The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Direct Cloud Access IWAN 2.3 feature enables users at branch sites to have best application experience to SaaS applications,
such as, Office 365, Google services, with reduced cost. This feature helps in constantly monitoring network and application
performance and select the optimized paths (usually local break out from branch to Cloud SaaS applications instead of back-haul
to the data center). Non-SaaS traffic still back-haul to data center for further inspection.
Feature Information for Configuring Direct Cloud Access
The following table provides release information about the feature or features described in this module. This table lists
only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise,
subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco
Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1. Feature Information for Direct Cloud Access IWAN 2.3
Feature Name
Releases
Feature Information
Direct Cloud Access IWAN 2.3
Cisco IOS XE Fuji 16.8.1
The Direct Cloud Access (DCA) feature allows traffic from trusted applications, part of well-trusted domains, to pass the
local Internet security check because traffic from these trusted applications have a lower security risk than untrusted Internet
sites.
The following commands were introduced or modified: domain path, path-preference, show domain dca-status, show domain default border, show domain default policy, show domain vrf border channels, show domain vrf master channels.
Prerequisites for Configuring Direct Cloud Access
NAT:
To enable a host that typically operates in a private network directly communicate with a SaaS application in a public network,
use a NAT. Enable NAT on the same router that has DCA enabled or other devices in the path.
Firewall security:
To improve security, you can enable a firewall, such as a zone-based firewall (ZBFW), in the path.
Note
By default OpenDNS is used as DNS resolver for SaaS traffic, but you can choose to use other DNS resolver such as Google DNS
resolver 8.8.8.8. OpenDNS license/registration is not a must if you don't need OpenDNS security services.
Restrictions for Configuring Direct Cloud Access
IPv6 address is not supported.
DCA is not supported if the DNS traffic does not pass through the router which is enabled with DCA.
DCA does not work if SaaS applications use proxy. All traffic going to proxy server as DCA may not classify these applications
and cannot perform local breakout for traffic that is bound to proxy.
Applications that directly access the content and not through DNS resolution, NBAR may fail to classify as SaaS and cannot
provide local break-out.
DCA may not work on a device when NBAR classification results are not available on the device. You must customize NBAR to
classify the results to support DCA.
This feature depends on applications classification. SD-AVC helps in better classification with NBAR.
To access SaaS applications, a public IP address is required. NAT helps translate the user’s private IP address to a public
IP address. Configure NAT on the border router that has DCA enabled, or on other internet-facing devices.
Information About Configuring Direct Cloud Access
Direct Cloud Access Overview
The infrastructure of cloud-hosted services, such as Microsoft Office 365 and Google Apps, is in the cloud. Back-hauling traffic
from remote users and sites through the private WAN to the data center via Internet imposes additional bandwidth requirements
on the private WAN and may add latency to each connection. Moreover, private WAN connectivity is more expensive than direct
Internet connections, which could add a tremendous amount of cost to the equation.
The Direct Cloud Access IWAN 2.3 feature implements direct cloud access (DCA) on Cisco IWAN networks and allows trusted SaaS
traffic to be forwarded out over the optimized path (directly local break out) while other traffic still back-haul to headquarters
over VPN. DCA monitors the candidate path (DCA path, back-haul path to headquarter) performance and chooses the optimized
path in policy to get the best SaaS application performance. While adding direct Internet connectivity to the branch site
without back hauling to data center, IWAN DCA provides the security capability at branch site by enabling security features
like NAT and Firewall (Zone-based Firewall, Snort IPS, etc.) at branch sites.
Features
DCA features include:
Automatic configuration of Cisco Umbrella Connector (supported from Cisco IOS XE Gibraltar 16.10.1)
Support for policy configured on a centralized hub, or per-site customized local policy
Customized local policy overrides global plicy.
If a hub connection goes down, local policy remains in effect.
Support for P2P interface, such as dialer interface, as DCA interface
Benefits of Direct Cloud Acces
Reduced operation cost as SaaS traffic no longer needs to go to headquarters which consume additional headquarter network
bandwidth.
Business processes run faster through direct network access to the major cloud providers. A traffic classification mechanism
is required in order to achieve direct Internet access for selected cloud applications.
Direct Cloud Access Architecture
The overlay DMVPN WAN tunnels on a branch router are configured to dynamically learn the service provider they are connected
to. An underlay interface is identified as a direct access interface via configuration.
Packets from the LAN side on a branch site are sent over the overlay when packets do not match the criteria of the configured
application. When a flow matches the DCA criteria, the packets are directed to the DCA interface that is specified in the
path preference. DCA interfaces can be listed in the order of priority in the path preference configuration of the policy
for the application. The DCA interfaces are evaluated in the order of the configured path preference priority.
NBAR classification occurs at LAN ingress. NBAR provides the application ID, which is exported by the border router. If a
match occurs on the Master Controller for an application, the policy for the application is applied to the traffic class for
the specific flow.
The following figure explains the DCA functionality for Office365 application:
The following actions are performed to achieve DCA functionality:
Classify all the cloud applications based on the DNS.
Intercept DNS traffic and make decisions based on the classification.
If the traffic is from a trusted application, direct Internet access is provided. Ensure that security concerns are addressed
for the breakout traffic, which include, constant application monitoring, choosing network performance over candidate paths
(DCA path, back-haul path), selecting the optimized path according to policy (if DCA path is not good), back-hauling SaaS
traffic to data center and reverting back if DCA path recovered.
If the traffic is not from a trusted application, the traffic is passed it to the Headquarter for further security inspection
and processing.
Route HTTP, HTTPS data traffic to Internet or Headquarter depending on the above decision.
Designate an Underlay Interface as Direct Access Interface
An interface of the border router must be designated as direct access interface. domain pathpath-namedirect-cloud-access command to specify the direct access interface. A service provider may have multiple links of direct access and each of the
direct access interface is measured independently.
When an interface is selected to be the direct access interface, all traffic to the whitelisted applications is directed through
the direct access interface. If there are multiple direct access interfaces, the traffic is directed on one direct access
interface depending on the performance metrics and policy.
Direct Cloud Access Components
Direct Cloud Access functionality has the following components:
Cisco Umbrella Connector
To achieve location proximity, the SaaS server must be closer to the branch router to achieve better application performance.
Generally, DNS requests for a SaaS application are destined to an enterprise DNS resolver. However, the DNS request must be
changed from enterprise DNS resolver to a public DNS resolver, such as, OpenDNS resolver or Google DNS resolver. The public
DNS resolver helps in placing the SaaS server closer to the branch router by using Cisco Umbrella connector. OpenDNS account
and registration is not mandatory.
DNS requests must be unencrypted traffic from the endpoint to the DNS server. Each direct access interface must be configured
with Open DNS.
NBAR Classification
Network Based Application Recognition (NBAR) is a classification engine that recognizes and classifies a wide variety of protocols
and applications. NBAR uses several classification information metadata such as application name, ID, traffic class, business
relevance, and so on.
For Direct Cloud Access functionality, once NBAR recognizes the DNS traffic as belonging to interesting cloud application,
it attaches this information to DNS packet in a way so that the umbrella connector feature can extract and use the information.
Cisco NBAR provides the first packet classification for some applications. Cisco NBAR uses DNS learning for application recognition
of user defined and predefined domains, Once the server is learned from the DNS response, traffic going to this server can
be classified as FIFO. SD-AVC also improves the first packet classification result.
Performance Routing Version 3
Performance Routing version 3 (PfRv3) delivers intelligent path control for application-aware routing across the WAN. Once
a DNS response is received, the data traffic (HTTP, HTTPS etc.) from cloud application is provided direct Internet access
(local break-out) or is sent to the headquarter for further security inspection.
IPSLA
IPSLA is enabled automatically by PfRv3 to probe each SaaS application over candidate paths by using IPSLA HTTP operation.
PfRv3 leverages the metrics reported by IPSLA to select the optimized path.
SaaS Reachability and Performance Management
Performance and reachability of each whitelisted application determines the path that an application takes. PfR measures the
reachability and performance of all VRFs and enables and shares one measurement across multiple VRFs.
Next-Hop Reachability
One DSCP-agnostic channel is created as the next-hop for the direct access interface. The DSCP of DCA channel is configured
as FF. The routing protocol configured on the direct access interface determines the next hop for the channel.
Performance Measurement
After the channel next hop is up, the service is reached via next hop by using the following steps:
Application Domain Mapping
Application to domain URL and Differentiated Services Code Point (DSCP) mapping must be configured on the master controller
of each branch router so that IPSLA can measure the SaaS application using right domain and DSCP.
Reachability and Performance Probing
Measuring network characteristics is performed using IPSLA. IPSLA probes are not sent per VRF, instead, PFR creates a probing
layer for all the VRFs and path preferences in the VRFs in a domain. Reachability and performance can be verified per application
by using the show domain domain-nameborder dca command. This command provides information per application, per interface for a border router.
Traffic Steering and Flow Stickiness
When DCA is implemented on a network, traffic classes are automatically created for interested applications. The applications
configured in the policy includes path preferences, which corresponds to the respective DSCP configured per application.
When selecting a path, PfR assigns a path to a flow that is destined to a service, for example, Offic365. These flows might
traverse a NAT device or a firewall device that maintains the state for the flow sequence numbers. Changing the flow during
packet traversal may lead to flow reset. Therefore, when a path is selected, flows must align to that path only. If a path
is unreachable, the flow is reset by the client and retried. If the path experiences packet loss but still usable, new flows
are routed via alternate paths.
Local Policy Configuration
Direct Cloud Access (DCA) policy can be configured on a centralized hub, or it can be configured on any individual site as
a customized local policy. To configure local DCA policy, use the policy local type DCA command.
Customized local policy overrides global policy.
If a hub connection goes down, local policy remains in effect.
Example of Local Policy Configuration
policy local type DCA
class DCA sequence 4
match application ms-cloud-group saas-dca
path-preference DCA1 fallback DCA2
How to Configure Direct Cloud Access
Assign an Underlay Interface as Direct Access Interface
The following configuration snippet explains how to assign an Ethernet interface as direct access interface.
Define PfR Policy for SaaS Application on Hub Master Controller
The following configuration snippet explains how SaaS application policies are defined on hub master controller at a central
point and published to all branch sites. There is no need to define policies at each branch sites because branch sites still
have the capability to customize the interested SaaS.
Router(config)# domain iwan Router
Router(config-domain)# vrf green
Router(config-domain-vrf)# master hub
Router(config-domain-vrf-master)# class BUSINESS-CRITICAL sequence 10
Router(config-domain-vrf-master-class)# match app-group ms-cloud-group policy custom
Router(config-domain-vrf-master-class-match)# priority 1 delay 500 ms
Router(config-domain-vrf-master-class-match)# exit
Router(config-domain-vrf-master-class)# path-preference ATT-DCA fallback ATT next-fallback INET
Define SaaS Application Mapping on Branch Master Controller
To measure the SasS application’s reachability and performance, the domain URL and DSCP must be specified for IPSLA probing
for each SaaS application.
Use HTTP ping to probe a specific SaaS to determine reachability and performance. The system has built-in default URL domains
for popular SaaS applications. For a complete list, use show domain xxx master dca domain-map.
Note
If there are multiple VRFs, IP SLA probing is performed for all domains defined for each VRF and the same IP SLA ID is used
for each domain group in the VRF.
If a desired SaaS is not included in the list, create a domain map for the service in PfRv3. For example, to add Servicenow:
By default, DNS requests for white-listed SaaS are intercepted by Umbrella, and the OpenDNS resolver is used to achieve location
proximity.
Optionally, configure a specific DNS resolver, either on a hub master controller or on an specific branch master controller.
Configuring a DNS resolver on a specific branch overrides, for that branch, the DNS resolver configured on the hub.
Hub
Use the following on a hub master controller to configure a DNS resolver for all DCA branches.
The HTTP ping probe uses a default probe interval of 30 seconds.
Optionally, you can configure a specific interval on the hub master controller, which applies the change to all DCA branches,
or to a branch master controller, to change the interval for a specific branch.
Hub
Use the following on a hub master controller to configure the interval for all DCA branches.
Use the following on a branch master controller to configure the interval for a specific branch. The branch setting overrides
a setting made at the hub.
Verify and Monitor Direct Cloud Access Configuration
Use the following commands to verify and monitor DCA configuration.
show domain iwan master traffic-classes summary
show domain iwan master traffic-classes detail
show domain iwan master traffic-classes dca detail
show domain iwan master traffic-classes dca application
show domaindomain-nameborder dca
Displays information about reachability and metrics collected for all paths towards a service. This command helps in understanding
the behavior of various paths for a service and how PFR is selecting the best paths depending on the metrics.
Displays the default policy on the master controller.
Device# show domain default master policy
No Policy publish pending
--------------------------------------------------------------------------------
class SOCIAL-NETWORKING sequence 11
class type: Application Based
match application skype policy custom
priority 1 delay threshold 500 msec
To troubleshoot, use debug domain default master dca and debug domain default border dca commands.
Configuration Examples for Configuring Direct Cloud Access
Example: Configure DCA Link on a Single Branch Router
Overview
In this example, DCA is configured on Cisco IWAN network with a single branch router as shown in the following topology.
Umbrella Service
Beginning with Cisco IOS XE Gibraltar 16.10.1, the Umbrella service configuration is automatic.
Underlay Interface
DCA is configured on WAN underlay interface in order to distinguish tunnel WAN interface.
interface GigabitEthernet0/0/3 ! INET branch WAN DCA interface
domain iwan path DCA1 direct-cloud-access
umbrella out
Optionally, a second DCA can be created as WAN underlay interface.
The policy can be local or from a centralized hub master controller. Configure a hub master controller as follows:
Note
Configure only one master controller, either at a hub site or a branch site.
domain default
vrf default
master hub
class DCA sequence 4
match application ms-cloud-group saas-dca
path-preference DCA1 fallback DCA2
Branch 1 and Master Controller Configuration
A branch site can serve as master controller instead of a hub site. In this example, Branch 1 serves as master conroller.
The configuration includes LAN interface and WAN (DCA) interface.
Note
Configure only one master controller, either at a hub site or a branch site.
interface GigabitEthernet3.30
description B1MCBR-LAN
encapsulation dot1Q 30
ip address 10.20.0.1 255.255.255.0
ip nat inside
Assigning the DCA to a WAN interface:
interface GigabitEthernet2.30
encapsulation dot1Q 30
ip vrf forwarding fvrf
ip address 10.20.1.1 255.255.255.0
ip nat outside
domain path DCA2 direct-cloud-access
Verifying the Configuration
The following commands are used to verify the configuration. To verify OpenDNS configuration, use the show umbrella deviceid and show umbrella configuration commands.
router# show umbrella deviceid
Device registration details
Interface Name Tag Status Device-id
GigabitEthernet3.64 inside-network 200 SUCCESS 010a3d458c172b8b
router# show umbrella configuration
Umbrella Configuration
========================
Token: 7772166EF2E473ADE8FA2204B37D0BD7001FE4F5
OrganizationID: 2090229
Local Domain Regex parameter-map name: dns_bypass
DNSCrypt: Enabled
Public-key: B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
UDP Timeout: 5 seconds
Resolver address:
1. 208.67.220.220
2. 208.67.222.222
3. 2620:119:53::53
4. 2620:119:35::35
Umbrella Interface Config:
Number of interfaces with "umbrella out" config: 2
1. GigabitEthernet0/0/0
Mode : OUT
VRF : IWAN-TRANSPORT-2(Id: 3)
2. GigabitEthernet0/0/1
Mode : OUT
VRF : IWAN-TRANSPORT-1(Id: 2)
Number of interfaces with "umbrella in" config: 1
1. GigabitEthernet3.64
Mode : IN
DCA : Enabled
Policy Name: umbrella-direct-access
Tag : lan064
Device-id : 010a3d458c172b8b
VRF : global(Id: 0)
To verify the DCA configuration, use the following commands:
show domain iwan border dca
show domain iwan master dca status
show domain iwan master traffic-classes summary
show domain iwan master traffic-classes detail
show ip sla summary
show ip sla configuration
show ip sla statistics
show flow monitor name flow-monitor cache format table
Use the show ip sla summary, show ip sla configuration, and show ip sla statistics commands to verify the probe functions.
Use the show flow monitor command to verify that the flow is passes through the DCA path.
Router# show domain iwan master traffic-classes summary
APP - APPLICATION, TC-ID - TRAFFIC-CLASS-ID, APP-ID - APPLICATION-ID
Current-EXIT - Service-Provider(PFR-label)/Border/Interface(Channel-ID)
UC - UNCONTROLLED, PE - PICK-EXIT, CN - CONTROLLED, UK - UNKNOWN
Dst-Site-Pfx Dst-Site-Id State DSCP TC-ID APP-ID APP Current-Exit
DCA Internet CN default[0] 30 9424 ms-cloud-group DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 29 4478 ms-lync-group DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 28 8388 hangouts-group DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 27 4692 gtalk-group DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 26 4456 google-group DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 25 218104328 google-service DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 21 50349148 dropbox DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 20 218104882 box DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
DCA Internet CN default[0] 17 218103890 youtube DCA1(0:0|0:0)/10.255.241.31/Gi0/0/3(Ch:6)
Router# show domain iwan border dca
[*] PFR created IP SLA entry ID
IPSLA DNS Resolver:208.67.220.220
App DSCP RTT/ms DCA2 MPLS1
thresh Gi0/0/2 Tu10 (0:1)
RTT/ms[*] RTT/ms[*]
share-point default 1000 7 [31] --
youtube default 1000 78 [33] --
box default 1000 7 [39] --
dropbox default 1000 3 [41] --
google-services default 1000 108 [49] --
google-group default 1000 109 [51] --
gtalk-group default 1000 112 [53] --
hangouts-group default 1000 115 [55] --
ms-lync-group default 1000 6 [57] --
ms-cloud-group default 1000 7 [59] --
Router# show domain iwan master traffic-classes detail
Dst-Site-Prefix: DCA Application: ms-cloud-group DSCP: default [0] Traffic class id:30 app_id:9424
Clock Time: 22:13:32 (UTC) 01/17/2018
TC Learned: 4d23h ago
Present State: CONTROLLED
Current Performance Status: not monitored (internet)
Current Service Provider: DCA1 since 4d23h
Previous Service Provider: Unknown
BW Used: 0 bps
Present WAN interface: GigabitEthernet0/0/3 in Border 10.255.241.31
Present Channel (primary): 6 DCA1 pfr-label:0:0 | 0:0 [0x0]
Backup Channel: 4 DCA2 pfr-label:0:0 | 0:0 [0x0]
Destination Site ID: Internet
DNS Primary Channel: 6 DCA1 pfr-label:0:0 | 0:0 [0x0]
DNS Backup Channel: 4 DCA2 pfr-label:0:0 | 0:0 [0x0]
Class-Sequence in use: 55
Class Name: saasapp using policy User-defined
priority 1 one-way-delay threshold 500 msec
BW Updated: - ago
Method for choosing channel: Random
Reason for Latest Route Change: Uncontrolled to Controlled Transition
Route Change History
Router# show ip sla sum
ID Type Destination Stats Return Last
Code Run
-----------------------------------------------------------------------
*1255 http 216.58.217.164 RTT=198 OK 30 seconds ago
*1256 http 216.58.217.164 RTT=184 OK 30 seconds ago
*1257 http 216.58.217.164 RTT=219 OK 30 seconds ago
*1258 http 216.58.217.164 RTT=219 OK 30 seconds ago
*1259 http 13.107.7.190 RTT=76 Http Error 30 seconds ago
Router# show ip sla config 1255
Entry number: 1255
Type of operation to perform: http
Target address/Source address: 216.58.217.164/172.16.1.1
Target port/Source port: 80/0
Type Of Service parameters: 0x0
Vrf Name: IWAN-TRANSPORT-2
HTTP Operation: get
HTTP Server Version: 1.0
URL: http://www.google.com
Proxy:
Raw String(s):
Cache Control: enable
Owner:
Tag:
Operation timeout (milliseconds): 30000
Schedule:
Operation frequency (seconds): 60 (not considered if randomly scheduled)
Next Scheduled Start Time: Start Time already passed
Group Scheduled : FALSE
Randomly Scheduled : FALSE
Life (seconds): Forever
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
Status of entry (SNMP RowStatus): Active
Threshold (milliseconds): 20000
Distribution Statistics:
Number of statistic hours kept: 2
Number of statistic distribution buckets kept: 1
Statistic distribution interval (milliseconds): 20
History Statistics:
Number of history Lives kept: 0
Number of history Buckets kept: 15
History Filter Type: None
Router# show ip sla statistics 1255
IPSLA operation id: 1255
Latest RTT: 179 milliseconds
Latest operation start time: 19:09:14 UTC Fri Jan 26 2018
Latest operation return code: OK
Latest DNS RTT: 6 ms
Latest TCP Connection RTT: 62 ms
Latest HTTP Transaction RTT: 111 ms
Number of successes: 29
Number of failures: 0
Operation time to live: Forever
Router# show flow monitor Monitor-FNF-IWAN cache format table | i office
54.209.129.73 172.31.1.2 80 62102 Gi0/0/0 Input 6 layer7 ms-office-365 0.0.0.0 /30 Null 4 0x00
172.31.1.2 52.109.2.14 5110 443 Gi0/0/2.101 Output 6 layer7 ms-office-web-apps 172.31.1.1 /0 Gi0/0/0 7 0x00
10.30.32.200 104.91.217.163 50319 443 Gi0/0/2.101 Input 6 layer7 ms-office-365 172.31.1.1 /0 Gi0/0/0 9 0x00
172.31.1.2 208.67.222.222 52262 53 Null Output 17 layer7 ms-office-365 172.31.1.1 /30 Gi0/0/0 1 www.office.com 0x00
10.30.32.200 104.91.188.182 50341 443 Gi0/0/2.101 Input 6 layer7 ms-office-365 172.31.1.1 /0 Gi0/0/0 11 0x00
10.30.32.200 104.91.188.182 50310 443 Gi0/0/2.101 Input 6 layer7 ms-office-365 172.31.1.1 /0 Gi0/0/0 11 0x00
172.31.1.2 52.109.2.14 5108 443 Gi0/0/2.101 Output 6 layer7 ms-office-web-apps 172.31.1.1 /0 Gi0/0/0 8 0x00
Example: Configure DCA Link on a Dual Branch Router
Overview
In this example, DCA is configured on Cisco IWAN network with a dual branch router as shown in the following topology.
The policy can be local or from a centralized hub. This example illustrates the use of a local policy in a non-IWAN scenario.
Branch 1 and Master Controller Configuration
A branch site can serve as master controller instead of a hub site. In this example, Branch 1 serves as master conroller.
The configuration includes LAN interface and WAN (DCA) interface.
Note
Configure only one master controller, either at a hub site or a branch site.
domain default
vrf default
border
master local
master branch
source-interface Loopback0
hub l00.20.1.1
policy local type DCA
class DCA sequence 4
match application ms-cloud-group saas-dca
path-preference DCA1 fallback DCA2
LAN interface configuration:
interface GigabitEthernet3.30
description B1MCBR-LAN
encapsulation dot1Q 30
ip address 10.20.0.1 255.255.255.0
ip nat inside
Assigning the DCA to a WAN interface:
interface GigabitEthernet2.30
encapsulation dot1Q 30
ip vrf forwarding fvrf
ip address 10.20.1.1 255.255.255.0
ip nat outside
domain path DCA1 direct-cloud-access
Branch 2 Configuration
This branch configuration includes LAN interface and WAN (DCA) interface.
interface GigabitEthernet3.30
description B1MCBR-LAN
encapsulation dot1Q 30
ip address 10.20.0.1 255.255.255.0
ip nat inside
Assigning the DCA to a WAN interface:
interface GigabitEthernet2.30
encapsulation dot1Q 30
ip vrf forwarding fvrf
ip address 10.20.1.1 255.255.255.0
ip nat outside
domain path DCA2 direct-cloud-access
Example: Configuring Umbrella Branch for OpenDNS
Overview
Beginning with Cisco IOS XE Gibraltar 16.10.1, DCA configures the Cisco Umbrella Connector automatically on the router. However,
it is still possible to configure Umbrella manually.
For example, if it is necessary to validate OpenDNS, you must configure Cisco Umbrella Connector on the branch, as shown in
the example below.
Procedure
Configure the DNS server, setting the router's clock and time zone correctly.
ip domain name cisco.com
ip host api.opendns.com 67.215.92.210
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use
these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products
and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password.