Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update for backbone #559

Merged
merged 2 commits into from
Nov 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 51 additions & 17 deletions ace_backbone/docs/backbone.md
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,6 @@ It will take roughly **2 minutes** for the Aviatrix Controller to completing the

```{figure} images/backbone-tgw04.png
---
height: 400px
align: center
---
Final Deployment outcome
Expand All @@ -142,7 +141,6 @@ Click on the `AWS-NVirginia-TGW` element, select the **VPC** tab and then click

```{figure} images/backbone-tgw05.png
---
height: 400px
align: center
---
AWS NVirginia-TGW
Expand All @@ -169,34 +167,70 @@ It will take roughly **2 minutes** for the Aviatrix Controller to completing the

```{figure} images/backbone-tgw07.png
---
height: 400px
height: 250px
align: center
---
Attachment
``
```

### Create Secure Egress DCF Rules
## Task #3: Create an Aviatrix Transit VPC

Let's continue building the cloud backbone, now you are asked to create the `Transit VPC`.

```{figure} images/backbone-tgw08.png
---
align: center
---
Initial Topology for Task#3

Go to **CoPilot > Cloud Resources > Cloud Assets > VPC/VNets & Subnets** and click on the `"+ VPC/VNet"` button.

```{figure} images/backbone-tgw09.png
---
align: center
---
Transit VPC
```

- Create three rules
- The last DCF rule is a zero-trust rule
- Rule 100 is to allow traffic from the test instance on the private IP address to the public internet only to FQDNs specified in the `allowed-internet-https` web group
- Rule 0 is to allow traffic from the test instance on the private IP address to the public internet only to FQDNs specified in the `allowed-internet-http` web group
Ensure these parameters are entered in the pop-up window `"Create VPC/VNet"`.

![DCF](images/egress_dcf_rules.png)
- **Name:** <span style='color:#479608'>transit-aws</span>
- **Cloud:** <span style='color:#479608'>AWS (Standard)</span>
- **Account:** <span style='color:#479608'>aws-account</span>
- **Region:** <span style='color:#479608'>us-east-1 (N. Virginia)</span>
- **VPC CIDR:** <span style='color:#479608'>10.10.0.0/16</span>
- **VPC Function:** <span style='color:#479608'>Transit + FireNet</span>

### Create rfc1918 SmartGroup
```{figure} images/backbone-tgw010.png
---
align: center
---
VPC Template
```

![Group](images/egress_groups.png)
```{note}
Wait few minutes for the completion of the task. Check the hourglass icon on the right-hand side of your Copilot.
```

![rfc1918](images/egress_rfc1918.png)
## Task #4: Create both the Transit Gateways and the peering

### Create WebGroup to Define FQDN Allowed to Access Internet
Now it's time to deploy a pair of **`Transit GWs`** inside the VPC created on the previous task. In addition to this, you have also to establish the peering between the Transit GWs in Azure and the Transit GWs in AWS.

![WebGroup](images/egress_create_group.png)
```{figure} images/backbone-tgw011.png
---
align: center
---
Inital Topology for Task #4
```

![Edit Group](images/egress_edit_group.png)
Go to **CoPilot > Cloud Fabric > Gateways > Transit Gateways** and click on the `"+ Transit Gateway"` button.

![Polling](images/egress_polling.png)
```{figure} images/backbone-tgw12.png
---
align: center
---
Transit Gateways section
```

### Deploy Aviatrix Spoke GW

Expand Down
Binary file modified ace_backbone/docs/images/backbone-tgw01.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added ace_backbone/docs/images/backbone-tgw010.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added ace_backbone/docs/images/backbone-tgw011.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added ace_backbone/docs/images/backbone-tgw08.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added ace_backbone/docs/images/backbone-tgw09.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added ace_backbone/docs/images/backbone-tgw12.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/ace-backbone/_images/backbone-tgw01.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/ace-backbone/_images/backbone-tgw010.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/ace-backbone/_images/backbone-tgw011.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/ace-backbone/_images/backbone-tgw08.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/ace-backbone/_images/backbone-tgw09.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/ace-backbone/_images/backbone-tgw12.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
68 changes: 51 additions & 17 deletions docs/ace-backbone/_sources/docs/backbone.md
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,6 @@ It will take roughly **2 minutes** for the Aviatrix Controller to completing the

```{figure} images/backbone-tgw04.png
---
height: 400px
align: center
---
Final Deployment outcome
Expand All @@ -142,7 +141,6 @@ Click on the `AWS-NVirginia-TGW` element, select the **VPC** tab and then click

```{figure} images/backbone-tgw05.png
---
height: 400px
align: center
---
AWS NVirginia-TGW
Expand All @@ -169,34 +167,70 @@ It will take roughly **2 minutes** for the Aviatrix Controller to completing the

```{figure} images/backbone-tgw07.png
---
height: 400px
height: 250px
align: center
---
Attachment
``
```

### Create Secure Egress DCF Rules
## Task #3: Create an Aviatrix Transit VPC

Let's continue building the cloud backbone, now you are asked to create the `Transit VPC`.

```{figure} images/backbone-tgw08.png
---
align: center
---
Initial Topology for Task#3

Go to **CoPilot > Cloud Resources > Cloud Assets > VPC/VNets & Subnets** and click on the `"+ VPC/VNet"` button.

```{figure} images/backbone-tgw09.png
---
align: center
---
Transit VPC
```

- Create three rules
- The last DCF rule is a zero-trust rule
- Rule 100 is to allow traffic from the test instance on the private IP address to the public internet only to FQDNs specified in the `allowed-internet-https` web group
- Rule 0 is to allow traffic from the test instance on the private IP address to the public internet only to FQDNs specified in the `allowed-internet-http` web group
Ensure these parameters are entered in the pop-up window `"Create VPC/VNet"`.

![DCF](images/egress_dcf_rules.png)
- **Name:** <span style='color:#479608'>transit-aws</span>
- **Cloud:** <span style='color:#479608'>AWS (Standard)</span>
- **Account:** <span style='color:#479608'>aws-account</span>
- **Region:** <span style='color:#479608'>us-east-1 (N. Virginia)</span>
- **VPC CIDR:** <span style='color:#479608'>10.10.0.0/16</span>
- **VPC Function:** <span style='color:#479608'>Transit + FireNet</span>

### Create rfc1918 SmartGroup
```{figure} images/backbone-tgw010.png
---
align: center
---
VPC Template
```

![Group](images/egress_groups.png)
```{note}
Wait few minutes for the completion of the task. Check the hourglass icon on the right-hand side of your Copilot.
```

![rfc1918](images/egress_rfc1918.png)
## Task #4: Create both the Transit Gateways and the peering

### Create WebGroup to Define FQDN Allowed to Access Internet
Now it's time to deploy a pair of **`Transit GWs`** inside the VPC created on the previous task. In addition to this, you have also to establish the peering between the Transit GWs in Azure and the Transit GWs in AWS.

![WebGroup](images/egress_create_group.png)
```{figure} images/backbone-tgw011.png
---
align: center
---
Inital Topology for Task #4
```

![Edit Group](images/egress_edit_group.png)
Go to **CoPilot > Cloud Fabric > Gateways > Transit Gateways** and click on the `"+ Transit Gateway"` button.

![Polling](images/egress_polling.png)
```{figure} images/backbone-tgw12.png
---
align: center
---
Transit Gateways section
```

### Deploy Aviatrix Spoke GW

Expand Down
2 changes: 1 addition & 1 deletion docs/ace-backbone/docs/Requirements.html
Original file line number Diff line number Diff line change
Expand Up @@ -324,7 +324,7 @@ <h1>Requirements<a class="headerlink" href="#requirements" title="Link to this h
<figure class="align-center" id="id1">
<img alt="../_images/backbone-quiz.png" src="../_images/backbone-quiz.png" />
<figcaption>
<p><span class="caption-number">Fig. 31 </span><span class="caption-text">Requirements</span><a class="headerlink" href="#id1" title="Link to this image">#</a></p>
<p><span class="caption-number">Fig. 36 </span><span class="caption-text">Requirements</span><a class="headerlink" href="#id1" title="Link to this image">#</a></p>
</figcaption>
</figure>
<div class="admonition caution">
Expand Down
Loading