Posts Tagged ‘csr1000v’

Dec
04

Click here to download the INE VIRL topology and initial configs

After long anticipation, Cisco’s Virtual Internet Routing Lab (VIRL) is now publicly available. VIRL is a network design and simulation environment that includes a GNS3-like frontend GUI to visually build network topologies, and an OpenStack based backend which includes IOSv, IOS XRv, NX-OSv, & CSR1000v software images that run on the built-in hypervisor. In this post I’m going to outline how you can use VIRL to prepare for the CCIE Routing & Switching Version 5.0 Lab Exam in conjunction with INE’s CCIE RSv5 Advanced Technologies Labs.

The first step of course is to get a copy of VIRL. VIRL is currently available for purchase from virl.cisco.com in two forms, a “Personal Edition” for a $200 annual license, and an “Academic Version” for an $80 annual license. Functionally these two versions are the same. Next is to install VIRL on a hypervisor of your choosing, such as VMWare ESXi, Fusion, or Player. Make sure to follow the installation guides in the VIRL documentation, because the install is not a very straightforward process. When installing it on VMWare Player I ran into a problem with the NTPd not syncing, which resulted in the license key not being able to register. In my case I had to edit the /etc/ntp.conf file manually to specify a new NTP server, which isn’t listed as a step in the current install guide. If you run into problems during install check the VIRL support community, as it’s likely that someone has already run into your particular install issue, and a workaround may be listed there.

Once VIRL and VM Maestro (the GUI frontend) is up and running, the next step is to build your topology. For the INE CCIE RSv5 Advanced Technology Labs, this topology will be 10 IOS or IOS XE instances that are connected to a single vSwitch. All you need to do to build this is to add the 10 IOS instances, and then connect them all to a single “Multipoint Connection”. Logical network segments will then later be built based on the initial configurations that you load on the routers for a specific lab. The end result of the topology should look something like this:

You may also want to add some basic customization to the topology file and the VM Maestro interface. I set the hostnames of the devices to R1 – R10 by clicking on the router icon, then setting the “Name” under the Properties tab.

Next under the File > Preferences > Terminal > Cisco Terminal you can set the options to use your own terminal software instead of the built in one. In my case I set the “Title format” variable to “%s”, which makes it show just the hostname in the SecureCRT tab, and set the “Telnet command” to “C:\Program Files\VanDyke Software\SecureCRT\SecureCRT.exe /T /N %t /TELNET %h %p”, which makes it spawn a SecureCRT tabbed window when I want to open the CLI to the routers. Your options of course may vary depending on your terminal software and its install location.

Next, click the “Launch Simulation” button on the topology to start the routers. Assuming everything is correct with your install, and you have enough CPU & memory resources, the instances should boot and show the “ACTIVE” state, similar to what you see below:

If you right click on the device name you’ll see the option to telnet to the console port. Note that the port number changes every time you restart the simulation, so I found it easier just to launch the telnet sessions from here instead of creating manual sessions under the SecureCRT database.

You should now be able to connect to the consoles of the routers and see them boot, such as you see below:

R1 con0 is now available

Press RETURN to get started.

**************************************************************************
* IOSv is strictly limited to use for evaluation, demonstration and IOS  *
* education. IOSv is provided as-is and is not supported by Cisco's      *
* Technical Advisory Center. Any use or disclosure, in whole or in part, *
* of the IOSv Software or Documentation to any third party for any       *
* purposes is expressly prohibited except as otherwise authorized by     *
* Cisco in writing.                                                      *
**************************************************************************
R1>
R1>enable
R1#show version
Cisco IOS Software, IOSv Software (VIOS-ADVENTERPRISEK9-M), Experimental Version 15.4(20141119:013030) [jsfeng-V154_3_M 107]
Copyright (c) 1986-2014 by Cisco Systems, Inc.
Compiled Tue 18-Nov-14 20:30 by jsfeng

ROM: Bootstrap program is IOSv

R1 uptime is 46 minutes
System returned to ROM by reload
System image file is "flash0:/vios-adventerprisek9-m"
Last reload reason: Unknown reason

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

Cisco IOSv (revision 1.0) with  with 484729K/37888K bytes of memory.
Processor board ID 9B2DD0A36JBLXZY7SLJTF
2 Gigabit Ethernet interfaces
DRAM configuration is 72 bits wide with parity disabled.
256K bytes of non-volatile configuration memory.
2097152K bytes of ATA System CompactFlash 0 (Read/Write)
0K bytes of ATA CompactFlash 1 (Read/Write)
0K bytes of ATA CompactFlash 2 (Read/Write)
1008K bytes of ATA CompactFlash 3 (Read/Write)

Configuration register is 0x0

R1#

With this basic topology you should have the 10 IOSv instances connected on their Gig0/1 interface to the same segment. The Gig0/0 interface is used for scripting inside the VIRL application, and can be shutdown for our purposes. The end result after the images boot should be something similar to this:

R1#show cdp neighbor
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
                  D - Remote, C - CVTA, M - Two-port Mac Relay 

Device ID        Local Intrfce     Holdtme    Capability  Platform  Port ID
R9.openstacklocal
                 Gig 0/1           177              R B   IOSv      Gig 0/1
R8.openstacklocal
                 Gig 0/1           167              R B   IOSv      Gig 0/1
R3.openstacklocal
                 Gig 0/1           155              R B   IOSv      Gig 0/1
R2.openstacklocal
                 Gig 0/1           177              R B   IOSv      Gig 0/1
R7.openstacklocal
                 Gig 0/1           156              R B   IOSv      Gig 0/1
R6.openstacklocal
                 Gig 0/1           146              R B   IOSv      Gig 0/1
R5.openstacklocal
                 Gig 0/1           129              R B   IOSv      Gig 0/1
R4.openstacklocal
                 Gig 0/1           153              R B   IOSv      Gig 0/1
R10.openstacklocal
                 Gig 0/1           146              R B   IOSv      Gig 0/1

Total cdp entries displayed : 9

Next you can load your initial configs for the lab you want to work on, and you’re up and running! I’ve taken the liberty of converting the CSR1000v formatted initial configs for our Advanced Technologies Labs to the IOSv format, as the two platforms use different interface numbering. Click here to download these initial configs as well as the .virl topology file that I created.

For further discussions on this see the IEOC thread Building INE’s RSv5 topology on VIRL.

Tags: , , , , , ,

Apr
18

Below are the steps needed to get the CSR1000v working in VMware Fusion on a Mac. Before we look at the steps here is the hardware and software I used:

CSR1000v

CSR1000v

Basically you need a quad core machine with a hypervisor (VMware, Virtual Box, KVM, etc). I just used VMware Fusion as it’s a commonly used hypervisor. Additionally I used two USB NICs to map to the GigabitEthernet1 and GigabitEthernet2 interfaces inside the CSR1000v. You could use any NICs or even subinterfaces if you are using Linux (Mac OS does support VLANs but I personally have not tried it with VMware Fusion). The GigabitEthernet0 is the management interface that is associated with the “Mgmt-intf” VRF so I didn’t want to use it for the internal and internet facing interfaces.
Continue Reading

Tags: , ,

Apr
15

Once you have ESXi 5.1 up and running download the CSR1000v OVA (Open Virtualization Archive) file here. Note that you will need to use your Cisco CCO login to download. Once the download is complete you need to open your vSphere Client and connect to your ESXi server. Once connected select the Deploy OVF Template option from the file menu.

CSR1000v Installation

Select the source of the OVA file you downloaded from your local machine.

Continue Reading

Tags: ,

Apr
14

The Cloud Services Router, CSR1000v, which was first announced at Cisco Live in San Diego last year is now available for download. For those who have never heard of the CSR1000v, in a nutshell it’s an IOS XE image running in a virtualized environment (VMWare support now, Citrix XEN, Amazon, Windows Hypervisor and OpenStack in the near future). The CSR1000v is designed as a virtual router (think Quagga but IOS from Cisco) that resides on the hypervisor server as a client instance and provides any services a normal ASR1000 would provide between the other hypervisor’s client instances (Linux servers, Windows servers, etc) and the network infrastructure. This could be something as simple as basic routing or NAT all the way up to advanced technologies like MPLS VPNs or LISP. Basically anything that a real ASR1000 could provide you can do in the CSR1000v with a small exception. This early release only supports 50Mbps throughput due to licensing restrictions. This being the case the specifications from Cisco shows the CSR1000v being capable of pushing 1.17Gpbs max and 438Mbps throughput with an IMIX traffic flow. With the 50Mbps limit it means the CSR1000v at this stage would be deployed more for proof-of-concept as opposed to real production. At this time the throughput is limited by the licensing but I’m sure there are plans to allow for higher throughput licensing in the near future.

If you’re interested in a presentation from Cisco covering the CSR1000v you can view the Cisco Live session from London: Cisco’s Cloud Services Router (CSR 1000V): Extending the Enterprise Network to the Cloud (2013 London) Note that you will need to create an account if you don’t already have an account to view the session.

Continue Reading

Tags: , ,

Categories

CCIE Bloggers