Control Connections and Certificates
Objective
In this lesson you will configure and verify the DTLS/TLS control connections used by SD‑WAN controllers and the certificate-based authentication that secures those control-plane sessions. This matters because the control plane carries routing, policy, and keying information (OMP) — if control connections fail or are not authenticated, the overlay cannot form and policies will not be distributed. In production, certificate-based DTLS/TLS is used to prevent rogue devices from joining a corporate SD‑WAN fabric and to ensure controllers and WAN Edge routers mutually authenticate before exchanging sensitive OMP updates.
Topology
Use the same physical layout from Lesson 1. This lesson focuses on the WAN Edge device interface names and the system IP already designated for this device.
ASCII topology (showing the WAN Edge system IP and WAN interfaces):
Internet / Transport
|
+--------------+
| WAN Router |
| (Provider) |
+--------------+
|
G0/0 / G0/1
|
+---------------------------------------------+
| WAN Edge (SD‑WAN) |
| System IP: 10.0.0.1 |
| Interfaces: G0/0 G0/1 |
+---------------------------------------------+
|
Management / LAN (VPNn / VPN512 etc.)
Note: The only exact IP we must use from the reference material is the WAN Edge System IP 10.0.0.1 on the WAN Edge device. Interface names used in this lesson are G0/0 and G0/1 as shown in the reference.
Device Table
| Device | Role | Key Interface(s) | System IP / Notes |
|---|---|---|---|
| WAN Edge | SD‑WAN Edge router | G0/0, G0/1 | System IP: 10.0.0.1, TLOC Color: Internet, Encap: IPSecTLOC |
| Controller(s) | SD‑WAN Controllers (control-plane) | — | Controllers provide DTLS/TLS endpoints for OMP (addresses configured out-of-band in production) |
Quick Recap
- In previous lessons you prepared the WAN Edge basics and learned about TLOCs and VPN separation (VPN0 for transports, VPN512 for management, VPNn for service).
- This lesson concentrates on the control plane: how the WAN Edge establishes authenticated DTLS/TLS connections to Controllers and how certificates are used to validate identities.
- We will use the WAN Edge System IP 10.0.0.1 and physical interfaces G0/0 and G0/1 (used for transports) as the anchor for our configuration examples and verifications.
Key Concepts (theory + practical implications)
-
Control Connections (DTLS/TLS)
- Theory: SD‑WAN control connections use authenticated DTLS (UDP) or TLS (TCP) tunnels between WAN Edge routers and Controllers. These tunnels carry OMP routes, TLOCs, keys, and policy.
- Practical: When a WAN Edge comes up, it establishes a DTLS/TLS control session to a Controller; this must authenticate before OMP advertisements are accepted.
-
Certificates and Authentication
- Theory: Certificate-based authentication uses PKI — controllers and WAN Edge routers present certificates signed by a trust anchor. The handshake validates identity and then derives session keys for AES256‑GCM control-plane encryption.
- Practical: In production, devices typically use trusted CA-signed certificates (or enterprise CA) rather than self-signed certs to prevent man-in-the-middle or rogue registration.
-
System IP vs. Underlay IP
- Theory: The System IP (10.0.0.1) is the identifier used inside the SD‑WAN fabric for OMP and TLOC mapping; it is not necessarily the physical interface IP.
- Practical: The System IP is advertised to Controllers and peers as part of TLOC state. In NAT scenarios, external public address is validated by a validator service so the control-plane can still form.
-
Control-plane Behavior & OMP
- Theory: After DTLS/TLS is established, the Controllers and Edge exchange OMP updates: reachability (subnets), TLOCs, keys, and policy. OMP runs over the authenticated control channel.
- Practical: If the DTLS/TLS session uses DTLS (UDP), NAT traversal and proper port handling are required; if TLS (TCP) is used, the connection is more firewall-friendly but less efficient for rapid key updates.
Tip: Think of the certificate trust relationship like a passport check: the Controller checks the WAN Edge's certificate against a trust anchor before handing over the grant (OMP updates). Without that check, anyone could claim to be a network element.
Step-by-step configuration
Note: Each step contains the exact commands to enter configuration modes, an explanation of what the commands do and why they matter, and verification commands with expected outputs. All commands presented reference the System IP 10.0.0.1 and interface names G0/0 or G0/1 as required by the lab reference.
Step 1: Set the System IP and TLOC color
What we are doing: We assign the device its SD‑WAN System IP (the identifier used in OMP and TLOC advertisements) and specify the TLOC attributes such as color and encapsulation. The System IP is essential for the controller to identify this WAN Edge inside the fabric.
configure terminal
system
system-ip 10.0.0.1
tloc color Internet
tloc encapsulation IPSecTLOC
exit
exit
What just happened:
system-ip 10.0.0.1configures the SD‑WAN identifier that will be advertised to controllers as the device’s System IP.tloc color Internetlabels this transport with the public color "Internet", which controllers and peers use to decide which TLOCs to form tunnels to.tloc encapsulation IPSecTLOCsets the encapsulation type for the TLOC to IPSecTLOC (the typical encapsulation used for data-plane tunnels).
Real-world note: In multi-transport sites you will configure multiple TLOCs with different colors (e.g., MPLS vs Internet). Controllers can auto-restrict tunnels between colors based on policy.
Verify:
show system
System IP: 10.0.0.1
TLOC:
Color: Internet
Encap: IPSecTLOC
Step 2: Configure VPN0 and the physical WAN interface
What we are doing: Assign an IP on the WAN-facing interface (VPN0 is reserved for transports) and bring the interface up. This provides underlay connectivity the control channel needs to reach Controllers.
configure terminal
vpn 0
interface GigabitEthernet0/0
ip address 10.0.0.1 255.255.255.0
no shutdown
exit
exit
exit
What just happened:
vpn 0places the interface in the transport VRF that isolates underlay from user LANs.- Setting
ip address 10.0.0.1 255.255.255.0assigns the underlay IP used by the physical interface — here we align the interface IP to the System IP for clarity (in many deployments the System IP may be different from the physical IP). no shutdownensures the interface is administratively up so control connections can egress.
Real-world note: In production the underlay interface IP will typically be provided by the ISP or DHCP; verify NAT and firewall rules allow DTLS/TLS to controller ports.
Verify:
show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 10.0.0.1 YES manual up up
Step 3: Generate and install a device certificate (self-signed for lab)
What we are doing: Create a device certificate that the Controller can validate during the DTLS/TLS handshake. Certificate-based authentication ensures both ends of the control connection are validated.
configure terminal
crypto key generate rsa label edge-key modulus 2048
crypto pki trustpoint NHPREP-TP
enrollment selfsigned
subject-name CN=wan-edge.lab.nhprep.com,O=NHPREP
revocation-check none
exit
crypto pki enroll NHPREP-TP
exit
What just happened:
crypto key generate rsa label edge-key modulus 2048creates a 2048-bit RSA key pair stored on the device; this becomes the private/public key for the cert.crypto pki trustpoint NHPREP-TPandenrollment selfsignedcreate a trustpoint and produce a self‑signed certificate with the specified subject name (CN and O).crypto pki enrollcompletes the enrollment, placing the certificate into the local certificate store for use in TLS/DTLS handshakes.
Real-world note: Use an enterprise CA or manufacturer-signed certificates in production. Self-signed certificates are acceptable for lab and testing only.
Verify:
show crypto pki certificates
Trustpoint: NHPREP-TP
Certificate:
Subject: CN=wan-edge.lab.nhprep.com,O=NHPREP
Validity:
Not Before: Jan 01 00:00:00 2025 GMT
Not After : Jan 01 00:00:00 2026 GMT
Serial Number: 00:01
Key Usage: Digital Signature, Key Encipherment
Step 4: Enable DTLS/TLS control and point to controllers (control connection profile)
What we are doing: Configure the device to use DTLS/TLS for control-plane connections and bind it to the certificate we created. This tells the WAN Edge to present its certificate during TLS handshakes and to accept controller certificates validated by the trustpoint.
configure terminal
control-connection
transport dtls tls
trustpoint NHPREP-TP
exit
exit
What just happened:
transport dtls tlsinstructs the device to negotiate DTLS first and fall back to TLS if necessary, following common SD‑WAN behavior for control plane reliability and NAT traversal.trustpoint NHPREP-TPbinds the certificate/trustpoint we created earlier to the control-plane TLS profile so the certificate is used for handshake and validation.
Real-world note: DTLS offers lower latency and better suitability for NATted UDP scenarios; TLS over TCP is often used where firewall traversal is constrained.
Verify:
show control-connection
Control Transport: dtls/tls
Trustpoint: NHPREP-TP
Status: enabled
Step 5: Verify control-plane session establishment and OMP advertisements
What we are doing: Check that a control connection to the Controller has been established, and that OMP routes/TLOCs are being exchanged. This confirms the certificate-based authentication succeeded and OMP is operational.
show omp connections
Control Connections:
Peer Controller: controller-01
Connection Type: DTLS
Local System IP: 10.0.0.1
State: Established
Authenticated: yes
Certificate Subject: CN=wan-edge.lab.nhprep.com,O=NHPREP
What just happened:
- The
show omp connectionsoutput shows an established DTLS control session to a controller with the local System IP 10.0.0.1. Authenticated: yesindicates the certificate handshake completed and the controller validated the device certificate and vice versa.- Once this is established, OMP updates (routes, TLOC publishing, policies) will be exchanged and the WAN Edge will advertise its attached subnets and TLOCs.
Real-world note: If the connection fails to authenticate, check certificate trust anchors on the controller side and ensure time/date on both endpoints is correct (cert validity).
Verify:
show omp routes
OMP Routes:
Network: 10.100.0.0/24
Origin: Connected
Next-hop: TLOC 10.0.0.1 color Internet
Hostname: wan-edge.lab.nhprep.com
Verification Checklist
-
Check 1: System IP and TLOC attributes are configured and visible
How to verify:show system— expect System IP: 10.0.0.1 and Color: Internet. -
Check 2: VPN0 interface is up with correct IP (underlay)
How to verify:show ip interface brief— expect GigabitEthernet0/0 10.0.0.1 up up. -
Check 3: Certificate installed and bound to control transport
How to verify:show crypto pki certificatesandshow control-connection— expect certificate subject CN=wan-edge.lab.nhprep.com and control transport dtls/tls bound to NHPREP-TP. -
Check 4: Control connection to Controller is established and authenticated; OMP routes present
How to verify:show omp connectionsandshow omp routes— expect Established state and OMP routes with TLOC next-hop.
Common Mistakes
| Symptom | Cause | Fix |
|---|---|---|
| Control connection remains in "Connecting" or "Down" | Certificate not installed or mismatched trustpoint on the controller | Verify certificate on WAN Edge and ensure controller has the corresponding CA/trust anchor; reinstall certificate or use a CA-signed cert |
| OMP shows no routes after control established | No TLOC published or VPN mappings incorrect | Confirm TLOC color/encapsulation and that interfaces are in VPN0; check show system and show ip interface brief |
| DTLS session fails through NAT | NAT device rewrites UDP ports or blocks DTLS traffic | Ensure NAT keeps mappings for DTLS UDP ports or allow TLS fallback over TCP; confirm connectivity to controller public IP and that validator is reachable |
| Certificate shows "Not Valid" or "Expired" | Device clock/time incorrect or certificate expired | Fix device NTP/time and re-enroll or renew certificate; ensure timezone and NTP are configured before certificate operations |
Key Takeaways
- The SD‑WAN control plane uses DTLS/TLS secured channels to exchange OMP updates; certificate-based authentication is the recommended method to prevent unauthorized devices from joining the fabric.
- The System IP (10.0.0.1) is the device identifier inside the fabric and is advertised with TLOCs; ensure it’s correctly configured and reflected in OMP.
- Certificates must be valid, trusted by the Controller, and matched to a control transport profile (DTLS/TLS). Time synchronization (NTP) and an appropriate CA policy are prerequisites in production.
- In production, prefer CA-signed certificates and carefully design transport colors (Internet vs MPLS) so Controllers can apply policies and prevent undesired inter‑region tunnel formation.
Important: Think of the control channel like the network’s nervous system — it must be authenticated and healthy for policies and reachability to propagate. Misconfiguration in certificates or control transport prevents the entire fabric from functioning even if the underlay is healthy.
If you want, next we can add controller-side verification examples or demonstrate a certificate renewal flow using an enterprise CA to mirror production operations.