Introduction

In past few years Branch has become more crucial and independent due to shift in application usage from Datacenter hosted applications to applications hosted in hybrid environment which includes Hybrid Cloud, Internet hosted productivity apps, and Datacenter hosted applications. 

The internet bound productivity traffic is increasing year over year with an estimated increase of 20 to 50 percent per year. Hence, it’s not beneficial to keep central breakout for internet; instead offload the internet bound traffic at the Branch itself. This new use-case also raises concern to tighten the security at the Branch due to increased targets at the access sites.

Versa SD-WAN’s Direct Internet Access (DIA) provides a solution to address this use case scenario. This white paper gives you the confidence to move to DIA and secure your Branch and prepare your organization for future growth and innovations.  


Direct Internet Access

DIA is a component of the Versa solution in which certain Internet-bound traffic or public cloud traffic from the Branch can be routed directly to the Internet. DIA helps reduce IT spending and ensures better application experiences.

In a traditional hub-and-spoke architecture all the traffic is routed to headquarters. The primary advantages of DIA are:

  • Reduced bandwidth requirements at headquarters

  • Fewer network hops, and

  • Reduced latency due to direct routing and better optimization. 

The increased reliability of the Internet for WAN transport makes DIA desirable in Branch deployments.


Sending traffic directly from the Branch to the Internet creates additional security challenges because the traffic bypasses security tools deployed at headquarters. Therefore, you need to deploy security features at the Branch. Security needs at the Branch resemble those at the headquarters, and an enterprise-class protection is required to protect against enterprise-class threats. A full threat defense stack that includes firewall, content security, intrusion detection and prevention, advanced malware protection, and application visibility and control provides the best protection against increasingly sophisticated cyber attacks.


Split Tunnel

Split tunneling allows a Branch to access dissimilar security domains like a public network (e.g., the Internet) and a local LAN or WAN at the same time, using the same or different network connections. Versa leverages the split tunnel mechanism which help the Branch use the same or multiple internet link for both internet as well as VPN traffic.


DIA Use Cases and Optimization Features

These are the DIA optimization feature

  • Branch‐to‐Cloud

  • Branch‐to‐Data Center

  • Application-Based QOS

  • Application-Based SLA and Dynamic Policies

Branch­‐to­‐Cloud         

Traffic may be routed directly via Versa FlexVNF within the branch to cloud applications such as Gmail, Salesforce.com, Office 365.  This traffic may have unique routing policies local to the branch or redundancy and resiliency requirements via MPLS and broadband access links.  Such traffic may also have unique security policy and encryption requirements.  Virtual Private Cloud applications may require tight integration with branch office or core sites.  In such cases, FlexVNF is an ideal traffic management element to handle per flow and endpoint security requirements.

Branch­‐to­‐Data  Center 

Traffic may be routed via Versa FlexVNF in a branch connecting to corporate data center applications such as Exchange server and internal web services.  These applications are likely to have the strictest security and availability requirements due to their mission-critical nature.  FlexVNF enables tight routing policies based on source, destination, application type, latency and jitter requirements.  Optimal paths such as higher cost MPLS links may be preferred when available, but alternate encrypted links such as broadband and LTE may serve as redundant alternatives to ensure business continuity.

Application-Based QOS

An administrator can configure AppQOS policies to ensure preferential treatment to performance-sensitive, well-known or user-defined applications.  Versa FlexVNF automatically detects about 2400 well-known applications based on application signatures or heuristics. Applications can be grouped, tagged, filtered on various parameters.  Custom groups are also supported.

Application-Based SLA and Dynamic Policies

When multiple WAN links are available at a branch site, FlexVNF uses the optimal path that meets the SLA or performance requirements of the application.  SLAs and performance requirements are based on network attributes including latency, packet loss ratio, bandwidth etc.  In the event that none of the WAN links meet the SLA or performance requirements of an application, FlexVNF intelligently discards traffic from non-business critical applications while selectively forwarding traffic associated with the most important applications under strict SLAs. These policies can provisioned in advance and are enforced dynamically.  For example, a Network Administrator may configure a policy to rate-limit YouTube traffic and drop Skype, when business-critical video traffic jitter rises above 1%.


Full DIA Configurations

Refer to these full DIA configurations:

  • Configuring Split Tunnel

  • Configuring CGNAT

  • Configuring Redistribution Policies

Configuring Split Tunnel 

To achieve a split tunnel configuration we create two Tunnel Virtual Interface (Paired TVI). This is significant locally and required for route redistribution between customer LAN-VR and Internet-Transport-VR. 

Follow these steps to configure a paired tunnel interface: 

  1. Select Appliance Context > Configuration > Networking > Interfaces and select Tunnel tab in the dashboard.

  2. Click to add a tunnel interface. This opens the Add Tunnel Interface window.

    This window has these two tabs:

a. Tunnel

b. Pseudo Tunnel

  1. Select the Tunnel tab and enter these details:


Use this field…

to …

Interface

Enter the slot and port number of the tunnel  interface. 

NOTE: A tunnel interface always has a tvi prefix.

Disable

Disable (deactivate) this interface post its configuration.

Description

Enter a brief description of the tunnel  interface and its purpose.

MTU

Maximum transmission unit. The size in bytes of largest protocol data   that the port can receive or transmit.

Mode

Select the mode of configuring the tunnel interface:

  • IPSec—For IPSec configuration.

  • Redundancy—For HA configuration.

Tunnel Type

Select Paired type of tunnel for this interface. This enables the Paired Interface field allowing you to enter the paired port number.

Paired Interface

The tvi address as a paired address. Traffic directed to a paired interface is switched to the parent interface and vice-versa.

Sub-Interface

Select the existing sub-interface and enter these parameters:

  • Unit—Unit number of the sub-interface. If the unit value is 0, VLAN ID is disabled. Else, enter the VLAN ID, which is the virtual LAN ID of the sub-interface.

  • IP Address/Mask—IP address and subnet mask of the sub-interface.


  1. Click OK to save the configuration and create a tunnel interface.

 

Yang Configuration:

interfaces {
tvi-0/602 {
description "WAN side Split Tunnel interface between Internet1 and Tenant-LAN-VR";
enable true;
type paired;
paired-interface tvi-0/603;
unit 0 {
enable true;
family {
inet {
address 169.254.0.2/31;
}
}
}
}
tvi-0/603 {
description "LAN side Split Tunnel Interface between Internet1 and Tenant-LAN-VR";
enable true;
type paired;
paired-interface tvi-0/602;
unit 0 {
enable true;
family {
inet {
address 169.254.0.3/31;
}
}
}
}
}


These TVI interfaces are also added to the interface list the tenant using for  traffic identification


Configuring CGNAT 

Versa FlexVNF supports full carrier-grade NAT (CGNAT) features.  Carrier-grade NAT is a scalable NAT technique that enables bulk translation of traffic between addressing domains and translating diverse addressing space into consolidated flows separated based on IP ports.  Scalable NAT within branch sites enables traffic to originate with addressing local to that branch site, ensuring reverse path traffic traverses the same links.  Without local NAT within FlexVNF sites, selective routing via Internet links would still be subject to reverse path routing via primary corporate Internet routes.

Versa FlexVNF nodes within branch sites may be configured to breakout Internet-bound traffic locally.  Internet-bound traffic may be routed via shared WAN and/or separate dedicated links for Internet traffic. If there is no local Internet breakout link available, traffic may be routed toward any other branch where Internet breakout is enabled.  Site-specific routing is enabled through traffic steering policies.  For those enterprises that prefer to have Internet connectivity routed centrally FlexVNF provides elastic and scalable CGNAT within core sites.

Follow these steps to configure a CGNAT:

  1. Select Appliance Context > Configuration > Services > CGNAT and select an Organization entity. The dashboard displays these two tabs:

    1. Pools

    2. Rules

  2. Select the Pools tab and click  to add a new CGNAT pool. This opens the Add CGNAT Pool window. 

        

 

Enter these details in the Add CGNAT Pool window:

Use this field…

to …

General tab

Name

Specify the name of the CGNAT Pool.

 NOTE: You can create multiple CGNAT Pools.

 

Description

Specify a brief description of the CGNAT Pool and its purpose.

Tags

Specify a keyword or phrase that allows you to filter the CGNAT Pool profile..

Timeout

Specify the protocol timeout :

  • ICMP—The default is set to 60 seconds. You can change this to specify a new timeout.

  • TCP—The default is set to 7440 seconds. You can change this to specify a new timeout.

  • UDP—The default is set to 300 seconds. You can change this to specify a new timeout.

IP Address tab

IP Address/ Range

Select this to specify IP address or IP address range with which you want to NAT the ingress traffic. 

This enables the IP Address/Mask section and the IP Address Range section.

Egress Network

Select this to specify the IP address and the egress network name with which you want to NAT the traffic. 

This enables the IP Address/Mask section and the Egress Network section.

IP Address/Mask

Click to add the IP address that you want to pool.

Egress Network

Click to select the egress network name from the drop down field.

NOTE: This field in enabled only when you select the Egress Network option.

IP Address Range

Specify the IP address range:

  • Range Name—Specify a name for the IP address range.

  • Low—Specify the lower range of the the IP addresses.

  • High—Specify the upper range of the the IP addresses.

Click to add this range to the CGNAT.

Address Allocation Scheme

Select the scheme that allocates one port from each address in a range. 

Routing Instance

Select a corresponding routing instance for the mentioned IP address/egress network with which you want to NAt the ingress traffic.

Provider Org

Select a provider organization. On completion of NATing the traffic is directed to the configured routing instance and provider organization.

Port tab

Destination Port

Select this and enter these values:

  • Low Port—Specify the lower port value.

  • High Port—Specify the upper port value.

Source Port—Select this to enter the source port.

Allocation Scheme

Select this to allocates one port from each address in a range. These are the options: 

  • Automatic port from range.

  • Automatic port assignment—Specify the Low Port value and the High Port value

Allocate IP/Port Randomly

Select this to allocate the IP/Port randomly.

Preserve Source Port Range

Select this to preserve source port range.

Preserve Source Port Parity

Select this to preserve the source port parity.

Port Block Allocation

Select this to block port allocation.

Block Timeout

Specify the timeout limit for the block.

Block Size

Specify the block size.

Max Block Per User

Specify the maximum block per user.


  1. Select the Rules tab and click to add a new CGNAT pool. This opens the Add CGNAT Rule window. 

        

Enter these details in the Add CGNAT Rule window:

Use this field…

to …

General tab

Name

Specify the name of the CGNAT Pool.

 NOTE: You can create multiple CGNAT Rules.

 

Description

Specify a brief description of the CGNAT Rule and its purpose.

Tags

Specify a keyword or phrase that allows you to filter the CGNAT Rule profile..

Precedence

Specify priority to the rule. You can configure multiple rules and assign each a priority. The increasing order of priority is 1 > 2 > 3. Rules with a higher priority take precedence over the ones with a lower priority.

Match tab—Configures the criteria to select traffic for translation. You can define the match criteria based on one or a combination of these:

Source

Source Zones

Matches packets from these zones only. Click to add the source zones from the list.

IP Address/Mask

Click to add the source IP address.

Routing Instance

Select the routing instance of the incoming packet.

IP Address Range

Click and specify the IP address range. Enter the lower range and higher range. 

Destination

Destination Zones

Matches packets to these zones only. Click to add the destination zones from the list.

IP Address/Mask

Click  to add the IP address/port.

Low Port

Specify the low port.

High Port

Specify the high port.

IP Address Range

Click and specify the IP address range. Enter the lower range and higher range. 

Protocol

Specify the protocol used for match criterion.

Action tab

Destination Port

Select this and enter these values:

  • Low Port—Specify the lower port value.

  • High Port—Specify the upper port value.

Source Port—Select this to enter the source port.

Allocation Scheme

Select this to allocates one port from each address in a range. These are the options: 

  • Automatic port from range.

  • Automatic port assignment—Specify the Low Port value and the High Port value

Allocate IP/Port Randomly

Select this to allocate the IP/Port randomly.

Preserve Source Port Range

Select this to preserve source port range.

Preserve Source Port Parity

Select this to preserve the source port parity.

Port Block Allocation

Select this to block port allocation.

Block Timeout

Specify the timeout limit for the block.

Block Size

Specify the block size.

Max Block Per User

Specify the maximum block per user.

  1. Click OK.

 

Yang Configuration:

cgnat {
pools {
DIA-Pool-Internet1 {
routing-instance Internet1-Transport-VR;
egress-network [ Internet1 ];
source-port {
random-allocation;
}
}
}
rules {
DIA-Rule-Tenant-LAN-VR-Internet1 {
from {
destination-zone [ L-ST-Tenant-LAN-VR-Internet1 ];
}
then {
translated {
translation-type napt-44;
source-pool DIA-Pool-Internet1;
filtering-type none;
mapping-type none;
}
}
}
objects {
zones {
# after RTI-Internet2-Zone
W-ST-Tenant-LAN-VR-Internet1 {
interface-list [ tvi-0/602.0 ];
}
L-ST-Tenant-LAN-VR-Internet1 {
interface-list [ tvi-0/603.0 ];
}
}
}
}
}


      

Configuring Redistribution Policies

We create BGP peering between the TVI and redistribute the static (default) route from Internet-Transport-VR.

Follow these steps to configure a BGP:

  1. Select the Director Context > Config Templates > Networking to configure the PNIC/VNIC.

  2. Select a Staging Template from the list box that is just below the Director Context list box.

  3. Select the Networking > Virtual Routers from the left panel.

        
  1. Click to configure a virtual router. This opens the Configure Virtual Router window.

  2. Select the BGP section in the Configure Virtual Router window and click  to open the Add BGP Instance window. 

           BGP (Border Gateway Protocol) is a protocol for exchanging routing information between gateway hosts in a network. BGP is often the protocol used between gateway hosts on the internet.

a. Select the General tab and enter these details:

Use this field…

to …

Description

Enter a brief description of the interface and its purpose.

Instance ID

Assign an ID for the BGP Instance. A router can have multiple instances of BGP.

Router ID

Specify the IP address of the router.

Local AS

Specify the local Autonomous System number for the BGP.

Peer AS

Specify the peer Autonomous System number for the BGP.

Local Address

Specify the IP address of the BGP instance.

Hold Time

Specify the hold time to negotiate with a peer.

TTL

Specify the time to live. This configures the number of hops a packet travel in a network.

Password

Specify the password to authenticate the BGP instance.

Local Network Name

Select the local area network to which the BGP instance belongs. This field lists the names of user-defined networks.

IBGP Preference

Specify the preference value given to the IBGP learnt routes. 

EBGP Preference

Specify the preference value given to the EGP learnt routes. 

Passive

Select this to enable the BGP to only accepts traffic and not to transmit routes.

Remove All Private AS#

Select this to advertise all the private autonomous system numbers before transmitting routes.

Route Reflector Client

Select this to enable the BGP router to  functions as a route reflector and broadcasts the routes of all the other routers in the network, instead of each router broadcasting its own route. 

NOTE:This parameter applies to an IBGP setup.

Family

Select the type of protocol. These are the options:

  • Family—Select the type of protocol. These are the options:

    • IPv4 Unicast—Applicable to BGP.

    • IPv4 Versa Private—Applicable to SD-WAN.

    • IPv4 Layer 3 VPN Unicast—Applicable to Layer 3 VPN.

    • IPv6 Unicast—Applicable to BGP.

    • IPv6 VPN Unicast—Applicable to BGP.

  • Loop—This family is considered a loop if the number of neighboring AS is more than this loop value. 

  • Prefix Limit—Specifies the maximum number of prefixes that a BGP instance can receive per session from its peer.     


Click OK to save the General configuration.

b. Select the Advanced tab and enter these details: 

Use this field…

to …

Cluster ID

Specify the cluster ID of the reflector clients.

Path Selection

Always Compare MED

Select this to enable the router to send routes to another router. A route with a lower MED (Multi Exit Discriminator) is given priority.

Cisco-Nondeterministic

Select this enable the routing of table path selection.

The active path is always first. All non-active, but eligible paths follow the active path and are maintained in the order in which they are received, with the most recent path first. Ineligible paths remain at the end of the list.

When a new path is added to the routing table, path comparisons are made without removing from consideration those paths that should not be selected because those paths lose the MED tie-breaking rule. 

Enable BFD

Select this to mark the link as down whenever the BFD is down.    

Minimum Receive Interval

Specify the time interval,  in milliseconds, to mark the link as down if the routing updates are not received.

Multiplier

Specify the value to compute the final minimum receive interval. Minimum receive interval is multiplied with this value to get the time interval.

Minimum Transmit Interval

Specify the Time interval at which BGP instances communicate with each other.

Route Flap Option

Free Max Time

Specify the maximum time to remember an assigned penalty to the router. A penalty is assigned to a router when its routes go up and down.

Reuse Max Time

Specify the time corresponding to the last reuse list.

Reuse Size

Specify the number of reuse lists.

Reuse Array Size

Specify the size of the reuse index arrays.

Enable Graceful Restart—Select this to allow the BGP to restart when it goes down.

Maximum Restart TIme

Specify the maximum time limit, in seconds, the BGP requires to restart and come up.

Stalepath Time

Specify the maximum time, in seconds, the BGP waits before removing the stale routes from a neighbor after a restart of the neighbors session.

Recovery Time

Specify the estimated recovery time after a restart.

Defer Time

Specify the maximum time, in seconds, for a BGP process to wait performing a route session after a local restart.

Dynamic Peer Restart Time

Specify a minimum time, in seconds, for the dynamic peers to reconnect after the restart of the BGP process.

Family

Enter these values:

  • Family—Select the type of protocol. These are the options:

    • IPv4 Unicast—Applicable to BGP.

    • IPv4 Versa Private—Applicable to SD-WAN.

    • IPv4 Layer 3 VPN Unicast—Applicable to Layer 3 VPN.

    • IPv6 Unicast—Applicable to BGP.

    • IPv6 VPN Unicast—Applicable to BGP.

  • Forwarding State Bit—Enable forwarding of routes.


Click OK to save the Advanced configuration.

c. Select the Prefix List tab and click   to open the Add BGP Instance > Add Prefix List  window. Enter these details:    

Use this field…

to …

Prefix List Name

Specify the prefix list name. 

Prefix lists are used in the peer group policy to change the attributes of routes and allow or deny advertising routes to the peer routers.

Click   to open the Add BGP Instance > Add Prefix List > Add Sequence window. Enter these details:

Sequence Number

Specify the order or sequence number of the prefix list.

Action

Select one of these action on the routes:

  • Permit—Select this to allow routes on this prefix list.

  • Deny—Select this to deny routes on this prefix list.

Address Family

Select the broadcast family protocol of the route.  Select one of these:

  • IPv4

  • IPv6

SAFI

Select the sub-address family indicator. 

IP Address

Specify an IP address to group the routes used for with this prefix list.

  • IP Address/Mask—Specify the IP address of the route.

  • Min Prefix Length—Specify the minimum prefix length to match; the acceptable range is <25-32>.

  • Max Prefix Length—Specify the maximum prefix length to match; the acceptable range is <25-32>. 


Click OK to configure Prefix List.

d. Select the Peer/Group Policy tab. 

              A peer/group policy is defined to manipulate routes defined in the prefix list. You can change the route attributes and allow or deny advertising these routes to the peers. 

            Click   to open the Add BGP Instance > Add Peer/Group Policy window and enter these details.

Use this field…

to …

Name

Specify the peer/group policy name.

Click  to open the Add BGP Instance > Add Peer/Group Policy > Add Term window and enter these details.

Term Name

Specify the policy term name. Term entities are executed in the order they are listed in the Term Name table. 

Match tab

Family

Select the routes protocol family. Select one from these protocols:

  • IPv4 Family

  • IPv4 VPN Family

  • IPv6 Family

  • IPv6 VPN Family

  • Versa-Private Family

AS Path

Specify the autonomous system (AS) path action.

Metric

 

NLRI

Select the Network Layer Reachability Information (NLRI) of the prefix list to be matched. It displays the user-defined prefix lists.

Source Address

Select the source address of the prefix list to be matched. It displays the user-defined prefix lists.

Next Hop

Select the IP address of the prefix list to be used as the next hop. It displays the user-defined prefix lists

Community

Applicable to BGP protocol.

This identifies and segregates BGP routes to enable a smooth traffic flow.

A BGP community is a group of destinations with a common property. This is a path attribute in BGP update messages. The attribute identifies community members and performs actions at a group level, instead of an individual level.

Extended Community

Applicable to BGP protocol.

This identifies label for BGP routes. Yo ucan group a larger number of destinations as an extended community than in a community.

Origin

Select the source of the route. The options are:

  • Remote IGP

  • Local EGP

  • Unknown Heritage

Action tab

Accept/Reject

Select to either accept or reject the route.

Origin

Select the source of the route. These are the options:

  • Remote IGP

  • Local EGP

  • Unknown Heritage        

Next Hop

Specify the IP address of the next hop.

Local Preference

Specify the BGP attribute used to choose the outbound external BGP path.

AS Path

Select a regular expression to match the AS-path for the route. Select one of these:

  • No AS path action.

  • Prepend the local aS path the number of times specified by local as prepend count.

  • Remove All AS numbers matched by match as-path.

  • Remove All AS numbers matched by match-as path and prepend the local AS the number of times specified by local-as-prepend-count.

Local AS Prepend Count

Specify the number of times a local AS number is prepended to the AS path. 

AS Path Prepend

Specify the AS number to an AS path.

Damping

Specify the BGP route-flap damping parameter configuration.

Community Action

Select the regular expression to use when matching the community list for a route. These are the options:

  • Remove all communities from the route.

  • Remove all communities with the value of set community.

  • Remove all communities with the value of set extended community.

  • Append the value of set community into the communities list.

Community

Specify a value to help  identify and segregate BGP routes, enabling a smooth traffic flow.

A BGP community is a group of destinations with a common property. This is a path attribute in BGP update messages. The attribute identifies community members and performs actions at a group level, instead of an individual level.

Extended Community Action

Select an expression to use when matching the extended community list for a route:

  • Community field is ignored.

  • Remove all communities from the route.

  • Remove all communities with the value of set community.

  • Remove all communities with the value of set extended community.

  • Append the value of set community into the communities list.

Extended Community

Specify a value that acts like an identification label for BGP routes. 

 A larger number of destinations can be grouped as an extended community than in a community.

Metric Action

Select an action on the metric value. These are the options:

  • Set Value.

  • IGP.

  • Add.

  • Subtract.

Metric

Specify the metric value for the route.

Slave Action tab—This is applicable in a high availability setup.

Slave AS Path

Select the AS path action when the appliance is an inter-chassis HA slave. These are the options:

  • No AS path action.

  • Prepend the local AS path the number of times specified by local as prepend count.

  • Remove All AS numbers matched by match as-path.

  • Remove All AS numbers matched by match-as path and prepend the local AS the number of times specified by local-as-prepend-count.

Slave Local AS Prepend Count

Specify the number of times a local AS number is prepended to the AS path while the appliance is a inter-chassis HA slave.

Slave AS Path Prepend

Prepend the AS number to an AS path.

Slave Metric Action

Select a metric action to perform. These are the options:

  • Set Value

  • IGP

  • Add

  • Subtract 

Slave Metric

Specify the metric value while the appliance is an inter-chassis HA slave.

Slave Local Preference

Specify the local preference associated with a route. 


Click OK to configure Peer/Group Policy. 

e. Select the Peer Group tab and click  to open the Add BGP Instance > Add Peer Group window to configure BGP peer groups. 

               There can be multiple BGP instances and these can be grouped. Enter these details to define the peer instance attributes:

Use this field…

to …

Name

Specify the name of the peer group.

Description

Enter a brief description of the interface and its purpose.

Type

Select the peer group type. These are the options:

  • IBGP

  • EBGP                            

Peer AS

Specify the peer autonomous system number in number format.

Local Address

Specify the local end address of the BGP session.

Hold Time

Specify the hold time used when negotiating with a peer.

TTL

Specify the number of hops a packet can travel in a network.

Password

Specify the MD5 password for this peer group.

Local Network Name

Select the network to which the peer group belong. Specify the network name or the local address of the peer group.

Local AS

Specify the local autonomous system number.

General 

Family

Select the protocol family of the peer group. These are the options:

  • IPV4 Unicast. Applicable to BGP.

  • IPV4 Versa Private. Applicable to SDWAN.

  • IPV4 VPN Unicast. Applicable to Layer 3 VPN.

Loop

Specify the number of times the local AS is allowed in the received AS path.

For example, if loop is set to a value 5 then Versa FlexVNF allows local AS in received AS path 5 times.

Prefix Limit

Specify the the maximum number of prefixes that a BGP instance can receive per session from its peer.  

Neighbors—Click   to open the Add BGP Instance > Add Peer Group > Add Neighbor window. Enter this details:

Neighbor IP

Specify the neighbor peer group ID.

Peer AS

Specify the autonomous system (AS) number in a number format.

Local Address

Specify the local end address of the BGP session.

Hold TIme

Specify the hold time used when negotiating with a peer.

TTL

Specify the number of hops a packet can travel in a network.

Password

Specify the MD5 password for this neighbor.

Local Network Name

Select the network to which the neighbor peer group belong. Specify the network name or the local address of the peer group.

Local AS

Specify the local autonomous system number.

Description

Enter a brief description of the interface and its purpose.

Neighbors > General tab.

Family

Select the protocol family of the neighbor peer group. These are the options:

  • IPv4 Unicast—Applicable to BGP.

  • IPv4 Versa Private— Applicable to SDWAN.

  • IPv4 VPN Unicast— Applicable to Layer 3 VPN.

Loop

Specify the number of times the local AS is allowed in the received AS path.

Prefix Limit

Specify the the maximum number of prefixes that a BGP instance can receive per session from its peer. 

Neighbor > Advanced tab.

Passive

Enable BGP to accept traffic only and not to transmit any routes.

Remove All Private AS#

Enable the AS to advertise all the private AS numbers before transmitting routes.

Route Reflector Client

Enable the router functions as a route reflector by broadcasting the routes of all the other routers in the network. 

The other routers are connected to the router, which broadcasts the routes of all the routers, instead of each router broadcasting its own route. This is applicable in an IBGP setup.

As Override

Specify the AS numbers to be replaced in the AS Path to be sent to neighbors.

Policy

  • Import—The peer group policy applies updates to outgoing routes.

  • Export—The peer group policy applies updates to incoming routes.

Enable BFD

Indicate the link as down when the peer group goes down.

  • Minimum Receive Interval—Specify the minimum time interval to receive routes.

  • Multiplier—Specify the values used to calculate the final minimum receive interval and minimum transmit interval.

  • Minimum Transmit Interval—Specify the time to at which the BGP instance communicates with each other. 

Allow—Use this tab to define the acceptable peer group routes.  

All

Select all the IP addresses  as acceptable peer group routes.

IP Address/Mask

Click to add IP address of the route that you want to allow.

Advanced

Passive

Enable BGP to accept traffic only and not to transmit any routes.

Remove All Private AS#

Enable the AS to advertise all the private AS numbers before transmitting routes.

Route Reflector Client

Enable the router functions as a route reflector by broadcasting the routes of all the other routers in the network. 

The other routers are connected to the router, which broadcasts the routes of all the routers, instead of each router broadcasting its own route. This is applicable in an IBGP setup.

Next Hop Self

Enable the IP address of the prefix list as the next hop. It displays the user-defined prefix list.

As Override

Specify the AS numbers to be replaced in the AS Path to be sent to neighbors.

Policy

  • Import—The peer group policy applies updates to outgoing routes.

  • Export—The peer group policy applies updates to incoming routes.

Enable BFD

Indicate the link as down when the peer group goes down.

  • Minimum Receive Interval—Specify the minimum time interval to receive routes.

  • Multiplier—Specify the values used to calculate the final minimum receive interval and minimum transmit interval.

  • Minimum Transmit Interval—Specify the time to at which the BGP instance communicates with each other. 


Click OK to configure the BGP Peer Group.

f. Select the Policy Options tab and click to open the Add BGP Instance > Add Damping window to configure dampening policy. Enter these details:


Use this field…

to …

Dampening Name

Specify the name of the dampening policy.

Suppress

Specify the cutoff threshold limit. Routes beyond this level are suppressed.

Maximum Suppress Time (min)

Specify the maximum suppression time of a route.

Reuse

Specify the reuse threshold of a suppressed route.

Half Life Ok (min)

Specify the decay half life time, in minutes, to define the stability of the route while it is still reachable.

Half Life Ng (min)

Specify the decay half life time, in minutes, to define the stability of the route while it is unreachable.

Maximum Time Ok (min)

Specify the maximum time, in minutes, any memory of a previous instability is retained for a reachable route.

Maximum TIme ng (min)

Specify the maximum time, in minutes, any memory of a previous instability is retained for an unreachable route.


Click OK to configure the dampening policy.

 

Yang Configuration:

routing-instances {
Internet1-Transport-VR {
policy-options {
redistribution-policy ST-Policy {
term T1-STATIC {
match {
protocol static;
 }
action {
accept;
set-origin igp;
}
}
}
redistribute-to-bgp ST-Policy;
}
interfaces [ tvi-0/602.0 ];
protocols {
bgp {
3000 {
router-id 169.254.0.1;
local-as {
as-number 64513;
}
group ST_Group {
type external;
neighbor 169.254.0.3 {
local-address 169.254.0.2;
peer-as 64514;
}
}
}
}
}
}


At the same time we ensure the routes do not get leaked to other branches. Hence we match specific community and reject them.

Tenant-Control-VR {
protocols {
 bgp {
 4 {
routing-peer-policy TO_SDWAN {
# first
term Reject_DIA {
match {
community "(^|,)64513:64513($|,)";
}
action {
reject;
}
}
}
}
}
}
}


# Redistribution at the LAN side VR and tagging the DIA routes with higher local preference to ensure routes prefer local DIA breakout. Policies are created so that other sites do not use this Local Breakout to reach internet.

Tenant-LAN-VR {
policy-options {
redistribution-policy Default-Policy-To-BGP {
# first
term T1-Paired-TVI-Direct {
match {
protocol direct;
address 169.254.0.0/16;
 }
action {
reject;
}
}
# after term T2-DIRECT
term T4-BGP {
match {
protocol bgp;
}
action {
accept;
set-origin egp;
 }
 }
}
}
interfaces [ tvi-0/603.0 ];
protocols {
bgp {
3017 {
routing-peer-policy From_ST_Internet1 {
term Color_ST_Routes {
action {
accept;
community 64513:64513;
community-action set-specific;
set-local-preference 120;
}
}
}
routing-peer-policy Import-From-LAN-Policy {
term Reject-SDWAN-Routes {
match {
community "(^|,)8009:8009($|,)";
 }
action {
reject;
 }
}
term Allow-All {
action {
 accept;
}
}
}
routing-peer-policy To_ST_DIA {
term Allow_Local_LAN {
match {
community "(^|,)8009:8009($|,)";
}
action {
reject;
}
}
term Allow_All {
action {
accept;
}
 }
}
router-id 169.254.0.5;
local-as {
as-number 64514;
}
group ST-Group-1 {
type external;
family {
inet {
unicast {
}
}
}
import From_ST_Internet1;
export To_ST_DIA;
local-address 169.254.0.3;
peer-as 64513;
neighbor 169.254.0.2;
}
}
}
}
}
 }


   



DIA for Application Specific Traffic

With Versa FlexVNF, the traffic breakout is controlled as per the use cases in this sample configuration. In this configuration we are restricting the Internet breakout only for few application categories. All the config will be same and we need to add below policies to achieve application specific DIA.

Follow these steps to configure a stateful firewall rule:

  1. Select Appliance Context > Configuration > Services > Stateful Firewall > Security and select an entity from the Organization list.  

  2. Select the Rules tab and click in the dashboard to  add a new security access policy. This opens the Add Rule window.

  3. Select the General tab and configure the name and description for the DoS protection policy rule. Enter these details:

Use this field…

to …

Name

Specify the access policy rule name. 

Description

Specify a brief description of the access policy rule and its purpose.

Tags

Specify a keyword or phrase that allows you to filter the access policy. This is useful when you have many policies and want to view those that are tagged with a particular keyword.

  1. Select the Source/Destination tab to define the source zone and the source address, and destination zone and destination address of the incoming (source) and outgoing (destination) traffic to which the DoS protection policy rule applies. Enter these details:

Use this field…

to …

Source Zone

Select the source zone to apply the rule to traffic coming from any interface in the specified zone.

Click to add more source zones.

Destination Zone

Select the destination zone to apply the DoS policy to traffic coming from all interfaces into a given zone.

Click   to add more destination zones.

Source Site ID

Select the unique source site ID to apply the rule to traffic coming from any interface in the specified zone.

Click   to add more source site based on its ID.  

Use the CLI mode to manually access the source site ID.

Destination Site ID

Select the unique destination site ID to apply the DoS policy to traffic coming from all interfaces into a given zone.

Click   to add more destination site based on its ID. 

Use the CLI mode to manually access the destination site ID.

Source Address

Select and specify one or more source address to which the DoS Protection policy rule applies.

Click   to add more source addresses. 

Destination Address

Select and specify one or more destination address to apply the DoS Protection policy rule to the traffic marked to specific destination.

Source Address Negate

Enable this to select any address except the configured addresses. 

 

Destination Address Negate

Enable this to specify any address except the configured addresses.

Routing Instance

Select the routing instance of the incoming traffic.

Egress Routing Instance

Select the destination routing instance of the traffic.

  1. Select Header/Schedule tab to define the IP header, services and schedule to which the security access rule applies. Enter these details:

Use this field…

to …

IP Version

Specify the IP header to which the security access rule applies. 

IP Flags

For IPv4, select one of these IP flags:

  • Don’t Fragment.

  • More Fragment.

DSCP

Specify a Differentiated Service Code Point (DSCP) value to classify the way the IP packet is queued to get forward.

TTL

Condition

Select the TTL condition of the IP packet that the security access policy rule verifies. These are the options:

  • Greater than or equal to—The TTL value must be greater than or equal to the specified value for the security access  rule to trigger.

  • Less than or equal to—The TTL value must be less  than or equal to the specified value for the security access  rule to trigger.

  • Equal to—The TTL value must be equal to the specified value for the security access  rule to trigger.

Value

Specify the TTL value that is matched by the security access  rule with the TTL condition.

Others

Schedules

Select a schedule to specify when the security access  rule is in effect. 

Services

Service List

Click to select one or more services to apply the security access  rule to the configured services.

  1. Select Enforce tab to select the applications and URls to which the security access rule applies. Enter these details:

Use this field…

to …

Applications

Click   to select one or more predefined/custom application signature and apply the security access  rule to the application.

Refer Configuring Application Objects for more information on predefined and custom applications.

URL Categories

Click   to select one or more predefined/custom URL categories and apply the security access  rule to the URL.

Refer to Configuring URL Category Objects for more information on predefined and custom applications.

  1. Click OK to create a security access policy.

Refer to the Versa FlexVNF Security Configuration Guide for more information on access policy.

 

Yang Configuration:

admin@user-cli> show configuration orgs org-services security access-policies
org-services Tenant {
security {
access-policies {
Default-Policy {
rules {
Allow_From_Trust {
match {
source {
zone {
zone-list [ Intf-LAN-Zone W-ST-Tenant-LAN-VR-Internet1 ];
}
user {
user-type any;
}
}
url-category {
predefined [ business_and_economy educational_institutions news_and_media ];
}
}
set {
action allow;
lef {
event never;
options {
send-pcap-data {
enable false;
}
}
}
}
}
 Deny_All {
match {
source {
zone {
zone-list [ Intf-LAN-Zone W-ST-Tenant-LAN-VR-Internet1 ];
}
 user {
 user-type any;
}
}
 }
set {
action deny;
 lef {
event never;
options {
send-pcap-data {
enable false;
}
}
}
}
}





Security Solution Available with Versa

Branch faces the risk of being exposed to outside world in absence of security tools available due to increased security risk associated with the exposure of branch to the internet. As more and more attacks are trying to leverage the weekly guarded Branch sites in absence of proper threat management and security policy in place. 

Versa SD-Security provides various security tools to cover the Branch security as per the different use cases. Versa FlexVNF has security features starting from Zone Based Standard firewall to NextGen Firewall which includes Application based filtering , URL filtering. Versa SD-Security also offers Antivirus , Malware protection , IDS/IPS , IP reputation and filtering , and DOS protection.


Conclusion

In summary, Versa security features provides the comprehensive level of security, privacy, and data integrity seen in private WANs, giving confidence to use the public Internet as a highly secure WAN transport for their Branch communication needs. Organizations can use DIA and continue to experience a high level of performance and security while saving money and securing their network.