Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Appendix: Building an Extended Topology with Hub Overlay and BGP Peering

This lab is an extension of the previous lab Appendix: Building a base SD-WAN Topology with Three Spokes and Two Hubs. The underlay connections and spoke implementation are not changed. We add two new changes to this lab:

  • We build a hub overlay. This enables sending traffic between the two hubs directly by exiting the WAN infrastructure. Hence you enable DC to DC traffic using this topology.
    • For traffic steering, we utilize an ECMP-based load-balancing algorithm to have the flows distributed among the two paths between the hubs.
  • We introduce data center routers that are attached to the hub LAN interfaces. Those will manage additional resources like servers attached to other interfaces. The additional IP prefixes for those resources will get announced through exterior BGP and propagated through the VPN.

A diagram of a cloud computing system Description automatically generated with medium confidence

The following table has the additional device information for the new topology.

Location Direct Hub IF Local AS Router IF Router AS Route propagation DC Name DC IP prefix
hub1 10.66.66.1/24 65010 10.66.66.254/24 65011 eBGP DC1 10.44.44.0/24
hub2 10.55.55.1/24 65020 10.55.55.254/24 65021 eBGP DC2 10.33.33.0/24
Note:

The AS numbers selected are self-defined and should be private AS and unique. Do not use AS 65000 as its in use internally already!

Extending Applications

Go to Organization -> Applications and add the following two new applications with the custom IP address ranges the DCs use:

Add a new application and configure the following:

  • Name=DC1
  • Type=Custom Apps
  • IP Addresses=10.44.44.0/24

Add another new application and configure the following:

  • Name=DC2
  • Type=Custom Apps
  • IP Addresses=10.33.33.0/24

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Extending Networks

Go to Organization -> Networks and edit the existing Network “HUB1-LAN”. You need to add a USERS-Object:

  • Name=DC1
  • IP Prefixes=10.44.44.0/24

A screenshot of a login page Description automatically generated

Then, edit the existing Network “HUB2-LAN”. You need to add a USERS-Object:

  • Name=DC2
  • IP Prefixes=10.33.33.0/24

A screenshot of a computer Description automatically generated

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Extend the Hub1 Profile

Go to Organization -> Hub Profiles.

Should you choose to use the import option, click on Import Profile and import the below JSON as a file.

Should you decide to configure everything manually in the Juniper Mist portal, then use the following steps.

Edit the existing WAN “INET” and add:

  • Hub to Hub Endpoint=hub2-INET

A screenshot of a computer Description automatically generated

Edit the existing WAN “MPLS” and add:

  • Hub to Hub Endpoint=hub2-MPLS

The result should look like the figure below:

A screenshot of a phone Description automatically generated

Add the following new traffic steering policy:

  • Name=REMOTEHUB
  • Strategy=ECMP
  • Paths
    • Path Type1=Overlay: hub2-INET
    • Path Type2=Overlay: hub2-MPLS

A screenshot of a computer Description automatically generated

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Edit the existing application policies to include the following:

  • Number=1
    • Name= spoke-to-hub-dmz
    • Application=HUB1-LAN1 + DC1
  • Number=2
    • Name= hub-dmz-to-spoke
    • Network=HUB1-LAN1 + DC1.HUB1-LAN1
  • Number=4
    • Name=hub-dmz-to-internet
    • Network=HUB1-LAN1 + DC1.HUB1-LAN1

Add the following two application policies:

  • Number=6
    • Name=remoterhub-to-myhub
    • Network=HUB2-LAN1 + DC2.HUB2-LAN1
    • Action=Pass
    • Application=HUB1-LAN + DC1
    • Traffic Steering=HUB-LANS
  • Number=7
    • Name= myhub-to-remotehub
    • Network=HUB1-LAN1 + DC1.HUB1-LAN1
    • Action=Pass
    • Application=HUB2-LAN1 + DC2
    • Traffic Steering=REMOTEHUB

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Configure the BGP peering with the data center router as follows:

  • Name=DC1
  • Peering Network LAN=HUB1-LAN1
  • Advertise to Overlay=Enabled/Checked
  • BFD=Enabled
  • Type=External
  • Local AS=65010
  • Hold Time=90
  • Graceful Restart Time=120
  • Export=None
  • Import=None
  • BGP Neighbor
    • Neighbor=Enabled
    • IP Address=10.66.66.254
    • Neighbor AS=65011
    • Export=None
    • Import=None

A screenshot of a computer Description automatically generated

A screenshot of a login Description automatically generated

The result should look like the figure below:

A screenshot of a box Description automatically generated

Save your results.

Extend the Hub2 Profile

Go to Organization -> Hub Profiles.

Should you choose to use the import option, click on Import Profile and import the below JSON as a file.

Should you decide to configure everything manually in the Juniper Mist portal, then use the following steps.

Edit the existing WAN “INET” and add:

  • Hub to Hub Endpoint=hub1-INET

A screenshot of a computer Description automatically generated

Edit the existing WAN “MPLS” and add:

  • Hub to Hub Endpoint=hub1-MPLS

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Add the following new traffic steering policy:

  • Name=REMOTEHUB
  • Strategy=ECMP
  • Paths
    • Path Type1=Overlay: hub1-INET
    • Path Type2=Overlay: hub1-MPLS

A screenshot of a computer AI-generated content may be incorrect.

The result should look like the figure below:

A screenshot of a web page AI-generated content may be incorrect.

Edit the existing application policies to include the following:

  • Number=1
    • Name= spoke-to-hub-dmz
    • Application=HUB2-LAN1 + DC2
  • Number=2
    • Name= hub-dmz-to-spoke
    • Network=HUB2-LAN1 + DC2.HUB2-LAN1
  • Number=4
    • Name=hub-dmz-to-internet
    • Network=HUB2-LAN1 + DC2.HUB2-LAN1

Add the following two application policies:

  • Number=6
    • Name=remoterhub-to-myhub
    • Network=HUB1-LAN1 + DC1.HUB1-LAN1
    • Action=Pass
    • Application=HUB2-LAN + DC2
    • Traffic Steering=HUB-LANS
  • Number=7
    • Name= myhub-to-remotehub
    • Network=HUB2-LAN1 + DC2.HUB1-LAN1
    • Action=Pass
    • Application=HUB1-LAN1 + DC1
    • Traffic Steering=REMOTEHUB

The result should look like the figure below:

A screenshot of a computer Description automatically generated

Configure the BGP peering with the data center router as follows:

  • Name=DC2
  • Peering Network LAN=HUB2-LAN1
  • Advertise to Overlay=Enabled/Checked
  • BFD=Enabled
  • Type=External
  • Local AS=65020
  • Hold Time=90
  • Graceful Restart Time=120
  • Export=None
  • Import=None
  • BGP Neighbor
    • Neighbor=Enabled
    • IP Address=10.55.55.254
    • Neighbor AS=65021
    • Export=None
    • Import=None

A screenshot of a computer Description automatically generated

A screenshot of a login Description automatically generated

The result should look like the figure below:

A screenshot of a box Description automatically generated

Save your results.

Extend the Spokes Template

The new DC1 and DC2 subnets are added here to the existing rules for visibility.

Edit the following Application Policies:

  • Number=1
    • Name=spoke-to-hub-dmz
    • Application=HUB1-LAN1 + HUB2-LAN1 + DC1 + DC2
  • Number=2
    • Name=hub-dmz-to-spoke
    • Network=HUB1-LAN1 + HUB2-LAN1 + DC1.HUB1-LAN1 + DC2.HUB1-LAN1

A screenshot of a computer Description automatically generated

Configuring DC Routers

There are many ways your data center routers can be configured to share routes using eBGP with the hub they are attached to. In our example below, we use an Ubuntu Linux-based VM with the BIRD Internet Routing Daemon for this exchange. Feel free to reuse or utilize other frameworks.

The below example shares the network and BIRD configuration used on DC-Router1 of this topology:

The below example shares the network and BIRD configuration used on DC-Router2 of this topology:

Test your network configuration

After the configuration is done, we can now test the new network configuration and verify the traffic between the two data centers via the two hubs.

The configuration on the Router1 VM now displays the exchanged routes both locally and within the BIRD process. Among these, key routes include the direct interface route to Hub2 (10.55.55.0/24) and the propagated data center route from DC2 (10.33.33.0/24).

The configuration on the Router2 VM now displays the exchanged routes both locally and within the BIRD process. Among these, key routes include the direct interface route to Hub2 (10.66.66.0/24) and the propagated data center route from DC1 (10.44.44.0/24).

When you go to WAN Edges -> hub1-site -> hub1 you can see the additional overlay tunnels:

A screenshot of a computer Description automatically generated

Go further to Utilities -> Testing Tools and click on BGP – Summary you can see the BGP neighbor summary on Hub1:

A screenshot of a computer Description automatically generated

Then, check the routes in the system. Here, it’s important to receive the remote DC2 route 10.33.33.0/24 .

A screenshot of a computer Description automatically generated

Now check the traffic utilizing the desktop6 VM which acts as a service in DC1 with the IP address 10.44.44.44:

The most important check is to reach the desktop7 VM IP address 10.33.33.33 which acts as a service in the remote DC2. This verifies the hub-to-hub overlay is working as expected.

Let the ping 10.33.33.33 on desktop6 VM continuously run and then check on Hub1 Applications – Session with the application name HUB2-LAN1 as the destination. The reverse traffic source and destination IP will indirectly determine which traffic path is used for this traffic which is MPLS as seen in the figure below:

A screenshot of a computer Description automatically generated

Stop the ping and start a new continuous ping to 10.33.33.1 on the desktop6 VM as we need a different destination IP address now.

Then, check on Hub1 Applications – Session with the application name HUB2-LAN1 as the destination. The reverse traffic source and destination IP will indirectly determine which traffic path is used for this traffic which is INET as seen in the figure below. This verifies that the ECMP-based traffic steering between the two Hubs is working as expected.

A screenshot of a computer Description automatically generated

The final test involves verifying that a VM connected to a spoke can access resources in both DC1 and DC2. This is demonstrated below using the desktop1 VM: