Aruba SD-Branch from scratch - Part 2 - BGW

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • The second video of the video series about deploying Aruba’s SD-Branch solution from scratch. This video covers the configuration of Branch location on a Group/device level, as well performing the ZTP process of Branch Gateway and validating the configuration.
    Do you want to know what happened between configuring the BGW and the appearance of the BGW in Central? Check out this video of the ZTP console output of 9004 BGW:
    Excited? Get yourself started with Aruba Central and try for yourself: www.arubanetwo...

Комментарии • 11

  • @MsFerodriguess
    @MsFerodriguess 4 года назад

    Good video!

  • @catthypace
    @catthypace Год назад

    How do the Branch1-BGW1 will get a DHCP IP from the Internet Provider if Provider do not DHCP pool on their router?

  • @vichitiranal7447
    @vichitiranal7447 Год назад

    If any possibility to use other vendor device as a gateway (velocloud sd-wan box) instead of our Aruba gateway

  • @wouayni
    @wouayni 4 года назад

    is the BGW set-up the same with the VPNC set up? do you have an in depth video for VPNC?

    • @mpompe2821
      @mpompe2821 4 года назад

      The VPNC set-up is mostly the same. The process of configuring and deploying the VPNC's will be covered in the next video :).

  • @zenventi
    @zenventi 3 года назад

    when doing the reboot of the branch gateway, can we continue to do the configuration while it's rebooting or we have to wait for the gateway to be back online to continue with the configuration?

    • @johnschaap5905
      @johnschaap5905 3 года назад

      You can keep on doing configuration work while the gateway reboots and it will synchronize again with Central after the reboot completes and control channel to Central is re-established.

  • @NedzadDzafic
    @NedzadDzafic 4 года назад

    So where/how would you apply the acl to deny traffic between specific vlans?

    • @mpompe2821
      @mpompe2821 4 года назад +2

      The recommended way is: Create a session ACL -> Apply ACL into Role -> Apply role as Initial Role in a AAA-Profile for a VLAN. Then make the VLAN untrusted and attach the AAA-Profile to that vlan under 'Security -> Apply Policy'.

  • @brianfleck8447
    @brianfleck8447 4 года назад

    Do not recommend putting a 2nd static default GW for MPLS link, should use static route with nexthop gateway.

    • @mpompe2821
      @mpompe2821 4 года назад

      Currently, in order to enable automatic orchestration of the VPN tunnel, a default gateway must be set. The MPLS VPN tunnels will not be established if the BGW can reach the VPNC with the use of a static route. If there is no internet connectivity for the MPLS link the cost could be set higher, like a floating route.