Changes

no edit summary
Line 38: Line 38:  
Go to <b>Network > VLAN</b> section in device WebUI and perform following actions:
 
Go to <b>Network > VLAN</b> section in device WebUI and perform following actions:
 
*Create new <b>VLAN ID</b> by clicking <b>ADD</b> button.
 
*Create new <b>VLAN ID</b> by clicking <b>ADD</b> button.
*On <b>VLAN ID:</b> 1 (LAN interface), select Off</b> from drop-down list, on port that you want to use as VPLS connection.
+
*On <b>VLAN ID:</b> 1 (LAN interface), select Off from drop-down list, on port that you want to use as VPLS connection.
 
*On newly created VLAN ID (3 in this example), from drop-down list, select <b>Untagged</b>, on same port.
 
*On newly created VLAN ID (3 in this example), from drop-down list, select <b>Untagged</b>, on same port.
 
*After performing these actions press <b>Save & Apply</b> in VLAN settings.
 
*After performing these actions press <b>Save & Apply</b> in VLAN settings.
Line 82: Line 82:     
==Configure General settings OSPF Protocol==
 
==Configure General settings OSPF Protocol==
 +
 +
Go to <b>Network > Routing > Dynamik Routes > OSPF</b> WebUI section.
    
*Enable OSPF instance on check bar.
 
*Enable OSPF instance on check bar.
Line 110: Line 112:     
==Configure OSPF Networks==
 
==Configure OSPF Networks==
 +
[[File:OSPF via VPLS and ZerotierVPN OSPF Networks.png|left|frame]]
 +
 +
 +
 +
 +
 +
 +
 +
 +
   −
IMG*
      
Add 2 new instance with <b>VPLS</b> and <b>Zerotier</b> subnet for broadcast OSPF flags on this networks.
 
Add 2 new instance with <b>VPLS</b> and <b>Zerotier</b> subnet for broadcast OSPF flags on this networks.
Line 117: Line 128:     
==Checking the functionality of the architecture==
 
==Checking the functionality of the architecture==
 +
 +
 
Connect to device via SSH and press command “vtysh”
 
Connect to device via SSH and press command “vtysh”
 +
[[File:OSPF via VPLS and ZerotierVPN Test vtysh.png|left|frame]]
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
   −
IMG*
      
Check OSPF neighbor device with command “<b>show ip ospf neighbor</b>”
 
Check OSPF neighbor device with command “<b>show ip ospf neighbor</b>”
 +
[[File:OSPF via VPLS and ZerotierVPN Test OSPF neighbor.png|left|frame]]
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
   −
IMG*
      
The figure above shows all the neighbors that we managed to contact via OSPF, as we can see, routers with addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4 neighbor on the eth0.3 interface, that is, the VPLS interface.
 
The figure above shows all the neighbors that we managed to contact via OSPF, as we can see, routers with addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4 neighbor on the eth0.3 interface, that is, the VPLS interface.
Line 129: Line 169:     
Check routes via command “show ip route”
 
Check routes via command “show ip route”
 +
[[File:OSPF via VPLS and ZerotierVPN Test route.png|left|alt=|frame]]
 +
   −
IMG*
      
The figure below shows the routing table, according to which we can see that we have received routes from routers with which OSPF neighbors (192.168.10.0/24.192.168.100.0/24.192.168.200.0/24.)
 
The figure below shows the routing table, according to which we can see that we have received routes from routers with which OSPF neighbors (192.168.10.0/24.192.168.100.0/24.192.168.200.0/24.)
Line 136: Line 177:     
Finally route trace test. Connect client(you notebook) to router, and get address via DHCP, in test we see what computer get address 192.168.200.236 and we make tracert to server with another addresses ( 10.127.0.254 )
 
Finally route trace test. Connect client(you notebook) to router, and get address via DHCP, in test we see what computer get address 192.168.200.236 and we make tracert to server with another addresses ( 10.127.0.254 )
 +
[[File:OSPF via VPLS and ZerotierVPN Test traceroute.png|alt=|left|frame]]
 +
<br>
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
   −
IMG*
     −
If we make trace we see all hops, Gateway 192.168.200.1 on side 192.168.200.1,  
+
If we make trace we see all hops, Gateway 192.168.200.1 on side 192.168.200.1, VPLS interface routers on side 10.127.0.1/24 and last hop its endpoint (10.127.0.254)
VPLS interface routers on side 10.127.0.1/24 and last hop its endpoint (10.127.0.254)
 

Navigation menu