If you want the Cisco Catalyst 8000V router to update a routing table in the AWS network, you must first authenticate the router. In AWS, you must create a policy
that permits the Cisco Catalyst 8000V router to access the route table. For example:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"logs:CreateLogStream",
"cloudwatch:",
"s3:",
"ec2:AssociateRouteTable",
"ec2:CreateRoute",
"ec2:CreateRouteTable",
"ec2:DeleteRoute",
"ec2:DeleteRouteTable",
"ec2:DescribeRouteTables",
"ec2:DescribeVpcs",
"ec2:ReplaceRoute",
"ec2:DescribeRegions",
"ec2:DescribeNetworkInterfaces",
"ec2:DisassociateRouteTable",
"ec2:ReplaceRouteTableAssociation",
"logs:CreateLogGroup",
"logs:PutLogEvents"
],
"Resource": "*"
}
]
}
An IAM role is then created using this policy and applied to the EC2 resource.
After the Cisco Catalyst 8000V EC2 instances are created, the IAM role created above needs to be attached to each router.
Note
|
See the AWS documentation for instructions on how to create policies, IAM roles, and how to associate a role to an EC2 instance.
|