The CCR is a virtual router that delivers comprehensive WAN gateway and network services into virtual and cloud environments.
The CCR enables enterprises to extend their WANs into provider-hosted clouds. Two CCRs are required for Cisco Cloud APIC solution.
The type of CCR used with the Cisco Cloud APIC varies depending on the release:
For releases prior to release 25.0(3), the Cisco Cloud Services Router 1000v is used with the Cisco Cloud APIC. For more information on this type of CSR, see the Cisco Cloud Services Router 1000v documentation.
Beginning with release 25.0(3), Cisco Cloud APIC moves from the Cisco Cloud Services Router 1000v to the Cisco Catalyst 8000V.
Following are updates that are specific to the Cisco Catalyst 8000V.
Cisco Cloud APIC makes use of the “Cisco DNA Advantage” subscription. For features supported by the “Cisco DNA Advantage” subscription, see
Cisco DNA Software SD-WAN and Routing Matrices.
Throughput
For the BYOL Licensing model, the Cisco Catalyst 8000V supports tier-based (T0/T1/T2/T3) throughput options. The following
table lists what AWS EC2 instance is used for different router throughput settings for the Cisco Catalyst 8000V:
CCR Throughput
AWS EC2 Instance
T0 (up to 15M throughput)
c5.xlarge
T1 (up to 100M throughput)
c5.xlarge
T2 (up to 1G throughput)
c5.xlarge
T3 (up to 10G throughput)
c5.9xlarge
Tier2 (T2) is the default throughput supported by Cisco Cloud APIC.
The following table shows the mapping of throughput from the older Cisco Cloud Services Router 1000v routers to the newer
Cisco Catalyst 8000V routers:
Throughput on Cisco Cloud Services Router 1000v
Throughput on Cisco Catalyst 8000V
10M
T0 (up to 15M throughput)
50M
T1 (up to 100M throughput)
100M
T1 (up to 100M throughput)
250M
T2 (up to 1G throughput)
500M
T2 (up to 1G throughput)
1G
T2 (up to 1G throughput)
2.5G
T3 (up to 10G throughput)
5G
T3 (up to 10G throughput)
7.5G
T3 (up to 10G throughput)
10G
T3 (up to 10G throughput)
Private IP Address Support for Cisco Cloud APIC and CCR in AWS
(注)
For Azure, support for private IP addresses for Cisco Cloud APIC and CCRs became available in release 5.1(2). AWS の場合、このサポートはリリース 5.2(1) 以降で利用できます。
For AWS, prior to release 5.2(1), Cisco Cloud Router (CCR) interfaces were assigned both public and private IP address by
Cisco Cloud APIC. Beginning with release 5.2(1), CCR interfaces are assigned private IP addresses only and assignment of public IP addresses
to CCR interfaces is optional. Private IP addresses are always assigned to all the interfaces of a CCR. The private IP address
of GigabitEthernet1 of a CCR is used as BGP and OSPF router IDs.
To enable CCR private IP addresses for inter-site connectivity, where you are disabling public IP addresses for the CCR interfaces,
see the Cisco Cloud APIC GUI を使用したリージョンの管理(クラウド テンプレートの設定) procedure.
AWS の場合、リリース5.2(1)よりも前は、Cisco Cloud APIC の管理インターフェイスにパブリック IP アドレスとプライベート IP アドレスが割り当てられていました。リリース5.2(1)以降、プライベートIPアドレスはの管理インターフェイスに割り当てられ、パブリックIPアドレスの割り当てはオプションです。Cisco Cloud APICCisco Cloud APIC へのパブリック IP を無効にして、プライベート IP アドレスが接続に使用されるようにするには、Cisco Cloud APIC for AWS Installation Guide、Release 5.2(1) 以降の「AWS での Cisco Cloud APIC」手順を参照してください。
Restrictions for CCR with Private IP Address
パブリック IP が無効になっている場合、パブリック インターネットにはパブリック IP アドレスが必要なため、アンダーレイのサイト間接続をパブリック インターネットにすることはできません。アンダーレイのサイト間接続は、次のいずれかになります。
AWS Direct Connect または Azure Express Route を介した、オンプレミスの ACI サイトに接続するためのプライベート接続
Communicating to External Sites From Regions Without a CCR
Prior to release 5.2(1), for traffic to pass through to an external site, the region where the traffic is passing through
must have a CCR deployed. The CCR advertises the CIDRs that are local to that region. If an EPG in a region has a contract
with an external site, then that region must have a CCR deployed in order to communicate with that external site.
Beginning with release 5.2(1), you can now have communication with an external site from regions without a CCR. This is accomplished
by making use of the AWS Transit Gateway feature, which became available for Cisco Cloud APIC in release 5.0(1). When you enable the AWS Transit Gateway feature on Cisco Cloud APIC, you also enable peering between all managed regions on AWS. In this way, the AWS Transit Gateway peering feature allows
the Cisco Cloud APIC to address the issue of communicating with external sites from regions without a CCR. It addresses this issue by having traffic
rerouted to a region with a CCR.
Using the AWS Transit Gateway feature, when traffic from a region without a CCR tries to egress out of a site, this traffic
will be routed to the infra VPC for the closest region with a CCR. After the traffic is rerouted to that region's infra VPC,
that CCR is used to egress out the packet. For ingress traffic, packets coming from an external site can reach any region's
CCR and then be routed to the destination region using the AWS Transit Gateway peering in the ingress data path.
In these situations, traffic is rerouted automatically when the system recognizes that external traffic is egressing or ingressing
through a region without a CCR. However, you must have the following components configured in order for the system to automatically
perform this rerouting task:
CCRs must be deployed in at least one region. Even though this enhancement allows you to communicate with an external site
from a region that does not contain a CCR, in order to do this, you must have another separate region that does contain a CCR so that traffic can be rerouted from the region without a CCR to the region with a CCR.
The following figure shows an example scenario where traffic is rerouted automatically when the system recognizes that external
traffic is egressing from a region without a CCR.
The following occurs when the Cisco Cloud APIC recognizes that Region 2 does not have a CCR, but traffic is egressing out to an external site (shown with the green arrow
and circles):
Traffic flow begins egressing out from the CIDR in App-1 in Region 2 to a remote site. Note that the endpoint is configured
with the appropriate outbound rule to allow the remote site CIDR.
The VPC 2 egress route table has the remote site CIDR, which then has the AWS Transit Gateway as the next hop. The AWS Transit
Gateway information is programmed automatically based on the configured contracts.
A 0.0.0.0/0 route is inserted in the AWS Transit Gateway route table, which essentially tells the system to take the AWS Transit
Gateway peering attachment if traffic is egressing out to an external site but there is no CCR in this region. In this situation,
the AWS Transit Gateway peering attachment goes to another region that does have a CCR (Region 1 in the example scenario).
The region with a CCR that will be used is chosen based on geographical proximity to the region that does not have a CCR.
The packet is first forwarded to the infra VPC in the region with the CCR (Region 1), and is then forwarded to the gigabit
ethernet network interface on the CCR that is associated with the appropriate VRF group.
The gigabit 2 inbound security group on the CCR in Region 1 is configured to allow traffic from the remote region VPC.
It's useful to note that in the egress example shown above:
For steps 1 and 2, there is no change from pre-release 5.2(1) behavior.
Step 3 is behavior that is new and unique to this feature in release 5.2(1), where the redirect occurs to the TGW peering
attachment from the region without a CCR to the region with a CCR. In addition, step 3 occurs on the AWS cloud.
Steps 4 and 5 would normally occur in Region 2 before release 5.2(1), but only if Region 2 had a CCR. However, because Region
2 does not have a CCR, with this feature in release 5.2(1), these steps are taking place in Region 1 where a CCR is present.
The following figure shows an example scenario where traffic is rerouted automatically when the system recognizes that external
traffic is ingressing to a region without a CCR.
The following occurs when the Cisco Cloud APIC recognizes that Region 2 does not have a CCR, but traffic is ingressing in from an external site to a CIDR in App-1 in Region
2 (shown with the blue arrow and circles):
Normally, the CCR in Region 1 would only advertise the CIDRs that are local to that region. However, with this enhancement
that is part of release 5.2(1), all CCRs in all regions now advertise CIDRs from all remote regions. Therefore, in this example,
the CCR in Region 1 will also advertise the CIDRs that are in Region 2 (assuming AWS Transit Gateway peering is configured
between both regions and the contracts are configured correctly). In this situation, the traffic ingresses in from an external
site to the CCR in Region 1, where the CCR in Region 1 advertises the static route for the remote region VPC CIDRs.
The infra route table (the AWS Transit Gateway route table in Region 1) has the next hop to the AWS Transit Gateway peering
attachment to Region 2.
It's useful to note that in the ingress example shown above:
Both steps (steps 1 and 2) in the ingress example shown above are new and unique to this feature in release 5.2(1).
Step 1 in the ingress example shows configurations programmed on the CCR.
Step 2 in the ingress example occurs on the AWS cloud.
Support for ECMP Forwarding from Remote Sites for CCRs
CCRs in a cloud will typically receive more than one path for a prefix. Prior to release 5.2(1), there was no support for
data forwarding from CCRs using Equal Cost Multiple Path (ECMP), even though the CCR receives multiple paths.
Beginning with release 5.2(1), support is now available for ECMP with CCRs, where traffic from CCRs will be forwarded to all
ECMP paths received from a destination site. このサポートはリリース 5.2(1) で自動的に有効になり、このサポートを有効にするために手動で設定する必要はありません。
Preference For Routes to CCRs in Regions with Local CIDRs
構成されているすべての CIDR は、特定のリージョンに対してローカルです。With multiple regions in a cloud, CCRs from all regions advertise the CIDRs for redundancy.
Prior to release 5.2(1), CCRs from all regions advertised the CIDRs with the same preference. これにより、リモート クラウド サイトまたはオンプレミス
サイトが、CIDR がローカルではないリージョンを介して CIDR へのパスをインストールする可能性があります。これにより、パケットが必要以上に長い経路をたどる可能性があります。
Beginning with release 5.2(1), CCRs from multiple regions will continue to advertise the CIDRs, but CCRs from the region where
the CIDR is local will advertise with a higher preference. これにより、オンプレミス サイトまたはリモート クラウド サイトは、CIDR がローカルであるリージョンにトラフィックを直接送信します。If
the CCRs in the local region fail, the paths from the other regions can be used for data forwarding.