DST 9.4 Lab Guide v1.3
DST 9.4 Lab Guide v1.3
DST 9.4 Lab Guide v1.3
Lab Guide
Version 1.2 – June 2024
Acknowledgements
Links to third-party websites take you outside the Hewlett Packard Enterprise website.
Hewlett Packard Enterprise has no control over and is not responsible for information outside
the Hewlett Packard Enterprise website.
To view the end-user software license agreement, go to: HPE Aruba Networking EULA
Table of Contents
Hands-on Labs - (eLearning Students Only) .................................................................. 4
Lab 1: Access Remote Lab............................................................................... 12
Lab 2: Configure Orchestrator Networking ..................................................... 16
Lab 3: Configure Orchestrator Getting Started Wizard .................................. 20
Lab 4: Configure Essential Orchestrator Features ......................................... 27
Lab 5: Run the Initial Config Wizard ................................................................ 34
Lab 6: Approve an Appliance from the Orchestrator ..................................... 39
Lab 7: Configure Deployment Profiles ............................................................ 51
Lab 8: Configure Additional Appliances ......................................................... 58
Lab 9: Approve Additional Appliances ............................................................ 68
Lab 10: Configure EdgeConnect HA .................................................................. 80
Lab 11: Deploy an Appliance Using Zero Touch Configuration ...................... 94
Lab 12: Configure Traditional HA .................................................................... 106
Lab 13: Modify Business Intent Overlays........................................................ 113
Lab 14: Monitor Flows ...................................................................................... 121
Lab 15: Run a Report ........................................................................................ 128
Appendix A: Solutions to Common Issues.............................................................. 135
Appendix B: Getting Support ................................................................................... 140
Appendix C: Summary of Orchestrator and EC-V Appliances ............................... 141
Appendix D: User IDs and Passwords Lab Access Code...................................... 142
Appendix E: DST Lab Topology ............................................................................... 143
INSTRUCTOR-LED Students
Skip blue pages, go directly to Lab 1
Lab Support
SASE Training Support
• Support for issues with the lab, the lab guide, and the Orchestrator and EC-V virtual machines.
Examples: appliance not registered, tunnel(s) down, connections not forming, etc.
• SASE training support is available Monday-Friday, 9:00 AM-5:00 PM US/Pacific. Emails sent
to the SASE training team outside of these hours will receive responses the following business
day.
• For help, send an email to SASE-Training@hpe.com. Include the following in your email:
1. Lab number and title
2. Your lab access code
3. Page number, task number, and step number in the lab guide
4. Brief description of the issue and a screenshot
ReadyTech Support
• Support for lab environment issues – inability to login to lab desktop, problems with
applications on the lab desktop, the lab freezing, etc.
• ReadyTech support is available 24x7.
• For help, send an email to get-support@readytech.com. You can also contact ReadyTech
support using the chat option in the support menu. The ReadyTech support team does not
have knowledge of the labs or lab guide and only supports the remote lab environment.
Note that solutions to common lab issues are in Appendix A at the end of the lab guide.
Materials
You will use this guide for every lab in the course. Unless you have multiple monitors, it can be
inconvenient to use the PDF to complete the labs. Therefore, it can be useful to print this lab guide.
Printing the lab guide will allow you to keep the lab on your screen while you follow instructions and
take notes on the printed copy.
We have found that if you only have a single screen and don’t print this manual, labs can take 30%
longer to complete, and students make 50% more errors because they are constantly switching back
and forth between the manual and the lab environment.
Lab Environment
Labs for this course are implemented in the ReadyTech hosted training environment.
IMPORTANT NOTE:
In order to access the lab, follow the process in the video "Hands on Lab - Part A" to request
a lab voucher through the purchase portal. There is a link in the video you click to
acknowledge that you understand the process and request a lab voucher.
used to register
for this course on
the HPE Aruba
Networking
training portal.
If this is incorrect it
can make it difficult
for you to get
support if needed.
5. Click Next
8. A Purchase confirmation
Deploying SD-WAN Technologies
DST Labs 1-9 (DST) PART A
2020.08
will be displayed.
14. Fill in your personal information - Input the Email you used to register for this
course in the HPE Aruba Networking training portal.
15. If this is incorrect it can make it difficult for you to get support if needed.
You will have one day—24 hours—of access time beginning when you click ‘Start the
lab’. If you do not start the lab within a few hours, you will not have time to complete
it. All EdgeConnect labs are designed to be completed within 4-5 hours.
However: If demand
is high and all
machines in the pool
have been deployed, you may have to wait the full length of time for your lab to fully deploy.
Do not click “Click here to connect”. Instructions to connect to the lab environment are in
the next lab.
Objectives
2. Select a language.
4. Click Log In
7. Click OK.
b. MS Teams (Instructor-Led)
Students ONLY – Notify your
instructor
10. Verify that the ReadyTech Viewer (HTML) is selected in the drop-down list. If another
option is present, change it to the ReadyTech Viewer HTML.
a. Password: Speak-123
The first time you open a webpage for VMware ESXi, the Orchestrator, or an
EdgeConnect Enterprise appliance during this course, you need to repeat steps 14 - 16
below.
Note: There are bookmarks for all tabs you need to access in the Google Chrome
browser bookmarks bar.
14. Open Google Chrome from the Landing Desktop. If it opens, close the “What’s new
with Chrome” browser tab.
16. Click Proceed to esxihost (unsafe). Google Chrome opens the VMware ESXi tab.
If you see any pop-up warning messages about the configured guest OS in VMware ESXi,
you can close or dismiss them.
a. Username: admin
b. Password: Speak-123
If you’re unable to log in to VMware ESXi, click Google Chrome’s refresh button on
the Landing Desktop or close / re-open the browser tab and then try again.
As you work with this student guide, be sure to follow all of the written instructions.
Screenshots provide additional context and are not a replacement for the written
instructions. In the event that an image differs from written instructions, always follow the
written instructions. As you follow the steps in a task, be aware that additional information
might be on the next page.
Objectives
Instructions
Task 1: Configure New Linux Root and Admin Account Passwords
If you need to enter commands in a VMware console window, and it displays incorrect
characters, you can find instructions on non-US keyboard setup and using the on-screen
keyboard in Appendix A, Issue #3.
2. Right-click on the Orchestrator VM, and then hover through Console and then click
on Open console in new tab or Open console in new window.
a. User: admin
b. Password: admin
Caution: In the following steps, ensure that you use the password Speak-123 for
the Linux admin and root accounts. Otherwise, you can accidentally lock yourself
out of Orchestrator. We cannot perform password recovery for Orchestrator in the
ReadyTech environment.
6. Orchestrator prompts
you to enter a new
password for the
Linux root account.
Enter the password
Speak-123.
8. After your enter the new passwords, Orchestrator displays the message Successfully
updated passwords.
g. IP address: 192.168.1.254
h. Netmask: 255.255.255.0
i. Gateway: 192.168.1.253
None of the 7 optional items displayed after the DNS settings will be configured.
Press <enter> and you will be returned to the Orchestrator prompt.
15. You may need to click the VMware ESXi refresh button to see the IP
address change on the Orchestrator.
16. In the list of virtual machines, verify the IP address for the
Orchestrator is 192.168.1.254.
If the status of a VM is Warning, click refresh above the list of virtual machines. The
status should change to Normal. This is only a cosmetic issue. Any yellow warning
alarms for VMs in the ESXi host may be ignored.
Learning Check
Answer the following questions:
3) What is the difference between the Linux admin and root passwords and the Orchestrator
admin password?
Linux passwords are used for the OS running on the VM; Orchestrator password is used to access the GMS application.
Instructor:
• Cancel unused lab codes before the first 3 hours of class have passed.
Objectives
Instructions
Task 1: Generate an Account Name and Account Key for the
Orchestrator and EdgeConnect Virtual Appliances
1. On the Landing Desktop’s desktop, click the DST Lab Files shortcut.
4. Leave the License.txt file open, you will use it later when deploying the appliances.
The file is saved on the desktop. If you close the License.txt file, click the License.txt
icon on the Landing Desktop’s dekstop.
5. In Google Chrome, click the second tab to access the Orchestrator UI should
already be open. You may need to refresh the webpage to connect to the
Orchestrator. There is also a bookmark for the Orchestrator in the browser’s
bookmark bar. Alternatively, you can enter https://192.168.1.254 into the address
bar.
When you connect to the Orchestrator, EdgeConnects or VMware ESXi host, you may
use the bookmarks in the Chrome browser. There are two bookmark folders for the
EdgeConnects – one contains the initial DHCP addresses and the other contains the
static addresses that you will configure after fully deploying each appliance. If you don’t
use a bookmark and instead manually enter the url to reach one of the lab devices in the
Chrome browser, you must use https:// (http:// will not work).
6. Click Advanced if the “Your connection is not private” window appears, and then
click Proceed to 192.168.1.254 (unsafe).
b. Password: admin
8. Click Login.
a. Password: Speak-123
b. Confirmation: Speak-123
12. You will be required to login again using the new password (admin / Speak-123).
13. If Orchestrator notifications appear in the upper-right corner (e.g. Generate New Key
Now), click Close, Dismiss, or Don’t Show Again.
Licensing Information
14. Click on EdgeConnect under Select Products on the License and Registration tab.
Email Settings
g. Server Port: 25
20. Click Test to the right of the “Send a Test Email to” field.
You should see this message at the bottom of the screen.
If the test isn’t successful, verify the settings. Everything is visible except the
passsword. When in doubt, delete the password and carefully re-enter it.
Note that it can take a minute or so for the email test to complete.
Backup Settings
a. Protocol: FTP
b. Hostname: 192.168.1.200
c. Username: anonymous
d. Password: Speak-123
e. Directory: /GMS
f. Port: 21
23. Click Test to define the Max backups to retain. If the test is not successful, verify the
settings. If the test is successful, Orchestrator shows a success message. If
everything looks correct, delete and enter the password.
a. Frequency: Weekly
b. Day: Saturday
c. Time: 08:00
You turn off this setting for the DST labs to prevent numerous software release notification
pop-ups from opening in Orchestrator. You will not be upgrading the software in this lab.
In a production SD-WAN, you don’t need to turn off this Orchestrator setting.
30. From the Advanced Properties tab, enter software in the Search field.
You might need to dismiss new software release notifications if they appeared before you
changed the setting to false. After you do this, additional new software release
notifications won’t appear.
TrainingDemoAcct00000
If you click on the blue padlock at the end of the Account Key field, you will see all of the
characters in plain text.
Note: You can copy the account name and key from the Cloud Portal tab on the
Orchestrator and paste into an appliance if necessary.
Learning Check
Answer the following questions:
4) If you cannot locate the License.txt file, where can you find the account name and key?
Account info can be found on the Orchestrator’s Cloud Portal tab – or on any deployed appliance.
Objectives
Instructions
Task 1: Rename Group 1 to Site 1 - Singapore
The Orchestrator’s appliance tree is located in the left margin of the Orchestrator UI. You
can edit an existing group, create new groups and sub-groups under an existing group.
1. From Orchestrator’s Appliance Tree, right-click Group 1, and then click Rename.
3. Click OK.
6. Click OK.
The syntax used to create the Site 3 group name must match exactly what is used in the
preconfiguration file to deploy ECV-5 in Lab 11 or an error will occur. Note that there is a
space before and after the dash between “3” and “Santa Clara”: Site 3 – Santa Clara.
The student guide provides detailed instructions for each task. If something doesn’t function
as expected, double-check the instructions to determine if a mistake or omission was made.
Caution: Don’t delete any of the preconfigured interface labels, because you will
use them when deploying the appliances.
Orchestrator comes with preconfigured LAN and WAN interface labels. The LTE (Hub &
Spoke) label’s topology in the BIOs indicates that regardless of an overlay’s topology, the
WAN interface with this label only establishes an underlay to a hub appliance. In this lab,
you will change this setting to make cross-connect underlays to INET1 interfaces possible
in Mesh topologies. Both LTE and INET1 interfaces are in cross-connect group 1. This is
what allows these unlike labels to create underlay tunnels. You cannot cross-connect
public connections (e.g. broadband & LTE) to private connections (MPLS).
9. Click the edit icon for the LTE (Hub & Spoke) WAN interface label.
10. Click the Topology drop-down list, and then click any.
During this lab, you will choose which templates to include in the Default Template Group.
This allows you to configure these settings once, and then simultaneously apply them to
all of the appliances. This reduces the risk of incorrectly configuring settings and saves
time.
20. Click and drag these templates from the Active Templates column to the Available
Templates column to remove them from the Default Template Group:
a. SNMP
b. Admin Distance
c. Routes
d. Shaper
a. DNS
b. Date/Time
c. User Management
d. Management Services
e. Session Management
23. Click Hide to remove the Available Templates column from view.
The DNS and Management Services templates already have the necessary
settings.
a. Click the X to the right of the pre-configured NTP server to delete it.
c. Click Add.
Server: 192.168.1.151
Learning Check
Answer the following questions:
3) What is a template?
You configure settings in a template that Orchestrator applies to multiple appliances.
Objective:
Instructions
Task 1: Become Familiar with VMWare ESXi vSwitch Port Groups
1. Unless it is already open, add a new tab in Google Chrome on the Landing Desktop,
and then open the DST Lab Topology bookmark.
2. Review the DST Lab Topology diagram. The gold-colored ovals represent the
vSwitch port groups to which each VM connects that allow them to communicate
with one another. Think of the vSwitch port groups like a physical switch that has
devices connected to it with cables. VMware ESXi uses virtual network switches, or
vSwitches, to interconnect its VMs. Each vSwitch has a port group. The port group
defines how the interfaces of each VM connect to a vSwitch.
ECV-1 Information
SW 01 -
1 Management mgmt0
2 SW 02 lan0
3 SW 03 wan0
4 SW 04 wan1
5 SW 05 wan2
ECV-1 is already installed, but not completely configured. The IP address for each
appliance and the Orchestrator should appear in the VM list in the ESXi host.
If the IP address field displays “Unknown” then click the refresh button above the VM list.
If the IP address does not appear after refreshing the VM tab, then notify your instructor.
Self-paced students:
contact training support at
SASE-Training@hpe.com.
If your cursor becomes stuck in the VMware ESXi console window, enter CTRL+ALT on
your keyboard to release the cursor. If you’re using a Mac computer, enter
CTRL+Option.
11. Click the ECV-1 (192.168.1.41) bookmark. If you choose to open a browser tab and
enter the ECV-1 DHCP IP address instead of using the bookmark, be sure to enter
https:// before the IP address.
12. Click through any Google Chrome security warnings that might appear.
a. Username: admin
b. Password: admin
21. Close the ECV-1 tab. You don’t need to wait for the
EdgeConnect to reboot.
IMPORTANT NOTE: It will take approximately 7 minutes for the Approve button to turn
green after the appliance is discovered. This is a good time to take a short break. In
the Appliances Discovered, compare the timestamp in the Discovered Time column with
the system clock in the bottom right corner of the Landing Desktop to determine how
long it has been since the appliance was discovered.
Learning Check
Answer the following questions:
2) Where do you configure the Initial Config Wizard – on the Orchestrator or the appliance?
From the Appliance Manager web interface.
Objectives
Instructions
Task 1: Verify that ECV-1 Has Finished Rebooting
You can view the reboot process from the ESXi host by clicking on the ECV-1 icon on the
Virtual Machines tab of the ESXi host. This will display ECV-1’s console where you can
watch it go through the boot process.
2. Look at the row for ECV-1 and verify its DHCP IP address is displayed
(192.168.1.41).
4. If the DHCP address remains unassigned, Appendix A (Issue #4) describes how to
reset an appliance to its defaults. Then go through the Initial Config Wizard on the
appliance again.
d. City: Singapore
g. Country: Singapore
11. Click the Deployment Profile drop-down list, and then click MPLS + Internet + LTE
Branch. This profile will be edited and used to configure ECV-1.
a. Outbound = 6,000
b. Inbound = 6,000
RealTime: Selected
BulkApps: Selected
DefaultOverlay: Selected
25. Click Apply on page 5. Orchestrator shows a list of operations on the Appliance
Wizard window. All of them should have a status of Success, and the overall status
should be Success. If one of the operations should fail, click Go Back, and then click
Apply again.
26. When all of the operations show Success, click Close on the Appliance Wizard
window.
You will need to wait until ECV-1 has finished deploying in the Orchestrator before moving
on to the next step. Note that ECV-1 is the only appliance at this point, so no tunnels will
be built.
37. Click Save Changes in the upper-right area. You might have to
wait for a few seconds for this button to appear. Depending on
the auto-save cycle, the Save Changes button may not appear.
During this task, you will configure a global internet breakout IP SLA that applies to all of
the overlays. EdgeConnect appliances use this IP SLA to verify that the internet is
reachable in order to perform local internet breakout. If all the targets you specify in the IP
SLA are not reachable, the EdgeConnect uses the next option in the Preferred Policy
Order. If no other options are present, then it uses the Drop option.
39. Open the Business Intent Overlays tab. (Click Configuration Overlays &
Security Business Intent Overlays.)
40. Click Breakout Traffic to Internet & Cloud Services on any one of the BIOs. Using
the instructions below, edit the IP SLA target addresses in one of the BIOs and the
changes will propagate to all the BIOs.
a. sp-ipsla.silverpeak.cloud,8.8.8.8,8.8.4.4,11.1.1.11
There may be specific Internet devices that are important for your network, so we will
demonstrate how to change the default IP SLA targets in this task. As an important
device in the lab internet, you will add UBU-1's address (11.1.1.11) into the IP SLA
addresses list to verify the lab internet is reachable. Note that 11.1.1.11 is a public IP
address but is not reachable on the real internet, only inside of the Ready Tech lab.
43. Click Save on the IP SLA Rule Destination window. Orchestrator displays a success
message.
44. Close the Overlay Configuration window using the “X” on the top right.
46. Review the DST Lab Topology, and then answer these questions:
At this point, Orchestrator has the four preconfigured BIOs. All of the BIOs now use the
global IP SLA that includes 11.1.1.11. These addresses will be used to determine if the
internet is reachable. These addresses are combined with a Boolean “or”, This means if
none of these IP addresses are reachable, the internet is considered unreachable and the
Breakout Locally option will not work. If any one of the IP addresses is reachable, then
the internet is considered to be up and Breakout Locally will be used.
During this task, you test Internet connectivity on ECV-1 by pinging UBU-1 which is
located on the lab Internet. Pings will be sourced from ECV-1’s lan0 interface which is the
same subnet as the connected host. The Ping / Traceroute utility is run from the appliance
manager, not the Orchestrator.
For a ping, you must identify the source address or interface in the options field preceded
with a “-I”. For example, “-I 10.110.10.100” or “-I wan1”.
For a traceroute you must identify the source address or interface in the options field.
Precede the source IP address with a “-s”. Precede the source interface with “- i”. For
example, “-s 10.110.10.100” or “-i wan1”.
Note that the options for traceroute are both in lowercase while ping uses an uppercase I
(i.e. “-I”). If a source is not specified, then the management interface is used by default.
52. Click the Start button and it will change to Stop. You should see successful replies in
in the Output field.
In this lab we are not using Routing Segmentation. If segmentation is configured, then
you would choose the correct segment for the ping or traceroute.
This time you will trace the path that ECV-1’s lan0 interface takes to the internet. UBU-1
represents the internet in the lab due to restrictive firewalling in the ReadyTech
environment.
You should see the traceroute going through ECV-1’s internet connection on wan1. The
first hop in the traceroute is wan1’s next hop address, 10.110.104.1.
Learning Check
Answer the following questions:
1) How do you know an appliance is ready for approval from the Orchestrator?
The Appliances Discovered button will appear – flash briefly and then turn solid.
3) What do you do after you click the Approve button for an appliance?
Complete the Appliance Wizard – System info, Deployment profile, Loopbacks, Subnet Sharing and BIOs / Template Groups
5) Why do you need to specify a data path source IP address for a ping or traceroute?
If you don’t do this, the EdgeConnect uses the IP address of its mgmt0 interface as the source IP address.
Objectives
Choose WAN and LAN interfaces and subinterfaces, and configure their settings: labels,
FW mode, interface & total WAN bandwidth, Boost bandwidth, and licensing.
These Deployment Profiles will be used to deploy three appliances in an upcoming lab
where you will deploy ECV-5 using a preconfiguration file.
Instructions
Task 1: Create the “Branch Office EdgeHA – MPLS” Deployment
Profile
You will modify the preconfigured MPLS Only Branch deployment profile, and then Save
As with a different name to create the Branch Office EdgeHA - MPLS deployment profile.
In a later lab, you will then apply the Branch Office EdgeHA - MPLS deployment profile to
ECV-2 at Site 2 - Mumbai.
a. lan0: Data
a. wan0: MPLS1
9. Verify the NAT flag setting of the WAN interface (just below WAN next-hop):
In a production SD-WAN, you would configure the NAT Flag setting for the internet and
4G LTE interfaces when upstream devices perform NAT. There are no upstream NAT
devices in this lab.
You will modify the Branch Office EdgeHA - MPLS profile you just configured, and then
Save As with a different name to create the Branch Office EdgeHA - Internet/LTE
Deployment Profile.
In a later lab, you will apply the Branch Office EdgeHA - Internet/LTE Deployment
Profile to ECV-3 at Site 2 - Mumbai.
a. wan0: INET1
a. wan1: LTE
20. Verify and change the FW mode (firewall mode) on the WAN interfaces:
a. wan0: Stateful+SNAT
b. wan1: Stateful+SNAT
21. Verify the NAT Flag setting for each WAN interface:
In a production SD-WAN, you would configure the NAT Flag setting for the internet and
4G LTE interfaces when upstream devices perform NAT. In this training lab, this isn’t
necessary.
2,000 inbound
You will modify the Branch Office EdgeHA - Internet/LTE Deployment Profile and then
Save As with a different name to create the Data Center HA Deployment Profile.
In a later lab, you will apply the Data Center HA Deployment Profile to ECV-4 at Site 3 –
Santa Clara. ECV-5 will also be located at Site 3 but will use a preconfiguration file
instead of a deployment profile for configuration.
b. sub-interface: 132
a. Label: MPLS1
a. Label: INET1
b. FW Mode: Stateful+SNAT
33. Verify the NAT Flag setting for each WAN interface:
35. Click ∑ Calc to set the Total Outbound and Total Inbound WAN bandwidth settings
to 8,000 each.
36. Verify that the EC drop-down list in the EdgeConnect Licensing section is set to 50
Mbps.
Learning Check
Answer the following questions:
5) What is the difference between a Deployment Profile and the Deployment page?
Deployment Profile contains no IP addresses – can be used with multiple appliances. Deployment Screen IP address fields are configurable –
intended for a single appliance.
Objectives
Complete the Initial Config Wizard for ECV-2, ECV-3, and ECV-4.
IMPORTANT NOTE: It will take approximately 7 minutes for the Approve button to turn
green after the appliance is discovered. This is a good time to take a short break. In
the Appliances Discovered, compare the timestamp in the Discovered Time column with
the system clock in the bottom right corner of the Landing Desktop to determine how
long it has been since the appliance was discovered.
Instructions
Task 1: Record the MAC Addresses of ECV-2’s Network Adapters
2. Right-click the name of ECV-2 in the list of virtual machines and click Edit Settings..
ECV-2 Information
1 SW 01 - Management mgmt0
2 SW 06 lan0
3 SW 08 wan0
4 SW 11 wan1
ECV-2 is already installed, but not completely configured. The next few steps show
another method for determining the mgmt0 IP address of an EC-V.
If your cursor becomes stuck in the VMware ESXi console window, enter CTRL+ALT on
your keyboard to release the cursor. If you’re using a Mac computer, enter CTRL+Option.
11. Click the ECV-2 (192.168.1.42) bookmark. If you choose to open a browser tab and
enter ECV-2’s mgmt0 DHCP IP address instead of using the bookmark, be sure to
enter https:// before the IP address.
12. Click through any Google Chrome security warnings that might appear.
a. Username: admin
b. Password: admin
14. Click Login to open the
Initial Config Wizard.
You might need to zoom out on the Landing Desktop browser to see the Initial Config
Wizard near the bottom of the list.
21. Close the ECV-2 tab. You don’t need to wait for the
EdgeConnect to reboot.
25. Review each network adapter’s settings, and then record the last two digits of each
MAC address in the following table.
ECV-3 Information
1 SW 01 - Management mgmt0
2 SW 06 lan0
3 SW 09 wan0
4 SW 10 wan1
5 SW 11 wan2
If your cursor becomes stuck in the VMware ESXi console window, enter CTRL+ALT on
your keyboard to release the cursor. If you’re using a Mac computer, enter CTRL+Option.
32. Click the ECV-3 (192.168.1.43) bookmark. If you choose to open a browser tab and
enter the ECV-3 DHCP IP address instead of using the bookmark, be sure to enter
https:// before the IP address.
33. Click through any Google Chrome security warnings that might appear.
a. Username: admin
b. Password: admin
35. Click Login to open the Initial Config Wizard. If the Initial Config Wizard doesn’t
automatically appear after you log in, click Configuration System & Networking
Initial Config Wizard on the appliance’s menu to open it.
You might need to zoom out on the Landing Desktop browser to see the Initial Config
Wizard near the bottom of the list.
42. Close the ECV-3 tab. You don’t need to wait for the EdgeConnect to reboot.
44. Right-click the name of ECV-4 in the list of virtual machines and then Edit Settings.
46. Review each network adapter’s settings, and then record the last two digits of each
MAC address in the following table.
ECV-4 Information
1 SW 01 - Management mgmt0
2 SW 13 lan0
3 SW 15 wan0
4 SW 16 wan1
If your cursor becomes stuck in the VMware ESXi console window, enter CTRL+ALT on
your keyboard to release the cursor. If you’re using a Mac computer, enter CTRL+Option.
53. Click the ECV-1 (192.168.1.44) bookmark. If you choose to open a browser tab and
enter the ECV-4 DHCP IP address instead of using the bookmark, be sure to enter
https:// before the IP address.
54. Click through any Google Chrome security warnings that might appear.
a. Username: admin
b. Password: admin
56. Click Login to open the Initial Config Wizard. If the Initial Config Wizard doesn’t
automatically appear after you log in, click Configuration > System & Networking >
Initial Config Wizard on the appliance’s menu to open it.
You might need to zoom out on the Landing Desktop browser to see the Initial Config
Wizard near the bottom of the list.
63. Close the ECV-4 tab. You don’t need to wait for the
EdgeConnect to reboot.
Learning Check
Answer the following questions:
1) Why do you record the MAC addresses of the virtual network adapters of the ESXi host?
These MAC addresses are each assigned to a specific switchport group which is associated to the local network. These MAC addresses are then
assigned to the physical interfaces during the Initial Config Wizard so that the interfaces are also associated with the correct switchport group.
Objectives
Use the previously configured Deployment Profiles with the Appliance Wizard.
Instructions
Task 1: Verify that ECV-2, ECV-3, and ECV-4 Have Finished
Rebooting
1. From VMware ESXi, click Virtual Machines in the Navigator pane.
2. Look at the row for ECV-2 and verify its DHCP IP address is displayed
(192.168.1.42).
Verifying that the EdgeConnect appliances have finished rebooting helps to ensure that
Orchestrator shows them as Reachable during a later task.
8. From Orchestrator’s Discovered Appliances tab, on the row for ECV-2, click the
green Approve button. The row will highlight when clicked as shown for ECV-2 below.
d. City: Mumbai
g. Country: India
15. Click Next on page 3. You won’t use loopback addresses during this course’s labs.
18. The following items on page 5 should be pre-selected, if not, then click in each box to
select them:
RealTime: Selected
BulkApps: Selected
DefaultOverlay: Selected
19. Click Apply on page 5. Orchestrator shows a list of operations on the Appliance
Wizard window. All of them should have a status of Success, and the overall status
should be Done. If one of the operations should fail, click Go Back, and then click
Apply again.
20. When all the operations show Success, click Close on the Appliance Wizard
window.
After you approve each appliance and complete its Appliance Wizard, several alarms will
appear in the appliance tree including critical alarms about tunnels being down. You can
safely ignore such alarms. The automated process that establishes tunnels between
appliances takes about 5 - 10 minutes to finish. Note that additional tunnel alarms will
appear immediately after EdgeConnect HA is configured but will eventually clear.
21. From Orchestrator’s Discovered Appliances tab, on the row for ECV-3, click the
green Approve button. The row will highlight when clicked as shown for ECV-3
below.
d. City: Mumbai
g. Country: India
28. Click Next on page 3. You won’t use loopback addresses during this course’s labs.
31. The following items on page 5 should be pre-selected, if not, then click in each box to
select them:
RealTime: Selected
BulkApps: Selected
DefaultOverlay: Selected
32. Click Apply on page 5. Orchestrator shows a list of operations on the Appliance
Wizard window. All of them should have a status of Success, and the overall status
should be Done. If one of the operations should fail, click Go Back, and then click
Apply again.
33. When all the operations show Success, click Close on the Appliance Wizard
window.
Yes, this group is incorrect! - you will change this later in the appliance tree.
e. State: California
g. Country: US
41. Click Next on page 3. You won’t use loopback addresses during this course’s labs.
44. The following items on page 5 should be pre-selected, if not, then click in each box to
select them:
RealTime: Selected
BulkApps: Selected
DefaultOverlay: Selected
45. Click Apply on page 5. Orchestrator shows a list of operations on the Appliance
Wizard window. All of them should have a status of Success, and the overall status
should be Done. If one of the operations should fail, click Go Back, and then click
Apply again.
46. When all the operations show Success, click Close on the Appliance Wizard
window.
48. From the Orchestrator’s appliance tree, right-click ECV-2, and then click Appliance
Manager. Orchestrator logs into the admin account of the appliance’s web interface.
53. Click Save Changes in the upper-right area. You might have to wait
for several seconds for this button to appear.
a. ECV-3: 192.168.1.6/24
b. ECV-4: 192.168.1.7/24
Task 10: Move ECV-4 into the Site 3 – Santa Clara Group
ECV-4 was configured in the Site 2 – Mumbai group in the appliance tree. It should be at
Site 3 – Santa Clara. You will see how simple it is to change the group for an appliance,
and that it has no effect on the tunnels built on the appliance.
59. Click OK
Task 11: Use the Link Integrity Test between ECV-1 and ECV-2
Now that the SD-WAN network is built, you will test the performance on the MPLS
underlay tunnels between ECV-1 and ECV-2.
Caution: The Link Integrity Test is service impacting. Only use this tool during a
scheduled maintenance window.
60. From Orchestrator’s appliance tree press and hold the control key and click to
select only ECV-1 and ECV-2.
a. Bandwidth : 2000
b. Bandwidth : 2000
c. Duration: 10
d. DSCP: any
a. The test runs first in one direction, and then in the other direction.
d. Each row is one second and shows the amount of data transferred, the
bandwidth, the jitter, and the amount of packet loss.
Learning Check
Answer the following questions:
Objectives
Observe the connections made between the devices and the tunnels built across the
connection.
Instructions
Task 1: Enable EdgeConnect HA on ECV-2 and ECV-3
In this task, you will peer the two appliances by editing the deployments for ECV-2 and
ECV-3 to enable EdgeHA mode, select the EdgeConnect HA interfaces and recalculate
the Total WAN bandwidth and Boost bandwidth.
EdgeHA can only be enabled from the Orchestrator, not from the appliances.
1. Right-click ECV-2.
2. Select Deployment
wan1
wan2
This updates the Total Outbound and Total Inbound at the bottom of the page to 6,000
kbps. Each appliance needs to be able to handle the total throughput for the outbound
interfaces on both machines since they both have access to all 3 WAN interfaces.
13. From the VRRP tab, click the edit icon next to ECV-2.
a. Group ID: 1
b. Interface: lan0
e. Preemption: Selected
a. Group ID: 1
b. Interface: lan0
e. Preemption: Selected
24. In the top-left, click the Details button for ECV-2, and then ECV-3. Click refresh if
needed. It may take a minute or two for the VLANs to display.
25. Click the header of the HA Interface column twice to sort the interfaces by HA status.
You might need to scroll the browser window to the far right to see this column.
The Interface column that shows that VLAN interfaces have been automatically
configured for ECV-2 and ECV-3. VLANs 100, 101, and 102 are in use (e.g. wan1.102 on
ECV-2). One VLAN is in use for each WAN interface.
Both ECV-2 and ECV-3 show interfaces with MPLS, LTE and Internet labels, one
appliance making use of the physical wan0 and wan1 connections, and the other making
use of the HA connections. The HA interfaces have automatically assigned vlans – e.g.
wan1.100 or wan2.102. These interfaces are assigned addresses in 169.254.1.X/30
ranges by default.
Remember that only ECV-2 has a physical connection to the MPLS network, even though
ECV-3 shows MPLS1 on the wan2.102 interface. This is because a logical connection has
been created across the HA link so ECV-3 can access MPLS through ECV-2. Similar
connections have been made so ECV-2 can access INET1 and LTE on ECV-3.
Based on the information in the Deployment and Tunnels tabs, which interface on ECV-2
is used to access LTE? _________ INET1? _________
The VLAN interfaces dynamically created by the Overlay Manager process show up here
also.
31. Sort on Local IP:Port by clicking the column heading twice to bring the highest
numbered IP addresses to the top.
You can click on the column header Local IP:Port to sort by IP address – click it twice so
the 169.254.1.X interfaces are at the top of the list. Here, the tunnels with 169.254.1.x IP
addresses are displayed at the top. These are tunnels built across the HA interfaces to
machines across the network, but they are reachable via the other HA appliance’s WAN
interfaces and are terminated on the local HA interface IP address.
Also note the Remote IP:Port column. This shows where the remote ends of the tunnels
are being terminated. Examine your topology diagram. You will see these are WAN
interface IP addresses on other appliances.
33. Again Sort on Local IP by clicking twice on the Local IP column heading to bring the
HA tunnels to the top.
Note that there are passthrough tunnels built for all the overlays terminating on the HA
interface addresses. There is one passthrough tunnel for each overlay to each WAN
interface on each of the machines in the HA pair.
If you are doing local internet breakout for traffic going over the HA interface to reach a
WAN interface on a neighboring HA device, it may use one of these passthrough tunnels.
We’ll be doing local internet breakout in a later lab.
Notice that there is not a remote IP. This is because a passthrough “tunnel” is not really a
tunnel. The way the feature works is by utilizing the same mechanisms as the tunnels
which is why it is referenced as a tunnel. So, keep in mind, traffic transiting a passthrough
tunnel will be directed to the next-hop router on the local interface where the passthrough
tunnel connects to the WAN or LAN.
For inbound traffic to Site 2, you want the VRRP Master (ECV-2) to advertise the best
metric for the LAN subnet – 10.110.20.0/24. You will accomplish this by reconfiguring the
Subnet Sharing metric on ECV-3 from 50 to 60. ECV-2 will remain at the default of 50
and therefore be the preferred route to the advertised LAN subnet.
40. Find the routes to the 10.110.20.0/24 network in the Routes table. The route learned
from ECV-2 has a metric of 50 while the route learned from ECV-3 has a metric of 60.
ECV-2 and ECV-3 are both connected to the 10.110.20.0/24 subnet and are both sharing
this prefix with other appliances using subnet sharing. Now that ECV-3 has been
reconfigured with a higher metric, other appliances learning the 10.110.20.0/24 prefix will
prefer the path through ECV-2 because it has a lower metric of 50.
In the event of a VRRP failover the advertised metric can be changed so that other
appliances prefer the route to the new VRRP master. This can be accomplished by
configuring an IP SLA to monitor the VRRP status of the appliances. IP SLAs can be
used to monitor a variety of inputs which can trigger various types of reactions such as
changing routing metrics, lowering VRRP priority, raising an alarm and many more. For
more information, the configuration of the different types of IPSLAs is covered in the
Advanced SD-WAN Deployments (ASD) course.
Now that there are two gateways at Site 2, you will need to change the default gateway on
TG-2011 to the VRRP Virtual IP address. TG-2011 will always forward traffic to the same
IP address regardless of which appliance is the VRRP master.
Caution: Be sure you click the Start button of TG-2011, not the Landing Desktop.
53. The default gateway currently points to ECV-2’s lan0 interface (10.110.20.101).
54. Change the Default Gateway address to 10.110.20.100 (i.e. VRRP VIP).
To test VRRP failover, you will traceroute the path from TG-2011 to TG-1011 and
examine the path that it takes, noting that the first hop is ECV-2. Then you will “admin
down” lan0 on ECV-2 and run the traceroute again. This time you will notice that it takes
a different path with ECV-3 as the first hop instead of ECV-2.
59. From TG-2011’s desktop, open the Command Prompt, and then enter the command
tracert 10.110.10.11.
61. Right-click ECV-2 in the Orchestrator’s appliance tree, and then click Appliance
Manager.
73. Go back to the VRRP tab and verify when ECV-2 takes back over the master role.
74. After ECV-2 shows it is the VRRP master, go to TG-2011’s command prompt and
press the up arrow on the keyboard to perform the traceroute to TG-1011
(10.110.10.11) again.
Learning Check
Answer the following questions:
2) What is one protocol that may be used to allow hosts on a LAN to have more than one
gateway to the WAN?
VRRP is used on connections to a layer 2 switched LAN. Routing protocols such as BGP and OSPF if connecting to a layer 3 devices on the LAN
can also work.
4) Why did you change the default gateway of TG-2011 after configuring VRRP?
The original default gateway pointed directly to ECV-4’s lan0. After reconfiguring, it is now pointing to the VRRP VIP – so it doesn’t matter which
appliance is forwarding, either one can answer for traffic sent to the VIP – depending on which is the VRRP master.
Objective
Instructions
Task 1: Create a Preconfiguration File for ECV-5
1. From Orchestrator, open the
Preconfigure Appliances tab.
(Configuration Overlays &
Security Discovery
Preconfiguration)
7. Open the
ECV-5_YAML.txt file.
11. Click Save. The file appears in the Preconfigure Appliances list with a status of
Pending Discovery.
14. Review each network adapter’s settings, and then record the last two digits of each
MAC address in the following table.
ECV-5 Information
SW 01 -
1 Management mgmt0
2 SW13 lan0
3 SW 15 wan0
4 SW 16 wan1
ECV-5 is already installed, but not completely configured. The next few steps show one
method for determining the mgmt0 IP address of an EC-V.
If your cursor becomes stuck in the VMware ESXi console window, enter CTRL+ALT on
your keyboard to release the cursor. If you’re using a Mac computer, enter
CTRL+Option.
b. Password: admin
30. Close the ECV-5 tab. You don’t need to wait for
the EdgeConnect to reboot.
Note that if you forget to configure the appliance tag in the Initial Config Wizard on the
appliance, you will still be prompted with the Apply Preconfiguration window. Simply
choose ECV-5_Config from the name drop-down and then apply the preconfiguration.
36. Before you apply the preconfiguration file, scroll through these lines of YAML code and
answer these questions:
DST 9.4. Lab Guide v1.2 – May 2024 page 100 of 144
INSTRUCTOR VERSION
You need to wait for several minutes while Orchestrator synchronizes with ECV-5. When
ECV-5 has a solid icon and text in Orchestrator’s tree view, the synchronization is done.
41. From Orchestrator’s Appliance Tree, right-click ECV-5, and then click Appliance
Manager. Orchestrator logs in the admin account to the web interface of the ECV-5
appliance.
45. Click Apply. A status window with Applying Hostname/IP changes appears. If this
continues for more than 1 minute, refresh the Google Chrome window from the
Landing Desktop.
After several minutes, the Orchestrator’s appliance tree shows the updated static
management IP address for each EdgeConnect.
Any additional appliances that are deployed will use the new key.
DST 9.4. Lab Guide v1.2 – May 2024 page 101 of 144
INSTRUCTOR VERSION
Before the Orchestrator and an appliance can fully communicate, they must have a
WebSocket connection. In addition, the appliance and the Orchestrator will also have
WebSocket connections with the Cloud Portal. In the event that the WebSocket directly
from the appliance to the Orchestrator goes down, communication can failover with the
Cloud Portal proxying the WebSocket connection between the two. You can test both
WebSocket connections on the appliance from the Orchestrator’s appliance tree.
49. Right-click on ECV-5 in the appliance tree and click on Connectivity from the menu.
WebSocket tests will be run and the results will be diplayed in the Appliance
Connectivity window.
• The top entry indicates the status of the WebSocket connection that traverses the
Cloud Portal.
• The bottom entry shows the WebSocket connection directly between the appliance
and the Orchestrator.
• You may also run an on-demand test from the Appliance Connectivity window.
DST 9.4. Lab Guide v1.2 – May 2024 page 102 of 144
INSTRUCTOR VERSION
This table includes the status of both WebSockets and indicates which one is active for
each appliance highlighted in the appliance tree.
The Fast WebSocket Failover mode was reconfigured to Aggressive for the above
screenshot. This sets the Ping Interval to 10 seconds and Max Idle Time to 60 seconds.
The Cloud Portal has connections to both the Orchestrator and the appliances. Each
appliance also has a WebSocket connection directly to the Orchestrator. In the event that
there is a failure on the direct WebSocket to the Orchestrator, the connection can be
proxied through the Cloud Portal to restore the WebSocket connection between the
appliance and the Orchestrator. In version 9.2 and earlier, legacy failover takes
approximately 10 minutes. The connection can now failover in 30 seconds when
Aggressive Mode is enabled.
53. On the Reachability tab, click on the Change WebSocket Failover Mode button.
DST 9.4. Lab Guide v1.2 – May 2024 page 103 of 144
INSTRUCTOR VERSION
When should you enable Fast WebSocket Failover? Anytime you want your
appliances to recover from a direct WebSocket failure to the Orchestrator in 30
seconds.
What is a scenario where you may not want to enable Fast WebSocket Failover? If
you have sites that are connected to the WAN using only LTE connections, the
increased bandwidth usage due to a reduced ping interval can affect performance at
these sites. Also, because LTE is a metered service, an increase in bandwidth usage
means a small increase in cost.
DST 9.4. Lab Guide v1.2 – May 2024 page 104 of 144
INSTRUCTOR VERSION
Learning Check
Answer the following questions:
3) Is it possible to opt out of using preconfiguration after an appliance has been approved?
Yes, from the Appliance Preconfiguration window there is a link in the lower left corner: Run the manual Appliance Wizard.
4) What is the failover / redirection time when the Fast WebSocket Failover Mode is set to
legacy?
Legacy (pre-9.4) = 10 minutes,; Slow = 90 seconds; Normal = 60 seconds; Aggressive = 30 seconds.
5) T/F – you cannot manage an appliance if its direct WebSocket connection fails?
False – The appliance is able to communicate with the Orchestrator through its Cloud Portal WebSocket connection.
DST 9.4. Lab Guide v1.2 – May 2024 page 105 of 144
INSTRUCTOR VERSION
Objectives
Instructions
Task 1: Configure the Same Site Name for ECV-4 and ECV-5
When EdgeConnect appliances are at the same site, they build IPsec UDP underlays
between like labels unless you specify the same site name on each appliance.
5. Click Save.
DST 9.4. Lab Guide v1.2 – May 2024 page 106 of 144
INSTRUCTOR VERSION
17. From the VRRP tab, click the edit icon next to ECV-4.
a. Group ID: 1
b. Interface: lan0
e. Preemption: Selected
DST 9.4. Lab Guide v1.2 – May 2024 page 107 of 144
INSTRUCTOR VERSION
a. Group ID: 1
b. Interface: lan0
e. Preemption: Selected
For inbound traffic to Site 3 - Santa Clara, you want the VRRP Master (ECV-4) to
advertise the best metric for the LAN subnet, 10.110.35.0/24. You will accomplish this by
reconfiguring the Subnet Sharing metric on ECV-5 to 60. ECV-4 will retain the default
of 50 and be the preferred route to the advertised LAN subnet.
DST 9.4. Lab Guide v1.2 – May 2024 page 108 of 144
INSTRUCTOR VERSION
31. Use the Search field to find the routes to the 10.110.35.0/24 network in the Routes
table. The route learned from ECV-4 has a metric of 50, while the route learned from
ECV-5 has a metric of 60.
ECV-4 and ECV-5 are both connected to the 10.110.35.0/24 subnet and share this prefix
with other appliances using subnet sharing. Now that ECV-5 has been reconfigured with
a higher metric, other appliances learning the 10.110.35.0/24 prefix will prefer the path
through ECV-4 because it has a lower metric of 50.
In the event of a VRRP failover, you can change the advertised metric so that other
appliances prefer the route to the new VRRP master. This can be accomplished by
configuring an IP SLA to monitor the VRRP status of the appliances. IP SLAs can be
used to monitor a variety of inputs which can trigger various types of reactions such as
changing routing metrics, lowering VRRP priority, generating an alarm, and many more.
For more information, the configuration of the different types of IP SLAs is covered in the
Advanced SD-WAN Deployments (ASD) course.
Now that there are two gateways at Site 3, you will need to change the default gateway on
TG-3511 to the VRRP Virtual IP address. TG-3511 will always forward traffic to the
same IP address regardless of which appliance is the VRRP master.
DST 9.4. Lab Guide v1.2 – May 2024 page 109 of 144
INSTRUCTOR VERSION
34. Choose TG-3511 from the Computer drop-down in the Remote Desktop window and
click Connect.
Caution: Be sure you click the Start button of TG-3511 and not the Landing
Desktop.
DST 9.4. Lab Guide v1.2 – May 2024 page 110 of 144
INSTRUCTOR VERSION
DST 9.4. Lab Guide v1.2 – May 2024 page 111 of 144
INSTRUCTOR VERSION
Learning Check
Answer the following questions:
1) Why do you configure Traditional HA peers to use the same Site Name?
The Overlay Manager will not build SD-WAN tunnels between appliances that are at the same site.
DST 9.4. Lab Guide v1.2 – May 2024 page 112 of 144
INSTRUCTOR VERSION
Objectives
Distinguish between passthrough traffic, backhauling internet traffic via an overlay, and
local internet breakout.
Instructions
Previously, you reviewed the default settings of the four preconfigured BIOs. As you recall,
the default settings use interfaces that the EdgeConnect appliances don’t have (INET2 &
MPLS2).
3. Open the SD-WAN Traffic to Internal Subnets tab of the RealTime BIO.
DST 9.4. Lab Guide v1.2 – May 2024 page 113 of 144
INSTRUCTOR VERSION
An overlay uses the SD-WAN Traffic to Internal Subnets settings to reach internal
destinations that match the subnets in the Internet Traffic Definition. SD-WAN traffic
includes breakout traffic backhauled to an EdgeConnect hub.
4. Remove unused interfaces by dragging and dropping these interfaces from the
Primary field to the Available Interfaces field:
a. INET2
b. MPLS2
5. Click the Add Backup if Above Are drop-down list, and then click Not Meeting
Service Levels.
a. Loss: 2%
b. Latency: 100 ms
7. Click the Peer Unavailable Option drop-down list, and then click Use MPLS1.
9. Remove the unused primary interface identified below by dragging and dropping it
from the Primary field to the Available Interfaces field.
a. INET2
DST 9.4. Lab Guide v1.2 – May 2024 page 114 of 144
INSTRUCTOR VERSION
a. Loss: 2%
b. Latency: 100 ms
ECV-2 doesn’t have INET1 or LTE interfaces and can’t perform local internet breakout.
So, it tries to use the Backhaul Via Overlay option in the Preferred Policy Order.
You will now add a rule to the Overlay ACL of the CriticalApps BIO. By default, CIFS
matches the DefaultOverlay.
DST 9.4. Lab Guide v1.2 – May 2024 page 115 of 144
INSTRUCTOR VERSION
22. Click the Boost drop-down list, and then click Enabled.
During this task, you will modify the BulkApps BIO, and change its topology to Hub &
Spoke.
27. From the SD-WAN Traffic to Internal Subnets tab, click the Boost drop-down list,
and then click Enabled.
DST 9.4. Lab Guide v1.2 – May 2024 page 116 of 144
INSTRUCTOR VERSION
30. Click the Boost drop-down list, and then click Enabled.
The Orchestrator pushed the BIO configuration changes to the EdgeConnect appliances.
ECV-1 has MPLS, INET, and LTE WAN interfaces. If you add ECV-1 as a hub, it acts as a
hub for every overlay that Orchestrator applies to it. Therefore, ECV-2 can backhaul
internet traffic to ECV-1.
DST 9.4. Lab Guide v1.2 – May 2024 page 117 of 144
INSTRUCTOR VERSION
The Overlay manager performs orchestration to push this configuration change to ECV-1
and synchronize with the other appliances.
41. Click the refresh button on the Hubs tab to see the updated hubs table that shows
ECV-1 if it doesn’t appear automatically.
44. Click the All Overlays drop-down list, review the topology map
for each overlay, and then answer these questions:
a. What is different about the BulkApps overlay’s topology than the other overlays?
BulkApps has a Hub & Spoke topology.
During this task, you test local internet breakout via ECV-4.
46. From the Landing Desktop, open a remote desktop window for TG-3511. (Start >
Remote Desktop Connection TG-3511 Connect)
47. From Orchestrator’s tree view, click 5 Appliances to select all of the EdgeConnect
appliances.
49. From Orchestrator’s Flows tab, enter 11.1.1.11 in the IP/Subnet filter field.
DST 9.4. Lab Guide v1.2 – May 2024 page 118 of 144
INSTRUCTOR VERSION
During this task, you will test backhauling CIFS breakout traffic via ECV-2.
flow details
DST 9.4. Lab Guide v1.2 – May 2024 page 119 of 144
INSTRUCTOR VERSION
58. Click the Flow Detail icon to view additional information about either flow via ECV-
2, and then answer these questions:
ECV-2 is the VRRP master receiving the traffic from TG-2011. Because of the
EdgeConnect HA link to ECV-3, ECV-2 is able to forward the traffic as passthrough
across the EdgeHA link to ECV-3 and then out the INET1 interface on ECV-3.
Learning Check
Answer the following questions:
1) How does the topology change to Hub & Spoke for the BulkApps BIO affect its tunnels?
IPsec UDP underlay tunnels are established from ECV-2 and ECV-4 to the hub, ECV-1.
3) Cifs_smb is a file transfer protocol. Why did this traffic match the CriticalApps BIO?
A rule permitting (Cifs_smb) port 445 was added to the overlay ACL in the CritricalApps BIO.
4) Besides changing the topology type in the BIO, what else is required to create a Hub &
Spoke topology?
At least one appliance must be configured as the hub for this topology.
DST 9.4. Lab Guide v1.2 – May 2024 page 120 of 144
INSTRUCTOR VERSION
Objectives
Identify flows.
Instructions
Task 1: Open an FTP Session Between TG-1011 and TG-2011
1. From Orchestrator’s tree view, press and hold the control key to select ECV-1 and
ECV-2.
5. Click Apply.
DST 9.4. Lab Guide v1.2 – May 2024 page 121 of 144
INSTRUCTOR VERSION
6. From the Landing Desktop, open a remote desktop window for TG-1011. (Start
Remote Desktop Connection TG-1011 Connect)
11. Click on the Flows tab to view ECV-1 and ECV-2 flows.
12. Click on Flow Details for the FTP flow via ECV-1, then ECV-2 and review the
output.
c. Which overlay tunnel does the outbound flow via ECV-1 use?
Outbound: to_ECV-2_BulkApps. Inbound: to_ECV-2_BulkApps.
d. Which overlay tunnel does the inbound flow via ECV-2 use?
Inbound: to_ECV-1_BulkApps. Outbound: to_ECV-1_BulkApps.
DST 9.4. Lab Guide v1.2 – May 2024 page 122 of 144
INSTRUCTOR VERSION
18. How many underlay tunnels does the BulkApps overlay use?
21 underlay tunnels (21/27 Rows).
19. If you want to find underlay tunnels with a down status on the Tunnels tab, how can
you identify them?
Status drop-down menu. Click the Status column to show down underlays at the top.
DST 9.4. Lab Guide v1.2 – May 2024 page 123 of 144
INSTRUCTOR VERSION
23. Open the Tunnel Bandwidth Trends tab. (Monitoring Bandwidth Tunnels
BW Trends)
a. Real Time
b. BulkApps
c. Outbound
27. The graph for to_ECV-2_BulkApps(ECV-1) shows the data that flows from TG-1011
to ECV-1 to ECV-2 on its way to TG-2011.
28. The graph for to_ECV-1_BulkApps(ECV-2) shows the data that flows from TG-2011
to ECV-2 to ECV-1 on its way to TG-1011.
29. Click Show Underlays below the graphs. These graphs show the data for the
underlays that carry the FTP flows.
DST 9.4. Lab Guide v1.2 – May 2024 page 124 of 144
INSTRUCTOR VERSION
a. Real Time
b. All Traffic
c. Outbound
34. The graphs show the overall bandwidth usage for ECV-1 and ECV-2.
DST 9.4. Lab Guide v1.2 – May 2024 page 125 of 144
INSTRUCTOR VERSION
A strength of EdgeConnect SD-WAN is its monitoring options. You can monitor the charts
for trend analysis over time. Some monitoring features have real-time view options, while
others display data after one hour or more.
35. Close the Tunnel BW Trends tab and the Appliance BW Trends tab.
Erasing network memory for an appliance is a tool you can use to measure baseline
performance against which you can measure the performance of an EdgeConnect
appliance’s populated disk cache. Don’t use this outside of a scheduled maintenance
window because it negatively affects performance until EdgeConnect rebuilds its disk cache.
39. From Orchestrator’s tree view, select only ECV-1 and ECV-2.
42. Click Close after the appliances have erased their network memory.
DST 9.4. Lab Guide v1.2 – May 2024 page 126 of 144
INSTRUCTOR VERSION
Learning Check
Answer the following questions:
DST 9.4. Lab Guide v1.2 – May 2024 page 127 of 144
INSTRUCTOR VERSION
Objectives
Create a report.
Schedule a report.
View a report.
Instructions
Task 1: Create a Report
1. From Orchestrator’s appliance tree, click 5 Appliances to highlight all appliances.
5. Click Save.
d. Application Charts:
Application Bandwidth
DST 9.4. Lab Guide v1.2 – May 2024 page 128 of 144
INSTRUCTOR VERSION
e. Tunnel Charts:
All Overlays b
a
Health Map
Flow Counts
Loss c e
Latency f
d
f. Appliance Charts
Top Talkers
Top Domains
Top Countries
7. Click Save.
a. Daily
b. Every day
c. Time: 03:00
Current date
DST 9.4. Lab Guide v1.2 – May 2024 page 129 of 144
INSTRUCTOR VERSION
20. Click the download icon to the right of the Hourly report. Google Chrome shows a
download notification in the top-right corner .
21. Go to the Downloads folder on the Landing Desktop and click to open on the
Hourly Training report.
DST 9.4. Lab Guide v1.2 – May 2024 page 130 of 144
INSTRUCTOR VERSION
By default, the Daily report statistics are summarized once per day over a 14-day
period. The Hourly report summarizes statistics every hour over a 24-hour period.
The time period for each report is configurable.
The statistics recorded in your lab may show different values than the example
screenshots.
DST 9.4. Lab Guide v1.2 – May 2024 page 131 of 144
INSTRUCTOR VERSION
27. Page 6 shows Tunnel Flow Counts. Answer the following question:
DST 9.4. Lab Guide v1.2 – May 2024 page 132 of 144
INSTRUCTOR VERSION
DST 9.4. Lab Guide v1.2 – May 2024 page 133 of 144
INSTRUCTOR VERSION
Learning Check
Answer the following questions:
You have reached the end of the labs for this course.
DST 9.4. Lab Guide v1.2 – May 2024 page 134 of 144
INSTRUCTOR VERSION
32. From the Landing Desktop, open VMware ESXi (https://esxihost) in Google Chrome.
38. Verify that Orchestrator reboots and returns to the Orchestrator login prompt.
DST 9.4. Lab Guide v1.2 – May 2024 page 135 of 144
INSTRUCTOR VERSION
If the appliance does not display an ip address in the VMware ESXi host.
If an appliance has not been discovered by the Orchestrator 10 minutes after completing
the Initial Config Wizard, then you will need to reboot the appliance.
1. Go to Virtual machines on the ESXi host. Click the checkbox next to the appliance.
It will take a couple minutes for the appliance to reboot. To verify network services have
restarted, click the Refresh button to verify the appliance has obtained an IP address.
Then go back to the Discovered Appliances tab in the Orchestrator. After a couple
minutes, the appliance should appear.
DST 9.4. Lab Guide v1.2 – May 2024 page 136 of 144
INSTRUCTOR VERSION
4. Click Save.
With some keyboards, you might need to enter the Fn (Function) key and the F1 key
together.
DST 9.4. Lab Guide v1.2 – May 2024 page 137 of 144
INSTRUCTOR VERSION
7. After the EdgeConnect is done rebooting, note the IP address at the top of the console
window.
You need to wait about 2 minutes before the EdgeConnect accepts HTTPS connection
attempts.
8. Open a Google Chrome tab, enter the https:// followed by the IP address from step 7,
and then press Enter.
9. Click through any Google Chrome security warnings that might appear.
b. Password: admin
11. Click Login to open the Initial Config Wizard. If the Initial Config Wizard doesn’t
automatically appear after you log in, click Configuration > System & Networking >
Intial Config Wizard on the appliance’s menu to open it.
1. You reboot the lab from the main Lab Portal screen using the menu in the blue
bar at the top. Click on Lab > Actions > Hard Reboot.
DST 9.4. Lab Guide v1.2 – May 2024 page 138 of 144
INSTRUCTOR VERSION
2. Click the checkbox next to the Lab name and and then click OK.
It will take approximately 15 minutes for the lab to reboot and become accessible again.
When rebooting, the status icon will change to a red downward pointing arrow. After a few
minutes, the status will change to up and green. You will want to wait 3 – 5 more minutes
after the status changes to up before attempting to access the lab again as the network
services will be starting on the landing desktop. If you attempt to login but end up back on
the main portal window, then the landing desktop is not yet ready. Try again in a minute.
DST 9.4. Lab Guide v1.2 – May 2024 page 139 of 144
INSTRUCTOR VERSION
DST 9.4. Lab Guide v1.2 – May 2024 page 140 of 144
INSTRUCTOR VERSION
DST 9.4. Lab Guide v1.2 – May 2024 page 141 of 144
INSTRUCTOR VERSION
EdgeConnect appliances
(ECV-1, 2, 4, and 5) admin Speak-123 Initial default password: admin
student (UBU-1)
FTP servers anonymous (TG-XX11) Speak-123 (both) Use the Quickconnect button.
hMail Server Provided by hMail Server. Speak-123 Not for student use.
Kwanem Emulators
(K1-MPLS, K2-Internet, K3-LTE) root Speak-123 Not for student use.
DST 9.4. Lab Guide v1.2 – May 2024 page 142 of 144
INSTRUCTOR VERSION
DST 9.4. Lab Guide v1.2 – May 2024 page 143 of 144
INSTRUCTOR VERSION
Change Log
May 27, 2024 (v1.0): Created original document
June 13, 2024 (v1.1): Edited EdgeHA lab to show that Boost can now be configured on both appliances at the same time.
: Moved instructions for rebooting an ECV via ESXi host to Appendix A. Added reference to the instructions in Labs
1, 5, 6 and 9.
June 24,2024 (v1.2): Corrected BIOs config (Lab 13, Tasks 1 & 3). Topology change to hub & spoke now only configured in BulkApps.
: Updated screenshots – Lab 7, task 3; Lab 9, task 1; Lab 10, tasks 4 & 5.
DST 9.4. Lab Guide v1.2 – May 2024 page 144 of 144