Search This Blog

Thursday, June 29, 2017

Setup of a Disaster Recovery (DR) site in Microsoft Azure using Lightweight, Software-Defined Networking (SDN) - Part 2

In the previous post, we've talked about how to use Veeam PN to setup site to site VPN from on-premise to Microsoft Azure. Next, we will look on how remote client from external access the resources securely to DR Site (located at Microsoft Azure). To do, you need to download OpenVPN Client from here:-https://openvpn.net/index.php/open-source/downloads.html

my lab scenario:-


[Scenario Point to Site VPN]
1. Power on Veeam PN Appliance (act as Network hub) on Microsoft Azure. We have temporary turn it off to save Azure credit. VM @ Microsoft Azure which has stopped (deallocated), do not incur compute charges except storage consumption)
2. Access to Veeam PN Appliance, create a new client. (Click on Clients | Standalone computer) and download the configuration file (user.ovpn)



3. From OpenVPN Client, import the configuration file

4. Click Connect


5. Once connected, try to access VM which located in Microsoft Azure using private IP.
Example: - RDP
You able to tracert & ping using private IP as well.



On Veeam PN - Network hub appliance, you can monitor the status mentioning client is "Connected"

That's concluded our testing on remote client access securely to DR located at Microsoft Azure using Veeam PN.

Tuesday, June 27, 2017

Setup of a Disaster Recovery (DR) site in Microsoft Azure using Lightweight, Software-Defined Networking (SDN) - Part 1

In this post, we are going to explore a lighweight software defined network (SDN) using Veeam PN to setup site to site VPN.

Veeam PN is a free Veeam solution that supplements the Veeam functionality of restore to Microsoft Azure and allows you to create a VPN connection between remote sites over the public network. You can use Veeam PN to implement the following scenarios:

  • Set up a site-to-site VPN between company offices and a Microsoft Azure network to which VMs restored in Microsoft Azure are connected.
  • Set up a point-to-site VPN between remote computers and a Microsoft Azure network to which VMs restored in Microsoft Azure are connected.
  • Allow remote users to get access to a company network through a Microsoft Azure network.

Veeam PN lets you set up VPN connections between Microsoft Azure networks and on-premises networks.

The solution is based on the OpenVPN technology and features a web-based interface that simplifies VPN configuration and administration.

In the VPN, all traffic between remote networks is routed over a secure communication channel — VPN tunnel. To establish a VPN tunnel, Veeam PN uses its appliances:
a) network hub - Network hub is the core of the VPN which is responsible for traffic routing, encryption, user management, authentication and so on.
b) site gateways- is a virtual appliance that establishes a secure connection with the network hub.


Here is my lab environment simple environment:-



[Scenario 1:- Site to Site VPN]
To configure S2S VPN, perform the following configuration:-

  • Deploy & configure Network Hub on Microsoft Azure


a) Network Hub Appliance in Microsoft Azure
Go to Azure MarketPlace:- https://azuremarketplace.microsoft.com/en-us/marketplace/apps/veeam.veeampn?tab=Overview
Using 192.168.20.0/24 Subnet on Microsoft Azure
Follow simple wizard to deploy the appliance from Azure MarketPlace. Once done, use the assigned public ip to access the appliance (https:\\veeampn public ip) & login using the credential which you've defined when create the appliance.

 This is how it look like after login in.


  • Register Veeam PN client
Go to Client
Click Add, select Entire Site
Enter Subnet 192.168.0.0/24 (on-premise subnet)

  • Deploy and Configure Site Gateway on on-premise

b) Site Gateway
Download free Veeam PN OVA package from https://www.veeam.com/cloud-disaster-recovery-azure.html and setup on-premise
Deploy it on-premise
Using 192.168.0.0/24 Subnet
Login to the virtual appliance using the following credential to get the ip address

  • username: root
  • password: VeeamPN

(use ifconfig cmd, the appliance is running on Ubuntu OS)

Use browser to login to https://veeamPN IP
Change the password
Initial configuration wizard will prompt
Select "Site Gateway"
Select the Configuration File that you've get it from Network Hub Appliance

  • Add static route for outgoing traffic on default gateway
Below result indicated that our traffic is still routed to old gateway (firewall). We need to add static route for any request to 192.168.20.0/24 should route to 192.168.0.253.



Use command "route add 192.168.20.0 mask 255.255.255.0 192.168.0.253"


Perform ping test to 192.168.20.5 (Azure VM). Result from tracert showing that traffic is now route to 192.168.0.253 (Veeam PN-Site Gateway Appliance)

Lastly, on Veeam PN (Network Hub @Microsoft Azure) dashboard is showing traffic in and out for both network.


That's concluded on our simple test on setting up site to site vpn between on-premise & Microsoft Azure using Veeam PN.

Interested to Part 2, please refer to here.

Tuesday, June 20, 2017

Webinar :- How to Migrate to VMware for Hyper-V administrators

If you’re an IT Pro who started your virtualization training with Hyper-V but find yourself in a situation where you need to work on a VMware platform, this is the perfect webinar to get up to scratch.

Sometimes department priorities change, corp. policies change, or maybe company acquisitions are made, etc. Whatever the reason, if you find yourself having to adopt to a multiple hypervisor deployment or making a complete switch to VMware altogether, you’re going to have to get yourself educated, FAST.

This webinar will help you do just that.

It’s intended for Hyper-V administrators who are thinking of using vSphere for the first time, or have recently started using VMware's virtualization platform for the first time and are having issues acclimatizing to it.

Webinar schedule:-

  • Tuesday, June 27th 2017
  • Time for US attendees: (10am PDT / 1pm EDT)
  • Time for EU attendees: (2pm CEST)
To register, click here.

Sunday, June 11, 2017

Online session: Combining monitoring and analytics with SCOM + OMS


Are you one of the many that are wondering if you can and should use SCOM and OMS together? There has been a lot of discussion around the topic of OMS and whether it will fully replace SCOM’s monitoring capabilities. To clear the air, Savision will hold a live online session: “Combining Monitoring & Analytics with SCOM and OMS”.

Hosted by Savision’s Support Manager – Chris Malay, the session will feature renowned Microsoft MVPs Thomas Maurer & Dieter Wijckmans, who will answer all your questions regarding SCOM & OMS.

The session will be held on Thursday, June 22nd at 4PM CEST | 10AM EDT | 9 AM CDT

 Discover:

  • What is new in OMS? | OMS Service Map | OMS Log Analytics
  • Is OMS a replacement for SCOM? | Why doesn’t OMS do monitoring? | Why do you still need SCOM?
  • How to get better insights from your data using advanced dashboards for SCOM + OMS
  • Demos and real-use cases from the field


Don’t miss out on this session. To register, click here.