Skip to content

Cisco Meraki vMX SD-WAN with AWS Cloud WAN Deployment

This lab guide covers deploying Cisco Meraki vMX SD-WAN appliances on AWS with AWS Cloud WAN to connect on-premises branches with AWS workloads using BGP connectivity.

Overview

This guide covers deploying the Cisco Meraki vMX Partner Solution with AWS Cloud WAN in the AWS Cloud.

The Cisco Meraki vMX is deployed in AWS Cloud WAN to enable customers to easily connect their on-premises branches to their AWS workloads through BGP-based routing.

Meraki vMX is a virtualized security and SD-WAN network appliance. This Cloud WAN deployment includes vMX as a node to extend the common policy, segmentation, and security of SD-WAN environments at scale. The deployment includes an active-active (or active-standby) pair of redundant vMX appliances in a highly available configuration. With AWS Cloud WAN, connectivity can be scaled across virtual private clouds (VPCs) with workloads in multiple AWS Regions. You can configure, monitor, and maintain all of your Meraki devices from a single Meraki dashboard.

Architecture: Cloud WAN with BGP Connectivity

This automation builds the regional vMXs that interconnect your on-premises branches to a new or existing Cloud WAN network. It uses BGP to manage end-to-end routing as well as failover in case of vMX failure.

Architecture

This deployment sets up the following:

  • Highly available Transit VPC (TVPC) that can be created in multiple AWS Regions
  • Each TVPC can be connected to an existing Cloud WAN(CW) network. If no CW network is available, a new CW network can be created via the CloudFormation template
  • Two Availability Zones in each VPC that contain a vMX appliance with internet access via an internet gateway
  • AWS Cloud WAN Global Network (if new CW network is created) that includes:
  • A core network with a core network policy that includes the routing policy
  • A software-defined wide area networks (SD-WAN) segment that can be integrated into customer-provided workload segments
  • Routes from each vMX branch connected via the transit VPCs are propagated throughout the SD-WAN segment for sharing with additional workload segments
  • VPC Attachment, Tunnel-less Connect(TLC) Attachment, and a TLC Connect Peer for each vMX deployed
  • For each Region deployed, an AWS Cloud WAN core network edge for connecting workload VPCs to the transit VPC
  • AWS Secrets Manager to store a vMX API key, which is used by AWS Lambda to access the Meraki dashboard when updating route tables
  • AWS Systems Manager Parameter Store to store vMX tag values used for CloudFormation automation

Prerequisites

Before deploying this solution, ensure you have the following:

AWS Account Configuration

  1. Sign in to your AWS account with an IAM user role that has the necessary permissions
  2. Make sure that your AWS account is configured correctly with appropriate service limits and permissions

Meraki Dashboard Account Preparation

Meraki Dashboard Configuration

As long as you have available vMX licenses (small, medium, or large), and an API Key, the CloudFormation template will create the licensed Meraki vMX network and provide each vMX with a name and tag that is used for automation.

Deployment Options

Deploy vMX with Cloud WAN into a new VPC

This option builds a new AWS environment that consists of the VPC, subnets, security groups, Cloud WAN Core Network, Attachments and other infrastructure components. It also launches Meraki vMX networks in the Meraki Dashboard.

Post-Deployment Configuration

After deployment, you must complete the following steps:

Verify Meraki vMX Networks

Two Meraki vMX networks have been created each with a generated name and tag: <AWS TVPC-vMX-REGION-vMX#-AZ#-ACCOUNT>

Configure Meraki Spokes

  • Configure your branch sites as Meraki Auto VPN spokes with the vMX instances as the primary and secondary hubs. For more information, see Meraki Auto VPN - Configuration and Troubleshooting
  • From each branch network, advertise the local subnet into autoVPN

Meraki AutoVPN

Configure BGP

  1. Navigate to Network Manager > Global Network > Attachments > Connect Attachment > Connect Peers
  2. Identify the two Inside CIDR addresses associated with each peer as well as the ASN number for the region
  3. Note the subnet identifies if the neighbors will peer with the Active vMX (vMX-0) or the standby (vMX-1)

Cloud WAN Attachment

  1. Navigate to each Meraki vMX network's BGP page at network <AWS TVPC-vMX-REGION-vMX#-AZ#-ACCOUNT> > Security & SD-WAN > Routing
  2. Enable BGP with your BGP ASN and the two neighbor relations that correspond with the active and standby vMX routers

Meraki VPN Configuration

vMX High Availability Architecture

The deployment architecture is fault tolerant with two vMX instances in different Availability Zones. BGP routing provides automatic failover capabilities when a vMX instance fails.

Testing vMX Failover

Failover can be tested by using a network ACL in the subnet of the active vMX that denies all traffic. Both AutoVPN and BGP protocol will detect an outage. Remove the ACL to test fail back.

BGP Failover Process: BGP, based upon the hold down timer values, will detect an outage and use AS Path to communicate that the standby vMX is now primary.

Best Practices

For best practices when using Meraki vMX on AWS, see vMX Setup Guide for Amazon Web Services (AWS).

Additional Architecture Diagrams

Cloud WAN Core Network

CW Core Network

Cloud WAN Global Network

CW Global Network

Cloud WAN Overview

CW Overview

This completes the Cisco Meraki vMX SD-WAN deployment with AWS Cloud WAN. The solution provides highly available, scalable connectivity between your on-premises branches and AWS workloads through BGP-based routing in the Cloud WAN architecture.