Learn by Creating Services
V-Net (Ethernet/Vlan/VXlan)
Let’s create a V-Net service to give the srv05-nyc server the ability to reach its gateway address.
In a terminal window:
SSH to the srv05-nyc server by typing
ssh demo@166.88.17.185 -p 30065.Enter the password provided in the introductory e-mail.
Type
ip route lsand we can see192.168.46.1is configured as the default gateway, indicated by the “default via 192.168.46.1 dev eth1 proto kernel onlink” line in the output.Start a ping session towards the default gateway by typing
ping 192.168.46.1and keep it running as an indicator for when the service becomes fully provisioned.Until the service is provisioned, the received responses will indicate that the destination is not reachable in the form of “From 192.168.46.64 icmp_seq=1 Destination Host Unreachable”
In a web browser: (*Fields not specified should remain unchanged and retain default values)
Log into the Netris GUI by visiting https://sandbox7.netris.ai and navigate to Services > V-Net.
Click +Add to create a new V-Net service.
Define a name in the Name field (e.g.
vnet-customer).From the Sites drop-down menu, select US/NYC.
Click +IPv4 Gateway, select subnet
192.168.46.0/24(CUSTOMER)and IP192.168.46.1to match the results of theip route lsoutput on srv05-nyc.Click +Port to define the port(s) to be included in the current V-Net service.
For the purposes of this exercise, you can easily find the required port by typing “
srv05” in the Search field.
Select the port named swp2(sw22-nyc-swp2 (srv05))@sw22-nyc (Admin), check the Untag check-box and click Add.
Click Save and the service will start provisioning.
Once fully provisioned, you will start seeing replies similar in form to “64 bytes from 192.168.46.1: icmp_seq=1 ttl=64 time=1.66 ms” to the ping previously started in the terminal window, indicating that now the gateway address is reachable.
E-BGP (Exterior Border Gateway Protocol)
Our internal network is already connected with the outside world so that our servers can communicate with the Internet through the E-BGP session with IRIS ISP1 named “iris-isp1-example”.
Optionally you can configure an E-BGP session to IRIS ISP2 for fault tolerance.
In a web browser: (*Fields not specified should remain unchanged and retain default values)
Log into the Netris GUI by visiting https://sandbox7.netris.ai and navigate to Net > E-BGP.
Click +Add to configure a new E-BGP session.
Define a name in the Name field (e.g.
iris-isp2-customer).From the Site drop-down menu, select US/NYC.
From the NFV Node drop-down menu, select SoftGate2.
In the Neighbor AS field, type in
65007.In the Switch port field, define the port on the switch that is connected to the ISP2.
For the purposes of this exercise, you can easily find the required port by typing “
ISP2” in the Search field.
Select the port named swp14(sw02-nyc-swp14 (ISP2))@sw02-nyc
For the VLAN ID field, unselect
Untagand type in1072.In the Local IP field, type in
50.117.59.102In the Remote IP field, type in
50.117.59.101.Expand the Advanced section
In the Prefix List Outbound field, type in
permit 50.117.59.160/28 le 32And finally click Add
Allow up to 1 minute for both sides of the BGP sessions to come up and then the BGP state on Net > E-BGP page as well as on Telescope > Dashboard pages will turn green, indication a successfully established BGP session. .
NAT (Network Address Translation)
Now when we have both internal and external facing services, we can aim for our srv05-nyc server to be able to communicate with the Internet.
In a terminal window:
SSH to srv05-nyc by typing
ssh demo@166.88.17.185 -p 30065.Enter the password provided in the introductory e-mail.
Start a ping session by typing
ping 1.1.1.1and keep it running as an indicator for when the service starts to work.
Let’s configure a source NAT so our V-Net subnet 192.168.46.0/24 can communicate with the Internet.
In a web browser: (*Fields not specified should remain unchanged and retain default values)
Log into the Netris GUI by visiting https://sandbox7.netris.ai and navigate to Net > NAT.
Click +Add to define a new NAT rule.
Define a name in the Name field (e.g.
NAT Customer).From the Action drop-down menu, select SNAT.
From the Protocol drop-down menu, select ALL.
In the Source field, type in
192.168.46.0/24.The Destination field can remain as
0.0.0.0/0.From the Nat IP drop-down menu, select 50.117.59.166/32(US/NYC).
This IP is from our sandbox address space and is indicated in the SoftGate configuration to be used as a global IP for NAT.
Click Add
Soon you will start seeing replies similar in form to “64 bytes from 1.1.1.1: icmp_seq=1 ttl=62 time=1.23 ms” to the ping previously started in the terminal window, indicating that now the Internet is reachable from srv05-nyc.
ACL (Access Control List)
Now that srv05-nyc can communicate with both internal and external hosts, let’s check Access Policy and Control options.
In a terminal window:
SSH to srv05-nyc by typing
ssh demo@166.88.17.185 -p 30065.Enter the password provided in the introductory e-mail.
Start a ping session by typing
ping 1.1.1.1and keep it running for the duration of this exercise.
In a web browser: (*Fields not specified should remain unchanged and retain default values)
Log into the Netris GUI by visiting https://sandbox7.netris.ai and navigate to Net > Sites.
Click Edit from the Actions menu indicated by three vertical dots (⋮) on the right side of the UC/NYC site.
From the ACL Default Policy drop-down menu, change the value from Permit to Deny.
Click Save.
Back in the terminal window:
Soon you will notice that there are no new replies to our previously started ping 1.1.1.1 command, indicating that the 1.1.1.1 IP address is no longer reachable.
Now that the Default ACL Policy is set to Deny, we need to configure an ACL entry that will allow the srv05-nyc server to communicate with the Internet.
Back in the web browser:
Navigate to Services > ACL.
Click +Add to define a new ACL.
Define a name in the Name field (e.g.
V-Net to WAN Customer).From the Protocol drop-down menu, select ALL.
In the Source field, type in
192.168.46.0/24.In the Destination field, type in
0.0.0.0/0.Click Add.
Select Approve from the Actions menu indicated by three vertical dots (⋮) on the right side of the newly created “V-Net to WAN Example” ACL.
Click Approve one more time in the pop-up window.
Back in the terminal window again:
Once the Netris software has finished syncing the new ACL policy with all the member devices, you can see that replies to our ping 1.1.1.1 command have resumed, indicating that the srv05-nyc server can communicate with the Internet once again.