{"id":1176,"date":"2023-02-14T18:10:00","date_gmt":"2023-02-14T23:10:00","guid":{"rendered":"https:\/\/cloudlearning365.com\/?p=1176"},"modified":"2023-02-17T17:42:31","modified_gmt":"2023-02-17T22:42:31","slug":"aviatrix-edge-2-0-features-traffic-engineering","status":"publish","type":"post","link":"https:\/\/cloudlearning365.com\/?p=1176","title":{"rendered":"Aviatrix Edge 2.0 features"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In our last blog, &#8220;<a href=\"https:\/\/cloudlearning365.com\/?p=1150\">AWS Hybrid Architecture and Edge 2.0<\/a>,&#8221; we covered the workflow of registering an Edge 2.0 gateway, attaching it to Aviatrix Transit, and forming a BGP peering with on-premise devices. Now, let&#8217;s take a closer look at the features of the Edge 2.0 gateway. By leveraging Edge 2.0, enterprises gain high throughput and intelligent packet processing capabilities at the edge of their network. Edge 2.0 provides a robust set of features, including intelligent packet routing to streamline network traffic and advanced security features, such as network segmentation, to provide an added layer of protection to your network.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"1024\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1-726x1024.png\" alt=\"\" class=\"wp-image-1181\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1-726x1024.png 726w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1-213x300.png 213w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1-768x1083.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1-1089x1536.png 1089w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-1-1.png 1191w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/figure>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Quick indexes<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#Customize-Spoke-Advertised-VPC-CIDRs\">Customize Spoke Advertised VPC CIDRs<\/a><\/li>\n\n\n\n<li><a href=\"#Gateway-Manual-BGP-Advertised-Network-List\">Gateway Manual BGP Advertised Network List<\/a><\/li>\n\n\n\n<li><a href=\"#Connection-Manual-BGP-Advertised-Network-List\">Connection Manual BGP Advertised Network List<\/a><\/li>\n\n\n\n<li><a href=\"#Preserve-AS-Path\">Preserve AS Path<\/a><\/li>\n\n\n\n<li><a href=\"#Gateway-AS-Path-Prepend\">Gateway AS Path Prepend<\/a><\/li>\n\n\n\n<li><a href=\"#Connection-AS-Path-Prepend\">Connection AS Path Prepend<\/a><\/li>\n\n\n\n<li><a href=\"#Transitive-Routing\">Transitive Routing<\/a><\/li>\n\n\n\n<li><a href=\"#Network Segmentation\">Network Segmentation<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Current-setup\">Current setup<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Aviatrix Transit will learn all the specific routes from TGW: 10.32.1.0\/24, 1.32.3.0\/24 and 10.64.254.0\/23. Since the security VPC is also used for Egress inspection, the default route 0.0.0.0\/0 is also been advertised. Aviatrix Transit will used the Edge 2.0 gateway to advertise these ranges towards on-premise router via overlay High Performance Encryption BGP over IPSec tunnels.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Aviatrix Transit VPC CIDR: 10.64.0.0\/23 will be advertised by VGW towards on-premise router via underlay Direct Connect connection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On-premise router have following BGP configuration:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Peering with AWS DXGW(Direct Connect Gateway) via VIF (Direct Connect Virtual Interface) 169.254.96.17<\/li>\n\n\n\n<li>Peering with Edge 2.0 LAN interface 10.1.12.2<\/li>\n\n\n\n<li>Advertises: 10.1.13.0\/24 and 10.1.88.88<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>show running-config | sec router\nrouter bgp 65300\n bgp log-neighbor-changes\n network 10.1.13.0 mask 255.255.255.0\n network 10.1.88.88 mask 255.255.255.255\n neighbor 10.1.12.2 remote-as 65010\n neighbor 10.1.12.2 description Edge LAN\n neighbor 169.254.96.17 remote-as 65020\n neighbor 169.254.96.17 description VIF\n neighbor 169.254.96.17 password 7 055B1E0...<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">From the on-premise router, we can see four prefixes of as-path of 65010 (Edge) 65001 (Aviatrix Transit). These came from overlay. We can also see 1 prefixes of as-path of 65020, this came from underlay.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 36, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 65010 65001 i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 65010 65001 i\n<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">On Aviatrix Controller, Multi-Cloud Transit <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-1024x456.png\" alt=\"\" class=\"wp-image-1178\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-1024x456.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-300x134.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-768x342.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-1536x685.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30-500x223.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-30.png 1734w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Aviatrix Controller, Multi-Cloud Transit  -&gt; Transit -&gt; Select Transit gateway -&gt; Details\/ Diag, under Route Info DB Details,<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We can see that 0\/0, 10.32.3.0\/24, 10.64.254.0\/23 and 10.32.1.0\/24 came from TGW VPC attachments. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">10.1.13.0\/24 and 10.1.88.88\/32 came from Edge peering, with as-path of 65010 (Edge), 65300 (ISR)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"473\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-1024x473.png\" alt=\"\" class=\"wp-image-1180\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-1024x473.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-300x139.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-768x355.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-1536x709.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32-500x231.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-32.png 1663w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Aviatrix Controller, Multi-Cloud Transit  -&gt; Transit -&gt; Select Transit gateway -&gt;  Details\/ Diag, under <strong>Gateway Routing Table<\/strong> click on the two circling arrows. This is the Linux routing table on the Transit Gateway. Aviatrix coverts the routes learned via Aviatrix Spoke\/Edge attachments, as well as from external BGP devices to Linux routing table. In the end, it doesn&#8217;t really matter what&#8217;s in the BGP, Linux will use it&#8217;s own routing table to determine where to send the traffic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-1024x681.png\" alt=\"\" class=\"wp-image-1182\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-1024x681.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-300x199.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-768x510.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-1536x1021.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-2048x1361.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-33-451x300.png 451w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Since the setup is using Aviatrix Orchestrated TGW, it uses eth1 to communicate to TGW side of VPCs, such as 10.32.1.0\/24, 10.32.3.0\/24&#8230;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">10.1.12.2\/32 is Edge LAN interface<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">10.1.13.0\/24 and 10.1.88.88\/32 is been advertised via ISR towards Edge LAN interface.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">10.1.13.0\/24 and 10.1.88.88\/32 also have a backup route via the HA transit gateway.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Customize-Spoke-Advertised-VPC-CIDRs\">Customize Spoke Advertised VPC CIDRs<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Multi-cloud transit -&gt; List -&gt; Spoke -&gt; Select Edge Gateway -&gt; Actions -&gt; Customize Spoke Advertised VPC CIDRs<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"485\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-1024x485.png\" alt=\"\" class=\"wp-image-1184\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-1024x485.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-300x142.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-768x364.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-1536x728.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34-500x237.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-34.png 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Let&#8217;s enter something here, such as 77.77.77.77\/32, someone&#8217;s lucky number maybe?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"300\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-35.png\" alt=\"\" class=\"wp-image-1185\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-35.png 709w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-35-300x127.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-35-500x212.png 500w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Route Info DB<\/strong>, we can see this gets inserted. Remember that it&#8217;s a BGP like behavior.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"518\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-1024x518.png\" alt=\"\" class=\"wp-image-1186\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-1024x518.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-300x152.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-768x389.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-1536x777.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36-500x253.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-36.png 1660w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Gateway Routing Table<\/strong>, we can also see this gets inserted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"360\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-1024x360.png\" alt=\"\" class=\"wp-image-1187\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-1024x360.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-300x105.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-768x270.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-1536x539.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-2048x719.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-37-500x176.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In VPC that are attached to Aviatrix Orchestrated TGW routing table, we can see this entry gets inserted pointing towards TGW<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-1024x461.png\" alt=\"\" class=\"wp-image-1188\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-1024x461.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-300x135.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-768x346.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-1536x691.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38-500x225.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-38.png 1664w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">If the firewall is also orchestrated by Aviatrix, this will also be programed. I&#8217;m using a GWLB enabled Firewall, which is a Firewall on a stick, where outbound traffic go back via the same inbound interface, hence it cannot have routing table management via Aviatrix. (Sorry cannot provide a screenshot of Firewall route table here!)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">TGW routing table: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"545\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-1024x545.png\" alt=\"\" class=\"wp-image-1189\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-1024x545.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-300x160.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-768x409.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-1536x817.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39-500x266.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-39.png 1757w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">ISR routing table, nothing added<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 36, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 65010 65001 i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 65010 65001 i\n<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Summary: <strong>Customize Spoke Advertised VPC CIDRs<\/strong> tells Aviatrix fabric that specified prefix will be coming from this Spoke, which will be propagated throughout Aviatrix fabric. But it will not send over to it&#8217;s external BGP peers. Aviatrix is intelligence to handle Software Defined Networking, whether it&#8217;s on VPC routing table, orchestrated TGW routing table, orchestrated Firewall routing table, or Aviatrix Gateway routing table.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Gateway-Manual-BGP-Advertised-Network-List\">Gateway Manual BGP Advertised Network List<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Multi-cloud transit -&gt; Advanced Config -&gt; Edit Spoke -&gt; Select the Edge gateway -&gt; Gateway Manual BGP Advertised Network List<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"627\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40-1024x627.png\" alt=\"\" class=\"wp-image-1191\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40-1024x627.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40-300x184.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40-768x470.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40-490x300.png 490w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-40.png 1338w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Route Info DB<\/strong>, not observed<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"464\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-1024x464.png\" alt=\"\" class=\"wp-image-1192\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-1024x464.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-300x136.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-768x348.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-1536x695.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41-500x226.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-41.png 1650w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Gateway Routing Table<\/strong>, not observed<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"679\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-1024x679.png\" alt=\"\" class=\"wp-image-1193\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-1024x679.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-300x199.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-768x509.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-1536x1018.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-2048x1357.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-42-453x300.png 453w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">On ISR, we can see all previously advertised routes via Aviatrix Transit disappeared, now we only have 10.64.0.0\/23 from 65020 (DXGW underlay). Also the 77.77.77.77\/32 came from 65010 (Edge), Aviatrix Transit AS number is not in the as-path.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 41, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">77.77.77.77\/32   10.1.12.2                0             0 65010 i<\/mark>\n<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Summary: <strong>Gateway Manual BGP Advertised Network List<\/strong> will make Edge gateway advertise towards all it&#8217;s BGP peers of selected CIDR, and it will be shown as coming from the Edge gateway. It is a manual entry that will completely override all the prefixes coming from Aviatrix fabric. Use case would be provide a summarized route to on-prem. Let&#8217;s say that we want to advertise 10.32.0.0\/16 to on-prem instead of more specific routes:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"202\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-43.png\" alt=\"\" class=\"wp-image-1194\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-43.png 624w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-43-300x97.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-43-500x162.png 500w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 43, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">10.32.0.0\/16     10.1.12.2                0             0 65010 i<\/mark>\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Terraform: In <strong><a href=\"https:\/\/registry.terraform.io\/providers\/AviatrixSystems\/aviatrix\/latest\/docs\/resources\/aviatrix_edge_spoke\">aviatrix_edge_spoke<\/a><\/strong> resource or <strong><a href=\"https:\/\/registry.terraform.io\/modules\/terraform-aviatrix-modules\/mc-edge\/aviatrix\/latest\">mc-edge<\/a><\/strong> module, this option maps to: <strong>spoke_bgp_manual_advertise_cidrs<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Connection-Manual-BGP-Advertised-Network-List\">Connection Manual BGP Advertised Network List<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Multi-cloud transit -&gt; Advanced Config -&gt; Edit Spoke -&gt; Select the Edge gateway -&gt; Connection Manual BGP Advertised Network List<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Connection Manual BGP Advertised Network List<\/strong> is similar to <strong><a href=\"#Gateway-Manual-BGP-Advertised-Network-List\">Gateway Manual BGP Advertised Network List<\/a><\/strong> mentioned about. The Edge gateway may have multiple external BGP peers, which may creates multiple connections. <strong>Gateway Manual BGP Advertised Network List<\/strong> will advertise to *ALL* it&#8217;s BGP peers of the specified prefixes. With <strong>Connection Manual BGP Advertised Network List<\/strong> you can specify which BGP peer you want to perform the manual advertisement.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"369\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-44.png\" alt=\"\" class=\"wp-image-1197\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-44.png 640w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-44-300x173.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-44-500x288.png 500w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Preserve-AS-Path\">Preserve AS Path<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Multi-cloud transit -&gt; Advanced Config -&gt; Edit Spoke -&gt; Select the Edge gateway -&gt;  Preserve AS Path<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">According to <a href=\"https:\/\/docs.aviatrix.com\/documentation\/latest\/building-your-network\/bgp-connection-settings.html?expand=true#preserve-as-path\">Aviatrix Document<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Preserve As Path option is applicable to both Gateway Manual BGP Advertised Network List and Connection Manual BGP Advertised Network List. When disabled, behavior defaults to the AS path being stripped during BGP route advertisements from transit or spoke gateways to neighbors. When enabled, AS Path is preserved. Gateways will not advertise manual BGP advertised CIDRs if the CIDRs are no longer in the best route DB.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"321\" height=\"126\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-45.png\" alt=\"\" class=\"wp-image-1199\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-45.png 321w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-45-300x118.png 300w\" sizes=\"auto, (max-width: 321px) 100vw, 321px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">What exactly does this mean? Let&#8217;s say that we are adding a spoke VPC on the right, and attach it to Aviatrix Transit, then we use the forementioned: <a href=\"#Customize-Spoke-Advertised-VPC-CIDRs\">Customize Spoke Advertised VPC CIDRs<\/a> on this spoke towards Aviatrix transit. Now that the 77.77.77.77\/32 is within Best Route table, as Aviatrix fabric consider this prefix came from the spoke. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"932\" height=\"1024\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46-932x1024.png\" alt=\"\" class=\"wp-image-1200\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46-932x1024.png 932w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46-273x300.png 273w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46-768x844.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46-1398x1536.png 1398w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-46.png 1540w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">On the Edge, when we specify <strong>Manual BGP Advertised Network List<\/strong> using 77.77.77.77\/32 + Preserve AS Path, on-premise ISR will learn following. Unlike previously the prefix as-path was just from the Edge, now you can see the full as-path.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 56, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 77.77.77.77\/32   10.1.12.2                0             0 65010 65001 i\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Gateway-AS-Path-Prepend\"><strong>Gateway AS Path Prepend<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Multi-cloud transit -&gt; Advanced Config -&gt; Edit Spoke -&gt; Select the Edge gateway -&gt; Gateway AS Path Prepend<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You can prepend Edge gateway ASN here, the net effect is Edge gateway ASN will be appended to the prefixes advertise to on-premise. The use case would be wanting to use this Edge as secondary route.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"417\" height=\"200\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-47.png\" alt=\"\" class=\"wp-image-1201\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-47.png 417w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-47-300x144.png 300w\" sizes=\"auto, (max-width: 417px) 100vw, 417px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Route Info DB<\/strong>, the edge as-prepend has been inserted for the prefixes received from on-premise<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-1024x423.png\" alt=\"\" class=\"wp-image-1203\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-1024x423.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-300x124.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-768x318.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-1536x635.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49-500x207.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-49.png 1833w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Gateway Routing Table<\/strong>, no change observed<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"549\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-1024x549.png\" alt=\"\" class=\"wp-image-1204\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-1024x549.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-300x161.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-768x412.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-1536x823.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-2048x1098.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-50-500x268.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">ISR side, we can see that prefixes from Edge have been prepended. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 68, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n<\/code><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">Terraform: In <strong><a href=\"https:\/\/registry.terraform.io\/providers\/AviatrixSystems\/aviatrix\/latest\/docs\/resources\/aviatrix_edge_spoke\">aviatrix_edge_spoke<\/a><\/strong> resource or <strong><a href=\"https:\/\/registry.terraform.io\/modules\/terraform-aviatrix-modules\/mc-edge\/aviatrix\/latest\">mc-edge<\/a><\/strong> module, this option maps to: prepend_as_path<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Connection-AS-Path-Prepend\"><strong>Connection AS Path Prepend<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Connection AS Path Prepend<\/strong> is similar to <strong><a href=\"#Gateway-AS-Path-Prepend\">Gateway AS Path Prepend<\/a><\/strong> mentioned before. The Edge gateway may have multiple external BGP peers, which may creates multiple connections. <strong>Gateway AS Path Prepend<\/strong> will prepend to *ALL* it&#8217;s BGP peers, while <strong>Connection AS Path Prepend<\/strong> you can specify which BGP peer you want to perform the as-prepend<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Connection AS Path Prepend towards Connection to onprem device <\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Following example shows AS Path Prepend on Edge gateway, on the connection from Edge to the on-premise router. Since the setting is on Edge gateway, you need to provide Edge AS number.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"363\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-51.png\" alt=\"\" class=\"wp-image-1206\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-51.png 413w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-51-300x264.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-51-341x300.png 341w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Remember <strong><a href=\"#Gateway-AS-Path-Prepend\">Gateway AS Path Prepend<\/a><\/strong>, the prepends were towards both Aviatrix Transit attachment, as well as Edge BGP peers. However, for this example, the as-prepend is only applied on the connection from Edge to OnPrem router, hence Aviatrix Transit won&#8217;t observe this prepend.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Route Info DB<\/strong>, we indeed don&#8217;t observe this prepend<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-1024x465.png\" alt=\"\" class=\"wp-image-1207\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-1024x465.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-300x136.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-768x349.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-1536x697.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52-500x227.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-52.png 1661w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Gateway Routing Table<\/strong>, no change observed<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"533\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-1024x533.png\" alt=\"\" class=\"wp-image-1208\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-1024x533.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-300x156.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-768x400.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-1536x800.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-2048x1067.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-53-500x260.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">On ISR side, we do observe Edge AS prepend inserted<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp\nBGP table version is 211, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65010 65010 65010 65001<\/mark> i<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Connection AS Path Prepend towards Connection to Transit Gateway<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Now we remove the prepend from Edge to OnPrem router connection. Then add prepend from Edge to Aviatrix Transit connection<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"487\" height=\"372\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-54.png\" alt=\"\" class=\"wp-image-1209\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-54.png 487w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-54-300x229.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-54-393x300.png 393w\" sizes=\"auto, (max-width: 487px) 100vw, 487px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Route Info DB<\/strong>, we observed prepend on the prefixes received from onprem.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"421\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-1024x421.png\" alt=\"\" class=\"wp-image-1210\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-1024x421.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-300x123.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-768x316.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-1536x632.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55-500x206.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-55.png 1826w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Transit <strong>Gateway Routing Table<\/strong>, no change observed<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"556\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-1024x556.png\" alt=\"\" class=\"wp-image-1211\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-1024x556.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-300x163.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-768x417.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-1536x834.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-2048x1112.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-56-500x272.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">On ISR side, we won&#8217;t observe the as-prepend<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ISR-2#show ip bgp \nBGP table version is 96, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 65010 65001 i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 65010 65001 i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 65010 65001 i\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Terraform<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In <a href=\"https:\/\/registry.terraform.io\/providers\/AviatrixSystems\/aviatrix\/latest\/docs\/resources\/aviatrix_edge_spoke_transit_attachment\">aviatrix_edge_spoke_transit_attachment<\/a> resource or <strong><a href=\"https:\/\/registry.terraform.io\/modules\/terraform-aviatrix-modules\/mc-edge\/aviatrix\/latest\">mc-edge<\/a><\/strong> module, you may use spoke_prepend_as_path. This is applied to Edge gateway, on the connection from Edge towards Aviatrix transit. (The connection is always named as &lt;transit_gw_name&gt;-peering). The setting is applied on Edge, so you need to provide Edge AS number.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"427\" height=\"368\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-66.png\" alt=\"\" class=\"wp-image-1230\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-66.png 427w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-66-300x259.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-66-348x300.png 348w\" sizes=\"auto, (max-width: 427px) 100vw, 427px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"477\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-1024x477.png\" alt=\"\" class=\"wp-image-1228\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-1024x477.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-300x140.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-768x358.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-1536x716.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65-500x233.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-65.png 1796w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">ISR side: Since this prepend is from Edge towards Transit Gateway, ISR won&#8217;t get AS Prepend.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In <a href=\"https:\/\/registry.terraform.io\/providers\/AviatrixSystems\/aviatrix\/latest\/docs\/resources\/aviatrix_edge_spoke_transit_attachment\">aviatrix_edge_spoke_transit_attachment<\/a> resource or <strong><a href=\"https:\/\/registry.terraform.io\/modules\/terraform-aviatrix-modules\/mc-edge\/aviatrix\/latest\">mc-edge<\/a><\/strong> module, there is another setting: transit_prepend_as_path. The setting is applied to the Transit, on the connection between Transit to Edge. Since this is applied on Transit, you will need AS number of the Transit.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once applied, you can observe the result by going to: Multi-Cloud Transit -&gt; Advanced Config -&gt; Edit Transit -&gt; Select the Transit where the Edge was attached to<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-1024x413.png\" alt=\"\" class=\"wp-image-1212\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-1024x413.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-300x121.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-768x310.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-1536x620.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-2048x826.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-57-500x202.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Scroll down and in the Connection AS Path Prepend section, select the Edge to OnPrem router connection (which is always named as &lt;edge_gw&gt;-peering. Note the Transit AS prepend here.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"424\" height=\"367\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-58.png\" alt=\"\" class=\"wp-image-1213\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-58.png 424w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-58-300x260.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-58-347x300.png 347w\" sizes=\"auto, (max-width: 424px) 100vw, 424px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Since the prepend happen from Transit to Edge, it&#8217;s expected that Transit Route Info DB has no change.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-1024x465.png\" alt=\"\" class=\"wp-image-1215\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-1024x465.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-300x136.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-768x349.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-1536x698.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60-500x227.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-60.png 1661w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Of course Gateway route table has no change<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"543\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-1024x543.png\" alt=\"\" class=\"wp-image-1216\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-1024x543.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-300x159.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-768x407.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-1536x814.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-2048x1085.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-61-500x265.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">ISR side we can noticed the prepend happened on the Transit ASN<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SR-2#show ip bgp \nBGP table version is 124, local router ID is 169.254.253.10\nStatus codes: s suppressed, d damped, h history, * valid, &gt; best, i - internal,\n              r RIB-failure, S Stale, m multipath, b backup-path, x best-external, f RT-Filter\nOrigin codes: i - IGP, e - EGP, ? - incomplete\n\n   Network          Next Hop            Metric LocPrf Weight Path\nr&gt; 0.0.0.0          10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65001 65001 65001 65001<\/mark> i\n*&gt; 10.1.13.0\/24     0.0.0.0                  0         32768 i\n*&gt; 10.1.88.88\/32    0.0.0.0                  0         32768 i\n*&gt; 10.32.1.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65001 65001 65001 65001<\/mark> i\n*&gt; 10.32.3.0\/24     10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65001 65001 65001 65001<\/mark> i\n*&gt; 10.64.0.0\/23     169.254.96.17                          0 65020 i\n*&gt; 10.64.254.0\/23   10.1.12.2                0             0 <mark style=\"background-color:#e2e2e2\" class=\"has-inline-color\">65010 65001 65001 65001 65001<\/mark> i\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Transitive-Routing\"><strong>Transitive Routing<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"332\" height=\"125\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-62.png\" alt=\"\" class=\"wp-image-1218\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-62.png 332w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-62-300x113.png 300w\" sizes=\"auto, (max-width: 332px) 100vw, 332px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">If you have a edge gateway connected to multiple Aviatrix Transits, enable Edge Transit Routing would allow traffic between Aviatrix Transits flow via Edge<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I&#8217;ll give credit to following image created by <a href=\"https:\/\/www.linkedin.com\/in\/bayupw\/\">Bayu Wibowo<\/a>, he did an incredible job on Edge documents, this image is no exception. I cannot do a better job than this.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"808\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-63.png\" alt=\"\" class=\"wp-image-1219\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-63.png 653w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-63-242x300.png 242w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">As show above, once Edge Transit Routing is enabled, it allows AWS Aviatrix Transit and Azure Aviatrix Transit to use Edge gateway as a transit router. Another use case would be use as-prepend on the Aviatrix Transit Peering via Internet, so that the Transit peering via Internet would be treated as backup path, while all traffic will flow through encrypted High Performance Encryption tunnels via the Edge gateway on top of private connections, such as Direct Connect or Express Route.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"654\" height=\"799\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-64.png\" alt=\"\" class=\"wp-image-1220\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-64.png 654w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-64-246x300.png 246w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Network-Segmentation\">Network Segmentation<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In previous topology, traffic are been fully routed from anywhere to anywhere, while VPCs attached to Aviatrix Orchestrated TGW can be segmented by the Firewalls in Security VPC. What if these VPCs need to talk to Shared VPC that&#8217;s attached to Aviatrix Transit, these VPCs also need to talk to on-prem via Edge, but Shared VPC cannot be accessed by on-premise?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"922\" height=\"1024\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1-922x1024.png\" alt=\"\" class=\"wp-image-1236\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1-922x1024.png 922w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1-270x300.png 270w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1-768x853.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1-1382x1536.png 1382w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/Edge-Prepend-Copy-of-Page-1.png 1512w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Aviatrix made this very simple by introducing Network Domain concepts similar to VRF (Virtual Routing and Forwarding), but without the complexity of VRF. Let&#8217;s take a look at how this is done.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Following examples shows everything can ping everything for now:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Left: Instance in Dev VPC 10.32.1.121 successful ping Shared VPC instance 10.16.0.59<br>Instance in Dev VPC 10.32.1.121 successful ping on-prem instance 10.1.88.88<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Right: Instance in Shared VPC 10.16.0.59 successful ping Dev VPC instance 10.32.1.121<br>Instance in Shared VPC 10.16.0.59 successful ping on-prem instance 10.1.88.88<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"401\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-1024x401.png\" alt=\"\" class=\"wp-image-1238\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-1024x401.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-300x118.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-768x301.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-1536x602.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68-500x196.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-68.png 1720w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Aviatrix Controller -&gt; Multi-Cloud Transit -&gt; List -&gt; Transit Gateways -&gt; Select the Transit Gateway -&gt; Details\/ Diag -&gt; Gateway Routing Table -&gt; Click on the drop down, notice there is nothing in there at the moment.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"453\" height=\"249\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-70.png\" alt=\"\" class=\"wp-image-1240\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-70.png 453w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-70-300x165.png 300w\" sizes=\"auto, (max-width: 453px) 100vw, 453px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">CoPilot -&gt; Programmable Intent -&gt; Network Segmentations -&gt; Transit Gateways<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"522\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-69.png\" alt=\"\" class=\"wp-image-1239\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-69.png 992w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-69-300x158.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-69-768x404.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-69-500x263.png 500w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Enable Network Segmentation on specific transit gateway<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71-1024x579.png\" alt=\"\" class=\"wp-image-1241\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71-1024x579.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71-300x170.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71-768x434.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71-500x283.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-71.png 1322w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Create new network domain, one for Shared_VPC, one for On_Prem, one for AWS_TGW_Attached_Dev<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"958\" height=\"511\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-72.png\" alt=\"\" class=\"wp-image-1242\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-72.png 958w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-72-300x160.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-72-768x410.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-72-500x267.png 500w\" sizes=\"auto, (max-width: 958px) 100vw, 958px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Notice, that you can associate either an Aviatrix Spoke, or an Aviatrix Edge Gateway or an Aviatrix Orchestrated TGW Domain<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"890\" height=\"518\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-74.png\" alt=\"\" class=\"wp-image-1244\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-74.png 890w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-74-300x175.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-74-768x447.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-74-500x291.png 500w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In my lab setup, I have this Aviatrix Spoke aws-ue1-spoke, let&#8217;s assume this is the Shared VPC and add it to <strong>Shared_VPC <\/strong>network domain. This interface actually allow you to perform three actions in one step:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Creation of Network Domain<\/li>\n\n\n\n<li>Association of Aviatrix Spoke, or an Aviatrix Edge Gateway or an Aviatrix Orchestrated TGW Domain to this Network Domain<\/li>\n\n\n\n<li>Create a Connection Policy between Network Domains (Similar to VRF Leak)<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Since we don&#8217;t have any Network Domain yet, let&#8217;s just use first two steps<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"893\" height=\"531\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-73.png\" alt=\"\" class=\"wp-image-1243\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-73.png 893w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-73-300x178.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-73-768x457.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-73-500x297.png 500w\" sizes=\"auto, (max-width: 893px) 100vw, 893px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Aviatrix Controller -&gt; Multi-Cloud Transit -&gt; List -&gt; Transit Gateways -&gt; Select the Transit Gateway -&gt; Details\/ Diag -&gt; Gateway Routing Table -&gt; Click on the drop down, notice there is a new Route Table called Shared_VPC. This matches to the Network Domain we just created, this is a good indication that we are creating a new Routing Table for this network domain, similar to what VRF does.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"429\" height=\"245\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-75.png\" alt=\"\" class=\"wp-image-1245\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-75.png 429w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-75-300x171.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Now let&#8217;s add Edge to <strong>On_Prem <\/strong>Network domain and associate Edge gateway branch1 to it. Since Shared_VPC is the only other Network domain, we don&#8217;t want On_Prem to talk to Shared_VPC, so leave Connect to Network Domain empty<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"520\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-76.png\" alt=\"\" class=\"wp-image-1246\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-76.png 886w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-76-300x176.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-76-768x451.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-76-500x293.png 500w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Aviatrix Controller -&gt; Multi-Cloud Transit -&gt; List -&gt; Transit Gateways -&gt; Select the Transit Gateway -&gt; Details\/ Diag -&gt; Gateway Routing Table -&gt; Click on the drop down, notice now we have two network domains. (We can have up to 250 Network Domains per Transit, which is the limit of Linux routing table)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"447\" height=\"284\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-77.png\" alt=\"\" class=\"wp-image-1247\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-77.png 447w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-77-300x191.png 300w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Now try to add Dev VPC to <strong>AWS_TGW_Attached_Dev <\/strong>Network domain, and try to connect with Shared_VPC network domain:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"519\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-78.png\" alt=\"\" class=\"wp-image-1248\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-78.png 873w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-78-300x178.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-78-768x457.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-78-500x297.png 500w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Since I&#8217;m using Security VPC inspecting the Dev VPC, error would occur. In the past, Aviatrix Orchestrated TGW Network Domain cannot have connection policy with Aviatrix Spoke Network Domain. Newer release added this feature, but it&#8217;s limited to only Aviatrix Orchestrated TGW Network Domains that are not been inspected.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"877\" height=\"703\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-79.png\" alt=\"\" class=\"wp-image-1249\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-79.png 877w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-79-300x240.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-79-768x616.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-79-374x300.png 374w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Check current status, network domain AWS_TGW_Attached_Dev created, and have a connection policy to Shared_VPC, but not associated with Dev VPC yet.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"854\" height=\"262\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-80.png\" alt=\"\" class=\"wp-image-1250\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-80.png 854w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-80-300x92.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-80-768x236.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-80-500x153.png 500w\" sizes=\"auto, (max-width: 854px) 100vw, 854px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">After disabled E\/W and Egress inspection of the Dev VPC, now I&#8217;m able to add the Dev VPC to AWS_TGW_Attached_Dev<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"267\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-81.png\" alt=\"\" class=\"wp-image-1251\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-81.png 781w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-81-300x103.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-81-768x263.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-81-500x171.png 500w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In Aviatrix Controller -&gt; Multi-Cloud Transit -&gt; List -&gt; Transit Gateways -&gt; Select the Transit Gateway -&gt; Details\/ Diag -&gt; Gateway Routing Table -&gt; Click on the drop down, notice now we have three network domains. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"444\" height=\"328\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-82.png\" alt=\"\" class=\"wp-image-1252\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-82.png 444w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-82-300x222.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-82-406x300.png 406w\" sizes=\"auto, (max-width: 444px) 100vw, 444px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Note OnPrem isn&#8217;t connected to anything yet. Let&#8217;s try to connect On-Prem with Dev but not Shared<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"173\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89-1024x173.png\" alt=\"\" class=\"wp-image-1262\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89-1024x173.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89-300x51.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89-768x130.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89-500x84.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-89.png 1422w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Logic view clearly shows that dev are connected to both onprem and shared network domains. But there&#8217;s no connection between onprem and shared.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1025\" height=\"945\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-90.png\" alt=\"\" class=\"wp-image-1263\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-90.png 1025w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-90-300x277.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-90-768x708.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-90-325x300.png 325w\" sizes=\"auto, (max-width: 1025px) 100vw, 1025px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Now check connectivity<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Left: Instance in Dev VPC 10.32.1.121 successful ping Shared VPC instance 10.16.0.59<br>Instance in Dev VPC 10.32.1.121 FAILED to ping on-prem instance 10.1.88.88<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Right: Instance in Shared VPC 10.16.0.59 successful ping Dev VPC instance 10.32.1.121<br>Instance in Shared VPC 10.16.0.59 successful ping on-prem instance 10.1.88.88<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"402\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-1024x402.png\" alt=\"\" class=\"wp-image-1264\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-1024x402.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-300x118.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-768x302.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-1536x603.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91-500x196.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-91.png 1703w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">So far I have not touched any routing table, and Aviatrix Controller did all the heavy lifting. This is truly indent based routing. Instead of wrangling with routing tables, Let&#8217;s leave the computer do what it can do best \ud83d\ude42<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In case you want to see what&#8217;s been done, here&#8217;s the routing table for AWS_TGW_Attached_Dev<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"466\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-1024x466.png\" alt=\"\" class=\"wp-image-1265\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-1024x466.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-300x136.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-768x349.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-1536x699.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-2048x932.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-92-500x227.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Shared VPC<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"364\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-1024x364.png\" alt=\"\" class=\"wp-image-1266\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-1024x364.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-300x107.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-768x273.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-1536x547.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-2048x729.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-93-500x178.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">On-Prem<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-1024x413.png\" alt=\"\" class=\"wp-image-1267\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-1024x413.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-300x121.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-768x310.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-1536x619.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-2048x825.png 2048w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-94-500x202.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Route Info BD also shows the separate routing tables.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"404\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-1024x404.png\" alt=\"\" class=\"wp-image-1268\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-1024x404.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-300x118.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-768x303.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-1536x606.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95-500x197.png 500w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2023\/02\/image-95.png 1719w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Conclusion\">Conclusion<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Aviatrix Edge 2.0 is a feature-rich solution for connecting multiple clouds and regions with a focus on high performance, security, and availability. <\/li>\n\n\n\n<li>It offers advanced features for influencing routing decisions and is fully supported by Terraform providers and modules, making it easy for enterprises to rapidly deploy connectivity from multiple data centers to the cloud. <\/li>\n\n\n\n<li>With Aviatrix Edge 2.0, creating network segmentation is a breeze. You can define a network domain, associate it with a connection policy. CoPilot further simplifies this workflow by performing both steps simultaneously. This intent-based network segmentation can greatly simplify and clarify your IT operations.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In our last blog, &#8220;AWS Hybrid Architecture and Edge 2.0,&#8221; we covered the workflow of registering an Edge 2.0 gateway, attaching it to Aviatrix Transit, and forming a BGP peering with on-premise devices. Now, let&#8217;s take a closer look at &hellip; <a href=\"https:\/\/cloudlearning365.com\/?p=1176\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,8],"tags":[],"class_list":["post-1176","post","type-post","status-publish","format-standard","hentry","category-aviatrix","category-terraform"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1176"}],"version-history":[{"count":21,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1176\/revisions"}],"predecessor-version":[{"id":1275,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1176\/revisions\/1275"}],"wp:attachment":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}