Professional Documents
Culture Documents
UCPE (4) UCPE Acting As Remote Inet GW
UCPE (4) UCPE Acting As Remote Inet GW
UCPE (4) UCPE Acting As Remote Inet GW
Parbhat Kapoor
parbhat@versa-networks.com
1 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Purpose:
1. This document will shed a light on how to make uCPE act as an Internet Gateway for Remote SDWAN branches.
2. We will also see that with default configuration on both FlexVNF & Palo Alto Remote-SDWAN Branch won’t be able to
communicate with Internet destinations and how we mitigate from that situation.
2 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Scenario 1a: Traffic coming from Remote SDWAN Branch towards Internet is getting blocked by Palo Alto
1. Remote SDWAN was unable to reach Internet destinaton but was able to reach uCPE Local LAN-VR Subnet 172.16.191.0/24 with below default configuration on:
b) Palo Alto had mainly 2 static routes which were suffice to communicate between Remote SDWAN branches and uCPE local LAN-VR subnet.
1) Default route pointing towards Untrust interface (towards Internet/Remote SD-WAN destination)
2) Static route pointing towards Trust interface in order to reach LAN-VR subnet (towards uCPE LOCAL LAN-VR subnet)
Above configuration is not suffice for Remote SD-WAN to start using uCPE as a Centralized Firewall INET/Edge Gateway
3 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
parbhat@parbhat-Standard-PC-i440FX-PIIX-1996:~$ traceroute 8.8.8.8
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets MPLS 8.8.8.8
Server
1 *** INTERNET
172.16.125.90
2 ***
Remote SDWAN Branch WAN IP: 192.168.2.1/24
3 ***
4 192.168.2.6 (192.168.2.6) 87.865 ms 87.974 ms 87.945 ms – INET-VR WAN IP: 192.168.2.6/24
5 ***
Vni0/0.0
6 ***
… Internet-Transport-VR
17 * * *
parbhat@parbhat-Standard-PC-i440FX-PIIX-1996:~$ Return traffic
tvi0/602.0 W-ST-Marriott-LAN-VR-PK-INET
Internet Destined traffic
tvi0/11.0
Palo Alto Firewall
DIA TRAFFIC PATH
Marriott-Control-VR/MP-BGP/Tunnels
mpls-vpn-core-instance
tvi0/603.0 L-ST-Marriott-LAN-VR-PK-INET
Palo Alto VM
172.16.20.2 Untrust
VRF: Marriott-LAN-VR Vni-0/303.0 172.16.20.1
172.16.191.2/24
4 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
TCPDUMP Logs from vni-0/302 & 303
Palo Alto Firewall not forwarding ICMP reply towards FlexVNF vni0-302 interface!
5 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Scenario 1b: Post implementing Policy Based Forwarding on Palo Alto, Remote SD-WAN branches started communicating with Internet
Solution implemented:
6 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
MPLS 8.8.8.8
Server
INTERNET
172.16.125.90
Remote SDWAN Branch WAN IP: 192.168.2.1/24
Datapath a packet takes from Remote SDWAN Branch to Internet & Vice-Versa
WAN IP: 192.168.2.6/24
Vni0/0.0
Internet-Transport-VR
Return traffic
tvi0/602.0 W-ST-Marriott-LAN-VR-PK-INET
Internet Destined traffic
tvi0/11.0
Palo Alto Firewall
DIA TRAFFIC PATH
Marriott-Control-VR/MP-BGP/Tunnels
mpls-vpn-core-instance
tvi0/603.0 L-ST-Marriott-LAN-VR-PK-INET
Palo Alto VM
172.16.20.2 Untrust
VRF: Marriott-LAN-VR Vni-0/303.0 172.16.20.1
8 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Debugs taken against each ICMP Request/Reply:
2019-02-14 15:07:15.883 DEBUG [0x103] vs_sfc_fltr_lookup_service_chain_id:1470 Ten 2 Sess hdl 0x0 Proto 1 SRC 172.16.125.90:4214 DST 8.8.8.8:4214 Fltr lkup rc 0 svc chain 128511
2019-02-14 15:07:15.883 DEBUG [0x103] vs_nfp_sess_create:2146 vs_nfp_sess_create, s-hdl 0 sess:0x7f42ed51aa00[0x00000000] flow[0]:(nil). flow[1]:(nil)
9 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
MPLS 8.8.8.8
Server
10.0.8.5 INTERNET
Remote SDWAN Branch
Comparison with previous datapath flow:
WAN IP: 192.168.2.1/24
Datapath a packet takes between Remote Branch/Internet & LAN-VR
Vni0/0.0
Return traffic
Internet-Transport-VR
SDWAN/Internet originated traffic
tvi0/602.0 W-ST-Marriott-LAN-VR-PK-INET
Versa FlexVNF Firewall
tvi0/11.0
DIA TRAFFIC PATH
Marriott-Control-VR/MP-BGP/Tunnels
mpls-vpn-core-instance
tvi0/603.0 L-ST-Marriott-LAN-VR-PK-INET
Palo Alto VM
172.16.20.2 Untrust
VRF: Marriott-LAN-VR Vni-0/303.0 172.16.20.1
11 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Debugs taken against each ICMP Request/Reply:
2019-02-15 11:51:47.523 DEBUG [0x102] vs_nfp_gen_shdl_from_sptr:428 Generating vs_sess_hdl_t 0x7f42ed11b902
2019-02-15 11:51:47.523 DEBUG [0x102] vs_nfp_flows_create:819 Flow create, sess:0x7f42ed11b900[0x0200a7e5], flow[0]: 0x7f42ed0d2600 flow tuple[src 172.16.125.90 : 5432 dst 172.16.191.5 : 5432. proto 1
vrf 11]
2019-02-15 11:51:47.523 DEBUG [0x102] vs_nfp_sess_create:2257 s-hdl 0x7f42ed11b902 sess:0x7f42ed11b900 flow[0]:0x7f42ed0d2600. flow[1]:0x7f42ed0d2680
2019-02-15 11:51:47.523 DEBUG [0x102] vs_nfp_sess_create:2393 created s-hdl 0x7f42ed11b902 at 148751217
2019-02-15 11:51:47.523 DEBUG [0x102] vs_nfp_sess_set_idle_tmo_internal:3150
idle timeout set[7f42ed11b902] idle_tmo: 10000 hard_tmo: 0
2019-02-15 11:51:47.523 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC 128767 ingr if 1062 Sess hdl 0x7f42ed11b902 action External/4 egr 1056 VRF 11 addr 172.16.20.2
2019-02-15 11:51:47.523 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC 128767 ingr if 1054 Sess hdl 0x7f42ed11b902 action Local/0
2019-02-15 11:51:47.524 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC -2147354881 ingr if 1048 Sess hdl 0x7f42ed11b902 action Local/0
2019-02-15 11:51:47.524 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Egr SC -2147354881 ingr if 1048 Sess hdl 0x7f42ed11b902 action External/4 egr 1054 VRF 11 addr 172.16.10.2
2019-02-15 11:51:47.524 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC -2147354881 ingr if 1056 Sess hdl 0x7f42ed11b902 action Fwd/5
2019-02-15 11:51:48.524 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC 128767 ingr if 1062 Sess hdl 0x7f42ed11b902 action External/4 egr 1056 VRF 11 addr 172.16.20.2
2019-02-15 11:51:48.524 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC 128767 ingr if 1054 Sess hdl 0x7f42ed11b902 action Local/0
2019-02-15 11:51:48.525 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC -2147354881 ingr if 1048 Sess hdl 0x7f42ed11b902 action Local/0
2019-02-15 11:51:48.525 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Egr SC -2147354881 ingr if 1048 Sess hdl 0x7f42ed11b902 action External/4 egr 1054 VRF 11 addr 172.16.10.2
2019-02-15 11:51:48.525 DEBUG [0x102] sfc_dp_trace_next_node_lookup:1274 Ing SC -2147354881 ingr if 1056 Sess hdl 0x7f42ed11b902 action Fwd/5
12 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential
Thank You
13 © 2017 Versa and/or its affiliates. All rights reserved. Versa Networks Confidential