Cisco Spaces: Connector VM on Azure Environment

Cisco Spaces: Connector Azure cloud platform support

The Cisco Spaces: Connector 3.2 June, 2025 release supports the Azure cloud platform. To deploy the Azure Connector virtual machine (VM), you need the necessary access to Azure cloud platform.

Set Up Connector VM on Azure Environment

Follow the steps to setup a connector VM.

Procedure


Step 1

Log in to your Azure portal.

Step 2

In the Azure Marketplace, search for the latest connector release and click Get It Now > Continue.

Figure 1. Cisco Spaces Connector
The Cisco Spaces: Connector preview page is displayed.
Figure 2. Cisco Spaces: Connector

Step 3

In the Cisco Spaces: Connector preview page, perform these steps:

  1. From the Subscription drop-down list, select Microsoft Azure Enterprise as the type.

  2. From the Plan drop-down list, select Cisco Spaces Connector V3 as your subscription plan.

  3. Click Create.

Step 4

In the Create a virtual machine window, under the Basics tab, perform these steps:

Figure 3. Create a virtual machine Basics tab
  1. From the Resource group drop-down list, under the Subscription section within the Project details area, select your resource group.

    Create a new one if required.

  2. In the Virtual machine name field, under the section Instance details, enter a name for the connector VM.

  3. From the Size drop-down list, select the recommended size. These are the recommended sizes:

    • Standard_D2ds_v4 - 2 vcpus, 8 GiB memory.

    • Standard_D4ds_v4 - 4 vcpus, 16 GiB memory.

    • Standard_D8ds_v4 - 8 vcpus, 32 GiB memory.

  4. From the Authentication type, under the section Administrator account, select the SSH public key radio button.

Note

 

The Username is azureuser by default. The Key pair name is populated by itself. You can keep the same or replace with your own.

Step 5

In the Create a virtual machine window, perform these steps under the Networking tab:

Figure 4. Create a virtual machine Networking tab
  1. From the Virtual network drop-down list, under the section Network interface, select your network group.

  2. From the Subnet drop-down list, select your specific subnet.

  3. Configure and allow the required inbound rules.

    Figure 5. Configure required inboud rules
  4. Configure and allow the required outbound rules.

    Figure 6. Configure required outboud rules
  5. Click Review + create.

Step 6

To change the permission of the downloaded key, run the command:

Example:

chmod 600 <keyname
Figure 7. Generate new key pair

Note

 

We recommend you to download this key pair to your system, navigate to the file location and configure appropriate permissions using the chmod command.

Step 7

SSH to the connector as azureuser using the public key.

Example:

ssh -i <public_key> azureuser@<ip_address>

Step 8

Enter the password for the Cisco Spaces administrator (spacesadmin).

Figure 8. Cisco Spaces administrator
The Cisco Spaces: Connector reboots and the connector UI is displayed.

What to do next

For more information on how to generate a token for your deployed azure connector, follow the steps here: Connector on Cisco Spaces.