Skip to content

Commit 828ea98

Browse files
authored
remove Juniper plugin references (#348)
1 parent 281676a commit 828ea98

File tree

3 files changed

+29
-31
lines changed

3 files changed

+29
-31
lines changed

source/adminguide/networking.rst

Lines changed: 25 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -156,28 +156,28 @@ offering.
156156

157157
.. cssclass:: table-striped table-bordered table-hover
158158

159-
+----------------------+-----------+------------+----------+-------------+-------------+
160-
| | Virtual | Citrix | Juniper | F5 BigIP | Host based |
161-
| | Router | NetScaler | SRX | | (KVM/Xen) |
162-
+======================+===========+============+==========+=============+=============+
163-
| Remote Access VPN | Yes | No | No | No | No |
164-
+----------------------+-----------+------------+----------+-------------+-------------+
165-
| DNS/DHCP/User Data | Yes | No | No | No | No |
166-
+----------------------+-----------+------------+----------+-------------+-------------+
167-
| Firewall | Yes | No | Yes | No | No |
168-
+----------------------+-----------+------------+----------+-------------+-------------+
169-
| Load Balancing | Yes | Yes | No | Yes | No |
170-
+----------------------+-----------+------------+----------+-------------+-------------+
171-
| Elastic IP | No | Yes | No | No | No |
172-
+----------------------+-----------+------------+----------+-------------+-------------+
173-
| Elastic LB | No | Yes | No | No | No |
174-
+----------------------+-----------+------------+----------+-------------+-------------+
175-
| Source NAT | Yes | No | Yes | No | No |
176-
+----------------------+-----------+------------+----------+-------------+-------------+
177-
| Static NAT | Yes | Yes | Yes | No | No |
178-
+----------------------+-----------+------------+----------+-------------+-------------+
179-
| Port Forwarding | Yes | No | Yes | No | No |
180-
+----------------------+-----------+------------+----------+-------------+-------------+
159+
+----------------------+-----------+------------+-------------+
160+
| | Virtual | Citrix | Host based |
161+
| | Router | NetScaler | (KVM/Xen) |
162+
+======================+===========+============+=============+
163+
| Remote Access VPN | Yes | No | No |
164+
+----------------------+-----------+------------+-------------+
165+
| DNS/DHCP/User Data | Yes | No | No |
166+
+----------------------+-----------+------------+-------------+
167+
| Firewall | Yes | No | No |
168+
+----------------------+-----------+------------+-------------+
169+
| Load Balancing | Yes | Yes | No |
170+
+----------------------+-----------+------------+-------------+
171+
| Elastic IP | No | Yes | No |
172+
+----------------------+-----------+------------+-------------+
173+
| Elastic LB | No | Yes | No |
174+
+----------------------+-----------+------------+-------------+
175+
| Source NAT | Yes | No | No |
176+
+----------------------+-----------+------------+-------------+
177+
| Static NAT | Yes | Yes | No |
178+
+----------------------+-----------+------------+-------------+
179+
| Port Forwarding | Yes | No | No |
180+
+----------------------+-----------+------------+-------------+
181181

182182

183183
Network Offerings
@@ -206,7 +206,7 @@ A network offering is a named set of network services, such as:
206206
- VPN
207207

208208
- (Optional) Name one of several available providers to use for a given
209-
service, such as Juniper for the firewall
209+
service
210210

211211
- (Optional) Network tag to specify which physical network to use
212212

@@ -398,6 +398,8 @@ To create a network offering:
398398
its maximum capacity, the device will not be allocated to a new
399399
account.
400400

401+
.. not sure how this works after deprecation of Juniper devices
402+
401403
- **Mode**: You can select either Inline mode or Side by Side mode:
402404
403405
- **Inline mode**: Supported only for Juniper SRX firewall and BigF5

source/adminguide/networking/external_firewalls_and_load_balancers.rst

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,9 @@
1717
External Firewalls and Load Balancers
1818
-------------------------------------
1919

20-
CloudStack is capable of replacing its Virtual Router with an external
21-
Juniper SRX device and an optional external NetScaler or F5 load
22-
balancer for gateway and load balancing services. In this case, the instances
23-
use the SRX as their gateway.
20+
CloudStack is capable of moving some of its Virtual Router networking functionality
21+
to some of the external network service providers such as e.g. NetScaler.
22+
2423

2524

2625
About Using a NetScaler Load Balancer

source/adminguide/networking/ip_forwarding_and_firewalling.rst

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,9 +108,6 @@ Prerequisites and Guidelines
108108

109109
Consider the following scenarios to apply egress firewall rules:
110110

111-
- Egress firewall rules are supported on Juniper SRX and virtual
112-
router.
113-
114111
- The egress firewall rules are not supported on shared networks.
115112

116113
- Allow the egress traffic from specified source CIDR. The Source CIDR
@@ -195,7 +192,7 @@ traffic. While implementing a guest network, CloudStack adds the
195192
firewall egress rule specific to the default egress policy for the guest
196193
network.
197194

198-
This feature is supported only on virtual router and Juniper SRX.
195+
This feature is supported only on the virtual router.
199196

200197
#. Create a network offering with your desirable default egress policy:
201198

0 commit comments

Comments
 (0)