Instructions for an End-Customer
Prerequisites
See sk184795 > Section "Prerequisites" > "Prerequisites for an End-Customer".
Step 1 - Configure the Host Server
-
Make sure the Host Server does not use the network 192.168.100.x / 30 that is reserved for the DPU:
-
Make sure that none of the Host Server interfaces are assigned an IP address from this network.
-
Make sure there is no static route on the Host Server to this network.
For more information, refer to the section "Virtual Ethernet Interface" in the NVIDIA BlueField-3 DPU documentation.
-
-
In the Host Server, install one or more BlueField-3 (DPU) cards.
-
On the Host Server, install the required DOCA OFED version.
-
On the DPU, install the required BFB version.
Step 2 - Configure the DPU (AIFF Security Gateway)
-
On the Multi-Domain Security Management Server, get the environment variables and their values for your Domain.
Get this file from the Data Center Provider from the Multi-Domain Security Management Server for your Domain:
/home/admin/MDSMS/<Name of Domain>/domain.json -
Copy these variables and their values from the "
domain.json" file you received from the Data Center Provider:-
domain_ip -
mgmt_server_fingerprint -
mgmt_api_key -
domain_name -
aicp_policy_name
We recommend saving them aside for now. You use these parameters later during the installation of the AIFF Security Gateway (the "
install.sh" script). -
-
Get the Check Point AIFF package for the DPU:
-
From sk184795 > section "Downloads", download the AI Factory Firewall package for the BlueField-3 DPU to your computer.
-
Copy this AIFF package from your computer to the DPU.
Follow one of these options:
Option 1 - Through the BlueField-3 Out-of-band Management
See Configuration of Out-of-Band Management Network.
-
Configure an IP address on the "
oob_net0" interface of the DPU.Make sure a computer with an SSH client and SCP client can reach this IP address.
-
With the SSH client, connect from your computer to the IP address you configured on the "
oob_net0" interface.ssh <IP Address>The default credentials are:
-
Username -
ubuntu -
Password -
ubuntu
-
-
On the DPU, create some directory for the AIFF package.
For example:
mkdir -v /var/log/AIFF -
With an SCP client, connect from your computer to the IP address you configured on the "
oob_net0" interface.The default credentials are:
-
Username -
ubuntu -
Password -
ubuntu
-
-
Copy the AIFF package from your computer to the DPU to the new directory "
/var/log/AIFF".
For more information, refer to the NVIDIA BlueField Platform Software Troubleshooting Guide.
Option 2 - Through the regular Host Server interface
-
Connect with an SCP client to one of the Host Server interfaces.
-
Copy the AIFF package from your computer to the Host Server to some directory.
-
With a built-in SCP client, copy the AIFF package from the Host Server to the DPU to the new directory "
/var/log/AIFF":scp -v /var/log/AIFF/<Name of package> ubuntu@192.168.100.2:/var/log/AIFF/The default credentials are:
-
Username -
ubuntu -
Password -
ubuntu
-
-
-
-
On the DPU, install the AIFF package:
-
Go to the directory with the AIFF package:
cd /var/log/AIFF/ -
Assign the 'execute' permission to the scripts:
sudo chmod +x AIFFctlsudo chmod +x deploy.sh -
Start the installation:
./AIFFctl install
Notes:
-
The "
AIFFctl" script:-
Verifies the environment prerequisites.
-
Prompts the user for the required installation parameters. See the prompts below.
-
Configures the internal networking of the BlueField-3, such that all of the required traffic passes through the Check Point Security Gateway.
-
Starts the AIFF Security Gateway Container.
-
If you chose to use the Zero Touch installation, the script also:
-
Creates the Security Gateway object.
-
Connects the Security Gateway object to the Domain.
-
Installs the Security Policy whose name is specified in the parameter "
aicp_policy_name" in the "domain.json" file.
-
-
-
The "
AIFFctl" script saves all the entered configuration values in this file:/etc/gwac/bf_standalone.confIf you run the "
AIFFctl" script again, it can automatically use these saved values to fill in the prompts.This makes repeated deployments faster and consistent.
The "
AIFFctl" script is interactive and prompts for all required values:-
Host interface 0: -
Host interface 1: -
DHCP for management network (y/n):If you entered "
n":Gateway's management IP address:Gateway's management prefix length (0-32):Gateway's default gateway: -
Zero Touch provisioning (y/n):-
If you entered "
n":Enter Initial SIC key: -
If you entered "
y":Management server IP:(enter the value of "domain_ip" from the "domain.json" file for your Domain)Management API key:(enter the value of "mgmt_api_key" from the "domain.json" file for your Domain)Server fingerprint:(enter the value of "mgmt_server_fingerprint" from the "domain.json" file for your Domain)Domain name:(enter the value of "domain_name" from the "domain.json" file for your Domain)Policy name:(enter the value of "aicp_policy_name" from the "domain.json" file for your Domain)
-
-
-
Wait for the installation script to finish.
Note - This setup can take a few minutes, and it mostly runs in the background.
-
Load the AIFF images:
sudo ctr -n k8s.io images import aicp.tar -
Load the device-plugin images:
sudo ctr -n k8s.io images import dp.tar -
Run the deployment script:
sudo ./deploy.sh --image=jess_t464_gwac_main-55-999000099 --gwac_cores=6 --gwac_fw_instances=2 --timezone="Etc/GMT" --network_conf=lab
Note - To pass traffic through the Host Server, use "
--network_conf=host". -
Connect with SmartConsole to the applicable Domain.
If a Data Center Provider created the Domain for you, the Data Center Provider must provide the credentials for this Domain.
-
From the left navigation panel, click Gateways & Servers.
The AIFF Security Gateway object must appear.
Example:
-
Step 3 - Configure the Kubernetes Connection
Follow the R82.10 CloudGuard Controller Administration Guide > Chapter "Supported Data Centers" > Section "CloudGuard Controller for Kubernetes":
-
Configure the applicable settings in Kubernetes.
-
In SmartConsole connected to the applicable Domain, configure the Kubernetes object.
-
Import objects from the Kubernetes: right-click the Data Center object and click Import.
-
Install the Access Control Policy on the AIFF Security Gateway.
Step 4 - Install Policy
|
|
Best Practice - Create the Access Control rules using your Data Center objects. |
To install a policy on a specific AIFF Security Gateway:
-
Connect with SmartConsole to the Domain.
If a Data Center Provider created the Domain, the Data Center Provider must provide the credentials for the Domain.
-
Click Install Policy.
-
Select Access Control.
-
Select Threat Prevention.
-
In the panel with the installation targets, select the Group-Policy-Controller object for any AIFF Security Gateways, on which you need to install this policy.
-
Click Install.
|
|
Note - To see the current policy name on a specific AIFF Security Gateway:
|