Updated Branches: refs/heads/master 26705cf53 -> 88468187e
CLOUDSTACK-4416 and CLOUDSTACK-906 cisco vnmc doc reviews Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/88468187 Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/88468187 Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/88468187 Branch: refs/heads/master Commit: 88468187e77df4a79a47b322ec9105d61dac8188 Parents: 26705cf Author: radhikap <[email protected]> Authored: Wed Aug 21 17:02:07 2013 +0530 Committer: radhikap <[email protected]> Committed: Wed Aug 21 17:02:56 2013 +0530 ---------------------------------------------------------------------- docs/en-US/vnmc-cisco.xml | 159 +++++++++++++++++++++++++---------------- 1 file changed, 99 insertions(+), 60 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cloudstack/blob/88468187/docs/en-US/vnmc-cisco.xml ---------------------------------------------------------------------- diff --git a/docs/en-US/vnmc-cisco.xml b/docs/en-US/vnmc-cisco.xml index adcaaea..fc3b217 100644 --- a/docs/en-US/vnmc-cisco.xml +++ b/docs/en-US/vnmc-cisco.xml @@ -39,63 +39,107 @@ </itemizedlist> <para>&PRODUCT; supports Cisco VNMC on Cisco Nexus 1000v dvSwich-enabled VMware hypervisors.</para> - <section id="notes-vnmc"> - <title>Guidelines</title> - <itemizedlist> - <listitem><para>Cisco ASA 1000v firewall is supported only in Isolated Guest Networks.</para></listitem> - <listitem> - <para>Cisco ASA 1000v firewall is not supported on VPC.</para> - </listitem> - <listitem><para>Cisco ASA 1000v firewall is not supported for load balancing.</para></listitem> - <listitem> - <para>When a guest network is created with Cisco VNMC firewall provider, an additional - public IP is acquired along with the Source NAT IP. The Source NAT IP is used for the - rules, whereas the additional IP is used to for the ASA outside interface. Ensure that - this additional public IP is not released. You can identify this IP as soon as the network - is in implemented state and before acquiring any further public IPs. The additional IP is - the one that is not marked as Source NAT. You can find the IP used for the ASA outside - interface by looking at the Cisco VNMC used in your guest network.</para> - </listitem> - <listitem> - <para>Use the public IP address range from a single subnet. You cannot add IP addresses from - different subnets.</para> - </listitem> - <listitem> - <para>Only one ASA instance per VLAN is allowed because multiple VLANS cannot be trunked to ASA ports. Therefore, you can use only one ASA instance in a guest network.</para> - </listitem> - <listitem> - <para>Supported only in Inline mode deployment with load balancer.</para> - </listitem> - - <listitem><para></para></listitem> - </itemizedlist> - </section> <section id="deploy-vnmc"> <title>Using Cisco ASA 1000v Firewall, Cisco Nexus 1000v dvSwitch, and Cisco VNMC in a Deployment</title> + <section id="notes-vnmc"> + <title>Guidelines</title> + <itemizedlist> + <listitem> + <para>Cisco ASA 1000v firewall is supported only in Isolated Guest Networks.</para> + </listitem> + <listitem> + <para>Cisco ASA 1000v firewall is not supported on VPC.</para> + </listitem> + <listitem> + <para>Cisco ASA 1000v firewall is not supported for load balancing.</para> + </listitem> + <listitem> + <para>When a guest network is created with Cisco VNMC firewall provider, an additional + public IP is acquired along with the Source NAT IP. The Source NAT IP is used for the + rules, whereas the additional IP is used to for the ASA outside interface. Ensure that + this additional public IP is not released. You can identify this IP as soon as the + network is in implemented state and before acquiring any further public IPs. The + additional IP is the one that is not marked as Source NAT. You can find the IP used for + the ASA outside interface by looking at the Cisco VNMC used in your guest + network.</para> + </listitem> + <listitem> + <para>Use the public IP address range from a single subnet. You cannot add IP addresses + from different subnets.</para> + </listitem> + <listitem> + <para>Only one ASA instance per VLAN is allowed because multiple VLANS cannot be trunked + to ASA ports. Therefore, you can use only one ASA instance in a guest network.</para> + </listitem> + <listitem> + <para>Only one Cisco VNMC per zone is allowed.</para> + </listitem> + <listitem> + <para>Supported only in Inline mode deployment with load balancer.</para> + </listitem> + <listitem> + <para>The ASA firewall rule is applicable to all the public IPs in the guest network. + Unlike the firewall rules created on virtual router, a rule created on the ASA device is + not tied to a specific public IP.</para> + </listitem> + <listitem> + <para>Supported version of Cisco Nexus 1000v dvSwitch is nexus-1000v.4.2.1.SV1.5.2b.bin and beyond. + </para> + </listitem> + </itemizedlist> + </section> <section id="prereq-asa"> <title>Prerequisites</title> - <itemizedlist> + <orderedlist> + <listitem> + <para>Configure Cisco Nexus 1000v dvSwitch in a vCenter environment.</para> + <para>Create Port profiles for both internal and external network interfaces on Cisco + Nexus 1000v dvSwitch. Note down the inside port profile, which needs to be provided + while adding the ASA appliance to &PRODUCT;.</para> + <para>For information on configuration, see <xref + linkend="vmware-vsphere-cluster-config-nexus-vswitch"/>.</para> + </listitem> + <listitem> + <para>Deploy and configure Cisco VNMC.</para> + <para>For more information, see <ulink + url="http://www.cisco.com/en/US/docs/switches/datacenter/vsg/sw/4_2_1_VSG_2_1_1/install_upgrade/guide/b_Cisco_VSG_for_VMware_vSphere_Rel_4_2_1_VSG_2_1_1_and_Cisco_VNMC_Rel_2_1_Installation_and_Upgrade_Guide_chapter_011.html" + >Installing Cisco Virtual Network Management Center</ulink> and <ulink + url="http://www.cisco.com/en/US/docs/unified_computing/vnmc/sw/1.2/VNMC_GUI_Configuration/b_VNMC_GUI_Configuration_Guide_1_2_chapter_010.html" + >Configuring Cisco Virtual Network Management Center</ulink>.</para> + </listitem> + <listitem> + <para>Register Cisco Nexus 1000v dvSwitch with Cisco VNMC.</para> + <para>For more information, see <ulink + url="http://www.cisco.com/en/US/docs/switches/datacenter/vsg/sw/4_2_1_VSG_1_2/vnmc_and_vsg_qi/guide/vnmc_vsg_install_5register.html#wp1064301" + >Registering a Cisco Nexus 1000V with Cisco VNMC</ulink>.</para> + </listitem> <listitem> - <para>Ensure that Cisco ASA 1000v appliance is set up externally and then registered with - &PRODUCT; by using the admin API. Typically, you can create a pool of ASA 1000v - appliances and register them with &PRODUCT;.</para> - <para>Specify the following to set up a Cisco ASA 1000v instance:</para> + <para>Create Inside and Outside port profiles in Cisco Nexus 1000v dvSwitch.</para> + <para>For more information, see <xref + linkend="vmware-vsphere-cluster-config-nexus-vswitch"/>.</para> + </listitem> + <listitem> + <para>Deploy and Cisco ASA 1000v appliance.</para> + <para>For more information, see <ulink + url="http://www.cisco.com/en/US/docs/security/asa/quick_start/asa1000V/setup_vnmc.html" + >Setting Up the ASA 1000V Using VNMC</ulink>.</para> + <para>Typically, you create a pool of ASA 1000v appliances and register them with + &PRODUCT;.</para> + <para>Specify the following while setting up a Cisco ASA 1000v instance:</para> <itemizedlist> <listitem> - <para>ESX host IP</para> + <para>VNMC host IP. </para> </listitem> <listitem> - <para>Standalone or HA mode</para> + <para>Ensure that you add ASA appliance in VNMC mode.</para> </listitem> <listitem> <para>Port profiles for the Management and HA network interfaces. This need to be - pre-created on Nexus dvSwitch switch.</para> + pre-created on Cisco Nexus 1000v dvSwitch.</para> </listitem> <listitem> - <para>Port profiles for both internal and external network interfaces. This need to be - pre-created on Nexus dvSwitch switch, and to be updated appropriately while - implementing guest networks.</para> + <para>Internal and external port profiles.</para> </listitem> <listitem> <para>The Management IP for Cisco ASA 1000v appliance. Specify the gateway such that @@ -108,19 +152,13 @@ <para>VNMC credentials</para> </listitem> </itemizedlist> - <para>After Cisco ASA 1000v instance is powered on, register VNMC from the ASA - console.</para> </listitem> <listitem> - <para>Ensure that Cisco VNMC appliance is set up externally and then registered with - &PRODUCT; by using the admin API. A single VNMC instance manages multiple ASA1000v - appliances.</para> - </listitem> - <listitem> - <para>Ensure that Cisco Nexus 1000v appliance is set up and configured in &PRODUCT; when - adding VMware cluster.</para> + <para>Register Cisco ASA 1000v with VNMC.</para> + <para>After Cisco ASA 1000v instance is powered on, register VNMC from the ASA + console.</para> </listitem> - </itemizedlist> + </orderedlist> </section> <section id="how-to-asa"> <title>Using Cisco ASA 1000v Services</title> @@ -165,7 +203,7 @@ <para>Choose the zone you want to work with.</para> </listitem> <listitem> - <para>Click the Network tab.</para> + <para>Click the Physical Network tab.</para> </listitem> <listitem> <para>In the Network Service Providers node of the diagram, click Configure. </para> @@ -175,7 +213,7 @@ <para>Click Cisco VNMC.</para> </listitem> <listitem> - <para>Click View VNMC Devices</para> + <para>Click View VNMC Devices.</para> </listitem> <listitem> <para>Click the Add VNMC Device and provide the following:</para> @@ -213,7 +251,7 @@ <para>Choose the zone you want to work with.</para> </listitem> <listitem> - <para>Click the Network tab.</para> + <para>Click the Physical Network tab.</para> </listitem> <listitem> <para>In the Network Service Providers node of the diagram, click Configure. </para> @@ -229,15 +267,16 @@ <para>Click the Add CiscoASA1000v Resource and provide the following:</para> <itemizedlist> <listitem> - <para>Host: The management IP address of the ASA 1000v instance. The IP address is used - to connect to ASA 1000V.</para> + <para><emphasis role="bold">Host</emphasis>: The management IP address of the ASA 1000v + instance. The IP address is used to connect to ASA 1000V.</para> </listitem> <listitem> - <para>Inside Port Profile: The Inside Port Profile configuration on Cisco Nexus1000v - dvSwitch.</para> + <para><emphasis role="bold">Inside Port Profile</emphasis>: The Inside Port Profile + configured on Cisco Nexus1000v dvSwitch.</para> </listitem> <listitem> - <para>Cluster: The VMware cluster to which you are adding the ASA 1000v instance.</para> + <para><emphasis role="bold">Cluster</emphasis>: The VMware cluster to which you are + adding the ASA 1000v instance.</para> <para>Ensure that the cluster is Cisco Nexus 1000v dvSwitch enabled.</para> </listitem> </itemizedlist>
