Link Search Menu Expand Document

Part (4) Cisco SDWAN Virtual Lab Deployment

We’ve covered creating a Meraki and DCNM dashboard using APIs and Grafana in previous updates. In this update we continue building out our Grafana dashboard with a focus on SDWAN and vManage APIs.

We’ll cover SD-WAN in two parts:

  • (1) Documenting the SDWAN Sandbox Lab virtual deployment
  • (2) Using vManage APIs and building upon our Grafana dashboard to aggregate our visualisations across domains.

If you have your own SD-WAN environment or would rather use the DevNet Sandbox you can skip this article and jump straight to update (4.2) SDWAN APIs and Grafana… (once it’s finished!).

SectionArchitectureLinkTopic
1.0Introductionbuilding a multidomain dashboard with cisco apis and grafanaSolution Overview
2.0MerakiBuilding a Meraki Dashboard with Grafana, Django and PythonVisualising Meraki APIs with Grafana.
3.1DCNM & EVPN VXLANDCNM VXLAN BGP and EVPN Lab with Nexus 9000vDCNM, N9000v, EVPN and VXLAN Lab deployment
3.2DCNM & EVPN VXLANBuilding a DCNM Dashboard with Grafana, Django and PythonVisualising DCNM APIs with Grafana.
4.1SDWANCisco SDWAN Virtual Lab BuildCisco SDWAN Virtual Lab deployment
4.2SDWANBuilding a SD-WAN Dashboard with Grafana, Django and PythonVisualising vManage APIs with Grafana
5.0OpenVuln APIBuilding a Security Advisory Dashboard with Grafana, Django and PythonVisualising OpenVuln APIs with Grafana
6.0DNA CenterBuilding a DNA-C Dashboard with Grafana, Django and PythonVisualising DNA-C APIs with Grafana
7.0ACI and ConclusionBuilding an ACI Dashboard with Grafana, Django and PythonVisualising ACI APIs with Grafana, Django send_email and django_tables2

Resources

There’s several detailed guides and resources available that were invaluable, the first three particulary so, at least in terms of building an SDWAN Lab:

1.0 Overview

Below summarises the devices found in each functional zone and also the key components of the virtual lab:

  • Control-plane: vSmart - establishes OMP sessions between itself and edge devices, facilitates fabric discovery
  • Management-plane: vManage - provisioning, configuration templating, visibility for day-1 and day-2 ops, REST API interface for programming and automation. vBond orchestrates the discovery of vSmart and vManage devices for WAN edge devices
  • Data-plane: 6 x vEdge and cEdge devices in Auckland, Hamilton, Wellington, Christchurch
  • Transport: Direct Internet and MPLS WAN
Physical Topology

Physical Topology

Let’s step through creating the topology in a virtual environment.

1.2 Lab components

ApplianceImage nameVersionMemoryCPUDiskQty
vManageviptela-vmanage-20.3.3.1-genericx86-64.qcow220.3.3.132768MB1vCPUs30G1
vSmartviptela-smart-20.3.3-genericx86-64.qcow220.3.34096MB1vCPUs-1
vBondviptela-edge-20.3.3-genericx86-64.qcow220.3.32048MB2vCPUs-1
vEdgeviptela-edge-20.3.3-genericx86-64.qcow220.3.32048MB1vCPUs-6
csr1000vcsr1000v-universalk9.17.03.03-serial.qcow217.03.033072MB1vCPUs-1
Ubuntu DesktopUbuntu 20.10 (64bit).vmdk20.101024MB1vCPUs-3

1.3 Addressing

  • VPN 0 Transport VPN: WAN transport and control plane traffic. Contains all interfaces except Management.
  • VPN 512 Management VPN: Carries out of band management traffic and interfaces
SubnetMaskPurpose
[192.168.200.0]255.255.255.0VPN 512 Mgmt OOB
10.254.254.0255.255.255.0VPN 0
10.254.253.0255.255.255.0VPN 512 Mgmt In-Band
10.100.0.0255.255.0.0Direct Internet
10.200.0.0255.255.0.0WAN

1.4 Interfaces

1.4.1 Control and Management Networks

HostnameInterfaceAddressNetwork
vmanageeth0192.168.200.42mgmt-oob
vmanageeth110.254.253.1vpn 512
vmanageeth210.254.254.1vpn 0
vbondeth010.254.253.3vpn 512
vbondeth110.254.254.3vpn 0
vsmarteth210.254.254.2vpn 0

1.4.2 Tranport Networks

HostnameInterfaceAddressNetwork
border-routereth110.254.254.254vpn 512
border-routereth210.100.0.1DIA
border-routereth210.200.0.1WAN

1.4.3 Edge and Branch Networks

HostnameInterfaceAddressNetwork
akl-vedge-1g0/010.100.0.10DIA
akl-vedge-1g0/110.200.0.10WAN
akl-vedge-2g0/010.100.0.11DIA
akl-vedge-2g0/110.200.0.11WAN
wgn-vedge-1g0/010.200.0.20DIA
wgn-vedge-1g0/110.100.0.20WAN
wgn-vedge-2g0/110.100.0.21DIA
wgn-vedge-2g0/010.200.0.21WAN
hml-vedge-1g0/010.100.0.30DIA
hml-vedge-1g0/110.200.0.30WAN
chc-vedge-1g0/010.100.0.40DIA
chc-vedge-1g0/110.200.0.40WAN

1.5 Device Configurations

1.5.1 Provisioning and Controller Profile

In the Plug and Play Connect portal on software.cisco.com:

  • Configure the controller profile as shown:
  • Add software devices
  • Download the vedge provisioning file that we’ll upload to vManage and use to authenticate vedge devices
Controller Profile

Controller Profile

Download the Provisioning File

Provisioning File

1.6.1 vManage

As per 1.4.1, eth2 maps to VPN 0 which is used for control traffic, eth0 is used for “out of band” lab management and eth1 for management inband, both map to VPN 512 for management

System

vmanage# show running-config system
system
 host-name             vmanage
 system-ip             1.1.1.1
 site-id               1000
 admin-tech-on-failure
 sp-organization-name  nz-se-lab
 organization-name     nz-se-lab
 clock timezone Pacific/Auckland
 vbond 10.254.254.3
 !
 ntp
  server nz.pool.ntp.org
   version 4
  exit
 !

Control - vpn 0

vmanage# sh run vpn 0
vpn 0
 interface eth2
  ip address 10.254.254.1/24
  tunnel-interface
   allow-service dhcp
   allow-service dns
   allow-service icmp
   no allow-service sshd
   no allow-service netconf
   no allow-service ntp
   no allow-service stun
   allow-service https
  !
  no shutdown
 !
 ip route 0.0.0.0/0 10.254.254.254
!

Management - vpn 512

vmanage# show running-config vpn 512
vpn 512
 interface eth0
  ip dhcp-client
  no shutdown
 !
 interface eth1
  ip address 10.254.253.1/24
  no shutdown
 !
 ip route 192.168.0.0/16 192.168.200.1 <- Route all home network subnets to firewall
!

Verify that an address has been assigned to eth0 and that it’s reachable through a browser. In my case https://192.168.200.42.

Initial Configuration Settings

From Administration > Settings, enter the organization name (must much plug and play controller profile) and vbond VPN0 IP address Configuration Settings

The vbond address needs to be configued under both the cli and gui as above for successful vedge registration.

Generate the keys for certificates

Enter vshell mode on vmanage and run the following:

openssl genrsa -out SDWAN.key 2048
openssl req -x509 -new -nodes -key SDWAN.key -sha256 -days 2000 \
        -subj "/C=NZ/ST=NZ/L=NZ/O=nz-se-lab/CN=SD-WAN" \
        -out SDWAN.pem

Use cat SDWAN.pem, to copy the certificate to Administration > Settings > Controll > Enterprise Root Certificate Enterprise Root Cert

Browse to https://vmanage-ip-address/dataservice/system/device/sync/rootcertchain, this will resync the vmanage database via an API call.

openssl x509 -req -in vManage.csr -CA SDWAN.pem -CAkey SDWAN.key -CAcreateserial -out vManage.crt -days 2000 -sha256
cat vManage.crt

Under Configuration > Certificates > Controllers, select vManage and “Generate CSR”, copy the CSR content. Generate CSR

In the vshell on vmanage use VIM to paste the CSR content into vManage.csr and save.

Sign the CSR as below:

openssl x509 -req -in vManage.csr -CA SDWAN.pem -CAkey SDWAN.key -CAcreateserial -out vManage.crt -days 2000 -sha256

Use cat to copy vManage.crt content, and install through Configuration > Certificates > Controllers and select vManage.

Paste vManage.crt content and “install” as below.

Install Cert

1.6.2 vBond

system

vbond# show running-config system
system
 host-name               vbond
 system-ip               1.1.1.3
 site-id                 1000
 admin-tech-on-failure
 no route-consistency-check
 organization-name       nz-se-lab
 clock timezone Pacific/Auckland
 vbond 10.254.254.3 local vbond-only
 !
  ntp
   server nz.pool.ntp.org
    version 4
   exit
  !

The vbond [10.254.254.3] local command designates that the device functions as a vbond vs vedge.

Control - VPN 0

Note - you will probably need to disable the “tunnel-interface” to add the vbond controller to vManage

vbond# show running-config vpn 0
vpn 0
 interface ge0/1
  ip address 10.254.254.3/24
  tunnel-interface
   encapsulation ipsec
   no allow-service bgp
   allow-service dhcp
   allow-service dns
   allow-service icmp
   no allow-service sshd
   no allow-service netconf
   no allow-service ntp
   no allow-service ospf
   no allow-service stun
   allow-service https
  !
  no shutdown
 !
 ip route 0.0.0.0/0 10.254.254.254

Management - VPN 512

vbond# show running-config vpn 512
vpn 512
 interface eth0
  ip address 172.16.1.3/24
  ipv6 dhcp-client
  no shutdown
 !
!

vBond Certificate Install

Either use cat and to copy the contents of SDWAN.pem and SDWAN.key from vmanage in vshell mode to vbond using vim, or use SCP to copy the .pem and .key files from vmanage to vbond.

In vManage add vBond under Configuration > Controllers > Add Controller. Use the VPN 0 (Control interface) IP address 10.254.254.3. Add vBond

Under Configuration > Certificates > Controllers > vBond, click the three dots … and “View CSR”

In vshell mode, use VIM to paste the contents into vBond.csr

openssl x509 -req -in vBond.csr -CA SDWAN.pem -CAkey SDWAN.key -CAcreateserial -out vBond.crt -days 2000 -sha256

Copy the content of vBond.crt (cat vBond.crt) and paste to Configuration > Certificates > Controllers > Select vBond and “Install Certificate”: vBond Cert

1.6.3 vSmart

system

vsmart# show running-config system
system
 host-name             vsmart
 system-ip             1.1.1.2
 site-id               1000
 admin-tech-on-failure
 organization-name     nz-se-lab
 clock timezone Pacific/Auckland
 vbond 10.254.254.3
 !
 ntp
  server nz.pool.ntp.org
   version 4
  exit
 !

VPN 0

Note - you will probably need to disable the “tunnel-interface” to add the vsmart controller to vManage

vsmart# show running-config vpn 0
vpn 0
 interface eth1
  ip address 10.254.254.2/24
  tunnel-interface
   allow-service dhcp
   allow-service dns
   allow-service icmp
   no allow-service sshd
   no allow-service netconf
   no allow-service ntp
   no allow-service stun
  !
  no shutdown
 !
 ip route 0.0.0.0/0 10.254.254.254

VPN 512

vsmart# show running-config vpn 512
vpn 512
 interface eth0
  ip address 172.16.1.2/24
  no shutdown
 !
!

vSmart Certificate Install

  • Use cat and to copy the contents of SDWAN.pem and SDWAN.key from vmanage in vshell mode to vSmart using vim, or use SCP to copy the .pem and .key files from vmanage to vsmart.
  • In vManage add vSmart under Configuration > Controllers > Add Controller. Use the VPN 0 (Control interface) IP address 10.254.254.2.
  • Under Configuration > Certificates > Controllers > vSmart, click the three dots … and “View CSR”
  • In vshell mode, use VIM to paste the contents into vSmart.csr
  • openssl x509 -req -in vSmart.csr -CA SDWAN.pem -CAkey SDWAN.key -CAcreateserial -out vSmart.crt -days 2000 -sha256
    
  • Copy the contents of vSmart.crt (cat vSmart.crt) and paste to Configuration > Certificates > Controllers > Select vSmart and “Install Certificate”:

1.6.4 vEdge

Certificates

  • In vshell mode on vManage, copy SDWAN.pem to vEdge
    vmanage:~$ cat SDWAN.pem
    -----BEGIN CERTIFICATE-----
       *********************
    -----END CERTIFICATE-----
    
  • Paste the cert contents into the vedge in vshell mode vim SDWAN.pem
  • Install the root certificate
    request root-cert-chain install /home/admin/SDWAN.pem
    
  • Verify certificate has been Installed
    akl-vedge-1# show certificate root-ca-cert | more
    Certificate:
        Data:
            Version: 3 (0x2)
            Serial Number:
                18:da:d1:9e:26:7d:e8:bb:4a:21:58:cd:cc:6b:3b:4a
    
  • Upload the WAN Edge List generated in section 1.5.1 to vManage - Configuration > Devices WAN Edge List
  • Select a vedge cloud device and Generate Bootstrap, note the UUID and OTP for the next step Generate Bootstrap
  • Return to the vedge device, exit from vshell mode and register with the UUID and OTP shown above
    akl-vedge-1# request vedge-cloud activate chassis-number **************** token ***************
    

System

akl-vedge-1# show running-config system
system
 host-name               akl-vedge-1
 system-ip               2.2.2.1
 site-id                 1
 admin-tech-on-failure
 no route-consistency-check
 organization-name       nz-se-lab
 clock timezone Pacific/Auckland
 vbond 10.254.254.3
 !
 ntp
  server nz.pool.ntp.org
   version 4
  exit
 !

Control VPN 0

 vpn 0
 interface ge0/0
  ip address 10.100.0.10/16
  tunnel-interface
   encapsulation ipsec
   no allow-service bgp
   allow-service dhcp
   allow-service dns
   allow-service icmp
   no allow-service sshd
   no allow-service netconf
   no allow-service ntp
   no allow-service ospf
   no allow-service stun
   allow-service https
  !
  no shutdown
 !
 interface ge0/1
  ip address 10.200.0.10/24
  no shutdown
 !
 ip route 0.0.0.0/0 10.100.0.1

1.7 Verification

From the vManage GUI, all devices are green and “up”: vManage

WAN edge status is “reachable”: WAN Edge Status

Clock and timezone is synchronised:

vmanage# show ntp associations

                                                           LAST             
IDX  ASSOCID  STATUS  CONF  REACHABILITY  AUTH  CONDITION  EVENT     COUNT  
----------------------------------------------------------------------------
1    40044    961a    yes   yes           none  sys.peer   sys_peer  1      

vmanage# show clock
Mon May 10 17:09:49 NZST 2021

Certificate is installed, organisation name is correct, vbond connection up, WAN interfaces up:

vmanage# show control local-properties
personality                       vmanage
sp-organization-name              nz-se-lab
organization-name                 nz-se-lab
root-ca-chain-status              Installed

certificate-status                Installed
certificate-validity              Valid
certificate-not-valid-before      May 09 21:46:52 2021 GMT
certificate-not-valid-after       Oct 30 21:46:52 2026 GMT

dns-name                          10.254.254.3
site-id                           1000
domain-id                         0
protocol                          dtls
tls-port                          23456
system-ip                         1.1.1.1
number-vbond-peers                1

INDEX   IP                                      PORT
-----------------------------------------------------
0       10.254.254.3                            12346  

number-active-wan-interfaces      2

                                PUBLIC          PUBLIC PRIVATE         PRIVATE                                 PRIVATE                               LAST
INSTANCE             INTERFACE  IPv4            PORT   IPv4            IPv6                                    PORT    VS/VM  COLOR            STATE CONNECTION
---------------------------------------------------------------------------------------------------------------------------------------------------------------
0        eth2       10.254.254.1    12346  10.254.254.1    ::                                      12346     1/0   default           up     0:00:00:04
1        eth2       10.254.254.1    12446  10.254.254.1    ::                                      12446     0/0   default           up     0:00:00:04

From vBond - validate control connectivity to vmanage, vsmart and vedges:

vbond# show orchestrator connections
                                                                                     PEER                      PEER                                                                            
         PEER     PEER     PEER             SITE        DOMAIN      PEER             PRIVATE  PEER             PUBLIC                                   ORGANIZATION                           
INSTANCE TYPE     PROTOCOL SYSTEM IP        ID          ID          PRIVATE IP       PORT     PUBLIC IP        PORT    REMOTE COLOR     STATE           NAME                    UPTIME         
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0        vedge    dtls     2.2.2.1          1           1           10.100.0.10      12366    10.100.0.10      12366   default          up              nz-se-lab               0:04:18:39     
0        vedge    dtls     2.2.2.2          1           1           10.100.0.11      12346    10.100.0.11      12346   default          up              nz-se-lab               0:04:18:37     
0        vedge    dtls     2.2.2.3          2           1           10.100.0.20      12366    10.100.0.20      12366   default          up              nz-se-lab               0:04:18:36     
0        vedge    dtls     2.2.2.4          2           1           10.100.0.21      12366    10.100.0.21      12366   default          up              nz-se-lab               0:04:18:35     
0        vedge    dtls     2.2.2.5          3           1           10.100.0.30      12346    10.100.0.30      12346   default          up              nz-se-lab               0:00:01:28     
0        vedge    dtls     2.2.2.6          4           1           10.100.0.40      12346    10.100.0.40      12346   default          up              nz-se-lab               0:00:00:06     
0        vsmart   dtls     1.1.1.2          1000        1           10.254.254.2     12346    10.254.254.2     12346   default          up              nz-se-lab               0:06:40:17     
0        vsmart   dtls     1.1.1.2          1000        1           10.254.254.2     12446    10.254.254.2     12446   default          up              nz-se-lab               0:06:40:16     
0        vmanage  dtls     1.1.1.1          1000        0           10.254.254.1     12346    10.254.254.1     12346   default          up              nz-se-lab               0:06:49:14     
0        vmanage  dtls     1.1.1.1          1000        0           10.254.254.1     12446    10.254.254.1     12446   default          up              nz-se-lab               0:06:49:31
Verify Connectivity

vbond to Border Gateway:

vbond# ping 10.254.254.254 vpn 0 count 3
Ping in VPN 0
PING 10.254.254.254 (10.254.254.254) 56(84) bytes of data.
64 bytes from 10.254.254.254: icmp_seq=1 ttl=255 time=107 ms
64 bytes from 10.254.254.254: icmp_seq=2 ttl=255 time=25.6 ms
64 bytes from 10.254.254.254: icmp_seq=3 ttl=255 time=64.8 ms

--- 10.254.254.254 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 25.620/65.906/107.215/33.319 ms

vbond to vManage:

vbond# ping 10.254.254.1 vpn 0 count 3  
Ping in VPN 0
PING 10.254.254.1 (10.254.254.1) 56(84) bytes of data.
64 bytes from 10.254.254.1: icmp_seq=1 ttl=64 time=12.3 ms
64 bytes from 10.254.254.1: icmp_seq=2 ttl=64 time=14.3 ms
64 bytes from 10.254.254.1: icmp_seq=3 ttl=64 time=15.2 ms

--- 10.254.254.1 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 12.355/14.005/15.291/1.229 ms

vbond to vsmart:

vbond# ping 10.254.254.2 vpn 0 count 3
Ping in VPN 0
PING 10.254.254.2 (10.254.254.2) 56(84) bytes of data.
64 bytes from 10.254.254.2: icmp_seq=1 ttl=64 time=20.1 ms
64 bytes from 10.254.254.2: icmp_seq=2 ttl=64 time=12.2 ms
64 bytes from 10.254.254.2: icmp_seq=3 ttl=64 time=19.4 ms

--- 10.254.254.2 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 12.206/17.282/20.199/3.602 ms

vbond to akl-vedge-1:

vbond# ping 10.100.0.10 vpn 0 count 3
Ping in VPN 0
PING 10.100.0.10 (10.100.0.10) 56(84) bytes of data.
64 bytes from 10.100.0.10: icmp_seq=1 ttl=63 time=16.2 ms
64 bytes from 10.100.0.10: icmp_seq=2 ttl=63 time=16.2 ms
64 bytes from 10.100.0.10: icmp_seq=3 ttl=63 time=14.2 ms

--- 10.100.0.10 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 14.211/15.556/16.240/0.962 ms

vbond to wgn-vedge-1:

vbond# ping 10.100.0.20 vpn 0 count 3
Ping in VPN 0
PING 10.100.0.20 (10.100.0.20) 56(84) bytes of data.
64 bytes from 10.100.0.20: icmp_seq=1 ttl=63 time=2.27 ms
64 bytes from 10.100.0.20: icmp_seq=2 ttl=63 time=13.4 ms
64 bytes from 10.100.0.20: icmp_seq=3 ttl=63 time=12.2 ms

--- 10.100.0.20 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 2.275/9.319/13.435/5.006 ms

vbond to vbond to hml-vedge-1:

vbond# ping 10.100.0.30 vpn 0 count 3
Ping in VPN 0
PING 10.100.0.30 (10.100.0.30) 56(84) bytes of data.
64 bytes from 10.100.0.30: icmp_seq=1 ttl=63 time=19.2 ms
64 bytes from 10.100.0.30: icmp_seq=2 ttl=63 time=18.2 ms
64 bytes from 10.100.0.30: icmp_seq=3 ttl=63 time=18.3 ms

--- 10.100.0.30 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 18.238/18.606/19.234/0.472 ms

vbond to chc-vedge-1:

vbond# ping 10.100.0.40 vpn 0 count 3
Ping in VPN 0
PING 10.100.0.40 (10.100.0.40) 56(84) bytes of data.
64 bytes from 10.100.0.40: icmp_seq=1 ttl=63 time=20.2 ms
64 bytes from 10.100.0.40: icmp_seq=2 ttl=63 time=19.3 ms
64 bytes from 10.100.0.40: icmp_seq=3 ttl=63 time=19.3 ms

--- 10.100.0.40 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 19.318/19.631/20.219/0.416 ms

Connectivity successful, validate control connections between vedge and vbond

vedge-6# show control connections
                                                                                       PEER                                          PEER                                          CONTROLLER
PEER    PEER PEER            SITE       DOMAIN PEER                                    PRIV  PEER                                    PUB                                           GROUP      
TYPE    PROT SYSTEM IP       ID         ID     PRIVATE IP                              PORT  PUBLIC IP                               PORT  LOCAL COLOR     PROXY STATE UPTIME      ID         
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
vsmart  dtls 1.1.1.2         1000       1      10.254.254.2                            12346 10.254.254.2                            12346 default         No    up     0:00:21:04  0           
vbond   dtls 0.0.0.0         0          0      10.254.254.3                            12346 10.254.254.3                            12346 default         -     up     0:00:21:04  0           
vmanage dtls 1.1.1.1         1000       0      10.254.254.1                            12346 10.254.254.1                            12346 default         No    up     0:00:21:04  0

Lessons Learned

  • Watch for ommitted or extra characters when copying certificates between devices - this caught me out a few times
  • You may need to disable encapsulation on the interface for devices to register with vmanage and re-enable once registered. You may need to toggle on/off depending on the order of operations
  • Set the timezone / clock on all devices and ensure they’re in sync
  • Organization name is important and must match between Plug and Play / Smart License portal and vmanage
  • Ensure the vBond IP address matches the controller address defined in the plug and play portal, otherwise vEdges won’t register
  • Use “show control conections-history detail” if and when troubleshooting bring up of devices and pay close attention to any error codes, cross reference any error codes with the troubleshooting guide linked above.
  • Reminder - management interfaces in VPN 512, control/transport in VPN 0. This caught me out as below.
An Example

An error I encountered was “VM_TMO” and from “show control connections-history detail”:

  "state               connect [Local Err: ERR_(D)TLS_CONN_FAIL] [Remote Err: NO_ERROR]"

Regular pings were completing but rapid pings weren’t:

  vedge-1# ping 10.254.254.1 vpn 0
  Ping in VPN 0
  PING 10.254.254.1 (10.254.254.1) 56(84) bytes of data.
  64 bytes from 10.254.254.1: icmp_seq=2 ttl=63 time=1.08 ms
  64 bytes from 10.254.254.1: icmp_seq=4 ttl=63 time=0.885 ms
  64 bytes from 10.254.254.1: icmp_seq=5 ttl=63 time=1.30 ms

  vedge-1# ping 10.254.254.1 vpn 0 count 1000 rapid
  Ping in VPN 0
  !.!....!.!..!.!.!.!..!.!^C

I’d put my management interface and route in the wrong vpn (0) - Moving the management interface and static route from vpn 0 to vpn 512 resolved.

  --- 10.254.254.1 statistics ---
  24 packets transmitted, 10 received, 59% packet loss
  vedge-1# ping 10.254.254.3 vpn 0 count 1000 rapid
  Ping in VPN 0
  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!^C

The Troubleshooting Guide describes each of these error codes and steps to resolve.

Wrap Up

Like anything, practice and repetition and familiarity with order of operations will help a lot. It took me a couple of hours to get my first vEdges registered with vManage and about 30 minutes to register the remaining.

This wraps up the SDWAN lab deployment, we’ll cover vManage APIs and Visualisations with Grafana in the next update.