Share

AWS Virtual Private Cloud Configurations

The Virtual Private Cloud (VPC) allows you to network Flame instances, a project server, and Burn nodes together in your cloud implementation.

This topic lists minimum requirements. Adapt these to your own deployment to implement an operational security that matches your environment.

Network & Security

To have Flame Family services run across your Virtual Private Cloud (VPC), you need to define Security Groups and open ports and port ranges. You want to create these security groups:

You also need to create a security group for your remote streaming protocol solution. See the HP Anyware and the AWS NICE DCV pages for their respective groups.

You create the VPC security groups in VPC > Security > Security Groups.

Note:

In the following tables, CIDR stands for the IPv4 CIDR of your VPC. You get it from your AWS console, VPC > Your VPCs > IPv4 CIDR.

Flame Family products security group flame

Inbound rules only. Use the default outbound rules.

IP VersionTypeProtocolPort RangeSourceDescription
IPv4Custom TCPTCP3234CIDRBackburner Manager
IPv4Custom TCPTCP3230 - 3233CIDRBackburner Server
IPv6SSHTCP22::/0
IPv4Custom TCPTCP7184CIDRWireTapGateway Frame Interface
IPv4Custom UDPUDP32768 - 60999CIDR/proc/sys/net/ipv4/ip_local_port_range
IPv4Custom UDPUDP20048CIDRRPC mountd
IPv4Custom TCPTCP7700CIDRDLmpd
IPv4Custom TCPTCP7348CIDRBackburner Manager WT Data
IPv4Custom TCPTCP7549CIDRIFFFSWireTapServer Node Interface
IPv4Custom UDPUDP111CIDRRPC Portmapper
IPv6HTTPSTCP443::/0
IPv4HTTPSTCP4430.0.0.0/0
IPv4Custom TCPTCP32768 - 60999CIDRDynamic ports
IPv4Custom TCPTCP7550CIDRIFFFSWireTapServer Frame Interface
IPv4Custom UDPUDP30000CIDRBackburner Manager
IPv4Custom UDPUDP7555CIDRWireTap Service Discovery
IPv4Custom TCPTCP7347CIDRBackburner Manager WT Meta
IPv4Custom UDPUDP7001CIDRS+W Probed Multicast
IPv4Custom UDPUDP3234CIDRBackburner Manager
IPv4Custom TCPTCP20048CIDRRPC mountd
IPv4Custom ICMP - IPv4Echo RequestN/A0.0.0.0/0

ping

IPv4SSHTCP220.0.0.0/0
IPv4Custom TCPTCP111CIDRRPC portmapper
IPv4NFSTCP2049CIDRNFS
IPv4Custom TCPTCP7183CIDRWireTapGateway Node Interface
IPv4Custom TCPTCP7000CIDRS+W Server

Elastic Fabric Adapter (EFA) Security Group

If you plan on using AWS CDI, you must enable EFA on Flame instances you will create. This requires creating an EFA-specific security group. Follow these steps to create one.

  1. In the AWS console, under the EC2 service, select Security Groups under Network & Security.
  2. Click Create security group.
  3. Give a descriptive name to your security group, eg Flame EFA SG, and enter a description.
  4. Click Create security group.
  5. On the new page that appears, copy the Security Group ID (sg-###) of your security group.
  6. Click Edit inbound rules, then Add rule.
  7. For type, select All traffic, select Custom for Source, then paste the Security group ID from the previous step in the source address box.
  8. Click Save rule.
  9. Select the Outbound rules tab, then Edit outbound rules.
  10. For type, select All traffic, select Custom for Source, then paste the Security group ID from the previous step in the source address box
  11. Click Save rule.

Burn security group

Inbound rules only. Use the default outbound rules.

IP VersionTypeProtocolPort RangeSourceDescription
IPv4Custom UDPUDP32768 - 60999CIDR/proc/sys/net/ipv4/ip_local_port_range
IPv4Custom TCPTCP3233CIDRBackburner Server
IPv4Custom TCPTCP7700CIDRDLmpd
IPv4Custom TCPTCP32768 - 60999CIDRDynamic ports
IPv4Custom ICMP - IPv4Echo RequestN/A0.0.0.0/0

ping

IPv4Custom TCPTCP7001CIDRS+W Probed
IPv4Custom UDPUDP7001CIDRS+W Probed Multicast
IPv4SSHTCP220.0.0.0/0SSH

Project Server security group

Inbound rules only. Use the default outbound rules.

IP VersionTypeProtocolPort RangeSourceDescription
IPv4Custom TCPTCP7549CIDRIFFFS WireTap Server (Node)

IPv4Custom UDPUDP32768 - 60999CIDR/proc/sys/net/ipv4/ip_local_port_range
IPv4Custom TCPTCP111CIDRRPC portmapper (TCP)

IPv4Custom TCPTCP3234CIDRBackburner Manager
IPv4Custom TCPTCP8244CIDRS+W Probed Remote Locking
IPv4Custom ICMP - IPv4Echo RequestN/A0.0.0.0/0

ping

IPv4Custom TCPTCP7000CIDRS+W Server
IPv4Custom UDPUDP111CIDRRPC Portmapper (UDP)

IPv4NFSTCP2049CIDRNFS
IPv4Custom TCPTCP7348CIDRBackburner Manager WT Data
IPv4Custom TCPTCP7700CIDRDLmpd
IPv4Custom TCPTCP20048CIDRNFS Mountd (TCP)

IPv4Custom UDPUDP3234CIDRBackburner Manager
IPv4Custom TCPTCP7347CIDRBackburner Manager WT Meta
IPv4Custom TCPTCP32768 - 60999CIDRDynamic ports
IPv4Custom UDPUDP30000CIDRBackburner Manager
IPv4Custom UDPUDP7555CIDRWireTap Service Discovery
IPv4Custom TCPTCP7428CIDRS+W Bandwidth Manager
IPv4Custom TCPTCP7001CIDRS+W Probed
IPv4Custom UDPUDP20048CIDRNFS Mountd (UDP)

IPv4Custom UDPUDP7001CIDRS+W Probed Multicast
IPv4SSHTCP220.0.0.0/0SSH

NAS security group

Inbound rules only. Use the default outbound rules.

IP VersionTypeProtocolPort RangeSourceDescription
IPv4Custom TCPTCP20048CIDRNFS Mountd (TCP)

IPv4Custom UDPUDP111CIDRRPC Portmapper (UDP)

IPv4SSHTCP22::/0SSH
IPv4Custom ICMP - IPv4Echo RequestN/A0.0.0.0/0

ping

IPv4Custom UDPUDP20048CIDRNFS Mountd (UDP)

IPv4NFSTCP2049CIDRNFS
IPv4SSHTCP220.0.0.0/0SSH
IPv4Custom TCPTCP111CIDRRPC portmapper (TCP)

IPv4Custom ICMP - IPv4Echo RequestN/A::/0

ping

IGMP-multicast

Inbound rules

IP VersionTypeProtocolPort RangeSourceDescription
IPv4All UDPUDP0-65535CIDRInbound multicast traffic

IPv4All trafficAllAllCIDRAll inbound VPC traffic

IPv4IGMP (2)*IGMP (2)**All0.0.0.0/32IGMPv2 autodiscovery

* When adding the rule to the security group, select the type "Custom Protocol" from the drop-down.

** When adding the rule to the security group, type '2' in the protocol text field.

Outbound rules

IP VersionTypeProtocolPort RangeSourceDescription
IPv4All UDPUDP0-65535239.0.0.1/32Outbound multicast traffic

IPv4All trafficAllAllCIDRAll outbound VPC traffic

IPv4IGMP (2)*IGMP (2)**All239.0.0.1/32IGMPv2 join

IPv4IGMP (2)*IGMP (2)**All224.0.0.2/32IGMPv2 leave

* When adding the rule to the security group, select the type "Custom Protocol" from the drop-down.

** When adding the rule to the security group, type '2' in the protocol text field.

Set Up an AWS Transit Gateway

To support the various networking capabilities of Flame Family products, you need to configure Transit Gateway service on your instances.

Note:

AWS Local Zones do not currently support TGW or TGW-mc. Please express your interest in these features to AWS directly.

You could edit the framestore map to enable Wire between Flame instances on your VPC, but a Transit Gateway enables Wire without editing the framestore map. In short, a Transit Gateway allows you to use the self-discovery capabilities of Autodesk Flame services.

If you plan on setting up a Transit Gateway for your VPC, AWS already has detailed documentation on the Transit Gateway and its configuration.

Transit Gateway uses a subnet in each availability zone (AZ) used by your Virtual Private Cloud (VPC). You only need to attach the subnets in your VPC where you provision a Flame instance. If there is a subnet (AZ) that you won’t be using, then you don't need to attach it to your TGW.

The following steps provide an overview of the process to set up a Transit Gateway, with the options required to make it work with a Flame-based workflow. For detailed operation and settings information, refer to the AWS documentation.

To set up a Transit Gateway, you use the AWS Console > VPC menu. Down the left menu, open Transit Gateways.

Transit Gateways

To set up a Transit Gateway, you need to open and set up the different sections in the following order:

  1. Transit Gateways
  2. Transit Gateway Attachments
  3. Transit Gateway Route Table
  4. Transit Gateway Multicast

1. Transit Gateways

Where you create the Transit Gateway. Make sure to select the following options:

  • DNS support
  • Default route table association
  • Default route table propagation
  • Multicast support
Note:

When you create a Transit Gateway, every option is enabled by default except Multicast support. Make sure to enable it.

You can leave Auto accept shared attachments deselected.

Transit Gateway creation

2. Transit Gateway Attachments

Where you attach your Transit Gateway to your Virtual Private Cloud (VPC).

Set the following options:

  • Details

    • Transit Gateway ID: The Transit Gateway you created.
    • Attachment Type: VPC
  • VPC attachment

    • DNS Support: Selected
    • IPv6: Unselected
    • VPC ID: The ID of your VPC

Transit Gateway attachment

3. Transit Gateway Route Tables

Where the routing tables are created.

You do not have any options to set in this menu: it is automatically generated when you create your Transit Gateway attachment.

4. Transit Gateway Multicast

Where you set how traffic flows for all associated subnets.

Set the following options:

  • Details

    • Transit Gateway ID: The Transit Gateway you created.
  • Configure the Transit Gateway multicast domain

    • IGMPv2 support: Selected
    • Auto accept shared associations: Unselected

Transit Gateway multicast

You must also associate your VPC subnets to your Transit Gateway multicast domain. This constrains the multicast to only the subnets that require it. Your subnets are listed in Virtual Private Cloud > Subnets. Every Flame instance part of the same Wire/Backburner network must be in a subnet associated to the same Transit Gateway multicast domain.

Was this information helpful?