In Lab 1: SD-WAN Device Bring Up, participants typically focus on the initial deployment and configuration of SD-WAN (Software-Defined Wide Area Network) devices. This lab involves bringing up SD-WAN devices, which could be edge routers or appliances, and connecting them to the SD-WAN fabric. Participants may perform tasks such as provisioning device interfaces, establishing connectivity with the SD-WAN controller, and configuring basic parameters like IP addresses and routing protocols. The lab often includes the verification of device connectivity, ensuring that the SD-WAN devices are successfully integrated into the overall network infrastructure. Through Lab 1, participants gain hands-on experience in the foundational steps of deploying SD-WAN, setting the stage for more advanced configurations and optimizations in subsequent labs.
This Lab was developed on Cisco SD-WAN cloud routers and controllers running on software version 19.3.0 and IOS Routers running on version 15.0.

viptela 19.3.0
vmanage login: admin
Password:
Welcome to Viptela CLI
admin connected from 127.0.0.1 using console on vmanage
vmanage# conf
Entering configuration mode terminal
vmanage(config)# system
vmanage(config-system)# system-ip 123.123.123.123
vmanage(config-system)# site-id 123
vmanage(config-system)# organization-name "rstforum"
vmanage(config-system)# vbond 200.0.3.200
vmanage(config-system)# vpn 0
vmanage(config-vpn-0)# no interface eth0
vmanage(config-vpn-0)# interface eth1
vmanage(config-interface-eth1)# ip add 200.0.5.123/24
vmanage(config-interface-eth1)# tunnel-interface
vmanage(config-tunnel-interface)# exit
vmanage(config-interface-eth1)# no shut
vmanage(config-interface-eth1)# ip route 0.0.0.0/0 200.0.5.10
vmanage(config-vpn-0)# vpn 512
vmanage(config-vpn-512)# interface eth0
vmanage(config-interface-eth0)# ip add 10.0.0.123/24
vmanage(config-interface-eth0)# no shut
vmanage(config-interface-eth0)# commit and-quit
Commit complete.
vmanage#
vmanage#
vmanage# vshell
vmanage:~$ openssl genrsa -out ROOTCA.key 2048
Generating RSA private key, 2048 bit long modulus
……………..
……………………
e is 65537 (0x10001)
vmanage:~$
vmanage:~$
vmanage:~$ openssl req -x509 -new -nodes -key ROOTCA.key -sha256 -days 2000 -subj "/C=IN/ST=MH/L=MH/O=rstforum/CN=vmanage.lab" -out ROOTCA.pem
vmanage:~$
vmanage:~$
vmanage:~$ cat ROOTCA.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
vmanage:~$
Add organization name “rstforum”, vbond ip “200.0.3.200” and Edit Controller Certificate Authorization and select “Enterprise” and then paste all the content copied from Step 4 and then click and import.

Now navigate back to vshell and sign the CSR.
vmanage:~$ openssl x509 -req -in vmanage\_csr -CA ROOTCA.pem -CAkey ROOTCA.key -CAcreateserial -out vmanage.crt -days 2000 -sha256
Signature ok
subject=/C=US/ST=California/L=San Jose/OU=rstforum/O=Viptela LLC/CN=vmanage-04af6304-7935-433f-aac1-5b2afd9d883e-2.viptela.com/emailAddress=support@viptela.com
Getting CA Private Key
vmanage:~$
vmanage:~$ cat vmanage.crt
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
vmanage:~$
viptela 19.3.0
vedge login: admin
Password:
Welcome to Viptela CLI
admin connected from 127.0.0.1 using console on vedge
vedge#
vedge# conf
Entering configuration mode terminal
vedge(config)# system
vedge(config-system)# host-name vbond
vedge(config-system)# system-ip 200.200.200.200
vedge(config-system)# site-id 123
vedge(config-system)# organization-name "rstforum"
vedge(config-system)# vbond 200.0.3.200 local vbond-only
vedge(config-system)# vpn 0
vedge(config-vpn-0)# interface ge0/0
vedge(config-interface-ge0/0)# no tunnel-interface
vedge(config-interface-ge0/0)# ip add 200.0.3.200/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# ip route 0.0.0.0/0 200.0.3.10
vedge(config-vpn-0)# vpn 512
vedge(config-vpn-512)# interface eth0
vedge(config-interface-eth0)# ip add 10.0.0.200/24
vedge(config-interface-eth0)# no shut
vedge(config-interface-eth0)# commit and
Commit complete.
vbond#
Go to Configuration > Devices > Controllers > Add Controllers > vBond.
vBond IP = 200.0.3.200, Username = admin, Password = admin and let the Generate CSR be ticked and click add.
vmanage:~$
vmanage:~$ vim vbond.csr
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
~
~
~
:wq!
vmanage:~$ openssl x509 -req -in vbond.csr -CA ROOTCA.pem -CAkey ROOTCA.key -CAcreateserial -out vbond.crt -days 2000 -sha256
Signature ok
subject=/C=US/ST=California/L=San Jose/OU=rstforum/O=Viptela LLC/CN=vbond-6b102286-ee19-4a19-91f1-323343cd4e96-0.viptela.com/emailAddress=support@viptela.com
Getting CA Private Key
vmanage:~$ cat vbond.crt
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
vmanage:~$
vbond# conf t
Entering configuration mode terminal
vbond(config)# vpn 0
vbond(config-vpn-0)# interface ge0/0
vbond(config-interface-ge0/0)# tunnel-interface
vbond(config-tunnel-interface)# encapsulation ipsec
vbond(config-tunnel-interface)# exit
vbond(config-interface-ge0/0)# no shutdown
vbond(config-interface-ge0/0)# commit and-quit
Commit complete.
vbond#
viptela 19.3.0
vsmart login: admin
Password:
Welcome to Viptela CLI
admin connected from 127.0.0.1 using console on vsmart
vsmart#
vsmart# config
Entering configuration mode terminal
vsmart(config)# system
vsmart(config-system)# system-ip 100.100.100.100
vsmart(config-system)# site-id 123
vsmart(config-system)# organization-name "rstforum"
vsmart(config-system)# vbond 200.0.3.200
vsmart(config-system)# vpn 0
vsmart(config-vpn-0)# no interface eth0
vsmart(config-vpn-0)# interface eth1
vsmart(config-interface-eth1)# ip add 200.0.4.100/24
vsmart(config-interface-eth1)# no shut
vsmart(config-interface-eth1)# ip route 0.0.0.0/0 200.0.4.10
vsmart(config-vpn-0)# vpn 512
vsmart(config-vpn-512)# interface eth0
vsmart(config-interface-eth0)# ip add 10.0.0.100/24
vsmart(config-interface-eth0)# no shut
vsmart(config-interface-eth0)# commit and
Commit complete.
vsmart#
add details vSmart IP = 200.0.4.100 Username=admin Password=admin and let the Generate CSR be ticked and click add.
vmanage:~$ vim vsmart.csr
-----BEGIN CERTIFICATE REQUEST-----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Wq!
vmanage:~$ openssl x509 -req -in vsmart.csr -CA ROOTCA.pem -CAkey ROOTCA.key -CAcreateserial -out vsmart.crt -days 2000 -sha256
Signature ok
subject=/C=US/ST=California/L=San Jose/OU=rstforum/O=Viptela LLC/CN=vsmart-4d832eb5-b508-490f-a5cb-c3a79797ccca-2.viptela.com/emailAddress=support@viptela.com
Getting CA Private Key
vmanage:~$ cat vsmart.crt
-----BEGIN CERTIFICATE-----
NDEwWjCBxjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNV
BAcTCFNhbiBKb3NlMREwDwYDVQQLEwhyc3Rmb3J1bTEUMBIGA1UEChMLVmlwdGVs
YSBMTEMxQjBABgNVBAMTOXZzbWFydC00ZDgzMmViNS1iNTA4LTQ5MGYtYTVjYi1j
M2E3OTc5N2NjY2EtMi52aXB0ZWxhLmNvbTEiMCAGCSqGSIb3DQEJARYTc3VwcG9y
dEB2aXB0ZWxhLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkF
bL+zO/YI4MWaLfZUWidYUOdvi5Wsz4KGOUuAxfSt57r1uLYt5cKhOLJfE7QWmlkk
NvTt4PoxmNAlPIcBkMBwBdKT/3mtsnPiiejFlkI1mOZDgRpV7Rx8wTYj0QIypTvG
yCys6269J+xvGr2i2jQl8BV8SZZoCbIz+R+p/CY3D35uRoKmujZbGC6akZO2WSlk
IrckH1eirLvzU4Lb1CH86265VI5gjSBw/yOmAF/Ujt0q3adkT4FvHZQK+p6wyshH
vPASGyb+hKIzskf5k4jije4G04BsEF116/mLw8pC1pDXwc54m6kcjTd/nEPQAq82
AOcGn7F/QJqy/mNDt+kCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAXYVtugeo6FjR
-----END CERTIFICATE-----
vmanage:~$
vsmart# config
Entering configuration mode terminal
vsmart(config)# vpn 0
vsmart(config-vpn-0)# interface eth1
vsmart(config-interface-eth1)# tunnel-interface
vsmart(config-tunnel-interface)# exit
vsmart(config-interface-eth1)# no shutdown
vsmart(config-interface-eth1)# commit and-quit
Commit complete.
vsmart#

viptela 19.3.0
vedge login: admin
Password:
Welcome to Viptela CLI
admin connected from 127.0.0.1 using console on vedge
vedge# config
Entering configuration mode terminal
vedge(config)# system
vedge(config-system)# system-ip 150.0.0.1
vedge(config-system)# site-id 1
vedge(config-system)# organization-name "rstforum"
vedge(config-system)# vbond 200.0.3.200
vedge(config-system)# vpn 0
vedge(config-vpn-0)# no interface ge0/1
vedge(config-vpn-0)# interface ge0/0
vedge(config-interface-ge0/0)# ip add 200.0.0.1/24
vedge(config-interface-ge0/0)# no shut
vedge(config-interface-ge0/0)# tunnel-interface
vedge(config-tunnel-interface)# encapsulation ipsec
vedge(config-tunnel-interface)# allow-service all
vedge(config-tunnel-interface)# no shut
vedge(config-tunnel-interface)# ip route 0.0.0.0/0 200.0.0.10
vedge(config-vpn-0)# vpn 1
vedge(config-vpn-1)# interface ge0/1
vedge(config-interface-ge0/1)# ip add 100.0.0.10/24
vedge(config-interface-ge0/1)# no shut
vedge(config-interface-ge0/1)# vpn 512
vedge(config-vpn-512)# interface eth0
vedge(config-interface-eth0)# ip add 10.0.0.11/24
vedge(config-interface-eth0)# no shut
vedge(config-interface-eth0)# commit and
Commit complete.
vedge#
now Upload the serial file acquired from Cisco Smart account Portal and check the box “Validate the uploaded vEdge list ….”
NOTE** if using KVM select Cloud-Init and For VMWare use Encoded String.
vedge# request root-cert-chain install vpn 512 scp://admin@10.0.0.123:/home/admin/ROOTCA.pem
vedge# request vedge-cloud activate chassis-number 2d65e5a0-ffe4-ee4e-XXXX-XXXXXXXXXX token a38892fd6310f07c5XXXXXXXXXXXX
vedge# **show ip route**
Codes Proto-sub-type:
IA -> ospf-intra-area, IE -> ospf-inter-area,
E1 -> ospf-external1, E2 -> ospf-external2,
N1 -> ospf-nssa-external1, N2 -> ospf-nssa-external2,
e -> bgp-external, i -> bgp-internal
Codes Status flags:
F -> fib, S -> selected, I -> inactive,
B -> blackhole, R -> recursive
PROTOCOL NEXTHOP NEXTHOP NEXTHOP
VPN PREFIX PROTOCOL SUB TYPE IF NAME ADDR VPN TLOC IP COLOR ENCAP STATUS
---------------------------------------------------------------------------------------------------------------------------------------------
0 150.0.0.1/32 connected - system - - - - - F,S
0 200.0.0.0/24 connected - ge0/0 - - - - - F,S
1 100.0.0.0/24 connected - ge0/1 - - - - - F,S
512 10.0.0.0/24 connected - eth0 - - - - - F,S
vedge# **show interface | tab**
IF IF IF TCP
AF ADMIN OPER TRACKER ENCAP SPEED MSS RX TX
VPN INTERFACE TYPE IP ADDRESS STATUS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX ADJUST UPTIME PACKETS PACKETS
----------------------------------------------------------------------------------------------
0 ge0/0 ipv4 200.0.0.1/24 Up Up NA null transport 1500 00:0c:29:a5:b7:d6 1000 full 1416 0:01:46:24 1 939
0 system ipv4 150.0.0.1/32 Up Up NA null loopback 1500 00:00:00:00:00:00 0 full 1416 0:00:12:35 0 0
1 ge0/1 ipv4 100.0.0.10/24 Up Up NA null service 1500 00:0c:29:a5:b7:e0 1000 full 1416 0:00:12:29 2 7
512 eth0 ipv4 10.0.0.11/24 Up Up NA null service 1500 00:0c:29:a5:b7:cc 0 full 0 0:01:46:23 3058 811