cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1591
Views
0
Helpful
3
Replies

Virtualization lab with XCP-ng hypervisor

I'm studying virtualization and networking, so my budget allowed me to acquire some old but gold Cisco 29xx series router and switch. I plan to upgrade this in a near future (a use GNS3 too, to anticipate some scenarios before getting fresher network hardware).

My Cisco hardware is one 2901 router and 2960-S switch, and using XCP-ng as virtualization platform. I can receive internet traffic when I ping and for this I configured NAT inside interface 0/1 and outside interface 0/0 (followed all the recipe for this, neat stuff at all).Now, the big thing will be configure the router to allow traffic in and out for my VM's (surely that will require some configurations in XCP-ng side and VM networking, but first getting router and switch on top of the priorities).
 
Also, my virtualization host is connected to the switch, so I can ping as well do anything related to outside internet connection. But, of course, I can't login via SSH into it as well ping it from my PC connected to my ISP. I know that this happens because I only allowed NAT in one interface to get packets from outside, but my subnet can not be seen, so my host is unreachable.
 
Last but not least, I'm "imagining" playing like I'm a small cloud hosting company, just for fun (and I know that to get there, I would need more sophisticated network architecture and design, like a Clos/Spine-Leaf 2-Tier stuff, but baby steps over here haha), so I want to be proficient in this Systems Engineering kind of thing.
 
I'm wondering if :
  • I should configure NAT outside interface 0/1
  • Create ACL for permit any traffic from any source
  • Do some port-forwarding
  • Create a DHCP server to control leases in XCP-ng (or I can leave that for each network configuration) and disable DHCP from the router
  • Just poking to figure out which specific switch configurations should I do to get the "least" of reliability regarding traffic and LAN when having hosts (the servers holding XCP-ng pool of VM's) to communicate with each other (well, that will require router to do it's thing, so, another stuff to comply for)
  • Configure another bridge (other than using `xenbr0` which is the default bridge for my host) to allow traffic to VM's
 
Any tips, recommendations, thoughts ?
 
Thanks in advance !
3 Replies 3

And, for sure, if I get this right, I'll create some guide/documentation for the community, so others can get there too

davelittle260
Level 1
Level 1

@pedroalvesbatista wrote: EmployeeConnection
I'm studying virtualization and networking, so my budget allowed me to acquire some old but gold Cisco 29xx series router and switch. I plan to upgrade this in a near future (a use GNS3 too, to anticipate some scenarios before getting fresher network hardware).

My Cisco hardware is one 2901 router and 2960-S switch, and using XCP-ng as virtualization platform. I can receive internet traffic when I ping and for this I configured NAT inside interface 0/1 and outside interface 0/0 (followed all the recipe for this, neat stuff at all).Now, the big thing will be configure the router to allow traffic in and out for my VM's (surely that will require some configurations in XCP-ng side and VM networking, but first getting router and switch on top of the priorities).
 
Also, my virtualization host is connected to the switch, so I can ping as well do anything related to outside internet connection. But, of course, I can't login via SSH into it as well ping it from my PC connected to my ISP. I know that this happens because I only allowed NAT in one interface to get packets from outside, but my subnet can not be seen, so my host is unreachable.
 
Last but not least, I'm "imagining" playing like I'm a small cloud hosting company, just for fun (and I know that to get there, I would need more sophisticated network architecture and design, like a Clos/Spine-Leaf 2-Tier stuff, but baby steps over here haha), so I want to be proficient in this Systems Engineering kind of thing.
 
I'm wondering if :
  • I should configure NAT outside interface 0/1
  • Create ACL for permit any traffic from any source
  • Do some port-forwarding
  • Create a DHCP server to control leases in XCP-ng (or I can leave that for each network configuration) and disable DHCP from the router
  • Just poking to figure out which specific switch configurations should I do to get the "least" of reliability regarding traffic and LAN when having hosts (the servers holding XCP-ng pool of VM's) to communicate with each other (well, that will require router to do it's thing, so, another stuff to comply for)
  • Configure another bridge (other than using `xenbr0` which is the default bridge for my host) to allow traffic to VM's
 
Any tips, recommendations, thoughts ?
 
Thanks in advance !

I could not make it work on XCP-ng. I tried entering the same name/key pairs under the VM platform category, but it does not look like the xe toolstack maps them correctly to the hypervisor. I didn't find documentation for applying them from xe. The success was only realized in Xen hypervisor.

Do you think this would happen due to Cisco non-compatibility, is that it ? If this is the case, we could open an issue in XCP community and then let folks help up with something.