diff options
| author | Martin Borg <martin.borg@enea.com> | 2019-08-26 15:02:02 +0200 |
|---|---|---|
| committer | Miruna Paun <Miruna.Paun@enea.com> | 2019-09-04 18:11:48 +0200 |
| commit | bcf37fdb8872b5073aa8ad919daca93090a48e61 (patch) | |
| tree | 96ce0cb66df0e3b829b234b68594349bff1fbe99 | |
| parent | fd686f0cb191e2711b9aedae3dcfeeed474f98f4 (diff) | |
| download | nfv-access-documentation-bcf37fdb8872b5073aa8ad919daca93090a48e61.tar.gz | |
Example Use-cases: Update Fortigate example
- Replace bundles with VNF images and update onboarding instructions
- Remove screenshots of uCPE manager GUI
- Cleanup of unnecessary information
Change-Id I36ec799b5843be80c44c7606e6e7b8bc6b5979e6
Signed-off-by: Martin Borg <martin.borg@enea.com>
Change-Id: I6f1f81443ca6d1c6764228cf1097ede8129c7c22
| -rw-r--r-- | doc/book-enea-nfv-access-example-usecases/doc/forti_vnf_examples.xml | 684 |
1 files changed, 229 insertions, 455 deletions
diff --git a/doc/book-enea-nfv-access-example-usecases/doc/forti_vnf_examples.xml b/doc/book-enea-nfv-access-example-usecases/doc/forti_vnf_examples.xml index 48f2995..6205ced 100644 --- a/doc/book-enea-nfv-access-example-usecases/doc/forti_vnf_examples.xml +++ b/doc/book-enea-nfv-access-example-usecases/doc/forti_vnf_examples.xml | |||
| @@ -7,23 +7,10 @@ | |||
| 7 | appliances. The virtual appliances can be integrated in Firewall or SD-WAN | 7 | appliances. The virtual appliances can be integrated in Firewall or SD-WAN |
| 8 | solution development.</para> | 8 | solution development.</para> |
| 9 | 9 | ||
| 10 | <para>Enea provides a prepared VNF bundle for usage with Enea NFV Access. | ||
| 11 | The bundle includes the FortiGate VNF image as well as a VNF Descriptor and | ||
| 12 | other onboarding related configuration files.</para> | ||
| 13 | |||
| 14 | <para>The VNF Descriptor represents one specific setup, suitable for usage | ||
| 15 | with the Firewall and SD-WAN VPN instructions in this guide. Alternative VNF | ||
| 16 | Descriptor configurations may be needed to support other setups desired by | ||
| 17 | the customer.</para> | ||
| 18 | |||
| 19 | <para>Enea can offer assistance and provide alternative VNF Descriptor | ||
| 20 | configurations.</para> | ||
| 21 | |||
| 22 | <section id="forti_firewall_prereq"> | 10 | <section id="forti_firewall_prereq"> |
| 23 | <title>Prerequisites</title> | 11 | <title>Prerequisites</title> |
| 24 | 12 | ||
| 25 | <para>The following hardware and software resources are needed for this | 13 | <para>System requirements for the uCPE device:</para> |
| 26 | example use case:</para> | ||
| 27 | 14 | ||
| 28 | <itemizedlist> | 15 | <itemizedlist> |
| 29 | <listitem> | 16 | <listitem> |
| @@ -37,6 +24,15 @@ | |||
| 37 | <listitem> | 24 | <listitem> |
| 38 | <para>1 GB of RAM memory</para> | 25 | <para>1 GB of RAM memory</para> |
| 39 | </listitem> | 26 | </listitem> |
| 27 | </itemizedlist> | ||
| 28 | |||
| 29 | <para>The following files are needed for this example use case:</para> | ||
| 30 | |||
| 31 | <itemizedlist> | ||
| 32 | <listitem> | ||
| 33 | <para>FortiGate VNF image. This file is provided by the local Fortinet | ||
| 34 | sales representatives in your region.</para> | ||
| 35 | </listitem> | ||
| 40 | 36 | ||
| 41 | <listitem> | 37 | <listitem> |
| 42 | <para>FortiGate VNF license file. This file is provided by the local | 38 | <para>FortiGate VNF license file. This file is provided by the local |
| @@ -44,8 +40,13 @@ | |||
| 44 | </listitem> | 40 | </listitem> |
| 45 | 41 | ||
| 46 | <listitem> | 42 | <listitem> |
| 47 | <para>FortiGate specific documentation. These files are provided by | 43 | <para>FortiGate specific documentation. This is provided by the local |
| 48 | the local Fortinet sales representatives in your region.</para> | 44 | Fortinet sales representatives in your region.</para> |
| 45 | </listitem> | ||
| 46 | |||
| 47 | <listitem> | ||
| 48 | <para>FortiGate configuration example files. These files are provided | ||
| 49 | with your Enea NFV Access release.</para> | ||
| 49 | </listitem> | 50 | </listitem> |
| 50 | </itemizedlist> | 51 | </itemizedlist> |
| 51 | </section> | 52 | </section> |
| @@ -53,13 +54,6 @@ | |||
| 53 | <section id="fortigate_firewall_uc_1"> | 54 | <section id="fortigate_firewall_uc_1"> |
| 54 | <title>FortiGate VNF as a Firewall</title> | 55 | <title>FortiGate VNF as a Firewall</title> |
| 55 | 56 | ||
| 56 | <para>FortiGate Next Generation Firewall utilizes purpose-built security | ||
| 57 | processors and threat intelligence security services to deliver top-rated | ||
| 58 | protection and high performance, including encrypted traffic. FortiGate | ||
| 59 | reduces complexity with automated visibility into applications, users and | ||
| 60 | networks, and provides security ratings to adopt security best | ||
| 61 | practices.</para> | ||
| 62 | |||
| 63 | <para>Enea provides an example of a simple base firewall configuration for | 57 | <para>Enea provides an example of a simple base firewall configuration for |
| 64 | the FortiGate VNF.</para> | 58 | the FortiGate VNF.</para> |
| 65 | 59 | ||
| @@ -67,7 +61,9 @@ | |||
| 67 | <title>FortiGate VNF Example Configuration</title> | 61 | <title>FortiGate VNF Example Configuration</title> |
| 68 | 62 | ||
| 69 | <tgroup cols="2"> | 63 | <tgroup cols="2"> |
| 70 | <colspec align="center" /> | 64 | <colspec align="center" colwidth="1*" /> |
| 65 | |||
| 66 | <colspec align="center" colwidth="4*" /> | ||
| 71 | 67 | ||
| 72 | <thead> | 68 | <thead> |
| 73 | <row> | 69 | <row> |
| @@ -110,11 +106,11 @@ | |||
| 110 | </table> | 106 | </table> |
| 111 | 107 | ||
| 112 | <para><superscript>1</superscript>FortiGate In-Band Management is a | 108 | <para><superscript>1</superscript>FortiGate In-Band Management is a |
| 113 | feature for running FortiGate Management traffic over WAN.</para> | 109 | feature used for running FortiGate Management traffic over WAN.</para> |
| 114 | 110 | ||
| 115 | <para>Instructions on how to alter the default configuration are provided, | 111 | <para>Instructions on how to alter the default configuration are provided in section |
| 116 | <olink targetdoc="book_enea_nfv_access_example_usecases" | 112 | <olink targetdoc="book_enea_nfv_access_example_usecases" |
| 117 | targetptr="fortigate_webmg">FortiGate VNF Management in <xi:include | 113 | targetptr="fortigate_webmg">FortiGate VNF Web Management in <xi:include |
| 118 | href="../../s_docbuild/olinkdb/pardoc-names.xml" | 114 | href="../../s_docbuild/olinkdb/pardoc-names.xml" |
| 119 | xmlns:xi="http://www.w3.org/2001/XInclude" | 115 | xmlns:xi="http://www.w3.org/2001/XInclude" |
| 120 | xpointer="element(book_enea_nfv_access_example_usecases/1)" /></olink>.</para> | 116 | xpointer="element(book_enea_nfv_access_example_usecases/1)" /></olink>.</para> |
| @@ -123,8 +119,8 @@ | |||
| 123 | <title>Lab Setup</title> | 119 | <title>Lab Setup</title> |
| 124 | 120 | ||
| 125 | <para>Before starting the configuration of the FortiGate Firewall, a lab | 121 | <para>Before starting the configuration of the FortiGate Firewall, a lab |
| 126 | setup of hardware and software configurations has to be built. The | 122 | setup concerning hardware and software components has to be created. The |
| 127 | following table illustrates the requirements.</para> | 123 | following table illustrates the requirements for this setup.</para> |
| 128 | 124 | ||
| 129 | <table> | 125 | <table> |
| 130 | <title>Lab Setup Prerequisites</title> | 126 | <title>Lab Setup Prerequisites</title> |
| @@ -147,11 +143,11 @@ | |||
| 147 | <entrytbl cols="1"> | 143 | <entrytbl cols="1"> |
| 148 | <tbody> | 144 | <tbody> |
| 149 | <row> | 145 | <row> |
| 150 | <entry>DHCP enabled Lab Network</entry> | 146 | <entry>DHCP enabled Lab Network.</entry> |
| 151 | </row> | 147 | </row> |
| 152 | 148 | ||
| 153 | <row> | 149 | <row> |
| 154 | <entry>Internet Connectivity</entry> | 150 | <entry>Internet Connectivity.</entry> |
| 155 | </row> | 151 | </row> |
| 156 | </tbody> | 152 | </tbody> |
| 157 | </entrytbl> | 153 | </entrytbl> |
| @@ -164,32 +160,32 @@ | |||
| 164 | <entrytbl cols="1"> | 160 | <entrytbl cols="1"> |
| 165 | <tbody> | 161 | <tbody> |
| 166 | <row> | 162 | <row> |
| 167 | <entry>Minimum 4 Physical Network Devices</entry> | 163 | <entry>Minimum 4 Physical Network Devices.</entry> |
| 168 | </row> | 164 | </row> |
| 169 | 165 | ||
| 170 | <row> | 166 | <row> |
| 171 | <entry>4 GB RAM and 4 cores (C3000 or Xeon D)</entry> | 167 | <entry>4 GB RAM and 4 cores (C3000 or Xeon D).</entry> |
| 172 | </row> | 168 | </row> |
| 173 | 169 | ||
| 174 | <row> | 170 | <row> |
| 175 | <entry>Enea NFV Access Installed</entry> | 171 | <entry>Enea NFV Access Installed.</entry> |
| 176 | </row> | 172 | </row> |
| 177 | 173 | ||
| 178 | <row> | 174 | <row> |
| 179 | <entry>WAN Connected to Lab Network</entry> | 175 | <entry>WAN Connected to the Lab Network.</entry> |
| 180 | </row> | 176 | </row> |
| 181 | 177 | ||
| 182 | <row> | 178 | <row> |
| 183 | <entry>LAN1 Connected to Test Machine</entry> | 179 | <entry>LAN1 Connected to the Test Machine.</entry> |
| 184 | </row> | 180 | </row> |
| 185 | 181 | ||
| 186 | <row> | 182 | <row> |
| 187 | <entry>LAN2 Unconnected</entry> | 183 | <entry>LAN2 Unconnected.</entry> |
| 188 | </row> | 184 | </row> |
| 189 | 185 | ||
| 190 | <row> | 186 | <row> |
| 191 | <entry>ETH0 connected to the Lab Network (for Enea uCPE | 187 | <entry>ETH0 connected to the Lab Network (for Enea uCPE |
| 192 | Manager communications)</entry> | 188 | Manager communications).</entry> |
| 193 | </row> | 189 | </row> |
| 194 | </tbody> | 190 | </tbody> |
| 195 | </entrytbl> | 191 | </entrytbl> |
| @@ -201,15 +197,15 @@ | |||
| 201 | <entrytbl cols="1"> | 197 | <entrytbl cols="1"> |
| 202 | <tbody> | 198 | <tbody> |
| 203 | <row> | 199 | <row> |
| 204 | <entry>Connected to Lab Network</entry> | 200 | <entry>Connected to the Lab Network.</entry> |
| 205 | </row> | 201 | </row> |
| 206 | 202 | ||
| 207 | <row> | 203 | <row> |
| 208 | <entry>Running either Windows or CentOS</entry> | 204 | <entry>Running either Windows or CentOS.</entry> |
| 209 | </row> | 205 | </row> |
| 210 | 206 | ||
| 211 | <row> | 207 | <row> |
| 212 | <entry>Enea uCPE Manager installed</entry> | 208 | <entry>The Enea uCPE Manager installed.</entry> |
| 213 | </row> | 209 | </row> |
| 214 | </tbody> | 210 | </tbody> |
| 215 | </entrytbl> | 211 | </entrytbl> |
| @@ -221,45 +217,15 @@ | |||
| 221 | <entrytbl cols="1"> | 217 | <entrytbl cols="1"> |
| 222 | <tbody> | 218 | <tbody> |
| 223 | <row> | 219 | <row> |
| 224 | <entry>Connected to Whitebox LAN</entry> | 220 | <entry>Connected to Whitebox LAN.</entry> |
| 225 | </row> | ||
| 226 | |||
| 227 | <row> | ||
| 228 | <entry>Internet Connectivity via LAN</entry> | ||
| 229 | </row> | 221 | </row> |
| 230 | 222 | ||
| 231 | <row> | 223 | <row> |
| 232 | <entry>Configured as DHCP client on LAN</entry> | 224 | <entry>Internet Connectivity via LAN.</entry> |
| 233 | </row> | ||
| 234 | </tbody> | ||
| 235 | </entrytbl> | ||
| 236 | </row> | ||
| 237 | |||
| 238 | <row> | ||
| 239 | <entry align="left">FortiGate VNF</entry> | ||
| 240 | |||
| 241 | <entrytbl cols="1"> | ||
| 242 | <tbody> | ||
| 243 | <row> | ||
| 244 | <entry>Copy the FortiGate VNF Bundle provided by Enea to | ||
| 245 | the Lab Machine file system.</entry> | ||
| 246 | </row> | ||
| 247 | |||
| 248 | <row> | ||
| 249 | <entry>Copy the FortiGate configuration examples from Enea | ||
| 250 | to the Lab Machine file system. Unpack the configuration | ||
| 251 | examples onto the Lab Machine.</entry> | ||
| 252 | </row> | ||
| 253 | |||
| 254 | <row> | ||
| 255 | <entry>Retrieve the FortiGate VNF license file from | ||
| 256 | Fortinet and store it on the Lab Machine file system. See | ||
| 257 | FortiGate VNF for details.</entry> | ||
| 258 | </row> | 225 | </row> |
| 259 | 226 | ||
| 260 | <row> | 227 | <row> |
| 261 | <entry>Optionally, retrieve FortiGate VNF documentation | 228 | <entry>Configured as the DHCP client on LAN.</entry> |
| 262 | from Fortinet. See FortiGate VNF for details.</entry> | ||
| 263 | </row> | 229 | </row> |
| 264 | </tbody> | 230 | </tbody> |
| 265 | </entrytbl> | 231 | </entrytbl> |
| @@ -274,7 +240,7 @@ | |||
| 274 | <mediaobject> | 240 | <mediaobject> |
| 275 | <imageobject> | 241 | <imageobject> |
| 276 | <imagedata align="center" fileref="images/intel_whitebox.png" | 242 | <imagedata align="center" fileref="images/intel_whitebox.png" |
| 277 | scale="45" /> | 243 | contentwidth="600" /> |
| 278 | </imageobject> | 244 | </imageobject> |
| 279 | </mediaobject> | 245 | </mediaobject> |
| 280 | </figure> | 246 | </figure> |
| @@ -283,93 +249,43 @@ | |||
| 283 | <section id="exam_setup_fortifirewall"> | 249 | <section id="exam_setup_fortifirewall"> |
| 284 | <title>Use-case Setup</title> | 250 | <title>Use-case Setup</title> |
| 285 | 251 | ||
| 286 | <para><emphasis role="bold">Configuring Network Interfaces on uCPE | 252 | <para><emphasis role="bold">Network Configuration:</emphasis></para> |
| 287 | devices</emphasis></para> | ||
| 288 | |||
| 289 | <para>Before deploying the FortiGate Firewall, the Enea NFV Access | ||
| 290 | platform has to be configured to the specific networking setup.</para> | ||
| 291 | 253 | ||
| 292 | <para>Since the firewall uses three External Network Interfaces, three | 254 | <para>Since the firewall uses three External Network Interfaces, three |
| 293 | bridges need to be configured. Each bridge provides the ability to | 255 | bridges need to be configured. Each bridge provides the ability to |
| 294 | connect a physical network interface to the virtual machines' virtual | 256 | connect a physical network interface to the virtual machines' virtual |
| 295 | network interface. Each physical to virtual network interface connection | 257 | network interface.</para> |
| 296 | is setup in two steps:</para> | ||
| 297 | |||
| 298 | <itemizedlist> | ||
| 299 | <listitem> | ||
| 300 | <para>Bind the physical network interfaces with a DPDK | ||
| 301 | driver.</para> | ||
| 302 | </listitem> | ||
| 303 | |||
| 304 | <listitem> | ||
| 305 | <para>Create a named bridge for each physical network | ||
| 306 | interface.</para> | ||
| 307 | </listitem> | ||
| 308 | </itemizedlist> | ||
| 309 | 258 | ||
| 310 | <orderedlist> | 259 | <orderedlist> |
| 311 | <listitem> | 260 | <listitem> |
| 312 | <para>Start the setup by preparing each interface for attachment to | 261 | <para>Select the uCPE device, access |
| 313 | a bridge. Bind the physical network interfaces to the DPDK by | 262 | <literal>Configuration</literal> and bind the three physical network |
| 314 | selecting the uCPE device, then accessing: | 263 | interfaces to DPDK.</para> |
| 315 | <literal>Configuration</literal> -> | ||
| 316 | <literal>OpenVSwitch</literal> -> <literal>Host Interfaces | ||
| 317 | </literal>-> <literal>Add</literal>.</para> | ||
| 318 | |||
| 319 | <para>The result of binding these three physical network interfaces | ||
| 320 | should look like the following:</para> | ||
| 321 | |||
| 322 | <figure> | ||
| 323 | <title>Successful Binding</title> | ||
| 324 | |||
| 325 | <mediaobject> | ||
| 326 | <imageobject> | ||
| 327 | <imagedata align="center" | ||
| 328 | fileref="images/result_of_binding.png" scale="65" /> | ||
| 329 | </imageobject> | ||
| 330 | </mediaobject> | ||
| 331 | </figure> | ||
| 332 | </listitem> | ||
| 333 | |||
| 334 | <listitem> | ||
| 335 | <para>Create one Open vSwitch bridge for each firewall network | ||
| 336 | connection (WAN, LAN1 and LAN2), by selecting: | ||
| 337 | <literal>Configuration</literal> -> | ||
| 338 | <literal>OpenVSwitch</literal> -> <literal>Bridges</literal> | ||
| 339 | -> <literal>Add</literal>.</para> | ||
| 340 | </listitem> | 264 | </listitem> |
| 341 | 265 | ||
| 342 | <listitem> | 266 | <listitem> |
| 343 | <para>Repeat this step for each type of connection until all are | 267 | <para>Create three OVS bridges, one for each DPDK network interface |
| 344 | bridges are configured.</para> | 268 | (WAN, LAN1 and LAN2).</para> |
| 345 | |||
| 346 | <figure> | ||
| 347 | <title>Configured Bridges per Connection Type</title> | ||
| 348 | |||
| 349 | <mediaobject> | ||
| 350 | <imageobject> | ||
| 351 | <imagedata align="center" | ||
| 352 | fileref="images/configured_bridges.png" scale="68" /> | ||
| 353 | </imageobject> | ||
| 354 | </mediaobject> | ||
| 355 | </figure> | ||
| 356 | </listitem> | 269 | </listitem> |
| 357 | </orderedlist> | 270 | </orderedlist> |
| 358 | 271 | ||
| 359 | <para>Alternatively, the firewall can be setup to use bridges as | 272 | <para>Alternatively, the firewall can be setup to use bridges as |
| 360 | connection points for the Fortigate VNF, by replacing the OVS-DPDK | 273 | connection points for the FortiGate VNF, by replacing the OVS-DPDK |
| 361 | bridges with SR-IOV connection points.</para> | 274 | bridges with SR-IOV connection points.</para> |
| 362 | 275 | ||
| 363 | <para>It was previously assumed that three physical interfaces are | 276 | <para>Please note that while previously three physical interfaces were |
| 364 | available for VNF connection. In the case of a firewall setup only two | 277 | presumed necessary for VNF connection, in the case of a firewall setup |
| 365 | physical interfaces are needed for the data path (one for WAN and one | 278 | only two physical interfaces are required for the data path |
| 366 | for LAN). Only two interfaces will be configured as DPDK, with two | 279 | (one for WAN and one for LAN).</para> |
| 367 | bridges created, one for each type of connection.</para> | 280 | |
| 281 | <para>Only two interfaces will be configured as DPDK, with two bridges | ||
| 282 | created, one for each type of connection.</para> | ||
| 368 | 283 | ||
| 369 | <para>Please note that at VNF instantiation instead of assigning | 284 | <note><para>At VNF instantiation instead of assigning distinct bridges for |
| 370 | distinct bridges for each LAN interface, only one will be used for both | 285 | each LAN interface, only one will be used for both LAN1 and LAN2, |
| 371 | LAN1 and LAN2, with no changes in WAN interface configuration. Please | 286 | with no changes in WAN interface configuration.</para></note> |
| 372 | see the picture below for the final setup:</para> | 287 | |
| 288 | <para>See the picture below for the final setup:</para> | ||
| 373 | 289 | ||
| 374 | <figure> | 290 | <figure> |
| 375 | <title>Two-Interface Configuration</title> | 291 | <title>Two-Interface Configuration</title> |
| @@ -377,123 +293,138 @@ | |||
| 377 | <mediaobject> | 293 | <mediaobject> |
| 378 | <imageobject> | 294 | <imageobject> |
| 379 | <imagedata align="center" fileref="images/two_inst_firewall.png" | 295 | <imagedata align="center" fileref="images/two_inst_firewall.png" |
| 380 | scale="65" /> | 296 | contentwidth="600" /> |
| 381 | </imageobject> | 297 | </imageobject> |
| 382 | </mediaobject> | 298 | </mediaobject> |
| 383 | </figure> | 299 | </figure> |
| 384 | 300 | ||
| 385 | <para><emphasis role="bold">Onboarding the FortiGate | 301 | <para><emphasis role="bold">Onboarding the VNF:</emphasis></para> |
| 386 | VNF:</emphasis></para> | ||
| 387 | 302 | ||
| 388 | <orderedlist> | 303 | <para>Onboard the FortiGate VNF by filling the required fields with the |
| 304 | following values:</para> | ||
| 305 | |||
| 306 | <itemizedlist spacing="compact"> | ||
| 389 | <listitem> | 307 | <listitem> |
| 390 | <para>To onboard the Fortigate VNF select from the top toolbar | 308 | <para><emphasis role="bold">VM Image File</emphasis>: Provide the |
| 391 | <literal>VNF</literal> -> <literal>Descriptors</literal> -> | 309 | path to the FortiGate VNF qcow2 image.</para> |
| 392 | <literal>On-board.</literal></para> | ||
| 393 | </listitem> | 310 | </listitem> |
| 394 | 311 | ||
| 395 | <listitem> | 312 | <listitem> |
| 396 | <para>Click <literal>Browse</literal> to view selections, and choose | 313 | <para><emphasis role="bold">Memory in MB</emphasis>: 1024</para> |
| 397 | the <literal>Fortigate.zip</literal> file, before clicking | ||
| 398 | <literal>Send</literal>.</para> | ||
| 399 | </listitem> | 314 | </listitem> |
| 400 | </orderedlist> | ||
| 401 | 315 | ||
| 402 | <para><emphasis role="bold">Instantiating the FortiGate | 316 | <listitem> |
| 403 | VNF</emphasis></para> | 317 | <para><emphasis role="bold">Num of CPUs</emphasis>: 1</para> |
| 318 | </listitem> | ||
| 404 | 319 | ||
| 405 | <orderedlist> | ||
| 406 | <listitem> | 320 | <listitem> |
| 407 | <para>Fortigate VNF instantiation requires the following | 321 | <para><emphasis role="bold">Storage in GB</emphasis>: 20</para> |
| 408 | settings:</para> | 322 | </listitem> |
| 409 | 323 | ||
| 410 | <table> | 324 | <listitem> |
| 411 | <title>Instantiation Requirements</title> | 325 | <para><emphasis role="bold">Interfaces</emphasis>: Add 3 |
| 326 | interfaces.</para> | ||
| 327 | </listitem> | ||
| 412 | 328 | ||
| 413 | <tgroup cols="2"> | 329 | <listitem> |
| 414 | <colspec align="center" colwidth="1*" /> | 330 | <para><emphasis role="bold">Cloud-init Datasource</emphasis>: |
| 331 | ConfigDrive</para> | ||
| 332 | </listitem> | ||
| 415 | 333 | ||
| 416 | <colspec align="center" colwidth="4*" /> | 334 | <listitem> |
| 335 | <para><emphasis role="bold">Cloud-init Disk Type</emphasis>: | ||
| 336 | cdrom</para> | ||
| 337 | </listitem> | ||
| 417 | 338 | ||
| 418 | <thead> | 339 | <listitem> |
| 419 | <row> | 340 | <para><emphasis role="bold">Cloud-init content file</emphasis>: Add |
| 420 | <entry align="center">Component</entry> | 341 | a license file entry.</para> |
| 342 | </listitem> | ||
| 343 | </itemizedlist> | ||
| 421 | 344 | ||
| 422 | <entry align="center">Description</entry> | 345 | <para><emphasis role="bold">Instantiating the VNF:</emphasis></para> |
| 423 | </row> | ||
| 424 | </thead> | ||
| 425 | 346 | ||
| 426 | <tbody> | 347 | <para>Instantiate the FortiGate VNF by filling the required fields with |
| 427 | <row> | 348 | the following values:</para> |
| 428 | <entry align="left">Name</entry> | ||
| 429 | 349 | ||
| 430 | <entry align="left">Name of the VM which will be created on | 350 | <table> |
| 431 | the uCPE device.</entry> | 351 | <title>Instantiation Requirements</title> |
| 432 | </row> | ||
| 433 | 352 | ||
| 434 | <row> | 353 | <tgroup cols="2"> |
| 435 | <entry align="left">VNF Type</entry> | 354 | <colspec align="center" colwidth="1*" /> |
| 436 | 355 | ||
| 437 | <entry align="left">Name of the onboarded VNF | 356 | <colspec align="center" colwidth="4*" /> |
| 438 | bundle.</entry> | ||
| 439 | </row> | ||
| 440 | 357 | ||
| 441 | <row> | 358 | <thead> |
| 442 | <entry align="left">VIM</entry> | 359 | <row> |
| 360 | <entry align="center">Field</entry> | ||
| 443 | 361 | ||
| 444 | <entry align="left">Name and IP address of the device where | 362 | <entry align="center">Description</entry> |
| 445 | the VNF will be instantiated.</entry> | 363 | </row> |
| 446 | </row> | 364 | </thead> |
| 447 | 365 | ||
| 448 | <row> | 366 | <tbody> |
| 449 | <entry align="left">License file</entry> | 367 | <row> |
| 368 | <entry align="left">Name</entry> | ||
| 450 | 369 | ||
| 451 | <entry align="left">FortiGate license file provided by | 370 | <entry align="left">Name of the VM which will be created on the |
| 452 | Fortinet.</entry> | 371 | uCPE device.</entry> |
| 453 | </row> | 372 | </row> |
| 454 | 373 | ||
| 455 | <row> | 374 | <row> |
| 456 | <entry align="left">Configuration file</entry> | 375 | <entry align="left">VNF Type</entry> |
| 457 | 376 | ||
| 458 | <entry align="left">Firewall example configuration file | 377 | <entry align="left">Name of the onboarded VNF.</entry> |
| 459 | provided by Enea | 378 | </row> |
| 460 | (<filename>FGVM080000136187_20180828_0353_basic_fw.conf</filename>).</entry> | ||
| 461 | </row> | ||
| 462 | 379 | ||
| 463 | <row> | 380 | <row> |
| 464 | <entry align="left">Port1 - WAN</entry> | 381 | <entry align="left">uCPE Device</entry> |
| 465 | 382 | ||
| 466 | <entry align="left">Set the External Interface type to Dpdk | 383 | <entry align="left">Select the uCPE device where the VNF will be |
| 467 | and connect it to the <literal>wanmgrbr</literal> ovs | 384 | instantiated.</entry> |
| 468 | bridge.</entry> | 385 | </row> |
| 469 | </row> | ||
| 470 | 386 | ||
| 471 | <row> | 387 | <row> |
| 472 | <entry align="left">Port2 - LAN1</entry> | 388 | <entry align="left">License file</entry> |
| 473 | 389 | ||
| 474 | <entry align="left">Set the Incoming Interface type to Dpdk | 390 | <entry align="left">The FortiGate license file provided by |
| 475 | and connect it to the <literal>lan1</literal> ovs | 391 | Fortinet.</entry> |
| 476 | bridge.</entry> | 392 | </row> |
| 477 | </row> | ||
| 478 | 393 | ||
| 479 | <row> | 394 | <row> |
| 480 | <entry align="left">Port3 - LAN2</entry> | 395 | <entry align="left">Configuration file</entry> |
| 481 | 396 | ||
| 482 | <entry align="left">Set the Outgoing Interface type to Dpdk | 397 | <entry align="left">The Firewall example configuration file provided |
| 483 | and connect it to the <literal>lan2</literal> ovs | 398 | by Enea |
| 484 | bridge.</entry> | 399 | (<filename>FGVM080000136187_20180828_0353_basic_fw.conf</filename>).</entry> |
| 485 | </row> | 400 | </row> |
| 486 | </tbody> | ||
| 487 | </tgroup> | ||
| 488 | </table> | ||
| 489 | </listitem> | ||
| 490 | 401 | ||
| 491 | <listitem> | 402 | <row> |
| 492 | <para>Select the uCPE device, then from the top toolbar select | 403 | <entry align="left">Port1 - WAN</entry> |
| 493 | <literal>VNF</literal> -> <literal>Instances</literal> -> | 404 | |
| 494 | <literal>Add</literal>.</para> | 405 | <entry align="left">Set the <literal>External Interface</literal> type to |
| 495 | </listitem> | 406 | <literal>DPDK</literal> and connect it to the <literal>wanmgrbr</literal> ovs |
| 496 | </orderedlist> | 407 | bridge.</entry> |
| 408 | </row> | ||
| 409 | |||
| 410 | <row> | ||
| 411 | <entry align="left">Port2 - LAN1</entry> | ||
| 412 | |||
| 413 | <entry align="left">Set the <literal>Incoming Interface</literal> type to | ||
| 414 | <literal>DPDK</literal> and connect it to the <literal>lan1</literal> ovs | ||
| 415 | bridge.</entry> | ||
| 416 | </row> | ||
| 417 | |||
| 418 | <row> | ||
| 419 | <entry align="left">Port3 - LAN2</entry> | ||
| 420 | |||
| 421 | <entry align="left">Set the <literal>Outgoing Interface</literal> type to | ||
| 422 | <literal>DPDK</literal> and connect it to the <literal>lan2</literal> ovs | ||
| 423 | bridge.</entry> | ||
| 424 | </row> | ||
| 425 | </tbody> | ||
| 426 | </tgroup> | ||
| 427 | </table> | ||
| 497 | </section> | 428 | </section> |
| 498 | 429 | ||
| 499 | <section id="testing_fortigate_uc_1"> | 430 | <section id="testing_fortigate_uc_1"> |
| @@ -513,9 +444,9 @@ | |||
| 513 | 444 | ||
| 514 | <para>The FortiGate VNF management interface is accessible through the | 445 | <para>The FortiGate VNF management interface is accessible through the |
| 515 | WAN interface. The WAN IP address can be used from a web browser on the | 446 | WAN interface. The WAN IP address can be used from a web browser on the |
| 516 | Lab Machine to access the Fortigate VNF Management Web UI. Please check | 447 | Lab Machine to access the FortiGate VNF Management Web UI. Please check |
| 517 | <olink targetdoc="book_enea_nfv_access_example_usecases" | 448 | <olink targetdoc="book_enea_nfv_access_example_usecases" |
| 518 | targetptr="fortigate_webmg">Fortigate VNF web management<xi:include | 449 | targetptr="fortigate_webmg">FortiGate VNF web management<xi:include |
| 519 | href="../../s_docbuild/olinkdb/pardoc-names.xml" | 450 | href="../../s_docbuild/olinkdb/pardoc-names.xml" |
| 520 | xmlns:xi="http://www.w3.org/2001/XInclude" | 451 | xmlns:xi="http://www.w3.org/2001/XInclude" |
| 521 | xpointer="element(book_enea_nfv_access_example_usecases/1)" /></olink> | 452 | xpointer="element(book_enea_nfv_access_example_usecases/1)" /></olink> |
| @@ -526,19 +457,12 @@ | |||
| 526 | <section id="fortigate_sdwan_vpn"> | 457 | <section id="fortigate_sdwan_vpn"> |
| 527 | <title>FortiGate VNF as an SD-WAN VPN</title> | 458 | <title>FortiGate VNF as an SD-WAN VPN</title> |
| 528 | 459 | ||
| 529 | <para>The Software-Defined Wide-Area Network (SD-WAN or SDWAN) is a | ||
| 530 | specific application of software-defined networking (SDN) technology | ||
| 531 | applied to WAN connections. It connects enterprise networks, including | ||
| 532 | branch offices and data centers, over large geographic distances.</para> | ||
| 533 | |||
| 534 | <para>SD-WAN decouples the network from the management plane, detaching | 460 | <para>SD-WAN decouples the network from the management plane, detaching |
| 535 | traffic management and monitoring functions from hardware. Most forms of | 461 | traffic management and monitoring functions from hardware. Most forms of |
| 536 | SD-WAN technology create a virtual overlay that is transport-agnostic, | 462 | SD-WAN technology create a virtual overlay that is transport-agnostic, |
| 537 | i.e. it abstracts underlying private or public WAN connections. With an | 463 | i.e. it abstracts underlying private or public WAN connections.</para> |
| 538 | overlay SD-WAN, a vendor provides an edge device to the customer that | ||
| 539 | contains the software necessary to run the SD-WAN technology. </para> | ||
| 540 | 464 | ||
| 541 | <para>For deployment, the customer plugs in WAN links into the device, | 465 | <para>For deployment, the user plugs in WAN links into the device, |
| 542 | which automatically configures itself with the network.</para> | 466 | which automatically configures itself with the network.</para> |
| 543 | 467 | ||
| 544 | <para>Example SD-WAN configurations for the FortiGate VNF are provided by | 468 | <para>Example SD-WAN configurations for the FortiGate VNF are provided by |
| @@ -547,7 +471,7 @@ | |||
| 547 | <section id="prereq_forti_sdwan_vpn"> | 471 | <section id="prereq_forti_sdwan_vpn"> |
| 548 | <title>Prerequisites</title> | 472 | <title>Prerequisites</title> |
| 549 | 473 | ||
| 550 | <para>The following table illustrates the use-case prerequisites of the | 474 | <para>The following table illustrates the use-case prerequisites for the |
| 551 | setup:</para> | 475 | setup:</para> |
| 552 | 476 | ||
| 553 | <table> | 477 | <table> |
| @@ -599,21 +523,21 @@ | |||
| 599 | </row> | 523 | </row> |
| 600 | 524 | ||
| 601 | <row> | 525 | <row> |
| 602 | <entry>VNFMgr Connected to Lab Network for VNF management | 526 | <entry>VNFMgr connected to the Lab Network for VNF management |
| 603 | access.</entry> | 527 | access.</entry> |
| 604 | </row> | 528 | </row> |
| 605 | 529 | ||
| 606 | <row> | 530 | <row> |
| 607 | <entry>WAN interfaces directly connected through Ethernet | 531 | <entry>WAN interfaces directly connected through the Ethernet |
| 608 | cable.</entry> | 532 | cable.</entry> |
| 609 | </row> | 533 | </row> |
| 610 | 534 | ||
| 611 | <row> | 535 | <row> |
| 612 | <entry>LAN Connected to Test Machine.</entry> | 536 | <entry>LAN connected to the Test Machine.</entry> |
| 613 | </row> | 537 | </row> |
| 614 | 538 | ||
| 615 | <row> | 539 | <row> |
| 616 | <entry>ETH0 connected to Lab Network (for Enea uCPE | 540 | <entry>ETH0 connected to the Lab Network (for Enea uCPE |
| 617 | Manager communications).</entry> | 541 | Manager communications).</entry> |
| 618 | </row> | 542 | </row> |
| 619 | </tbody> | 543 | </tbody> |
| @@ -626,7 +550,7 @@ | |||
| 626 | <entrytbl cols="1"> | 550 | <entrytbl cols="1"> |
| 627 | <tbody> | 551 | <tbody> |
| 628 | <row> | 552 | <row> |
| 629 | <entry>Connected to Lab Network.</entry> | 553 | <entry>Connected to the Lab Network.</entry> |
| 630 | </row> | 554 | </row> |
| 631 | 555 | ||
| 632 | <row> | 556 | <row> |
| @@ -634,7 +558,7 @@ | |||
| 634 | </row> | 558 | </row> |
| 635 | 559 | ||
| 636 | <row> | 560 | <row> |
| 637 | <entry>Enea uCPE Manager installed.</entry> | 561 | <entry>The Enea uCPE Manager installed.</entry> |
| 638 | </row> | 562 | </row> |
| 639 | </tbody> | 563 | </tbody> |
| 640 | </entrytbl> | 564 | </entrytbl> |
| @@ -654,36 +578,7 @@ | |||
| 654 | </row> | 578 | </row> |
| 655 | 579 | ||
| 656 | <row> | 580 | <row> |
| 657 | <entry>Configured as DHCP client on LAN.</entry> | 581 | <entry>Configured as the DHCP client on LAN.</entry> |
| 658 | </row> | ||
| 659 | </tbody> | ||
| 660 | </entrytbl> | ||
| 661 | </row> | ||
| 662 | |||
| 663 | <row> | ||
| 664 | <entry align="left">FortiGate VNF</entry> | ||
| 665 | |||
| 666 | <entrytbl cols="1"> | ||
| 667 | <tbody> | ||
| 668 | <row> | ||
| 669 | <entry>FortiGate VNF Bundle copied from Enea to the Lab | ||
| 670 | Machine file system.</entry> | ||
| 671 | </row> | ||
| 672 | |||
| 673 | <row> | ||
| 674 | <entry>FortiGate configuration examples from Enea, copied | ||
| 675 | to the Lab Machine file system. Unpack the configuration | ||
| 676 | examples specific for SD-WAN onto the Lab Machine.</entry> | ||
| 677 | </row> | ||
| 678 | |||
| 679 | <row> | ||
| 680 | <entry>Retrieve the FortiGate VNF license from Fortinet | ||
| 681 | and store it on the Lab Machine file system.</entry> | ||
| 682 | </row> | ||
| 683 | |||
| 684 | <row> | ||
| 685 | <entry>Optionally, retrieve FortiGate VNF documentation | ||
| 686 | from Fortinet.</entry> | ||
| 687 | </row> | 582 | </row> |
| 688 | </tbody> | 583 | </tbody> |
| 689 | </entrytbl> | 584 | </entrytbl> |
| @@ -810,17 +705,13 @@ | |||
| 810 | </tgroup> | 705 | </tgroup> |
| 811 | </table> | 706 | </table> |
| 812 | 707 | ||
| 813 | <para>Download locally the valid license files for the Fortigate VNF | ||
| 814 | from Fortinet and the configuration file provided by Enea as | ||
| 815 | examples.</para> | ||
| 816 | |||
| 817 | <figure> | 708 | <figure> |
| 818 | <title>SD-WAN: VPN Configuration</title> | 709 | <title>SD-WAN: VPN Configuration</title> |
| 819 | 710 | ||
| 820 | <mediaobject> | 711 | <mediaobject> |
| 821 | <imageobject> | 712 | <imageobject> |
| 822 | <imagedata align="center" | 713 | <imagedata align="center" |
| 823 | fileref="images/sdwan_vpn_overview_1.png" scale="55" /> | 714 | fileref="images/sdwan_vpn_overview_1.png" contentwidth="600" /> |
| 824 | </imageobject> | 715 | </imageobject> |
| 825 | </mediaobject> | 716 | </mediaobject> |
| 826 | </figure> | 717 | </figure> |
| @@ -829,130 +720,52 @@ | |||
| 829 | <section id="forti_examsetup_uc2"> | 720 | <section id="forti_examsetup_uc2"> |
| 830 | <title>Use-case Setup</title> | 721 | <title>Use-case Setup</title> |
| 831 | 722 | ||
| 832 | <para><emphasis role="bold">Configuring Network Interfaces on uCPE | 723 | <para><emphasis role="bold">Network Configuration:</emphasis></para> |
| 833 | devices</emphasis></para> | ||
| 834 | |||
| 835 | <para>Before deploying the FortiGate SD-WAN, the Enea NFV Access | ||
| 836 | platform has to be configured to the specific networking setup.</para> | ||
| 837 | 724 | ||
| 838 | <para>Since the SD-WAN VNF uses three External Network Interfaces, three | 725 | <para>Since the SD-WAN VNF uses three External Network Interfaces, three |
| 839 | bridges need to be configured. Each bridge provides the ability to | 726 | bridges need to be configured. Each bridge provides the ability to |
| 840 | connect a physical network interface to the VM's virtual network | 727 | connect a physical network interface to the VM's virtual network |
| 841 | interface. Each physical to virtual network interface connection is | 728 | interface.</para> |
| 842 | setup in two steps:</para> | 729 | |
| 843 | 730 | <para>Each VNF instance will have a virtual interface for VNF | |
| 844 | <itemizedlist> | 731 | management, for the WAN network and for LAN communication.</para> |
| 845 | <listitem> | ||
| 846 | <para>Bind the physical network interfaces with a DPDK | ||
| 847 | driver.</para> | ||
| 848 | </listitem> | ||
| 849 | |||
| 850 | <listitem> | ||
| 851 | <para>Create a named bridge for each physical network | ||
| 852 | interface.</para> | ||
| 853 | </listitem> | ||
| 854 | </itemizedlist> | ||
| 855 | |||
| 856 | <para>Start the setup by preparing each physical interface for | ||
| 857 | attachment to a bridge. Each VNF instance will have a virtual interface | ||
| 858 | for VNF management, for the WAN network and for LAN | ||
| 859 | communication.</para> | ||
| 860 | 732 | ||
| 861 | <orderedlist> | 733 | <orderedlist> |
| 862 | <listitem> | 734 | <listitem> |
| 863 | <para>Bind a physical interface to the DPDK by selecting uCPE device | 735 | <para>Select uCPE Device 1, access <literal>Configuration</literal> |
| 864 | 1 first, then: <literal>Configuration</literal> -> | 736 | and bind the three physical network interfaces to the DPDK.</para> |
| 865 | <literal>OpenVSwitch</literal> -> <literal>Host | ||
| 866 | Interfaces</literal> -> <literal>Add</literal>.</para> | ||
| 867 | |||
| 868 | <para>Repeat this step for the other two interfaces. The result of a | ||
| 869 | successful binding should look like the following:</para> | ||
| 870 | |||
| 871 | <figure> | ||
| 872 | <title>Results of Binding</title> | ||
| 873 | |||
| 874 | <mediaobject> | ||
| 875 | <imageobject> | ||
| 876 | <imagedata align="center" fileref="images/binding_results.png" | ||
| 877 | scale="70" /> | ||
| 878 | </imageobject> | ||
| 879 | </mediaobject> | ||
| 880 | </figure> | ||
| 881 | </listitem> | 737 | </listitem> |
| 882 | 738 | ||
| 883 | <listitem> | 739 | <listitem> |
| 884 | <para>Create an Open vSwitch bridge for each SD-WAN network | 740 | <para>Create three OVS bridges, one for each DPDK network interface |
| 885 | connection (VNF management, WAN and LAN) by selecting the uCPE | 741 | (VNF management, WAN and LAN).</para> |
| 886 | device then: <literal>Configuration</literal> -> | ||
| 887 | <literal>OpenvSwitch</literal> -> <literal>Bridges</literal> | ||
| 888 | -> <literal>Add</literal>.</para> | ||
| 889 | </listitem> | 742 | </listitem> |
| 890 | 743 | ||
| 891 | <listitem> | 744 | <listitem> |
| 892 | <para>Repeat this step for all network connections. Three bridges | 745 | <para>Repeat the steps above for uCPE device 2.</para> |
| 893 | will be created:</para> | ||
| 894 | |||
| 895 | <figure> | ||
| 896 | <title>OVS Bridges</title> | ||
| 897 | |||
| 898 | <mediaobject> | ||
| 899 | <imageobject> | ||
| 900 | <imagedata align="center" fileref="images/created_bridges.png" | ||
| 901 | scale="70" /> | ||
| 902 | </imageobject> | ||
| 903 | </mediaobject> | ||
| 904 | </figure> | ||
| 905 | </listitem> | 746 | </listitem> |
| 906 | </orderedlist> | 747 | </orderedlist> |
| 907 | 748 | ||
| 908 | <para><emphasis role="bold">Onboarding the FortiGate | 749 | <para><emphasis role="bold">Onboarding the FortiGate VNF</emphasis></para> |
| 909 | VNF</emphasis></para> | ||
| 910 | |||
| 911 | <orderedlist> | ||
| 912 | <listitem> | ||
| 913 | <para>To onboard a VNF, select a uCPE device on the map and click | ||
| 914 | the <literal>VNF</literal> button in the top toolbar. Then, click | ||
| 915 | the <literal>Descriptors</literal> -> <literal>On-board</literal> | ||
| 916 | -> <literal>Browse</literal> options, and select the | ||
| 917 | <filename>Fortigate.zip</filename> file, before pressing | ||
| 918 | <literal>Send</literal>:</para> | ||
| 919 | |||
| 920 | <figure> | ||
| 921 | <title>Onboarding FortiGate VNF</title> | ||
| 922 | |||
| 923 | <mediaobject> | ||
| 924 | <imageobject> | ||
| 925 | <imagedata align="center" fileref="images/onboard.png" | ||
| 926 | scale="45" /> | ||
| 927 | </imageobject> | ||
| 928 | </mediaobject> | ||
| 929 | </figure> | ||
| 930 | </listitem> | ||
| 931 | 750 | ||
| 932 | <listitem> | 751 | <para>See the onboarding parameters detailed in the previous use-case above.</para> |
| 933 | <para>Wait for the <literal>Onboarding Status</literal> popup to | ||
| 934 | display the confirmation message and select | ||
| 935 | <literal>OK</literal>.</para> | ||
| 936 | </listitem> | ||
| 937 | </orderedlist> | ||
| 938 | 752 | ||
| 939 | <para><emphasis role="bold">Instantiating the FortiGate | 753 | <para><emphasis role="bold">Instantiating the FortiGate VNF</emphasis></para> |
| 940 | VNF</emphasis></para> | ||
| 941 | 754 | ||
| 942 | <para>FortiGate VNF instantiation requires the following | 755 | <para>Instantiate the FortiGate VNF by filling the required fields with |
| 943 | settings:</para> | 756 | the following values:</para> |
| 944 | 757 | ||
| 945 | <table> | 758 | <table> |
| 946 | <title>FortiGate VNF Instantiation Requirements</title> | 759 | <title>Instantiation Requirements</title> |
| 947 | 760 | ||
| 948 | <tgroup cols="2"> | 761 | <tgroup cols="2"> |
| 949 | <colspec align="left" colwidth="2*" /> | 762 | <colspec align="center" colwidth="1*" /> |
| 950 | 763 | ||
| 951 | <colspec align="left" colwidth="4*" /> | 764 | <colspec align="center" colwidth="4*" /> |
| 952 | 765 | ||
| 953 | <thead> | 766 | <thead> |
| 954 | <row> | 767 | <row> |
| 955 | <entry align="center">Component</entry> | 768 | <entry align="center">Field</entry> |
| 956 | 769 | ||
| 957 | <entry align="center">Description</entry> | 770 | <entry align="center">Description</entry> |
| 958 | </row> | 771 | </row> |
| @@ -960,57 +773,59 @@ | |||
| 960 | 773 | ||
| 961 | <tbody> | 774 | <tbody> |
| 962 | <row> | 775 | <row> |
| 963 | <entry>Name</entry> | 776 | <entry align="left">Name</entry> |
| 964 | 777 | ||
| 965 | <entry>The name of the VM which will be created on the uCPE | 778 | <entry align="left">Name of the VM which will be created on the |
| 966 | device.</entry> | 779 | uCPE device.</entry> |
| 967 | </row> | 780 | </row> |
| 968 | 781 | ||
| 969 | <row> | 782 | <row> |
| 970 | <entry>VNF Type</entry> | 783 | <entry align="left">VNF Type</entry> |
| 971 | 784 | ||
| 972 | <entry>The name of the onboarded VNF bundle.</entry> | 785 | <entry align="left">Name of the onboarded VNF.</entry> |
| 973 | </row> | 786 | </row> |
| 974 | 787 | ||
| 975 | <row> | 788 | <row> |
| 976 | <entry>VIM</entry> | 789 | <entry align="left">uCPE Device</entry> |
| 977 | 790 | ||
| 978 | <entry>Name and IP address of the device where the VNF will be | 791 | <entry align="left">Select the uCPE device where the VNF will be |
| 979 | instantiated.</entry> | 792 | instantiated.</entry> |
| 980 | </row> | 793 | </row> |
| 981 | 794 | ||
| 982 | <row> | 795 | <row> |
| 983 | <entry>License file</entry> | 796 | <entry align="left">License file</entry> |
| 984 | 797 | ||
| 985 | <entry>The FortiGate license file provided by Fortinet.</entry> | 798 | <entry align="left">The FortiGate license file provided by |
| 799 | Fortinet.</entry> | ||
| 986 | </row> | 800 | </row> |
| 987 | 801 | ||
| 988 | <row> | 802 | <row> |
| 989 | <entry>Configuration file(s)</entry> | 803 | <entry align="left">Configuration files</entry> |
| 990 | 804 | ||
| 991 | <entry>SD-WAN example configuration files provided by Enea: | 805 | <entry align="left">The SD-WAN example configuration files provided |
| 806 | by Enea: | ||
| 992 | <literal>FGVM080000136187_20180215_0708_sdwan1.conf</literal> | 807 | <literal>FGVM080000136187_20180215_0708_sdwan1.conf</literal> |
| 993 | <literal>FGVM080000136188_20180215_0708_sdwan2.conf</literal></entry> | 808 | <literal>FGVM080000136188_20180215_0708_sdwan2.conf</literal></entry> |
| 994 | </row> | 809 | </row> |
| 995 | 810 | ||
| 996 | <row> | 811 | <row> |
| 997 | <entry>Port1 - VNFMgr</entry> | 812 | <entry align="left">Port1 - VNFMgr</entry> |
| 998 | 813 | ||
| 999 | <entry>Set as Dpdk type and connect it to the | 814 | <entry align="left">Set the type to <literal>DPDK</literal> and connect it to the |
| 1000 | <literal>vnfmgrbr</literal> bridge.</entry> | 815 | <literal>vnfmgrbr</literal> bridge.</entry> |
| 1001 | </row> | 816 | </row> |
| 1002 | 817 | ||
| 1003 | <row> | 818 | <row> |
| 1004 | <entry>Port2 - WAN</entry> | 819 | <entry align="left">Port2 - WAN</entry> |
| 1005 | 820 | ||
| 1006 | <entry>Set as Dpdk type and connect it to the | 821 | <entry align="left">Set the type to <literal>DPDK</literal> and connect it to the |
| 1007 | <literal>wanbr</literal> bridge.</entry> | 822 | <literal>wanbr</literal> bridge.</entry> |
| 1008 | </row> | 823 | </row> |
| 1009 | 824 | ||
| 1010 | <row> | 825 | <row> |
| 1011 | <entry>Port3 - LAN</entry> | 826 | <entry align="left">Port3 - LAN</entry> |
| 1012 | 827 | ||
| 1013 | <entry>Set as Dpdk type and connect it to the | 828 | <entry align="left">Set the type to <literal>DPDK</literal> and connect it to the |
| 1014 | <literal>lanbr</literal> bridge.</entry> | 829 | <literal>lanbr</literal> bridge.</entry> |
| 1015 | </row> | 830 | </row> |
| 1016 | </tbody> | 831 | </tbody> |
| @@ -1019,33 +834,15 @@ | |||
| 1019 | 834 | ||
| 1020 | <orderedlist> | 835 | <orderedlist> |
| 1021 | <listitem> | 836 | <listitem> |
| 1022 | <para>Select a uCPE device on the map, then from the top toolbar | 837 | <para>Instantiate the FortiGate VNF on uCPE device 1 using the |
| 1023 | click <literal>VNF</literal> -> <literal>Instances</literal> | 838 | <literal>sdwan1</literal> example configuration file.</para> |
| 1024 | -> <literal>Add</literal>.</para> | ||
| 1025 | </listitem> | 839 | </listitem> |
| 1026 | 840 | ||
| 1027 | <listitem> | 841 | <listitem> |
| 1028 | <para>Use the <literal>sdwan1</literal> example configuration file | 842 | <para>To complete the branch-to-branch setup, configure <literal>uCPE device |
| 1029 | for uCPE device 1:</para> | 843 | 2</literal> in the same way as <literal>uCPE device 1</literal>. Make sure to |
| 1030 | 844 | use the <literal>sdwan2</literal> configuration file for the second VNF | |
| 1031 | <figure> | 845 | instantiation.</para> |
| 1032 | <title>Configuring uCPE device 1</title> | ||
| 1033 | |||
| 1034 | <mediaobject> | ||
| 1035 | <imageobject> | ||
| 1036 | <imagedata align="center" | ||
| 1037 | fileref="images/sdwan1_eg_config.png" scale="70" /> | ||
| 1038 | </imageobject> | ||
| 1039 | </mediaobject> | ||
| 1040 | </figure> | ||
| 1041 | </listitem> | ||
| 1042 | |||
| 1043 | <listitem> | ||
| 1044 | <para>To complete the branch-to-branch setup, configure the peer | ||
| 1045 | uCPE device in the same way as <literal>uCPE device 1</literal>. | ||
| 1046 | Make sure to use the | ||
| 1047 | <filename>FGVM080000136188_20180215_0708_sdwan2.conf</filename> | ||
| 1048 | configuration file for the second VNF instantiation.</para> | ||
| 1049 | </listitem> | 846 | </listitem> |
| 1050 | </orderedlist> | 847 | </orderedlist> |
| 1051 | </section> | 848 | </section> |
| @@ -1080,7 +877,7 @@ | |||
| 1080 | 877 | ||
| 1081 | <note> | 878 | <note> |
| 1082 | <para>In this SD-WAN VPN setup example, bridges were used as | 879 | <para>In this SD-WAN VPN setup example, bridges were used as |
| 1083 | connection points for the Fortigate VNF. It is possible to replace | 880 | connection points for the FortiGate VNF. It is possible to replace |
| 1084 | OVS-DPDK bridges with SR-IOV connection points.</para> | 881 | OVS-DPDK bridges with SR-IOV connection points.</para> |
| 1085 | </note> | 882 | </note> |
| 1086 | </section> | 883 | </section> |
| @@ -1089,74 +886,51 @@ | |||
| 1089 | <section id="fortigate_webmg"> | 886 | <section id="fortigate_webmg"> |
| 1090 | <title>FortiGate VNF Web Management</title> | 887 | <title>FortiGate VNF Web Management</title> |
| 1091 | 888 | ||
| 1092 | <para>In order to check the IP address assigned to the Fortigate VNF you | 889 | <para>In order to check the IP address assigned to the FortiGate VNF you |
| 1093 | need to connect to the Fortigate CLI.</para> | 890 | need to connect to the FortiGate CLI.</para> |
| 1094 | |||
| 1095 | <para><emphasis role="bold">Connecting to the Fortigate | ||
| 1096 | CLI</emphasis></para> | ||
| 1097 | 891 | ||
| 1098 | <orderedlist> | 892 | <orderedlist> |
| 1099 | <listitem> | 893 | <listitem> |
| 1100 | <para>Connect to the Fortigate VNF by using: <literal>SSH</literal> | 894 | <para>SSH to the uCPE Device (Username: root) and connect to the |
| 1101 | -> <literal>user</literal> (root) and attach to the VNF's console | 895 | FortiGate VNF console:</para> |
| 1102 | using the <literal>virsh console</literal> command shown below:</para> | ||
| 1103 | |||
| 1104 | <figure> | ||
| 1105 | <title>Attaching to the VNF Console</title> | ||
| 1106 | 896 | ||
| 1107 | <mediaobject> | 897 | <programlisting>virsh list |
| 1108 | <imageobject> | 898 | virsh console <id of FortiGate VNF></programlisting> |
| 1109 | <imagedata align="center" fileref="images/virsh_console.png" | ||
| 1110 | scale="80" /> | ||
| 1111 | </imageobject> | ||
| 1112 | </mediaobject> | ||
| 1113 | </figure> | ||
| 1114 | </listitem> | 899 | </listitem> |
| 1115 | 900 | ||
| 1116 | <listitem> | 901 | <listitem> |
| 1117 | <para>To access Fortigate CLI, use <literal>admin</literal> as the | 902 | <para>To access the FortiGate CLI, use <literal>admin</literal> as the |
| 1118 | user, leaving the password blank/empty, and press enter.</para> | 903 | user, leaving the password blank/empty, and press enter.</para> |
| 1119 | 904 | ||
| 1120 | <para>Use the CLI command <literal>get system interface</literal> to | 905 | <para>Use the CLI command <literal>get system interface</literal> to |
| 1121 | get the dynamic interfaces configuration.</para> | 906 | get the dynamic interfaces configuration.</para> |
| 1122 | |||
| 1123 | <figure> | ||
| 1124 | <title>Accessing and configuring Fortigate CLI</title> | ||
| 1125 | |||
| 1126 | <mediaobject> | ||
| 1127 | <imageobject> | ||
| 1128 | <imagedata align="center" | ||
| 1129 | fileref="images/access_fortigate_cli.png" scale="58" /> | ||
| 1130 | </imageobject> | ||
| 1131 | </mediaobject> | ||
| 1132 | </figure> | ||
| 1133 | </listitem> | 907 | </listitem> |
| 1134 | 908 | ||
| 1135 | <listitem> | 909 | <listitem> |
| 1136 | <para>Use the IP address assigned for the management interface in the | 910 | <para>Use the IP address assigned for the management interface in the |
| 1137 | web browser (<literal>https://<IP></literal>), to access the | 911 | web browser (<literal>https://<IP></literal>), to access the |
| 1138 | Fortinet VNF web management interface. Use the same credentials as | 912 | FortiGate VNF Web Management Interface. Use the same credentials as |
| 1139 | before to login.</para> | 913 | before to login.</para> |
| 1140 | </listitem> | 914 | </listitem> |
| 1141 | 915 | ||
| 1142 | <listitem> | 916 | <listitem> |
| 1143 | <para>You can browse through the configuration and perform changes | 917 | <para>Browse through the configuration and perform changes |
| 1144 | according to your setup:</para> | 918 | according to your setup:</para> |
| 1145 | 919 | ||
| 1146 | <figure> | 920 | <figure> |
| 1147 | <title>The Fortinet Web Interface</title> | 921 | <title>The FortiGate VNF Web Management Interface</title> |
| 1148 | 922 | ||
| 1149 | <mediaobject> | 923 | <mediaobject> |
| 1150 | <imageobject> | 924 | <imageobject> |
| 1151 | <imagedata align="center" | 925 | <imagedata align="center" |
| 1152 | fileref="images/fortinet_interface.png" scale="33" /> | 926 | fileref="images/fortinet_interface.png" contentwidth="600" /> |
| 1153 | </imageobject> | 927 | </imageobject> |
| 1154 | </mediaobject> | 928 | </mediaobject> |
| 1155 | </figure> | 929 | </figure> |
| 1156 | </listitem> | 930 | </listitem> |
| 1157 | 931 | ||
| 1158 | <listitem> | 932 | <listitem> |
| 1159 | <para>Optionally, alter the default Fortinet example configuration | 933 | <para>Optionally, alter the default FortiGate example configuration |
| 1160 | provided by Enea, through the following steps:</para> | 934 | provided by Enea, through the following steps:</para> |
| 1161 | 935 | ||
| 1162 | <orderedlist> | 936 | <orderedlist> |
| @@ -1188,4 +962,4 @@ | |||
| 1188 | </listitem> | 962 | </listitem> |
| 1189 | </orderedlist> | 963 | </orderedlist> |
| 1190 | </section> | 964 | </section> |
| 1191 | </chapter> \ No newline at end of file | 965 | </chapter> |
