Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Cisco CSR-1000v VNF Configuration Settings

    You can configure the Cisco CSR-1000v virtualized network function (VNF) from Configuration > Network Services > Service Name > Overview > Service Configuration. Your service provider usually configures base settings for the virtual machine (VM) in which the virtualized network function (VNF) resides and you configure settings for the service, such as policies. Use the information in the following tables to provide values for the available settings:

    • Table 1 shows the base settings you can configure for the virtual machine (VM) that contains the VNF.

      Note: Your service provider usually configures the base settings and you should not need to change them.

    • Table 2 shows the firewall settings you can configure.

    Table 1: Fields for the CSR-1000v Base Settings

    Field

    Description

    Host Name

    Specify the hostname of the VM.

    Example: host1

    Loopback Address

    Specify the IPv4 loopback IP address.

    Example: 10.0.2.50

    Name Servers

    Specify the fully qualified domain names (FQDNs) or IP addresses of one or more DNS name servers.

    Example: 10.0.2.15

    NTP Servers

    Specify the FQDNs or IP addresses of one or more NTP servers.

    Example: ntp.example.net

    Table 2: Fields for the CSR-1000v Firewall Settings

    Field

    Description

    Left Interface

    Specify the identifier of the interface that transmits data to the host.

    Example: GigabitEthernet2

    Right Interface

    Specify the identifier of the interface receiving data transmitted by the host.

    Example: GigabitEthernet3

    Left to Right Allowed Apps

    Select the applications from the drop-down list for which the policy is enforced in outgoing packets. The following applications are available:

    • http
    • https
    • telnet
    • ftp
    • tcp
    • udp
    • icmp

    Example: http, https

    Right to Left Allowed Apps

    Select the application from the drop-down list for which the policy is enforced for incoming packets. The following applications are available:

    • http
    • https
    • telnet
    • ftp
    • tcp
    • udp
    • icmp

    Example: ftp, udp

    Modified: 2017-08-17