This SD-WAN lab practical will show you how to Initialize vBond and Add in vManage. You can practice along with this practical using our SD-WAN virtual lab.

1. Configure the following system parameters on vBond (Login vBond via default username: admin and Password: admin)
Hostname: vBond
Organization: viptela sdwan
System-IP: 200.1.1.14
Site ID: 1
vBond Address: 200.1.1.4
Clock timezone Asia/Kolkata
2. Configure VPN0 on vBond with the following parameters
Interface: Ge0/0
IP address: 200.1.1.4/24
Tunnel Interface
Tunnel Services: (All, NetConf, SSHD)
Encapsulation: IPsec
Default route gateway: 200.1.1.1
3. Configure VPN512 on vBond with the following parameters
Interface: Eth0
IP address: 192.168.10.4/24
4. Add controller named “vBond” in vManage using vBond IP address 200.1.1.4 (username: admin and password: admin)
5. Generate the CSR for vBond in vManage
6. Request a certificate from CA-Server using this CSR and download the signed certificate
7. Install the signed certificate for vBond in vManage

Get the console access of vBond using default username “admin” and password “admin”

Now you can configure the basic configuration on vBond such as hostname, organization name, system-IP, etc. as per required in this lab tasks. Add a keyword local when specifying the vBond IP address because this device itself is a vBond.

Verify this system configuration on vBond on its running configuration

Now configure the parameters of VPN0 and VPN512 on vBond. vBond has Ge0/0 and Eth0 interfaces, configure Ge0/0 in VPN0 and Eth0 in VPN512 (this is also a default configuration)
Note: In the topology vBond interface Ge0/0 is depicted as Eth1 which provide layer 3 connectivity to HQ

Verify this configuration in the vBond running configuration of each VPN0 and VPN512


You can also check the interfaces IP address assigned to them

VPN512 is connected internally to all other SDWAN controllers including CA-Server (Window Server) in the subnet 192.168.10.0/24. Till now we have configured CA-Server, vManage and vBond so we should get the reachability to vManage and CA-Server from vBond.
If you are trying to ping CA-Server and vManage via VPN512 from vBond then ping using VPN512

Once you have the reachability to vManage from vBond, you can add vBond in vManage. Login to vManage from Windows Server (CA-Server) and navigate to Configuration->Devices-> Controllers-> Add Controllers and click on vBond

Here you provide the vBond IP address 200.1.1.4 (Management IP address), username “admin” and password “admin”. Also check on Generate CSR and click on Add

vBond has been added to vManage though none of the parameters are still blank

vBond CSR has been generated for vBond, to view the generated CSR navigate to Configuration->Certificates->Controllers->vBond->view CSR

Copy the CSR using CTL-A and CTL-V, this vBond CSR will be used to generate a certificate from CA-Server for vBond

Now browse the CA-Server (https://192.168.10.5/certsrv) and request a certificate

Click on Advance Certificate Request

Here you can paste CTL-V the copied CSR in the box and click on Submit

It will show the pending status however just browse the CA-Server again to retrieve the certificate

Now issue the certificate on CA-Server, open Server Manager-> Roles-> Active Directory Certificate Server-> CA-Server-> Pending Request-> More Actions-> All Tasks and click on Issue. This will now issue a certificate

You can now download the issued certificate, browse to CA-Server (http://192.168.10.5/certsrv)

On the next window, it shows the date and time of the saved certificate, click on it

Now here you select the Base64 encoding method and click on “Download Certificate” to download it

The folder where this file is downloaded and change its name to “vBond” just to have a meaningful name

Open this file in notepad and copy (CTLA + CTLC) the content of the file

Using this file, you can install the identity certificate for vBond on vManage, In vManage, navigate to Configuration-> Certificate-> Controller and click on top right corner on “Install Certificate”

It will open a certificate text area wherein you can paste CTL-V the earlier copied certificate from CA-Server for vBond and then click on install

The vBond certificate will be scheduled to be installed

In our case, the certificate installation is failed due to time mismatch between generate certificate and time on vBond

As seen below, current time is different from the clock time
Show system status command output


Note: You may see failure here due to current time (on vmange CLI run command “show system status”) and clock time (on vManage CLI run”show clock”) mismatch, adjust the time by setting clock using command “clock set date <> time <>”. You may have to set the clock 12 or more hours a head than standard time set by timezone Asia/Kolkata in all devices. This setting is required in all SDWAN Controllers (vManage, vBond and vSmart)
Once clock is set correctly, try to install the certificate again and it will be installed successfully.

Go back to the Configuration-> Certificates-> Controllers, you can see vBond certificate is installed and showing all the relevant details.

He is a senior solution network architect and currently working with one of the largest financial company. He has an impressive academic and training background. He has completed his B.Tech and MBA, which makes him both technically and managerial proficient. He has also completed more than 450 online and offline training courses, both in India and ...
More... | Author`s Bog | Book a Meeting