{"id":1277,"date":"2023-03-01T15:01:40","date_gmt":"2023-03-01T20:01:40","guid":{"rendered":"https:\/\/cloudlearning365.com\/?p=1277"},"modified":"2023-08-09T17:33:37","modified_gmt":"2023-08-09T22:33:37","slug":"launch-aviatrix-spoke-gateways","status":"publish","type":"post","link":"https:\/\/cloudlearning365.com\/?p=1277","title":{"rendered":"Launch Aviatrix Spoke Gateways"},"content":{"rendered":"\n<p>In this blog, I&#8217;ve logged steps to provision AWS VPC or Azure vNet for launching Aviatrix Spoke Gateways (HPE and none-HPE)<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">AWS &#8211; HPE<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create VPC with CIDR allocated for application.<\/li>\n\n\n\n<li>Create subnets to populate application CIDR range.<\/li>\n\n\n\n<li>Create IGW and associate with VPC.<\/li>\n\n\n\n<li>For application subnets, whether they are public or private, create one dedicated route table per subnet. <\/li>\n\n\n\n<li>For application public subnet route table, associate 0.0.0.0 with IGW.<\/li>\n\n\n\n<li>On VPC, add \/25 CIDR for Aviatrix HPE spoke gateways. (Each HPE gateway require \/26 for up to 50 secondary IPs)<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt; Select VPC and enable High Performance Encryption, select the first \/26 within added \/25 range, and launch spoke gateway<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt;  Enable\/Disable HA to an Aviatrix Spoke Gateway -&gt; Select primary gateway, select the second \/26 range and AZ, click Enable<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">AWS &#8211; None HPE<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create VPC with CIDR allocated for application.<\/li>\n\n\n\n<li>Create subnets to populate application CIDR range.<\/li>\n\n\n\n<li>Create IGW and associate with VPC.<\/li>\n\n\n\n<li>For application subnets, whether they are public or private, create one dedicated route table per subnet.<\/li>\n\n\n\n<li>For application public subnet route table, associate 0.0.0.0 with IGW.<\/li>\n\n\n\n<li>On VPC, add \/27 CIDR for Aviatrix none HPE spoke gateways. <\/li>\n\n\n\n<li>Within \/27 range, create two \/28 subnets in different AZ, one for primary spoke gateway, one for HA spoke gateway.<\/li>\n\n\n\n<li>Create route table for each spoke gateway subnet, and associate 0.0.0.0 with IGW<\/li>\n\n\n\n<li>Associate each route table to corresponding subnet<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt; Select VPC, select the first \/28 subnet, and launch spoke gateway<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt;  Enable\/Disable HA to an Aviatrix Spoke Gateway -&gt; Select primary gateway, select the second \/28 subnet, click Enable<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Azure &#8211; HPE<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create vNet with CIDR allocated for application.<\/li>\n\n\n\n<li>Create subnets to populate application CIDR range.<\/li>\n\n\n\n<li>For application subnets, whether they are public or private, create one dedicated route table per subnet.<\/li>\n\n\n\n<li>For application public subnet route table, associate 0.0.0.0 with internet.<\/li>\n\n\n\n<li>For application private subnet route table, associate 0.0.0.0 with none.<\/li>\n\n\n\n<li>Associate each route table to corresponding subnet<\/li>\n\n\n\n<li>On vNet address space, add \/25 CIDR for Aviatrix HPE spoke gateways. (Each HPE gateway require \/26 for up to 50 secondary IPs)<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt; Select vNet and enable High Performance Encryption, select the first \/26 within added \/25 range, and launch spoke gateway<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt;  Enable\/Disable HA to an Aviatrix Spoke Gateway -&gt; Select primary gateway, select the second \/26 range and AZ, click Enable<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Azure &#8211; None HPE<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create vNet with CIDR allocated for application.<\/li>\n\n\n\n<li>Create subnets to populate application CIDR range.<\/li>\n\n\n\n<li>For application subnets, whether they are public or private, create one dedicated route table per subnet.<\/li>\n\n\n\n<li>For application public subnet route table, associate 0.0.0.0 with internet.<\/li>\n\n\n\n<li>For application private subnet route table, associate 0.0.0.0 with none.<\/li>\n\n\n\n<li>On vNet address space, add \/27 CIDR for Aviatrix HPE spoke gateways. <\/li>\n\n\n\n<li>Within \/27 range, create two \/28 subnets in different AZ, one for primary spoke gateway, one for HA spoke gateway.<\/li>\n\n\n\n<li>For each spoke gateway subnet, create a route table, and add 0.0.0.0 target Internet<\/li>\n\n\n\n<li>Associate each route table to corresponding subnet<\/li>\n\n\n\n<li>In Aviatrix Controller -> Multi-cloud Transit -> Setup -> Spoke -> Select vNet and disable High Performance Encryption, select the first \/28 subnet with appropriate AZ, and launch spoke gateway<\/li>\n\n\n\n<li>In Aviatrix Controller -&gt; Multi-cloud Transit -&gt; Setup -&gt; Spoke -&gt;  Enable\/Disable HA to an Aviatrix Spoke Gateway -&gt; Select primary gateway, select the second \/28 subnet with appropriate AZ, click Enable<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In this blog, I&#8217;ve logged steps to provision AWS VPC or Azure vNet for launching Aviatrix Spoke Gateways (HPE and none-HPE)<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,3,4],"tags":[],"class_list":["post-1277","post","type-post","status-publish","format-standard","hentry","category-aviatrix","category-aws","category-azure"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1277"}],"version-history":[{"count":5,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1277\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/1277\/revisions\/1533"}],"wp:attachment":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}