Section 4: Peering to devices outside the fabric

Estimated time: 10 minutes

Setting up external connectivity

Remember the analytics-web virtual network — the one we created as Layer 2 only, without a gateway on the leaf switches? The reason for that design decision was to route all web-tier traffic through an external firewall for inspection. You now need to connect that firewall (or edge router) to the fabric.

You will model that connection in Undeploy mode, meaning the configuration is pre-staged in Apstra but will not be pushed to any switch until you change the mode to Deploy. This is how you prepare for hardware that has not physically arrived yet.

  • Navigate to menu:Staged[Physical > Topology].

  • Select leaf2, we will use as a border leaf.

Selecting a border leaf switch

What is a border leaf? Border leaf switches sit at the edge of the fabric and handle connectivity to external networks — routers, firewalls, or the WAN. Internal leaf switches connect servers. Border leaves connect the fabric to the outside world. Traffic destined for external systems exits through a border leaf.

  • Click the box to the left of the device name and select Add internal/external generic system.

Add external generic system option
Parameter Value

Generic Type

External

Name

analytics-edge-router

Hostname

analytics-edge-router

Logical Device

None

External generic system configuration form
  1. Click Next and configure the links to the external router as follows:

Parameter Value

Port

Any available port (e.g. port 5)

Speed

10Gbps

Deploy mode

Undeploy

Tag

Router

Undeploy means the connection is fully modelled in the blueprint — Apstra has generated all the configuration — but will not push it to any switch until you change this to Deploy. When the physical router arrives and is cabled in, that one field change activates the entire configuration.

External router link configuration
  • Click Create.

Configuring the router’s properties

  • Click on your analytics-edge-router in the topology. image::test_drive/egs_4.png[External router properties tab]

  • Click the Properties tab.

Router ASN and loopback IP configured
  1. Edit each field to reflect the below information.

Parameter Value

ASN

65000

Loopback IP

192.168.100.1/32

Why do we need an ASN? BGP (Border Gateway Protocol) — the routing protocol used here — identifies each participant by a unique Autonomous System Number (ASN). The external router must have a different ASN from the fabric switches so that BGP treats it as a trusted external peer rather than part of the fabric. These two values — ASN and loopback IP — are all Apstra needs to generate the full peering configuration on the border leaf.

Creating the BGP peering connectivity template

Connectivity templates work for external routing sessions, not just servers. Here you will create one that configures the BGP session between the border leaf and the external router.

  • Navigate to menu:Staged[Connectivity Templates].

  • Click Add Template and name it analytics-external-peering.

New template name entry
  • Click the Predefined Templates tab.

  • Select BGP over L3 Connectivity.

  • Click the cog next to the IP Link box.

BGP over L3 predefined template selected

Configure the IP link as follows:

Parameter Value

Routing Zone

Analytics

Interface Type

Untagged

IPv4 Addressing Type

Numbered

IP link configuration for BGP peering

You are attaching this BGP session to Analytics VRF because the external router doubles as the Layer 3 gateway for that network — the one you deliberately left without an IP gateway on the leaf switches. Traffic from the web tier exits the fabric through this BGP session and is inspected by the firewall before going anywhere else.

  • Leave the BGP Peering section at its defaults.

Completed BGP peering template
  • For Routing Policy you can see on the right hand side, select Default Immutable Policy.

  • Click Create.

The Default Immutable Policy is a built-in routing policy that controls which routes the border leaf advertises to and accepts from the external router. Using this is the correct choice for most external peering scenarios — it ensures sensible route advertisements without manual policy configuration.

If you have a more complex routing environment with specific policy requirements, you can create your own custom policies and select them here.

Assigning the template

Now the template has been created, we need to assign it to the interface that will connect to the external router.

  • Select your new analytics-external-peering template in the list.

  • Click Assign.

Assigning the external peering template
  • Select the interfaces connected to your external router.

  • Click Assign.

Interface assignment for external peering

Assigning routing zone resources

After assigning the template, Apstra identifies that the external peering requires additional IP addressing for the point-to-point links between the border leaf and the router. You will see red indicators on the routing zone.

  • Navigate to menu:Staged[Virtual > Routing Zones] and assign any available pool to the red indicators.

  • Assign appropriate resource pools as needed to resolve the red indicators.

Routing zone resource assignments for the external peering links
  • Select the border leaf switch and check the Incremental Configuration tab.

Incremental config for external peering on the border leaf
Incremental config detail

The full BGP peering configuration is staged and ready to deploy the moment the physical router is in place.

  • Click the Uncommitted tab, enter a commit message such as External connectivity for Analytics service staged, and click Commit.