DEV Community

Masaki Okuda
Masaki Okuda

Posted on

[HandsOn]Launching and testing Cisco Catalyst 8000V for SD-WAN & Routing on AWS

Introduction

Thank you for always reading our articles!

I was personally curious as to whether it was possible to build a Cisco Catalyst 8000V for SD-WAN & Routing environment on AWS, so I did some research.

After trying out a few things on the Market Place(AWS), I found Cisco Catalyst 8000V for SD-WAN & Routing as something that looked like it could be built, so I would like to try that out.

from Japanese
There was also a license for the Free Plan of the Cisco Catalyst SD-WAN C8000v (virtual router), but it seems that users in Japan could not set it up due to a violation of the license terms.

Target audience

  • Those who have unavoidable circumstances and want to test Cisco Catalyst SD-WAN
  • A rare person who wants to try using a Cisco router on AWS
  • Looking for people with extensive networking experience

Goals

  • Deploying Cisco Catalyst 8000V in an AWS environment
  • Verify that you can run basic commands

The following is not covered:

  • Building the Manager, Controller, and Validator required for Cisco Catalyst SD-WAN
  • Configuring physical devices such as cEdge

Cisco Documents
https://www.cisco.com/c/ja_jp/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html
https://www.cisco.com/c/ja_jp/td/docs/routers/C8000V/AWS/deploying-c8000v-on-amazon-web-services/overview.html

Hands On

  • Enter "Market Place" in the search box at the top of the AWS console screen

Image description

  • The screen will change, so click Detect Product on the left pane.
  • After clicking, enter Cisco Catalyst 8000V for SD-WAN & Routing in the center input box.
  • Search results will be displayed, so click on the search result

Image description

  • The Cisco Catalyst 8000V for SD-WAN & Routing Marketplace screen will be displayed, so click the View purchase options button.

Image description

Market Place URL:https://aws.amazon.com/marketplace/pp/prodview-rohvq2cjd4ccg

  • The screen will change, so click the Continue to Configuration button.
  • ※Clickable after a certain period of time

Image description

  • After clicking, the Config setting screen will be displayed.
  • Change the Region to Asia Pacific (Tokyo) and click the Continue to Launch button.

Image description

  • The screen will change, so change the drop-down menu under Choose Action to Launch through EC2.
  • After making the changes, click the Launch button.

Image description

  • Enter an appropriate instance name to transition to the EC2 setting screen.

Image description

  • Select the desired key pair and click the Launch Instance button.

Image description

  • After a certain period of time has passed, the message "Instance startup has started successfully" will be displayed.
  • Click the Show All Instances button

Image description

  • After a certain amount of time has passed, when the instance status shows 3/3 checks were successful, construction is complete.
  • Please connect to the instance using Teraterm.

Image description

Commands Check

Now that I've managed to build the C8000V, I'd like to try executing some commands.

Command Refenece:https://www.cisco.com/c/en/us/td/docs/routers/sd-routing/command/reference/sd-routing-cr-book/dapr-cr-book_chapter_01.html

show version

ip-172-31-34-128#show version
Cisco IOS XE Software, Version 17.15.02a
Cisco IOS Software [IOSXE], Virtual XE Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.15.2a, RELEASE SOFTWARE (fc7)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2025 by Cisco Systems, Inc.
Compiled Thu 06-Mar-25 19:10 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2025 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON

ip-172-31-34-128 uptime is 13 minutes
Uptime for this control processor is 15 minutes
System returned to ROM by reload
System image file is "bootflash:packages.conf"
Last reload reason: Unknown reason



This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
[email protected].


Technology Package License Information:
Controller-managed

The current throughput level is 20000 kbps


Smart Licensing Status: Smart Licensing Using Policy

cisco C8000V (VXE) processor (revision VXE) with 1892243K/3075K bytes of memory.
Processor board ID 9NRP91KBRS6
Router operating mode: Autonomous (SD-Routing)
1 Gigabit Ethernet interface
32768K bytes of non-volatile configuration memory.
5000596K bytes of physical memory.
11526144K bytes of virtual hard disk at bootflash:.

Configuration register is 0x2102

ip-172-31-34-128#
Enter fullscreen mode Exit fullscreen mode

show running-config

ip-172-31-34-128#show running-config
Building configuration...

Current configuration : 6572 bytes
!
! Last configuration change at 14:13:07 UTC Mon Mar 31 2025 by ec2-user
!
version 17.15
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
platform qfp utilization monitor load 80
platform sslvpn use-pd
platform console virtual
!
hostname ip-172-31-34-128
!
boot-start-marker
boot-end-marker
!
!
vrf definition GS
 rd 100:100
 !
 address-family ipv4
 exit-address-family
!
logging persistent size 1000000 filesize 8192 immediate
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local none
!
!
aaa session-id common
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
login on-success log
!
!
subscriber templating
ipv6 unicast-routing
!
!
!
crypto pki trustpoint TP-self-signed-3782309302
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-3782309302
 revocation-check none
 rsakeypair TP-self-signed-3782309302
 hash sha512
!
crypto pki trustpoint SLA-TrustPoint
 enrollment pkcs12
 revocation-check crl
 hash sha512
!
!
crypto pki certificate chain TP-self-signed-3782309302
 certificate self-signed 01
  30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 0D050030
  31312F30 2D060355 04030C26 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 33373832 33303933 3032301E 170D3235 30333331 31343035
  34375A17 0D333530 33333131 34303534 375A3031 312F302D 06035504 030C2649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 37383233
  30393330 32308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
  0A028201 0100A2BD 2092EB3F 3A9C1C18 F3F04F95 847A5122 82DD97E0 55AC1145
  AC91A238 620E6EF8 7994251E F609513A 83229BD3 205F856F 9A229B82 637893F6
  7AA314BD D3679CA9 9C0769CF 7DB9FA9E C53D1C59 0EB7B6BE 2C392CEB B7742317
  71537E61 75616E30 BC71A24D 67055E3E 69161F5D 285605B6 B21DFB4A 66373B21
  A37F6E7E 8C69F1E0 AADD7E8D E5BEA8D3 E9B35588 463C9E4C 48D3C5A3 686AA4F9
  C9BEF1A0 562C1EBA 8558F171 F951FEC5 44B18757 C97D86C1 244AE841 DADC83C8
  72EA00FA 88B2627D B63D606F 3F11DD47 02F3659C F083873E 7D527288 107C4CD4
  F0882E23 A4BADA2D 9519B11A D959CFC4 3C8678A5 D1F7FD46 AC68C88E 097B57DF
  952D7F78 2B1F0203 010001A3 53305130 1D060355 1D0E0416 041478EA D363CC8B
  89E1CA02 889FD43B EB77A28F 7302301F 0603551D 23041830 16801478 EAD363CC
  8B89E1CA 02889FD4 3BEB77A2 8F730230 0F060355 1D130101 FF040530 030101FF
  300D0609 2A864886 F70D0101 0D050003 82010100 77AB683C BF306342 7404BD3A
  7F54A538 B94BC65C 6491D762 37152441 D4E81FCE 5E25057E E1CDA101 E2C22105
  4EB1B56E 9C7B54DC D35D3F60 0C3EFE05 8493EE48 FD45C1F7 ECBBCC6E 0990BE72
  6377A712 A80CEE5A 2AEC5738 45D37228 D8C63C7C C256B62B E338558D D942B9A2
  15F5DA08 A2FEBEB6 5D097800 AFF524CB 482C4DF9 2CF00BD2 6404A05D E9FCEA15
  04350893 91AF7797 D729D3C5 E217711F DB298708 A39658A0 CE12A603 48C9D292
  58053BAB 4A0EBC58 874793F4 7E202ABD 28096BE6 43956BC5 CA691329 2BDEA9F6
  CD0C2B0A E56BFC15 BEC863EC D7F6D522 F6E5DD03 70BCBB54 AEE7C2F5 1D7A7313
  0DAE6D79 6DC7D626 4B60001B 9273BE1E 3AA1B4E1
        quit
crypto pki certificate chain SLA-TrustPoint
 certificate ca 01
  30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
  32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
  6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
  3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
  43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
  526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
  82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
  CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
  1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
  4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
  7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
  68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
  C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
  C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
  DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
  06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
  4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
  03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
  604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
  D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
  467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
  7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
  5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
  80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
  418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
  D697DF7F 28
        quit
!
!
license udi pid C8000V sn 9NRP91KBRS6
memory free low-watermark processor 189210
diagnostic bootup level minimal
!
!
!
!
username ec2-user privilege 15
!
redundancy
!
!
!
!
!
!
!
!
!
!
interface VirtualPortGroup0
 vrf forwarding GS
 ip address 192.168.35.101 255.255.255.0
 ip nat inside
!
interface GigabitEthernet1
 ip address dhcp
 ip nat outside
 negotiation auto
 ipv6 address dhcp
 ipv6 enable
 ipv6 nd autoconfig default-route
!
iox
ip forward-protocol nd
ip tcp window-size 8192
!
ip http server
ip http secure-server
ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 172.31.32.1
ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 172.31.32.1 global
ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
ip ssh bulk-mode 131072
ip ssh rsa keypair-name ssh-key
ip ssh pubkey-chain
 username ec2-user
  key-hash ssh-rsa 20F55DF574092980C9981FCF4472EB7C
ip ssh server algorithm publickey ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-ed25519 ssh-rsa x509v3-ecdsa-sha2-nistp256 x509v3-ecdsa-sha2-nistp384 x509v3-ecdsa-sha2-nistp521
ip scp server enable
!
ip access-list standard GS_NAT_ACL
 10 permit 192.168.35.0 0.0.0.255
!
!
!
!
!
control-plane
!
!
line con 0
 stopbits 1
line aux 0
line vty 0 4
 transport input ssh
line vty 5 20
 transport input ssh
!
!
!
!
!
!
!
!
app-hosting appid guestshell
 app-vnic gateway1 virtualportgroup 0 guest-interface 0
  guest-ipaddress 192.168.35.102 netmask 255.255.255.0
 app-default-gateway 192.168.35.101 guest-interface 0
 name-server0 8.8.8.8
netconf-yang feature candidate-datastore
sd-routing
end
Enter fullscreen mode Exit fullscreen mode

show vlan brief

ip-172-31-34-128#show vlan brief

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
1    default                          active
1002 fddi-default                     act/unsup
1003 token-ring-default               act/unsup
1004 fddinet-default                  act/unsup
1005 trnet-default                    act/unsup

Enter fullscreen mode Exit fullscreen mode

I was unable to execute commands related to show sd-router,
so I suspect that registration with vManage may be required.

Benefits of this article

  • You can touch the Cisco Catalyst C8000V without purchasing a license from Cisco
     ☞☞It lowers the hurdle for verification in personal environments

  • Expand the scope of network design using AWS
     ☞☞Flexible operation is possible because Cisco routers can be built in a WS environment.

However, since this is not the currently released 17.16.X, you will need to take into account the differences with the actual environment.
(Personally, I think it would be better to create a CDK template since it would be nice to be able to test Cisco Catalyst SD-WAN-related items.)

Thank you for reading the article to the end.

Top comments (2)

Collapse
 
kathy_george_918aa1c5d273 profile image
Kathy George

Happy to share I passed the Cisco 700-750 Security Operations Analyst exam with CERTIONARY! This boosts my skills in cybersecurity, threat analysis, and incident response. Excited to apply this knowledge to improve security operations.

Collapse
 
masakiokuda profile image
Masaki Okuda

Good Job👍