Cisco-IIoT-SD-WAN-Catalogs

Cisco SD-WAN Catalogs are essentially edge device configuration groups that can be imported directly into Catalyst SD-WAN. Further, Cisco Industrial IoT devices can be added to the group and the configuration deployed with few clicks, reducing the need to build such configuration groups from scratch.

All catalogs are Cisco Validated Profiles (CVP) and their names start with CVP and some other designation. In all profiles (N) in the name refers to a deployment in NAT mode (aka Direct Internet Access or DIA) where LAN traffic is sent directly to the internet, while (R) in the name refers to a routed deployment where all LAN traffic will be routed to a central hub advertising a default route.

The table below lists all IIoT SD-WAN catalogs which have been tested and validated by Cisco for use with Cisco Industrial IoT Platforms (IR1101, IR1800, IR8340). Each published catalog is essentially a tar file that can be imported directly into the matching Catalyst SD-WAN release as a Configuration Group. That group can then be modified further, if needed, prior to attaching and deploying on edge devices. Catalogs come with certain global values pre-configured to ease deployment, such as interface names, cellular timers optimizations to reduce cellular data usage, pre-defined service VPNs and other services such as NTP, DNS, DHCP, and Logging. Each catalog also comes with a PDF file that explains in more detail the functionality of the catalog. Below is example where to import the Catalog tar file in Cisco SD-WAN

image

Catalog Entries By Release
Cisco Validated Profile (CVP) Cisco IIoT Platforms Catalyst SD-WAN Release Functional Description
1 CVP1N CVP1R IR1101 20.15.2+ Single router SD-WAN configurations with wired and single LTE as last resort supporting single service VPN for for horizontal IR1101 deployments.
2 CVP2N CVP2R IR1800 20.15.2+ Single router SD-WAN configurations with wired and single LTE as last resort supporting single service VPN for for horizontal IR1800 deployments.
3 CVP1NX CVP2NX IR1101 & IR1800 20.15.2+ Single router SD-WAN configurations with LTE and wired as last resort supporting single service VPN for for horizontal IR deployments. Reverse priority of CVP1N and CVP2N
4 CVP5 CVP6 IR1101 & IR1835 Roadways 20.15.2+ Single router SD-WAN configurations with wired and single LTE as last resort supporting multiple service VPN for Roadways deployments with ISE integration and lan port authentication
5 CVP3NAA CVP3NAS IR1101 Dual LTE

active/active &

active/standby
20.15.2+
& IOS 17.18.1/17.15.4
Single router SD-WAN configurations with wired and dual LTE in both active/active and active/standby modes, supporting single service VPN for for horizontal IR deployments.
6 CVP4NAA CVP4NAS IR1800 Dual LTE

active/active &

active/standby
20.15.2+
& IOS 17.18.1/17.15.4
Single router SD-WAN configurations with wired and dual LTE in both active/active and active/standby modes, supporting single service VPN for for horizontal IR deployments.
7 CVP1N_SEA CVP2N_SEA IR1101 & IR1800

NAT with SEA

20.18.1+ Same as CVP1N/CVP2N with Cisco Secure Equipment Access agent deployment included.
8 CVP1N_TE CVP2N_TE IR1101 & IR1800

NAT with ThousandEyes

Coming Soon Same as CVP1N/CVP2N with ThousandEyes agent deployment included.
9 CVP1N_TESEA CVP2N_TESEA IR1101 & IR1800

NAT with ThousandEyes and SEA

Coming Soon Same as CVP1N/CVP2N with ThousandEyes and Secure Equipment agents deployment included.
10 CVP5_CV CVP6_CV IR1101 & IR1835 Roadways (CV) Coming Soon Single router SD-WAN configurations with wired and single LTE as last resort supporting multiple service VPN for Roadways deployments with ISE integration and lan port authentication. Also includes profile to deploy Cyber Vision sensor in IOX
11 CVP6_CVSEA CVP6_CVTE IR1835

Roadways (CV&SEA)

Roadways (CV&TE)
Coming Soon IR1835 Roadways catalog with combined applications, Cyber Vision & Secure Equipment Access or Cyber Vision & ThousandEyes.
12 CVP7R IR8340 Coming Soon

Cisco provides the configurations in this catalogs as is for your convenience. These configurations have been built using industry best practices, observed across multiple deployments, which may be beneficial to you. Cisco is not responsible for any technical issues, bugs, or other issues that may arise from your use of these configurations and any resulting indirect, incidental, reliance, consequential, special or exemplary damages or loss of actual or anticipated revenue, profit, business, savings, data goodwill or use, business interruption, damaged data, wasted expenditure or delay in delivery (in all cases, whether direct or indirect).

View code on GitHub

Code Exchange Community

Get help, share code, and collaborate with other developers in the Code Exchange community.View Community
Disclaimer:
Cisco provides Code Exchange for convenience and informational purposes only, with no support of any kind. This page contains information and links from third-party websites that are governed by their own separate terms. Reference to a project or contributor on this page does not imply any affiliation with or endorsement by Cisco.