Configure Secure Access for SD-Routing Devices
What is Cisco Secure Access
Cisco Secure Access is a cloud Security Service Edge (SSE) solution that is a convergence of network security services delivered from the cloud to connect a hybrid workforce. This solution provides seamless, transparent, and secure Direct Internet Access (DIA) to users helping them connect from anything to anywhere.
In Cisco IOS XE 17.14.1a, Cisco SSE provides the capability for SD-Routing devices to connect with SSE providers using IPSec tunnels.
Feature | Release Information | Description |
Configure Cisco Secure Access |
Cisco IOS XE Release 17.14.1a |
Cisco Secure Access is a cloud Security Service Edge (SSE) solution that provides seamless, transparent, and secure Direct Internet Access (DIA). This solution can be configured using policy groups in Cisco SD-WAN Manager. |
Restrictions
-
Cisco Secure Access does not support API Throttling
-
After integrating CiscoSecure Access with Cisco SD-Routing, any changes made to the network tunnel group name in Cisco Secure Access dashboard is not reflected in Cisco SD-WAN Manager
Workflow to Set Up Cisco Secure Access
This workflow outlines the high-level steps required to set up Cisco Secure Access. The detailed instructions are covered in the following sections.
Task |
Description |
---|---|
Preliminary configurations on Cisco Secure Access Portal |
|
Check credentials on the portal and ensure that the API credentials have write access. |
Go to and generate and manage API keys.Ensure that you have write access to Tunnel Group and tunnel creation. Having this ensures seamless connection between Cisco Secure Access and the SD-Routing device, after tunnels have been set up and deployed using the SD-WAN Manager. |
Preliminary configurations on Cisco SD-WAN Manager |
|
Ensure that you have created a Configuration Group and assigned it to the SD-Routing device. |
Go to Configuration Groups |
Configure the following using the CLI template available on the SD -WAN Manager. |
Go to Configuration Groups select any SD-Routing config group, click Edit and select the corresponding CLI Profile dialog box. In the Add Feature Profile window, select Create New and enter a name and description followed by the command in the CLI Configuration section. Save it to add this feature parcel. |
|
By doing this you are allowing the device to interact with DNS servers. You can configure any DNS server on the device which connects to HTTPS to get the public IP address. To configure a source interface for HTTPS, use the ip http client source-interface name and number of the interface command on Cisco SD-WAN Manager. |
|
By doing this you are ensuring that multiple private addresses inside a local network get mapped to a public IP address before transferring the information onto the internet. For example, all source addresses of the packets that match access-list nat acl1 will be converted to Loopback 1 IP address when exiting the router.
OR
|
Enable domain look up for the device |
Go to Global Lookup and enable |
SSE related configurations on Cisco SD-WAN Manager |
|
Set up Cloud Provider credentials |
Go to |
Configure source interface address |
Go to |
Create SSE Policy using Policy Groups |
Go to |
Configure Traffic Redirection |
By configuring this, you are creating a service route to redirect traffic through the SSE tunnels Go to Configuration Groups select any SD-Routing config group, click Edit and select the corresponding CLI Profile dialog box. In the Add Feature Profile window, select Create New and enter a name and description followed by the command in the CLI Configuration section. Save it to add this feature parcel. |
Associate the SSE Policy with Policy Group |
Go to Save to associate the SSE Policy with the Policy Group. , select the SSE policy created earlier and clickNext associate this policy group with the device and deploy. |
Verify the SSE Configuration |
Verify the configuration. |
Monitor the SSE Tunnels |
for SSE Tunnels
|
Set up Cloud Provider Credentials
Configure credentials to enable Cisco SD-WAN Manager for automated tunnel provisioning to Cisco SSE.
Procedure
Step 1 | Click Cisco Secure Access and enter the following details. These credentials are used to initiate authentication for a session and are later used in subsequent sessions. enable
| ||||||||
Step 2 | Save these details. |
Configure Loopback Interface as the Source Interface
Configure a loopback interface as source. As this loopback interface is not tied to any interface, there is no risk of interruptions in connections.
Add the following command to the CLI template:
interface loopback1
no shutdown
ip nat inside
ip address 1.1.1.1 255.255.255.255
Create an SSE Policy Using Policy Group
Before you begin
Ensure that you have created the SSE credentials.You can do this on the SD-WAN Manager by going to
and enter the details.Procedure
Step 1 | On the SD-WAN Manager go to Add Secure Service Edge (SSE). . Click on | ||||||||||||||||||||||||||||||||||||||||||||||
Step 2 | Enter a name for the SSE policy and specify the solution type as sd-routing and click Create. | ||||||||||||||||||||||||||||||||||||||||||||||
Step 3 | Create a tracker. While creating automatic tunnels, Cisco SD-WAN Manager creates and attaches a default tracker endpoint with default values for failover parameters. However, you can also create customized trackers with failover parameters that suit your requirements.
| ||||||||||||||||||||||||||||||||||||||||||||||
Step 4 | Create a Tunnel. Click Configuration.
| ||||||||||||||||||||||||||||||||||||||||||||||
Step 5 | Configure High Availability. To designate active and back-up tunnels and distribute traffic among tunnels, click High Availability and do the following:
| ||||||||||||||||||||||||||||||||||||||||||||||
Step 6 | Select the Region: When you choose the region, a pair of primary and secondary region is selected. Choose the primary region that Cisco Secure Service Edge provides from the drop-down list and the secondary region is auto-selected in Cisco SD-WAN Manager. If the primary region with a unicast IP address is not reachable then the secondary region with a unicast IP address is reachable and vice versa. Cisco Secure Access ensures that both the regions are reachable at all times. |
What's next
Create Route-Based Traffic Forwarding
After the tunnels are established, relevant traffic should be forwarded to the tunnels. In Cisco IOS XE 17.14.1a, configure traffic forwarding by using the CLI template to add the following command:
ip sdwan route vrf <network> <subnetmask> service sse Cisco-Secure-Access
Example: ip sdwan route vrf 2 0.0.0.0/0 service sse Cisco-Secure-Access
Associate the SSE Policy with a Policy Group and Deploy the Policy Group to a Device
The SSE policy created earlier needs to be associated with a Policy Group and later associated with a device for the policy to work on that device.
Procedure
Step 1 | On the SD-WAN Manager go to to create a new policy group for sd-routing devices. |
Step 2 | Select the Action button and under Policy select the SSE Policy created earlier from the available policies. |
Step 3 | Click Save to create an association between the SSE Policy and the Policy Group. This association ensures that the SSE policy is now part of the Policy Group. |
Step 4 | Associate the Policy Group to the device. This association ensures that when you deploy this Policy group to a device, the device inherits all the policies associated with this Policy Group. |
Step 5 | Deploy the Policy Group to the device. Your device is now ready to use the SSE tunnels. |
What's next
Verify Cisco Secure Access Tunnels
To view information about the Cisco Secure Access tunnels that you have configured for the SD-Routing device, use the show sse all command.
Device# show sse all
***************************************
SSE Instance Cisco-Secure-Access
***************************************
Tunnel name : Tunnel15000001
Site id: 2678135102
Tunnel id: 617865691
SSE tunnel name: C8K-63a9b72b-f1fa-4973-a323-c36861cf59ee
HA role: Active
Local state: Up
Tracker state: Up
Destination Data Center: 52.42.220.205
Tunnel type: IPSEC
Provider name: Cisco Secure Access
Monitor and Troubleshoot Cisco Secure Access Tunnels from SD-WAN Manager
The following sections show how to identify issues with the SSE tunnels and take corrective measures.
Monitoring SSE Tunnel State Using Cisco SD-WAN Manager
Monitor the state of the SSE tunnels using the following options in Cisco SD-WAN Manager:
-
dashboard to view information about:
-
Down Tunnels
-
Degraded Tunnels: Degraded state indicates that the SSE tunnel is up but the Layer 7 health of the tunnel as detected by the tracker does not meet the configured SLA parameters. Therefore, the traffic is not routed through the tunnel.
-
Up Tunnels
-
-
to view information about :
Data plane tunnels, tunnel end points, and health of the tunnel
Cisco SD-WAN Manager displays a table that provides the following details about each automatic tunnel created to Cisco Secure Access:
Field |
Description |
---|---|
Host Name |
Host name of the SD-Routing device. |
Site ID |
ID of the site where the WAN edge device is deployed. |
Tunnel ID |
Unique ID for the tunnel defined by the SIG/SSE provider. |
Transport Type |
IPSec |
Tunnel Name |
Unique name for the tunnel that can be used to identify the tunnel at both the local and remote ends. On the SSE provider portal, you can use the tunnel name to find details about a particular tunnel. |
HA Pair |
Active or Backup |
Provider |
Cisco Secure Access |
Destination Data Center |
SIG/SSE provider data center to which the tunnel is connected. |
Tunnel Status (Local) |
Tunnel status as perceived by the device. |
Tunnel Status (Remote) |
Tunnel status as perceived by the SIG/SSE endpoint. |
Events |
Number of events related to the tunnel set up, interface state change, and tracker notifications. Click on the number to display an Events slide-in pane. The slide-in pane lists all the relevant events for the particular tunnel. |
Tracker |
Enabled or disabled during tunnel configuration. |
Monitoring and Troubleshooting Using Commands
This section provides details on how to identify and troubleshoot SSE tunnel issues from device commands.
Troubleshooting Using Device Notifications
Accessing the device shell needs a consent token. Consent Token is a security feature that is used to authenticate the network administrator of an organization to access system shell with mutual consent from the network administrator and Cisco Technical Assistance Centre (Cisco TAC).
To view information about a device on which an event was generated use the following steps:
-
Execute the /opt/confd/bin/confd_cli -C -P 3010 -noaaa -g sdwan-oper command. This command gives you access to the shell to run commands to view device notifications.
-
Execute show notification stream viptela command to view the device notifications
Device#show notification stream viptelanotification eventTime 2023-11-09T06:21:19.95062+00:00 sse-tunnel-params-absent severity major host-name vm6 if-name TunnelSSE wan-if-ip 192.1.2.8
Troubleshooting Using Crypto Session Details
Execute show crypto session command to view the crypto session details
Interface: Tunnel15000010
Profile: if-ipsec10-ikev2-profile
Session status: UP-ACTIVE
Peer: 3.76.88.203 port 4500
Session ID: 7
IKEv2 SA: local 10.1.15.15/4500 remote 3.76.88.203/4500 Active
IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0
Active SAs: 2, origin: crypto map
Troubleshooting Using Interface Details
Execute the show interface brief command. This command displays the interface details.
Tunnel15000010 10.1.15.15 YES TFTP up up
Troubleshooting Using Endpoint Tracker Details
Execute the show endpoint tracker command. This command displays all the endpoint tracker details.
Interface Record Name Status Address Family RTT in msecs Probe ID Next Hop
Tunnel16000002 DefaultTracker Up IPv4 22 20 None
Troubleshooting Using Tunnel Details
Execute the show running config|sec sse command. This command displays the tunnel and vrf details.
sse instance Cisco-Secure-Access
ha-pairs
interface-pair Tunnel15000010 active-interface-weight 1 None backup-interface-weight 1
!
ip sdwan route vrf 2 0.0.0.0/0 service sse Cisco-Secure-Access