CCIE EI Virtual Lab Users Guide
CCIE EI Virtual Lab Users Guide
Our Lab includes all of the Virtual Machines in this list, but of course it
doesn’t include the Physical Equipment (Switches).
However, the Physical Switches are not needed for all Lab Exercises. They
are mainly needed for the SD-Access-related Labs that include SD-Access
Programmability and SD-Access FiaB (Fabric in a Box)
But the less complex Switching-related Lab Exercises can simply use
Virtual Devices like the Cisco IOSv-L2. We’ll expand this discussion in the
next section: 2. Connection between Physical Switches & Server
Cisco’s Website also includes the following requirement:
- Cisco DNA Center Release 1.3.1
But this requirement can’t be met with a Home Lab, because Cisco hasn’t
still released an Official Virtual version of the DNA Center (DNAC)
However, Cisco does offer a way to get at least some “exposure” to the
DNAC User Interface.
That will be explained in Appendix B (Cisco DNA Center Sandbox Site)
In addition to the VM’s mentioned above, our Lab includes an EVE-NG
VM, which is perhaps the most important component of this Lab:
EVE-NG Server (Community Edition) ver 2.0.3-112
Routers
- Cisco IOSv Router ver 15.9.3
- Cisco XRv Router ver 6.3.1
- Cisco XRv-9K Router ver 7.2.1
- Cisco CSR1000v SD-WAN Router w/ IOS XE ver Amsterdam 17.3.2
Other Devices
- Cisco IOSv-L2 Layer-2 Switch ver 15.2
- Cisco NX-OSv9K Nexus Switch ver 9.2.4
- Cisco ASAv Firewall ver 9.14.1
SD-WAN Controllers
- vBond versions 18.4.4, 19.2.31 and 20.3.2
- vSmart versions 18.4.4, 19.2.31 and 20.3.2
- vManage versions 18.4.4, 19.2.31 and 20.3.2
As we may recall, the list of requirements for CCIE EI Lab includes the
following:
- Cisco CSR1000v with IOS XE SD-WAN ver 16.12
Using these Routers as WAN Edge Nodes is perhaps the main purpose of
this requirement. However, they can also be used for other purposes.
In fact, our Lab includes CSR1000v SD-WAN capable Routers (IOS XE
ver 17.3.2) not only as part of the EVE-NG VM, but also as an alternative
to CML-2 and EVE-NG.
We deploy 20 x CSR1000v Routers as independent/native VM’s directly on
top of ESXi. Being built directly on ESXi allows them run much faster
than when they run on a Network Simulator like CML-2 and EVE-NG.
When INE started to offer Labs based on Virtual devices, they were initially
based on CSR1000v Routers. But when Cisco VIRL was released, they
migrated from native CSR1000v Routers to VIRL and now to CML-2.
But again, using natively deployed CSR1000v Routers is still a valid
option, although they so present some challenges.
For instance, while the Virtual Routers in EVE-NG and CML-2 have 4 or
more Gigabit Ethernet interfaces, CSR1000v Routers have only 3. This
challenge can be overcome by creating Sub-interfaces, for which of course
there is no limit on the number of them.
However, this would force us to modify the Lab’s Initial Configuration files,
since the interface names will be very different. But it could be done.
The main advantage of taking this approach is first of all speed and the fact
that there is no Licensing requirement, at least not for a Lab environment
where the Routers won’t be using a lot of Bandwidth.
We’ll discuss this issue a little bit more in Appendix A.
All of the VM’s are interconnected with an internal Virtual Switch, which
also allows communication to the external world, because it’s “mapped” to
one of the 4 Gigabit Ports in the Dell Server.
As we’ll see in the next section, this relationship between the Virtual Switch
and one of the physical Gigabit Ports is what allows the interconnection
between the Server and the Physical Switches that are needed for this Lab.
One of these Ports must be designated the Management Port. The default
Management Port is Gb0. That could be changed, but we keep the default.
The Management Port is of course connected to the Management Network
which we configure with IP Subnet 192.168.15.0/24 (255.255.255.0)
An ESXi Sever always includes a Virtual Switch called vSwitch0, which is
a Virtual Device (everything in ESXi is of course Virtual) that by default
has 3 main components (or Ports if we use VMware Language) which are
in a way equivalent to the 3 first Layers in the OSI model:
- vSwitch (Physical Layer for a Virtual Switch with 120 Virtual Ports)
- VM Network (Data-Link Layer Controller)
- Management Network (Layer-3 or IP Network Controller)
Source:
https://www.router-switch.com/faq/cisco-catalyst-9300-switch-vs-3850-switch.html
As you may see, the 9300’s and 3850’s have similar capabilities, while
lower level Platforms lack many of the functions provided by them.
Although not shown here, the Catalyst 3650 is quite similar to the 3850.
As we may see here, vSwitch1 is the “bridge” that connects the Physical
Switches with the Virtual Routers and all other VM’s.
Of course vSwitch1 has to be assigned to Gb1 (vmnic1) and that’s why Gb1
is the Port that must be used to connect the Physical Switches to the Server.
A single link between the Server and one of the Physical Switches is enough
because vSwitch1 is configured as a Trunk, so that it allows all VLANs.
According to the previous Diagram, Switch SW1 should be connected to the
Server through its first Gigabit Port (G0/1 or whatever the Port name is).
Therefore, that Switch Port should also be configured as a Trunk.
Since SW1 is connected to all other Physical Switches (also through Trunks
that allow all VLAN’s) then all 4 Physical Switches will effectively have
full communication with all Virtual Devices.
We actually create 3 Virtual Switches in the Server, vSwitch1, vSwitch2
and vSwitch3.
Virtual Switch vSwitch2 is assigned to vmnic2 (Gb2) and Virtual Switch
vSwitch3 is assigned to vmnic3 (Gb3).
While this is done just as a backup plan for vSwitch1, they could also be
used to connect devices to the Lab. However, in this Topology these Virtual
Switches are not being unused.
You may later configure the Integrated Dell Remote Access Controller,
(simply known as the iDRAC Controller) to allow Remote Management.
That way you can shutdown the Server without being right beside.
By the way, there is a short but very good YouTube Video that explains
how to setup the iDRAC Controller:
Dell PowerEdge R620 iDRAC Setup
https://www.youtube.com/watch?v=n1O9DrAoCAk
The Access Credentials to login through this Interface (or through the
vSphere Client) are the same Credentials used on the Server’s Monitor:
User Name: root
Password: esxiadmin
The next step after we login should be to power up the VM’s that we want
to use. These are the Lab’s VM’s as seen from the vSphere Client:
So for instance, if you plan to use the EVE-NG VM, of course you’ll need
to power up only that VM.
However, EVE-NG needs the Default Gateway VM, that in this Lab takes
the name CSR-DG (a CSR1000v Router). Therefore, the CSR-DG VM
would also have to be powered up.
This will be explained in Appendix E (Sample SD-WAN Network),
We also need to configure all Virtual Switches, and therefore the NIC’s
assigned to them, in Promiscuous Mode (PM).
As you may know, a Network Interface in Promiscuous Mode allows all
Frames through it. This lets the Interface to accept Frames intended for
other Network Devices.
And that’s exactly what is needed in our case, because the Server will be
receiving Frames intended for multiple Virtual Machines; not for itself.
If this is not done, the Server would simply discard those Frames and they
will never reach the actual destination.
To configure a Virtual Switch in Promiscuous Mode we first need to go to
its vSwitch component (or sudo Physical Layer) which by default is set to
Reject PM, click on the Security Tab, and change PM to Accept. The next
image shows that:
Now the Virtual Switches are finally properly configured for this Lab and
we are almost done with this section.
There are still a couple of settings that the Server needs like setting the
Security Profile and the creation of Virtual Console Ports to allow
Reverse Telnet Access to some Virtual Appliances. But that will be
explained in some of the Appendices.
Please notice that this is not a Secure URL. It’s a standard HTTP that
starts with http://. It won’t work if you try the Secure version (https://)
We can also access EVE-NG’s Console either through the ESXi Console
Tab or via SSH. These are the Credentials to login to EVE’s Console :
Username: root
Password: cisco
Although advanced users can use the Console to do some very complex
settings, most users only use it to power down the VM, which is done with
this Command: sudo shutdown now
Obviously we won’t explain how to use EVE-NG. However, we do need to
ask you to check out Appendix F: EVE-NG Windows Client Side Software.
This short Appendix talks about a little piece of Software that must be
installed in the Client PC to help you manage the different Virtual Devices
in an EVE-NG Topology.
DN2-HW-APL $91,756.40
DN2-HW-APL-L $152,619.27
DN2-HW-APL-XL $293,785.66
Although most Cisco Authorized Resellers offer significant discounts over
these very high list prices, their final prices are still extremely high for most
Organizations and of course no person preparing for the CCIE EI Lab Exam
would be able to afford this.
https://sandboxdnac.cisco.com
The following URL provides some help to navigate the DNAC Dashboard:
Cisco DNA Assurance User Guide - Managing Dashboards
https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-
automation-and-management/dna-center-assurance/1-3-3-
0/b_cisco_dna_assurance_1_3_3_0_ug/b_cisco_dna_assurance_1_3_2_0_ch
apter_01110.html
We'll have to scroll down until we find the VM serial port connected over
network option, which by default will be unchecked. So please check this
option and click OK.
Now we are finally ready to do Reverse Telnet!
So when you start a new EVE-NG Project and try to add a new Node, you
should see the following options:
All Configuration Files include comments that make them almost self-
explanatory. Therefore, we are not going to explain the configuration. So
please read all the comments if you wish to understand it.
However, we do need to explain a few things about this sample Network.
Let’s start with the SD-WAN Controllers: vManage, vSmart, and vBond
As the Diagram shows, the Controllers are connected to the OOB-Switch
(Out-of-Band Switch) which in turn is connected to vSwitch0; that is, to the
Management Network.
As you know, the Management Network uses IP Subnet 192.168.15.0/24.
Therefore, the Controllers could get an IP Address via DHCP. However, we
prefer to assign Fixed IP Addresses to them:
- vManage ==> 192.168.15.51
- vBond ==> 192.168.15.52
- vSmart ==> 192.168.15.53
As you may see, the Dashboard provides a view of the entire SD-WAN
Network, as it shows the connections to the other Controllers (vSmart and
vBond) and to all three vEdges.
Of course we are going to explain how to navigate this Dashboard, but you
can find a good explanation at this URL:
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-
xe-gs-book/vmanage-dashboard.html
The following YouTube Video also provides a good Tutorial:
Cisco SDWAN: vManage GUI Deep Dive
https://www.youtube.com/watch?v=SQshStgp72I
We use this label because in this case vSwitch1 is giving us access to the
Controller’s In-Band Management Interface, which is configure using IP
Subnet 10.1.1.0/24
To be more specific, these are the IP Addresses assigned to the Controller’s
In-Band Management Interfaces:
- vManage ==> 10.1.1.1
- vBond ==> 10.1.1.2
- vSmart ==> 10.1.1.3
Normally we would not have access to the In-Band Mgmt. Interface, nor
should we. Actually, that’s the job of the OOB Management Interface.
However, since this is a Lab, it would be nice to also have access to the In-
Band Mgmt. Interface from our Desktop.
The Sample Network Diagram also shows one more connection between the
SD-WAN Network and the external world. The following image shows that:
As you may see, there is traffic from 3 different Subnets that are being re-
directed to the Lab’s Internet Router (192.168.15.254):
- 10.1.1.0/24
- 172.1.0.0/24
- 200.200.100.0/24
Therefore, we need to tell this Router how to send traffic from these
Subnets back to their proper origin.
If the Lab’s Internet Router was also a Cisco Router, we could solve this
problem very easily by simply running RIP, EIRGP or OSPF, so that all
Routers learn all Routes.
But the Lab’s Internet Router is most likely a Linksys or similar product in
which it would be very difficult to run any Dynamic Routing Protocol.
The solution is this case then would be to create Static Routes using the
Router's GUI.
But to create a Static Route we need to know the Gateway's IP Address.
We know that CSR-DG is the Gateway to reach the first two Subnets
(10.1.1.0/24 & 172.1.0.0/24)
And we also know that SD-WAN’s Internet Router is the Gateway to reach
Subnet 200.200.100.0/24
To test these Static Routes, we simply try to ping any IP Address in these
Subnets.
If everything is done correctly all of the IP Addresses used in the SD-WAN
Network should be reachable (pingable) from the Client PC’s Desktop!