In this step you will determine the names of networks and the unrestricted security group that will be associated with the created VMs. These names will be required during the VM creation step.

Requirements

  • You must have administrator access to the OpenStack server which will host the VMs.

Determine network names

It is assumed you have created the required networks for the Rhino VoLTE TAS VMs. If not, follow the OpenStack documentation to create them.

Method of procedure

  1. Log into the OpenStack server.

  2. Source the client environment script for the tenant that will contain the Rhino VoLTE TAS VMs.

  3. List the available networks using openstack network list.

  4. Find the networks that will be used for the VMs and note their names in the second column of the output. You can find a list of required networks for each VM here.

  5. Record these names for later use.

Ensure there is an unrestricted security group

If you have previously created an unrestricted security group for another VM type, and you know the name under which it was created, this section can be skipped. You can check using the command openstack security group list on OpenStack Pike or later, and neutron security-group-list on OpenStack Ocata and earlier.

Rhino VoLTE TAS VMs require an unrestricted security group. If you have not created one yet, then you can create one using the following commands:

neutron security-group-create open

neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol icmp
--remote-ip-prefix 0.0.0.0/0 open

neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol tcp
--remote-ip-prefix 0.0.0.0/0 open

neutron security-group-rule-create --direction ingress --ethertype IPv4 --protocol udp
--remote-ip-prefix 0.0.0.0/0 open

neutron security-group-rule-create --direction egress --ethertype IPv4 --protocol icmp
--remote-ip-prefix 0.0.0.0/0 open

neutron security-group-rule-create --direction egress --ethertype IPv4 --protocol tcp
--remote-ip-prefix 0.0.0.0/0 open

neutron security-group-rule-create --direction egress --ethertype IPv4 --protocol udp
--remote-ip-prefix 0.0.0.0/0 open

This creates a security group named open.

Results

You have determined the network names for use in VM creation, and created a security group.

Backout procedure

If you wish to delete the security group, use the command neutron security-group-delete open (replace open with the name of your security group, if different).

Next step

Previous page Next page
VM Build Container Version 1.0.0