You are on page 1of 27

Cisco SD-WAN: Cloud SDN Architecture

Cisco SD-WAN: Platform Options


Controllers Deployment Models
Multitenancy
Dedicated tenancy: Each tenant has dedicated components VPN Tenancy: Segments only the data plane of the VPN topology and allows
and the data plane is segmented as well. you to define read-only users who can view and monitor their VPN within
vManage. VPN tenancy still shares the same SD-WAN components.

Enterprise Tenancy: The orchestration and management planes are operating in multi-tenancy mode, but the control plane requires dedicated,
per-tenant appliances. Because the control plane is dedicated, it can be deployed as a container or nested virtual machine to decrease scalability
concerns.
Deploying Controller Certificate Options

• Option 1: Automated Thrid-Party Certificate Signing Through Symantec/Digicert

• Option 2: Manual Third-Party Certificate Signing Through Symantec/Digicert

• Option 3: Automated Certificate Signing Through Cisco Systems

• Option 4: Manual Certificate Signing Through Cisco Systems

• Option 5: Enterprise Root Certificate Authority (CA)


Option 1: Automated Thrid-Party Certificate Signing Through
Symantec/Digicert

• Certificate Signing Request (CSR) is generated for each controller and it is automatically sent to the Symantec/Digicert server.
• A Cisco Technical Assistance Center (TAC) case needs to be opened to complete the signing process.
• After the certificate is signed, vManage automatically retrieves each signed certificate and installs it on the respective controller.
• Note that the root certificate is installed by default on each controller.
Option 2: Manual certificate signing using Symantec/Digicert

• A CSR is generated for each controller and is copied or downloaded locally.


• A separate certificate request for each controller is made manually through the Symantec/Digicert web portal using the CSR generated in the previous step.
• A Cisco TAC case needs to be opened to complete the signing process.
• Once signed, the signed certificates are delivered to the administrator, typically through email.
• The administrator uploads each certificate to vManage and vManage then installs it on the respective controller.
Note that the root certificate is installed by default on each controller.
Option 3: Automated Cisco PKI certificate signing (recommended)

• This option requires vManage version 19.1 at a minimum and is very similar to the automated Symantec/Digicert option except that the certificates are signed by
the Cisco PKI certificate server and a Cisco TAC case does not need to be opened to complete the signing process.
• A CSR is generated for each controller and is automatically sent to the Cisco PKI certificate server.
• After the signing is complete, the vManage automatically retrieves each signed certificate and installs it on the respective controller.
Note that the root certificate is installed by default on each controller.
Option 4: Manual Cisco PKI certificate signin

• This option requires vManage version 19.1 and is very similar to the manual Symantec/Digicert option except that the certificates are signed by the Cisco PKI
certificate server and a Cisco TAC case does not need to be opened to complete the signing process.
• A CSR is generated for each controller and is copied or downloaded locally.
• A separate certificate request for each controller is made manually through the Plug and Play Connect > Certificates portal at https://software.cisco.com, using
the CSR generated in the previous step.
• After the signing is complete, the certificates can be downloaded by the administrator and each certificate is then uploaded to vManage. vManage installs each
certificate on the respective controller.
Note that the root certificate is installed by default on each controller
Option 5: Manual certificate signing using Enterprise CA

• Customers can use their own CA servers to sign controller certficates.


• This method is similar to the manual Cisco PKI certificate signing method as automatic enrollment using Simple Certificate Enrollment Protocol (SCEP) to an
Enterprise CA is not supported.
• In addition, as a first step, the Enterprise CA root certificate is installed on vManage, which can automatically distribute the root certificate to the other
controllers.
• Once a root certificate is installed, a CSR is generated for each controller and is either copied or downloaded locally.
• Separate certificate requests are made for each controller to the Enterprise Root CA, submitting the CSR generated in the previous step.
• Once signed, the generated certificates can be uploaded to vManage by the administrator.
• vManage will install each certificate on the respective controller.
Architecture Example Topology
SD-WAN WAN Edge onboarding options overview
WAN Edge onboarding steps
WAN Edge control connections to different SD-WAN controllers
Cisco IOS-XE WAN Edge onboarding – PnP process vEdge onboarding – ZTP process

Tip: For WAN Edge devices using enterprise root-ca certificates, the device is installed with the root certificates manually before it initiates a connection with the
vBond orchestrator. In the bootstrap onboarding method, the enterprise root-certificate is copied along with the configuration to the WAN Edge device and installed
to successfully onboard the device.
Cisco IOS-XE SD-WAN onboarding – Bootstrap process
WAN Edge onboarding – Manual process
WAN Edge firewall ports
PNP Portal
PnP Portal: Adding Controller Profile
PnP Portal: Adding Controller Profile Settings
PnP Portal: Adding WAN Edge Devices
PnP Portal: Providing Device Details
Syncing with Smart Account
PnP Portal: Downloading vManage License File
show sdwan certificate root-ca-cert.

copy tftp://username:password@WAN-Edge-VPN512- IP-Address/root-ca-chain.pem bootflash:root-ca-chain.pem


vrf Mgmt-intf
request platform software sdwan root-cert-chain install bootflash:root-ca-chain.pem

request download vpn 512 tftp://Admin:C1sco123@100.119.104.249/rootca.crt


vedge# request root-cert-chain install /home/admin/rootca.crt
request vedge_cloud activate chassis-number XXXXXXXX-XXXX-XXXX-XXXX token XXXXXXXXXXXXXXX

Within the output, make sure:


• system parameters are configured to include organization-name and site-id
• certificate-status and root-ca-chain-status are installed Operate 54
• certificate-validity is Valid
• dns-name is pointing to vBond IP address/DNS
• system-ip is configured and chassis-num/unique-id and serial-num/token is available on the device

You might also like