You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cloudstack.apache.org by ra...@apache.org on 2013/07/30 07:31:11 UTC
git commit: updated refs/heads/master to 67ab7e5
Updated Branches:
refs/heads/master 650de7998 -> 67ab7e558
CLOUDSTACK-3580
Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo
Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/67ab7e55
Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/67ab7e55
Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/67ab7e55
Branch: refs/heads/master
Commit: 67ab7e558eda743088b9cd76383fea57fc87d620
Parents: 650de79
Author: Radhika PC <ra...@citrix.com>
Authored: Tue Jul 30 11:00:46 2013 +0530
Committer: Radhika PC <ra...@citrix.com>
Committed: Tue Jul 30 11:00:46 2013 +0530
----------------------------------------------------------------------
docs/en-US/vnmc-cisco.xml | 125 ++++++++++++++++++++++-------------------
1 file changed, 67 insertions(+), 58 deletions(-)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/cloudstack/blob/67ab7e55/docs/en-US/vnmc-cisco.xml
----------------------------------------------------------------------
diff --git a/docs/en-US/vnmc-cisco.xml b/docs/en-US/vnmc-cisco.xml
index 6181348..924806c 100644
--- a/docs/en-US/vnmc-cisco.xml
+++ b/docs/en-US/vnmc-cisco.xml
@@ -20,16 +20,16 @@
-->
<section id="vnmc-cisco">
<title>External Guest Firewall Integration for Cisco VNMC (Optional)</title>
- <para>Cisco Virtual Network Management Center (VNMC) provides centralized multi-device and
- policy management for Cisco Network Virtual Services. When Cisco VNMC is integrated with
- ASA 1000v Cloud Firewall and Cisco Nexus 1000v dvSwitch in &PRODUCT; you will be able to: </para>
+ <para>Cisco Virtual Network Management Center (VNMC) provides centralized multi-device and policy
+ management for Cisco Network Virtual Services. When Cisco VNMC is integrated with ASA 1000v
+ Cloud Firewall and Cisco Nexus 1000v dvSwitch in &PRODUCT; you will be able to: </para>
<itemizedlist>
<listitem>
<para>Configure Cisco ASA 1000v Firewalls</para>
</listitem>
<listitem>
- <para>Create and apply security profiles that contain ACL policy sets for both ingress
- and egress traffic, connection timeout, NAT policy sets, and TCP intercept</para>
+ <para>Create and apply security profiles that contain ACL policy sets for both ingress and
+ egress traffic, connection timeout, NAT policy sets, and TCP intercept</para>
</listitem>
</itemizedlist>
<para>&PRODUCT; supports Cisco VNMC on Cisco Nexus 1000v dvSwich-enabled VMware
@@ -46,22 +46,21 @@
addCiscoAsa1000vResource. You can configure one per guest network.</para>
</listitem>
<listitem>
- <para>A Cloud administrator creates an Isolated guest network offering by using ASA
- 1000v as the service provider for Firewall, Source NAT, Port Forwarding, and Static
- NAT. </para>
+ <para>A Cloud administrator creates an Isolated guest network offering by using ASA 1000v as
+ the service provider for Firewall, Source NAT, Port Forwarding, and Static NAT. </para>
</listitem>
</itemizedlist>
</section>
<section id="deploy-vnmc">
- <title>Cisco ASA 1000v Firewall, Cisco Nexus 1000v dvSwitch, and Cisco VNMC
+ <title>Using Cisco ASA 1000v Firewall, Cisco Nexus 1000v dvSwitch, and Cisco VNMC in a
Deployment</title>
<section id="prereq-asa">
<title>Prerequisites</title>
<itemizedlist>
<listitem>
- <para>Ensure that Cisco ASA 1000v appliance is set up externally and then registered
- with &PRODUCT; by using the admin API. Typically, you can create a pool of ASA
- 1000v appliances and register them with &PRODUCT;.</para>
+ <para>Ensure that Cisco ASA 1000v appliance is set up externally and then registered with
+ &PRODUCT; by using the admin API. Typically, you can create a pool of ASA 1000v
+ appliances and register them with &PRODUCT;.</para>
<para>Specify the following to set up a Cisco ASA 1000v instance:</para>
<itemizedlist>
<listitem>
@@ -71,17 +70,17 @@
<para>Standalone or HA mode</para>
</listitem>
<listitem>
- <para>Port profiles for the Management and HA network interfaces. This need to
- be pre-created on Nexus dvSwitch switch.</para>
+ <para>Port profiles for the Management and HA network interfaces. This need to be
+ pre-created on Nexus dvSwitch switch.</para>
</listitem>
<listitem>
- <para>Port profiles for both internal and external network interfaces. This need
- to be pre-created on Nexus dvSwitch switch, and to be updated appropriately
- while implementing guest networks.</para>
+ <para>Port profiles for both internal and external network interfaces. This need to be
+ pre-created on Nexus dvSwitch switch, and to be updated appropriately while
+ implementing guest networks.</para>
</listitem>
<listitem>
- <para>The Management IP for Cisco ASA 1000v appliance. Specify the gateway such
- that the VNMC IP is reachable.</para>
+ <para>The Management IP for Cisco ASA 1000v appliance. Specify the gateway such that
+ the VNMC IP is reachable.</para>
</listitem>
<listitem>
<para>Administrator credentials</para>
@@ -99,11 +98,21 @@
appliances.</para>
</listitem>
<listitem>
- <para>Ensure that Cisco Nexus 1000v appliance is set up and configured in &PRODUCT;
- when adding VMware cluster.</para>
+ <para>Ensure that Cisco Nexus 1000v appliance is set up and configured in &PRODUCT; when
+ adding VMware cluster.</para>
</listitem>
</itemizedlist>
</section>
+ <section id="notes-vnmc">
+ <title>Guidelines</title>
+ <para>When a guest network is created with Cisco VNMC firewall provider, an additional public
+ IP is acquired along with the Source NAT IP. The Source NAT IP is used for the ASA outside
+ interface, whereas the addition IP is used to workaround an ASA limitation. Ensure that this
+ additional public IP is not released. You can identify this IP as soon as the network is in
+ implemented state and before acquiring any further public IPs. The additional IP is the one
+ that is not marked as Source NAT. You can find the IP used for the ASA outside interface by
+ looking at the Cisco VNMC used in your guest network.</para>
+ </section>
<section id="how-to-asa">
<title>Using Cisco ASA 1000v Services</title>
<orderedlist>
@@ -120,11 +129,13 @@
<para>See <xref linkend="add-asa"/>.</para>
</listitem>
<listitem>
- <para>Create a Network Offering and use Cisco VNMC as the service provider for desired services.</para>
+ <para>Create a Network Offering and use Cisco VNMC as the service provider for desired
+ services.</para>
<para>See <xref linkend="asa-offering"/>.</para>
</listitem>
<listitem>
- <para>Create an Isolated Guest Network by using the network offering you just created.</para>
+ <para>Create an Isolated Guest Network by using the network offering you just
+ created.</para>
</listitem>
</orderedlist>
</section>
@@ -164,8 +175,8 @@
<para>Host: The IP address of the VNMC instance.</para>
</listitem>
<listitem>
- <para>Username: The user name of the account on the VNMC instance that &PRODUCT;
- should use.</para>
+ <para>Username: The user name of the account on the VNMC instance that &PRODUCT; should
+ use.</para>
</listitem>
<listitem>
<para>Password: The password of the account.</para>
@@ -209,16 +220,15 @@
<para>Click the Add CiscoASA1000v Resource and provide the following:</para>
<itemizedlist>
<listitem>
- <para>Host: The management IP address of the ASA 1000v instance. The IP address is
- used to connect to ASA 1000V.</para>
+ <para>Host: The management IP address of the ASA 1000v instance. The IP address is used
+ to connect to ASA 1000V.</para>
</listitem>
<listitem>
- <para>Inside Port Profile: The Inside Port Profile configuration on Cisco
- Nexus1000v dvSwitch.</para>
+ <para>Inside Port Profile: The Inside Port Profile configuration on Cisco Nexus1000v
+ dvSwitch.</para>
</listitem>
<listitem>
- <para>Cluster: The VMware cluster to which you are adding the ASA 1000v
- instance.</para>
+ <para>Cluster: The VMware cluster to which you are adding the ASA 1000v instance.</para>
<para>Ensure that the cluster is Cisco Nexus 1000v dvSwitch enabled.</para>
</listitem>
</itemizedlist>
@@ -230,8 +240,7 @@
</section>
<section id="asa-offering">
<title>Creating a Network Offering Using Cisco ASA 1000v</title>
- <para>To have Cisco ASA 1000v support for a guest network, create a network offering as
- follows: </para>
+ <para>To have Cisco ASA 1000v support for a guest network, create a network offering as follows: </para>
<orderedlist>
<listitem>
<para>Log in to the &PRODUCT; UI as a user or admin.</para>
@@ -250,51 +259,50 @@
offering.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Description</emphasis>: A short description of the
- offering that can be displayed to users.</para>
+ <para><emphasis role="bold">Description</emphasis>: A short description of the offering
+ that can be displayed to users.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Network Rate</emphasis>: Allowed data transfer rate in
- MB per second.</para>
+ <para><emphasis role="bold">Network Rate</emphasis>: Allowed data transfer rate in MB
+ per second.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Traffic Type</emphasis>: The type of network traffic
- that will be carried on the network.</para>
+ <para><emphasis role="bold">Traffic Type</emphasis>: The type of network traffic that
+ will be carried on the network.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Guest Type</emphasis>: Choose whether the guest
- network is isolated or shared.</para>
+ <para><emphasis role="bold">Guest Type</emphasis>: Choose whether the guest network is
+ isolated or shared.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Persistent</emphasis>: Indicate whether the guest
- network is persistent or not. The network that you can provision without having
- to deploy a VM on it is termed persistent network. </para>
+ <para><emphasis role="bold">Persistent</emphasis>: Indicate whether the guest network is
+ persistent or not. The network that you can provision without having to deploy a VM on
+ it is termed persistent network. </para>
</listitem>
<listitem>
<para><emphasis role="bold">VPC</emphasis>: This option indicate whether the guest
- network is Virtual Private Cloud-enabled. A Virtual Private Cloud (VPC) is a
- private, isolated part of &PRODUCT;. A VPC can have its own virtual network
- topology that resembles a traditional physical network. For more information on
- VPCs, see <xref linkend="vpc"/>.</para>
+ network is Virtual Private Cloud-enabled. A Virtual Private Cloud (VPC) is a private,
+ isolated part of &PRODUCT;. A VPC can have its own virtual network topology that
+ resembles a traditional physical network. For more information on VPCs, see <xref
+ linkend="vpc"/>.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Specify VLAN</emphasis>: (Isolated guest networks
- only) Indicate whether a VLAN should be specified when this offering is
- used.</para>
+ <para><emphasis role="bold">Specify VLAN</emphasis>: (Isolated guest networks only)
+ Indicate whether a VLAN should be specified when this offering is used.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Supported Services</emphasis>: Use Cisco VNMC as the
- service provider for Firewall, Source NAT, Port Forwarding, and Static NAT to
- create an Isolated guest network offering.</para>
+ <para><emphasis role="bold">Supported Services</emphasis>: Use Cisco VNMC as the service
+ provider for Firewall, Source NAT, Port Forwarding, and Static NAT to create an
+ Isolated guest network offering.</para>
</listitem>
<listitem>
<para><emphasis role="bold">System Offering</emphasis>: Choose the system service
offering that you want virtual routers to use in this network.</para>
</listitem>
<listitem>
- <para><emphasis role="bold">Conserve mode</emphasis>: Indicate whether to use
- conserve mode. In this mode, network resources are allocated only when the first
- virtual machine starts in the network.</para>
+ <para><emphasis role="bold">Conserve mode</emphasis>: Indicate whether to use conserve
+ mode. In this mode, network resources are allocated only when the first virtual
+ machine starts in the network.</para>
</listitem>
</itemizedlist>
</listitem>
@@ -303,4 +311,5 @@
<para>The network offering is created.</para>
</listitem>
</orderedlist>
- </section></section>
\ No newline at end of file
+ </section>
+</section>