aboutsummaryrefslogtreecommitdiffstats
path: root/heat
diff options
context:
space:
mode:
authorRuoyu Ying <ruoyu.ying@intel.com>2019-04-07 02:49:59 +0800
committerRuoyu Ying <ruoyu.ying@intel.com>2019-04-09 16:27:20 +0800
commit845800d65fc2f25286c74551a1d5dd00e2798df5 (patch)
treea4146b5482bbec8d1390bba591de15f6c02b364b /heat
parenta5eaf56f1c30cb3414a93912a2439e24edc0fc1d (diff)
Add heat script for vIPsec use case
Add the HEAT script for IPsec deployment. With two IPsec gateways, a packetGenerator and a sink inside this scenario. Change-Id: I2f6f74c863f8fb0c52bd776263569e26130b2e38 Issue-ID: INT-793 Signed-off-by: Ruoyu Ying <ruoyu.ying@intel.com>
Diffstat (limited to 'heat')
-rw-r--r--heat/vIPsec/vIPsec/MANIFEST.json17
-rw-r--r--heat/vIPsec/vIPsec/base_vipsec.env58
-rw-r--r--heat/vIPsec/vIPsec/base_vipsec.yaml781
3 files changed, 856 insertions, 0 deletions
diff --git a/heat/vIPsec/vIPsec/MANIFEST.json b/heat/vIPsec/vIPsec/MANIFEST.json
new file mode 100644
index 00000000..a54b816e
--- /dev/null
+++ b/heat/vIPsec/vIPsec/MANIFEST.json
@@ -0,0 +1,17 @@
+{
+ "name": "virtualIPsecurity",
+ "description": "",
+ "data": [
+ {
+ "file": "base_vipsec.yaml",
+ "type": "HEAT",
+ "isBase": "true",
+ "data": [
+ {
+ "file": "base_vipsec.env",
+ "type": "HEAT_ENV"
+ }
+ ]
+ }
+ ]
+}
diff --git a/heat/vIPsec/vIPsec/base_vipsec.env b/heat/vIPsec/vIPsec/base_vipsec.env
new file mode 100644
index 00000000..20c39d26
--- /dev/null
+++ b/heat/vIPsec/vIPsec/base_vipsec.env
@@ -0,0 +1,58 @@
+parameters:
+ vipsec_image_name: PUT THE VM IMAGE NAME HERE (IPSEC image required)
+ ipsec_flavor_name: PUT THE VM FLAVOR NAME HERE (m1.large suggested)
+ sink_flavor_name: PUT THE VM FLAVOR NAME HERE (m1.medium suggested)
+ packetgen_flavor_name: PUT THE VM FLAVOR NAME HERE (m1.medium suggested)
+ public_net_id: PUT THE PUBLIC NETWORK ID HERE
+ protected_clientA_private_net_id: zdfw1fwl01_unprotected
+ protected_clientB_private_net_id: zdfw1fwl01_protected
+ onap_private_net_id: PUT THE ONAP PRIVATE NETWORK NAME HERE
+ onap_private_subnet_id: PUT THE ONAP PRIVATE NETWORK NAME HERE
+ ipsec_private_net_id: PUT THE IPSEC PRIVATE NETWORK NAME HERE
+ ipsec_private_subnet_id: PUT THE IPSEC PRIVATE NETWORK NAME HERE
+ protected_clientA_private_net_cidr: 192.168.10.0/24
+ protected_clientB_private_net_cidr: 192.168.20.0/24
+ onap_private_net_cidr: 10.0.0.0/16
+ ipsec_private_net_cidr: 192.168.30.0/24
+ vipsec_A_private_ip_0: 192.168.10.100
+ vipsec_B_private_ip_0: 192.168.20.100
+ vipsec_A_private_ip_1: 10.0.100.1
+ vipsec_B_private_ip_1: 10.0.100.4
+ vipsec_A_private_ip_2: 10.0.30.100
+ vipsec_B_private_ip_2: 10.0.30.101
+ vpg_private_ip_0: 192.168.10.200
+ vpg_private_ip_1: 10.0.100.2
+ vsn_private_ip_0: 192.168.20.250
+ vsn_private_ip_1: 10.0.100.3
+ vipsec_name_0: zdfw1fwl01fwl01
+ vipsec_name_1: zdfw1fwl01fwl02
+ vpg_name_0: zdfw1fwl01pgn01
+ vsn_name_0: zdfw1fwl01snk01
+ vipsec_A_private_0_port_vnic_type: normal or direct
+ vipsec_B_private_0_port_vnic_type: normal or direct
+ vipsec_private_1_port_vnic_type: normal or direct
+ vipsec_private_2_port_vnic_type: normal or direct
+ vpg_private_0_port_vnic_type: normal or direct
+ vpg_private_1_port_vnic_type: normal or direct
+ vsn_private_0_port_vnic_type: normal or direct
+ vsn_private_1_port_vnic_type: normal or direct
+ input_device_interface_A: TwentyFiveGigabitEthernet18/0/0
+ input_device_interface_B: TwentyFiveGigabitEthernet18/0/1
+ output_device_interface_A: TwentyFiveGigabitEthernet18/0/0
+ output_device_interface_B: TwentyFiveGigabitEthernet18/0/1
+ input_interface_A: 0000:00:06.0
+ input_interface_B: 0000:00:06.0
+ output_interface_A: 0000:00:07.0
+ output_interface_B: 0000:00:07.0
+ ipsec_A_MAC_address: 1:00:00:00:00:01
+ ipsec_B_MAC_address: 11:11:11:11:00:11
+ vnf_id: vIPsec_demo_app
+ vf_module_id: vIPsec
+ dcae_collector_ip: 10.0.4.1
+ dcae_collector_port: 30235
+ demo_artifacts_version: 1.4.0-SNAPSHOT
+ install_script_version: 1.4.0-SNAPSHOT
+ key_name: vipsec_key
+ pub_key: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQXYJYYi3/OUZXUiCYWdtc7K0m5C0dJKVxPG0eI8EWZrEHYdfYe6WoTSDJCww+1qlBSpA5ac/Ba4Wn9vh+lR1vtUKkyIC/nrYb90ReUd385Glkgzrfh5HdR5y5S2cL/Frh86lAn9r6b3iWTJD8wBwXFyoe1S2nMTOIuG4RPNvfmyCTYVh8XTCCE8HPvh3xv2r4egawG1P4Q4UDwk+hDBXThY2KS8M5/8EMyxHV0ImpLbpYCTBA6KYDIRtqmgS6iKyy8v2D1aSY5mc9J0T5t9S2Gv+VZQNWQDDKNFnxqYaAo1uEoq/i1q63XC5AD3ckXb2VT6dp23BQMdDfbHyUWfJN
+ cloud_env: openstack
+ sec_group: PUT THE ONAP SECURITY GROUP HERE
diff --git a/heat/vIPsec/vIPsec/base_vipsec.yaml b/heat/vIPsec/vIPsec/base_vipsec.yaml
new file mode 100644
index 00000000..993612e3
--- /dev/null
+++ b/heat/vIPsec/vIPsec/base_vipsec.yaml
@@ -0,0 +1,781 @@
+##########################################################################
+#
+#==================LICENSE_START==========================================
+#
+# Copyright © Intel Corporation 2019
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+#==================LICENSE_END============================================
+#
+##########################################################################
+
+heat_template_version: 2013-05-23
+
+description: Heat template that deploys vIPsec demo app for ONAP
+
+##############
+# #
+# PARAMETERS #
+# #
+##############
+
+parameters:
+ vipsec_image_name:
+ type: string
+ label: Image name or ID
+ description: Image to be used for compute instance
+ ipsec_flavor_name:
+ type: string
+ label: IPsec Flavor
+ description: Type of instance (flavor) to be used for IPsec VM
+ sink_flavor_name:
+ type: string
+ label: Flavor
+ description: Type of instance (flavor) to be used for vSink VM
+ packetgen_flavor_name:
+ type: string
+ label: Flavor
+ description: Type of instance (flavor) to be used for packet generator
+ public_net_id:
+ type: string
+ label: Public network name or ID
+ description: Public network that enables remote connection to VNF
+ external_net_id:
+ type: string
+ label: External network name or ID
+ description: External network that connects the two IPsec gateways
+ protected_clientA_private_net_id:
+ type: string
+ label: Unprotected private network name or ID
+ description: Private network that connects vPacketGenerator with vIPsec gateway A
+ protected_clientB_private_net_id:
+ type: string
+ label: Protected private network name or ID
+ description: Private network that connects vIPsec gateway B with vSink
+ onap_private_net_id:
+ type: string
+ label: ONAP management network name or ID
+ description: Private network that connects ONAP components and the VNF
+ onap_private_subnet_id:
+ type: string
+ label: ONAP management sub-network name or ID
+ description: Private sub-network that connects ONAP components and the VNF
+ ipsec_private_net_id:
+ type: string
+ label: IPsec private network name or ID
+ description: Private network that connects the two IPsec VNFs
+ ipsec_private_subnet_id:
+ type: string
+ label: IPsec sub-network name or ID
+ description: Private sub-network that connects the two IPsec VNFs
+ protected_clientA_private_net_cidr:
+ type: string
+ label: Unprotected private network CIDR
+ description: The CIDR of the protected private network for clientA
+ protected_clientB_private_net_cidr:
+ type: string
+ label: Protected private network CIDR
+ description: The CIDR of the protected private network for clientB
+ onap_private_net_cidr:
+ type: string
+ label: ONAP private network CIDR
+ description: The CIDR of the protected private network
+ ipsec_private_net_cidr:
+ type: string
+ label: IPsec private network CIDR
+ description: The CIDR of the protected IPsec private network
+ vipsec_A_private_ip_0:
+ type: string
+ label: vIPsec private IP address towards the protected network A
+ description: Private IP address that is assigned to the vIPsec gateway A to communicate with the vPacketGenerator
+ vipsec_A_private_ip_1:
+ type: string
+ label: vIPsec private IP address towards the ONAP management network
+ description: Private IP address that is assigned to the vIPsec A to communicate with ONAP components
+ vipsec_A_private_ip_2:
+ type: string
+ label: vIPsec private IP address towards the IPsec external network
+ description: Private IP address that is assigned to the vIPsec A to communicate with vIPsec B
+ vipsec_B_private_ip_0:
+ type: string
+ label: vIPsec private IP address towards the protected network B
+ description: Private IP address that is assigned to the vIPsec gateway B to communicate with the vSink
+ vipsec_B_private_ip_1:
+ type: string
+ label: vIPsec private IP address towards the ONAP management network
+ description: Private IP address that is assigned to the vIPsec B to communicate with ONAP components
+ vipsec_B_private_ip_2:
+ type: string
+ label: vIPsec private IP address towards the IPsec external network
+ description: Private IP address that is assigned to the vIPsec B to communicate with vIPsec A
+ vpg_private_ip_0:
+ type: string
+ label: vPacketGenerator private IP address towards the protected network A
+ description: Private IP address that is assigned to the vPacketGenerator to communicate with the vIPsec gateway A
+ vpg_private_ip_1:
+ type: string
+ label: vPacketGenerator private IP address towards the ONAP management network
+ description: Private IP address that is assigned to the vPacketGenerator to communicate with ONAP components
+ vsn_private_ip_0:
+ type: string
+ label: vSink private IP address towards the protected network
+ description: Private IP address that is assigned to the vSink to communicate with the vIPsec gateway B
+ vsn_private_ip_1:
+ type: string
+ label: vSink private IP address towards the ONAP management network
+ description: Private IP address that is assigned to the vSink to communicate with ONAP components
+ vipsec_A_private_0_port_vnic_type:
+ type: string
+ description: vipsec port 0 vnic type (normal, direct)
+ default: normal
+ vipsec_private_1_port_vnic_type:
+ type: string
+ description: vipsec port 1 vnic type (normal, direct)
+ default: normal
+ vipsec_B_private_0_port_vnic_type:
+ type: string
+ description: vipsec port 0 vnic type (normal, direct)
+ default: normal
+ vipsec_private_2_port_vnic_type:
+ type: string
+ description: vipsec port 2 vnic type (normal, direct)
+ default: normal
+ vsn_private_0_port_vnic_type:
+ type: string
+ description: vsn port 0 vnic type (normal, direct)
+ default: normal
+ vsn_private_1_port_vnic_type:
+ type: string
+ description: vsn port 1 vnic type (normal, direct)
+ default: normal
+ vpg_private_0_port_vnic_type:
+ type: string
+ description: vpg port 0 vnic type (normal, direct)
+ default: normal
+ vpg_private_1_port_vnic_type:
+ type: string
+ description: vpg port 1 vnic type (normal, direct)
+ default: normal
+ vipsec_name_0:
+ type: string
+ label: vIPsec name
+ description: Name of the vIPsec gateway A
+ vipsec_name_1:
+ type: string
+ label: vIPsec name
+ description: Name of the vIPsec gateway B
+ vpg_name_0:
+ type: string
+ label: vPacketGenerator name
+ description: Name of the vPacketGenerator
+ vsn_name_0:
+ type: string
+ label: vSink name
+ description: Name of the vSink
+ vnf_id:
+ type: string
+ label: VNF ID
+ description: The VNF ID is provided by ONAP
+ vf_module_id:
+ type: string
+ label: vIPsec module ID
+ description: The vIPsec Module ID is provided by ONAP
+ dcae_collector_ip:
+ type: string
+ label: DCAE collector IP address
+ description: IP address of the DCAE collector
+ dcae_collector_port:
+ type: string
+ label: DCAE collector port
+ description: Port of the DCAE collector
+ key_name:
+ type: string
+ label: Key pair name
+ description: Public/Private key pair name
+ pub_key:
+ type: string
+ label: Public key
+ description: Public key to be installed on the compute instance
+ install_script_version:
+ type: string
+ label: Installation script version number
+ description: Version number of the scripts that install the vIPsec demo app
+ demo_artifacts_version:
+ type: string
+ label: Artifacts version used in demo vnfs
+ description: Artifacts (jar, tar.gz) version used in demo vnfs
+ nexus_artifact_repo:
+ type: string
+ description: Root URL for the Nexus repository for Maven artifacts.
+ default: "https://nexus.onap.org"
+ cloud_env:
+ type: string
+ label: Cloud environment
+ description: Cloud environment (e.g., openstack, rackspace)
+ sec_group:
+ type: string
+ description: ONAP Security Group
+ sdnc_model_name:
+ type: string
+ description: SDNC Model Name metatada
+ sdnc_model_version:
+ type: string
+ description: SDNC Model Version metatada
+ sdnc_artifact_name:
+ type: string
+ description: SDNC Artifact Name metatada
+ input_device_interface_A:
+ type: string
+ description: Device BDF name for the interface
+ input_device_interface_B:
+ type: string
+ description: Device BDF name for the interface
+ output_device_interface_A:
+ type: string
+ description: Device BDF name for the interface
+ output_device_interface_B:
+ type: string
+ description: Device BDF name for the interface
+ input_interface_A:
+ type: string
+ description: Device BDF num for the interface
+ input_interface_B:
+ type: string
+ description: Device BDF num for the interface
+ output_interface_A:
+ type: string
+ description: Device BDF num for the interface
+ output_interface_B:
+ type: string
+ description: Device BDF num for the interface
+ vpp_config:
+ type: string
+ description: Name of the vpp config
+ ipsec_config:
+ type: string
+ description: Name of the ipsec config
+ ipsec_A_MAC_address:
+ type: string
+ description: MAC address of ipsec gateway A
+ ipsec_B_MAC_address:
+ type: string
+ description: MAC address of ipsec gateway B
+
+#############
+# #
+# RESOURCES #
+# #
+#############
+
+resources:
+ random-str:
+ type: OS::Heat::RandomString
+ properties:
+ length: 4
+
+ my_keypair:
+ type: OS::Nova::KeyPair
+ properties:
+ name:
+ str_replace:
+ template: base_rand
+ params:
+ base: { get_param: key_name }
+ rand: { get_resource: random-str }
+ public_key: { get_param: pub_key }
+ save_private_key: false
+
+ protected_clientA_private_network:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: protected_clientA_private_net_id }
+
+ protected_clientB_private_network:
+ type: OS::Neutron::Net
+ properties:
+ name: { get_param: protected_clientB_private_net_id }
+
+ protected_clientA_private_subnet:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: protected_clientA_private_network }
+ cidr: { get_param: protected_clientA_private_net_cidr }
+
+ protected_clientB_private_subnet:
+ type: OS::Neutron::Subnet
+ properties:
+ network_id: { get_resource: protected_clientB_private_network }
+ cidr: { get_param: protected_clientB_private_net_cidr }
+
+ # Virtual IPsec instantiation
+ vipsec_A_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_clientA_private_network }
+ binding:vnic_type: { get_param: vipsec_A_private_0_port_vnic_type}
+ fixed_ips: [{"subnet": { get_resource: protected_clientA_private_subnet}, "ipaddress": { get_param: vipsec_A_private_ip_0 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_A_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ #allowed_address_pairs: [{ "ip_address": { get_param: vpg_private_ip_0 }}]
+ network: { get_param: onap_private_net_id }
+ binding:vnic_type: { get_param: vipsec_private_1_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: onap_private_subnet_id }, "ip_address": { get_param: vipsec_A_private_ip_1 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_A_private_2_port:
+ type: OS::Neutron::Port
+ properties:
+ #allowed_address_pairs: [{ "ip_address": { get_param: vpg_private_ip_0 }}]
+ network: { get_param: ipsec_private_net_id }
+ binding:vnic_type: { get_param: vipsec_private_2_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: ipsec_private_subnet_id }, "ip_address": { get_param: vipsec_A_private_ip_2 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_B_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_clientB_private_network }
+ binding:vnic_type: { get_param: vipsec_B_private_0_port_vnic_type}
+ fixed_ips: [{"subnet": { get_resource: protected_clientB_private_subnet}, "ipaddress": { get_param: vipsec_B_private_ip_0 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_B_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ #allowed_address_pairs: [{ "ip_address": { get_param: vpg_private_ip_0 }}]
+ network: { get_param: onap_private_net_id }
+ binding:vnic_type: { get_param: vipsec_private_1_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: onap_private_subnet_id }, "ip_address": { get_param: vipsec_B_private_ip_1 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_B_private_2_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: ipsec_private_net_id }
+ binding:vnic_type: { get_param: vipsec_private_2_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: ipsec_private_subnet_id }, "ip_address": { get_param: vipsec_B_private_ip_2 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vipsec_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vipsec_image_name }
+ flavor: { get_param: ipsec_flavor_name }
+ name: { get_param: vipsec_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vipsec_A_private_0_port }
+ - port: { get_resource: vipsec_A_private_1_port }
+ metadata: { vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __dcae_collector_ip__ : { get_param: dcae_collector_ip }
+ __dcae_collector_port__ : { get_param: dcae_collector_port }
+ __demo_artifacts_version__ : { get_param: demo_artifacts_version }
+ __install_script_version__ : { get_param: install_script_version }
+ __vipsec_A_private_ip_0__ : { get_param: vipsec_A_private_ip_0 }
+ __vipsec_A_private_ip_1__ : { get_param: vipsec_A_private_ip_1 }
+ __protected_clientA_private_net_cidr__ : { get_param: protected_clientA_private_net_cidr }
+ __onap_private_net_cidr__ : { get_param: onap_private_net_cidr }
+ __cloud_env__ : { get_param: cloud_env }
+ __nexus_artifact_repo__: { get_param: nexus_artifact_repo }
+ __vpp_config__: { get_param: vpp_config }
+ __ipsec_config__: { get_param: ipsec_config }
+ __input_interface_num__: { get_param: input_interface_A }
+ __output_interface_num__: { get_param: output_interface_A }
+ __input_interface__: { get_param: input_device_interface_A }
+ __output_interface__: { get_param: output_device_interface_A }
+ __ipsec_B_MAC_address__: { get_param: ipsec_B_MAC_address }
+ template: |
+ #!/bin/bash
+
+ # Create configuration files
+ mkdir /opt/config
+ echo "__dcae_collector_ip__" > /opt/config/dcae_collector_ip.txt
+ echo "__dcae_collector_port__" > /opt/config/dcae_collector_port.txt
+ echo "__demo_artifacts_version__" > /opt/config/demo_artifacts_version.txt
+ echo "__install_script_version__" > /opt/config/install_script_version.txt
+ echo "__vipsec_A_private_ip_0__" > /opt/config/vipsec_A_private_ip_0.txt
+ echo "__vipsec_A_private_ip_1__" > /opt/config/vipsec_A_private_ip_1.txt
+ echo "__protected_clientA_private_net_cidr__" > /opt/config/protected_clientA_private_net_cidr.txt
+ echo "__onap_private_net_cidr__" > /opt/config/onap_private_net_cidr.txt
+ echo "__cloud_env__" > /opt/config/cloud_env.txt
+ echo "__nexus_artifact_repo__" > /opt/config/nexus_artifact_repo.txt
+ echo "__input_interface_num__" > /opt/config/input_interface_A_BDF_num.txt
+ echo "__output_interface_num__" > /opt/config/output_interface_A_BDF_num.txt
+ echo "__input_interface__" > /opt/config/input_interface_A.txt
+ echo "__output_interface__" > /opt/config/output_interface_A.txt
+ echo "__ipsec_B_MAC_address__" > /opt/config/ipsec_B_mac_address.txt
+ echo "__vpp_config__" > /opt/config/vpp_config.txt
+ echo "__ipsec_config__" > /opt/config/ipsec_config.txt
+
+ # Download and run install script
+ apt-get update
+ cd /root/comms/dpdk/x86_64-native-linuxapp-gcc/kmod
+ modeprobe uio
+ insmod igb_uio.ko
+ cd /opt
+ cat > __vpp_config__<< NEWFILE
+
+ unix {
+ exec __ipsec_config__
+ nodaemon
+ cli-listen /run/vpp/cli.sock
+ log /tmp/vpp.log
+ }
+
+ cpu {
+ main-core 0
+ corelist-workers 1
+ }
+
+ dpdk {
+ socket-mem 512
+ log-level debug
+ no-tx-checksum-offload
+ dev default{
+ num-tx-desc 512
+ num-rx-desc 512
+ }
+ dev __input_interface_num__
+ {
+ workers 0
+ }
+ dev __output_interface_num__
+ {
+ workers 0
+ }
+ vdev crypto_aesni_gcm0
+
+ num-mbufs 370000
+ no-multi-seg
+ }
+
+ NEWFILE
+
+ cat > __ipsec_config__<< NEWFILE
+
+ set interface state __input_interface__ up
+ set interface state __output_interface__ up
+
+ set interface ip address __input_interface__ 1.0.0.1/8
+ set interface ip address __output_interface__ 255.0.0.128/8
+
+ set int promiscuous on __input_interface__
+ set int promiscuous on __output_interface__
+
+ set ip arp __output_interface__ 255.0.0.129 __ipsec_B_MAC_address
+ set ip arp __input_interface__ 1.0.0.2 11:11:11:11:00:11
+
+ ip route add count 1 104.0.0.0/32 via 255.0.0.129 __output_interface__
+ ip route add count 1 004.0.0.0/32 via 1.0.0.2 __input_interface__
+
+ ipsec spd add 1
+ set interface ipsec spd __output_interface__ 1
+ ipsec sa add 1 spi 25500128 esp tunnel-src 255.0.0.128 tunnel-dst 255.0.0.129 crypto-key 2b7e151628aed2a6abf7158809cf4f3d crypto-alg aes-cbc-128 integ-key 6867666568676665686766656867666568676669 integ-alg sha1-96
+ ipsec sa add 2 spi 25500129 esp tunnel-src 255.0.0.129 tunnel-dst 255.0.0.128 crypto-key 2b7e151628aed2a6abf7158809cf4f3d crypto-alg aes-cbc-128 integ-key 6867666568676665686766656867666568676669 integ-alg sha1-96
+ ipsec policy add spd 1 outbound priority 100 action protect sa 1 remote-ip-range 104.0.0.0-104.0.0.0
+ ipsec policy add spd 1 inbound priority 100 action protect sa 2 remote-ip-range 004.0.0.0-004.0.0.0
+ ipsec policy add spd 1 inbound priority 90 protocol 50 action bypass
+ ipsec policy add spd 1 outbound priority 90 protocol 50 action bypass
+
+ NEWFILE
+
+ vpp -c __vpp_config__
+
+ vipsec_1:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vipsec_image_name }
+ flavor: { get_param: ipsec_flavor_name }
+ name: { get_param: vipsec_name_1 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vipsec_B_private_0_port }
+ - port: { get_resource: vipsec_B_private_1_port }
+ metadata: { vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __dcae_collector_ip__ : { get_param: dcae_collector_ip }
+ __dcae_collector_port__ : { get_param: dcae_collector_port }
+ __demo_artifacts_version__ : { get_param: demo_artifacts_version }
+ __install_script_version__ : { get_param: install_script_version }
+ __vipsec_A_private_ip_0__ : { get_param: vipsec_B_private_ip_0 }
+ __vipsec_A_private_ip_1__ : { get_param: vipsec_B_private_ip_1 }
+ __protected_clientA_private_net_cidr__ : { get_param: protected_clientB_private_net_cidr }
+ __onap_private_net_cidr__ : { get_param: onap_private_net_cidr }
+ __cloud_env__ : { get_param: cloud_env }
+ __nexus_artifact_repo__: { get_param: nexus_artifact_repo }
+ __vpp_config__: { get_param: vpp_config }
+ __ipsec_config__: { get_param: ipsec_config }
+ __input_interface_num__: { get_param: input_interface_B }
+ __output_interface_num__: { get_param: output_interface_B }
+ __input_interface__: { get_param: input_device_interface_B }
+ __output_interface__: { get_param: output_device_interface_B }
+ __ipsec_A_MAC_address__: { get_param: ipsec_A_MAC_address }
+ template: |
+ #!/bin/bash
+
+ # Create configuration files
+ mkdir /opt/config
+ echo "__dcae_collector_ip__" > /opt/config/dcae_collector_ip.txt
+ echo "__dcae_collector_port__" > /opt/config/dcae_collector_port.txt
+ echo "__demo_artifacts_version__" > /opt/config/demo_artifacts_version.txt
+ echo "__install_script_version__" > /opt/config/install_script_version.txt
+ echo "__vipsec_B_private_ip_0__" > /opt/config/vipsec_B_private_ip_0.txt
+ echo "__vipsec_B_private_ip_1__" > /opt/config/vipsec_B_private_ip_1.txt
+ echo "__protected_clientA_private_net_cidr__" > /opt/config/protected_clientB_private_net_cidr.txt
+ echo "__onap_private_net_cidr__" > /opt/config/onap_private_net_cidr.txt
+ echo "__cloud_env__" > /opt/config/cloud_env.txt
+ echo "__nexus_artifact_repo__" > /opt/config/nexus_artifact_repo.txt
+ echo "__input_interface_num__" > /opt/config/input_interface_B_BDF_num.txt
+ echo "__output_interface_num__" > /opt/config/output_interface_B_BDF_num.txt
+ echo "__input_interface__" > /opt/config/input_interface_B.txt
+ echo "__output_interface__" > /opt/config/output_interface_B.txt
+ echo "__ipsec_A_MAC_address__" > /opt/config/ipsec_A_mac_address.txt
+ echo "__vpp_config__" > /opt/config/vpp_config.txt
+ echo "__ipsec_config__" > /opt/config/ipsec_config.txt
+
+ # Download and run install script
+ apt-get update
+ cd /root/comms/dpdk/x86_64-native-linuxapp-gcc/kmod
+ modeprobe uio
+ insmod igb_uio.ko
+ cd /opt
+ cat > __vpp_config__<< NEWFILE
+
+ unix {
+ exec __ipsec_config__
+ nodaemon
+ cli-listen /run/vpp/cli.sock
+ log /tmp/vpp.log
+ }
+
+ cpu {
+ main-core 0
+ corelist-workers 1
+ }
+
+ dpdk {
+ socket-mem 512
+ log-level debug
+ no-tx-checksum-offload
+ dev default{
+ num-tx-desc 512
+ num-rx-desc 512
+ }
+ dev __input_interface_num__
+ {
+ workers 0
+ }
+ dev __output_interface_num__
+ {
+ workers 0
+ }
+ vdev crypto_aesni_gcm0
+
+ num-mbufs 370000
+ no-multi-seg
+ }
+
+ NEWFILE
+
+ cat > __ipsec_config__<< NEWFILE
+
+ set interface state __input_interface__ up
+ set interface state __output_interface__ up
+
+ set interface ip address __input_interface__ 1.0.0.1/8
+ set interface ip address __output_interface__ 255.0.0.128/8
+
+ set int promiscuous on __input_interface__
+ set int promiscuous on __output_interface__
+
+ set ip arp __output_interface__ 255.0.0.129 __ipsec_A_MAC_address
+ set ip arp __input_interface__ 1.0.0.2 11:11:11:11:00:11
+
+ ip route add count 1 104.0.0.0/32 via 255.0.0.129 __output_interface__
+ ip route add count 1 004.0.0.0/32 via 1.0.0.2 __input_interface__
+
+ ipsec spd add 1
+ set interface ipsec spd __output_interface__ 1
+ ipsec sa add 1 spi 25500128 esp tunnel-src 255.0.0.128 tunnel-dst 255.0.0.129 crypto-key 2b7e151628aed2a6abf7158809cf4f3d crypto-alg aes-cbc-128 integ-key 6867666568676665686766656867666568676669 integ-alg sha1-96
+ ipsec sa add 2 spi 25500129 esp tunnel-src 255.0.0.129 tunnel-dst 255.0.0.128 crypto-key 2b7e151628aed2a6abf7158809cf4f3d crypto-alg aes-cbc-128 integ-key 6867666568676665686766656867666568676669 integ-alg sha1-96
+ ipsec policy add spd 1 outbound priority 100 action protect sa 1 remote-ip-range 104.0.0.0-104.0.0.0
+ ipsec policy add spd 1 inbound priority 100 action protect sa 2 remote-ip-range 004.0.0.0-004.0.0.0
+ ipsec policy add spd 1 inbound priority 90 protocol 50 action bypass
+ ipsec policy add spd 1 outbound priority 90 protocol 50 action bypass
+
+ NEWFILE
+
+ vpp -c __vpp_config__
+
+
+ # Virtual Packet Generator instantiation
+ vpg_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_clientA_private_network}
+ binding:vnic_type: { get_param: vpg_private_0_port_vnic_type}
+ fixed_ips: [{"subnet": { get_resource: protected_clientA_private_subnet }, "ip_address": { get_param: vpg_private_ip_0 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vpg_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: onap_private_net_id }
+ binding:vnic_type: { get_param: vpg_private_1_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: onap_private_subnet_id }, "ip_address": { get_param: vpg_private_ip_1 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vpg_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vipsec_image_name }
+ flavor: { get_param: packetgen_flavor_name }
+ name: { get_param: vpg_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vpg_private_0_port }
+ - port: { get_resource: vpg_private_1_port }
+ metadata: {vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __ipsec_ipaddr__: { get_param: vipsec_A_private_ip_0 }
+ __protected_clientB_net_cidr__: { get_param: protected_clientB_private_net_cidr }
+ __sink_ipaddr__: { get_param: vsn_private_ip_0 }
+ __demo_artifacts_version__ : { get_param: demo_artifacts_version }
+ __install_script_version__ : { get_param: install_script_version }
+ __vpg_private_ip_0__ : { get_param: vpg_private_ip_0 }
+ __vpg_private_ip_1__ : { get_param: vpg_private_ip_1 }
+ __protected_clientA_net_cidr__ : { get_param: protected_clientA_private_net_cidr }
+ __onap_private_net_cidr__ : { get_param: onap_private_net_cidr }
+ __cloud_env__ : { get_param: cloud_env }
+ __nexus_artifact_repo__: { get_param: nexus_artifact_repo }
+ template: |
+ #!/bin/bash
+
+ # Create configuration files
+ mkdir /opt/config
+ echo "__ipsec_ipaddr__" > /opt/config/fw_ipaddr.txt
+ echo "__protected_clientB_net_cidr__" > /opt/config/protected_clientB_net_cidr.txt
+ echo "__sink_ipaddr__" > /opt/config/sink_ipaddr.txt
+ echo "__demo_artifacts_version__" > /opt/config/demo_artifacts_version.txt
+ echo "__install_script_version__" > /opt/config/install_script_version.txt
+ echo "__vpg_private_ip_0__" > /opt/config/vpg_private_ip_0.txt
+ echo "__vpg_private_ip_1__" > /opt/config/vpg_private_ip_1.txt
+ echo "__protected_clientB_private_net_cidr__" > /opt/config/protected_clientA_net_cidr.txt
+ echo "__onap_private_net_cidr__" > /opt/config/onap_private_net_cidr.txt
+ echo "__cloud_env__" > /opt/config/cloud_env.txt
+ echo "__nexus_artifact_repo__" > /opt/config/nexus_artifact_repo.txt
+
+ # Download and run install script
+ apt-get update
+ apt-get -y install unzip
+ if [[ "__install_script_version__" =~ "SNAPSHOT" ]]; then REPO=snapshots; else REPO=releases; fi
+ curl -k -L "__nexus_artifact_repo__/service/local/artifact/maven/redirect?r=${REPO}&g=org.onap.demo.vnf.vipsec&a=vipsec-scripts&e=zip&v=__install_script_version__" -o /opt/vipsec-scripts-__install_script_version__.zip
+ unzip -j /opt/vipsec-scripts-__install_script_version__.zip -d /opt v_packetgen_install.sh
+ cd /opt
+ chmod +x v_packetgen_install.sh
+ ./v_packetgen_install.sh
+
+
+ # Virtual Sink instantiation
+ vsn_private_0_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_resource: protected_clientB_private_network }
+ binding:vnic_type: { get_param: vsn_private_0_port_vnic_type}
+ fixed_ips: [{"subnet": { get_resource: protected_clientB_private_subnet }, "ip_address": { get_param: vsn_private_ip_0 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vsn_private_1_port:
+ type: OS::Neutron::Port
+ properties:
+ network: { get_param: onap_private_net_id }
+ binding:vnic_type: { get_param: vsn_private_1_port_vnic_type}
+ fixed_ips: [{"subnet": { get_param: onap_private_subnet_id }, "ip_address": { get_param: vsn_private_ip_1 }}]
+ security_groups:
+ - { get_param: sec_group }
+
+ vsn_0:
+ type: OS::Nova::Server
+ properties:
+ image: { get_param: vipsec_image_name }
+ flavor: { get_param: sink_flavor_name }
+ name: { get_param: vsn_name_0 }
+ key_name: { get_resource: my_keypair }
+ networks:
+ - network: { get_param: public_net_id }
+ - port: { get_resource: vsn_private_0_port }
+ - port: { get_resource: vsn_private_1_port }
+ metadata: {vnf_id: { get_param: vnf_id }, vf_module_id: { get_param: vf_module_id }}
+ user_data_format: RAW
+ user_data:
+ str_replace:
+ params:
+ __protected_net_gw__: { get_param: vipsec_B_private_ip_0 }
+ __protected_net_A__: { get_param: protected_clientA_private_net_cidr }
+ __install_script_version__ : { get_param: install_script_version }
+ __vsn_private_ip_0__ : { get_param: vsn_private_ip_0 }
+ __vsn_private_ip_1__ : { get_param: vsn_private_ip_1 }
+ __protected_clientB_private_net_cidr__ : { get_param: protected_clientB_private_net_cidr }
+ __onap_private_net_cidr__ : { get_param: onap_private_net_cidr }
+ __cloud_env__ : { get_param: cloud_env }
+ __nexus_artifact_repo__: { get_param: nexus_artifact_repo }
+ template: |
+ #!/bin/bash
+
+ # Create configuration files
+ mkdir /opt/config
+ echo "__protected_net_gw__" > /opt/config/protected_net_gw.txt
+ echo "__protected_net_A__" > /opt/config/protected_net_A.txt
+ echo "__install_script_version__" > /opt/config/install_script_version.txt
+ echo "__vsn_private_ip_0__" > /opt/config/vsn_private_ip_0.txt
+ echo "__vsn_private_ip_1__" > /opt/config/vsn_private_ip_1.txt
+ echo "__protected_clientB_private_net_cidr__" > /opt/config/protected_clientB_private_net_cidr.txt
+ echo "__onap_private_net_cidr__" > /opt/config/onap_private_net_cidr.txt
+ echo "__cloud_env__" > /opt/config/cloud_env.txt
+ echo "__nexus_artifact_repo__" > /opt/config/nexus_artifact_repo.txt
+
+ # Download and run install script
+ apt-get update
+ apt-get -y install unzip
+ if [[ "__install_script_version__" =~ "SNAPSHOT" ]]; then REPO=snapshots; else REPO=releases; fi
+ curl -k -L "__nexus_artifact_repo__/service/local/artifact/maven/redirect?r=${REPO}&g=org.onap.demo.vnf.vipsec&a=vipsec-scripts&e=zip&v=__install_script_version__" -o /opt/vipsec-scripts-__install_script_version__.zip
+ unzip -j /opt/vipsec-scripts-__install_script_version__.zip -d /opt v_sink_install.sh
+ cd /opt
+ chmod +x v_sink_install.sh
+ ./v_sink_install.sh