Configuring TLOC Extensions for transport redundancy.


Task List

- Overview
- Feature Templates for TLOC Extensions
        - Creating the VPN Interface Template for the TLOC-EXT interface
        - Creating the VPN Interface Template for the Tunnel interface
        - Creating the BGP Template for the MPLS link
- Updating the VPN and Device Templates
- Activity Verification

Overview

A number of sites have a couple of routers in place, but transport connectivity to just one of the available transports. In the event of a link failure, there is no mechanism for traffic to be redirected over the other transport. That’s where TLOC Extensions come in.

TLOC Extensions allow vEdge/cEdge routers with a single transport to utilize the link on another vEdge/cEdge router at the same site. Given below is a graphical representation of what we’re trying to achieve in this section of the lab.

vEdge20 is connected to the Internet transport whereas vEdge21 is connected to MPLS. If the Internet link goes down, vEdge20 doesn’t have a way to utilize the MPLS link available at vEdge21. TLOC Extensions seek to remedy this.

vEdge/cEdge routers build IPSec tunnels across directly connected transports AND across the transport connected to the neighbouring vEdge/cEdge router to facilitate transport redundancy.

Without TLOC Extensions, the vEdges at Site 20 look something like the images below. Note that both have control connections to the vSmarts and vManage via the directly connected transport, which can be checked using the CLI show control connections

BFD sessions are established across the directly connected transport as well. Check via the CLI show bfd sessions

show control connections
show bfd sessions


Feature Templates for TLOC Extensions

We will need to create a total of three Feature Templates for this section which will be applied to vEdge20 and vEdge21 Device Templates.

Towards the end of the lab, we will copy and modify the VPN 0 feature template used by the INET interface on vEdge20 to allow for NAT. Both vEdges at Site20 use the same feature template for VPN 0 ge0/0 so making a change on one will impact the other as well. Hence, we will be breaking off the vEdge20 VPN Interface template from the one being used. This new template will be identical to the VPN 0 interface template being used at this Site, except for NAT being enabled on ge0/0.

Creating the VPN Interface Template for the TLOC-EXT interface

  1. On the vManage GUI, click on Configuration => Templates and go to the Feature tab. click on Add Template and search for vedge. Select vEdge Cloud from the list and choose VPN Interface Ethernet to create an Interface Template

  2. Enter the details as shown in the table below. Use the images for reference. Click on Save once done

    Section Field Global or Device Specific (drop down) Value
      Template Name NA Site20_TLOC_Ext_NoTunn
      Description NA Site 20 TLOC Extension Template without Tunnel Configuration
    Basic Configuration Shutdown Global No
    Basic Configuration Interface Name Device Specific if_name_notunn_tlocext
    Basic Configuration IPv4 Address Device Specific if_ipv4_address_notunn
    Advanced TLOC Extension Global ge0/0

This completes configuration of the VPN Interface Template for TLOC Extension interfaces, without a Tunnel. Each participating vEdge/cEdge will have an interface that will not have a Tunnel associated with it (but will have a TLOC Extension association) and another one which will have a Tunnel (but won’t have a TLOC Extension associated with it).


Creating the VPN Interface Template for the Tunnel interface

  1. Navigate to Configuration => Templates => Feature tab and search for tloc. You should get one template (the one we just created). Click on the three dots next to it and choose Copy

  2. Rename the Template to Site20_Tunn_no_tlocext with a Description of Site 20 Template with Tunnel Configuration no TLOC-Ext. Click on Copy

  3. Click on the three dots next to the newly created template and choose to Edit

  4. Update the details as in the table below. Use the images for reference and click on Update when done

    Section Field Global or Device Specific (drop down) Value
    Basic Configuration Shutdown Global No
    Basic Configuration Interface Name Device Specific if_name_tunn_notlocext
    Basic Configuration IPv4 Address Device Specific if_ipv4_address_tunn
    Tunnel Tunnel Interface Global On
    Tunnel Color Device Specific tloc_if_tunnel_color_value
    Tunnel Restrict Device Specific tloc_if_tunnel_color_restrict
    Tunnel - Allow Service All Global On
    Advanced TLOC Extension Default  

This completes the configuration of our second feature template.


We will now set up the BGP template for eBGP peering on the MPLS link. This is so that the TLOC extension subnet (192.168.26.0/24 in this case) can be advertised to the MPLS network.

  1. On the vManage GUI, go to Configuration => Templates => Feature tab. Click on Add Template and search for vedge. Select vEdge Cloud and scroll down to the Other Templates section. Choose BGP

  2. Enter the Template Name as vedge21_mpls_bgp_tloc and the Description as BGP Peering Template for TLOC Extension on the MPLS link. Set Shutdown to a Device Specific variable of bgp_shutdown. Set AS Number to a global value of 65534. This will be the AS number on our vEdge21 for BGP Peering

  3. Under Unicast Address Family, set the Maximum Paths to 2. Click on the Network tab and click on New Network. Enter the Network Prefix as a global value of 192.168.26.0/24 and click on Add. This is the subnet which will be advertised in BGP

  4. Under Neighbor, click on New Neighbor and enter details as per the table below. Click on Add (don’t miss this - far right corner) to Add the Neighbor details and then click on Save (bottom-middle of the screen) to Save this template

    Section Field Global or Device Specific (drop down) Value
    Neighbor Address Global 192.0.2.9
    Neighbor Remote AS Global 65535
    Neighbor Address Family Global On
    Neighbor Address Family Global ipv4-unicast

This completes the configuration of our BGP Template.


Updating the VPN and Device Templates

We will start by updating the existing VPN template for Site 20 (named Site20-vpn0) to include a default route with a next hop to the corresponding TLOC Extension interface (i.e. to 192.168.26.21 on vEdge20 and 192.168.25.20 on vEdge21). Device Specific variables will be used.

  1. Navigate to Configuration => Templates => Feature tab on the vManage GUI. Search for site20 and you should see the Site20-vpn0 template. Click on the three dots next to it and choose to Edit

  2. Scroll down to the IPv4 Route section and click on the pencil icon next to 0.0.0.0/0 route to edit it

  3. Click on 1 Next Hop in the Update IPv4 Route popup

  4. Click on Add Next Hop and set the new hop address to Device Specific with a name of tloc_ext_next_hop_ip. Click on Save Changes

  5. Click on Save Changes again, making sure that the Update IPv4 Routes field now shows 2 Next Hop

  6. Back at the VPN Feature template, make sure that the number 2 shows up under Selected Gateway Configuration and click on Update

  7. Populate the details for the Address (tloc_ext_next_hop_ip) for the two vEdges. vEdge20 should have 192.168.26.21 and vEdge21 should have 192.168.25.20 as the next hop IP. Click on Next

  8. You can view the side by side configuration if needed, and click on Configure Devices. Choose the confirm the changes and click on OK

  9. To edit the Device Template and bring everything together, navigate to Configuration => Templates on the vManage GUI. Make sure you’re on the Device tab and locate the vedge_Site20_dev_temp template. Click on the three dots next to it and choose to Edit

  10. Under Transport & Management VPN, click on BGP under Additional VPN 0 Templates. Click on VPN Interface twice to add two VPN Interfaces over on the left-hand side. Populate the BGP template we created in the BGP field (named vedge21_mpls_bgp_tloc). Populate Site20_TLOC_Ext_NoTunn under the first VPN Interface and Site20_Tunn_no_tlocext under the second VPN Interface. Click on Update

  11. Click on the three dots next to vEdge20 and choose Edit Device Template. Enter the details as shown in the table below, referencing the image and click on Update

    Field Value
    Interface Name (if_name_tunn_notlocext) ge0/4
    IPv4 Address (if_ipv4_address_tunn) 192.168.26.20/24
    Color (tloc_if_tunnel_color_value) mpls
    Restrict (tloc_if_tunnel_color_restrict) Checked
    Interface Name (if_name_notunn_tlocext) ge0/1
    IPv4 Address (if_ipv4_address_notunn) 192.168.25.20/24
    Shutdown (bgp_shutdown) Checked

  12. Click on the three dots next to vEdge21 and choose Edit Device Template. Enter the details as shown in the table below, referencing the image and click on Update and then click on Next

    Field Value
    Interface Name (if_name_tunn_notlocext) ge0/1
    IPv4 Address (if_ipv4_address_tunn) 192.168.25.21/24
    Color (tloc_if_tunnel_color_value) public-internet
    Restrict (tloc_if_tunnel_color_restrict) Unchecked
    Interface Name (if_name_notunn_tlocext) ge0/4
    IPv4 Address (if_ipv4_address_notunn) 192.168.26.21/24
    Shutdown (bgp_shutdown) Unchecked

  13. View the side-by-side configuration (optional) and click on Configure Devices. Confirm the configuration change on 2 devices

  14. From the vManage GUI, navigate to Configuration => Templates. On the Feature tab, search for vpn0. Locate the site20_vpn0_int template and make a copy of it, renaming to site20_vpn0_int_nat and updating the description accordingly

  15. Click on the three dots next to the new site20_vpn0_int_nat template and choose to Edit. Set NAT to a global value of On and click on Update

  16. Make sure you’re on the Configuration => Templates Device tab and locate the vEdge_Site20_dev_temp template. Make a copy of it, renaming to vEdge_Site20_dev_temp_nat and updating the description accordingly

  17. Choose to Edit the newly created vEdge_Site20_dev_temp_nat via the three dots next to it and update the VPN Interface field under Transport & Management VPN to reflect the VPN Interface template we created in step 14/15. The name of the newly created VPN Interface template is site20_vpn0_int_nat. Click on Update

  18. Click on the three dots next to the vEdge_Site20_dev_temp_nat device template and click on Attach. Choose the vEdge20 device and Attach it. Click Next/Configure Device as the prompts pop up (nothing will need to be populated since we’re using a device template copied from before with NAT set to On)

This completes the configuration of TLOC Extensions at Site 20.


Activity Verification

  1. To verify that our configuration is working, log in to the CLI of vEdge20 and vEdge21. Issue the same commands as before and compare with the output we had taken at the start of this section ( click here to compare the output). Output of show control connections and show bfd sessions given below

    Issued clear control connections

  2. Similarly, log in to vEdge21 and compare the output of the same commands (click here to compare the output). Commands are again show control connections and show bfd sessions

We now see that the vEdges have established control connections over the transport connected to their counterpart at the same site. BFD sessions are also established across the platform transports. Thus, we should see control connections and bfd sessions across mpls on vEdge20 and across public-internet on vEdge21, along with their directly connected transport connections/sessions.