2. Configuration
2. Configuration
vsmart(config)# system
o vsmart(config-system)# host-name vSmart
o vsmart(config-system)# organization-name nb007
o vsmart(config-system)# site-id 100
o vSmart(config-system)# vbond 100.1.1.13
o vsmart(config-system)# clock timezone UTC
o vsmart(config-system)# system-ip 2.2.2.2
o vsmart(config-system)# exit
vSmart(config)# vpn 0
o vSmart(config-vpn-0)# ip route 0.0.0.0/0 100.1.1.254
o vsmart(config-vpn-0)# interface eth0
vsmart(config-interface-eth0)# no shutdown
vsmart(config-interface-eth0)# ip add 100.1.1.12/24
vsmart(config-interface-eth0)# tunnel-interface
vsmart(config-tunnel-interface)# allow-service all
vsmart(config-tunnel-interface)# allow-service netconf
vsmart(config-tunnel-interface)# allow-service sshd
vsmart(config-tunnel-interface)# commit
vmanage# conf t
o vmanage(config)# system
vmanage(config-system)# system-ip 1.1.1.1
vmanage(config-system)# organization-name nb
vmanage(config-system)# site-id 100
vmanage(config-system)# vbond 100.1.1.13
vmanage(config-system)# host-name NMS
vmanage(config-system)# exit
vmanage(config)# vpn 0
vmanage(config-vpn-0)# ip route 0.0.0.0/0 100.1.1.254
vmanage(config-vpn-0)# interface eth0
o vmanage(config-interface-eth0)# no shut
vmanage(config-interface-eth0)# ip add 100.1.1.11/24
vmanage(config-interface-eth0)# tunnel-interface
vmanage(config-tunnel-interface)# allow-
service all
vmanage(config-tunnel-interface)# allow-
service netconf
vmanage(config-tunnel-interface)# allow-
service sshd
vmanage(config-tunnel-interface)# exit
vmanage(config-interface-eth0)# exit
vmanage(config-vpn-0)# exit
vmanage(config)# vpn 512
vmanage(config-vpn-512)# ip route 0.0.0.0/0 192.168.110.2
vmanage(config-vpn-512)# interface eth1
vmanage (config-interface-eth1)# no shutdown
vmanage(config-interface-eth1)# ip add 192.168.110.114/24
vmanage(config-interface-eth1)# commit
Commit complete.
NMS# ping 192.168.110.2 vpn 512
Stop with ctrl + C
vedge(config)# system
vedge(config-system)# host-name vbond
vedge(config-system)# system-ip 3.3.3.3
vedge(config-system)# site-id 100
vedge(config-system)# admin-tech-on-failure
vedge(config-system)# organization-name nb007
vedge(config-system)# vbond 100.1.1.13 local
vedge(config-system)#exit
vedge(config-system)# vpn 0
vedge(config-vpn-0)# interface ge0/0
vedge(config-interface-ge0/0)# ip address 100.1.1.13/24
vedge(config-interface-ge0/0)# ipv6 dhcp-client
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service dhcp
vedge(config-tunnel-interface)# allow-service dns
vedge(config-tunnel-interface)# allow-service icmp
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# no allow-service ntp
vedge(config-tunnel-interface)# no allow-service stun
vedge(config-tunnel-interface)# allow-service https
vedge(config-tunnel-interface)# !
vedge(config-tunnel-interface)# no shutdown
vedge(config-tunnel-interface)# !
vedge(config-tunnel-interface)# ip route 0.0.0.0/0 100.1.1.254
vedge(config-vpn-0)#
vedge(config-vpn-0)#commit
Router(config)#hostname ROOT_CA
ROOT_CA(config)#int g0/0
o ROOT_CA(config-if)#ip add 100.1.1.14 255.255.255.0
o ROOT_CA(config-if)#no sh
o ROOT_CA(config-if)#exit
o ROOT_CA(config)#ip route 0.0.0.0 0.0.0.0 100.1.1.254
ROOT_CA(config)#ip http server
ROOT_CA(config)#ip http authentication local
ROOT_CA(config)#username admin privilege 15 password cisco
ROOT_CA(config)#ip http path flash:
ROOT_CA(config)#crypto key generate rsa label ROOT modulus 2048
ROOT_CA(config)#ip ssh version 2
ROOT_CA(config)#crypto pki server ROOT
ROOT_CA(cs-server)#database url flash:
ROOT_CA(cs-server)#database archive pkcs12 password cisco123
ROOT_CA(cs-server)#database level complete
ROOT_CA(cs-server)#hash sha256
ROOT_CA(cs-server)#issuer-name cn=nblab.local
ROOT_CA(cs-server)#grant auto
ROOT_CA(cs-server)#no shutdown
ROOT_CA(config)#crypto pki export ROOT pem url flash:
Sh flash
ROOT_CA(config)#crypto pki export ROOT pem terminal
NMS# show control local-properties
NMS# request root-cert-chain uninstall
NMS# request download http://admin:[email protected]/ROOT.ca
NMS# vshell
NMS:~$ ls
NMS# request root-cert-chain install home/admin/ROOT.ca
Do same on V manage , V bond , v smart
Switch
o Switch(config)#
o Switch(config)#int vlan 1
o Switch(config-if)#ip add 100.1.1.254 255.255.255.0
o Switch(config-if)#no shut
o Switch(config-if)#no shutdown
o Switch(config)#int gi1/0
o Switch(config-if)#no switchport
o Switch(config-if)#no shut
o Switch(config-if)#
o Switch(config-if)#ip address 199.1.1.254 255.255.255.0
o Switch(config-if)#exit
o Switch(config)#int gi 1/1
o Switch(config-if)#no switchport
o Switch(config-if)#no shut
o Switch(config-if)#ip add 172.16.100.254 255.255.255.0
o Switch(config-if)#exit
o Switch(config)#
o Switch(config)#
o Switch(config)#router bgp 65100
o Switch(config-router)#neighbor 199.1.1.1 remote-as 200
o Switch(config-router)#neighbor 172.16.100.1 remote-as 100
o Switch(config-router)#network 100.1.1.0 mask 255.255.255.0
o Switch(config-router)#exit
o Switch(config)#
o Switch(config)#do wr
BR1-1 configuration
vedge(config)#
vedge(config)# system
vedge(config-system)# host-name BR1-1
vedge(config-system)# organization-name nb007
vedge(config-system)# system-ip 172.16.0.101
vedge(config-system)# site-id 101
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# vpn 0
vedge(config-vpn-0)# ip route 0.0.0.0/0 101.1.1.1
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# ip add 101.1.1.2/24
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# commit
Commit complete.
BR1-1# request root-cert-chain uninstall
BR1-1# request download http://admin:[email protected]/ROOT.ca
BR1-1# request root-cert-chain install home/admin/ROOT.ca
IN gui – setting configuration device then copy from … ( generate bootstrap configuration)
chassis number and token number (otp)
Then run command
BR1-1# request vedge-cloud activate chassis-number 5c272c51-f0b0-2640-c696-d5abfeab705f
token 1fbf77c87769313a1628b2650bf17fc3
Internet router
NT_R(config)#int e0/2
INT_R(config-if)#no shut
INT_R(config-if)#ip add 111.1.1.1 255.255.255.0
INT_R(config-if)#exit
INT_R(config)#int e0/3
INT_R(config-if)#no shut
INT_R(config-if)#ip add 102.1.1.1 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)#int e1/1
INT_R(config-if)#ip add 103.1.1.1 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)#int e1/0
INT_R(config-if)#
INT_R(config-if)#ip add 198.1.1.2 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)#
INT_R(config)#int e1/3
INT_R(config-if)#ip add 203.1.1.1 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)#int e1/2
INT_R(config-if)#no shut
INT_R(config-if)#ip add 202.1.1.1 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#
INT_R(config-if)#int e2/0
INT_R(config-if)#ip add 201.1.1.1 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)#
INT_R(config)#int e2/1
INT_R(config-if)#ip add 99.1.1.2 255.255.255.0
INT_R(config-if)#no sh
INT_R(config-if)#exit
INT_R(config)# router bgp 200
INT_R(config-router)#neighbor 192.1.1.1 remote-as 100
INT_R(config-router)#exit
INT_R(config)#do wr
Building configuration...
[OK]
BR1-2 configuration
vedge(config)# system
vedge(config-system)# system-ip 172.16.0.111
vedge(config-system)# organization-name nb007
vedge(config-system)# site-id 101
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# host-name BR1-2
vedge(config-system)# exit
vedge(config)# vpn 0
vedge(config-vpn-0)# ip route 0.0.0.0/0 111.1.1.1
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# ip add 111.1.1.2/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# commit
BR1-2(config-tunnel-interface)# exit
BR1-2(config-interface-ge0/0)# exit
BR1-2(config-vpn-0)# exit
BR1-2(config)# exit
BR1-2# ping 100.1.1.14 ( root ca)
BR1-2# show control local-properties
BR1-2# request root-cert-chain uninstall
BR1-2# request download http://admin:[email protected]/ROOT.ca
BR1-2# request root-cert-chain install home/admin/ROOT.ca
Generating CSR manually
o BR1-2# request csr upload home/admin/csr.cert
Uploading CSR via VPN 0
Enter organization-unit name : nb007
Re-enter organization-unit name : nb007
o Now BR1-2 have CSR ( Identity certificate)
o Then BR1-2 will send CSR (certificate singing request) toward ROOT CA.
o Now copy from BR1-2 and paste on ROOT CA. Then , root ca will sing CSR and
o Then again paste on BR1-2 and install it.
o Now chassis number and certificate install krte hi iske pass serial number a jaye ye serial
number, digital certificate ka serial number hota hai . fr ye chassis number or serial
number sare controller per add krna peg a jise ye new device ko on board kra le.
o BR1-2# vshell
o BR1-2:~$ ls
o ROOT.ca archive_id_rsa.pub csr.cert
o BR1-2:~$ more csr.cert
o Then copy it and paste on ROOT CA
o ROOT_CA#crypto pki server ROOT request pkcs10 terminal
o Paste it , enter and get granted certificate and paste in BR1-2
o BR1-2:~$ cat > root.cert
o BR1-2:~$ (copy certificate then do ctrl + c )
o BR1-2:~$ ls
ROOT.ca archive_id_rsa.pub csr.cert root.cert
o Request certificate install home admin
o BR1-2# request certificate install home/admin/root.cert
o BR1-2# show certificate serial
o Then copy on controller chassis number and serial number.
vManage# request vedge add chassis-num 271b6611-7e56-4015-bbb4-
06083913efbe serial-num 06 (paste this same command on V smart and V bond.
BR2
vedge(config)# system
vedge(config-system)# host-name BR2
vedge(config-system)# system-ip 172.16.0.102
vedge(config-system)# site-id 102
vedge(config-system)# organization-name nb007
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# exit
vedge(config)# vpn 0
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# ip add 102.1.1.2/24
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# no shut
vedge(config-tunnel-interface)#
vedge(config-tunnel-interface)# ip route 0.0.0.0/0 102.1.1.1
vedge(config-vpn-0)# commit
Commit complete.
BR2(config-vpn-0)#
BR2# request root-cert-chain uninstall
BR2# request download http://admin:[email protected]/ROOT.ca
BR2# request root-cert-chain install home/admin/ROOT.ca
Then , go In Vmanage GUI and copy serial number and token number from gui
o Setting >configuration > … > generate bootstamp
o Then copy on BR2
BR2# request vedge-cloud activate chassis-number 5c272c51-f0b0-2640-c696-d5abfeab705f
token c61ce043bf817d2e8cd9a41143a0f
BR3
vedge# conf t
Entering configuration mode terminal
vedge(config)# system
vedge(config-system)# site-id 103
vedge(config-system)# system-ip 172.16.0.13
vedge(config-system)# organization-name nb007
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# host-name BR3
vedge(config-system)# exit
vedge(config)# vpn 0
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# ip add 103.1.1.2/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# exit
vedge(config-interface-ge0/0)#
vedge(config-interface-ge0/0)# ip route 0.0.0.0/0 103.1.1.1
vedge(config-vpn-0)# commit
Commit complete.
BR3(config-vpn-0)#
BR3# request root-cert-chain uninstall
BR3# request download http://admin:[email protected]/ROOT.ca
BR3# request root-cert-chain install home/admin/ROOT.ca
BR3# request vedge-cloud activate chassis-number 1ef20c70-8a35-d001-fde5-cad78a647170
token 29b5a529665ecd3cb998873a1ced3bd1
BR3#
HQ1
vedge# conf t
Entering configuration mode terminal
vedge(config)# system
vedge(config-system)# site-id 1
vedge(config-system)# host-name HQ1
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# system-ip 172.16.0.11
vedge(config-system)# organization-name nb007
vedge(config-system)# exit
vedge(config)# vpn 0
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# ip add 202.1.1.2/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# exit
vedge(config-interface-ge0/0)# ip route 0.0.0.0/0 202.1.1.1
vedge(config-vpn-0)# commit
Commit complete.
HQ1(config-vpn-0)#
HQ1(config-vpn-0)# exit
HQ1(config)#
HQ1(config)# exit
HQ1# request root-cert-chain uninstall
HQ1# request download http://admin:[email protected]/ROOT.ca
HQ1# request root-cert-chain install home/admin/ROOT.ca
HQ1#
HQ1# request vedge-cloud activate chassis-number 85d3cd20-4ba7-306e-296c-f1c18f83dd90
token 169f3cc6ede2fc1f57b6a1b0975ce05c
HQ1#
HQ1#
HQ2
vedge(config)# system
vedge(config-system)# site-id 1
vedge(config-system)# organization-name nb007
vedge(config-system)# vbond 100.1.1.13
vedge(config-system)# system-ip 172.16.0.12
vedge(config-system)# host-name HQ2
vedge(config-system)# exit
vedge(config)# vpn 0
vedge(config-vpn-0)# int ge0/0
vedge(config-interface-ge0/0)# ip add 203.1.1.2/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# allow-service netconf
vedge(config-tunnel-interface)# allow-service sshd
vedge(config-tunnel-interface)# exit
vedge(config-interface-ge0/0)# ip route 0.0.0.0/0 203.1.1.1
vedge(config-vpn-0)# commit
Commit complete.
HQ2(config-vpn-0)#
HQ2(config-vpn-0)# end
HQ2# request root-cert-chain uninstall
HQ2# request download http://admin:[email protected]/ROOT.ca
HQ2#
HQ2# request root-cert-chain install home/admin/ROOT.ca
HQ2# request vedge-cloud activate chassis-number 551a46e0-8581-092d-cb05-6664896e653c
token ad090a6033371ac79fa4d15499ff2e9a