KB Implementing SD-WAN Workbook
KB Implementing SD-WAN Workbook
KB Implementing SD-WAN Workbook
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353 Preparing the Network for SD-WAN
CCDE # 20110020
Netmetric Solutions
(c) KBITS Live | https://kbits.live
Http://www.Netmetric-Solutions.com 1 of 150
Lab 1 – Configuring the WAN
Components
Interface Configuration
HQ
MPLS Cloud
HQ Router
Hostname HQ
!
Interface E 0/0
ip address 199.1.1.14 255.255.255.240
no shut
!
Interface E 0/1
ip address 199.1.1.30 255.255.255.240
no shut
!
Interface E 0/2
ip address 192.168.101.1 255.255.255.0
no shut
!
Interface E 0/3
ip address 192.1.101.1 255.255.255.0
no shut
!
router ospf 1
network 192.168.101.0 0.0.0.255 area 0
network 199.1.1.0 0.0.0.255 area 0
passive-interface default
no passive-interface E0/2
!
Router bgp 65001
Neighbor 192.1.1.17 remote-as 65001
Redistribute ospf 1
!
ip route 0.0.0.0 0.0.0.0 192.1.101.254
no ip domain-lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname MPLS
!
interface Ethernet0/0
ip address 192.168.101.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.168.102.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.168.103.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.168.104.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.168.105.254 255.255.255.0
no shut
!
router ospf 1
network 192.168.101.0 0.0.0.255 area 0
network 192.168.102.0 0.0.0.255 area 0
network 192.168.103.0 0.0.0.255 area 0
network 192.168.104.0 0.0.0.255 area 0
network 192.168.105.0 0.0.0.255 area 0
no ip domain lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname Internet
!
interface Ethernet0/0
ip address 192.1.101.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.1.102.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.1.103.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.1.104.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.1.105.254 255.255.255.0
no shut
!
ip route 199.1.1.0 255.255.255.0 192.1.101.1
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
IP Address: 199.1.1.5
Subnet Mask: 255.255.255.240
Default Gateway: 199.1.1.14
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353
CCDE # 20110020 Initializing the Controllers
▪ Host-name : vManage1
▪ Organization: KBITS
▪ System-IP: 10.1.1.101
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vManage
config
!
system
host-name vManage1
system-ip 10.1.1.101
site-id 1
organization-name KBITS
▪ vpn 0
- Interface eth1
- IP Address: 199.1.1.1/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.1/24
vManage
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.1/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.1/24
no shut
!
commit
➢ Browse to http://192.168.1.5/certsrv
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vBond1
▪ Organization: KBITS
▪ System-IP: 10.1.1.103
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vBond
config
!
system
host-name vBond1
system-ip 10.1.1.103
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3 local
!
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.3/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Encapsulation: IPSec
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.3/24
vBond
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.3/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.3/24
no shut
!
commit
o IP Address: 199.1.1.3
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vSmart1
▪ Organization: KBITS
▪ System-IP: 10.1.1.102
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vSmart
config
!
system
host-name vSmart1
system-ip 10.1.1.102
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
▪ vpn 0
- Interface Eth1
- IP Address: 199.1.1.2/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.2/24
vSmart
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.2/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.2/24
no shut
!
Commit
o IP Address: 199.1.1.2
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353
CCDE # 20110020 Initializing the WAN Edges
➢ Select the file you downloaded from the PNP Portal. Upload it and
check the Validate option.
vEDGE-1
▪ Host-name : vEdge1
▪ Organization: KBITS
▪ System-IP: 10.2.2.201
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge1
config
!
system
host-name vEdge1
system-ip 10.2.2.201
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.17/28
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.30
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge1
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.17/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
vEDGE-2
▪ Host-name : vEdge2
▪ Organization: KBITS
▪ System-IP: 10.2.2.202
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-2
config
!
system
host-name vEdge2
system-ip 10.2.2.202
site-id 2
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge2
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.102.2/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.102.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
commit
vEDGE-3
▪ Host-name : vEdge3
▪ Organization: KBITS
▪ System-IP: 10.2.2.203
▪ Site ID: 3
vEdge-3
config
!
system
host-name vEdge3
system-ip 10.2.2.203
site-id 3
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.103.3/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.103.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge3
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.103.3/24
tunnel-interface
encapsulation ipsec
allow-service all
vEDGE-4
▪ Host-name : vEdge4
▪ Organization: KBITS
▪ System-IP: 10.2.2.204
▪ Site ID: 4
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-4
config
!
system
host-name vEdge4
system-ip 10.2.2.204
site-id 4
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge4
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.104.4/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.104.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
vEDGE-1
Task 1 – Upload the Root Certificate to the vEdge
o IP Address : 199.1.1.17
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 1st
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.102.2
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 2nd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.103.3
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 3rd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.104.4
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 4th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
cEDGE-1
Task 1 – Configuring the System Component
▪ Host-name : cEdge5
▪ Organization: KBITS
▪ System-IP: 10.2.2.205
▪ Site ID: 5
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
cEdge1
config-transaction
!
hostname cEdge1
!
system
system-ip 10.2.2.205
site-id 5
organization-name KBITS
▪ GigabitEthernet1 Parameters
o IP Address: 192.168.105.5/24
o Default Route: 192.168.105.254
▪ Tunnel Parameters Parameters
o Tunnel Interface: Tunnel1
o Tunnel Source: GigabitEthernet1
o Tunnel Mode: SDWAN
▪ SDWAN Interface Parameters
o Interface: GigabitEthernet1
o Encapsulation: IPSec
o Color: default
o Tunnel Services (All, NetConf, SSHD)
cEdge1
config-transaction
!
interface GigabitEthernet1
no shutdown
ip address 192.168.105.5 255.255.255.0
!
ip route 0.0.0.0 0.0.0.0 192.168.105.254
!
interface Tunnel1
no shutdown
ip unnumbered GigabitEthernet1
tunnel source GigabitEthernet1
tunnel mode sdwan
exit
!
sdwan
interface GigabitEthernet1
tunnel-interface
encapsulation ipsec
color default
cEDGE-1
Task 1 – Upload the Root Certificate to the cEdge
➢ Note and use the Chassis Number and Token number for the 1st
CSR Device from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
Authored By:
Khawar Butt
CCIE # 12353
Hepta CCIE#12353
CCDE # 20110020 Configuring Templates
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : MPLS
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : BIZ-Internet
Allow Service
(c) KBITS Live | https://kbits.live
44 of 150
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Advanced
o OSPF Network Type: Point-to-Point
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the MPLS Router.
Interface Configuration
Site-1
Site-2
Site-4
Site-5
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-1
!
Interface E 0/0
ip address 192.168.11.11 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.11.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.12.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.13.1 255.255.255.0
ip ospf network point-to-point
!
router ospf 1
network 192.168.11.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-2
!
Interface E 0/0
ip address 192.168.20.22 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.21.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.22.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.23.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.2 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.20.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-3
!
Interface E 0/0
ip address 192.168.30.33 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.31.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.32.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.33.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.3 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.30.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-4
!
Interface E 0/0
ip address 192.168.40.44 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.41.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.42.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.43.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback4
ip address 172.16.234.4 255.255.255.255
ip ospf network point-to-point
!
router ospf 1
network 192.168.40.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Site-5
!
Interface E 0/0
ip address 192.168.50.55 255.255.255.0
no shut
!
Interface Loopback1
ip address 172.16.51.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback2
ip address 172.16.52.1 255.255.255.0
ip ospf network point-to-point
!
Interface Loopback3
ip address 172.16.53.1 255.255.255.0
ip ospf network point-to-point
!
router ospf 1
network 192.168.50.0 0.0.0.255 area 0
network 172.16.0.0 0.0.255.255 area 0
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF : BR-VE-OSPF-VPN1
➢ Click on “…” towards the right-hand side & click Edit Device
Template.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the Internal Site Router.
➢ Click Attach.
➢ Click on “…” towards the right-hand side for both devices, one at a
time click Edit Device Template.
vEdge-3
➢ Click Update.
vEdge-4
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
VPN 0
Task 1 – Configure a VPN Template for HQ vEdge-Cloud Devices for
VPN 0
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o AS Number -> Global : 65001
Neighbor
o Adddress -> Global : 199.1.1.30
o Remote AS -> Global : 65001
o Address Family -> Global : On
o Address Family -> Global : IPv4-Unicast
➢ Click Add to add the Interface and Click Add to add BGP Neighbor.
VPN 512
Task 1 – Configure a VPN Template to be used by HQ vEdge-Cloud
Devices for VPN 512
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : HQ-VE-VPN-VPN1
o VPN Interface : HQ-VE-VPNINT-VPN1-G2
o OSPF : HQ-VE-OSPF-VPN1
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on vEdge2 to verify that you are receiving OSPF
routes from the MPLS Router.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
VPN 0
Task 1 – Configure a VPN Template by CSR for VPN 0
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet1
o IPv4 Address -> Static -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet2
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
➢ Click Add to add the Interface and Click Add to add OSPF.
VPN 512
Task 1 – Configure a VPN Template to be used by CSR for VPN 512
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet4
VPN 1
Task 1 – Configure a VPN Template for CSR for VPN 1
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : GigabitEthernet3
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: GigabitEthernet3
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> CE-System
Service VPN
o VPN 1 : BR-CSR-VPN-VPN1
o VPN Interface : BR-CSR-VPNINT-VPN1-G3
o OSPF : BR-CSR-OSPF-VPN1
➢ Click Attach.
(c) KBITS Live | https://kbits.live
73 of 150
Task 3 – Configure the Variable Parameters for the Feature
Templates
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Type Show Ip route on cEdge1 to verify that you are receiving OSPF
routes from the MPLS Router.
➢ Type Show Ip route on Internal Site Routers to verify that you are
receiving OSPF routes from the other Sites.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Global : 199.1.1.14
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Static -> Device-Specific
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
Requirements:
➢ Los Angeles & London Sites should use the MPLS Transport for Telnet
Traffic and the Biz-Internet Transport for Web Traffic.
➢ Telnet Should have a SLA based on the following:
o Loss – 5%
o Latency – 200
o Jitter – 100ms
➢ Web Should have a SLA based on the following:
o Loss – 10%
o Latency – 500
o Jitter – 100ms
➢ Create the Sites for Los Angeles and London.
➢ Create the VPN for VPN ID 1.
➢ Click SLA Class and select New SLA Class list. Create 2 policies
based on the following:
o Name : SLA-Telnet
o Loss : 5%
o Latency : 200
o Jitter : 100ms
o Name : SLA-Web
o Loss : 10%
o Latency : 500
o Jitter : 100ms
➢ Click VPN and select New VPN list. Create 1 policy based on the
following:
o Name : VPN1
o ID : 1
➢ Click Site and select New Site list. Create 2 policies based on the
following:
o Name : London
o Site ID : 3
Telnet Sequence
Match Conditions:
o Protocol : 6
o Port : 23
Action
o SLA Class List: SLA-Telnet
o Color : mpls
o Backup Preferred Color: biz-internet
Web Sequence
Match Conditions:
o Protocol : 6
o Port : 80
Action
o SLA Class List: SLA-Web
o Color : biz-internet
o Backup Preferred Color: mpls
➢ Click Next to move to the “Apply Policy to Sites and VPNs” Page.
➢ The TELNET-WEB-Policy will be there. Click “New Site List and VPN
List” button.
➢ Click Add.
➢ Verify the policy by using the Monitor -> Network -> vEdge2 ->
Troubleshooting -> Simulate Flows Tool.
➢ Telnet from Los Angeles or London should only use the mpls
transport.
➢ Web from Los Angeles or London should only use the biz-internet
transport.
➢ Normal Ping from Los Angeles or London should use both the
Transports.
Requirements:
o Name : Chat-Apps
o Appls: Aol-Messenger, MSN-Messenger & WhatsApp Messenger
➢ Click SLA Class and select New SLA Class list. Create a policy based
on the following:
o Name : SLA-CHATS
o Loss : 25%
o Latency : 600
o Jitter : 100ms
➢ Click Site and select New Site list. Create a policy based on the
following:
o Name : Rome
o Site ID : 4
Telnet Sequence
Match Conditions:
o Application List: Chat-Apps
Action
o SLA Class List: SLA-CHATS
o Color : mpls
o Backup Preferred Color: biz-internet
Web Sequence
Match Conditions:
o Protocol : 6
o Port : 80
Action
o SLA Class List: SLA-Web
o Color : biz-internet
o Strict: Checked
➢ Click “Import Existing” and select the CHAT-POLICY from the drop-
down list and click Import.
(c) KBITS Live | https://kbits.live
84 of 150
➢ Click Policy Application on the Top of the page.
➢ The CHAT-Policy will be there. Click “New Site List and VPN List”
button.
➢ Click Add.
➢ Verify the policy by using the Monitor -> Network -> vEdge3 ->
Troubleshooting -> Simulate Flows Tool.
Requirements:
➢ Rome should only the MPLS TLOC as the preferred color while
communicating to Los Angeles. The Internet TLOC should be backup
TLOC.
➢ Click TLOCs and select New TLOC list. Create a policy based on the
following:
o Name : LA-TLOC-MPLS-INT
o TLOC#1:
• IP Address: 10.2.2.202
• Color: MPLS
• Encapsulation: IPSec
• Preference: 300
o TLOC#2:
• IP Address: 10.2.2.202
• Color: Biz-internet
• Encapsulation: IPSec
• Preference: 200
Route Sequence
Match Conditions:
(c) KBITS Live | https://kbits.live
86 of 150
o Site List: LosAngeles
o VPN List: VPN1
Action
o TLOC/TLOC List: LA-MPLS-INT
o Click Save Match and Actions to save the Sequence.
Default Sequence
Action
o Accept
➢ Click “Import Existing” and select the LA-MPLS-INT from the drop-
down list and click Import.
➢ Click Add.
Requirements:
➢ Click Prefix and select New Prefix list. Create a policy based on the
following:
o Name : PL-234
o Prefix List Entry: 172.16.234.0/24 le 32
➢ Click Site and select New Site list. Create a policy based on the
following:
o Name : Dubai
o Site ID : 1
Route Sequence
Match Conditions:
o Prefix List: PL-234
Action: Reject
Default Sequence
➢ Click Add.
Interface Configuration
Cloud Edge
MPLS Cloud
WAN Setup
Task 1 – Cloud Edge Router Configuration
no ip domain-loo
line con 0
logg sync
no exec-timeout
!
Hostname Cloud Edge
!
Vlan 199
!
Interface range E 0/0-3
Switchport mode access
Switchport access vlan 199
!
Interface VLAN 199
ip address 199.1.1.14 255.255.255.240
no shut
!
Interface E 1/0
ip address 192.1.100.1 255.255.255.240
no shut
!
Interface E 1/1
ip address 192.168.100.1 255.255.255.0
no shut
!
router ospf 1
network 192.168.100.0 0.0.0.255 area 0
network 199.1.1.0 0.0.0.255 area 0
passive-interface default
no passive-interface E 1/1
!
ip route 0.0.0.0 0.0.0.0 192.1.100.254
no ip domain-lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname MPLS
!
interface Ethernet0/0
ip address 192.168.100.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.168.11.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.168.12.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.168.21.254 255.255.255.0
no shut
!
router ospf 1
network 192.168.100.0 0.0.0.255 area 0
network 192.168.11.0 0.0.0.255 area 0
network 192.168.12.0 0.0.0.255 area 0
network 192.168.21.0 0.0.0.255 area 0
no ip domain lookup
!
line con 0
exec-timeout 0 0
logging synchronous
!
hostname Internet
!
interface Ethernet0/0
ip address 192.1.100.254 255.255.255.0
no shut
!
interface Ethernet0/1
ip address 192.1.11.254 255.255.255.0
no shut
!
interface Ethernet0/2
ip address 192.1.12.254 255.255.255.0
no shut
!
interface Ethernet0/3
ip address 192.1.22.254 255.255.255.0
no shut
!
interface Ethernet1/0
ip address 192.1.31.254 255.255.255.0
no shut
!
ip route 199.1.1.0 255.255.255.0 192.1.100.1
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
IP Address: 199.1.1.5
Subnet Mask: 255.255.255.240
Default Gateway: 199.1.1.14
▪ Host-name : vManage1
▪ Organization: KBITS
▪ System-IP: 10.1.1.101
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vManage
config
!
system
host-name vManage1
system-ip 10.1.1.101
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface eth1
- IP Address: 199.1.1.1/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
vManage
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.1/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.1/24
no shut
!
commit
➢ Browse to http://192.168.1.5/certsrv
➢ Set the CSR Parameters with the Organization name, City, State,
Country. Set the Time to 3 Years and save.
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
(c) KBITS Live | https://kbits.live
99 of 150
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vBond1
▪ Organization: KBITS
▪ System-IP: 10.1.1.103
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vBond
config
!
system
host-name vBond1
system-ip 10.1.1.103
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3 local
!
Commit
▪ vpn 0
- Interface ge0/0
- IP Address: 199.1.1.3/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Encapsulation: IPSec
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
- IP Address: 192.168.1.3/24
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 199.1.1.3/28
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.3/24
no shut
!
Commit
o IP Address: 199.1.1.3
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Browse to http://192.168.1.5/certsrv
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
▪ Host-name : vSmart1
▪ Organization: KBITS
▪ System-IP: 10.1.1.102
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vSmart
config
!
system
host-name vSmart1
system-ip 10.1.1.102
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface Eth1
- IP Address: 199.1.1.2/28
- Tunnel Interface
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 199.1.1.14
▪ vpn 512
- Interface eth0
vSmart
config
!
vpn 0
no interface eth0
interface eth1
ip address 199.1.1.2/28
tunnel-interface
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 199.1.1.14
!
vpn 512
interface eth0
ip address 192.168.1.2/24
no shut
!
Commit
o IP Address: 199.1.1.2
o Username: Admin
o Password: Admin
o Check Generate CSR
o Click OK
➢ It will open a window with the CSR. Copy by using CTRL-A and
CTRL-C.
➢ Select “Advanced”.
➢ Paste the CSR in the box by using CTRL-V and click Submit.
➢ Browse to http://192.168.1.5/certsrv
➢ The issued certificate link will show up. Click on the link.
➢ Select the file you downloaded from the PNP Portal. Upload it and
check the Validate option.
vEDGE-1
▪ Host-name : vEdge1
▪ Organization: KBITS
▪ System-IP: 10.2.2.201
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge1
config
!
system
host-name vEdge1
system-ip 10.2.2.201
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.11.1/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.11.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge1
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.11.1/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.11.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
commit
▪ Host-name : vEdge2
▪ Organization: KBITS
▪ System-IP: 10.2.2.202
▪ Site ID: 1
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-2
config
!
system
host-name vEdge2
system-ip 10.2.2.202
site-id 1
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
commit
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.12.2/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.12.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.12.2/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.102.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
commit
vEDGE-3
▪ Host-name : vEdge3
▪ Organization: KBITS
▪ System-IP: 10.2.2.203
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-3
config
!
system
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.21.3/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.21.254
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge3
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.21.3/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.21.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
vEDGE-4
▪ Host-name : vEdge4
▪ Organization: KBITS
▪ System-IP: 10.2.2.204
▪ Site ID: 2
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-4
config
!
system
host-name vEdge4
system-ip 10.2.2.204
site-id 2
organization-name KBITS
clock timezone Asia/Muscat
vbond 199.1.1.3
!
Commit
▪ vpn 0
- Interface Ge0/1
- IP Address: 192.1.22.4/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.22.254
▪ vpn 512
vEdge4
config
!
vpn 0
no interface eth0
interface ge0/1
ip address 192.1.22.4/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.22.254
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
o IP Address : 192.168.11.1
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 1st
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.12.2
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 2nd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.168.21.3
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 3rd
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
o IP Address : 192.1.22.4
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 4th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
Interface Configuration
ASAv1
Firewall Configuration
Task 1 – Interface Configuration and Default Routing on ASA in Los
Angeles
Hostname ASAv1
!
Interface Gig 0/0
Nameif Outside
ip address 192.1.31.10 255.255.255.0
no shut
!
Interface Gig 0/1
Nameif Inside
ip address 192.168.31.10 255.255.255.240
no shut
!
Route Outside 0.0.0.0 0.0.0.0 192.1.31.254
ASAv Firewall
▪ Host-name : vEdge5
▪ Organization: KBITS
▪ System-IP: 10.2.2.205
▪ Site ID: 3
▪ vbond Address: 199.1.1.3
▪ Timezone: Based on the appropriate Timezone
vEdge-5
config
!
system
host-name vEdge5
▪ vpn 0
- Interface ge0/0
- IP Address: 192.168.31.5/24
- Tunnel Interface
- Encapsulation IPSec
- Tunnel Services (All, NetConf, SSHD)
- Default Route: 192.168.31.10
▪ vpn 512
- Interface eth0
- IP Address: DHCP Client
vEdge5
config
!
vpn 0
no interface eth0
interface ge0/0
ip address 192.168.31.5/24
tunnel-interface
encapsulation ipsec
allow-service all
allow-service netconf
allow-service sshd
no shut
ip route 0.0.0.0/0 192.168.31.10
!
vpn 512
interface eth0
ip dhcp-client
no shutdown
!
Commit
ASAv
o IP Address : 192.1.31.5
o Protocol - SFTP
o Username : admin
o Password : admin
➢ Note and use the Chassis Number and Token number for the 5th
vEdge from vManage.
➢ You should see the vEdge in the vManage console with a Certificate
issued.
System
VPN 0
Basic Configuration
o VPN -> Global : 0
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
VPN512
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Dynamic
VPN 1
Basic Configuration
o VPN -> Global : 1
o Name -> Global : Data VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/2
o IPv4 Address -> Static -> Device Specific
Redistribution
o Protocol : OMP
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/2
➢ Click Add to add the Interface and Click Add to add OSPF.
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R3
!
Interface E 0/0
Ip address 172.16.30.33 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.31.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.32.1 255.255.255.0
Ip ospf network point-to-point
Verification
➢ Verify the configuration on vEdge5. You can do that by verify OSPF
Neighbor relationship with the MPLS Router by issuing the Show ospf
neighbor command on vEdge5.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Mpls
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
o IPv4 Address -> Static -> Device Specific
Tunnel
(c) KBITS Live | https://kbits.live
131 of 150
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-Internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/3
o IPv4 Address -> Static -> Device Specific
Advanced
o TLOC Extension: Device Specific
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
o Interface Name: ge0/3
(c) KBITS Live | https://kbits.live
132 of 150
➢ Click Save to save the Template.
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
➢ Click Update.
(c) KBITS Live | https://kbits.live
136 of 150
➢ Verify the Configuration & Click Configure Devices.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R2
!
Interface E 0/0
Ip address 172.16.20.22 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.21.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.22.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback3
Ip address 172.16.23.1 255.255.255.0
Ip ospf network point-to-point
!
Router ospf 1
Network 172.16.0.0 0.0.255.255 area 0
Verification
➢ Verify the configuration on vSmart. You can do that by making sure
that you are receiving 2 TLOCS for vEdge3 and 2 TLOCS for vEdge4.
The command to verify is show omp tlocs.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Device Specific
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/0
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> Global : Mpls
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : ge0/1
o IPv4 Address -> Static -> Device Specific
Tunnel
(c) KBITS Live | https://kbits.live
139 of 150
o Tunnel Inteface -> Global : On
o Color -> Global : Biz-Internet
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Area Configuration
o Area Number -> Global : 0
o Area Type -> Default
Interface Configuration
o Interface Name: ge0/0
Basic Information
o System -> VE-System
Service VPN
o VPN 1 : BR-VE-VPN-VPN1
o VPN Interface : BR-VE-VPNINT-VPN1-G2
o OSPF: BR-VE-OSPF-VPN1
➢ Click Attach.
vEdge1
o Default Gateway for VPN0 : 192.1.11.254
o Interface IP for ge0/0 :192.168.11.1/24
o Interface IP for ge0/1 :192.1.11.1/24
o Interface IP for ge0/2 :172.16.10.1/24
o Timezone: Asia/Dubai
vEdge2
o Default Gateway for VPN0 : 192.1.12.254
o Interface IP for ge0/0 :192.168.12.2/24
o Interface IP for ge0/1 :192.1.12.2/24
o Interface IP for ge0/2 :172.16.10.2/24
o Timezone: Asia/Dubai
o Hostname : vEdge-2
o System IP : 10.2.2.202
o Site ID : 1
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
No ip domain-lookup
!
Hostname R1
!
Interface E 0/0
Ip address 172.16.10.11 255.255.255.0
No shut
!
Interface loopback1
Ip address 172.16.11.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback2
Ip address 172.16.12.1 255.255.255.0
Ip ospf network point-to-point
!
Interface loopback3
Ip address 172.16.13.1 255.255.255.0
Verification
➢ Verify the configuration on vEdge1 & vEdge2. You can do that by
verify OSPF Neighbor relationship with the MPLS Router by issuing
the Show ospf neighbor command on vEdge1 & vEdge2.
Basic Configuration
o VPN -> Global : 0
o Name -> Global : Transport VPN
IPv4 Route
o Prefix -> Global : 0.0.0.0/0
o Next Hop -> Global : 199.1.1.14
Basic Configuration
o VPN -> Global : 512
o Name -> Global : MGMT VPN
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth1
o IPv4 Address -> Static -> Device Specific
Tunnel
o Tunnel Inteface -> Global : On
o Color -> default
Allow Service
o All -> Global : On
o NETCONF -> Global : On
o SSH -> Global : On
Basic Configuration
o Shutdown -> Global : No
o Interface Name -> Global : eth0
o IPv4 Address -> Static -> Device-Specific
Basic Information
o System -> VE-System
➢ Click Attach.
➢ Click Update.
➢ Wait for it to update the device. It should come back with Status of
Success.
➢ Los Angeles & London Sites are communicating to each other directly.
You can verify this by checking the routes. The routes should be
pointing directly at the TLOCs of the Branch Sites directly.
➢ All traffic between the sites should be forwarded via the HQ Site
Dubai. Use a TLOC list to accomplish this task.
➢ Click VPN and select New VPN list. Create 1 policy based on the
following:
o Name : VPN1
o ID : 1
➢ Click Site and select New Site list. Create 2 policies based on the
following:
o Name : Dubai
o Site ID : 1
o Name : London
o Site ID : 2
➢ Click TLOC and select New TLOC list. Create 1 policies based on the
following:
o Name : TLOC-Dubai
o TLOCs
• 10.2.2.201 – mpls – IPSec – 500
• 10.2.2.202 – mpls – IPSec – 500
• 10.2.2.201 – biz-internet – IPSec – 400
• 10.2.2.202 – biz-internet – IPSec – 400
Default
Action
o Accept
➢ Click Next on the “Configure Traffic Rules” page as we are not using
any Control Policies. You will move to the “Apply Policy to Sites and
VPNs” Page.
➢ Click Add.
➢ You can verify this by doing checking the routes. The routes should
be pointing directly at the TLOCs of Dubai and all traffic will be
forwarded thru Dubai.