Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 24 Next »


1. Manage networks



1.1. Limit Public IP bandwidths for a VDC

This document describes how to set a bandwidth limit in a virtual datacenter for each public IP using quality of service (QoS) traffic shaping parameters.
You can also limit the bandwidth of NAT IPs. See Limit bandwidth of NAT IPs with QoS


This feature applies to public IPs in infrastructure and managed by NSX in vCenter and vCenter clusters.

Privilege: Manage bandwidth limit for public IPs


During an upgrade or when you create a virtual datacenter, the public IP bandwidth limit is disabled.
To use QoS, edit the limit to set a value. The platform will apply the value when you deploy or reconfigure a VM to use a public IP.

Bandwidth limit for a public IP

To edit the bandwidth limit:

  1. Select the virtual datacenter

  2. Go to Network → QoS

  3. Click the pencil edit button 

  4. To activate the bandwidth limit in a specific direction, select the Enabled checkbox for that direction

  5. For the Average, enter the amount of bandwidth, in bits per second, that each public IP in the virtual datacenter can use

  6. For the Peak, enter the maximum bandwidth in bits per second that each public IP in the virtual datacenter can use

  7. For the Burst size, enter the amount of data that can be transmitted at the peak bandwidth rate in bytes. A burst bonus accumulates when traffic is below the Average value and this bandwidth can be used for bursts

Edit the QoS parameters for the bandwidth limit for a public IP

To register changes that were made outside the platform, save existing public IP bandwidth values.
In the API, to register changes, send a POST request with the existing values.

This feature sets the limits when you deploy or reconfigure a VM to use a public IP.

If you deploy a VM and the platform cannot configure the limit, then the deploy will fail and roll back. If you reconfigure a VM and try to add a public IP, and the limit fails, then the platform will roll back the reconfigure and delete the public IP address.

If you are working with multiple VMs and there are different switches involved, then the platform will make a best effort to update all of the VMs, and log any errors. 



1.2. Reserve private IPs

Unable to render {include} The included page could not be found.



2. Manage NAT



3. Manage firewalls

3.1. Introduction to firewalls



3.2. Display firewall policies



3.3. Synchronize firewall policies



3.4. Create a firewall policy



3.5. Create a firewall policy in GCP

In GCP, the platform can create firewall rules in virtual datacenters or in global networks, to later attach to VMs.

Privileges: Manage firewall, Manage global networks

To create a new firewall, do these steps:

  1. Go to Virtual datacentersNetworkFirewalls OR
    Go to myCloud → Global → select the GCP provider → Network → Firewalls

  2. Click the Add button

  3. Enter the firewall details and select the direction

    1. For the Name, see the Google cloud entity naming conventions. See Google Cloud Platform integration

    2. For the Direction, select INGRESS for incoming traffic or EGRESS for outgoing traffic

    3. For Sources or Targets, enter a list of comma separated values in CIDR format

    4. For Priority, the default is 1000 and lower numbers have higher priority

  4. Go to Inbound or Outbound and add firewall rules

    1. Optionally, select from predefined Common protocols OR
      Enter Protocols and enter a list of Ports, separated by commas, and/or a port range, separated with a dash (e.g. 80,8000-8009)

  5. After you finish adding rules, click Save

The platform will create your firewall in the provider.



3.6. Edit firewall policy rules



3.7. Move firewall policies



3.8. Delete a firewall policy



4. Manage load balancers

Unable to render {include} The included page could not be found.


4.1. Display load balancers

Unable to render {include} The included page could not be found.

4.2. Create load balancers

Unable to render {include} The included page could not be found.

4.3. Edit load balancers

Unable to render {include} The included page could not be found.


5. Manage VPNs

This page describes how to use the VPN feature that enables you to create site-to-site VPNs between virtual datacenters and other virtual datacenters, or other entities. 

For details of the VPN feature and how to configure it for specific providers, see:

This feature is available in:

  • Datacenters using VMware with NSX-V (and the NSX-NAT or NSX-gateway plugin)

  • Datacenters using VMware with NSX-T (requires NAT IPs as endpoints).

  • AWS

  • Azure

To manage VPNs:

  1. Go to MyCloud viewVirtual datacenters

  2. Select a virtual datacenter

  3. Go to Network → VPN

VPNs in virtual datacenter view

Support for VPNs is per VDC, which means you need to create a separate VPN site for each connected virtual datacenter. Both sites of a VPN must have the same encryption and authentication settings, and inverse local and remote network configurations.

The following table describes VPN functionality in the providers. You can further configure the NSX-T options using Abiquo configuration properties.

AWS

VMware NSX-V

VMware NSX-T

Azure

Encryption

AES

AES,
AES256,
Triple DES,
AES-GCM

AES_128,
AES_256,
AES_GCM_128,
AES_GCM_192,
AES_GCM_256,
NO_ENCRYPTION_AUTH_AES_GMAC_128,
NO_ENCRYPTION_AUTH_AES_GMAC_192,
NO_ENCRYPTION_AUTH_AES_GMAC_256,
NO_ENCRYPTION

AES128_SHA1, AES128_SHA256, AES256_SHA1,
AES256_SHA256, _3DES_SHA1, _3DES_SHA256

Perfect forward secrecy enabled

always enabled

optional

optional

always disabled

DH group

DH2

DH2, DH5, DH14

DH2,DH5,DH14,DH15,DH16,DH19,DH20,DH21

DH2, DH14

Authentication

PSK (mandatory)

PSK (mandatory)

PSK (mandatory)

PSK (mandatory)

Create a VPN

To connect private cloud with public cloud, define the VPN site in private cloud first. 

  • In Azure you can create a VPN using a placeholder address for the local gateway (site 1) and edit it after you create the Azure VPN site

  • In NSX-T you can delete and re-create a site instead of editing it

  • Azure may automatically select a compatible encryption type

  • In AWS you must supply the IP address of site 1 and you cannot edit it, so you must create site 1 first and the VPN site in AWS will always be site 2

To create a VPN site in a virtual datacenter:

  1. We recommend that you check that the private networks for your VPN sites (local and remote) have different IP address ranges. If necessary create a new private network, and you may also decide to make it the default network for the virtual datacenter. See Manage networks

  2. In NSX-T, for the VPN endpoint, obtain a NAT IP for the virtual datacenter.
    You don’t need to create any NAT rules to create a VPN. Tip: check if your provider allows SNAT and DNAT traffic to VMs in the VDC from the internet or from IP/network addresses or NSX-T groups.
    For more details see Manage NAT for virtual datacenters

  3. Create a firewall to allow traffic to the VMs in your VPN. See Manage firewalls

  4. Obtain the values of the remote endpoint and network. They don’t need to exist when you create the VPN, but if you need to change them, you will need to delete the site and recreate it.

  5. Go to myCloud view → Virtual datacenters and select a virtual datacenter

  6. Go to Networks → VPN

  7. To create the VPN site, click the + add button and enter the VPN details. For full details see the Create VPN reference table below

  8. Go to your other VDC or provider and create the remote VPN site.

Create VPN (part 1)Create VPN (part 2)

To create the VPN site for site2 in another VDC:

  1. Select the virtual datacenter

  2. Add another VPN site using the same encryption and authentication settings, and the remote network configuration of the first VPN site as the local values. 

To check the status of your VPN in a virtual datacenter:

  1. Go to myCloud → Virtual datacenters → select the virtual datacenter

  2. Go to Networks → VPN

  3. Beside the VPN details, click Check

Create VPN reference table

This table describes all of the fields for creating a VPN.

Button

Action

Name

Name of the VPN

Encryption algorithm

Select the encryption algorithm

Perfect forward secrecy enabled

Select to enable perfect forward secrecy to protect your session keys

DH group

Diffie-Hellman group for the VPN

Authentication

Select for PSK authentication (Preshared key authentication), which is mandatory in the providers

Preshared key

Enter preshared key to use for this session.
Click the link beside the text entry box to show or hide the value of the key.
For AWS the PSK must be alphanumeric or "." or"_", between 8 and 64 characters, and cannot start with 0.

Local endpoint

NAT IP in the VDC or an automatically generated address in public cloud

Local networks

Select VDC networks. We recommend that you do not use the default private network addresses for both sides of a VPN

Remote endpoint

NAT IP in the remote VDC

Remote networks

Add network addresses using CIDR notation. Click x beside a network to remove it from the VPN configuration

  • No labels