You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add VPC example
* Rewrite of Softgate installation, Lots of changes
* Finalize the doc
* Corrected spelling typos
* Simplify requirements for softgate installation
* Removed requirements for OS
* Missing link
* Add image with green status
* Fix typos
* REvert changes in installation
* Reverted changes in vpc upstream peering
Co-authored-by: Levon Avagyan <[email protected]>
Copy file name to clipboardExpand all lines: SoftGate-PRO-installation.rst
+1-1
Original file line number
Diff line number
Diff line change
@@ -69,4 +69,4 @@ Requires freshly installed Ubuntu Linux 18.04 LTS and internet connectivity conf
69
69
70
70
user@host:~$ sudo reboot
71
71
72
-
Once the server boots up you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
72
+
Once the server boots up you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
Copy file name to clipboardExpand all lines: SoftGate-installation.rst
+1-1
Original file line number
Diff line number
Diff line change
@@ -88,4 +88,4 @@ Requires freshly installed Ubuntu Linux 22.04 LTS and internet connectivity.
88
88
89
89
user@host:~$ sudo reboot
90
90
91
-
Once the server boots up, you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
91
+
Once the server boots up, you should see its heartbeat going from Critical to OK in **Net→Inventory**, **Telescope→Dashboard**, and the SoftGate color will reflect its health in **Net→Topology**.
Copy file name to clipboardExpand all lines: installing-netris-controller.rst
+2-2
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ Installing a Netris Controller
7
7
8
8
You can install the Netris controller almost on any 64-bit Linux host. Netris Controller may or may not be on the same network as the managed network nodes are. In fact if there are multiple Netris managed deployments there’s no need for an individual controller for each deployment.
9
9
10
-
It doesn’t matter where to host the Netris controller. What matters is that the Netris controller needs to be accessible over the Internet. So you can access the console, and nodes that are going to be managed by Netris need to have access to the Netris controller through their management network interface.
10
+
It doesn't matter where to host the Netris controller. What matters is that the Netris controller needs to be accessible over the Internet. So you can access the console, and nodes that are going to be managed by Netris need to have access to the Netris controller through their management network interface.
11
11
12
12
Linux Host requirements
13
13
@@ -18,7 +18,7 @@ Linux Host requirements
18
18
19
19
In this example I am running my Netris controller on an AWS hosted virtual machine (EC2) which has got a public IP address 54.219.211.71. While it is OK for users and nodes to refer to the Netris Controller through an IP address, I like using a DNS record (this way it will be easier to potentially move Netris Controller somewhere with a different IP address).
20
20
21
-
I’m using Cloudflare to create this “example-netris-controller.netris.dev” DNS record to point to the public IP address of my EC2 : 54.219.211.71.
21
+
I'm using Cloudflare to create this “example-netris-controller.netris.dev” DNS record to point to the public IP address of my EC2 : 54.219.211.71.
Copy file name to clipboardExpand all lines: l3-load-balancer.rst
+13-13
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
.. meta::
2
-
:description: Layer-3 Load Balancer (Anycast)
2
+
:description: Layer-3 Load Balancer (Anycast)
3
3
4
4
.. _l3lb_def:
5
5
@@ -23,22 +23,22 @@ To configure L3 (Anycast) load balancing:
23
23
#. This will create a service under Services→Load Balancer and permit using the Anycast IP address in multiple ROH instances.
24
24
25
25
.. image:: images/add-l3-lb.png
26
-
:align:center
27
-
:class:with-shadow
28
-
:alt:Add a L3 LB
26
+
:align:center
27
+
:class:with-shadow
28
+
:alt:Add a L3 LB
29
29
30
-
Example: Adding an Anycast IPv4 address
30
+
Example: Adding an Anycast IPv4 address
31
31
32
32
.. image:: images/list-l3-lb.png
33
-
:align:center
34
-
:class:with-shadow
35
-
:alt:List L3 LBs
33
+
:align:center
34
+
:class:with-shadow
35
+
:alt:List L3 LBs
36
36
37
-
Example: Under Services→Load Balancer, you can find the listing of L3 (Anycast) Load Balancers, service statuses, and you can add/remove more ROH instances and/or health checks.
37
+
Example: Under Services→Load Balancer, you can find the listing of L3 (Anycast) Load Balancers, service statuses, and you can add/remove more ROH instances and/or health checks.
Copy file name to clipboardExpand all lines: network-policies.rst
+44-39
Original file line number
Diff line number
Diff line change
@@ -28,9 +28,10 @@ Example: Declare a basic BGP neighbor
28
28
:class:with-shadow
29
29
30
30
Example2: Declare BGP neighbor terminated on V-Net. Netris will automatically configure BGP session on the switch closest to the remote IP.
31
+
31
32
.. image:: images/add-bgp-basic-2.png
32
-
:align:center
33
-
:class:with-shadow
33
+
:align:center
34
+
:class:with-shadow
34
35
35
36
36
37
############
@@ -45,7 +46,6 @@ Click Advanced to expand the BGP neighbor add/edit window.
45
46
:widths: 25, 75
46
47
:header-rows: 0
47
48
48
-
49
49
--------------------------
50
50
51
51
BGP Objects
@@ -139,18 +139,20 @@ Located under Net→Routes is a method for describing static routing policies th
139
139
We recommend using the Routes only if BGP is not supported by the remote end.
140
140
141
141
|Typical use cases for static routing:
142
+
142
143
* To connect the switch fabric to an ISP or upstream router in a situation where BGP and dual-homing are not supported.
143
144
* Temporary interconnection with the old network for a migration.
144
145
* Routing a subnet behind a VM hypervisor machine for an internal VM network.
145
146
* Specifically routing traffic destined to a particular prefix through an out-of-band management network.
146
147
147
148
|Add new static route fields description:
149
+
148
150
* **Prefix** - Route destination to match.
149
151
* **Next-Hop** - Traffic destined to the Prefix will be routed towards the Next-Hop. Note that static routes will be injected only on units that have the Next-Hop as a connected network.
150
152
* **Description** - Free description.
151
153
* **Site** - Site where Route belongs.
152
154
* **State** - Administrative (enable/disable) state of the Route.
153
-
* **Apply to** - Limit the scope to particular units. It’s typically used for Null routes.
155
+
* **Apply to** - Limit the scope to particular units. It's typically used for Null routes.
154
156
155
157
156
158
Example: Default route pointing to a Next-Hop that belongs to one of V-NETs.
@@ -201,45 +203,46 @@ Example: Adding NAT IP addresses and NAT IP Address Pools to a SoftGate node.
201
203
:align:center
202
204
:class:with-shadow
203
205
206
+
204
207
Defining NAT rules
205
208
------------------
206
209
NAT rules are defined under Net→NAT.
207
210
208
211
.. list-table:: NAT Rule Fields
209
-
:widths: 25 75
210
-
:header-rows: 1
211
-
212
-
* - Name
213
-
- Unique name
214
-
* - **State**
215
-
- State of rule (enabled or disabled)
216
-
* - **Site**
217
-
- Site to apply the rule
218
-
* - **Action**
219
-
- *SNAT* - Replace the source IP address with specified NAT IP along with port overloading
220
-
*DNAT* - Replace the destination IP address and/or destination port with specified NAT IP
221
-
*ACCEPT* - Silently forward, typically used to add an exclusion to broader SNAT or DNAT rule
222
-
*MASQUERADE* - Replace the source IP address with the IP address of the exit interface
223
-
* - **Protocol**
224
-
- *All* - Match any IP protocol
225
-
*TCP* - Match TCP traffic and ports
226
-
*UDP* - Match UDP traffic and ports
227
-
*ICMP* - Match ICMP traffic
228
-
* - **Source**
229
-
- *Address* - Source IP address to match
230
-
*Port* - Source ports range to match with this value (TCP/UDP)
231
-
* - **Destination**
232
-
- *Address* - Destination IP address to match. In the case of DNAT it should be one of the predefined NAT IP addresses
233
-
*Port* - For DNAT only, to match a single destination port
234
-
*Ports* - For SNAT/ACCEPT only. Destination ports range to match with this value (TCP/UDP)
235
-
* - **DNAT to IP**
236
-
- The global IP address for SNAT to be visible on the Public Internet. The internal IP address for DNAT to replace the original destination address with
237
-
* - **DNAT to Port**
238
-
- The Port to which destination Port of the packet should be NAT'd
239
-
* - **Status**
240
-
- Administrative state (enable/disable)
241
-
* - **Comment**
242
-
- Free optional comment
212
+
:widths: 25 75
213
+
:header-rows: 1
214
+
215
+
* - Name
216
+
- Unique name
217
+
* - **State**
218
+
- State of rule (enabled or disabled)
219
+
* - **Site**
220
+
- Site to apply the rule
221
+
* - **Action**
222
+
- *SNAT* - Replace the source IP address with specified NAT IP along with port overloading
223
+
*DNAT* - Replace the destination IP address and/or destination port with specified NAT IP
224
+
*ACCEPT* - Silently forward, typically used to add an exclusion to broader SNAT or DNAT rule
225
+
*MASQUERADE* - Replace the source IP address with the IP address of the exit interface
226
+
* - **Protocol**
227
+
- *All* - Match any IP protocol
228
+
*TCP* - Match TCP traffic and ports
229
+
*UDP* - Match UDP traffic and ports
230
+
*ICMP* - Match ICMP traffic
231
+
* - **Source**
232
+
- *Address* - Source IP address to match
233
+
*Port* - Source ports range to match with this value (TCP/UDP)
234
+
* - **Destination**
235
+
- *Address* - Destination IP address to match. In the case of DNAT it should be one of the predefined NAT IP addresses
236
+
*Port* - For DNAT only, to match a single destination port
237
+
*Ports* - For SNAT/ACCEPT only. Destination ports range to match with this value (TCP/UDP)
238
+
* - **DNAT to IP**
239
+
- The global IP address for SNAT to be visible on the Public Internet. The internal IP address for DNAT to replace the original destination address with
240
+
* - **DNAT to Port**
241
+
- The Port to which destination Port of the packet should be NAT'd
242
+
* - **Status**
243
+
- Administrative state (enable/disable)
244
+
* - **Comment**
245
+
- Free optional comment
243
246
244
247
245
248
Example: SNAT all hosts on 10.0.0.0/8 to the Internet using 198.51.100.65 as a global IP.
@@ -319,11 +322,13 @@ Example: Ping.
319
322
:class:with-shadow
320
323
321
324
|Looking Glass controls described for the EVPN family.
322
-
* **BGP Summary** - Show brief summary of BGP adjacencies with neighbors, interface names, and EVPN prefixes received.
325
+
326
+
* **BGP Summary** - Show brief summary of BGP adjacencies with neighbors, interface names, and EVPN prefixes received.
323
327
* **VNI** - List VNIs learned.
324
328
* **BGP EVPN** - List detailed EVPN routing information optionally for the given route distinguisher.
325
329
* **MAC table** - List MAC address table for the given VNI.
326
330
331
+
327
332
Example: Listing of adjacent BGP neighbors and number of EVPN prefixes received.
Copy file name to clipboardExpand all lines: roh.rst
+8-8
Original file line number
Diff line number
Diff line change
@@ -44,15 +44,15 @@ Description of ROH instance fields:
44
44
.. tip:: Many switches can’t autodetect old 1Gbps ports. If attaching hosts with 1Gbps ports to 10Gpbs switch ports, you’ll need to change the speed for a given Switch Port from Auto(default) to 1Gbps. You can edit a port in Net→Switch Ports individually or in bulk.
45
45
46
46
.. image:: images/ROH-instance.png
47
-
:align:center
48
-
:class:with-shadow
49
-
:alt:ROH Instances
47
+
:align:center
48
+
:class:with-shadow
49
+
:alt:ROH Instances
50
50
51
-
Example: Adding an ROH instance. (Yes, you can use A.B.C.0/32 and A.B.C.255/32)
51
+
Example: Adding an ROH instance. (Yes, you can use A.B.C.0/32 and A.B.C.255/32)
52
52
53
53
.. image:: images/ROH-listing.png
54
-
:align:center
55
-
:class:with-shadow
56
-
:alt:ROH Listings
54
+
:align:center
55
+
:class:with-shadow
56
+
:alt:ROH Listings
57
57
58
-
Expanded view of ROH listing. BGP sessions are up, and the expected IP is in fact received from the actual ROH server. Traffic stats are available per port.
58
+
Expanded view of ROH listing. BGP sessions are up, and the expected IP is in fact received from the actual ROH server. Traffic stats are available per port.
0 commit comments