Use the VPN Interface SVI template to configure SVI for Cisco IOS XE Catalyst SD-WAN devices. You configure a switch virtual interface (SVI) to configure a VLAN interface.
To configure DSL interfaces on Cisco routers using Cisco SD-WAN Manager templates, create a VPN Interface SVI feature template to configure VLAN interface parameters.
Create VPN Interface SVI Template
-
From the Cisco SD-WAN Manager menu, choose .
-
In Device Templates, click Create Template.
Note
|
In Cisco vManage Release 20.7.x and earlier releases, Device Templates is titled Device.
|
-
From the Create Template drop-down, choose From Feature Template.
-
From the Device Model drop-down, choose the type of device for which you are creating the template.
-
If you are configuring the SVI in the transport VPN (VPN 0):
-
Click Transport & Management VPN, or scroll to the Transport & Management VPN section.
-
Under Additional VPN 0 Templates, click VPN Interface SVI.
-
If you are configuring the SVI in a service VPN (VPNs other than VPN 0):
-
Click Service VPN, or scroll to the Service VPN section.
-
In the Service VPN drop-down list, enter the
number of the service VPN.
-
Under Additional VPN Templates, click VPN Interface SVI.
-
From the VPN Interface SVI drop-down, click
Create Template. The VPN Interface SVI template
form is displayed.
The form contains fields for naming the template, and fields for defining VLAN Interface parameters.
-
In Template Name, enter a name for the template. The name can be up to 128 characters and can contain only alphanumeric characters.
-
In Template Description, enter a description of the template. The description can be up to 2048 characters and can contain only alphanumeric characters.
When you open a feature template initially, for each parameter that has a default value, the scope is set to Default (indicated
by a check mark), and the default setting or value is shown. To change the default or to enter a value, click the scope drop-down next to the parameter field.
Note
|
To get the SVI interface up and functional, ensure that the appropriate VLAN is explicitly configured on the Switch Port Access
or Trunk interface.
|
Configure Basic Interface Functionality
Table 5. Feature History
Feature Name
|
Release Information
|
Description
|
Support for Configuring Secondary IP Address
|
Cisco IOS XE Catalyst SD-WAN Release 17.2.1r
|
You can configure up to four secondary IPv4 or IPv6 addresses,
and up to four DHCP helpers. Secondary IP addresses can be
useful for forcing unequal load sharing between different
interfaces, for increasing the number of IP addresses in a LAN
when no more IPs are available from the subnet, and for
resolving issues with discontinuous subnets and classful routing
protocol.
|
To configure basic VLAN interface functionality in a VPN, choose Basic Configuration and configure the following parameters. Parameters marked with an asterisk are required to configure an interface.
Table 6.
Parameter Name
|
Description
|
Shutdown*
|
Click No to enable the VLAN interface.
|
VLAN Interface Name*
|
Enter the VLAN identifier of the interface. Range: 1 through 1094.
|
Description
|
Enter a description for the interface.
|
IP MTU
|
Specify the maximum MTU size of packets on the interface. Range: 576 through 1500. Default: 2000 bytes
|
IPv4* or IPv6
|
Click to configure one or more IPv4 of IPv6 addresses for the
interface. (Beginning with Cisco IOS XE SD-WAN Release
17.2.)
|
IPv4 Address*
IPv6 Address
|
Enter the IPv4 address for the interface.
|
Secondary IP Address
|
Click Add to enter up to four secondary IP
addresses. (Beginning with Cisco IOS XE SD-WAN Release
17.2.)
|
DHCP Helper*
|
Enter up to eight IP addresses for DHCP servers in the network to
have the interface be a DHCP helper. Separate each address with
a comma. A DHCP helper interface forwards BOOTP (Broadcast) DHCP
requests that it receives from the specified DHCP servers.
Click Add to configure up to four DHCP
helpers. (Beginning with Cisco IOS XE SD-WAN Release 17.2, for
IPv6.)
|
To save the feature template, click Save.
Apply Access Lists
To apply a rewrite rule, access lists, and policers to a router interface, choose ACL and configure the following parameters:
Table 7.
Parameter Name
|
Description
|
Ingress ACL – IPv4
|
Click On and specify the name of the
access list to apply to IPv4 packets being received on the
interface.
|
Egress ACL – IPv4
|
Click On and specify the name of the
access list to apply to IPv4 packets being transmitted on the
interface.
|
Ingress Policer
|
Click On and specify the name of the
policer to apply to packets being received on the interface.
|
Egress Policer
|
Click On and specify the name of the
policer to apply to packets being transmitted on the
interface.
|
To save the feature template, click Save.
Configure VRRP
To have an interface run the Virtual Router Redundancy Protocol (VRRP), which allows multiple routers to share a common virtual
IP address for default gateway redundancy, choose VRRP. Then click Add New VRRP and configure the following parameters:
Table 8.
Parameter Name
|
Description
|
Group ID
|
Enter the virtual router ID, which is a numeric identifier of the virtual router. You can configure a maximum of 24 groups. Range: 1 through 255
|
Priority
|
Enter the priority level of the router. There router with the highest priority is elected as the primary router. If two Cisco IOS XE Catalyst SD-WAN devices have the same priority, the one with the higher IP address is elected as the primary one. Range: 1 through 254 Default: 100
|
Timer
|
Specify how often the primary VRRP router sends VRRP advertisement messages. If the subordinate routers miss three consecutive
VRRP advertisements, they elect a new primary router. Range: 1 through 3600 seconds Default: 1 second
|
Track OMP
Track Prefix List
|
By default, VRRP uses of the state of the service (LAN) interface on which it is running to determine which Cisco IOS XE Catalyst SD-WAN device is the primary virtual router. if a Cisco IOS XE Catalyst SD-WAN device loses all its WAN control connections, the LAN interface still indicates that it is up even though the router is functionally
unable to participate in VRRP. To take WAN side connectivity into account for VRRP, configure one of the following:
Track OMP—Click On for VRRP to track the Overlay Management Protocol (OMP) session running on the WAN connection. If the primary VRRP router
loses all its OMP sessions, VRRP elects a new default gateway from those that have at least one active OMP session.
Track Prefix List—Track both the OMP session and a list of remote prefixes, which is defined in a prefix list configured on
the local router. If the primary VRRP router loses all its OMP sessions, VRRP failover occurs as described for the Track OMP
option. In addition, if reachability to all of the prefixes in the list is lost, VRRP failover occurs immediately, without
waiting for the OMP hold timer to expire, thus minimizing the amount of overlay traffic is dropped while the Cisco IOS XE Catalyst SD-WAN device determines the primary VRRP router.
|
IP Address
|
Enter the IP address of the virtual router. This address must be
different from the configured interface IP addresses of both the
local Cisco IOS XE Catalyst SD-WAN device and the peer running VRRP.
|
Add ARP Table Entries
To configure static Address Resolution Protocol (ARP) table entries on the interface, choose ARP. Then click Add New ARP and configure the following parameters:
Table 9.
Parameter Name
|
Description
|
IP Address
|
Enter the IP address for the ARP entry in dotted decimal notation or as a fully qualified host name.
|
MAC Address
|
Enter the MAC address in colon-separated hexadecimal notation.
|
To save the ARP configuration, click Add.
To save the feature template, click Save.
Configure Other Interface Properties
To configure other interface properties, choose Advanced and configure the following properties:
Table 10.
Parameter Name
|
Description
|
TCP MSS
|
Specify the maximum segment size (MSS) of TPC SYN packets passing through the Cisco IOS XE Catalyst SD-WAN device. By default, the MSS is dynamically adjusted based on the interface or tunnel MTU such that TCP SYN packets are never fragmented.
Range: 552 to 1460 bytes Default: None
|
ARP Timeout
|
Specify how long it takes for a dynamically learned ARP entry to time out. Range: 0 through 2678400 seconds (744 hours) Default: 1200 (20 minutes)
|
To save the feature template, click Save.