Deploying PCS on New Virtual Network
This section describes deployment with three NIC cards and two NIC cards.
Deployment on VM with Three NIC Cards
To deploy PCS on Azure using the Azure portal, do the following:
1.Select the template file created in section ‘Upload Azure Resource Manager Template to Azure account’ and click Deploy.
Before proceeding with deployment, ensure that the attribute “accept-license-agreement” in pulse-config is set to “y”.
Custom Deployment on VM with Three NIC Cards – New Virtual Network
2.Fill or modify the following parameters:
•Resource group: Specify the resource group name in which Pulse Connect Secure needs to be deployed
•Location: Region where resource group needs to be created
•PCS Storage Account Name: Storage account name where the Pulse Connect Secure Virtual Appliance image is available
•PCS Storage Account Resource Group: Resource group of where the Pulse Connect Secure Virtual Appliance image is copied
•PCS Image Location URI: URI to Pulse Connect Secure Virtual Appliance Image
•PCSVM Name: Name of the Pulse Connect Secure Virtual instance
•PCS Config: Provisioning parameters in an XML format. Refer the section ‘Pulse Connect Secure Provisioning Parameters’
•SSH Public Key: This key is used to access PCS via SSH. The SSH keys are generated using ssh-keygen on Linux and OS X, or PuTTyGen on Windows. For details about generating the SSH key pairs, refer:
For Windows: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/ssh-from-windows
For MacOS and Linux: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/mac-create-ssh-keys
•DNS Label Prefix Ext: Prefix for the external interface DNS label
•DNS Label Prefix Mgmt: Prefix for the management interface DNS label
•Vnet Address Space: Virtual network address space
•Internal Subnet: Subnet from which Pulse Connect Secure internal interface needs to lease IP
•External Subnet: Subnet from which Pulse Connect Secure external interface needs to lease IP
•Management Subnet: Subnet from which Pulse Connect Secure management interface needs to lease IP
•Tunnel Subnet: Subnet which will be configured as tunnel IP pool in the Pulse Connect Secure VPN Profile
3.Agree to the Azure licensing terms and click Purchase.
4.Watch for the deployment succeeded message after 3 to 5 minutes.
Deployment Succeeded
5.Go to the resource group in which the Pulse Connect Secure Virtual Appliance was deployed to see the resources created.
6.Navigate to the resource group and click PCS Management Public IP. Make a note of the PCS Management Public IP and DNS name (FQDN) to access PCS for admin page.
PCS Management Public IP
7.Click PCS External Public IP and note down the PCS External Public IP and DNS name (FQDN) to access PCS for end user page.
PCS External Public IP
Azure allows static as well as dynamic assignment of IP addresses to the network interfaces. The mode of IP assignment (static/dynamic) can be mentioned in the Azure Resource Manage template file. The current JSON template uses the dynamic method of allotting IP addresses to the network interfaces.
Deployment on VM with Two NIC Cards
To deploy Pulse Connect Secure on Azure using the Azure portal, do the following:
1.Select the template file created in section ‘Upload Azure Resource Manager Template to Azure account’ and click Deploy.
Before proceeding with deployment, ensure that the attribute “accept-license-agreement” in pulse-config is set to “y”.
Custom Deployment on VM with Two NIC Cards – New Virtual Network
2.Fill or modify the following parameters:
•Resource group: Specify the resource group name in which Pulse Connect Secure needs to be deployed
•Location: Region where resource group needs to be created
•PCS Storage Account Name: Storage account name where the Pulse Connect Secure Virtual Appliance image is available
•PCS Storage Account Resource Group: Resource group of where the Pulse Connect Secure Virtual Appliance image is copied
•PCS Image Location URI: URI to Pulse Connect Secure Virtual Appliance Image
•PCSVM Name: Name of the Pulse Connect Secure Virtual instance
•PCS Config: Provisioning parameters in an XML format. Refer the section ‘Pulse Connect Secure Provisioning Parameters’
•SSH Public Key: This key is used to access PCS via SSH. The SSH keys are generated using ssh-keygen on Linux and OS X, or PuTTyGen on Windows. For details about generating the SSH key pairs, refer:
For Windows: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/ssh-from-windows
For MacOS and Linux: https://docs.microsoft.com/en-us/azure/virtual-machines/linux/mac-create-ssh-keys
•DNS Label Prefix Ext: Prefix for the external interface DNS label
•Vnet Address Space: Virtual network address space
•Internal Subnet: Subnet from which Pulse Connect Secure internal interface needs to lease IP
•External Subnet: Subnet from which Pulse Connect Secure external interface needs to lease IP
•Tunnel Subnet: Subnet which will be configured as tunnel IP pool in the Pulse Connect Secure VPN Profile
3.Agree to the Azure licensing terms and click Purchase.
4.Watch for the deployment succeeded message after 3 to 5 minutes.
Deployment Succeeded
5.Go to the resource group in which the Pulse Connect Secure Virtual Appliance was deployed to see the resources created.
6.Click PCS External Public IP and note down the PCS External Public IP and DNS name (FQDN) to access PCS for end user page.
PCS External Public IP
Azure allows static as well as dynamic assignment of IP addresses to the network interfaces. The mode of IP assignment (static/dynamic) can be mentioned in the Azure Resource Manage template file. The current JSON template uses the dynamic method of allotting IP addresses to the network interfaces.