Allocating Elastic IPs (EIPs)
Create Elastic IPs (EIP) for use with MGT0, PKT0, and/or PKT1 network interfaces.
To create an Elastic IP for the Management (MGT0) interface, perform the following steps:
- Navigate to the EC2 Management Console
- Select NETWORK & SECURITY > Elastic IPs.
The Elastic IPs page displays.
- Click Allocate new address.
The Allocate new address page displays.
- Click on the radio button next to IPv4 address pool > Amazon pool unless you have a private IPv4 address pool pre-defined by Amazon.
- Click on the Allocate button to complete the creation.
- Assign your IP address a name tag by hovering the mouse over the "Name" field in the Network interface list and clicking on the pencil.
- Repeat to allocate Elastic IPs for PKT0 and PKT1.
Creating Network Interfaces
To route IP packets to/from the subnets created in the preceding procedure, create network interfaces for HA0, MGT0, PKT0, and PKT1.
To create a network interface for HA0, perform the following steps:
Navigate to EC2 Management Console.
Select NETWORK & SECURITY > Network Interfaces.
The Network Interface page displays.
Click Create Network Interface.
The Create Network Interface displays.
In the Create Network Interface screen:
Enter the network interface description such as HA0.
Select the Subnet and Security groups from the drop-down list.
Click Yes, Create.
The new network interface displays in the list.
- By default, the network interface does not have a name. Name it by hovering the mouse over the "Name" field in the Network interface list and clicking on the pencil.
- Repeat steps 3 through 4 to create network interfaces for MGT0, PKT0, and PKT1.
Associating an Elastic IP Address to Private IPs
Associate an elastic IP (EIP) address to MGT0 private primary IP and secondary private IP addresses. Based on your network requirement you can associate EIPs to secondary IP addresses of PKT0 and PKT1 network interfaces.
To associate an elastic IP address to MTG0:
- Right-click the network interface and select Associate Address.
The Associate Elastic IP Address screen displays.
- Click the Address drop-down list and select an elastic IP address from the list.
- Click the Associate to Private IP Address drop-down list and select the private IP address.
Click Associate Address.
- Repeat this procedure for PKT0 and PKT1 network interfaces.
Launching a Standalone SBC Instance from EC2
To launch a standalone SBC instance using AWS EC2 control panel:
Log into the AWS account.
Click the Services drop-down list.
The Services list is displayed.
In the left pane, click EC2.
The EC2 Dashboard page displays.
From the left pane under Images click AMIs.
The AMI ID page displays.
Choosing an AMI ID
This account may own the SBC AMI ID, or it may be a private image.
- If this account owns the AMI, select Owned by me from the drop-down next to the search bar.
- If this account does not own the AMI, select Private images from the drop-down next to the search bar.
- In the search bar enter the AMI ID of the image and press enter. The AMI entered displays.
- Select the AMI ID and click Launch.
The Choose an Instance Type page displays.
Choosing and Configuring an Instance Type
Select an instance type that meets the requirements.
Click Next: Configure Instance Details.
The Configure Instance Details page displays.
Select the Network (VPC) and Management Subnet from the list. This creates the mgt0 network interface and is attached as eth0.
Select the checkbox Add instance to Placement group, and click on the radio button next to Add to a new placement group. Name the placement group.
- Select the IAM role that was created earlier in the procedure.
Scroll down and select Tenancy from the list.
- Scroll down to Network interfaces and expand the section.
- Auto-assign a Public IP address by selecting New network interface next to the eth0 device, or Select the mtg0 Network Interface you allocated in the prior step from the drop-down.
- Click Advanced Details to expand.
In the User data section, select As text.
Enter the user data information in the following format:
If the CERole parameter is missing, it represents standalone userdata format.
{
"ReverseNatPkt0" : "<True | False>",
"ReverseNatPkt1" : "<True | False>",
"SbcPersonalityType" : "isbc",
"CEName" : "<CEName>",
"SystemName" : "<SystemName>",
"ThirdPartyCpuAlloc" : "0",
"ThirdPartyMemAlloc" : "0",
"AdminSshKey" : "<public key>"
}
If the CERole parameter is missing, it represents standalone userdata format.
{
"ReverseNatPkt0" : "False",
"ReverseNatPkt1" : "False",
"SbcPersonalityType" : "isbc",
"SystemName" : "vsbcSystem",
"CEName" : "vsbc1",
"ThirdPartyCpuAlloc" : "0",
"ThirdPartyMemAlloc" : "0",
"AdminSshKey" : "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCJnrFMr/RXJD3rVLMLdkJBYau+lWQ+F55Xj+KjunVBtw/zXURV38QIQ1zCw/GDO2CZTSyehUeiV0pi2moUs0ZiK6/TdWTzcOP3RCUhNI26sBFv/Tk5MdaojSqUc2NMpS/c1ESCmaUMBv4F7PfeHt0f3PqpUsxvKeNQQuEZyXjFEwAUdbkCMEptgaroYwuEz4SpFCfNBh0obUSoX5FNiNO/OyXcR8poVH0UhFim0Rdneo7VEH5FeqdkdGyZcTFs7A7aWpBRY3N8KUwklmNSWdDZ9//epEwgaF3m5U7XMd4M9zHURF1uQ/Nc+aiyVId9Mje2EU+nh6npaw/tEOPUiC1v"
}
The following table gives descriptions for Userdata Parameters:
Userdata Parameter Description
| | | |
---|
ReverseNatPkt0 / ReverseNatPkt1 | Logical
| True / False (default) | Values: True: To consider FIPV4 entity using the value provided in the dictionary False: To configure FIPV4 using SMM rules, and ignore the FIPV4 value provided here. (Default)
|
CEName | 64 | text | This specifies the actual CE name of the SBC instance. For more information, refer to System and Instance Naming Conventions. CEName Requirements: Must start with an alphabetic character. Only contain alphabetic characters and/or numbers. No special characters. Cannot exceed 64 characters in length
|
SystemName | 26 | text | This specifies the actual system name of the SBC instance. For more information, refer to System and Instance Naming Conventions. System Requirements: Must start with an alphabetic character. Only contain alphabetic characters and/or numbers. No special characters. Cannot exceed 26 characters in length.
|
ThirdPartyCpuAlloc | n/a | 0-? in vCPUs | Enter the number of CPUs reserved for use with third-party apps. Note: Default is 0 |
ThirdPartyMemAlloc | n/a | 0-? in MB | Enter the number of MB of memory reserved for use with third-party apps. Note: Default is 0 |
AdminSshKey | 255 | text | This specifies the public key for the admin user. To Extract the Public Key from the Private Key (.pem) file generated in AWS, use the ssh-keygen tool from the shell of any Linux system. (e.g.type: ssh-keygen -y -f <pem_file>). Cut/paste the output from the command onto the AdminSshKey : line as “ssh-rsa <key>” e.g.
> ssh-keygen -y -f paul-vsbc-SA-admin.pemssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCHVcY4flFmBaxvDkIHlgWXl3fTa1A1xrun6FxDMkk3pu5dI4EjgEofnZ4vy/vBakLDMN8Qu5XxmkMDTcgK6ZhJ2JWG8U3y/1w7WauYohMWJV5yQ5ILgui9huc23LGa2+o0zFNGc+0+6X0jmvliccMKwZ05ti9nTaeYj2lDd3UWJGO8pSCvTh50GF9fqRfzAG8BNKXNRDi00XBEfcrMVErhwhyWrwEfSOYOGqrh9p/LubjPHVp8wTn98ZCnUh0B09eX2iOoIBBQalNiD4PnCXGYLnm7MmKErKtEdny0OpGglP2OgjkVQsFK9sYaPu0XlRb7PLZjvsOqqRHc9b/b0A+J
|
Adding Storage
- Click Next: Add Storage.
The Add Storage page opens.
Select Provisioned IOPS SSD (io1) as Volume Type.
- Enter volume size in GiB. The minimum size is 65 GiB.
Click Next: Add Tags
The Add Tags page displays.
Enter a key name and value.
Configuring Security Groups
- Click Next: Configure Security Group.
The Configure Security Group page appears.
- Click Select an existing security group.
- Select the management security group from the list.
- Click Review and Launch.
Reviewing the Instance
- Review the instance details. You can choose to Edit any of the prior specified instance specifications.
- Click Launch. You will be prompted to select a key pair.
Key Pair Selection
- Select Key Pair option.
- Select Choose an existing key pair and select the key pair or specify the key pair name if one has already been defined.
OR - Select Create a new key pair name from the drop-down and give the key-pair a name. Be sure to click "Download Key Pair" to save the private key file (*.pem). This will be required to have ssh access into the created SBC after the instance is launched.
- Click Launch Instances. The new instance will start launching and the Launch Status page appears.
- Click the instance ID to view the instance.
Attaching Network Interfaces
Stop the instance to attach the network interfaces:
- Right-click the instance and select Instance State > Stop.
A message appears to confirm stopping the instance:
The Launch Instance screen displays again. - Right-click the instance and select Networking > Attach Network Interface.
- Select the HA interface and click Attach. This attaches the HA network interface as eth1.
Repeat step 3 to attach PKT0 and PKT1 network interfaces.
Re-Start the instance to continue the instantiation:
- Right click the instance and select Instance State > Start.
A message appears to confirm starting the instance.
- Click Yes, Start.
The user is returned to the Launch Instance screen.