Skip to content

Commit 390cb8e

Browse files
committed
AWS byol 3.0
1 parent 284abd8 commit 390cb8e

7 files changed

+97
-65
lines changed

docs/intro_installation_quickstart_byol_conductor_aws.md

Lines changed: 47 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,12 @@ To deploy the Session Smart Networking software via the AWS Console:
6464
7. Answer the following questions to launch the deployment of an SSR. For a description of the parameters of the template, please refer to [Launch the Conductor Template](#launch-the-conductor-template).
6565

6666
- What name do you want to give the instance?
67-
- Provide it in the **Stack name** field (for example: Conductor).
67+
- Provide it in the **Conductor Name** field (for example: conductor).
6868
- What version of SSR software do you want to install?
69+
- What are the artifactory credentials used to install the software?
6970
- Where do you want to deploy it?
7071
- Select the VPC in the region.
7172
- Select the subnet within the VPC.
72-
- What are the artifactory credentials used to install the software?
7373
- Who is going to be the administrator?
7474
- Select the IAM user key.
7575
8. Click **Next**.
@@ -110,7 +110,8 @@ write_files:
110110
"mode": "conductor",
111111
"artifactory-user": "<username>",
112112
"artifactory-password": "<password>",
113-
"node-name": "node0"
113+
"node-name": "node0",
114+
"cloud-provider": "aws"
114115
}
115116
```
116117

@@ -143,14 +144,15 @@ A description of the parameters of the template are listed in the following tabl
143144

144145
| Parameter | Description |
145146
| -------------------- | ----------- |
146-
| Stack name | The Instance Name field provides a name to the VM for the device.|
147-
| VPC ID | ID of the existing VPC where the device is going to be deployed. |
148-
| Public Subnet ID | ID of the management subnet within the VPC. |
149-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Conductor's management interface in the management subnet. |
147+
| Name | The Instance Name field provides a name to the VM for the device.|
148+
| Instance Type | Size of the EC2 instance.|
149+
| SSR Version | SSR software version installed on the instance. |
150150
| Artifactory Username | User portion of the artifactory credentials used to install the SSR software. |
151151
| Artifactory Token | Token for the artifactory credentials used to install the SSR software. |
152-
| Version | SSR software version installed on the instance. |
153-
| Instance size | Size of the EC2 instance.|
152+
| VPC ID | ID of the existing VPC where the device is going to be deployed. |
153+
| Control Subnet ID | ID of the control subnet within the VPC. |
154+
| Control Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Conductor's management interface in the management subnet. |
155+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Conductor's GUI. |
154156
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
155157

156158

@@ -171,7 +173,7 @@ Once the deployment of the template is complete, information about the new route
171173

172174
The information listed in the Outputs tab is the following:
173175
* Instance ID of the Router EC2 instance.
174-
* Public IP address of the public interface for administration purposes.
176+
* Public IP address of the Control interface for administration purposes.
175177
* SSH command to login to the Linux VM.
176178

177179
#### AWS CLI
@@ -188,14 +190,15 @@ Paste the following JSON content. Please adjust the values to your specific envi
188190

189191
```
190192
{
191-
"StackName": "<instance name>",
192-
"VpcId": "<ID of the VPC>",
193-
"ManagementSubnet": "<ID of the management subnet within the VPC>",
194-
"ManagementSubnetAllowedCidr": "0.0.0.0/0",
193+
"Name": "<instance name>",
194+
"Version": "<ssr-version>",
195+
"InstanceType": "c5.xlarge",
195196
"ArtifactoryUsername": "<username>",
196197
"ArtifactoryUsername": "<password>",
197-
"SSRVersion": "<ssr-version>",
198-
"InstanceType": "c5.xlarge",
198+
"VpcId": "<ID of the VPC>",
199+
"ControlSubnet": "<ID of the management subnet within the VPC>",
200+
"ControlAllowedCidr": "0.0.0.0/0",
201+
"AdminAllowedCidr": "0.0.0.0/0",
199202
"KeyName": "<username>"
200203
}
201204
```
@@ -269,7 +272,7 @@ The following infrastructure must exist in your AWS account:
269272
* The existing VPC is segmented with at least the following three subnets:
270273
- **Public Subnet**: This subnet must provide connectivity to enable communication with external/remote SSR peers.
271274
- **Private Subnet**: This subnet must provide connectivity to internal workloads within the cloud.
272-
- **Management Subnet**: This subnet is used for conductor-managed deployments, and has the following requirements:
275+
- **[OPTIONAL] Management Subnet**: This subnet is used for conductor-managed deployments, and has the following requirements:
273276
* The subnet is reachable for SSH for administration purposes.
274277
* The interface of the Conductor that manages this router must be reachable from this subnet.
275278
* [Enable enhanced network](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking-ena.html#enabling_enhanced_networking) with ENA for maximum throughput performance. For SSR routers, execute the following command from your local computer:
@@ -312,7 +315,7 @@ To deploy the Session Smart Networking software via the AWS Console:
312315
- What version of SSR software do you want to install?
313316
- Where do you want to deploy it?
314317
- Select the VPC in the region.
315-
- Select the public, private, and management subnets within the VPC.
318+
- Select the public, private, and optional management subnets within the VPC.
316319
- What are the artifactory credentials used to install the software?
317320
- What is the control IP address of the Conductor used to manage it?
318321
- **Optional** What is the secondary control IP address of the Conductor used to manage it?
@@ -354,7 +357,8 @@ write_files:
354357
"name": "<router-name>",
355358
"ssr-version": "<version>",
356359
“mode”: "conductor-managed",
357-
“conductor-hosts”: ["<conductor-host>"]
360+
“conductor-hosts”: ["<conductor-host>"],
361+
"cloud-provider": "aws"
358362
}
359363
```
360364
| Option | Meaning |
@@ -379,9 +383,9 @@ The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two
379383

380384
| Network Interface name | Subnet | PCI Address |
381385
| ---------------------- | ---------------- | ----------------|
382-
| ge-0-0 | Management | 0000:00:05.0 |
383-
| ge-0-1 | Public | 0000:00:06.0 |
384-
| ge-0-2 | Private | 0000:00:07.0 |
386+
| ge-0-0 | Public | 0000:00:05.0 |
387+
| ge-0-1 | Private | 0000:00:06.0 |
388+
| ge-0-2 | Management | 0000:00:07.0 |
385389

386390
### Launch the Conductor Managed Template
387391

@@ -393,21 +397,22 @@ A description of the parameters of the template are listed in the following tabl
393397

394398
| Parameter | Description |
395399
| -------------------- | ----------- |
396-
| Stack name | Fill out the Instance Name field to provide a name to the VM for the conductor-managed router.|
397-
| VPC ID | ID of the existing VPC where the conductor-managed router is going to be deployed. |
398-
| Public Subnet ID | ID of the public subnet within the VPC. |
399-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
400-
| Private Subnet ID | ID of the private subnet within the VPC. |
401-
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
402-
| Management Subnet ID | ID of the management subnet within the VPC. |
403-
| Management Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
400+
| Name | Fill out the Instance Name field to provide a name to the VM for the conductor-managed router.|
401+
| Version | SSR software version installed on the instance. |
404402
| Artifactory Username | User portion of the artifactory credentials used to install the SSR software. |
405403
| Artifactory Token | Token for the artifactory credentials used to install the SSR software. |
406404
| Primary Control IP | The primary IP address of the Conductor |
407405
| Secondary Control IP | The secondary IP address of the Conductor |
408-
| Version | SSR software version installed on the instance. |
409-
| Instance size | Size of the EC2 instance.|
410406
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
407+
| Instance size | Size of the EC2 instance.|
408+
| VPC ID | ID of the existing VPC where the conductor-managed router is going to be deployed. |
409+
| Public Subnet ID | ID of the public subnet within the VPC. |
410+
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
411+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
412+
| Private Subnet ID | ID of the private subnet within the VPC. |
413+
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
414+
| Management Subnet ID | [OPTIONAL] ID of the management subnet within the VPC. |
415+
411416

412417
#### Using the AWS Console
413418

@@ -443,20 +448,21 @@ Paste the following JSON content. Please adjust the values to your specific envi
443448

444449
```
445450
{
446-
"StackName": "<instance name>",
451+
"Name": "<instance name>",
452+
"Version": "<ssr-version>",
453+
"ArtifactoryUsername": "<username>",
454+
"ArtifactoryToken": "<password>",
455+
"conductorPrimaryControlIP": "<control-ip>",
456+
"conductorSecondaryControlIP": "<control-ip>",
457+
"InstanceType": "c5.xlarge",
458+
"KeyName": "<username>"
447459
"VpcId": "<ID of the VPC>",
448460
"PublicSubnet": "<ID of the public subnet within the VPC>",
449461
"PublicSubnetAllowedCidr": "0.0.0.0/0",
450462
"PrivateSubnet": "<ID of the public subnet within the VPC>",
451463
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
452464
"AdminAllowedCidr": "0.0.0.0/0",
453-
"conductorPrimaryControlIP": "<control-ip>",
454-
"conductorSecondaryControlIP": "<control-ip>",
455-
"ArtifactoryUsername": "<username>",
456-
"ArtifactoryUsername": "<password>",
457-
"SSRVersion": "<ssr-version>",
458-
"InstanceType": "c5.xlarge",
459-
"KeyName": "<username>"
465+
"ManagementSubnet": "<[OPTIONAL] ID of the management subnet within the VPC>",
460466
}
461467
```
462468

@@ -527,6 +533,7 @@ In addition to using the cloud formation template, the admin can tag the interfa
527533
| --------- | ------- |
528534
| WAN | Interface is marked as WAN for onboarding purposes. |
529535
| LAN | Interface is marked as LAN and is assumed to be used as a private network for internal workflows. |
536+
| MGMT | Interface is marked as MGMT and is assumed to have SSH connectivity. |
530537

531538
:::note
532539
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging.

docs/intro_installation_quickstart_byol_mist_aws.md

Lines changed: 29 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,16 @@ To deploy the Session Smart Networking software via the AWS Console:
6767

6868
7. Answer the following questions to launch the deployment of an SSR. For a description of the parameters of the template, please refer to [Launch the Template](#launch-the-template).
6969

70-
- What version of SSR software do you want to install?
7170
- What name do you want to give the instance?
72-
- Provide it in the **Stack name** field (for example: SSR_1_Router).
73-
- Where do you want to deploy it?
74-
- Select the VPC in the region.
75-
- Select the public, private, and management subnets within the VPC.
71+
- Provide it in the **Router Name** field (for example: SSR_1_Router).
7672
- Which Mist organization is going to manage it?
7773
Provide the [registration code](wan_onboarding_whitebox.md#manual-adoption) for the Mist organization.
74+
- What version of SSR software do you want to install?
7875
- Who is going to be the administrator?
7976
- Select the IAM user key.
77+
- Where do you want to deploy it?
78+
- Select the VPC in the region.
79+
- Select the public, private, and optional management subnets within the VPC.
8080
8. Click the **Next** button.
8181
9. Click on the **Create stack** button to launch the deployment.
8282

@@ -118,7 +118,7 @@ write_files:
118118
### Manual Onboarding
119119
If a user does not supply the onboarding configuration before launching the instance, the onboarding steps can be manually executed.
120120

121-
1. Log into the instance using the default AWS username `ec2-user` and the key pair provided when launching.
121+
1. Log into the instance using the default SSR username `t128` and the key pair provided when launching.
122122
2. Run `/usr/libexec/hardwareBootstrapper128t config-generator`
123123
3. Follow the prompts to generate and apply the onboarding configuration.
124124

@@ -136,24 +136,26 @@ If the device does not show up in the Mist organization or the desired SSR versi
136136

137137
### Network Interfaces Layout
138138

139-
The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two network interfaces. The template attaches the network interfaces to the EC2 instance in the following order: Public, and Private. The network interfaces to be used in Mist configuration are as follows:
139+
The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two network interfaces. The template attaches the network interfaces to the EC2 instance in the following order: Public, private, and Management. The network interfaces to be used in Mist configuration are as follows:
140140

141141
| Network Interface Name | Subnet | Mist Config Name |
142142
| ---------------------- | ---------------- | ----------------|
143143
| ge-0-0 | Public | ge-0/0/0 |
144144
| ge-0-1 | Private | ge-0/0/1 |
145+
| ge-0-2 | Management | Out Of Band Management |
145146

146147
#### Interface Tagging
147148

148149
In addition to using the cloud formation template, the admin can tag the interface with the key `SSR-ROLE`. The possible values are as follows:
149150

150151
| Tag Value | Meaning |
151152
| --------- | ------- |
152-
| WAN | Interface is marked as WAN for onboarding purposes and is assumed to have connectivity to Mist cloud infrastructure. |
153+
| WAN | Interface is marked as WAN for onboarding purposes. Without a MGMT interface, it is assumed to have connectivity to Mist cloud infrastructure. |
153154
| LAN | Interface is marked as LAN and is assumed to be used as a private network for internal workflows. |
155+
| MGMT | Interface is marked as MGMT and is assumed to have connectivity to Mist cloud infrastructure. |
154156

155157
:::note
156-
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging.
158+
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging. This is automatically done when using the provided templates.
157159
:::
158160

159161
## Source / Destination Check
@@ -180,17 +182,18 @@ A description of the parameters of the template are listed in the following tabl
180182

181183
| Parameter | Description |
182184
| -------------------- | ----------- |
183-
| Stack name | Fill out the Instance Name field to provide a name to the VM for the Mist-managed router.|
184-
| VPC ID | ID of the existing VPC where the Mist-managed router is going to be deployed. |
185-
| Public Subnet ID | ID of the public subnet within the VPC. |
186-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
187-
| Private Subnet ID | ID of the private subnet within the VPC. |
188-
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
189-
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
190-
| Registration Code | The Mist registration used for adoption of the EC2 instance to a Mist organization. |
185+
| Router Name | Name of the VM for the Mist-managed router.|
191186
| Version | SSR software version installed on the instance. |
187+
| Registration Code | The Mist registration used for adoption of the EC2 instance to a Mist organization. |
192188
| Instance size | Size of the EC2 instance.|
193-
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
189+
| SSH IAM Key | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
190+
| VPC ID | ID of the existing VPC where the Mist-managed router is going to be deployed. |
191+
| Public Inteface Subnet | ID of the public subnet within the VPC. |
192+
| Public Interface Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
193+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
194+
| Private Interface Subnet | ID of the private subnet within the VPC. |
195+
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
196+
| Mangement Interface Subnet [OPTIONAL] | Optional ID of the management subnet within the VPC. |
194197

195198
#### AWS Console
196199

@@ -226,17 +229,18 @@ Paste the following JSON content. Please adjust the values to your specific envi
226229

227230
```
228231
{
229-
"StackName": "<instance name>",
232+
"Name": "<instance name>",
233+
"Version": "<ssr-version>",
234+
"RegistrationCode": "<Registration-code>",
235+
"InstanceType": "c5.xlarge",
236+
"KeyName": "<ssh-key-name>"
230237
"VpcId": "<ID of the VPC>",
231238
"PublicSubnet": "<ID of the public subnet within the VPC>",
232239
"PublicSubnetAllowedCidr": "0.0.0.0/0",
233-
"PrivateSubnet": "<ID of the public subnet within the VPC>",
234-
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
235240
"AdminAllowedCidr": "0.0.0.0/0",
236-
"RegistrationCode": "<Registration code>",
237-
"SSRVersion": "<ssr-version>",
238-
"InstanceType": "c5.xlarge",
239-
"KeyName": "<username>"
241+
"PrivateSubnet": "<ID of the private subnet within the VPC>",
242+
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
243+
"ManagementSubnet": "<Optional ID of the management subnet within the VPC>"
240244
}
241245
```
242246

docs/release_notes_byol_3.0.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: Bring Your Own License (BYOL)
3+
sidebar_label: '3.0'
4+
---
5+
## Release 3.0.0
6+
7+
**Release Date:** June 26, 2025
8+
9+
### New Features
10+
- **I95-59197 BYOL support for EL9:** Update The base BYOL image to use Oracle Linux 9.
11+
- **I95-60147 Conditionally management subnet:** The Management Interface is now optional in all SSR templates.
12+
- **WAN-3513 Support Azure VMBus UUID in UDev rules:** Added support for Azure VMBus UUID in UDev rules instead of MAC Addresses.
13+
- **I95-60201 AWS IMDSv2 Support:** Added support for IMDSv2 in AWS for added security. For more information, please see the [AWS documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html).
14+
- **I95-60148 Template Improvements** General quality of life improvements to the provided AWS and Azure templates.
15+
16+
17+
### Resolved Issues
18+
- **I95-60395 AWS BYOL Mist Manual Onboarding Method Fails** An erroneous IP route to the IMDS endpoint was being created on the wrong interface causing the instance to fail onboarding.
19+
- **WAN-4006 Password authentication is allowed and authorized keys are not copied over** SSR default passwords were created and the configured authorized keys were not copied once SSR software was installed.
20+
- **I95-60102 Management interface setup is incorrect** The provided conductor-managed and mist-managed router templates created a `management` inteface, but it was not configured as out of band management.

sidebars.js

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ module.exports = {
6868
"type": "category",
6969
"label": "BYOL Cloud Images",
7070
"items": [
71+
"release_notes_byol_3.0",
7172
"release_notes_byol_2.0",
7273
"release_notes_byol"
7374
]
Loading
-14.3 KB
Loading

static/img/aws-byol-mist-template.png

-382 KB
Loading

0 commit comments

Comments
 (0)