Aruba JL849AAE, JL850AAE, JL851AAE, JL853AAE Configuration Guide

  • Hello, I have analyzed the IMC Orchestrator 6.2 Service Configuration Guide. This document provides a comprehensive overview of configuring the IMC Orchestrator in non-cloud environments. It covers essential topics such as setting up multi-fabric management, configuring VLAN-VXLAN mappings, deploying service chains, and includes detailed procedures for various use cases like direct egress configurations. I am ready to assist with any questions you may have about its content.
  • What is the purpose of the IMC Orchestrator in non-cloud scenarios?
    What is a fabric network in the IMC Orchestrator solution?
    What is the function of a border device?
IMC Orchestrator 6.2 Solution
Service Configuration Guide in Non-Cloud
Scenarios
The information in this document is subject to change without notice.
© Copyright 2022 Hewlett Packard Enterprise Development LP
i
Contents
Overview ························································································1
Configure basic controller settings ·······················································2
Log in to the controller··················································································································· 2
Add a fabric ································································································································ 2
Configure a VDS ·························································································································· 3
Configure global parameters ·········································································································· 4
Add a border device group ············································································································· 5
Configure VLAN-VXLAN mapping ··································································································· 6
Add a tenant ······························································································································· 8
Add a border gateway ··················································································································· 8
Bind the border gateway to the tenant ···························································································· 10
Configure a single security egress ····················································· 12
Network planning ······················································································································· 12
Network topology ················································································································ 12
Resource plan ···················································································································· 16
Deploymeng workflow ················································································································· 17
Procedure ································································································································· 17
Configure basic settings of the underlay network ······································································· 17
Configure basic settings of security service resources ································································ 18
Configure basic controller settings ·························································································· 18
Configure the tenant overlay network ······················································································ 20
Bind the FW service resources to a tenant ··············································································· 23
Add a firewall ······················································································································ 24
Bind the LB service resources to the tenant ·············································································· 28
Create an LB ······················································································································ 29
Create an external network ··································································································· 38
Bind a border gateway to a vRouter ························································································ 41
Bind the vFW service resources to a vRouter············································································ 42
Bind the vLB service resources to a vRouter ············································································ 42
Bind an external network to the vRouter ·················································································· 43
Check the issued configurations ····························································································· 44
Configure the permitted VLAN and route on the border device ····················································· 47
Verify the configuration ········································································································· 48
Configure direct egresses ································································ 49
Configure a direct egress in static route mode ················································································· 49
Network planning ················································································································ 49
Deployment workflow ··········································································································· 52
Procedure ·························································································································· 52
Verify the configuration ········································································································· 59
Configure a BGP direct egress ····································································································· 60
Network planning ················································································································ 60
Deployment workflow ··········································································································· 64
Procedure ·························································································································· 64
Verify the configuration ········································································································· 74
Configure an OSPF direct egress (DR interface) to the external network ·············································· 83
Network planning ················································································································ 83
Deployment workflow ··········································································································· 87
Procedure ·························································································································· 87
Verify the configuration ······································································································· 111
Configure an OSPF direct egress (non-DR interface) to the external network ······································ 112
Network planning ·············································································································· 112
Deployment workflow ········································································································· 115
Procedure ························································································································ 115
Configure an OSPF direct egress to the internal network ································································· 129
ii
Network planning ·············································································································· 129
Deployment workflow ········································································································· 133
Procedure ························································································································ 133
Verify the configuration ······································································································· 158
Configure a BGP direct egress to a directly connected external network ············································· 158
Network planning ·············································································································· 158
Deployment workflow ········································································································· 161
Procedure ························································································································ 161
Configure a direct egress (static route) to a directly connected external network ·································· 175
Network planning ·············································································································· 175
Deployment workflow ········································································································· 179
Procedure ························································································································ 179
Verify the configuration ······································································································· 196
Configure the service chain ···························································· 198
Configure an east-west FW service chain ····················································································· 198
Network planning ·············································································································· 198
Deployment workflow ········································································································· 201
Procedure ························································································································ 201
Verify the configuration ······································································································· 209
Configure an east-west LB service chain ······················································································ 211
Network planning ·············································································································· 211
Deployment workflow ········································································································· 214
Procedure ························································································································ 214
Verify the configuration ······································································································· 226
Configure a south-north FW service chain and a direct egress ·························································· 227
Network planning ·············································································································· 228
Deployment workflow ········································································································· 231
Procedure ························································································································ 231
Verify the configuration ······································································································· 240
Configure a south-north LB service chain and a direct egress ··························································· 242
Network planning ·············································································································· 242
Deployment workflow ········································································································· 244
Procedure ························································································································ 244
Verify the configuration ······································································································· 259
Configure a third-party FW service chain ······················································································ 260
Network planning ·············································································································· 260
Deployment workflow ········································································································· 262
Procedure ························································································································ 262
Verify the configuration ······································································································· 266
Configure a third-party LB service chain ······················································································· 268
Network planning ·············································································································· 268
Deployment workflow ········································································································· 269
Procedure ························································································································ 269
Verify the configuration ······································································································· 275
Configure direct access of the LB to the external network ····················· 277
Network planning ····················································································································· 277
Network topology ·············································································································· 277
Resource plan ·················································································································· 279
Deployment workflow ················································································································ 279
Procedure ······························································································································· 279
Configure basic settings of the underlay network ····································································· 279
Configure basic settings of security service resources ······························································ 280
Configure basic controller settings ························································································ 280
Configure the tenant overlay network ···················································································· 282
Bind the VLB service resources to the tenant ·········································································· 285
Add an LB ························································································································ 286
Add an external network ····································································································· 297
Bind a gateway to the vRouter ····························································································· 299
Bind the vLB service resources to a vRouter ·········································································· 300
Bind an external network to the vRouter ················································································ 301
iii
Check the issued configurations ··························································································· 302
Configure the permitted VLAN on the border device ································································· 304
Verify the configuration ············································································································· 304
Configure the EPG denylist and allowlist ··········································· 304
Network planning ····················································································································· 305
Network topology ·············································································································· 305
Resource plan ·················································································································· 307
Deployment flow ······················································································································ 308
EPG allowlist deployment flow ····························································································· 308
EPG denylist deployment flow ····························································································· 309
Procedure ······························································································································· 309
Configure the basic environment of the controller ···································································· 309
Add an EPG allowlist ········································································································· 321
Add an EPG denylist ·········································································································· 333
Configure an east-west EPG FW service chain ··································· 347
Network planning ····················································································································· 347
Network topology ·············································································································· 347
Resource plan ·················································································································· 350
Deployment workflow ················································································································ 350
Procedure ······························································································································· 351
Configure basic controller settings ························································································ 351
Configure the tenant overlay network ···················································································· 352
Configure an FW ··············································································································· 354
Configure an EPG ············································································································· 360
Configure a service path ····································································································· 361
Configure an application policy ···························································································· 362
Verify the configuration ············································································································· 364
Verify configurations deployed by the controller ······································································· 364
Verify the connectivity ········································································································ 367
Configure an east-west EPG LB service chain ········································1
Network planning ························································································································· 1
Network topology ·················································································································· 1
Resource plan ······················································································································ 3
Deployment workflow ···················································································································· 3
Procedure ··································································································································· 4
Configure basic settings of the underlay network ········································································· 4
Configure basic controller settings ···························································································· 4
Configure the tenant overlay network ························································································ 5
Configure load balancing ········································································································ 7
Configure an EPG ··············································································································· 22
Configure a service path ······································································································· 24
Configure an application policy ······························································································ 25
Verify the configuration ··············································································································· 27
Verify configurations deployed by the controller ········································································· 27
Verify the connectivity ·········································································································· 30
Configure a south-north EPG FW service chain ···································· 31
Network planning ······················································································································· 31
Network topology ················································································································ 31
Resource plan ···················································································································· 33
Deployment workflow ·················································································································· 34
Procedure ································································································································· 34
Configure basic settings of the underlay network ······································································· 34
Configure basic settings of security service resources ································································ 35
Configure basic controller settings ·························································································· 35
Configure the tenant overlay network ······················································································ 36
Add a south-north EPG service chain ······················································································ 41
Verify the configuration ········································································································· 50
iv
Configure a south-north EPG LB service chain ····································· 55
Network planning ······················································································································· 55
Network topology ················································································································ 55
Resource plan ···················································································································· 56
Deployment workflow ·················································································································· 58
Procedure ································································································································· 58
Configure basic settings of the underlay network ······································································· 58
Configure basic settings of security service resources ································································ 59
Configure basic controller settings ·························································································· 59
Configure the tenant overlay network ······················································································ 60
Add a south-north EPG service chain ······················································································ 65
Verify the configuration ········································································································· 81
Configure the EPG service chain for third-party devices ························· 87
Network planning ······················································································································· 87
Network topology ················································································································ 87
Resource plan ···················································································································· 88
Deployment workflow ·················································································································· 89
Procedure ································································································································· 89
Configure the basic environment ···························································································· 89
Configure an IPv4 EPG service chain ······················································································ 92
Configure an IPv6 EPG service chain ······················································································ 98
Configure the controller connected to non-cloud VMware platforms ········ 105
Network planning ····················································································································· 105
Network topology ·············································································································· 105
Resource plan ·················································································································· 106
Deployment workflow ················································································································ 107
Procedure ······························································································································· 107
Configure basic settings of the underlay network ····································································· 107
Configure basic controller settings ························································································ 107
Configure the tenant overlay network ···················································································· 108
Manage the vCenter and configure basic settings of vCenter ····················································· 110
Add a VDS ······················································································································· 112
Add hosts to the vCenter ···································································································· 114
Add a distributed port group and bring a VM online based on the VLAN-VXLAN mapping ··············· 118
Add a distributed port group and bring a VM online based on automatic VLAN allocation and bound
interface availability zone ···································································································· 130
Add a distributed port group and bring a VM online based on manual VLAN allocation and bound
interface availability zone ···································································································· 133
Add a distributed port group and bring a VM online based on manual VLAN trunk allocation and bound
interface availability zone ···································································································· 135
Add a distributed port group and bring VMs online in a hierarchical manner·································· 137
Add a distributed port group and bring VMs online in a hierarchical manner (PVLAN) ····················· 139
Verify the configuration ······································································································· 143
Migrate a VM ···················································································································· 144
Audit and synchronization ··································································································· 144
Pull inventory ···················································································································· 146
Configure the controller connected to RHVM ······································ 150
Network planning ····················································································································· 150
Network topology ·············································································································· 150
Resource plan ·················································································································· 153
Deployment workflow ················································································································ 153
Procedure ······························································································································· 153
Configure basic settings of the underlay network ····································································· 153
Configure basic controller settings ························································································ 153
Configure the tenant overlay network ···················································································· 154
Connect to the RHVM ········································································································ 158
Add a logical network ········································································································· 159
Bring VMs online and ping between VMs ··············································································· 161
v
Pull inventory ···················································································································· 166
Audit and synchronization ··································································································· 167
Configure the controller connected to Microsoft System Center ·············· 171
Network planning ····················································································································· 171
Network topology ·············································································································· 171
Resource plan ·················································································································· 172
Deployment workflow ················································································································ 173
Procedure ······························································································································· 173
Configure basic settings of the underlay network ····································································· 173
Configure basic controller settings ························································································ 173
Configure the tenant overlay network ···················································································· 174
Connect to the System Center ····························································································· 178
Add a logical switch ··········································································································· 181
Add a VM network ············································································································· 184
Onboard VMs and verify connectivity between VMs ································································· 188
Audit and synchronization ··································································································· 196
Configure cloud private lines ··························································· 200
Network planning ····················································································································· 200
Network topology ·············································································································· 200
Resource plan ·················································································································· 202
Deployment workflow ················································································································ 203
Procedure ······························································································································· 203
Configure basic settings of the underlay network ····································································· 203
Configure basic settings of security service resources ······························································ 203
Configure basic controller settings ························································································ 204
Configure the tenant overlay network ···················································································· 205
Verify the configuration ············································································································· 213
Verify configurations deployed by the controller ······································································· 213
Verify the connectivity ········································································································ 214
Configure EVPN multicast ······························································ 215
Network planning ····················································································································· 215
Network topology ·············································································································· 215
Resource plan ·················································································································· 217
Deployment workflow ················································································································ 218
Procedure ······························································································································· 220
Configure basic settings of the underlay network ····································································· 220
Configure basic controller settings ························································································ 220
Intra-VPN Layer 2 multicast in a DC ······················································································ 222
VPN+PIM-SM multicast in a DC ··························································································· 227
VPN+PIM-SSM multicast in a DC ························································································· 236
Cross-VPN in a DC ············································································································ 245
External network multicast ·································································································· 255
Configure a vRouter link ································································ 266
Distributed vRouter link ············································································································· 266
Network planning ·············································································································· 266
Deployment workflow ········································································································· 269
Procedure ························································································································ 269
Verify the configuration ······································································································· 273
Centralized vRouter link ············································································································ 276
Network planning ·············································································································· 276
Deployment workflow ········································································································· 281
Procedure ························································································································ 281
Verify the configuration ······································································································· 290
Configure the remote leaf ······························································· 292
Network planning ····················································································································· 292
Network topology ·············································································································· 292
Resource plan ·················································································································· 294
vi
Deployment workflow ················································································································ 295
Procedure ······························································································································· 295
Configure the network for communication between the central DC and remote DC ························ 295
Implement automatic deployment of the remote underlay network ·············································· 298
Deploy the remote leaf overlay service ·················································································· 307
Deploy security incorporation for the remote leaf ····································································· 311
Verify the configuration ······································································································· 311
Configure single-VPC NAT traversal for VPC interconnection ················ 312
Configure single-VPC NAT traversal for VPC interconnection (single border group) ······························ 312
Network planning ·············································································································· 312
Deployment workflow ········································································································· 317
Procedure ························································································································ 317
Configure single-VPC NAT traversal for VPC interconnection (multi-border groups) ······························ 333
Network planning ·············································································································· 333
Deployment workflow ········································································································· 337
Procedure ························································································································ 337
Monitoring ······················································································0
FAQ ······························································································0
1
Overview
In non-cloud scenarios, cloud platforms such as OpenStack are unavailable, and a controller acts
as the network, computing, and security configuration entry to implement network management and
service orchestration.
In the IMC Orchestrator solution, a controller supports multi-fabric management. A fabric network
adopts the Spine-Leaf or Spine-Aggregation-Leaf structure.
Figure 1 shows the typical networking in a non-cloud scenario. When a spine device is connected to
leaf devices, the spine device forwards data on the underlay network between the leaf devices.
Server leaf devices are connected to computing devices such as servers, VMware VMs, RedHat
VMs, and Kubernetes containers. Service leaf devices are connected to HPE firewalls (FWs), HPE
load balancers (LBs), and third-party devices.
Figure 1 Typical networking in a non-cloud scenario
Fabric ED devices implement Layer 2/Layer 3 interconnection between fabrics. DCI ED devices
implement Layer 2/Layer 3 interconnection between data centers (DCs).
Border devices are connected to external devices to realize communication between the internal and
external networks. FWs, LBs, and third-party devices are connected to the border devices in hairpin
mode to enable internal network devices to access the external network through the security devices.
The leaf devices, ED devices, and border devices adopt the DRNI mode for networking. Spine
devices use more nodes for networking, and spine border devices adopt DRNI for networking.
Border1 Border2
Server
Leaf1 Server
Leaf2
Server1 Server2
IPL
IPL
Spine1 Spine2
Service
Leaf1 Service
Leaf2
FW3 FW4
IPL
FW1 FW2
Internet
Border1 Border2
Server
Leaf1 Server
Leaf2
Server1 Server2
IPL
IPL
Spine1 Spine2
Service
Leaf1 Service
Leaf2
FW3 FW4
IPL
LB1 LB2 FW1 FW2
Internet
Fabric1 Fabric2
Fabric
ED1 Fabric
ED2
DCI ED
Other DC
2
Configure basic controller settings
This chapter describes only the general operation steps for configuring basic controller settings. For
the specific configuration content and data, see "Configure basic controller settings" in each scenario.
Log in to the controller
After the controller is deployed, the corresponding menu items are loaded in IMC PLAT, and you can
use the controller functions by logging in to IMC PLAT.
IMC PLAT provides a user-friendly GUI. The login method is as follows:
1. Enter http://ip_address:30000/central/index.html in the address bar of the browser, and
press Enter to open the login page as shown in Figure 2.
ï‚¡ Ip_address is the virtual IP address of the cluster northbound service of the Installer where
IMC PLAT is located.
ï‚¡ 30000 is the port number.
Figure 2 IMC PLAT login page
Add a fabric
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
1. Navigate to Automation > Data Center Networks > Fabrics > Fabrics. Click Add. On the
page for adding a fabric, configure the fabric parameters:
ï‚¡ Name: fabric1
ï‚¡ AS number: 100. It is mandatory, and must be the same as the BGP AS number of each
device in the fabric.
ï‚¡ Multicast network: Off (default). If multicast is used, set this parameter to On.
ï‚¡ Epg controller: Off (default). If End Point Group (EPG) is used, set this parameter to On.
ï‚¡ Configure other parameters based on the networking requirements. The default
configuration is used as an example here.
3
Figure 3 Adding a fabric
2. Click OK to create the fabric.
3. Click the icon in the Actions column, and then click the Settings tab to open the fabric
settings page. On this page, complete the advanced configuration of the fabric based on the
actual networking requirements. To reduce packet flood on the network, you are advised to
select Unknown Unicast Suppression, Unknown Multicast Suppression, and Broadcast
Suppression. For other parameters, the default configuration is used as an example here.
Figure 4 Advanced settings of the fabric
Configure a VDS
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
1. Navigate to Automation > Data Center Networks > Common Network Settings > Virtual
Distributed Switches. Click the Modify icon in the Actions column, and modify VDS 1 by
adding the created fabric fabric1 on the Carrier Fabric tab.
4
Figure 5 Adding a fabric for the VDS
2. Click the Advanced Settings tab, and configure the following parameters of VDS 1:
ï‚¡ Bridge name: vds1-br
ï‚¡ VXLAN tunnel interface name: vxlan_vds1-br
ï‚¡ vSwitch Learned Flow Entries Aging Time (seconds): 300
ï‚¡ Configure other parameters based on the networking requirements. The default
configuration is used as an example here.
Figure 6 Advanced settings
3. Click Apply to save the settings.
Configure global parameters
1. To ensure the normal use of IPv6 services (if any), enable the global IPv6 configuration on the
controller as follows:
a. Navigate to Automation > Data Center Networks > Fabrics > Parameters, and click the
Controller Global Settings tab.
b. Set IPv6 to On.
2. Disable Deploy Security Policy Flow Table to Switching Devices as follows:
a. Navigate to Automation > Data Center Networks > Fabrics > Parameters, and click the
Controller Global Settings tab.
b. Set Deploy Security Policy Flow Table to Switching Devices to Off.
3. If it is required to generate the VRF names according to rules, select the VRF autonaming mode
in the controller as follows:
5
a. Navigate to Automation > Data Center Networks > Fabrics > Parameters, and click the
Controller Global Settings tab.
b. Set VRF Autonaming Mode to Rule-based. The generated VRF name is in the following
format: Tenant name_Router name_Segment ID.
Figure 7 Controller global settings
Add a border device group
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
1. Navigate to Automation > Data Center Networks > Fabrics > Fabrics, click the icon in
the Actions column for fabric1, and click the Border Device Group tab.
2. Click Add to go to the page for adding a border device group, and configure the following
parameters in the Basic Info area:
ï‚¡ Device Group Name: Custom name of the device group.
ï‚¡ Remote Device Group: Specify whether the device group is remote. Once configured, this
parameter cannot be modified. Therefore, you must plan this parameter.
ï‚¡ Position: Network position of the border device group. You can select multiple positions.
Once configured, this parameter cannot be modified. Therefore, you must plan this
parameter.
ï‚¡ HA Mode: Specify the deployment mode.
3. In the Border Gateway Settings area, configure the following parameters:
ï‚¡ Third-Party Firewall: Off. Configure this parameter based on the networking requirements.
ï‚¡ Firewall Deployment Mode: Inline. Configure this parameter based on the networking
requirements.
ï‚¡ Connection Mode: Specify the mode of connection between the border device and service
device. Once configured, this parameter cannot be modified. Therefore, you must plan this
parameter.
ï‚¡ IPAddress Pool List: Configure this parameter based on the networking requirements.
ï‚¡ VLAN Pool List: Configure this parameter based on the networking requirements.
6
Figure 8 Adding a border device group
4. Add the border device in the Device Group Members area.
5. Click Apply in the upper right corner to add the border device group.
6. If you use the automatic deployment mode to configure the underlay network, the controller
automatically performs DRNI deployment on the two member devices of the added border
device group. To manually add the DR interface configuration on the controller, see IMC
Orchestrator 6.2 Solution Underlay Network Configuration Guide.
Configure VLAN-VXLAN mapping
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
Before performing the configuration described in this chapter, you must execute the vtep access
port command on the access port of the connected device. If you do not do that, you cannot bind
the VLAN-VXLAN mapping to this port on the controller. The configuration method is as follows:
[server-leaf1] interface Bridge-Aggregation257
[server-leaf1-Bridge-Aggregation257] vtep access port
[server-leaf1-Bridge-Aggregation257] quit
1. Navigate to Automation > Data Center Networks > Resource Pools > VNID Pools > VLAN-
VXLAN Mappings. Click Add, select VLAN-VXLAN Mapping to go to the Add VLAN-VXLAN
Mapping page, and perform the following operations:
a. Enter the mapping name map1.
Figure 9 VLAN-VXLAN mapping settings
7
a. Click Add Mapping, and configure the following parameters in the dialog box that opens:
− Name: map001
− Start VLAN ID: 2001
− Start VXLAN ID: 2001
− Mapping Range Length: 4
− Access Mode: VLAN
Figure 10 Adding a VLAN-VXLAN mapping
a. Click Apply.
2. On the Apply to Device or Apply to Interface tab, apply the mapping to a device or an
interface. For example, to apply the mapping to an interface:
a. Select map1 on the VLAN-VXLAN mapping page.
b. Click Interface in the Apply to Interfaces area to go to the Apply to Interfaces page.
3. Select a device from the device list. Select an access interface (or an aggregate interface) of
the device, and add the selected interface to the selected interface list on the right. Click Apply.
Figure 11 Selecting an interface
8
4. View the created mapping in the list.
Figure 12 Mapping information
Add a tenant
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
1. Navigate to Automation > Data Center Networks > Tenant Management > All Tenants.
Click Add, and configure the following parameters on the Add Tenant page:
ï‚¡ Tenant Name: Custom tenant name, for example, tenant1
ï‚¡ VDS Name: VDS1
Figure 13 Adding a tenant
2. Click Apply.
Add a border gateway
This chapter describes only the configuration example. For the specific configuration content and
data, see "Configure basic controller settings" in each scenario.
1. Navigate to Automation > Data Center Networks > Common Network Settings > Border
Gateway. Click Add, and configure the following parameters on the Add Border Gateway
page:
ï‚¡ Name: Custom border gateway name, for example, gw1.
ï‚¡ Gateway Sharing: Off. Configure this parameter based on the networking requirements.
9
ï‚¡ Gateway Type: Composite gateway. Configure this parameter based on the networking
requirements.
ï‚¡ Configure other parameters based on the networking requirements. The default
configuration is used as an example here.
Figure 14 Adding a border gateway
2. Click Add Border Gateway Members, and configure the following parameters on the Add
Border Gateway Members page:
ï‚¡ Name: Custom name of the border gateway member, for example, gw1member.
ï‚¡ Fabric: fabric1.
ï‚¡ Device Group: bdgroup1. Select the border device group created for the fabric.
ï‚¡ Priority: 1. Set this parameter to a value between 0 and 99 based on the networking
requirements. A larger number indicates a higher priority.
3. Add service resources (if required) on the Add Border Gateway Member or Modify Border
Gateway Member page. When adding service resources, configure the following parameters:
ï‚¡ Service Type: Select vFW or VLB based on the networking requirements.
ï‚¡ Resource Source: Select VNF or L4-L7 Physical Resource Pool based on the networking
requirements.
ï‚¡ Resource Pool Name: Select an existing resource pool based on the networking
requirements.
10
Figure 15 Adding a border gateway member
4. Click Apply to add a border gateway member. Click Apply on the Add Border Gateway page
to add a border gateway.
Bind the border gateway to the tenant
1. Navigate to Automation > Data Center Networks > Tenant Management > All Tenants,
select tenant1, and click to open the Edit Tenant page.
Figure 16 Adding a service resource
2. Click Add in the Allocate Gateway Resources area. In the dialog box that opens, select the
border gateway, and click Apply to add the border gateway.
11
Figure 17 Binding the border gateway to the tenant
3. Click Apply.
12
Configure a single security egress
Network planning
Network topology
Figure 18 Network diagram
Table 1 lists the management IP addresses and VTEP IP addresses of switches.
Table 1 IP addresses and interfaces
Device
Function
Management IP
address
Service IP address and interface
Border1
EVPN border device
192.168.11.8
Loopback0: 10.1.1.8/32
HGE4/0/1 (connecting to HGE4/0/1 on
Border2)
HGE4/0/2 (connecting to HGE4/0/2 on
Border2)
XGE6/0/48 (connecting to XGE6/0/48 on
Border2)
HGE4/0/3 (connecting to HGE1/0/3 on
Spine1)
Internet
Border1 Border2
Leaf1 Leaf2
Server1 Server2
FW1 FW2 LB1 LB2
IPL
IPL
Spine1 Spine2
Leaf3 Leaf4
Server3 Server4
IPL
Related component
IMC Orchestrator
13
Device
Function
Management IP
address
Service IP address and interface
HGE4/0/4 (connecting to HGE1/0/3 on
Spine2)
XGE6/0/1 (connected to XGE1/2/0 on FW1)
XGE6/0/2 (connected to XGE1/2/0 on FW2)
XGE6/0/3 (connected to XGE1/2/0 on LB1)
XGE6/0/4 (connected to XGE1/2/0 on LB2)
Border2
EVPN border device
192.168.11.9
Loopback0 10.1.1.9/32
HGE4/0/1 (connecting to HGE4/0/1 on
Border1)
HGE4/0/2 (connecting to HGE4/0/2 on
Border1)
XGE6/0/48 (connected to XGE6/0/48 on
Border1)
HGE4/0/3 (connecting to HGE1/0/4 on
Spine1)
HGE4/0/4 (connecting to HGE1/0/4 on
Spine2)
XGE6/0/1 (connected to XGE1/2/1 on FW1)
XGE6/0/2 (connected to XGE1/2/1 on FW2)
XGE6/0/3 (connected to XGE1/2/1 on LB1)
XGE6/0/4 (connected to XGE1/2/1 on LB2)
Spine1
Underlay physical
device
192.168.11.2
Loopback0 10.1.1.2/32
HGE1/0/3 (connecting to HGE4/0/3 on
Border1)
HGE1/0/4 (connecting to HGE4/0/3 on
Border2)
HGE1/0/5 (connecting to HGE1/0/25 on
Leaf1)
HGE1/0/6 (connecting to HGE1/0/25 on
Leaf2)
HGE1/0/7 (connecting to HGE1/0/25 on
Leaf3)
HGE1/0/8 (connecting to HGE1/0/25 on
Leaf4)
Spine2
Underlay physical
device
192.168.11.3
Loopback0 10.1.1.3/32
HGE1/0/3 (connecting to HGE4/0/4 on
Border1)
HGE1/0/4 (connecting to HGE4/0/4 on
Border2)
HGE1/0/5 (connecting to HGE1/0/27 on
Leaf1)
HGE1/0/6 (connecting to HGE1/0/27 on
Leaf2)
HGE1/0/7 (connecting to HGE1/0/27 on
Leaf3)
HGE1/0/8 (connecting to HGE1/0/27 on
Leaf4)
Leaf1
EVPN access device
192.168.11.4
Loopback0 10.1.1.4/32
XGE1/0/9 (connecting to XGE1/0/9 on Leaf2)
/