Updated on 2022-03-04 GMT+08:00

Network Planning

Network Plane in the Single-Node Scenario Where HA Is Not Required

Figure 1 shows the network plane planning in the single-node scenario where HA is not required.

The network segments and IP addresses are for reference only.

Figure 1 Network plane in the single-node scenario where HA is not required

Planning description

  • In this scenario, each node uses only one NIC to form the network communication plane.
  • Table 1 shows the planned network.
    Table 1 Network planning in the single-node scenario where HA is not required

    Parameter

    Description

    Example Value

    IP address of the server/client plane

    Allows an SAP HANA node to communicate with service software (such as SFS and ERP) or SAP HANA Studio client software.

    SAP HANA node: 10.0.3.2

    SAP HANA Studio: 10.0.0.102

    NAT server: 10.0.0.202

    Elastic IP address

    Allows you to access SAP HANA Studio and NAT server.

    Automatically allocated

Network Plane in the Single-Node Scenario Where HA Is Required

Figure 2 shows the network plane planning in the single-node scenario where HA is required.

  • The network segments and IP addresses are for reference only.
  • Figure 2 applies to performing active/standby switchovers using scripts. If active/standby switchovers are manually performed, no heartbeat plane NIC is required.
  • IP addresses of the server plane (server/client plane IP address) and the active/standby internal communication plane (System Replication communication plane IP address and heartbeat plane IP address) must belong to different subnets.
Figure 2 Network plane in the single-node scenario where HA is required

Planning description

  • The active and standby SAP HANA nodes both have an NIC1 and an NIC2 card. The two NIC1 cards are in the same network segment and belong to the service/client plane. The two NIC2 cards are in another network segment and belong to the system replication/heartbeat plane.
  • Table 2 shows the planned network.
    Table 2 Network planning in the single-node scenario where HA is required

    Parameter

    Description

    Example Value

    IP address of the server/client plane

    Specifies the IP address of the primary NIC plane. Allows an SAP HANA node to communicate with service software (such as SFS and ERP) or SAP HANA Studio client software.

    SAP HANA node: 10.0.3.2 to 10.0.3.3

    SAP HANA node floating IP address: 10.0.3.103

    SAP HANA Studio: 10.0.0.102

    NAT server: 10.0.0.202

    IP address of the System Replication communication plane

    Specifies the IP address of the plane that SAP HANA nodes use to implement System Replication.

    SAP HANA node: 10.0.4.2 to 10.0.4.3

    IP address of the heartbeat plane

    Specifies the IP address of the plane that SAP HANA nodes use to transmit heartbeat signals to perform automatic active/standby switchovers when a node is faulty.

    Elastic IP address

    Allows you to access SAP HANA Studio and NAT server.

    Automatically allocated

Security Group Rules

  • The network segments and IP addresses are for reference only. The following security group rules are recommended practices. You can configure your own security group rules as you need.
  • In the following table, ## stands for the SAP HANA instance ID, such as 00. Ensure that this ID is the same as the instance ID specified when you install the SAP HANA software.
  • For more information about specific ports and security group rules to be accessed by SAP, see SAP official documents.
Table 3 Security group rules (SAP HANA)

Source/Destination

Protocol

Port Range

Description

Inbound

10.0.0.0/24

TCP

3##13

Allows SAP HANA Studio to access SAP HANA.

10.0.0.0/24

TCP

3##15

Provides ports for the service plane.

10.0.0.0/24

TCP

3##17

Provides ports for the service plane.

10.0.0.0/24

TCP

5##13

Allows SAP HANA Studio to access sapstartsrv.

10.0.0.0/24

TCP

22

Allows SAP HANA to be accessed using SSH.

10.0.0.0/24

TCP

43##

Allows access to XS Engine from the 10.0.0.0/24 subnet using HTTPS.

10.0.0.0/24

TCP

80##

Allows access to XS Engine from the 10.0.0.0/24 subnet using HTTP.

10.0.0.0/24

TCP

8080 (HTTP)

Allows Software Update Manager (SUM) to access SAP HANA using HTTP.

10.0.0.0/24

TCP

8443 (HTTPS)

Allows Software Update Manager (SUM) to access SAP HANA using HTTPS.

10.0.0.0/24

TCP

1128-1129

Allows access to SAP Host Agent using SOAP/HTTP.

Automatically specified by the system

All

All

Security group rule created by the system by default

It enables ECSs in the same security group to communicate with each other.

Outbound

All

All

All

Security group rule created by the system by default

Allows all peers to access SAP HANA.

Table 4 Security group rules (SAP HANA Studio)

Source/Destination

Protocol

Port Range

Description

Inbound

0.0.0.0/0

TCP

3389

Allows users to access SAP HANA Studio using RDP.

This rule is required only when SAP HANA Studio is deployed on a Windows ECS.

0.0.0.0/0

TCP

22

Allows users to access SAP HANA Studio using SSH.

This rule is required only when SAP HANA Studio is deployed on a Linux ECS.

Automatically specified by the system

All

All

Security group rule created by the system by default

It enables ECSs in the same security group to communicate with each other.

Outbound

All

All

All

Security group rule created by the system by default

Allows all peers to access SAP HANA Studio.

Table 5 Security group rules (NAT server)

Source/Destination

Protocol

Port Range

Description

Inbound

0.0.0.0/0

TCP

22

Allows users to access the NAT server using SSH.

10.0.3.0/24

TCP

80 (HTTP)

Allows users to access the NAT server using HTTP.

10.0.3.0/24

TCP

443 (HTTPS)

Allows users to access the NAT server using HTTPS.

Automatically specified by the system

All

All

Security group rule created by the system by default

It enables ECSs in the same security group to communicate with each other.

Outbound

10.0.3.0/24

TCP

22 (SSH)

Allows the NAT server to access the 10.0.3.0 subnet using SSH.

0.0.0.0/0

TCP

80 (HTTP)

Allows the NAT server to access any network where VPC instances reside using HTTPS.

0.0.0.0/0

TCP

443 (HTTPS)

Allows the NAT server to access any network where VPC instances reside using HTTPS.