Deploy an SAProuter with NSX

Knowledge Base

Deploy an SAProuter with NSX


Icons/System/eye-open Created with Sketch. 436 Views 05.09.2023 Cloud / SAP HANA on Private Cloud

Objective

This guides provides instructions for deploying an SAProuter on VMware on OVHcloud with NSX.

Requirements

Instructions

Network Firewall configuration

OVHcloud provides a firewall and anti-DDoS solution, the Network Firewall. This option protects you against potential attacks from the public network. We advise you to enable it for your public IP address which you will use in this configuration.

If you didn't create a Network Firewall and a firewall rule for the public IP address used by your NSX gateway, follow these steps to do it. If you are familiar with the Network Firewall, you can skip the first three steps.

Connect to your OVHcloud Control Panel, open the Bare Metal Cloud tab, expand the Network menu then click on IP.

If you have many public IP addresses or services, you can filter them with the All service types value and select Hosting Private Cloud (VMware), or with the All services value and select your VMware on OVHcloud solution.

In our First steps with NSX guide, the Displaying the HA VIP virtual IP address chapter shows you the way to get the public IP address held by your NSX gateway.

Expand the IPv4 address block, select the IPv4 address used by your NSX gateway and click on Create Firewall.

create_firewall

Click on Configure the firewall to open the edition window of your Network Firewall.

configure_firewall

We advise you to create 2 default rules in your Network Firewall.

Click on Add a rule then set these parameters:

  1. Parameters for the first rule:
    • Priority: 0
    • Action: Authorise
    • Protocol: TCP
    • Flags: ESTABLISHED

We suggest that you authorise the TCP protocol from all IP addresses with the flag ESTABLISHED. This is to check that the packet is from a previous opened/initiated session. If you don't authorise it, the server won't receive TCP packets from SYN/ACK requests.

  1. Parameters for the second rule :
    • Priority: 19
    • Action: Refuse
    • Protocol: IPv4

We recommend refusing all IPv4 traffic which wasn't authorised by any prior rule.

standard_rules

Create the rule to allow the connection from the SAP support infrastructure.

Click on Add a rule then set these parameters:

  • Priority: 1
  • Action: Authorise
  • Protocol: TCP
  • IP source: 194.39.131.34/32
  • Destination port: 3299
  • Flags: None

create_rule

Find more information about the SAP support public IP address on the SAP support website.

After a few seconds, the rule is enabled.

rule_3299

Click on the Back button, select the IP address where you have set up the rule and click on Enable the firewall.

enable_firewall

NSX gateway configuration

The NSX gateway is the gateway between Internet and your SAP infrastructure hosts on your VMware on OVHcloud solution. You must configure the NSX gateway to allow the connection from SAP support to your SAP infrastructure via SAProuter.

Firewall

We recommend doing a network filtering on your NSX gateway, in addition of the network filtering done by the previously configured Network Firewall.

This network filtering on your NSX gateway allows you to secure your SAProuter if the Network Firewall was to be disabled on your public IP address.

Connect to your VMware on OVHcloud solution and click on the NSX tile.

nsx_interface

Click on the Security tab then, in the Policy Management category, click on Gateway Firewall and select your T0 gateway "ovh-T0-xxxx".

nsx_firewall

Click on Add policy and give it a name (example: SAP). Inside this policy, you can also set all SAP firewall rules.

Select your new policy and click on Add a rule.

nsx_firewall_policy

Set the following parameters:

  • Name: SAP support
  • Sources: 194.39.131.34/32
  • Destinations: Private IP address of your SAProuter
  • Services: TCP - Destination: 3299
  • Action: Allow

nsx_firewall_rule

Once the rule has been created, click on Publish to update the configuration on the NSX gateway.

NAT

The SAProuter doesn't have a public IP address. You must apply the configuration to route the traffic on the port tcp/3299 from the public IP address held by your NSX gateway to your SAProuter.

You must create a Destination Network Address Translation (DNAT) rule.

This part shows you the steps to create a DNAT rule on an NSX gateway.

Click on the Networking tab then, in the Network Services category, click on NAT.

nsx_nat

Select your T0 gateway "ovh-T0-xxxx" then click on Add NAT rule.

Set the following parameters:

  • Nom: SAP Support
  • Action: DNAT
  • Source IP : 194.39.131.34/32
  • Destination IP | Port : Public IP address of your NSX gateway | 3299
  • Translated IP | Port : Private IP address of your SAProuter | Empty

nsx_nat_rule

Once the DNAT rule has been created, click on Publish to update the configuration on the NSX gateway.

Now the traffic originating from the public IP address 194.39.131.34/32 held by SAP to your public IP address of your NSX gateway on the tcp/3299 port will be routed to your SAProuter.

SAProuter installation

To install the SAProuter service on your dedicated virtual machine, we recommend following instructions provided by the SAP support. Some steps must be done on your SAP Support Launchpad to secure the connection between SAP support and the SAProuter.

We advise updating your SAProuter as often as you can and deploying it in a monitored and isolated network of your SAP infrastructure. The SAProuter should communicate with your SAP infrastructure on restricted ports.

Find more information about the firewall rule with an NSX gateway in our guide.

Go further

If you need training or technical assistance to implement our solutions, contact your sales representative or click on this link to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.

Join our community of users on https://community.ovh.com/en/.

Related articles