Skip to main content
Cisco SD-WAN
Support
Product Documentation
Viptela Documentation

vEdge Cloud Router

The vEdge Cloud is a virtualized version of the vEdge router, inheriting all the capabilities offered on Viptela’s physical branch routers. vEdge Cloud can be instantiated as a virtual machine (VM) on a KVM hypervisor or as a VM on a VMware ESXi hypervisor, as well as in public cloud environments, such as Amazon AWS. vEdge Cloud can be used as a Virtual Network Function (VNF) for a Virtual CPE (vCPE) deployment at the branch. It can also be used as a Virtual Private Cloud (VPC) Gateway for customers that have workload residing in Amazon Web Services (AWS).

Start and Configure the vEdge Cloud Router

To start the vEdge Cloud router, you create a VM instance for it on a server on which the VMware vSphere ESXi Hypervisor or the Kernel-based Virtual Machine (KVM) Hypervisor software is installed. For server requirements, see Server Hardware Requirements.

To create a vEdge Cloud VM instance, see Deploy the vEdge Routers.

To configure the vEdge Cloud router, see Configure the vEdge Routers.

vEdge Cloud Router Default Configuration

Each vEdge Cloud router has a default configuration. The default configuration file sets the default CLI prompt to vEdge#, configures OMP, and enables logging of syslog messages to a file.

The default configuration file looks like this:

vEdge# show running-config
system
 host-name vedge
 vbond ztp.viptela.com
 aaa
​  auth-order local radius tacacs
  usergroup basic
   task system read write
   task interface read write
  !
  usergroup netadmin
  !
  usergroup operator
   task system read
  task interface read
   task policy read
   task routing read
   task security read
  !
  user admin
   password $6$F1rfcIs0C/GI3RPc$jo/<wbr/>wlF0Ivv2aOlslWO3qEhVTFAVjpoTbz<wbr/>1EzckuzFLXvYK59JhpcqR7rtqY6pni<wbr/>eg/0m.X85SxShYxy9PQ7.r.
  !
 !
 logging
  disk
   enable
  !
 !
!
omp
 no shutdown
 graceful-restart
 advertise connected
 advertise static
!
security
 ipsec
  authentication-type ah-sha1-hmac sha1-hmac
 !
!
vpn 0
 interface ge0/0
  ip dhcp-client
  tunnel-interface
   encapsulation ipsec
   no allow-service bgp
   allow-service dhcp
   allow-service dns
   allow-service icmp
   no allow-service sshd
   no allow-service netconf
   no allow-service ntp
   no allow-service ospf
   no allow-service stun
  !
  no shutdown
 !
!
vpn 512
 interface eth0
  ip dhcp-client
  no shutdown
 !
​!
  • Was this article helpful?