Cisco SD-WAN AppQoE Configuration Guide, Cisco IOS XE Release 17.x
Cisco SD-WAN AppQoE Configuration Guide, Cisco IOS XE Release 17.x
Cisco SD-WAN AppQoE Configuration Guide, Cisco IOS XE Release 17.x
17.x
First Published: 2020-12-19
Last Modified: 2021-06-07
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2019–2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
Configure DRE 45
Upload DRE Container Image to the Software Repository 45
Enable DRE Optimization 46
Create Security Policy for SSL Decryption 47
Update Device Template 47
Create a Centralized Policy for TCP and DRE Optimization 47
Configure Cisco Catalyst 8000V on UCS-E Series Server Modules for DRE Optimization 48
Configure UCS E-Series Server 49
Deploy Cisco Catalyst 8000V on UCS E-Series Server 49
Configure AppQoE Feature Template for Cisco Catalyst 8000V Instances 49
Configure the Controller Cluster Types 50
Configure DRE Using the CLI 52
Monitor DRE 53
Monitor and Troubleshoot DRE Using CLI 54
User Documentation
• Cisco IOS XE (Cisco IOS XE SD-WAN Devices)
• Cisco IOS XE (SD-WAN) Qualified Command Reference
• Cisco SD-WAN Command Reference
Documentation Feedback
To provide feedback about Cisco technical documentation use the feedback form available in the right pane
of every online document.
Note The documentation set for this product strives to use bias-free language. For purposes of this documentation
set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial
identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be
present in the documentation due to language that is hardcoded in the user interfaces of the product software,
language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco is constantly enhancing the SD-WAN solution with every release and we try and keep the content in
line with the latest enhancements. The following table lists new and modified features we documented in the
Configuration, Command Reference, and Hardware Installation guides. For information on additional features
and fixes that were committed to the Cisco SD-WAN solution, see the Resolved and Open Bugs section in
the Release Notes.
What's New in Cisco IOS XE (SD-WAN) Release 17.x
AppNav-XE Cisco IOS XE Release This feature lets you configure policy-based redirection of
17.2.1r LAN-to-WAN and WAN-to-LAN traffic flows to WAAS nodes
for WAN optimization on Cisco IOS XE SD-WAN devices .
This feature was already available on Cisco IOS XE platforms
and is being extended to Cisco IOS XE SD-WAN platforms in
this release.
Overview of AppNav-XE
The AppNav-XE feature facilitates intelligent distribution of traffic flows to WAAS devices. WAAS devices
are used for WAN optimization.
AppNav-XE reduces dependency on the intercepting router by distributing traffic among WAAS devices for
optimization using a class and policy mechanism. You can use WAAS nodes (WNs) to optimize traffic based
on sites and/or applications. The AppNav-XE solution can scale up to available capacity by taking into account
WAAS device utilization as it distributes traffic among nodes. The solution provides high availability of
optimization capacity by monitoring node overload; and by providing configurable failure and overload
policies.
Note The AppNav-XE feature was already available on Cisco IOS XE platforms before it was introduced to Cisco
SD-WAN in Cisco IOS XE Release 17.2. For more information, see Configuration Guide for AppNav-XE
on the Cisco CSR 1000V Series and Cisco ASR 1000 Series.
Topology Example
Figure 1: Example Topology
The image above shows an example of Cisco SD-WAN deployment with AppNav-XE. The Cisco IOS XE
SD-WAN devices at the data center and branches are enabled with the AppNav-XE feature and form an
AppNav cluster with WAAS nodes.
Benefits of AppNav-XE
• Enables enterprises to expand services efficiently and cost-effectively
• Supports the use of flexible policy definitions
• Integrated with Cisco SD-WAN network services, which eliminates the need for any additional hardware
• Intelligently redirects new flows based on the load on each service node. This also includes the load on
individual L7 application accelerators
• For flows that don't require any optimization, service nodes can inform the AppNav Controller to directly
pass-through the packets, thus minimizing the latency and resource utilization
• Has minimal impact to traffic when adding or removing service nodes
• Supports VRFs, so that the VRF information is preserved when traffic returns from a service node
• Supports optimization of asymmetric flows through AppNav controller groups
Note An asymmetric flow is when the traffic in one direction goes through one AppNav
Controller and the return traffic goes through a different AppNav Controller; but
both AppNav Controllers redirect the traffic to the same service node.
• Provides inter-router high availability to keep traffic flows uninterrupted, where if one router goes down,
the traffic can be re-routed to a different router within the AppNav Controller group.
Components of AppNav-XE
• AppNav Cluster: A group of all AppNav controllers and WAAS nodes at a site. Typically, each enterprise
site, such as branch and data center, has an AppNav cluster.
• AppNav Controller: A device that intercepts network traffic and, based on an AppNav policy, distributes
that traffic to one or more WAAS nodes (WNs) for optimization. The device in this context is a Cisco
IOS XE SD-WAN device running AppNav-XE.
• WAAS Nodes: Wide Area Application Services (WAAS) nodes or service nodes are WAAS optimization
engines or vWAAS instances that optimize and accelerate traffic based on the optimization policies
configured on the device.
Note WAAS service nodes are outside the scope of this document.
• WAAS Central Manager (WCM): WCM devices host WCM, a Web-based interface that allows you
to configure, manage, and monitor AppNav controllers and WAAS nodes in your network. In AppNav-XE
for Cisco SD-WAN, WCM communicates with Cisco vManage, which is the NMS used to configure
Cisco IOS XE SD-WAN devices. Cisco vManage then pushes the AppNav-XE configuration to the Cisco
IOS XE SD-WAN devices. However, WAAS nodes in an AppNav cluster still receive their configuration
through WCM. Monitoring of WAAS nodes and AppNav-XE on Cisco IOS XE SD-WAN devices is
done directly through WCM.
• Cisco vManage: This is the primary management system in Cisco SD-WAN. Therefore, WCM sends
the AppNav-XE configuration to Cisco vManage, which in turn pushes it to the AppNav-XE controllers.
Supported Platforms
The following platforms support AppNav-XE for Cisco SD-WAN.
• Cisco 1000 Series Aggregation Services Routers
• Cisco 4000 Series Integrated Services Routers
• Cisco Cloud Services Router 1000V Series
• C8500-12X4QC and C8500-12X Series Aggregation Services Routers
• C8300 Series Integrated Services Routers
AppNav-XE in IOS XE: The WCM GUI directly communicates with the AppNav Controller (ANC) and
the WAAS Nodes (WN) in the AppNav cluster to push the configuration.
AppNav-XE in IOS XE SD-WAN: The major difference is in terms of how the AppNav policy configuration
is pushed to the AppNav Controllers (ANC). Here, the feature is configured through both WCM GUI and
Cisco vManage. You continue to configure the AppNav-XE feature in WCM. WCM then sends the
configuration to Cisco vManage, which in turn pushes the configuration to AppNav controllers. The
communication between WCM and Cisco vManage is achieved through registering WCM as a third-party
controller with Cisco vManage. WCM still directly sends the configuration to the WAAS nodes.
To register using a Fully Qualified Domain Name (FQDN), enter the FQDN in the Host Name field. The
IP Address field should remain empty.
4. Upload the trusted issuer certificate bundle in PEM format for the Cisco vManage web server certificate.
Note Use the re-import button to re-upload the trusted issuer certificate bundle, which replaces the existing certificate
bundle.
5. To enable revocation check of the Cisco vManage web server certificate, choose the Revocation Check
option.
Note that only OSCP based revocation check is supported.
6. Click Submit.
Once integrated, the WCM partner can be seen from the Cisco vManage menu by choosing Administration >
Integration Management.
3. In the Available Devices column on the left, choose a device from the list.
4. Click Attach.
5. To configure AppNav-XE on the device, Register Cisco XE SD-WAN Device with WCM next.
The registration status of the device is displayed in the lower part of the screen.
4. Click Submit.
Monitor AppNav-XE
• Through CLI: See Monitoring the AppNav-XE Component
Troubleshoot AppNav-XE
For information on common problems and how to troubleshoot them using various debug commands, see
Troubleshooting AppNav-XE.
TCP Cisco IOS XE TCP optimization support extended to Cisco ISR4221, Cisco ISRv, and
Optimization Release 17.3.1a Cisco 1000 Series Integrated Services Routers. See Supported Platforms
for more information.
Cisco IOS XE This feature optimizes TCP data traffic by decreasing any round-trip
SD-WAN latency and improving throughput.
Release 16.12.1d
TCP optimization fine tunes the processing of TCP data traffic to decrease round-trip latency and improve
throughput.
This article describes optimizing TCP traffic in service-side VPNs on Cisco IOS XE SD-WAN devices.
Optimizing TCP traffic is especially useful for improving TCP traffic performance on long-latency links, such
as transcontinental links and the high-latency transport links used by VSAT satellite communications systems.
TCP optimization can also improve the performance of SaaS applications.
With TCP optimization, a router acts as a TCP proxy between a client that is initiating a TCP flow and a server
that is listening for a TCP flow, as illustrated in the following figure:
The figure shows two routers acting as proxies. Router A is the proxy for the client, and is called the client
proxy. Router B is the proxy for the server, called the server proxy. Without TCP optimization, the client
establishes a TCP connection directly to the server. When you enable TCP optimization on the two routers,
Router A terminates the TCP connection from the client and establishes a TCP connection with Router B.
Router B then establishes a TCP connection to the server. The two routers cache the TCP traffic in their buffers
to ensure that the traffic from the client reaches the server without allowing the TCP connection to time out.
It is recommended that you configure TCP optimization on both the routers, the router closer to the client and
the router closer to the server. This configuration is sometimes called a dual-ended proxy. It is possible to
configure TCP optimization only on the router closer to the client, a scenario called single-ended proxy, but
this configuration is not recommended because the TCP optimization process is compromised. TCP is a
bidirectional protocol and operates only when connection-initiation messages (SYNs) are acknowledged by
ACK messages in a timely fashion.
If both the client and the server are connected to the same router, no TCP optimization is performed.
To use TCP optimization, first enable the feature on the router. Then define which TCP traffic to optimize.
Before you configure TCP optimization, to start with the configuration transaction, you can use the following
command such as,
ntp server 198.51.241.229 source GigabitEthernet1 version 4
Data Center
For a data center, the controller and service-node roles are performed by separate Cisco IOS XE SD-WAN
devices. This optimizes performance and enables handling more traffic.
The service-node is an external node that has control connections to vManage to receive configurations.
Note The service-node Cisco IOS XE SD-WAN device must have an underlay connection to the controller on the
global VRF to establish an appnav tunnel.
Supported Platforms
Release Supported Platforms
Cisco IOS XE Release 17.3.2 • Cisco Catalyst 8300 Series Edge Platforms
Note By default, subnet 192.168.1.1/30 and 192.0.2.1/30 used for VPG0 and VPG1 (UTD) and 192.168.2.1/24
used for VPG2 (APPQOE) is configured through Cisco vManage. Use any RFC 1918 subnet for Transport
and Service VPN configurations other than these netmask.
interface VirtualPortGroup2
no shutdown
ip address 192.3.3.1 255.255.255.0
service-insertion appqoe
exit
Note When enabling the AppQoE feature on a device through Cisco vManage, ensure that you remove any Virtual
Port Groups (VPG) that already have service-insertion appqoe in their configuration and have an IP address
that differs from the one you are pushing through vManage. Enabling AppQoE on a device that has an existing
service-insertion appqoe configuration on a VPG could lead to a conflict in configurations. This conflict
may result in the AppQoE status remaining indeterminate.
2. Click Feature.
3. Choose a device from one of the device options listed.
4. Under Other Templates in the right pane, choose AppQoE.
5. Enter a name and description for the template.
6. Click the Controller option.
7. Enter the following details for the controller option:
• Controller IP: Corresponds to the appnav-controller value that would be configured by the
service-insertion appnav-controller-group command when configuring by CLI.
• Internal: Check this check box.
• Service Node IP: Corresponds to the service-node value that would be configured by the
service-insertion service-node-group command when configuring by CLI.
8. Click Save.
9. Add the feature template that was created in a previous step, to a device template page. In the AppQoE
drop-down menu, choose the name of the feature template. Add the AppQoE template you created in
the previous step following the steps below.
a. From the Cisco vManage menu, choose Configuration > Templates.
b. Click Device.
c. From the devices listed in the window, click ...for the device you want to attach the AppQoE template
to. Click Edit.
d. Click Additional Templates and under the AppQoE drop-down list, choose the AppQoE template
created.
Example: Configure Service Insertion Using Cisco vManage – Data Center Controller
1. From the Cisco vManage, choose Configuration > Templates.
2. Click Feature.
3. Under Select Devices, choose the branch device to configure.
4. Under Other Templates in the right pane, choose AppQoE.
5. Enter a name and description for the template.
6. Click the Controller option.
7. Create a feature template for the Cisco IOS XE SD-WAN device acting as controller. Enter:
• Controller IP: Corresponds to the appnav-controller value that would be configured by the
service-insertion appnav-controller-group command when configuring by CLI.
• Internal: Leave this option unchecked.
• Service Node IP: Corresponds to the service-node value that would be configured by the
service-insertion service-node-group command when configuring by CLI.
8. Click Save.
9. Add the feature template that was created in a previous step, to a device template. In the AppQoE
drop-down menu, choose the name of the feature template. Add the AppQoE template you created in
the previous following the steps below.
a. From the Cisco vManage menu, choose Configuration > Templates
b. Click Device.
c. From the devices listed on the page, select the device you want to attach the AppQoE template to
and click the More Options icon (…) next to the selected device. Click Edit.
d. Click Additional Templates and under the AppQoE drop-down menu, choose the AppQoE template
created.
Note When enabling the AppQoE feature on a device through vManage, ensure that you remove any Virtual Port
Groups (VPG) that already have service-insertion appqoe in their configuration and have an IP address that
differs from the one you are pushing through vManage. Enabling AppQoE on a device that has an existing
service-insertion appqoe configuration on a VPG could lead to a conflict in configurations. This conflict
may result in the AppQoE status remaining indeterminate.
7. Click Save.
8. Add the feature template that was created in a previous step, to a device template page. In the AppQoE
drop-down list, choose the name of the feature template.
9. Click Create.
Support for Multiple, Cisco IOS XE Release This feature allows you to configure multiple AppQoE
External AppQoE Service 17.4.1a service nodes that are external to the intercepting edge
Nodes routers or AppQoE service controllers. It extends
Cisco vManage Release
AppQoE support to edge routers in which AppQoE
20.4.1
can't run as an integrated service node. This feature
also allows AppQoE to scale, where integrated
AppQoE has limitations on the throughput and number
of connections. The ability to configure multiple
AppQoE service nodes help meet the scale and
throughput requirements of large enterprise sites, such
as data centers.
Support for Additional Cisco IOS XE Release This release extends the service controller role to
Platforms as Controllers 17.5.1a additional device models—C8500L-8S4X and
for AppQoE Service ASR1006-X.
Cisco vManage Release
Nodes
20.5.1
Support for Automated Cisco IOS XE Release This feature enables a programmatic setting of the
MTU Setting for Tunnel 17.5.1a maximum transmission unit (MTU) size to 1500 for
Adjacency the network connecting the service controllers and
service nodes. This automation prevents broken
communication due to packet fragmentation that can
bring down the throughput requirements.
• Supported Devices for AppQoE Controllers and External Service Nodes, on page 24
• Restrictions for External AppQoE Service Nodes, on page 25
• Information about External AppQoE Service Nodes, on page 26
• Configure AppQoE Controllers and Service Nodes, on page 29
• Configure AppQoE Service Controllers and Nodes Using the CLI, on page 30
• Monitor AppQoE Service Controllers and Nodes, on page 33
• Monitor AppQoE Service Controllers and Nodes Using the CLI, on page 34
Cisco IOS XE Release 17.4.1a • Cisco ASR 1000 Series Aggregation Services Routers
and later
• ASR1001X
• ASR1002X
• ASR1001-HX
• ASR1002-HX
Cisco IOS XE Release 17.5.1a • Cisco Catalyst 8500 Series Edge Platforms
and later
• C8500L-8S4X
Note If you configure Cisco Catalyst 8000V as a service node, you cannot use the same instance as a service
controller.
Note For information on platforms supported as external service nodes for Data Redundancy Elimination (DRE),
see Traffic Optimization with DRE.
Note This configuration prevents the AppQoE service node from participating in the
SD-WAN data plane. The absence of this modification in the bootstrap
configuration leads to generation of alarms indicating that OMP and Control
Connections are down in Cisco vManage. However, the alarms are harmless and
can be ignored if the recommended configuration is absent from bootstrap
configuration.
• Service nodes do not communicate with each other and are not aware of the other service nodes in the
cluster.
• Service controllers initiate communication with the service nodes connected to them. This configuration
is set up in the AppQoE feature template associated with a device template that has the service controller
role defined.
• Service controllers and service nodes can be adjacent to each other, or next or multiple hops away.
• Service controllers communicate with the service nodes through service VPNs. However, service nodes
communicate with service controllers through transport VPN or VPN 0.
• Service nodes only respond to the service controller that they are connected with.
• In Cisco vManage, the health of each AppQoE service node is represented by the colors Green or Yellow.
Only nodes with Green status are considered for distribution of new flows. Any ongoing flows to service
nodes showing as Yellow are redirected.
Sample Topology
Figure 4: Sample Topology with External Service Nodes
The image above shows an example of Cisco SD-WAN deployment with service nodes that are external to
the service controller. The image shows the deployment at both a branch site and a data center. Cisco IOS XE
SD-WAN devices at the data center and branches form an AppQoE cluster with service nodes at their respective
sites.
Note Only Cisco Catalyst 8000V instances can be configured as AppQoE service nodes. If you choose any other
device, the Service Node option isn’t available in the Device Role field.
4. In the Device Role field, choose Service Node from the drop-down list.
5. Enter Template Name and Description.
6. Click Additional Templates. In the AppQoE field, notice that the Factory Default AppQoE External
Service Node template is attached by default.
No further configuration is required for devices configured as AppQoE service nodes. Additional
configuration for connecting the service nodes to a service node controller is done through the AppQoE
controller configuration screens in Cisco vManage.
7. Attach the device template to the device.
4. In the Device Role field, choose SDWAN Edge from the drop-down list.
Note The SDWAN cEdge option is only visible for devices that support the service controller role.
Note Click + next to the Service Node IP field to add more service nodes. You can add up to 64 service nodes for
a single service controller.
Note From Cisco vManage Release 20.6.1, the AppQoE feature template allows you to configure multiple service
node groups and add the external service nodes to such groups. However, if the version of the device that you
are configuring as a service controller is lower than Cisco IOS XE Release 17.6.1a, and you use Cisco Cisco
vManage Release 20.6.1 to configure the AppQoE template for such device, ensure that you configure only
one service node group, even though the template allows you to configure multiple service node groups.
Device# config-transaction
Device(config)# sdwan appqoe tcpopt enable
Device(config-appqoe)# no sslproxy enable
Note If you configure Cisco Catalyst 8000V as service-plane heavy, you need to reload it to enable the service
plane..
config-transaction
device-role service-node
service-node 192.168.2.2
!
interface VirtualPortGroup1
ip address 192.168.2.1 255.255.255.0
service-insertion appqoe
!
interface GigabitEthernet 2
description SN_LAN_Interface in VPN0
ip address 192.0.2.1 255.255.255.0
!
system
system-ip 198.51.100.1
site-id 78200
!
Device# config-transaction
Device(config)# service-insertion appnav-controller-group appqoe
appqoe-controller-group-name
Device(config-service-insertion-acg)# appnav-controller controller-ip-address
Note You can configure multiple external service nodes in a service node group.
3. Configure service context for the controller and service node groups.
config-transaction
interface GigabitEthernet 1
description SC_To_SN_LAN_Interface in VPN200
system
sytem-ip 198.51.100.10
site-id 78200
!
Note To get details about traffic flows, you must choose a service controller. The flows aren't available for individual
service nodes. The details of service nodes are shown in context of their connection with the service controllers.
PT_SN_DOWN The service node connected to the controller has crashed and is
permanently down.
PT_SN_YELLOW Reached the high watermark threshold for the supported resource
limit.
PT_DIVERT_FAILED The service controller data path has failed and the controller cannot
divert traffic flows to the service node.
PT_ALG_FLOW AppQoE cannot be applied because the flow request is for NAT
application-level gateway..
PT_TCP_MID_FLOW Asymmetric routing has been identified for the traffic flow and
the edge router is not able to sync but is able to see packets from
the middle of the flow.
PT_INTERMEDIATE AppQoE is receiving traffic flows from the middle and not from
TCP SYN.
• Application: This option displays application-wise flows for the service nodes connected to a
controller. Choose the Bytes or the Flows option in the Y Axis drop-down list to view the information
by flows or the number of hours of data. The applications are only displayed if application visibility
is enabled in the localized data policy attached to the device.
The following sample output shows the traffic statistics for service nodes in a service node group:
Device# show service-insertion type appqoe statistics service-node-group
Service Node Group: SNG-APPQOE
Number of Service Node(s): 2
Member Service Nodes:
IP Address
10.1.1.1
10.1.1.2
The following sample output shows the configuration details of service controllers in a controller group:
Device# show service-insertion type appqoe appnav-controller-group
All AppNav Controller Groups in service context
Appnav Controller Group : ACG-APPQOE
Member Appnav Controller Count : 1
Members:
IP Address
10.1.1.100
Traffic Optimization with Cisco IOS XE Release This release extends the DRE functionality to Cisco
DRE 17.5.1a SD-WAN. DRE is a compression technology that
reduces the size of data transmitted over the WAN
Cisco vManage Release
and enables more effective utilization of the WAN.
20.5.1
DRE Profiles Cisco IOS XE Release This feature provides the flexibility to use resources
17.6.1a for DRE based on your connection requirements by
applying profiles such as S, M, L, and XL.
Cisco vManage Release
20.6.1
UCS-E Series Server Cisco IOS XE Release This feature lets you deploy Cisco Catalyst 8000V
Support for Deploying 17.6.1a instances, on supported routers, using the UCS-E
Cisco Catalyst 8000V series blade server modules. With this feature, the
Cisco vManage Release
supported routers can be configured as integrated
20.6.1
service nodes, external service nodes, or hybrid
clusters with both internal and external service nodes.
• RAM: 16 GB
Cisco Catalyst 8000V Edge Software (Cisco Cisco IOS XE Release 17.5.1a • Storage: 600 GB
Catalyst 8000V) and later
• vCPUs: 8
• RAM: 32 GB
Cisco IOS XE Release • Storage: 2 TB
17.6.1a
• vCPUs: 16
Cisco Catalyst
8000V • RAM: 16 GB
Cisco IOS XE Release • Storage: 600 GB
17.5.1a
• vCPUs: 8
• RAM: 32 GB
Cisco IOS XE Release
17.6.1a • Storage: 2 TB
C8500L-8S4X
• RAM: 16 GB
Cisco IOS XE Release
17.5.1a • Storage: 600 GB
Parameter Value
Table 6: DRE Profiles, Resource Requirements, and Supported Connections and FanOut
C8200-1N-4T
S — 8 GB 120 GB 750 35
(S)
S S, M 8 GB 120 GB 750 35
C8300-2N2S-4T2X
M S 8 GB 280 GB 5000 70
(M)
L — 16 GB 500 GB 10,000 256
S — 8 GB 120 GB 750 35
Cisco Catalyst
8000V—6 S — 8 GB 120 GB 750 35
core (S)
S — 8 GB 120 GB 750 35
Cisco Catalyst
8000V—12 M — 8 GB 280 GB 5000 70
core (S)
L — 16 GB 500 GB 10,000 256
S — 8 GB 120 GB 750 35
Note UCS E-Series servers only support 6 core, 8 core, and 12 core Cisco Catalyst 8000V instances. For more
information, see Supported UCS E-Series Server Modules for Deploying Cisco Catalyst 8000V.
C8200-1N-4T (S) S 2 80 60
C8300-2N2S-6T (M) S 2 80 60
C8300-1N1S-4T2X (M)
M 4 250 230
C8300-1N1S-6T (M)
S 2 80 60
L 8 480 460
S 2 80 60
M 4 250 230
C8500L-8G4X (M)
L 8 480 460
XL 20 1200 1180
S 2 80 60
Cisco Catalyst 8000V—12
M 4 250 230
core (S)
L 8 480 460
S 2 80 60
XL 20 1200 1180
Note UCS E-Series servers only support 6 core, 8 core, and 12 core Cisco Catalyst 8000V instances. For more
information, see Supported UCS E-Series Server Modules for Deploying Cisco Catalyst 8000V.
Device Family Device Model Supported UCS-E Module and DRE Profiles
using the dual-side optimization enable command in Cisco vManage CLI templates. We don’t
recommended enabling dual-side SSL if you use GRE tunnels over the WAN.
Note UCS E-Series Server support is applicable for installing Cisco Catalyst 8000V as an external service node
starting from Cisco IOS XE Release 17.6.1a only.
• Only the VMware vSphere ESXi (release 6.7) hypervisor is supported for deploying Cisco Catalyst
8000V instances on UCS-E Series server modules.
• Hyperthreading should be disabled on VMware vSpehere ESXi hypervisor.
• Hyperthreading is not supported for the app-heavy core allocation profile for Cisco Catalyst 8000V
deployed on UCS E-Series servers.
• Cisco Catalyst 8000V instances on UCS-E series server modules can only have 6, 8, or 12 cores.
• Cisco Catalyst 8000V instances on UCS-E series server modules should be configured with the app-heavy
core allocation profile to enable them to run the DRE service.
• Only one Cisco Catalyst 8000V instance can be installed on a supported UCS E-Series server.
• To change the DRE profile applied to a device, you need to uninstall DRE, reinstall it, and then apply
the new DRE profile.
Note Cisco IOS XE SD-WAN devices need to be deployed at both ends of the Cisco SD-WAN overlay tunnel.
When DRE is configured, the TCP traffic is intercepted and it’s separated into three connections:
Client to the branch Cisco IOS XE SD-WAN device: This connection LAN
exists in Local Area Network (LAN)
Branch router to the data center router Through Cisco SD-WAN overlay
tunnel
TCP connections in the Local Area Network (LAN) continue to send the original data. However, TCP
connections through the Cisco SD-WAN overlay tunnel send data that is compressed by DRE. The DRE
container in the Cisco IOS XE SD-WAN device at one side of the tunnel compresses the data before it’s sent
over the overlay tunnel. The DRE container in the Cisco IOS XE SD-WAN device at the other side of the
tunnel decompresses the data before it's sent to the server at the remote branch or data center side.
Components of DRE
DRE Cache: DRE cache uses secondary storage so that it can store a large amount of data. DRE cache is
stored on both sides of the WAN and is used by edge devices to decompress the data. DRE cache in both
devices (branch and data center) is synchronized, which means that if a chunk signature is present on one
side, the other side has it too.
DRE Compression: DRE uses the Lempel-Ziv-Welch (LZW) compression algorithm for compressing data.
DRE operates on large streams of data, typically tens to hundreds of bytes or more, and maintains a much
larger compression history.
• Small (S)
• Medium (M)
• Large (L)
• Extra-large (XL)
To see the profiles supported on the devices that support the DRE feature, see the Supported DRE Profiles
section in this chapter.
Configure DRE
Upload DRE Container Image to the Software Repository
Prerequisite
Download the DRE container image from Cisco software downloads page.
8.
Note The Resource Profile field is applicable for DRE profiles. The DRE profiles feature was introduced in Cisco
IOS XE Release 17.6.1a. Therefore, this option is not available in previous releases.
(Optional) In the Resource Profile field, choose Global from the drop-down list. Next, choose a profile
size from the options available.
If you don't configure the Resource Profile, the default DRE profile size for the device is applied. For
more information on the default profiles, see Supported DRE Profiles.
9. (Optional) To optimize HTTPS, FTPS, or any other encrypted traffic, enable SSL Decryption.
Note If you enable SSL Decryption, you must configure an SSL/TLS decryption security policy so that the TLS
service can decrypt the traffic before it is sent to the DRE container, and then encrypted again after the traffic
is optimized.
Note To deactivate the DRE service, detach the AppQoE template from the device template.
Note For more information, see Configure Centralized Policies Using Cisco vManage.
3. In the policy configuration wizard, click Next until you are on the Configure Traffic Rules window.
4. Click Traffic Data, and then click Add Policy.
5. Enter a name and description for your policy.
6. Click Sequence Type and from the Add Data Policy dialog box, choose Custom.
7. Click Add Sequence Rule.
8. Under the Match option, you can choose any match conditions that are applicable to a data policy, such
as, Source Data Prefix, Application/Application Family List, and so on.
9. Under the Actions option, choose Accept. Choose TCP Optimization and DRE Optimization from
the options.
Note Not all actions are available for all match conditions. The actions available to you depend on the match
conditions you choose. For more information, see Configure Traffic Rules.
Configuration Workflow
1. Configure the UCS E-Series server on the supported router.
2. Deploy Cisco Catalyst 8000V on the supported UCS E-Series server.
3. In Cisco vManage, configure AppQoE feature template for Cisco Catalyst 8000V instances on UCS
E-Series servers.
4. In Cisco vManage, configure the AppQoE feature template for the service controllers, and add additional
configuration using Cisco vManage CLI template and CLI Add-on feature template.
interface ucse1/0/0
vrf forwarding 5
For the DRE service to be enabled, bring up DRE on the Cisco Catalyst 8000V instance configured as
the integrated service node separately. For more information, see Enable DRE Optimization.
interface ucse1/0/0
vrf forwarding 5
ip address 10.40.17.1 255.255.255.0
service-insertion service-node-group appqoe SNG-APPQOE
service-node 192.168.2.2
service-insertion service-node-group appqoe SNG-APPQOE1
service-node 10.40.17.5
!
service-insertion appnav-controller-group appqoe ACG-APPQOE
appnav-controller 10.40.17.1 vrf 5
9. Attach the following to the device template of the router that has Cisco Catalyst 8000V deployed on its
UCS E-Series server:
• AppQoE feature template
• CLI Add-on feature template with the UCS E-Series server configuration
• CLI template with the hybrid cluster configuration
For the DRE service to be enabled, bring up DRE on the Cisco Catalyst 8000V instance configured as
integrated service node separately. For more information, see Enable DRE Optimization.
Device(config-if)# no shutdown
Configure Virtual Port Group and Map it to DRE, and Assign a DRE Profile
Note The DRE Profiles feature is available starting from Cisco IOS XE Release 17.6.1a only. This feature is not
applicable to releases before Cisco IOS XE Release 17.6.1a.
The following example shows how to configure a virtual port group, map it to the DRE service and assign a
DRE profile to the device. This example shows the small (S) profile being assigned.
Device(config)# interface VirtualPortGroup 0
Device(config-if)# no shutdown
Note Use the app-hosting activate appid command if you've already configured the DRE application, but haven't
enabled it. Alternatively, you can use the start command in application hosting gateway configuration mode,
as shown in the example in the preceding section.
Uninstall DRE
Follow these steps to deactivate and uninstall the DRE service.
1. Use the following command in privileged EXEC mode to stop the DRE service.
Device# app-hosting stop appid Bangalore
Monitor DRE
You can monitor the traffic or applications optimized by DRE using Cisco vManage.
1. From the Cisco vManage menu, choose Monitor > Network.
2. Click the hostname of the device you want to monitor.
3. Under Service, choose AppQoE DRE Optimization.
4. Choose Optimized Traffic or Application, depending on what you want to monitor.
5. Choose Controller or Service Node.
If the chosen device has an integrated service node, you can view the data for either the controller role or
the service node role. If the chosen device is an external AppQoE service node, you can view the monitoring
data for the external service node, as well as the controller that it's connected to.
DRE ID : 52:54:dd:d0:e2:8d-0176814f0f66-93e0830d
Disk latency : 16 ms
Active alarms:
None
Configuration:
Maximum fanout : 35
CPU cores : 1
Disk encryption : ON
To view the status in more detail, use the show sdwan appqoe dreopt status detail command.
Cache details:
Other reasons : 0
Connection Statistics:
Alloc : 325071
Free : 325071
Server IP Port State DRE LAN BYTES DRE WAN BYTES DRE COMP Last
Update Entry Age
----------------------------------------------------------------------------------------------------------
Cache details:
The following example shows DRE optimization statistics for a peer device.
Device# show sdwan appqoe dreopt statistics peer
----------------------------------------------------------------------------------------
Status: Success
Atempts: 1
ENCRYPTION:
---------------------------------------------------
---------------------------------------------------
---------------------------------------------------
DECRYPTION:
---------------------------------------------------
---------------------------------------------------
SEGMENT BLOCK | 1 1 0
---------------------------------------------------
Troubleshoot DRE
The following sample output displays the statistics for the auto discovery of peer devices. When connections
are not optimized by DRE, run this command and share the output with Cisco Technical Support.
==========================================================
Auto-Discovery Statistics
==========================================================
The following sample output displays the statistics for one time exchange of information between peer devices.
Device# show sdwan appqoe aoim-statistics
==========================================================
AOIM Statistics
==========================================================
LOCAL AO Statistics
----------------------------------------
Number Of AOs : 2
AO Version Registered
SSL 1.2 Y
DRE 0.23 Y
PEER Statistics
----------------------------------------
Number Of Peers : 1
AO Version InCompatible
SSL 1.2 N
DRE 0.23 N
The following example shows how to clear DRE cache. Clearing cache restarts the DRE service.
Device# clear sdwan appqoe dreopt cache