M Route Leaking Use Case
M Route Leaking Use Case
Figure 1:
As shown in the figure above, each site has a separate associated template, which contains VRF/network
definitions specific to that site only. On-Prem Template is associated to the NDFC managed on-premises site,
whereas AWS Template and Azure Template are associated to the AWS and Azure cloud sites, respectively.
Inter-VRF route leaking is configured explicitly between different VRFs to allow communication between
the sites.
Step 1 In NDO, navigate to Application Management > Schemas and click Add Schema.
Step 2 Provide the schema name and click Add.
For this use case, we will name the new schema VRF Route Leaking Schema.
Figure 2:
You are returned to the Overview page for the new VRF Route Leaking Schema schema.
Step 3 Under the VRF Route Leaking Schema schema, click Add New Template.
Step 4 Choose the NDFC template.
Step 5 Enter a name in the Display Name field to create an NDFC-type template (for example, On-Prem Template).
Step 6 Select the dcnm-default-tn tenant in the Select a Tenant field to map the template to that tenant.
Figure 3:
Step 7 Under Template Properties, click Create Object and choose VRF to create a VRF that will be used with the NDFC
managed on-premises site.
Note If you have an on-premises VRF already created that you want to use instead of creating a new VRF, under
Template Properties, click Import, then import the already-created VRF.
Currently, support is only available for importing VRFs and networks from on-premises sites.
Step 8 Enter a name in the Display Name field for this VRF (for example, v10).
Figure 4:
Step 9 Under Template Properties, click Create Object and choose Network to create a network.
Note If you have a network already created that you want to use instead of creating a new network, under
Template Properties, click Import, then import the already-created network.
Step 10 Enter a name in the Display Name field for the network (for example, net10).
Step 11 In the Virtual Routing & Forwarding field, choose the v10 VRF to map the net10 network to that VRF.
Figure 5:
Step 12 In the Gateway IP field, click Add Subnet and provide the gateway IP address, then click Add.
Figure 6:
Figure 7:
Step 15 Associate this template only to the on-premises site (the Sydney site in this example use case), then click Ok.
Figure 9:
Step 16 Click Template Properties and select the on-premises site (the Sydney site in this example use case), then select the
v10 VRF.
Step 17 In the right pane, click Add Static Leaf.
Figure 10:
Step 18 In the Leaf field, select the leaf/border/border gateway device where this VRF is to be deployed and click Ok.
In this example, you need to deploy the VRF on the leaf nodes (where the endpoints part of the network mapped to the
VRF will be connected) and on the BGW spine node to be able to extend the Layer 3 connectivity for the VRF towards
the cloud sites.
Step 19 To attach the network to the leaf switches, click the net10 network, then click Add Static Port to add the ports where
you want to deploy this network.
The Add Static Port window appears.
Step 20 In the Add Static Port window, click Add Path.
The Add Static Port window appears.
Step 21 In the Leaf field, select the device where you want to deploy this network.
Step 22 (Optional) Enter the necessary information in the VLAN field.
Step 23 In the Ports field, select the ports where you want to deploy this network.
Step 24 Click Save.
Figure 11:
Figure 12:
Step 26 Click the arrow next to the on-premises site, and from the drop-down menu, select Template Properties.
Step 27 Click Deploy to Sites.
Figure 14:
Figure 16:
What to do next
Follow the procedures provided in Configure the Azure Site Template, on page 11.
Step 1 Under the VRF Route Leaking Schema schema, click Add New Template.
Step 2 Choose the NDFC template.
Step 3 Enter a name in the Display Name field to create an NDFC-type template for the Azure site (for example, Azure
Template).
Step 4 Select the dcnm-default-tn tenant in the Select a Tenant field to map the template to that tenant.
Figure 17:
Step 5 Under Template Properties, click Create Object and choose VRF to create a VRF that will be used with the Azure
site.
Figure 18:
Step 6 Enter a name in the Display Name field for this VRF (for example, azure10).
Figure 19:
Step 7 In the Template Properties area, click Actions > Sites Association.
Figure 20:
Step 8 Associate this template only to the Azure site, then click Ok.
Figure 21:
Step 9 Click the azure10 VRF, then click Add Region to create the VNet in a selected region.
The Add Cloud Region CIDRs window appears.
Step 10 In the Region field, choose the region where you want to create the VNet.
Step 11 In the CIDR field, click Add CIDRs and define a CIDR block for the VNet.
Step 12 Click Add Subnet to create the subnets, then click Save.
Figure 22:
Step 13 Check the box under the VNet Peering field, then select the hub network that was created on the Cisco Cloud Network
Controller for Azure.
Figure 23:
To verify that the configurations were pushed out correctly, connect to the Cloud Network Controller deployed on
Azure and navigate to Cloud Resources > Virtual Networks, then click the azure10 VNet and use the information
in the Overview page for additional verifications:
Figure 25:
Note that there is no destination address configured at this point in the process, so the Azure site cannot talk to any
other site yet at this point in the process. This destination address configuration will be pushed out after you have
completed the route leaking procedure.
What to do next
Follow the procedures provided in Configure the AWS Site Template, on page 16.
Step 1 Under the VRF Route Leaking Schema schema, click Add New Template.
Step 2 Choose the NDFC template.
Step 3 Enter a name in the Display Name field to create an NDFC-type template for the AWS site (for example, AWS Template).
Step 4 Select the dcnm-default-tn tenant in the Select a Tenant field to map the template to that tenant.
Figure 26:
Step 5 Under Template Properties, click Create Object and choose VRF to create a VRF that will be used with the AWS
site.
Step 6 Enter a name in the Display Name field for this VRF (for example, aws10).
Figure 27:
Step 7 In the Template Properties area, click Actions > Sites Association.
Step 8 Associate this template only to the AWS site, then click Ok.
Figure 28:
Step 9 Click the arrow next to Template Properties, and from the drop-down menu, select the AWS cloud site.
Step 10 Click the aws10 VRF, then click Add Region to create the VPC in a selected region.
The Add Cloud Region CIDRs window appears.
Step 11 In the Region field, choose the region where you want to create the VPC.
Step 12 In the CIDR field, click Add CIDRs and define a CIDR block for the VPC.
Step 13 Click Add Subnet to create the subnets and map them to the availability zones, then click Save.
Figure 29:
Step 14 Check the box under the Hub Network field, then select the hub network that was created on the Cisco Cloud Network
Controller for AWS.
This allows the Cisco Cloud Network Controller to attach the subnets onto the transit gateway, which builds the
connectivity from those subnets to the transit gateway, where the transit gateway already has the connectivity to the
Cisco Catalyst 8000Vs in the cloud.
Step 15 In the Subnets field, map the subnets that will be used for the transit gateway.
It is best practice to have a dedicated subnet that will be used for the transit gateway.
Figure 30:
Figure 31:
To verify that the configurations were pushed out correctly, connect to the Cloud Network Controller deployed on
AWS and navigate to Cloud Resources > VPCs, then click the aws10 VPC and use the information in the Overview
page for additional verifications:
Figure 33:
Note that there is a destination address configured at this point in the process for AWS, but this shows only that this
AWS site can talk to itself; the AWS site cannot talk to any other site yet at this point in the process. The necessary
destination address configuration that will allow the AWS site to talk to another site will be pushed out after you have
completed the route leaking procedure.
What to do next
Configure route leaking using the procedures provided in Configure Route Leaking, on page 21.
Step 1 Click the Azure Template that you configured earlier in these procedures and the dcnm-default-tn tenant.
Step 2 Click the azure10 VRF that you configured earlier in these procedures.
Step 3 In the right pane, click Add Leak Route.
Figure 34:
Step 4 In the Add Leak Routes window, click Select a Target VRF.
Figure 35:
Step 5 In the Select a Target VRF page, select the NDFC VRF (v10) that you want to leak routes to, then click Select.
Figure 36:
Step 6 In the Add Leak Routes window, click Add Subnet IP, then add the Azure cloud subnets that you want to propagate
to the on-premises site.
Note The Add Subnet IP option allows leaking of only selective subnets. Alternatively, you can use the All
Subnet IPs option instead in the case where all the prefixes need to be leaked into a destination VRF.
Figure 37:
For this use case, you will use the 90.1.1.0/24 subnet.
You are returned to the Azure Template page, where you can see the configuration for this route leak from the Azure
VRF to the NDFC VRF.
What to do next
Follow the procedures provided in Configure Route Leak from Azure VRF to AWS VRF, on page 24.
Step 1 In the Select a Target VRF page, select the AWS VRF (aws10) that you want to leak routes to, then click Select.
Figure 38:
Figure 39:
Step 4 Click the arrow next to the Azure site, and from the drop-down menu, select Template Properties.
Step 5 Click Deploy to sites.
Figure 40:
The Deploy to sites window appears, showing where the template will be deployed.
Step 6 Click Deployment Plan for additional verification, then click on a site to see the deployment plan for that specific site.
Step 7 Click Deploy to have NDO push the configurations to the site specific controllers.
Figure 41:
What to do next
Follow the procedures provided in Configure Route Leak from AWS VRF to NDFC VRF, on page 26.
Step 1 Click the AWS Template that you configured earlier in these procedures and the dcnm-default-tn tenant.
Step 2 Click the aws10 VRF that you configured earlier in these procedures.
Step 3 In the right pane, click Add Leak Route.
Figure 42:
Step 4 In the Add Leak Routes window, click Select a Target VRF.
The Select a Target VRF window appears.
Step 5 In the Select a Target VRF window, select the NDFC VRF (v10) that you want to leak routes to, then click Select.
You are returned to the Add Leak Routes window.
Step 6 In the Add Leak Routes window, click Add Subnet IP, then add the AWS cloud subnets that you want to propagate to
the on-premises site.
Note The Add Subnet IP option allows leaking of only selective subnets. Alternatively, you can use the All
Subnet IPs option instead in the case where all the prefixes need to be leaked into a destination VRF.
Figure 43:
For this use case, you will use the following subnets:
• 10.220.1.0/24
• 10.220.2.0/24
What to do next
Follow the procedures provided in Configure Route Leak from AWS VRF to Azure VRF, on page 28.
Step 1 In the Select a Target VRF page, select the Azure VRF (azure10) that you want to leak routes to, then click Select.
You are returned to the Add Leak Routes window.
Step 2 In the Add Leak Routes window, add the subnets that you want to propagate to the Azure cloud.
For this use case, you will use the following subnets:
• 10.220.1.0/24
• 10.220.2.0/24
Therefore, you will click the dropdown menu and choose those subnets.
Figure 44:
Step 4 Click the arrow next to the AWS site, and from the drop-down menu, select Template Properties.
Step 5 Click Deploy to sites.
The Deploy to sites window appears, showing where the template will be deployed.
Step 6 Click Deployment Plan for additional verification, then click on a site to see the deployment plan for that specific site.
Step 7 Click Deploy to have NDO push the configurations to the site specific controllers (NDFC and Cloud Network Controller).
What to do next
Follow the procedures provided in Configure Route Leak from NDFC VRF to AWS VRF, on page 30.
Step 1 Click the On-Prem Template that you configured earlier in these procedures and the dcnm-default-tn tenant.
Step 2 Click the v10 VRF that you configured earlier in these procedures.
Step 3 In the right pane, click Add Leak Route.
Figure 46:
For this use case, you will use the 172.16.10.0/24 subnet.
Figure 47:
What to do next
Follow the procedures provided in Configure Route Leak from NDFC VRF to Azure VRF, on page 31.
Step 1 In the Select a Target VRF window, select the Azure VRF (azure10) that you want to leak routes to, then click Select.
You are returned to the Add Leak Routes window.
Step 2 In the Add Leak Routes window, add the subnets that you want to propagate to the Azure cloud.
For this use case, you will use the 172.16.10.0/24 subnet. Therefore, you will click the dropdown menu and choose the
172.16.10.0/24 subnet.
Figure 48:
Step 4 Click the arrow next to the on-premises site, and from the drop-down menu, select Template Properties.
Step 5 Click Deploy to sites.
Figure 49:
The Deploy to sites window appears, showing where the template will be deployed.
Step 6 Click Deployment Plan for additional verification, then click on a site to see the deployment plan for that specific site.
Figure 50:
Step 7 Click Deploy to have NDO push the configurations to the site specific controllers (NDFC and Cloud Network Controller).
What to do next
Verify that the configurations were deployed successfully using the procedures provided in Verify the
Configurations, on page 33.
Step 2 Enter sh ip route vrf v10 on the on-premises Border Gateway Spine device:
The routing table on the on-premises leaf switch shows that the reachable subnets are:
• AWS: 10.220.0.0/16
• Azure: 10.220.0.0/16
Step 3 Connect to the Cloud Network Controller deployed on AWS and navigate to Application Management > VRFs, and
verify that you can see the Azure and NDFC VRFs.
Step 4 Remaining in the Cloud Network Controller deployed on AWS, perform a verification on the route table view.
Step 5 In the AWS console, perform a verification on the route table view.
Step 6 Connect to the Cloud Network Controller deployed on Azure and navigate to Application Management > VRFs, and
confirm that you can see the AWS and NDFC VRFs:
Step 7 Remaining in the Cloud Network Controller deployed on Azure, navigate to Cloud Resources > Virtual Networks,
then click the azure10 VNet and use the information in the Overview page for additional verifications.