In this step you will determine the names of networks and the unrestricted security group that will be associated with the created VMs. These names will be required during the VM creation step.
Determine network names
It is assumed you have created the required networks for the Rhino VoLTE TAS VMs. If not, follow the OpenStack documentation to create them.
Method of procedure
-
Log into the OpenStack server.
-
Source the client environment script for the tenant that will contain the Rhino VoLTE TAS VMs.
-
List the available networks using
openstack network list
. -
Find the networks that will be used for the VMs and note their names in the second column of the output. You can find a list of required networks for each VM here.
-
Record these names for later use.
Ensure there is an unrestricted security group
If you have previously created an unrestricted security group for another VM type,
and you know the name under which it was created, this section can be skipped. You can check using
the command openstack security group list
on OpenStack Pike or later,
and neutron security-group-list
on OpenStack Ocata and earlier.
Rhino VoLTE TAS VMs require an unrestricted security group. If you have not created one yet, then you can create one using the following commands:
neutron security-group-create open
neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol icmp
--remote-ip-prefix 0.0.0.0/0 open
neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol tcp
--remote-ip-prefix 0.0.0.0/0 open
neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol udp
--remote-ip-prefix 0.0.0.0/0 open
This creates a security group named open
.
Backout procedure
If you wish to delete the security group, use the command neutron security-group-delete open
(replace open
with the name of your security group, if different).
Next step
You can now create ports and deploy VMs.