] route-policy denycpe3 permit node 20

[RR-route-policy-denycpe3-20] quit

# Configure BGP EVPN route reflection.

[RR] bgp 200

[RR-bgp-default] address-family l2vpn evpn

[RR-bgp-default-evpn] undo policy vpn-target

[RR-bgp-default-evpn] peer 1.1.1.10 enable

[RR-bgp-default-evpn] peer 1.1.1.10 reflect-client

[RR-bgp-default-evpn] peer 1.1.1.10 advertise encap-type sdwan

[RR-bgp-default-evpn] peer 1.1.1.20 enable

[RR-bgp-default-evpn] peer 1.1.1.20 reflect-client

[RR-bgp-default-evpn] peer 1.1.1.20 advertise encap-type sdwan

[RR-bgp-default-evpn] peer 1.1.1.20 route-policy denycpe3 export

[RR-bgp-default-evpn] peer 1.1.1.30 enable

[RR-bgp-default-evpn] peer 1.1.1.30 reflect-client

[RR-bgp-default-evpn] peer 1.1.1.30 advertise encap-type sdwan

[RR-bgp-default-evpn] peer 1.1.1.30 route-policy denycpe2 export

Verifying the configuration

# Display SDWAN TTE connection on CPE 1. Verify that CPE 1 has established TTE connections to the RR, CPE 2, and CPE 3.

[CPE1] display sdwan tte connection

Destination SiteID/DevID/IfID/SysIP: 100/100/110/1.1.1.100

Destination IP/port: 11.1.1.1/3000

Source IP/port/IfID: 11.1.1.2/3000/10

 

Destination SiteID/DevID/IfID/SysIP: 20/20/20/1.1.1.20

Destination IP/port: 12.1.1.2/3000

Source IP/port/IfID: 11.1.1.2/3000/10

 

Destination SiteID/DevID/IfID/SysIP: 30/30/30/1.1.1.30

Destination IP/port: 13.1.1.2/3000

Source IP/port/IfID: 11.1.1.2/3000/10

 

Number of connections: 3

# Display SDWAN TTE connection on CPE 2. Verify that CPE 2 has established TTE connections only to the RR and CPE 1.

[CPE2] display sdwan tte connection

Destination SiteID/DevID/IfID/SysIP: 100/100/110/1.1.1.100

Destination IP/port: 12.1.1.1/3000

Source IP/port/IfID: 12.1.1.2/3000/20

 

Destination SiteID/DevID/IfID/SysIP: 10/10/10/1.1.1.10

Destination IP/port: 11.1.1.2/3000

Source IP/port/IfID: 12.1.1.2/3000/20

 

Number of connections: 2

# Display SDWAN TTE connection on CPE 3. Verify that CPE 3 has established TTE connections only to the RR and CPE 1. (Details not shown.)

# Display routing table information on CPE 1. Verify that CPE 1 has generated the routes destined for CE 2 and CE 3.

[CPE1] display ip routing-table vpn-instance vpn1

 

Destinations : 12       Routes : 12

 

Destination/Mask   Proto   Pre Cost        NextHop         Interface

0.0.0.0/32         Direct  0   0           127.0.0.1       InLoop0

10.1.1.0/24        Direct  0   0           10.1.1.1        GE1/0/1

10.1.1.2/32        Direct  0   0           127.0.0.1       InLoop0

10.1.1.255/32      Direct  0   0           10.1.1.1        GE1/0/1

10.1.2.1/24        BGP     255 0           1.1.1.20        Tun1

10.1.3.1/24        BGP     255 0           1.1.1.30        Tun2

127.0.0.0/8        Direct  0   0           127.0.0.1       InLoop0

127.0.0.1/32       Direct  0   0           127.0.0.1       InLoop0

127.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

224.0.0.0/4        Direct  0   0           0.0.0.0         NULL0

224.0.0.0/24       Direct  0   0           0.0.0.0         NULL0

255.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

# Display routing table information on CPE 2. Verify that CPE 2 has generated the route destined for CE 1 and no route destined for CE 3 is generated.

[CPE2] display ip routing-table vpn-instance vpn1

 

Destinations : 11       Routes : 11

 

Destination/Mask   Proto   Pre Cost        NextHop         Interface

0.0.0.0/32         Direct  0   0           127.0.0.1       InLoop0

10.1.2.0/24        Direct  0   0           10.1.1.1        GE1/0/1

10.1.2.2/32        Direct  0   0           127.0.0.1       InLoop0

10.1.2.255/32      Direct  0   0           10.1.1.1        GE1/0/1

10.1.1.1/24        BGP     255 0           1.1.1.20        Tun1

127.0.0.0/8        Direct  0   0           127.0.0.1       InLoop0

127.0.0.1/32       Direct  0   0           127.0.0.1       InLoop0

127.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

224.0.0.0/4        Direct  0   0           0.0.0.0         NULL0

224.0.0.0/24       Direct  0   0           0.0.0.0         NULL0

255.255.255.255/32 Direct  0   0           127.0.0.1       InLoop0

# Display routing table information on CPE 3. Verify that CPE 3 has generated the route destined for CE 1 and no route destined for CE 2 is generated. (Details not shown.)

# Verify that CE 1 and CE 2 can access each other, CE 1 and CE 3 can access each other, and CE 2 and CE 3 cannot access each other. (Details not shown.)

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网