Any plans for SD WAN?
Posted: Fri Jan 19, 2018 11:33 pm
Getting lots of requests for this from customers.
Yeah I don't get this either.Really? Isn't it just a fancy sounding putting of cloud word everywhere? Nothing against, just asking what is it above a vpn?
So you're using Cisco equipment? Or Mikrotik for this? Can you tell me more about how you set this up? Assuming it doesn't take up too much of your time.I agree with you. However I doubt you will see it anytime soon. I use OSPF with BFD on each tunnel and it switches very fast. But your right that its not balancing loads etc.
That particular client uses a static IP from my POP that floats between the tunnels. They have an onsite PBX and it allows them to float between providers without having to change the src nat and of course the incoming VoIP calls routed to their IP doesn't have to change with every switch.
https://www.cisco.com/en/US/technologie ... 44005.html
this is not true. any overlay vpn can make use of _every_ available uplink path if required. but believe me, no one on earth want to do per packet load balancing over multiple independent connections, as OOO packet delivery is a pain in the back. Mikrotik has only per packet load balancing and a quite obscure way to actually utilise this (multiple gw values in a single route entry).A VPN only functions over a single connection.
i love how cisco (or replace this with any "big" brand name) marketing folks glue buzzwords to "destination address based packet forwarding tweaked as we need it". the whole SD-WAN movement is against the "classic" virtual pipe providers, so to replace L2 and L3 MPLS VPNs, and give a slight possibility to the customer to steer how stuff is being delivered over the remote connections. there ain't nothing new in it - and to be honest the whole L3 VPN story was found out how to fight "physical" pipes to make the service more affordable and more versatile. now you as customer can just buy any random internet connection and run your OTT VPNs on top of it. like we did back in 1999 with IPSec.You can utilize multiple connections for instance and create a secure tunnel that sends packets over whichever has the least congestion at the moment. So for instance, you're a bank and your traffic to the banking server over a VPN at the main site becomes congested so transactions slow down. With SD WAN you can bring in a second carrier (since the first would just still be congested) and maintain that secure tunnel with packets going over the fastest route. I suppose it would be more like secure OSPF.
I always wonder what is the underlying technology that build those peplink Speedfusion, this should give me some light.....I'm using Mikrotik. The Cisco doc just explains it really well.
In my situation I configured the HA or SDWAN mikrotik router and then connected their existing Mikrotik router to it. I just assumed the gateway position and was in between the ISP connections and their router.
HA - SDWAN Router
Ether1 ISP1
Ether2 ISP2
Ether3 ISP3
EoIP tunnel 1 from POP to Customer HA Router over ISP 1
EOIP tunnel 2 from POP to Customer HA Router over ISP 2
EOIP tunnel 3 from POP to Customer HA Router over ISP 3
OSPF w/ BFD enabled between each end of EoIP tunnel 1 (POP=10.20.0.1/30 Customer=10.20.0.2/30)
OSPF w/ BFD enabled between each end of EoIP tunnel 2 (POP=10.20.0.5/30 Customer=10.20.0.6/30)
OSPF w/ BFD enabled between each end of EoIP tunnel 3 (POP=10.20.0.9/30 Customer=10.20.0.10/30)
I routed the whole /29 to the HA router from my POP. So the first IP address of the /29 was placed on Ether5 and it acts as the gateway for the customer router.
The default route of the HA SDWAN router is the POP. (OSPF default route it receives from POP)
0.0.0.0/0 over 10.20.0.1 if OSPF & BFD select primary ISP
0.0.0.0/0 over 10.20.0.5 if OSPF & BFD select secondary ISP
0.0.0.0/0 over 10.20.0.9 if OSPF & BFD select tertiary ISP
Since the default route is through the tunnel mangle rules and routing marks are required to force the traffic for the EoIP tunnels out the appropriate ISP connection.
When everything is dialed in you can be on an active VoIP call and unplug the primary Internet connection and you only have maybe 1 or 2 seconds of audio loss but the call stays connected and audio resumes just fine. Several times the parties on the phone never noticed the switch over.
Anyway a very rough outline of the framework. Took an insane number of failed attempts before I landed on this one and it has been working great.
Once in a great while the mangle rules would not be followed and I would have to manually clear connections to get them to do what they should. I have a script to do that occasionally now and that issue never came up again.
Its overall not horribly complex I have some configs that are 1700 lines so this one seemed middle of the road for complexity. The OSPF and BFD take the most time to get to their happy place.