btNOG 10: Open source SD-WAN

APNIC
APNICAPNIC
1
Open source SD-WAN
One man’s decent into Madness
Dave Phelan - APNIC
2
Who Am I?
• Dave Phelan
– Network and Infrastructure engineer for a LONG time
– Trainer at APNIC
– Parent to 2 Human children and 2 Fur Children
– Likes Cat memes
• [Date[
• [xx]
3
3
What are we going to talk about?
• Why am I talking about ANOTHER overlay network?
• What is SD-WAN?
• What are the “standards” for this?
• What are my FOSS options?
• How do I do it?
• Should I do it (or what problem am I solving)?
4
Why am I talking about this?
• Post training surveys
– Most requested content
• Finding solutions that don’t have a vendor lock in
– This is HARD…Or is it?
• Like it or not, SD-WAN is being deployed
5
What is SD-WAN
• Defined in MEF-70(07/2019) Updated MEF-
70.1(11/2021)
• SD-WAN Is a Virtual Overlay Network
• Operates over one or more underlay (Layer 3)
services
• Centralised Management and Orchestration
– Usually via a Vendor Portal
• Provisions for Flexible routing
– Application based routing (YMMV)
– Load balanced/Preferred/failover etc
6
What is SD-WAN – Components - 1
• Underlay Network
– The network that our SD-WAN sits over the top of.
– Can be any form of connectivity as long as we have L3
• LTE/Ethernet/MPLS/Commodity BB etc
• Overlay Network
– Virtual Tunnels for our SD-WAN Network
• SD-WAN Edge Device
– Serve as endpoints for connectivity to the Virtual Fabric
– Encapsulate and forward the traffic based on Policies
7
What is SD-WAN – Components - 2
• SD-WAN Controller
– Manages and Orchestrates the Overlay Network
– Policy/routing definition is done here
• Management and Orchestration
– UI into the controller
– Allows for configuration of our Edges and creation of policy/routing
8
What is SD-WAN – Components - 3
MEF-70.1 Page 13
9
What are the Standards?
• MEF-70.1
– It defines the components, features, and Framework
• https://www.mef.net/resources/mef-70-1-sd-wan-service-attributes-and-service-
framework/
– Vendor Interop is questionable(non-existent)
• You have to drink the kool-aid
– It covers off the “Do” and “Don’t”, “Must”, and “Should”
– It’s all about the Subscriber and Supplier
• Not so much about the “how”
10
What are my FOSS Options?
• There are now many options
– Zero-Tier
– Headscale(Based on Tailscale)
– Flexiwan
– Zevenet
– VyOS
– Others……
• BUT They all have drawbacks
– Limited Options for self-hosted controller/UI
– Still broken interop
– Not all SD-WAN Features are implemented
– Some still require you to create an account(phone home)
11
How do I do it?
• Choose an Open source Option
• Install the required software on your network devices
– This is where the problems start
• Configure your routing policy
– This is where more problems occur
• Join your network devices to your Virtual Network
• Magic Magic…
• Packets go from A to B
12
How DID I do it?
• Problem 1 – Network Hardware
– Low Cost, but flexible
– SD-WAN parts already there
• or that I can Modify
• Problem 2
– Which FOSS solution to use?
– Does my SW Choice drive my hardware or Visa-Versa
– What features am I missing?
– What can I do without?
– I don’t want to have to create a login with a Vendor!
13
How DID I do it?
• Hardware/Network OS
– Mikrotik ROS7
– ARM Hardware has options for Zero-Tier by additional NPK
– X86 (CHR) supports docker containers
• Custom Rolled my own Docker ZeroTier Container
– More to come on this…
• Software
– ZeroTier (https://www.zerotier.com/)
– Many Deployment options
• Clients for Windows/Mac/Android/iPhone/Linux
– Can Be run as a docker container
– Doesn’t need to connect to the Mother ship (Planet servers)
14
How DID I do it?
• Other Options could be
– OpenWRT
– Teltonika
– Protectli(Running OpenWRT)
• Still investigating these Options
• Still Investigating the other Software as well
15
How DID I do it?
• Caveats
– This Method breaks the ties to the ZeroTier Roots
• You CAN’T do this if you run Android/iOS clients
• You CAN do this if you are running a docker/linux/wrt image
• IF you want to use Android/iOS clients, you will need create a ZT login and
NOT REMOVE/DISABLE the planets
– Packet Processing is done in CPU
• No HW offload
16
How DID I do it?
• Challenges
– Primarily for a LAB
– Finding a good UI for the users
– Emulating as MUCH functionality as possible
• At what point do I “Draw the line”
• Still building some of this
17
How DID I do it?
• Some Zero-Tier Terminology
– Planet
• Zero-Tier Root Servers
– Moon
• User Defined Root Server
– Leaf
• SD-WAN Endpoints
• Controllers
18
How DID I do it?
• ZT Docker image
– Unable to run an ARM image as a VM
• Had to go x86(CHR)
• Sits off to the side of the rest of the routing engine
– Missing some tooling
• jq – Parsing JSON queries from the Mikrotik API
• curl – execute the API queries
– Preinstall my “Moon” files
• Still unsure if I can even do this on ARM_64 MT
– Based on the original image
• https://hub.docker.com/r/zerotier/zerotier
19
How DID I do it?
• Step 1
– Create some new ROOT servers
• At least 2 Recommended
• Tooling is built-in to do this
– https://docs.zerotier.com/zerotier/moons/
• Step 2
– Block access to the planet servers
• IPTABLES rules/firewall rules should be sufficient
• Step 3
– Install the “MOONS” on your client nodes
• Details included in the above
20
How DID I do it?
• Step 4
– Install a Node to use as a controller
• Step 5
– Choose a GUI
• https://github.com/dec0dOS/zero-ui
• https://github.com/key-networks/ztncui
– They have their Pros and Cons
• Step 6
– Setup your networks and Join your clients
– Configure any routing required on your end nodes
21
Should I do it?
• What Problem am I trying to solve?
– Cost?
– Service Availability?
– Splitting services?
– User Self-Management?
• They All have different answers
– Can I do it another way?
– Will a standard VPN do the same thing?
22
Should I do it?
• Use Case #1
MEF-70.1 Page 98
23
Should I do it?
• Use Case #2
MEF-70.1 Page 99
24
Demo Topology
25
Quick 2 Minute Demo
26
Questions?
1 de 26

Recomendados

SDN Demystified, by Dean Pemberton [APNIC 38] por
SDN Demystified, by Dean Pemberton [APNIC 38]SDN Demystified, by Dean Pemberton [APNIC 38]
SDN Demystified, by Dean Pemberton [APNIC 38]APNIC
636 vistas59 diapositivas
Control Your Network ASICs, What Benefits switchdev Can Bring Us por
Control Your Network ASICs, What Benefits switchdev Can Bring UsControl Your Network ASICs, What Benefits switchdev Can Bring Us
Control Your Network ASICs, What Benefits switchdev Can Bring UsHungWei Chiu
1.1K vistas31 diapositivas
Webinar: IBM Connections Adminblast por
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections Adminblastpanagenda
139 vistas57 diapositivas
Webinar: IBM Connections Adminblast por
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections AdminblastNico Meisenzahl
1K vistas57 diapositivas
Metasploitation part-1 (murtuja) por
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)ClubHack
1.6K vistas75 diapositivas
Realtime traffic analyser por
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyserAlex Moskvin
174 vistas56 diapositivas

Más contenido relacionado

Similar a btNOG 10: Open source SD-WAN

Docker in pratice -chenyifei por
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifeidotCloud
19.6K vistas31 diapositivas
AdminCamp 2017 - IBM Connections Adminblast por
AdminCamp 2017 - IBM Connections AdminblastAdminCamp 2017 - IBM Connections Adminblast
AdminCamp 2017 - IBM Connections AdminblastNico Meisenzahl
1.4K vistas66 diapositivas
Deploying PHP apps on the cloud por
Deploying PHP apps on the cloudDeploying PHP apps on the cloud
Deploying PHP apps on the cloudZend by Rogue Wave Software
341 vistas18 diapositivas
Lightweight Virtualization Docker in Practice por
Lightweight Virtualization Docker in PracticeLightweight Virtualization Docker in Practice
Lightweight Virtualization Docker in PracticeDocker, Inc.
1.2K vistas31 diapositivas
Considerations when implementing_ha_in_dmf por
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfhik_lhz
599 vistas32 diapositivas
Zend con what-i-learned-about-mobile-first por
Zend con what-i-learned-about-mobile-firstZend con what-i-learned-about-mobile-first
Zend con what-i-learned-about-mobile-firstClark Everetts
3.5K vistas15 diapositivas

Similar a btNOG 10: Open source SD-WAN(20)

Docker in pratice -chenyifei por dotCloud
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifei
dotCloud19.6K vistas
AdminCamp 2017 - IBM Connections Adminblast por Nico Meisenzahl
AdminCamp 2017 - IBM Connections AdminblastAdminCamp 2017 - IBM Connections Adminblast
AdminCamp 2017 - IBM Connections Adminblast
Nico Meisenzahl1.4K vistas
Lightweight Virtualization Docker in Practice por Docker, Inc.
Lightweight Virtualization Docker in PracticeLightweight Virtualization Docker in Practice
Lightweight Virtualization Docker in Practice
Docker, Inc.1.2K vistas
Considerations when implementing_ha_in_dmf por hik_lhz
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmf
hik_lhz599 vistas
Zend con what-i-learned-about-mobile-first por Clark Everetts
Zend con what-i-learned-about-mobile-firstZend con what-i-learned-about-mobile-first
Zend con what-i-learned-about-mobile-first
Clark Everetts3.5K vistas
Fluentd and docker monitoring por Vinay Krishna
Fluentd and docker monitoringFluentd and docker monitoring
Fluentd and docker monitoring
Vinay Krishna5.7K vistas
Microservices: Yes or not? por Eduard Tomàs
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?
Eduard Tomàs943 vistas
When DevOps and Networking Intersect by Brent Salisbury of socketplane.io por DevOps4Networks
When DevOps and Networking Intersect by Brent Salisbury of socketplane.ioWhen DevOps and Networking Intersect by Brent Salisbury of socketplane.io
When DevOps and Networking Intersect by Brent Salisbury of socketplane.io
DevOps4Networks1.1K vistas
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015 por Jeremy Brown
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Browser Fuzzing with a Twist (and a Shake) -- ZeroNights 2015
Jeremy Brown1.6K vistas
Warsaw MuleSoft Meetup - Runtime Fabric por Patryk Bandurski
Warsaw MuleSoft Meetup - Runtime FabricWarsaw MuleSoft Meetup - Runtime Fabric
Warsaw MuleSoft Meetup - Runtime Fabric
Patryk Bandurski1.3K vistas
Docking postgres por rycamor
Docking postgresDocking postgres
Docking postgres
rycamor809 vistas
OpenNebulaConf2015 1.07 Cloud for Scientific Computing @ STFC - Alexander Dibbo por OpenNebula Project
OpenNebulaConf2015 1.07 Cloud for Scientific Computing @ STFC - Alexander DibboOpenNebulaConf2015 1.07 Cloud for Scientific Computing @ STFC - Alexander Dibbo
OpenNebulaConf2015 1.07 Cloud for Scientific Computing @ STFC - Alexander Dibbo
OpenNebula Project603 vistas
Cloud Device Insecurity por Jeremy Brown
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
Jeremy Brown1.2K vistas

Más de APNIC

IETF 118: Starlink Protocol Performance por
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
394 vistas22 diapositivas
HKNOG 12.0: RPKI Actions Required by HK Networks por
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK NetworksAPNIC
512 vistas26 diapositivas
KHNOG 5: RPKI Status Update por
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status UpdateAPNIC
403 vistas25 diapositivas
KHNOG 5: APNIC Services por
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC ServicesAPNIC
416 vistas15 diapositivas
PITA Strategy Forum 2023: Internet resilience por
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilienceAPNIC
440 vistas7 diapositivas
SANOG 40: DDoS in South Asia por
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaAPNIC
352 vistas52 diapositivas

Más de APNIC(20)

IETF 118: Starlink Protocol Performance por APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC394 vistas
HKNOG 12.0: RPKI Actions Required by HK Networks por APNIC
HKNOG 12.0: RPKI Actions Required by HK NetworksHKNOG 12.0: RPKI Actions Required by HK Networks
HKNOG 12.0: RPKI Actions Required by HK Networks
APNIC512 vistas
KHNOG 5: RPKI Status Update por APNIC
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status Update
APNIC403 vistas
KHNOG 5: APNIC Services por APNIC
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC416 vistas
PITA Strategy Forum 2023: Internet resilience por APNIC
PITA Strategy Forum 2023: Internet resiliencePITA Strategy Forum 2023: Internet resilience
PITA Strategy Forum 2023: Internet resilience
APNIC440 vistas
SANOG 40: DDoS in South Asia por APNIC
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
APNIC352 vistas
SANOG 40: RPKI in South Asia por APNIC
SANOG 40: RPKI in South AsiaSANOG 40: RPKI in South Asia
SANOG 40: RPKI in South Asia
APNIC353 vistas
RenasCON 2023: Learning from honeypots por APNIC
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
APNIC429 vistas
IGF 2023: DNS Privacy por APNIC
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC434 vistas
MNSEC Conference 2023: Mining Bots por APNIC
MNSEC Conference 2023: Mining BotsMNSEC Conference 2023: Mining Bots
MNSEC Conference 2023: Mining Bots
APNIC424 vistas
VNIX-NOG 2023: IPv6 Deployment in government networks por APNIC
VNIX-NOG 2023: IPv6 Deployment in government networksVNIX-NOG 2023: IPv6 Deployment in government networks
VNIX-NOG 2023: IPv6 Deployment in government networks
APNIC431 vistas
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids por APNIC
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalidsVNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
VNIX-NOG 2023: State of RPKI in APAC - Cleaning up invalids
APNIC427 vistas
SGNOG 10: IPv6 Insights in South East Asia por APNIC
SGNOG 10: IPv6 Insights in South East AsiaSGNOG 10: IPv6 Insights in South East Asia
SGNOG 10: IPv6 Insights in South East Asia
APNIC416 vistas
mnNOG 5: Open source SD-WAN por APNIC
mnNOG 5: Open source SD-WANmnNOG 5: Open source SD-WAN
mnNOG 5: Open source SD-WAN
APNIC482 vistas
mnNOG 2023: State of IPv6 in Mongolia por APNIC
mnNOG 2023: State of IPv6 in MongoliamnNOG 2023: State of IPv6 in Mongolia
mnNOG 2023: State of IPv6 in Mongolia
APNIC933 vistas
mnNOG 2023: On GEOs, LEOs and Starlink por APNIC
mnNOG 2023: On GEOs, LEOs and StarlinkmnNOG 2023: On GEOs, LEOs and Starlink
mnNOG 2023: On GEOs, LEOs and Starlink
APNIC496 vistas
AusNOG 2023: RPKI and whois updates por APNIC
AusNOG 2023: RPKI and whois updatesAusNOG 2023: RPKI and whois updates
AusNOG 2023: RPKI and whois updates
APNIC566 vistas
AusNOG 2023: A quick look at QUIC por APNIC
AusNOG 2023: A quick look at QUICAusNOG 2023: A quick look at QUIC
AusNOG 2023: A quick look at QUIC
APNIC583 vistas
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives por APNIC
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APNIC607 vistas
APAN 56: APNIC Report por APNIC
APAN 56: APNIC Report APAN 56: APNIC Report
APAN 56: APNIC Report
APNIC293 vistas

Último

hamro digital logics.pptx por
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
9 vistas36 diapositivas
PORTFOLIO 1 (Bret Michael Pepito).pdf por
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
9 vistas6 diapositivas
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
5 vistas24 diapositivas
Affiliate Marketing por
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
17 vistas30 diapositivas
WEB 2.O TOOLS: Empowering education.pptx por
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vistas16 diapositivas
information por
informationinformation
informationkhelgishekhar
10 vistas4 diapositivas

Último(9)

PORTFOLIO 1 (Bret Michael Pepito).pdf por brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04109 vistas
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh5 vistas
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 vistas
Marketing and Community Building in Web3 por Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 vistas
Building trust in our information ecosystem: who do we trust in an emergency por Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat109 vistas

btNOG 10: Open source SD-WAN

  • 1. 1 Open source SD-WAN One man’s decent into Madness Dave Phelan - APNIC
  • 2. 2 Who Am I? • Dave Phelan – Network and Infrastructure engineer for a LONG time – Trainer at APNIC – Parent to 2 Human children and 2 Fur Children – Likes Cat memes • [Date[ • [xx]
  • 3. 3 3 What are we going to talk about? • Why am I talking about ANOTHER overlay network? • What is SD-WAN? • What are the “standards” for this? • What are my FOSS options? • How do I do it? • Should I do it (or what problem am I solving)?
  • 4. 4 Why am I talking about this? • Post training surveys – Most requested content • Finding solutions that don’t have a vendor lock in – This is HARD…Or is it? • Like it or not, SD-WAN is being deployed
  • 5. 5 What is SD-WAN • Defined in MEF-70(07/2019) Updated MEF- 70.1(11/2021) • SD-WAN Is a Virtual Overlay Network • Operates over one or more underlay (Layer 3) services • Centralised Management and Orchestration – Usually via a Vendor Portal • Provisions for Flexible routing – Application based routing (YMMV) – Load balanced/Preferred/failover etc
  • 6. 6 What is SD-WAN – Components - 1 • Underlay Network – The network that our SD-WAN sits over the top of. – Can be any form of connectivity as long as we have L3 • LTE/Ethernet/MPLS/Commodity BB etc • Overlay Network – Virtual Tunnels for our SD-WAN Network • SD-WAN Edge Device – Serve as endpoints for connectivity to the Virtual Fabric – Encapsulate and forward the traffic based on Policies
  • 7. 7 What is SD-WAN – Components - 2 • SD-WAN Controller – Manages and Orchestrates the Overlay Network – Policy/routing definition is done here • Management and Orchestration – UI into the controller – Allows for configuration of our Edges and creation of policy/routing
  • 8. 8 What is SD-WAN – Components - 3 MEF-70.1 Page 13
  • 9. 9 What are the Standards? • MEF-70.1 – It defines the components, features, and Framework • https://www.mef.net/resources/mef-70-1-sd-wan-service-attributes-and-service- framework/ – Vendor Interop is questionable(non-existent) • You have to drink the kool-aid – It covers off the “Do” and “Don’t”, “Must”, and “Should” – It’s all about the Subscriber and Supplier • Not so much about the “how”
  • 10. 10 What are my FOSS Options? • There are now many options – Zero-Tier – Headscale(Based on Tailscale) – Flexiwan – Zevenet – VyOS – Others…… • BUT They all have drawbacks – Limited Options for self-hosted controller/UI – Still broken interop – Not all SD-WAN Features are implemented – Some still require you to create an account(phone home)
  • 11. 11 How do I do it? • Choose an Open source Option • Install the required software on your network devices – This is where the problems start • Configure your routing policy – This is where more problems occur • Join your network devices to your Virtual Network • Magic Magic… • Packets go from A to B
  • 12. 12 How DID I do it? • Problem 1 – Network Hardware – Low Cost, but flexible – SD-WAN parts already there • or that I can Modify • Problem 2 – Which FOSS solution to use? – Does my SW Choice drive my hardware or Visa-Versa – What features am I missing? – What can I do without? – I don’t want to have to create a login with a Vendor!
  • 13. 13 How DID I do it? • Hardware/Network OS – Mikrotik ROS7 – ARM Hardware has options for Zero-Tier by additional NPK – X86 (CHR) supports docker containers • Custom Rolled my own Docker ZeroTier Container – More to come on this… • Software – ZeroTier (https://www.zerotier.com/) – Many Deployment options • Clients for Windows/Mac/Android/iPhone/Linux – Can Be run as a docker container – Doesn’t need to connect to the Mother ship (Planet servers)
  • 14. 14 How DID I do it? • Other Options could be – OpenWRT – Teltonika – Protectli(Running OpenWRT) • Still investigating these Options • Still Investigating the other Software as well
  • 15. 15 How DID I do it? • Caveats – This Method breaks the ties to the ZeroTier Roots • You CAN’T do this if you run Android/iOS clients • You CAN do this if you are running a docker/linux/wrt image • IF you want to use Android/iOS clients, you will need create a ZT login and NOT REMOVE/DISABLE the planets – Packet Processing is done in CPU • No HW offload
  • 16. 16 How DID I do it? • Challenges – Primarily for a LAB – Finding a good UI for the users – Emulating as MUCH functionality as possible • At what point do I “Draw the line” • Still building some of this
  • 17. 17 How DID I do it? • Some Zero-Tier Terminology – Planet • Zero-Tier Root Servers – Moon • User Defined Root Server – Leaf • SD-WAN Endpoints • Controllers
  • 18. 18 How DID I do it? • ZT Docker image – Unable to run an ARM image as a VM • Had to go x86(CHR) • Sits off to the side of the rest of the routing engine – Missing some tooling • jq – Parsing JSON queries from the Mikrotik API • curl – execute the API queries – Preinstall my “Moon” files • Still unsure if I can even do this on ARM_64 MT – Based on the original image • https://hub.docker.com/r/zerotier/zerotier
  • 19. 19 How DID I do it? • Step 1 – Create some new ROOT servers • At least 2 Recommended • Tooling is built-in to do this – https://docs.zerotier.com/zerotier/moons/ • Step 2 – Block access to the planet servers • IPTABLES rules/firewall rules should be sufficient • Step 3 – Install the “MOONS” on your client nodes • Details included in the above
  • 20. 20 How DID I do it? • Step 4 – Install a Node to use as a controller • Step 5 – Choose a GUI • https://github.com/dec0dOS/zero-ui • https://github.com/key-networks/ztncui – They have their Pros and Cons • Step 6 – Setup your networks and Join your clients – Configure any routing required on your end nodes
  • 21. 21 Should I do it? • What Problem am I trying to solve? – Cost? – Service Availability? – Splitting services? – User Self-Management? • They All have different answers – Can I do it another way? – Will a standard VPN do the same thing?
  • 22. 22 Should I do it? • Use Case #1 MEF-70.1 Page 98
  • 23. 23 Should I do it? • Use Case #2 MEF-70.1 Page 99