CLC CCIE EI SD-Wan Lab v1.0 - Full Solution
CLC CCIE EI SD-Wan Lab v1.0 - Full Solution
CLC CCIE EI SD-Wan Lab v1.0 - Full Solution
1|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Workbook Description
Author: CCIE Lab Center (CLC)
Focus: Practice
Level: Expert (CCIE)
Stream: CCIE Enterprise Infrastructure: SD-WAN Technology
Content: Topology, Questions, Initial Configuration, Solutions, Verifications.
Format: PDF
Protection: DRM Protected
Price/Cost: $100 USD
2|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1) Lab Details 6
A) Lab Summary 6
B) Initial configuration 12
3|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
17) Final CLI output of all vEdges & vSmart controller 227
5|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1 LAB Details
A) Lab Summary
1) Feature & Devices Template
2) Hub & Spoke Policy.
3) Local Internet Breakout
4) Implementing Traffic Engineering (PBR)
5) QoS
6) Application aware policy
7) TLOC
8) cflowd
a) Hardware Requirement
CPU 8 core
RAM 32 GB
HDD 500 GB
Note: After starting all nodes wait for 10 minutes for CPU utilization getting back to normal.
6|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
7|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Step3: Login to your eve-ng server/hypervisor/vmware/etc. with username root & password eve
/opt/unetlab/wrappers/unl_wrapper -a fixpermissions
8|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
/opt/unetlab/wrappers/unl_wrapper -a fixpermissions
For more details on uploading images you can visit the below link.
https://www.eve-ng.net/index.php/documentation/howtos/howto-add-cisco-iol-ios-on-linux/
9|Page
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
10 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
e) IP details
f) Lab nodes
Image versions used in lab.
Viptela 18.4.4:, vManager, vBond, vSmart, vEdge
MPLS Router: i86bi-linuxl3-adventerprisek9-15.5.2T.bin
Internet Router: i86bi-linuxl3-adventerprisek9-15.5.2T.bin
L2 Switches: viosl2-adventerprisek9-m.03.2017 & i86bi-linuxl2-adventerprisek9-15.2d.bin
Host system: EVE Docker GUI-Server
CA Server: EVE Docker GUI-Server
11 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
B) Initial configurations
For ISP router, Switches, hosts and servers configurations are pasted as given bellows.
Startup configuration
I. Internet Router
hostname Biz-INT
ip name-server 8.8.8.8
ip name-server 1.1.1.1
interface Ethernet0/0
description *** Connected to Internet ***
ip address dhcp
ip nat outside
ip virtual-reassembly in
!
interface Ethernet0/1
description *** Connected to vedge1 ***
ip address 64.100.101.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet0/2
description *** Connected to vedge2 ***
ip address 64.100.102.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet0/3
description *** Connected to vedge4 ***
ip address 64.100.103.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet1/0
description *** Connected to vedge6 ***
ip address 64.100.104.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet1/1
description *** Connected to vedge7 ***
ip address 64.100.105.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet1/2
description *** Connected to vedge8 ***
ip address 64.100.106.1 255.255.255.240
ip nat inside
ip virtual-reassembly in
!
interface Ethernet1/3
12 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
II. MPLS
hostname MPLS
interface E0/1
description *** Connected to vedge2 ***
ip address 192.168.2.1 255.255.255.252
no shutdown
interface E0/2
description *** Connected to vedge3 ***
ip address 192.168.3.1 255.255.255.252
ip nat inside
no shutdown
13 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
interface E0/3
description *** Connected to vedge5 ***
ip address 192.168.4.1 255.255.255.252
no shutdown
interface E1/0
description *** Connected to vedge7 ***
ip address 192.168.5.1 255.255.255.252
no shutdown
interface E1/1
description *** Connected to vedge8 ***
ip address 192.168.6.1 255.255.255.252
no shutdown
interface E1/2
description *** Connected to vedge9 ***
ip address 192.168.7.1 255.255.255.252
no shutdown
interface E2/0
description *** Connected to SW2 ***
ip address 192.168.8.1 255.255.255.252
no shutdown
interface E1/3
description *** Connected to Internet P2P link ***
ip address 5.5.5.5 255.255.255.252
no shutdown
router ospf 10
redistribute connected
redistribute static
network 192.168.8.0 0.0.0.3 area 10
dns server
ip route 0.0.0.0 0.0.0.0 5.5.5.6
ip route 10.1.1.12 255.255.255.252 192.168.7.2 name static-4-vedge9
ntp master 1
III. SW1
hostname SW1
vlan 100
name VPN512
interface E0/2
description *** Connected to vBond VPN512 ***
switchport access vlan 100
switchport mode access
no shutdown
spanning-tree portfast edge
!
interface E0/1
description *** Connected to vSmart VPN512 ***
switchport access vlan 100
14 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IV. SW2
hostname SW2
vlan 200
name VPN0
interface GigabitEthernet0/0
description *** Conneced to vManage VPN0 ***
switchport access vlan 200
switchport mode access
no shutdown
spanning-tree portfast edge
!
interface GigabitEthernet0/1
description *** Conneced to vSmart VPN0 ***
switchport access vlan 200
switchport mode access
no shutdown
spanning-tree portfast edge
!
interface GigabitEthernet0/2
description *** Conneced to vBond VPN0 ***
switchport access vlan 200
switchport mode access
no shutdown
spanning-tree portfast edge
!
interface GigabitEthernet1/2
description *** Connected to MPLS ***
no switchport
ip address 192.168.8.2 255.255.255.252
no shutdown
!
interface GigabitEthernet1/1
description *** Connected to Internet ***
no switchport
ip address 64.100.108.2 255.255.255.240
no shutdown
!
15 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
interface GigabitEthernet0/3
description *** Connected CA Server ***
switchport access vlan 200
switchport mode access
no shutdown
spanning-tree portfast edge
!
interface Vlan200
description ** Created for VPN0 ***
ip address 10.10.0.1 255.255.255.0
!
router ospf 10
network 10.10.0.0 0.0.0.255 area 10
network 192.168.8.0 0.0.0.3 area 10
ip route 0.0.0.0 0.0.0.0 64.100.108.1
V. SW3
hostname SW3
vlan 10
name FTP
vlan 20
name WEB
interface Port-channel10
description *** Created for SW4 ***
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet0/0
description *** Connected to SW4 ***
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
channel-group 10 mode active
!
interface GigabitEthernet0/1
description *** Connected to SW4 ***
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
channel-group 10 mode active
!
interface GigabitEthernet0/2
description *** Connected to vedge1 ***
no switchport
ip address 10.1.1.2 255.255.255.252
ip ospf network point-to-point
negotiation auto
!
interface GigabitEthernet0/3
description *** Connected to vedge2 ***
16 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
no switchport
ip address 10.2.2.6 255.255.255.252
ip ospf network point-to-point
negotiation auto
!
interface GigabitEthernet1/0
description *** Connected to SW5 ***
switchport trunk allowed vlan 10,20
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
!
interface Vlan10
ip address 172.16.10.2 255.255.255.0
ip ospf network point-to-point
vrrp 10 ip 172.16.10.1
vrrp 10 priority 250
!
interface Vlan20
ip address 172.16.20.2 255.255.255.0
ip ospf network point-to-point
vrrp 20 ip 172.16.20.1
!
router ospf 10
auto-cost reference-bandwidth 100000
redistribute connected subnets
network 10.1.1.0 0.0.0.3 area 0
network 10.2.2.4 0.0.0.3 area 0
network 172.16.10.0 0.0.0.255 area 0
network 172.16.20.0 0.0.0.255 area 0
VI. SW4
hostname SW4
vlan 10
name FTP
vlan 20
name WEB
interface Port-channel10
description *** Created for SW3 ***
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet0/0
description *** Connected to SW3 ***
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
channel-group 10 mode active
17 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
interface GigabitEthernet0/1
description *** Connected to SW3 ***
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
channel-group 10 mode active
!
interface GigabitEthernet0/2
description *** Connected to vedge2 ***
no switchport
ip address 10.1.1.6 255.255.255.252
ip ospf network point-to-point
negotiation auto
!
interface GigabitEthernet0/3
description *** Connected to vedge1 ***
no switchport
ip address 10.2.2.2 255.255.255.252
ip ospf network point-to-point
negotiation auto
!
interface GigabitEthernet1/0
description *** Connected to SW5 ***
switchport trunk allowed vlan 10,20
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
interface Vlan10
ip address 172.16.10.3 255.255.255.0
vrrp 10 ip 172.16.10.1
!
interface Vlan20
ip address 172.16.20.3 255.255.255.0
vrrp 20 ip 172.16.20.1
vrrp 20 priority 250
!
router ospf 10
auto-cost reference-bandwidth 100000
redistribute connected subnets
network 10.1.1.4 0.0.0.3 area 0
network 10.2.2.0 0.0.0.3 area 0
network 172.16.10.0 0.0.0.255 area 0
network 172.16.20.0 0.0.0.255 area 0
VII. SW5
hostname SW5
vlan 10
18 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
name FTP
vlan 20
name WEB
interface GigabitEthernet0/0
description *** SW3 ***
switchport trunk allowed vlan 10,20
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
!
interface GigabitEthernet0/1
description *** SW4 ***
switchport trunk allowed vlan 10,20
switchport trunk encapsulation dot1q
switchport mode trunk
media-type rj45
negotiation auto
!
interface GigabitEthernet0/2
description *** WEB ***
switchport access vlan 20
switchport mode access
media-type rj45
negotiation auto
!
interface GigabitEthernet0/3
description *** FTP ***
switchport access vlan 10
switchport mode access
media-type rj45
negotiation auto
VIII. SW6
hostname SW6
VLAN 100
Name employee
VLAN 200
Name guest
interface E0/1
description *** Connected to SW7 ***
switchport trunk encapsulation dot1q
switchport mode trunk
no shutdown
!
interface E0/0
description *** Connected to vEdge ***
switchport trunk allowed vlan 100,200
switchport trunk encapsulation dot1q
switchport mode trunk
no shutdown
!
interface E0/2
description *** Connected to Host1 ***
19 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IX. SW7
hostname SW7
VLAN 100
Name employee
VLAN 200
Name guest
interface E0/0
description *** Connected to vEdge4 ***
switchport trunk allowed vlan 100,200
switchport trunk encapsulation dot1q
no shutdown
!
interface E0/1
description *** Connected to SW6 ***
switchport trunk encapsulation dot1q
switchport mode trunk
no shutdown
!
interface E0/2
description *** Connected to Host2 ***
switchport access vlan 200
switchport mode access
no shutdown
X. SW8
hostname SW8
vlan 100
name Employee
interface E0/0
description *** Connected to vEdge6 ***
no switchport
ip address 10.1.1.34 255.255.255.252
ip ospf network point-to-point
no shutdown
interface E0/1
description *** Connected to vEdge5 ***
no switchport
ip address 10.1.1.30 255.255.255.252
ip ospf network point-to-point
no shutdown
interface E0/2
description *** Connected to Host1 ***
switchport
switchport mode access
switchport access vlan 100
no shutdown
20 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
interface Vlan100
ip address 172.18.1.1 255.255.255.0
description *** Employee host ***
no shutdown
!
router ospf 10
redistribute connected subnets
network 10.1.1.28 0.0.0.3 area 0
network 10.1.1.32 0.0.0.3 area 0
network 172.18.1.0 0.0.0.255 area 0
XI. SW9
hostname SW9
vlan 100
name Empoyee
vlan 200
name Guest
interface E0/1
description *** Connected to Host1 ***
switchport access vlan 100
switchport mode access
no shut
spanning-tree portfast edge
!
interface E0/2
description *** Connected to Host2 ***
switchport access vlan 200
switchport mode access
spanning-tree portfast edge
no shut
!
interface E0/0
description *** Connected to vEdge7 ***
switchport trunk allowed vlan 100,200
switchport trunk encapsulation dot1q
switchport mode trunk
no shutdown
XII. SW10
(no config)
hostname SW10
interface Et0/0
description *** Connected to vEdge8 ***
no shutdown
XIII. SW11
hostname SW11
interface Ethernet0/0
description *** Connected to vEdge9 ***
no switchport
21 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
interface Ethernet0/2
description *** Connected to Host3 ***
switchport access vlan 100
switchport mode access
spanning-tree portfast edge
!
!
interface Vlan100
description *** Employee ***
ip address 172.21.1.1 255.255.255.0
shutdown
!
XIV. R3
hostname R3
interface GigabitEthernet0/0
description *** Connected to vedge9 ***
ip address 10.1.1.13 255.255.255.252
duplex auto
speed auto
media-type rj45
!
interface GigabitEthernet0/1
description *** Connected to MPLS ***
ip address 192.168.7.2 255.255.255.252
duplex auto
speed auto
media-type rj45
ip route 0.0.0.0 0.0.0.0 192.168.7.1
22 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
XV. CA Server
23 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vim /etc/resolv.conf
nameserver 1.1.1.1
nameserver 8.8.8.8
esc>:wq
XVI. RTP
17.1 Host1
ifconfig eth0 172.17.1.254 netmask 255.255.255.0
route add default gw 172.17.1.1 eth0
17.2 Host2
ifconfig eth0 172.17.2.254 netmask 255.255.255.0
route add default gw 172.17.2.1 eth0
Host1
ifconfig eth0 172.18.1.254 netmask 255.255.255.0
route add default gw 172.18.1.1 eth0
Host1
ifconfig eth0 172.19.1.254 netmask 255.255.255.0
route add default gw 172.19.1.1 eth0
Host1
ifconfig eth0 172.20.1.254 netmask 255.255.255.0
route add default gw 172.20.1.1 eth0
24 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
XXI. Francisco
Host1
ifconfig eth0 172.21.1.254 netmask 255.255.255.0
route add default gw 172.21.1.1 eth0
25 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Login ID:admin
Pass :admin
Login: admin
Password: admin
Welcome to Viptela CLI
admin connected from 127.0.0.1 using console on vmanage
You must set an initial admin password.
Password: admin
Re-enter password: admin
Available storage devices:
hdb 100GB
hdc 3GB
1) vdb
2) hdc
Select storage device to use: 1
Would you like to format vdb? (y/n): y
Step 1.2. After reboot you need to login again & configure vManage with following:
Be careful to configure exactly the same organization-name. Organization name, when you downloaded
from https://software.cisco.com (PnP) section
conf t
system
clock timezone America/Los_Angeles
host-name vmanage
system-ip 10.200.1.10
site-id 700
organization-name "viptela sdwan"
vbond 10.10.0.3
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface eth0
description Connected-vSmart-ETH0-VPN0
ip address 10.10.0.5/24
26 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
no tunnel-interface
!
no shutdown
!
ip route 0.0.0.0/0 10.10.0.1
commit and
config t
vpn 512
interface eth1
description Connected-vSmart-ETH1-VPN512
ip address 54.239.98.5/24
no shutdown
!
ip route 0.0.0.0/0 54.239.98.1
commit and
reboot
Are you sure you want to reboot?[yes,NO] yes
Step 1.3. From CA server host open Chrome web browser and navigate to vManage web interface.
https://10.10.0.5 Navigate to Administrator > Settings. Verify that Organization Name is correctly
displayed. Edit the vBond settings and enter vBond Public IP address (10.10.0.3).
Even though you have already entered vBond IP address in the CLI, you still need to configure vBond
address also under system settings. Otherwise, process of generating bootstrap configuration for vEdge
Cloud instances will not be successful.
27 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Enter the Organization Name and click Save. This field must match what you used when creating the vBond profile.
28 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
conf t
system
clock timezone America/Los_Angeles
host-name vbond
system-ip 10.200.1.12
site-id 700
organization-name "viptela sdwan"
vbond 10.10.0.3 local
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface ge0/0
description Connected-vBond-GE0/0-VPN0
ip address 10.10.0.3/24
no tunnel-interface
no shutdown
!
ip route 0.0.0.0/0 10.10.0.1
commit and
config t
vpn 512
interface eth0
description Connected-vBond-ETH0-VPN512
ip address 54.239.98.3/24
no shutdown
!
ip route 0.0.0.0/0 54.239.98.1
commit and
reboot
Are you sure you want to reboot?[yes,NO] yes
29 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Login ID:admin
Pass :admin
conf t
system
clock timezone America/Los_Angeles
host-name vsmart
system-ip 10.200.1.11
site-id 700
organization-name "viptela sdwan"
vbond 10.10.0.3
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface eth0
description Connected-vSmart-ETH0-VPN0
ip address 10.10.0.4/24
no tunnel-interface
!
no shutdown
!
ip route 0.0.0.0/0 10.10.0.1
commit and
config t
vpn 512
interface eth1
description Connected-vSmart-ETH1-VPN512
ip address 54.239.98.4/24
no shutdown
!
ip route 0.0.0.0/0 54.239.98.1
commit and
30 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
31 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Clear all the certificates on the local device, including the public and private keys and the root
certificate, and return the device to the factory-default state
32 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
I. On vManage
Vshell
1.2 Generate the Root CA certificate. I will generate a certificate with 5 years of
validity.
openssl req -x509 -new -nodes -key ROOTCA.key -sha256 -days 2000 \
-subj "/C=US/ST=California/L=San Jose/O=viptela sdwan/CN=viptela sdwan" \
-out ROOTCA.pem
exit back to the cli shell and find the IP address of the vpn 0 interface.
33 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Once you have the IP address browse to the URL https://10.10.0.5 and login with the username/password
admin.
34 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
. Paste in the contents of the generated ROOTCA.pem file from the previous step and click Import & Save.
35 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Paste in the contents of the generated ROOTCA.pem file from the previous step and click Import & Save.
Next we need to create a CSR for the vManage. Navigate to the certificates section.
36 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
A window will popup with the CSR text. This can be ignored for the vManage.
Back in the vshell there will be a file called vmanage.csr. Sign this file with the ROOTCA.key and ROOTCA.pem.
This creates a file called vmanage.crt cat the file in order to copy and paste it into the web interface in the next
step.
Navigate to the certificates page and install the certificate by pasting the contents of the vmanage.crt file and
click Install.
37 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
38 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
II. On vBond
1 Add the vBond to the vManage.
39 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1.1 Navigate to the certificates page to get the vBond CSR text.
Copy the CSR text and go to the vManage vshell to generate the certificate.
Use vim to create a file called vbond.csr with the contents of the vBond CSR from the previous step. Then sign
the CSR with the Root CA certificate.
40 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
This will create a certificate file called vbond.crt. cat the contents of the vbond.crt file in order to copy and past
the contents to the vManage in the next step.
Navigate to the certificates page and install the vBond certificate by pasting in the contents of the vbond.crt file
and click Install.
41 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
III. On vSmart
1 Adding the vSmart to the vManage.
42 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1.1 Navigate to the certificates page to get the vSmart CSR text.
Copy the CSR text and go to the vManage vshell to generate the certificate.
Use Vim to create a file called vsmart.csr with the contents of the vSmart CSR from the previous step. Then sign
the CSR with the Root CA certificate.
43 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
This will create a certificate file called vsmart.crt. cat the contents of the vsmart.crt file in order to copy and
patch the contents to the vManage in the next step.
Navigate to the certificates page and install the vSmart certificate by pasting in the contents of the vsmart.crt file
and click Install.
44 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
If it was successful you will see a success message similar to the below.
To finalize controllers, bring up, you need to configure VPN0 with tunnel interface settings. Log
in first to vManage using SSH. Under interface eth0 configure tunnel-interface and commit the
configuration change. Your session should look similar as below:
1 vManage
vpn 0
interface eth0
tunnel-interface
commit and-quit
2 vBond
On vBond, you’ll also need to specify encapsulation type under tunnel-interface. Set it as ipsec.
vpn 0
interface ge0/0
tunnel-interface
encapsulation
ipsec commit and-
quit
45 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
3 vSmart
vpn 0
interface eth0
tunnel-interface
commit and-quit
Navigate back to the vManager Main dashboard. You should notice Up status for vSmart,
vBond and green checkmark status for vManage. There should be no certificate errors.
46 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
47 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
On vBond
Show orchestrator connections
48 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
49 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
50 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
You need to add a vBond controller profile in order to create virtual edges.
Navigate back to the main page and select Plug and Play Connect.
Select the Default dropdown then select the virtual account you created in the previous step.
51 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
52 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Note
The Organization Name will need to be unique, the IP address can be anything.
53 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Submit.
Select Done.
You should see your newly created controller profile in the list.
54 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Now create some vEdge and cEdge devices so we can generate a serial file.
55 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Enter the PID VEDGE-CLOUD-DNA for vEdges, specify the desired quantity and select Save.
56 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Next.
Select Submit.
57 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Done.
Rinse and repeat the process for cEdges but this time use: CSR1KV as the PID.
Note
At the time of writing a total of 25 virtual devices can be added to a virtual account.
58 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
This is it, the moment you have been waiting for, the all-important serial file. The serial file is required to add edge
devices to the fabric.
Select 18.3 and Newer from the dropdown and then select Download. Save the file to a safe location to import into the
vManage at a future time.
59 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Summary
We created a Virtual account, controller profile added software vEdge and cEdge devices and have our all important serial
file in hand.
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/TECSEC-2355.pdf
CA > Desktop > thinclient _drives > GUACFS – Drag and drop our viptela.serial license and move it to
rootCA. If we cannot see GUACFS > Download – stop Linux machine and start again.
A window will open that will allow you to save your file on your Linux or just close and open again. This
https://www.eve-ng.net/index.php/documentation/professional-cookbook/
Option. Copy file to Linux using native console
Linux > Desktop > thinclient _drives – we can see our PC disks, just find our license and with right copy to
Home folder or another folder
60 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Before you can add vEdges to the system, you also need to import license serial.viptela file. Navigate to
Configuration > Devices. Select Upload WAN vEdges List.
61 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
62 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
63 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1.2 You should be able to ping 10.10.0.3(vbond),10.10.0.4(vsmart) & 10.10.0.5(vmanage) from all vEdges.
1.3 Copy & Paste in the contents of the generated ROOTCA.pem file from vmanage vshell & save into all vEdges
vshell ROOTCA.pem
On all vEdges
Vedges:$vim ROOTCA.pem
From vmanage
64 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1.4 To vedges
vedges:~$ exit
conf t
system
clock timezone America/Los_Angeles
host-name vedge1
system-ip 10.200.1.1
site-id 100
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
conf t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
conf t
65 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 0
interface ge0/0
description MPLS
ip address 192.168.1.2/30
tunnel-interface
encapsulation ipsec
allow-service sshd
allow-service all
!
no shutdown
!
ip route 0.0.0.0/0 192.168.1.1
commit and
conf t
vpn 512
interface eth0
ip address 172.16.10.253/24
ipv6 dhcp-client
no shutdown
!
ip route 0.0.0.0/0 172.16.10.1
commit and
II. vEdge2
config t
system
clock timezone America/Los_Angeles
host-name vedge2
system-ip 10.200.1.2
site-id 100
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
conf t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
conf t
66 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 0
interface ge0/0
description MPLS
ip address 192.168.2.2/30
III. vEdge3
config t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
conf t
system
clock timezone America/Los_Angeles
host-name vedge3
system-ip 10.200.1.3
site-id 200
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
config t
vpn 0
interface ge0/0
description MPLS
ip address 192.168.3.2
tunnel-interface
encapsulation ipsec
allow-service all
allow-service sshd
!
no shutdown
!
ip route 0.0.0.0/0 192.168.3.1
commit and
config t
vpn 512
interface eth0
67 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ip address 172.17.1.253/24
no shutdown
commit and
IV. vEdge4
config t
system
clock timezone America/Los_Angeles
host-name vedge4
system-ip 10.200.1.4
site-id 200
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
conf t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
config t
vpn 0
no interface ge0/0
interface ge0/1
description Internet
ip address 64.100.103.2/28
tunnel-interface
encap ipsec
allow-service all
allow-service sshd
!
no shutdown
!
ip route 0.0.0.0/0 64.100.103.1
commit and
config t
68 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 512
interface eth0
ip address 172.17.2.253/24
no shutdown
ip route 0.0.0.0/0 172.17.2.1
commit and
V. vEdge5
config t
system
clock timezone America/Los_Angeles
host-name vedge5
system-ip 10.200.1.5
site-id 300
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
config t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface ge0/0
description MPLS
ip address 192.168.4.2/30
tunnel-interface
encap ipsec
allow-service all
allow-service sshd
!
no shutdown
!
ip route 0.0.0.0/0 192.168.4.1
commit and
69 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
config t
vpn 512
interface eth0
ip address 172.18.1.253/24
no shutdown
VI. vEdge6
config t
system
clock timezone America/Los_Angeles
config t
host-name vedge6
system-ip 10.200.1.6
site-id 300
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
config t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
no interface ge0/0
interface ge0/1
description Internet
ip address 64.100.104.2/28
tunnel-interface
encap ipsec
allow-service all
allow-service sshd
!
no shutdown
!
ip route 0.0.0.0/0 64.100.104.1
commit and
config t
70 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 512
interface eth0
ip address 172.18.1.252/24
no shutdown
commit and
VII. vEdge7
config t
system
clock timezone America/Los_Angeles
host-name vedge7
system-ip 10.200.1.7
site-id 400
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
config t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface ge0/0
description MPLS
ip address 192.168.5.2/30
tunnel-interface
encap ipsec
allow-service sshd
allow-service all
!
no shutdown
!
71 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
config t
vpn 512
interface eth0
ip address 172.19.1.253/24
no shutdown
commit and
VIII. vEdge8
config t
system
clock timezone America/Los_Angeles
host-name vedge8
system-ip 10.200.1.8
site-id 500
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
conf t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface ge0/0
description MPLS
ip address 192.168.6.2/30
tunnel-interface
encap ipsec
allow-service all
allow-service sshd
!
no shutdown
!
72 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
config t
vpn 512
interface eth0
ip address 172.20.1.253/24
no shutdown
commit and
IX. vEdge9
config t
system
clock timezone America/Los_Angeles
host-name vedge9
system-ip 10.200.1.9
site-id 600
organization-name "viptela sdwan"
vbond 10.10.0.3
commit and
config t
system
ntp
server 192.168.10.1
version 4
prefer
exit
commit and
config t
vpn 0
interface ge0/0
description MPLS
ip address 10.1.1.14/30
tunnel-interface
encap ipsec
allow-service sshd
73 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
allow-service all
!
no shutdown
!
ip route 0.0.0.0/0 10.1.1.13
commit and
config t
vpn 512
interface eth0
ip address 172.21.1.253/24
no shutdown
commit and
74 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
To add a virtual edge you need to generate a bootstrap file. Navigate to the devices page.
Generate bootstrap configuration to extract the UUID number and OTP token for the vEdge Cloud activation.
75 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
D) Verification on vEdges
show certificate serial
show control connections
show certificate installed
I. on vEdge1
Verification on vManage
76 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
II. on vEdge2
III. on vEdge3
77 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IV. vEdge4
V. on vEdge5
VI. On vEdge6
78 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
VII. On vEdge7
VIII. On vEdge8
79 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IX. On vEdge9
X. Verification on vManage
Navigate to the vManager Main dashboard. You should notice Control Status Up status for all WAN Edges.
80 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
81 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
In this section, the feature templates that fall under the basic information section of the device template will be
configured. This includes system settings, logging, Network Time Protocol (NTP), AAA,Banner and VPN 512 feature
templates.
From the list left side choose vEdge Cloud and CSR1000v devices and select System
vEdge-system
Template Description: vEdge-system
82 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Navigate to Timezone, Select Global, and Your timezone. Example America/Los Angles
83 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ii. Logging
To create a logging feature template, go to Configuration > Templates and select the Feature tab. Select the Add
Template button.
From the list left side choose vEdge Cloud and CSR1000v devices and select System
. Select the Logging template block under the Other Templates category on the right.
The Logging template is presented. Fill in the Template Name (Logging) and Description (Logging)
Select Server in order to jump to the logging server section of the template. Select the New Server button. In the
Hostname/IP Address box, type in the logging server hostname or IP address (172.16.10.253) in this example).
By default, this is a Global value, which means the value of 172.16.10.253 will be applied to all devices this
template is applied to. Alternatively, this could have been defined as a Device Specific variable instead.
For VPN ID, select Global from the drop-down box and type 1, which references the service VPN number that
will be created. The logging server, which sits in the data center, should be reachable from any site's local
network. For remote sites, traffic will traverse over the tunnel to reach the data center.
84 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
For Source Interface, select Global from the drop-down box and type loopback0 into the text box. We want to
source logging messages from loopback0, which will be the system IP for the device so you can better correlate
the events which appear on vManage.
85 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
By default, events are also still logged to the local disk. For priority, informational messaging is the default. Select
the Add button to add the logging server configuration to the feature template.
In the NTP template, the devices will use an NTP server located on the MPLS router, 192.168.10.1 which is
reachable through the transport VPN, VPN 0. Keeping correct time is important because certificates are used to
authenticate and connect to the controllers. Connection to the vSmart controllers is needed before IPSec tunnels
can be formed and connectivity to the data centre restored from the branches. In order for NTP to work
properly, a DNS server to resolve the NTP hostname will be required in the transport VPN. In addition, the NTP
protocol needs to be allowed on the tunnel interface or NTP will not work in the transport VPN. DNS and allowed
protocols are configured in the VPN interface templates configured later in this guide.
Assuming that you are still on the feature templates page, select the Add Template button. Create the NTP
template using the following device types, template type, template name, and description:
In the Server section, select the New Server button, and type 192.168.10.1 in the Hostname/IP Address box.
There is no authentication configured and the VPN ID by default is 0.
86 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
87 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
iv. AAA
In the AAA feature template, define local authentication and create additional users, an operator with read-only
privileges and a netadmin user who can perform all operations. Note that this controls access when users use
ssh to access the devices. Different users under different groups can be separately configured in vManage to
control access to the vMangage GUI (under Administration>Manage Users).
Assuming that you are still on the feature templates page, select the Add Template button. Create the AAA
template using the following device types, template type, template name, and description:
Under the Authentication Order parameter, deselect radius and tacacs from the drop-down box (so only the
local method is left). Click outside the box to close the drop-down menu.
Under the Local authentication section, click the New User button.
Next to Name enter oper1. Next to Password, enter a password. Next to User Groups, select operator from the
drop-down text box.
Click Add.
Click the New User botton to add the second new user.
Next to Name enter oper1. Next to Password, enter a password. Next to User Groups, select operator from the
drop-down text box.
Next to Name, enter netadmin1. Next to Password, enter a password. Next to User Groups, select netadmin
from the drop-down text box.
Click Add.
88 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
89 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
v. Banner
There are two types of banners: one that is displayed before the CLI username/login prompt (login banner) and
one that is displayed after successfully logging in (message of the day, or MOTD, banner). Configure an MOTD
banner.
Select Configuration>Templates, and select the Feature tab. Select the Add Template button.
Create the banner template using the following device types, template type, template name, and description:
90 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Template name:
91 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Save Template
92 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Save
93 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
viii. Interface Template for Las Vegas, New Jersey & Francisco vEdge7, 8& 9
94 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
DC-INET-Interface
Branch-INT-Interface
95 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
96 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
In this topology, there is one data center and five remote sites. The transports shown are one MPLS and one
Internet service provider. The SD-WAN controllers are deployed using AWS cloud-managed service and reachable
via the Internet & MPLS transport. There is one vManage, one vSmart controller, and one vBond orchestrator on
the U.S. West Coast,
Each WAN Edge router attempts to make a connection to the controllers over each transport. The vEdge router will
initially connect to a vBond and will then connect to the vSmart controllers over each transport. vManage connection
is made from the site, and it will depend on which transport first connected to it, but this preference is configurable.
The WAN Edge routers connect directly to the controllers over the Internet transport &MPLS. The WAN Edge routers
connect to the controllers over the MPLS transport by being routed over the IPSec tunnels to the data center and
following the default route to the Internet & MPLS transport.
97 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
i. Transport side
The transport VPN (VPN 0) contains interface ge0/0 for the MPLS transport and ge0/1 for the Internet
transport on each vEdge router.
will use a static default route in VPN 0 to route the tunnel endpoint out to the Internet transport.
The vEdge will use a static default route in VPN 0 to route the tunnel endpoint out to the MPLS transport.
The service VPN (VPN 1) contains interfaces ge0/2 and ge0/3 for the connections to the aggregation
switches. Interface ge0/2 of each vEdge connects to data center WAN aggregation switch 1 (labeled SW3) in
the network, while interface ge0/3 connects to data center aggregation switch 2 (labeled SW4). Each vEdge
peers to each switch via OSPF area 0 using the interface addresses, in OMP OSPF route would be
redistribute to get advertise to all locations.
iii. IP details
vEdges IP's details
Hostname ge0/0 MPLS ge0/1 Internet g0/2 SW3 g0/3 SW4
vEdge1 192.168.1.2/30 64.100.101.2/28 10.1.1.1/30 10.2.2.1/30
vEdge2 192.168.2.2/30 64.100.102.2/28 10..1.1.5/30 10.2.2.5/30
In the vManage GUI, Select Configuration > Templates, and choose the Feature tab.
Under the Select Devices column, choose vEdge cloud. Select the VPN template block under the VPN
section on the right.
98 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Next to Name, select Global from the drop-down menu, and type Transport VPN, a description for the VPN.
Next to Enhance ECMP Keying, select Global from the drop-down menu, and select On. Enabling this
feature configures the ECMP hashing to use the layer 4 source and destination ports in addition to the
source and destination IP address, protocol, and Differentiated Services Code Point (DSCP) field as the
ECMP hash key. ECMP is used when there are equal-cost routing paths in the VPN and traffic uses a hash on
key fields in the IP header to determine which path to take.
Under DNS and next to Primary DNS Address, select Global from the drop-down menu and enter 1.1.1.1. The
Secondary DNS Address box appears. Select Global from the drop-down menu and enter 8.8.8.8 in the
Secondary DNS Address text box.
99 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Under the IPv4 Route template section, default routes are added for each interface. These routes are used so the
tunnel endpoints can peer with neighboring sites. Multiple default routes can exist because the WAN Edge uses
the physical tunnel endpoint source as well as the destination when making a routing decision.
Under the IPv4 Route section, click the New IPv4 Route button. Add 0.0.0.0/0 in the Prefix box and select Add
Next Hop.
A pop-up window appears that prompts you to add your first next hop. Select the Add Next Hop button.
Since this template applies to more than one WAN Edge, the next hop parameters are variables instead of global
values. On the pop-up window, under Address, select Device Specific from the drop-down menu, and type in the
next-hop IP address variable for the MPLS transport in the text box (vpn0_mpls_next_hop_ip_addr). Click the
Add Next Hop button to add the second next hop.
Under Address on the second next-hop entry, select Device Specific from the drop-down menu, and type in the
next-hop IP address variable for the Internet transport in the text box (vpn0_inet_next_hop_ip_addr).
100 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
101 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Under the Select Devices column, choose vEdge cloud. Select the VPN interface Ethernet template block under
the VPN section on the right.
Under the Basic Configuration section next to Interface Name ge0/0 & global no shutdown
Under Basic Configuration next to Description, select Global and type in MPLS Interface to describe the interface.
Under Basic Configuration under IPv4 Configuration next to IPv4 Address, select Device Specific and type in the
variable name vpn0_mpls_int_ip_addr|maskbits.
102 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Under Tunnel and next to Tunnel Interface, select Global and select On. When you select On, additional
parameters for the tunnel are shown. Next to Color, select Global and select mpls from the drop-down text box.
Next to Restrict, select Global and select On. Restrict means that only tunnels will be formed with other
endpoints of the same color.
By default when the tunnel is enabled, the physical interface accepts DTLS/TLS and IPSec traffic in the case
of WAN Edge. In addition, other services can be enabled and accepted into the physical interface
unencrypted - this includes DNS, DHCP, HTTPS, and Internet Control Message Protocol (ICMP) by default.
Other protocols include SSH, NETCONF, NTP, BGP, OSPF, and STUN. It is a best security practice to minimize
the allowed protocols through. In the example network, for initial troubleshooting purposes, ICMP stays
enabled and DHCP is turned off for the MPLS interface since the IP address on the interface is static. NTP
and DNS are allowed through since the MPLS transport can route through the data center to reach the
Internet.
Under Tunnel and the Allow Service section, next to DHCP, select Global and select Off. Next to NTP, select
Global and select On.
103 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Below the Allow Service section, select the Advanced Options text. The Encapsulation section is revealed.
Next to Preference, select Device Specific and configure the variable as
vpn0_mpls_tunnel_ipsec_preference. The IPSec tunnel preference allows you to prefer one tunnel over
another depending on the preference value.
104 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Assuming that you are still on the Feature Templates page, find the feature template just created (DC-MPLS-
Interface) and select to the far right. Select Copy.
On the pop-up window, define the template name and description as:
Template Name: DC-INET-Interface
Description: DC Internet Interface
29. Select the Copy button. The feature template is created and is now in the list with the other created
feature templates.
105 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
106 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Once configuration changes have been made, select the Update button to save the changes to the feature
template
107 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Create the VPN 1 template using the following device types, template, template name, and description:
108 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
With the Advertise OMP configuration, OSPF routes are being redistributed into OMP so the remote sites will
have reachability to the data center service-side routes.
Assuming that you are still on the Feature Templates page, select the Add Template button.
Create the first VPN 1 interface template using the following device types, template type, template name, and
description:
Select Devices: vedges cloud
109 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
In the pop-up window, define the Template Name and Description as:
Select the Copy button. The feature template is created and is now in the list with the other created feature
templates.
Choose to the right of the newly-created feature template (DC-LAN-INT2) and select Edit to modify the template.
110 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Once configuration changes have been made, select the Update button to save the changes in the feature template
A loopback0 interface is created with the system IP address so that logging, SNMP, and other management traffic
could be sourced from the system IP address, making correlation with vManage easier. This template can be shared
across all device types.
Assuming that you are still on the Feature Templates page, select the Add Template button.
Create the loopback0 interface template using the following device types, template type, template name, and
description:
111 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
112 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Configure OSPF in the Service VPN. In the configuration, OMP is redistributed into OSPF so the data center can
have reachability to the remote sites.
Assuming that you are still on the Feature Templates page, select the Add Template button.
Create the BGP template using the following device types, template type, template name, and description.
113 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
114 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Save it
115 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Create Template and select From Feature Template from the drop-down box.
Under Basic Information next to System, select the feature template, vEdge-System, from the drop-down box.
Next to Logging, select the feature template, Logging, from the drop-down box.
For NTP, this feature first needs to be added to the device template. Under Additional System Templates, click
NTP, and select the feature template from the drop down, NTP
Next to AAA, select the feature template, AAA, from the drop-down box.
116 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Under the Transport & Management VPN section, select VPN Interface on the right side under Additional VPN 0
Templates. This will add a second VPN interface under the Transport VPN. Select the newly-created feature
templates under the VPN 0 drop-down box and under each VPN Interface drop-down box under VPN 0.
117 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
For VPN 512, select the newly-created feature template under the VPN 512 drop-down box and under the VPN
Interface drop-down box under VPN 512.
118 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Under the Service VPN section, hover over the + Service VPN text. A window will appear with a text box for the
number of service VPNs you want to create.
Select 1 and press return. A VPN drop-down box will be added. In the Additional VPN Templates on the right side,
select VPN Interface three times (for the two LAN interfaces and Loopback0 definition) and select the OSPF template
as well.
119 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
To deploy the device template created to the WAN Edge routers, the vManage builds the full
configurations based on the feature templates and then pushes them out to the designated WAN Edge
routers. Before the full configurations can be built and pushed out, you need to first define all variables
associated with the feature templates attached to the device template. There are two ways to do this:
either by entering in the values of the variables manually within the GUI, or by uploading a .csv file with
a list of the variables and their
Go to Configuration > Templates and select the Device tab. Find the desired device template (DC-
vEdges). Select the to the right of the template, and select Attach Devices.
A window pops up listing the available devices to be attached to this configuration. The list of available
devices contains either the hostname and IP address of a device if it is known through vManage, or it
will contain the chassis serial number of the devices that have not yet come up on the network and are
unknown by vManage. In any case, the list contains only the device model that was defined when the
template was created (vEdge cloud in this case).
Select the devices you want to apply the configuration template to, and select the arrow to move the
device from the Available Devices box to the Selected Devices box. You can select multiple devices at
one time by simply clicking each desired device. Select Attach.
120 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
121 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Click next
122 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Click ok
Run successfully.
123 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
i. On vEdge1
124 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Routing table
Control connection
125 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ii. On vEdge2
Routing table & control connection
126 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
i. Transport side
San jose contains two vEdges routers, with each router having a direct connection to one of the
transport providers. This site has TLOC-extension links between the routers to give each router access
to both transports. WAN Edge 1 (labelled vedge3) runs static default in the transport VPN to
communicate the TLOC extension link subnet to the MPLS cloud, so WAN Edge 2 (labeled vedge2) will
have reachability to the controllers through the data center and to other WAN Edge routers on the
MPLS transport to form IPSec tunnels. On both routers, static default routes pointing to the next-hop
gateways are configured for tunnel establishment on the MPLS (GigabitEthernet0/0) and Internet
(GigabitEthernet0/0) links on both WAN Edge routers. The TLOC-extension interface does not need
any special routing configured since it routes tunnel and control traffic to the next hop, which is
directly connected.
127 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
One VPN 0 template will be used for all the branch WAN Edge devices. For MPLS & Internet for
both.
Go to Configuration > Templates and select the Feature tab. Select the Add Template button and use the
following parameters to configure the VPN 0 feature template:
Select Devices: vEdges cloud
Template: VPN/VPN
Template Name: Branch VPN0
Description: Branch Transport VPN0
128 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
DNS
129 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IPv4 route
130 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
131 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IPv4 config
Tunnel config
132 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
IPSec preference
133 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
134 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
135 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
136 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
137 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
i. Branch-VPN1
One aggregate prefix for the remote site is advertised into OMP instead of multiple site routes. Note that
even though you can mark this prefix as an optional configuration, once you turn aggregation on, you need
at least one aggregate prefix defined. Redistribute connected is turned on to advertise the loopback
interface for reachability to and from the data center for management.
A static route is configured and marked optional so that it can be used on branch to reach the LAN segments behind
a layer 3 switch. Instead of redistributing static routes into OMP, the site is advertising the aggregate prefix instead.
1. Add a new feature template using the following parameters:
138 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
139 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ii. Branch-LAN-INT1-VRRP
140 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
iii. Branch-LAN-INT2-VRRP
141 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
142 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Create Template and select From Feature Template from the drop-down box.
143 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
145 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
146 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Device variable
147 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
148 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
149 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
150 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ii. On vEdge4
151 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
152 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
153 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
154 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
i. Transport side
In this Branch we’ve two vEdge routers are depicted, each with a direct connection to one of the transport
providers. This site has a TLOC-extension link between the vEdge routers to give each vEdge router access to
both transports. The TLOC-extension link utilizes sub-interfaces. vEdge 1 runs in the transport VPN to
communicate the TLOC extension link subnet to the MPLS cloud, so vEdge2 will have reachability to the
controllers through the data center and to other vEdge routers on the MPLS transport to form IPSec tunnels.
On both vEdge routers, static default routes pointing to the next-hop gateways are configured for tunnel
establishment on the MPLS (ge0/0) and Internet (ge0/1) links. The TLOC-extension sub-interface does not
need any special routing configured since it routes tunnel and control traffic to the next hop, which is directly
connected. The physical links, ge0/1 on vEdge 3 and ge0/20on vEdge 4, as well as the sub-interfaces, are
configured in VPN 0.
This Branch has two vEdge routers connected to a layer 3 switch and running Open Shortest
Path First (OSPF) between them. All devices are in area 0. The vEdge router interfaces are
configured for OSPF network point to point on each interface to the layer 3 switch.
155 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
iii. IP details
156 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
157 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
158 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Save it
159 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
160 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
161 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
162 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
163 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
164 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
165 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
E) Verification
I. on vEdges Routing table & control connection
166 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
167 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
168 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
A) Branch details
I. Transport side
Branch 3 contains one vEdge router which connects to both the MPLS and Internet transports. A static default
route pointing to the next-hop gateway is configured for tunnel establishment on the Internet (ge0/1) and MPLS
(ge0/0) transports.
III. IP details
169 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
170 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Next save
C) Verification on vEdge 7
Routing table & control connection.
171 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
I. Transport side
Branch has one vEdge router, which connects to both the MPLS and Internet transports. on the MPLS transport
(ge0/0) & internet ge0/0,LAN side ge0/2
III. IP details
vEdges IP's details
Hostname ge0/0 Internet ge0/1 MPLS ge0/2 LAN
vEdge9 64.100.107.2/30 192.168.6.2/30 172.20.1.1/24
172 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
173 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Save it
174 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
175 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
176 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
D) Verification vEdge8
177 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
I. Transport side
Francisco has a single vEdge directly connected to the Internet transport and is also connected to a CE router,
which has a connection to the MPLS transport. A static default route pointing to the next-hop gateway is
configured for tunnel establishment on the Internet (ge0/1) and MPLS (ge0/1) transports. Configured on the CE
router advertises the vEdge MPLS subnet so the vEdge router can have reachability to the other vEdge routers
on the MPLS transport and connectivity to the controllers through the data centre.
III. IP details
178 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
179 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
180 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
181 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
D) Verification on vEdge 9
Routing table & control connection
182 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Before we start implementing Hub & spoke: Let’s check how vEdge7 node is reaching vEdge8 network over
VPN 1.
183 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
184 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
185 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
186 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
B) Create Topology
Click on the Add Topology. For simple Hub-and-Spoke topology, you can select
preconfigured Hub-and-Spoke template.
Define desired topology name and description (example Hub-and-Spoke-VPN1-Topology). Specify VPN
list to which policy will be applied. Select Co VPN list.
Associate Hub site list and Spoke site list you have created in previous steps. Then click Save Hub-and-
Spoke Policy. Click Next.
187 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
188 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
C) Create Policy
On this page, the centralized policy is named. Type in the Policy Name (Hub-Spoke-Policy) and Policy
Description (Global Policy), and select Save Policy.
189 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
vpn-list Service-VPN1
vpn 1
!
!
!
apply-policy
site-list Sites23456
control-policy control_-1978396596 out
!
!
D) Policy Activation
Click on the policy options on the right side (…) and select Activate. Confirm activation on
listed vSmart.
190 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
191 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
If we will check the vEdge7 routing table, we will notice that route to the Edge3 to 6 to &7 are
VPN1 is gone. This can be sort when we provide default route to the braches from hub location
Verification on vManage
192 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
You can modified existing feature template DC-LAN-OSPF to push default routes to all vEdges
Update
Apply changes for Site100. Default route should appear in the remote sites routing tables.
193 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
A) Create Lists
Press Custom Options > Centralized Policy >Lists.
194 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Define new Data Prefix Lists named InternalNetworks, which will include
172.16.0.0/16,172.17.0.0/16,172.20.0.0/16 prefix.
195 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Add Sequence Rule. In first rule Destination Data Prefix match all traffic destined to corporate
172.16.0.0/16,172.17.0.0/16 & 172.20.0.0/16 & 10.0.0.0/8 prefix. Set Accept action for it. This rule will
match all corporate traffic and allow it to be forwarded according to other policies or default best path
selection. Click Save Match and Actions.
196 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Add another Sequence Rule, which will match remaining traffic and forward it towards the internet. For
Match statement, do not select any criteria. This will act as the any statement. For Action select Accept
and NAT VPN, which will forward matched traffic via NAT interface in VPN0. Click Save Match and
Actions.
197 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Navigate to Policy Applications, Select Traffic Data tab and associate defined policy with Site100, Site200 and
Site500. For direction select from All for Site3 and from service for Site100,200. For VPN List select Guest list
VPN1 for all sites. Click Add. Select Preview to analyze the CLI configuration of created policy.
198 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Save Policy Changes. Click on options button and activate policy.
D) Verification
Open Lab Window host @New Jersey 172.20.1.254, Host1 and verify reachability of 1.1.1.1 from VPN1.or
Able to open google.com
Must config static IP/GW/DNS
199 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Open Web server 172.16.20.254 @RTP DC (VPN 1) and verify Internet using Browser.
vim /etc/resolv.conf
press insert
nameserver 1.1.1.1
nameserver 8.8.8.8
esc>:wq
200 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
201 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Navigate to vManage and select Monitor > Network and choose vEdge8
Select Troubleshooting > Simulate Flows. You will verify the paths between vEdge8 VPN 1 and prefix
172.16.10.254 advertised from Site 100. Select VPN 10, ge0/2.10 as source interface and enter 172.16.10.254
as destination address. Click Simulate.
You will notice outgoing traffic flowing from vEdge8 towards Site 100 utilizes both WAN links by default.
MPLS and biz-internet
Define new Data Prefix Lists named FTP-Server, which will include 172.16.10.254/32 prefix.
202 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Press Sequence Rule, select Destination Data Prefix and choose RTP- FTP-254 data Prefix list
203 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Actions tab, select Local TLOC and choose TLOC Color: mpls.
C) Global Policy
Navigate Tab Traffic Rules/Traffic Data/ Add Policy/ Import Existing
205 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
E) Verification
Simulate traffic flow again, you will notice that only mpls WAN link is utilized
Simulate traffic again, you will see that vEdge8 has chosen WAN link biz-internet.
Right click on topology vEdge8 link Ge0/0, choose option Resume Link
206 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Press Application > + New Application List Name: YouTube, Application: Choose from list
YouTube. Press Add.
Navigate to Policer, Press + New Policer List. Name: YouTube-policer, Burst: 15000, Exceed:
Drop, Rate: 10000. Press Add.
207 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
208 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Select Actions tab and Policer tab. Set Policer list: Youtube-policer and on Counter add the name
for Counter Name: YouTube
209 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
210 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
C) Activate Policy.
Navigate Configuration > Policies, Select Local-Internet-Policy, (…) Activate.
i.
D) Verification
Open Host1 Web server host web browser and run YouTube site. Play some video.
You need to suspend the vEdge1 Link MPLS & Internet to result on vEdge2.
Login in the vEdge2 node cli and issue command show policy data-policy-filter.
After some time, you will notice policy capture.
211 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
212 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Create the application-aware routing policy, which consists of matching traffic that gets placed into a specific
SLA class.
Once a centralized policy is created, it is not possible to build lists by editing the policy - you can only create
policy definitions and apply them through the centralized policy configuration. You need to select Custom
Options on the main policy page in order to modify or create lists.
In the vManage GUI, go to Configurations>Policies. Select Custom Options in the top right corner of the
page and select Lists.
Select SLA Class on the left side, and select New SLA Class List. Type in the SLA Class List Name, the
Loss (%), the Latency (ms), and jitter (ms). Select Add and repeat for all of the SLA classes. Use the following
settings:
213 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Task: apply AAR policy for Voice application using DSCP 46 at Site500, VPN1 Employee hosts.
Voice application with DSCP 46 must prefer MPLS path, fallback link is Biz-internet
Select Real Time and under Device Options type in or select App Routes Statistics. Filter the output to
Remote System IP 10.200.1.1. This will display path measurements only between vEdge1 and vEdge8.
Notice the current Mean Loss, Latency and Jitter values. In a policy you will configure in the next few steps,
you will define how to react based on these measurements.
Navigate to SLA Class and define new list. Define a name Business-Critical-voip-AAR and specify Loss
20%, Latency 1000ms and Jitter 500. Click Add
214 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Note: Configured values are lower than the actual real life voice requirements, to make sure failover
action will be triggered in the lab environment.
Under Application Aware Routing choose Add Policy > Create New. Define a name and description
(example: VOIP-AAR-Policy). Select Sequence Type and add Sequence Rule. You can match traffic for
AAR policy in several different options. In this lab exercise, you will match voip traffic based on a DSCP
value 46.
215 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Click Save Match And Actions. Verify Default Action. Since this is AAR policy, it does not drop the packets.
Click Save Application Aware Routing Policy
216 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Navigate back to Policy Application > Application-Aware Routing. Add + New Site List and VPN List.
Site List: Site 500. VPN List: Employee VPN1. Press Add.
217 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
D) Activation
Activate Policy. Navigate Configuration >Policies, Select AAR-POLICY, (…) Activate.
218 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
219 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
F) Verification
Navigate to Monitor/Network/vEdge8/Troubleshooting Simulated Flows for vEdge1 and verify the path
for packets sourced from VPN1, headed towards 172.16.10.254 with DSCP marking 46. The path is taken
via MPLS
You will now worsen the performance of the MPLS link connecting vEdge8. Right click on ge0/1 link
connected to vEdge8 and click on Edit Quality.
Specify Delay to 1000, Click Apply settings at the bottom of the page
Navigate to Monitor > Events. As poll and multiplier timers are configured very aggressively, you will now
see multiple App-Route events because of SLA violation.
220 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
Navigate again to Monitor/Network/vEdge21/Troubleshooting Simulated Flows for vEdge8 and verify the
path for packets sourced from VPN11, headed towards 172.16.10.254 with DSCP marking 46. The path is
taken via biz-internet
221 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
The Viptela cflowd software implements cflowd version 10, as specified in RFC 7011 and RFC 7012. Cflowd version 10
is also called the IP Flow Information Export (IPFIX) protocol.
Cflowd performs 1:1 sampling. Information about all flows is aggregated in the cflowd records; flows are not sampled.
vEdge routers do not cache any of the records that are exported to a collector.
Components of Cflowd
In the Viptela overlay network, you configure cflowd using centralized data policy. As part of the policy, you specify
the location of the collector. By default, flow information is sent to the collector every 60 seconds. You can modify this
and other timers related to how often cflowd templates are refreshed and how often a traffic flow times out.
You can configure a maximum of four cflowd policies. The Viptela software can export template records to a
maximum of four cflowd collectors. When you configure a new data policy that changes which flows are sampled, the
software allows the old flows to expire gracefully rather than deleting them all at once.
The vEdge router exports template records and data records to a collector. The template record is used by the
collector to parse the data record information that is exported to it. Option templates are not supported. The source
IP address for the packet containing the IPFIX records is randomly selected from any of the interfaces in the VPN. The
flow records are exported via TCP or UDP connections. Anonymization of records and TLS encryption are not
performed, because it is assumed that the collector and the IPFIX analyzer are both located within the data center,
traffic traveling within the data center is assumed to be safe.
222 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
223 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
224 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
225 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
C) Policy activation
D Verification
Show below output on vEdge1 or 2
show policy from-vsmart cflowd-template
show app cflowd flow-count
show app cflowd flows
226 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
1) vSmart.
vsmart# sh run
system
host-name vsmart
system-ip 10.200.1.11
site-id 700
admin-tech-on-failure
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$siwKBQ==$wT2lUa9BSreDPI6gB8sl4E6PAJoVXgMbgv/whJ8F1C6sWdRazdxorYYTLrL6syiG6qnLABTnrE96HJiKF6QRq1
!
!
logging
disk
enable
!
!
!
omp
no shutdown
graceful-restart
!
vpn 0
interface eth0
description Trasnport
ip address 10.10.0.4/24
tunnel-interface
227 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
color mpls
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service netconf
no allow-service ntp
no allow-service stun
!
no shutdown
!
ip route 0.0.0.0/0 10.10.0.1
!
vpn 512
!
policy
data-policy _Service-VPN1_Local-I_1804088537
vpn-list Service-VPN1
sequence 1
match
source-ip 0.0.0.0/0
app-list youtube
!
action accept
count youtube_-2013586706
set
policer Youtube-Policer
!
!
!
sequence 11
match
destination-data-prefix-list Internet-ACL
!
action accept
!
!
sequence 21
match
source-ip 0.0.0.0/0
!
action accept
nat use-vpn 0
!
!
default-action drop
policer Youtube-Policer
rate 10000
burst 15000
exceed drop
!
cflowd-template Cflowd-Policy
flow-active-timeout 30
flow-inactive-timeout 10
228 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
template-refresh 60
flow-sampling-interval 10
collector vpn 1 address 172.16.20.254 port 13322 transport transport_udp source-interface loopback0
!
lists
vpn-list Service-VPN1
vpn 1
!
data-prefix-list Internet-ACL
ip-prefix 10.0.0.0/8
ip-prefix 172.16.0.0/16
ip-prefix 172.17.0.0/16
ip-prefix 172.20.0.0/16
!
app-list youtube
app youtube
app youtube_hd
!
site-list Franscisco-600
site-id 600
!
site-list Las-Vegas-400
site-id 400
!
site-list New-Jursey-500
site-id 500
!
site-list RTP-HUB-100
site-id 100
apply-policy
site-list Franscisco-600
data-policy _Service-VPN1_Local-I_1804088537 from-service
!
site-list Las-Vegas-400
data-policy _Service-VPN1_Local-I_1804088537 from-service
cflowd-template Cflowd-Policy
!
site-list New-Jursey-500
data-policy _Service-VPN1_Local-I_1804088537 from-service
cflowd-template Cflowd-Policy
!
site-list RTP-HUB-100
data-policy _Service-VPN1_Local-I_1804088537 from-service
cflowd-template Cflowd-Policy
229 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
2) vEdege1
vedge1# sh run
system
host-name vedge1
system-ip 10.200.1.1
site-id 100
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ
5TvQOXEc/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9
A0Dz01Mfw.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
230 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ntp
server 192.168.10.1
version 4
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 192.168.1.2/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
interface ge0/1
description "Internet Interface"
ip address 64.100.101.2/28
nat
!
tunnel-interface
encapsulation ipsec preference 0
231 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 64.100.101.1
ip route 0.0.0.0/0 192.168.1.1
!
vpn 1
name "Service VPN 1"
router
ospf
auto-cost reference-bandwidth 100000
default-information originate always
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/2
network point-to-point
exit
interface ge0/3
network point-to-point
exit
exit
!
interface ge0/2
description LAN-INT1
ip address 10.1.1.1/30
no shutdown
!
interface ge0/3
description LAN-INT2
ip address 10.2.2.1/30
no shutdown
!
interface loopback0
ip address 10.200.1.1/32
no shutdown
!
omp
advertise ospf external
232 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
!
vpn 512
interface eth0
description Management
no shutdown
3) vEdge2
vedge2# sh run
system
host-name vedge2
system-ip 10.200.1.2
site-id 100
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
233 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
ntp
server 192.168.10.1
version 4
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 192.168.2.2/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "Internet Interface"
ip address 64.100.102.2/28
nat
!
234 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 64.100.102.1
ip route 0.0.0.0/0 192.168.2.1
!
vpn 1
name "Service VPN 1"
router
ospf
auto-cost reference-bandwidth 100000
default-information originate always
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/2
network point-to-point
exit
interface ge0/3
network point-to-point
exit
exit
!
!
interface ge0/2
description LAN-INT1
ip address 10.1.1.5/30
no shutdown
!
interface ge0/3
description LAN-INT2
ip address 10.2.2.5/30
no shutdown
!
interface loopback0
ip address 10.200.1.2/32
no shutdown
!
omp
advertise ospf external
!
!
235 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 512
interface eth0
description Management
no shutdown
!
4) vEdge3
vedge3# sh run
system
host-name vedge3
system-ip 10.200.1.3
site-id 200
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
236 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
source-interface loopback0
exit
!
ntp
server 192.168.10.1
version 4
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 192.168.3.2/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "internet Interface"
ip address 10.1.1.9/30
nat
!
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
237 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/2
description "LAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/3
description "TLOC Extension Interface"
ip address 10.2.2.9/30
tloc-extension ge0/0
no shutdown
!
ip route 0.0.0.0/0 10.1.1.10
ip route 0.0.0.0/0 192.168.3.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
interface ge0/2.100
description LAN-Interface1
ip address 172.17.1.2/24
no shutdown
vrrp 100
priority 200
ipv4 172.17.1.1
!
!
interface ge0/2.200
description LAN-Interface2
ip address 172.17.2.2/24
no shutdown
vrrp 200
priority 200
ipv4 172.17.2.1
!
!
interface loopback0
ip address 10.200.1.3/32
no shutdown
!
omp
advertise ospf external
advertise connected
238 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
advertise static
!
!
vpn 512
interface eth0
description Management
no shutdown
!
5) vEdge 4
vedge4# sh run
system
host-name vedge4
system-ip 10.200.1.4
site-id 200
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
239 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
vpn 1
source-interface loopback0
exit
!
ntp
server 192.168.10.1
version 4
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 10.2.2.10/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "internet Interface"
ip address 64.100.103.2/28
nat
!
tunnel-interface
encapsulation ipsec preference 0
240 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/2
description "LAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/3
description "TLOC Extension Interface"
ip address 10.1.1.10/30
tloc-extension ge0/1
no shutdown
!
ip route 0.0.0.0/0 10.2.2.9
ip route 0.0.0.0/0 64.100.103.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
interface ge0/2.100
description LAN-Interface1
ip address 172.17.1.3/24
no shutdown
vrrp 100
ipv4 172.17.1.1
!
!
interface ge0/2.200
description LAN-Interface2
ip address 172.17.2.3/24
no shutdown
vrrp 200
ipv4 172.17.2.1
!
!
interface loopback0
ip address 10.200.1.4/32
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
241 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
!
vpn 512
interface eth0
description Management
no shutdown
!
!
vedge4#
6) vEdge 5
vedge5# sh run
system
host-name vedge5
system-ip 10.200.1.5
site-id 300
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
242 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
disk
enable
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 192.168.4.2/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "LAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/1.10
description "internet Interface"
ip address 10.1.1.17/30
243 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
nat
!
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1.20
description "TLOC Extension Interface"
ip address 10.2.2.13/30
tloc-extension ge0/0
no shutdown
!
ip route 0.0.0.0/0 10.1.1.18
ip route 0.0.0.0/0 192.168.4.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
router
ospf
auto-cost reference-bandwidth 100000
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/2
network point-to-point
exit
exit
!
!
interface ge0/2
description "OSPF Interface"
ip address 10.1.1.29/30
no shutdown
!
interface loopback0
ip address 10.200.1.5/32
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
244 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
!
vpn 512
interface eth0
description Management
no shutdown
7) vEdge 6
vedge6# sh run
system
host-name vedge6
system-ip 10.200.1.6
site-id 300
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
245 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
source-interface loopback0
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "LAN Parent Interface"
mtu 1504
no shutdown
!
interface ge0/0.10
description "TLOC Extension Interface"
ip address 10.1.1.18/30
tloc-extension ge0/1
no shutdown
!
interface ge0/0.20
description "MPLS Interface"
ip address 10.2.2.14/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "internet Interface"
246 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ip address 64.100.104.2/28
nat
!
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 10.2.2.13
ip route 0.0.0.0/0 64.100.104.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
router
ospf
auto-cost reference-bandwidth 100000
timers spf 200 1000 10000
redistribute omp
area 0
interface ge0/2
network point-to-point
exit
exit
!
!
interface ge0/2
description "OSPF Interface"
ip address 10.1.1.33/30
no shutdown
!
interface loopback0
ip address 10.200.1.6/32
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 512
interface eth0
description Management
247 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
no shutdown
8) vEdge 7
vedge7# sh run
system
host-name vedge7
system-ip 10.200.1.7
site-id 400
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
!
omp
248 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 192.168.5.2/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
interface ge0/1
description "internet Interface"
ip address 64.100.105.2/28
nat
!
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
249 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
no shutdown
!
interface ge0/2
description "LAN Parent Interface"
mtu 1504
no shutdown
!
ip route 0.0.0.0/0 64.100.105.1
ip route 0.0.0.0/0 192.168.5.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
interface ge0/2.10
description "VLAN 100"
ip address 172.19.1.1/24
no shutdown
!
interface ge0/2.20
description "VLAN 200"
ip address 172.19.2.1/24
no shutdown
!
interface loopback0
ip address 10.200.1.7/32
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 512
interface eth0
description Management
no shutdown
9) vEdge 8
vedge8# sh run
system
host-name vedge8
system-ip 10.200.1.8
site-id 500
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
250 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
ntp
server 192.168.10.1
version 4
exit
!
!
bfd app-route poll-interval 5000
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
251 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
ip address 172.20.1.1/24
no shutdown
!
interface loopback0
ip address 10.200.1.8/32
no shutdown
!
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 512
interface eth0
description Management
no shutdown
10 vEdge 9
!
vedge9# sh run
system
host-name vedge9
system-ip 10.200.1.9
site-id 600
admin-tech-on-failure
no route-consistency-check
sp-organization-name "viptela sdwan"
organization-name "viptela sdwan"
clock timezone America/Los_Angeles
console-baud-rate 9600
vbond 10.10.0.3
aaa
auth-order local radius tacacs
usergroup basic
task system read write
task interface read write
!
usergroup netadmin
!
usergroup operator
task system read
task interface read
task policy read
task routing read
task security read
!
user admin
password
$6$b0Jypw==$AvlWgs2a6J4XlTK.5ry1.idmALj.kgkPsoyApbK3.6NeUl/SC5QLSbQBGo16B4D//cldYmDpyQ5TvQOXEc
/zE0
!
user netadmin1
password
253 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
$6$b5PCHw==$fVhuSaCIemWW90pzMchDYdJ1UcuFC.hfFlwPxD8Wod7IJ8L1PM1viAN5jg06culKyIsptP9A0Dz01Mf
w.wWSL.
group netadmin
!
!
logging
disk
enable
!
server 172.16.10.253
vpn 1
source-interface loopback0
exit
!
ntp
server 192.168.10.1
version 4
exit
!
!
omp
no shutdown
graceful-restart
advertise connected
advertise static
!
security
ipsec
authentication-type sha1-hmac ah-sha1-hmac
!
!
banner
login "MOTD Banner"
motd "This is a private network. It is for authorized use only."
!
vpn 0
name "Transport VPN"
dns 1.1.1.1 primary
dns 8.8.8.8 secondary
interface ge0/0
description "MPLS Interface"
ip address 10.1.1.14/30
tunnel-interface
encapsulation ipsec preference 0
color mpls restrict
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
254 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
!
no shutdown
!
interface ge0/1
description "internet Interface"
ip address 64.100.107.2/28
nat
!
tunnel-interface
encapsulation ipsec preference 0
color biz-internet
no allow-service bgp
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
no allow-service netconf
allow-service ntp
no allow-service ospf
no allow-service stun
allow-service https
!
no shutdown
!
ip route 0.0.0.0/0 10.1.1.13
ip route 0.0.0.0/0 64.100.107.1
!
vpn 1
name "Service VPN"
ecmp-hash-key layer4
interface ge0/2
description "LAN interface"
ip address 10.2.2.17/30
no shutdown
!
interface loopback0
ip address 10.200.1.9/32
no shutdown
!
ip route 172.21.1.0/24 10.2.2.18
omp
advertise ospf external
advertise connected
advertise static
!
!
vpn 512
interface eth0
description Management
no shutdown
255 | P a g e
CCIE Enterprise Infrastructure: SD-WAN Practice Lab v1.0
256 | P a g e