Prerequisites to Configure Cloud onRamp for IaaS
Before you configure Cloud onRamp for IaaS, ensure that you provision the vManage NMS, AWS, and Azure.
-
Provision vManage
Before you can configure Cloud onRamp for IaaS, you must properly provision vManage NMS.
-
Ensure that your vManage server has access to the internet and that it has a DNS server configured so that it can reach AWS. To configure a DNS server, in the vManage VPN feature configuration template, enter the IP address of a DNS server, and then reattach the configuration template to the vManage server.
-
Ensure that two cloud routers that are to be used to bring up the Cloud OnRamp for IaaS have been added to the vManage NMS and have been attached to the appropriate configuration template. (These two routers are deployed in AWS in their own VPC, and together they form the transit VPC, which is the bridge between the overlay network and AWS cloud applications.) Ensure that the configuration for these routers includes the following:
-
Hostname
-
IP address of vBond orchestrator
-
Site ID
-
Organization name
-
Tunnel interface configuration on the eth1 interface
-
-
Ensure that the vManage NMS is synchronized with the current time. To check the current time, click the Help (?) icon in the top bar of any vManage screen. The Timestamp field shows the current time. If the time is not correct, configure the vManage server’s time to point to an NTP time server, such as the Google NTP server. To do this, in the vManage NTP feature configuration template, enter the hostname of an NTP server, and then reattach the configuration template to the vManage server. The Google NTP servers are time.google.com, time2.google.com, time3.google.com, and time4.google.com
-
-
Provision Amazon Web Services (AWS)
Before you can configure Cloud OnRamp for IaaS, ensure that you provision AWS properly.
-
Ensure that you have subscribed to the Viptela marketplace Amazon machine images (AMIs) and the Cisco CSR AMIs in your AWS account. See Subscribe to Cisco SD-WAN AMIs.
-
Ensure that at least one user who has administrative privileges has the AWS API keys for your AWS account. For Cloud OnRamp for IaaS, these keys are used to authenticate the vManage server with AWS and to bring up the VPC and Elastic Compute Cloud (EC2) instances.
-
Check the AWS limits associated with your account (in the Trusted Advisor section of AWS) to ensure that the following resources can be created in your account:
-
1 VPC, which is required for creating the transit VPC
-
6 Elastic IP addresses associated with each pair of transit vEdge router
Note
vEdge Cloud routers support C3 and C4 compute-intensive families.
-
1 AWS virtual transit (VGW) for each host VPC
-
4 VPN connections for mapping each host VPC
Note
Cisco XE SD-WAN devices use VRFs in place of VPNs. When you complete the VPN configuration, the system automatically maps the VPN configurations to VRF configurations.
-
-
-
Subscribe to Cisco SD-WAN AMIs
To use the Cloud OnRamp for IaaS and other Cisco SD-WAN services, you must subscribe to the Amazon Machine Image (AMI) for your router in AWS. When you subscribe, you can complete the following tasks:
-
Launch a cloud router AMI instance
-
Generate a key pair to use for the instance
-
Use the key pair to subscribe to the cloud router instance.
You subscribe to the vEdge Cloud router AMI only once, when you first create a Cisco SD-WAN Viptela AMI instance.
To create a new AMI subscription, generate and upload a key pair:
-
In AWS, search to locate a cloud router AMI for your devices.
-
Select and launch an EC2 instance with the AMI instance. For more information, see Create Cisco IOS XE SD-WAN Cloud VM Instance on AWS.
-
Generate a key pair. For full instructions, see Set Up the Cisco IOS XE SD-WAN Cloud VM Instance.
-
Click Download Key Pair. The key pair then downloads to your local computer as a .pem file.
-
Click Launch Instance. A failure message displays, because you now need to upload the key pair to complete the subscription process.
-
To upload the key pair, in AWS Marketplace, search for your router AMI.
-
Click Continue.
-
Click Key Pair to bring up a vEdge router instance. In the option to enter the key pair, upload the .pem file from your local computer. This is the file that you had generated in Step c when creating a new AMI subscription.
-
-
Provision Azure
Before you can configure Cloud OnRamp for IaaS, you must properly provision Azure.
-
Ensure that you have accepted the terms and conditions for the Cisco Cloud vEdge Router in the Azure Marketplace.
Accept the Azure Terms of Service
To use a Cisco cloud router as part of the Cloud onRamp workflow, you must accept marketplace terms for using a virtual machine (VM). You can do accept the Azure Terms of Service in one of the following ways:
-
Spin up the cloud router on the portal manually, and accept the terms as part of the final page of the bringup wizard.
-
In the Azure APIs or Powershell/Cloud Shell, use the Set-AzureRmMarketplaceTerms command.
-
-
Ensure that you create an App Registration in Azure and retrieve the credentials for your Azure account. For Cloud OnRamp for IaaS, these credentials are used to authenticate the vManage server with Azure and bring up the VNet and the Virtual Machine instances.
Create and Retrieve Azure Credentials
To create and retrieve Azure credentials, you must create an App Registration in Azure with Contributor privileges:
-
Launch the Microsoft Azure portal.
-
Create an application ID:
-
In the left pane of the Azure portal, click Azure Active Directory.
-
In the sub-menu, click App registrations.
-
Click New application registration. The system displays the Create screen.
-
In the Name field, enter a descriptive name such as CloudOnRampApp.
-
In the Application Type field, select Web app/API
-
In the Sign-on URL field, enter any valid sign-on URL; this URL is not used in Cloud OnRamp.
-
Click Create. The system displays a summary screen with the Application ID.
-
-
Create a secret key for the Cloud OnRamp application:
-
In the summary screen, click Settings in the upper-left corner.
-
In the right pane, click Keys. The system displays the screen.
-
On the Passwords screen:
-
In the Description column, enter a description for your secret key.
-
In the Expires column, from the Duration drop-down, select the duration for your secret key.
-
Click Save in the upper-left corner of the screen. The system displays the secret key in the Value column but then hides it permanently, so be sure to copy and save the password in a separate location.
-
-
-
In the left pane of the Azure portal, click Subscriptions to view the subscription ID. If you have multiple subscriptions, copy and save the subscription ID which you are planning to use for configuring the Cloud OnRamp application.
-
View the Tenant ID:
-
In the left pane of the Azure portal, click Azure Active Directory.
-
Click Properties. The system displays the directory ID which is equivalent to the tenant ID.
-
-
Assign Contributor privileges to the application:
-
In the left pane of the Azure portal, click Subscriptions.
-
Click the subscription that you will be using for the Cloud OnRamp application.
-
In the subscription pane, navigate to Access Control (IAM).
-
Click Add. The system displays the Add Permissions screen.
-
From the Role drop-down menu, select Contributor.
-
From the Assign Access To drop-down, select the default value Azure AD user, group, or application.
-
From the Select drop-down, select the application you just created for Cloud onRamp.
-
Click Save.
You can now log into the Cloud OnRamp application with the Azure credentials you just created and saved.
-
-
-
Check the Azure limits associated with your account (by going to your subscription in the portal and checking Usage + Quotas) to ensure that the following resources can be created in your account:
-
1 VNet, which is required for creating the transit VNet
-
1 Availability set, required for Virtual Machine distribution in the transit VNet
-
6 Static Public IP addresses associated with the transit cloud routers
-
1 Azure Virtual Network Gateway and 2 Static Public IP Addresses for each host VNet
-
4 VPN connections for mapping each host VNet
Note
Cisco XE SD-WAN devices use VRFs in place of VPNs. When you complete the VPN configurations, the system automatically maps the VPN configurations to VRF configurations.
-
-
F-Series Azure VMs (F4 and F8) are supported on the cloud routers.
-