04-26-2019 11:02 AM
Ive been working at this for a while now, and I can not get the vbond device to work. I've been following this guide: https://sdwan-docs.cisco.com/Product_Documentation/Getting_Started/Viptela_Overlay_Network_Bringup/04Deploy_the_vBond_Orchestrator/04Add_Additional_vBond_Orchestrators
I go to devices>controllers and add the vBond. That part seems to work, its obviously able to contact it since it can pull the UUID. I also see via cli on the vBond that it has configured an organization name. So I go on to attaching a template to it, i get to the end of that process and just get "scheduled, device is offline". vManage and vBond can ping each other, but I can't figure out why vManage thinks vBond is offline.
The guide ive been following seems a bit out of date so Ive gotta be missing something. Any ideas? Using the latest version of the devices downloaded from cisco. All deployed on a single ESXI server.
Solved! Go to Solution.
05-06-2019 01:51 PM
Yep, that's most likely the problem. The certificate must be approved by Cisco, you can typically ask for that via a TAC case. The vmanage will periodically attempt to retrieve the cert and once approved, it should succeed. Of course, the vmanage needs internet access but I assume that's already the case.
05-07-2019 04:19 AM
Hi All,
Actually you can have your own enterprise CA for controllers signing, see below:
You just need to generate CA cert and key, and then use it to sign CSRs for controllers, e.g. with openssl:
openssl x509 -req -sha256 -days 4096 -in ./your_controller.csr -CA Lab_CA.crt -CAkey Lab_CA.key -set_serial <serial number, e.g. 0x01, some random value here> -out ./your_controller.crt
If you use Windows, you can use something like XCA to generate and sign your own certificates:
https://sourceforge.net/projects/xca/
Please note that you still need your Smart Account and Virtual Account created on software.cisco.com with some devices populated in it (so you can download provisioning file). In general, you should get in touch with your cisco representative to get Smart Account approved.
05-06-2019 12:18 PM
What do you have under Configuration/Certificates ? Does the vbond have a successfully installed certificate ? Is this an on-prems or cisco-cloud installation ?
05-06-2019 12:57 PM
05-06-2019 01:51 PM
Yep, that's most likely the problem. The certificate must be approved by Cisco, you can typically ask for that via a TAC case. The vmanage will periodically attempt to retrieve the cert and once approved, it should succeed. Of course, the vmanage needs internet access but I assume that's already the case.
05-07-2019 04:19 AM
Hi All,
Actually you can have your own enterprise CA for controllers signing, see below:
You just need to generate CA cert and key, and then use it to sign CSRs for controllers, e.g. with openssl:
openssl x509 -req -sha256 -days 4096 -in ./your_controller.csr -CA Lab_CA.crt -CAkey Lab_CA.key -set_serial <serial number, e.g. 0x01, some random value here> -out ./your_controller.crt
If you use Windows, you can use something like XCA to generate and sign your own certificates:
https://sourceforge.net/projects/xca/
Please note that you still need your Smart Account and Virtual Account created on software.cisco.com with some devices populated in it (so you can download provisioning file). In general, you should get in touch with your cisco representative to get Smart Account approved.
05-07-2019 06:52 AM
Thanks, that definitely worked for the vbond and vsmart. I think I'm stuck at the vedge part though. I'm not sure if i can get a smart account authorized through my employer yet to get the provisioning file. Is this the only way to get a vedge to associate with the controller? This is only used in a lab, so I don't have any kind of licensed purchased yet, just exploring.
05-07-2019 12:48 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide