VM Install (Aruba, Cisco Catalyst, Extreme, Ruckus)
Overview:
The School will have to meet all the steps in “Phase One” so the data ingestion team can create the VM file that will be sent to the customer. This would apply for Cisco Catalyst, Aruba, Extreme, and Ruckus systems.
In Phase Two the school will take the VM file that Degree Analytics has provided them, install it, and make the necessary firewall/network changes are applied. This will allow the VM to start forwarding traffic and so we can manage it via SSH.
Flow Diagram:
Phase One:
Complete this Google Form
Send VM Hypervisor or Management software information:
We need the Version and Vendor type of the Hypervisor you plan to run the VM on.
On-Prem VM Requirements
1 CPU
2 GB of Ram
40gb of Disk Space
1 Virtual network interface
Technical contact: Please provide email/contact information should we need to escalate for any VM streaming issues
On-Prem VM Configuration
VM Options
Option 1: DHCP
Just state this is your preferred configuration
Option 2: Single Interface Static IP
Please provide the following information:
Static IP Address |
|
---|---|
Subnet Mask/CIDR |
|
Gateway IP Address |
|
DNS Server IP Addresses (minimum one address) |
|
Option 3: Dual Interface Static IP
If you are running a dual network, we need a little bit more information.
WAN Static IP Address |
|
---|---|
WAN Subnet Mask/CIDR |
|
WAN Gateway IP Address |
|
WAN DNS Server IP Addresses (minimum one address) |
|
LAN Static IP Address |
|
LAN Subnet/Mask |
|
LAN Gateway IP Address |
|
Need More than 1 VM?
If you have more than 1 wireless controller or multiple On-Prem systems, please let us know. Depending on the system load, it may be necessary to provide 2+ on-prem VMs
Phase Two:
Step 1: Install VM file provided by Degree Analytics on VM Hypervisor or Management software.
Import the VM into your Hypervisor and allocate 1 virtual network interface in the subnet of the VM IP address.
Ensure the VM starts without errors. If you see the console output or VM screen with a login prompt, that is considered working.
If there are errors importing, please send error logs to us.
Step 2: Configure Network Devices or Wireless Controllers to Forwarding Log Traffic
For SNMP TRAP Traffic (Cisco Catalyst)
Refer to the Degree Analytics SNMP TRAP Guide for the configuration of your wireless controller.
Forward traffic to VM IP address
Community String is not required. Set this to anything you like.
For Syslog Traffic (Aruba, Extreme, Ruckus)
Forward traffic to VM IP address
Will vary on system
Extreme
logging <IP of VM> configure syslog add <IP of VM> vr <virtual-router> enable log target syslog <IP of VM> vr <virtual-router> configure log target syslog <IP of VM> vr <virtual router> level informational
Ruckus
System -> General Settings -> Syslog
Enable logging to remote syslog server
Enter <IP Address of VM> as the syslog server, on port 514
Of the Event Filter, we want all events
informational
Aruba:
Can use the UI to set
User
andWireless
at theNotice or Notification
level withbsd
formatTerminal Commands:
(Aruba Controller) > enable (Aruba Controller) # configure terminal // set logging levels and format (Aruba Controller) (config) # logging level notice user (Aruba Controller) (config) # logging level notice wireless (Aruba Controller) (config) # logging format syslog bsd // Following is optional, but can assign these logs to a particular facility if you have other facilities already enabled (Aruba Controller) (config) # logging facility local0 // To Confirm Logging (Aruba Controller) # show logging // To write (Aruba Controller) # write memory
Firewall Configuration
Destination NAT or an external/public IP address we can use to access the VM via ssh. (ex. public IP address -> VM IP address)
Inbound access (To VM IP address)
Outside Network Access Options:
Option A: Allow SSH (port TCP
22
) from our IP address18.213.99.13
to the VM IP address.Option B: Provide a Client VPN Connection Option to connect to port
22
For SNMP TRAPS Traffic
Allow SNMP TRAPs Traffic (port UDP
162
) from your source (ex. wireless controller IP address) or internal network range
For SYSLOG Traffic
Allow SYSLOG traffic (port UDP
514
) from your source (ex. syslog server) or internal network range
Outbound Access (from VM IP address)
HTTPS and HTTP (port TCP
9443
TCP443
and TCP80
) to anywhere)TSL port
8000
to anywhere or 0.0.0.0/0 (Degree Analytics Management Software)UDP port
53
DNS to the VM DNS servers IP addressUDP port
4242
to anywhere or 0.0.0.0/0 (Degree Analytics Management Software)UDP port
123
NTP to anywhere or 0.0.0.0/0 (NTP service)