SDEWAN AWS test nodus
ICN-SDWAN-Virginia AWS2
IPv4 Prefixes | Public IPv4 | Private IPv4 |
---|---|---|
ICN-SDWAN-Virginia-Eth1 | 3.211.4.230 | 10.20.0.232 |
ICN-SDWAN-Virginia-Eth0 | 34.230.111.156 | 10.20.0.23 |
ICN-SDWAN- California AWS5
IPv4 Prefixes | Public IPv4 | Private IPv4 |
---|---|---|
ICN-SDWAN-California-Eth1 | 54.177.9.32 | 172.16.182.169 |
ICN-SDWAN-California-Eth0 | 54.241.18.249 | 172.16.182.237 |
iptables -I POSTROUTING -d 172.17.0.2/32 -j SNAT –to-source 192.169.0.4 -t nat
iptables -I POSTROUTING -d 10.0.0.1/24 -j SNAT –to-source 10.8.0.1 -t nat
AWS2 eth1 MAC Address
0e:4e:31:15:1a:ed
0e:4e:31:15:1a:ed
1ip addr add 10.20.0.232/20 dev
1eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 0e:4e:31:15:1a:ed brd ff:ff:ff:ff:ff:ff inet 10.20.0.232/20 brd 10.20.15.255 scope global eth1 valid_lft forever preferred_lft forever inet6 fe80::c4e:31ff:fe15:1aed/64 scope link valid_lft forever preferred_lft forever
Open Switch
1# all in controller pod
2ovs-vsctl
3ovn-nbctl
Use Tmux
Connect to the Host
1ssh ubuntu@sdewan.sh.intel.com passwd: 123456
There are four windows of tmux for different SDEWAN cluster
1tmux a -t vpn
Use multispass
Connect to the Host
1ssh ubuntu@sdewan.sh.intel.com passwd: 123456
1# run the following command to enter different VM
2
3m shell vpn-overlay
4m shell vpn-hub
5m shell vpn-edge-1
6m shell vpn-edge-2
end
-
Form Virgina to California
Vigina California Protocol Result Protocal Result eth1(CNF) 3.211.4.230 54.177.9.32 ICMP PASS SSH(22) Failed eth0(Host) 34.230.111.156 54.177.9.32 ICMP PASS SSH(22) PASS -
From California to Virgina
California Vigina Protocol Result Protocal Result eth1(CNF) 54.177.9.32 3.211.4.230 ICMP PASS SSH(22) Failed eth0(Host) 54.241.18.249 3.211.4.230 ICMP PASS SSH(22) Failed
AWS3-Virginia
Interface | Public IP | Local IP |
---|---|---|
eth0 | 35.169.8.124 | 10.20.0.129 |
eth1 | 3.83.186.169 | 10.20.0.213 |
hhh
AWS4- California
Interface | Public IP | Local IP |
---|---|---|
eth0 | 54.215.142.138 | 172.16.182.54 |
eth1 | 50.18.65.42 | 172.16.182.149 |
About AWS IPsec Tunnel Test
Now we can successful create IPsec Tunnel between Two CNF on AWS VM located in different region. This verified the the possibility of using SDEWAN with Nodus in WAN.