Integrate Prisma Access with Cisco Catalyst SD-WAN (Manual Integration)
Focus
Focus
Prisma Access

Integrate Prisma Access with Cisco Catalyst SD-WAN (Manual Integration)

Table of Contents

Integrate Prisma Access with Cisco Catalyst SD-WAN (Manual Integration)

Configure the remote network between the Cisco Catalyst SD-WAN and Prisma Access by completing the steps in the following workflows.
Where Can I Use This?
What Do I Need?
  • Prisma Access (Cloud Management)
  • Prisma Access (Panorama Managed)
  • IP address of the Cisco Catalyst SD-WAN device that you will be using as the other side of the remote network connection
You can configure the IPSec tunnel in Prisma Access before you perform the IPSec tunnel configuration in Cisco Catalyst SD-WAN, formerly known as Viptela SD-WAN.
Cisco Catalyst SD-WAN supports the following deployment architectures for use with Prisma Access. a dash (—) indicates that the deployment is not supported.
Use Case
Architecture
Supported?
Securing traffic from each branch site with 1 WAN link (Type 1)
Yes
Securing branch and HQ sites with active/backup SD-WAN connections
Yes
Securing branch and HQ sites with active/active SD-WAN connections
Yes
Securing branch and HQ sites with SD-WAN edge devices in HA mode
Yes
Securing SD-WAN deployments with Regional Hub/POP architecture (Type 2)
Yes
Before you start, get the IP address of the Cisco Catalyst SD-WAN device that you will be using as the other side of the remote network connection; you enter this information in your IKE Gateway profile.

Cloud Management

    • Choose a
      Prisma Access Location
      that is close to the remote network location that you want to onboard.
    • When creating the IPSec tunnel, use a
      Branch Device Type
      of
      Other Devices
      .
  1. Select
    IPSec Advanced Options
    and
    Create New
    to create a new IPSec crypto profile for the remote network tunnel using the recommended settings.
  2. Select
    IKE Advanced Options
    and
    Create New
    to create a new IKE cryptographic profile for the remote network tunnel.
    Be sure to use crypto values that are supported with Viptela and make a note of the values you use.
  3. Set up routing for the remote network.
    Set Up
    Routing and
    Add
    the IP subnets for Static Routing.
    Choose Static Routing and
    Add
    a subnet. A /30 subnet is sufficient for a Viptela-Prisma Access SD-WAN integration, because you need only two IP addresses for this configuration:
    • 10.10.10.1, which you specified as the IP address for the ge0/4 interface.
    • 10.10.10.2, for which you specify a default route when you configure the remote network connection in Viptela.
  4. Push your configuration changes.
    1. Return to
      Manage
      Service Setup
      Remote Networks
      and select
      Push Config
      Push
      .
    2. Select
      Remote Networks
      .
    3. Push
      your changes.
  5. Make a note of the
    Service IP
    of the Prisma Access side of the tunnel. To find this address in
    Prisma Access (Cloud Management)
    , select
    Manage
    Service Setup
    Remote Networks
    , click the
    Remote Networks
    . Look for the
    Service IP
    field corresponding to the remote network configuration you created.
  6. Complete configuration of the IPSec tunnel.
    1. Return to the IPSec tunnel configuration.
    2. Change
      Local Identification
      to
      IP address
      and add the
      Service IP
      you just retrieved (13.1.1.1 in this example).
      Be sure to make a note of the
      Service IP
      ; you configure this as the peer IP address for the IPSec tunnel between the Viptela SD-WAN device and Prisma Access.

Create a Remote Network Connection in Viptela

Use the following steps to configure the IPSec tunnel in Viptela. The examples in this section use command-line interface (CLI) commands.
This configuration completes the remote network connection between Prisma Access and the Viptela SD-WAN. The following figure shows what you define in the Viptela side:
  • On the LAN side of the Viptela SD-WAN device, create a ge0/0 interface with an IP address of 10.50.50.1. This matches the IP address you specified when you configured the
    IKE Gateway
    in Prisma Access.
    The Viptela SD-WAN performs NAT on the source IP address for the LAN (73.146.228.139).
  • On the remote network tunnel (WAN) side, create an interface named
    ipsec2
    with a type, slot, and port of ge0/4 whose IP address is 10.10.10.1/30.
    This address must be within the subnet range you specified for the
    Branch IP Subnet
    when you onboarded your remote network in Prisma Access. In this example, the administrator specified a
    Branch IP Subnet
    of 10.10.10.0/30 in Prisma Access, and you use the other available IP address (10.10.10.1/30) on the Viptela side of the remote network connection.
  • Specify a
    tunnel-destination
    IP address that matches the Prisma Access
    Service IP
    . This example uses
    13.1.1.1
    .
  • Specify a
    loopback
    IP address that Prisma Access can use for tunnel monitoring.
    In this example, the administrator configured a
    loopback100
    interface with an IP address of 10.1.50.1/32. This value matches the
    Tunnel Monitor
    Destination IP
    address you specified in the
    IPSec Tunnel
    configuration that you configured in Prisma Access.
  1. Open a CLI session with the Viptela SD-WAN device and enter the following commands to define the control plane for the Viptela Overlay Management Protocol (OMP).
    The following commands enable a graceful restart for the OMP and advertise static and connected routes.
    omp no shutdown graceful-restart advertise connected advertise static
  2. Define the security types for the IPSec tunnel.
    The following commands enable the AH-SHA1 HMAC and ESP HMAC-SHA1 authentication types.
    security ipsec authentication-type sha1-hmac ah-sha1-hmac
  3. Configure VPNs to segment the Viptela overlay network.
    The following commands create a VPN
    VPN 0
    named
    Transport VPN
    and associates the
    ge0/4
    interface with this VPN. You use this interface and VPN for the Viptela SD-WAN side of the remote network tunnel (IPSec tunnel) between Viptela and Prisma Access.
    vpn 0 name "Transport VPN" interface ge0/4 ip dhcp-client tunnel-interface encapsulation ipsec color biz-internet allow-service all no allow-service bgp allow-service dhcp allow-service dns allow-service icmp no allow-service sshd no allow-service netconf no allow-service ntp no allow-service ospf no allow-service stun
  4. Enter the
    no shutdown
    command to enable the
    ge0/4
    interface.
  5. Create another VPN named
    VPN 1
    , associate the
    ge0/0
    interface with this VPN, then define parameters for it.
    The following example defines the parameters to allow the Viptela SD-WAN to route traffic from the LAN to its ge0/0 interface.
    vpn 1 interface ge0/0 ip address 10.50.50.1/24 no shutdown dhcp-server address-pool 10.50.50.0/24 exclude 10.50.50.1 offer-time 600 lease-time 86400 admin-state up options default-gateway 10.50.50.1 dns-servers 8.8.8.8 8.8.4.4
  6. Create an interface named
    ipsec2
    and apply it to the
    ge0/4
    interface. These commands define the parameters for the remote network tunnel between the Viptela SD-WAN and Prisma Access.
    Enter the following values:
    • Enter an
      ip address
      to allow the Viptela SD-WAN to route traffic to Prisma Access.
      This address must be within the subnet range you specified for the
      Branch Subnet
      when you onboarded your remote network in Prisma Access. A /30 address is sufficient to allow routing to Prisma Access.
    • Specify the same
      tunnel-source-interface
      that you used for
      VPN 0
      (
      ge0/4
      in this example).
    • Specify a
      tunnel-destination
      using the
      Service IP
      from Prisma Access. This example uses
      13.1.1.1
      as the
      Service IP
      .
    • Make sure that the
      ike
      and
      ipsec
      parameters that you specify match the parameters you specified in Prisma Access.
    • Enter a
      pre-shared-secret
      that matches the
      Pre-shared key
      (PSK) that you entered in Prisma Access. This example uses a PSK of
      secretkey
      .
    interface ipsec2 ip address 10.10.10.1/30 tunnel-source-interface ge0/4 tunnel-destination 13.1.1.1 ike version 1 mode main rekey 14400 cipher-suite aes128-cbc-sha1 group 2 authentication-type pre-shared-key pre-shared-secret secretkey ! ! ! ipsec rekey 3600 replay-window 512 cipher-suite aes256-cbc-sha1
  7. Enter the
    no shutdown
    command on the ipsec2 interface to enable it.
  8. Create a loopback interface to be used for tunnel monitoring.
    interface loopback100 ip address 10.1.50.1/32 no shutdown
  9. Create a default route for the network.
    This route uses the second IP address (
    10.10.10.2
    in this example) of the /30 subnet you used when you onboarded your remote network in Prisma Access. The Viptela side of the network can route to this IP address and uses it as a next hop for routing.
    ip route 0.0.0.0/0 10.10.10.2
  10. Enter a VPN and give it a name.
    vpn 512 name "Transport VPN"
  11. Apply policies for the network.
    policy app-visibility flow-visibility

Troubleshoot the Viptela Remote Network

To troubleshoot problems related to SD-WAN tunnels in Viptela, refer to the Viptela documentation for configuring IPSec tunnels at the following URL: https://www.cisco.com/c/en/us/support/routers/sd-wan/tsd-products-support-series-home.html.
Prisma Access provides logs and widgets that provide you with the status of remote tunnels and the status of each tunnel.
  • Go to
    Manage
    Service Setup
    Remote Networks
    and check the
    Status
    of the tunnel.
  • Go to
    Activity
    Log Viewer
    and check the
    Common/System
    logs for IPSec- and IKE-related messages.
    To view VPN-relates messages, set the filter to
    sub_type.value = vpn
    .
    The message
    ignoring unauthenticated notify payload
    indicates that the route has not been added in the crypto map on the other side of the IPSec tunnel after the IPSec negotiation has already occurred.
  • Check the
    Firewall/Traffic
    logs and view the messages that are coming from the zone that has the same name as the remote network.
    In the logs, the remote network name is used as the source zone.

Panorama

You can configure the IPSec tunnel in Prisma Access before you perform the IPSec tunnel configuration in Cisco Catalyst.
Before you start, get the IP address of the Cisco Catalyst SD-WAN device that you will be using as the other side of the remote network connection; you enter this information in your
IKE Gateway
profile.
  1. In Panorama, add an IPSec crypto profile, IKE crypto profile, IKE gateway, and IPSec tunnel in the
    Remote_Network_Template
    template.
    1. Select
      Network
      Network Profiles
      IPSec Crypto
      and
      Add
      an
      IPSec Crypto Profile
      , specifying supported
      Encryption
      and
      Authentication
      settings; then click
      OK
      .
      Be sure that you have selected the
      Remote_Network_Template
      in the
      Templates
      drop-down at the top of the page.
    2. Select
      Network Profiles
      IKE Crypto
      and
      Add
      an
      IKE Crypto Profile
      specifying supported
      DH Group
      ,
      Encryption
      , and
      Authentication
      settings; then click
      OK
      .
    3. Select
      Network Profiles
      IKE Gateways
      and
      Add
      an
      IKE Gateway
      .

Create a Remote Network Connection in Cisco Catalyst

Use the following steps to configure the IPSec tunnel in Cisco Catalyst. The examples in this section use command-line interface (CLI) commands.
This configuration completes the remote network connection between Prisma Access and the Cisco Catalyst SD-WAN. The following figure shows what you define in the Cisco Catalyst side:
  • On the LAN side of the Cisco Catalyst SD-WAN device, create a ge0/0 interface with an IP address of 10.50.50.1. This matches the IP address you specified when you configured the
    IKE Gateway
    in Prisma Access.
    The Cisco Catalyst SD-WAN performs NAT on the source IP address for the LAN (73.146.228.139).
  • On the remote network tunnel (WAN) side, create an interface named
    ipsec2
    with a type, slot, and port of ge0/4 whose IP address is 10.10.10.1/30.
    This address must be within the subnet range you specified for the
    Branch IP Subnet
    when you onboarded your remote network in Prisma Access. In this example, the administrator specified a
    Branch IP Subnet
    of 10.10.10.0/30 in Prisma Access, and you use the other available IP address (10.10.10.1/30) on the Cisco Catalyst side of the remote network connection.
  • Specify a
    tunnel-destination
    IP address that matches the Prisma Access
    Service IP Address
    . This example uses
    13.1.1.1
    .
  • Specify a
    loopback
    IP address that Prisma Access can use for tunnel monitoring.
    In this example, the administrator configured a
    loopback100
    interface with an IP address of 10.1.50.1/32. This value matches the
    Tunnel Monitor
    Destination IP
    address you specified in the
    IPSec Tunnel
    configuration that you configured in Prisma Access.
  1. Open a CLI session with the Cisco Catalyst SD-WAN device and enter the following commands to define the control plane for the Cisco Catalyst Overlay Management Protocol (OMP).
    The following commands enable a graceful restart for the OMP and advertise static and connected routes.
    omp no shutdown graceful-restart advertise connected advertise static
  2. Define the security types for the IPSec tunnel.
    The following commands enable the AH-SHA1 HMAC and ESP HMAC-SHA1 authentication types.
    security ipsec authentication-type sha1-hmac ah-sha1-hmac
  3. Configure VPNs to segment the Cisco Catalyst overlay network.
    The following commands create a VPN
    VPN 0
    named
    Transport VPN
    and associates the
    ge0/4
    interface with this VPN. You use this interface and VPN for the Cisco Catalyst SD-WAN side of the remote network tunnel (IPSec tunnel) between Cisco Catalyst and Prisma Access.
    vpn 0 name "Transport VPN" interface ge0/4 ip dhcp-client tunnel-interface encapsulation ipsec color biz-internet allow-service all no allow-service bgp allow-service dhcp allow-service dns allow-service icmp no allow-service sshd no allow-service netconf no allow-service ntp no allow-service ospf no allow-service stun
  4. Enter the
    no shutdown
    command to enable the
    ge0/4
    interface.
  5. Create another VPN named
    VPN 1
    , associate the
    ge0/0
    interface with this VPN, then define parameters for it.
    The following example defines the parameters to allow the Cisco Catalyst SD-WAN to route traffic from the LAN to its ge0/0 interface.
    vpn 1 interface ge0/0 ip address 10.50.50.1/24 no shutdown dhcp-server address-pool 10.50.50.0/24 exclude 10.50.50.1 offer-time 600 lease-time 86400 admin-state up options default-gateway 10.50.50.1 dns-servers 8.8.8.8 8.8.4.4
  6. Create an interface named
    ipsec2
    and apply it to the
    ge0/4
    interface. These commands define the parameters for the remote network tunnel between the Cisco Catalyst SD-WAN and Prisma Access.
    Enter the following values:
    • Enter an
      ip address
      to allow the Cisco Catalyst SD-WAN to route traffic to Prisma Access.
      This address must be within the subnet range you specified for the
      Branch Subnet
      when you onboarded your remote network in Prisma Access. A /30 address is sufficient to allow routing to Prisma Access.
    • Specify the same
      tunnel-source-interface
      that you used for
      VPN 0
      (
      ge0/4
      in this example).
    • Specify a
      tunnel-destination
      using the
      Service IP Address
      from Prisma Access. This example uses
      13.1.1.1
      as the
      Service IP Address
      .
    • Make sure that the
      ike
      and
      ipsec
      parameters that you specify match the parameters you specified in Prisma Access.
    • Enter a
      pre-shared-secret
      that matches the
      Pre-shared key
      (PSK) that you entered in Prisma Access. This example uses a PSK of
      secretkey
      .
    interface ipsec2 ip address 10.10.10.1/30 tunnel-source-interface ge0/4 tunnel-destination 13.1.1.1 ike version 1 mode main rekey 14400 cipher-suite aes128-cbc-sha1 group 2 authentication-type pre-shared-key pre-shared-secret secretkey ! ! ! ipsec rekey 3600 replay-window 512 cipher-suite aes256-cbc-sha1
  7. Enter the
    no shutdown
    command on the ipsec2 interface to enable it.
  8. Create a loopback interface to be used for tunnel monitoring.
    interface loopback100 ip address 10.1.50.1/32 no shutdown
  9. Create a default route for the network.
    This route uses the second IP address (
    10.10.10.2
    in this example) of the /30 subnet you used when you onboarded your remote network in Prisma Access. The Cisco Catalyst side of the network can route to this IP address and uses it as a next hop for routing.
    ip route 0.0.0.0/0 10.10.10.2
  10. Enter a VPN and give it a name.
    vpn 512 name "Transport VPN"
  11. Apply policies for the network.
    policy app-visibility flow-visibility

Troubleshoot the Cisco Catalyst Remote Network

To troubleshoot issues in Prisma Access, we provide logs that provide you with the status of remote tunnels and the status of each tunnel. To view these logs in Panorama, select
Monitor
Logs
System
.
To debug tunnel issues, you can filter for tunnel-specific logs by using the object identifier corresponding to that tunnel. The following figures show errors related to tunnel misconfiguration and negotiation issues.

Recommended For You