CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices
? To achieve simplification and consistency, the Cisco SD-WAN solution has been rebranded as Cisco Catalyst SD-WAN. In addition, from Cisco IOS XE SD-WAN Release 17.12.1a and Cisco Catalyst SD-WAN Release 20.12.1, the following component changes are applicable: Cisco vManage to Cisco Catalyst SD-WAN Manager, Cisco vAnalytics to Cisco Catalyst SD-WAN Analytics, Cisco vBond to Cisco Catalyst SD-WAN Validator, and Cisco vSmart to Cisco Catalyst SD-WAN Controller. See the latest Release Notes for a comprehensive list of all the component brand name changes. While we transition to the new names, some inconsistencies might be present in the documentation set because of a phased approach to the user interface updates of the software product.
You can configure CLI templates for Cisco IOS XE Catalyst SD-WAN devices in the following ways.
? If you generate a CLI template in a higher version of Cisco SD-WAN Manager and then try to apply it in a lower version, it may not be supported depending on the configuration. In this case, Cisco SD-WAN Manager might also deny access and generate an error message. We recommend that you use a CLI template generated in an earlier version of Cisco SD-WAN Manager. For example, if you are using Cisco vManage Release 20.7.x, you can use a CLI template generated in Cisco vManage Release 20.6.x and earlier releases.
- Device Configuration-Based CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices, on page 1
- Intent-Based CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices, on page 3
Device Configuration-Based CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices
Cisco SD-WAN Manager configures Cisco IOS XE Catalyst SD-WAN devices using a combination of feature templates and policies (localized policies, security policies). In Cisco vManage 20.1.1 and onwards, Cisco SD-WAN Manager allows you to specify CLI templates that use the device configuration with Cisco IOS XE Catalyst SD-WAN devices. You can use these templates to push the device configuration (yang-cli) to devices directly.
In a single operation, Cisco SD-WAN Manager pushes the difference between the device configuration and configuration provided by the user in the template directly to the Cisco IOS XE Catalyst SD-WAN devices. Cisco SD-WAN Manager also displays a preview of the configuration before it is pushed to the device, as it does with other templates. The described workflow also applies if you want to make any additions, changes, or removals to the template.
? To configure features not accessible using Cisco SD-WAN Manager, we recommend doing the following:
- Use the relevant feature template in addition to a CLI add-on feature template. For more information, see Qualified CLIs for CLI Add-On Feature Templates.
- For situations where the previous option is not sufficient, use the device configuration-based CLI templates as described in this section.
Feature Information for CLI Template for Cisco XE SD-WAN Routers
Feature Name | Release Information | Description |
---|---|---|
Device Configuration CLI Templates | Cisco IOS XE Catalyst SD-WAN Release 17.2.1r Cisco vManage 20.1.1 | The CLI Templates feature has been updated to support device configuration-based CLIs. You can use these templates to push the device configuration (yang-cli) to devices directly. |
Limitations
Auxiliary ports: When using a CLI template for Cisco Integrated Services Routers that have an auxiliary port, do not include commands for auxiliary ports, such as line aux 0. Doing so results in an error. These commands may be executed directly on the device.
When you import the CLI template configuration using the command, show sdwan running-config, you need to add quotes manually for the CLI template on the Cisco SD-WAN Manager.
Configure CLI Templates in Cisco SD-WAN Manager
- From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
- Click Device Templates.
? In Cisco vManage Release 20.7.x and earlier releases, Device Templates is titled as Device.
- From the Create Template drop-down list, select CLI Template.
- From the Device Model drop-down list, select the type of device for which you are creating the template.
- In Template Name, enter a name for the template.
The name can be up to 128 characters and can contain only alphanumeric characters.
- In Template Description, enter a description of the template.
The description can be up to 2048 characters and can contain only alphanumeric characters.
Choose Device configuration. Using this option, you can provide IOS-XE configuration commands that appear in the output of the show sdwan running-config command.
(Optional) To load the running config of a connected device, select it from the Load Running config from reachable device list and click Search.
In CLI Configuration, enter the configuration either by typing it, cutting and pasting it, or uploading a file.
To convert an actual configuration value to a variable, select the value and click Create Variable. Enter the variable name, and click Create Variable. You can also type the variable name directly, in the format {{variable-name}}; for example, {{hostname}}.
These variables can be filled in device variables page per device after attaching the template. Values can be entered manually or can be uploaded via a csv file.
To save the feature template, click Add. The new device template is displayed in the Device Template table.
Intent-Based CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices
The CLI Templates for Cisco IOS XE Catalyst SD-WAN device features allows you to configure intent-based CLI templates for Cisco IOS XE Catalyst SD-WAN devices using Cisco SD-WAN Manager. Intent-based CLI template refer to the command line interface configuration that are based on the Cisco vEdge device syntax. Using CLI templates, Cisco SD-WAN Manager enables pushing Cisco vEdge syntax-based commands to Cisco IOS XE Catalyst SD-WAN device in Cisco IOS XE Syntax.
? With the support of device configuration-based CLI templates, the intent-based CLI templates will be deprecated. We recommend using the device configuration-based CLI templates as described in Device Configuration-Based CLI Templates for Cisco IOS XE Catalyst SD-WAN Devices, on page 1.
Using Cisco SD-WAN Manager CLI templates significantly reduces the effort to configure feature templates.
Feature Information for CLI Template for Cisco IOS XE Catalyst SD-WAN devices
Feature Name | Release Information | Description |
---|---|---|
CLI Template for Cisco XE SD-WAN Routers | Cisco IOS XE Release 16.11.1a Cisco SD-WAN release 19.1 | The CLI Templates for Cisco IOS XE Catalyst SD-WAN device features allows to you configure intent-based CLI templates for Cisco XE SD-WAN routers using Cisco SD-WAN Manager. |
VRF Configuration | Cisco IOS XE Catalyst SD-WAN Release 17.2.1r | Support for VRF configuration increased from a total of 100 to a total of 300 VRFs. Supported on: Cisco ASR 1001-HX and Cisco ASR 1002-HX |
Benefits of CLI Templates
- You can reuse any Cisco vEdge-specific Cisco SD-WAN Manager feature templates for Cisco IOS XE Routers. When you create a device template using Cisco XE SDWAN Feature Templates, Cisco SD-WAN Manager displays the intent-based configuration (vEdge CLI syntax) and the corresponding device-based (Cisco XE SDWAN Routers) configuration. You can examine the intent-based configuration and repurpose that to create a separate CLI template for XE SDWAN routers.
- You can make multiple changes to a CLI template in a single edit.
- You can use a single configuration across multiple devices of the same device models. Variables can be used for rapid bulk configuration rollout with unique per-device settings. Common configurations like system-IP, site-id, hostname, IP addresses, and so on, can be defined as editable variables in the template and the same template can be attached to multiple devices.
- You can define custom length for variables in CLI Templates.
- You can use any existing IOS-XE device intent configuration as input for CLI template.
- Content of a CLI template can be used across multiple IOS-XE device types (common CLIs like VPN, VPN interface, BGP, OSPF and so on).
Limitations
Auxiliary ports: When using a CLI template for Cisco Integrated Services Routers that have an auxiliary port, do not include commands for auxiliary ports, such as line aux 0. Doing so results in an error. These commands may be executed directly on the device.
Configuring CLI Templates in Cisco SD-WAN Manager
- From the Cisco SD-WAN Manager menu, choose Configuration > Templates.
- Click Device Templates, and click Create Template.
? In Cisco vManage Release 20.7.x and earlier releases, Device Templates is titled as Device.
- From the Create Template drop-down list, select CLI Template.
- From the Device Model drop-down list, select the type of device for which you are creating the template.
- In Template Name, enter a name for the template.
The name can be up to 128 characters and can contain only alphanumeric characters.
- In Template Description, enter a description of the template.
The description can be up to 2048 characters and can contain only alphanumeric characters.
The configuration of the CLI template can either be intent-based or based on the device configuration.
- Intent: If you specify Intent, you specify commands in the Cisco vEdge format. If the device you've selected is a Cisco IOS XE Catalyst SD-WAN device, Cisco SD-WAN Manager converts the configuration for the device.
- Device configuration: This option is available from Cisco IOS XE Catalyst SD-WAN Release 17.2.1r and onwards and only for Cisco IOS XE Catalyst SD-WAN devices. For this option, you must specify the entire device configuration as it appears in show sd-wan running config.
? You can only use this feature with the qualified CLIs detailed in Qualified CLIs for CLI Add-On Feature Templates.
You can upload a configuration file using Select a File or copy and paste the CLI configuration. Following is an example of an intent-based CLI with variables.
system host-name {{hostname}} system-ip {{system_ip}} domain-id 1 site-id {{site_id}} port-offset 1 admin-tech-on-failure organization-name "XYZ" logging disk enable !!
These variables can be filled in device variables page per device after attaching the template. Values can be entered manually or can be uploaded via a csv file.
To save the feature template, click Add.
? See the Attach Devices to a Device Template section in this topic to know more about attaching a device to a template and reusing a template for multiple devices of the same device model.
Sample Configurations for CLI Template
System Level Configuration
CLI Template Configuration | Configuration on the Device |
---|---|
system host-name pm4 system-ip 172.16.255.14 overlay-id 1 site-id 400 control-session-pps 300 admin-tech-on-failure sp-organization-name "XYZ Inc Regression" organization-name "XYZ Regression" console-baud-rate 115200 vbond 10.0.12.26 port 12346 | system host-name pm4 system-ip 172.16.255.14 overlay-id 1 site-id 400 control-session-pps 300 admin-tech-on-failure sp-organization-name "XYZ Inc Regression" organization-name "XYZ Inc Regression" console-baud-rate 11520 vbond 10.0.12.26 port 12346 |
AAA Configuration - Authentication, authorization, and accounting (AAA) with RADIUS and TACACS+
CLI Template Configuration | Configuration on the Device |
---|---|
aaa ! auth-order local radius tacacs usergroup basic task system read write task interface read write ! usergroup netadmin ! usergroup operator task system read task interface read task policy read task routing read task security read ! user admin password $6$nbbLkA==$ae/DO78l/wluPUohhBU2L6h/ Q.PLkurGvxjRlS9OWB9iTtFwSGNQcABV6F MW57vuEHvo3zp3qdYVinLmMIu/p/ secret ! aaa group server radius server 10.99.144.200 server-private 10.99.144.200 auth-port 1812 timeout 5 retransmit 3 ip radius source-interface GigabitEthernet0/0/1 ! aaa group server radius server 10.99.144.201 server-private 10.99.144.201 auth-port 1812 timeout 5 retransmit 3 ip radius source-interface GigabitEthernet0/1/0 ! aaa authentication login default local group radius group tacacs+ aaa authorization exec default local group radius group tacacs+ a !! radius server 10.99.144.200 source-interface GigabitEthernet0/0/1 exit server 10.99.144.201 source-interface GigabitEthernet0/1/0 exit tacacs server 10.0.1.1 auth-port 50 vpn 0 source-interface GigabitEthernet0/0/1 key 1 secret-key $8$Kcuva0CM871E8czESwV5g/YX4Q8pY1LSNk/+PIDrpCg= exit ! | aaa group server tacacs+ server-10.0.1.1 server-private 10.0.1.1 timeout 5 key $8$vs5hzVg/Z6EeuUdNHTzOwWPsUv9V/50xmcRfShWp3YI= ip tacacs source-interface GigabitEthernet0/0/1 ! aaa group server radius server-10.99.144.200 server-private 10.99.144.200 auth-port 1812 timeout 5 retransmit 3 ip radius source-interface GigabitEthernet0/0/1 ! aaa group server radius server-10.99.144.201 server-private 10.99.144.201 auth-port 1812 timeout 5 retransmit 3 ip radius source-interface GigabitEthernet0/1/0 ! aaa authentication login default local group radius group tacacs+ aaa authorization exec default local group radius group tacacs+ a aa session-id common -- added by default username admin privilege 15 secret 9 $9$3/IL3/UF2F2F3E$J9NKBeKlWrq9ExmHk6F5VAiDMOFQfD.QPAmMxDdxz.c |
Logging configuration - Configures logging to either the local hard drive or a remote host
CLI Template Configuration | Configuration on the Device |
---|---|
logging disk ! enable file size 12 file rotate 6 ! server 192.168.13.1 vpn 0 source-interface Loopback1 priority alert exit ! | logging disk enable ! ! logging persistent size 75497472 filesize 12582912 logging buffered 512000 -- added by default logging host 192.168.13.1 no logging rate-limit logging source-interface Loopback1 logging persistent |
Switch Port and VLAN configuration
CLI Template Configuration | Configuration on the Device |
---|---|
interface GigabitEthernet0/1/4 switchport ! mode trunk access vlan vlan 10 access vlan name "DHCP Vlan" trunk allowed vlan 10 ! no shutdown vpn 10 name "DHCP VPN" interface Vlan10 description "Vlan 10 Mgmt interface" ip address 10.29.35.1/24 no shutdown ! | interface GigabitEthernet0/1/4 switchport ios-sw:mode trunk switchport ios-sw:trunk allowed vlan 10 no shutdown no ip address exit interface Vlan10 description Vlan 10 Mgmt interface no shutdown arp timeout 1200 vrf forwarding 10 ip address 10.29.35.1 255.255.255.0 ip mtu 1500 exit |
Cellular Configuration
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 0 interface Cellular0/2/0 ! description "Cellular interface" no shutdown ! controller cellular 0/2/0 lte sim max-retry 1 lte failovertimer 7 profile id 1 apn Broadband ! | interface Cellular0/2/0 description Cellular interface no shutdown ip address negotiated ip mtu 1428 mtu 1500 exit controller Cellular 0/2/0 lte sim max-retry 1 lte failovertimer 7 profile id 1 apn Broadband authentication none pdn-type ipv4 |
BGP, OSPF, and EIGRP - Configures BGP, OSPF, and EIGRP Routing Protocols under Transport or Service VPN
CLI Template Configuration | Configuration on the Device |
---|---|
vpn1 bgp 2 shutdown distance external 30 distance internal 250 distance local 10 address-family ipv4-unicast network 10.0.100.0/24 redistribute static route-policy route_map redistribute connected route-policy route_map ! neighbor 10.0.100.1 no shutdown remote-as 3 timers keepalive 12 holdtime 20 connect-retry 300 advertisement-interval 123 ! update-source GigabitEthernet0/0/1 ebgp-multihop 1 password $8$9pou4PH9b60B072hcw3MmSSdLCfJk8bVys121LVb+08= address-family ipv4-unicast vpn 1 router ospf router-id 172.16.255.15 compatible rfc1583 timers spf 200 1000 10000 redistribute connected route-policy route_map max-metric router-lsa administrative area 23 stub interface GigabitEthernet0/0/1 cost 23 authentication type message-digest authentication authentication-key key1 exit exit ! vpn 1 router eigrp 1 ! af-interface GigabitEthernet0/0/2 no split-horizon exit-af-interface ! address-family ipv4 network 10.1.10.1/32 address-family ipv4 topology base redistribute omp exit-af-topology | router bgp 2 bgp log-neighbor-changes distance bgp 30 250 10 address-family ipv4 unicast vrf 1 neighbor 10.0.100.1 remote-as 3 neighbor 10.0.100.1 activate neighbor 10.0.100.1 ebgp-multihop 1 neighbor 10.0.100.1 maximum-prefix 2147483647 100 neighbor 10.0.100.1 password 0 password neighbor 10.0.100.1 send-community both neighbor 10.0.100.1 timers 12 20 neighbor 10.0.100.1 update-source GigabitEthernet0/0/1 ! network 10.0.100.0 mask 255.255.255.0 redistribute connected redistribute static route-map route_map exit-address-family ! timers bgp 60 180 router ospf 1 vrf 1 auto-cost reference-bandwidth 100 max-metric router-lsa timers throttle spf 200 1000 10000 router-id 172.16.255.15 default-information originate distance ospf external 110 distance ospf inter-area 110 distance ospf intra-area 110 redistribute connected subnets route-map route_map ! interface GigabitEthernet0/0/1 no shutdown arp timeout 1200 vrf forwarding 1 ip address 10.1.100.14 255.255.255.0 ip redirects ip mtu 1500 ip ospf 1 area 23 ip ospf network broadcast mtu 1500 negotiation auto exit ! router eigrp eigrp-name 1 address-family ipv4 vrf 1 autonomous-system 1 af-interface GigabitEthernet0/0/2 hello-interval 5 hold-time 15 no split-horizon exit-af-interface ! network 10.1.10.1 0.0.0.0 topology base redistribute omp exit-af-topology ! exit-address-family |
VPN, Interface, and Tunnel Configuration for WAN and LAN interfaces
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 0 interface GigabitEthernet0/2/0 ip address 10.1.14.14/24 tunnel-interface ! encapsulation ipsec color lte no allow-service bgp allow-service dhcp allow-service dns allow-service icmp no allow-service sshd no allow-service netconf no allow-service ntp no allow-service ospf no allow-service stun allow-service https ! autonegotiate no shutdown ! ip route 0.0.0.0/0 10.1.14.13 vpn 512 interface GigabitEthernet0 ip dhcp-client ipv6 dhcp-client autonegotiate no shutdown !! | ip route 0.0.0.0 0.0.0.0 10.1.14.13 1 interface GigabitEthernet0/2/0 no shutdown arp timeout 1200 -- added by default ip address 10.1.14.14 255.255.255.0 ip redirects --> added by default ip mtu 1500 mtu 1500 negotiation auto --> added by default exit interface Tunnel20 ---> based on the interface 0/2/0 no shutdown ip unnumbered GigabitEthernet0/2/0 no ip redirects ipv6 unnumbered GigabitEthernet0/2/0 no ipv6 redirects tunnel source GigabitEthernet0/2/0 tunnel mode sdwan sdwan interface GigabitEthernet0/2/0 tunnel-interface encapsulation ipsec weight 1 color lte no last-resort-circuit vmanage-connection-preference 5 no allow-service all no allow-service bgp allow-service dhcp allow-service dns allow-service icmp no allow-service sshd no allow-service netconf no allow-service ntp no allow-service ospf no allow-service stun interface GigabitEthernet0 no shutdown arp timeout 1200 vrf forwarding Mgmt-intf ip address dhcp client-id GigabitEthernet0 ip redirects ip dhcp client default-router distance 1 ip mtu 1500 mtu 1500 negotiation auto |
Network Address Translation (NAT) over Direct Internet Access (DIA)
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 201 interface GigabitEthernet0/0/2.2901 description gigi21 ip address 10.201.201.1/24 mtu 1496 no shutdown vrrp 100 ! ! ! track-omp ipv4 10.201.201.3 ! ! ! dhcp-server address-pool 10.201.201.0/24 exclude 10.201.201.1-10.201.201.10 10.201.201.20-10.201.201.22 ! offer-time 600 lease-time 86400 admin-state up options ! ! ! default-gateway 10.201.201.1 tftp-servers 10.99.139.201 10.99.139.201 ! ! ! ip route 0.0.0.0/0 vpn 0 ! vpn 0 interface GigabitEthernet0/0/0 ip address 172.16.10.1/24 nat ! ! udp-timeout 3 tcp-timeout 40 respond-to-ping ! | interface GigabitEthernet0/0/2.2901 no shutdown encapsulation dot1Q 2901 vrf forwarding 201 ip address 10.201.201.1 255.255.255.0 ip mtu 1496 vrrp 100 address-family ipv4 vrrpv2 address 10.201.201.3 priority 100 track omp shutdown exit exit ip dhcp excluded-address vrf 201 10.201.201.1 10.201.201.10 ip dhcp excluded-address vrf 201 10.201.201.20 10.201.201.22 ip dhcp pool vrf-201-GigabitEthernet0/0/2.2901 option 150 ip 10.99.139.201 vrf 201 lease 1 0 0 default-router 10.201.201.1 dns-server 10.99.139.201 network 10.201.201.0 255.255.255.0 exit ip dhcp use hardware-address client-id no ip dhcp use class ip dhcp use vrf remote ip nat inside source list nat-dia-vpn-hop-access-list interface GigabitEthernet0/0/0 overload ip nat translation tcp-timeout 40 ip nat translation udp-timeout 3 ip nat route vrf 201 0.0.0.0 0.0.0.0 global interface GigabitEthernet1/0/2 no shutdown arp timeout 1200 ip address 10.1.15.15 255.255.255.0 ip nat outside ip redirects ip mtu 1500 mtu 1500 negotiation auto |
NAT64 Configuration
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 1 nat64 ! v4 pool pool1 start-address 10.1.1.10 v4 pool pool1 end-address 10.1.1.100 ! interface GigabitEthernet3 ! ip address 10.1.19.15/24 nat64 ! autonegotiate no shutdown ! | interface GigabitEthernet3 1 no shutdown arp timeout 1200 vrf forwarding 1 ip address 10.1.19.15 255.255.255.0 negotiation auto nat64 enable nat64 prefix stateful 2001::F/64 vrf 1 nat64 v4 pool pool1 10.1.1.10 10.1.1.100 nat64 v6v4 list global-list pool pool1 vrf 1 nat64 translation timeout tcp 60 nat64 translation timeout udp 1 |
Multilink and T1/E1 - Configures T1/E1 Controller and Serial, Multilink Interfaces
CLI Template Configuration | Configuration on the Device |
---|---|
card type t1 0 2 ! controller T1 0/2/0 framing esf clock source internal linecode b8zs cablelength long 0db channel-group 1 timeslots 15 channel-group 2 timeslots 12 channel-group 3 timeslots 10 channel-group 4 timeslots 10 ! interface Multilink1 no shutdown encapsulation ppp ip address 10.1.10.30 255.255.255.0 ppp pap sent-username admin password admin ppp authentication pap ppp multilink ppp multilink links minimum 1 ppp multilink fragment disable ppp multilink group 1 exit interface Serial0/2/0:1 no shutdown encapsulation ppp bandwidth 1536 no ip address load-interval 30 ppp pap sent-username admin password admin ppp authentication pap ppp multilink ppp multilink group 1 exit | interface Multilink1 ip address 10.1.10.30/24 shutdown controller T1 0/2/0 ! linecode b8zs channel-group 1 channel-group 3 ! ppp pap sent-username admin password admin ppp authentication pap ppp multilink ppp multilink group 1 |
Local QoS Policy
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 1 interface GigabitEthernet0/0/1 ip address 10.2.54.15/24 no shutdown access-list MyACL in ! policy class-map class best-effort queue 3 class bulk-data queue 2 class critical-data queue 1 class voice queue 0 ! access-list MyACL sequence 10 match dscp 46 ! action accept class voice ! ! sequence 20 match source-ip 10.1.1.0/24 destination-ip 192.168.10.0/24 ! action accept class bulk-data set dscp 32 ! ! ! sequence 30 match destination-ip 192.168.20.0/24 ! action accept class critical-data set dscp 22 ! ! ! sequence 40 action accept class best-effort set dscp 0 ! ! ! default-action accept ! qos-scheduler be-scheduler class best-effort bandwidth-percent 20 buffer-percent 20 drops red-drop ! qos-scheduler bulk-scheduler | interface GigabitEthernet0/0/1 access-list MyACL in exit class-map match-any best-effort match qos-group 3 ! class-map match-any bulk-data match qos-group 2 ! class-map match-any critical-data match qos-group 1 ! class-map match-any voice match qos-group 0 ! policy-map MyQoSMap class best-effort random-detect bandwidth percent 20 ! class bulk-data random-detect bandwidth percent 20 ! class critical-data random-detect bandwidth percent 40 ! class voice priority percent 20 ! ! policy no app-visibility no flow-visibility no implicit-acl-logging log-frequency 1000 class-map class best-effort queue 3 class bulk-data queue 2 class critical-data queue 1 class voice queue 0 ! access-list MyACL sequence 10 match dscp 46 ! action accept class voice ! ! sequence 20 match source-ip 10.1.1.0/24 destination-ip 192.168.10.0/24 ! action accept class bulk-data set dscp 32 ! class bulk-data bandwidth-percent 20 buffer-percent 20 drops red-drop ! qos-scheduler critical-scheduler class critical-data bandwidth-percent 40 buffer-percent 40 drops red-drop ! qos-scheduler voice-scheduler class voice bandwidth-percent 20 buffer-percent 20 scheduling llq ! qos-map MyQoSMap qos-scheduler be-scheduler qos-scheduler bulk-scheduler qos-scheduler critical-scheduler qos-scheduler voice-scheduler ! ! ! ! ! ! sequence 30 match destination-ip 192.168.20.0/24 ! action accept class critical-data set dscp 22 ! ! ! sequence 40 action accept class best-effort set dscp 0 ! ! ! default-action accept ! ! ! ! |
Security Policy (ZBFW, IPS/IDS, URL-Filtering) Configuration
CLI Template Configuration | Configuration on the Device |
---|---|
policy zone internet vpn 0 ! zone zone1 vpn 1 ! zone zone2 vpn 2 ! zone-pair ZP_zone1_internet_fw_policy ! source-zone zone1 destination-zone internet zone-policy fw_policy ! zone-pair ZP_zone1_zone2_fw_policy ! source-zone zone1 ! destination-zone zone2 zone-policy fw_policy ! zone-based-policy fw_policy sequence 1 match ! source-data-prefix-list subnet1 ! action inspect ! ! ! default-action pass ! zone-to-nozone-internet deny lists data-prefix-list subnet1 ! ! ip-prefix 10.0.10.0/24 url-filtering url_filter web-category-action block web-categories games block-threshold moderate-risk block text "<![CDATA[<h3>Access to the requested page has been denied</h3><p>Please contact your Network Administrator</p>]]>" ! target-vpns 1 ! intrusion-prevention intrusion_policy security-level connectivity inspection-mode protection ! ! ! log-level err target-vpns 1 ! failure-mode open ! ! ! | ip access-list extended fw_policy-seq-1-acl_ 11 permit object-group fw-policy-seq-1-service-og_ object-group subnet1 any ! ip access-list extended utd-nat-acl 10 permit ip any any ! class-map type inspect match-all fw_policy-seq-1-cm_ match access-group name fw_policy-seq-1-acl_ ! policy-map type inspect fw_policy class fw_policy-seq-1-cm_ inspect ! class class-default pass ! ! object-group service fw_policy-seq-1-service-og_ ip ! parameter-map type inspect-global alert on log dropped-packets multi-tenancy vpn zone security ! parameter-map type umbrella global token A5EA676087BF66A42DC4F722C2AFD10D00256274 dnscrypt vrf 1 dns-resolver umbrella match-local-domain-to-bypass ! ! zone security internet vpn 0 ! zone security zone1 vpn 1 ! zone security zone2 vpn 2 ! zone-pair security ZP_zone1_internet_fw_policy source zone1 destination internet service-policy type inspect fw_policy ! zone-pair security ZP_zone1_zone2_fw_policy source zone1 destination zone2 service-policy type inspect fw_policy ! app-hosting appid utd app-resource package-profile cloud-low app-vnic gateway0 virtualportgroup 0 |
CLI Template Configuration | Configuration on the Device |
---|---|
guest-interface 0 guest-ipaddress 192.168.1.2 netmask 255.255.255.252 ! app-vnic gateway1 virtualportgroup 1 guest-interface 1 guest-ipaddress 192.0.2.2 netmask 255.255.255.252 ! ! start utd multi-tenancy utd engine standard multi-tenancy web-filter block page profile block-url filter text <![CDATA[<h3>Access to the requested page has been denied</h3><p>Please contact your Network Administrator</p>]]> ! web-filter url profile url filter categories block ! games ! block page-profile block-url filter log level error reputation block-threshold moderate-risk ! ! ! ! threat-inspection profile intrusion_policy ! threat protection policy connectivity logging level err utd global ! policy utd-policy-vrf-1 all-interfaces vrf 1 threat-inspection profile intrusion_policy web-filter url profile url_filter exit ! | guest-interface 0 guest-ipaddress 192.168.1.2 netmask 255.255.255.252 ! app-vnic gateway1 virtualportgroup 1 guest-interface 1 guest-ipaddress 192.0.2.2 netmask 255.255.255.252 ! ! start ! utd multi-tenancy utd engine standard multi-tenancy web-filter block page profile block-url filter text <![CDATA[<h3>Access to the requested page has been denied</h3><p>Please contact your Network Administrator</p>]]> ! web-filter url profile url filter categories block ! games ! block page-profile block-url filter log level error reputation block-threshold moderate-risk ! ! ! ! threat-inspection profile intrusion_policy ! threat protection policy connectivity logging level err utd global ! policy utd-policy-vrf-1 all-interfaces vrf 1 threat-inspection profile intrusion_policy web-filter url profile url_filter exit |
Configuring NTP
CLI Template Configuration | Configuration on the Device |
---|---|
ntp server 10.29.43.1 source-interface GigabitEthernet1 version 4 exit ! ! | ntp server 198.51.241.229 source GigabitEthernet1 version 4 ! |
IPv6 Configuration
CLI Template Configuration | Configuration on the Device |
---|---|
vpn 1 ! interface GigabitEthernet3 ! ipv6 address 2671:123A::1/128 shutdown ! | interface GigabitEthernet3 shutdown arp timeout 1200 vrf forwarding 1 no ip address ip redirects ip mtu 1500 ipv6 address 2671:123A::1/128 ipv6 redirects mtu 1500 negotiation auto exit vrf definition 1 rd 1:1 address-family ipv4 ! exit-address-family address-family ipv6 exit-address-family ! ! ! |
Service Configuration
In Cisco IOS XE Catalyst SD-WAN Release 17.7.1a and earlier, only the following configurations under service can be configured via CLI templates:
- service pad
- service config
- service tcp-keepalives-in
- service tcp-keepalives-out
- service tcp-small-servers
- service udp-small-servers
VRF Configuration
Configure up to 300 VRFs, with a corresponding subinterface for each VRF. The example configures two VRFs.
? Do not configure VLAN 1. It is reserved for the native VLAN.
CLI Template Configuration | Configuration on the Device |
---|---|
! vpn 2 router bgp 1000 address-family ipv4-unicast redistribute omp address-family ipv6-unicast ! redistribute omp neighbor 192.0.2.2 ! no shutdown remote-as 2 ipv6-neighbor 2001:DB8:2::2 remote-as 2 ! ! ! ! interface GigabitEthernet0/0/0.2 ip address 192.0.2.1/24 ipv6 address 2001: DB8:2::1/64 mtu 1496 no shutdown ! ! vpn 3 router bgp 1000 address-family ipv4-unicast redistribute omp address-family ipv6-unicast ! redistribute omp neighbor 192.0.3.2 ! no shutdown remote-as 3 ipv6-neighbor 2001: DB8:3::2 remote-as 3 ! ! interface GigabitEthernet0/0/0.3 ip address 192.0.3.1/24 ipv6 address 2001: DB8:3::1/64 mtu 1496 no shutdown ! | vrf definition 2 rd 1:2 address-family ipv4 ! route-target export 1000:2 route-target import 1000:2 exit-address-family ! address-family ipv6 exit-address-family ! ! router bgp 1000 bgp log-neighbor-changes distance bgp 20 200 20 ! address-family ipv4 vrf 2 redistribute omp neighbor 192.0.2.2 remote-as 2 neighbor 192.0.2.2 activate neighbor 192.0.2.2 send-community both exit-address-family ! address-family ipv6 vrf 2 redistribute omp neighbor 2001:DB8:2::2 remote-as 2 neighbor 2001: DB8:2::2 activate neighbor 2001: DB8:2::2 send-community both exit-address-family ! interface GigabitEthernet0/0/0.2 encapsulation dot1Q 2 vrf forwarding 2 ip address 192.0.2.1 255.255.255.0 ip mtu 1496 ipv6 address 2001:DB8:2::1/64 end vrf definition 3 rd 1:3 address-family ipv4 ! route-target export 1000:3 route-target import 1000:3 exit-address-family ! address-family ipv6 exit-address-family ! ! router bgp 1000 bgp log-neighbor-changes distance bgp 20 200 20 ! address-family ipv4 vrf 3 redistribute omp neighbor 192.0.3.2 remote-as 3 neighbor 192.0.3.2 activate neighbor 192.0.3.2 send-community both exit-address-family ! address-family ipv6 vrf 3 redistribute omp neighbor 2001:DB8:3::2 remote-as 3 |
CLI Template Configuration | Configuration on the Device |
---|---|
neighbor 2001: DB8:3::2 activate neighbor 2001: DB8:3::2 send-community both exit-address-family ! interface GigabitEthernet0/0/0.3 encapsulation dot1Q 3 vrf forwarding 3 ip address 192.0.3.1 255.255.255.0 ip mtu 1496 ipv6 address 2001:DB8:3::1/64 end | neighbor 2001: DB8:3::2 activate neighbor 2001: DB8:3::2 send-community both exit-address-family ! interface GigabitEthernet0/0/0.3 encapsulation dot1Q 3 vrf forwarding 3 ip address 192.0.3.1 255.255.255.0 ip mtu 1496 ipv6 address 2001:DB8:3::1/64 end |