Planning and Deployment of Edge Transit Gateway

This topic provides the prerequisites and deployment steps to launch an Aviatrix Edge Transit Gateway on the Aviatrix Edge Platform.

Prerequisites

The prerequisites to deploy an Aviatrix Edge Transit Gateway for on-premises on the Aviatrix Edge Platform.

1. Procure and Onboard the Edge Device

Before you can deploy an Aviatrix Edge Transit Gateway, you must procure and onboard your edge device onto the Aviatrix Edge Platform. For more information, see Installing Edge OS and Onboaring Dell Hardware.

2. Obtain Edge Gateway Interface IP Addresses

The Edge Transit Gateway on the Aviatrix Edge Platform supports one Management and up to 4 WAN interfaces.

For each WAN interface that you want to configure, you will need to provide the following information during Edge Gateway creation for your primary and secondary HA Edge Gateways.

WAN Interface Description

Interface Primary CIDR

The CIDR for the WAN interface.

DHCP for dynamic IP address assignment is not supported.

Interface CIDR must be in the format interface_ip/netmask (for example, 192.18.20.1/24).

Interface CIDR cannot be link-local CIDR.

If you need to create a BGP underlay connection to cloud service provider (CSP) with a link-local IP address, you must enter the link-local IP address in the Link-local Underlay CIDR setting of the WAN interface.

Interface Secondary CIDRs

The secondary CIDRs for the WAN interface.

Interface CIDR must be in the format interface_ip/netmask (for example, 192.18.20.1/24).

The secondary CIDRs are used for High Performance Encryption (HPE) attachment peering connections over a private network between the Edge Transit Gateway to another Edge Transit Gateway or Edge Spoke Gateway. The secondary IP addresses (based on the secondary CIDRs) are automatically assigned to create the peering connections. You can define /32 CIDR for specific secondary IP address.

Secondary CIDR cannot be link-local CIDR.

Default Gateway IP

The Default Gateway IP address for the WAN interface.

For CSP underlay, this is the remote side IP address of the BGP session on CSP VNG or VGW.

If Link-Local Underlay CIDR is configured, the Default Gateway IP should be in the same subnet as the Link-Local Underlay CIDR, otherwise, it should be in the same subnet as the WAN Interface CIDR.

Public IP

The public IP for the WAN interface.

The public IP of the WAN interface is used for peering connections over the public network.

If the Edge Gateway will be used in environments where connections to Cloud Service Providers (CSPs) are available, then BGP configurations can be set up on the Edge gateway to peer with cloud routers such as VGW, VNG and Google Cloud router.

For BGP underlay connections to CSP, you will need to provide the following information.

BGP Configuration Description

Link-Local Underlay CIDR (GCP only)

The Link-Local Underlay CIDR is used for BGP underlay connections to cloud service provider (CSP).

If you need to create a BGP underlay connection to CSP with a link-local IP address, you must provide the Link-Local Underlay CIDR for the WAN interface in the format of link_local_underlay_ip/netmask (for example 169.254.100.3/24).

This is required for GCP. If terminating GCP Interconnect and using BGP underlay on Edge, provide the WAN Default Gateway of the peer IP address.

If Link-Local Underlay CIDR is configured, the Default Gateway IP should be in the same subnet as the Link-Local Underlay CIDR, otherwise, it should be in the same subnet as the WAN Interface CIDR.

Remote ASN

The AS Number of the remote BGP peer.

Remote LAN IP

The IP address of the remote BGP peer.

For the Management interface, you will need the Egress IP address.

MGMT Interface

Description

Egress CIDR (Primary)

The Egress CIDR is the public IP address which the Management interface uses.

If the Public IP is used from Edge Gateway Management interface to establish connectivity to Aviatrix Controller, then configure the Public IP as the CIDR. The CIDR is then added to the Controller security group to allow incoming traffic from the Edge Gateway.

Egress CIDR (Secondary)

The Egress Public IP for the secondary Edge Gateway’s Management interface when High Availability is configured.

3. Provide Network Access

Aviatrix Edge Transit Gateway requires outbound access to communicate with the Aviatrix Platform. You must allow access on the specified ports on your firewall.

For all Edge Gateway outbound access requirements, see Aviatrix Products: Required Access for External Sites on the Aviatrix Customer Support website.

Deploy an Edge Transit Gateway

You can deploy an Edge Transit Gateway on the Dell edge device once the device is onboarded and registered with the Aviatrix Edge Platform. The Dell device will show as Connected in Copilot (go to Cloud Fabric > Hybrid Cloud > Devices).

edge device connected

Follow the instructions in Edge Transit Gateway Deployment Workflow for On-Premises to deploy the primary and secondary highly available (HA) Edge Transit Gateways.