Skip to content

Latest commit

 

History

History
328 lines (248 loc) · 16.7 KB

lab5.md

File metadata and controls

328 lines (248 loc) · 16.7 KB

Lab 5: Building Dedicated Connections to the Cloud

Objective

Establish connectivity between the Internet2 Virtual Router, that you build in Lab 1, and the CSPs of your choice.

While some key components of dedicated connectivity have been provisioned with code in Lab 3, such as Azure VNG's, many key components or configuration steps haven't been provisioned. One of the primary objectives of this workshop was to understand the components necessary for dedicated connectivity with the various CSPs. While some of these steps are simple or quick to achieve using code I felt it was important to do many of these processes manually so you could see the components that connect together first hand.

Multicloud Routing Diagram

Multicloud routing diagram

IPv4 addressing plan for dedicated connections

This IPv4 addressing is used for the dedicated connections with each provider in the labs, except for Google. (Google assigns reserved link-local addressing from 169.254.0.0/16.) Dedicated Connection Addressing


AWS: Building a Hosted Direct Connect (DX) Connection

AWS Architecture

AWS Architecture

Step 1: Starting in the Internet2 Insight Console

  1. Navigate to your Virtual Network Space (VNS) from Lab 1
  2. Find the Virtual Router you created in Lab 1.
  3. Select Add Peering using AWS Direct Connect.
  4. In the Create Peering window fill in the details:
    • Enter your AWS Account ID.
    • Region select US East (N. Virginia).
    • Select an Interface by clicking on one to highlight it.
    • VLAN ID use the Auto button to pick the next available VLAN ID (Note the VLAN ID, you'll need the VLAN ID later).
    • Max Bandwidth select 50 Mb/s.
    • Internet2 IPv4 Address enter 10.255.255.234 and for the prefix enter 30.
    • Peer IPv4 Address enter 10.255.255.233.
    • AWS ASN enter 65001.
    • BGP Authentication Key enter some_secret. (Note: If you don't provide a key here AWS will and you will need to edit this connection to enter the AWS provided BGP Authentication key before BGP will come up.)
    • MTU at 1500 for our lab.
    • (Optional) For the Remote Name you can enter a unique name.
    • (Optional) Enter some details for the Notes.
    • Set the Authoring State to Live. (Let's Go! This isn't production! 🚀) AWS Peering Connection
  5. Press Save.

Step 2: Accept the Direct Connect Connection

From within the AWS Console:

  1. Search for Direct Connect.
  2. Select the checkbox for the new connection and press View details.
  3. On the next screen press Accept for the connection.
  4. Wait until the State on the new connection changes from pending to available. (This will take a few minutes)

This is they layer2 component of the connection between the AWS infrastructure and the Internet2 infrastructure.

Step 3: Configure AWS Direct Connect Gateway with a Transit VIF

After the new connection shows as available:

  1. Select Virtual Interfaces in the left side bar.
  2. Select Create virtual interface.
  3. Select Transit under the Virtual interface type.
  4. Enter a Virtual interface name like tvif-1.
  5. In the Connection pull down select the DX Connection we accepted above ⬆️.
  6. In the Direct Connect gateway pull down select dxgw-i2lab.
  7. Enter the VLAN ID you choose in the Insight Console for the next connection.
  8. Enter 55038 for the BGP ASN (of the Internet2 Virtual Router).
  9. Expand the Additional settings section.
  10. Enter 10.255.255.234/30 for Your router peer ip.
  11. Enter 10.255.255.233/30 for Amazon router peer IP.
  12. Enter some_secret for the BGP authentication key.
  13. Select Create virtual interface.

NOTE: It typically take a while for the peering state and BGP status to show available. There must be a health check that periodically updates this status. AWS DXGW Peering

The VIF is the layer3 component of the connection between the AWS infrastructure and the Internet2 infrastructure.

Step 4: Associate the TGW with the DXGW

Now that you built the DX connection and the DXGW peering we need to associate the Transit Gateway to the Direct Connect Gateway.

  1. Select Transit Gateway from the left sidebar.
  2. Select the transit gateway and press View details.
  3. Press the orange Associate Direct Connect gateway button.
  4. Under Association settings/Direct Connect gateways select dxgw-i2lab.
  5. Under Allowed prefixes enter 10.192.0.0/16,10.192.1.0/24, and 10.192.0.240/28.
  6. Press the orange Associate Direct Connect gateway button.

NOTE: This take a good long while, go ahead and move on to the next step and check back periodically.

Step 5: Attach the TGW with the i2lab VPC

This step was completed in the IaC code we used to provision the base resources for our lab environment in AWS. I documented this before finishing the terraform code and thought it was worth leaving here to help understand this networking component. If you wish to practice the workflow for this section you can comment out the code around lines 14-24 in lab/aws/6-tgw.tf. You will need to then do a terraform apply and wait for the attachment to delete. (This could take a while, maybe 10 minutes.)

The final step for the AWS connectivity in this lab is to attach the transit gateway with the i2lab VPC.

  1. In the AWS Console search or navigate to the VPC service.
  2. In the left side bar find the Transit Gateway section and select Transit gateway attachments.
  3. Press the orange Create transit gateway attachment button.
  4. Enter tgw-att-1 for the Name tag.
  5. Select the transit gateway in the Transit gateway ID pull down.
  6. Make sure the attachment type is set to VPC.
  7. Under the VPC attachment section, select the VPC in the VPC ID pull down menu.
  8. Under the Subnet IDs pull down select the subnet that include the name tgw-i2lab.
  9. Press the orange Create transit gateway attachment button.

Transit Gateway Attachment

NOTE: This take a good long while, go ahead and move on to another CSP and check back periodically.


Azure: Building an ExpressRoute (ER) Connection

Azure Architecture

Azure Architecture

Step 1: Create ExpressRoute circuit

The process of building ExpressRoute connections from Azure to Internet2 Insight Console begin in the Azure Portal.

  1. Navigate to the Azure ExpressRoute service.
  2. Press Create ExpressRoute circuit.
  3. Fill in the configuration details:
    • Choose your Subscription.
    • Resource group choose i2lab-rg.
    • Resiliency select Standard Resiliency.
    • Region select East US 2.
    • Circuit Name enter i2cc-lab or similar.
    • Port type select Provider.
    • Peering location search Washington DC.
    • Provider select Internet2.
    • Bandwidth select 50Mbps.
    • Leave SKU and Billing model set to the defaults of Standard and Metered. Create ExpressRoute
  4. Press Review + create.
  5. On the next screen press Create.
  6. This will take a minute or two but when it finished you can press Go to resource.
  7. Under the new ExpressRoute resource you need the Service Key for Step 2, go ahead and copy to clipboard.

Step 2: Create the ExpressRoute Provisioning Request

This portion of the circuit creation happens in the Internet2 Insight Console.

  1. Navigate to your Virtual Network Space (VNS) from Lab 1.
  2. Find the Virtual Router you created in Lab 1.
  3. Select Add Peering using Azure ExpressRoute. Azure peering
  4. Fill in the details:
    • Service Key from Step 1 above.
    • VLAN ID. (Any ID will do for our lab.)
    • Internet2 IPv4 Address enter 10.255.255.242.
    • IPv4 Prefix Length enter 30.
    • Peer IPv4 Address enter 10.255.255.241.
    • Leave BFD Enabled.
    • (Optional) Change the Remote Name.
    • (Optional) Input some notes about the connection.
    • Set the Authoring State to Live and live dangerously! Azure Peering Connection
  5. Press Save.

NOTE: ExpressRoute service provides a second circuit for redundancy but we'll skip configuring that for the lab.

Step 3: Create Connection between ExpressRoute and VPN Gateway (VNG)

Using the Terraform plan in Lab 3 we already created a VNG resource named i2lab-vng and public IP address for that service that is connected to the Gateway subnet in our i2lab VNet. Creating a VNG takes quite some time and was the primary motivators in using code to spin up some base resources otherwise I would have added a step to create the VNG.

  1. Navigate or search for the i2lab-vng resource or VNG service.
  2. In the left menu bar for the i2lab-vng resource find Settings>Connections.
  3. Press + Add to start the connection creation.
  4. Change Connection type from VNet-to-VNet to ExpressRoute. ER to VNG Connection
  5. Press Next: Settings >. VNG Connection Settings
  6. Enter the settings details:
    • Resiliency choose Standard Resiliency.
    • Virtual network gateway choose i2lab-vng.
    • ExpressRoute circuit choose i2cc-i2lab.
  7. Press Review + create.
  8. Press Create.

Google: Building a Partner Interconnect Connection

Creating a VLAN attachment for a Partner Interconnect connection

The process of building a Partner Interconnect starts in the Google Cloud Console.

Google Cloud Architecture

Google Cloud Architecture

This step generates a pairing key that you use in Internet2 Insight Console. The pairing key is a unique key that lets a service provider identify and connect to your Virtual Private Cloud (VPC) network and associated Cloud Router. The Internet2 Console requires this key to complete the configuration of your VLAN attachment.

Step 1: Create the Interconnect attachment

In the Google Cloud Console:

  1. Use the menu to navigate to Network Connectivity > Interconnect.

  2. Press Create VLAN attachments.

  3. Select Partner Interconnect connection.

  4. In the Encrypt interconnect section, select Set up unencrypted Interconnect.

  5. Press Continue.

  6. On the next screen select I already have a service provider.

  7. Fill in the Add VLAN attachments form:

    • Redundancy select Create a single VLAN and press Continue in the pop up message box.
    • Network select i2lab-vpc.
    • Region select us-east4 (North Virginia).
    • Cloud Router select cr-i2lab.
    • VLAN attachment name enter i2cc-vlan or similar.
    • (Optional) Description
    • IP stack type select IPv4 (single-stack).
    • Maximum transmission unit (MTU) choose 1460. (Matches our prebuilt environment.) Add VLAN attachment
  8. Press Create. (Sometimes this action can take a minute or two to complete.)

  9. After creation is complete, copy the pairing key. (You will use these keys in the Internet2 Insight Console when you create the Google Partner Interconnect Connection.) Pairing keys

  10. Pre-activate these VLAN attachments by selecting Enable.

  11. In the pop-up window choose I UNDERSTAND,PRE-ACTIVATE.

  12. Press OK.

Step 2: Create the Internet2 Interconnect to Google Cloud

  1. Navigate to your Virtual Network Space (VNS) from Lab 1.
  2. Find the Virtual Router you created in Lab 1.
  3. Select Add Peering using Google Cloud Partner Interconnect.
  4. Enter the connection details:
    • Pairing Key from the Google Cloud Console in Step 1 above.
    • Region select Equinix DC1-DC15, DC21 - Ashburn.
    • Choose an Interface that has bandwidth available.
    • VLAN ID use the Auto button to pick the next available VLAN ID.
    • Max Bandwidth select 50 Mb/s.
    • IP Addressing You can completely skip the IP Addressing for the Internet2 and Peer. (This just gets overridden by Google.)
    • Peer ASN enter 16550.
    • (Optional) For the BGP Authentication Key enter some_secret. (Google won't force you to use a key here so for this lab you can leave this blank.)
    • (Optional) For the Remote Name you can enter a unique name.
    • (Optional) Enter some details for the Notes.
    • Set the Authoring State to Live and live dangerously! Google Peering Connection
  5. Press Save.

Oracle: Building a FastConnect Connection

Oracle Cloud Architecture

Oracle Cloud Architecture

Step 1: Create the FastConnect Connection-

Start in the Oracle Console

  1. Search or navigate to the FastConnect service.
  2. Press Create FastConnect
  3. Choose FastConnect Partner and Single virtual circuit for the connection type and redundancy level. Create FastConnect
  4. Press Next to continue.
  5. Fill in virtual connection details:
    • Name enter a name for the connection (e.g., i2lab-i2cc).
    • Compartment select the compartment you created in Lab 3 (e.g., i2lab).
    • Partner search for Internet2: Internet2 L3.
    • Virtual circuit type choose Private Circuit.
    • Traffic choose All traffic.
    • Dynamic routing gateway choose drg-i2lab.
    • Provisioned Bandwidth select 1Gbps.FastConnect settings
  6. Press Create.
  7. Wait for the Oracle console page to refresh and show the new circuit.
  8. Select the new circuit and find the OCID for connection. Copy this value you need it for Step 2.

Step 2: Associate the FastConnect Virtual Circuit to the i2lab routing table

In the Oracle Console:

  1. Navigate to the DRG named drg_i2lab.
  2. Under the Resources menu click on Virtual circuit attachments.
  3. Click on the Virtual circuit attachment for the FastConnect circuit. Virtual Circuit Attachments
  4. Press Edit on the attachment details page that follows.
  5. In the Edit Attachment window under the Choose a DRG route table select i2lab DRG Route Table.
  6. Press Save changes.

Step 3: Create the FastConnect connection in Insight Console

From Internet2 Insight Console

  1. Navigate to your Virtual Network Space (VNS) from Lab 1.
  2. Find the Virtual Router you created in Lab 1.
  3. Select Add Peering using OCI FastConnect.
  4. Enter the connection details:
    • FastConnect OCID paste the OCID from Step 1.
    • Interface > Filter by Region select US East (Ashburn).
    • Interface > choose an available Interface.
    • VLAN ID use the Auto button to pick the next available VLAN ID.
    • Max Bandwidth choose 1 GB/s.
    • Internet2 IPv4 Address enter 10.255.255.250 and for the prefix enter 30.
    • Peer IPv4 Address enter 10.255.255.249.
    • BGP Authentication Key enter some_secret.
    • MTU at 1500 for our lab.
    • (Optional) Remote Name leave as is or modify.
    • (Optional) Notes enter details about the connection.
    • Set the Authoring State to Live. (Let's Go! This isn't production! 🚀) FastConnect Peering Details
  5. Press Save.

Nice work!

At this point you've got the dedicated connectivity built to your cloud service providers.