Changes

no edit summary
Line 112: Line 112:     
==Configure OSPF Networks==
 
==Configure OSPF Networks==
[[File:OSPF via VPLS and ZerotierVPN OSPF Networks.png|left|frame|alt=|border]]
+
[[File:OSPF via VPLS and ZerotierVPN OSPF Networks.png]]<br>Add 2 new instance with <b>VPLS</b> and <b>Zerotier</b> subnet for broadcast OSPF flags on this networks.
 
  −
 
  −
Add 2 new instance with <b>VPLS</b> and <b>Zerotier</b> subnet for broadcast OSPF flags on this networks.
   
After that press <b>Save & Apply.</b>
 
After that press <b>Save & Apply.</b>
 
+
== Checking the functionality of the architecture==
==Checking the functionality of the architecture==
      
Connect to device via SSH and press command “vtysh”
 
Connect to device via SSH and press command “vtysh”
[[File:OSPF via VPLS and ZerotierVPN Test vtysh.png|left|frame|alt=|border]]
+
[[File:OSPF via VPLS and ZerotierVPN Test vtysh.png]]<br>
   −
Check OSPF neighbor device with command “<b>show ip ospf neighbor</b>”
+
Check OSPF neighbor device with command “<b>show ip ospf neighbor</b>”[[File:OSPF via VPLS and ZerotierVPN Test OSPF neighbor.png]]<br>The figure above shows all the neighbors that we managed to contact via OSPF, as we can see, routers with addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4 neighbor on the eth0.3 interface, that is, the VPLS interface.
[[File:OSPF via VPLS and ZerotierVPN Test OSPF neighbor.png|left|frame|alt=|border]]
  −
 
  −
 
  −
The figure above shows all the neighbors that we managed to contact via OSPF, as we can see, routers with addresses 10.0.0.2, 10.0.0.3 and 10.0.0.4 neighbor on the eth0.3 interface, that is, the VPLS interface.
   
While the routers are 172.23.0.10, 172.23.0.30, 172.23.0.50 via the ztbto4jk6k interface, that is, via the Zerotier interface.
 
While the routers are 172.23.0.10, 172.23.0.30, 172.23.0.50 via the ztbto4jk6k interface, that is, via the Zerotier interface.
   −
Check routes via command “show ip route”
+
Check routes via command “show ip route”[[File:OSPF via VPLS and ZerotierVPN Test route.png]]<br>The figure below shows the routing table, according to which we can see that we have received routes from routers with which OSPF neighbors (192.168.10.0/24.192.168.100.0/24.192.168.200.0/24.)
[[File:OSPF via VPLS and ZerotierVPN Test route.png|left|alt=|frame|border]]
  −
 
  −
 
  −
The figure below shows the routing table, according to which we can see that we have received routes from routers with which OSPF neighbors (192.168.10.0/24.192.168.100.0/24.192.168.200.0/24.)
   
We also received default routes (0.0.0.0/0) from the routers on the back side, which will allow us to have backup internet connections in case the LTE connection on the site drops.
 
We also received default routes (0.0.0.0/0) from the routers on the back side, which will allow us to have backup internet connections in case the LTE connection on the site drops.
    
Finally route trace test. Connect client(you notebook) to router, and get address via DHCP, in test we see what computer get address 192.168.200.236 and we make tracert to server with another addresses ( 10.127.0.254 )
 
Finally route trace test. Connect client(you notebook) to router, and get address via DHCP, in test we see what computer get address 192.168.200.236 and we make tracert to server with another addresses ( 10.127.0.254 )
   −
[[File:OSPF via VPLS and ZerotierVPN Test traceroute.png|alt=|left|frame|border]]
+
[[File:OSPF via VPLS and ZerotierVPN Test traceroute.png]]<br>
<br>
  −
 
  −
 
      
If we make trace we see all hops, Gateway 192.168.200.1 on side 192.168.200.1, VPLS interface routers on side 10.127.0.1/24 and last hop its endpoint (10.127.0.254)
 
If we make trace we see all hops, Gateway 192.168.200.1 on side 192.168.200.1, VPLS interface routers on side 10.127.0.1/24 and last hop its endpoint (10.127.0.254)

Navigation menu