Thanks Sailaja and Koushik. I have fixed the following defects: https://issues.apache.org/jira/browse/CLOUDSTACK-3115 https://issues.apache.org/jira/browse/CLOUDSTACK-4416 https://issues.apache.org/jira/browse/CLOUDSTACK-906
From: Sailaja Mada Sent: Tuesday, August 20, 2013 4:23 PM To: Radhika Puthiyetath; d...@cloudstack.apache.org; users@cloudstack.apache.org; Koushik Das Subject: RE: [Doc] Cisco VNMC Doc Is Ready for Review Hi Radhika, As discussed with you please find the minutes below ( Review comments provided by Koushik & Myself) ============================================================== Introduction : Works only on isolated. Remove: connection timeout, TCP intercept: Use case: they are not use cases. What is listed is how to, not use cases. Check FS Add that VNMC would work only on Nexus-enabled cluster. Prerequisites: First configure Nexus in a vCenter environment (direct to the link) 2nd - Deploy and configure VNMC 3rd - Register Nexus with VNMC 4TH - Create inside and outside port profiles in Nexus. Direct to cloudstack nexus doc 5th - Deploy and configure ASA 6th - Register ASA with VNMC Ensure that all devices are time-synced VNMC is the service provider for Firewall, through which cloudstack can leverage firewall and sourceNAT services - update Port profiles for both inside and outside network interfaces. This need to be pre-created on Nexus dvSwitch switch. Note down the inside port profile and provide that while adding the ASA appliance to CloudStack. Not required: ESX host IP and Standalone or HA mode Add: VNMC Host IP (Add ASA in VNMC mode) Ensure that Cisco VNMC appliance is set up externally and then registered with CloudStack by using the admin API (ui also). A single VNMC instance manages multiple ASA1000v appliances. One VNMC per Zone One ASA per guest network. VLAN id is treated as a Tenant. Each guest network will have one VLAN ID, so one ASA per guest network When a guest network is created with Cisco VNMC firewall provider, an additional public IP is acquired along with the Source NAT IP. The Source NAT IP is used for the rules, whereas the additional IP is used to for the ASA outside interface. Ensure that this additional public IP is not released. You can identify this IP as soon as the network is in implemented state and before acquiring any further public IPs. The additional IP is the one that is not marked as Source NAT. You can find the IP used for the ASA outside interface by looking at the Cisco VNMC used in your guest network. Click the Physical Network tab. Inside Port Profile: The Inside Port Profile configured on Cisco Nexus1000v dvSwitch. Thanks, Sailaja.M From: Radhika Puthiyetath Sent: Tuesday, August 20, 2013 3:47 PM To: d...@cloudstack.apache.org<mailto:d...@cloudstack.apache.org>; users@cloudstack.apache.org<mailto:users@cloudstack.apache.org>; Koushik Das; Sailaja Mada Subject: [Doc] Cisco VNMC Doc Is Ready for Review Hi all The doc is attached at https://issues.apache.org/jira/browse/CLOUDSTACK-906 Thanks in advance -Radhika