The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Service Provider administrator can use the Cisco CNAP Admin Portal to:
– Look at information about a gateway.
– Add a gateway (you cannot configure a WAN Gateway until a tenant has created a container and the container is active).
– View summary information about a firewall.
– View the hierarchy of information on the Firewall tab.
– Set up a tenant perimeter firewall.
– Change the policy map for a service policy.
– Create a new network Access Control List (ACL).
– Confirm the licensing of a Citrix NetScaler VPX.
– Look at load balancer information about a container.
Note Since Cisco CNAP is also pushing configurations for the automation of work flows on devices, certain precautions need to be followed when manually configuring devices to avoid disrupting Cisco CNAP-based automation. Changing configurations pushed from Cisco CNAP will cause the automated provisioning system to malfunction, which in some cases could cause all automated provisioning to stop until the error conditions are manually remediated. In general on the data center provider edge, all configurations under the tenant VRFs pushed by Cisco CNAP should not be edited or changed, including sub-interfaces and routing. Similarly on the Cisco APIC, the Cisco APIC tenants configured by Cisco CNAP should only be changed by Cisco CNAP. Any configurations pushed by Cisco CNAP should not be manually edited. For more information, see Installing Cisco Cloud Network Automation Provisioner for the Microsoft Cloud Platform, Release 1.1.
The Tenants tab displays a list of all the tenant containers currently managed by Cisco CNAP, as shown on the Tenants Tab screen.
Each container row visible on the Tenants tab shows the following information:
Step 1 To display summary information about a specific container, on the Tenants tab click on the row with the container you want to view, as shown in the following screen.
Figure 5-2 Tenants Tab—Container Selected
You see the Tenants Summary screen.
Figure 5-3 Tenants Summary Screen
The Tenants Summary screen displays a list of the WAN Gateway services configured in the container (only MPLS VPN in current release) and a list of all the perimeter network services configured in the container (firewall, tiers, DMZ, etc.).
Specific information above the WAN Gateway and Perimeter tables includes:
– Yellow—Container state is Creating.
You can collapse and expand the table information using the triangles, as shown in the following sample screens for the MPLS VPN WAN Gateway, Perimeter Firewall, and Perimeter Tier 1.
Figure 5-4 Summary Tab—WAN Gateway MPLS VPN Details
Using MPLS VPN as an example, the information in the WAN Gateway table includes:
Information in the Perimeter table is based on the currently selected Cloud Service and includes information about firewalls and tiers (in the current release, public for backups and recovery for DMZ are not used).
Figure 5-5 Summary Tab—Perimeter Firewall Details
Using Zone Based Firewall as an example, the information in the Perimeter table includes:
Figure 5-6 Summary Tab—Perimeter Tier Details
Note When you delete a container, all information about the container is deleted from the Cisco CNAP database and none of the deleted information can be recovered.
Step 1 To delete a container, on the Tenants tab click on the row with the container you want to delete, as shown in the following screen.
Figure 5-7 Tenants Tab—Container Selected
You see the Tenants Summary screen.
Figure 5-8 Tenants Summary Screen
Step 2 You can use the Containers: pull-down menu to select a different container to delete. To delete the selected container, at the bottom of the screen click Remove.
You see a screen asking you to confirm the deletion, as shown in the following screen.
Figure 5-9 Confirm Container Deletion
Step 3 Click Yes to delete the container or No to cancel the deletion.
Tenants can access their cloud networks via a WAN. This section describes the provisioning of WAN Gateways for tenant containers, which in this release includes two options:
On the gateway tab screen, you can:
You should not configure a WAN Gateway until a tenant has created a container and the container is active. Check that the container is created and shown as active before provisioning the WAN Gateway.
Step 1 To display gateway information about a specific container, on the Tenants tab click on the row with the container you want to view, as shown in the following screen.
Figure 5-10 Tenants Tab—Container Selected Screen
You see the Tenants Summary screen.
Figure 5-11 Tenants Summary Screen
You see the Tenant Gateway screen. The screen below shows an example for MPLS.
Figure 5-12 Tenant Gateway Screen—MPLS
The screen displays the following information:
– Green—WAN Gateway is Active.
– Red—WAN Gateway is Inactive.
– Yellow—WAN Gateway state is Creating.
The MPLS VPN Backbone and PE fields are described in the next section on Setting Up a WAN Gateway.
During container creation, you can specify whether you want to auto-provision WAN Edge/PE. If you select Autoprovision WAN Edge/PE, then during WAN setup you enter MPLS VPN information, such as route targets and route descriptor, and Cisco CNAP automatically selects a VLAN from the infrastructure pool and uses cloud settings that you defined for the Cisco APIC vPC information to set up the WAN Gateways in the plan.
If your network does not include PE equipment (e.g., Cisco ASRs), you can manually provision the WAN gateways in a plan. During container creation, do not select Autoprovision WAN Edge/PE. Then during set up of WAN Gateways, you can specify the VLAN that will be used on the vPC to connect to private network service, as well as the external PE A and PE B IP addresses.
All gateways set up in the plan will be provisioned in the same way, either automatically or manually.
Note If you are manually provisioning WAN Edge/PE for Shared Services, you must add a SharedService firewall subnet. For more information, see Configuring Network Pools in Chapter3, “Building the Pool of Available Cloud Resources”
Note You cannot configure a WAN Gateway until a tenant has created a container and the container is active.
To set up a WAN Gateway, you specify WAN Gateway settings as appropriate for the VPN access methods you select:
The information you enter is different depending on whether during container creation you specified you wanted Cisco CNAP to Autoprovision WAN Edge/PE.
To set up a WAN Gateway for a container:
Step 1 On the Tenants tab click on the row with the container for which you want to set up a WAN Gateway, as shown in the following screen.
Figure 5-13 Tenants Tab—Container Selected Screen
You see the Tenants Summary screen.
Figure 5-14 Tenants Summary Screen
The specific Tenant Gateway screen you see and the fields you complete depend on whether or not during container creation you specified Autoprovision WAN Edge/PE.
Figure 5-15 Tenant Gateway Screen—Auto-provision Provider Edge
a. Complete the modifiable fields to set up the gateway.
Note Modifiable fields when auto-provisioning WAN Edge/PE are Import Route Target, Export Route Target, and Route Descriptor, which are noted in bold below.
– Provider Edge Bundle—The bundled interface on the ASR, the same as in the Global settings for clouds, MPLS Network, Primary PE ACI L2 Attachment.
– VLAN ID—The VLAN ID that Cisco CNAP allocates.
Note The values for Route Targets and Route Descriptor must be verified and accurately entered to prevent any security violation of a tenant network. You must ensure that tenant cloud networks (containers) are only mapped to their specific VPN by using the correct values for the Route Targets and Route Descriptor of that specific tenant L3VPN.
– Import Route Target —Enter the proper RT based on the network design.
– Export Route Target —Enter the proper RT based on the network design.
– Route Descriptor —Enter the proper descriptor based on the network design.
– VRF—Generated by Cisco CNAP based on the abbreviation of the container ID.
– Primary IP—External PE IP Address in dotted format.
– Secondary IP—External PE IP Address in dotted format.
Figure 5-16 Tenant Gateway Screen—Manual Provision Provider Edge
a. Complete the modifiable fields to add the gateway:
Note Modifiable fields when manually-provisioning WAN Edge/PE are VLAN ID, Primary IP, Secondary IP, and Mask, which are noted in bold below.
– Provider Edge Bundle—The bundled interface on the ASR, the same as in the Global settings for clouds, MPLS Network, Primary PE ACI L2 Attachment.
Note The following fields are not displayed when manually provisioning WAN Edge/PE. The SP administrator should consult with the Microsoft WAP PE administrator to provision the tenant network into the correct L3VPN or other private network for the tenant and agree on the VLAN used for the hand-off of tenant traffic to the cloud data center.
– Import Route Target—RT based on the network design.
– Export Route Target—RT based on the network design.
– Route Descriptor—Descriptor based on the network design.
– VRF—Generated by Cisco CNAP based on the abbreviation of the container ID.
– Primary IP —Enter the external PE IP Address in dotted format.
– Secondary IP —Enter the external PE IP Address in dotted format.
– Mask —Enter the external PE Mask in dotted format.
Note Based on the PE IP address and subnet mask you specify, Cisco CNAP automatically provisions the Cisco CSR 1000V interface IP and HSRP address.
b. When you are finished, click the Add button.
Step 1 On the Tenants tab, click on the row with the container whose WAN Gateway you want to change, then on the Gateway tab, click Change.
Once a container is created, the only WAN Gateway fields you can change are the Import Route Target and Export Route Target, as shown in the following screen.
Note If you manually provisioned the WAN gateways, you cannot change any of the fields.
Figure 5-17 Tenant Gateway Screen—Change WAN Gateway Settings
Step 2 When you are finished, click Change.
On the Tenants tab, click on the row with the container whose WAN Gateway you want to remove, then on the Gateway tab, click Remove.
A firewall is created by default the moment you create a WAN Gateway in the Zinc container and a default policy is applied that allows inside to outside traffic, but restricts outside to inside traffic. The SP administrator can view and manage tenant firewalls, depending on the agreement with the tenant (e.g., you might do it as a managed service or while troubleshooting a customer reported problem). Each Tier is considered a zone, as is the Layer 3 VPN as well as any other external access such as Site-to-Site VPN, Internet access, etc. The Firewall tab will not display any information until the WAN Gateway has been provisioned, since there is no point in showing how traffic is going to be regulated if the tenant cannot access the container from the “outside”.
For detailed information on the base firewall configuration, see: Cisco Cloud Architecture for the Microsoft Cloud Platform: Zinc Container Configuration Guide, Release 1.0
http://www.cisco.com/c/en/us/td/docs/solutions/Service_Provider/CCAMCP/1-0/IaaS_Zinc_Config/CCAMCP1_IaaS_Zinc_Config.html
Step 1 To display firewall information about a specific container, on the Tenants tab click on the row with the container you want to view, as shown in the following screen.
Figure 5-18 Tenants Tab Screen—Container Selected
You see the Tenants Summary screen.
Figure 5-19 Tenants Summary Screen
Step 2 Click the Firewall tab.
You see the Tenant Firewall screen.
Figure 5-20 Tenant Firewall Screen
The screen displays the following information:
– Yellow—Firewall state is Creating.
Note In rare instances, the retrieval of Zone Pairs may take longer than approximately 20 seconds, in which case you will see an error message. Dismiss the error message and refresh the screen.
You use the Firewall Tab to view the various layers of information about firewalls, including:
Note To change the Policy Map associated with a Source and Destination Zone pair, you have to define a new Policy Map, which replaces the existing one.
Note You can view the list of all Object Groups, but you cannot view or edit the details of any specific Object Group.
To display the various layers of information about a firewall:
Step 1 On the Firewall tab screen, use the Source Zone: and Destination Zone: pull-down menus to select the relevant zones, as shown in the following screens.
Figure 5-21 Firewall Source Zone Pull-down Menu Screen
Figure 5-22 Firewall Destination Zone Pull-down Menu Screen
After you select the Source and Destination Zones, the screen populates with a variety of information, as shown in the following screen.
Figure 5-23 Firewall Zones Selected Screen—Detailed Firewall Information Displayed
The various operations you can perform on this screen are described in the following section, Configuring a Firewall.
Step 2 If you click an element on the screen to bring it into focus, it changes to blue. For the element in focus:
The Remove button may be used to remove a:
– Class Map Instance from a Policy Map
– Access List from a Class Map
Note In the current release, Cisco CNAP allows and requires you to associate only one Policy Map with any given zone pair. Consequently, the Remove button is deactivated when you drill down to the Policy Map, but not further.
Note You can only configure a firewall after a tenant has created a container and the Admin has created a WAN Gateway. The firewall is automatically created with a base configuration during container creation. When the WAN gateway is created, another firewall zone is created for the WAN edge. For more information, see Understanding Firewall Creation.
Firewalls are configurable on a per-Tier basis. You configure one firewall per container (not per tier) and you specify policy rules between zones. Firewall policies are specified between each of the workload Tiers and outside interfaces and in each direction independently. That is, a policy needs to be specified for L3VPN to Tier 1 and Tier 1 to L3VPN, and so on for each tier.
To configure a firewall for a container:
Step 1 On the Tenants tab, click the row with the container for which you want to configure a firewall, as shown in the following screen.
Figure 5-24 Tenants Tab Screen—Container Selected
You see the Tenants Summary screen.
Figure 5-25 Tenants Summary Screen
Step 2 Click the Firewall tab.
You see the Tenant Firewall screen.
Figure 5-26 Tenant Firewall Screen
Step 3 Use the Source Zone: and Destination Zone: pull-down menus to select the relevant zones. After you select the zones, the screen populates with a variety of information, as shown in the following screen.
Figure 5-27 Firewall Zones Selected Screen—Detailed Firewall Information Displayed
Step 4 To add a Policy Map, click the Policy Map under Service Policy, then click the Add button. You see the following screen.
Figure 5-28 Add Policy Map for Service Policy Screen
As you begin entering a name, the screen expands to display the following screen where you can associate class maps with the new Policy Map.
Figure 5-29 New Policy Map—Class Maps Screen
Step 6 Associate class maps with the new Policy Map:
Note The class-default shown in the following screen cannot be de-coupled from the policy.
Figure 5-30 Class Map Instance class-default Screen
Step 7 When you are finished, click Save.
Step 1 Click a Policy Map to select it (mark it blue).
Step 2 Click the Modify button to display the Policy Map pop-up.
Figure 5-31 Policy Map Pop-up Screen
This is the same as the Create Service Policy page, but with the name field deactivated. You can click:
Step 1 Click + New in the Class Map Instance section on the Policy Map screen shown below.
Figure 5-32 Class Map Instance Screen—Click +New
Figure 5-33 New Class Map Instance Screen
Step 2 In the Name field, enter a descriptive name for your new Class Map.
This expands the screen to display the following screen.
Figure 5-34 New Class Map Instance Details Screen
The fields on this screen are:
Step 3 When you are finished associating ACLs to this Class Map, click Update to return to the Service Policy screen.
Step 1 Select the desired Class Map on the Firewall tab.
Figure 5-35 Class Map Instance Screen
This screen is identical to the Create Class Map pop up, but with the Name field deactivated.
Step 1 Click New on the Class Map Instance screen shown above, which displays the Access Group screen shown below.
Figure 5-36 Access Groups Screen
Step 2 When you enter a name for the Access List, the screen expands to display the Rules section. Since this is a new ACL, the screen expands in the Add Rule mode as shown below.
Figure 5-37 Access Groups Details Screen
Step 3 The fields you can complete include:
Step 4 If you select Object-Group in the drop-down menu for Target, the Source or Destination menus allow you to choose from object groups existing on the device or create new ones, as shown in the following screen.
Figure 5-38 Access Groups Screen—Object Group Selected
Step 5 Click the +Add Rule button to add the current rule being built to the ACL.
Figure 5-39 Rule Added to ACL Screen
Step 6 Click +New Rule to add more rules.
Step 7 Click the Update button to exit the Add Rule mode and show the list of all rules in the ACL.
Step 1 Select the desired Access List on the Firewall tab.
Step 2 Click Modify to display the Access List pop-up screen, as shown below.
Figure 5-40 Access List Pop-up Screen
Step 3 You can add and remove rules as explained in Creating a New Network Access Control List.
Step 4 If you make any changes to the list of Rules, the Save button is activated and you can click it to save the changes.
Step 1 Select the desired Access List on the Firewall tab.
Step 2 Click Modify to display the Access List pop-up screen, as shown in the following screen.
Figure 5-41 Access List Pop-up Screen
Step 3 Click the +New Rule button.
On the Access Groups screen, the Target, Source, and Destination drop-down menus have an object-group option which when selected displays the Object Group: fields with drop-down menus with a list of compatible object groups and + buttons that launch a page where you can create a new compatible Object Group.
Step 4 Click the + button as shown in the following screen.
Figure 5-42 Access Groups Screen—Object Group Selected
Figure 5-43 Object Group Screen
Step 5 When you enter a name, you see the Add Object screen, as shown below.
Step 6 When you click a field, you see information about allowable values, as shown in the following screen.
Figure 5-45 Add Object Screen—Possible Field Values Displayed
Step 7 You can enter information for the following fields:
Note If “range” is present, the “filter” and “port” properties are ignored.
Step 8 You can create Network or Service type objects and click + to include the object in the group.
A Group must be homogeneous; i.e., it must contain objects of only one type (Network or Service)
Step 9 When you click +, you see the following screen.
Figure 5-46 Object Added to Group Screen
Step 10 Click the X under Remove to remove an object from the group.
Step 1 On the screen shown below, select the object group you want to change, then click Modify.
Figure 5-47 Firewall Zones Selected Screen—Select Object Group
Figure 5-48 Modify Object Group Screen
Step 2 You can enter information for the following fields:
Note If “range” is present, the “filter” and “port” properties are ignored.
Step 3 You can create Network or Service type objects and click + to include the object in the group.
A Group must be homogeneous; i.e., it must contain objects of only one type (Network or Service)
Step 4 When you click +, the object is added to the group. Click the X under Remove to remove an object from the group. When you are done, click Save to save your changes or Close to exit without saving them.
On the load balancer tab screen, you can:
Load balancing services are performed on a per-tenant basis, so you can view information about a load balancer, such as the associated tenant, container type, hosting cloud, etc.
Step 1 To display load balancer information about a specific container, on the Tenants tab click on the row with the container you want to view, as shown in the following screen.
Figure 5-49 Tenants Tab Screen—Container Selected
You see the Tenants Summary screen.
Figure 5-50 Tenants Summary Screen
Step 2 Click the Load Balancer tab.
You see the Tenant Load Balancer screen.
Figure 5-51 Tenant Load Balancer Screen
Step 3 If you click a specific Load Balancer Virtual Server, you see the corresponding Server Farm, as shown in the following screen.
Figure 5-52 Tenant Load Balancer Screen—Server Farm
The screen displays the following information:
– Green—Load balancer is Active.
– Red— Load balancer is Inactive.
– Yellow— Load balancer state is Creating.
Note In the current release, the only operation that can be performed in the Admin Portal related to setting up a server load balancer (SLB) is confirming that the Citrix NetScaler VPX is licensed. The remaining configuration is performed in the Tenant Portal. For more information on the Tenant Portal steps, see Cisco Cloud Network Automation Provisioner for the Microsoft Cloud Platform—Tenant Portal Guide, Release 1.1.
The steps required in the Tenant Portal and Admin Portal to set up a server load balancer are:
Step 1 On the Tenant Portal Load Balancers tab, the tenant should add a Citrix NetScaler VPX device.
The Citrix NetScaler VPX that was added will be in a “LicenseNeeded” state. The tenant will see the message: “Please contact your Cloud Administrator to license your NetScalers”.
Note The administrator must license the Citrix NetScaler VPX, which is not performed within the Cisco CNAP portals nor within the Microsoft WAP interface. You must license and reboot the Citrix NetScaler VPX before you confirm the licensing in Cisco CNAP or the Citrix NetScaler VPX will be deleted.
Step 2 On the Admin Portal, under the Tenants tab screen, Load Balancer tab, the administrator must confirm that the Citrix NetScaler VPX is licensed (this sets the base configuration on the Citrix NetScaler VPX and changes the database information for the device). Information on confirming the licensing of the Citrix NetScaler VPX is shown in the next section.
On the Tenant Portal Load Balancers tab, the Citrix NetScaler VPX will now be in an Active state.
On the Tenant Portal Load Balancers tab, the tenant can now:
For more information, see Cisco Cloud Network Automation Provisioner for the Microsoft Cloud Platform—Tenant Portal Guide, Release 1.1.
Step 1 On the Tenants tab, click on the row with the container for which you want to confirm the Citrix NetScaler VPX license, as shown in the following screen.
Figure 5-53 Tenants Tab Screen—Container Selected
You see the Tenants Summary screen.
Figure 5-54 Tenants Summary Screen
Step 2 Click the Load Balancer tab.
You see the Tenant Load Balancer screen.
Figure 5-55 Tenant Load Balancer Screen
Note You must license and reboot the Citrix NetScaler VPX before you confirm the licensing in Cisco CNAP or the Citrix NetScaler VPX will be deleted.
Step 3 The Citrix NetScaler VPX that requires license confirmation will be in a “LicenseNeeded” state. Click the device, then click License NetScaler(s).