NetScaler SD-WAN Standard Edition is now available in Azure marketplace on BYOL basis. NetScaler SD-WAN Standard Edition for Azure logically bonds multiple network links into a single secure logical virtual path. The solution enables organizations to leverage connections from different service providers including Broadband, MPLS, 4G/LTE, Satellite and point-to-point links to get high resiliency virtual WAN paths. NetScaler SD-WAN for Azure enables organizations to have a direct secure connection from each branch to the applications hosted in Azure eliminating the need to backhaul cloud bound traffic through a data center. Some of the benefits of using NetScaler SD-WAN in Azure are:
- Create direct connections from every location to Azure.
- Ensure an always on connection to Azure.
- Extend your secure perimeter to the cloud.
- Evolve to a simple, easy to manage branch network.
Topology - SD-WAN in Azure
NetScaler SD-WAN Standard Edition can only be deployed in Gateway deployment mode in Azure. A Public IP address (Static/Dynamic) needs to be assigned to the WAN facing interface of SD-WAN in Azure. Since Azure only supports one public IP per instance, the web management GUI needs to be accessed through private IP assigned to the instance through a Windows/Linux machine.
A Azure VM is deployed within a specified region and can be connected to multiple branch locations through MPLS, Internet, or 4G/LTE. Within a Virtual Network (VNET) infrastructure, SD-WAN Standard Edition VHD (Virtual Hard Drive) is deployed in Gateway mode. The VNET has routes towards the Azure Gateway. SD-WAN instance has a route towards the Azure Gateway for internet connectivity.
Connectivity between Data Center, Branch, and Cloud is achieved by leveraging different transports methods utilizing multiple WAN paths simultaneously.
To deploy NetScaler SD-WAN Standard Edition in Microsoft Azure:
- In a web browser, type https://portal.azure.com. Log into Microsoft Azure account. Search for NetScaler SD-WAN Standard Edition.
2. In the search results window, choose the solution as shown below:
3. Click create after going through the description and making sure the solution chosen is correct.
4. After you click Create, a wizard pormpting for details necessary to create the virtual machine in Azure appears. In the first step, choose the resource group in which you like to deploy the solution. A resource group is a container that holds related resources for an Azure solution. The resource group can include all the resources for the solution, or only those resources that you want to manage as a group. You can decide how you want to allocate resources to resource groups based on your deployment. Some important points to consider when defining your resource group are:
- a) All the resources in your group should share the same lifecycle. You deploy, update, and delete them together.
- b) If one resource, such as a database server, needs to exist on a different deployment cycle it should be in another resource group.
- c) Each resource can only exist in one resource group.
- d) You can add or remove a resource to another resource group at any time.
- e) You can move a resource from one resource group to another resource group
- f) A resource group can contain resources that reside in different regions.
- g) A resource group can be used to scope access control for administrative actions.
- h) A resource can interact with resources in other resource groups. This interaction is common when the two resources are related but do not share the same lifecycle (for example, web apps connecting to a database).
In the following image, choose Create New.
Under Location, choose the region in which you want to deploy the solution. When creating a resource group, you need to provide a location for that resource group. The resource group stores metadata about the resources that you are creating. Therefore, when you specify a location for the resource group, you are specifying where that metadata is stored.
5. Provide a name for the Virtual Machine. Choose a username and strong password. Tthe password must consist of an upper case letter, special character and must be more than 9 characters. Click OK.
6. Choose the instance in which you want to run the image. Currently, Standard_D3_V2 and Standard_D4_V2 are supported. If you are looking to achieve 200 Mbps of aggregated through put then choose Standard_D4_V2 as the instance type.
7. After choosing the image, choose the storage account. If you have an existing storage account then you may choose that. In this step, you are creating a new storage account as seen below. A storage account stores the VHD’s for the operating system's temporary and additional data disks.
8. Choose a Public IP for the Virtual Machine. This would be assigned to the WAN facing interface of the solution. You may choose either a static or dynamic IP. However, it is recommended that you choose a static IP.
The public IP that is assigned to the appliance here is provided by Azure and will become the Virtual IP of the SD-WAN VM and would be used to communicate with the Master Control Node.
9. After you have assigned an IP address, assign a DNS label. This DNS label must be able to uniquely identify the SD-WAN VM.
10. Create a new Virtual Network (VNET) or use an existing VNET. This is the most critical step for deployment as this step chooses the subnets to be assigned to the interfaces of the SD-WAN VM.
11. You can now assign the required subnets to each of the interfaces in the VM. The ordering for assigning subnets is WAN, LAN and Management respectively. Choose as required and click OK. In the following image, you are assigning the subnets to each of the interfaces.
12. Verify all the configuration details and click OK.
13. All the configuration that you provided in previous steps is validated and applied. If you have configured correctly then you should see the validation passed message as shown below. Click OK.
14. After validation is passed, click on Purchase to purchase and create the image.
15. After you make the purchase, the deployment starts and you can view the status in the notifications section.
16. You can get additional details of your deployment by going to the resource group in which you are creating the deployment.
17. Once the deployment has succeeded, please try to access the GUI through the public IP. Use your administrator login credentials (admin/password) to login.
18. Upgrade the software to the latest image by applying the latest 9.2.147 software image for VPX appliances by going into the update software option. This is a onetime operation only and is required when bringing the image up for the first time. You can find the build at: https://www.citrix.com/downloads/netscaler-sd-wan/netscaler-sd-wan-standard-enterprise-edition/cloudbridge-virtual-wan-vpx-release-920.html
19. After software is updated, you cannot access the GUI through the public IP as the public IP would be used for setting up the virtual paths. In order to access the GUI for managing the solution, you need to spin a Windows VM in the same vnet and connect to the management IP assigned to the appliance. The management IP is assigned to the last NIC (sdwanrg42-Nic2 as shown below). You need to connect to the GUI of the appliance through the management IP assigned to this NIC, 10.14.2.4 as shown below.
20 . After you login to the GUI, you will notice that the virtual service is disabled because SD-WAN on Azure works on a BYOL (Bring Your Own License) model. Please apply the license through the licensing tab, if you have the license already or order a new one by going to http://store.citrix.com.
21. After the license is applied, you can apply configuration to the appliance and use it like any other branch. For more information on configuring the appliance, please refer to: http://docs.citrix.com/en-us/netscaler-sd-wan/9-3.html
Limitations - Microsoft Azure VMs
- After a VM is created and booted in Azure, the interfaces cannot be added or deleted. The VM profile (RAM/HD/CPUs) can be changed.
- Azure does not allow two network interfaces NIC on a VM to have IP address on same subnet. There is no L2 Support and bridging is not allowed. SE-VPX on Azure has to be deployed in Gateway mode.
- There is no concept of MAC address spoofing in Azure Cloud. The LAN subnet of the SE-VPX and the LAN subnet of the Client/Server Host have to be different. This will require additional routing configuration to be done in two places.
- PCI Enumeration causes the order of NICs in an Azure VM to get switched on reboots. This might cause Management Subnet unreachability.
–Routes have to added in the Virtual WAN Configuration file directing all Virtual WAN Data traffic coming from the WAN to the Client/Server LAN Subnet.