Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents
maxLevel3

Introduction

Purpose

The purpose of this document is to outline the infrastructure and network architecture for SyWay project.

Scope

This document describes the high-level infrastructure and network design for SAP RISE and non-RISE deployments. It also covers the network design for specialized integration scenarios and deployment in China region.

...

  • Infrastructure and network design for SaaS applications.
  • SD-WAN and cloud infrastructure detailed design or configurations.
  • Existing Syensqo systems that SyWay project integrates with.
  • SAP RISE and Azure operating model.

Assumptions

  • Azure will be chosen as SyWay cloud service provider for all regions.
  • Syensqo network will connect to Azure tenants via ExpressRoute for all regions
  • Standard SAP RISE integration patterns will be leveraged when integrating S/4HANA, SAP connectors and SAP SaaS applications. 
  • As of writing this document, there are pending architectural decisions regarding North America & China , and RISE infrastructure. These designs will be added to this document as they are finalized.

Overview

SyWay systems can be classified into 3 hosting models:

...

In addition to the different hosting models, SyWay systems can be deployed to 1 or more regions (North America, Europe EU or to both EU and China )regions. The  The figure below describes how SyWay systems are deployed are deployed across Syensqo’s network.

Info

The design for China SDWAN Hub is in progress and the diagram below will be updated after Syensqo network team completes the design. 

draw.io Diagram
bordertrue
diagramNameUntitled Diagram-1744691252359
simpleViewerfalse
width1250
linksauto
tbstyletop
lboxtrue
diagramWidth13321591
height901509
revision34

Infrastructure Architecture

SAP RISE

Overview

S/4HANA is hosted in SAP RISE along with supporting connectors and web dispatchers. SyWay project would leverage a common Sandbox, Development landscape that are deployed in Europe region and individual Integration Testing, Training, UAT, Parallel Testing and Production systems that are deployed to all three EU and China regions.

The table below lists the landscape, systems and the corresponding system ID (SID) for the three different regions.

WR2North AmericaTBCTBCTBC

China

N/

Region

Landscape

Systems

S/4HANA (HANA DB)

Web Dispatcher

SAP Cloud connector

SAP Data Provisioning Agent

SAC Agent

OpenText Connector

Europe

Sandbox

ERS (HRS)

WRS

N/A

N/A

N/A

N/A

Development

ERD (HRD)

WRD

CRD1

DRD1

SRD1

ORD1

Integration Testing

ERT (HRT)

WRT

N/A

N/A

N/A

N/A

Training

ER2 (HR2)

N/A

N/A

N/A

N/A

N/A

UAT

ERQ (HRQ)

WRQ

N/A

N/A

N/A

N/A

Parallel TestingRun

ER1 (HR1)

WR13

N/A

N/A

N/A

N/A

Production

ERP (HRP)

WRP & WRH

CRP

DRP

SRP

ORP



China

Integration Testing

TBC

TBC

TBC1

TBC1

TBC1

TBC1

Training

TBC

Development

ECD (HCD)2

WCD2

CCD1

DCD1

SCD1

OCD1

Integration Testing

ECT (HCT)

WCT

N/A

N/A

N/A

N/A

UAT

TBC

Training

EC2 (HC2)

N/A

N/A

N/A

N/A

N/A

UAT

ECQ (HCQ)

WCQ

Parallel Testing

TBC

N/A

N/A

N/A

N/A

Production

TBC

TBC

TBC

TBC

TBC

TBC

Parallel Run

EC1 (HC1)

WC13

N/A

N/A

N/

Integration Testing

TBC

TBC

TBC1

TBC1

TBC1

TBC1

Training

TBC

TBC

A

N/A

N/A

N/A

UAT

TBC

TBC

N/A

N/A

N/A

N/A

Parallel Testing

TBC

TBC

N/A

N/A

N/A

N/A

Production

TBC

TBC

TBC

TBC

TBC

TBC

 1System shared across all non-PRD systems

Landscape Provisioning

The following diagrams illustrates the different RISE landscapes that are provision for the different phases. Post Go-Live, INT and PAR landscapes will be decommissioned and a 5 tier landscape will be maintained.

Europe

Image Removed

High Availability and Disaster Recovery

The table below summaries the SLA for HA and DR for production and non-production systems

Production

ECP (HCP)

WCP

CCP

DCP

SCP

OCP

 1System shared across all non-PRD systems.

2SAP RISE requires each region to host a development system which will be used for RISE administrations (e.g., upgrades). Hence ECD and WCD will be in the landscape and will be added to the transport route but not have a system role.

3Web dispatcher will be shared between Parallel Run and Training landscape. 

Post Go-Live Landscape

Post release 4 Group 2 go-live a 4-tier landscape (DEV, QAS, PAR and PRD) will be maintained. SBX, INT and TRG landscapes will be decommissioned. 

LandscapeAvailability SLARPORTOProduction99.9%0Contractually-guaranteed: 12 hours
Achievable: ~10 minutesNon-Production98%

Region

Landscape

Systems

S/4HANA (HANA DB)

Web Dispatcher

SAP Cloud connector

SAP Data Provisioning Agent

SAC Agent

OpenText Connector

Europe

Development

ERD (HRD)

WRD

CRD1

DRD1

SRD1

ORD1

UAT

ERQ (HRQ)

WRQ

N/A

N/A

N/A

N/A

Parallel Testing

ER1 (HR1)

WR1

N/A

N/A

N/A

N/A

S/4HANA

In SAP RISE, High Availability (HA) and Disaster Recovery (DR) is applicable to Production instances. For SyWay project, S/4HANA Production is provisioned with the following RISE add-ons.

  • Short distance disaster recovery
  • 99.9% SLA

With these add-ons, S/4HANA production is deployed across 2 availability zones with synchronous database replication and automated fail-over via pacemaker clusters as shown below.

draw.io Diagram
bordertrue
diagramNameSAP HA-DR
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth453
height488
revision3

The table below describes how HA is achieved for the different components.

...

Production

ERP (HRP)

WRP & WRH

CRP

DRP

SRP

ORP

China

Development

ECD (HCD)2

WCD2

CCD1

DCD1

SCD1

OCD1

UAT

ECQ (HCQ)

WCQ

N/A

N/A

N/A

N/A

Parallel Testing

EC1 (HC1)

WC1

N/A

N/A

N/A

N/A

Production

ECP (HCP)

WCP & WCH

CCP

DCP

SCP

OCP

 1System shared across all non-PRD systems.

2SAP RISE requires each region to host a development system which will be used for RISE administrations (e.g., upgrades). Hence ECD and WCD will be in the landscape and will be added to the transport route but not have a system role.

High Availability and Disaster Recovery

The table below summaries the SLA for HA and DR for production and non-production systems

LandscapeAvailability SLARPORTO
Production99.9%0Contractually-guaranteed: 12 hours
Achievable: ~10 minutes
Non-Production98%N/AN/A

S/4HANA

In SAP RISE, High Availability (HA) and Disaster Recovery (DR) is applicable to Production instances. For SyWay project, S/4HANA Production is provisioned with the following RISE add-ons.

  • Short distance disaster recovery
  • 99.9% SLA

With these add-ons, S/4HANA production is deployed across 2 availability zones with synchronous database replication and automated fail-over via pacemaker clusters as shown below.

draw.io Diagram
bordertrue
diagramNameSAP HA-DR
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth453
height488
revision3

The table below describes how HA is achieved for the different components.

ComponentHA Design
Web DispatcherDeployed to both AZs in active-active configuration and Azure load balancer is used to distribute incoming HTTP traffic to both instances.
S/4HANA Application serversTwo application servers are deployed to each AZs in an active-active configuration.
S/4HANA Message server (SCS & ERS)Pacemaker cluster is configured between SCS and ERS servers to ensure SCS & ERS services fails over accordingly in the event of a failure.
SAPMNT Shared folderNetApp files is used to host the SAPMNT shared folder and is mounted across all S/4HANA application, SCS and ERS servers.
HANA DBTwo HANA nodes are deployed across 2 AZs in an active-standby configuration. HANA synchronous replication is configured to replicate data from the active to standby node. Pacemaker cluster is configured to ensure that the standby node is promoted to active node in the event of a failure.

SAP Connectors

Two instances of SAP Cloud connectors are deployed across 2 AZs and configured as active-standby nodes. In the event of a failure, the standby node will take over as active node

The following connectors do not have out of the box high-availability and will require SAP RISE team to manually failover the system in the event of a failure.

SAP RISE VM Details

Azure RegionEnvironmentSIDPurposePhysical HostnameVirtual HostnameCPUMemory/GBOS
North Europe (Dublin)

SandboxERSApp Server

hec42v331805.irl.sap.eu.cloud.syensqo.com (172.16.33.10)

vhysqersci.sap.eu.cloud.syensqo.com (172.16.33.12)
vhysqerscs.sap.eu.cloud.syensqo.com (172.16.33.11)

1664SUSE SLES15
HRSHANA DBhec42v331250.irl.sap.eu.cloud.syensqo.com (172.16.33.5)

vhysqersdb.sap.eu.cloud.syensqo.com (172.16.33.13)
vhysqhrsdb01.sap.eu.cloud.syensqo.com (172.16.33.8)
vhysqhrsdb.sap.eu.cloud.syensqo.com (172.16.33.7)

32256SUSE SLES15
WRSWeb Dispatcherhec42v331253.irl.sap.eu.cloud.syensqo.com (172.16.33.6)

vhysqwrswd01.sap.eu.cloud.syensqo.com (172.16.33.9)

28SUSE SLES15
DevelopmentERDApp Serverhec42v303048.irl.sap.eu.cloud.syensqo.com (172.16.33.48)

vhysqerdci.sap.eu.cloud.syensqo.com (172.16.33.49)
vhysqerdcs.sap.eu.cloud.syensqo.com (172.16.33.50)

864SUSE SLES15
HRDHANA DB

hec42v302672.irl.sap.eu.cloud.syensqo.com (172.16.33.37)

vhysqerddb.sap.eu.cloud.syensqo.com (172.16.33.51)
vhysqhrddb01.sap.eu.cloud.syensqo.com (172.16.33.42)
vhysqhrddb.sap.eu.cloud.syensqo.com (172.16.33.43)

32256SUSE SLES15
WRDWeb Dispatcher

hec42v302675.irl.sap.eu.cloud.syensqo.com (172.16.33.40)

vhysqwrdwd01.sap.eu.cloud.syensqo.com (172.16.33.44)

28SUSE SLES15
CRDCloud Connector

hec42v302678.irl.sap.eu.cloud.syensqo.com (172.16.33.45)

vhysqcrdcc01.sap.eu.cloud.syensqo.com (172.16.33.46)

28SUSE SLES15
DRDData Provisioning Agent

hec42v302676.irl.sap.eu.cloud.syensqo.com (172.16.33.41)

vhysqdrddpa01.sap.eu.cloud.syensqo.com (172.16.33.47)

416SUSE SLES15
SRDSAC Agenthec42v302674.irl.sap.eu.cloud.syensqo.com (172.16.33.39)

vhysqsrdweb01.sap.eu.cloud.syensqo.com (172.16.33.38)

416SUSE SLES15
TRDTM Optimizerhec42v350658.irl.sap.eu.cloud.syensqo.com (172.16.33.52)

vhysqtrdgtw01.sap.eu.cloud.syensqo.com (172.16.33.53)

1664SUSE SLES15
ORDOpenText Connectorhec42v318041.irl

SAP Connectors

Two instances of SAP Cloud connectors are deployed across 2 AZs and configured as active-standby nodes. In the event of a failure, the standby node will take over as active node

Further clarification is required from SAP RISE team post system build regarding HA for the following components.

Non-RISE

Systems that follow an IaaS or on-premises deployment model and are not hosted in SAP RISE, are hosted in Syensqo’s Azure subscription. The following systems are classified as Non-RISE:

  • SAP WWI Server    
  • SAP TM Optimizer    
  • Syniti Replicate    
  • Syniti Connector    
  • SWIFT Connector    
  • Vertex    
  • NextLabs Policy Server

Network Architecture 

Overview

The figure below describes the overall network connectivity for SAP RISE and non-RISE Azure VNets.

  • SAP RISE Tenant is provisioned in the same region as Syensqo Azure tenant.
  • ExpressRoute circuits and ExpressRoute Gateway are provisioned in SAP RISE Tenant. 
  • Syensqo regional firewall and SAP RISE ExpressRoute circuit are connected via Megaport Virtual Cross Connect (VXC) managed by Syensqo IT.
  • Non-RISE vNET is provisioned in Syensqo Azure tenant and Syensqo Azure Hub will be leveraged for the management of Non-RISE vNET.
  • Network traffic between SAP RISE and Non-RISE systems will be routed through Megaport and Syensqo Azure Hub.
  • Since NextLabs application requires low latency network connectivity to S/4HANA, a separate vNET will be provisioned to host NextLabs application and vNET peering will be configured between SAP RISE and NextLab vNETs.
  • Azure NSG will be used to secure the network traffic between SAP RISE and NextLabs vNET.
  • vNET peering will also be configured between Syensqo Hub and NextLabs vNETs for management purposes. 

draw.io Diagram
bordertrue
diagramNameRISE Connection
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth1054
height700
revision8

The table below lists down the regional hub and Azure edge location for NAM, EMEA and China regions.

...

IP Allocation

SAP RISE 

The 172.16.32.0/19 IP range has been allocated for SAP RISE globally. The following table lists down the IP allocation for the different regions and subnets.

...

172.16.34.0/25

...

172.16.34.0 - 172.16.34.127

...

126

...

172.16.34.128/25

...

172.16.34.128 - 172.16.34.255

...

126

...

172.16.32.0/24

...

172.16.32.0 - 172.16.32.255

...

254

...

172.16.33.0/27

...

30

...

172.16.33.64/27

...

30

...

172.16.33.128/27

...

30

...

172.16.33.192/27

...

30

...

172.16.34.0/27

...

30

...

172.16.34.64/27

...

30

...

172.16.37.128/25

...

126

...

172.16.38.0/24

...

172.16.38.0 - 172.16.38.255

...

254

...

172.16.36.0/22

...

-

...

172.16.44.0 - 172.16.47.255

...

1022

...

-

...

172.16.48.0 - 172.16.63.255

...

4094

DNS Architecture

Domain Name

The following domains names are used for the respective RISE regions.

RISE RegionSAP RISE DomainNon-RISE DomainEurope*
.sap.eu.cloud.syensqo.com

TBC

North America*
 (172.16.33.54)

vhysqordotc01

.sap.

us

eu.cloud.syensqo.com

TBC

China 

(172.16.33.55)

416SUSE SLES15
Integration TestERTApp Serverhec42v350888.irl
*
.sap.
cn
eu.cloud.syensqo.com
TBC

DNS Integration

SAP RISE supports 3 different DNS integration types: DNS Zone Transfer, Conditional DNS Forwarding and DNS Domain Delegation.

Conditional DNS Forwarding has been chosen for Syensqo for the following reasons:

  • Reduced network traffic and complexity.
  • Limits security exposure by only forwarding queries for specified domains.
  • Easier to manage in the event Syensqo changes it DNS provider.
  • Simple configuration and maintenance.

The table below lists the Syensqo and SAP DNS servers that are integrated.

 (172.16.33.74)

vhysqertci.sap.eu.cloud.syensqo.com (172.16.33.76)
vhysqertcs.sap.eu.cloud.syensqo.com (172.16.33.75)

1664SUSE SLES15
HRTHANA DBhec42v350674.irl.sap.eu.cloud.syensqo.com (172.16.33.71)

vhysqertdb.sap.eu.cloud.syensqo.com (172.16.33.77)
vhysqhrtdb01

RegionSyensqo Primary DNSSAP RISE DNSEurope

Primary - 172.18.164.7 (DNS_EMEA_01)

Secondary - 172.18.164.22 (DNS_EMEA_02)

DNS –CSN-A-HA IP - 172.16.32.14 (vhysqirlcsna-ha.irl

.sap.eu.cloud.syensqo.com

)

DNS –CSN-B-HA IP - 172.16.32.30 (vhysqirlcsnb-ha.irl.sap.eu.cloud.syensqo.com)

DNS –CSN-C-HA IP - 172.16.32.46 (vhysqirlcsnc-ha.irl.sap.eu.cloud.syensqo.com)

North America

Primary - 172.19.113.69 (DNS_US_01)

Secondary - 172.19.113.86 (DNS_US_02)

TBCChina

Primary - 172.23.193.86 (DNS_APAC_02)

Secondary - 172.23.193.70 (DNS_APAC_01)

TBC

Network Firewall

For SyWay project, the following firewalls will be leveraged to manage the corresponding traffic.

...

Firewall

...

Network Traffic

...

Regional Hub Firewall

...

  • Incoming network traffic to SAP RISE..

  • Outgoing network traffic from SAP RISE.

...

Syensqo Azure Firewall

...

  • Incoming network traffic to Non-RISE and NextLabs vNETs.

  • Outgoing network traffic from Non-RISE and NextLabs vNETs.

(172.16.33.73)
vhysqhrtdb.sap.eu.cloud.syensqo.com (172.16.33.72)

64512SUSE SLES15
WRDWeb Dispatcher

hec42v349378.irl.sap.eu.cloud.syensqo.com (172.16.33.69)

vhysqwrtwd01.sap.eu.cloud.syensqo.com (172.16.33.70)

28SUSE SLES15

China North 3 (Hebei)



DevelopmentECDApp Serverhec60v072245.chn1.sap.cn.cloud.syensqo.com

vhycdecdci.sap.cn.cloud.syensqo.com
vhycdecdcs.sap.cn.cloud.syensqo.com

832SUSE SLES15
HCDHANA DBhec60v072019.chn1.sap.cn.cloud.syensqo.com

vhycdecddb.sap.cn.cloud.syensqo.com 
vhycdhcddb01.sap.cn.cloud.syensqo.com

32256SUSE SLES15
WCDWeb Dispatcherhec60v072016.chn1.sap.cn.cloud.syensqo.com

vhycdwcdwd01.sap.cn.cloud.syensqo.com

28SUSE SLES15
CCDSAP Cloud connectorhec60v072124.chn1.sap.cn.cloud.syensqo.com

vhycdccdcc01.sap.cn.cloud.syensqo.com

28SUSE SLES15
DCDData Provisioning Agenthec60v072234.chn1.sap.cn.cloud.syensqo.com 

vhycddcddpa01.sap.cn.cloud.syensqo.com

416SUSE SLES15
SCDSAC Agenthec60v072237.chn1.sap.cn.cloud.syensqo.com

vhycdscdweb01.sap.cn.cloud.syensqo.com

416SUSE SLES15
TCDTM Optimizerhec60v072226.chn1.sap.cn.cloud.syensqo.com

vhycdtcdgtw01.sap.cn.cloud.syensqo.com

1664SUSE SLES15
Integration TestECTApp Serverhec60v072421.chn1.sap.cn.cloud.syensqo.com

vhycdectci.sap.cn.cloud.syensqo.com
vhycdectcs.sap.cn.cloud.syensqo.com

1664SUSE SLES15
HCTHANA DBhec60v072123.chn1.sap.cn.cloud.syensqo.com

vhycdectdb.sap.cn.cloud.syensqo.com
vhycdhctdb01.sap.cn.cloud.syensqo.com

64512SUSE SLES15

Non-RISE

Overview

Systems that follow an IaaS or on-premises deployment model and are not hosted in SAP RISE, are hosted in Syensqo’s Azure subscription. The following systems are classified as Non-RISE. Depending on complexity, separate documents may be used to describe the architecture for these applications. 

Application

Region

Dev

INT

UAT

TRG

PAR

PRD

SAP WWI Server

EU

Non-PRD

PRD

China

-

Non-PRD

PRD

Syniti Replicate

EU

PRD

China

PRD

Syniti Connector

EU

PRD

China

PRD

NextLabs

EU

DEV

QAS

-

PAR

PRD

OpenText xECM

EU

DEV

QAS

PRD

China

-

QAS

PRD

Hosting Region

Following considerations were taken into account in deciding the Azure hosting regions

  • NextLabs provides attribute-based access control (ABAC) and evaluates access to sensitive data during runtime execution. To prevent performance issues, NextLabs will require low latency network connection to S/4HANA.
  • NextLabs have its own Azure subscription and will be hosted in the same region & physical zone as S/4HANA. vNET peering will be established between SAP RISE and NextLabs vNET to achieve low latency connectivity.
  • Other applications can be hosted in region that is in line with Syensqo's Azure deployment strategy. 
  • Different subscriptions will be created for different environment: non-PRD, Pre-PRD and PRD
RegionCategorySubscriptionsAzure Region
EUNextLabs3 (non-PRD, Pre-PRD, PRD)North Europe (Dublin)
Non-RISE (excluding NextLabs)2 (non-PRD, PRD)France Central (Paris)
ChinaNon-RISE2 (non-PRD, PRD)

TBC

Azure Low Level Design

Azure landscape for SyWay is managed my Syensqo IT as part of their overall Azure management. See Azure management roles and responsibility for more details. 

RegionCategoryLLD 
EUNextLabsLink
Non-RISE (excluding NextLabs)
ChinaNon-RISE

Following tables lists down SyWay Azure details.

CategoryEnvironmentAzure Subscription NamevNETStorage AccountKey vault
NextLabsDEV & QASOTH - Next Lab - 00azrneuvntdnlasha0000azrneustodnlasha0000azrneukvtdnlasha0000




  

VM Details

CategoryEnvironmentApplicationVM NameIPVM TypeOS DiskData DiskOS
NextLabsDEVNextLabs Control Centerazrneuvmldnlaapp0000172.16.48.5Standard D4s v5128GB128GBRHEL 9.4
NextLabs Policy Controllerazrneuvmldnlaapp0100172.16.48.6Standard D4s v5128GB64GBRHEL 9.4

SQL Server

CategoryEnvironmentApplicationSQL ServerSQL DBIPSchema
NextLabsDEVNextLabs azrneuvmldnlaapp0000azrneusdbdnlasha0000172.16.48.20dbo

Shared File Systems

EnvironmentStorage accountPurpose TypeShare name
DEVazrneustodnlasha0000
NextLabs installation filesAzure filesdae-install-dev
NextLabs working directoryAzure filesdae-working-dev
ERS interface shared folderAzure filesinterface-ers
ERD interface shared folderAzure filesinterface-erd

Network Architecture 

Europe 

The figure below describes the overall network connectivity for SAP RISE and non-RISE Azure vNETs in Europe.

SAP RISE

  • SAP RISE tenant is deployed in Azure North Europe. 
  • Connection SAP RISE is established via ExpressRoute which is connecting through Megaport Paris and Dublin.

Non-RISE

  • Non-RISE systems will be deployed in Azure France Central. 
  • Workloads are deployed to Non-PRD and PRD vNETs.
  • Syensqo Azure shared services deployed in Azure France Central leveraged for SyWay non-RISE systems.
  • Connection between SAP RISE and non-RISE will traverse Megaport EMEA hub.

NextLabs

  • NextLabs systems will be deployed in Azure North Europe (same region as SAP RISE).
  • Workloads are deployed to 4 vNETs: DEV, QAS, PAR and PRD
  • Connection to Syensqo WAN will be established via Azure vWAN and ExpressRoute in Paris. 
  • vNET Peering is configured between the HUB vNET and and SAP RISE, and HUB vNET and the 4 NextLabs vNETs.
  • Azure firewall is deployed in the HUB vNET to route traffic between SAP RISE and NextLabs.
  • Syensqo Azure shared services deployed in Azure North Europe leveraged for SyWay NextLabs systems.

draw.io Diagram
bordertrue
diagramNameUntitled Diagram-1761724000735
simpleViewerfalse
width1250
linksauto
tbstyletop
diagramDisplayName
lboxtrue
diagramWidth1557
height865
revision12

China

TBC

SAP RISE ExpressRoute Design

The table below lists down the regional hub and Azure edge location for NAM, EMEA and China regions.

RegionMegaport LocationAzure Edge locationSAP RISE RegionNon-RISE Region
EuropeParis Equinix PA2/3 & Paris Interxion PAR5DublinAzure North Europe (Dublin)Azure France Central (Paris)
ChinaTBCTBC

Azure China North 3 (Hebei)

TBC

Europe

The following diagram describes the ExpressRoute design between Megaport and SAP RISE in EU region.  

Image Added

China

TBC

IP Allocation

The 172.16.32.0/19 IP range has been allocated for SyWay. The following table lists down the IP allocation for the different regions and subnets.

RegionLandscapeCIDRNetwork NameIP AllocationRangeUsable Hosts
EuropeSAP RISE172.16.32.0/22Production

172.16.34.0/25

172.16.34.0 - 172.16.34.127

126

Production (HA components)

172.16.34.128/25

172.16.34.128 - 172.16.34.255

126

ECS Services

172.16.32.0/24

172.16.32.1 - 172.16.32.254 254
Sandbox

172.16.33.0/27

172.16.33.1 - 172.16.33.30

30

Development

172.16.33.32/27

172.16.33.33 - 172.16.33.62

30

Integration Test

172.16.33.64/27

172.16.33.65 - 172.16.33.94

30

QA / UAT

172.16.33.96/27

172.16.33.97 - 172.16.33.126

30

Pre-Production (PAR)

172.16.33.128/27

172.16.33.129 - 172.16.33.158

30

Training

172.16.33.160/27

172.16.33.161 - 172.16.33.190

30

Non-Prod Reserve 

172.16.33.192/27

172.16.33.193 - 172.16.33.222

30

Tools / Other Needs

172.16.33.224/27

172.16.33.225 - 172.16.33.254

30

Unassigned

172.16.35.0/24

172.16.35.1 - 172.16.35.254

254

NextLabs

172.16.48.0/23

Production172.16.49.0/25172.16.49.0 - 172.16.49.127 126
HUB172.16.49.128/25172.16.49.128 - 172.16.49.255 126
Pre-Production (PAR)172.16.48.128/25172.16.48.128 - 172.16.48.255 126
OTH (DEV & QAS)172.16.48.0/25172.16.48.0 - 172.16.48.127126

Non-RISE

TBC

TBCTBCTBCTBC
China

SAP RISE

172.16.36.0/22

TBCTBC172.16.36.0 - 172.16.39.2551022

Non-RISE

TBC

TBCTBCTBCTBC
Unassigned
Unassigned172.16.52.0/222-

-

172.16.52.0 - 172.16.55.255 1022
Unassigned172.16.56.0/21-

-

172.16.56.0 - 172.16.63.255 2046
Unassigned

172.16.40.0/21

-

-

172.16.40.0 - 172.16.47.2552046
Unassigned

172.16.50.0/23

-

-

172.16.50.0 - 172.16.51.255 510

DNS Architecture

Domain Name

The following domains names are used for the respective RISE regions.

RISE RegionSAP RISE DomainNon-RISE Domain (incl. NextLabs)
Europe

*.sap.eu.cloud.syensqo.com

*.azure.cloud.syensqo.com

China 

*.sap.cn.cloud.syensqo.com

*.cn.azure.cloud.syensqo.com

DNS Integration

2-way DNS integration is configured between Syensqo and SAP RISE DNS. 

  • Syensqo DDI team has select DNS Domain Delegation as the integration method. Syensqo DNS are configured to redirect SAP RISE DNS queries to the respective SAP RISE DNS deployed in the different regions.
  • SAP RISE DNS have a DNS forwarder configured to redirect all Syensqo DNS queries to the respective Syensqo regional DNS servers. 

The table below lists the Syensqo and SAP RISE DNS servers.

RegionSyensqo DNSSAP RISE DNS
Europe

172.23.128.104
10.53.73.3
10.129.131.52
10.129.131.53
172.18.180.142
172.18.181.116
172.19.1.42
172.19.1.57
10.237.6.11
10.233.6.5
172.23.193.70
172.23.193.86
172.18.164.7
172.18.164.22
172.19.113.69
172.19.113.86

DNS –CSN-A-HA IP - 172.16.32.14 (vhysqirlcsna-ha.irl.sap.eu.cloud.syensqo.com)

DNS –CSN-B-HA IP - 172.16.32.30 (vhysqirlcsnb-ha.irl.sap.eu.cloud.syensqo.com)

DNS –CSN-C-HA IP - 172.16.32.46 (vhysqirlcsnc-ha.irl.sap.eu.cloud.syensqo.com)

ChinaTBC

Network Firewall

For SyWay project, the following firewalls will be leveraged to manage the corresponding traffic.

Firewall

Network Traffic

Regional Hub Firewall

  • Incoming network traffic to SAP RISE..

  • Outgoing network traffic from SAP RISE.

Syensqo Azure Firewall

  • Incoming network traffic to Non-RISE and NextLabs vNETs.

  • Outgoing network traffic from Non-RISE and NextLabs vNETs.

Internet Traffic

To connect SyWay systems deployed in Azure (SAP RISE or non-RISE) and SaaS applications, a middleware (i.e., using Cloud connector and SAP Integration Suite ) based integration approach will be preferred. If the integration scenario requires direct connection between S/4HANA and SaaS applications, the following sections covers how inbound and outbound network connections can be established.    

Outbound Internet Traffic

draw.io Diagram
bordertrue
diagramNameOutbound Internet Traffice
simpleViewerfalse
width800
linksauto
tbstyletop
lboxtrue
diagramWidth768
height581
revision15

  • Outbound HTTPS traffic from SAP RISE is routed through the Customer Gateway server which has an internet proxy (Squid Proxy) installed in the VM.
  • Outbound non-HTTP traffic (e.g., SDTP) from SAP RISE is NAT-ed via Azure Standard Load Balancer. 
  • Outbound internet traffic from Non-RISE application is routed to Azure firewall in Syensqo Hub. 

The following outbound traffic is configured in SAP RISE.

SourceDestinationPort/ProtocolMethod
All S/4HANA Application serverMailjet (34.22.188.249)587/SMTP TLSAzure Load balancer

Following is the Customer Gateway server connection details.

RegionHostnamePort
EUproxy3128
China

Inbound Internet traffic

Info

Currently there is no requirements for inbound internet traffic to SAP RISE and non-RISE systems. This method of connectivity will be considered if there are no other alternatives and will require cybersecurity approval. 

draw.io Diagram
bordertrue
diagramNameInbound Internet traffic

Internet Traffic

All inbound and outbound internet traffic are filtered by the firewalls hosted in Megaport except for integration scenarios mentioned in integration section.

Outbound Internet Traffic

draw.io Diagram
bordertrue
diagramNameOutbound Internet Traffice
simpleViewerfalse
width800
linksauto
tbstyletop
lboxtrue
diagramWidth825
height581582
revision8

  • Outbound internet traffic from SAP RISE is routed to the regional hub firewall which filters the traffic before allowing it to the external application.
  • Outbound internet traffic from Non-RISE application is routed to Azure firewall in Syensqo Hub which filters the traffic before allowing it to the external application.

If the external application requires source IP to be whitelisted before accepting the connection, a public IP can be assigned at the respective firewall.

Inbound Internet traffic

...

  • SAP RISE uses Azure Application Gateway with Web Application Firewall to manage inbound HTTPS traffic. Non-HTTP inbound traffic are not permitted and will required further approvals from SAP.
  • For non-RISE, Syensqo's Azure DMZ which uses Azure WAF + Application Gateway will be leveraged. Incoming HTTPS will also be filtered through Azure firewall in Syensqo Hub vNET before it is routed to the non-RISE vNET. 

User Access

The following sections describes how SAP RISE and non-RISE systems are access by users within (internal) and outside (external) Syensqo network. For SaaS application access, users can access them through their existing internet access. 

These section cover the network perspective and does not include the authentication processes where single sign-on will be configured with Syensqo Identity provider.

Internal Access

End users will access SyWay systems via browser, mobile app or SAPGUI (for S/4HANA) (refer KDD036). The figure below describes the network traffic from user's terminal to SyWay systems.

draw.io Diagram
bordertrue
diagramName
Inbound Internet traffic
Internal access
simpleViewerfalse
width
800
1000
linksauto
tbstyletop
lboxtrue
diagramWidth
825
1507
height
581
681
revision
6
5

  • Inbound internet traffic to SAP RISE are filtered through the regional firewall before it is routed to SAP RISE.
  • Inbound internet traffic to non-RISE vNET are filtered through Azure firewall in Syensqo Hub vNET before it is routed to the non-RISE vNET. 

User Access

The following sections describes how SAP RISE and non-RISE systems are access by users within (internal) and outside (external) Syensqo network. For SaaS application access, users can access them through their existing internet access. 

These section cover the network perspective and does not include the authentication processes where single sign-on will be configured with Syensqo Identity provider.

Internal Access

End users will access SyWay systems via browser, mobile app or SAPGUI (for S/4HANA) (refer KDD036). The figure below describes the network traffic from user's terminal to SyWay systems.

draw.io Diagram
bordertrue
diagramNameInternal access
simpleViewerfalse
width1000
linksauto
tbstyletop
lboxtrue
diagramWidth1507
height681
revision5

SAP RISE Web Access:

  • Primary mode of access for SAP RISE system is through HTTPS.  
  • User's HTTPS traffic is routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection. 
  • In SAP RISE, Azure load balancer is provisioned to load balance the incoming HTTPS traffic to SAP web dispatchers.
  • SAP web dispatchers act as  proxies and forward the request to S/4HANA application server. 

SAP RISE SAPGUI Access

  • SAP administrators and support staff may access S/4HANA using SAPGUI which uses TCP protocol.
  • User's SAPGUI connections are routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection. 
  • In SAP RISE, a pacemaker cluster is configured between SCS and ERS servers for HA and Azure load balancer is used to direct network traffic to the active SCS node.
  • SCS redirects users to one of the available S/4HANA application server and there after, the communication is directly between user's SAPGUI and the application server.

Non-RISE Access:

  • User traffic is routed from Syensqo local site network to Syensqo's Hub vNET through SDWAN, Megaport and ExpressRoute connection. 
  • In the hub vNET, traffic is filtered through Azure firewall before being routed to Non-RISE vNET and non-RISE application.

SaaS:

  • Primary mode of access for SaaS applications is via HTTPS.  
  • User's HTTPS traffic is routed from Syensqo local site network to Zscaler which acts as a proxy and connects to the SaaS applications. 

External Access

No direct external access from the internet is enabled for SyWay systems hosted in RISE. Users with a Syensqo-issued device can access systems hosted in RISE from outside the Syensqo network via ZScaler Private Access (ZPA).

SAP has deployed ZPA App Connectors in the RISE vNET, and allows connections from Syensqo's Zscaler Exchange as shown below.

Image Removed

...

The following sections describes the network design and flow for the following integration scenarios.

SAP Cloud Connector

The SAP Cloud connector are deployed in SAP RISE and acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and S/4HANA.

To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.

SAP RISE Web Access:

  • Primary mode of access for SAP RISE system is through HTTPS.  
  • User's HTTPS traffic is routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection. 
  • In SAP RISE, Azure load balancer is provisioned to load balance the incoming HTTPS traffic to SAP web dispatchers.
  • SAP web dispatchers act as  proxies and forward the request to S/4HANA application server. 

SAP RISE SAPGUI Access

  • SAP administrators and support staff may access S/4HANA using SAPGUI which uses TCP protocol.
  • User's SAPGUI connections are routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection. 
  • In SAP RISE, a pacemaker cluster is configured between SCS and ERS servers for HA and Azure load balancer is used to direct network traffic to the active SCS node.
  • SCS redirects users to one of the available S/4HANA application server and there after, the communication is directly between user's SAPGUI and the application server.

Non-RISE Access:

  • User traffic is routed from Syensqo local site network to Syensqo's Hub vNET through SDWAN, Megaport and ExpressRoute connection. 
  • In the hub vNET, traffic is filtered through Azure firewall before being routed to Non-RISE vNET and non-RISE application.

SaaS:

  • Primary mode of access for SaaS applications is via HTTPS.  
  • User's HTTPS traffic is routed from Syensqo local site network to Zscaler which acts as a proxy and connects to the SaaS applications. 

External Access

No direct external access from the internet is enabled for SyWay systems hosted in RISE. Users with a Syensqo-issued device can access systems hosted in RISE from outside the Syensqo network via ZScaler Private Access (ZPA).

ZPA App Connectors will be deployed in non-RISE Azure vNET and will be registered with Syensqo's Zscaler Exchange. Users will connect from their terminal using Zscaler client connector and the network traffic will traverse as shown below. 

draw.io Diagram
bordertrue
diagramNameUntitled Diagram-1754646172546
simpleViewerfalse
width
linksauto
tbstyletop
lboxtrue
diagramWidth1313
height255
revision3

Anchor
Integration
Integration
Integration

The following sections describes the network design and flow for the following integration scenarios.

SAP Cloud Connector

The SAP Cloud connector are deployed in SAP RISE and acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and S/4HANA.

To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.

draw.io Diagram
bordertrue
diagramNameUntitled Diagram-1744869525625
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth839
height312
revision9

EIM Data Provisioning Agent

EIM Data Provisioning Agent (DPA) is used to integrate S/4HANA and SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere. 

DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.   

draw.io Diagram
bordertrue
diagramNameDPA
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth761
height313
revision4

OpenText Connector

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS.

The HTTPS protocol is used for communication between all components. 

draw.io Diagram
bordertrue
diagramNameOpenText
draw.io Diagram
bordertrue
diagramNameUntitled Diagram-1744869525625
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth839761
height312
revision9

EIM Data Provisioning Agent

EIM Data Provisioning Agent (DPA) is used to integrate S/4HANA and SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere. 

3

SAP Router

SAP has configured a VPN connection between the Syensqo SAP RISE tenant and SAP's Management network (used by SAP support). SAP Router is deployed in SAP RISE to manage SAP support's connection to SAP systems.DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.   

draw.io Diagram
bordertrue
diagramNameDPA
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth761
height313
revision4

OpenText Connector

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS.

The HTTPS protocol is used for communication between all components. 

draw.io Diagram
bordertrue
diagramNameOpenText
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth761
height312
revision3

SAP Router

SAP has configured a VPN connection between the Syensqo SAP RISE tenant and SAP's Management network (used by SAP support). SAP Router is deployed in SAP RISE to manage SAP support's connection to SAP systems.

...

SAP Router
simpleViewerfalse
linksauto
tbstyletop
lboxtrue
diagramWidth801
height312
revision1

Appendix

Azure Management Roles and Responsibility 
Anchor
role_res
role_res

Following is the roles and responsibility for SyWay's Azure tenants management. 

Domain

Sub-Domain

SyWay

Syensqo Azure

Syensqo Security

Project management

Overall timeline and delivery

A, R

R

R

Application

Application management and administration

A, R

I

I

Application security (authorization, authentication)

A, R

I

I

Infrastructure

Network design and build (vNET & ExpressRoute)

C

A, R

C

VM and Storage requirements 

R

A

I

VM build 

C

A, R

I

Integration with DNS and Syensqo domain

C

A, R

I

Security

Azure Security Architecture for SyWay vNETs

C

R

A, R

Firewall request

R

C

A

Operations

Backup management

R

A, R

I

Monitoring and alerting

R

A, R

I

OS management, access & patching

C

A, R

I

Azure administration (including DaaS)

C

A, R

I

...