Lab: Network Configuration
Objective
Section titled “Objective”Configure a complete networking environment in VergeOS, including external network connectivity, internal virtual networks, VLAN segmentation, and firewall rules to control traffic flow.
Prerequisites
Section titled “Prerequisites”- Completed Module 1: Architecture Fundamentals
- Completed Module 3: Installation
- Completed Module 4 reading (External Networks, Internal Networks, VLANs & Firewall Rules, Dynamic Routing)
- A running VergeOS cluster with at least 2 nodes
Difficulty
Section titled “Difficulty”Intermediate — Requires understanding of networking concepts (IP addressing, VLANs, firewall rules)
Estimated Time
Section titled “Estimated Time”1.5 hours
Part 1: External Network Configuration
Section titled “Part 1: External Network Configuration”Connect your VergeOS cluster to the upstream physical network.
- Navigate to the Networks section in the VergeOS UI
- Configure the external network:
- Assign the external-facing NIC
- Configure IP addressing (static or DHCP from upstream)
- Set the default gateway
- Verify external connectivity by pinging an upstream resource
- Document the external network configuration for later reference
Part 2: Internal Network Creation
Section titled “Part 2: Internal Network Creation”Create isolated virtual networks for workloads.
- Create a new internal network for application workloads:
- Define the subnet (e.g., 10.100.1.0/24)
- Enable DHCP and configure the address pool
- Configure DNS forwarding
- Create a second internal network for management traffic:
- Define a separate subnet (e.g., 10.100.2.0/24)
- Enable DHCP with a different address range
- Verify both networks appear in the Networks dashboard
Part 3: VLAN and Firewall Rules
Section titled “Part 3: VLAN and Firewall Rules”Segment traffic and apply security policies.
- Configure VLAN tagging on the external network (if applicable):
- Assign a VLAN ID to match your physical network configuration
- Create firewall rules:
- Allow HTTP/HTTPS traffic from the external network to the application network
- Allow SSH from the management network only
- Block all other inter-network traffic by default
- Test firewall rules by attempting allowed and blocked connections
Part 4: Routing Between Networks
Section titled “Part 4: Routing Between Networks”Enable controlled communication between internal networks.
- Configure routing between the application and management networks
- Set up NAT for internal networks to access external resources
- Verify routing by testing connectivity between VMs on different internal networks
- Review the routing table to confirm expected routes
Verification
Section titled “Verification”Your networking lab is complete when you can answer yes to all of the following:
- External network is configured and has upstream connectivity
- At least two internal networks are created with DHCP enabled
- Firewall rules are in place allowing only intended traffic
- VMs on internal networks can reach external resources via NAT
- Inter-network routing works as configured
- Blocked traffic is correctly denied by firewall rules