Establish connectivity between the Internet2 Virtual Router, that you build in Lab 1, and the CSPs of your choice.
While some key components of dedicated connectivity have been provisioned with code in Lab 3, such as Azure VNG's, many key components or configuration steps haven't been provisioned. One of the primary objectives of this workshop was to understand the components necessary for dedicated connectivity with the various CSPs. While some of these steps are simple or quick to achieve using code I felt it was important to do many of these processes manually so you could see the components that connect together first hand.
This IPv4 addressing is used for the dedicated connections with each provider in the labs, except for Google. (Google assigns reserved link-local addressing from 169.254.0.0/16.)
AWS: Building a Hosted Direct Connect (DX) Connection
- Navigate to your Virtual Network Space (VNS) from Lab 1
- Find the Virtual Router you created in Lab 1.
- Select
Add Peering using AWS Direct Connect
. - In the Create Peering window fill in the details:
- Enter your AWS Account ID.
- Region select
US East (N. Virginia)
. - Select an Interface by clicking on one to highlight it.
- VLAN ID use the
Auto
button to pick the next available VLAN ID (Note the VLAN ID, you'll need the VLAN ID later). - Max Bandwidth select
50 Mb/s
. - Internet2 IPv4 Address enter
10.255.255.234
and for the prefix enter30
. - Peer IPv4 Address enter
10.255.255.233
. - AWS ASN enter
65001
. - BGP Authentication Key enter
some_secret
. (Note: If you don't provide a key here AWS will and you will need to edit this connection to enter the AWS provided BGP Authentication key before BGP will come up.) - MTU at 1500 for our lab.
- (Optional) For the Remote Name you can enter a unique name.
- (Optional) Enter some details for the Notes.
- Set the Authoring State to
Live
. (Let's Go! This isn't production! 🚀)
- Press
Save
.
From within the AWS Console:
- Search for Direct Connect.
- Select the checkbox for the new connection and press
View details
. - On the next screen press
Accept
for the connection. - Wait until the State on the new connection changes from pending to available. (This will take a few minutes)
This is they layer2 component of the connection between the AWS infrastructure and the Internet2 infrastructure.
After the new connection shows as available:
- Select
Virtual Interfaces
in the left side bar. - Select
Create virtual interface
. - Select
Transit
under the Virtual interface type. - Enter a Virtual interface name like
tvif-1
. - In the Connection pull down select the DX Connection we accepted above ⬆️.
- In the Direct Connect gateway pull down select
dxgw-i2lab
. - Enter the VLAN ID you choose in the Insight Console for the next connection.
- Enter
55038
for the BGP ASN (of the Internet2 Virtual Router). - Expand the Additional settings section.
- Enter
10.255.255.234/30
for Your router peer ip. - Enter
10.255.255.233/30
for Amazon router peer IP. - Enter
some_secret
for the BGP authentication key. - Select
Create virtual interface
.
NOTE:
It typically take a while for the peering state and BGP status to show available. There must be a health check that periodically updates this status.
The VIF is the layer3 component of the connection between the AWS infrastructure and the Internet2 infrastructure.
Now that you built the DX connection and the DXGW peering we need to associate the Transit Gateway to the Direct Connect Gateway.
- Select
Transit Gateway
from the left sidebar. - Select the transit gateway and press
View details
. - Press the orange
Associate Direct Connect gateway
button. - Under Association settings/Direct Connect gateways select
dxgw-i2lab
. - Under Allowed prefixes enter
10.192.0.0/16
,10.192.1.0/24
, and10.192.0.240/28
. - Press the orange
Associate Direct Connect gateway
button.
NOTE:
This take a good long while, go ahead and move on to the next step and check back periodically.
This step was completed in the IaC code we used to provision the base resources for our lab environment in AWS. I documented this before finishing the terraform code and thought it was worth leaving here to help understand this networking component. If you wish to practice the workflow for this section you can comment out the code around lines 14-24 in lab/aws/6-tgw.tf. You will need to then do a terraform apply
and wait for the attachment to delete. (This could take a while, maybe 10 minutes.)
The final step for the AWS connectivity in this lab is to attach the transit gateway with the i2lab
VPC.
- In the AWS Console search or navigate to the VPC service.
- In the left side bar find the Transit Gateway section and select
Transit gateway attachments
. - Press the orange
Create transit gateway attachment
button. - Enter
tgw-att-1
for the Name tag. - Select the transit gateway in the Transit gateway ID pull down.
- Make sure the attachment type is set to VPC.
- Under the VPC attachment section, select the VPC in the VPC ID pull down menu.
- Under the Subnet IDs pull down select the subnet that include the name
tgw-i2lab
. - Press the orange
Create transit gateway attachment
button.
NOTE:
This take a good long while, go ahead and move on to another CSP and check back periodically.
Azure: Building an ExpressRoute (ER) Connection
The process of building ExpressRoute connections from Azure to Internet2 Insight Console begin in the Azure Portal.
- Navigate to the Azure ExpressRoute service.
- Press
Create ExpressRoute circuit
. - Fill in the configuration details:
- Choose your Subscription.
- Resource group choose
i2lab-rg
. - Resiliency select
Standard Resiliency
. - Region select
East US 2
. - Circuit Name enter
i2cc-lab
or similar. - Port type select
Provider
. - Peering location search
Washington DC
. - Provider select
Internet2
. - Bandwidth select
50Mbps
. - Leave SKU and Billing model set to the defaults of
Standard
andMetered
.
- Press
Review + create
. - On the next screen press
Create
. - This will take a minute or two but when it finished you can press
Go to resource
. - Under the new ExpressRoute resource you need the
Service Key
for Step 2, go ahead andcopy to clipboard
.
This portion of the circuit creation happens in the Internet2 Insight Console.
- Navigate to your Virtual Network Space (VNS) from Lab 1.
- Find the Virtual Router you created in Lab 1.
- Select
Add Peering using Azure ExpressRoute
. - Fill in the details:
Service Key
from Step 1 above.VLAN ID
. (Any ID will do for our lab.)- Internet2 IPv4 Address enter
10.255.255.242
. - IPv4 Prefix Length enter
30
. - Peer IPv4 Address enter
10.255.255.241
. - Leave BFD Enabled.
- (Optional) Change the Remote Name.
- (Optional) Input some notes about the connection.
- Set the Authoring State to
Live
and live dangerously!
- Press
Save
.
NOTE:
ExpressRoute service provides a second circuit for redundancy but we'll skip configuring that for the lab.
Using the Terraform plan in Lab 3 we already created a VNG resource named i2lab-vng
and public IP address for that service that is connected to the Gateway subnet in our i2lab VNet. Creating a VNG takes quite some time and was the primary motivators in using code to spin up some base resources otherwise I would have added a step to create the VNG.
- Navigate or search for the
i2lab-vng
resource or VNG service. - In the left menu bar for the
i2lab-vng
resource find Settings>Connections. - Press
+ Add
to start the connection creation. - Change Connection type from VNet-to-VNet to
ExpressRoute
. - Press
Next: Settings >
. - Enter the settings details:
- Resiliency choose
Standard Resiliency
. - Virtual network gateway choose
i2lab-vng
. - ExpressRoute circuit choose
i2cc-i2lab
.
- Resiliency choose
- Press
Review + create
. - Press
Create
.
Google: Building a Partner Interconnect Connection
The process of building a Partner Interconnect starts in the Google Cloud Console.
This step generates a pairing key that you use in Internet2 Insight Console. The pairing key is a unique key that lets a service provider identify and connect to your Virtual Private Cloud (VPC) network and associated Cloud Router. The Internet2 Console requires this key to complete the configuration of your VLAN attachment.
In the Google Cloud Console:
-
Use the menu to navigate to Network Connectivity > Interconnect.
-
Press
Create VLAN attachments
. -
Select
Partner Interconnect connection
. -
In the Encrypt interconnect section, select
Set up unencrypted Interconnect
. -
Press
Continue
. -
On the next screen select
I already have a service provider
. -
Fill in the Add VLAN attachments form:
- Redundancy select
Create a single VLAN
and pressContinue
in the pop up message box. - Network select
i2lab-vpc
. - Region select
us-east4 (North Virginia)
. - Cloud Router select
cr-i2lab
. - VLAN attachment name enter
i2cc-vlan
or similar. - (Optional) Description
- IP stack type select
IPv4 (single-stack)
. - Maximum transmission unit (MTU) choose
1460
. (Matches our prebuilt environment.)
- Redundancy select
-
Press
Create
. (Sometimes this action can take a minute or two to complete.) -
After creation is complete, copy the pairing key. (You will use these keys in the Internet2 Insight Console when you create the Google Partner Interconnect Connection.)
-
Pre-activate these VLAN attachments by selecting
Enable
. -
In the pop-up window choose
I UNDERSTAND,PRE-ACTIVATE
. -
Press
OK
.
- Navigate to your Virtual Network Space (VNS) from Lab 1.
- Find the Virtual Router you created in Lab 1.
- Select
Add Peering using Google Cloud Partner Interconnect
. - Enter the connection details:
- Pairing Key from the Google Cloud Console in Step 1 above.
- Region select
Equinix DC1-DC15, DC21 - Ashburn
. - Choose an Interface that has bandwidth available.
- VLAN ID use the
Auto
button to pick the next available VLAN ID. - Max Bandwidth select
50 Mb/s
. - IP Addressing You can completely skip the IP Addressing for the Internet2 and Peer. (This just gets overridden by Google.)
- Peer ASN enter
16550
. - (Optional) For the BGP Authentication Key enter
some_secret
. (Google won't force you to use a key here so for this lab you can leave this blank.) - (Optional) For the Remote Name you can enter a unique name.
- (Optional) Enter some details for the Notes.
- Set the Authoring State to
Live
and live dangerously!
- Press
Save
.
Oracle: Building a FastConnect Connection
Start in the Oracle Console
- Search or navigate to the FastConnect service.
- Press
Create FastConnect
- Choose FastConnect Partner and Single virtual circuit for the connection type and redundancy level.
- Press
Next
to continue. - Fill in virtual connection details:
- Name enter a name for the connection (e.g.,
i2lab-i2cc
). - Compartment select the compartment you created in Lab 3 (e.g.,
i2lab
). - Partner search for
Internet2: Internet2 L3
. - Virtual circuit type choose
Private Circuit
. - Traffic choose
All traffic
. - Dynamic routing gateway choose
drg-i2lab
. - Provisioned Bandwidth select
1Gbps
.
- Name enter a name for the connection (e.g.,
- Press
Create
. - Wait for the Oracle console page to refresh and show the new circuit.
- Select the new circuit and find the
OCID
for connection. Copy this value you need it for Step 2.
In the Oracle Console:
- Navigate to the DRG named
drg_i2lab
. - Under the Resources menu click on
Virtual circuit attachments
. - Click on the
Virtual circuit attachment
for the FastConnect circuit. - Press
Edit
on the attachment details page that follows. - In the Edit Attachment window under the Choose a DRG route table select
i2lab DRG Route Table
. - Press
Save changes
.
From Internet2 Insight Console
- Navigate to your Virtual Network Space (VNS) from Lab 1.
- Find the Virtual Router you created in Lab 1.
- Select
Add Peering using OCI FastConnect
. - Enter the connection details:
- FastConnect OCID paste the
OCID
from Step 1. - Interface > Filter by Region select
US East (Ashburn)
. - Interface > choose an available Interface.
- VLAN ID use the
Auto
button to pick the next available VLAN ID. - Max Bandwidth choose
1 GB/s
. - Internet2 IPv4 Address enter
10.255.255.250
and for the prefix enter30
. - Peer IPv4 Address enter
10.255.255.249
. - BGP Authentication Key enter
some_secret
. - MTU at 1500 for our lab.
- (Optional) Remote Name leave as is or modify.
- (Optional) Notes enter details about the connection.
- Set the Authoring State to
Live
. (Let's Go! This isn't production! 🚀)
- FastConnect OCID paste the
- Press
Save
.
Nice work!
At this point you've got the dedicated connectivity built to your cloud service providers.