You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/intro_installation_quickstart_byol_conductor_aws.md
+47-40Lines changed: 47 additions & 40 deletions
Original file line number
Diff line number
Diff line change
@@ -64,12 +64,12 @@ To deploy the Session Smart Networking software via the AWS Console:
64
64
7. Answer the following questions to launch the deployment of an SSR. For a description of the parameters of the template, please refer to [Launch the Conductor Template](#launch-the-conductor-template).
65
65
66
66
- What name do you want to give the instance?
67
-
- Provide it in the **Stack name** field (for example: Conductor).
67
+
- Provide it in the **Conductor Name** field (for example: conductor).
68
68
- What version of SSR software do you want to install?
69
+
- What are the artifactory credentials used to install the software?
69
70
- Where do you want to deploy it?
70
71
- Select the VPC in the region.
71
72
- Select the subnet within the VPC.
72
-
- What are the artifactory credentials used to install the software?
73
73
- Who is going to be the administrator?
74
74
- Select the IAM user key.
75
75
8. Click **Next**.
@@ -110,7 +110,8 @@ write_files:
110
110
"mode": "conductor",
111
111
"artifactory-user": "<username>",
112
112
"artifactory-password": "<password>",
113
-
"node-name": "node0"
113
+
"node-name": "node0",
114
+
"cloud-provider": "aws"
114
115
}
115
116
```
116
117
@@ -143,14 +144,15 @@ A description of the parameters of the template are listed in the following tabl
143
144
144
145
| Parameter | Description |
145
146
| -------------------- | ----------- |
146
-
| Stack name | The Instance Name field provides a name to the VM for the device.|
147
-
| VPC ID | ID of the existing VPC where the device is going to be deployed. |
148
-
| Public Subnet ID | ID of the management subnet within the VPC. |
149
-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Conductor's management interface in the management subnet. |
147
+
| Name | The Instance Name field provides a name to the VM for the device.|
148
+
| Instance Type | Size of the EC2 instance.|
149
+
| SSR Version | SSR software version installed on the instance. |
150
150
| Artifactory Username | User portion of the artifactory credentials used to install the SSR software. |
151
151
| Artifactory Token | Token for the artifactory credentials used to install the SSR software. |
152
-
| Version | SSR software version installed on the instance. |
153
-
| Instance size | Size of the EC2 instance.|
152
+
| VPC ID | ID of the existing VPC where the device is going to be deployed. |
153
+
| Control Subnet ID | ID of the control subnet within the VPC. |
154
+
| Control Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Conductor's management interface in the management subnet. |
155
+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Conductor's GUI. |
154
156
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
155
157
156
158
@@ -171,7 +173,7 @@ Once the deployment of the template is complete, information about the new route
171
173
172
174
The information listed in the Outputs tab is the following:
173
175
* Instance ID of the Router EC2 instance.
174
-
* Public IP address of the public interface for administration purposes.
176
+
* Public IP address of the Control interface for administration purposes.
175
177
* SSH command to login to the Linux VM.
176
178
177
179
#### AWS CLI
@@ -188,14 +190,15 @@ Paste the following JSON content. Please adjust the values to your specific envi
188
190
189
191
```
190
192
{
191
-
"StackName": "<instance name>",
192
-
"VpcId": "<ID of the VPC>",
193
-
"ManagementSubnet": "<ID of the management subnet within the VPC>",
194
-
"ManagementSubnetAllowedCidr": "0.0.0.0/0",
193
+
"Name": "<instance name>",
194
+
"Version": "<ssr-version>",
195
+
"InstanceType": "c5.xlarge",
195
196
"ArtifactoryUsername": "<username>",
196
197
"ArtifactoryUsername": "<password>",
197
-
"SSRVersion": "<ssr-version>",
198
-
"InstanceType": "c5.xlarge",
198
+
"VpcId": "<ID of the VPC>",
199
+
"ControlSubnet": "<ID of the management subnet within the VPC>",
200
+
"ControlAllowedCidr": "0.0.0.0/0",
201
+
"AdminAllowedCidr": "0.0.0.0/0",
199
202
"KeyName": "<username>"
200
203
}
201
204
```
@@ -269,7 +272,7 @@ The following infrastructure must exist in your AWS account:
269
272
* The existing VPC is segmented with at least the following three subnets:
270
273
-**Public Subnet**: This subnet must provide connectivity to enable communication with external/remote SSR peers.
271
274
-**Private Subnet**: This subnet must provide connectivity to internal workloads within the cloud.
272
-
-**Management Subnet**: This subnet is used for conductor-managed deployments, and has the following requirements:
275
+
-**[OPTIONAL]Management Subnet**: This subnet is used for conductor-managed deployments, and has the following requirements:
273
276
* The subnet is reachable for SSH for administration purposes.
274
277
* The interface of the Conductor that manages this router must be reachable from this subnet.
275
278
*[Enable enhanced network](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking-ena.html#enabling_enhanced_networking) with ENA for maximum throughput performance. For SSR routers, execute the following command from your local computer:
@@ -312,7 +315,7 @@ To deploy the Session Smart Networking software via the AWS Console:
312
315
- What version of SSR software do you want to install?
313
316
- Where do you want to deploy it?
314
317
- Select the VPC in the region.
315
-
- Select the public, private, and management subnets within the VPC.
318
+
- Select the public, private, and optional management subnets within the VPC.
316
319
- What are the artifactory credentials used to install the software?
317
320
- What is the control IP address of the Conductor used to manage it?
318
321
-**Optional** What is the secondary control IP address of the Conductor used to manage it?
@@ -354,7 +357,8 @@ write_files:
354
357
"name": "<router-name>",
355
358
"ssr-version": "<version>",
356
359
“mode”: "conductor-managed",
357
-
“conductor-hosts”: ["<conductor-host>"]
360
+
“conductor-hosts”: ["<conductor-host>"],
361
+
"cloud-provider": "aws"
358
362
}
359
363
```
360
364
| Option | Meaning |
@@ -379,9 +383,9 @@ The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two
@@ -393,21 +397,22 @@ A description of the parameters of the template are listed in the following tabl
393
397
394
398
| Parameter | Description |
395
399
| -------------------- | ----------- |
396
-
| Stack name | Fill out the Instance Name field to provide a name to the VM for the conductor-managed router.|
397
-
| VPC ID | ID of the existing VPC where the conductor-managed router is going to be deployed. |
398
-
| Public Subnet ID | ID of the public subnet within the VPC. |
399
-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
400
-
| Private Subnet ID | ID of the private subnet within the VPC. |
401
-
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
402
-
| Management Subnet ID | ID of the management subnet within the VPC. |
403
-
| Management Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
400
+
| Name | Fill out the Instance Name field to provide a name to the VM for the conductor-managed router.|
401
+
| Version | SSR software version installed on the instance. |
404
402
| Artifactory Username | User portion of the artifactory credentials used to install the SSR software. |
405
403
| Artifactory Token | Token for the artifactory credentials used to install the SSR software. |
406
404
| Primary Control IP | The primary IP address of the Conductor |
407
405
| Secondary Control IP | The secondary IP address of the Conductor |
408
-
| Version | SSR software version installed on the instance. |
409
-
| Instance size | Size of the EC2 instance.|
410
406
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
407
+
| Instance size | Size of the EC2 instance.|
408
+
| VPC ID | ID of the existing VPC where the conductor-managed router is going to be deployed. |
409
+
| Public Subnet ID | ID of the public subnet within the VPC. |
410
+
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
411
+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
412
+
| Private Subnet ID | ID of the private subnet within the VPC. |
413
+
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
414
+
| Management Subnet ID |[OPTIONAL] ID of the management subnet within the VPC. |
415
+
411
416
412
417
#### Using the AWS Console
413
418
@@ -443,20 +448,21 @@ Paste the following JSON content. Please adjust the values to your specific envi
443
448
444
449
```
445
450
{
446
-
"StackName": "<instance name>",
451
+
"Name": "<instance name>",
452
+
"Version": "<ssr-version>",
453
+
"ArtifactoryUsername": "<username>",
454
+
"ArtifactoryToken": "<password>",
455
+
"conductorPrimaryControlIP": "<control-ip>",
456
+
"conductorSecondaryControlIP": "<control-ip>",
457
+
"InstanceType": "c5.xlarge",
458
+
"KeyName": "<username>"
447
459
"VpcId": "<ID of the VPC>",
448
460
"PublicSubnet": "<ID of the public subnet within the VPC>",
449
461
"PublicSubnetAllowedCidr": "0.0.0.0/0",
450
462
"PrivateSubnet": "<ID of the public subnet within the VPC>",
451
463
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
452
464
"AdminAllowedCidr": "0.0.0.0/0",
453
-
"conductorPrimaryControlIP": "<control-ip>",
454
-
"conductorSecondaryControlIP": "<control-ip>",
455
-
"ArtifactoryUsername": "<username>",
456
-
"ArtifactoryUsername": "<password>",
457
-
"SSRVersion": "<ssr-version>",
458
-
"InstanceType": "c5.xlarge",
459
-
"KeyName": "<username>"
465
+
"ManagementSubnet": "<[OPTIONAL] ID of the management subnet within the VPC>",
460
466
}
461
467
```
462
468
@@ -527,6 +533,7 @@ In addition to using the cloud formation template, the admin can tag the interfa
527
533
| --------- | ------- |
528
534
| WAN | Interface is marked as WAN for onboarding purposes. |
529
535
| LAN | Interface is marked as LAN and is assumed to be used as a private network for internal workflows. |
536
+
| MGMT | Interface is marked as MGMT and is assumed to have SSH connectivity. |
530
537
531
538
:::note
532
539
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging.
Copy file name to clipboardExpand all lines: docs/intro_installation_quickstart_byol_mist_aws.md
+29-25Lines changed: 29 additions & 25 deletions
Original file line number
Diff line number
Diff line change
@@ -67,16 +67,16 @@ To deploy the Session Smart Networking software via the AWS Console:
67
67
68
68
7. Answer the following questions to launch the deployment of an SSR. For a description of the parameters of the template, please refer to [Launch the Template](#launch-the-template).
69
69
70
-
- What version of SSR software do you want to install?
71
70
- What name do you want to give the instance?
72
-
- Provide it in the **Stack name** field (for example: SSR_1_Router).
73
-
- Where do you want to deploy it?
74
-
- Select the VPC in the region.
75
-
- Select the public, private, and management subnets within the VPC.
71
+
- Provide it in the **Router Name** field (for example: SSR_1_Router).
76
72
- Which Mist organization is going to manage it?
77
73
Provide the [registration code](wan_onboarding_whitebox.md#manual-adoption) for the Mist organization.
74
+
- What version of SSR software do you want to install?
78
75
- Who is going to be the administrator?
79
76
- Select the IAM user key.
77
+
- Where do you want to deploy it?
78
+
- Select the VPC in the region.
79
+
- Select the public, private, and optional management subnets within the VPC.
80
80
8. Click the **Next** button.
81
81
9. Click on the **Create stack** button to launch the deployment.
82
82
@@ -118,7 +118,7 @@ write_files:
118
118
### Manual Onboarding
119
119
If a user does not supply the onboarding configuration before launching the instance, the onboarding steps can be manually executed.
120
120
121
-
1. Log into the instance using the default AWS username `ec2-user` and the key pair provided when launching.
121
+
1. Log into the instance using the default SSR username `t128` and the key pair provided when launching.
122
122
2. Run `/usr/libexec/hardwareBootstrapper128t config-generator`
123
123
3. Follow the prompts to generate and apply the onboarding configuration.
124
124
@@ -136,24 +136,26 @@ If the device does not show up in the Mist organization or the desired SSR versi
136
136
137
137
### Network Interfaces Layout
138
138
139
-
The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two network interfaces. The template attaches the network interfaces to the EC2 instance in the following order: Public, and Private. The network interfaces to be used in Mist configuration are as follows:
139
+
The _Session Smart Router Template_ deploys an EC2 instance for the SSR with two network interfaces. The template attaches the network interfaces to the EC2 instance in the following order: Public, private, and Management. The network interfaces to be used in Mist configuration are as follows:
140
140
141
141
| Network Interface Name | Subnet | Mist Config Name |
In addition to using the cloud formation template, the admin can tag the interface with the key `SSR-ROLE`. The possible values are as follows:
149
150
150
151
| Tag Value | Meaning |
151
152
| --------- | ------- |
152
-
| WAN | Interface is marked as WAN for onboarding purposes and is assumed to have connectivity to Mist cloud infrastructure. |
153
+
| WAN | Interface is marked as WAN for onboarding purposes. Without a MGMT interface, it is assumed to have connectivity to Mist cloud infrastructure. |
153
154
| LAN | Interface is marked as LAN and is assumed to be used as a private network for internal workflows. |
155
+
| MGMT | Interface is marked as MGMT and is assumed to have connectivity to Mist cloud infrastructure. |
154
156
155
157
:::note
156
-
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging.
158
+
The EC2 instance must be assigned the IAM role containing the `ec2_describeNetwork` permission to leverage the interface tagging. This is automatically done when using the provided templates.
157
159
:::
158
160
159
161
## Source / Destination Check
@@ -180,17 +182,18 @@ A description of the parameters of the template are listed in the following tabl
180
182
181
183
| Parameter | Description |
182
184
| -------------------- | ----------- |
183
-
| Stack name | Fill out the Instance Name field to provide a name to the VM for the Mist-managed router.|
184
-
| VPC ID | ID of the existing VPC where the Mist-managed router is going to be deployed. |
185
-
| Public Subnet ID | ID of the public subnet within the VPC. |
186
-
| Public Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
187
-
| Private Subnet ID | ID of the private subnet within the VPC. |
188
-
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
189
-
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
190
-
| Registration Code | The Mist registration used for adoption of the EC2 instance to a Mist organization. |
185
+
| Router Name | Name of the VM for the Mist-managed router.|
191
186
| Version | SSR software version installed on the instance. |
187
+
| Registration Code | The Mist registration used for adoption of the EC2 instance to a Mist organization. |
192
188
| Instance size | Size of the EC2 instance.|
193
-
| Key Name | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
189
+
| SSH IAM Key | IAM user key (SSH public key) to login to the EC2 instance (Linux) via SSH.|
190
+
| VPC ID | ID of the existing VPC where the Mist-managed router is going to be deployed. |
191
+
| Public Inteface Subnet | ID of the public subnet within the VPC. |
192
+
| Public Interface Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's public interface in the public subnet. |
193
+
| Admin Allowed CIDR | The IP CIDR range of the endpoints allowed to SSH to the EC2 instance as well as login to the Router's GUI. |
194
+
| Private Interface Subnet | ID of the private subnet within the VPC. |
195
+
| Private Subnet Allowed CIDR | The IP CIDR range of the endpoints allowed to originate traffic to the Router's private interface in the private subnet. |
196
+
| Mangement Interface Subnet [OPTIONAL]| Optional ID of the management subnet within the VPC. |
194
197
195
198
#### AWS Console
196
199
@@ -226,17 +229,18 @@ Paste the following JSON content. Please adjust the values to your specific envi
226
229
227
230
```
228
231
{
229
-
"StackName": "<instance name>",
232
+
"Name": "<instance name>",
233
+
"Version": "<ssr-version>",
234
+
"RegistrationCode": "<Registration-code>",
235
+
"InstanceType": "c5.xlarge",
236
+
"KeyName": "<ssh-key-name>"
230
237
"VpcId": "<ID of the VPC>",
231
238
"PublicSubnet": "<ID of the public subnet within the VPC>",
232
239
"PublicSubnetAllowedCidr": "0.0.0.0/0",
233
-
"PrivateSubnet": "<ID of the public subnet within the VPC>",
234
-
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
235
240
"AdminAllowedCidr": "0.0.0.0/0",
236
-
"RegistrationCode": "<Registration code>",
237
-
"SSRVersion": "<ssr-version>",
238
-
"InstanceType": "c5.xlarge",
239
-
"KeyName": "<username>"
241
+
"PrivateSubnet": "<ID of the private subnet within the VPC>",
242
+
"PrivateSubnetAllowedCidr": "0.0.0.0/0",
243
+
"ManagementSubnet": "<Optional ID of the management subnet within the VPC>"
-**I95-59197 BYOL support for EL9:** Update The base BYOL image to use Oracle Linux 9.
11
+
-**I95-60147 Conditionally management subnet:** The Management Interface is now optional in all SSR templates.
12
+
-**WAN-3513 Support Azure VMBus UUID in UDev rules:** Added support for Azure VMBus UUID in UDev rules instead of MAC Addresses.
13
+
-**I95-60201 AWS IMDSv2 Support:** Added support for IMDSv2 in AWS for added security. For more information, please see the [AWS documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html).
14
+
-**I95-60148 Template Improvements** General quality of life improvements to the provided AWS and Azure templates.
15
+
16
+
17
+
### Resolved Issues
18
+
-**I95-60395 AWS BYOL Mist Manual Onboarding Method Fails** An erroneous IP route to the IMDS endpoint was being created on the wrong interface causing the instance to fail onboarding.
19
+
-**WAN-4006 Password authentication is allowed and authorized keys are not copied over** SSR default passwords were created and the configured authorized keys were not copied once SSR software was installed.
20
+
-**I95-60102 Management interface setup is incorrect** The provided conductor-managed and mist-managed router templates created a `management` inteface, but it was not configured as out of band management.
0 commit comments