Zscaler Cisco SD WAN Deployment Guide FINAL
Zscaler Cisco SD WAN Deployment Guide FINAL
DEPLOYMENT GUIDE
Contents
Terms and Acronyms 8
Design 15
GRE and IPSec Tunnels 15
Tunnel Liveliness 15
GRE Keepalives and DPD 15
Layer 7 Health Checks 16
Zscaler Active/Standby Tunnel Combinations 16
One Active/Standby Tunnel Pair 16
Multiple Active/Active Tunnels with Equal-Cost Multi-Path 17
Multiple Active/Standby Tunnel Pairs 18
Active/Active Tunnels with Weighted Load Balancing 18
Design Considerations 26
Basic 26
ZIA Admin Portal 26
ECMP Tunnels 26
Auto Tunnels 27
L7 Health Checks 27
GRE Keepalives 27
Cisco IOS XE SD-WAN 27
Cisco vEdge 27
Additional Features 27
Deploy 28
Deploy: ZIA for API Access 28
Procedure 1: Log Into ZIA 29
Procedure 2: Find Zscaler Organization Domain and Partner Base URI 29
Procedure 3: Add and Verify SD-WAN Partner Key 31
Procedure 4: Add a Partner Administrator Role 34
Procedure 5: Create a Partner Administrator 36
Procedure 6: Activate Pending Changes 39
Operate 73
Verify Cisco SD-WAN Tunnel Operation from the Cisco vManage Console 73
Verify Cisco SD-WAN Event Logs from the Cisco vManage Console 74
Verify Zscaler Tunnel Status in ZIA Admin 75
Verify Zscaler Tunnel Event Logs in ZIA Admin 76
Tunnel Logging 76
Device Templates 90
Single WAN Edge Router Sites (Cisco IOS XE SD-WAN) 90
Single WAN Edge Router Sites (Cisco vEdge) 91
Traffic Redirection 98
Service Route 98
Branch VPN1 Feature Template 98
Centralized Policy 98
Miscellaneous 99
Customize Health Tracker 99
Enable Advanced Zscaler Features 99
Customize Zscaler Tunnel Destinations (Primary and Secondary DCs) 99
Assign Tunnel Weights (Use with Active/Active Tunnels) 100
Miscellaneous 114
Customize Health Tracker 114
Enable Advanced Zscaler Features 114
Customize Zscaler Tunnel Destinations (Primary and Secondary DCs) 114
Assign Tunnel Weights (Use with Active/Active Tunnels) 114
Miscellaneous 123
Customize Health Tracker 123
Enable Advanced Zscaler Features 123
Customize Zscaler Tunnel Destinations (Primary and Secondary DCs) 123
Acronym Definition
Cisco vBond Cisco SD-WAN Orchestrator which facilitates the initial bring-up authentication and
authorization of the network elements.
Cisco vEdge Cisco SD-WAN a Cisco vEdge Cloud router.
Cisco vManage console Cisco SD-WAN centralized network management system that provides a interface and REST
APIs to monitor, configure, and maintain all Cisco SD-WAN devices in the overlay network.
Cisco vSmart Cisco SD-WAN centralized control data policies.
DIA Dedicated Internet Access
DLP Data Loss Prevention
DPD Dead Peer Detection (RFC 3706)
DTLS Datagram Transport Layer Security (RFC6347)
ECMP Equal-cost Multi-path
ESP Encapsulated Security Payload
GRE Generic Routing Encapsulation (RFC2890)
IKE Internet Key Exchange (RFC2409)
INET Internet Networking
IPS Intrusion Prevention System
IPSec Internet Protocol Security (RFC2411)
ISAKMP Internet Security Association and Key Management Protocol
NAT-T Network Address Translation traversal
NMS Network Management System
NTP Network Time Protocol
OAM Operation, Administration, and Management
OMP Overlay Management Protocol (Cisco SD-WAN)
PAT Port Address Translation
PBR Policy-based Routing
PFS Perfect Forward Secrecy
SIG Secure Internet Gateway
SSL Secure Socket Layer (RFC6101)
TLS Transport Layer Security (RFC5246)
URI Uniform Resource Identifier
VDI Virtual Desktop Infrastructure
VRF Virtual Routing and Forwarding
WAN Edge Cisco SD-WAN router solution
XFF X-Forwarded-For (RFC7239)
ZIA Zscaler Internet Access (Zscaler)
ZPA Zscaler Private Access (Zscaler)
Zscaler Overview
Zscaler (NASDAQ: ZS), enables the world’s leading organizations to securely transform their networks and applications for
a mobile and cloud-first world. Its flagship Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) services create
fast, secure connections between users and applications, regardless of device, location, or network. Zscaler delivers its
services 100% in the cloud and offers the simplicity, enhanced security, and improved user experience that traditional
appliances or hybrid solutions can’t match. Used in more than 185 countries, Zscaler operates a massive, global cloud
security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss. To
learn more, see Zscaler’s website or follow Zscaler on Twitter @zscaler.
Cisco Overview
Cisco (NASDAQ: CSCO) helps seize the opportunities of tomorrow by proving that amazing things can happen when you
connect the unconnected. An integral part of our DNA is creating long-lasting customer partnerships, working together to
identify our customers’ needs and provide solutions that fuel their success.
Cisco has preserved this keen focus on solving business challenges since its founding in 1984. Len Bosack and wife Sandy
Lerner, both working for Stanford University, wanted to email each other from their respective offices, but technological
shortcomings did not allow such communication. A technology had to be invented to deal with disparate local area
protocols, and as a result of solving their challenge, the multiprotocol router was born.
Audience
This document is designed for network engineers and network architects interested in configuring and integrating ZIA
access with Cisco WAN edge routers. It assumes the reader has a basic comprehension of IP networking and is familiar
with Cisco SD-WAN concepts and configurations. For more information, see:
• Zscaler Resources
• Cisco Resources
• Appendix E: Requesting Zscaler Support
Hardware Used
To create this document, Cisco WAN edge router solutions were tested in various use cases. They include a C8300-1N1S-
6T, ISR4331, ISR1100-4G (Cisco Viptela), and Cisco vEdge 100b.
Software Revisions
The following products and software versions are included as part of validation in this deployment guide. This validated
set is not inclusive of all possibilities.
• The Define section gives background on the Zscaler and Cisco SD-WAN solution.
• The Design section discusses the solution components, design aspects, and any prerequisites.
• The Deploy section provides information about various configurations and best practices.
• The Operate section shows how to manage different aspects of the solution.
ZIA Overview
ZIA is a secure internet and web gateway delivered as a service from the cloud. Think of ZIA as a secure internet on-
ramp— just make Zscaler your next hop to the internet via one of the following methods:
• Setting up a tunnel (GRE or IPSec) to the closest Zscaler data center (for offices).
• Forwarding traffic via our lightweight Zscaler Client Connector or PAC file (for mobile employees).
No matter where users connect—a coffee shop in Milan, a hotel in Hong Kong, or a VDI instance in South Korea—they get
identical protection. ZIA sits between your users and the internet and inspects every transaction inline across multiple
security techniques (even within SSL).
You get full protection from web and internet threats. The Zscaler cloud platform supports Cloud Firewall, IPS,
Sandboxing, DLP, and Browser Isolation, allowing you to start with the services you need now and activate others as your
needs grow.
ZPA Overview
ZPA is a cloud service that provides secure remote access to internal applications running on cloud or data center using
a Zero Trust framework. With ZPA, applications are never exposed to the internet, making them completely invisible
to unauthorized users. The service enables the applications to connect to users via inside-out connectivity rather than
extending the network to them.
ZPA provides a simple, secure, and effective way to access internal applications. Access is based on policies created by
the IT administrator within the ZPA Admin Portal and hosted within the Zscaler cloud. On each user device, software
called Zscaler Client Connector is installed. Zscaler Client Connector ensures the user’s device posture and extends a
secure microtunnel out to the Zscaler cloud when a user attempts to access an internal application.
Zscaler Resources
The following table contains links to Zscaler resources based on general topic areas.
https://config.zscaler.com/zscaler.net/cenr/
https://config.zscaler.com/zscalerbeta.net/cenr/
https://config.zscaler.com/zscalerone.net/cenr/
https://config.zscaler.com/zscalertwo.net/cenr/
https://config.zscaler.com/zscalerthree.net/cenr/
https://config.zscaler.com/zscloud.net/cenr
https://config.zscaler.com/zscalergov.net/cenr
Zscaler Training and Certification Training designed to help you maximize Zscaler products.
Submit a Zscaler Support Ticket Zscaler Support portal for submitting requests and issues.
Cisco SD-WAN
Cisco SD-WAN powered by Cisco Viptela and Cisco IOS XE is a highly secure, cloud-scale architecture that is open,
programmable, and scalable. Through the Cisco vManage console, you can quickly establish an SD-WAN overlay fabric.
Use it to connect data centers, branches, campuses, and colocation facilities to improve network speed, security, and
efficiency.
This document assumes you have the Cisco SD-WAN controllers already built and operational, either through the Cisco
cloud service or on-premises. Zscaler recommends that you use Cisco vManage console to configure and manage the
WAN edge routers.
Make sure that the WAN edge devices are already connected to the controllers in the SD-WAN overlay, and a basic device
template configuration from Cisco vManage console has been deployed on them. See Appendix A: Cisco Branch Base
Feature Templates and Configuration Values Used for base device and feature template configurations and Appendix
B: Tunnel Configuration Summary (Feature and Device Templates) for a summary of feature templates required to
configure the Zscaler tunnel use cases. Appendix C: Cisco IOS XE SD-WAN CLI Configuration and Appendix D: Cisco
vEdge CLI Configuration reflect CLI-equivalent configurations for Cisco IOS XE SD-WAN and Cisco vEdge, respectively.
This document requires administrator login credentials to Cisco vManage console and SSH administrator login credentials
to the WAN Edge routers.
Cisco Resources
The following table contains links to Cisco support resources.
Cisco SD-WAN End-to-End Additional information on deploying a Cisco SD-WAN network from
Deployment Guide end-to-end.
Cisco EN Validated Design and Simple, modular, use-case based design and deployment guidance to
Deployment Guides provide you with validated designs and best practices.
Define
The following section explain Cisco SD-WAN concepts.
The following example topology shows a Cisco SD-WAN network with two transports (MPLS and internet) and the SD-
WAN controllers reachable through the internet cloud. Two branch sites are shown with a data center site. SD-WAN
fabric (IPSec) tunnels are built between each WAN Edge router at each site for corporate traffic. A separate pair of GRE or
IPSec tunnels are built from each branch router to ZIA Public Service Edge for access to internet and SaaS applications. If
the local internet transport fails, traffic can traverse the SD-WAN overlay over the MPLS transport to the data center and
access the internet from there.
Support through Cisco SD-WAN 20.3 and Cisco IOS XE SD-WAN 17.3 release versions (Manual
Active/Standby Tunnels and L7 Health Checking)
Early support for Zscaler tunnels included GRE or IPSec tunnels that can be configured manually through Interface VPN
templates in Cisco vManage console, either in the transport VPN (IPSec or GRE) or service VPN (IPSec). A single active/
standby tunnel pair is supported per WAN edge router, along with L7 health check probes running between the WAN
Edge router and the respective Zscaler Private Service Edge and Zscaler Public Service Edge. The active tunnel is typically
connected to a primary node while the standby tunnel is connected to a secondary node.
Cisco SD-WAN 20.4 and Cisco IOS XE SD-WAN 17.4 release versions (Active/Active ECMP Tunnels
and Traffic Steering through Centralized Data Policy)
In 20.4/17.4, a new Cisco vManage console Secure Internet Gateway (SIG) feature template is introduced where you can
configure up to four active/backup tunnel pairs to get the benefit of equal cost multipath (ECMP) load balancing and
allow more traffic bandwidth to be redirected to Zscaler. As needed, assign weights to the tunnels so that more traffic
can traverse one tunnel over another. Traffic redirection into the tunnels is accomplished through a new SIG service route,
which reduces the administrative overhead of configuring static routes that require site-specific next-hop IP addresses.
You can also configure traffic redirection to Zscaler through centralized data policy, giving additional flexibility and
granularity to choose specific application traffic.
Cisco SD-WAN 20.5 and Cisco IOS XE SD-WAN 17.5 release versions (Zscaler Automatic IPSec
Tunnel Provisioning)
In 20.5/17.5, there were several updates to the SIG feature template, including accommodations for automatic discovery
and tunnel provisioning to the closest Zscaler data centers based on geolocation. Layer 7 (L7) Health checking is
automated and supported for Cisco vEdge WAN Edge routers as well.
Cisco SD-WAN 20.6 and Cisco IOS XE SD-WAN 17.6 release versions (L7 Health Checks for IPSec
Auto Tunnels for Cisco IOS XE SD-WAN routers)
In 20.6/17.6, up to four pairs of active/standby IPSec tunnels are supported with automatic provisioning. L7 automated
health checking is introduced as an in-product feature for Zscaler IPSec auto tunnels for Cisco IOS XE SD-WAN routers.
Official support for Cisco IOS XE SD-WAN L7 health checking for automatic IPSec Zscaler tunnels is in version 20.6.2/17.6.2.
Design
The following sections describe the architecture behind Cisco SD-WAN deployments.
GRE is neither TCP nor UDP. It has its own protocol number (47). Because GRE is a protocol without source or destination
ports, GRE packets can’t be translated by Port Address Translation (PAT) devices. The source IP address of a GRE packet
can, be translated with static or dynamic NAT. Using NAT, a single IP address is mapped to a single publicly routable IP
address. This is because no ports need to be mapped.
An IPSec packet uses Encapsulating Security Payload (ESP)—also a protocol without ports and unusable by PAT devices.
IPSec traffic can use NAT traversal (NAT-T) to transport packets. If both ends of the IPSec connection support NAT-T, then
Nat-Discovery packets are exchanged during the ISAKMP exchange. If NAT is detected, then ISAKMP packets change from
UDP port 500 to UDP port 4500. ESP data packets are encapsulated inside a UDP packet with source and destination
ports equal to 4500. Now the packet can be translated by a PAT device.
An active GRE or IPSec tunnel is defined by a unique 4-tuple of source IP address and interface, source port, destination
IP address, and destination port pair. Multiple tunnels can reference the same source IP address, but each tunnel
must have a unique source port or destination IP address and destination port number for the tunnel to be up and
operational.
Zscaler GRE tunnels support higher throughput than IPSec tunnels in the Zscaler cloud. Contact your Zscaler
representative for more information on bandwidth support. Bandwidth support can vary depending on the Zscaler cloud
and ZIA Public Service Edge you are connecting to.
Tunnel Liveliness
GRE Keepalives and DPD
GRE Keepalives for GRE tunnels and Dead Peer Detection (DPD) for IPSec tunnels are traditional methods for a local router
to determine whether the remote router at the end of a tunnel is reachable and able to forward traffic. Zscaler best
practices advises that you send GRE Keepalives and DPD packets no more than once every ten (10) seconds.
An L7 health check monitors latency and reachability based on HTTP request and response probes to a URL that is
reachable through the Zscaler tunnels, and allows you to fail over to an alternate tunnel when reachability fails or latency
degrades beyond an acceptable threshold.
To check the health of the application stack of the ZIA Public Service Edge, Zscaler recommends not performing L7
health checks to commonly visited websites. Instead, use the following non-public URL for the tracker. It is only reachable
through a Zscaler tunnel: http://gateway.<Zscaler Cloud Name>.net/vpntest.
The following diagram shows an example of an active/active tunnel deployment at sites with single and dual internet
circuits. In either deployment, if an active tunnel becomes unreachable or exceeds the latency threshold (with L7 health
checks enabled), then traffic is rehashed to one of the remaining tunnels. In the hybrid deployment, if the INET transport
goes down, or if all tunnels over the INET transport exceed the latency thresholds (with L7 health checks enabled),
then traffic can still take the default route over the SD-WAN overlay over the MPLS transport to the data center. Traffic
can access the internet through an on-premises security stack or via a separate Secure Internet Gateway (SIG) tunnel
originating from the data center hub router. In either deployment, if the ZIA Public Service Edge becomes unreachable,
traffic can fall back to the data center over the SD-WAN overlay.
• With a static route to rely on destination-based routing (typically a default route where all internet-bound traffic is
sent). 20.4/17.4 code version introduces a new type of route for Zscaler or other third-party tunnels called a Service
Route, which has a next hop that points to the SIG service.
• With a centralized data policy that allows you to customize the traffic sent to the Zscaler service. 20.4/17.4 supports
centralized policy for both Cisco vEdge and Cisco IOS XE SD-WAN devices where you can rely on prefix-lists and
applications lists to direct desired traffic to the SIG service.
SIG Service
Starting in 20.4/17.4, Zscaler tunnels can make use of the SIG service construct that was introduced in Cisco vManage
console for integration with Cisco Umbrella SIG. The SIG service keeps track of the state and next hop of the tunnels,
in addition to redirecting traffic into the tunnels from the service VPN. Traffic redirection at the branch is implemented
locally through service routing (defined in the service VPN feature templates) or as a centralized data policy action.
20.4/17.4 and No Yes A new Unified SIG workflow is introduced with a SIG feature
later template, which greatly simplifies the SIG tunnel configuration
process regardless of the tunnel type (Umbrella, Zscaler, other
third-party IPSec or GRE tunnels).
20.5/17.5 and • The 20.5/17.5 and 20.6/17.6 releases offer three tunnel
20.6/17.6 types, Umbrella, Zscaler, and Generic.
• Zscaler recommends that you use automatic tunnels if
available.
• To configure automatic IPSec Zscaler tunnels, use the
Zscaler option.
• To configure manual tunnels (IPSec or GRE), use the Generic
option.
vManage 20.6 No Yes In vManage version 20.6, the SIG template is divided into
several sections:
After automatic tunnels (through the SIG feature template) and the SIG credentials feature template are added to the
device template and are pushed to the WAN edge device, the following API steps occur from the WAN edge router to
provision the tunnels.
1. An authenticated session request is made to the ZIA by sending an API key, username, password, and time stamp.
The requestor receives a cookie from Zscaler, which is then used in subsequent calls as part of the authenticated
session.
2. VPN credentials are added for each tunnel. Each tunnel has a unique name, FQDN, and pre-shared security key that
is generated by the WAN edge device and then shared to the Zscaler cloud. Zscaler returns a tunnel ID associated
with each tunnel. For future edits and modifications, the WAN device refers to the tunnel ID.
3. Next, the VPN credential associated with the tunnel is added to a location before it is usable by Zscaler policy. If it is
the first tunnel for a WAN edge device, create a location with a unique location name and add it to ZIA via an HTTP
POST. The tunnel VPN credentials are added to the location.
4. A final API activates the configuration changes made in ZIA.
5. Primary and secondary data centers are retrieved from ZIA.
Another sequence of API calls happens when a tunnel is deleted. API HTTP responses are received and the last response
code is recorded for troubleshooting purposes. After the APIs are completed, you get a non-zero location ID and non-
zero tunnel IDs. Whether the tunnel comes up and active depends on the Internet Key Exchange (IKE) negotiation. See
the Operate section for more information on troubleshooting.
• Primary Data Center and Secondary Data Center: By default, the primary and secondary data centers are
automatically selected. Alternatively, manually choose the data centers. If a Global variable is selected, you can
choose from a drop-down list of data centers. This list of data centers is static at the time of this writing and the
information might not be completely current. If you choose device-specific input, an FQDN is required for the
variable. For the latest list of data centers, go to https://config.zscaler.com (then choose the cloud name from the
drop-down).
• Authentication Required: If enabled, the Surrogate IP feature can be enabled with its corresponding parameters.
• XFF Forwarding
• Enable Firewall
• Enable IPS Control
• Enable Caution
• Enable AUP and additional AUP parameters
For additional information on these advanced location features, see Configuring Locations.
20.6/17.6 • L7 health checks are enabled by defult on all auto-tunnels provisioned with the SIG
templates (Umbrella and Zscaler).
• For Cisco IOS XE SD-WAN routers, the L7 health check is considered an in-product feature.
The L7 health check is implemented as an HTTP request. It measures route-trip latency and compares it to the threshold
set. Customize the tracker if you want to change the default parameters or use a different service URL. The default settings
are:
• Interval: 30 seconds
• Multiplier: 2
• Threshold: 1000 msec
• Service URL for Zscaler tunnel type: http://gateway.<Zscaler Cloud Name>.net/vpntest
For Cisco IOS XE SD-WAN, a Loopback 65530 interface in VRF 65530 is created and used to source the L7 health check
probes through each active and backup tunnel. You must configure a tracker source IP address, which is a private RFC 1918
address that should not overlap with other interfaces.
For Cisco vEdge, a loopback 65530 in VPN 65530 is created by default, sourced from 192.168.0.2/32. There is no need to
configure a tracker source IP address for Cisco vEdge.
For any tunnels that fail to receive a response within the interval and retransmit timers, or for any tunnels that exceed the
latency threshold, the tunnel tracker status is marked down and the VPN routes pointing to this tunnel is marked standby.
Crypto IKE stays up for the tunnel but the routes are withdrawn. When the tracker status goes up (probes become
reachable again or latency improves under the threshold), the tunnel becomes active again and you can add the VPN
routes.
Configuration Prerequisites
For Zscaler automatic tunnels to succeed, observe the following prerequisites:
• Configure ZIA Admin Portal with a partner key, username, and password (which belongs to the partner admin role).
• Enable NAT on the internet-facing interface on the WAN Edge router. In Cisco IOS XE SD-WAN, there is a loopback
65528 in VRF 65528 by default with an IP address of 192.168.1.1 that is used as the source interface for API calls. A NAT
Dedicated Internet Access (DIA) route is used to direct API traffic into the underlay.
• Create a DNS server configuration in the transport VPN (VPN 0). Resolve the Zscaler base URI from the WAN Edge
router for API calls, along with the Layer 7 health check URI. The Zscaler base URI is zsapi.<Zscaler Cloud Name>.net/
api/v1 where values for <Zscaler Cloud Name> are zscaler, zscalerbeta, zscalerone, zscalertwo, zscalerthree, etc. The
automated Layer 7 health check URL is http://gateway.<Zscaler Cloud Name>.net/vpntest.
• Configure Network Time Protocol (NTP) to ensure that the WAN edge router clock is accurate (for Zscaler API calls).
This isn’t required but is highly recommended.
Design Considerations
Review the following considerations:
Basic
• NAT is required on the outgoing tunnel WAN interface.
• DNS server configuration is required in VPN 0 to resolve Zscaler API and L7 heath check URLs.
• NTP configuration is highly recommended so clocks are synced to ensure successful API calls.
• Do not change Site ID or System IP Address of a WAN edge router when you have a SIG feature template attached.
Remove the SIG feature template to remove the tunnels, make the Site ID and/or System IP address change, then re-
attach the SIG feature template.
ECMP Tunnels
• Several applications are known to fork off multiple sessions for a single user session (O365, Google Services,
Facebook, etc.). If you have two active SIG tunnels that are pinned to two different Zscaler data centers, ECMP can pin
flows from a single user to separate tunnels. The cloud application can see different client IP addresses for the same
session, because NAT is applied to their source IP addresses from two different data centers. This can cause resets
from the server. You must use the same SIG data center for any active/active tunnels. Zscaler does not support active/
active tunnels across ZIA data centers.
• When configuring multiple active/active tunnels, each tunnel must have a unique source IP/source port/destination
IP/destination port. All active tunnels are destined to the same data center IP address and each tunnel has the same
source port and destination port 500 or 4500 (NAT-T), so, the source IP address for the tunnels cannot be the same.
Use loopback interfaces defined in VPN 0 to source multiple active tunnels from. These addresses can be private
because NAT is turned on at the internet interface.
• Multiple active/active tunnel support for Cisco vEdge is not qualified nor supported at this time.
Auto Tunnels
• Several advanced security features can be enabled on Zscaler through APIs from the Cisco vManage console. Zscaler
recommends you leave all features off as default, deploy the feature template, bring the tunnels up, and then go back
to edit the SIG template and enable the desired features/services. Some features might not have the proper licenses
or permissions to enable, so you can get a failed H response and a location might not get created if you are trying to
create tunnels at the same time. It simplifies troubleshooting if you enable them separately from configuring tunnels
for the first time.
• In Cisco vManage console version 20.5, values greater than 255 for Idle-time-to-dissociation and Refresh-time (part
of Authentication/Surrogate IP feature and Surrogate IP for Known Browser feature) cannot be configured in the
SIG template UI. The workaround in Cisco IOS XE SD-WAN Edge routers is to use a CLI add-on template. For more
information on Zscaler advanced features and CLI commands, see the Cisco IOS XE SD-WAN Qualified Command
Reference on Zscaler commands for additional information on Zscaler advanced features CLI commands.
L7 Health Checks
• In the 20.5 Cisco vManage console version, L7 health checks are supported only for Cisco vEdge routers. Health
checks are not supported for Cisco IOS XE SD-WAN edge routers until the 20.6 Cisco vManage console version.
• Starting in 20.5/17.5, manually configure GRE or IPSec tunnels can be configured using the generic SIG tunnel option in
the SIG feature template. L7 health checking is not supported for the generic SIG tunnel option.
• L7 health checks are sent out on all SIG tunnels across all high availability configs. L7 health checks can promote a
standby tunnel to an active tunnel, potentially impacting existing sessions.
• Do not use custom L7 health check trackers destined to commonly visited websites, because it might cause cloud
security provider IP address space to be blocked. Use http://gateway.<Zscaler Cloud Name>.net/vpntest as the
service URL. Use only HTTP:// in the service URL to Zscaler. HTTPS:// is not valid, even though the Cisco vManage
console might accept it.
GRE Keepalives
GRE Keepalives are disabled by default in Cisco IOS XE SD-WAN devices. To configure GRE keepalives, configure a CLI
add-on feature template. The command is keepalive [[seconds] retries] under the tunnel interface configuration.
Cisco vEdge
Multiple active/active tunnel support for Cisco vEdge is not qualified nor supported at this time.
Additional Features
Cloud onRamp for SaaS can be used over Zscaler tunnels starting in 20.6/17.6.
Deploy
The following basic steps are needed to configure auto tunnels successfully:
• Deploy: ZIA for API Access. This allows Cisco vManage console to send API calls to ZIA to provision IPSec tunnels and
Zscaler locations.
• Deploy: Cisco WAN Edge Prerequisites.
• Verify NAT, DNS, and clock/NTP settings.
• Create a SIG credentials feature template. This uses information obtained from ZIA you configured while setting
up ZIA for API access.
• Deploy an IPSec Auto Tunnel use case. You can choose different use cases. Active/Standby tunnels and Active/
Active tunnels using hybrid or dual-internet transports and configured with a SIG route or centralized policy are a few
examples. For each use case, the following is needed:
• Create a SIG feature template: This allows you to define multiple tunnels of certain types (Umbrella, Zscaler, or
generic), and allows you to define specific characteristics about each tunnel. Then, you can define which tunnels
are active and which are backup.
• Add the SIG and SIG credentials feature template to the device template of the device you want to configure with
IPSec auto tunnels.
• Add a route or modify centralized policy for traffic redirection to the Zscaler tunnels.
Note that login IDs and passwords in the following screens might be obscured for security reasons.
2. If you are unable to log in using your admin account, contact Zscaler Support.
1. Go to Administration > Settings > Company Profile. On the Organization tab, note the value in the Domains field
(ciscotest.net in this example).
2. Go to Administration > Authentication > API Key Management. On the API Key tab at the top of the page, copy the
base URL for your API (zsapi.zscalerthree.net/api/v1 in this example).
Administration >
zsapi.zscalerthree.net/api/v1
Partner Base URI Authentication > API Key Base URL for your API
(example)
Management > API Key
1. Navigate to Administration > Settings > Cloud Configuration > Partner Integrations.
2. At the Partner Integrations section of the ZIA Admin Portal, select SD-WAN. If a key already exists with a Partner
Name Cisco Viptela, then skip to Step 6. Only one key can exist per partner name. Take care when deleting and
modifying the partner key because API calls to Zscaler fail if other Cisco vManage console instances are using the
current key.
3. Click Add Partner Key.
4. Under the Name drop-down menu, select which SD-WAN vendor you want to create a partner key. After selecting
Cisco Viptela, click Generate. The previous screen is displayed.
5. See the partner key you created (Cisco Viptela in this case) in the Partner Integrations window. A red circle with a
number above the Activation icon on the bottom left-hand navigation is also displayed. Although you have created
a partner key, the configuration change is pending. Only after activation does this configuration become active.
6. Ensure to copy the Key value as it is required in a future step when configuring the SIG credentials feature template
in the Cisco vManage console Network Management System (NMS).
Administration >
zsapi.zscalerthree.net/api/v1
Partner Base URI Authentication > API Key Base URL for your API
(example)
Management > API Key
2. If a partner administrator role has already been created with full access, use this role, or create a separate one. A
partner administrator role is listed as Type Partner Admin, including a Policy keyword listed under the Full Access
column. If you use a role already created, note the Name, and go to Procedure 5: Create a Partner Administrator to
create a partner administrator login ID and password.
3. To create a new partner administrator role, click Add Partner Administrator Role.
4. Enter the name of the partner administrator role you want to create.
5. Change the Access Control to Full. Full Access Control allows partner admins to view and edit VPN credentials and
locations that the Cisco vManage console NMS is managing via the ZIA Provisioning API. This is necessary for the
Cisco vManage console NMS to be able to create new VPN credentials and locations in ZIA for branches.
6. Click Save to return to the previous screen.
Clipboard-list Note
Save the Login ID@Domain value and Password settings as you need to enter them in the Cisco vManage console NMS
when configuring the SIG credentials template.
4. Click Save.
Administration >
zsapi.zscalerthree.net/api/v1
Partner Base URI Authentication > API Key Base URL for your API
(example)
Management > API Key
Administration >
Administration Controls > Partner Admin [email protected]
Username
Administrator Management Login ID (example)
> Administrators
Administration >
Administration Controls > Partner Admin
Password (hidden)
Administrator Management Password
> Administrators
Click Activation on the left-hand navigation, and then click Activate to enable the pending configuration changes.
This is needed for API calls requested against the ZIA Public Service Edge because a NAT DIA route is used to direct
the API traffic out of the underlay. Enable a NAT in each internet interface feature template deployed where Zscaler
tunnels are built. The following is the relevant feature template information that is required:
2. Verify that a primary and/or secondary DNS server is defined in the VPN 0 feature template. API calls are made to
the base URI: zsapi.<Zscaler Cloud Name>.net/api/v1 or admin.<Zscaler Cloud Name>.net/api/v1 where values for
<Zscaler Cloud Name> are zscaler, zscalerbeta, zscalerone, zscalertwo, zscalerthree, etc. The automated L7 health
check URL also needs DNS resolution. It is http://gateway.<Zscaler Cloud Name>.net/vpntest.
The following is the relevant feature template information that is required (which can be global or device-specific
values):
3. Verify Network Time Protocol (NTP) is enabled, synced, and the clock is correct. An authentication session can fail
with Zscaler is due to the clock time being mismatched. Configuring NTP and ensuring the NTP server time is synced
is one way to prevent authentication issues.
WAN_EdgeE#show clock
01:49:13.091 UTC Fri Sep 3 2021
NTP is configured in a separate feature template and added to the device template in the basic information section.
In the example topology, the source interface is the internet interface in VPN 0, because the NTP server is on the
internet.
6. Enter the Template Name (xeSig_Credentials) and Description (Cisco IOS XE SIG Credentials Template).
7. Select the Zscaler radio button as the SIG provider.
8. Fill in the Organization, Partner Base URI, Username, Password, and Partner API Key. These parameters were
obtained from the Zscaler configuration section:
Cisco vManage
console SIG ZIA Admin Portal Zscaler Zscaler
Credentials Location Parameter Value
Parameter
Administration > Settings
ciscotest.net
Organization > Company Profile > Domains
(example)
Organization
Administration >
zsapi.zscalerthree.net/
Partner Base URI Authentication > API Key Base URL for your API
api/v1 (example)
Management > API Key
Administration >
Administration Controls > Partner Admin [email protected]
Username
Administrator Management > Login ID (example)
Administrators
Administration >
Administration Controls > Partner Admin
Password (hidden)
Administrator Management > Password
Administrators
Administration > Settings >
Cloud Configuration > Partner Partner Name (Cisco ABCdef123GHI
Partner API Key
Integrations > Viptela) Key (example)
SD-WAN
9. Click Save.
Deploy: Cisco WAN Edge Auto IPSec Tunnels (One Active/Standby Pair, Hybrid
Transport)
In this section, you’ll configure one active/standby auto tunnel pair on the internet transport: one to the primary Zscaler
data center and one to the secondary Zscaler data center. Traffic is forwarded on the active tunnel to the primary data
center until the active tunnel is declared to be down (through L7 health checking and/or Dead Peer Detection). After
down, the standby tunnel to the secondary data center becomes active. When the tunnel to the primary data center
recovers, it becomes active again and the tunnel to the secondary data center goes into standby.
• One active/standby IPSec auto tunnel pair on a single internet transport. The active tunnel connects to a primary
Zscaler data center and the standby tunnel connects to a secondary Zscaler data center.
• SIG service route for redirecting traffic to Zscaler tunnels
• Customized L7 Health Tracker (optional)
• Advanced Zscaler features (optional)
• Customized Zscaler tunnel destinations (optional)
2. Enter the Template Name (xeSig_Zscaler) and Description (Cisco IOS XE Sig Zscaler Template).
3. (Cisco IOS XE SD-WAN ONLY) A source IP address for the L7 health tracker is required. This field is a private, unique
IPv4 address with a /32 prefix. Under the Tracker section next to Source IP Address, choose Device Specific from
the drop down. The variable for this parameter is labeled zscaler_trackersrcip. Note that this field is required for
Cisco IOS XE SD-WAN routers. You can turn off health checks under the tunnel configuration advanced settings
(not recommended), but you must still configure a global value or device specific variable for the Tracker Source IP
Address.
Note that by default, Cisco vEdge routers use source IP address 192.168.0.2 in VRF 65530 for the L7 health tracker.
A tracker does not need to be explicitly configured for SD-WAN routers because it is created automatically. By default, L7
health checks are enabled on each tunnel with the following default properties.
If you choose to change any tracker parameters, configure a custom tracker. A customized tracker configuration is shown
configured in Procedure 5: Customize L7 Health Tracker (optional).
1. Under the Configuration section, select the Zscaler radio button as the SIG provider.
2. Click Add Tunnel (the IPSec tunnel type is configured because only IPSec auto tunnels are configured).
3. Interface Name cannot be set as a variable, so use the global parameter type. If you select a variable, you cannot
finish the template since you cannot refer to the tunnel in the high availability section, where you specify which
tunnels are active and which are backup. Specify an Interface Name, which defaults to ipsec, expected to be
followed by a number 1-255.
4. Next to Description, choose Global parameter and type an optional Description (e.g., Primary DC Tunnel 1).
5. Next to Tunnel Source Interface, select Device Specific and create a variable for this parameter (e.g., pri_
tunnel1_src_int).
6. Next to Data Center, select which data center at which this tunnel terminates. Each data center location (primary or
secondary) is selected automatically when the configuration is deployed, or manually assigned (described later in
this guide).
7. Leave the parameters under Advanced Options as defaults. Under Advanced Options, the following default options
are set:
8. Click Add.
9. In this use case, one additional tunnel is created (the standby tunnel to the secondary data center).
Click Add Tunnel.
13. In Advanced Settings, you can choose the primary and secondary data centers (the default is automatic). You also
can turn on several Zscaler features for the tunnel through the APIs. They include: Authentication Required, XFF
Forwarding, Enable Firewall, Enable IPS Control, Enable Caution, and Enable AUP. For more information on these
options, see the Configuring Locations help section.
14. Under Advanced Settings, keep the defaults and click Save at the bottom of the screen to save the feature
template.
2. Under the Transport & Management VPN section, select Cisco Secure Internet Gateway on the right-hand side. The
Cisco Secure Internet Gateway field is inserted into the Transport & Management VPN section. In the drop-down
box, select the SIG feature template recently created (xeSig_Zscaler).
3. Before saving the device template, attach the SIG credentials template. Under Additional Templates, next to Cisco
SIG Credentials *, select the SIG Credentials template created earlier (xeSig_Credentials).
4. Click Update.
5. To the right of the device configuration being updated, click … and select Edit Device Template from the drop-down
list.
7. Deploy template changes: click Next, then Configure Devices. The configuration changes are pushed and Cisco
vManage console returns success.
1. On the Cisco vManage console page, select the Configuration > Templates > Feature tab and find the branch
service VPN feature template to modify (e.g., xeBR_VPN1).
2. To the right of the feature template, click … and select Edit from the drop-down list.
6. Click Next, then Configure Devices. Confirm changes on multiple devices if needed and click OK. The status of the
configuration change returns with Success.
3. If the interface you are interested in is missing from the graph, scroll down past the chart to see the entire list of
interfaces. Click the checkbox on the left for the interface you want to display on the chart. You can also view the
state and statistics of the various interfaces on the device from this list.
See the Operate section of this guide for additional monitoring and troubleshooting information.
1. In the Cisco vManage console, go to Configuration > Templates > Feature tab. To the right of the SIG template that
was created in the earlier section (xeSig_Zscaler), click … and select Edit from the drop-down menu.
2. In the Tracker (Beta) section, click the New Tracker button. Next to Name, select Global for the parameter and enter
the name for the tracker (zscaler_L7_health_check), which is a label referenced by each tunnel using the tracker.
3. For Interval, the default is 60 seconds and the minimum allowed is 20 seconds. Change the parameter to Global,
and type 20. For the API URL of endpoint, type http://gateway.<Zscaler Cloud Name>.net/vpntest for
the specific Zscaler cloud you belong to.
4. Click Add.
5. Now, before finishing the update to the feature template, reference the new L7 health tracker by the tunnels already
created. Under Configuration next to each tunnel, click the Edit icon.
6. Next to Tracker, choose the Global parameter, then in the drop-down menu, select the L7 health check you created,
zscaler_L7_health_check. Click Save Changes.
8. Click Update to save changes to the SIG feature template. Click Next, then Configure Devices. You might need to
confirm configuration changes on multiple devices. Select the checkbox and click OK. The configuration changes are
pushed out to the attached WAN Edge routers. The status returns Success.
WAN_EdgeE#show endpoint-tracker
2. To change the settings, modify the SIG template feature template in the Cisco vManage console. Go to
Configuration > Templates > Feature. Find the name of the SIG template you want to modify (xeSig_Zscaler). Click …
to the far right of the template and select Edit from the drop-down menu.
3. Under Advanced Settings, select Global parameter and click On next to the settings you want to enable. In this
example, Enable Caution is enabled.
4. Click Update.
Clipboard-list NOTE
This enables the same Zscaler advanced settings for every device this template is attached to. If you need different
settings for different devices, a separate SIG feature template is required.
5. Click Next, then Configure Devices. Confirm configuration on multiple devices if needed. Configuration changes are
pushed to the devices and Success is returned.
6. View the location gateway options in the ZIA Admin Portal for changes.
Procedure 7: (Optional) Customize Zscaler Tunnel Destination (Primary and Secondary Data
Centers)
To change the tunnel destination settings to choose your own primary and secondary Zscaler data center locations,
modify the SIG template feature template.
1. Go to Configuration > Templates > Feature. Find the name of the SIG template you want to modify (xeSig_Zscaler).
Click … to the far right of the template and select Edit from the drop-down menu.
2. Under Advanced settings, next to Primary Data-Center, select the Device Specific parameter and use the variable
vpn_zlsprimarydc. Next to Secondary Data-Center, select Device Specific and use the variable
vpn_zlssecondarydc.
4. At the top of the page, select a device template to fill in data center values. To the right of the device, click … and
select Edit Device Template from the drop-down menu.
5. Fill in the values for the Primary and Secondary Data-Centers. Use VPN Host names. Note that auto is an acceptable
value for those locations where the tunnels are automatically discovered for you. This example uses the data center
locations Atlanta II (e.g., atl2-vpn.zscalerthree.net) for Primary and Dallas I (e.g., dfw1-vpn.zscalerthree.net) for
Secondary.
6. Click Update.
7. Update variable values on other devices attached to device templates using the feature template you just modified.
8. Click Next, then Configure Devices. Confirm configuration changes on multiple devices if needed. Cisco vManage
console pushes the configuration changes and indicates Success.
9. Open a client browser at the site, navigate to http://ip.zscaler.com. Validate that the primary data center is accessed
(in this example, San Francisco IV).
Deploy: Cisco WAN Edge Auto IPSec Tunnels (Active/Active Tunnels, Hybrid
Transport)
In this section, two active auto IPSec tunnels are configured, all to the same Zscaler data center. Traffic is forwarded on
both tunnels to the primary data center until a tunnel is declared to be down (through L7 health checking and/or dead
peer detection). When down, traffic is hashed to the remaining tunnel. When the downed tunnel recovers, it becomes
active again and traffic can be hashed to it again.
• One active/active IPSec auto tunnel pair on a single internet transport. Both tunnels connect to the same primary
Zscaler data center. This is supported on Cisco IOS XE SD-WAN devices only.
• Centralized data policy for redirecting traffic to Zscaler tunnels.
• Weighted tunnels.
To accommodate both tunnels to one Zscaler destination, two loopback interfaces are needed for source IP addresses
since each tunnel needs a unique source IP/source port/destination IP/destination port pair. If you configure standby
tunnels to the same Zscaler data center destination, each of them needs a unique source IP address as well.
Procedure 1: Create two loopback interfaces, one for each active tunnel (Cisco IOS XE SD-WAN
only)
1. In the Cisco vManage console, navigate to Configuration > Templates > Feature tab. Click Add Template, select your
devices, and under VPN, select Cisco VPN Interface Ethernet.
2. Enter a Template Name and Description. Under basic configuration next to Shutdown, choose Global parameter
and click No. Next to Interface Name, enter Loopback1, and next to IPv4 Address/prefix-length, choose Global
parameter and type the address (10.10.10.1/32 in this example).
3. Click Save.
4. Copy the previous template and make modifications or create new interface Ethernet feature templates by
repeating steps 1 through 3 to create two total loopback addresses with the following characteristics:
Feature Template
Section Parameter Type Variable/value
Name
IPv4 Address/prefix-
Global 10.10.10.1/32
length
IPv4 Address/prefix-
Global 10.10.10.2/32
length
Procedure 2: Create a local policy-based routing policy (Cisco IOS XE SD-WAN only)
1. Create a CLI add-on template that creates a local policy-based routing policy. This lets any control traffic (IKE traffic)
pick the proper next-hop interface generated by the router.
2. Go to Configuration > Templates > Feature tab and click Add Template. Select the devices the feature template can
apply to. Under Other Templates, click Cli Add-On Template.
3. Type a Template Name (CLI-Template-Sig-Local-Policy) and Description (CLI Add-on Template Sig Local Policy).
4. Add the following CLI:
6. In the pop-up window, enter a variable name (Loopback-Tun-Src-Next-Hop-IP). This CLI template can apply to
several WAN Edge routers. Click Create Variable.
7. Click Save.
Procedure 3: Create a new Sig feature template with 2 active tunnels (Cisco IOS XE SD-WAN only)
The active tunnels reference loopback interfaces as sources.
1. In the Cisco vManage console, navigate to Configuration > Templates and click Feature. Click Add Template, select
the devices the feature template can apply to. Under VPN, select the Cisco Secure Internet Gateway (SIG) template.
Add the Template Name (xeSig_Zcaler_2_Loopback_Source) and Description (Sig Zscaler 2 Tunnels
with Loopback Source).
2. Under Tracker (BETA), select Device Specific and use the variable vpn_trackersrcip.
3. Under Configuration, click the Zscaler radio button, then click Add Tunnel.
4. Next to Interface Name, name the tunnel (ipsec101).
5. Fill out the Description (Tunnel 1 to Primary DC).
6. Next to Tunnel Source Interface, ensure it is a Global value, then type Loopback1.
7. Next to Data-Center, ensure Primary is selected.
8. When a loopback interface is entered for the tunnel source, you must fill out a field called Tunnel Route-via
Interface, specifying what physical interface data traffic is routed out. Next to Tunnel Route-via Interface, select
Device Specific and indicate the variable, pri_tunnel1_route_via.
9. Click Add.
10. Finish configuring the tunnel interfaces by repeating steps 1 thorugh 9 to configure two tunnels total with the
following characteristics. All active tunnels point to the primary data center.
11. Under High Availability, add one additional tunnel pair and assign ipsec101 under the Active column for Pair-1 and
ipsec201 under the Active column for Pair-2.
1. Go to Configuration > Templates. Under the Device tab, next to the device template you want to modify, click … on
the right-hand side, and select Edit from the drop-down menu.
2. Under Transport & Management VPN, click Cisco Secure Internet Gateway on the right-side under Additional
Cisco VPN 0 Templates.
3. Choose the new SIG template created in the last procedure (xeSig_Zscaler_2_Loopback_Source).
4. Click Cisco VPN Interface Ethernet on the right-hand side two times under Additional Cisco VPN 0 Templates and
then select xeLoopback1 for one, and xeLoopback2 for the other.
5. Under Additional Templates, choose the CLI Add-On Template and the SIG Credentials feature template created
earlier.
6. Click Update.
7. Next to the device you need to define values for, click … and select Edit Device Template.
8. Fill in values for the variables created in the feature template.
9. Click Update.
10. Click Next, then Configure Devices. After the configuration changes are pushed to the WAN edge, the status shows
up as Success.
11. Verify tunnel operation.
2. Select Data Prefix on the left-hand pane and create a Prefix List called Overlay that contains the 10.0.0.0/8 prefix
and any other site prefix/summary advertised into the SD-WAN overlay.
3. Select Application on the left-hand pane and create a New Application List called Box.
4. Ensure the WAN edge router to which you are applying the policy is defined in a site list and there is a VPN list that
contains the VPN to which you want to apply the policy. If not, create the site list.
5. The service VPN for Zscaler traffic is VPN1. Create the VPN list if needed.
6. To edit or create a new traffic policy for a WAN edge router, go to Custom Options and under Centralized Policy,
select Traffic Policy.
8. If there is already a data policy attached to the WAN edge router site to which you want to add a SIG data policy,
choose to edit the existing policy, or create a new data policy and import it into the master policy already attached
to the Cisco vSmart controllers. In this example, a new data policy is created and imported into a master policy
already attached to the Cisco vSmart controllers.
9. Click Add Policy and select Create New from the drop-down menu.
10. Name the Data Policy (Sig_Data) and give it a Description (Data Policy for Sig Data).
12. Click Sequence Rule. Select Match Conditions and Actions, then click Save Match and Actions. Repeat as needed
to complete the policy.
13. (Optional) Change Default Action from Drop to Accept for your policy if necessary.
16. Click Traffic Rules at the top of the page so the new data policy is imported into the master policy. Click the Traffic
Data tab. Click Add Policy and choose Import Existing from the drop-down menu.
17. In the pop-up window, select the policy name created and click Import.
18. After the policy is imported, apply it to a site list and VPN list. Click Policy Application at the top of the page. Click
the Traffic Data tab. Under Sig_Data, click New Site List and VPN List.
19. Ensure radio button From Service is chosen so data policy is applied to traffic coming from the service VPN. Select
Site list (Zscaler-DataPolicy-Sites) and VPN List (VPN1). Click Add, then Save Policy Changes.
20. A pop-up window appears to push the update policy to the Cisco vSmarts. Click Activate.
1. In the Cisco vManage console, go to Configuration > Templates > Feature tab. To the right of the SIG template that
was created in the earlier section (xeSig_Zcaler_2_Loopback_Source), click … and select Edit from the drop-down
menu.
2. Under the High Availability section, configure the Active Weight column for each active tunnel.
Operate
The following shows different ways to monitor the Zscaler IPSec tunnels.
Verify Cisco SD-WAN Tunnel Operation from the Cisco vManage Console
1. In the Cisco vManage console under Monitor > Network, click the WAN Edge router on which you want to verify the
tunnel operation.
2. Select Applications > Interface > Real Time at the top right of the chart. You can also click the interface you are
interested in on the right-hand side of the chart.
3. If the interface you are interested in is missing from the graph, scroll down past the chart to see the entire list of
interfaces. Select the checkbox on the left for the interface you want to display on the chart. You can also view the
state and statistics of the various interfaces on the device from this list.
Verify Cisco SD-WAN Event Logs from the Cisco vManage Console
1. In the Cisco vManage console, navigate to Monitor > Events.
2. In the top right-hand corner, you can select the timeframe over which to see the events. The default is over the last
three hours.
3. In the search bar, type something to narrow down your search. In this example, you see all the WAN_EdgeB device
events in the last hour.
Events are generated when a location is created, VPN credentials are associated with the tunnel, and when the tunnel
state comes up.
In the ZIA Admin Portal, navigate to Analytics > Insights > Tunnel Insights.
In the Insights screen, you can visualize and filter data in various ways. You can select how to categorize all tunnel traffic
to graph from the drop-down menu under Tunnel Insights (by Overall Traffic, Location, Location Group, Location Type,
Tunnel Destination IP, Tunnel Source IP, Tunnel Type, or by VPN Credential). You can also configure the Timeframe,
ChartType, and Metrics you want to view. Additionally, you can filter the data shown in the chart even further by clicking
the Add Filter drop-down menu and selecting various filter types and values.
2. In the Audit Logs window, you can filter out all changes to only view the API calls by selecting API under the
Interface drop-down menu.
A list of all the API interactions is displayed, where the Result column shows whether the call was successful or failed.
The icons on the right of the Result column when clicked show the API data that was created or updated from the call.
dest-ip 165.225.34.44
dest-port 4500
initiator-spi 0a977da74a8ca235
responder-spi dc36839e3b9138e4
cipher-suite aes256-cbc-sha1
dh-group “2 (MODP-1024)”
state IKE_UP_IPSEC_UP
uptime 0:02:15:45
tunnel-uptime 1:01:16:19
public-dest-address 64.102.254.147
public-source-port 12346
public-dest-port 12367
filter-state established
idle-timeout 0:00:00:59
outbound-packets 3296
outbound-octets 519226
inbound-packets 3294
inbound-octets 593424
ip nat filter nat-vpn 0 nat-ifname ge0/2 vpn 0 protocol udp 10.10.10.1 104.129.206.161
public-source-address 192.168.212.2
public-dest-address 104.129.206.161
public-source-port 4500
public-dest-port 4500
filter-state established
idle-timeout 0:00:00:52
outbound-packets 15105
outbound-octets 1851428
inbound-packets 15077
inbound-octets 1846978
Max Re-transmit : 2
First Probe : 0 secs
Probe interval : 30 secs
Probe timeout : 1000 msecs
DNS TTL : 96 secs
DNS query/ok/fail : 611/611/0
Peer: 165.225.48.11 (UP - flapped 0 times, nretries 0)
Total requests : 0 Total responses : 0
Total Tx errors : 0 Total Rx errors : 0
Total Tx skipped: 0 Total Rx ignored: 0
Total timeout : 0 Connect errors : 0
RTT min/avg/max : 0.00/0.00/0.00 ms
Conn min/avg/max: 0.00/0.00/0.00 ms
Interface: ipsec201/#SIGL7#AUTO#TRA#ZIA
Monitor: 65530/http://gateway.zscalerthree.net/vpntest/80 via ipsec201
Monitor state : UP (flapped 0 times)
Ref count : 1
Monitor type : httping
Probe / DNS SIP : 192.168.0.2 / ::
Nameserver IP : 208.67.222.222
Src Port Base : 49173
Num of probes : 1
Max Re-transmit : 2
First Probe : 0 secs
Probe interval : 30 secs
Probe timeout : 1000 msecs
DNS TTL : 96 secs
DNS query/ok/fail : 611/611/0
Feature Templates
Note that these branch base configuration feature templates can be applied to Cisco vEdge or Cisco IOS XE SD-WAN
routers. When you define them, however, they must be defined for Cisco vEdge devices or Cisco IOS XE SD-WAN devices
and not both. From Cisco vManage console version 20.1 and higher, feature templates cannot apply to both Cisco vEdge
and Cisco IOS XE SD-WAN devices–they must have separate feature templates. Each template name below is preceded
by either v or Cisco vEdge_ if the device type is a Cisco vEdge device, or an xe or xeEdge_ if the device type is a Cisco IOS
XE SD-WAN device.
When creating feature templates for Cisco vEdge routers, if you want to cover the most models possible when selecting
devices, select all ISR 1100 models with Cisco Viptela, and all Cisco vEdge devices (all Cisco vEdge 100 types, Cisco vEdge
1000, Cisco vEdge 2000, Cisco vEdge 5000, and Cisco vEdge Cloud).
When creating feature templates for Cisco IOS XE SD-WAN routers, if you want to cover the most models possible when
selecting devices, select all models except the ISR 1100 models with Cisco Viptela, all Cisco vEdge devices, CG (Cellular
Gateway) devices, Cisco vManage console, and Cisco vSmart devices. When creating SIG feature templates, you must also
exclude the IR8340 from the device model list.
Device Templates
The following device templates are used in this guide. The table indicates what non-default feature template is used.
Prerequisites
• Verify that NAT is enabled on the internet interface that is used to access Zscaler.
• Verify that a primary and secondary DNS server is defined in the VPN 0 feature template.
• Verify NTP is enabled, synced, and the clock is correct.
Device Template
Template Type Template Subtype Template Name
Basic Information Cisco NTP xeNTP
Cisco AAA xeAAA
VPN 0 Cisco VPN xeBR_VPN0
Cisco Secure Internet Gateway xeSig_Zscaler
Cisco VPN Interface xeBR_VPN0_INET
Cisco VPN Interface xeBR_VPN0_MPLS
VPN 512 Cisco VPN Interface xeVPN512_MGT_INT
VPN 1 Cisco VPN1 xeBR_VPN1
Cisco VPN Interface xeBR_VPN1_LAN_INT1
Additional Templates Cisco SIG Credentials* xeSig_Credentials
Basic Information Cisco NTP xeNTP
Cisco AAA xeAAA
Device Template
Template Type Template Subtype Template Name
Basic Information Cisco NTP xeNTP
Cisco AAA xeAAA
VPN 0 Cisco VPN xeBR_VPN0
Cisco Secure Internet Gateway xeSig_Zscaler_2_Loopback_Source
Cisco VPN Interface xeBR_VPN0_INET
Cisco VPN Interface xeBR_VPN0_MPLS
Cisco VPN Interface xeLoopback1
Cisco VPN Interface xeLoopback2
VPN 512 Cisco VPN Interface xeVPN512_MGT_INT
VPN 1 Cisco VPN1 xeBR_VPN1
Cisco VPN Interface xeBR_VPN1_LAN_INT1
Additional Templates CLI Add-On Template CLI-Template-Sig-Local-Policy
Cisco SIG Credentials* xeSig_Credentials
Traffic Redirection
Service Route
Branch VPN1 Feature Template
Template: VPN/VPN Interface Ethernet
Template Name: xeBR_VPN1
Description: VPN 1 Template for WAN Edge Branch Routers
Centralized Policy
Configuration > Policies > Custom Options > Centralized Policy > Lists
Configuration > Policies > Custom Options > Centralized Policy > Traffic Policy > Traffic Data
Go to Configuration > Policies > Centralized Policy and Edit the master policy that is currently activated on the Cisco
vSmart controllers.
Under Traffic Rules > Traffic Data, import the newly-created data policy.
Under Policy Application > Traffic Data, choose radio button From Service, and add Site List Zscaler-DataPolicy-Sites
and VPN List VPN1.
Miscellaneous
In the following section, the Cisco Secure Internet Gateway (SIG) feature template is modified.
• Base connectivity
• Prerequisites
• Common tunnel components
• Use case example 1 or 2 (active/standby or active/active tunnel definitions)
• Traffic redirection (service SIG route, service DIG data policy, or both)
• Miscellaneous (optional features)
Base Connectivity
The following is a basic connectivity configuration for the Cisco IOS XE SD-WAN router. It includes one other transport
(MPLS), which is not essential to the connectivity to Zscaler (except for internet access across the SD-WAN overlay to
the data center in case the local internet fails). Some default configurations have been removed. These configurations
correspond to feature and device templates shown in Appendix B: Tunnel Configuration Summary (Feature and Device
Templates).
system
system-ip 10.255.255.215
site-id 215
organization-name “ENB-Solutions - 216151”
vbond vbond.cisco.net port 12346
!
hostname WAN_EdgeE
vrf definition 1
description LAN
rd 1:1
address-family ipv4
route-target export 1:1
route-target import 1:1
exit-address-family
!
address-family ipv6
exit-address-family
!
!
ip host vbond.cisco.net 64.100.100.113
no shutdown
ip unnumbered GigabitEthernet0/0/2
no ip redirects
ipv6 unnumbered GigabitEthernet0/0/2
no ipv6 redirects
tunnel source GigabitEthernet0/0/2
tunnel mode sdwan
exit
!
ntp server time.google.com source GigabitEthernet0/0/0 version 4
ntp source GigabitEthernet0/0/0
!
sdwan
interface GigabitEthernet0/0/0
tunnel-interface
encapsulation ipsec weight 1
color biz-internet
no allow-service all
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
no allow-service snmp
no allow-service bfd
exit
exit
interface GigabitEthernet0/0/2
tunnel-interface
encapsulation ipsec weight 1
color mpls restrict
no allow-service all
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
no allow-service snmp
no allow-service bfd
exit
exit
Prerequisites
The base configuration enables NTP to ensure an accurate clock and DNS. Enable NAT under the internet transport.
interface GigabitEthernet0/0/0
ip nat outside
SIG Credentials
secure-internet-gateway
zscaler organization ciscotest.net
zscaler partner-base-uri zsapi.zscalerthree.net/api/v1
zscaler partner-key ABCdef123GHI
zscaler username [email protected]
zscaler password (REMOVED)
!
crypto ipsec transform-set if-ipsec201-ikev2-transform esp-null esp-sha-hmac
mode tunnel
!
crypto ipsec profile if-ipsec101-ipsec-profile
set ikev2-profile if-ipsec101-ikev2-profile
set transform-set if-ipsec101-ikev2-transform
set security-association lifetime kilobytes disable
set security-association lifetime seconds 3600
set security-association replay window-size 512
!
crypto ipsec profile if-ipsec201-ipsec-profile
set ikev2-profile if-ipsec201-ikev2-profile
set transform-set if-ipsec201-ikev2-transform
set security-association lifetime kilobytes disable
set security-association lifetime seconds 3600
set security-association replay window-size 512
Traffic Redirection
Service SIG Route
ip sdwan route vrf 1 0.0.0.0/0 service sig
nat fallback
!
!
sequence 21
match
app-list Box
source-ip 0.0.0.0/0
!
action accept
nat use-vpn 0
nat fallback
!
!
sequence 31
match
destination-data-prefix-list Default
!
action accept
sig
!
!
default-action drop
!
lists
app-list Box
app box
app box_net
!
data-prefix-list Default
ip-prefix 0.0.0.0/0
!
data-prefix-list Overlay
ip-prefix 10.0.0.0/8
!
site-list Zscaler-DataPolicy-Sites
site-id 214
site-id 215
!
vpn-list VPN1
vpn 1
!
!
!
apply-policy
site-list Zscaler-DataPolicy-Sites
data-policy _VPN1_Sig_Data from-service
!
!
Miscellaneous
Customize Health Tracker
endpoint-tracker zscaler_l7_health_check
endpoint-api-url http://gateway.zscalerthree.net/vpntest
tracker-type interface
interval 20
interface Tunnel100101
endpoint-tracker zscaler_l7_health_check
exit
interface Tunnel100201
endpoint-tracker zscaler_l7_health_check
exit
• Base connectivity
• Prerequisites
• Use case example 1 (active/standby tunnel definitions)
• Traffic redirection (service SIG route, service SIG data policy, or both)
• Miscellaneous (optional features)
Base Connectivity
The following is a basic connectivity configuration for the Cisco vEdge router. It includes one other transport (MPLS), which
is not essential to the connectivity to Zscaler (except for internet access across the SD-WAN overlay to the data center in
case the local internet fails). Some default configurations have been removed. These configurations correspond to feature
and device templates shown in Appendix B: Tunnel Configuration Summary (Feature and Device Templates).
system
host-name WAN_EdgeB
system-ip 10.255.255.212
site-id 212
organization-name “ENB-Solutions - 216151”
vbond vbond.cisco.net
!
ntp
server time.google.com
source-interface ge0/0
exit
!
!
vpn 0
name “Transport VPN”
dns 208.67.220.220 secondary
dns 208.67.222.222 primary
ecmp-hash-key layer4
host vbond.cisco.net ip 64.100.100.113
interface ge0/0
ip address 64.100.212.2/28
nat
!
tunnel-interface
encapsulation ipsec
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/2
ip address 192.168.212.2/30
tunnel-interface
encapsulation ipsec
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 64.100.212.1
ip route 0.0.0.0/0 192.168.212.1
!
vpn 1
name LAN
interface ge0/3
ip address 10.212.10.1/24
no shutdown
!
!
vpn 512
name “Transport VPN”
interface ge0/1
ip address 192.168.255.181/23
no shutdown
!
!
Prerequisites
The base configuration enables NTP to ensure an accurate clock and DNS. Enable NAT under the internet transport.
vpn 0
interface ge0/0
nat
cipher-suite aes256-cbc-sha1
group 2
authentication-type
pre-shared-key-dynamic
!
!
ipsec
rekey 3600
replay-window 512
cipher-suite null-sha1
perfect-forward-secrecy none
!
mtu 1400
no shutdown
!
SIG Credentials
secure-internet-gateway
zscaler organization ciscotest.net
zscaler partner-base-uri zsapi.zscalerthree.net/api/v1
zscaler partner-key ABCdef123GHI
zscaler username [email protected]
zscaler password <hidden>
Traffic Redirection
Service SIG Route
vpn 1
ip service-route 0.0.0.0/0 vpn 0 service sig
dns request
source-ip 0.0.0.0/0
!
action accept
nat use-vpn 0
nat fallback
!
!
sequence 21
match
app-list Box
source-ip 0.0.0.0/0
!
action accept
nat use-vpn 0
nat fallback
!
!
sequence 31
match
source-ip 0.0.0.0/0
!
action accept
sig
!
!
default-action drop
!
lists
app-list Box
app box
app box_net
!
data-prefix-list Overlay
ip-prefix 10.0.0.0/8
!
site-list Zscaler-DataPolicy-Sites
site-id 212
site-id 214
site-id 215
!
vpn-list VPN1
vpn 1
!
!
!
apply-policy
site-list Zscaler-DataPolicy-Sites
data-policy _VPN1_Sig_Data from-service
!
!
Miscellaneous
Customize Health Tracker
vpn0
tracker SIG zscaler_l7_health_check
endpoint-api-url http://gateway.zscalerthree.net/vpntest
interval 20
interface ipsec101
tracker zscaler_l7_health_check
interface ipsec201
tracker Zscaler_l7_health_check
To contact Zscaler Support, select Administration > Settings > Company Profile.
Figure 87. Collecting details to open support case with Zscaler TAC
Save Company ID
Copy the Company ID.