Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Log onto Rapid Access Cloud dashboard via https://cloud.cybera.ca

  2. In the very top left corner of the page, next to the Rapid Access Cloud logo, ensure the proper project is selected


  3. On the side, click on “Compute”, and then “Instances” under it.

  4. Click on the “Launch Instance” button to start making a VFS instance. You will see the following menu


  5. Give the instance a name, and choose the appropriate flavor. Depending on the virtual firewall of your choice, the corresponding flavor should be chosen for the instance. See the table below to identify the right flavor for your virtual firewall:

    Palo Alto FirewallFlavorFortigate FirewallFlavor
    VM-100f1.smallVM-02f2.small
    VM-300f1.mediumVM-04f2.medium
    VM-500f1.largeVM-08f2.large



    In the example above, the name test03-vfs has been given to the instance, and the flavor (f1.medium) indicates it is a Palo Alto instance.

  6. Click on ‘Select source’ and select “Boot from image”. 



  7. Then select the appropriate image (panos-production in the example below):


  8. Check your options after you’ve picked what you wanted:


  9. Under “Networking*” tab, select only "default":


  10. Under “Network Ports” tab, check both trust0_port and untrust0_port:


  11. Then click on "Launch" in the bottom right of the window, and wait. This process could take a few minutes, then after completion, the following menu should appear:


  12. At this point your VFS instance is ready. You can then use a VPN to connect to it and then either SSH using the default management IP, or open a web browser and add “https://<default IP> and then hit enter. See the Access and Maintenance of Your Virtual Firewall section.

  13. (Optional) If a configuration needs to be uploaded from a backup, make sure the ports on the newly launched firewall and in the backup configuration match, otherwise the backup configuration should be edited based on new port assignments on the new firewall

    1. Take note of the trust0 and untrust0 MAC addresses from the cloud side, using RAC portal (horizon) as shown in the example below




    2. Find out which ports on the new firewall have the MAC addresses discovered in (a)
      1. panos
        1. Web GUI
          First, change the interface type for Ethernet1/1 and Ethernet1/2 to Layer3, and commit
          Image Added
        2. Web GUI
          Make sure the 'MAC Address' column is selected
          Image Added

          Then, you can see the MAC addresses as follows. Note, no need of configuring IP addresses to display the MAC.



        3. Command line (using horizon instance console or ssh to instance)

          Code Block
          admin@PA-VM> show interface all
          
          total configured hardware interfaces: 2
          
          name                    id    speed/duplex/state            mac address
          --------------------------------------------------------------------------------
          ethernet1/1             16    10000/full/up                 fa:16:3e:77:d2:98
          ethernet1/2             17    10000/full/up                 fa:16:3e:d2:2a:f3


      2. fortios
        1. Web GUI
          Go to the edit mode of each interface to check the MAC, as shown on the bottom right side below. This doesn't need any configuration changes in advance.
          Image Added

        2. Command line (using horizon instance console or ssh to instance)
          Image Added

    3. Cross check if the panos/fortios ports match with those in the backup configuration
      1. if the ports are similar, no further action is required, the backup configuration can be uploaded to the new firewall
      2. if ports are different, edit the backup configuration according to the new port assignment; then the configuration can be uploaded to the new firewall

...