Professional Documents
Culture Documents
George Liu
[1]
Agenda
• GNS3 Basics
• GNS3 Environment
• GNS3 with Vmworkstation Networking
• Demo Lab
• Other GNS3 Labs
• Internal Use -
Confidential [2]
GNS3 Basics
• Internal Use -
Confidential [3]
GNS3 Basics
• https://www.gns3.com/marketplace/appliances
• Internal Use -
Confidential [4]
GNS3 Basics - VMWorkstation
• Internal Use -
Confidential [5]
GNS3 Basics - VMWorkstation
• Internal Use -
Confidential [6]
GNS3 Basics - VMWorkstation
• GNS3 and appliances can be downloaded from GNS3 website for free
• First step after Vmworkstation installed and you are using your work
laptop to run GNS3 VM, start the virtual network editor to configure
your logical networks on your work laptop
– If you are connecting to remote server, you only need to ensure VMnet0 enabled
so that you can access the GNS3 VM hosted remotely. This will likely just be a
bridge interface to your local LAN
• Internal Use -
Confidential [7]
GNS3 Basics – Work Laptop - VMWorkstation
• Internal Use -
Confidential [8]
GNS3 Basics - VMWorkstation
• VMnet0 is by default the bridge interface to local LAN. You will only
see it when you click on change settings
• VMnet8 by default is NAT interface to local LAN. I never used this
option as I rather just used bridge to access local LAN/Internet. Of
course, if you run out of IP on your local LAN, then you can use this
option as traffic will be NATed by the local host interface
– Using this option traffic from local LAN cannot access devices off VMnet8
• Internal Use -
Confidential [9]
GNS3 Basics - VMWorkstation
• Internal Use -
Confidential [ 10 ]
GNS3 Basics - VMWorkstation
• Internal Use -
Confidential [ 11 ]
GNS3 Basics - VMWorkstation
• Internal Use -
Confidential [ 12 ]
GNS3 Enviroment
• Internal Use -
Confidential [ 13 ]
GNS3 Environment
• Internal Use -
Confidential [ 14 ]
GNS3 Environment
• Internal Use -
Confidential [ 15 ]
GNS3 Environment – BGP eVPN Lab
• Internal Use -
Confidential [ 16 ]
GNS3 Environment
• Internal Use -
Confidential [ 17 ]
GNS3 Environment
• Internal Use -
Confidential [ 18 ]
GNS3 Environment
• You can also connect to multiple GNS3 VM’s to spread the load across
multiple GNS3 VM’s. More on this later slide
• Internal Use -
Confidential [ 19 ]
GNS3 Environment
• After GNS3 VM boots up for first time, configure the IP address that
your laptop GNS3 client will connect on “remote option”.
• In my setup, I have 6 vmnet network adapters configured on GNS3
VM running in VMworkstation.
– This may be slightly different for example if GNS3 VM hosted on ESXi as there is
no concept of Vmnet when running GNS3 VM in ESXi
• Internal Use -
Confidential [ 20 ]
GNS3 Environment
• Internal Use -
Confidential [ 21 ]
GNS3 Environment
• Internal Use -
Confidential [ 22 ]
GNS3 Environment
• Internal Use -
Confidential [ 23 ]
GNS3 Environment
• Internal Use -
Confidential [ 24 ]
GNS3 Environment
• Internal Use -
Confidential [ 25 ]
GNS3 Environment
• By default, any additional adapters beyond the 3 network adapter you add
will show up on the ifconfig output in the GNS3 VM but the ports will be in
down state
• Internal Use -
Confidential [ 26 ]
GNS3 Environment
vmnet3
vmnet4
• Internal Use -
Confidential [ 27 ]
GNS3 Environment
• Internal Use -
Confidential [ 28 ]
GNS3 Environment
• Internal Use -
Confidential [ 29 ]
GNS3 Environment
• Save file and reboot. The ports should now show UP status
vmnet3
vmnet4
• Internal Use -
Confidential [ 30 ]
GNS3 Environment - Appliances
• Internal Use -
Confidential [ 31 ]
GNS3 Environment - Appliances
• Internal Use -
Confidential [ 32 ]
GNS3 Environment - Appliances
• If you want to be creative and want to learn some onie commands, the old
onie NOS-VM-Template can also be imported into GNS3 so that device only
loads ONIE
• From there, you can play around with ONIE and even load OS10 images
• The NOS-VM-Template is imported as a QEMU VM
• Internal Use -
Confidential [ 33 ]
GNS3 Environment - Appliances
• Internal Use -
Confidential [ 34 ]
GNS3 Environment - Appliances
• When working with appliances, you may need to configure the
appliance settings to match your network requirements
• Consider my case where I have 5 Vmnet, by default, when you import
say cloud appliance, it will by default only have 3 interfaces available.
VMnet4 and 5 is missing which correspond to eth3 and 4
• Internal Use -
Confidential [ 35 ]
GNS3 Environment - Appliances
• Select the appliance, configure option and select interface and click add so that you can
connect the appliance to the correct vmnet
• You can also do it on the appliance template so that whenever you add the appliance to
the project, it will already have the interfaces added
• Here I have added eth3 and 4 to the cloud appliance
• Internal Use -
Confidential [ 36 ]
GNS3 Environment - Appliances
• Internal Use -
Confidential [ 37 ]
GNS3 with
VMworkstation
Networking
• Internal Use -
Confidential [ 38 ]
GNS3 VMworkstation Networking
• Notes on FTOS VM
– Network Adapter VMnet0 is always connected to management port
– Network Adapter 2 VMnet1 will be 1st physical user port and so on
– No Keepalive needs to be enabled on all ports you want to use
Connected to mgmt.
port
• Internal Use -
Confidential [ 39 ]
GNS3 VMworkstation Networking
• This example is where I run GNS3 VM on my local work laptop
• Recall my GNS3 VM has been configure with 5 interfaces
• Specifically these interfaces are used for connecting the GNS3
appliances to the cloud appliance which then allows you connect
GNS3 appliances to your Vmworkstation VM, local LAN..etc
• Internal Use -
Confidential [ 40 ]
GNS3 VMworkstation Networking
• Internal Use -
Confidential [ 41 ]
GNS3 VMworkstation Networking
• Internal Use -
Confidential [ 42 ]
GNS3 VMworkstation Networking
• Notice how you need to connect GNS3 appliances to the GNS3 cloud
that connected to the FTOS switch running in Vmworkstation
• You need to connect the cloud on the same interface which is running
inside Vmworkstation. In my case, this is a FTOS switch
• Internal Use -
Confidential [ 43 ]
GNS3 VMworkstation Networking
• Internal Use -
Confidential [ 44 ]
GNS3 VMworkstation Networking
• You also need to configure the GNS3 VM to tell it which Vmnet to use
• In this example, I have allocated VMnet19 to the FTOS VM
• Internal Use -
Confidential [ 45 ]
GNS3 VMworkstation Networking
• Internal Use -
Confidential [ 46 ]
GNS3 VMworkstation Networking
• Now you should see the FTOS switch available as an appliance in GNS3
• Internal Use -
Confidential [ 47 ]
GNS3 VMworkstation Networking
• Internal Use -
Confidential [ 48 ]
GNS3 VMworkstation Networking
• When you start the project, the GNS3 will tell Vmworkstation to also
power up the FTOS VM automatically
– See quick demo
• Internal Use -
Confidential [ 49 ]
GNS3 Vmworkstation Network - Scaling
• If you have limited resource on work laptop and want to build a large
topology, recommend you install GNS3 VM on a server like ESXi with
lots of memory. Example LAB server
• For some, this may not be an option. The workaround if you have
another spare PC at home is to run GNS3 VM on both your work
laptop and home PC
• Here appliances in GNS3 VM home PC can communicate with
appliance on work PC so long as the GNS3 VM can communicate with
each other. Hence the VMnet0 should be used as this will bridge all
traffic from GNS3 VM to local LAN
• Your not limited to just 2 GNS3 VM if you have couple spare PC’s
• Internal Use -
Confidential [ 50 ]
GNS3 Vmworkstation Network - Scaling
• Internal Use -
Confidential [ 51 ]
GNS3 Vmworkstation Network - Scaling
• In this setup, you do need to enable local server feature on the laptop
that is the client interface to the GNS3 VM
– The appliances will still be hosted on the GNS3 VM’s
• Internal Use -
Confidential [ 52 ]
GNS3 Vmworkstation Network - Scaling
• You can see also the switch on left is appliance running on my home
PC whereas the switch on right is running GNS3 VM inside my laptop
• So basically if you have a large topology, you can split up the resource
between multiple GNS3 appliances
• Internal Use -
Confidential [ 53 ]
GNS3 Vmworkstation Network - Scaling
• One thing to note which I haven’t tried testing is that the traffic
between the 2 switches in this setup is actually now tunneled so this
“may” break some setup example if you run Vxlan.
– The source/destination IP of packet sent between the appliances running in the
GNS3 VM would be GNS VM IP of each GNS3 VM
– You may need to ensure NIC card on where GNS3 VM has jumbo enabled if you
plan to run say Vxlan between appliances in the different GNS3 VM
› Again, not tried it. Maybe someone can test and let me know
• Internal Use -
Confidential [ 54 ]
GNS3 Vmworkstation Network - Scaling
• Internal Use -
Confidential [ 55 ]
GNS3 Vmworkstation Network - Scaling
• As you can see below when running multiple GNS3 VM, you need to
tell appliances template which GNS3 VM you want to run on your
project
• Internal Use -
Confidential [ 56 ]
Demo LAB
• Internal Use -
Confidential [ 57 ]
Demo Lab
• Below topology hope achieved in this demo. Will build project from
scratch. No guarantees it will work during the presentation ☺
• Internal Use -
Confidential [ 58 ]
Demo LAB
• All devices are hosted inside GNS3 except for FTOS switch running in
Vmworkstation
• I have one OS10 switch hosted in GNS3 VM on my home PC and other
OS10 switch running on my work laptop
• There is one FTOS switch running 9.13 in Vmworkstation. Here I
haven’t added the FTOS VM into GNS3. As mention earlier, I find it
more complex to manage
• Internal Use -
Confidential [ 59 ]
Demo LAB
• Internal Use -
Confidential [ 60 ]
Ostinato Docker on OS10 LAB
• Internal Use -
Confidential [ 61 ]
Other GNS3 LAB
• Internal Use -
Confidential [ 62 ]
Smart Fabric Director LAB
• Internal Use -
Confidential [ 63 ]
BGP eVPN Asymmetric IRB
• Internal Use -
Confidential [ 64 ]
BGP eVPN Symmetric IRB
• Internal Use -
Confidential [ 65 ]
Kubernetes Container with Calico
• Internal Use -
Confidential [ 66 ]
Any Questions??
George Liu
[ 67 ]