Contents

Introduction

Chapter 1 Introduction to Cisco Software-Defined Wide Area Networking (SD-WAN)

Networks of Today

Common Business and IT Trends

Common Desired Benefits

High-Level Design Considerations

Introduction to Cisco Software-Defined WAN (SD-WAN)

Transport Independence

Rethinking the WAN

Use Cases Demanding Changes in the WAN

Bandwidth Aggregation and Application Load-Balancing

Protecting Critical Applications with SLAs

End-to-End Segmentation

Direct Internet Access

Fully Managed Network Solution

Building an ROI to Identify Cost Savings

Introduction to Multidomain

Cloud Trends and Adoption

Summary

Review All Key Topics

Key Terms

Chapter Review Questions

Chapter 2 Cisco SD-WAN Components

Data Plane

Management Plane

Control Plane

Orchestration Plane

Multi-Tenancy Options

Deployment Options

Summary

Review All Key Topics

Key Terms

Chapter Review Questions

References

Chapter 3 Control Plane and Data Plane Operations

Control Plane Operations

Overlay Management Protocol

OMP Routes

TLOC Routes

Service Routes

Path Selection

OMP Route Redistribution and Loop Prevention

Data Plane Operations

TLOC Colors

Tunnel Groups

Network Address Translation

Full Cone NAT

Symmetric NAT

Address Restricted Cone NAT

Port Restricted Cone NAT

Network Segmentation

Data Plane Encryption

Data Plane Encryption with Pairwise

Summary

Review All Key Topics

Key Terms

Chapter Review Questions

References

Chapter 4 Onboarding and Provisioning

Configuration Templates

Developing and Deploying Templates

Onboarding Devices

Manual Bootstrapping of a WAN Edge

Automatic Provisioning with PNP or ZTP

Summary

Review All Key Topics

Chapter Review Questions

References

Chapter 5 Introduction to Cisco SD-WAN Policies

Purpose of Cisco SD-WAN Policies

Types of Cisco SD-WAN Policies

Centralized Policy

Centralized Policies That Affect the Control Plane

Centralized Policies That Affect the Data Plane

Localized Policy

Policy Domains

Cisco SD-WAN Policy Construction

Types of Lists

Policy Definition

Cisco SD-WAN Policy Administration, Activation, and Enforcement

Building a Centralized Policy

Activating a Centralized Policy

Packet Forwarding Order of Operations

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

Chapter 6 Centralized Control Policies

Centralized Control Policy Overview

Use Case 1: Isolating Remote Branches from Each Other

Use Case 1 Review

Use Case 2: Enabling Branch-to-Branch Communication Through Data Centers

Enabling Branch-to-Branch Communication with Summarization

Enabling Branch-to-Branch Communication with TLOC Lists

Use Case 2 Review

Use Case 3: Traffic Engineering at Sites with Multiple Routers

Setting TLOC Preference with Centralized Policy

Setting TLOC Preference with Device Templates

Use Case 3 Review

Use Case 4: Preferring Regional Data Centers for Internet Access

Use Case 4 Review

Use Case 5: Regional Mesh Networks

Use Case 5 Review

Use Case 6: Enforcing Security Perimeters with Service Insertion

Use Case 6 Review

Use Case 7: Isolating Guest Users from the Corporate WAN

Use Case 7 Review

Use Case 8: Creating Different Network Topologies per Segment

Use Case 8 Review

Use Case 9: Creating Extranets and Access to Shared Services

Use Case 9 Review

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

Reference

Chapter 7 Centralized Data Policies

Centralized Data Policy Overview

Centralized Data Policy Use Cases

Use Case 10: Direct Internet Access for Guest Users

Use Case 10 Review

Use Case 11: Direct Cloud Access for Trusted Applications

Use Case 11 Review

Use Case 12: Application-Based Traffic Engineering

Use Case 12 Review

Use Case 13: Protecting Corporate Users with a Cloud-Delivered Firewall

Use Case 13 Review

Use Case 14: Protecting Applications from Packet Loss

Forward Error Correction for Audio and Video

Packet Duplication for Credit Card Transactions

Use Case 14 Review

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

References

Chapter 8 Application-Aware Routing Policies

The Business Imperative for Application-Aware Routing

The Mechanics of an App-Route Policy

Constructing an App-Route Policy

Monitoring Tunnel Performance

Liveliness Detection

Hello Interval

Multiplier

Path Quality Monitoring

App-Route Poll Interval

App-Route Multiplier

Mapping Traffic Flows to a Transport Tunnel

Packet Forwarding with Application-Aware Routing Policies

Traditional Lookup in the Routing Table

SLA Class Action

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

Chapter 9 Localized Policies

Introduction to Localized Policies

Localized Control Policies

Localized Data Policies

Quality of Service Policies

Step 1: Assign Traffic to Forwarding Classes

Step 2: Map Forwarding Classes to Hardware Queues

Step 3: Configure the Scheduling Parameters for Each Queue

Step 4: Map All of the Schedulers Together into a Single QoS Map

Step 5: Configure the Interface with the QoS Map

Summary

Review All Key Topics

Chapter Review Questions

Chapter 10 Cisco SD-WAN Security

Cisco SD-WAN Security: Why and What

Application-Aware Enterprise Firewall

Intrusion Detection and Prevention

URL Filtering

Advanced Malware Protection and Threat Grid

DNS Web Layer Security

Cloud Security

vManage Authentication and Authorization

Local Authentication with Role-Based Access Control (RBAC)

Remote Authentication with Role-Based Access Control (RBAC)

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

Chapter 11 Cisco SD-WAN Cloud onRamp

Cisco SD-WAN Cloud onRamp

Cloud onRamp for SaaS

Cloud onRamp for IaaS

Cloud onRamp for Colocation

Why Colocation?

How It Works

Service Chaining for a Single Service Node

Service Chaining for Multiple Service Nodes

Service Chaining and the Public Cloud

Infrastructure as a Service

Software as a Service

Redundancy and High Availability

Service Chain Design Best Practices

Configuration and Management

Cluster Creation

Image Repository

Service Chain Creation

Monitoring

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

Chapter 12 Cisco SD-WAN Design and Migration

Cisco SD-WAN Design Methodology

Cisco SD-WAN Migration Preparation

Cisco SD-WAN Data Center Design

Transport-Side Connectivity

Loopback TLOC Design

Service-Side Connectivity

Cisco SD-WAN Branch Design

Complete CE Replacement—Single Cisco SD-WAN Edge

Complete CE Replacement—Dual Cisco SD-WAN Edge

Integration with Existing CE Router

Integration with a Branch Firewall

Integration with Voice Services

Cisco SD-WAN Overlay and Underlay Integration

Overlay Only

Overlay with Underlay Backup

Full Overlay and Underlay Integration

Summary

Review All Key Topics

Chapter Review Questions

Chapter 13 Provisioning Cisco SD-WAN Controllers in a Private Cloud

SD-WAN Controller Functionality Recap

Certificates

vManage Controller Deployment

Step 1: Deploy vManage Virtual Appliance on VMware ESXi
or KVM

Step 2: Bootstrap and Configure vManage Controller

Step 3/4: Set Organization Name and vBond Address in vManage;
Install Root CA Certificate

Step 5: Generate, Sign, and Install Certificate onto vManage Controller

vBond Controller Deployment

Step 1/2/3: Deploy vBond Virtual Machine on VMware ESXi; Bootstrap and Configure vBond Controller; Manually Install Root CA Certificate on vBond

Step 4/5: Add vBond Controller to vManage; Generate, Sign, and Install Certificate onto vBond Controller

vSmart Controller Deployment

Step 1/2/3: Deploy vSmart Virtual Machine from Downloaded OVA; Bootstrap and Configure vSmart Controller; Manually Install Root CA Certificate on vSmart

Step 4/5: Add vSmart Controller to vManage; Generate, Sign, and Install Certificate onto vSmart Controller

Summary

Review All Key Topics

Define Key Terms

Chapter Review Questions

References

Appendix A: Answers to Chapter Review Questions

Appendix B: Example 7-17

Glossary of Key Terms

Index