Velocloud Admin Guide 33 PDF
Velocloud Admin Guide 33 PDF
Velocloud Admin Guide 33 PDF
Guide
VMware SD-WAN by VeloCloud 3.3
VeloCloud Administration Guide
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
3 VeloCloud Overview 15
Solution Components 16
Capabilities 16
Network Topologies 19
Branch Site Topologies 20
Roles and Privilege Levels 24
User Role Matrix 25
Key Concepts 28
Supported Modems 32
VMware, Inc. 3
VeloCloud Administration Guide
7 Configuring VNFs 63
Monitor the Edge Overview 63
Configure a VNF Instance 64
VNF Monitoring for an Edge 74
VNF Events 76
Configure VNF Alerts and Notifications 77
8 Configure Segments 79
VMware, Inc. 4
VeloCloud Administration Guide
VMware, Inc. 5
VeloCloud Administration Guide
VMware, Inc. 6
VeloCloud Administration Guide
VMware, Inc. 7
VeloCloud Administration Guide
20 Administration 309
Configure System Settings 309
Overview of Single Sign On 309
Configure Single Sign On for Enterprise User 309
Configure Single Sign On for Identity Partners 312
Self-service Password Reset 330
Configure Two-factor Authentication 333
Enforce PCI Compliance on VCO 334
Monitor Edge Licensing 335
Generate an Edge Licensing Report 335
VMware, Inc. 8
VeloCloud Administration Guide
VMware, Inc. 9
VeloCloud Administration Guide
VMware, Inc. 10
VMware SD-WAN by VeloCloud
Release 3.3 1
The VMware SD-WAN by VeloCloud Administration Guide release 3.3 includes new and updated
content for versions 3.3.0, 3.3.1, and 3.3.2 as described below.
VMware, Inc. 11
VeloCloud Administration Guide
Status Section
VMware, Inc. 12
VeloCloud Administration Guide
Status Section
VMware, Inc. 13
Who Should Read This Document
2
This guide is written for network administrators, network analysts, and IT administrators
responsible for deploying, monitoring and managing Enterprise branch network. This guide
describes the settings of the core VeloCloud configurations: Networks, Network Services,
Profiles, and Edges in detail.
Prerequisites
It is assumed that you have become thoroughly familiar with the concepts described in the
Chapter 3 VeloCloud Overview before proceeding with configuration steps. It is also strongly
recommended that you read and perform the steps in the Chapter 18 Quick Start Configuration to
become familiar with the basic configuration and Edge activation.
VMware, Inc. 14
VeloCloud Overview
3
This section provides an overview of VeloCloud.
Cloud-delivered Software-defined WAN from VeloCloud assures enterprise and cloud application
performance over Internet and hybrid WAN while simplifying deployments and reducing costs.
VeloCloud is a cloud network service solution enabling sites to quickly deploy Enterprise grade
access to legacy and cloud applications over both private networks and Internet broadband. The
following figure shows the VeloCloud Software-defined WAN solution components (in orange).
The components are described in more detail in the following sections.
n Solution Components
n Capabilities
n Network Topologies
n Key Concepts
VMware, Inc. 15
VeloCloud Administration Guide
n Supported Modems
Solution Components
This section describes VeloCloud solution components.
VeloCloud Edge
A thin “Edge” that is zero IT touch provisioned from the cloud for secured, optimized connectivity
to your apps and virtualized services. The VeloCloud Edges are zero-touch, enterprise-class
devices or virtual software that provide secure and optimized connectivity to private, public and
hybrid applications; compute; and virtualized services. VeloCloud Edges perform deep
application recognition, application and per-packet steering, on-demand remediation
performance metrics and end-to-end quality of service (QoS) in addition to hosting Virtual
Network Function (VNF) services. An Edge pair can be deployed to provide High Availability
(HA). Edges can be deployed in branches, large sites and data centers. All other network
infrastructure is provided on-demand in the cloud.
VeloCloud Gateways
VeloCloud’s network consists of gateways deployed at top tier network points-of-presence and
cloud data centers around the world, providing SDWAN services to the doorstep of SaaS, IaaS
and cloud network services, as well as access to private backbones. Multi-tenant, virtual
Gateways are deployed both by VeloCloud transit and cloud service provider partners. The
gateways provide the advantage of an on-demand, scalable and redundant cloud network for
optimized paths to cloud destinations as well as zero-installation applications.
A Cloud Edge may also be configured with VeloCloud Gateways to provide Internet inbound
firewall protection.
Capabilities
This section describes VeloCloud capabilities.
VMware, Inc. 16
VeloCloud Administration Guide
Cloud VPN
Cloud VPN is a 1-click, site-to-site, VPNC-compliant, IPSec VPN to connect VeloCloud and Non-
VeloCloud Sites while delivering real-time status and the health of the sites. The Cloud VPN
establishes dynamic edge-to-edge communication for all branches based on service level
objectives and application performance. Cloud VPN also delivers secure connectivity across all
branches with PKI scalable key management. New branches join the VPN network automatically
with access to all resources in other branches, enterprise data centers, and 3rd party data
centers, like Amazon AWS.
Firewall
VeloCloud delivers stateful and context-aware (application, user, device) integrated application
aware firewall with granular control of sub-applications, support for protocol-hopping
applications – such as Skype and other peer-to-peer applications (e.g., disable Skype video and
chat, but allow Skype audio). The secure firewall service is user- and device OS-aware with the
ability to segregate voice, video, data, and compliance traffic. Policies for BYOD devices (such as
Apple iOS, Android, Windows, and Mac OS) on the corporate network are easily controlled.
VMware, Inc. 17
VeloCloud Administration Guide
Activation
VeloCloud Edge appliances automatically authenticate, connect, and receive configuration
instructions once they are connected to the Internet in a zero-touch deployment. They deliver a
highly available deployment with VeloCloud Edge redundancy protocol and integrate with the
existing network with support for OSPF routing protocol and benefit from dynamic learning and
automation.
OSPF
VeloCloud supports inbound/outbound filters to OSPF neighbors, OE1/OE2 route types, MD5
authentication. Routes learned through OSPF will be automatically redistributed to the controller
hosted in the cloud or on-premise.
BGP
VeloCloud supports inbound/outbound filters and the filter can be set to Deny, or optionally
adding/changing the BGP attribute to influence the path selection, i.e. RFC 1998 community, MED,
AS-Path prepend, and local preference.
Segmentation
Network segmentation is an important feature for both enterprises and service providers. In the
most basic form, segmentation provides network isolation for management and security reasons.
Most common forms of segmentation are VLANs for L2 and VRFs for L3.
However, the legacy approach is limited to a single box or two physically connected devices. To
extend the functionality, segmentation information must be carried across the network.
VMware, Inc. 18
VeloCloud Administration Guide
VeloCloud enables end-to-end segmentation. When the packet traverses through the Edge, the
Segment ID is added to the packet and is forwarded to the Hub and cloud Gateway, allowing
network service isolation from the Edge to the cloud and data center. This provides the ability to
group prefixes into a unique routing table, making the business policy segment aware.
Routing
In Dynamic Routing, VeloCloud Edge learns routes from adjacent routers through OSPF or BGP.
The VeloCloud Orchestrator maintains all the dynamically learned routes in a global routing table
called the Overlay Flow Control. The Overlay Flow Control allows management of dynamic routes
in the case of "Overlay Flow Control sync" and "change in Inbound/Outbound filtering
configuration." The change in inbound filtering for a prefix from IGNORE to LEARN would fetch
the prefix from the Overlay Flow Control and install into the Unified routing table.
For more information, see Chapter 17 Configure Dynamic Routing with OSPF or BGP.
Network Topologies
This section describes network topologies for branches and data centers.
VeloCloud simplifies the branch deployment and delivers enterprise great application
performance or public/private link for cloud and/or on-premise applications.
VMware, Inc. 19
VeloCloud Administration Guide
The first variant is a single L3 switch with one or more public internet links and a MPLS link, which
is terminated on a CE and is accessible through the L3 switch. In this case, the VeloCloud Edge
goes between the L3 switch and Internet (replacing existing firewall/router).
The second variant includes MPLS and Internet routers deployed using HSRP with an L2 switch
on the LAN side. In this case, the VeloCloud Edge replaces the L2 switch.
VMware, Inc. 20
VeloCloud Administration Guide
A key differentiation point here is a single WAN link is accessible via two routed interfaces. In
order to support this, a virtual IP address is provisioned inside the edge (similar to a Cisco
“loopback interface”) and can be advertised over OSPF , BGP, or statically routed to.
VMware, Inc. 21
VeloCloud Administration Guide
Connecting the L1 ports on each edge is used to establish a failover link. The standby VeloCloud
Edge blocks all ports except the L1 port for the failover link.
On-premise Topology
The on-premise topology consists of two hubs and multiple branches (some with VCE and some
without). Each hub has hybrid WAN connectivity. There are several branch types.
Note The Gold Site is not currently in the scope of this release and will be added at a later time.
VMware, Inc. 22
VeloCloud Administration Guide
The MPLS network runs BGP and peers with all the CE routers. At Hub 1, Hub 2, and Silver 1 sites,
the L3 switch runs OSPF or BGP with the CE router and firewall (in case of hub sites).
In some cases, there may be redundant data centers which advertise the same subnets with
different costs. In this scenario, both data centers can be configured as edge-to-edge VPN hubs.
Since all edges connect directly to each hub, the hubs in fact also connect directly to each other.
Based on route cost, traffic is steered to the preferred active data center.
In previous versions, users could create an enterprise object using Zscaler or Palo Alto Network
as a generic Non-VeloCloud Site. In 2.0, that object will now become a first-class citizen as a Non-
VeloCloud Site.
VeloCloud's Cloud-Delivered SD-WAN solution combines the economics and flexibility of the
hybrid WAN with the deployment speed and low maintenance of cloud-based services. It
dramatically simplifies the WAN by delivering virtualized services from the cloud to branch
offices. VeloCloud's customer-premise equipment, VeloCloud Edge, aggregates multiple
broadband links (e.g., Cable, DSL, 4G-LTE) at the branch office, and sends the traffic to
VeloCloud gateways. Using cloud-based orchestration, the service can connect the branch office
to any of type of data center: enterprise, cloud, or Software-as-a-Service.
VMware, Inc. 23
VeloCloud Administration Guide
VeloCloud Edge is a compact, thin Edge device that is zero-IT-touch provisioned from the cloud
for secure, optimized connectivity to applications and data. A cluster of gateways is deployed
globally at top-tier cloud data centers to provide scalable and on-demand cloud network
services. Working with the Edge, the cluster delivers dynamic, multi-path optimization so multiple,
ordinary broadband links appear as a single, high bandwidth link. Orchestrator management
provides centralized configuration, real-time monitoring, and one-click provisioning of virtual
services.
Administrator
The Administrator configures, monitors, and administers the VeloCloud service operation. There
are three Administrator roles:
Enterprise Standard Admin Can perform all configuration and monitoring tasks.
Enterprise Superuser Can perform the same tasks as an Enterprise Standard Admin and can also create additional
users with the Enterprise Standard Admin, Enterprise MSP, and Customer Support role.
Enterprise Support Can perform configuration review and monitoring tasks but cannot view user identifiable
application statistics and can only view configuration information.
Site Contact
The Site Contact is responsible for VeloCloud Edge physical installation and activation with the
VeloCloud service. The Site Contact is a non-IT person who has the ability to receive an email and
perform the instructions in the email for Edge activation.
Operator
The Operator can perform all of the tasks that an Administrator can perform, plus additional
operator-specific tasks – such as create and manage customers, Cloud Edges, and Gateways.
There are four Operator roles:
VMware, Inc. 24
VeloCloud Administration Guide
Superuser Operator Can view and create additional users with the Operator roles.
An Operator should be thoroughly familiar with networking concepts, web applications, and
requirements and procedures for the Enterprise.
Partner
The Partner can perform all of the tasks that an Administrator can perform, along with additional
Partner specific tasks – such as creating and managing customers. There are four Partner roles:
Superuser Can view and create additional users with the Partner roles.
Business Specialist Can perform configuration and monitoring tasks but cannot view user identifiable application
statistics.
Customer Support Can perform configuration review and monitoring tasks but cannot view user identifiable application
statistics and can only view configuration information.
A Partner should be thoroughly familiar with networking concepts, web applications, and
requirements and procedures for the Enterprise.
Note The "User Role Matrix" section is new for the 3.3 release.
n R: Read
n W: Write (Modify/Edit)
n D: Delete
n NA: No Access
VMware, Inc. 25
VeloCloud Administration Guide
Partner:
Operator: Operator: Partner: Customer
Superuser Standard Business Support Super Standard Business Customer
VCO Feature Operator Operator Specialist Operator User Admin Specialist Support
Monitor R R R R R R R R
Customers
(Managing RWD RWD R R *See *See Note *See Note *See Note
Edge) Software Note
Images
System RWD R NA R NA NA NA NA
Properties
Operator R R NA R NA NA NA NA
Events
CA Summary RW R R R NA NA NA NA
Orchestrator RWD R NA R NA NA NA NA
Authentication
Replication RW R NA R NA NA NA NA
Note Operator superusers have "RWD" access to certificate related configurations and standard
operators have Read-only access to certificate related configurations. These users can access
the certificate related configurations at Configure > Edges from the navigation panel.*
Note Enterprise users at all levels do not have access to the Operator-level features show in the
table above.
VMware, Inc. 26
VeloCloud Administration Guide
n R: Read
n W: Write (Modify/Edit)
n D: Delete
n NA: No Access
MonitorCustomers R R R R
Events R R NA R
Admins RWD R NA R
Overview R R R R
Settings RW R R R
Gateways RW RW NA R
n R: Read
n W: Write (Modify/Edit)
n D: Delete
n NA: No Access
VMware, Inc. 27
VeloCloud Administration Guide
Note Operator-level users have complete access the VCO features shown in the preceding
table.
Key Concepts
This section describes key concepts to understand when using VeloCloud.
Configurations
The VeloCloud service has four core configurations that have a hierarchical relationship. These
configurations are created and values are entered in the VeloCloud Orchestrator.
Configuration Description
Network Defines basic network configurations, such as addressing and VLANs. Networks can be designated
as Corporate or Guest and there can be multiple definitions of each.
Network Services Define several common services used by the VeloCloud Service, such as BackHaul Sites, Cloud VPN
Hubs, Non-VeloCloud Sites, Cloud Proxy Services, DNS services, and Authentication Services.
VMware, Inc. 28
VeloCloud Administration Guide
Configuration Description
Profile Defines a template configuration that can be applied to multiple Edges. A Profile is configured by
selecting a Network and Network Services. A profile can be applied to one or more Edge models and
defines the settings for the LAN, Internet, Wireless LAN, and WAN Edge Interfaces. Profiles can also
provide settings for Wi-Fi Radio, SNMP, Netflow, Business Policies and Firewall configuration.
Edge Configurations provide a complete group of settings that can be downloaded to an Edge device. The
Edge configuration is a composite of settings from a selected Profile, a selected Network, and
Network Services. An Edge configuration also override settings or add ordered policies to those
defined in the Profile, Network, and Network Services.
The following figure below shows a more detailed overview of the relationships between multiple
Edges, Profiles, Networks, and Network Services.
Note that a single Profile can be assigned to multiple Edges. An individual Network configuration
can be used in more than one Profile. Network Services configurations are used in all Profiles.
The preceding figure also gives an expanded view of the configuration settings of an Edge,
Profile, Network, and Network Services, which are described in the following sections. The
following sections also provide additional details for the four core configurations.
Networks
Networks are standard configurations that define network address spaces and VLAN
assignments for Edges. Networks configure two network types:
Multiple Corporate and Guest Networks can be defined. VLANs can be assigned to both
Corporate and Guest Networks.
VMware, Inc. 29
VeloCloud Administration Guide
With non-overlapping addresses, an address space is divided into blocks of an equal number of
addresses. Non-overlapping addresses are associated with VPN configurations. The address
blocks are assigned to Edges that use the Network so that each Edge has a unique set of
addresses. Non-overlapping addresses are required for Edge-to-Edge and Edge -to- Non-
VeloCloud Site VPN communication. The VeloCloud configuration creates the information
necessary to access an Enterprise Data Center Gateway for VPN access. The following diagram
shows how unique IP address blocks from a Network configuration are assigned to VeloCloud
Edges. It also shows how IPSec configuration is generated by the VeloCloud Orchestrator. An
administrator for the Enterprise Data Center Gateway uses the IPSec configuration information
generated during Non-VeloCloud Site VPN configuration to configure the VPN tunnel to the Non-
VeloCloud Site.
Network Services
Network Services in VeloCloud Orchestrator allows you to define your Enterprise Network
Services. These definitions can be used across all Profiles. This includes services for
Authentication, Cloud Proxy, Non-VeloCloud Sites, and DNS. The possible services are defined in
Network Services but are not used unless they are assigned in a Profile.
Profiles
Profiles define a standard configuration for one or more VeloCloud Edges. A profile is a named
configuration that defines a list of VLANs, Cloud VPN settings, Interface Settings (wired and
wireless), and Network Services (such as DNS Settings, Authentication Settings, Cloud Proxy
Settings, and VPN connections to Non-VeloCloud Sites).
Profiles provide Cloud VPN settings for Edges configured for VPN. The Cloud VPN Settings can
enable/disable Edge-to-Edge and Edge-to- Non-VeloCloud Site VPN connections.
VMware, Inc. 30
VeloCloud Administration Guide
Profiles can also define rules and configuration for the VeloCloud Business Policy and Firewall
settings.
Edges
The Edge configuration includes the assignment of a Profile, from which most of the Edge
configuration is derived.
Most of the settings that are defined in a Profile, Network, or Network Services can be used
without modification in an Edge configuration. However, overrides or ordered policy additions
can be configured for several of the Edge configuration elements to tailor an Edge for a specific
scenario. This includes settings for Interfaces, Wi-Fi Radio Settings, DNS, Authentication,
Business Policy, and Firewall.
Additions can also be made to an Edge configuration to augment settings not present in Profile
or Network configuration. This includes Subnet Addressing, Static Route settings, and Inbound
Firewall Rules (for Port Forwarding and 1:1 NAT).
Scenario Description
SaaS : Used for Edges that do not require VPN connections between Edges, to a Non-VeloCloud Site, or
to a VeloCloud Site. The workflow assumes the addressing for the Corporate Network uses
overlapping addressing.
Non-VeloCloud Used for Edges that require a VPN connection to a Non-VeloCloud Site such as Amazon Web
Site via VPN Services, Zscaler, Cisco ISR, or ASR 1000 Series. This workflow assumes the addressing for the
Corporate Network uses non-overlapping addressing and that the Non-VeloCloud Sites are specified
in the profile.
VeloCloud Used for Edges that require VPN connections to a VeloCloud Site such as an Edge Hub or a Cloud
SiteVPN VPN Hub. This workflow assumes the addressing for the Corporate Network uses non-overlapping
addressing and that the VeloCloud Sites are specified in the profile.
For each scenario, there are four major steps for configuration in the VeloCloud Orchestrator:
Step 1: Network
Step 3: Profile
Step 4: Edge
The following table provides a high-level outline of the steps required for a Quick Start
configuration for each of the workflows. For Quick Start Configurations, preconfigured Network,
Network Services, and Profile configurations are used. VPN configurations also require some
modification of the existing VPN Profile and creating the configuration of a VeloCloud or Non-
VeloCloud Site. The final step is to create a new Edge and activate it. Additional details (including
screen captures) can be found in the Chapter 18 Quick Start Configuration section.
VMware, Inc. 31
VeloCloud Administration Guide
Quick StartConfiguration
Steps SaaS Non-VeloCloud SiteSite VPN VeloCloud Site VPN
Step 1: Network Select Quick Start Select Quick Start VPN Select Quick Start VPN
Internet Network Network Network
Step 2: Network Service Use pre-configured Use pre-configured Network Use pre-configured Network
Network Services Services Services
Step 3: Profile Select Quick Start Select Quick Start VPN Profile Select Quick Start VPN
Internet Profile Enable Cloud VPN - Configure Profile
Non-VeloCloud Sites Enable Cloud VPN- Configure
VeloCloud Sites
Step 4: Edge Add New Edge and Add New Edge and Activate Add New Edge and Activate
Activate Edge Edge Edge
Supported Modems
This section describes how to get a list of supported modems.
VMware, Inc. 32
User Agreement (VCO Login
Screen) 4
An Enterprise Superuser or Partner Superuser might see a user agreement upon logging into the
VCO. The user must accept the agreement before gaining access to the VCO. If the user does
not accept the agreement, he or she will be automatically logged out of the VCO.
Note The "User Agreement (VCO Login Screen)" section is new for the 3.3 release.
VMware, Inc. 33
Log in to VCO Using SSO for
Enterprise User 5
Describes how to log in to VeloCloud Orchestrator (VCO) using Single Sign On (SSO) as an
Enterprise user.
Prerequisites
n Ensure you have configured SSO authentication in VCO. For more information, see Configure
Single Sign On for Enterprise User.
n Ensure you have set up roles, users, and OIDC application for SSO in your preferred IDPs. For
more information, see Configure an IDP for Single Sign On.
Procedure
3 In the Enter your Organization Domain text box, enter the domain name used for the SSO
configuration and click Sign In.
The IDP configured for SSO will authenticate the user and redirect the user to the configured
VCO URL.
Note Once the users log in to the VCO using SSO, they will not be allowed to login again as
native users.
VMware, Inc. 34
Monitor the VCO
6
The VeloCloud Orchestrator provides monitoring functionality that enables you to observe
various performance and operational characteristics of VeloCloud Edges. Monitoring functionality
is accessible in Monitor area of the navigation panel.
n Network Overview
n Monitor Edges
n Monitor Routing
n Monitor Alerts
n Monitor Events
n Network Overview
n Monitor Edges
n Monitor Routing
n Monitor Alerts
n Monitor Events
Network Overview
The Network Overview feature helps to monitor networks by checking the Edge and Link
(activated Edge) status summary. Clicking Monitor > Network Overview in the navigation panel
opens the Network Overview screen, which provides a visual summary about the enterprises
VMware, Inc. 35
VeloCloud Administration Guide
running VeloCloud edge devices, Non-VeloCloud sites, profiles, segments, software versions, and
their system configuration time and run time statuses.
The following table describes the connection status types and definitions for the Edge, Edge
Hub, Link, and Hub Link:
Color Meaning
Green Connected
Amber Degraded
Red Down
The Network Overview screen presents the overall summary information about a network in
three dashboard sections:
n VeloCloud Edge statistics - Includes the following information about the Edges and Links:
VMware, Inc. 36
VeloCloud Administration Guide
n Summary dashboard table - Includes a table that displays top ten Edges, or Edge Hubs, or
Links, or Hub Links sorted by last contact time, based on the selected filter criteria in the
VeloCloud Edge statistics section.
n Count of VeloCloud Active Standby Pair-enabled Edges (Failed, Pending, and Ready)
n Count of used Profiles out of the total number of Profiles configured for the Enterprise.
n Count of activated Segments out of the total number of Segments configured for the
Enterprise.
n Count of Edges with up-to-date Software version out of the total number of Edges
configured for the Enterprise.
Note The minimum supported edge version is 2.4.0. You can change the target edge
version against which the edges will be compared by using the system property
product.edge.version.minimumSupported.
You can also get detailed information on a specific item in the Network Overview screen by
clicking the link on the respective item or metric. For example, clicking the Edge link in the
summary dashboard table takes you to the Edge detail dashboard for the selected Edge.
You can configure the refresh time interval for the information displayed in the Network
Overview dashboard screen to one of the following options:
n pause
n 30s
n 60s
n 5min
VMware, Inc. 37
VeloCloud Administration Guide
Monitor Edges
By clicking Edges under Monitor in the navigation panel, you can monitor your Edge WAN links
and get usage data via network sources and traffic destinations.
The Edges monitoring screen includes the following tabs (with the Overview tab as the initial
display screen):
n Overview Tab
n QoE Tab
n Transport Tab
n Applications Tab
n Sources Tab
n Destinations Tab
The following sections describe the tab pages listed above that can be accessed via Monitor >
Edges.
The following list describes the Edge connection status types and definitions:
Color Meaning
Green Connected
Amber Degraded
Red Offline
The numbers on the map represent the number of Edges in that location as shown in the image
below. Click the number(s) on the map to open a pop-up that displays the name of the Edge and
its location.
Note You can Filter your map view by Name, Serial Number, IP Address, Status, Software
Version, Software Build, Profile, or Operator Profile.
VMware, Inc. 38
VeloCloud Administration Guide
Overview Tab
The Edge Overview tab displays information about your Edge WAN links, application bandwidth,
and network usage for top operating systems, top categories, and the top sources.
The Overview tab consists of two major areas: Link Status and Bandwidth Usage.
VMware, Inc. 39
VeloCloud Administration Guide
In the Link Status area, the Cloud Status and VPN Status columns can display the following link
status:
Status Meaning
Green Active
The Link Status area can display the status of backup links depending upon the WAN Settings
(see figures below). For information on how to configure an Edge Device to update these
settings, see the Configure an Edge Device section.
VMware, Inc. 40
VeloCloud Administration Guide
Link Status
The Link Status area displays a list of your links and their data (Cloud and VPN status, Interface,
and Throughput Capacity). With the Links Status functionality:
n You can view a list of your links and their status ( green: connected, red: not connected,
yellow: unstable).
n You can view Latency, Jitter, and Packet Loss by clicking the arrow next to the Signal
column.
Bandwidth Usage
The Bandwidth Usage area displays your top applications, categories, and operating systems
and their volume for a historical period of time. You can change the time frame by clicking the
Time Duration drop-down menu and the Calendar. (You can access the Calendar by clicking the
date at the top of the screen).
The Bandwidth Usage screen includes the following areas: Top Applications, Top Categories,
and Top Operating Systems. See the sections below for more information.
Top Applications
The Top Applications area displays historical usage data for top applications and is connected to
the Applications Tab tab. To access the Applications tab, click the View Details arrow. (See
image below).
Top Categories
The Top Categories area displays categories as a color-coded Pie chart (with a corresponding
Legend). The Top Categories area is also connected to the Applications tab. (See figure below).
VMware, Inc. 41
VeloCloud Administration Guide
You can access the Applications tab from this section in the following ways:
n Click the View Details arrow to the right of the section to view details about all your
categories.
n Click individual sections of the Pie chart, or click individual categories in the Legend to open
the Applications tab for that specific category.
The Top Operating Systems area is connected to the Sources tab. You can access the Sources
tab from this section in the following ways:
n Click an individual bar in the graph to access the Sources tab for that specific system.
Top Sources
The Top Sources section of the Bandwidth Usage area displays top sources as a bar graph. The
Top Sources section is also connected to the Sources tab. You can access the Sources tab from
this section in the following ways:
n Click an individual bar on the graph to access the Sources tab for that specific system.
VMware, Inc. 42
VeloCloud Administration Guide
QoE Tab
The VeloCloud Quality of Experience (QoE) tab shows the VeloCloud Quality Score (VQS) for
different applications. The VQS rates an application's quality of experience that a network can
deliver for a period of time. See sections below for more information.
Traffic Type
There are three different traffic types that you can monitor (Voice, Video, and Transactional) in
the QoE tab. You can hover over a WAN network link, or the aggregate link provided by the
VeloCloud to display a summary of Latency, Jitter, and Packet Loss (see image below).
VMware, Inc. 43
VeloCloud Administration Guide
Green Good All metrics are better than the objective thresholds. Application SLA met/exceeded.
Yellow Fair Some or all metrics are between the objective and maximum values. Application SLA is
partially met.
Red Poor Some or all metrics have reached or exceeded the maximum value. Application SLA is not
met.
QoE Example
The two QoE example images below show three before and after voice traffic scenario problems
and how VeloCloud solved them. See the table below for more information. (The red numbers in
the images below represent the scenario numbers in the table below).
VMware, Inc. 44
VeloCloud Administration Guide
Scenario 1 and 2: Link Steering and Forward Error Correction Solution Example
VMware, Inc. 45
VeloCloud Administration Guide
Transport Tab
The Edge Transport tab provides an overview of the bandwidth used across all of the WAN links.
You can hover over the line graph and view Sent and Received data in a pop-up window.
For any point in time, you can view which Link or Transport Group was used for the traffic and
how much data was sent. See the sections below for a description of the major areas of the
Transport tab.
VMware, Inc. 46
VeloCloud Administration Guide
Links
When you click the Transport tab, Links is the default display screen (as shown in the image
above). The Links screen displays Sent and Received data for your links. Any links associated
with an Edge are displayed in a numbered list at the bottom of the screen under the Link column,
along with their Interface (WAN Type) and Total Bytes. See image above.
n Status for Cloud and VPN ( green: connected, red: disabled, gray: unavailable)
n Link Info (you can access this pop-up window by clicking the down arrow next to Interface
WAN Type)
Note You can also access the Links screen at anytime by clicking the Links button.
VMware, Inc. 47
VeloCloud Administration Guide
Bandwidth This parameter denotes the desired bandwidth allocation in Mbps for each flow. Based on these
parameters, the total capacity is allocated in proportion to the bandwidth values of various flows.
Jitter Jitter is calculated using the RFC 3550 Formula for calculating jitter that is used by RTP.
Latency For each packet, the latency is measured by subtracting the network send time (packet is time stamped
immediately before being sent) from the network receive time (packet is time stamped immediately after
being received).
Packet Loss A lost packet is calculated when a path sequence number is missed and doesn’t arrive within the re-
sequencing window. A “very late” packet is counted as a lost packet in this regard.
Live Monitoring
Live monitoring is useful for conducting active testing and calculating Average Throughput. It is
also beneficial for troubleshooting security compliance and for seeing how traffic policies are
being leveraged in real time.
To monitor live traffic for Links and Transport Groups click the Start Live Monitoring button.
When the Live Monitoring screen appears, select the Show TCP/UDP Details checkbox to view
protocol level link usage details.
VMware, Inc. 48
VeloCloud Administration Guide
Transport Groups
Transport Groups are links grouped into one of the following categories:
n Public Wired
n Private Wired
n Public Wireless
Transport Groups enable box-by-box configuration and business policy abstraction. A single plan
can be applied across different hardware agnostic types. When you click the Transport Groups
button, the above items are displayed in a numbered list in the Transport Group area at the
bottom of the Transport screen.
You can also click the Transport Group link to view the data for that group. See the section
below (Viewing Links in a Transport Group) for information about the Transport Groups dialog
box.
Transport Groups are displayed in a numbered list at the bottom of the Transport tab.
2 Click a Transport Group link (Public Wired, Private Wired, or Public Wireless).
VMware, Inc. 49
VeloCloud Administration Guide
3 Click a Transport Group from the Pie chart to display the top applications and links within a
Transport Group. (You can also toggle between Transport Groups by clicking the Transport
Group categories displayed below the Pie chart).
Applications Tab
The Edge Applications tab displays network usage information about your applications or your
application categories. The following section provide information about the Applications and
Categories areas.
Network Usage
Network usage data is displayed as one or two graphs (depending upon the type of data you
choose) with an option to scale the Y-axis. You can hover over a segment of the graph to display
network usage data for that segment. You can also choose which type of data is displayed from
the Data drop-down menu (Bytes Received/Sent, Total Bytes, Total Packets, or Packets
Received/Sent).
Note Network usage data for the Applications tab is displayed over a historical period of time.
Top Applications
When you click the Applications button (located on the upper, right side of the screen), a list of
your applications display at the bottom of the screen (as shown in the image below) in the
Applications column.
VMware, Inc. 50
VeloCloud Administration Guide
To display specific application data in the graphs, select or unselect the checkboxes next to the
applications in the Applications column. You can also click an application in the Applications
column to open a dialog box, which displays all applications in a Pie chart. (See image below).
In the Top Applications dialog box (as shown in the image below), you can:
n Click an application name (or its color-coded slice of the Pie chart) to view its Transport
Groups, Top Operating Systems, and Top Destinations.
n Click the arrow next to the Top Devices area to open the Sources tab.
n Choose an option from the drop-down menu in the Top Destinations section (by Domain, by
FQDN, or by IP).
n Click the arrow (top, right corner) of the Top Destinations area to open the Destinations tab.
VMware, Inc. 51
VeloCloud Administration Guide
Top Categories
When you click the Categories button, two Category columns display at the bottom of the
screen. The first Category column lists your top categories. Click a category from this column to
open the Top Categories dialog box.
The Top Categories dialog box includes similar features and functionality as the Top
Applications dialog box with a couple of exceptions, instead of Transport Groups, the Top
Categories dialog displays Top Applications in the top, right area of the dialog. Also, when you
click the arrow in the Top Applications area, the Applications tab opens displaying usage data
for all the applications in that category.
Sources Tab
The Edge Sources tab screen displays network usage data (operating system, device type) over
a historical period of time.
The data is displayed as two line graphs. You can change the data that is displayed in the graphs
from the Data drop-down menu (Bytes Received/Sent, Total Bytes, Total Packets, or Packets
Received/Sent). You can also hover over a segment of the graph to display the source and its
associated network usage.
VMware, Inc. 52
VeloCloud Administration Guide
n View the operating systems of your applications and destinations in the Operating Systems
column (located at the bottom of the screen).
n Use Filter to display operating systems based on Application, Category, type of Operating
System, and Destination.
n Click an operating system from the Operating System column to open the Top Operating
Systems dialog box.
n Go to the Applications tab by clicking the gray arrow next to the Top Applications area of
the Top Operating Systems dialog box.
n Go to the Destinations tab by clicking the gray arrow next to the Top Destinations area of
the Top Operating Systems dialog box.
Destinations Tab
The Edge Destinations tab displays network usage as two line graphs (over a historical period of
time) by the destination of the network traffic. If you hover over a segment of the graph, the
destination and its associated network usage appears.
There are three display buttons (Domain, FQDN, and IP) located on the right side of the screen.
Click one of the display buttons to update destinations by type in the Destination column.
For each display button (Domain, FQDN, and IP), the Top Destinations dialog box appears by
type when you click a destination from the Destination column. You can open the Applications
and Sources tabs from the Top Destinations dialog box. Click the gray arrows next to the Top
Applications and Top Operating areas of the dialog boxes (respectively) to open these tabs.
VMware, Inc. 53
VeloCloud Administration Guide
If you mouse over a segment of the graph, the Business Policy characteristics and its associated
network usage appears.
VMware, Inc. 54
VeloCloud Administration Guide
VMware, Inc. 55
VeloCloud Administration Guide
To enable flow stats daily rollups, set the flowStats.daily.rollup.enabled system property to
true.
n What is the maximum number of flows that are rolled up per edge per day?
By default, a maximum of one million flows are rolled up per edge per day. This averages out
to approximately 3500 flows per 5-minute push. You can modify the number of flows that are
rolled up per edge per day, by using the flowStats.daily.rollup.flowLimit system property.
By default, rolling up of hub flows is disabled. You can enable hub flows by using the
flowStats.daily.rollup.edgeflowLimit system property, which takes a key-value pair of
<edgeId>:<numFlows>. You can view high resolution hub flows upto 15 days only.
The retention policy for rolled up stats is configurable on the VCO using the
retentionWeeks.flowStats.daily system property. The rolled-up flow stats retention can be
configured to persist anywhere between 1 and 52 weeks.
n Will the UI be able to query flowstats for more than 15 days after enabling rollups?
No. Rolling up flowstats for longer retention is separated from actually being able to query
those flowstats. You can set the number of days you want to query the flows by using the
session.options.maxFlowstatsRetentionDays system property.
n Will there be side effects from a data perspective after turning on this feature?
Although, no side effects are observed on aggregated results, time-series graphs on the VCO
UI would have a loss in fidelity due to displaying of rolled up series stats.
Since rolling up daily flowstats aggregates results from the full resolution table and stores it
separately, the system load (CPU/load average) is bound to increase due to the additional
processing required by MySQL for aggregating the results.
VMware, Inc. 56
VeloCloud Administration Guide
Since rolling up daily flowstats aggregates results from the high resolution table and stores it
separately, VeloCloud anticipates the need for the on-premise customers to plan their
storage requirements to accommodate rolled up stats. On an average, rolled up flows will
consume 1/8th of the space required for high resolution stats; however, this is strongly
dependent on the uniqueness of daily flows sent by the edge. In any case, the storage space
consumption growth of rolled up flows will be at a much lower rate than the high resolution
statistics. For customers that start off with smaller volume drive, VeloCloud recommends
using logical volumes so the storage capacity can be grown as the Edges increase.
2 In the System Properties screen, click the New System Properties button.
4 Click Save.
VMware, Inc. 57
VeloCloud Administration Guide
You can click a Non-VeloCloud Site from the Site column to open a dialog box to change
information about your site.
n Iaas: AWS
n CWS: Zscaler
The Non-VeloCloud Site screen displays the Status and the Tunnel Status. Types of status results
are listed below:
Color Meaning
Green Connected
Monitor Routing
The Routing feature ( Monitor > Routing > Multicast tab) displays Multicast Group and Multicast
Edge information.
VMware, Inc. 58
VeloCloud Administration Guide
Monitor Alerts
VeloCloud Orchestrator provides an alert function to notify one or more Enterprise
Administrators (or other support users) when a problem occurs. You can access this functionality
by clicking Alerts under Monitor in the navigation panel.
VMware, Inc. 59
VeloCloud Administration Guide
You can send Alerts when a VeloCloud Edge goes offline or comes back online, a WAN link goes
down, a VPN tunnel goes down, or when an Edge HA failover occurs. A delay for sending the
alert after it is detected can be entered for each of the alert types. You can configure alerts in
Configure > Alerts and Notifications.
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
Monitor Events
The Events screen (located under Monitor in the navigation panel) displays the events that have
been generated by the Orchestrator. These events can help you determine the operational
status of the VeloCloud system.
You can click an Event link (under the Event column) to get more details.
VMware, Inc. 60
VeloCloud Administration Guide
Note The "Auto Rollback to Last Known "Good" Configuration" section is new for the 3.3.0
release.
The rollback time, which is the time necessary to detect a bad configuration and apply the
previous known “good” configuration for a standalone Edge, is between 5-6 minutes. For HA
Edges, the rollback time is between 10-12 minutes.
Note This feature rolls back only Edge-level device settings. If the configuration is pushed from
the Profile that causes multiple Edges to go offline from the Orchestrator, the Edges will log “Bad
Configuration” events and roll back to the last known good configuration individually.
IMPORTANT: The Administrator is responsible for fixing the Profile accordingly. the Profile
configuration will not roll back automatically.
Bad Configuration Rolling back device settings to the last known settings. See section titled, “ Auto Rollback to the
Last Known “Good” Configuration for more information.
Edge Provisioned An Edge has been created on the VCO (but not yet activated).
VMware, Inc. 61
VeloCloud Administration Guide
VMware, Inc. 62
Configuring VNFs
7
The VeloCloud SD-WAN solution supports the following third-party firewalls, Palo Alto Networks,
Fortinet, and Check Point CloudGuard Edge VNF. See the links below to successfully deploy and
forward traffic through VNF on the VMware SD-WAN Edge.
n VNF Events
1 Go to Configure> Edges > Edge Overview tab from the VCO navigation panel.
2 In the Profile area, select your profile from the Profile drop-down menu.
3 In the Services section of the Profile area, note the Security VNF's type, deployment state,
and insertion settings, as shown in the following example.
VMware, Inc. 63
VeloCloud Administration Guide
Clicking the Security VNF link opens the network service VNF Management Configuration dialog
so that you can view more information about your VNF.
VMware, Inc. 64
VeloCloud Administration Guide
Note Only Operator Superusers and Standard Operators can enable Edge NFV and Security
VNFs. Business Specialist Operators and Support Operators must contact their Operators to
request access. If you do not have access, your Operator must enable this feature to configure
VNFs. If you have Operator access, see "Step 1: Enable Edge NFV and Edge VNF" in the
Procedure section below.
2 In the Edge NFV area, check the Enable Edge NFV checkbox (image below).
3 In the Security VNFs area, enable the applicable security VNFs: Enable Check Point
Networks Firewall, Enable Fortinet Networks Firewall, or Enable Palo Alto Networks
Firewall.
VMware, Inc. 65
VeloCloud Administration Guide
After you enable Edge NFV and choose a Security VNF, the Enable Edge NFV checkbox
becomes disabled because there is now a network service associated with it.
3 In the VNF Service Management Configuration dialog box complete the following:
a Type in a name in the appropriate text box for the VNF service instance.
b From the VNF Type drop-down menu, choose one of the following for the VNF Type:
Check Point Firewall, Fortinet Firewall, or Palo Alto Networks Firewall.
Note The VNF Service Management Configuration dialog box will require different
information depending upon which VNF type you choose. If you chose Palo Alto
Networks Firewall, see Step 3c. If you chose Check Point Firewall, see step 3d. If you
chose Fortinet Firewall, see step 3e. Follow the appropriate steps below to determine
what types of information is required in the VNF Management Configuration dialog box.
c If you’ve chosen Palo Alto Networks Firewall as the VNF type, enter in the following in the
VNF Management Configuration dialog box as described in the steps below:
2 Type in the Panorama Auth Key in the appropriate text box. The customer must
configure the Auth Key password on Panorama. VNF uses the Auth Key to login and
communicate with Panorama.
The VNFs area updates, displaying the newly created VNF configuration.
VMware, Inc. 66
VeloCloud Administration Guide
4 Define VNF Licenses for Palo Alto Networks. (These licenses will be applied to one or
more VNF configured Edges).
n In the VNF Licenses area, click the New button (from theConfigure > Network
Services screen).
n In the VNF License Configuration dialog box complete the folllowing steps below:
n In the VNF Type drop-down menu, choose the only available option, Palo Alto
Networks Firewall.
n Type in the License Server API Key in the appropriate textbox. The customer
gets this key from their Palo Alto Networks account. The VCO uses this key to
communicate with Palo Alto Networks license server.
n Type in the Authorization Code in the Auth Code textbox. The customer must
purchase the Auth Code from Palo Alto Networks). See image below.
n If the configuration is not valid, an invalid message icon will display next to the
Test button.
VMware, Inc. 67
VeloCloud Administration Guide
n Click Save Changes. The customer can now apply one or more of these
licenses to VNF configured Edges.
d If you’ve chosen Check Point Firewall as the VNF type, enter the following in the VNF
Service Management Configuration dialog box as described below. (See image below).
1 Type in a name in the appropriate text box for your VNF service instance.
2 From the VNF Type drop-down menu, choose Check Point Firewall.
3 Type in the Primary Check Point Mgmt Server IP in the appropriate text box. This is
the Check Point Smart Console IP address that the Check Point CloudGuard Edge will
connect to.
4 Type in the SIC Key for Mgmt Server Access in the appropriate text box. This is the
password used to register the VNF to the Check Point Smart Console.
5 Type in the VNF Image Location in the appropriate text box. This is the image
location where the SD-WAN Orchestrator will download the VNF image.
6 From the Image Version drop-down menu, select a version of the Check Point VNF
image.
7 File Checksum Type autopopulated field – Specifies the method used to validate the
VNF image. This field is automatically populated after you choose an image version
from the above step.
8 File Checksum autopopulated field – Specifies the checksum used to validate the VNF
image. This field is automatically populated after you choose an image version from
the previous step.
VMware, Inc. 68
VeloCloud Administration Guide
9 Download Type radio buttons – Specify where the image is available by choosing one
of the following options, s3 or https. NOTE: When you select https, enter the
username and password in the appropriate text field. When you select s3, enter the
AccessKeyid and SecretAccessKey in the appropriate text field.
The VNFs area updates displaying the newly created VNF configuration (see image
below)
e If you’ve chosen Fortinet Firewall as the VNF type, follow the steps below in the VNF
Service Management Configuration dialog box (see image below).
1 Type in a name in the appropriate text box for your VNF service instance.
2 Choose the VNF type Fortinet Firewall from the drop-down menu.
3 Type in the Fortinet Mgmt Server IP in the appropriate text box. This is the IP address
of the FortiManager for the FortiGate to connect to.
4 Type in the Registration Password. This is the password used to register the VNF to
the FortiManager.
5 Type in the VNF Image Location. This is the image location for the SD- WAN
Orchestrator to download the VNF image.
6 From the Image Version drop-down menu, select a version of the Fortinet VNF
image.
7 File Checksum Type text box– Specifies the method used to validate the VNF image.
This field is automatically populated after you choose an image version from the
previous step.
VMware, Inc. 69
VeloCloud Administration Guide
8 File Checksum text box – Specifies the checksum used to validate the VNF image.
This field is automatically populated after you choose an image version from the
previous step.
9 Download Type radio buttons – Specify where the image is available by choosing one
of the following options, s3 or https. NOTE: When you select https, enter the
username and password in the appropriate text field. When you select s3, enter the
AccessKeyid and SecretAccessKey in the appropriate text field.
The VNFs area updates displaying the newly created VNF configuration (see image
below).
4 In the Device tab screen, scroll down to the Security VNF area, click the Edit button.
5 In the Edge VNF Configuration dialog, check the Deploy checkbox (image below).
6 In the Edge VNF Configuration dialog box, check the Deploy checkbox.
VMware, Inc. 70
VeloCloud Administration Guide
7 In the VM Configuration area of the Edge VNF Configuration dialog box complete the
following:
a Choose a VLAN from the drop-down menu. (This VLAN will be used for the VNF
management).
b Type in the Management IP. Note that when the VNF is created, it will automatically
specify the IP address of the VLAN interface as a default Gateway.
d Choose a Deployment State. The type of deployment state will be determined based on
what type of predefined “Security VNF” network service as described below.
n If you choose Fortinet or Checkpoint as a security VNF, choose from one of the
following two Deployment States: Image Downloaded and Powered On or Image
Downloaded and Powered Off. (See the table below for a description of these states).
n If you choose PaloAlto Networks as a security VNF, choose from one of the following
two Deployment States: Powered On or Powered Off. (See the table below for more
information about these states).
State Definition
Powered Off After building the firewall VNF on the Edge, keep it
powered down.
Note Traffic only transits the VNF when it is in the “Powered On” state, which
requires that at least one VLAN or routed interface be configured for VNF insertion.
Do not select ‘Powered Off’ if you intend to send traffic through the VNF.
VMware, Inc. 71
VeloCloud Administration Guide
e In the Security VNF drop-down menu, choose one of the following: a predefined VNF
network service or a new network service (if you choose the later option, the Network
Service VNF Configuration dialog box opens so you can create a new VNF service).
n Type in the Device Group Name and the Config Template Name in the
appropriate textboxes. (The Device Group Name and the Config Template Name
are pre-configured on the Panorama server).
n Drag the license file into the License box located at the bottom of the screen.
1 If you are not in the Device tab screen for a VeloCloud Edge, go to Configure > Edges in the
navigation panel of the VCO.
2 Select an Edge and click the Device icon associated with the selected Edge located the
Device column.
VMware, Inc. 72
VeloCloud Administration Guide
5 In the VLAN dialog box, click the VPN Insertion checkbox to insert the VNF into VLAN. This
step redirects traffic from a specific VLAN into the VNF.
6 Insert the VNF into Layer 3 interfaces or sub-interfaces. This step redirects traffic from
specific Layer 3 interfaces or subinterfaces into the VNF.
As shown in the following figure, the segment in which the VNF is inserted is assigned a unique
VLAN ID. The FW policy on the VNF is defined using these VLAN IDs. Traffic from VLANs and
interfaces within these segments is tagged with the VLAN ID allocated for that particular
segment.
VMware, Inc. 73
VeloCloud Administration Guide
The following figure zooms into the FW VNF area of the preceding figure.
Note the following about Firewall VNF (The image below pertains to Palo Alto Networks only):
To define mapping between segments and service VLANs (Step 3), complete the following
substeps:
VMware, Inc. 74
VeloCloud Administration Guide
n View All the VNF Network Services Configured for the Customer
You can monitor the VNF status of the Edges from the VeloCloud Orchestrator at Monitor >
Edges. VNF Monitoring can be classified in two categories
In the Edge Monitoring table, you can check the VNF status for an Edge. Hover over the icon in
the VNF column to view additional information about your VNF (type, serial number, and when it
was deployed).
Click the VM Status link to open the VNF Virtual Machine Status dialog box, where you can view
the deployment status for the Edge. To view deployment details, click the Deployment Details
View link.
VMware, Inc. 75
VeloCloud Administration Guide
View All the VNF Network Services Configured for the Customer
You can view all the VNF network services configured for the customer from the VCO at
Monitoring > Network Services.
VNF Events
VNF Events are categorized into the following categories:
n VNF_VM_POWERED_ON
n VNF_VM_POWERED_OFF
n VNF_VM_DELETED
n VNF_VM_ERROR
n VNF_INSERTION_DISABLED
VMware, Inc. 76
VeloCloud Administration Guide
n Choose the Edge VNF Virtual Machine Deployment notification to receive an alert when an
Edge virtual machine deployment state changes.
n Choose the Edge VNF Insertion notification to receive an alert when an Edge VNF
deployment state changes.
VMware, Inc. 77
VeloCloud Administration Guide
VPN Tunnel Down Receive an alert when the IPSec tunnel configured from the
VeloCloud service to your VPN Gateway cannot be
established or if the tunnel is dropped and cannot be re-
established.
Edge VNF Virtual Machine Deployment Receive an alert when an Edge VNF virtual machine
deployment state changes.
Edge VNF Insertion Receive an alert when an Edge VNF deployment state
changes.
Edge VNF Image Download Event Receive an alert when an Edge VNF image download state
changes.
Edge CSS Tunnel Up Receive an alert when the Edge Cloud Secruity Service
Tunnel is up.
Edge CSS Tunnel Down Receive an alert when the Edge Cloud Secruity Service
Tunnel is down.
To set alerts:
1 In the Select Alerts area, select the type of alert you want to receive.
2 No need to the number of Notification Delay minutes for each type because the Notification
Delay value is not valid for VNF alerts.
3 If applicable, type in Customers, Email Addresses, Phone Numbers, and SNMP Traps in the
appropriate textboxes.
VMware, Inc. 78
Configure Segments
8
In the VeloCloud segment-aware topology, different VPN profiles can be enabled for each
segment. For example, Guest traffic can be backhauled to remote data center firewall services:
Voice media can flow direct from Branch-to-Branch based on dynamic tunnels, and the PCI
segment can backhaul traffic to the data center to exit out of the PCI network.
You can create segments in the Segments window ( Configure > Segments in the navigation
panel).
n Regular
n CDE (Cardholder Data Environment). The CDE type is for customers who require PCI and
want to leverage the VeloCloud SD-WAN PCI certification.
Beginning with the 3.1 release, VeloCloud provides PCI certified VeloCloud SD-WAN service. For
customers who have PCI certified VeloCloud SD-WAN, they must create a segment for PCI traffic
and assign the type as CDE. VeloCloud hosted Orchestrator and Controller will be aware of the
PCI segment and in the PCI scope. Gateways (marked as non-CDE Gateways) will not be aware
or transmit PCI traffic and will be out of PCI scope.
Note For information about the Service VLAN column in the Segments screen, see Step 3
"Define Mapping between Segments and Service VLANs (Optional)" in Chapter 7 Configuring
VNFs.
The following table describes the fields displayed in the Segments screen.
Field Description
VMware, Inc. 79
VeloCloud Administration Guide
Field Description
Delegate To Partner By default, this is selected. If unselected, the Partner cannot change configs within the segment,
including the interface assignment.
Delegate To Customer By default, this is selected. If unselected, the Customer cannot change configs within the
segment, including the interface assignment.
VMware, Inc. 80
Configure Network Services
9
This section describes how to configure network services.
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
n Edge Cluster
n Non-VeloCloud Sites
n VNFs
n VNF Licenses
n DNS Services
n Netflow Settings
n Authentication Services
Note Configuring Network Services are optional and can be configured in any order.
VMware, Inc. 81
VeloCloud Administration Guide
SD-WAN Edge Clustering addresses the issue of SD-WAN Hub scale because it can be used to
easily expand the tunnel capacity of the Hub dynamically by creating a logical cluster of Edges.
Edge Clustering also provides resiliency via the Active/Active High Availability (HA) topology that
a cluster of SD-WAN Edges would provide. A cluster is functionally treated as an individual Hub
from the perspective of other Edges.
The Hubs in a VMware SD-WAN Cluster can be either physical or Virtual Edges. If they are virtual,
they may exist on a single hypervisor or across multiple hypervisors.
VMware, Inc. 82
VeloCloud Administration Guide
Each Edge in a cluster periodically reports usage and load stats to the SD-WAN Gateway. The
load value is calculated based on Edge CPU and memory utilization along with the number of
tunnels connected to the Hub as a percentage of the Edge model’s tunnel capacity. The Hubs
within the cluster do not directly communicate nor exchange state information. Typically, Edge
Clusters are deployed as Hubs in data centers.
Note Theoretically, Edge Clustering could be used to horizontally scale other vectors, such as
throughput. However, the current Edge Clustering implementation has been specifically designed
and tested to scale at tunnel capacity only.
There are four important concepts to understand before describing the SD-WAN Edge Clustering
functionality.
1 Edge Clustering has been designed and tested to be used on Hubs as follows:
n To allow greater tunnel capacity for a Hub than an individual Edge serving as a Hub can
provide.
n To distribute the remote Spoke Edges among multiple Hubs and reduce the impact of any
incident that may occur.
2 Cluster Score is a mathematical calculation of the overall utilization of the system as follows:
n The three measured utilization factors are CPU usage, memory usage, and tunnel
capacity.
n Tunnel capacity is based on the rated capacity for a given hardware model or Virtual
Edge configuration.
n While throughput is not directly considered, CPU and memory usage indirectly reflect
throughput and flow volume on a given Hub.
VMware, Inc. 83
VeloCloud Administration Guide
4 A “logical ID” is a 128-bit UUID that uniquely identifies an element inside the VeloCloud
Network.
n For instance, each Edge is represented by a logical ID and each Cluster is represented by
a logical ID.
n While the user is providing the Edge and Cluster names, the logical IDs are guaranteed to
be unique and are used for internal identification of elements.
Once a Hub is added to a VeloCloud Cluster, the Hub will tear down and rebuild tunnels to all of
its assigned Gateways and indicate to each Gateway that the Hub has been assigned to a Cluster
and provide a Cluster logical ID.
n The logical ID
n The name
n The logical ID
n The name
n A set of statistics, updated every 30 seconds via a periodic message sent from the Hub to
each assigned Gateway, including:
n The current computed Cluster Score based on the formula provided above.
A Hub is removed from the list of Hub objects when the Gateway has not received any packets
from the Hub Edge for more than seven seconds.
In a traditional Hub and Spoke topology, the SD-WAN Orchestrator provides the Edge with the
logical ID of the Hub to which it must be connected. The Edge asks its assigned Gateways for
connectivity information for that Hub logical ID—i.e. IP addresses and ports, which the Edge will
use to connect to that Hub.
VMware, Inc. 84
VeloCloud Administration Guide
From the Edge’s perspective, this behavior is identical when connecting to a Cluster. The
Orchestrator informs the Edge that the logical ID of the Hub it should connect to is the Cluster
logical ID rather than the individual Hub logical ID. The Edge follows the same procedure of
sending a Hub connection request to the Gateways and expects connectivity information in
response.
There are two divergences from basic Hub behavior at this point:
n Divergence Number One: The Gateway must choose which Hub to assign.
n Divergence Number Two: Due to Divergence Number One, the Edge may get different
assignments from its different Gateways.
Divergence Number One was originally addressed by using the Cluster Score to assign the least
loaded Hub in a Cluster to an Edge. While in practice this is logical, in the real world, it turned out
to be a less than ideal solution because a typical reassignment event can involve hundreds or
even thousands of Edges and the Cluster Score is only updated every 30 seconds. In other
words, if Hub 1 has a Cluster Score of 20 and Hub 2 has a Cluster Score of 21, for 30 seconds all
Edges would choose Hub 1, at which point it may be overloaded and trigger further
reassignments.
Instead, the Gateway first attempts a fair mathematical distribution disregarding the Cluster
Score. The Edge logical IDs, which were generated by a secure random-number generator on the
Orchestrator, will (given enough Edges) have an even distribution of values. That means that
using the logical ID, a fair share distribution can be calculated.
n Edge logical ID modulo the number of Hubs in Cluster = Assigned Hub index
n For example:
This is more consistent than a round-robin type assignment because it means that Edges will
tend to be assigned the same Hub each time, which makes assignment and troubleshooting
more predictive.
Note When a Hub restarts (e.g. due to maintenance or failure), it will be disconnected from
the Gateway and removed from the Cluster. This means that Edges will always be evenly
distributed following all Edges restarting (due to the above described logic), but will be
unevenly distributed following any Hub event that causes it to lose connectivity.
What happens when a Hub exceeds its maximum allowed tunnel capacity?
VMware, Inc. 85
VeloCloud Administration Guide
The Edge assignment logic will attempt to evenly distribute the Edges between all available
Hubs. However, after an event (e.g. restart) on the Hub, the Edge distribution will no longer be
even.
Note Generally, the Gateway tries at initial assignment to evenly distributed Edges among Hubs,
an uneven distribution is not considered an invalid state. If the assignments are uneven but no
individual Hub exceeds 70% tunnel capacity, the assignment is considered valid.
Due to such an event on the Hub (or adding additional Edges to the network), Clusters might
reach a point where an individual Hub has exceeded 70% of its permitted tunnel capacity. If this
happens, and at least one other Hub is at less than 70% tunnel capacity, then fair share
redistribution is performed automatically regardless of whether rebalancing is enabled on the
Orchestrator. Most Edges will retain their existing assignment due to the predictive mathematical
assignment using logical IDs, and the Edges that have been assigned to other Hubs due to
failovers or previous utilization rebalancing will be rebalanced to ensure the Cluster is returned to
an even distribution automatically.
What happens when a Hub exceeds its maximum allowed Cluster Score?
Unlike tunnel percentage (a direct measure of capacity), which can be acted upon immediately,
the Cluster Score is only updated every 30 seconds and the Gateway cannot automatically
calculate what the adjusted Cluster Score will be after making an Edge reassignment. In the
Cluster configuration, an Auto Rebalance parameter is provided to indicate whether the Gateway
should dynamically attempt to shift the Edge load for each Hub as needed.
If Auto Rebalance is disabled and a Hub exceeds a 70 Cluster Score (but not 70% tunnel
capacity), then no action is taken.
If Auto Rebalance is enabled and one or more Hubs exceed a 70 Cluster Score, the Gateway will
reassign one Edge per minute to the Hub with the lowest current Cluster Score until all Hubs are
below 70 or there are no more reassignments possible.
What happens when two SD-WAN Gateways give different Hub assignments?
If an Edge is not currently connected to a Hub in a Cluster, it will accept the assignment from any
Gateway that responds. This ensures that Edges are never left unassigned in a scenario where
some Gateways are down and others are up.
VMware, Inc. 86
VeloCloud Administration Guide
If an Edge is connected to a Hub in a Cluster and it gets a message indicating it should choose an
alternate Hub, this message is processed in order of “Gateway Preference.” For instance, if the
Super Gateway is connected, the Edge will only accept reassignments from the Super Gateway.
Conflicting assignments requested by other Gateways will be ignored. Similarly, if the Super
Gateway is not connected, the Edge would only accept reassignments from the Alternate Super
Gateway. For Partner Gateways (where no Super Gateways exist), the Gateway Preference is
based on the order of configured Partner Gateways for that specific Edge.
When a SD-WAN Gateway goes down, Edges may be reassigned if the most preferred Gateway
was the one that went down, and the next most preferred Gateway provided a different
assignment. For instance, the Super Gateway assigned Hub A to this Edge while the Alternate
Super Gateway assigned Hub B to the same Edge.
The Super Gateway going down will trigger the Edge to fail over to Hub B, since the Alternate
Super Gateway is now the most preferred Gateway for connectivity information.
When the Super Gateway recovers, the Edge will again request a Hub assignment from this
Gateway. In order to prevent the Edge switching back to Hub A again in the scenario above, the
Hub assignment request includes the currently assigned Hub (if there is one). When the Gateway
processes the assignment request, if the Edge is currently assigned a Hub in the Cluster and that
Hub has a Cluster Score less than 70, the Gateway updates its local assignment to match the
existing assignment without going through its assignment logic. This ensures that the Super
Gateway, on recovery, will assign the currently connected Hub and prevent a gratuitous failover
for its assigned Edges.
As noted above, the Hubs report to the SD-WAN Gateways the number of dynamic routes they
have learned via BGP every 30 seconds. If routes are lost for only one Hub in a Cluster, either
because they are erroneously retracted or the BGP neighborship fails, the SD-WAN Gateways
will failover Spoke Edges to another Hub in the Cluster that has an intact routing table.
As the updates are sent every 30 seconds, the route count is based on the moment in time when
the update is sent to the SD- WAN Gateway. The SD-WAN Gateway rebalancing logic occurs
every 60 seconds, meaning that users can expect failover to take 30-60 seconds in the unlikely
event of total loss of a LAN-side BGP neighbor. To ensure that all Hubs have a chance to update
the SD-WAN Gateways again following such an event, rebalancing is limited to a maximum of
once per 120 seconds. This means that users can expect failover to take 120 seconds for a
second successive failure.
The SD-WAN Gateway will wait for tunnels to be declared dead (7 seconds) before failing over
Spoke Edges. This means that users can expect failover to take 7-10 seconds (depending on
RTT) when a SD-WAN Hub or all its associated WAN links fail.
VMware, Inc. 87
VeloCloud Administration Guide
a From the Edge Cluster area, click the New Cluster button.
b In the Edge Cluster dialog box, enter the name and description in the appropriate text
boxes. (See image below).
Note As stated in the Auto Rebalance tool tip in the VCO: If this option is enabled, when
an individual Edge in a Hub cluster exceeds 70% aggregate utilization, we will rebalance
spokes at the rate of one spoke per minute until utilization is reduced by 70%. This
rebalancing will cause VPN tunnels to disconnect and may cause up to 6-10 seconds of
downtime to prevent overloading of individual Hubs. If all in a Hub cluster exceed 70%, no
d In the Available Edges section, select an Edge and (using the arrow) move it to the Edges
In Cluster section.
Note Edges used as a Hub or in Hub Clusters, or configured as an Active Standby HA pair
are not displayed in the Available Edges list area.
VMware, Inc. 88
VeloCloud Administration Guide
3 An Edge Cluster and an individual Edge can be simultaneously configured as Hubs in a branch
profile. Once Edges are assigned to a Cluster, they cannot be assigned as individual Hubs.
Choose an Edge Cluster as a Hub in the Branch Profile.
4 Branch to Branch VPN using Hubs functions the same regardless of whether the Hubs are
Clusters or individual Edges. In order to configure Branch to Branch VPN using Hubs that are
also Edge Clusters, you can select a Hub from the VeloCloud Hubs area and move it to the
Branch to Branch VPN Hubs area.
5 Hub Clusters can also be configured as Internet Backhaul Hubs in the business policy
configuration by selecting a Hub from the VeloCloud Hubs area and move it to Backhaul
Hubs area ( Business Policy Match dialog) and above ( Backhaul Hubs area).
VMware, Inc. 89
VeloCloud Administration Guide
n Check Point
n Cisco ASA
n Cisco ISR
n Palo Alto
n SonicWALL
n Zscaler
Note VeloCloud now supports both Generic IKEv1 Router (Route Based VPN) and Generic
IKEv2 Router (Route Based VPN) Non-VeloCloud Site Configurations.
VMware, Inc. 90
VeloCloud Administration Guide
Cisco ISR
Cisco ISR is one of the more common third party configurations. Instructions on how to configure
with Cisco ISR in the VeloCloud Orchestrator are listed below.
c Type in the Primary VPN Gateway (and the Secondary VPN Gateway if necessary).
4 Click Next.
Your Non-VeloCloud Site is created, and a dialog box for your Non-VeloCloud Site appears.
(See image below).
VMware, Inc. 91
VeloCloud Administration Guide
a Click the Advanced button located at the bottom of the dialog box.
c The VeloCloud Orchestrator generates a PSK by default. If you want to use your own
PSK, type it in the PSK text box.
f To provide an optimal Source NAT IP to translate the source IP address, type the IP in the
Source NAP IP text box.
Note The View IKE/IPSec Template button shows a sample configuration of the PSK
and IP details that would be useful to configure a Non-VeloCloud Site.
Cisco ASA
Cisco ASA is another common third party configuration. Instructions on how to configure with
Cisco ASA in the VeloCloud Orchestrator are listed below.
VMware, Inc. 92
VeloCloud Administration Guide
4 Click Next.
Your Non-VeloCloud Site is created, and a dialog box for your Non-VeloCloud Site appears.
a Click the Advanced button located at the bottom of the dialog box.
c The VeloCloud Orchestrator generates a PSK by default. If you want to use your own
PSK, type it in the PSK text box.
VMware, Inc. 93
VeloCloud Administration Guide
e Type in the Subnet and description for your site. (Type in Custom Source Subnets if
necessary).
f To provide an optimal Source NAT IP if to translate the source IP address, type the IP in
the Source NAP IP text box.
Note The View IKE/IPSec Template button shows a sample configuration of the PSK
and IP details that would be useful to configure a Non-VeloCloud Site.
Click the links for the following sections below to complete the instructions to configure Check
Point.
Step 2: Step 2: Configure Check Point as the Non-VeloCloud Site on the VeloCloud Orchestrator
Prerequisites
You must have an active Check Point account and login credentials to access Check Point's
Infinity Portal.
You must have an active Check Point account and login credentials to access Check Point's
Infinity Portal.
Procedure
1 To configure the Check Point CloudGuard service, login to Check Point’s Infinity Portal at
(https://portal.checkpoint.com/).
VMware, Inc. 94
VeloCloud Administration Guide
2 Once logged in, create a site at Check Point's Infinity Portal via the following link: https://
sc1.checkpoint.com/documents/integrations/VeloCloud/check-point-VeloCloud-
integration.html
After you create a site at Check Point's Infinity Portal, you're ready to complete Step 2: Step
2: Configure Check Point as the Non-VeloCloud Site on the VeloCloud Orchestrator
After you create a site at Check Point's Infinity Portal, complete the steps below:
Procedure
3 Complete the following sub steps in the New Non-VeloCloud Sitedialog box:
VMware, Inc. 95
VeloCloud Administration Guide
c Type in the Primary VPN Gateway (and the Secondary VPN Gateway if necessary).
d Click Next.
Note To configure tunnel settings to the Non-VeloCloud site’s Primary VPN Gateway,
click the Advanced button located at the bottom of the dialog box. Any changes made to
Encryption, DH Group, or PFS will also be applied to the redundant tunnel configuration.
After saving your changes, update the site's primary VPN Gateway device. Click on the
"View IKE/IPSec Template" button for details.
4 In the Primary VPN Gateway area, of the dialog box of your Non-VeloCloud Site (image
above):
a PSK text box: Enter the Pre-Shared Key that was configured on the Check Point infinity
portal. Do not configure redundant IPsec tunnels (keep the checkbox for Redundant
VeloCloud Cloud VPN unchecked).
b Encryption drop-down menu: The Encryption should be set to the same algorithm that
was configured on the checkpoint infinity portal.
c DH Group: The DH group should be set to the same value that was configured on the
checkpoint infinity portal.
d For the purposes of this specific Check Point configuration, choose disabled from PFS
drop-down menu.
5 To add a Secondary VPN Gateway click the Add button. Clicking the Save Changes button
will immediately create the Secondary VPN Gateway for this site and provision a VeloCloud
VPN tunnel to this Gateway.
6 As mentioned in Step 4a above, leave the Redundant VeloCloud Cloud VPN checkbox
unchecked.
VMware, Inc. 96
VeloCloud Administration Guide
7 For the purposes of the Check Point configuration, choose Default from the Local Auth Id
drop-down menu.
8 For the purposes of the Check Point configuration, check the Disable Site Subnets checkbox.
10 Check the Enable Tunnel(s) checkbox once you are ready to initiate the tunnel from the
VeloCloud Gateway to the Check Point CloudGuard VPN gateways.
The Amazon Web Services (AWS) configuration consists of two major steps (with multiple steps
within each one).
1 Obtain Public IP, Inside IP, and PSK details from the Amazon Web Services website.
2 Enter the details you obtained from the AWS website into the “Non-VeloCloud Network
Service” in the VeloCloud Orchestrator.
To configure using Amazon Web Services, complete the instructions in the following section.
When using Amazon Web Services for your configurations, refer to the instructions in Amazon's
documentation (Amazon Virtual Private Cloud Network Administrator Guide), which can be found
at: http://awsdocs.s3.amazonaws.com/VPC/latest/vpc-nag.pdf. Reference the following section,
"Example: Generic Customer Gateway without Border Gateway" on page 79 for specific
configuration instructions .
1 From Amazon's Web Services, create VPC and VPN Connections. (See section above for the
link on how to access the Amazon Web Services to complete this step).
2 Make note of the VeloCloud gateways associated with the enterprise account in the
VeloCloud Orchestrator that might be needed to create a virtual private gateway in the
Amazon Web Services.
3 Make a note of the Public IP, Inside IP and PSK details associated with the Virtual Private
Gateway. You will enter this information in the VeloCloud Orchestrator when you create a
Non-VeloCloud Site.
VMware, Inc. 97
VeloCloud Administration Guide
b Select Generic Router (Route Based VPN) from the Type drop-down menu.
c Type in the Primary VPN Gateway (and the Secondary VPN Gateway if necessary).
d Click Next.
Your Non-VeloCloud Site is created, and a dialog box for your Non-VeloCloud Site
appears.
c Type in the Site Subnet(s) and description. (Enter the network which is behind the VPN
firewall / router and can be exposed to branches for access).
d To provide an optimal Source NAT IP to translate the source IP address, type the IP in the
Source NAT IP text box.
e Add the PSK details and the Public IP you obtained from the Amazon Web Services site.
f Select the Redundant VeloCloud Cloud VPN checkbox to establish redundant tunnels on
a second gateway. This functionality establishes a redundant tunnel from a redundant
VeloCloud Gateway to the Non-VeloCloud Site.
Note The View IKE/IPSec Template button shows a sample configuration of the PSK
and IP details that would be useful to configure a Non-VeloCloud Site.
VMware, Inc. 98
VeloCloud Administration Guide
Note You can click the symbol next to the PSK to change to a visible display.
Configure Zscaler
The Zscaler configuration includes four major steps. You must perform all four steps to complete
this configuration.
The first three major steps include setting up a VPN IPSec tunnel gateway between VeloCloud
and Zscaler, and the last step requires that you set up business rules. Complete the following
configuration steps:
Note You will perform Step 1, Step 2, and Step 4 in the VeloCloud Orchestrator. You will perform
Step 3 at the Zscaler site.
VMware, Inc. 99
VeloCloud Administration Guide
1 From the navigation panel in the VCO, go to Configure > Network Services.
d Click Next.
Your Non-VeloCloud Site is created, and a dialog box for your Non-VeloCloud Site
appears.
a Click the Advanced button located at the bottom of the dialog box.
d In the Authentication drop-down menu, choose User FQDN and type in the domain
address.
e Copy the User FQDN domain address and the PSK. (You will need this information when
you set up your VPN Credentials in your Zscaler account).
Note You can click the symbol next to the PSK to change the PSK information to a
visible display.
2 In the Configure Profiles screen, click the Devices icon to the right of your profile. (For
multiple Edges, use the drop-down menu to select your Edge, then click the Device tab).
3 From the Cloud VPN area, click the symbol, and choose your Non-VeloCloud Site from the
drop-down menu.
Note You can also create a new Non-VeloCloud Site from the Cloud VPN area. After you
click the symbol, choose New Non-VeloCloud Site ... from the drop-down menu.
Complete the following these steps on the Zscaler website. From there, you will create a Zscaler
account, add VPN credentials, and add a location.
a At the top of the Zscaler screen, hover over the Administration option to display the
drop down menu. (See image below).
2 Type the User ID and Pre-Shared Key (PSK). You obtained this information from your
Non-VeloCloud Site's dialog box from the VCO.
4 Click Save.
3 Assign a location:
a At the top of the Zscaler screen, hover over the Administration option to display the
drop-down menu.
1 Complete the text boxes in the Location area (Name, Country, State/Province, Time
Zone).
3 In the VPN Credentials drop-down menu, select the credential you just created. (See
image below).
4 Click Done.
5 Click Save.
2 In the VeloCloud Edges screen, click the Bus. Policy icon for your Edge.
2 In the Destination area of the Match section, choose your options. (Example options
are shown below):
b Choose Internet.
d Type your port in the Ports text box. The image below shows an example using
the port 80 option. VeloCloud recommends using port 80 or port 443. See note at
the end of this section for more information.
3 In the Action area, choose your options. (Example options are shown below):
b For Network Service, click Internet Backhaul and choose your Non-VeloCloud
Site from the drop down menu.
b Click OK.
Note VeloCloud recommends business policy rules to Backhaul web traffic, specifically
port 80 and 443. You can send all Internet traffic to Backhaul Zscaler. An image example
using port 443 is shown below.
Configuration Tasks
This section describes configuration tasks for NVS.
VPN Workflow
This is an optional service that allows you to create VPN tunnel configurations to access one or
more Non-VeloCloud Sites. The VeloCloud provides the configuration required to create the
tunnel(s) – including creating IKE IPSec configuration and generating a pre-shared key.
Overview
The following figure shows an overview of the VPN tunnels that can be created between the
VeloCloud and a Non-VeloCloud Site.
Note It is required that an IP address be specified for a Primary VPN Gateway at the Non-
VeloCloud Site. The IP address is used to form a Primary VPN Tunnel between a VeloCloud
Gateway and the Primary VPN Gateway.
Optionally, an IP address can be specified for a Secondary VPN Gateway to form a Secondary
VPN Tunnel between a VeloCloud Gateway and the Secondary VPN Gateway. Using Advanced
Settings, Redundant VPN Tunnels can be specified for any VPN tunnels you create.
Click the Advanced Settings button to enter additional subnet parameters, VPN Gateway
parameters, and to add Redundant VPN tunnel(s).
1 In the New Cloud Proxy dialog box, specify a Service Name and select a Service type.
Currently, the connectivity from a branch Edge to a cloud service or a Non-VeloCloud site is
established through the VeloCloud Gateway. In this model, the VeloCloud Gateway aggregates
traffic from multiple branch Edges and securely forwards the traffic to the Non-VeloCloud site.
You can also configure the branch Edge to establish a tunnel direct to the cloud service pop. This
option has the following advantages:
n You can save link bandwidth costs by offloading non-enterprise traffic to the internet.
n By redirecting the Internet traffic to a cloud security service, you can ensure that the branch
sites are protected from malicious traffic.
n Simplified configuration.
This document describes how to define and configure a cloud security service instance and
establish a secure tunnel directly from the Edge to the cloud security service. The configuration is
divided into three parts:
In the Enterprise portal, navigate to Configure > Network Services. For establishing a secured
tunnel to cloud security service sites from the Edge, you can define the service instance in the
Cloud Security Service area.
3 In the New Cloud Security Provider dialog box, select the Service Type for the cloud service.
Note If you have selected Zscaler Cloud Security Service as Service Type and planning to
assign a GRE tunnel, it is recommended to enter only IP address as Point-of-Presence and not
the hostname, as GRE does not support hostnames.
Note You must configure the tunnel attributes for each Edge. See the Configure Cloud Security
Services for Edges section.
n You should have Cloud security service gateway endpoint IPs and FQDN credentials
configured in the third party CSS.
2 Click the Device Icon next to a profile, or click the link to the profile, and then click the Device
tab.
3 In the Cloud Security section, switch the dial from the Off position to the On position.
Option Description
Cloud Security Service Select a cloud security service from the drop-down
menu. You can also click New Cloud Security Service
from the drop-down to create a new service type.
Tunneling Protocol This option is available only for Zscaler cloud security
service. Choose either IPsec or GRE. By default, IPsec is
selected.
Hash Select the Hash function as SHA 1 or SHA 256 from the
drop-down. By default, SHA 1 is selected.
Key Exchange Protocol This option is not available for Symantec cloud security
service.
Select the key exchange method as IKEv1 or IKEv2. By
default, IKEv2 is selected.
When you enable Cloud Security Service and configure the settings in a profile, the setting is
automatically applied to the Edges that are associated with the profile. If required, you can
override the configuration for a specific Edge. See Configure Cloud Security Services for Edges.
For the profiles created with cloud security service enabled and configured prior to 3.3.1 release,
you can choose to redirect the traffic as follows:
n Redirect traffic based on Business Policy Settings – This option is available only from release
3.3.1. If you choose this option, then the other two options are no longer available.
Note For the new profiles that you create for release 3.3.1 or later, by default, the traffic is
redirected as per the Business Policy settings.
You can create a rule in the business policy to redirect the traffic to cloud security service.
1 In the Business Policy tab of the profile, create a new rule by clicking New Rule or, from the
Actions drop-down menu, choose New.
3 In the Action area, click the Internet Backhaul button and choose Cloud Security Service.
4 Click OK.
2 In the Cloud Security Service section, the cloud security service parameters of the
associated profile are displayed. Select Enable Edge Override, to modify the attributes. For
more information on the attributes, see Configure Cloud Security Services for Profiles.
Apart from the existing attributes, you can configure the following additional parameters for an
Edge:
n FQDN – Enter the Fully Qualified Domain Name for an IPsec protocol.
Note The above options are not available for Symantec cloud security service.
If you choose the GRE tunneling protocol for Zscaler cloud security service, add the GRE tunnel
parameters.
Option Description
Option Description
Primary ZEN IP/Mask Enter the primary IP address of Internal Zscaler Public
Service Edge.
Secondary ZEN IP/Mask Enter the secondary IP address of Internal Zscaler Public
Service Edge.
Note The Router IP/Mask and ZEN IP/Mask are provided by Zscaler.
3 Click OK and the tunnel details are displayed in the Cloud Security Services section.
Click Save Changes in the Edges window to save the modified settings.
For the profiles created with cloud security service enabled and configured prior to 3.3.1 release,
you can choose to redirect the traffic as follows:
n Redirect traffic based on Business Policy Settings – This option is available only from release
3.3.1. If you choose this option, then the other two options are no longer available.
Note For the new profiles that you create for release 3.3.1 or later, by default, the traffic is
redirected as per the Business Policy settings.
You can create a rule in the business policy to associate the cloud security service.
1 In the Business Policy tab of the Edge, create a new rule by clicking New Rule or, from the
Actions drop-down menu, choose New Rule.
3 In the Action area, click the Internet Backhaul button and choose Cloud Security Service.
4 Click OK.
Edges Screen
To monitor your cloud services from the Edges screen, go to Monitor > Edges. This view displays
the number of tunnels that are up and the number of tunnels that are down.
The Edge Status column in the Cloud Security Tunnel State area displays how many Edges are
fully connected and disconnected.
Status Column
The Status column shows the overall connectivity state of the specific Cloud Security Service. If
all Edges are fully connected, the color of the icon will be green. If some Edges are connected,
while some are disconnected, the color of the icon will be yellow. If all Edges are disconnected,
the color of the icon will be red.
Events
To view the Events for the Cloud Security Service, click the Events link in the Cloud Security
Service Sites area.
The DNS Service can be for a public DNS service or a private DNS service provided by your
company. A Primary Server and Backup Server can be specified. The service is preconfigured to
use Google and Open DNS servers.
For a private service, you can also specify one or more Private Domains.
Procedure
2 To configure a collector, go to the Netflow Settings area and click the New button at the
right side of the Collector table. The Add New Collector dialog box appears.
a In the Collector Name text box, enter a unique name for the collector.
c In the Collector Port text box, enter the port ID of the collector.
Under Network Services, the newly added collector appears in the Collector table.
3 VCO allows filtering of traffic flow records by source IP, destination IP, and application ID
associated with the flow. To configure a filter, go to the Netflow Settings area and click the
New button at the right side of the Filter table. The Add New Filter dialog box appears.
a In the Filter Name text box, enter a unique name for the filter.
b Under the Match area, click Define to define per collector filtering rules to match by
source IP or destination IP or application associated with the flow, or click Any to use any
of the source IP or destination IP or application associated with the flow as the match
criteria for Netflow filtering.
c Under the Action area, select either Allow or Deny as the filter action for the traffic flow,
and click OK.
Under Network Services, the newly added filter appears in the Filter table.
Results
At the profile and edge level, the configured collectors and filters appears as a list under the
Netflow Settings area in the Device tab.
n While configuring a profile or edge, you can either select a collector and filter from the
available list or add a new collector and a filter. For steps, see Configure Netflow Settings at
the Profile Level.
n To override Netflow settings at the Edge level, see Configure Netflow Settings at the Edge
Level.
3 In New Private Network Name dialog box, enter a unique name in the appropriate text box.
The private network name appears in the Private Network Name area.
1 Select the name by clicking the name's checkbox, and then click the Delete button.
You can select private link tags when you define a User Defined Overlay. See section titled, "
Select a Private Network Name."
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
Profiles have four tab pages: Profile Overview, Device, Business Policy, and Firewall.
n Create a Profile
n Modify a Profile
Create a Profile
After a new installation, the VeloCloud Orchestrator has the following predefined Profiles:
Internet Profile, VPN Profile, and as of the 3.0 release, Segment-based profiles.
Note With the Segmentation feature introduced in the 3.0 release, Edges running the software
prior to 3.0 could have a Network-based Configuration or a Segmentation-based Configuration.
**Because of this transition, you must migrate/convert the Network-based profile to the
Segment-based profile.
The following steps are typically followed when creating a new Profile:
1 Create a Profile
2 Configure Device
a Select Network
b Assign Authentication/DNS
5 Configure Firewall
2 In the New Profile dialog, enter a Profile Name and Description in the appropriate textboxes.
The Profile Overview tab page refreshes. See the Profile Overview Screen section below for
more information.
Modify a Profile
Enterprise Admins can also manually assign a profile to an Edge.
Note Content for "Change a Profile" is new for the 3.3.0 release.
One scenario in which this is necessary is for Edge Staging Profiles. In this case, the Edge gets
activated against the staging profile by default due to push activation. Enterprise Admins must
manually assign a final production profile to the Edge. See Provision an Edge in Assign a Profile
(Change a Profile) for instructions on how to manually assign Profiles.
Note Push activation is tech preview for the 3.3.0 release. For more information, see section
titled Push Activation.
Category Description
Networks Has the name of the Network configuration used, the type of addressing, and the Network addresses and
VLANs assigned to the Corporate and Guest networks.
After all settings have been entered for the Profile Device, Business Policy, and Firewall tab
screens, the Profile Overview screen should reflect the configurations you have performed.
n Make sure the VCO and VCG are the same version or a higher version than the Edge.
n The Edges configured as a Hub should be upgraded to 3.X before upgrading the Edges
configured as Spokes.
n Tunnel formation will not occur if the Hub is in a 3.X based profile and all the Spokes are
running in a 2.X based profile.
n In order to overcome the above-mentioned restriction, each Spoke profile should have at
least one Spoke running in the 3.2.1 based profile.
Note Because 3.X Edges only understand Segment-based Profiles, the 3.2 image update will get
pushed out to the Edge only if the Edge has a Segmented Profile assigned. Once a Segment-
based Profile is assigned to an Edge, it cannot be reassigned to a Network-based Profile. The
transition from a Network-based Profile to a Segment-based Profile is supported, but a Segment-
based Profile to a Network-based Profile is not supported.
Operators must enable segmentation before a profile can be migrated. Enterprise and Partner
level users do not have access to this feature.
To enable Segmentation:
2 From the Customer Configuration screen, select the Enable Segmentation checkbox located
under Customer Capabilities.
Note If you attempt to migrate a profile without segmentation enabled, the following error
message appears.
1 From the VeloCloud Orchestrator, go to Configure > Segments. The Segments screen
appears. Note that the Global Segment cannot be deleted.
2 Select a Network-based Profile by selecting the checkbox next to the name of the
configuration profile.
4 In the Migrate Profile dialog box, type in a name and description for the profile.
5 Select the segment to which the Guest Network will be mapped (refer to Step 4).
A new Segment-based Profile is created with the same settings in the Global Segment as the
old Network-based Profile. See image below. Please note that no Edges are assigned to this
Profile.
2 In the VeloCloud Edges screen, select the Edge you want to assign a Segment Profile to.
4 From the Profile drop-down menu, choose a Segment Based Profile (see image below).
The segment-based profile will be applied only after the Edge is upgraded to 3.2.X.
Note There are two additional steps to migrate a profile, 'Create a New Operator Profile with a
3.2 Edge Image' and 'Assign the Segment-based Operator Profile to the Edges.' Enterprise Admin
users at all levels do not have access to these additional steps and must contact their Operator.
Their Operator must create a new Operator Profile with a 3.X Image and assign the Operator
profile to the Enterprise usage. After assigning the 3.X based Operator profile and segmented
profile, the Edge will receive a software image update. Contact your Operator for more
information.
Note The next step, "Create a New Operator Profile with a 3.2 Edge Image" is an Operator-level
only step that must be completed before a profile can be migrated. Partners do not have access
to the features for this step and must contact their Operators.
Step 5: Create a New Operator Profile with a 3.2 Edge Image (Operator-level
Only Step)
Operators must create a new Operator profile with a 3.2 Edge image before a profile can be
migrated. Enterprise and Partner level users do not have access to the features in this step.
Step 5 is an Operator-level only step. Your Operator must create a new Operator Profile with a
3.2 Edge Image.
2 From the Operator Profile screen, click the New Profile button.
4 In the newly created Operator Profile screen, go to the Software Version area.
5 In the Software Version area, choose a software version from the Version drop-down menu.
(See image below).
6 Click the Save Changes button at the top of the VCO screen.
An Important Note has been added to this step for the 3.3.0 software release (see note
below).
Note Operators and Partners can assign software images, but Enterprise Admins at all levels do
not have access to this feature.
The Edge with the Segmented Profile will receive a software image update via the Operator
Profile. This can be accomplished either by switching the Operator Profile for the customer or
assigning a new Operator Profile to selected Edges. The steps below describe how to assign a
new Operator Profile to a selected Edge.
Note It is recommended that you perform the profile assignment to one Edge first and validate
that the Edge is working correctly before you proceed to the other Edges. The first Edge that
you assign a profile to will be classified as a Hub (because Hubs must be migrated before
spokes).
2 In the VeloCloud Edges screen, select the Edge(s) you want to assign an Operator Profile to.
3 From the Actions drop-down menu, choose Assign Operator Profile or Assign Software
Image.(NOTE: Only Operator Superusers will see Assign Operator Profile from the Actions
drop-down menu, all other users with access to this feature will see Assign Software Image
from the Actions drop-down menu).
4 From the appropriate dialog box ( Assign Operator Profile dialog box or Assign Software
Image dialog box), choose the Segment-based Operator Profile that was created in Step 3.
( NOTE: If necessary, assign the Operator Profile to a Customer or Partner).
After this operation, Edge(s) will receive the 3.2 software image update, and after the image
update process is complete, Edge(s) will begin communicating with the VCO.
Add Credentials
This section describes how to add credentials.
Click the View button to open the Local Configuration Credentials dialog box. Type in a User
name and a Password, and then click the Submit button.
Note If you are logged in using a user ID with Customer Support privileges, you will only be able
to view VeloCloud Orchestrator objects. You will not be able to create new objects or configure/
update existing ones.
VeloCloud provides device settings using the Device tab ( Configure > Profiles > Device Tab) in
a profile. The Device Settings tab is used to assign segments, create VLANs, configure
interfaces, configure DNS settings, Configure Authentication Settings. For more information
about Segmentation, see Chapter 8 Configure Segments.
n Configure a Device
Configure a Device
Device configuration allows you to assign segments to a Profile and configure Interfaces to be
associated with a Profile.
For segment aware profiles, there are two sections on the UI:
Segment-aware Configure Segments area of the Device tab screen. Customers can choose the segment from
configurations the drop-down menu, select the segment, and then the configuration for that segment will
display in the Configure Segments area.
Common configurations The lower part of the Device tab screen. Features and configurations that apply to multiple
segments, which include VLAN configs, Device Settings, Wifi and Multi-source QoS.
Segment-aware Configurations
n Authentication Settings
n DNS Settings
n Netflow Settings
n Syslog Settings
n Cloud VPN
n OSPF Areas
n BGP Settings
n Multicast Settings
Common Configurations:
n VLAN
n Device Settings
n Multi-Source QoS
n SNMP Settings
n NTP Servers
n Visibility Mode
Clicking the Change button opens the Select Segments dialog box.
In this dialog box, you can select the Segments that you want to include in your profile. Segments
with a lock symbol next to them indicate that the Segment is in use within a profile, and it cannot
be removed. Segments available for use will be displayed on the left side of the dialog under All
Segments.
After you have selected a Segment, you can configure your Segment through the Configure
Segment drop-down menu. All Segments available for configuration are listed in the Configure
Segment drop-down menu. If a Segment is assigned to a VLAN or interface, it will display the
VLAN ID and the Edge models associated with it.
When you choose a Segment to configure from the Configure Segment drop-down menu,
depending upon the Segment’s options, the settings associated that Segment display in the
Configure Segments area.
Procedure
2 Select a profile you want to configure Netflow settings and click the icon under the Device
column.
3 From the Configure Segment drop-down menu, select a profile segment to configure
Netflow settings.
b From the Collector drop-down menu, select a existing Netflow collector to export IPFIX
information directly from VCEs, or click New Collector to configure a new Netflow
collector.
For more information about how to add a new collector, see Configure Netflow Settings.
Note You can configure a maximum of two collectors per segment and eight collectors
per profile by clicking the + button. When the number of configured collectors reaches
the maximum allowable limit, the + button will be disabled.
c From the Filter drop-down menu, select an existing Netflow filter for the traffic flows from
VCEs, or click New Filter to configure a new Netflow filter.
For more information about how to add a new filter, see Configure Netflow Settings.
Note You can configure a maximum of 16 filters per collector by clicking the + button.
However, the 'Allow All' filtering rule is added implicitly at the end of the defined filter list,
per collector.
d Enable the Allow All checkbox corresponding to a collector to allow all segment flows to
that collector.
n Flow Stats - Export interval for flow stats template. By default netflow records of this
template is exported every 60 seconds. The allowable export interval range is from
60 seconds to 300 seconds.
n FlowLink Stats - Export interval for flow link stats template. By default netflow
records of this template is exported every 60 seconds. The allowable export interval
range is from 60 seconds to 300 seconds.
n VRF Table - Export interval for VRF option template. The default export interval is
300 seconds. The allowable export interval range is from 60 seconds to 300 seconds.
n Application Table - Export interval for Application option template. The default
export interval is 300 seconds. The allowable export interval range is from 60
seconds to 300 seconds.
n Interface Table - Export interval for Interface option template. The default export
interval is 300 seconds. The allowable export interval range is from 60 seconds to
300 seconds.
n Link Table - Export interval for Link option template. The default export interval is 300
seconds. The allowable export interval range is from 60 seconds to 300 seconds.
Note In an Enterprise, you can configure the Netflow intervals for each template only on
the Global segment. The configured Netflow export interval is applicable for all collectors
of all segments on an edge.
Prerequisites
n Ensure that Cloud VPN (branch-to-branch VPN settings) is configured for the VCE (from
where the VCO bound events are originating) to establish a path between the VCE and the
Syslog collectors. For more information, see Configure Cloud VPN.
Procedure
2 Select a profile you want to configure Syslog settings and click the icon under the Device
column.
3 From the Configure Segment drop-down menu, select a profile segment to configure syslog
settings. By default, Global Segment [Regular] is selected.
a From the Facility Code drop-down menu, select a Syslog standard value that maps to
how your Syslog server uses the facility field to manage messages for all the events from
VCEs. The allowed values are from local0 through local7.
Note The Facility Code field is configurable only for the Global Segment, even if the
Syslog settings is enabled or not for the profile. The other segments will inherit the facility
code value from the Global segment.
c In the IP text box, enter the destination IP address of the Syslog collector.
d From the Protocol drop-down menu, select either TCP or UDP as the Syslog protocol.
e In the Port text box, enter the port number of the Syslog collector. The default value is
514.
f As Edge interfaces are not available at the Profile level, the Source Interface field is set to
Auto. The Edge automatically selects an interface with 'Advertise' field set as the source
interface.
h From the Syslog Level drop-down menu, select the Syslog severity level that need to be
configured. For example, If CRITICALis configured, the VCE will send all the events which
are set as either critical or alert or emergency.
n EMERGENCY
n ALERT
n CRITICAL
n ERROR
n WARNING
n NOTICE
n INFO
n DEBUG
Note You can configure a maximum of two Syslog collectors per segment and 10 Syslog
collectors per Edge. When the number of configured collectors reaches the maximum
allowable limit, the + button will be disabled.
Note By configuring the Syslog setting for the Edges, only remote syslog for VCO bound
events from Edges will be received at the Syslog collector. If you want the VCO auto-
generated local events to be received at the Syslog collector, you must configure Syslog at
the VCO level by using the log.syslog.backend and log.syslog.upload system properties.
n Process ID - 1312
When Cloud VPN on the Profile Device tab is enabled, you can configure three different Cloud
VPN types:
You can configure Branch to Non-VeloCloud Sites by selecting the Enable checkbox (see the
highlighted area in the screen capture below). You can also choose one or more Non-VeloCloud
Sites by selecting the Enable check box, and then selecting Non-VeloCloud Site from the drop-
down menu. You can click the + (plus) button to add additional Non-VeloCloud Sites.
You can also create VPN connections by selecting the New Non-VeloCloud Site from the drop-
down menu. Select a Type for the Non-VeloCloud Site. The Non-VeloCloud Site Type options (as
shown in the image below) are Cisco ASA, Cisco ISR, Palo Alto, SonicWall, Zscaler, Generic
Router (Route Based VPN), and Generic Firewall (Policy Based VPN). In the example below, Cisco
ISR is chosen. In this example, you can enter a Primary VPN gateway, and a Secondary VPN
gateway option is available. Enter the required parameters (Name, Type, Primary Gateway, and
Secondary Gateway) for the Non-VeloCloud Site you selected, then click Next.
Note Cisco ASA does not support a secondary gateway. This is a limitation of the Cisco ASA
VPN.
A final dialog box for completing the configuration of the Non-VeloCloud Site appears.
Note The Branch to Non-VeloCloud Site VPN should not be enabled until after the gateway for
the Enterprise Data Center is configured by the Enterprise Data Center Administrator and the
Data Center VPN Tunnel is enabled.
1 Select the Enable checkbox (see the highlighted area in the screen capture below).
The following dialog appears for you to select the select the VeloCloud Hubs that can be
used for VPN tunnels between the Branch using this profile and the selected VeloCloud Hub.
Branch to Branch VPN supports two configurations for establishing a VPN connection between
branches:
Configuration Description
Using a VeloCloud In this option, the closest gateway is used to establish VPN connections between Edges.
Gateway The VeloCloud Gateway may have traffic from other users.
Using a VeloCloud Hub In this option, one or more Edges are selected to act as hubs that can establish VPN
connections between branches. The hub will be your asset and will only have your
corporate data on it, improving overall security.
When the Isolate Profile checkbox is selected, the Edges within the profile will not learn routes
from other Edges outside this profile via the SD-WAN Overlay.
Note For topology and use cases, see Branch to Branch VPN.
Note For topology and use cases, see Dynamic Branch to Branch VPN Isolation by Profile.
Multicast clients (aka receivers) use the Internet Group Management Protocol (IGMP) to
propagate membership information from hosts to Multicast enabled routers and PIM to
propagate group membership information to Multicast servers via Multicast routers.
n Static Rendezvous Point (RP) configuration, where RP is enabled on a 3rd party router.
1 From Configure > Profile > Devices, go to the Multicast Settings area.
2 If the Multicast Settings button is in the Off position, click the Off button to turn On Multicast
Settings.
3 In the appropriate textboxes for the RP Selection, type in the RP Address and Multicast
Group. (See the table below for a description of RP Address and Multicast Group ).
4 If applicable, select the Enable PIM on Overlay checkbox and enter the IP Source Address.
5 Set Advanced Settings, if necessary. Refer to the table that follows for a description of each
setting. In the appropriate text boxes, enter PIM Timers for Join Prune Send Interval (default
60 seconds) and Keep Alive Timer (default 60 seconds).
Multicast Settings
The following table describes Multicast settings.
RP Selection Configure RP for multicast groups. Static RP is the default and supported mechanism in 3.2
release.
Enable PIM on Enable PIM peering on SD-WAN Overlay, for example when enabled on both branch VCE and
Overlay hub VCE. Branch VCE and hub VCE will form a PIM peer. By default, the source IP address for
the overlays is derived from one of the multicast-enabled underlay interfaces and it is
recommended to leave the default. Users can optionally change the source IP by specifying
Source IP Address, which will be a virtual address and will be advertised over the overlay
automatically.
PIM Timers
Join Prune Send The Join Prune Interval Timer. Default value is 60 seconds.
Interval
Keep Alive Timer PIM keep alive timer. Default value is 60 seconds.
1 From the Configure Profiles Device tab screen, choose a target Edge model and go the
Interfaces Settings area and select the interface you want to enable Multicast.
2 Click the Edit button to open the Interface Settings dialog box for the Edge you configured.
a Select the Interface Enabled checkbox to display the settings for the dialog.
b In the Capability drop-down menu, choose Routed to be able to use the Multicast
settings.
c In the Addressing Type drop-down menu, choose either DHCP, PPPoE, or Static.
1 If applicable, select the IGMP checkbox and select the only available option IGMP v2.
2 If applicable, select the PIM checkbox and select the only available option PIM SM.
3 Click the ' toggle advanced multicast settings' link to set IGMP Timers, as shown in
the image below.
n IGMP Host Query Interval: The default is 125 seconds and the range is 1-1800.
n IGMP Max Query Response Value: The default is 100 deciseconds and the range is
10-250.
g If applicable, select the following checkboxes: Advertise, NAT Direct Traffic, Underlay
Accounting, and Trusted Source.
h In the Reverse Path Filter drop-down menu, make a selection ( Disabled, Specific,
Loose). NOTE: The user can only set the Reverse Path Filter when the trusted zone is
checked. When the trusted zone is unchecked, the value will default to Specific as shown
in the image above.
i In the L2 Settings area, if applicable, select the Autonegotiate checkbox. If so, enter the
MTU in the textbox.
j If Autonegotiate is unselected, enter the Speed, Duplex, and MTU in the appropriate
checkboxes.
IGMP Host Query Interval IGMP host query interval, default value is 60 sec.
IGMP Max Query Response Value IGMP max query response value, default value is 10 sec.
Note Go to Monitor > Routing > Multicast tab, to view Multicast routing information. See
Monitor Routing for more information.
1 From the Configure VLAN area, click the Add VLAN button.
2 In the VLAN dialog box, choose a Segment from the Segment drop-down menu.
3 Enter the following information in the appropriate text boxes: VLAN Name, VLAN ID, Edge
LAN IP Address, Cidr, and Network.
8 Depending upon the DHCP type you have selected, enter in the appropriate information.
Depending on the Edge Model, each interface can be a Switch Port (LAN) interface or a Routed
(WAN) Interface. Depending on the Branch Model, a connection port is a dedicated LAN or WAN
port, or ports can be configured to be either a LAN or WAN port. Branch ports can be Ethernet
or SFP ports. Some Edge models may also support wireless LAN interfaces.
It is assumed that a single public WAN link is attached to a single interface that only serves WAN
traffic. If no WAN link is configured for a routed interface that is WAN capable, it is assumed that
a single public WAN link should be automatically discovered. If one is discovered, it will be
reported to the VeloCloud Orchestrator. This auto-discovered WAN link can then be modified via
the VeloCloud Orchestrator and the new configuration pushed back to the branch.
Note
n If the routed Interface is enabled with the WAN overlay and attached with a WAN link, then
the interface will be available for all Segments.
n If an interface is configured as PPPoE, it will only support a single auto-discovered WAN link.
Additional links can not be assigned to the interface.
If the link should not or cannot be auto-discovered, it must be explicitly configured. There are
multiple supported configurations in which auto-discovery will not be possible, including:
n Multiple WAN links on a single interface. Example: A Datacenter Hub with 2 MPLS
connections
n A single WAN link reachable over multiple interfaces. Example: for an active-active HA
topology
Links that are auto-discovered are always public links. User-defined links can be public or private,
and will have different configuration options based on which type is selected.
Note Even for auto-discovered links, overriding the parameters that are automatically detected
-- such as service provider and bandwidth – can be overridden by the Edge configuration.
You may choose to treat MPLS links as a single link. However, to differentiate between different
MPLS classes of service, multiple WAN links can be defined that map to different MPLS classes of
service by assigning each WAN link a different DSCP tag.
Additionally, you may decide to define a static SLA for a private WAN link. This will eliminate the
need for peers to exchange path statistics and reduce the bandwidth consumption on a link.
Since probe interval influences how quickly the device can fail over, it’s not clear whether a static
SLA definition should reduce the probe interval automatically.
Device Settings
The following screen captures illustrate the top-level user interface for the VeloCloud Edge 500
and the VeloCloud Edge 1000. The following table describes the major features of the UI (the
numbers in the table correspond to the numbers in the subsequent screen captures).
Actions you can perform on the network interface, such as Edit or Delete.
The Interface name. This name matches the Edge port label on the Edge device or is predetermined for wireless
LANs.
The list of Switch Ports with a summary of some of their settings (such as Access or Trunk mode and the VLANs for
the interface). Switch Ports are highlighted with a light yellow background.
The list of Routed Interfaces with a summary of their settings (such as the addressing type and if the interface was
auto-detected or has an Auto Detected or User Defined WAN overlay). Routed Interfaces are highlighted with a
light blue background.
The list of Wireless Interfaces (if available on the Edge device). You can add additional wireless networks by
clicking the Add Wi-Fi SSID button. Wireless Interfaces are highlighted with a light gray background.
n You can add additional wireless networks by clicking the Add Wi-Fi SSID button. Wireless Interfaces are
highlighted with a light gray background.
n You can add sub interfaces by clicking the Add Sub Interfaces button. Sub interfaces are displayed with "SIF"
next to the interface.
n You can add secondary IPs by clicking the Add Secondary IP button. Secondary IPs are displayed with 'SIP"
next to the interface.
2 Select an Interface from the drop-down menu and the Sub Interface ID in the text box as
shown in the Select Interface dialog below.
3 Click Next.
4 In the Sub Interface dialog box, choose your Addressing Type ( DHCP or Static).
a If you choose the Addressing Type DHCP, the Enable VLAN Tagging checkbox is
selected by default and the Sub Interface ID you chose in the previous dialog displays in
the text box.
b If you choose the Addressing Type Static, you have the option of enabling VLAN by
selecting the Enable VLAN Tagging check box. The Sub Interface ID you chose in the
previous dialog displays in the text box.
The Interface column refreshes, showing the newly created sub interface.
2 Select an Interface from the drop-down menu and the Sub Interface ID in the text box as
shown in the Select Interface dialog below. Note the Sub Interface type is Secondary IP.
3 Click Next.
4 In the Secondary IP dialog box, choose your Addressing Type ( DHCP or Static).
5 In the Secondary IP dialog box, choose your Addressing Type ( DHCP or Static).
The Interface column refreshses, showing the newly created Secondary IP (see the Interface
Settings image below).
1 Use Case 1: Two WAN links connected to an L2 SwitchConsider the traditional data center
topology where the VCE is connected to an L2 switch in the DMZ that is connected to
multiple firewalls, each connected to a different upstream WAN link.
In this topology, the VeloCloud interface has likely been configured with FW1 as the next hop.
However, in order to use the DSL link, it must be provisioned with an alternate next hop to
which packets should be forwarded, because FW1 cannot reach the DSL.When defining the
DSL link, the user must configure a custom next hop IP address as the IP address of FW2 to
ensure that packets can reach the DSL modem. Additionally, the user must configure a
custom source IP address for this WAN link to allow the edge to identify return interfaces.
The final configuration becomes similar to the following figure:
n The interface is defined with IP address 10.0.0.1 and next hop 10.0.0.2. Because more
than one WAN link is attached to the interface, the links are set to “user defined.”
n The Cable link is defined and inherits the IP address of 10.0.0.1 and next hop of 10.0.0.2.
No changes are required. When a packet needs to be sent out the cable link, it is sourced
from 10.0.0.1 and forwarded to the device that responds to ARP for 10.0.0.2 (FW1). Return
packets are destined for 10.0.0.1 and identified as having arrived on the cable link.
n The DSL link is defined, and because it is the second WAN link, the VCO flags the IP
address and next hop as mandatory configuration items. The user specifies a custom
virtual IP (e.g. 10.0.0.4) for the source IP and 10.0.0.3 for the next hop. When a packet
needs to be sent out the DSL link, it is sourced from 10.0.0.4 and forwarded to the device
that responds to the ARP for 10.0.0.3 (FW2). Return packets are destined for 10.0.0.4 and
identified as having arrived on the DSL link.
In this topology, policy-based routing will be used to steer packets to the appropriate WAN
link. This steering may be performed by the IP address or by the VLAN tag, so we support
both options.
Steering by IP: If the L3 device is capable of policy-based routing by source IP address, then
both devices may reside on the same VLAN. In this case, the only configuration required is a
custom source IP to differentiate the devices.
n The interface is defined with IP address 10.0.0.1 and next hop 10.0.0.2. Because more
than one WAN link is attached to the interface, the links are set to “user defined.”
n The Cable link is defined and inherits the IP address of 10.0.0.1 and next hop of 10.0.0.2.
No changes are required. When a packet needs to be sent out the cable link, it is sourced
from 10.0.0.1 and forwarded to the device that responds to ARP for 10.0.0.2 (L3 Switch).
Return packets are destined for 10.0.0.1 and identified as having arrived on the cable link.
n The DSL link is defined, and because it is the second WAN link, the VCO flags the IP
address and next hop as mandatory configuration items. The user specifies a custom
virtual IP (for example, 10.0.0.3) for the source IP and the same 10.0.0.2 for the next hop.
When a packet needs to be sent out the DSL link, it is sourced from 10.0.0.3 and
forwarded to the device that responds to the ARP for 10.0.0.2 (L3 Switch). Return packets
are destined for 10.0.0.3 and identified as having arrived on the DSL link.
Steering by VLAN: If the L3 device is not capable of source routing, or if for some other
reason the user chooses to assign separate VLANs to the cable and DSL links, this must be
configured.
n The interface is defined with IP address 10.100.0.1 and next hop 10.100.0.2 on VLAN 100.
Because more than one WAN link is attached to the interface, the links are set to “user
defined.”
n The Cable link is defined and inherits VLAN 100 as well as the IP address of 10.100.0.1 and
next hop of 10.100.0.2. No changes are required. When a packet needs to be sent out the
cable link, it is sourced from 10.100.0.1, tagged with VLAN 100 and forwarded to the
device that responds to ARP for 10.100.0.2 on VLAN 100 (L3 Switch). Return packets are
destined for 10.100.0.1/VLAN 100 and identified as having arrived on the cable link.
n The DSL link is defined, and because it is the second WAN link the VCO flags the IP
address and next hop as mandatory configuration items. The user specifies a custom
VLAN ID (200) as well as virtual IP (e.g. 10.200.0.1) for the source IP and the 10.200.0.2
for the next hop. When a packet needs to be sent out the DSL link, it is sourced from
10.200.0.1, tagged with VLAN 200 and forwarded to the device that responds to the ARP
for 10.200.0.2 on VLAN 200 (L3 Switch). Return packets are destined for 10.200.0.1/
VLAN 200 and identified as having arrived on the DSL link.
Again, the VCE shares the same next hop for both WAN links. Policy-based routing can be
done to ensure that traffic is forwarded to the appropriate destination as defined above.
Alternately, the source IP and VLAN for the WAN link objects in the VeloCloud may be the
same as the VLAN of the cable and DSL links to make the routing automatic.
4 Case 4: One WAN link reachable over multiple interfaces:Consider the traditional gold site
topology where the MPLS is reachable via two alternate paths. In this case, we must define a
custom source IP address and next hop that can be shared regardless of which interface is
being used to communicate.
n The MPLS is defined and set as reachable via either interface. This makes the source IP
and next hop IP address mandatory with no defaults.
n The source IP and destination are defined, which can be used for communication
irrespective of the interface being used. When a packet needs to be sent out the MPLS
link, it is sourced from 169.254.0.1, tagged with the configured VLAN and forwarded to
the device that responds to ARP for 169.254.0.2 on the configured VLAN (CE Router).
Return packets are destined for 169.254.0.1 and identified as having arrived on the MPLS
link.
Note If OSPF or BGP is not enabled, you may need to configure a transit VLAN that is the
same on both switches to enable reachability of this virtual IP.
Interface Configuration
Clicking the Edit link presents a dialog for updating the settings for a specific interface. The
following sections provide a short description for the various dialogs that are presented for the
Edge model and interface types.
Type Description
WPA2 / Enterprise A Radius server is used to authenticate a user. In this scenario, a Radius Server must be configured
in Network Services and the Radius Server must be selected in the Profile Authentication Settings
on the Device page. The default settings for Security can also be overridden on the Edge Device
page.
n To download the VeloCloud Edge MIB: go to the Remote Diagnostic screen (Test &
Troubleshooting > Remote Diagnostics) and run MIB for VeloCloud Edge. Copy and paste
results onto your local machine.
n Install all MIBs required by VELOCLOUD-EDGE-MIB on the client host, including SNMPv2-SMI,
SNMPv2-CONF, SNMPv2-TC, INET-ADDRESS-MIB, IF-MIB, UUID-TC-MIB, and VELOCLOUD-
MIB. All the above-mentioned MIBs, except VELOCLOUD-MIB, can be found online. For
VELOCLOUD-MIB, check the VeloCloud website.
Supported MIBs
n VELOCLOUD-EDGE-MIB
2 Install all MIBs required by VELOCLOUD-EDGE-MIB. (See "Before you begin" for more
information.
4 Select a profile you want to configure SNMP settings for, and click the Device icon under the
Device column.
5 Scroll down to the SNMP Settings area. You can choose between two versions, v2c or v3.
c In the Community textbox, type in a word or sequence of numbers that will act as a
'password' that will allow you access to the SNMP agent.
n Check the Any checkbox to allow any IP to access the SNMP agent.
n To restrict access to the SNMP agent, uncheck the Any checkbox and enter the IP
address(es) that will be allowed access to the SNMP agent.
7 For a SNMP v3 Config, which provides added security support follow the steps below:
c Check the Privacy checkbox if you want your packet transfer encrypted.
d If you have checked the Privacy checkbox, choose DES or AES from the Algorithm drop-
down menu.
8 Configure Firewall Settings. After you have configured SNMP Settings, go to Firewall settings
(Configure >Profiles > Firewall) to configure the Firewall settings that will enable your SNMP
settings.
Note SNMP interface monitoring is supported on DPDK enabled interfaces for 3.3.0 and later
releases.
n Visibility by IP address
Note The Partner Gateway Assignment feature has been enhanced to also support segment-
based configurations. Multiple Partner Gateways can be configured on the Profile level and/or
overridden on the Edge level.
Select Gateways
To complete this section, you must have this feature enabled. See your Operator for more
information.
2 In the Select Partner Gateways for Global Segment dialog box, select an available Partner
Gateway from the Available Partner Gateway area and move it (using the appropriate arrow)
to the Selected Partner Gateway area.
Note that only Gateways configured as a Partner Handoff Gateway will be visible in the Available
Partner Gateways area. If there are other Gateways not configured as a Partner Handoff
Gateway, the following message will appear in the dialog box: There is one other Gateway in the
Gateway Pool that is not configured as a Partner Handoff Gateway.
In certain scenarios where Gateways can have a handoff to the PCI network and in the PCI scope,
the Operator can enable CDE role for the Partner Gateways and these Gateways (CDE
Gateways) will be available for the user to assign in the PCI Segments (CDE Type).
To complete this section, you must have this feature enabled. See your Operator for more
information.
1 From the Configure Segments window, click the Select Profile Segments Change button.
2 In the Select Segments dialog box, move the available CDE segment from the Available
Segments area (using the appropriate arrow) to the Within This Profile area.
3 In the Gateway Handoff Assignment area, click the Select Gateways link.
4 In the Select Partner Gateways for cde seg dialog box, select an available CDE Partner
Gateway (from the Available Partner Gateways area) and move it to the Selected Partner
Gateways area.
The Gateway Handoff Assignment area refreshes with the selected Gateways.
Note As indicated in the Select Partner Gateways for cde seg dialog box, only CDE gateways
can be selected for the segment.
n More than two Partner Gateways can be assigned to an Edge (up to 16).
Note If you do not see the Gateway Handoff Assignment area displayed in the Configure
Segments window, contact your Operator to enable this feature.
Assign Controllers
The VeloCloud Gateway is enabled for supporting both the data and control plane. In the 3.2
release, VeloCloud introduces a Controller-only feature (Controller Gateway Assignment).
There are multiple use cases which require the VeloCloud Gateway to operate as a Controller
only (that is, to remove the data plane capabilities). Additionally, this will enable the Gateway to
scale differently, as resources typically dedicated for packet processing can be shifted to
support control plane processing. This will enable, for instance, a higher number of concurrent
tunnels to be supported on a Controller than on a traditional Gateway. See the following section
for a typical use case.
Dynamic Tunnel
The Controller signals to the Edges to create the dynamic tunnel by providing E1 connectivity
information to E2 and vice versa. The traffic flow moves seamlessly to the new dynamic tunnel if
and when it is established.
Note At least one Gateway in the Gateway Pool should be a "Controller Only" Gateway.
4 In the Select Controllers for Global Segment dialog, move controllers from the Available
5 Click Update.
Note The Voice Quality Monitoring (VQM) feature will be deprecated in future releases.
VQM supports 80+ Voice Codecs and provides listening and conversational call quality metrics in
both R-Factor and MOS (mean opinion score) formats as well as detailed diagnostic information.
These report metrics provide a high-level health overview of the network and specific details of
each call session, which get sent to a RFC6035 compliant VQM Collector (e.g. Oracle Palladion,
Telchemy SQMediator, etc.). If there are multiple reports sent from a single call session, the VQM
collector will correlate these reports into a single coherent quality record.
2 Scroll down to the Voice Quality Monitoring Settings area. (See image below).
5 In the Collectors text box, type in the IP Address and Port number of the location where you
would like to receive the Voice Quality metric reports. To add multiple IP Addresses and
Ports, click the " +" symbol. To delete a Collector, click the " -" symbol.
6 If applicable, check the Enable Edge Override checkbox. Hover over the symbol of the
"triangle exclamation point" to view the pop up message (as displayed in the image above).
Call and User Info LocalGroup, RemoteGroup, CallID, LocalID, RemoteID, OrigID, LocalAddr, RemoteAddr
n G.723.1
n G.723.1 Annex C
n G.728
n G.729
n G.729A/AB
n G.729E
n G.726
n MS RTAudio
n IS-54
n iLBC
n Broadvoice16
n Broadvoice32
n AMBE2Plus
n GSM 06.10/06.20/06.30
n QCELP8K
n QCELP13K
n EVRC-A
n EVRC-B
n AMR-NB
n AMR-WB/G.722.2
n AMR-WB+
n SMV
n Siren7/G.722.1
n Siren14/G.722.1C
n GIPS iPCM-WB
n Speex Narrowband
n Speex Wideband
n Lucent/elemedia SX7300
n Lucent/elemedia SX9600
n Japanese PDC
The following figure represents all three branches of the Cloud VPN. The numbers in the image
represent each branch and correspond to the descriptions in the table that follows.
Non-VeloCloud Site
You can access the 1-click Cloud VPN feature in the VeloCloud Orchestrator (VCO) from
Configure > Profiles > Device Tab in the Cloud VPN area.
Note For configuration information for each branch, see the Chapter 11 Configure a Profile
Device section.
Primary tunnel
Redundant tunnel
n Cisco ASA
n Cisco ISR
n PaloAlto
n SonicWall
For information on how to configure a Branch to Non-VeloCloud Site see Configure a Non-
VeloCloud Site.
Iaas
When configuring with Amazon Web Services (AWS), use the Generic Firewall (Policy Based
VPN) option in the Non-VeloCloud Site dialog box.
Configuring with a third party can benefit you in the following ways:
n Eliminates mesh
n Cost
n Performance
As shown in the following figure, VeloCloud Cloud VPN is simple to set up (global networks of
VeloCloud Gateways eliminates mesh tunnel requirement to VPCs), has a centralized policy to
control branch VPC access, assures performance, and secures connectivity as compared to
traditional WAN to VPC.
For information on how to configure using Amazon Web Services (AWS), see the Configure
Amazon Web Services (AWS) section.
The following figure shows how both Active-Standby and Active-Active are supported.
For information on how to configure a Branch to VeloCloud Hub, see "Configure Cloud VPN" in
the Chapter 9 Configure Network Services section.
n Cloud Gateways
The following figure shows Branch to Branch traffic flows for both Cloud Gateway and a
VeloCloud Hub.
You can also enable Dynamic Branch to Branch VPN for both Cloud Gateways and Hubs.
n Routes to other Edges within its own profile as well as the underlay routes behind those
Edges
n Routes to the assigned Hubs as well as underlay routes learned by the Hub
Note When the Profile Isolation feature is enabled for a profile, the Edges within that profile will
not learn routes of other Edges outside of that profile.
Note For configuration information, see Enable Branch to Branch VPN Isolation.
Once the tunnel is established, traffic begins to flow over the secure overlay multi-path tunnel
between the branches. After 180 seconds of traffic silence (forward or reverse from either side of
the branches), the initiating edge tears down the tunnel.
Note For configuration information, see Enable Dynamic Branch to Branch VPN Isolation by
Profile.
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
Based on the business policy configuration, the VeloCloud examines the traffic being used,
identifies the Application behavior, the business service objective required for a given app (High,
Med, or Low), and the Edge WAN Link conditions. Based on this, the Business Policy optimizes
Application behavior driving queuing, bandwidth utilization, link steering, and the mitigation of
network errors.
The screen capture below shows some of the Business Policy rules. A number of rules are
predefined and you can add your own rules to customize your network operation. Rules are
listed in order of highest precedence. Network traffic is managed by identifying its characteristics
then matching the characteristics to the rule with the highest precedence.
As shown in the image below, Business Policy Rules are now Segment aware. All Segments
available for configuration are listed in the Configure Segment drop-down menu.
When you choose a Segment to configure from the Configure Segment drop-down menu, the
settings and options associated with that Segment appear in the Configure Segments area.
Global Segment [Regular] is the default segment.
For more information about Segmentation, see Chapter 8 Configure Segments and Chapter 11
Configure a Profile Device.
Note You can move your configured rules up or down in the list of rules to establish precedence
by hovering over the numeric value at the left side of the rule and moving the rule up or down. If
you hover over the right side of a rule, click the – (minus) sign next to the rule to remove it from
the list or the + (plus) sign to add a new rule.
n Provision an Edge
Before you begin: Know the IP Addresses of your devices and understand the implications of
setting a wildcard mask.
About this task: New for the 3.3.1 release, there are three IP Address options available: CIDR
Prefix, Subnet Mask, and Wildcard Mask.
2 In the Match area of the Configure Rule dialog box, there are three sections to configure
traffic:
n Source
n Destination
n Application
See the steps below to configure the Source section of the Match area.
3 In the Source section, click the Define button if you want to narrow the source traffic to a
specific VLAN, an IP Address, or an Operating System. By default, the Any button is selected.
4 If you click the Define button, complete the appropriate options in the sub steps below.
b VLAN: Click the VLAN radio button and choose the appropriate VLAN from the drop-
down menu.
c IP Address: Click the IP Address radio button and type in the IP Address, and then
choose one of the three options from the drop-down menu (CIDR prefix, Subnet mask, or,
Wildcard mask). See image below. Wildcard mask and subnet mask are new for the 3.3.1
release. See the table below for a description of each of these options.
Option Description
CIDR prefix Choose this option if you want the network defined as a CIDR value (for example: 172.10.0.0 /16).
Subnet Choose this option if you want the network defined based on a Subnet mask (for example,
mask 172.10.0.0 255.255.0.0).
Wildcard Choose the Wildcard mask option if you want the ability to narrow the enforcement of a policy to
mask a set of devices across different IP subnets that share a matching host IP address value. The
Wildcard mask matches an IP or a set of IP addresses based on the inverted Subnet mask. A '0'
within the binary value of the mask means the value is fixed and a 1 within the binary value of the
mask means the value is wild (can be 1 or 0). For example, a Wildcard mask of 0.0.0.255 (binary
equivalent = 00000000.00000000.00000000.11111111) with an IP Address of 172.0.0, the first
three octets are fixed values and the last octet is a variable value. Note: After you set up this rule
using a Wildcard mask, you are narrowing the number of clients this rule applies to.
e Operating System: From the drop-down menu, choose the Operating System of the
Client device.
5 In the Destination section, you can assign additional parameters to identify the traffic
destination as shown in the sub steps below:
a Define your traffic destination by clicking one of the following radio buttons (Any,
Internet, VeloCloud Edge, or Non-VeloCloud Site). See Configure Match Destination for a
description of these traffic destinations. NOTE: Branch to Branch Cloud VPN must be
enabled before you can define your traffic destination .
b Type in the IP Address in the appropriate text box and specify an IP Address option: CIDR
Prefix, Wildcard mask, and Subnet mask. (Wildcard mask and Subnet mask are new for
the 3.3.1 release).
Option Description
CIDR prefix Choose this option if you want the network defined as a CIDR value (for example: 172.10.0.0 /
16).
Subnet Choose this option if you want the network defined based on a Subnet mask (for example,
mask 172.10.0.0 255.255.0.0).
Wildcard Choose the Wildcard mask option if you want the ability to narrow the enforcement of a policy to
Mask a set of devices across different IP subnets that share a matching host IP address value. The
Wildcard mask matches an IP or a set of IP addresses based on the inverted Subnet mask. A '0'
within the binary value of the mask means the value is fixed and a 1 within the binary value of the
mask means the value is wild (can be 1 or 0). For example, a Wildcard mask of 0.0.0.255 (binary
equivalent = 00000000.00000000.00000000.11111111) with an IP Address of 172.0.0, the first
three octets are fixed values and the last octet is a variable value.
Note After you set up this rule using a Wildcard mask, you are narrowing the number of clients
this rule applies to.
c Enter a Hostname: Use this field to match the entire hostname or a portion of the
hostname. For example, "salesforce" will match traffic to "www.salesforce.com."
d Protocol: A protocol is a set of rules and standards that define a language devices use to
communicate. Choose a protocol from the drop-down menu (GRE, ICMP, TCP, or UDP).
e Ports: A port is an address on a single machine you can tie to a specific piece of software.
Enter the appropriate port number in the Port textbox.
a Click the Define button if you want to choose specific applications. By default, the Any
button is selected.
b From the Browse list, select an application category. A list of specific applications display
on the right side of the Browse list. Scroll down the list and select the specific application
you want to define.
a Priority: Designate the priority of the rule (High, Normal, or Low). Click the Rate Limit
checkbox to set limits for inbound and outbound traffic directions.
b Network Service: Choose one of the options (Direct, Multi-Path, or Internet Backhaul).
With the Direct option, traffic is sent to the destination directly, bypassing the VeloCloud
Gateway. The Internet Backhaul option can only be used on Internet rules. For information
about these options see the section titled, Configure Action Network Service.
c Link Steering: Choose one of the following options from the table below. (For information
about DSCP, DSCP marking for both Underlay and Overlay traffic, see Link Steering:
DSCP Marking for Underlay and Overlay Traffic).
Option Description
Auto By default, all applications are put in automatic Link Steering mode. When an application is in the
automatic Link Steering mode, the DMPO automatically chooses the best links based on the
application type and automatically enables on-demand remediation when necessary. For more
information about this topic, see Link Selection: Auto. Enter an Inner Packet DSCP Tag from the
drop-down menu and an Outer Packet DSCP Tag from the drop-down menu.
Transport A transport group is a bundle of WAN links grouped together by similar characteristics and
Group functionality. For a description of the Transport Group options below, see Link Steering by
Transport Group. Choose Public Wired, Public Wireless, or Private Wired from the drop-down
menu. Choose one of the following radio buttons: Mandatory, Preferred, or Available. Choose
the Inner and Outer Packet DSP Tag from the appropriate drop-down menus.
Interface Complete the following options for the Interface below. For more information, see section titled,
Link Steering by Interface.
n Choose an Interface from the drop-down menu.
n Type in the VLAN in the text box.
Note VLAN cannot be specified when using the Multi-Path network service.
n Choose one of the following radio buttons: Mandatory, Preferred, Available. If you choose the
Preferred option, the Error Correct Before Steering checkbox appears. If you unselect this
checkbox, the application will steer before Error Correction occurs.
n ICMP Probe: If applicable, choose an ICMP Probe from the drop-down menu.
n Choose Inner and Outer Packet DSCP Tags from the appropriate drop-down menus.
WAN Link For this option, the interface configuration is separate and distinct from the WAN link
configuration. You will be able to select a WAN link that was either manually configured or auto-
discovered. Select a WAN link from the drop-down menu. For more information, see WAN Link
Drop Down Menu.
d NAT: Disable or Enable NAT. For more information, see section titled, Configure Policy-
based NAT.
e Service Class: Choose a Service Class option. The Service Class parameter can be set to
Real-time (time sensitive traffic), Transactional, or Bulk. This option is only for a custom
application. VeloCloud Apps/Categories fall in one of these categories.
8 Click OK to configure your rule. The business policy rule will be created successfully.
If the Match Source Define option is chosen, the source traffic can be narrowed to a specific
VLAN, an IP Address, a Port, an Operating System or any combination of selections.
The destination can be first narrowed to a type (Any, Internet, Edge, or Non-VeloCloud Site). See
the table below for a description of the above-mentioned traffic destinations.
Option Description
Internet Traffic that is designated to be sent out to the Internet and not inside the network.
VeloCloud Edge Traffic designated for another site in the network. Sites such as these would use a VeloCloud
Edge.
Non-VeloCloud Site Sites that do not use a VeloCloud Edge, but that have a route inside the network. A Non-
VeloCloud Site is configured in Configure > Network Servivces.
The destination can then be furthered defined by specifying an IP Address, Hostname, Protocol
(GRE, ICMP, TCP, or UDP), and a port.
Match Destination options are particularly useful if the same traffic match pattern needs to be
assigned different QoS values depending on the route taken. As an example, you may want to
assign a higher priority to traffic destined to a VeloCloud Site versus regular cloud-based internet
traffic. This can be easily achieved using the Destination configuration value.
The following sections describe the Action Priority, Network Service, Link Steering, NAT, and
Service class selections in more detail.
Note Depending on your Match choices, some Actions may not be available. For example, if All
Applications is chosen, Network Service and Link Actions are grayed out and are not available
for selection. In a similar manner, if a Destination of type Internet or an Application of type
Routable Apps is chosen for a VPN profile, an additional Network Service option, Internet
Backhaul, becomes available.
Direct
Sends the traffic out of the WAN circuit directly to the destination, bypassing the VeloCloud
Gateway. NAT is applied to the traffic if the NAT Direct Traffic checkbox is enabled on the
Interface Settings under the Device tab.
Multi-Path
Sends the traffic from one VeloCloud Edge to another Edge.
Internet Backhaul
While configuring the business policy rule match criteria, if you define the Destination as
Internet, then the Internet Backhaul network service will be enabled.
Note The Internet Backhaul Network Service will only apply to Internet traffic (WAN traffic
destined to network prefixes that do not match a known local route or VPN route).
When the Internet Backhaul is selected, you need to select one of the following:
n Backhaul Hubs
n Non-VeloCloud Site
You should be able to configure multiple VeloCloud Sites for backhaul to support the redundancy
that is inherently built into the Non-VeloCloud Site connection, but keep a consistent behavior of
service unavailability leading to traffic being dropped.
If Conditional Backhaul is enabled at the profile level, then it will apply for all Business Policies
configured for that profile. You can disable conditional backhaul for selected policies to exclude
select traffic (Direct and Multi-Path) from this behavior by selecting the Disable Conditional
Backhaul checkbox in the Action area of the Configure Rule screen for the selected business
policy.
Note More details about Public/Private WAN links, interface configuration, and user defined
options are available in the relevant sections are available at the following links.
At least one link satisfies the SLA for Pick the best available link.
the application.
Single link with packet loss exceeding Enable FEC for the real-time applications sent on this link.
the SLA for the application.
Two links with loss on only one link. Enable FEC on both links.
Multiple links with loss on multiple Enable FEC on two best links.
links.
Two links but one link appears Mark link un-usable and steer the flow to the next best available link.
unstable, i.e. missing three
consecutive heartbeats.
Both Jitter and Loss on both links. Enable FEC on both links and enable Jitter buffer on the receiving side. Jitter
buffer is enabled when Jitter is greater than 7 ms for voice and greater than 5
ms for video.
The sending DMPO endpoint notifies the receiving DMPO endpoint to enable
Jitter buffer. The receiving DMPO endpoint will buffer up to 10 packets or 200
ms of traffic, whichever happens first. The receiving DMPO endpoint uses the
original time stamp embedded in the DMPO header to calculate the flow rate to
use in de-jitter buffer. If the flow is not sent at a constant rate, the Jitter
buffering is disabled.
Different locations may have different WAN transports (e.g. WAN carrier name, WAN interface
name); DMPO uses the concept of Transport Group to abstract the underlying WAN carriers and
interfaces from the Business Policy configuration. The Business Policy configuration can specify
the transport group (public wired, public wireless, private wired, etc.) in the steering policy so
that the same Business Policy configuration can be applied across different device types or
locations, which may have completely different WAN carriers and WAN interfaces. When the
DMPO performs the WAN link discovery, it also assigns the transport group to the WAN link. This
is the most desirable option for specifying the links in the Business Policy because it eliminates
the need for IT administrators to know the type of physical connectivity or the WAN carrier.
If you choose the Preferred option, the Error Correct Before Steering checkbox displays.
If you select the Error Correct Before Steering checkbox, the Loss% variable textbox displays.
When you define a loss percentage (4% for example), the Edge will continue to use the selected
link or transport group and apply error correction until loss reaches 4%, which is when it will steer
traffic to another path. (See image below). When the Error Correct Before Steering checkbox is
unchecked, the Edge will start steering traffic away if the loss for the link exceed the application
SLA - i.e. Real-time application SLA is 0.3% by default. If you disable this checkbox, the
application will steer before Error Correction occurs.
Note This option is allowed at both the Edge Override level and Profile level.
If you choose the Preferred option, the Error Correct Before Steering checkbox displays. If you
check the box is checked, an additional Loss% variable will become available. When the option is
disabled, the Edge will start steering traffic away if the loss for the link exceed the application
SLA - i.e. Real-Time application SLA is 0.3% by default. When “Error Correct Before Steering” is
applied and Loss percentage defined, let’s say if it’s 4% in this example, the Edge will continue to
use the selected link or transport group and apply error correction until loss reaches 4%, which is
when it will steer traffic to another path. If you disable this checkbox, the application will steer
before Error Correction occurs.
Note This option is only allowed at the Edge override level. This will ensure that the link options
provided always match the VeloCloud Edge hardware model.
WAN Link
For this option, the interface configuration is separate and distinct from the WAN link
configuration. You will be able to select a WAN link that was either manually configured or auto-
discovered.
For information on how to define multiple private network names and assign them to individual
private WAN overlays, see Private Network Names and Selecting a Private Name Link.
If you choose the Preferred option, the Error Correct Before Steering checkbox displays. If you
disable this checkbox, the application will steer before Error Correction occurs.
For the by Interface and by WAN Link choices, you must select one of the following options:
Option Description
Mandatory Indicates that traffic will be sent over the WAN link or link Service-group specified. If the link specified (or all
links within the chosen service group) is inactive or if a Multi-path gateway route is unavailable, the
corresponding packet will be dropped.
Preferred Indicates that traffic should preferably be sent over the WAN link or link Service-group specified. If the link
specified (or all links within the chosen service group) is inactive, or if the Multi-path gateway route chosen
is unstsable, or if the link Service Level Objective (SLO) is not being met, the corresponding packet will be
steered on the next best available link. If the preferred link becomes available again, traffic will be steered
back to the preferred link.
Available Indicates that traffic should preferably be sent over the WAN link or link Service-group specified as long as
it is available (irrespective of link SLO). If the link specified (or all links within chosen service group) are not
available, or if the selected Multi-path gateway route is unavailable, the corresponding packet will be
steered to the next best available link. If the preferred link becomes available again, traffic will be steered
back to the available link.
Link Steering: DSCP Marking for Underlay and Overlay Traffic Overview
In the 3.3.0 release, VeloCloud supports DSCP remarking of packets forwarded by the Edge to
the Underlay. The VMware SD-WAN Edge can re-mark underlay traffic forwarded on a WAN link
as long as “Underlay Accounting” is enabled on the interface. DSCP re-marking is enabled in the
Business Policy configuration in the Link Steering area. (See section titled, Create Business Policy
for more information). In the example image shown below (assuming the Edge is connected to
MPLS with both underlay and overlay traffic forwarded MPLS), if the traffic matches the network
prefix 172.16.0.0/12, the Edge will re-mark the underlay packets with a DSCP value of 16 or CS2
and ignore the “Outer Packet DSCP Tag” field. For overlay traffic sent toward MPLS matching the
same business policy, the DSCP value for the outer header will be set to the “Outer Packet DSCP
tag.”
3 From the Business Policy screen, click an existing rule or click the New Rule button to create
a new rule.
5 Click one of the following as applicable: Auto, Transport Group, Interface, or WAN Link.
6 Configure Match critera for the underlay traffic and config “Inner Packet DSCP Tag.” See
image below.
3 From the Business Policy screen, click an existing rule or click the New Rule button to create
a new rule.
5 Click one of the following as applicable: Auto, Transport Group, Interface, or WAN Link.
6 Configure Match critera for the Overlay traffic and config “Inner Packet DSCP Tag” and
“Outer Packet DSCP Tag.” See image below.
Accessing NAT
You can access the NAT feature from Configure > Profiles > Business Policy tab, then click the
New Rule button. The NAT feature is located under the Action area.
The following figure shows an example of the Many to One configuration. In this example, all the
traffic originating from the hosts that are connected to VLAN 100 - Corporate 2 (behind the Edge
destined to an Internet host or a host behind the DC) will get source NAT with the IP address
72.4.3.1.
All applications in a given Traffic Class have a guaranteed minimum aggregate bandwidth during
congestion based on scheduler weight (or percentage of bandwidth). When there is no
congestion, the applications are allowed into the maximum aggregated bandwidth. A Policer can
be applied to cap the bandwidth for all the applications in a given Traffic Class. See the image
below for a default of the Application/Category and Traffic Class Mapping.
The Business Policy contains the out-of-the-box Smart Defaults functionality that maps more
than 2,500 applications to Traffic Classes. You can use application-aware QoS without having to
define policy. Each Traffic Class is assigned a default weight in the Scheduler, and these
parameters can be changed in the Business Policy. Below are the default values for the 3x3
matrix with nine Traffic Classes. See the image below for default of the Weight and Traffic Class
Mapping.
Example:
In this example, a customer has 90 Mbps Internet link and 10 Mbps MPLS on the Edge and the
aggregate Bandwidth is 100 Mbps. Based on the default weight and Traffic Class mapping above,
all applications that map to Business Collaboration will have a guaranteed bandwidth of 35 Mbps,
and all applications that map to Email will have a guaranteed bandwidth of 15 Mbps. Note that
business policies can be defined for an entire category like Business Collaborations, applications
(e.g. Skype for Business), and more granular sub-applications (e.g. Skype File Transfer, Skype
Audio, and Skype Video).
Note The SD-WAN Traffic Class and Weight Mapping feature is editable only if it is enabled by
your Operator. To gain access to this feature, see your Operator for more information.
4 In the SD-WAN Traffic Class and Weight Mapping area, type in numerical values for Real
Time, Transactional, and/or Bulk as necessary.
Service Providers may offer SD-WAN services at a lower capacity compared to the aggregated
capacity of WAN links at the local branch. For example, customers may have purchased a
broadband link from another vendor and SP offering SD-WAN services, and hosting VeloCloud
Partner Gateway has no control over the underlay broadband link. In such situations, in order to
ensure that the SD-WAN service capacity is being honored and to avoid congestion towards
Partner Gateway, a Service Provider can enable the DMPO Tunnel Shaper between the tunnel
and the Partner Gateway.
Note The Rate-Limit Tunnel Traffic feature is editable only if it is enabled by your Operator. To
gain access to this feature, see your Operator for more information.
4 In the SD-WAN Overlay Rate Limit area, check the Rate-Limit Tunnel Traffic check box. (See
image below).
6 In the Limit text box, type in a numerical limit to the Tunnel Traffic.
7 Click the Save Changes button located on the top, right corner of the VCO screen.
Firewall Profiles are Segment aware. All Segments available for the configuration are listed in the
Configure Segment drop-down menu. When you select a Segment to configure from the
Configure Segment drop-down menu, the settings and options associated with that Segment
appear in the Configure Segments area. Global Segment [Regular] is the default Segment.
n Enabling Syslog Forwarding. By default, the Syslog Forwarding feature is disabled for an
enterprise. To collect SD-WAN Orchestrator bound events and firewall logs originating from
enterprise SD-WAN Edge to one or more centralized remote Syslog collectors (Servers), an
enterprise user must enable this feature at the enterprise level. For steps on how to configure
Syslog collector details per segment in the SD-WAN Orchestrator, see Configure Syslog
Settings at Profile Level.
n Enabling Stateful Firewall at the Profile and Edge level. By default, the Stateful Firewall
feature is enabled for an enterprise. To disable the Stateful Firewall feature for an enterprise,
contact an Operator with Super User permission.
n #unique_164.
Note You can disable the Firewall function for profiles by turning the Firewall Status to OFF.
Related Links
n #unique_166
Network traffic is managed by identifying its characteristics then matching the characteristics to
the rule with the highest precedence. The following screen capture shows the initial definition of
firewall rules. Note that Firewall function can be disabled using the Firewall Status switch.
Firewall Profiles are Segment aware. All Segments available for configuration are listed in the
Configure Segment drop-down menu.
When you choose a Segment to configure from the Configure Segment drop-down menu, the
settings and options associated with that Segment appear in the Configure Segments area.
Global Segment [Regular] is the default Segment.
For more information about Segmentation, see Chapter 8 Configure Segments and Chapter 11
Configure a Profile Device.
The Firewall Logging feature must be enabled to log individual firewall logging events.
Note An Operator must enable Firewall logging in order for an Enterprise user to enable or
disable it.
For the 3.3.1 release, there are three new IP Address options available: CIDR Prefix, Wildcard
Mask, and Subnet Mask.
The Configure Rule dialog box appears. From this dialog box, you can select Source,
Destination, and Application characteristics to match. Given a match, the Firewall action
defined in the rule will be applied.
2 In the Match area of the Configure Rule dialog box, there are three sections to configure the
traffic: Source, Destination, and Application. See the steps below to configure the Source
section of the Match area.
3 In the Source section, click the Define button if you want to narrow the source traffic to a
specific VLAN, an IP Address, or MAC Address, as described in the steps that follow.
4 By default, the Any button is selected. If you click the Define button, complete the
appropriate options in the sub steps below.
b VLAN: Click the VLAN radio button and choose the appropriate VLAN from the drop-
down menu.
c IP Address: Click the IP Address radio button and type in the IP Address and choose one
of the three options from the drop-down menu.
Note Wildcard Mask and Subnet Mask are new for the 3.3.1 release.
Option Description
CIDR prefix Choose this option if you want the network defined as a CIDR value (for example: 172.10.0.0 /
16).
Subnet Choose this option if you want the network defined based on a Subnet mask (for example,
mask 172.10.0.0 255.255.0.0).
Wildcard Choose the Wildcard mask option if you want the ability to narrow the enforcement of a policy to
Mask a set of devices across different IP subnets that share a matching host IP address value. The
Wildcard mask matches an IP or a set of IP addresses based on the inverted Subnet mask. A '0'
within the binary value of the mask means the value is fixed and a 1 within the binary value of the
mask means the value is wild (can be 1 or 0). For example, a Wildcard mask of 0.0.0.255 (binary
equivalent = 00000000.00000000.00000000.11111111) with an IP Address of 172.0.0, the first
three octets are fixed values and the last octet is a variable value.
Note After you set up this rule using a Wildcard mask, you are narrowing the number of clients
this rule applies to.
d MAC Address: Type in the MAC Address in the appropriate text box.
5 In the Destination section, you can assign additional parameters to identify the traffic
destination, as described in the following sub-steps:
a Define your traffic destination by clicking one of the following radio buttons (Any,
Internet, VeloCloud Edge, or Non-VeloCloud Site).
b Type in the IP Address in the appropriate text box and specify an IP Address option: CIDR
Prefix, Wildcard Mask, and Subnet Mask.
Note Wildcard Mask and Subnet Mask are new for the 3.3.1 release.
Option Description
CIDR prefix Choose this option if you want the network defined as a CIDR value (for example: 172.10.0.0 /
16).
Subnet Choose this option if you want the network defined based on a Subnet mask (for example,
mask 172.10.0.0 255.255.0.0).
Wildcard Choose the Wildcard mask option if you want the ability to narrow the enforcement of a policy to
Mask a set of devices across different IP subnets that share a matching host IP address value. The
Wildcard mask matches an IP or a set of IP addresses based on the inverted Subnet mask. A '0'
within the binary value of the mask means the value is fixed and a 1 within the binary value of the
mask means the value is wild (can be 1 or 0). For example, a Wildcard mask of 0.0.0.255 (binary
equivalent = 00000000.00000000.00000000.11111111) with an IP Address of 172.0.0, the first
three octets are fixed values and the last octet is a variable value.
Note After you set up this rule using a Wildcard mask, you are narrowing the number of clients
this rule applies to.
a Click the Define button if you want to choose specific applications. By default, the Any
button is selected.
b From the Browse List, select an application category. A list of specific applications display
on the right side of the Browse list. Scroll down the list and select the specific application
you want to define.
The Profile Firewall page allows you to define Outbound Firewall Rules and Edge Access.
Inbound rules must be defined at each Edge.
Note When a Deny action is detected by the firewall, an Event is generated. The event can be
seen in the list of events using Monitor -> Events. When a Deny and Log action is detected, the
Firewall logs the event locally.
The following screen capture shows expanded options for Source, Destination, and Application.
You can use the parameters to finely select where you want the Firewall rule to be applied.
To enable this filter, choose the Mac Address radio button, type in the Mac address, and click the
OK button.
Edge Access
Edge Access behavior can be defined on the Firewall page. Accessing an Edge by remotely
accessing the Edge Local UI or accessing the Edge via SNMP can be set to Deny All, Allow All, or
Allow for specific IP addresses. Accessing an Edge by Support Access can be set to Deny All or
Allow for specific IP addresses. A Local Web UI Port Number can also be specified.
For security reasons, please keep Support Access and the Local Web UI disabled.
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
Steps Overview
The following steps are required for a Network configuration:
b Configure VLANs
b Configure VLANs
If you are creating a new Network, the New Network Allocation dialog is displayed (see the
image below). In the New Network Allocation dialog, specify a Name, Description, and choose an
addressing type.
Although the Address Type can be either Overlapping Addresses (where every VeloCloud Edge
has the same address space) or Non Overlapping Addressing (where each VeloCloud Edge has a
unique address block), we mandate Non Overlapping. For this example, we will call our new
Network, VeloAcme VPN.
Overlapping Addresses
In order to enable branches with Overlapping IP to reach the common server in the hub or data
center, or to enable data center users to reach servers in Overlapping IP branches, NAT on the
Edge must be configured. You can define NAT for a single source local IP to map to one VPN IP
address, or for a block of IP addresses to a block of VPN addresses with same prefix length.
e In the Networks screen, click the Allow VPN Via NAT checkbox if NAT on the Edge is
required. See image below.
2 In the Corporate Networks area, create a new VLAN or update an existing VLAN.
a If you are updating an existing VLAN, click the link of the VLAN to open the Corporate
dialog box.
b If you are creating a new VLAN, click the New button in the VLANs area to open the New
VLAN dialog box. (From the New VLAN dialog box, enter the VLAN Name and VLAN ID).
d Whether you update an existing VLAN or you are creating a new VLAN, enter the Subnet
in the Subnet textbox.
3 If the Allow VPN via NAT is checked, define NAT on the Edge level (1:1 or use VPN IP Subnet
blockpool). See section titled, Configure Edge Device.
Non-Overlapping Addressing
The summary of the new Network where non-overlapping addressing is shown in the following
screen capture. In this Network definition, every edge will have a unique network address space.
VeloAcme will also have some Edges that require communication between Edges using a VPN
tunnel. This requires that each connection across all of the Edges must have a unique IP address.
Note Initially, one Corporate Network is defined. Additional Corporate networks can be defined
by clicking on the '+' symbol to the right of the network.
SaaS
The following screen capture shows a screen capture for a Corporate Network that uses
overlapping addressing. Enter the address space that the Corporate Network will occupy on all
Edges.
Note Although SaaS can use either but for VPN we mandate Non-Overlapping.
Note Once a Network is assigned to an Edge, it is not possible to change the Address Space
Allocation.
Note The number of Edges is the maximum number of Edges that will ever be deployed using
this Network. The Addresses/Edge defines the size of the address space for each Edge.
Configure VLANs
You can define as many VLANs as you like for the Corporate Network, but the Max VLANs value
specifies the maximum number you can specify for use in a Profile or Edge.
Click the New button to create a new VLAN. The dialog below is presented. You can configure
the VLAN Name, VLAN ID, and the DHCP configuration (see the screen capture below).
The following screen captures shows some examples for configuring DHCP options. Choose one
of the following types:
Type Description
When choosing Enabled, you can add one or more DHCP options where you specify predefined
options or add custom options. The following screen capture shows an example configuration
with one predefined and one custom DHCP option.
If you choose the DHCP type of Relay, you can specify the IP address of one or more Relay
Agents (see the screen capture below).
If the DHCP type of Disabled is chosen, IP addresses are not provided by DHCP for this VLAN.
Note Initially, one Guest Network is defined. Additional Guest networks can be defined by
clicking on the ' +' symbol to the right of the network.
The Guest Network is an untrusted network that always uses an overlapping address space. It is
completely segmented and on separate VRF as compared to corporate network. The Guest
Network section (see screen capture below) defines the Address Space. You can define as many
VLANs as you like for the Guest Network, but the Max VLANs value specifies the maximum
number you can use in a Profile or Edge.
Configure VLANs
You can define as many VLANs as you like for the Guest Network, but the Max VLANs value
specifies the maximum number you can use in a Profile or Edge. For VeloAcme, we used the
default VLAN, Guest.
Our VeloAcme Network definitions are now complete and ready to be incorporated into our
Profile and Edge Definitions.
Provision an Edge
This section describes how to provision an Edge.
Note Content for Provision an Edge has been updated for the 3.3.0 release.
Overview
Enterprise Admins can provision a single Edge or multiple Edges, such as assigning a Profile
configuration to an Edge or changing other Edge specific parameters. You must create a
configuration for every Edge you will deploy to a specific site. This section describes what an
Enterprise Admin can provision.
The Enterprise Edges Identification table below provides details for each field and button
displayed on this screen.
Note If you are logged in using a user ID that has Customer Support privileges, you will only be
able to view VeloCloud Orchestrator objects. You will not be able to create new objects or
configure/update existing ones.
Columns/
Checkboxes/
Buttons Description
Edge Column Displays the name of the Edge. Click the Edge column header to sort the Edge list in alphabetical
order. The Edge name is also a link; click the link to open the Chapter 14 Edge Overview Tab
screen. Select the checkbox next to the name of the Edge to select the Edge.
Certificates Column Displays an Edge’s current and expired certificates. Click the View link next to the number of
certificates for more information.
Profile Column Lists the Profile assigned to the Edge. The Profile name is also a link; clicking the link opens the
Profile Overview Screen Tab screen. NOTE: If an Edge Staging Profile is displayed due to push
activation , this profile is used by a newly assigned Edge, but has not been configured with a
production Profile. Enterprise Admins must manually assign a Profile to these Edges. See section
titled, Assign a Profile (Change a Profile) for instructions on how to manually assign a profile to an
Edge.
Operator Profile This column is visible to only Operators. The Operator Profile is the template assigned to the
Column customer the moment the customer is created by the Operators. It includes the software image,
application maps, Gateway selection, and the management settings of the Edge. Operator-level
Admins can change the Operator Profile for specific Edges. Enterprise Admins have read-only
access. The Operator Profile name is also a link; clicking the link opens the Operator Profiles
screen.
HA Checkbox Selecting the HA checkbox enables the VeloCloud Active Standby HA option.
Device Column Displays a blue icon if Edge specific configurations have been configured. Displays a gray
icon to indicate that all settings (if any) have been inherited from the Profile. To navigate to the
Device settings screen, click the icon in the Device column, and then click the Device tab.
Biz Policy Column Displays a blue icon if Business Policy rules have been configured. Displays a gray icon to
indicate that all rules (if any) have been inherited from the Profile. To navigate to the Business
Policy screen, click the icon in the Biz Policy column and then click the Business Policy tab.
Firewall Column Displays a blue icon if Firewall rules have been configured. Displays a gray icon to indicate
that all rules (if any) have been inherited from the Profile.
Displays a red line across the icon if the Firewall is disabled. When the Firewall is disabled, it
indicates that it has been turned off in an Edge's profile configuration. To turn the Firewall on, go
the profile configuration ( Configure > Profiles > Firewall tab).
To navigate to the Firewall screen, click the icon in the Firewall column and then click the Firewall
tab.
Alerts Checkbox If Customer alerts are enabled for the Edge, the Alerts checkbox will be checked in this column.
Click the name of the Edge in the Edge column to open the Chapter 14 Edge Overview Tab to
enable or disable Customer alerts.
Operator Alerts If Operator alerts are enabled for the Edge, the Operator Alerts checkbox will be checked in this
Checkbox column. Click the name of the Edge in the Edge column to open the Chapter 14 Edge Overview
Tab to enable or disable Operator alerts.
Software Version The software version of the Edge will display in this column.
Column
Factory Software When the Edge is shipped from the factory, it is shipped with a default software version.
Version Column
Columns/
Checkboxes/
Buttons Description
Serial Number Displays the serial number of the Edge. Assigning a serial number to an Edge is optional. If a serial
Column number is not assigned to the Edge, this field will be blank.
Created Column Displays the date and time the Edge was provisioned.
Activated Column Displays the date and time the Edge was activated.
Last Contact The last date and time the Edge communicated with the VCO.
Column
Column (Cols) Click the Cols button to select the options you want to display in the Enterprise Edges list (See
button image above).
Reset View Button Resets the Enterprise Edges list to the default view. (This removes filters and resets any options
that were selected from the Cols button drop-down menu to the default view).
Refresh Button Refreshes the Enterprise Edges list with current data from the server.
CSV Button To export the content displayed in the Enterprise Edges list, click the CSV button.
Selected Button Indicates how many Edges are selected from the Edge column. Click the Selected button to
select all or deselect all of the Edges listed in the Edge column.
Actions Button Lists the following actions you can perform on a selected Edge:
n New Edge
n Local Credentials
n Delete Edge
n Assign Profile
n Assign Operator Profile
n Update Pre-notifications
n Edge Licensing
n Update Customer Alerts
n Rebalance Gateways
Note Assign Operator Profile and Rebalance Gateways are Operator-level only features.
New Edge Button Opens the Provision New Edge dialog to provision a new Edge. See section, Provision a New
Edge for more information.
Help Button Access the online help for this feature by clicking the Question Mark icon.
Note This "Provision a New Edge" section below has been updated for the 3.3 release.
To provision an Edge:
1 In the VeloCloud Edges screen, click the New Edge button, located on the top, right corner
of the VCO.
2 In the Provision New Edge dialog box, type a unique name for the Edge in the Name text
field (see image below).
3 From the Model drop-down menu, select the model of the Edge you are creating.
4 Assign a profile to the Edge by choosing a profile from the Profile drop-down menu.
n If an Edge Staging Profile is displayed as an option due to push activation, this profile is
used by a newly assigned Edge, but has not been configured with a production Profile.
n If a customer has a Network-based Operator Profile, then the customer can only provision
Network-based Edges. In addition, if a customer has a Segment-based Operator Profile,
then the customer can only provision Segment-based Edges. (For more information about
Profile migration see, Network to Segment Migration. For more information about how to
create a new profile, see the Chapter 10 Configure Profiles section titled, Create a Profile).
5 Apply a certificate to the Edge from the Authentication drop-down menu. Options are as
follows: Certificate Disabled, Certificate Optional, and Certificate Required (if a valid certificate
is available). For more information about each of these certificates, see Authentication, in the
Properties Area Field and Checkbox Descriptions table.
6 Choose an Edge license from the Edge License drop-down menu. For more information
about Edge Licensing, see Edge Licensing.
7 To apply High Availability (HA), select the High Availability checkbox. (Edges can be installed
as a single standalone device or paired with another Edge to provide High Availability (HA)
support. For more information about HA, see the High Availability Options section).
8 As an optional step, enter the serial number of the Edge in the Serial Number text field. If
specified, the serial number must match the serial number of the Edge that will be activated.
9 Type in the name and email address of the site contact for the Edge.
10 Click the Set Location link to enter the location of the Edge. See Contact & Location in the
Monitor the Edge Overview section for more information.
11 Click the Create button to Provision the Edge. The Edge gets provisioned with an activation
key.
Note The activation key expires in one month if the Edge device is not activated against it.
For information on how to activate an Edge see the Configure Edge Activation section in the
Edge Activation Quick Start Guide.
After you click the Create button, the Edge Overview screen appears showing the Edge
activation key at the top of the screen. To see an overview of the Edge you just created, or to
make any changes to it, see the Chapter 14 Edge Overview Tab section.
After you have Provisioned the Edge, you can select the Edge from the VeloCloud Edges
window, click the Actions button to open the drop-down menu, and perform relevant options on
the selected Edge. See the section below for a description of all the options in the Actions drop-
down menu.
Overview
After you select an Edge from the Enterprise Edges Configuration screen ( Configure > Edges
from the VCO), the following actions can be taken from the Actions drop-down menu.
New Edge
You can create a new Edge by either clicking the Create Edge button or by choosing New Edge
from the Actions drop-down menu. See the Provision a New Edge section in this document for
information on how to Provision a new Edge.
Local Credentials
You can assign local configuration credentials by selecting an Edge and choosing Local
Credentials from the Actions drop-down menu. In the Local Configuration Credentials dialog,
type the User and Password in the appropriate fields. The default credentials are username:
admin password: admin123 (case sensitive). Then, click the Submit button.
Delete an Edge
Once you delete an Edge the action cannot be undone. If you’re sure you want to delete an
Edge, select the Edge you want to delete, and then choose Delete Edge from the Actions drop-
down menu. In the Delete Edge dialog, make note of the warning message that deleting an Edge
cannot be undone, click the Confirm Delete Selected Edge checkbox, and then click the Delete
button.
Note If no Edge operator configuration is set, the Edge will receive the operator configuration
assigned to the Customer.
Update Pre-notifications
To set Edge device alerts for Operators, select an Edge, and then choose Update Pre-
Notifications from the Actions drop-down menu. In the Update Pre-Notifications dialog, select
the Enable Pre-Notifications radio button, and then click Update. NOTE: In order for an Operator
to receive alert messages, alerts and notifications must be selected and enabled via email, SMS,
or SNMP Traps at Configure > Alerts and Notifications. You can change this pre-notification
setting by selecting the Edge, and then going to the Properties area at Configure > Edges to
enable or disable the alert.
Rebalance Gateways
Rebalance Gateways is an Operator-level only feature to help rebalance VeloCloud hosted
Gateways across the Enterprise Edges. (This feature is not visible to Standard Admins).
Note Content for Edge Overview Tab has been updated for the 3.3 release.
n Edge Overview
n Edge Profile
n RMA Reactivation
Edge Overview
The Edge Overview tab provides an overview of a selected Edge, which includes properties,
status, profile configurations, and contact information.
In this tab, you can send an Edge activation email, make changes to certain properties, assign a
different profile to a selected Edge, update Edge contact and location information, or request an
Edge RMA reactivation. To access the Edge Overview Tab:
2 In the Enterprise Edgescreen, select and click an Edge to open the Edge Overview Tab.
You can perform the following tasks (as well as other tasks) on the Edge Overview Tab:
n To enable alerts for a specific Edge, or send an Edge activation email, see the Edge Overview
Properties section.
n To see an overview of the Edge overrides from a specific profile, or if you need to change to
a different profile, see the Edge Profile section.
n To change the contact, location, or the shipping address of an Edge, see the Contact &
Location section.
n To replace an Edge that has malfunctioned, see the RMA Reactivation section.
The following sections provide detailed descriptions of each area of the Edge Overview Tab.
Properties Overview
In the Properties area, you can initiate the Edge activation process by sending an Edge activation
email, and you can also view and change certain properties of a selected Edge. The Edge status,
activation date, and software version also display in this area.
See the Properties Area Field and Checkbox Descriptions for a description of all fields and
checkboxes featured in the Properties area. See the Initiate Edge Activation section for
information on how to send an Edge activation email.
Field/Checkbox Description
Name Displays the unique name of the Edge at the customer level. If you change the name of the Edge,
remember to click the Save Changes button.
Description Enables you to provide information about the Edge. If you make updates to the Edge description,
remember to click the Save Changes button.
Note This is the only location where a description of the Edge is displayed.
Enable Pre- This checkbox is enabled by default after the Edge has been provisioned.
Notifications For Operators to receive alerts, the Enable Pre-Notifications checkbox must be checked, and
checkbox alerts must be selected and enabled via email, SMS, or SNMP Traps at Configure > Alerts &
Notifications.
In addition to receiving an email, SMS, or SNMP Trap, Alerts can also be viewed on the Alerts
screen at Monitor > Alerts. Uncheck this checkbox to disable alert notifications for Operators for
the selected Edge.
Enable Alerts This checkbox is enabled by default after the Edge has been provisioned.
checkbox For Customers to receive Edge Device alerts, the Enable Alerts checkbox must be checked, and
alerts must be selected and enabled via email, SMS, or SNMP Traps at Configure > Alerts &
Notifications.
In addition to receiving an email, SMS, or SNMP Trap, Alerts can also be viewed on the Alerts
screen at Monitor > Alerts. Uncheck this checkbox to disable alerts for the selected Edge.
Field/Checkbox Description
Authentication There are three options for the Authentication Mode (Certificate Disabled, Certificate Optional, and
Mode Certificate Required).
n Certificate Disabled (default): If Certificate Disabled is selected as an option, the Edge will use
a pre-shared key mode of authentication.
n Certificate Optional: If Certificate Optional is selected as an option, the Edge will use either the
PKI certificate or the Pre-shared key (depending upon which certificate the other Edge or
Gateway is using).
License The License drop-down menu displays available license types that can be assigned to an Edge.
View Certificate If the Edge has a valid certificate, the View link displays. Click the View link to view, export, or
revoke the certificate.
Status Displays the following status options: Pending, Activated, and Reactivation Pending.
n Pending: The Edge has not been activated.
n Activated: The Edge has been activated.
n Reactivation Pending: If the Request Reactivation button is clicked, the status will change to
Reactivation Pending. This status update does not change the Edge’s function, it only indicates
that a new or replacement Edge can be activated with the existing configuration.
Activated Displays the date and time the Edge was activated.
Software Version Displays the software version and build number of the Edge.
Local Credentials Displays the credentials for the local UI. The default credentials are username: admin password:
admin123 (case sensitive). Click the View button to change the credentials.
Serial Number If the Edge is in the Pending state, the Serial Number text field displays. Entering the serial number
is optional, but if specified, the serial number must match the serial number of the Edge that will be
activated.
Activation Key If the Edge is in the Pending state, the Edge Activation Key displays. The activation key is only valid
for one month. After one month, the key will expire, and a warning message will display
underneath the activation key. You can generate a new key by clicking the Generate New
Activation Key button located below the warning message.
See the Expired RMA Activation Key section for more information.
Send Activation When the Send Activation Email button is clicked, an email with activation instructions is sent to
Email the Site Contact.
Once the Edge configuration is saved, an activation key is assigned. In the Properties area, click
the Send Activation Email button to initiate the Edge activation process. Clicking the Send
Activation Email button does not activate the Edge; it only initiates the activation process by
sending an email to the Site Contact with instructions on how to activate the Edge device.
After clicking the Send Activation Email button, a pop-up window displays the email that will be
sent to the Site Contact. Instructions are provided in the email for the Site Contact to connect and
activate the Edge hardware. For more information on how to activate an Edge, see the Edge
Activation Quick Start Guide in the online help. For information about Pull Activation and Push
Activation, see Zero Touch Provisioning.
Note The image above represents an Edge that has not been activated. Notice that the Edge
status is in the Pending state and displays the Serial Number text field, the Activation Key, and
the Send Activation Email button). See the Properties Area Field and Checkbox Descriptions
table for a description of each of these fields.
Edge License
This section describes the Edge License.
Note The "Edge License" section is new for the 3.3.0 release.
Standard Administrator Superusers and Standard Administrators can assign and monitor Edge
license types that have been assigned to them. See Monitor Edge Licensing for additional
information, including how to generate a report that provides a list of Edges and their license
types.
To assign a license type to an Edge, choose a license type from the License drop-down menu
located at the bottom of the Properties area of the Edge Overview Tab.
Edge Profile
This section describes an Edge Profile.
Profile Overview
The profile is the “template” from which the Edge configuration is derived.
When switching to a different profile on the Edge, all relevant configurations will be changed
except for any Edge override configurations. Overwritten configurations are displayed in the
Profile area.
Note Edge overwritten configurations will not be changed when switching to a different profile.
Note If an Edge Staging Profile is displayed as an option due to push activation, it is a newly
assigned Edge that has not been configured by a production Profile. Enterprise Admins must
manually assign a Profile to those Edges by choosing a new profile from the Profile drop-down
menu.
However, based on system validations, some profiles cannot be assigned to the selected Edge. In
these instances (as shown in the image below), click the Click to view details link for the reason
the profile cannot be assigned to the selected Edge.
See the Important Note in the Profile Overview section above for information about Edge Staging
Profiles.
Customer
Operator Profile Current Edge Selected Edge
Type Enterprise Profile Enterprise Profile Result
Segment-based Network-based Network-based The Edge will not receive the image update.
Network-based Segment-based Segment-based The Edge will not receive the image update.
See the following sections related to the Profile drop-down menu for more information:
n Create a Profile
Edge overrides are the changes to the inherited profile configurations at the Edge level. Edge
additions are configurations that are not included in the profile, but they are added to the
selected Edge. A summary of all Edge overrides and additions are displayed in the Profile area
(see the image in the Profile Profile Overview section).
The Contact & Location area displays the Edge contact information and location. If you make
changes to the Contact Name, Contact Email, or Contact Phone fields, remember to click the
Save Changes button located on the top, right corner of the VCO.
2 In the Set Edge Location pop-up window, update the location using either the Search
Address feature (selected by default) or by typing the address manually.
3 If you choose to type the address manually, click the Manual Address Entry button, and type
either the address or type the Latitude and Longitude.
4 If you choose to type the address, click the Update Lat,Lng From Address button.
5 If you choose to type the Latitude and Longitude, click the Update Address From Lat,Lng
button.
If the shipping address is different from the Edge location, unselect the Same as above checkbox
for the shipping address, then type in the shipping contact in the appropriate text field.
2 In the Edge Shipping Location pop-up window, update the shipping location using either the
Search Address feature (selected by default) or by typing the address manually.
3 If you choose to type the address manually, click the Manual Address Entry button, type the
address, and then click the Update Location on Map button.
4 Click OK.
RMA Reactivation
This section describes RMA reactivation.
See the RMA Reactivation Steps section for detailed instructions on how to activate the
replacement Edge device. See the RMA Reactivation Scenarios section below for scenarios that
require an Edge RMA reactivation.
3 In the Edge Overview Tab, scroll down to the bottom of the screen to the RMA Reactivation
area. Expand the area by clicking the gray arrow located on the upper, right side.
4 Click the Request Reactivation button. This step generates a new activation key and places
the Edge status in Reactivation Pending mode.
Note The reactivation key is only valid for one month from the time when the reactivation
request was made.
5 If you need to cancel the activation request for any reason, click the Cancel Reactivation
Request button. The Edge status changes from Reactivation Pending to Activated.
6 If the activation key has expired (the key is valid for one month), you will need to generate a
new activation key. For more information, see Expired RMA Activation Key.
7 As an optional step, you can enter the serial number of the Edge that will be activated in the
RMA Serial Number text field. Serial numbers are case sensitive, so make sure “VC” is
capitalized.
Note Activation will fail if the serial number doesn’t match the Edge that will be activated.
8 The RMA Model drop-down menu displays the selected Edge by default. If you are
reactivating a different Edge model, select the Edge model that will be activated from the
RMA Model drop-down menu.
Note Activation will fail if the selected Edge model doesn’t match the Edge that will be
activated.
9 If you entered a serial number or chose a model from the RMA Model drop-down menu, click
the Update button.
10 Click the Send Activation Email button. The Send Activation Email pop-up window appears.
11 Click the Send button to send the activation procedure email to the Site Contact. This email
will include the same information displayed in the Send Activation Email pop-up window.
The remaining instructions provide steps for activating the replacement Edge device.
13 Connect the new Edge to the power and network. Make sure the Edge is connected to the
Internet.
Note Be sure to click the activation link in the email to activate the Edge.
The Edge will download the configuration and software from the VCO. The new Edge will be
activated successfully and will be ready for service.
To generate a new RMA Activation Key after the one-month expiration date:
2 In the Generate New Activation Key dialog box, specify the number of days you would like
the key to be active.
3 Click Submit.
4 Follow the RMA Reactivation Steps to complete the RMA reactivation process.
Overrides can be made to Interfaces, DNS, and Authentication. In addition override rules can be
added to existing Business Policy and Firewall rules. Override rules have precedence over all
other rules defined for Business Policy or Firewall.
Note Edge overrides enable Edge specific edits to the displayed settings, and discontinue
further automatic updates from the configuration Profile. You can simply disable the override and
go back to automatic updates any time.
The sections below describe the areas in the Configure > Edges > Device tab screen.
Segment-aware Configurations:
n Authentication Settings
n DNS Settings
n Netflow Settings
n Syslog Settings
n ICMP Probes
n ICMP Responders
n VRRP Settings
n Cloud VPN
n OSPF Areas
n BGP Settings
n Multicast Settings
Common Configurations:
n High Availability
n VLAN
n Device Settings
n WAN Settings
n Multi-Source QoS
n SNMP Settings
n NTP Servers
n Visibility Mode
Note For information about OSPF and BGP, see the Chapter 17 Configure Dynamic Routing with
OSPF or BGP section.
Procedure
2 Select an Edge you want to override Netflow settings and click the icon under the Device
column.
3 From the Configure Segment drop-down menu, select a profile segment to configure
Netflow settings.
4 Go to the Netflow Settings area and select the Enable Edge Override checkbox.
At the edge level, the Observation ID field is auto-populated with 8 bits segment ID and 24
bits edge ID and it cannot be edited. The Observation ID is unique to an Exporting Process
per segment per enterprise.
5 Follow the Step 4 in Configure Netflow Settings at the Profile Level to override the collector,
filter, and Netflow export interval information specified in the Profile.
6 From the Source Interface drop-down menu, select an Edge interface configured in the
segment as the source interface, to choose the source IP for the NetFlow packets.
Note Make sure you select an Edge interface with 'Advertise' field set as the source
interface. If none is selected, the Management interface IP is set as the source interface for
the Global segment and the Edge automatically selects an interface with 'Advertise' field set
as the source interface for all other segments.
To override the Syslog settings at the Edge level, perform the following steps.
Prerequisites
n Ensure that Cloud VPN (branch-to-branch VPN settings) is configured for the VCE (from
where the VCO bound events are originating) to establish a path between the VCE and the
Syslog collectors. For more information, see Configure Cloud VPN.
Procedure
2 Select an Edge you want to override Syslog settings and click the icon under the Device
column.
3 From the Configure Segment drop-down menu, select a profile segment to configure syslog
settings. By default, Global Segment [Regular] is selected.
4 Go to the Syslog Settings area and select the Enable Edge Override checkbox to override
the syslog settings specified in the Profile associated with the Edge.
a From the Facility Code drop-down menu, select a Syslog standard value that maps to
how your Syslog server uses the facility field to manage messages for all the events from
VCEs. The allowed values are from local0 through local7.
Note The Facility Code field is configurable only for the Global Segment, even if the
Syslog settings is enabled or not for the Edge. The other segments will inherit the facility
code value from the Global segment.
c In the IP text box, enter the destination IP address of the Syslog collector.
d From the Protocol drop-down menu, select either TCP or UDP as the Syslog protocol.
e In the Port text box, enter the port number of the Syslog collector. The default value is
514.
f From the Source Interface drop-down menu, select one of the Edge interface configured
in the segment as the source interface.
h From the Syslog Level drop-down menu, select the Syslog severity level that need to be
configured. For example, If CRITICALis configured, the VCE will send all the events which
are set as either critical or alert or emergency.
n EMERGENCY
n ALERT
n CRITICAL
n ERROR
n WARNING
n NOTICE
n INFO
n DEBUG
You can configure a maximum of two Syslog collectors per segment and 10 Syslog collectors
per Edge. When the number of configured collectors reaches the maximum allowable limit,
the + button will be disabled.
Note By configuring the Syslog setting for the Edges, only remote syslog for VCO bound
events from Edges will be received at the Syslog collector. If you want the VCO auto-
generated local events to be received at the Syslog collector, you must configure Syslog at
the VCO level by using the log.syslog.backend and log.syslog.upload system properties.
For details about the settings in the dialog box, refer to the table that follows.
3 Select the WAN interface where the Static Route will be bound.
4 Select the Broadcast checkbox to advertise this route over VPN and allow other Edges in the
network to have access to this resource.
ICMP Probes can be specified settings for Name, VLAN Tagging (none, 802.1q, 802.1ad, QinQ
(0x8100), or QinQ (0x9100)), C-Tags, S-Tags, Source/Destination/Next Hop IPs, Frequency to
send ping requests, and Threshold the value for number of missed pings that will cause route to
be marked unreachable.
ICMP Responders can be specified settings for Name, IP Address, and Mode ( Conditional or
Always).
n Conditional: Edge only responds to ICMP Probes when the SD-WAN Overlay is up.
For more
information about the setup and configuration of HA, see HA Configuration.
The Edge LAN IP address, the Edge Management IP address, and CIDR Prefix. You can also
specify Fixed IP addresses tied to specific MAC Addresses. The list of LAN interfaces and the
SSID of any Wi-Fi interfaces that are configured for this VLAN are listed. Finally, a block for
configuring DHCP is shown. DHCP can be Enabled (where a start address, the number of
addresses, the lease time, and optional parameters are entered), the address of one or more
relay agents can be enabled, or DHCP can be disabled.
The usual DHCP Server settings can be specified, including Disabled (the default), Relay
(configure as DHCP relay), and Enabled (configure as a DHCP server, with options).
See Chapter 11 Configure a Profile Device for LAN interface configuration parameters.
See Chapter 11 Configure a Profile Device for LAN interface configuration parameters.
Either click the Device Icon next to an Edge or click the link to the Edge and click the Device tab.
You can configure the WAN overlay properties in the WAN Settings.
For the auto-detected WAN Overlay networks, click the Edit option to modify the settings.
For the user-defined WAN Overlay networks, click Add User Defined WAN Overlay to create
new Overlay settings or click Edit for an existing network to modify the settings.
Link Type (Available only for user-defined Overlay) You can deploy the WAN Overlay as a public or private
link. Choose the relevant link type from the drop-down.
SD-WAN Service Reachable (Available only for user- VeloCloud supports private WAN deployments with a
defined Overlay and a Private link) hosted VeloCloud service for customers with hybrid
environments who deploy in sites with only a private WAN
link.
In a site with no public overlays, the private WAN can be
used as the primary means of communication with the
VeloCloud service, by enabling the SD-WAN Service
Reachable option.
When you select the checkbox, the list of public SD-WAN
IP addresses is displayed, which would be advertised
across the private network to allow the operation without
public WAN overlays.
Alerts Select the checkbox to enable alerts. Ensure that you have
enabled the Link alerts in the Configure > Alerts &
Notifications screen to receive the alerts.
Source IP Address (Available only for user-defined Enter the IP address of the routed interface.
Overlay) This is the raw socket source IP address used for VCMP
tunnel packets that originate from the Interface selected in
the Interfaces drop-down, to which the User Defined
Overlay is bounded.
Source IP address does not have to be pre-configured
anywhere but must be routable to and from the Interface
this User Defined Overlay is bounded.
Next-Hop IP Address (Available only for user-defined Enter the next hop IP address to which the packets, which
Overlay) come from the raw socket source IP address specified in
the Source IP Address field, should be routed.
Custom VLAN (Available only for user-defined Overlay) Select the checkbox to enable custom VLAN and enter the
VLAN ID. The range is 2 to 4094.
This option applies the VLAN tag to the packets originated
from the Source IP Address of a VCMP tunnel from the
interface selected in the Interfaces drop-down.
802.1P Setting (Available only for user-defined Overlay) To configure the 802.1P setting, the System Property
session.options.enable8021PConfiguration must be set to
True. By default, this value is False.
If this option is not available for you, contact your Operator
to enable the setting.
You can select this checkbox, only when you have already
selected the Custom VLAN checkbox. Select the checkbox
to enable the 802.1P setting and enter the priority value as
a 3-digit binary number. The range is from 000 to 111 and
default is 000.
Option Description
Dynamic Bandwidth Adjustment Select the checkbox to track congestion and packet loss in
WAN and to adjust the bandwidth as required. It is
recommended to enable this option for wireless links.
Option Description
Use as Backup Only Select the checkbox to use the Overlay WAN as a backup,
when other Overlay networks are down or not available.
The Overlay WAN is displayed in the Monitoring page as a
backup link. Click Monitor > Edges to view the status of the
Edge.
Overhead Bytes Enter a value for the Overhead bandwidth in bytes. This is
an option to indicate the additional L2 framing overhead
that exists in the WAN path.
When you configure the Overhead Bytes, the bytes are
additionally accounted for by the QoS schedular for each
packet, in addition to the actual packet length. This ensures
that the link bandwidth is not oversubscribed due to any
upstream L2-framing overhead.
Private Network Name (Available only for user-defined Choose the private network name from the drop-down list.
Overlay and a Private link) You can also click New Private Network Name from the list
and enter a name for a new network.
UDP Hole Punching (Available only for a Public link) Select the checkbox to enable UDP hole punching for the
Overlay network.
Type (Available only for a Public link) Choose whether the link is Wired or Wireless, from the
drop-down.
Configure Static SLA (Available only for user-defined Select the checkbox to configure the static SLA and enter
Overlay and a Private link) the values for Latency, Jitter, and Loss.
Configure Class of Service (Available only for user-defined Select the checkbox to configure the class of service and
Overlay and a Private link) enter appropriate values for the following:
n Class of Service: Enter a descriptive name for the class
of service.
n DSCP Tags: Click Set to select the DSCP tags to be
used in the class of service.
n Bandwidth: Enter a value for the bandwidth.
n Policing: Select the checkbox to enable the class-
based policing.
n Default Class: Click to set the corresponding class of
service as default.
Click the Plus icon (+) to add more rows and the Minus icon
(−) to remove a row. For more information on class of
service, see Configure Edge WAN Settings for MPLS
Private Links.
Therefore, according to the above table, the voice on a MPLS CoS would be identified as DSCP
tag CS5, EF, Video on a MPLS CoS would be identified as AF41, CS4, and the file transfer on a
MPLS CoS would be identified as DSCP tag AF21, CS2. See the Private Link Configuration image
below for an example.
For a private link that has CoS agreement with a MPLS provider, a Service Provider will guarantee
a different SLA for each CoS on a MPLS Link. The DMPO can treat each CoS as a different link
and can take granular application aware decisions for a private link with CoS agreements. A
Policer can be defined for a MPLS CoS underlay to ensure that the Service Provider committed
bandwidth SLAs are being honored by the customer.
Note For more information, see Configure Edge WAN Settings for MPLS Private Links and Edge
WAN Settings for Private Links Example.
2 In the VeloCloud Edges screen, you have two options to access the Device Settings tab:
a First Option: Click an Edge's link to open the Edge Overview screen, and then click the
Device Settings tab.
b Second Option: From the VeloCloud Edges screen, click an Edge's Device Settings icon.
3 In the Actions section of the WAN Settings area, click the Edit link for a Private link. See
image below.
4 In the Private Link... dialog, click the Advanced button to open the Private Link
Configuration area.
5 In the Private Link Configuration area, click the Configure Class of Service checkbox. See
image below.
6 In the Class of Service text box, type in a Class of Service to differentiate the types of traffic
(e.g. Voice). Click the Plus symbol to add another row.
7 Click the Set link to open the DSCP Tags dialog to assign a DSCP tag for the Class of Service
you created.
8 In the DSCP Tags dialog, select a DSCP tag from the Available DSCP Tags list area, and then
click the appropriate arrow to move the tag to the Selected DSCP Tags area. See the image
below.
Note You can select multiple DSCP Tags to assign to a single CoS.
9 Click Submit.
10 In the Bandwidth (%) column, type in the traffic percentages you want to designate for each
of the Class of Services. All of the values in the Bandwidth column must equal 100%. See
image below.
12 If applicable, check the Policing checkbox. For more information, see section title, Edge WAN
Settings for MPLS Private Links Example for more information about Policing.
In a site with no direct public internet access, the SD-WAN Service Reachable option allows the
private WAN to be used for private site-to-site VCMP tunnels and as a path to communicate with
an internet hosted VeloCloud service.
For hybrid environments that have MPLS-only links or require failover to MPLS links, you can
enable the SD-WAN Service Reachable option.
MPLS-only Sites
VeloCloud supports private WAN deployments with a hosted VeloCloud service for customers
with hybrid environments who deploy in sites with only a private WAN link.
In a site with no public overlays, the private WAN can be used as the primary means of
communication with the VeloCloud service, including the following:
The following image shows a Regional Hub with Internet connection and SD-WAN Edge with only
MPLS connection.
Internet
SD-WAN Cloud
Orchestrator Gateway
Regional
Hub Site
MPLS-only
Site
Branch
Edge MPLS
Hub Edge
LAN LAN
The traffic from the SD-WAN Edge with MPLS-only links is routed to the Orchestrator and
Gateway through a Regional Hub, which is able to break out to the public cloud. SD-WAN Service
Reachable option allows the Edge to remain online and manageable from the Orchestrator, and
allows public internet connectivity through the Gateway irrespective of whether or not there is
public link connectivity.
n Orchestrator Resiliency – The Orchestrator connects to the Internet. If the Internet fails, the
Orchestrator will connect through MPLS. The Orchestrator connection is established using the
IP Address which is advertised over MPLS. The connectivity leverages the public Internet link
in the Regional Hub.
n Zscaler Resiliency – The Zscaler connectivity is established through Internet. If the public link
fails, then Zscaler connects through MPLS.
2 In the Edges page, either click the device Icon next to an Edge or click the link to the Edge
and click the Device tab.
3 Scroll down to Interface Settings and Edit the Interface connected to the MPLS link.
The SD-WAN Service Reachable is available only for a User Defined Overlay network.
5 In the WAN Settings section, Edit the Interface enabled with User Defined Overlay.
6 In the User Defined WAN Overlay window, select the SD-WAN Service Reachable checkbox
to deploy sites which only have a private WAN link and/or enable the capability to failover
critical Internet traffic to a private WAN link.
When you select the SD-WAN Service Reachable checkbox, a list of public IP addresses of
SD-WAN Gateways and SD-WAN Orchestrator is displayed, which may need to be
advertised across the private network, if a default route has not been already advertised
across the same private network from the firewall.
7 Configure other options as required and click Update Link to save the settings.
For more information on other options in the WAN Overlay window, see Configure Edge WAN
Overlay Settings.
n The VeloCloud Edge MIB is new for the 3.3.2 release. To download the VeloCloud Edge MIB:
go to the Remote Diagnostic screen (Test & Troubleshooting > Remote Diagnostics) and run
MIB for VeloCloud Edge. Copy and paste results onto your local machine.
n Install all MIBs required by VELOCLOUD-EDGE-MIB on the client host, including SNMPv2-SMI,
SNMPv2-CONF, SNMPv2-TC, INET-ADDRESS-MIB, IF-MIB, UUID-TC-MIB, and VELOCLOUD-
MIB. All the above-mentioned MIBs, except VELOCLOUD-MIB, can be found online. For
VELOCLOUD-MIb, please check VeloCloud website.
About this task: At the Edge level, you can override the SNMP settings specified in the Profile by
selecting the Enable Edge Override checkbox. The Edge Override option enables Edge specific
edits to the displayed settings, and discontinues further automatic updates from the
configuration profile for this module. For ongoing consistency and ease of updates, it is
recommended to set configurations at the Profile rather than Edge exception level.
Supported MIBs
2 Install all MIBs required by VELOCLOUD-EDGE-MIB. (See "Before you begin" for more
information.
4 Select an Edge you want to configure SNMP settings for, and click the Device icon under the
Device column.
5 Scroll down to the SNMP Settings area and check the Enable Edge Override checkbox. You
can choose between two versions, v2c or v3.
c In the Community textbox, type in a word or sequence of numbers that will act as a
'password' that will allow you access to the SNMP agent.
n Check the Any checkbox to allow any IP to access the SNMP agent.
n To restrict access to the SNMP agent, uncheck the Any checkbox and enter the IP
address(es) that will be allowed access to the SNMP agent.
7 For a SNMP v3 config, which provides added security support follow the steps below:
c Check the Privacy checkbox if you want your packet transfer encrypted.
d If you've chcked the Privacy checkbox, choose DES or AES from the Algorithm drop-
down menu.
8 Configure Firewall Settings. After you have configured SNMP Settings, go to Firewall settings
(Configure >Profiles > Firewall) to configure the Firewall settings that will enable your SNMP
settings.
Details about each of these options can be found at Chapter 11 Configure a Profile Device.
On the Edge Device tab, you can review any detected WAN connections after a device has been
activated. The status of WAN interfaces for an Edge appear in the Link Status area of the
Overview tab. Two status examples are shown in the figures below. The status will display as
Backup: Active and/or Backup: Standby.
As shown in the image below, Business Policy is Segment aware. All Segments available for
configuration are listed in the Configure Segment drop-down menu.
When you choose a Segment to configure from the Configure Segment drop down, the settings
and options associated with that Segment display in the Configure Segments area. Global
Segment [Regular] is the default Segment.
For more information about Segmentation, see Chapter 8 Configure Segments and Configure
Edge Device.
Firewall Profiles are Segment aware. All Segments available for configuration are listed in the
Configure Segment drop-down menu. When you choose a Segment to configure from the
Configure Segments drop-down menu, the settings and options associated with that Segment
appear in the Configure Segments area. Global Segment [Regular] is the default Segment.
For more information about Segmentation, see Chapter 8 Configure Segments and Configure
Edge Device.
Note Inbound Firewall Rules are configured at the Edge Level and are Segment aware.
Inbound firewall rules gives Internet clients access to servers connected to an Edge LAN
interface. Access can be made available through either Port Forwarding Rules or 1:1 NAT
(Network Address Translation) rules.
Example
If the WAN IP is 169.254.6.45, port forwarding rules can be as follows:
n If the source IP is 88.88.88.88 (from Internet), and it tries to reach 169.254.6.46 port 8888, it
will port forward to 192.168.10.10 / port 80.
n If source IP is 99.99.99.99, and it tries to reach 169.254.6.46 port 8888 (same as above), it will
port forward to 192.168.20.10 / port 80.
Procedure:
4 Enter the Outside IP address in the appropriate text box. For more information, see the 'Port
Forwarding Rules' section above.
5 Enter the WAN port number. (To configure a range of ports, separate the first port and last
port with a dash, e.g. "20-25").
6 Enter the LAN IP and the Port where the request will be forwarded.
7 From the Segment drop-down menu, select a segment the LAN IP will belong to.
8 In the appropriate text field, enter the Inbound Traffic (Remote IP Address/subnet) that will
be allowed to be forwarded to an internal server. Leave the Remote IP Address/subnet text
field blank to allow "any" traffic.
The following figure shows an illustration overview of the port forwarding configuration.
3 Select the WAN interface where the Outside IP address will be bound.
5 From the Segment drop-down menu, select a segment the LAN IP will belong to.
6 Select if Outbound traffic should also be allowed to pass over the firewall connection by
checking the Outbound Traffic checkbox.
7 Enter the Allowed Traffic Source (Protocol, Ports, Remote IP/Subnet) for the mapping.
The following figure shows an overview view of the 1:1 NAT configuration.
Once an Edge configuration has been saved, it is assigned an activation key. Edge activation
begins by clicking the Send Activation Email link on the Edge Overview Tab.
A Send Activation Email dialog box appears with a suggested email to be sent to a Site Contact.
Simple instructions are provided for the Site Contact to connect and activate Edge
hardware. Specify additional instructions in the email for connecting specific site WAN and LAN
networks to the Edge.
Enable LAN-side NAT Rules (Go to Configure Customer > Customer Capabilities and check the
Enable LAN-side NAT Rules checkbox.
Note LAN-side NAT Rules can be configured at the Profile level or the Edge level. To configure
at the Edge level, make sure the “Enable Edge Override” checkbox is checked.
In this scenario, a third-party has assigned multiple non-overlapping subnets to a customer's site.
The server in the customer's data center recognizes traffic from this third-party by a single IP
address at any given site.
Because the NAT rule is a single IP, TCP and UDP traffic will be PAT'd. So in this example,
192.168.1.50 becomes 172.26.24.4 with an ephemeral source port for TCP/UDP traffic, ICMP traffic
becomes 172.26.24.4 with a custom ICMP ID for reverse lookup, and all other traffic will be
dropped.
In this scenario, the LAN subnet is 192.168.1.0/24. However, this is an overlapping subnet with
other sites. A unique subnet of equal size, 172.16.24.0/24 has been assigned to use for VPN
communication at this site. Traffic from the PC must be NAT'd on the Edge prior to doing the
route lookup, otherwise the source route will match 192.168.1.0/24 which is not advertised from
this Edge and traffic will drop.
Because the subnets match in size, all bits matching the subnet mask will be NAT'd. So in this
example, 192.168.1.50 becomes 172.16.24.50.
2 In the Device Settings tab screen, scroll down to the LAN-Side NAT Rules area.
3 In the LAN-Side NAT Rules area, complete the following: (See the table below and the Use
Cases described above for more information about the fields in the LAN-Side NAT Rules
area).
Inside Address text box IPv4 address/prefix, Prefix must be The "inside" or "before NAT" IP
1-32 address (if prefix is 32) or subnet (if
prefix is less than 32).
Outside Address text box IPv4 address/prefix, Prefix must be The "outside" or "after NAT" IP
1-32 address (if prefix is 32) or subnet (if
prefix is less than 32).
Type drop-down menu Select either Source or Destination. Determine whether this NAT rule
should be applied on the source or
destination IP address of user traffic.
Description text box Text Custom text box to describe the NAT
rule.
The diagram below shows an example topology that includes two data center hubs and the Gold,
Silver , and Bronze variations of branch topologies interconnected using MPLS and the Internet.
This example will be used to describe the individual tasks required for data center and branch
configurations. It is assumed that you are familiar with concepts and configuration details in
earlier sections of this documentation. This section will primarily focus on configuring Networks,
Profile Device Settings, and Edge configuration required for each topology.
Additional configuration steps for traffic redirection, control routing (such as for backhaul traffic
and VPNs), and for Edge failover are also included.
This section primarily focuses on the configuration required for a topology that includes different
types of data center and branch locations, and explains the Network, Profile/Edge Device
Settings, and Profile/Edge Business Policies required to complete the configurations. Some
ancillary configuration steps that may be necessary for a complete configuration – such as for
Network Services, Device Wi-Fi Radio, Authentication, SNMP, and Netflow settings – are not
described.
The following describes the various designs with different options of how VeloCloud Edge can be
inserted into the topology.
Option Description
Hub 1 Data Center or regional hub site with VeloCloud Edge deployed in two-arm topology.
Hub 2 Data Center or regional hub site with VeloCloud Edge deployed in one-arm topology (same interface
carries multiple WAN links).
Silver 1 VeloCloud Edge is deployed off-path. VeloCloud Edge creates overlay across both MPLS and Internet
paths. Traffic is first diverted to the VeloCloud Edge.
Silver 2 VeloCloud Edge is deployed in-path as the default gateway. It is always the default gateway. This
topology is simpler but makes VeloCloud Edge a single point of failure and may require HA.
Overview
To configure the VeloCloud Edge in a two-arm configuration:
You will use the Virtual Edge as a hub. Below is an example of the wiring and IP address
information.
1 Configure a PC with a static IP 192.168.2.100/24 and gateway 192.168.2.1 which is the default
LAN setting for accessing a VeloCloud Edge. Connect the PC to the VeloCloud Edge LAN
interface.
2 From the PC, browse to http://192.168.2.1 (the local Web interface of the VeloCloud Edge).
Click the link review the configuration.
3 Configure the GE2 static WAN IP and default gateway of the VeloCloud Edge so that it can
reach the Internet.
Typically at the data center/hub site, the static IP address will be assigned to you and the
enterprise IT admin will configure the firewall to translate the VeloCloud Edge WAN IP to a
Public IP and also filter the appropriate traffic (outbound: TCP/443, inbound: UDP/2426, UDP/
500, UDP/4500).
After configuration of the VeloCloud Edge static WAN IP address and associated firewall
configuration is complete, the VeloCloud Edge Internet status shows "Connected".
2 The default VPN profile allows the activation of the VeloCloud Edge 500.
2 Go to the hub VeloCloud Edge (DC1-VCE) and follow the normal activation process. If you
already have the email feature set up, an activation email will be sent to that email address.
Otherwise, you can go to the device setting page to get the activation URL.
3 Copy the activation URL and paste that to the browser on the PC connected to the VeloCloud
Edge or just click on the activation URL from the PC browser.
5 Now the DC1-VCE data center hub should be up. Go to Monitor > Edges. Click the Edge
Overview tab. The public WAN link capacity is detected along with the correct public IP
71.6.4.9 and ISP.
6 Go to Configure > Edges and select DC1-VCE. Go to the Device tab and scroll down to the
Interface Settings.
You will see that the registration process notifies the VeloCloud Orchestrator of the static
WAN IP address and gateway that was configured through the local UI. The configuration on
the VeloCloud will be updated accordingly.
7 Scroll down to the WAN Settings section. The Link Type should be automatically identified as
Public Wired.
2 Under WAN Settings, click the Add User Defined WAN Overlay button (see the following
screen capture).
3 Define the WAN overlay for the MPLS path. Select the Link Type as Private and specify the
next-hop IP (172.31.2.2) of the WAN link in the IP Address field. Choose the GE3 as the
interface. Click the Advanced button.
Tip: The hub site normally has more bandwidth than the branches. If we choose the
bandwidth to be auto-discovered, the hub site will run a bandwidth test with its first peer, e.g.
the first branch that comes up, and will end up discovering an incorrect WAN bandwidth. For
the hub site, you should always define the WAN bandwidth manually, and that is done in the
advanced settings.
4 The private WAN bandwidth is specified in advanced settings. The screen shot below shows
an example of 5 Mbps upstream and downstream bandwidth for a symmetric MPLS link at the
hub.
5 Validate that the WAN link is configured and save the changes.
You are done with configuring the VeloCloud Edge on the hub. You will not see the User
Defined MPLS overlay that you just added until you enable a branch VeloCloud Edge.
2 Navigate to the Device tab and scroll down to the VLAN Settings section.
1 Create a new Edge SILVER1-DCEand select the appropriate Model and configuration profile
(see image below).
3 The VeloCloud Edge should now be active in the VeloCloud Orchestrator with one public link.
We can now configure the private WAN link.
Configure the Private WAN Link on the Silver 1 Site VeloCloud Edge
At this point, we need to build the IP connectivity from the VeloCloud Edge towards the L3
switch.
1 Go to Configure > Edges, select the SILVER1-VCE and go to the Device tab and scroll down
to the Interface Settings section. Configure static IP on GE3 as 10.12.1.1/24 and default
gateway of 10.12.1.2. Under WAN Overlay, select User Defined Overlay. This will allow us to
define a WAN link manually in the next step.
2 Under the WAN Settings section, click Add User Defined WAN Overlay.
3 Define the WAN overlay for the MPLS path. Select the Link Type as Private. Specify the next-
hop IP (10.12.1.2) of the WAN link in the IP Address field. Choose the GE3 as the Interface.
Click the Advanced button.
Tip: Since the hub has already been set up, it is OK to auto-discover the bandwidth. This
branch will run a bandwidth test with the hub to discover its link bandwidth.
4 Set the Bandwidth Measurement to Measure Bandwidth. This will cause the branch
VeloCloud Edge to run a bandwidth test with the hub VeloCloud Edge just like what happens
when it connects to the VeloCloud Gateway.
5 Validate that the WAN link is configured and save the changes (see the following screen
capture).
interfaces.
You are now ready to build the tunnel from the branch into the hub.
n Under Branch to Branch VPN, uncheck the Use Cloud Gateways checkbox. Doing this will
disable the data plane through the VeloCloud Gateway for Branch to Branch VPN. The
Branch to Branch traffic will first go through one of the hubs (in the ordered list which you
will specify next) while the direct Branch to Branch tunnel is being established.
Click the button Select VeloCloud Hubs]. Next, move the DC1-VCE to the right. This will
designate the DC1-VCE to be a VeloCloud Hubs. Click the DC1-VCE in the VeloCloud Hubs,
and click both Enable Backhaul Hubs and Enable B2B VPN Hubs buttons. We will use the
same DC1-VCE for both Branch to Branch traffic and to Backhaul Internet traffic to the hub.
Under the Cloud VPN section, DC1-VCE now shows as both VeloCloud hubs and used for
Branch to Branch VPN hubs.
2 At this point, the direct tunnel between the branch and the hub VCEs should come up.The
debug command will now also show the direct tunnel between the branch and the hub. The
below example is from the SILVER1-VCE. Note that the additional tunnels to 71.6.4.9 and
172.31.2.1. These are the direct tunnels to the hub VeloCloud Edge (GE2 over public Internet
and GE3 over private link).
2 Configure the hub VeloCloud Edge to reach the Internet by configuring the first WAN
interface, GE2.
1 On the VeloCloud Orchestrator, go to Configure > Edges, select New Edge to add a new
VeloCloud Edge.
2 Go to Configure > Edges, select the VeloCloud Edge that you just created, then go to the
Device tab to configure the same Interface and IP you configured in previous step.
Important Since we are deploying the VeloCloud Edge in one-arm mode (same physical
interface but there will be multiple over tunnels from this interface), it is important to specify
the WAN Overlay to be User Defined.
3 At this point, you need to create the overlay. Under WAN Settings, click Add User Defined
WAN Overlay.
4 Create an overlay across the public link. In our example, we will use the next-hop IP of
172.29.0.4 to reach the Internet through the firewall. The firewall is already configured to
NAT the traffic to 209.116.155.31.
5 Add the second overlay across the private network. In this example, we specify the next-hop
router 172.29.0.1 and also specify the bandwidth since this is the MPLS leg and DC2-VCE is a
hub.
Add a static route to the LAN side subnet, 172.30.128.0/24 through GE2 (see the following
screen capture).
6 Activate the VeloCloud Edge. After the activation is successful, come back to the Device tab
under the edge level configuration. Note the Public IP field is now populated.You should now
see the links in the Monitor > Edges, under the Overview tab. (Optional) Configure the LAN
Interface with Management IPGo to Configure > Edges, select DC2-VCE. Navigate to the
Device tab and scroll down to the VLAN Settings section. Click Edit. Configure the IP address
of the LAN and Management interfaces.
Add the Hub 2 VeloCloud Edge to the Hub List in the Quick Start
VPN Profile
1 Go to Configure > Profiles and select the profile Quick Start VPN.
2 Go to the Device tab and add this new VeloCloud Edge to a list of hubs.
Connect a PC to the VeloCloud Edge LAN or Wi-Fi and use the browser to point to http://
192.168.2.1.
VeloCloud Edge learns routes from adjacent routers through OSPF and BGP. It sends the learned
routes to the Gateway/Controller. The Gateway/Controller acts like a route reflector and sends
the learned routes to other VeloCloud SD-WAN Edges. The Overlay Flow Control (OFC) enables
enterprise-wide route visibility and control for ease of programming and for full and partial
overlay.
VeloCloud supports Inbound/Outbound filters to OSPF neighbors, OE1/OE2 route types, MD5
authentication. Routes learned through OSPF will be automatically redistributed to the controller
hosted in the cloud or on-premise. Support for BGP Inbound/Outbound filters and the filter can
be set to Deny, or optionally you can Add/Change the BGP attribute to influence the path
selection, i.e. RFC 1998 community, MED, and local preference.
Note For information about OSPF and BGP Redistribution, see the section titled OSPF/BGP
Redistribution.
Note In the 3.2 release, both BGP and OSPF can be enabled in a VeloCloud SD WAN Edge at a
time.
n Enable OSPF
n Enable BGP
n OSPF/BGP Redistribution
Enable OSPF
Open Shortest Path First (OSPF) can be enabled only on a LAN interface as a passive interface.
The Edge will only advertise the prefix associated with that LAN switch port. To get full OSPF
functionality, you must use it in routed interfaces.
b Click the Device icon corresponding to the VPN profile for which you want to configure
OSPF.
c In the OSPF Areas section, turn ON the OSPF Areas toggle button.
1 From the Default Route drop-down menu, choose an OSPF route type (E1 or E2) to
be used for default route.
4 Optionally, to enable injection of BGP routes into OSPF, select the BGP checkbox.
BGP routes can be redistributed into OSPF, so if this is applicable, enter or choose the
configuration options as follows:
a In the Set Metric textbox, enter the metric. (This is the metric that OSPF would put
in its external LSAs that it generates from the redistributed routes). The default
metric is 20.
b From the Set Metric Type drop-down menu, choose a metric type. (This is either
type E1 or E2 (OSPF External-LSA type)); the default type is E2).
7 By default,the Normal type is selected. Only Normal type is supported at this time.
Note For the 3.3.1 release, the VeloCloud Orchestrator (VCO) supports OSPF Point to Point
network mode at the Edge and Profile level.
a In the Configure Segments screen, scroll down to the Device Settings area of the Edge
device for which you want to configure interface and OSPF settings.
c In the Interface Settings area, click the Edit link of your interface. The Interface Setting
screen for the Edge device appears.
f Click the toggle advance ospf settings link to configure advanced OSPF settings.
1 Create filters for Inbound Route Learning and Route Advertisement. For more
information, see Route Filters.
2 Click the Customs Settings tab and configure the following OSPF settings.
a In the Hello Timer text box, enter the OSPF Hello time interval in seconds. The
allowable range is 1 through 255.
b In the Dead Timer text box, enter the OSPF Dead time interval in seconds. The
allowable range is 1 through 65535.
d In the Interface Path Cost text box, enter the OSPF cost for the interface path.
e In the MTU text box, enter the Maximum Transmission Unit (MTU) value of the
interface.
f From the Mode drop-down menu, select Broadcast or Point to Point as the OSPF
network type mode. The default OSPF mode is Broadcast.
The Confirm Changes dialog box appears requesting you to confirm the OSPF areas you
want to enable. It also displays how many Edges are affected.
Note If you have Edges that are not associated with the OSPF configuration at the Profile
level, then you must configure at the Edge level from Configure > Edges > Device > Interface
Settings area.
Route Filters
There are two different types of routing: inbound and outbound.
n Inbound routing includes preferences that can be learned or ignored from OSPF and installed
into the Overlay Flow Control.
n Outbound Routing indicates what prefixes can be redistributed into the OSPF.
Enable BGP
The Routing BGP feature is available only if it is enabled by your Operator. To gain access to this
feature, see your Operator for more information.
n BGP must be enabled by an Operator (Go to Configure > Customer and check the Enable
BGP checkbox in the Customer Configuration screen).
Note
n 4-Byte ASN BGP is supported (As the ASN of the VCE itself), Peer to a neighbor with 4-Byte
ASN- Accept 4-Byte ASNs in route advertisements. Only plain format is supported; asdot/
decimal format is not.
n BGP can be configured per segment. You can configure either at the Profile level or the Edge
level with the Edge Override enabled.
BGP inbound and outbound configuration supports setting BGP communities. Community values
can be used to identify the source of the routes. By default, if "additive" is not checked, the
existing BGP community will be replaced by the "set" value(s). If the community additive option is
checked, we will append the set community values to the existing BGP community. As shown in
the example image below, community 12345:11 and 12345:22 will be appended to the existing
BGP community. NOTE: The maximum number of community strings supported is twelve.
b Select a profile you want to enable BGP for and click the Device icon for the applicable
Profile.
2 Scroll down to the BGP Settings area, and turn BGP ON as shown in the image below.
a Click the Add Filter button to create one or more filters. (These filters will be applied to
the neighbor to deny or change the attributes of the route. The same filter can be used
for multiple neighbors).
n Set the value for either the Prefix or Community in the Value textbox.
n Indicate the action type (Permit or Deny) from the Type drop-down menu.
n From the Set drop-down menu, choose either None, Local Preference, Metric, AS-
Path-Preprend, or Community, Community Additive checkbox. See the section
above titled, Community Additive Support" for more information.
c After you have set the rules for the filter, click the OK button.
d In the BGP Editor dialog box, enter the Local ASN number in the Local ASN textbox.
e In the Neighbor's area, enter the Neighbor IP and ASN in the appropriate text boxes, and
specify Inbound Filters or Outbound Filters from the Filter list defined in the previous
step.
f Add additional options by clicking the view all button to open the drop-down menu.
Apply additional options as needed. (See the table below for a description of each option
and the table below for additional reference).
Neighbor Flag drop-down menu Used to flag the neighbor type. Choose between two
options from the drop-dwon menu: None and Uplink.
Select Uplink if it is used as the WAN overlay towards
MPLS. It will be used as the flag to decide whether the
site will become a transit site (e.g. hub) by
propagating routes leant over SD-WAN overlay to
WAN link toward MPLS. If need to make it a transit
site, also check "Overlay Prefix Over Uplink" in
Advanced option.
Allow AS checkbox Learn BGP routes even though the same AS is in the
AS-path.
Default Route checkbox Advertise a default route to the neighbor. See step "e,
ii" below for more information about using the Default
Route checkbox.
MD5 Auth checkbox Enables BGP MD5 authentication. The MD5 Auth
checkbox is used in a legacy network or federal
network, and it is common that BGP MD5 is used as a
security guard for BGP peering.
h In the Additional Settings area, you can enter the following additional BGP settings
described in the table below. (See the image below for additional reference).
Additional Settings Description
Fields
Keep Alive The frequency (in seconds) that the "Keep Alive" message will be sent to its peer. The
default value is 60 seconds. The range is 0-65535.
Hold Timers Interval in seconds that the peer is considered after not receiving the Keep Alive
message. The default value is 180 seconds. The range is 0-65535.
Uplink Community Uplink refers to link connected to the Provider Edge (PE).
Inbound routes (towards the edge) matching this community will be treated as Uplink
routes. (For which the Hub/Edge is not considered the owner).
Input can be in the original number format or in the new AA:NN format.
Disable AS-PATH By default, this should be left unchecked. In certain topologies, disabling AS-PATH
Carry Over Carry Over will influence the outbound AS-PATH to make the L3 routers prefer a path
towards an Edge or a Hub. Warning: When the AS-PATH Carry Over is checked, tune
your network to avoid routing loops.
Defalut Route Redistributes default route only when Edge learns via overlay or underlay.
Set Metric textbox Optionally, you can enable OSPF, which allows an injection of OSPF routes into BGP.
The default BGP metric for the redistributed OSPF routes is MED value of 20.
Overlay Prefixes Over Uplink refers to link/neighbor which is configured with the Neighbor flag Uplink
Uplink (Normally, the link is connected to the Provider Edge(PE) router). Propagates routes
learned from Overlay to the Uplink with the Neighbor flag.
Networks The Network the BGP will advertise in the format 10.10.10.10/21.
Note If you checked the Default Route checkbox located in the Additional Settings
area, please be aware of the following four scenarios:
n If the global Default Route option is enabled with the "Conditional” option selected,
and the per BGP neighbor option Default Route is not selected, BGP will Redistribute
the default route to its neighbor only when the Edge learns an explicit default route
via overlay or underlay.
n If the global Default Route option is enabled with the “Conditional” option selected,
and the per BGP neighbor option Default Route is selected, the Per Neighbor
configuration overrides the Global configuration hence “Advertise default route to
BGP peer Always.”
n If the global Default Route option is not enabled and the per BGP neighbor option
Default Route is selected, Advertise default route to BGP peer Always.
n If the global Default Route option is not enabled and per the BGP neighbor option
Default Route is not selected, Do not Advertise/Redistribute default route to BGP
peer.
Note All the above options are available at the Edge level and can be configured with Edge
override enabled for BGP settings.
OSPF/BGP Redistribution
Each of routing protocols OSPF and BGP may be enabled independently and the prior model of
allowing only one routing protocol to be enabled on the system has been removed with this
release. This release also allows the possibility of redistributing OSPF into BGP or BGP into OSPF
(or both simultaneously), along with other possible route sources like prefixes learnt over the
overlay, connected routes, static routes, etc.
In addition, with release 3.2, we are standardizing the redistribution behavior along more
traditional lines (similar to that in other routing vendors). For example, if there is more than one
route available for the same prefix, then only the best route for that prefix in the system RIB will
be redistributed to the destination protocol if the configuration in the destination protocol allows
redistribution for that route type.
Consider, as an example, redistribution of the prefix 192.168.1.0/24 into BGP. Let's say routes to
the prefix 192.168.1.0/24 are locally available, learned from OSPF and separately learned as an
Overlay prefix. Let's further assume that between the OFC flow ordering for the prefix, and route
metrics, and route preference the OSPF route ranks above (is better than) the learned overlay
route for that same prefix. Then, the OSPF route will be redistributed into BGP if OSPF
redistribution has been turned on in BGP. Note that since the overlay learned prefix is not the
best route for that prefix in the system RIB, it will not be redistributed into BGP even if the
redistribution of overlay prefixes has been turned on in BGP.
In cases like the above, in order to facilitate the redistribution of the best route for a prefix into a
given destination protocol, the user can enable redistribution for the specific route type that is
the best route in the system.
Alternately, if the user prefers a different route source for that prefix to be redistributed into the
destination protocol, the user can control the relative precedence of the route in the system RIB
using the Overlay Flow Control facility provided by the management interface, or by varying the
route metric.
Subnet The network that this route corresponds to along with a list of Edges that learned this route.
Route Type Connected: A network that is directly connected to the interface. Types include: OSPF-O, OSPF-OE2,
BGP, Static, and Connected.
Preferences VeloCloud (B2B)- VeloCloud Route Direct: Direct interface route if a Private link is present.
Edit Routes
You can also change the destination of your preferences. Click the Edit button from the Overlay
Flow Control table. If you change the destination preference, the change applies only to that
specific route/subnet.
Adjacencies
Adjacencies display routes between OSPF, BGP neighbors, and the Edge as shown in the
following figure. Click the Adjacencies link to view these neighboring relationships.
Re-prioritize Routes
You can re-priortize routes by clicking the Edit button from Overlay Flow Control area. These
are the final exit points to reach the destination subnet.
n SaaS
This section describes each of these scenarios. The VeloCloud Orchestrator has default
configurations for Networks, Network Services, and Profiles. These predefined configurations
allow you to create a VeloCloud Edge configuration and have an operational Edge in a matter of
minutes.
Configuration Description
Network Services Configuration for Open DNS and Google DNS Services.
Networks Two preconfigured Networks are provided, each with a Corporate and a Guest Network with one
VLAN defined:
n Internet Network: Configuration for a non-VPN network with overlapping addresses.
n VPN Network: Configuration for a VPN Network with non-overlapping addresses.
Profiles Two preconfigured Profiles are provided. Each uses a preconfigured Network, Network Services and
defines LAN and Wi-Fi interfaces settings. The predefined Profiles are:
n Quick Start Internet Network: This profile uses the Internet Network configuration.
n Quick Start VPN Network: This profile uses the VPN Network configuration.
n via VPN
n VPN
n Zero-touch Provisioning
1 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Configure ->
Edges.
2 On the VeloCloud Edges page, click the New Edge button at the upper right.
3 In the Provision New Edge dialog box, specify the Edge name, select an Edge model number,
select the Quick Start Internet Profile, and enter your name and email for the Contact Name
and Contact Email.
With the “out-of-the-box” configuration provided for Networks, Network Services, and Profiles,
plus the default configuration provided for an Edge, your newly created Edge configuration is
complete. You are now able to activate your Edge device and apply the VeloCloud Orchestrator
Edge configuration to the Edge device. Edge activation is the same for the three workflows.
Next, complete the steps described in Configure Edge Activation.
When PKI is enabled (access must be granted by the Operator), you can choose from three
certificate options (Certificate Required, Certificate Optional, or Certificate Disabled). If PKI is
enabled and you set the certificate to Certificate Required, you are provisioning the Edge and
the Pre-Shared Key is not available.
via VPN
An administrator can provision an Edge using the default VPN Network, Network Services, and
Profile configurations, and then initiate activation of the Edge configuration. In this scenario, a
new Profile needs to be configured and an Edge needs to be provisioned.
Create Profile
This section describes how to create a profile.
To create a profile:
1 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Configure ->
Profiles.
2 On the VeloCloud Profiles page, select the Quick Start VPN Profile, then click Actions ->
Duplicate Profile at the upper right.
3 Enable the Edge to Non-VeloCloud Site, then select New Non-VeloCloud Site.
4 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Configure ->
Profiles.
5 On the VeloCloud Profiles page, select the Quick Start VPN Profile, then click Actions ->
Duplicate Profile at the upper right.
6 Select a Type for the Non-VeloCloud Site. In the following example, a Cisco ISR is chosen.
Enter any additional parameters required for the Non-VeloCloud Site you chose, then click
Next.
A final dialog box for completing the configuration of the Non-VeloCloud Site appears.
1 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Configure ->
Profiles on the VeloCloud Edges page.
3 In the Provision New Edge dialog box, specify your Edge name, select an Edge model
number, select the Quick Start VPN Profile, and enter your name and email for the Contact
Name and Contact Email.
With the “out-of-the-box” configuration provided for Networks, Network Services, and Profiles
plus the default configuration provided for an Edge, your newly created Edge configuration is
complete. The only step remaining is the activation of the Edge. Edge activation is the same for
the three scenarios. Next, complete the steps described in Configure Edge Activation.
VPN
An administrator can provision an Edge using the default VPN Network, Network Services, and
Profile configurations, and then initiate activation of the Edge configuration. In this scenario, a
new Profile needs to be configured and an Edge needs to be provisioned.
Create a Profile
This section describes how to create a profile.
To create a profile:
1 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Configure ->
Profiles to create a VeloCloud Site Profile.
2 To create a duplicate profile, on the VeloCloud Profiles page, select the Quick Start VPN
Profile, then click Actions -> Duplicate Profile at the upper right.
The VeloCloud Site VPN can be configured for two types of VeloCloud Site VPNs:
Note The Cloud VPN feature on the Device tab must be On to reveal the configuration options
for the two VPN types.
The following dialog box appears, prompting you to select VeloCloud Hubs that can be used
for VPN tunnels between the Edges using this profile and the VeloCloud Edges chosen to be
VeloCloud Hubs.
1 As shown in the figure below (far right area), configure Branch to Branch VPN by selecting
the Enable checkbox.
2 From the options, select Use Cloud Gateways and Dynamic Branch to Branch VPN.
3 Click OK.
1 From the Navigation Panel on the left side of the VeloCloud Orchestrator, click Edges.
2 On the VeloCloud Edges page, click the New Edge button at the upper right.
3 In the Provision New Edge dialog box, complete the following steps:
With the “out-of-the-box” configuration provided for Networks, Network Services, and Profiles,
plus the default configuration provided for an Edge, your newly created Edge configuration is
complete. The only step remaining is the activation of the Edge. Edge activation is the same for
the three scenarios. Next, complete the steps described in Configure Edge Activation.
Zero-touch Provisioning
The VeloCloud SD-WAN solution supports two methods of VCE zero-touch deployment and
activation: Pull Activation and Push Activation
No IT Visit Required
No Pre-staging Required
Pull Activation
For the Pull Activation method, the VCE is shipped to the customer site with a factory-default
configuration. Prior to activation, the VCE contains no configuration or credentials to connect to
the enterprise network.
Note The Pull Activation section has been updated for the 3.3.0 release.
The administrator initiates the activation process by sending an activation procedure email to
the person that will install the Edge, typically a Site Contact.
The individual following the instructions in the activation procedure email will activate the
Edge device.
Complete the following instructions for the Pull Edge activation process.
2 Select the Edge you want to activate. The Edge Overview Tab window appears.
3 As an optional step, in the Properties area, enter the serial number of the Edge that will be
activated in the Serial Number text field. Serial numbers are case sensitive, so make sure that
“VC” is capitalized.
Note This step is optional. However, if specified, the serial number must match the activated
Edge.
4 Click the Send Activation Email button to send the activation email to the Site Contact. For a
detailed description of the fields and checkboxes featured in the Properties area, see the
Properties Area Field and Checkbox Descriptions in the Chapter 14 Edge Overview Tab.
5 The Send Activation Email pop-up window appears. It describes the steps for the Site
Contact to complete to activate the Edge device.
6 Click the Send button to send the activation procedure email to the Site Contact.
1 Connect your Edge device to power and insert any Internet cables or USB modems.
2 Find and connect to the Wi-Fi network that looks like velocloud- followed by three more
letters/numbers (for example,velocloud-01c) with the password vcsecret.
Note Refer the Wi-Fi SSID from the box. The default Wi-Fi is vc-wifi.
The Edge activation email might provide specific instructions for connecting WAN cables and
USB modems, connecting devices to the LAN connections, and connecting additional networking
devices to the Edge. It might also provide instructions for using one or more Wi-Fi connections.
The Edge will download the configuration and software from the VCO. The Edge will be activated
successfully and will be ready for service. Once an Edge has been activated, it will be “useable”
for routing network traffic. In addition, more advanced functions such as monitoring, testing, and
troubleshooting will be enabled.
Note The Push Activation section below has been updated for the 3.3.0 release.
n When a Service Provider outsources the physical installation of devices at a site—in most
instances, just to connect cables and power. The person who installs the device may neither
be an employee of the end customer nor of the Service Provider.
n When the person at the remote site is unable to connect a laptop/tablet/ phone to the VCE,
and therefore cannot use an email or cannot click an activation code/URL.
Note If you are logged in using a user ID that has Customer Support privileges, you can view
VeloCloud Orchestrator objects but not create new objects or configure/update existing ones.
Alerts can be sent when a VeloCloud Edge goes offline or comes back online, a WAN link goes
down, a VPN tunnel goes down, or when an Edge HA failover occurs. A delay for sending the
alert after it is detected can be entered for each of the alert types.
The following screen capture shows the Configure Alerts page where the alerts of interest are
selected, the Notification Delay for each alert type is entered, and the email addresses where
the alerts will be sent are configured. You can also select if SMS alerts are sent to a mobile phone
number.
The VCO can send SNMP Traps corresponding to existing alerts (e.g. 'Edge Down' and 'Edge Up')
and ‘SMS’ and ‘Email’ alerts.
Click Save Changes after you have chosen the Alert Configuration you want.
Single Sign On (SSO) is a session and user authentication service that allows VCO users to log in
to the VCO with one set of login credentials to access multiple applications. Integrating the SSO
service with VCO improves the security of user authentication for VCO users and enables VCO to
authenticate users from other OpenID Connect (OIDC)-based Identity Providers (IDPs). The
following IDPs are currently supported:
n Okta
n OneLogin
n PingIdentity
n AzureAD
n VMwareCSP
Prerequisites
n Before setting up the SSO authentication, ensure you have set up roles, users, and OpenID
connect (OIDC) application for VCO in your preferred identity provider’s website. For more
information, see Configure an IDP for Single Sign On.
Procedure
1 Log in to a Velocloud Orchestrator (VCO) application as Enterprise super user, with your login
credentials.
3 Click the General Information tab and in the Domain text box, enter the domain name for
your enterprise, if it is not already set.
Note To enable SSO authentication for the VCO, you must set up the domain name for your
enterprise.
4 Click the Authentication tab and from the Authentication Mode drop-down menu, select
SSO.
5 From the Identity Provider template drop-down menu, select your preferred Identity
Provider (IDP) that you have configured for Single Sign On.
Note If you select VMwareCSP as your preferred IDP, ensure to provide your Organization
ID in the following format: /csp/gateway/am/api/orgs/<full organization ID>.
When you sign in to VMware CSP console, you can view the organization ID you are logged
into by clicking on your username. A shortened version of the ID is displayed under the
organization name. Click the ID to display the full organization ID.
You can also manually configure your own IDPs by selecting Others from the Identity
Provider template drop-down menu.
6 In the OIDC well-known config URL text box, enter the OpenID Connect (OIDC) configuration
URL for your IDP. For example, the URL format for Okta will be: https://{oauth-provider-
url}/.well-known/openid-configuration.
7 The VCO application auto-populates endpoint details such as Issuer, Authorization Endpoint,
Token Endpoint, and User Information Endpoint for your IDP.
8 In the Client Id text box, enter the client identifier provided by your IDP.
9 In the Client Secret text box, enter the client secret code provided by your IDP, that is used
by the client to exchange an authorization code for a token.
n Use Default Role – Allows user to configure a static role as default by using the Default
Role text box that appears on selecting this option. The supported roles are: Enterprise
Superuser, Enterprise Standard Admin, Enterprise Support, and Enterprise Read Only.
n Use Identity Provider Roles – Uses the roles set up in the IDP.
11 On selecting the Use Identity Provider Roles option, in the Role Attribute text box, enter the
name of the attribute set in the IDP to return roles.
12 In the Role Map area, map the IDP-provided roles to each of the VCO roles, separated by
using commas.
Roles in VMware CSP will follow this format: external/<service definition uuid>/<service role
name mentioned during service template creation>.
13 Update the allowed redirect URLs in OIDC provider website with VCO URL (https://<vco>/
login/ssologin/openidCallback).
15 Click Test Configuration to validate the entered OpenID Connect (OIDC) configuration.
The user is navigated to the IDP website and allowed to enter the credentials. On IDP
verification and successful redirect to VCO test call back, a successful validation message will
be displayed.
Results
What to do next
For step-by-step instructions to configure an OpenID Connect (OIDC) application for VCO in
various IDPs, see:
Prerequisites
Procedure
Note If you are in the Developer Console view, then you must switch to the Classic UI view
by selecting Classic UI from the Developer Console drop-down list.
e Under the General Settings area, in the Application name text box, enter the name for
your application (for example, VCO).
f Under the CONFIGURE OPENID CONNECT area, in the Login redirect URIs text box,
enter the redirect URL that your VCO application uses as the callback endpoint.
In the VCO application, at the bottom of the Configure Authentication screen, you can
find the redirect URL link. Ideally, the VCO redirect URL will be in this format: https://<VCO
URL>/login/ssologin/openidCallback.
g Click Save.
h On the General tab, click Edit and select Refresh Token for Allowed grant types, and click
Save.
Note down the Client Credentials (Client ID and Client Secret) to be used during the SSO
configuration in VCO.
i Click the Sign On tab and under the OpenID Connect ID Token area, click Edit.
j In the Groups claim filter area, set the filter for the user groups and click Save.
The application is setup in IDP. You can assign groups and users to your VCO application.
b On the Assignments tab, from the Assign drop-down menu, select Assign to Groups or
Assign to People.
c Click Assign next to available user groups or users you want to assign the VCO
application and click Done.
Results
What to do next
Procedure
3 Enter the group name and description for the group and click Save.
Create a New User in Okta
To add a new user, perform the steps on this procedure.
Procedure
3 Enter all the mandatory details such as first name, last name, and email ID of the user.
4 If you want to set the password, select Set by user from the Password drop-down menu and
enable Send user activation email now.
5 Click Save.
An activation link email will be sent your email ID. Click the link in the email to activate your
Okta user account.
Prerequisites
Procedure
b In the Find Applications text box, search for “OpenId Connect” or “oidc” and then select
the OpenId Connect (OIDC) app.
c In the Display Name text box, enter the name for your application (for example, VCO)
and click Save.
d On the Configuration tab, enter the redirect URI that VCO uses as the callback endpoint
and click Save.
In the VCO application, at the bottom of the Authentication screen, you can find the
redirect URL link. Ideally, the VCO redirect URL will be in this format: https://<VCO URL>/
login/ssologin/openidCallback.
e On the Parameters tab, under OpenId Connect (OIDC), double click Groups.
f Configure User Roles with value “--No transform--(Single value output)” to be sent in
groups attribute and click Save.
g On the SSO tab, from the Application Type drop-down menu, select Web.
h From the Authentication Method drop-down menu, select POST as the Token Endpoint
and click Save.
Also, note down the Client Credentials (Client ID and Client Secret) to be used during the
SSO configuration in VCO.
i On the Access tab, choose the roles that will be allowed to login and click Save.
b On the Application tab, from the Roles drop-down menu, on the left, select a role to be
mapped to the user.
Results
What to do next
Procedure
When you first set up a role, the Applications tab displays all the apps in your company
catalog.
4 Click an application to select it and click Save to add the selected apps to the role.
Create a New User in OneLogin
To create a new user, perform the steps on this procedure.
Procedure
2 Enter all the mandatory details such as first name, last name, and email ID of the user and
click Save User.
Prerequisites
Note Currently, VeloCloud Orchestrator (VCO) supports PingOne as the Identity Partner (IDP);
however, any PingIdentity product supporting OIDC can be easily configured.
Procedure
b On the My Applications tab, select OIDC and then click Add Application.
c Provide basic details such as name, short description, and category for the application
and click Next.
Also, note down the Discovery URL and Client Credentials (Client ID and Client Secret) to
be used during the SSO configuration in VCO.
e Under SSO FLOW AND AUTHENTICATION SETTINGS, provide valid values for Start SSO
URL and Redirect URL and click Next.
In the VCO application, at the bottom of the Configure Authentication screen, you can
find the redirect URL link. Ideally, the VCO redirect URL will be in this format: https://<VCO
URL>/login/ssologin/openidCallback. The Start SSO URL will be in this format: https://
<vco>/<domain name>/login/doEnterpriseSsoLogin.
f Under DEFAULT USER PROFILE ATTRIBUTE CONTRACT, click Add Attribute to add
additional user profile attributes.
g In the Attribute Name text box, enter group_membership and then select the Required
checkbox, and select Next.
h Under CONNECT SCOPES, select the scopes that can be requested for your VCO
application during authentication and click Next.
i Under Attribute Mapping, map your identity repository attributes to the claims available
to your VCO application.
Note The minimum required mappings for the integration to work are email,
given_name, family_name, phone_number, sub, and group_membership (mapped to
memberOf).
j Under Group Access, select all user groups that should have access to your VCO
application and click Done.
The application will be added to your account and will be available in the My Application
screen.
Results
What to do next
Procedure
3 In the Name text box, enter a name for the group and click Save.
Procedure
2 On the Users tab, click the Add Users drop-down menu and select Create New User.
3 Enter all the mandatory details such as username, password, and email ID of the user.
Prerequisites
Procedure
c In the Name field, enter the name for your VeloCloud Orchestrator (VCO) application.
d In the Redirect URL field, enter the redirect URL that your VCO application uses as the
callback endpoint.
In the VCO application, at the bottom of the Configure Authentication screen, you can
find the redirect URL link. Ideally, the VCO redirect URL will be in this format: https://<VCO
URL>/login/ssologin/openidCallback.
e Click Register.
Your VCO application will be registered and displayed in the All applications and Owned
applications tabs. Make sure to note down the Client ID/Application ID to be used during
the SSO configuration in VCO.
f Click Endpoints and copy the well-known OIDC configuration URL to be used during the
SSO configuration in VCO.
g To create a client secret for your VCO application, on the Owned applications tab, click
on your VCO application.
i Provide details such as description and expiry value for the secret and click Add.
The client secret will be created for the application. Note down the new client secret
value to be used during the SSO configuration in VCO.
j To configure permissions for your VCO application, click on your VCO application and go
to API permissions > Add a permission.
k Click Microsoft Graph and select Application permissions as the type of permission for
your application.
n To add and save roles in the manifest, click on your VCO application and from the
application Overview screen, click Manifest.
A web-based manifest editor opens, allowing you to edit the manifest within the portal.
Optionally, you can select Download to edit the manifest locally, and then use Upload to
reapply it to your application.
o In the manifest, search for the appRoles array and add one or more role objects as shown
in the following example and click Save.
{
"allowedMemberTypes": [
"User"
],
"description": "Standard Admininstrator who will have sufficient privilege to
manage resource",
"displayName": "Standard Admin",
"id": "18fcaa1a-853f-426d-9a25-ddd7ca7145c1",
"isEnabled": true,
"lang": null,
"origin": "Application",
"value": "standard"
},
{
"allowedMemberTypes": [
"User"
],
"description": "Super Admin who will have the full privilege on VCO",
"displayName": "Super Admin",
"id": "cd1d0438-56c8-4c22-adc5-2dcfbf6dee75",
"isEnabled": true,
"lang": null,
"origin": "Application",
"value": "superuser"
}
c Click Users and groups and assign users and groups to the application.
d Click Submit.
Results
What to do next
Procedure
3 In the Email address text box, enter the email address of the guest user and click Invite.
The guest user immediately receives a customizable invitation that lets them to sign into their
Access Panel.
Prerequisites
Sign in to VMware CSP console (staging or production environment) with your VMware account
ID. If you are new to VMware Cloud and do not have a VMware account, you can create one as
you sign up. For more information, see How do I Sign up for VMware CSP section in Using
Vmware Cloud documentation.
Procedure
1 Contact the VMware SD-WAN Support Provider for receiving a Service invitation URL link to
register your VCO application to VMware CSP. For information on how to contact the
Support Provider, see https://kb.vmware.com/s/article/53907 and https://www.vmware.com/
support/contacts/us_support.html.
n a Service definition uuid and Service role name to be used for Role mapping in
Orchestrator
2 Redeem the Service invitation URL to your existing Customer Organization or create a new
Customer Organization by following the steps in the UI screen.
You need to be a Organization Owner to redeem the Service invitation URL to your existing
Customer Organization.
3 After redeeming the Service invitation, when you sign in to VMware CSP console, you can
view your application tile under My Services area in the Vmware Cloud Services page.
The Organization you are logged into is displayed under your username on the menu bar.
Make a note of the Organization ID by clicking on your username, to be used during
Orchestrator configuration. A shortened version of the ID is displayed under the Organization
name. Click the ID to display the full Organization ID.
4 Log in to VMware CSP console and create an OAuth application. For steps, see Use OAuth
2.0 for Web Apps. Make sure to set Redirect URI to the URL displayed in Configure
Authentication screen in VCO.
Once OAuth application is created in VMware CSP console, make a note of IDP integration
details such as Client ID and Client Secret. These details will be needed for SSO configuration
in Orchestrator.
5 Log in to your VCO application as Super Admin user and configure SSO using the received
IDP integration details as follows.
b Click the General Information tab and in the Domain text box, enter the domain name for
your enterprise, if it is not already set.
Note To enable SSO authentication for the VCO, you must set up the domain name for
your enterprise.
c Click the Authentication tab and from the Authentication Mode drop-down menu, select
SSO.
e In the Organization Id text box, enter the Organization ID (that you have noted down in
Step 3) in the following format: /csp/gateway/am/api/orgs/<full organization ID>
f In the OIDC well-known config URL text box, enter the OpenID Connect (OIDC)
configuration URL (https://console.cloud.vmware.com/csp/gateway/am/api/.well-known/
openid-configuration) for your IDP.
g In the Client Id text box, enter the client ID that you have noted down from the OAuth
application creation step.
h In the Client Secret text box, enter the client secret code that you have noted down from
the OAuth application creation step.
i To determine user’s role in VCO, select either Use Default Role or Use Identity Provider
Roles.
j On selecting the Use Identity Provider Roles option, in the Role Attribute text box, enter
the name of the attribute set in the VMware CSP to return roles.
k In the Role Map area, map the VMwareCSP-provided roles to each of the VCO roles,
separated by using commas.
Roles in VMware CSP will follow this format: external/<service definition uuid>/<service
role name mentioned during service template creation>. Use the same Service definition
uuid and Service role name that you have received from your Support Provider.
7 Click Test Configuration to validate the entered OpenID Connect (OIDC) configuration.
The user is navigated to the VMware CSP website and allowed to enter the credentials. On
IDP verification and successful redirect to VCO test call back, a successful validation message
will be displayed.
Results
You have completed integrating VCO application in VMware CSP for SSO and can access the
VCO application logging in to the VMware CSP console.
What to do next
n Within the organization, manage users by adding new users and assigning appropriate role
for the users. For more information, see Manage Users.
Note The "Self-service Password Reset" section is new for the 3.3.0 release.
n For Enterprise users, Superusers and Standard Admins can enable and disable the Self-
service Password Reset feature. Customer Support users cannot enable or disable this
feature; they have read-only access.
n Partner Superusers, Standard Admins, Business Specialists, and Customer Support can
enable and disable the Self-service Password Reset feature for Partner Customers.
Note If the customer’s account has Two Factor Authentication configured for administrators, or
Two Factor is required for password reset globally in System Properties, the customer will first
be redirected to a Two Factor Authentication page, and will be prompted to enter a one-time
code. After entering a valid code, the customer will be redirected to New Password page. In the
New Password page, the customer will type a new password in the Password textbox, and will
type the new password again in the Confirm textbox.
1 From the VCO Login page, click the reset password link (Click here to reset your password).
NOTE: For Partners responsible for password reset, the contact email address
(support@velocloud.net) is configurable. The value can be overridden with the branding
package.
2 In the next screen, enter your username. (Make sure the username has an existing mailbox
account).
4 Click Submit.
The following screen appears, prompting you to check your email for further instructions.
6 Type your new password in the Password textbox. Type your new password again in the
Confirm textbox.
7 When you click the link provided in the email to reset your password, a new password page
displays.
You can enable two-factor authentication after providing valid mobile numbers for all the users.
Prerequisites
Ensure that you provide a valid mobile number for all admin users before enabling two-factor
authentication. You can enter the mobile number by selecting the user in the Administration >
Administrators screen.
Procedure
3 To mandate the user login with two-factor authentication, select the Require Two Factor
Authentication checkbox.
Results
After enabling the two-factor authentication, when you try to login with your user credentials,
you also need to enter the six-digit pin that you receive as SMS in your mobile.
1 Go to the VCO navigation panel and choose Administration > System Settings.
2 In the Privacy Settings area, select the Enforce PCI Compliance checkbox. This disables
PCAP and removes the Core Dump option in Test & Troubleshoot > Diagnostic Bundles
screen.
Note The "Monitor Edge Licensing" section is new for the 3.3.0 release.
From the list of license types, users must assign license types to their Edges. See the Edge
Overview Tab section, Edge License, for information on how to assign license types.
Note The "Generate an Edge Licensing Report" section is new for the 3.3.0 release.
n Prerequisites
n Failure Scenarios
n Configure HA
n HA Event Details
1 HA Option 1
2 HA Option 2
This document describes the steps necessary to enable High Availability (HA) and bring up a
second VCE as a Standby device to an activated Edge.
Prerequisites
This section describes HA requirements that must be met before configuring a VCE as a Standby.
HA Options
There are two options when configuring in HA mode (Option 1 and Option 2). Both options are
described below.
HA Considerations
Considerations for both HA options:
n Edges automatically select either Option 1 or Option 2. Edges will select Option 1 if both
Edges are connected to the same WAN links. Edges will select Option 2 if the Edges detect
that they are connected to different WAN links.
n Both options are supported on all VCE platforms: 510, 520, 520v, 540, 840, 2000, and Virtual
Edge.
n HA is supported only between the identical VCE platform models (see https://
www.velocloud.com/get-started/ for the various Edge platform models).
HA Option 1: Standard HA
This section describes HA Option 1: Standard HA.
The Edges, one Active and one Standby, are connected by L1 ports to establish a failover link.
The Standby VeloCloud Edge blocks all ports except the L1 port for the failover link.
n In addition, VeloCloud Edge LAN and WAN ports must be connected to different L2 switches.
If it is necessary to connect the ports to the same switch, then the LAN and WAN ports must
be isolated.
n The two VCEs must have mirrored physical WAN and LAN connections.
W1 and W2 are WAN connections used to connect to the L2 switch to provide WAN connectivity
to both ISPs. The L1 link connects the two VCEs and is used for ‘keep-alive’ and communication
between the VCEs for HA support. The VCE’s LAN connections are used to connect to the
access layer L2 switches.
n Use the L2 switch to make the same ISP link available to both Edges.
n The Standby VCE does not interfere with any traffic by blocking all its ports except the
failover link (L1 port).
n Session information is synchronized between the Active and Standby VeloCloud Edges
through the failover link.
n If the Active Edge detects a loss of a LAN link, it will also failover to the Standby if it has an
Active LAN link.
The VeloCloud Edge WAN connections (W1 and W2) are used to connect to L2 switches to
provide a WAN connection to ISP1 and ISP2 respectively. The L1 connections on the VeloCloud
Edges are connected to provide a failover link for HA support. The VeloCloud Edge LAN
connections are used to connect L2 Switches, which have several end-user devices connected.
n The VeloCloud Edge's static route points to the L3 switches’ HSRP VIP as the next hop to
reach the end stations behind L2 switches.
n The same ISP link must be connected to the same port on both VeloCloud Edges. The L2
switch must make the same ISP link available to both Edges.
n The Standby VeloCloud Edge does not interfere with any traffic by blocking all of its ports
except the failover link (L1 port).
n The session information is synchronized between the Active and Standby VeloCloud Edges
through the failover link.
n The HA pair also does a failover from Active to Standby on detecting the L1 loss of LAN /
WAN links.
n If Active and Standby have the same number of LAN links which are up, but Standby has
more WAN links up, then a switchover to Standby will occur.
n If the Standby Edge has more LAN links up and has at least one WAN link up, then a
failover to the Standby will occur. In this situation, it is assumed that the Standby Edge
has more users on the LAN side than the Active Edge, and that the Standby will allow
more LAN side users to connect to the WAN, given that there is some WAN connectivity
available.
HA Option 2: Enhanced HA
This section describes options for High Availability (HA) Option 2: Enhanced HA
The HA Option 2 eliminates the need for L2 Switches on WAN side of the Edges. This option is
chosen when the Active Edge detects different WAN link(s) connected to the Standby Edge
when compared to the link(s) connected to itself.
The Edges, one Active and one Standby, are connected by L1 ports to establish a failover link.
The Standby VeloCloud Edge blocks all ports except the L1 port for the failover link. As shown in
the figure, the Active Edge establishes overlay tunnels on both WAN links (connected to itself
and the Standby Edge).
Note The two VCEs should not have mirrored physical WAN connections. As shown in the
figure, if VCE1 has GE2 as the WAN link, VCE2 cannot have GE2 as its WAN link.
In order to leverage the WAN link connected to the Standby Edge, the Active Edge establishes
the overlay tunnel through the HA link. Traffic from the LAN is forwarded to the Active Edge. The
business policy for the branch defines the traffic distribution across the overlay tunnels.
Split-Brain Condition
When the HA link is disconnected or when the Active and Standby Edges fail to communicate
with each other, both Edges assume the Active role. As a result, both Edges start responding to
ARP requests on their LAN interfaces. This causes LAN traffic to be forwarded to both Edges,
which could result in spanning tree loops on the LAN.
Typically, switches run the Spanning Tree Protocol to prevent loops in the network. In such a
condition, the switch would block traffic to one or both Edges. This would cause a total loss of
traffic through the Edge pair.
Note Tunnel to Primary Gateway is a requirement for split-brain detection. Therefore, in WAN 2
(as shown in the the following figure), there should be a tunnel to VCG.
The Gateway has a pre-existing connection to the Active VCE (VCE1 in the “Normal State”
diagram above). In a split-brain condition, the Standby VCE (VCE2 in the “Split-brain Condition”
diagram above), changes state to Active and establishes a tunnel with the Gateway. The
Gateway allows the VCE2 to establish the new tunnel. However, the tunnels are not torn down.
The Gateway informs the Edge VCE1 to move to the Standby state. In the 3.3.0 software release,
in the Split-brain state, the Standby will also maintain tunnels to the Gateways. Only the LAN
interfaces remain blocked (as long as the HA cable is down). As illustrated in the diagram below,
the Gateway signals VCE1 to go into Standby mode on the LAN. This will logically prevent the
Split-brain scenario from occurring.
Note The normal failover from Active to Standby in a Split-brain scenario is not the same as the
normal failover. It could take a few extra milliseconds/seconds to converge.
Failure Scenarios
This section describes the following scenarios that can trigger a failover from an Active to a
Standby Edge.
This will enable the Active Edge to learn routes from the WAN link(s) connected to the Standby
Edge. The routing daemon on standby will not involve in any of the functionality. The standby
Edge itself will just do a pass-through.
Note Routes are not synced between the active and the standby Edges. Therefore, in the above
scenario, if there is a failover and a standby Edge becomes active, the BGP daemon on the newly
active edge will establish a new neighborship with the same BGP peer.
n Check for the Edge that has a higher number (L2 and L3) LAN interfaces. The Edge with the
higher number of LAN interfaces is chosen as the Active one. Note that the interface used for
the HA link is not counted as a LAN interface.
n If both Edges have the same number of LAN interfaces, the Edge with the higher number of
WAN interfaces is chosen as the Active one.
Note There is no preemption if the two Edges have the same number of LAN and WAN
interfaces.
n Multiple WAN links each tagged with a separate VLAN ID on a single interface (e.g. Sub-
Interfaces) are supported.
n USB modems are not recommended on HA. The interface will not be used when present
in the Standby Edge.
Note The "VLAN Tagged Traffic Over HA Link" section is new for the 3.3.0 release.
n Customer will have separate VLANs for Enterprise traffic versus DIA traffic.
n The WAN link on the Standby has sub-interfaces to carry Internet traffic.
n Multi segments
Configure HA
For HA enhancements, there are no changes to the UI of the VCO.
2 Select your VeloCloud Edge (VCE), and then click the Device tab.
3 From the High Availability area, click the radio button VeloCloud Active Standby Pair.
By default, the GE1 or LAN1 interface will be used as the HA interface to connect the pair
depending on the VCE model.
Note This is available on as an Edge Override and is not configurable at the Profile level. Do not
connect the Standby VCE.
2 After it boots up, connect the LAN1/GE1 interface (as indicated on the Device tab) to the
same interface on the Active VCE.
3 Wait for the Active VCE to detect and activate the standby VCE automatically. The VCO
Events displays HA Standby Activated when the VCO successfully activates the standby
VCE.
The standby Edge will then begin to synchronize with the active VCE and reboot automatically
during the process.
Note It may take up to 10 minutes for the Standby VCE to sync with the Active Edge and
upgrade its software.
The VCO Events will display Standby device software update completed. The HA State (under
Monitor > Edges on the VCO) appears green when ready.
HA Event Details
This section describes HA events.
HA Event Description
HA_GOING_ACTIVE A standby VCE is taking over as Active because it has not heard a heartbeat from the peer.
HA_STANDBY_ACTIVATED When a new Standby is detected by the Active, the Active tries to activate the Edge by sending
this event to the VCO. On a successful response from the VCO, the Active will sync the
configurations and sync data.
HA_FAILED Typically happens after the HA pair has formed and the Active VCE no longer hears from the
Standby VCE. For example, if the Standby VCE reboots, you will receive this message.
HA_READY Means the Active VCE now hears from the Standby VCE. Once the Standby VCE comes back up
and reestablishes the heartbeat, then you will receive this message.
HA_TERMINATED When the HA configuration is disabled, and it is successfully applied on the Edges, this Event is
generated.
HA_ACTIVATION_FAILURE If the VCO is unable to verify the HA activation, it will generate this Event. Examples include:
n the VCO is unable to generate a certificate
n the HA has been deactivated (rare)
You can access these features under the Test & Troubleshoot section of the navigation panel
listed as follows:
n Remote Diagnostics
n Remote Actions
n Diagnostic Bundles
When you click Test & Troubleshoot, the Remote Diagnostics screen appears. It displays all the
Edges you have defined in the Edge column at the bottom of the screen.
You can use the Filter to find Edges based on connection Status, Name, IP address, Serial
Number, Software Version, and Software Build. However, before you can perform any of the
Test & Troubleshoot options, you must select an Edge from the Edge column. See the sections
below for more information regarding each of the Test & Troubleshooting options from the
navigation panel (Remote Diagnostics, Remote Actions, and Diagnostic Bundles).
n Remote Diagnostics
n Remote Actions
n Diagnostic Bundles
Remote Diagnostics
You can run tests on a single Edge to obtain diagnostic information by clicking Remote
Diagnostics under Test & Troubleshoot.
2 Search for an Edge if necessary using the Filter, and click Apply.
The Remote Diagnostics screen appears showing all the possible tests you can run on an Edge.
1 Choose a test to run. A description is located under each diagnostic test name. (See image
below).
2 Click Run.
Note When you run the Bandwidth Test in a single-link environment, all other traffic will be
interrupted. However, this excess traffic will only last a few moments until the test is finished.
ARP Table Dump Run this test to view the contents of the ARP table. The
output is limited to display 1000 ARP entries.
Clear ARP Cache Run this test to clear the ARP cache entries for the
specified interface.
DNS Test Run this test to perform a DNS lookup of the specified
domain name.
DNS/DHCP Service Restart Run this test to restart the DNS/DHCP service. This can
serve as a troubleshooting step if DHCP or DNS requests
are failing for clients.
Flush Flows Run this test to flush the flow table, causing user traffic to
be re-classified. Use source and destination IP address
filters to flush specific flows.
Interface Status Run this test to view the MAC address and connection
status of physical interfaces.
List Active Flows Run this test to list active flows in the system. Use source
and destination IP address filters to view the exact flows
you want to see. This output is limited to a maximum of
1000 flows.
List Clients Run this test to view the complete list of clients.
List Paths Run this test to view the list of active paths between local
WAN links and each peer.
MIB for VeloCloud Edge Run this test to dump Edge MIBs.
NAT Table Dump Run this test to view the contents of the NAT Table. Use
the destination IP address filter to view the exact entries
you want to see. This output is limited to a maximum of
1000 entries.
NTP Dump Run this test to view the current date and time on Edge
and NTP information.
Route Table Dump Run this test to view the contents of the Route Table.
System Health Run this test to view system information such as system
load, recent WAN stability statistics, monitoring services.
WAN stability statistics include the number of times
individual VPN tunnels and WAN links lost connectivity for
at least 700 milliseconds.
Traceroute Run a traceroute via the Gateway or directly out any of the
WAN interfaces to the destination specified.
Troubleshoot BGP - List BGP Redistributed Routes Run this test to view routes redistributed to BGP neighbors.
Troubleshoot BGP - List BGP Routes Run this test to view the specific BGP routes from
neighbors, leave prefix empty to view all.
Troubleshoot BGP - List Routes per Prefix Run this test to view all the Overlay and Underlay routes
for a prefix and the related details.
Troubleshoot BGP - Show BGP Neighbor Advertised Run this test to view the BGP routes advertised to a
Routes neighbor.
Troubleshoot BGP - Show BGP Neighbor Learned Routes Run this test to view all the accepted BGP routes learned
from a neighbor after filters.
Troubleshoot BGP - Show BGP Neighbor Received Routes Run this test to view all the BGP routes learned from a
neighbor before filters.
Troubleshoot BGP - Show BGP Routes per Prefix Run this test to view all the BGP routes and their attributes
for the specified prefix.
Troubleshoot BGP - Show BGP Summary Run this test to view the existing BGP neighbor and
received routes.
Troubleshoot BGP - Show BGP Table Run this test to view the BGP table.
Troubleshoot OSPF - List OSPF Redistributed Routes Run this test to view all the routes redistributed to OSPF
neighbor.
Troubleshoot OSPF - List OSPF Routes Run this test to view the OSPF routes from neighbors for
the specified Prefix. Displays all the OSPF routes from the
neighbors if the Prefix is not specified.
Troubleshoot OSPF - Show OSPF Database Run this test to view the OSPF link state database
summary.
Troubleshoot OSPF - Show OSPF Database for E1 Self- Run this test to view the E1 LSA's self-originated routes
Originate Routes that are advertised to OSPF router by the Edge.
Troubleshoot OSPF - Show OSPF Neighbors Run this test to view all the OSPF neighbors and associated
information.
Troubleshoot OSPF - Show OSPF Route Table Run this test to view the existing OSPF route table.
Troubleshoot OSPF - Show OSPF Setting Run this test to view the OSPF setting and neighbor status.
VeloCloud Gateway Run this test by choosing whether cloud traffic should or
should not use the Gateway Service.
WAN Link Bandwidth Test Run the bandwidth test on a specified WAN link. This test
has the benefit of being non-disruptive in multi-link
environments. Only the link under test is blocked for user
traffic. This means that you can re-run the test on a specific
link and the other link(s) will continue to serve user traffic.
Remote Actions
When you click Remote Actions (located under Test & Troubleshoot), the Remote Edge Actions
screen appears, listing the Edges that are defined in the Edge column.
2 Search for an Edge if necessary using the Filter, and click Apply.
The Edge Remote Actions dialog box appears listing all possible actions you can run on the
Edge. Definitions for each action in the Edge Remote Actions dialog box are provided later in
this section.
4 Click an Edge remote action. The pop-up message Action Sent Successfully appears in the
top right corner of the screen.
5 Click Close.
Action Description
Diagnostic Memory Dump Forces the save of a memory dump on the Edge.
Hard Reset Returns the Edge hardware to its factory default state.
Diagnostic Bundles
From the Diagnostic Bundles window (accessed via Test & Troubleshooting > Diagnostic
Bundles in the VCO), Operators can request PCAP Bundles and Diagnostic Bundles. Standard
Admins and Customer Support can only request PCAP Bundles.
Access Packet Capture from Test & Troubleshoot > Packet Capture.
The Packet Capture screen appears. If applicable, the status of previous requests are shown.
2 Click the Request PCAP button at the top right corner of the screen.
3 In the Request PCAP Bundle dialog box, choose your Target, Interface, and Duration. If
necessary, type in a reason for the generation.
4 Click Submit. A pop-up message (Successful Request) appears in the top right corner of the
screen.
The Packet Capture screen updates to show the status of the request. Refresh your screen or
click Packet Capture from the navigation panel to display status results. When complete, you can
get detailed information (Generation Time, Bundle Size, etc.) by clicking the gray arrow located
next to the last column on the far right.
Note The Packet Capture data for a particular Edge will get deleted from the system on the
date displayed in the Cleanup Date column. Click the Cleanup Date link to indicate a date to
remove the data or select the Keep Forever checkbox and the data will not get deleted; it will be
kept until you indicate otherwise.
Click the Actions button to download or delete the bundle. See the sections below for more
information.
Download Bundle
When the request is complete, you can download the bundle in one of the following ways:
n Click the Download symbol next to a completed PCAP request under the Request Status
column.
n Click the Complete link in the Request Status column for your selected Edge.
n Select the checkbox of one or more completed PCAP requests, and click the down arrow of
the Action button (top, right corner of the screen) and choose Download.
You can forward the downloaded bundle to a VeloCloud Networks Support representative.
Delete Bundle
If you want to delete a Packet Capture, select one or more Packet Captures from the Request
Status column and choose Delete from the Actions button.
Note If a Packet Capture request is pending, you can delete the request before the request is
completed. Select the checkbox of the pending request you want to delete, and click the Action
button, and choose Delete.
1 Click the Request Diagnostic Bundle button located on the top right corner of the Diagnostic
Bundles screen.
a In the Target drop-down menu, select the specific Edge from which you will receive the
data.
b If you want to indicate the reason for request, include that in the Reason for Generation
textbox.
c For an advanced request, click the Advanced button and choose a limit from the Core
Limit drop-down menu. The Core Limit is used to reduce the size of the uploaded bundle
when the Internet connectivity is experiencing errors.
The Diagnostic Request bundle for the selected Edge is in the Pending state, as shown in the
Request Status column in the Diagnostic Bundles window. When finished, the status will change
to Complete. The Complete status is a link that you can click to download the bundle.
n Deployment Prerequisites
n Overview of cloud-init
The following sections provide information on how to install the Virtual Edge on KVM and
VMware ESXi hypervisors.
Deployment Prerequisites
This section describes deployment prerequisites and instance requirements.
n 4Gb of memory
Firewall/NAT Requirements
If the VeloCloud Virtual Edge is deployed behind the Firewall and/or a NAT device, the following
requirements apply:
n The Firewall must allow outbound traffic from the VeloCloud Virtual Edge to TCP/443 (for
communication with the VeloCloud Orchestrator).
n The Firewall must allow traffic outbound to Internet on ports UDP/2426 (VCMP).
n Disable hyperthreading
n Virtual Edge supports paravirtualized vNIC VMXNET 3 and passthrough vNIC SR-IOV:
For example, for a 10-core CPU system, recommend running one 8-core virtual edge
or two 4-core virtual edge and reserve 2 cores for Hypervisor processes.
n For a dual socket host system, make sure the hypervisor is assigning network adapters,
memory and CPU resources that are within the same socket (NUMA) boundary as the
vCPUs assigned.
n Recommended VM settings:
n 2, 4, or 8 CPUs (dedicated)
Overview of cloud-init
This section provides an overview of the cloud-init package.
About cloud-init
Cloud-init is a Linux package responsible for handling early initialization of instances. If available in
the distributions, it allows for configuration of many common parameters of the instance directly
after installation. This creates a fully functional instance that is configured based on a series of
inputs. This mode of installation requires two files, meta-data and user-data.
Cloud-init's behavior can be configured via user-data. User-data can be given by the user at the
time of launching the instance. This is typically done by attaching a secondary disk in ISO format
that cloud-init will look for at first boot time. This disk contains all early configuration data that will
be applied at that time.
The VeloCloud Virtual Edge supports cloud-init and all essential configurations packaged in an
ISO image.
The final installation configuration options are set with a pair of cloud-init configuration files. The
first installation configuration file contains the metadata. Create this file with a text editor and
name it meta-data. This file provides information that identifies the instance of the VeloCloud
Virtual Edge being installed. The instance-id can be any identifying name, and the local-hostname
should be a host name that follows your site standards.
1 Create the meta-data file that contains the instance name.instance-id: vedge1local-hostname:
vedge1
2 Create the network-config file that contains the WAN configuration. Only WAN interfaces
that require static IP addressing need to be specified here. By default, all VCE WAN
interfaces are configured for DHCP. Multiple interfaces can be specified.
version: 1
config:
- type: physical
name: GE3
subnets:
- type: static
address: 10.1.0.2
netmask: 255.255.255.0
gateway: 10.1.0.1
3 Create the user-data file. This file contains three main modules: VCO, Activation Code, and
Ignore Certificates Errors.
Module Description
activation_code Activation code for the Virtual Edge. The activation code is generated while creating an
Edge instance on the VCO.
The activation code is generated while creating an Edge instance on the VCO.
Important There is no default password in VCE image. The password must be provided in
cloud-config:
#cloud-config
password: passw0rd
chpasswd: { expire: False }
ssh_pwauth: True
velocloud:
vce:
vco: 10.32.0.3
activation_code: F54F-GG4S-XGFI
vco_ignore_cert_errors: true
genisoimage -output seed.iso -volid cidata -joliet -rock user-data meta-data network-config
Including network-config is optional. If the file is not present, the DHCP option will be used by
default.
Once the ISO image is generated, transfer the image to a datastore on the host machine.
KVM provides multiple ways to provide networking to virtual machines. VeloCloud recommends
the following options:
n SR-IOV
n Linux Bridge
n OpenVSwitch Bridge
If you decide to use SR-IOV mode, enable SR-IOV on KVM. For steps, see Enable SR-IOV on KVM:
To install VeloCloud Virtual Edge on KVM, see Install a Virtual Edge on KVM.
Considerations
KVM provides multiple ways to provide networking to virtual machines. The following have been
used by VeloCloud:
n SR-IOV
n Linux Bridge
n OpenVSwitch Bridge
If you don’t have Virtual Functions, but you have a NIC that supports Virtual Functions, you will
need to enable it.
This will be dependent on your BIOS. Login to the BIOS console and look for SR-IOV Support/
DMA. You can verify support on prompt by checking that Intel has the correct CPU flag.
GRUB_CMDLINE_LINUX="intel_iommu=on"
update-grub
update-initramfs -u
3 Add the ixgbe Driver in Linux by clicking the link below. https://downloadcenter.intel.com/
download/14687/Intel-Network-Adapter-Driver-for-PCIe-Intel-10-Gigabit-Ethernet-Network-
Connections-Under-Linux-
a On the left section of the Intel website ( Other Versions section), click the 5.2.1 link.
update-initramfs -u
01:10.0 Ethernet controller: Intel Corporation 82599 Ethernet Controller Virtual Function (rev 01)
1 Use gunzip to extract the qcow2 file to the image location (for example, /var/lib/libvirt/
images).
2 Create the Network pools that you are going to use for the device. Provided below sample
on pool using SR-IOV and pool using OpenVswitch.
SR-IOV Sample
<network>
<name>sriovpool</name> <!--This is the name of the file you created-->
<forward mode='hostdev' managed='yes'>
<pf dev='eth1'/> <!--Use the netdev name of your SR-IOV devices PF here-->
</forward >
</network>
OpenVSwitch Sample
<network>
<name>passthrough</name>
<model type='virtio'/>
<forward mode="bridge"/>
<bridge name="passthrough"/>
<virtualport type='openvswitch'>
</virtualport>
<vlan trunk='yes'>
<tag id='33' nativeMode='untagged'/>
<tag id='200'/>
<tag id='201'/>
<tag id='202'/>
</vlan>
</network>
Bridge
<network>
<name>passthrough</name>
<model type='virtio'/>
<forward mode="bridge"/>
</network>
<domain type='kvm'>
<name>vedge1</name>
<memory unit='KiB'>4194304</memory>
<currentMemory unit='KiB'>4194304</currentMemory>
<vcpu placement='static'>2</vcpu>
<resource>
<partition>/machine</partition>
</resource>
<os>
<type arch='x86_64' machine='pc-i440fx-trusty'>hvm</type>
<boot dev='hd'/>
</os>
<features>
<acpi/>
<apic/>
<pae/>
</features>
<!--
Set the CPU mode to host model to leverage all the available features on the host CPU
-->
<cpu mode='host-model'>
<model fallback='allow'/>
</cpu>
<clock offset='utc'/>
<on_poweroff>destroy</on_poweroff>
<on_reboot>restart</on_reboot>
<on_crash>restart</on_crash>
<devices>
<emulator>/usr/bin/kvm-spice</emulator>
<!--
Below is the location of the qcow2 disk image
-->
<disk type='file' device='disk'>
<driver name='qemu' type='qcow2'/>
<source file='/var/lib/libvirt/images/edge-VC_KVM_GUEST-x86_64-2.3.0-18- R23-20161114-GA-updatable-
ext4.qcow2'/>
<target dev='sda' bus='sata'/>
<address type='drive' controller='0' bus='0' target='0' unit='0'/>
</disk>
<!--
If using cloud-init to boot up virtual edge, attach the 2nd disk as CD-ROM
-->
<disk type='file' device='cdrom'>
<driver name='qemu' type='raw'/>
<source file='/home/vcadmin/cloud-init/vedge1/seed.iso'/>
<target dev='sdb' bus='sata'/>
<readonly/>
<address type='drive' controller='1' bus='0' target='0' unit='0'/>
</disk>
<controller type='usb' index='0'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x01' function='0x2'/>
</controller>
<controller type='pci' index='0' model='pci-root'/>
<controller type='sata' index='0'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x05' function='0x0'/>
</controller>
<controller type='ide' index='0'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x01' function='0x1'/>
</controller>
<!--
The first two interfaces are for the default L2 interfaces, NOTE VLAN support just for SR-IOV and
OpenvSwitch
-->
< interfacetype='network'>
< modeltype='virtio'/>
< sourcenetwork='LAN1'/>
< vlan>< tagid='#hole2_vlan#'/></ vlan>
< aliasname=LAN1/>
< addresstype='pci' domain='0x0000' bus='0x00' slot='0x12' function='0x0'/>
</ interface>
< interfacetype='network'>
< modeltype='virtio'/>
< sourcenetwork=LAN2/>
< vlan>< tagid='#LAN2_VLAN#'/></ vlan>
< aliasname='hostdev1'/>
< addresstype='pci' domain='0x0000' bus=' 0x00' slot='0x13' function='0x0'/>
</ interface>
<!--
The next two interfaces are for the default L3 interfaces. Note that additional 6 routed interfaces
are supported for a combination of 8 interfaces total
-->
< interfacetype='network'>
< modeltype='virtio'/>
< sourcenetwork=WAN1/>
< vlan>< tagid='#hole2_vlan#'/></ vlan>
< aliasname=LAN1/>
< addresstype='pci' domain='0x0000' bus='0x00' slot='0x12' function='0x0'/>
</ interface>
< interfacetype='network'>
< modeltype='virtio'/>
< source network=LAN2/>
< vlan>< tag id='#LAN2_VLAN#'/></ vlan>
< aliasname='hostdev1'/>
< addresstype='pci' domain='0x0000' bus='0x00' slot='0x13' function='0x0'/>
</ interface>
<serial type='pty'>
<target port='0'/>
</serial>
<console type='pty'>
<target type='serial' port='0'/>
</console>
<input type='mouse' bus='ps2'/>
<input type='keyboard' bus='ps2'/>
<graphics type='vnc' port='-1' autoport='yes' listen='127.0.0.1'>
<listen type='address' address='127.0.0.1'/>
</graphics>
<sound model='ich6'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x04' function='0x0'/>
</sound>
<video>
<model type='cirrus' vram='9216' heads='1'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x02' function='0x0'/>
</video>
<memballoon model='virtio'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x06' function='0x0'/>
</memballoon>
</devices>
</domain>
Instructions
1 Save the above domain XML file (for example, vedge1.xml).
Note vedge1 is the name of the VM defined in the <name> element of the domain XML file.
Replace vedge1 with the name you specify in the <name> element.
The Cloud-init already includes the activation key, which was generated while creating a new
Virtual Edge on the VCO. The Virtual Edge is configured with the config settings from the Cloud-
init file. This will configure the interfaces as the Virtual Edge is powered up. Once the Virtual Edge
is online, it will activate with the VCO using the activation key. The VCO IP address and the
activation key have been defined in the Cloud-init file.
KVM provides multiple ways to provide networking to virtual machines. VeloCloud recommends
the following options:
n SR-IOV
n Linux Bridge
n OpenVSwitch Bridge
If you decide to use SR-IOV mode, enable SR-IOV on VMware ESXi. For steps, see Enable SR-IOV
on VMware:
To install VeloCloud Virtual Edge on VMware ESXi, see Installing a Virtual Edge on VMware ESXi.
Prerequisites
This requires a specific NIC card. As of today, only the following chipset is certified by VeloCloud
to work with the VCG.
n Intel 82599/82599ES
n X550 (under experimenting as this requires the latest Intel ixgbevf driver on the VCG VM and
Malicious Driver Detection disabled on the ESXi host ixgbe driver)
1 Make sure that your NIC card supports SR-IOV. Check the VMware Hardware Compatibility
List (HCL) at https://www.vmware.com/resources/compatibility/search.php?
deviceCategory=io
Features: SR-IOV
The following VMware KB article provides details of how to enable SR-IOV on the supported
NIC: https://kb.vmware.com/s/article/2038739
2 Once you have a support NIC card, go to the specific VMware host, select the Configure tab,
and then choose Physical adapters.
3 Select Edit Settings. Change Status to Enabled and specify the number of virtual functions
required. This number varies by the type of NIC card.
5 If SR-IOV is successfully enabled, the number of Virtual Functions (VFs) will show under the
particular NIC after ESXi reboots.
To install:
1 Use the vSphere client to deploy an OVF template, and then select the VCE OVA file.
4 Select a resource.
6 Select the storage location to store the files for the deployment template.
Note Skip this step if you are using a cloud-init file to provision the Virtual Edge on ESXi.
8 Customize the template by specifying the deployment properties. See the image below of
the VCO that highlights the following substeps.
a From the VCO UI, retrieve the VCO URL/IP Address. You will need this address for Step c
below.
b Create a new Virtual Edge on the VCO for the Enterprise. Once the Edge is created, copy
the Activation Key. You will need the Activation Key for Step c" below.
c On the customize template page shown in the image below, type in the Activation Code
that you retrieved in Step b above, and the VCO URL/IP Address retrieved in Step a
above, into the corresponding fields.
Once the Edge powers up, it will establish connectivity to the VCO.
n Create a VSwitch
VeloCloud, leveraging distributed VCGs to establish IPSec towards public cloud private network
or deploy virtual edge directly in AliCloud.
This document illustrates the high-level workflow of the following two topologies to deploy a
virtual VeloCloud Edge (vVCE) on AliCloud:
Prerequisites
n Ensure you have an Alibaba Cloud account and login information for the Alibaba Cloud
Console.
n Ensure you have the VCO host name and admin account to login.
VCO
Address:4.5.6.7 Internet
Aliases:demo:velocloud.net
Alibaba Cloud
VPC
Route Table
velo_vVCE_Public_RT-172.16.100.0/24
velo_vVCE_Private_RT-172.16.101.0/24
GE1 (eth0)172.16.102.21(Management)
GE2 (eth1)172.16.100.21(WAN Overlay) GE3 (eth2)172.16.101.21
vVCE
ecs.sn2ne.large
High-Level Workflow
To deploy a VeloCloud Virtual Edge on Alibaba Cloud ECS, perform the following steps:
1 Create a Virtual Private Cloud (VPC). For steps, see Create a Virtual Private Cloud.
2 Create three VSwitches, each for a subnet connected to the Edge as shown in the topology
diagram. For steps, see Create a VSwitch.
n Public Subnet/VSwitch for Internet access from the Edge through WAN-side Interface
GE2.
n Private Subnet/VSwitch for LAN-side device access through LAN-side Interface GE3.
3 Create a Security Group (velo_vVCE_SG) and add inbound rules. For steps, see Create a
Security Group.
c Disable WAN Overlay for GE3 interface and NAT Direct Traffic, which will be the next
hop for devices connected to Private Subnets (LAN devices).
6 Create and launch a virtual VeloCloud Edge (vVCE) instance with Management Interface
(GE1). For steps, see Create a vVCE Instance on the ECS Console.
7 Create two Elastic Network Interfaces (ENIs): one Private LAN-side interface (GE3) and
another Public WAN-side interface (GE2). For steps, see Create an Elastic Network Interface.
8 Create an Elastic IP and assign it to the Public Interface (GE2) of the Edge. For steps, see
Create Elastic IP and Assign it to Public Interface of the Edge.
9 Bind the Public (GE2) and Private (GE3) interfaces to the Edge instance (vVCE) and then
restart the Edge instance to make sure the interfaces are connected to the Edge. For steps,
see Bind an ENI to an Edge instance.
The Edge instance will be activated against the VCO and the Edge will be able to establish
the VCMP tunnel to the Gateway.
10 (Optional) Within the VPC, if you want to access your Edge from a Private subnet, not over
the Internet, then you have to create a Jump Host (JH) instance (Linux instance) with one
interface in Public subnet for Internet connectivity with EIP and the other interface in
Management subnet, over which the Edge will be accessed. For steps, see Create a Jump
Host Instance.
Note VCAdmin users will be able to access the Edge over Management subnet interface
from JH.
Note After the Edge activation starts, if you want to SSH to the Edge from a Private
subnet then you must ensure to add the JH IP in the firewall SSH access list.
11 Create a LAN instance with the Primary interface connected to Private subnet. For steps, see
Create a LAN Instance.
a In the Private routing table (Velo_vVCE_Private_RT), create a new route entry that points
to GE3 interface of edge for default route. For steps, see Add a Custom Route Table
Entry.
VCO
Address:4.5.6.7 Internet
Aliases:demo:velocloud.net
Alibaba Cloud
VPC
Route Table
velo_vVCE_Public_RT-172.16.100.0/24
velo_vVCE_Private_RT-172.16.101.0/24
GE1 (eth0)172.16.102.21(Management)
GE2 (eth1)172.16.100.21(WAN Overlay)
vVCE
ecs.sn2ne.large
High-Level Workflow
To deploy a VeloCloud Virtual Edge on Alibaba Cloud ECS, perform the following steps:
1 Create a Virtual Private Cloud (VPC). For steps, see Create a Virtual Private Cloud.
2 Create three VSwitches, each for a subnet connected to the Edge as shown in the topology
diagram. For steps, see Create a VSwitch.
n Public Subnet/VSwitch for Internet access from the Edge through WAN-side Interface
GE2.
n Private Subnet/VSwitch for LAN-side device access through LAN-side Interface GE3.
3 Create a Security Group (velo_vVCE_SG) and add inbound rules. For steps, see Create a
Security Group.
c Add a static route on the Edge that points to the Private Subnet/VSwitch.
5 Create and launch a virtual VeloCloud Edge (vVCE) instance with Management Interface
(GE1). For steps, see Create a vVCE Instance on the ECS Console.
6 Create a public Elastic Network Interface (GE2) on the WAN side. For steps, see Create an
Elastic Network Interface.
7 Create an Elastic IP and assign it to the Public Interface (GE2) of the Edge. For steps, see
Create Elastic IP and Assign it to Public Interface of the Edge.
8 Bind the Public (GE2) interface to the Edge instance (vVCE) and then restart the Edge
instance to make sure the interface is connected to the Edge. For steps, see Bind an ENI to
an Edge instance.
The Edge instance will be activated against the VCO and the Edge will be able to establish
the VCMP tunnel to the Gateway.
9 Login to the Edge using the EIP and verify Edge activation.
10 Create a LAN instance with the Primary interface connected to the Management subnet. For
steps, see Create a LAN Instance.
a In the Primary routing table, create a new route entry that points to GE2 interface of edge
for default route. For steps, see Add a Custom Route Table Entry.
Prerequisites
Procedure
The VPC must be in the same region as the cloud resources that you want to deploy.
5 On the Create VPC page, set the following parameters, and then click OK.
a In the Name text box, enter the name for the VPC.
During VPC creation itself, you can create one or more VSwitches by clicking the + Add
button. For more information about creating a VSwitch, see Create a VSwitch.
Note After the VPC is created, you cannot change its IPv4 CIDR block.
What to do next
n Create a VSwitch
Create a VSwitch
A VSwitch is a basic network device of a VPC and used to connect different cloud product
instances. After creating a VPC, you can further segment your virtual private network to one or
more subnets by creating VSwitches. The VSwitches within a VPC are interconnected. Therefore,
you can deploy different applications in the different VSwitches of different zones to improve the
service availability.
Prerequisites
Procedure
3 Select the region of the VPC in which you want to create a VSwitch.
5 On the Create VSwitch page, set the following parameters, and then click OK.
a From the VPC drop-down menu, select a VPC to which the VSwitch belongs.
b In the Name text box, enter the name for the VPC.
c From the Zone drop-down menu, select the zone to which the VSwitch belongs.
d In the IPv4 CIDR Block text box, enter the IPv4 CIDR block of the VSwitch.
n The IPv4 CIDR block of the VSwitch can be the same as that of the VPC to which the
VSwitch belongs or be a subset of the VPC CIDR block.
For example, if the CIDR block of the VPC is 192.168.0.0/16, the CIDR block of the VSwitch
in the VPC can be 192.168.0.0/16, or any CIDR block between 192.168.0.0/17 and
192.168.0.0/29.
Note If the CIDR block of the VSwitch is the same as that of the VPC, you can only
create one VSwitch.
n The subnet mask of the VSwitch CIDR block can be 16 to 29 bits. It means that the
VSwitch can provide 8 to 65,536 IP addresses.
n The first IP address and the last three IP addresses in the VSwitch CIDR block are
reserved.
For example, if the VSwitch CIDR block is 192.168.1.0/24, the IP addresses 192.168.1.0,
192.168.1.253, 192.168.1.254, and 192.168.1.255 are reserved.
n If the VSwitch needs to communicate with VSwitches of other VPCs or on-premises data
centers, you need to make sure that the CIDR blocks involved do not conflict with each
other.
Note After the VSwitch is created, you cannot change its IPv4 CIDR block.
What to do next
Prerequisites
If you want to create a VPC-type security group, ensure that a VPC and a VSwitch have been
created. For more information, see Create a Virtual Private Cloud and Create a VSwitch.
Procedure
2 In the left-side navigation pane, choose Network & Security > Security Groups.
4 In the Create Security Group dialog box, configure the following parameters:
a From the Template drop-down menu, select a suitable template to simplify security
group rule configuration. For example, select Customize.
b In the Security Group Name text box, enter a valid name for the security group.
5 Click OK.
Results
After the security group is created, a new security group is added to the security group list.
What to do next
After creating a security group, it is recommended to immediately create security group rules.
Otherwise, you may not be able to access the internal network or Internet. For steps, see Add
Security Group Rules.
Prerequisites
n Ensure that you have created a security group. For more information, see Create a Security
Group.
n Ensure that you know which internal or public network requests need to be allowed or denied
for your instance.
Procedure
5 To allow inbound connectivity to your Edge, select Protocol Type and Port Range.
The port range is based on the protocol type. The following are some of the examples:
n ICMP Request/Reply
The authorized IP address is based on the authorization type. For example, for IPv4 CIDR
block, specifying 0.0.0.0/0 will allow or deny all IP addresses, based on the authorization
policy.
7 Click OK.
Results
Click the refresh icon to confirm that the security group rule is added. Changes to security group
rules are automatically applied to Elastic Compute Service (ECS) instances in the security group.
You cannot create or delete the default route table. However, you can create a custom route
table and associate it with a VSwitch to control the routes of the corresponding subnet. To
create a custom route table and associate it with a VSwitch, perform the following steps:
Prerequisites
Ensure that a VPC and VSwitches have been created. For steps, see Create a Virtual Private
Cloud and Create a VSwitch.
Procedure
b In the Name text box, enter the name for the routing table.
The route table is created, and it gets added to the list of Route Tables.
6 On the Route Tables page, select the route table that you have created and then click the
Associated VSwitches tab.
8 From the VSwitch drop-down menu, select the relevant VSwitch to be associated with the
Route Table.
Results
Click Refresh to confirm that the VSwitch is associated with the Routing Table.
What to do next
Prerequisites
Ensure you have the VCO host name and admin account to login.
Procedure
1 Log in to the VCO application as Admin user, with your login credentials.
4 In the Name text box, enter a unique name for the Edge.
6 From the Profile drop-down menu, select Quick Start Profile and click Create.
The Edge is provisioned, and the activation key is displayed on the top of the page. Make a
note of the activation key to use it for launching the Edge from the AliCloud Console.
7 Configure Virtual Edge interfaces. The following steps are explained considering Topology A
- Virtual Edge Deployment on AliCloud VPC.
b Click Edit corresponding to the GE2 Interface and select Override Interface checkbox.
c From the Capability drop-down menu, select Routed and click Update GE2.
d Click Edit corresponding to the GE3 Interface and select Override Interface checkbox.
e Disable WAN Overlay and NAT Direct Traffic, as this interface will be used LAN-side, and
Click Update GE3.
Note If you are using an Edge instance with only two interfaces as illustrated in Topology B -
Virtual Edge Deployment on AliCloud Single-Arm Topology, then the public interface (GE2)
will be used for both WAN and LAN connectivity. For the LAN network to point to the GE2
interface, under Static Route Settings, configure a static route on the Edge that points to the
Private Subnet/VSwitch as shown in the following screenshot.
8 Under the Configure VLAN area, edit the VLAN settings to update the Edge LAN IP Address.
9 (Optional) If you are using a Jump Host, to allow SSH access to the Edge from the jump
server, make sure to enable the Support access for the Jump Host server’s IP in the Firewall
page.
What to do next
Prerequisites
Procedure
2 In the left-side navigation pane, click Instances & Images > Instances.
b From the Region drop-down menu, select a region. The system randomly allocates a
zone by default.
Note After an instance is created, you cannot change its region or zone.
c In the Instance Type area, go to All Generations > x86-Architecture > General Purpose
and select the 4 vCPU + 16 GiB memory (ecs. sn2ne.xlarge) instance type.
The available instance type family is determined by the region you selected.
d In the Image area, click Custom Image and select an Edge image, for example,
vce-3.3.1-48-R331-20190727-QE.
5 Click Next: Networking to set up the networking and security group configuration.
a Select VPC as the network type and select the VPC where you are going to deploy your
Edge and attach the Console interface of your Edge to MGMT_SN.
d Add an Elastic Network Interface (ENI). You can skip this step if the selected instance
type does not support ENI.
a Configure Logon Credentials by selecting one of the following options: Key Pair, Inherit
Password From Image, and Password. By default, Set Later option is selected.
b In the Instance Name text box, enter a unique name for your Edge instance.
c Under the Advance area, you can provide the cloud-init user data for your edge in the
following sample format for activation purpose. According to your VCO set up, you must
change the vco name and activation code.
#cloud-config
velocloud:
vce:
vco: 1.211.224.11
activation_code: 12XX-ABC1-6DD3-3EFG
vco_ignore_cert_errors: true
8 Click Next: Preview and confirm the selected configuration. You can also click the edit icon to
modify the configurations.
9 Read and confirm Terms of Service, and then click Create Instance.
Results
Click Console to return to the ECS console. Click the refresh button to check if the Edge instance
is created. If the newly created Edge instance is in a Running status, then the Edge is created
successfully.
What to do next
Prerequisites
n A VPC and a VSwitch are created. For steps, see Create a Virtual Private Cloud.
n A security group is created in the same VPC. For steps, see Create a Security Group.
Procedure
a In the Network Interface Name text box, enter a unique name for the ENI.
b From the VPC drop-down menu, select the same VPC associated with the instance to
which you want the ENI to be bound. When you attach an ENI to an instance, they must
be in the same VPC.
c From the VSwitch drop-down menu, select the VSwitch to which you want the ENI to be
bound. When you attach an ENI to an instance, they must be in the same zone, but they
do not have to be in the same VSwitch.
d From the Security Group drop-down menu, select your security group in the selected
VPC.
5 Click OK.
Results
On the Network Interfaces page, click Refresh to view the newly created ENI instance.
What to do next
n After creating an ENI, you can attach an ENI to an Edge instance. For steps, see Bind an ENI
to an Edge instance.
Prerequisites
n Ensure you have an Elastic Network Interface (ENI) to assign the Elastic IP. For steps to
create ENI, see Create an Elastic Network Interface.
Procedure
4 Configure EIP.
Ensure that the EIP and the cloud instance to be associated with the EIP belong to the
same region.
b Set the maximum bandwidth for the EIP to be created, depending on the requirement.
c Select the number of the EIPs that you want to create with the same configurations. The
default value for Quantity is 1.
On the Elastic IP Addresses page, click Refresh to view the newly created EIP instance.
7 To associate the EIP instance to a secondary (public) Elastic Network Interface (ENI) of the
Edge, click Bind under the Actions column. The Bind Elastic IP Address page appears.
b From the Secondary ENI drop-down menu, select the interface to which you want to bind
the EIP.
c Click OK.
What to do next
Prerequisites
n Ensure that you have created an ENI. For steps. see Create an Elastic Network Interface.
Procedure
2 In the left-side navigation pane, choose Network & Security > ENI.
3 On the Network Interfaces page, select an ENI and click Bind to Instance under the Actions
column.
4 From the Select Instance drop-down menu, select the Edge instance to which you want to
bind the ENI.
5 Click OK.
Results
What to do next
Restart your Edge instance for the newly associated interfaces to get effect, by performing the
following step.
2 On the Instances page, go to your Edge instance, and click More under the Actions column.
4 Click OK.
Prerequisites
Procedure
2 In the left-side navigation pane, click Instances & Images > Instances.
b From the Region drop-down menu, select a region. The system randomly allocates a
zone by default.
Note After an instance is created, you cannot change its region or zone.
c In the Instance Type area, go to All Generations > x86-Architecture > General Purpose
and select an instance type.
The available instance type family is determined by the region you selected.
d In the Image area, click Public Image and select an Ubuntu image, for example,
16.04.64.bit.
5 Click Next: Networking to set up the networking and security group configuration.
a Select VPC as the network type and select the VPC where you are going to deploy your
LAN device and the Subnet/VSwitch to which you want the primary interface to be
connected.
d Add an Elastic Network Interface (ENI). You can skip this step if the selected instance
type does not support ENI.
a Configure Logon Credentials by selecting one of the following options: Key Pair, Inherit
Password From Image, and Password. By default, Set Later option is selected.
b In the Instance Name text box, enter a unique name for the LAN instance.
8 Click Next: Preview and confirm the selected configuration. You can also click the edit icon to
modify the configurations.
9 Read and confirm Terms of Service, and then click Create Instance.
Results
Click Console to return to the ECS console. Click the refresh button to check if the LAN instance
is created. If the newly created LAN instance is in a Running status, then the inatance is created
successfully.
Prerequisites
n Ensure that you have created a VPC and VSwitches. For steps, see Create a Virtual Private
Cloud and Create a VSwitch.
n Ensure that you have a custom route table associated with a VSwitch. For steps, see Create
Custom Route Tables and Associate VSwitches.
Procedure
3 On the Route Tables page, find the target route table, and then click Manage in the Actions
column.
4 In the Route Table Details area, click Route Entry List tab, and then click Add Route Entry.
5 In the Name text box, enter the unique name for the route entry.
7 From the Next Hop Type drop-down menu, select the next hop interface type, for example,
Secondary NetworkInterface, and then select the interface.
8 Click OK.
Prerequisites
Procedure
2 In the left-side navigation pane, click Instances & Images > Instances.
b From the Region drop-down menu, select a region. The system randomly allocates a
zone by default.
Note After an instance is created, you cannot change its region or zone.
c In the Instance Type area, go to All Generations > x86-Architecture > General Purpose
and select an instance type.
The available instance type family is determined by the region you selected.
d In the Image area, click Public Image and select an Ubuntu image, for example,
16.04.64.bit.
5 Click Next: Networking to set up the networking and security group configuration.
a Select VPC as the network type and select the VPC where you are going to deploy your
JH and attach the Console interface of your Edge to MGMT_SN.
d Add an Elastic Network Interface (ENI). You can skip this step if the selected instance
type does not support ENI.
a Configure Logon Credentials by selecting one of the following options: Key Pair, Inherit
Password From Image, and Password. By default, Set Later option is selected.
b In the Instance Name text box, enter a unique name for the JH instance.
8 Click Next: Preview and confirm the selected configuration. You can also click the edit icon to
modify the configurations.
9 Read and confirm Terms of Service, and then click Create Instance.
Results
Click Console to return to the ECS console. Click the refresh button to check if the JH instance is
created. If the newly created JH instance is in a Running status, then the inatance is created
successfully.
Where:
n private key - Use the private key generated in Create a vVCE Instance on the ECS Console.
n Elastic IP of the edge - Use the Elastic IP created in Create Elastic IP and Assign it to Public
Interface of the Edge.
For the 3.3.1 release, VeloCloud Orchestrator (VCO) supports Azure Virtual WAN and VeloCloud
Gateway (VCG) integration and automation by leveraging the Azure backbone to establish
branch-to-Azure VPN connectivity through the VCG as shown in the following diagram.
Azure
virtual
WAN
NSX SD-WAN
Orchestrator
and Controller
Azure
Portal
CustomerA
Azure
vWAN Hub
NSX SD-WAN
Gateway
CustomerA
Branch
NSX
SD-WAN
Edge
The following sections describe the procedures for configuring the VCO and Azure to enable
branch-to-Azure VPN connectivity through the VeloCloud Gateway (VCG):
Prerequisites
Procedure
3 Select Azure Active Directory and go to App registrations > New registration.
4 In the Name field, enter the name for your VCO application.
5 Select a supported account type, which determines who can use the application.
6 Click Register.
Results
Your VCO application will be registered and displayed in the All applications and Owned
applications tabs.
Make sure to note down the Directory (tenant) ID and Application (client) ID to be used during
the VCO configuration for IaaS Subscription.
What to do next
Prerequisites
Procedure
2 From the list of subscriptions, select the subscription to which you want to assign your
application. If you do not see the subscription you are looking for, select global subscriptions
filter. Make sure the subscription you want is selected for the portal.
5 From the Role drop-down menu, select the Contributor role to assign to the application.
To allow the application to execute actions like reboot, start and stop instances, it is
recommended that users assign the Contributor role to the App Registration.
6 From the Assign access to drop-down menu, select Azure AD user, group, or service
principal.
By default, Azure AD applications are not displayed in the available options. To find your
application, search for the name and select it.
7 Select Save.
Results
The application is assigned to the Contributor role and it appears in the list of users assigned to a
role for that scope.
What to do next
by provisioning a transient storage account for each of the download task. To download VPN
site configurations, you must manually register the Microsoft.Storage resource provider on your
Azure Subscription. By default, the Microsoft.Storage resource provider is not registered on
Azure Subscriptions.
Prerequisites
Procedure
5 From the list of available resource providers, select Microsoft.Storage. and click Register.
Results
The resource provider is registered and also configures your subscription to work with the
resource provider.
What to do next
You can create the resources in Azure, for steps, see Configure Azure Virtual WAN for Branch-
to-Azure VPN Connectivity.
Prerequisites
Procedure
5 Provide details such as description and expiry value for the secret and click Add.
Results
Note Copy and save the new client secret value to be used during the IaaS subscription in VCO.
What to do next
Before you begin to configure the Azure Virtual WAN and the other Azure resources:
n Verify that none of the subnets of your on-premises network overlap with the existing virtual
networks that you want to connect to. Your virtual network does not require a gateway
subnet and cannot have any virtual network gateways. For steps to create a virtual network,
see Create a Virtual Network.
n Obtain an IP address range for your Hub region and ensure that the address range that you
specify for the Hub region does not overlap with any of your existing virtual networks that
you connect to.
For step-by-step instructions about the various procedures that need to be completed in the
Azure portal side for integrating Azure Virtual WAN and VeloCloud Gateway (VCG), see:
Prerequisites
Procedure
4 From the Subscription drop-down menu, select your Microsoft Azure subscription.
5 In the Resource group text box, enter a unique name for your new resource group.
A resource group name can include alphanumeric characters, periods (.), underscores (_),
hyphens (-), and parenthesis (), but the name cannot end with a period.
6 From the Region drop-down menu, select the location for your resource group, where the
majority of your resources will reside.
Results
What to do next
Create an Azure Virtual WAN. For steps, see Create a Virtual WAN.
Prerequisites
n Ensure you have a resource group created to add the Virtual WAN.
Procedure
4 From the Subscription drop-down menu, select your Microsoft Azure subscription.
5 From the Resource group drop-down menu, select your resource group to add the Virtual
WAN.
6 From the Resource group location drop-down menu, select the location where the metadata
associated with the Virtual WAN will reside.
7 In the Name text box, enter a unique name for your Virtual WAN.
8 From the Type drop-down menu, select Standard as the Virtual WAN type.
9 Click Create.
Results
What to do next
Prerequisites
n Ensure you have a resource group created to add the Azure resources.
Procedure
2 Go to All resources and from the list of available resources, select the Virtual WAN that you
have created.
a From the Region drop-down menu, select the location where the Virtual Hub resides.
b In the Name text box, enter the unique name for your Hub.
c In the Hub private address space text box, enter the address range for the Hub in
Classless inter-domain routing (CIDR) notation.
6 Click Next: Site to site > and enable Site to site (VPN gateway) before connecting to VPN
sites by selecting Yes.
Note A VPN Gateway is required in order for NVS automation to work, ortherwise it is not
possible to create VPN connections.
a From the Gateway scale units drop-down menu, select a scaling value.
Results
What to do next
n Create Virtual Connection between Hubs and Virtual Networks (VNets). For steps, see Create
a Virtual Connection between VNet and Hub.
n If you do not have an existing VNet, you can create one by following the steps in Create a
Virtual Network.
Prerequisites
Procedure
4 In the Name text box, enter the unique name for your virtual network.
5 In the Address space text box, enter the address range for the virtual network in Classless
inter-domain routing (CIDR) notation.
6 From the Subscription drop-down menu, select your Microsoft Azure subscription.
7 From the Resource group drop-down menu, select your resource group to add the virtual
network.
8 From the Location drop-down menu, select the location where the virtual network resides.
9 Under the Subnet area, enter the name and address range for the subnet.
Do not make any changes to the other default settings of DDos protection, Service
endpoints, and Firewall.
10 Click Create.
Results
What to do next
Create Virtual Connection between Hubs and Virtual Networks (VNets). For steps, see Create a
Virtual Connection between VNet and Hub.
To create a virtual network connection between a VNet and a Virtual Hub in a particular Azure
region:
Prerequisites
Procedure
2 Go to All resources and from the list of available resources, select the Virtual WAN that you
have created.
3 Under the Virtual WAN architecture area, click Virtual network connections.
5 In the Connection name text box, enter the unique name for the virtual connection.
6 From the Hubs drop-down menu, select the Hub you want to associate with this connection.
7 From the Subscription drop-down menu, select your Microsoft Azure subscription.
8 From the Virtual network drop-down menu, select the virtual network you want to connect
to this Hub.
9 Click OK.
Results
A peering connection is established between the selected Vnet and the Hub.
What to do next
Note By default, for the 3.3.1 release, the Azure Virtual WAN feature is disabled. To enable the
feature, you must set the session.options.enableAzureVirtualWAN system property to true.
Before you begin the VCO configuration for Azure Virtual WAN - VCG automation, ensure you
have completed all the steps explained in the Prerequisite Azure Configuration and Configure
Azure Virtual WAN for Branch-to-Azure VPN Connectivity sections.
For step-by-step instructions about the various procedures that need to be completed in the
VCO side for integrating Azure Virtual WAN and VeloCloud Gateway (VCG), see:
Prerequisites
Ensure you have registered the VCO application and created Client secret in the Azure portal.
For steps, see Prerequisite Azure Configuration.
Procedure
1 From the navigation panel in the VCO, go to Configure > Network Services.
4 Enter the Active Directory Tenant ID, Client ID, and Client Secret corresponding to your VCO
Application Registration.
5 Click the Get Subscriptions button to retrieve the list of Azure Subscriptions for which the
App Registration has been allocated an IAM role.
What to do next
Configure a Non-VeloCloud Site (NVS) of type Microsoft Azure Virtual Hub. For more information,
see Configure a Microsoft Azure Non-VeloCloud Site.
Prerequisites
n Ensure you have configured an IaaS subscription. For steps, see Configure an IaaS
Subscription Network Service.
n Ensure you have created Virtual WAN and Hubs in Azure. For steps, see Configure Azure
Virtual WAN for Branch-to-Azure VPN Connectivity.
Procedure
1 From the navigation panel in the VCO, go to Configure > Network Services.
3 In the Name text box, enter the name for the Non-VeloCloud site.
4 From the Type drop-down menu, select Microsoft Azure Virtual Hub.
The application fetches all the available Virtual WANs dynamically from Azure.
The application auto-populates the resource group to which the virtual WAN is associated.
8 Select the Enable Tunnel(s) checkbox to enable VeloCloud VPN Gateways initiate VPN
connections to the target Virtual Hub, as soon as the site is successfully provisioned.
Note VeloCloud VPN Gateways will not initiate IKE negotiation until this Non-VeloCloud Site
(NVS) is configured on at least one profile.
9 Click Next.
The VCO automatically initiates deployment, provisions Azure VPN Sites, and downloads the
VPN Site Configuration for the newly configured sites and stores the configuration in the
VCO’s Non-VeloCloud site configuration database.
Results
Once the Azure VPN sites are provisioned at the VCO side, you can view the VPN sites (Primary
and Redundant) in the Azure portal by navigating to your Virtual WAN page > Virtual WAN
architecture > VPN sites.
What to do next
n Associate the Micorsoft Azure Non-VeloCloud Site to a Profile in order to establish a tunnel
between a branch and Azure Vitual Hub. For more information, see Associate a Non-
VeloCloud Site to a Profile.
n You must add SD-WAN routes in to Azure network manually. For more information, see Edit a
VPN Site.
Procedure
2 Select a profile you want to associate your Non-VeloCloud Site of type Microsoft Azure
Virtual Hub and click the icon under the Device column.
3 Go to Cloud VPN area and enable Cloud VPN by turning the toggle button to On.
5 From the drop-down menu, select your Non-VeloCloud Site of type Microsoft Azure Virtual
Hub to establish VPN connection between the branch and the Micorsoft Azure Non-
VeloCloud Site.
Results
A tunnel is established between the branch and the Micorsoft Azure Non-VeloCloud Site. For
more information, see Configure Branch to VPNs.
Prerequisites
Ensure you have completed provisioning the Azure VPN sites at the VCO side.
Procedure
2 Go to All resources and from the list of available resources, select the Virtual WAN that you
have created.
4 From the available list of VPN sites, select your VPN site (for example,Non-VeloCloud site
name.primary), that is added as a result of NVS provisioning step done using the VCO.
6 In the Private address space text box, enter the address range for the SD-WAN routes.
7 Click Confirm.
Similarly, you can edit your Redundant VPN site by following the above steps.
Procedure
1 Delete the Azure VPN Connections associated to the VPN Sites targeted for deletion.
2 Delete the Azure VPN Sites provisioned on behalf of the NVS VCGs selected for that Virtual
Hub by using an Azure API.
Note Deletion of the Azure VPN Sites will fail if the VPN connections associated to the VPN
Sites (targeted for deletion) are not removed.