summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--doc/book-enea-nfv-access-ucpe-solution/doc/demo_usecases.xml568
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/adding_instance.pngbin0 -> 70774 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/bind_phys_interface.pngbin12419 -> 11477 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/binding_results.pngbin0 -> 20299 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/created_bridges.pngbin0 -> 19322 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/onboarding_new_vnf.pngbin0 -> 86515 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/ovs_bridge_four.pngbin0 -> 20535 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan1_eg_config.pngbin0 -> 31720 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan_vpn_overview_1.pngbin0 -> 85166 bytes
-rwxr-xr-xdoc/book-enea-nfv-access-ucpe-solution/doc/images/test_machines.pngbin0 -> 82850 bytes
10 files changed, 478 insertions, 90 deletions
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/demo_usecases.xml b/doc/book-enea-nfv-access-ucpe-solution/doc/demo_usecases.xml
index ff43601..d7f55f1 100644
--- a/doc/book-enea-nfv-access-ucpe-solution/doc/demo_usecases.xml
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/demo_usecases.xml
@@ -1294,41 +1294,337 @@ Run: tail -f /opt/testpmd-out</programlisting>
1294 <section id="fortigate_sdwan_vpn"> 1294 <section id="fortigate_sdwan_vpn">
1295 <title>FortiGate VNF as an SD-WAN VPN</title> 1295 <title>FortiGate VNF as an SD-WAN VPN</title>
1296 1296
1297 <para>The software-defined wide-area network (SD-WAN or SDWAN) is a
1298 specific application of software-defined networking (SDN) technology
1299 applied to WAN connections. It connects enterprise networks, including
1300 branch offices and data centers, over large geographic distances.</para>
1301
1302 <para>SD-WAN decouples the network from the management plane, detaching
1303 the traffic management and monitoring functions from hardware. Most
1304 forms of SD-WAN technology create a virtual overlay that is
1305 transport-agnostic, i.e. it abstracts underlying private or public WAN
1306 connections. With an overlay SD-WAN, a vendor provides an edge device to
1307 the customer that contains the software necessary to run the SD-WAN
1308 technology. For deployment, the customer plugs in WAN links into the
1309 device, which automatically configures itself with the network.</para>
1310
1311 <para>The following will detail an SD-WAN setup for a branch to branch
1312 connection using the FortiGate VNF. FortiGate provides native SD-WAN
1313 along with integrated advanced threat protection.</para>
1314
1315 <note>
1316 <para>Example SD-WAN configurations for the FortiGate VNF are provided
1317 in the Enea Portal.</para>
1318 </note>
1319
1320 <table>
1321 <title>FortiGate VNF Example Configuration - SD-WAN Target 1</title>
1322
1323 <tgroup cols="2">
1324 <colspec align="center" />
1325
1326 <thead>
1327 <row>
1328 <entry align="center">Component</entry>
1329
1330 <entry align="center">Description</entry>
1331 </row>
1332 </thead>
1333
1334 <tbody>
1335 <row>
1336 <entry>SD-WAN</entry>
1337
1338 <entry>VPN connection between two branches (Target 1 and Target
1339 2).</entry>
1340 </row>
1341
1342 <row>
1343 <entry>VNFMgr (Virtual Port1)</entry>
1344
1345 <entry>DHCP Client, dynamically assigned IP address.</entry>
1346 </row>
1347
1348 <row>
1349 <entry>WAN (Virtual Port2)</entry>
1350
1351 <entry>IP address: 10.0.0.1</entry>
1352 </row>
1353
1354 <row>
1355 <entry>LAN (Virtual Port3)</entry>
1356
1357 <entrytbl cols="1">
1358 <tbody>
1359 <row>
1360 <entry>IP address: 172.16.1.1</entry>
1361 </row>
1362
1363 <row>
1364 <entry>DHCP server (IP range 172.16.1.2 -
1365 172.16.1.254)</entry>
1366 </row>
1367 </tbody>
1368 </entrytbl>
1369 </row>
1370 </tbody>
1371 </tgroup>
1372 </table>
1373
1374 <table>
1375 <title>FortiGate VNF Example Configuration - SD-WAN Target 2</title>
1376
1377 <tgroup cols="2">
1378 <colspec align="center" />
1379
1380 <thead>
1381 <row>
1382 <entry align="center">Component</entry>
1383
1384 <entry align="center">Description</entry>
1385 </row>
1386 </thead>
1387
1388 <tbody>
1389 <row>
1390 <entry>SD-WAN</entry>
1391
1392 <entry>VPN connection between two branches (Target 2 and Target
1393 1).</entry>
1394 </row>
1395
1396 <row>
1397 <entry>VNFMgr (Virtual Port1)</entry>
1398
1399 <entry>DHCP Client, dynamically assigned IP address.</entry>
1400 </row>
1401
1402 <row>
1403 <entry>WAN (Virtual Port2)</entry>
1404
1405 <entry>IP address: 10.0.0.2</entry>
1406 </row>
1407
1408 <row>
1409 <entry>LAN (Virtual Port3)</entry>
1410
1411 <entrytbl cols="1">
1412 <tbody>
1413 <row>
1414 <entry>IP address: 172.16.2.1</entry>
1415 </row>
1416
1417 <row>
1418 <entry>DHCP server (IP range 172.1.2.2 -
1419 172.16.2.254)</entry>
1420 </row>
1421 </tbody>
1422 </entrytbl>
1423 </row>
1424 </tbody>
1425 </tgroup>
1426 </table>
1427
1428 <para><emphasis role="bold">Lab Setup</emphasis></para>
1429
1430 <para>The following table illustrates the use-case prerequisites of the
1431 setup:</para>
1432
1433 <table>
1434 <title>Lab Setup Prerequisites</title>
1435
1436 <tgroup cols="2">
1437 <colspec align="center" />
1438
1439 <thead>
1440 <row>
1441 <entry align="center">Component</entry>
1442
1443 <entry align="center">Description</entry>
1444 </row>
1445 </thead>
1446
1447 <tbody>
1448 <row>
1449 <entry>Lab Network</entry>
1450
1451 <entrytbl cols="1">
1452 <tbody>
1453 <row>
1454 <entry>DHCP enabled Lab Network.</entry>
1455 </row>
1456
1457 <row>
1458 <entry>Internet Connectivity.</entry>
1459 </row>
1460 </tbody>
1461 </entrytbl>
1462 </row>
1463
1464 <row>
1465 <entry>Two Intel Whitebox target devices</entry>
1466
1467 <entrytbl cols="1">
1468 <tbody>
1469 <row>
1470 <entry>Minimum 4 Physical Network Devices.</entry>
1471 </row>
1472
1473 <row>
1474 <entry>4 GB RAM and 4 cores (C3000 or Xeon D).</entry>
1475 </row>
1476
1477 <row>
1478 <entry>Enea NFV Access Installed.</entry>
1479 </row>
1480
1481 <row>
1482 <entry>VNFMgr Connected to Lab Network for VNF management
1483 access.</entry>
1484 </row>
1485
1486 <row>
1487 <entry>WAN interfaces directly connected through Ethernet
1488 cable.</entry>
1489 </row>
1490
1491 <row>
1492 <entry>LAN Connected to Test Machine.</entry>
1493 </row>
1494
1495 <row>
1496 <entry>ETH0 connected to Lab Network (for Enea uCPE
1497 Manager communications).</entry>
1498 </row>
1499 </tbody>
1500 </entrytbl>
1501 </row>
1502
1503 <row>
1504 <entry>One Management Machine</entry>
1505
1506 <entrytbl cols="1">
1507 <tbody>
1508 <row>
1509 <entry>Connected to Lab Network.</entry>
1510 </row>
1511
1512 <row>
1513 <entry>Running either Windows or CentOS.</entry>
1514 </row>
1515
1516 <row>
1517 <entry>Enea uCPE Manager installed.</entry>
1518 </row>
1519 </tbody>
1520 </entrytbl>
1521 </row>
1522
1523 <row>
1524 <entry>Two Test Machines</entry>
1525
1526 <entrytbl cols="1">
1527 <tbody>
1528 <row>
1529 <entry>Connected to Whitebox LANs.</entry>
1530 </row>
1531
1532 <row>
1533 <entry>Internet Connectivity via LAN.</entry>
1534 </row>
1535
1536 <row>
1537 <entry>Configured as DHCP client on LAN.</entry>
1538 </row>
1539 </tbody>
1540 </entrytbl>
1541 </row>
1542
1543 <row>
1544 <entry>FortiGate VNF</entry>
1545
1546 <entrytbl cols="1">
1547 <tbody>
1548 <row>
1549 <entry>Downloaded the FortiGate VNF Bundle from Enea
1550 Portal to the Lab Machine file system.</entry>
1551 </row>
1552
1553 <row>
1554 <entry>Downloaded FortiGate configuration examples from
1555 Enea Portal to Lab Machine file system. Unpack the
1556 configuration examples specific for SD-WAN on the
1557 Management Machine.</entry>
1558 </row>
1559
1560 <row>
1561 <entry>Retrieve the FortiGate VNF license from Fortinet
1562 and store it on the Management Machine file
1563 system.</entry>
1564 </row>
1565
1566 <row>
1567 <entry>Optionally, retrieve FortiGate VNF documentation
1568 from Fortinet.</entry>
1569 </row>
1570 </tbody>
1571 </entrytbl>
1572 </row>
1573 </tbody>
1574 </tgroup>
1575 </table>
1576
1297 <figure> 1577 <figure>
1298 <title>Overview: FortiGate VNF as an SD-WAN VPN</title> 1578 <title>SD-WAN: VPN Configuration</title>
1299 1579
1300 <mediaobject> 1580 <mediaobject>
1301 <imageobject> 1581 <imageobject>
1302 <imagedata align="center" contentwidth="600" 1582 <imagedata align="center"
1303 fileref="images/sdwan_vpn_overview.svg" /> 1583 fileref="images/sdwan_vpn_overview_1.png" scale="50" />
1304 </imageobject> 1584 </imageobject>
1305 </mediaobject> 1585 </mediaobject>
1306 </figure> 1586 </figure>
1307 1587
1308 <para>For each target, the setup will require the creation of three 1588 <para><emphasis role="bold">uCPE Networking Setup</emphasis></para>
1309 bridges, one for each type of connection. Each VNF instance will have
1310 three interfaces attached: one for VNF management, one for the WAN
1311 network and one for LAN communication. In this use case, a separate WAN
1312 interface was used because it allows us to provide a VPN example using
1313 static IP addresses (VPN requires information about peer
1314 targets).</para>
1315 1589
1316 <para><emphasis role="bold">How to setup the FortiGate VNF as an SD-WAN 1590 <para>Before deploying the FortiGate SD-WAN, the Enea NFV Access
1317 VPN</emphasis></para> 1591 platform has to be configured to the specific networking setup.</para>
1592
1593 <para>Since the SD-WAN VNF uses three External Network Interfaces, three
1594 bridges need to be configured. Each bridge provides the ability to
1595 connect a physical network interface to the virtual machine's virtual
1596 network interface. Each physical to virtual network interface connection
1597 is setup in two steps:</para>
1598
1599 <itemizedlist>
1600 <listitem>
1601 <para>Bind the physical network interfaces with a DPDK
1602 driver.</para>
1603 </listitem>
1604
1605 <listitem>
1606 <para>Create a named bridge for each physical network
1607 interface.</para>
1608 </listitem>
1609 </itemizedlist>
1610
1611 <para>Start the setup by preparing each physical interface for
1612 attachment to a bridge. Each VNF instance will have a virtual interface
1613 for VNF management, for the WAN network and for LAN
1614 communication.</para>
1318 1615
1319 <orderedlist> 1616 <orderedlist>
1320 <listitem> 1617 <listitem>
1321 <para>Start by preparing each interface attachment to a bridge. Host 1618 <para>Bind physical interface to DPDK (target_1 -&gt; Configuration
1322 interfaces must be bound to the DPDK (target_1 -&gt; Configuration
1323 -&gt; OpenVSwitch -&gt; Host Interfaces -&gt; Add):</para> 1619 -&gt; OpenVSwitch -&gt; Host Interfaces -&gt; Add):</para>
1324 1620
1325 <figure> 1621 <figure>
1326 <title>Attaching the Interface</title> 1622 <title>Binding the Physical Interface</title>
1327 1623
1328 <mediaobject> 1624 <mediaobject>
1329 <imageobject> 1625 <imageobject>
1330 <imagedata align="center" 1626 <imagedata align="center"
1331 fileref="images/interface_attach.png" /> 1627 fileref="images/bind_phys_interface.png" scale="90" />
1332 </imageobject> 1628 </imageobject>
1333 </mediaobject> 1629 </mediaobject>
1334 </figure> 1630 </figure>
@@ -1337,42 +1633,46 @@ Run: tail -f /opt/testpmd-out</programlisting>
1337 the following:</para> 1633 the following:</para>
1338 1634
1339 <figure> 1635 <figure>
1340 <title>Binding results</title> 1636 <title>Results of Binding</title>
1341 1637
1342 <mediaobject> 1638 <mediaobject>
1343 <imageobject> 1639 <imageobject>
1344 <imagedata align="center" 1640 <imagedata align="center" fileref="images/binding_results.png"
1345 fileref="images/attachment_results.png" scale="70" /> 1641 scale="70" />
1346 </imageobject> 1642 </imageobject>
1347 </mediaobject> 1643 </mediaobject>
1348 </figure> 1644 </figure>
1349 </listitem> 1645 </listitem>
1350 1646
1351 <listitem> 1647 <listitem>
1352 <para>Create an OpenVSwitch bridge for each type of connection (VNF 1648 <para>Create one OpenVSwitch bridge for each SD-WAN network
1353 management, WAN and LAN) by selecting the "Add" button from Bridges 1649 connection (VNF management, WAN and LAN) by selecting the "Add"
1354 tab (target -&gt; Configuration -&gt; OpenvSwitch-&gt; Bridges). A 1650 button from the Bridges tab (target -&gt; Configuration -&gt;
1355 popup should appear:</para> 1651 OpenvSwitch-&gt; Bridges). A popup like this should appear:</para>
1356 1652
1357 <figure> 1653 <figure>
1358 <title>Creating the Bridge</title> 1654 <title>Creating an OpenVSwitch bridge for an SD-WAN network
1655 connection</title>
1359 1656
1360 <mediaobject> 1657 <mediaobject>
1361 <imageobject> 1658 <imageobject>
1362 <imagedata align="center" 1659 <imagedata align="center" fileref="images/ovs_bridge_four.png"
1363 fileref="images/ovs_bridge_three.png" scale="80" /> 1660 scale="70" />
1364 </imageobject> 1661 </imageobject>
1365 </mediaobject> 1662 </mediaobject>
1366 </figure> 1663 </figure>
1664 </listitem>
1367 1665
1368 <para>Three bridges will be created:</para> 1666 <listitem>
1667 <para>Repeat this step for all network connections. Three bridges
1668 will be created:</para>
1369 1669
1370 <figure> 1670 <figure>
1371 <title>OVS Bridges</title> 1671 <title>The three newly created Bridges</title>
1372 1672
1373 <mediaobject> 1673 <mediaobject>
1374 <imageobject> 1674 <imageobject>
1375 <imagedata align="center" fileref="images/three_bridges.png" 1675 <imagedata align="center" fileref="images/created_bridges.png"
1376 scale="70" /> 1676 scale="70" />
1377 </imageobject> 1677 </imageobject>
1378 </mediaobject> 1678 </mediaobject>
@@ -1380,26 +1680,27 @@ Run: tail -f /opt/testpmd-out</programlisting>
1380 </listitem> 1680 </listitem>
1381 </orderedlist> 1681 </orderedlist>
1382 1682
1383 <para>Once the interfaces and bridges are ready, only on-boarding and 1683 <para>Once the interfaces and bridges are ready, only the on-boarding
1384 instantiating the VNF remains to be done.</para> 1684 and instantiation of the VNF remains to be done.</para>
1385 1685
1386 <para><emphasis role="bold">How to on-board a VNF</emphasis></para> 1686 <para><emphasis role="bold">Onboarding the FortiGate
1687 VNF</emphasis></para>
1387 1688
1388 <orderedlist> 1689 <orderedlist>
1389 <listitem> 1690 <listitem>
1390 <para>Select a target device on the map and click the VNF button in 1691 <para>To on-board a VNF, select a target device on the map and click
1391 the top toolbar, then select the "Descriptors" -&gt; "On-board" 1692 the VNF button in the top toolbar. Then, click the "Descriptors"
1392 -&gt; "Browse" options, and upload the 1693 -&gt; "On-board" -&gt; "Browse" options, and select the
1393 <filename>Fortigate.zip</filename> file, before pressing 1694 <filename>Fortigate.zip</filename> file, before clicking
1394 "Send":</para> 1695 "Send":</para>
1395 1696
1396 <figure> 1697 <figure>
1397 <title>On-boarding the VNF</title> 1698 <title>On-boarding FortiGate VNF</title>
1398 1699
1399 <mediaobject> 1700 <mediaobject>
1400 <imageobject> 1701 <imageobject>
1401 <imagedata align="center" fileref="images/onboarding_vnf.png" 1702 <imagedata align="center"
1402 scale="45" /> 1703 fileref="images/onboarding_new_vnf.png" scale="50" />
1403 </imageobject> 1704 </imageobject>
1404 </mediaobject> 1705 </mediaobject>
1405 </figure> 1706 </figure>
@@ -1410,100 +1711,187 @@ Run: tail -f /opt/testpmd-out</programlisting>
1410 confirmation message and select "OK":</para> 1711 confirmation message and select "OK":</para>
1411 1712
1412 <figure> 1713 <figure>
1413 <title>Onboarding Status Results</title> 1714 <title>Successful Confirmation</title>
1414 1715
1415 <mediaobject> 1716 <mediaobject>
1416 <imageobject> 1717 <imageobject>
1417 <imagedata align="center" 1718 <imagedata align="center"
1418 fileref="images/onboarding_vnf_status.png" 1719 fileref="images/onboarding_status.png" scale="80" />
1419 scale="80" />
1420 </imageobject> 1720 </imageobject>
1421 </mediaobject> 1721 </mediaobject>
1422 </figure> 1722 </figure>
1423 </listitem> 1723 </listitem>
1424 </orderedlist> 1724 </orderedlist>
1425 1725
1426 <para><emphasis role="bold">How to instantiate the Fortigate 1726 <para><emphasis role="bold">Instantiating the FortiGate
1427 VNF</emphasis></para> 1727 VNF</emphasis></para>
1428 1728
1729 <para>The following steps describe how to instantiate the Fortigate
1730 VNF.</para>
1731
1429 <orderedlist> 1732 <orderedlist>
1430 <listitem> 1733 <listitem>
1431 <para>Select the target, then from the top toolbar select "VNF" 1734 <para>Select the target, then from the top toolbar click on "VNF"
1432 -&gt; "Instances" -&gt; "Add":</para> 1735 and choose the "Instances" -&gt; "Add" options:</para>
1433 1736
1434 <figure> 1737 <figure>
1435 <title>Adding a VNF instance</title> 1738 <title>Adding an Instance</title>
1436 1739
1437 <mediaobject> 1740 <mediaobject>
1438 <imageobject> 1741 <imageobject>
1439 <imagedata align="center" 1742 <imagedata align="center" fileref="images/adding_instance.png"
1440 fileref="images/vnf_instance_two.png" scale="50" /> 1743 scale="50" />
1441 </imageobject> 1744 </imageobject>
1442 </mediaobject> 1745 </mediaobject>
1443 </figure> 1746 </figure>
1444 1747
1445 <note> 1748 <note>
1446 <para>Make sure you have downloaded locally valid license files 1749 <para>Download locally the valid license files for the Fortigate
1447 for the Fortigate VNF from Fortinet and the configuration file 1750 VNF from Fortinet and the configuration file provided by Enea as
1448 provided by Enea, as examples.</para> 1751 examples.</para>
1449 </note> 1752 </note>
1450 </listitem> 1753 </listitem>
1451 1754
1452 <listitem> 1755 <listitem>
1453 <para>For the first target, we are going to use the 1756 <para>Use the <literal>sdwan1</literal> example configuration file
1454 <filename>sdwan_vpn1</filename> example configuration file:</para> 1757 for the first target:</para>
1455 1758
1456 <figure> 1759 <figure>
1457 <title>sdwan_vpn1 configuration file</title> 1760 <title>Configuring target_1</title>
1458 1761
1459 <mediaobject> 1762 <mediaobject>
1460 <imageobject> 1763 <imageobject>
1461 <imagedata align="center" fileref="images/sdwan_vpn1.png" 1764 <imagedata align="center"
1462 scale="75" /> 1765 fileref="images/sdwan1_eg_config.png" scale="70" />
1463 </imageobject> 1766 </imageobject>
1464 </mediaobject> 1767 </mediaobject>
1465 </figure> 1768 </figure>
1466
1467 <para>The first target should be prepared for a VPN connection with
1468 a peer target.</para>
1469 </listitem> 1769 </listitem>
1770 </orderedlist>
1470 1771
1471 <listitem> 1772 <para>Fortigate VNF instantiation requires the following
1472 <para>In order to have the full setup working, the second target 1773 settings:</para>
1473 needs to be configured in a similar way starting from the
1474 interfaces' setup described above <remark>does this refer to the
1475 previous procedure or something else, please clarify</remark>, up to
1476 the VNF instantiation, using the <filename>sdwan_vpn2</filename>
1477 configuration file.</para>
1478
1479 <para>Please see the <remark>insert the section, procedure or
1480 chapter for reference if that helps</remark> for more details</para>
1481 </listitem>
1482 1774
1483 <listitem> 1775 <table>
1484 <para>Once the full setup is in place, you can connect a device to 1776 <title>Fortigate VNF Instantiation Requirements</title>
1485 the LAN interface on each target.</para>
1486 1777
1487 <para>Each device should automatically receive an IP address 1778 <tgroup cols="2">
1488 (172.16.1.X from the first target and 172.16.2.X from second 1779 <colspec align="left" colwidth="2*" />
1489 target):</para>
1490 1780
1491 <figure> 1781 <colspec align="left" colwidth="4*" />
1492 <title>VPN Configuration</title>
1493 1782
1494 <mediaobject> 1783 <thead>
1495 <imageobject> 1784 <row>
1496 <imagedata align="center" contentwidth="600" 1785 <entry align="center">Component</entry>
1497 fileref="images/setup_overview.svg" />
1498 </imageobject>
1499 </mediaobject>
1500 </figure>
1501 1786
1502 <para><literal>Device1</literal> should be able to ping 1787 <entry align="center">Description</entry>
1503 <literal>Device2</literal> in this setup over the WAN 1788 </row>
1504 connection.</para> 1789 </thead>
1505 </listitem> 1790
1506 </orderedlist> 1791 <tbody>
1792 <row>
1793 <entry>Name</entry>
1794
1795 <entry>The name of the VM which will be created on target
1796 device.</entry>
1797 </row>
1798
1799 <row>
1800 <entry>VNF Type</entry>
1801
1802 <entry>The name of the on-boarded VNF bundle.</entry>
1803 </row>
1804
1805 <row>
1806 <entry>VIM</entry>
1807
1808 <entry>Name and IP address of the device where the VNF has to be
1809 instantiated.</entry>
1810 </row>
1811
1812 <row>
1813 <entry>License file</entry>
1814
1815 <entry>FortiGate license file provided by Fortinet.</entry>
1816 </row>
1817
1818 <row>
1819 <entry>Configuration file</entry>
1820
1821 <entry>SD-WAN example configuration files provided by Enea: -
1822 FGVM080000136187_20180215_0708_sdwan1.conf -
1823 FGVM080000136188_20180215_0708_sdwan2.conf</entry>
1824 </row>
1825
1826 <row>
1827 <entry>Port1 - VNFMgr</entry>
1828
1829 <entry>Set as dpdk type and connect it to vnfmgrbr
1830 bridge.</entry>
1831 </row>
1832
1833 <row>
1834 <entry>Port2 - WAN</entry>
1835
1836 <entry>Set as dpdk type and connect it to wanbr bridge.</entry>
1837 </row>
1838
1839 <row>
1840 <entry>Port3 - LAN</entry>
1841
1842 <entry>Set as dpdk type and connect it to lanbr bridge.</entry>
1843 </row>
1844 </tbody>
1845 </tgroup>
1846 </table>
1847
1848 <para>To complete the branch-to-branch setup, configure the peer target
1849 in the same way as <literal>target_1</literal>. Make sure to use the
1850 <filename>FGVM080000136188_20180215_0708_sdwan2.conf</filename>
1851 configuration file for the second VNF instantiation.</para>
1852
1853 <para><emphasis role="bold">Testing the FortiGate SD-WAN
1854 VPN</emphasis></para>
1855
1856 <para>Once the full SD-WAN setup is in place a VPN connection needs to
1857 established between the two devices. The Test Machines can be connected
1858 to the LAN interface on each target.</para>
1859
1860 <para>The connected Test Machine can be a laptop or a target that has
1861 one interface configured to get dynamic IP from a DHCP server. The
1862 <command>dhclient &lt;interface&gt;</command> command can be used to
1863 request an IP address.</para>
1864
1865 <note>
1866 <para>The received IP must be in the 172.16.1.2 - 172.16.1.255 range
1867 for Test Machine-1 and in the 172.16.2.2 - 172.16.2.255 range for Test
1868 Machine-2.</para>
1869 </note>
1870
1871 <figure>
1872 <title>Overview: Testing Machines Setup</title>
1873
1874 <mediaobject>
1875 <imageobject>
1876 <imagedata align="center" fileref="images/test_machines.png"
1877 scale="40" />
1878 </imageobject>
1879 </mediaobject>
1880 </figure>
1881
1882 <para>Test Machine-1 should be able to ping Test Machine-2 in this setup
1883 over the WAN connection.</para>
1884
1885 <para>In the figure above and this example, the FortiGate VNF management
1886 interface is accessible through a dedicated Mgmt interface. The Mgmt IP
1887 address can be used from a web browser on the Lab Machine to access the
1888 Fortigate VNF Management Web UI.</para>
1889
1890 <note>
1891 <para>In this SD-WAN VPN setup example, bridges were used as
1892 connection points for Fortigate VNF. It is possible to replace
1893 OVS-DPDK bridges with SR-IOV connection points.</para>
1894 </note>
1507 </section> 1895 </section>
1508 </section> 1896 </section>
1509</chapter> \ No newline at end of file 1897</chapter> \ No newline at end of file
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/adding_instance.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/adding_instance.png
new file mode 100755
index 0000000..e07bd9e
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/adding_instance.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/bind_phys_interface.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/bind_phys_interface.png
index 2fb10fc..73b6ea7 100755
--- a/doc/book-enea-nfv-access-ucpe-solution/doc/images/bind_phys_interface.png
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/bind_phys_interface.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/binding_results.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/binding_results.png
new file mode 100755
index 0000000..892bab7
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/binding_results.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/created_bridges.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/created_bridges.png
new file mode 100755
index 0000000..a44b26e
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/created_bridges.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/onboarding_new_vnf.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/onboarding_new_vnf.png
new file mode 100755
index 0000000..72b59bc
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/onboarding_new_vnf.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/ovs_bridge_four.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/ovs_bridge_four.png
new file mode 100755
index 0000000..1ebcf26
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/ovs_bridge_four.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan1_eg_config.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan1_eg_config.png
new file mode 100755
index 0000000..9ff6284
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan1_eg_config.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan_vpn_overview_1.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan_vpn_overview_1.png
new file mode 100755
index 0000000..684a6af
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/sdwan_vpn_overview_1.png
Binary files differ
diff --git a/doc/book-enea-nfv-access-ucpe-solution/doc/images/test_machines.png b/doc/book-enea-nfv-access-ucpe-solution/doc/images/test_machines.png
new file mode 100755
index 0000000..6ec93fc
--- /dev/null
+++ b/doc/book-enea-nfv-access-ucpe-solution/doc/images/test_machines.png
Binary files differ