Difference between revisions of "Deploying an instance zone advanced-routing"

From EN Ikoula wiki
⧼vector-jumptonavigation⧽ ⧼vector-jumptosearch⧽
 
(27 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<span data-link_translate_fr_title="Deploiement d'une instance en zone advanced-routing"  data-link_translate_fr_url="Deploiement_d%27une_instance_en_zone_advanced-routing"></span>[[:fr:Deploiement d'une instance en zone advanced-routing]][[fr:Deploiement d'une instance en zone advanced-routing]]
 
<br />
 
  
This article has been created by an automatic translation software. You can view the article source [[:fr:Deploiement d'une instance en zone advanced-routing|here]].<br /><span data-translate="fr"></span>
+
{{#seo:
 +
|title=Deploying an instance zone advanced-routing
 +
|title_mode=append
 +
|keywords=these,are,your,keywords
 +
|description=Deploying an instance zone advanced-routing
 +
|image=Uploaded_file.png
 +
|image_alt=Wiki Logo
 +
}}
  
  
<!-- Début de l'article. Placez votre texte ci-après et n'hésitez pas à personnaliser les chapitres selon votre besoin -->
+
3. Deploying an instance zone  <span class="notranslate">'''Advance -Routing'''</span>
  
  
 
+
Log on to the web interface <span class="notranslate">Cloud</span> public to Ikoula : https://cloudstack.ikoula.com/client/ and go to the 'Bodies' tab and click on the button "add an instance."
 
 
3. Deploying an instance zone <span class="notranslate">Advance-Routing</span>
 
 
 
 
 
Log on to the web interface <span class="notranslate">Cloud</span> public to Ikoula : https://cloudstack.ikoula.com/client/ and go to the 'Bodies' tab and click on the button "add an instance."
 
 
   
 
   
  
Line 19: Line 19:
  
  
The first step allows yor to choose the one hosting your instance Zone (five areas are currently available ) and a model (preinstalled system /preconfigured ) or an ISO.
+
The first step allows you to choose the one hosting your instance Zone (five areas are currently available ) and a model (preinstalled system /preconfigured) or an ISO.
  
  
Line 25: Line 25:
  
  
For this example we will use a model. Select the image <span class="notranslate">« CentOS 7 – Minimal – 64bits »</span> and click on «next».
+
For this example we will use a model. Select the image   <span class="notranslate">« CentOS 7 – Minimal – 64bits »</span> and click on «next».
 
   
 
   
  
Line 31: Line 31:
  
  
The next step is to select the instance configuration, descriptions of the various offers are shown.  
+
The next step is to select the instance configuration, descriptions of the various offers are shown.
 
   
 
   
  
Line 37: Line 37:
  
  
In the next step, we can indicate if we want a <span class="notranslate">DATADISK</span> (data disc ) and its size. We do not want immediate : then click on the button "next".
+
In the next step, we can indicate if we want a   <span class="notranslate">DATADISK</span> (data disc ) and its size. We do not want immediate : then click on the button "next".
 
   
 
   
  
Line 43: Line 43:
  
 
 
Then there is the selection of the network, if yor already have one or more networks in this area they will appear at the top ("default" in the image below ).
+
Then there is the selection of the network, if you already have one or more networks in this area they will appear at the top ("default" in the image below ).
  
  
Otherwise, various offers are available for creating (Depending on the service purchased ) in the lower part : 10/100/200/500/1000
+
Otherwise, various offers are available for creating (Depending on the service purchased ) in the lower part : 10/100/200/500/1000
Once your choice is made, click on «Next» :
+
Once your choice is made, click on «Next» :
 
    
 
    
 
                    
 
                    
Line 53: Line 53:
  
 
 
This page allows yor to define a name and /or a group for your instance, these two parameters are optional and only present to help organize you. Once complete, yor can initiate the creation.      
+
This page allows you to define a name and /or a group for your instance, these two parameters are optional and only present to help organize you. Once complete, you can initiate the creation.        
  
  
Line 59: Line 59:
  
 
 
The interface is asynchronous, it "makes yor hand" during the deployment of your trial. Yor can see the current actions, in error or terminated in the 'Message' window at the top in the middle of your interface :
+
The interface is asynchronous, it "makes you hand" during the deployment of your trial. You can see the current actions, in error or terminated in the 'Message' window at the top in the middle of your interface :
  
  
Line 65: Line 65:
  
  
Once the deployment is completed, a pop-up will notify yor of the password of your new instance :
+
Once the deployment is completed, a pop-up will notify you of the password of your new instance :
  
  
Line 71: Line 71:
 
   
 
   
  
In addition, another, at the bottom of the screen will inform yor of the end of the deployment :
+
In addition, another, at the bottom of the screen will inform you of the end of :
 
   
 
   
  
Line 77: Line 77:
  
  
- Examples of network configuration for the instances  
+
- Examples of network configuration for the instances
  
  
Once your instance is created, yor can access it via the KVM available in the window of details of the latter or, for example, to open its port of SSH   access (GNU /Linux ) or TerminalServer /RDP  <span class="notranslate">(Windows)</span>.  
+
Once your instance is created, you can access it via the KVM available in the window of details of the latter or, for example, to open its port of SSH access (GNU/Linux) or TerminalServe/RDP  <span class="notranslate">(Windows)</span>.  
  
  
- Accessibility outside for an instance type GNU SSH   /Linux .
+
- Accessibility outside for an instance type GNU SSH /Linux.
  
  
Go to your "Network" tab and click on the name of your network :
+
Go to your "Network" tab and click on the name of your network :
  
  
Line 92: Line 92:
 
   
 
   
  
Then click on 'See IP addresses' :
+
Then click on 'See IP addresses' :
  
  
Line 98: Line 98:
 
   
 
   
  
Yor will find the public IP addresses assigned to you, click the one that yor want to configure :  
+
You will find the public IP addresses assigned to you, click the one that you want to configure :  
 
   
 
   
  
Line 104: Line 104:
  
  
Once on the detail of your public address, click on "Configuration" :
+
Once on the detail of your public address, click on "Configuration" :
  
  
Line 110: Line 110:
 
   
 
   
  
We open the port 22 (SSH ) on your private virtual router, then click on "See all" in the "Firewall" framework :
+
We open the port 22 (SSH) on your private virtual router, then click on "See all" in the "Firewall" framework :
 
   
 
   
  
Line 116: Line 116:
  
  
In this screen yor can add the IP address or the network (CIDR notation, e.g. x.x.x.x /24 or 0.0.0.0/0 for everyone ) yor want to allow to connect to TCP port 22 from the outside (i.e. "Internet" ) :
+
In this screen you can add the IP address or the network (CIDR notation, e.g. x.x.x.x /24 ou 0.0.0.0/0 for everyone ) you want to allow to connect to TCP port 22 from the outside (i.e. "Internet" ) :
 
   
 
   
  
Line 122: Line 122:
  
  
When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :  
+
When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :  
  
  
Line 128: Line 128:
 
   
 
   
  
In the same way, yor will specify a port (or un intervalle de ports) external (your public IP address ) to match to a port (or un intervalle de ports) internal (on your instance in addressing private ).  
+
In the same way, you will specify a port (or a port range ) extern (your public IP address ) to match to a port (or a port range ) intern (on your instance in addressing privat).  
  
  
In our example, we have created our Firewall rule on port 22, to indicate public port will be port 22 as for the port private (pour une instance où le serveur SSH   écoute sur le port par défaut).
+
In our example, we have created our Firewall rule on port 22, to indicate public port will be port 22 as for the port private (for an instance where the SSH server listens on the default port ).
  
  
After which, you can access your instance en SSH   Since the port 22 your public IP.  
+
After which, you can access your instance in SSH from port 22 your public IP.
  
  
In this way, it is possible to have multiple instances to listen on the private port 22 and access it from different public ports from outside. If yor only have an instance, specify 22 in public and private port as in our example to access from the port 22 from the outside.
+
In this way, it is possible to have multiple instances to listen on the private port 22 and access it from different public ports from outside. If you only have an instance, specify 22 in public and private port as in our example to access from the port 22 from the outside.
 
   
 
   
  
Line 143: Line 143:
  
  
- Accessibility TS /RDP from the outside to an instance type MS <span class="notranslate">Windows</span>.
+
- Accessibility TS/RDP from the outside to an instance type MS   <span class="notranslate">Windows</span>.
  
  
Go to your "Network" tab and click on the name of your network :
+
Go to your "Network" tab and click on the name of your network :
 
   
 
   
  
Line 152: Line 152:
  
  
Then click on 'See IP addresses' :  
+
Then click on 'See IP addresses' :  
 
   
 
   
  
Line 158: Line 158:
  
  
Yor will find the public IP addresses assigned to you, click the one that yor want to configure :  
+
You will find the public IP addresses assigned to you, click the one that you want to configure :  
 
   
 
   
  
Line 164: Line 164:
  
  
Once on the detail of your public address, click on "Configuration" :
+
Once on the detail of your public address, click on "Configuration" :
 
   
 
   
  
Line 170: Line 170:
  
  
We open the port 22 (SSH ) on your private virtual router, then click on "See all" in the "Firewall" framework :
+
We open the port 22 (SSH) on your private virtual router, then click on "See all" in the "Firewall" framework :
 
   
 
   
  
Line 176: Line 176:
  
  
Dans cet écran vous allez pouvoir ajouter l’adresse IP or réseau (CIDR notation, e.g. x.x.x.x /24 or 0.0.0.0/0 for everyone ) yor want to allow to connect to TCP port 3389 from the outside (i.e. "Internet" ) :  
+
In this screen you can add the IP address or network  (CIDR notation, e.g. x.x.x.x /24 ou 0.0.0.0/0 for everyone ) you want to allow to connect to TCP port 3389 from the outside (i.e. "Internet" ) :  
  
  
Line 182: Line 182:
  
  
When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :  
+
When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :  
 
   
 
   
  
Line 191: Line 191:
  
  
In the same way, yor will specify a port (or un intervalle de ports) external (your public IP address ) to match to a port (or un intervalle de ports) internal (on your instance in addressing private ).  
+
In the same way, you will specify a port (or a port range ) extern (your public IP address ) to match to a port (or a port range ) intern (on your instance in addressing privat).  
  
  
In our example, we have created our Firewall rule on port 3389, to indicate public port will be port 3389 as for the port private (pour une instance où le serveur SSH   écoute sur le port par défaut).
+
In our example, we have created our Firewall rule on port 3389, to indicate public port will be port 3389 as for the port private (for an instance where the SSH server listens on the default port ).
  
  
After which, you can access your instance en <span class="notranslate">Terminal Server</span> Since the port 3389 Since your public IP.  
+
After which, you can access your instance en <span class="notranslate">Terminal Server</span> Since the por 3389 Since your public IP.
In this way, it is possible to have multiple instances to listen on the private port 3389 et y accéder depuis des ports publics différents from the outside or si vous n’avez qu’une instance, indiquez 3389 en port privé et public comme dans notre exemple et y accéder Since the port 3389 from the outside.
+
In this way, it is possible to have multiple instances to listen on the private port 3389 and access it from different public ports from the outside or if you only have an instance, specify  3389 in public and private port as in our example and access from the port 3389 from the outside.
  
  
See also :  
+
See also :  
  
  
Authorization PING (ICMP /Echo ) from the outside to its public IP  
+
Authorization PI (ICMP/Echo) from the outside to its public IP  
  
  
Line 213: Line 213:
 
<!-- Fin de l'article -->
 
<!-- Fin de l'article -->
 
<br /><br />
 
<br /><br />
This article seemed you to be useful ? <vote />
+
This article seemed you to be u ? <vote />
  
 
<!--T:5-->
 
<!--T:5-->
Line 219: Line 219:
  
  
<!-- Placez ci-dessous la or les catégories auxquelles se rapporte votre article. Ex: [[Category:Help]] [[Category:Linux]] -->
+
<!-- Placez ci-dessous la ou les catégories auxquelles se rapporte votre article. Ex: [[Category:Contribute]] [[Category:Linux]] -->
[[Category:[First_steps_on_cloud_public_ikoula]]
+
[[Category:First_steps_on_the_cloud_public_ikoula]]
 
[[Category:Public_cloud]]
 
[[Category:Public_cloud]]
 
<br />
 
<br />
 
<comments />
 
<comments />

Latest revision as of 15:18, 24 September 2021


3. Deploying an instance zone Advance -Routing


Log on to the web interface Cloud public to Ikoula : https://cloudstack.ikoula.com/client/ and go to the 'Bodies' tab and click on the button "add an instance."


Premierpascs50.png


The first step allows you to choose the one hosting your instance Zone (five areas are currently available ) and a model (preinstalled system /preconfigured) or an ISO.


Premierpascs51.png


For this example we will use a model. Select the image « CentOS 7 – Minimal – 64bits » and click on «next».


Premierpascs52.png


The next step is to select the instance configuration, descriptions of the various offers are shown.


Premierpascs53.png


In the next step, we can indicate if we want a DATADISK (data disc ) and its size. We do not want immediate : then click on the button "next".


Premierpascs54.png

  Then there is the selection of the network, if you already have one or more networks in this area they will appear at the top ("default" in the image below ).


Otherwise, various offers are available for creating (Depending on the service purchased ) in the lower part : 10/100/200/500/1000 Once your choice is made, click on «Next» :


Premierpascs55.png

  This page allows you to define a name and /or a group for your instance, these two parameters are optional and only present to help organize you. Once complete, you can initiate the creation.


Premierpascs56.png

  The interface is asynchronous, it "makes you hand" during the deployment of your trial. You can see the current actions, in error or terminated in the 'Message' window at the top in the middle of your interface :


Premierpascs57.png


Once the deployment is completed, a pop-up will notify you of the password of your new instance :


Premierpascs58.png


In addition, another, at the bottom of the screen will inform you of the end of :


Premierpascs59.png


- Examples of network configuration for the instances


Once your instance is created, you can access it via the KVM available in the window of details of the latter or, for example, to open its port of SSH access (GNU/Linux) or TerminalServe/RDP (Windows).


- Accessibility outside for an instance type GNU SSH /Linux.


Go to your "Network" tab and click on the name of your network :


Premierpascs60.png


Then click on 'See IP addresses' :


Premierpascs61.png


You will find the public IP addresses assigned to you, click the one that you want to configure :


Premierpascs62.png


Once on the detail of your public address, click on "Configuration" :


Premierpascs63.png


We open the port 22 (SSH) on your private virtual router, then click on "See all" in the "Firewall" framework :


Premierpascs64.png


In this screen you can add the IP address or the network (CIDR notation, e.g. x.x.x.x /24 ou 0.0.0.0/0 for everyone ) you want to allow to connect to TCP port 22 from the outside (i.e. "Internet" ) :


Premierpascs65.png


When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :


Premierpascs66.png


In the same way, you will specify a port (or a port range ) extern (your public IP address ) to match to a port (or a port range ) intern (on your instance in addressing privat).


In our example, we have created our Firewall rule on port 22, to indicate public port will be port 22 as for the port private (for an instance where the SSH server listens on the default port ).


After which, you can access your instance in SSH from port 22 your public IP.


In this way, it is possible to have multiple instances to listen on the private port 22 and access it from different public ports from outside. If you only have an instance, specify 22 in public and private port as in our example to access from the port 22 from the outside.


Premierpascs67.png


- Accessibility TS/RDP from the outside to an instance type MS Windows.


Go to your "Network" tab and click on the name of your network :


Premierpascs68.png


Then click on 'See IP addresses' :


Premierpascs69.png


You will find the public IP addresses assigned to you, click the one that you want to configure :


Premierpascs70.png


Once on the detail of your public address, click on "Configuration" :


Premierpascs71.png


We open the port 22 (SSH) on your private virtual router, then click on "See all" in the "Firewall" framework :


Premierpascs72.png


In this screen you can add the IP address or network (CIDR notation, e.g. x.x.x.x /24 ou 0.0.0.0/0 for everyone ) you want to allow to connect to TCP port 3389 from the outside (i.e. "Internet" ) :


Premierpascs73.png


When done, click 'Add' and return to the previous step for, this time, click 'See all' in the setting "Port forwarding" :


Premierpascs74.png


Premierpascs75.png


In the same way, you will specify a port (or a port range ) extern (your public IP address ) to match to a port (or a port range ) intern (on your instance in addressing privat).


In our example, we have created our Firewall rule on port 3389, to indicate public port will be port 3389 as for the port private (for an instance where the SSH server listens on the default port ).


After which, you can access your instance en Terminal Server Since the por 3389 Since your public IP. In this way, it is possible to have multiple instances to listen on the private port 3389 and access it from different public ports from the outside or if you only have an instance, specify 3389 in public and private port as in our example and access from the port 3389 from the outside.


See also :


Authorization PI (ICMP/Echo) from the outside to its public IP


Allow outbound to the outside network flow




This article seemed you to be u ?

0



You are not allowed to post comments.