Options to Integrate Your Devices with Secure Internet Gateways
To integrate Cisco Catalyst SD-WAN edge devices with a SIG, you can use:
-
Automatic tunnels
-
Manual tunnels
Automatic Tunnels
Using the Secure Internet Gateway (SIG) feature template, you can provision automatic IPSec tunnels to Cisco Umbrella SIGs, or automatic IPSec or GRE tunnels to Zscaler SIGs.
Provision an automatic tunnel as follows:
-
Complete the following prerequisites for the SIG:
-
Specify Cisco Umbrella or Zscaler credentials using the SIG Credentials feature template.
-
Specify the details for the tunnel to the SIGs using the Security Internet Gateway (SIG) feature template.
In the template, define the parameters for the tunnels such as the interface name, the source interface, the SIG provider, and so on.
-
Edit the VPN feature template that provides the service route for the devices to the internet. Add a service route to the SIG in the VPN feature template.
-
Add feature templates to the device templates of the devices that should route traffic to the SIG.
-
Attach the device templates to the devices.
When you attach the device template, the device sets up tunnels to the SIGs and redirects traffic to it.
Cisco Umbrella Integration
From Cisco SD-WAN Release 20.1.1 and Cisco vManage Release 20.2.1, use Cisco Umbrella as a SIG by choosing Umbrella as the SIG provider in the Security Internet Gateway (SIG) feature template, and then define IPSec tunnels, and tunnel parameters. Use the SIG credentials feature template to specify the Umbrella Organization ID, Registration Key, and Secret. For information on configuring automatic tunnelling, see Configure Automatic Tunnels Using Cisco SD-WAN Manager.
Cisco Umbrella Multi-Org Support
Minimum releases: Cisco IOS XE Release 17.11.1a and Cisco vManage Release 20.11.1
The Cisco Catalyst SD-WAN Umbrella for SIG support security policy requirements for different sub-regions of their SD-WAN network. This feature is supported for both DNS security policy and SIG templates.
Although Cisco Umbrella's individual dashboards can only support a single domain, the multi-org feature allows you to view and manage multiple domains or logically separate network segments from a particular dashboard. The multi-org setup is suitable for organizations that are highly distributed across different locations where networks are all connected, but where different regions require different security policies. The multi-org feature is also helpful for networks with more than one Active Directory (AD) domain, whether within an AD or logically separate domains.
Zscaler Integration
You can integrate Cisco Catalyst SD-WAN edge devices to Zscaler SIGs by provisioning automatic IPsec tunnels between the edge devices and the SIGs.
From Cisco SD-WAN Release 20.5.1 and Cisco vManage Release 20.5.1, you can provision automatic IPSec tunnels to Zscaler Internet Access (ZIA) Public Service Edges using the Security Internet Gateway (SIG) feature template. ZIA Public Service Edges are secure internet gateways that can inspect and secure traffic from Cisco Catalyst SD-WAN devices. The devices use Zscaler APIs to create IPSec tunnels by doing the following:
-
Establish an authenticated session with ZIA.
-
Based on the IP address of the device, obtain a list of nearby data centres.
-
Provision the VPN credentials and location using ZIA APIs.
-
Using the VPN credentials and location, create an IPSec tunnel between the ZIA Public Service Edges and the device.
For information on configuring automatic tunnelling, see Configure Automatic Tunnels Using Cisco SD-WAN Manager.
Manual Tunnels
You can create a GRE or IPSec tunnel to a third-party SIG or a GRE tunnel to a Zscaler SIG by defining the tunnel properties in the Secure Internet Gateway (SIG) feature template.
Provision manual tunnels as follows:
-
Specify the details for the tunnel to the SIG by using the Security Internet Gateway (SIG) feature template.
In the template, define the parameters for the tunnels such as the interface name, the source interface, the SIG provider, and so on.
-
Edit the VPN feature template that provides the service route for the devices to the internet. Add a service route to the SIG in the VPN feature template.
-
Add feature templates to the device templates of the devices that should route traffic to the SIG.
-
Attach the device templates to the devices.
When you attach the device template, the device sets up the defined IPSec or GRE tunnels to the SIG and redirects traffic to it.
High Availability and Load Balancing
When you connect a Cisco Catalyst SD-WAN edge device to Cisco Umbrella, Zscaler, or a third-party SIG, you can connect the device to a primary data center and a secondary data center. Also, you can provision more than one tunnel to each data center.
Active Tunnels: You can provision up to four IPSec tunnels to the primary data center. These tunnels serve as active tunnels, and when two or more active tunnels are provisioned, the traffic toward the SIG is distributed among these tunnels, increasing the available bandwidth toward the SIG. From Cisco SD-WAN Release 20.4.1 and Cisco vManage Release 20.4.1, you can distribute the traffic equally among the active tunnels to achieve an equal-cost multi-path (ECMP) distribution, or assign different weights to the active tunnels so that some tunnels carry more traffic toward the SIG than the others.
Back-up Tunnels: You can provision up to four IPSec tunnels to the secondary data center, one for each active tunnel that you have provisioned to the primary data center. These tunnels to the secondary data center serve as back-up tunnels. When an active tunnel fails, the traffic toward the SIG is sent through the corresponding back-up tunnel. When you provision two or more back-up tunnels, the traffic toward the SIG is distributed among these tunnels, increasing the available bandwidth toward the SIG. From Cisco SD-WAN Release 20.4.1 and Cisco vManage Release 20.4.1, you can distribute the traffic equally among the back-up tunnels to achieve an ECMP distribution, or assign different weights to the back-up tunnels so that some tunnels carry more traffic toward the SIG than the others.
By provisioning two or more active tunnels and distributing the traffic among them, while not provisioning any back-up tunnels, you can create an active-active setup. By provisioning a back-up tunnel for each active tunnel, you can create an active-back-up setup.
Support for Layer 7 Health Check
You can monitor the health of tunnels towards the SIG using trackers attached to the tunnels. These trackers are used to automatically fail over to backup tunnels based on the health of the tunnel.
While creating automatic tunnels, Cisco SD-WAN Manager creates and attaches a default tracker with default values for failover parameters. However, you can also create customized trackers with failover parameter values that suit your SLA requirements.
In the case of manually created tunnels, create and attach the tracker.
The following table summarizes tracker support for automatic and manual tunnels:
Tunnel Type | Default Tracker | Customized Tracker |
---|---|---|
Automatic | Yes |
Yes Minimum releases: Cisco SD-WAN Release 20.5.1 and Cisco vManage Release 20.5.1 |
Manual | No |
Yes Minimum releases: Cisco SD-WAN Release 20.8.1 and Cisco vManage Release 20.8.1 |
The tunnel health is monitored as follows:
-
Based on the configuration in the System feature template, Cisco SD-WAN Manager creates a tracker according to the default or customized failover parameters that you define in the SIG template. This tracker uses VPN 65530. Cisco SD-WAN Manager reserves VPN 65530 for tracker VPNs.
-
The tracker resolves the IP address of the SIG service using VPN 0.
For automatic tunnels to Cisco Umbrella or Zscaler, the tracker uses the following URLs to connect to the SIG:
-
Cisco Umbrella: http://service.sig.umbrella.com
-
Zscaler: http://gateway.zscaler-cloud-url/vpntest
-
-
The device sets up tunnels to the SIG.
-
For each tunnel, the device creates a named TCP socket that it uses to identify the tunnels.
-
The tracker monitors the health of the tunnel using HTTP probes. The tracker calculates the round-trip time (RTT) and compares it to the configured SLA parameters.
-
If the tunnel does not meet the SLA parameters, the tracker marks the tunnel as down.
-
The device updates the routes for any service VPNs that are connected to the tunnel.
Tracker DNS Cache Timeout
Trackers attached to SIG tunnels monitor the corresponding SIG endpoints. A Cisco vEdge device resolves FQDNs of these SIG endpoints through DNS queries and caches the DNS resolved IP addresses. Trackers probe the SIG endpoint IP addresses to determine tunnel health.
The device refreshes the DNS cache containing SIG endpoint IP addresses as follows:
-
Cisco SD-WAN Release 20.7.x and earlier, and Cisco vManage Release 20.7.x and earlier: Configure the DNS cache timeout using the timer dns-cache-timeout command on Cisco SD-WAN Manager in the system configuration mode. Cisco vEdge devices cache DNS resolved SIG endpoint IP addresses for the duration of this timeout. When the cache times out, Cisco vEdge devices refresh the cache through new DNS resolution queries. The default timeout is two minutes.
Note
timer dns-cache-timeout also affects the caching of Cisco SD-WAN Validator IP addresses that the Cisco vEdge devices obtains by resolving FQDNs.
-
Cisco SD-WAN Release 20.8.x and Cisco vManage Release 20.8.x: Cisco vEdge devices refresh cached SIG endpoint IP addresses every 2 hours. The DNS cache timeout is preconfigured and cannot be modified.
-
From Cisco SD-WAN Release 20.9.1 and Cisco vManage Release 20.9.1: Configure the DNS cache timeout using the timer tracker-dns-cache-timeout command on Cisco SD-WAN Manager in the system configuration mode. Cisco vEdge devices cache DNS resolved SIG endpoint IP addresses for the duration of this timeout. When the cache times out, Cisco vEdge devices refresh the cache through new DNS resolution queries. The default timeout is two hours.
When a Cisco vEdge device refreshes the cache, if a SIG endpoint FQDN is resolved to the IP address that was cached earlier, the device does not reset associated counters. In Cisco SD-WAN Release 20.8.x and earlier releases, and Cisco vManage Release 20.8.x and earlier releases, the device resets counters every time that it refreshes the cache. In some scenarios, this automatic resetting of the counters affects tracker behavior and the tracker fails to detect that the health of tunnel has degraded and it must not be used for routing traffic.
Global SIG Credentials Template
Minimum supported release: Cisco vManage Release 20.9.1
In Cisco vManage Release 20.8.x and earlier releases, you must create a SIG Credentials template for a SIG provider (Cisco Umbrella or Zscaler) for each Cisco vEdge model that you wish to connect to the SIG.
From Cisco vManage Release 20.9.1, create a single global SIG Credentials template for a SIG provider (Cisco Umbrella or Zscaler) and attach the template to the required Cisco vEdges, irrespective of the device model. When you attach a SIG feature template that configures automatic SIG tunnels to a device template, Cisco SD-WAN Manager automatically attaches the applicable global SIG Credentials template to the device template.
The Cisco vEdges of your organization connect to Cisco Umbrella or Zscaler using a common organization account with the SIG provider. As such, it is beneficial to configure the organization account credentials on the devices through a global template. When you modify the Cisco Umbrella or Zscaler credentials, update only one global template for the modified credentials to take effect on the attached Cisco vEdges.
Note |
After you upgrade Cisco SD-WAN Manager software from Cisco vManage Release 20.8.x or earlier to Cisco vManage Release 20.9.1 or later, the device-model-specific SIG Credentials templates created in Cisco vManage Release 20.8.x or earlier become read-only. The read-only status allows you to only view the configured credentials. To update the credentials configured in Cisco vManage Release 20.8.x or an earlier release, create a SIG Credentials template for the SIG provider. If you try to create or modify a SIG feature template, Cisco SD-WAN Manager prompts you to create a global SIG Credentials template for the SIG provider. |