Cisco SD-WAN: NAT DIA – Static NAT Route Method

What is Cisco SD-WAN NAT DIA Feature

Cisco SD-WAN offers a powerful feature called Direct Internet Access (DIA). DIA is a component of the Cisco SD-WAN architecture that enables certain traffic from branch locations to route directly to the Internet by performing NAT, bypassing the organization’s data center. By doing so, it reduces latency and improves application performance for Internet-bound traffic.

Benefits of Using DIA:

  • Reduced Latency: By avoiding route through the data center, DIA ensures faster access to Internet resources.
  • Improved Application Performance: Applications that rely on the Internet experience better responsiveness.
  • Cost Optimization: DIA allows organizations to use a mix of MPLS (Multiprotocol Label Switching) and low-cost broadband or other transports in an active/active fashion, optimizing capacity and reducing bandwidth costs. Also this reduction of load on Data Center’s Circuits.

Methods to Implement NAT DIA

Cisco SD-WAN provides below methods to implement NAT DIA

  1. Static NAT Route: Configure a static NAT route to direct traffic from the service VPN to the Internet. This method diverts all traffic to NAT DIA for which specific route is not available in particular service VPN.
  2. Centralized Data Policy: Create a centralized data policy that matches traffic from the service VPN and sets the NAT for VPN0 (DIA). This method uses various configured parameters(like source/destination/application etc) to match and divert the traffic to NAT DIA, thus provides more granularity.
  3. Cloud On Ramp (CoR) for SaaS: Cisco SD-WAN provides option to configure CoR SaaS applications which can leverage NAT DIA or Gateway exit to reach SaaS applications.

In this article, we will use Static NAT Route method to configure NAT DIA. Later will explore Centralised Data Policy / CoR SaaS method in another article.

Topology

We will be using below topology for this demonstration. Here we have two Service VPNs – VPN10 and VPN20. We will be enabling DIA exit for users in VPN10.

Configuration

Configuring NAT DIA for VPN10 require two steps.

  • Configure NAT statement on Internet Interface.
  • Configure Static NAT route in VPN10

Steps

1. Identify Device Template name on vManage GUI via Configuration > Devices and search for Device.

2. Navigate to Configuration > Template > Device Template and view identified Device Template to find the Feature Template name for VPN 0 Internet Interface and VPN10 template.

3. Navigate to Configuration > Template > Feature Template. Edit above Feature Template and Enable NAT. You can change other parameters of NAT if required. Once done, click update.

4. Now these changes will be pushed to all attached devices having the Feature template. Click Next and move to check configuration differences. Once ready, click Configure.

5. Once above configuration pushed, edit VPN10 Feature Template to add Static NAT route. In IPv4 Route section, add new IPv4 route.

6. Update Feature template and check configuration differences and push configuration to devices.

7. Login to configured devices CLI and you will see a new Default Static NAT route in VPN10 table.

BEFORE

BR101-vEdge-1# sh ip route vpn 10
Codes Proto-sub-type:
  IA -> ospf-intra-area, IE -> ospf-inter-area,
  E1 -> ospf-external1, E2 -> ospf-external2,
  N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
  e -> bgp-external, i -> bgp-internal
Codes Status flags:
  F -> fib, S -> selected, I -> inactive,
  B -> blackhole, R -> recursive, L -> import

                                            PROTOCOL  NEXTHOP     NEXTHOP          NEXTHOP                                                   
VPN    PREFIX              PROTOCOL         SUB TYPE  IF NAME     ADDR             VPN      TLOC IP          COLOR            ENCAP  STATUS  
---------------------------------------------------------------------------------------------------------------------------------------------
10     10.1.10.0/30        omp              -         -           -                -        10.0.10.1        mpls             ipsec  F,S     
10     10.1.10.0/30        omp              -         -           -                -        10.0.10.1        biz-internet     ipsec  F,S     
10     10.1.10.4/30        omp              -         -           -                -        10.0.10.2        mpls             ipsec  F,S     
10     10.1.10.4/30        omp              -         -           -                -        10.0.10.2        biz-internet     ipsec  F,S     
10     10.1.101.0/24       connected        -         ge0/2.10    -                -        -                -                -      F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.1        mpls             ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.1        biz-internet     ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.2        mpls             ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.2        biz-internet     ipsec  F,S     

AFTER

BR101-vEdge-1# sh ip route vpn 10
Codes Proto-sub-type:
  IA -> ospf-intra-area, IE -> ospf-inter-area,
  E1 -> ospf-external1, E2 -> ospf-external2,
  N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
  e -> bgp-external, i -> bgp-internal
Codes Status flags:
  F -> fib, S -> selected, I -> inactive,
  B -> blackhole, R -> recursive, L -> import

                                            PROTOCOL  NEXTHOP     NEXTHOP          NEXTHOP                                                   
VPN    PREFIX              PROTOCOL         SUB TYPE  IF NAME     ADDR             VPN      TLOC IP          COLOR            ENCAP  STATUS  
---------------------------------------------------------------------------------------------------------------------------------------------
10     0.0.0.0/0           nat              -         ge0/0       -                0        -                -                -      F,S     
10     10.1.10.0/30        omp              -         -           -                -        10.0.10.1        mpls             ipsec  F,S     
10     10.1.10.0/30        omp              -         -           -                -        10.0.10.1        biz-internet     ipsec  F,S     
10     10.1.10.4/30        omp              -         -           -                -        10.0.10.2        mpls             ipsec  F,S     
10     10.1.10.4/30        omp              -         -           -                -        10.0.10.2        biz-internet     ipsec  F,S     
10     10.1.101.0/24       connected        -         ge0/2.10    -                -        -                -                -      F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.1        mpls             ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.1        biz-internet     ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.2        mpls             ipsec  F,S     
10     192.168.10.10/32    omp              -         -           -                -        10.0.10.2        biz-internet     ipsec  F,S     

BR101-vEdge-1# 

8. Generate traffic to test DIA exit from LAN device.

LAB125-LAN-Router#ping vrf br101-vrf10 8.8.8.8
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
LAB125-LAN-Router#

9. BR101-vEdge-1 is VRRP active and it shows NAT translation.

BR101-vEdge-1# show ip nat filter

                            PRIVATE      PRIVATE      PRIVATE  PRIVATE  PUBLIC                    PUBLIC  PUBLIC                                                                            
NAT  NAT                    SOURCE       DEST         SOURCE   DEST     SOURCE       PUBLIC DEST  SOURCE  DEST    FILTER       IDLE        OUTBOUND  OUTBOUND  INBOUND  INBOUND             
VPN  IFNAME  VPN  PROTOCOL  ADDRESS      ADDRESS      PORT     PORT     ADDRESS      ADDRESS      PORT    PORT    STATE        TIMEOUT     PACKETS   OCTETS    PACKETS  OCTETS   DIRECTION  
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0    ge0/0   10   icmp      10.1.101.4   8.8.8.8      5        5        199.101.1.2  8.8.8.8      5       5       established  0:00:00:02  5         590       5        570      -          

CLI Configuration

vpn 0
 interface ge0/0
  ip address 199.101.1.2/30
  nat                            <<<<<<<<
vpn 10
 ip route 0.0.0.0/0 vpn 0        <<<<<<<<

This completes NAT DIA configuration on vEdge router. For more details, please refer Cisco Documentation.

2 thoughts on “Cisco SD-WAN: NAT DIA – Static NAT Route Method”

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Share via
Copy link