| Table of Contents | ||
|---|---|---|
|
Introduction
Purpose
The purpose of this document is to outline the infrastructure and network architecture for SyWay project.
Scope
This document will describe describes the high-level infrastructure and network design for SAP RISE and non-RISE deployments. It will also cover It also covers the network design for specialized integration scenarios and deployment in China region.
Out of scope:
- Infrastructure and network design for SaaS applications as infrastructure and network responsibility falls under the service provider’s responsibility.
- SD-WAN and cloud infrastructure detailed design or configurations as it will be managed by Syensqo IT and SAP RISE.
- Existing Syensqo systems in Syensqo that SyWay project will be integrating integrates with.
Overview
SyWay systems can be classified into 3 hosting models:
Hosting model | Description |
SAP RISE | S/4HANA and SAP applications that are hosted in SAP RISE cloud tenants and managed by SAP. |
Non-RISE | Non-SAP and SAP applications that cannot be hosted in SAP RISE will be hosted in Syensqo Azure tenants. |
SaaS | Applications that follow the SaaS model and managed by the service providers. |
- SAP RISE and Azure operating model.
Assumptions
- Azure will be chosen as SyWay cloud service provider for all regions.
- Syensqo network will connect to Azure tenants via ExpressRoute for all regions
- Standard SAP RISE integration patterns will be leveraged when integrating S/4HANA, SAP connectors and SAP SaaS applications.
- As of writing this document, there are pending architectural decisions regarding China infrastructure. These designs will be added to this document as they are finalized.
Overview
SyWay systems can be classified into 3 hosting models:
Hosting model | Description |
SAP RISE1 | S/4HANA and SAP applications that are hosted in SAP RISE cloud tenants and managed by SAP. |
Non-RISE | On-premise applications that cannot be hosted in SAP RISE and are hosted in Azure tenants managed by Syensqo IT. |
SaaS | Applications that follow the SaaS model and are access from the internet |
1See KDD026 - SAP S/4HANA Deployment Model for the comparison between various deployment options for S/4HANA and the decision.
In addition to the different hosting models, SyWay systems can be deployed to 1 or more region (North America, Europe EU or to both EU and China )regions. The The figure below describes how SyWay systems will be are deployed across Syensqo’s network.
| Info |
|---|
The design for China SDWAN Hub is in progress and the diagram below will be updated after Syensqo network team completes the design. |
| draw.io Diagram | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Infrastructure Architecture
SAP RISE
Overview
S/4HANA will be the core system that will be 4HANA is hosted in SAP RISE along with supporting connectors and web dispatchers. SyWay project will would leverage a common Sandbox, Development , Integration Testing and training landscape that will be landscape that are deployed in Europe region and individual Integration Testing, Training, UAT, Parallel Testing and Production systems that will be are deployed to all 3 EU and China regions.
The table below describes lists the landscape and systems that will be hosted in the 3 , systems and the corresponding system ID (SID) for the three different regions.
Region |
Landscape | Systems | |||||
S/4HANA (HANA DB) | Web Dispatcher | SAP Cloud connector | SAP Data Provisioning Agent | SAC Agent | OpenText Connector | |
Europe | ||||||
SBX
☑
☑
☐
☐
☐
☐
DEV
☑
☑
☑1
☑1
☑1
☑1
INT
☑
☑
☐
☐
☐
☐
TRG
☑
☐
☐
☐
☐
☐
UAT
☑
☑
☐
☐
☐
☐
PAR
☑
☑
☐
☐
☐
☐
PRD
☑
☑
☑
☑
☑
☑
North America
UAT
☑
☑
☑1
☑1
☑1
☑1
PAR
☑
☐
☐
☐
☐
☐
PRD
☑
☑
☑
☑
☑
☑
China
UAT
☑
☑
☑1
☑1
☑1
☑1
PAR
☑
☐
☐
☐
☐
☐
PRD
☑
☑
☑
☑
☑
☑
Sandbox | ERS (HRS) | WRS | N/A | N/A | N/A | N/A | |
Development | ERD (HRD) | WRD | CRD1 | DRD1 | SRD1 | ORD1 | |
Integration Testing | ERT (HRT) | WRT | N/A | N/A | N/A | N/A | |
Training | ER2 (HR2) | N/A | N/A | N/A | N/A | N/A | |
UAT | ERQ (HRQ) | WRQ | N/A | N/A | N/A | N/A | |
Parallel Run | ER1 (HR1) | WR13 | N/A | N/A | N/A | N/A | |
Production | ERP (HRP) | WRP & WRH | CRP | DRP | SRP | ORP | |
China | Development | ECD (HCD)2 | WCD2 | CCD1 | DCD1 | SCD1 | OCD1 |
Integration Testing | ECT (HCT) | WCT | N/A | N/A | N/A | N/A | |
Training | EC2 (HC2) | N/A | N/A | N/A | N/A | N/A | |
UAT | ECQ (HCQ) | WCQ | N/A | N/A | N/A | N/A | |
Parallel Run | EC1 (HC1) | WC13 | N/A | N/A | N/A | N/A | |
Production | ECP (HCP) | WCP | CCP | DCP | SCP | OCP |
1System 1System will be shared across all non-PRD systems.
Landscape Provisioning
2SAP RISE landscape will be provisioned in stages to optimize cost. The following diagrams illustrates the systems that will be provision for the different phases.
Europe
...
S/4HANA High Availability and Disaster Recovery
In SAP RISE, High Availability (HA) and Disaster Recovery (DR) is applicable to Production instances. For SyWay project, S/4HANA will be provisioned with the following RISE add-ons.
- Short distance disaster recovery
- 99.9% SLA
With these add-ons, S/4HANA production will be deployed across 2 availability zones and with pacemaker clusters for HA.
...
The table below describe how HA is achieved for the different components.
...
requires each region to host a development system which will be used for RISE administrations (e.g., upgrades). Hence ECD and WCD will be in the landscape and will be added to the transport route but not have a system role.
3Web dispatcher will be shared between Parallel Run and Training landscape.
Post Go-Live Landscape
Post release 4 Group 2 go-live a 4-tier landscape (DEV, QAS, PAR and PRD) will be maintained. SBX, INT and TRG landscapes will be decommissioned.
Region | Landscape | Systems | |||||
S/4HANA (HANA DB) | Web Dispatcher | SAP Cloud connector | SAP Data Provisioning Agent | SAC Agent | OpenText Connector | ||
Europe | Development | ERD (HRD) | WRD | CRD1 | DRD1 | SRD1 | ORD1 |
UAT | ERQ (HRQ) | WRQ | N/A | N/A | N/A | N/A | |
Parallel Testing | ER1 (HR1) | WR1 | N/A | N/A | N/A | N/A | |
Production | ERP (HRP) | WRP & WRH | CRP | DRP | SRP | ORP | |
China | Development | ECD (HCD)2 | WCD2 | CCD1 | DCD1 | SCD1 | OCD1 |
UAT | ECQ (HCQ) | WCQ | N/A | N/A | N/A | N/A | |
Parallel Testing | EC1 (HC1) | WC1 | N/A | N/A | |||
The table below summaries the SLA for HA and DR.
N/A | N/A |
SAP RISE VM Specs
<<Placeholder>>
Non-RISE
Systems that follow an IaaS or on-premises deployment model and are not hosted in SAP RISE will be hosted in Syensqo’s Azure subscription. The following systems are classified as Non-RISE.
- SAP WWI Server
- SAP TM Optimizer
- Syniti Replicate
- Syniti Connector
- SWIFT Connector
- Vertex
- NextLabs Policy Server
<<Placeholder for landscaope overview & VM details>>
Network Architecture
Network Design
SAP RISE
172.16.32.0/20 IP range has been allocated for for all SAP RISE provisioning. The following table lists down the IP allocation for the different subnets.
...
172.16.32.0/23.0/23
...
172.16.32.0 - 172.16.33.225
...
510
...
172.16.34.0/27
...
172.16.34.0 - 172.16.34.31
...
30
...
172.16.34.32/27
...
172.16.34.32 - 172.16.34.63
...
30
...
172.16.34.64/27
...
172.16.34.64 - 172.16.34.95
...
30
...
172.16.34.96/27
...
172.16.34.96 - 172.16.34.127
...
30
...
172.16.34.128/127
...
172.16.34.128 - 172.16.34.159
...
30
...
172.16.34.160/27
...
172.16.34.160 - 172.16.34.191
...
30
...
172.16.34.192/26
...
172.16.34.192 - 172.16.34.255
...
30
...
172.16.35.0/24
...
172.16.35.0 - 172.16.35.255
...
254
...
172.16.36.0/22
...
172.16.44.0/22
...
172.16.44.0 - 172.16.47.255
...
1022
Production | ECP (HCP) | WCP & WCH | CCP | DCP | SCP | OCP |
1System shared across all non-PRD systems.
2SAP RISE requires each region to host a development system which will be used for RISE administrations (e.g., upgrades). Hence ECD and WCD will be in the landscape and will be added to the transport route but not have a system role.
High Availability and Disaster Recovery
The table below summaries the SLA for HA and DR for production and non-production systems
| Landscape | Availability SLA | RPO | RTO |
|---|---|---|---|
| Production | 99.9% | 0 | Contractually-guaranteed: 12 hours Achievable: ~10 minutes |
| Non-Production | 98% | N/A | N/A |
S/4HANA
In SAP RISE, High Availability (HA) and Disaster Recovery (DR) is applicable to Production instances. For SyWay project, S/4HANA Production is provisioned with the following RISE add-ons.
- Short distance disaster recovery
- 99.9% SLA
With these add-ons, S/4HANA production is deployed across 2 availability zones with synchronous database replication and automated fail-over via pacemaker clusters as shown below.
| draw.io Diagram | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
The table below describes how HA is achieved for the different components.
| Component | HA Design |
|---|---|
| Web Dispatcher | Deployed to both AZs in active-active configuration and Azure load balancer is used to distribute incoming HTTP traffic to both instances. |
| S/4HANA Application servers | Two application servers are deployed to each AZs in an active-active configuration. |
| S/4HANA Message server (SCS & ERS) | Pacemaker cluster is configured between SCS and ERS servers to ensure SCS & ERS services fails over accordingly in the event of a failure. |
| SAPMNT Shared folder | NetApp files is used to host the SAPMNT shared folder and is mounted across all S/4HANA application, SCS and ERS servers. |
| HANA DB | Two HANA nodes are deployed across 2 AZs in an active-standby configuration. HANA synchronous replication is configured to replicate data from the active to standby node. Pacemaker cluster is configured to ensure that the standby node is promoted to active node in the event of a failure. |
SAP Connectors
Two instances of SAP Cloud connectors are deployed across 2 AZs and configured as active-standby nodes. In the event of a failure, the standby node will take over as active node
The following connectors do not have out of the box high-availability and will require SAP RISE team to manually failover the system in the event of a failure.
- SAP Data Provisioning Agent - Currently not supported (SAP Note 3275211)
- SAC Agent - Currently not supported (SAP Note 3595999)
- OpenText Connector
SAP RISE VM Details
| Azure Region | Environment | SID | Purpose | Physical Hostname | Virtual Hostname | CPU | Memory/GB | OS |
|---|---|---|---|---|---|---|---|---|
| North Europe (Dublin) | Sandbox | ERS | App Server | hec42v331805.irl.sap.eu.cloud.syensqo.com (172.16.33.10) | vhysqersci.sap.eu.cloud.syensqo.com (172.16.33.12) | 16 | 64 | SUSE SLES15 |
| HRS | HANA DB | hec42v331250.irl.sap.eu.cloud.syensqo.com (172.16.33.5) | vhysqersdb.sap.eu.cloud.syensqo.com (172.16.33.13) | 32 | 256 | SUSE SLES15 | ||
| WRS | Web Dispatcher | hec42v331253.irl.sap.eu.cloud.syensqo.com (172.16.33.6) | vhysqwrswd01.sap.eu.cloud.syensqo.com (172.16.33.9) | 2 | 8 | SUSE SLES15 | ||
| Development | ERD | App Server | hec42v303048.irl.sap.eu.cloud.syensqo.com (172.16.33.48) | vhysqerdci.sap.eu.cloud.syensqo.com (172.16.33.49) | 8 | 64 | SUSE SLES15 | |
| HRD | HANA DB | hec42v302672.irl.sap.eu.cloud.syensqo.com (172.16.33.37) | vhysqerddb.sap.eu.cloud.syensqo.com (172.16.33.51) | 32 | 256 | SUSE SLES15 | ||
| WRD | Web Dispatcher | hec42v302675.irl.sap.eu.cloud.syensqo.com (172.16.33.40) | vhysqwrdwd01.sap.eu.cloud.syensqo.com (172.16.33.44) | 2 | 8 | SUSE SLES15 | ||
| CRD | Cloud Connector | hec42v302678.irl.sap.eu.cloud.syensqo.com (172.16.33.45) | vhysqcrdcc01.sap.eu.cloud.syensqo.com (172.16.33.46) | 2 | 8 | SUSE SLES15 | ||
| DRD | Data Provisioning Agent | hec42v302676.irl.sap.eu.cloud.syensqo.com (172.16.33.41) | vhysqdrddpa01.sap.eu.cloud.syensqo.com (172.16.33.47) | 4 | 16 | SUSE SLES15 | ||
| SRD | SAC Agent | hec42v302674.irl.sap.eu.cloud.syensqo.com (172.16.33.39) | vhysqsrdweb01.sap.eu.cloud.syensqo.com (172.16.33.38) | 4 | 16 | SUSE SLES15 | ||
| TRD | TM Optimizer | hec42v350658.irl.sap.eu.cloud.syensqo.com (172.16.33.52) | vhysqtrdgtw01.sap.eu.cloud.syensqo.com (172.16.33.53) | 16 | 64 | SUSE SLES15 | ||
| ORD | OpenText Connector | hec42v318041.irl.sap.eu.cloud.syensqo.com (172.16.33.54) | vhysqordotc01.sap.eu.cloud.syensqo.com (172.16.33.55) | 4 | 16 | SUSE SLES15 | ||
| Integration Test | ERT | App Server | hec42v350888.irl.sap.eu.cloud.syensqo.com (172.16.33.74) | vhysqertci.sap.eu.cloud.syensqo.com (172.16.33.76) | 16 | 64 | SUSE SLES15 | |
| HRT | HANA DB | hec42v350674.irl.sap.eu.cloud.syensqo.com (172.16.33.71) | vhysqertdb.sap.eu.cloud.syensqo.com (172.16.33.77) | 64 | 512 | SUSE SLES15 | ||
| WRD | Web Dispatcher | hec42v349378.irl.sap.eu.cloud.syensqo.com (172.16.33.69) | vhysqwrtwd01.sap.eu.cloud.syensqo.com (172.16.33.70) | 2 | 8 | SUSE SLES15 | ||
China North 3 (Hebei) | Development | ECD | App Server | hec60v072245.chn1.sap.cn.cloud.syensqo.com | vhycdecdci.sap.cn.cloud.syensqo.com | 8 | 32 | SUSE SLES15 |
| HCD | HANA DB | hec60v072019.chn1.sap.cn.cloud.syensqo.com | vhycdecddb.sap.cn.cloud.syensqo.com | 32 | 256 | SUSE SLES15 | ||
| WCD | Web Dispatcher | hec60v072016.chn1.sap.cn.cloud.syensqo.com | vhycdwcdwd01.sap.cn.cloud.syensqo.com | 2 | 8 | SUSE SLES15 | ||
| CCD | SAP Cloud connector | hec60v072124.chn1.sap.cn.cloud.syensqo.com | vhycdccdcc01.sap.cn.cloud.syensqo.com | 2 | 8 | SUSE SLES15 | ||
| DCD | Data Provisioning Agent | hec60v072234.chn1.sap.cn.cloud.syensqo.com | vhycddcddpa01.sap.cn.cloud.syensqo.com | 4 | 16 | SUSE SLES15 | ||
| SCD | SAC Agent | hec60v072237.chn1.sap.cn.cloud.syensqo.com | vhycdscdweb01.sap.cn.cloud.syensqo.com | 4 | 16 | SUSE SLES15 | ||
| TCD | TM Optimizer | hec60v072226.chn1.sap.cn.cloud.syensqo.com | vhycdtcdgtw01.sap.cn.cloud.syensqo.com | 16 | 64 | SUSE SLES15 | ||
| Integration Test | ECT | App Server | hec60v072421.chn1.sap.cn.cloud.syensqo.com | vhycdectci.sap.cn.cloud.syensqo.com | 16 | 64 | SUSE SLES15 | |
| HCT | HANA DB | hec60v072123.chn1.sap.cn.cloud.syensqo.com | vhycdectdb.sap.cn.cloud.syensqo.com | 64 | 512 | SUSE SLES15 |
Non-RISE
Overview
Systems that follow an IaaS or on-premises deployment model and are not hosted in SAP RISE, are hosted in Syensqo’s Azure subscription. The following systems are classified as Non-RISE. Depending on complexity, separate documents may be used to describe the architecture for these applications.
Application | Region | Dev | INT | UAT | TRG | PAR | PRD |
|---|---|---|---|---|---|---|---|
SAP WWI Server | EU | Non-PRD | PRD | ||||
China | - | Non-PRD | PRD | ||||
Syniti Replicate | EU | PRD | |||||
China | PRD | ||||||
Syniti Connector | EU | PRD | |||||
China | PRD | ||||||
NextLabs | EU | DEV | QAS | - | PAR | PRD | |
OpenText xECM | EU | DEV | QAS | PRD | |||
China | - | QAS | PRD | ||||
Hosting Region
Following considerations were taken into account in deciding the Azure hosting regions
- NextLabs provides attribute-based access control (ABAC) and evaluates access to sensitive data during runtime execution. To prevent performance issues, NextLabs will require low latency network connection to S/4HANA.
- NextLabs have its own Azure subscription and will be hosted in the same region & physical zone as S/4HANA. vNET peering will be established between SAP RISE and NextLabs vNET to achieve low latency connectivity.
- Other applications can be hosted in region that is in line with Syensqo's Azure deployment strategy.
- Different subscriptions will be created for different environment: non-PRD, Pre-PRD and PRD
| Region | Category | Subscriptions | Azure Region |
|---|---|---|---|
| EU | NextLabs | 3 (non-PRD, Pre-PRD, PRD) | North Europe (Dublin) |
| Non-RISE (excluding NextLabs) | 2 (non-PRD, PRD) | France Central (Paris) | |
| China | Non-RISE | 2 (non-PRD, PRD) | TBC |
Azure Low Level Design
Azure landscape for SyWay is managed my Syensqo IT as part of their overall Azure management. See Azure management roles and responsibility for more details.
| Region | Category | LLD |
|---|---|---|
| EU | NextLabs | Link |
| Non-RISE (excluding NextLabs) | ||
| China | Non-RISE |
Following tables lists down SyWay Azure details.
| Category | Environment | Azure Subscription Name | vNET | Storage Account | Key vault |
|---|---|---|---|---|---|
| NextLabs | DEV & QAS | OTH - Next Lab - 00 | azrneuvntdnlasha0000 | azrneustodnlasha0000 | azrneukvtdnlasha0000 |
VM Details
| Category | Environment | Application | VM Name | IP | VM Type | OS Disk | Data Disk | OS |
|---|---|---|---|---|---|---|---|---|
| NextLabs | DEV | NextLabs Control Center | azrneuvmldnlaapp0000 | 172.16.48.5 | Standard D4s v5 | 128GB | 128GB | RHEL 9.4 |
| NextLabs Policy Controller | azrneuvmldnlaapp0100 | 172.16.48.6 | Standard D4s v5 | 128GB | 64GB | RHEL 9.4 |
SQL Server
| Category | Environment | Application | SQL Server | SQL DB | IP | Schema |
|---|---|---|---|---|---|---|
| NextLabs | DEV | NextLabs | azrneuvmldnlaapp0000 | azrneusdbdnlasha0000 | 172.16.48.20 | dbo |
Shared File Systems
| Environment | Storage account | Purpose | Type | Share name |
|---|---|---|---|---|
| DEV | azrneustodnlasha0000 | NextLabs installation files | Azure files | dae-install-dev |
| NextLabs working directory | Azure files | dae-working-dev | ||
| ERS interface shared folder | Azure files | interface-ers | ||
| ERD interface shared folder | Azure files | interface-erd |
Network Architecture
Europe
The figure below describes the overall network connectivity for SAP RISE and non-RISE Azure vNETs in Europe.
SAP RISE
- SAP RISE tenant is deployed in Azure North Europe.
- Connection SAP RISE is established via ExpressRoute which is connecting through Megaport Paris and Dublin.
Non-RISE
- Non-RISE systems will be deployed in Azure France Central.
- Workloads are deployed to Non-PRD and PRD vNETs.
- Syensqo Azure shared services deployed in Azure France Central leveraged for SyWay non-RISE systems.
- Connection between SAP RISE and non-RISE will traverse Megaport EMEA hub.
NextLabs
- NextLabs systems will be deployed in Azure North Europe (same region as SAP RISE).
- Workloads are deployed to 4 vNETs: DEV, QAS, PAR and PRD
- Connection to Syensqo WAN will be established via Azure vWAN and ExpressRoute in Paris.
- vNET Peering is configured between the HUB vNET and and SAP RISE, and HUB vNET and the 4 NextLabs vNETs.
- Azure firewall is deployed in the HUB vNET to route traffic between SAP RISE and NextLabs.
- Syensqo Azure shared services deployed in Azure North Europe leveraged for SyWay NextLabs systems.
| draw.io Diagram | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
China
TBC
SAP RISE ExpressRoute Design
The table below lists down the regional hub and Azure edge location for NAM, EMEA and China regions.
| Region | Megaport Location | Azure Edge location | SAP RISE Region | Non-RISE Region |
|---|---|---|---|---|
| Europe | Paris Equinix PA2/3 & Paris Interxion PAR5 | Dublin | Azure North Europe (Dublin) | Azure France Central (Paris) |
| China | TBC | TBC | Azure China North 3 (Hebei) | TBC |
Europe
The following diagram describes the ExpressRoute design between Megaport and SAP RISE in EU region.
China
TBC
IP Allocation
The 172.16.32.0/19 IP range has been allocated for SyWay. The following table lists down the IP allocation for the different regions and subnets.
| Region | Landscape | CIDR | Network Name | IP Allocation | Range | Usable Hosts |
|---|---|---|---|---|---|---|
| Europe | SAP RISE | 172.16.32.0/22 | Production | 172.16.34.0/25 | 172.16.34.0 - 172.16.34.127 | 126 |
| Production (HA components) | 172.16.34.128/25 | 172.16.34.128 - 172.16.34.255 | 126 | |||
| ECS Services | 172.16.32.0/24 | 172.16.32.1 - 172.16.32.254 | 254 | |||
| Sandbox | 172.16.33.0/27 | 172.16.33.1 - 172.16.33.30 | 30 | |||
| Development | 172.16.33.32/27 | 172.16.33.33 - 172.16.33.62 | 30 | |||
| Integration Test | 172.16.33.64/27 | 172.16.33.65 - 172.16.33.94 | 30 | |||
| QA / UAT | 172.16.33.96/27 | 172.16.33.97 - 172.16.33.126 | 30 | |||
| Pre-Production (PAR) | 172.16.33.128/27 | 172.16.33.129 - 172.16.33.158 | 30 | |||
| Training | 172.16.33.160/27 | 172.16.33.161 - 172.16.33.190 | 30 | |||
| Non-Prod Reserve | 172.16.33.192/27 | 172.16.33.193 - 172.16.33.222 | 30 | |||
| Tools / Other Needs | 172.16.33.224/27 | 172.16.33.225 - 172.16.33.254 | 30 | |||
| Unassigned | 172.16.35.0/24 | 172.16.35.1 - 172.16.35.254 | 254 | |||
NextLabs | 172.16.48.0/23 | Production | 172.16.49.0/25 | 172.16.49.0 - 172.16.49.127 | 126 | |
| HUB | 172.16.49.128/25 | 172.16.49.128 - 172.16.49.255 | 126 | |||
| Pre-Production (PAR) | 172.16.48.128/25 | 172.16.48.128 - 172.16.48.255 | 126 | |||
| OTH (DEV & QAS) | 172.16.48.0/25 | 172.16.48.0 - 172.16.48.127 | 126 | |||
Non-RISE | TBC | TBC | TBC | TBC | TBC | |
| China | SAP RISE | 172.16.36.0/22 | TBC | TBC | 172.16.36.0 - 172.16.39.255 | 1022 |
Non-RISE | TBC | TBC | TBC | TBC | TBC | |
| Unassigned | Unassigned | 172.16.52.0/222 | - | - | 172.16.52.0 - 172.16.55.255 | 1022 |
| Unassigned | 172.16.56.0/21 | - | - | 172.16.56.0 - 172.16.63.255 | 2046 | |
| Unassigned | 172.16.40.0/21 | - | - | 172.16.40.0 - 172.16.47.255 | 2046 | |
| Unassigned | 172.16.50.0/23 | - | - | 172.16.50.0 - 172.16.51.255 | 510 |
DNS Architecture
Domain Name
The following domains names are used for the respective RISE regions.
| RISE Region | SAP RISE Domain | Non-RISE Domain (incl. NextLabs) |
|---|---|---|
| Europe | ||
| China | *.cn.azure.cloud.syensqo.com |
DNS Integration
2-way DNS integration is configured between Syensqo and SAP RISE DNS.
- Syensqo DDI team has select DNS Domain Delegation as the integration method. Syensqo DNS are configured to redirect SAP RISE DNS queries to the respective SAP RISE DNS deployed in the different regions.
- SAP RISE DNS have a DNS forwarder configured to redirect all Syensqo DNS queries to the respective Syensqo regional DNS servers.
The table below lists the Syensqo and SAP RISE DNS servers.
| Region | Syensqo DNS | SAP RISE DNS |
|---|---|---|
| Europe | 172.23.128.104 | DNS –CSN-A-HA IP - 172.16.32.14 (vhysqirlcsna-ha.irl.sap.eu.cloud.syensqo.com) DNS –CSN-B-HA IP - 172.16.32.30 (vhysqirlcsnb-ha.irl.sap.eu.cloud.syensqo.com) DNS –CSN-C-HA IP - 172.16.32.46 (vhysqirlcsnc-ha.irl.sap.eu.cloud.syensqo.com) |
| China | TBC |
Network Firewall
For SyWay project, the following firewalls will be leveraged to manage the corresponding traffic.
Firewall | Network Traffic |
|---|---|
Regional Hub Firewall |
|
Syensqo Azure Firewall |
|
Internet Traffic
To connect SyWay systems deployed in Azure (SAP RISE or non-RISE) and SaaS applications, a middleware (i.e., using Cloud connector and SAP Integration Suite ) based integration approach will be preferred. If the integration scenario requires direct connection between S/4HANA and SaaS applications, the following sections covers how inbound and outbound network connections can be established.
Outbound Internet Traffic
draw.io Diagram border true diagramName Outbound Internet Traffice simpleViewer false width 800 links auto tbstyle top lbox true diagramWidth 768 height 581 revision 15
- Outbound HTTPS traffic from SAP RISE is routed through the Customer Gateway server which has an internet proxy (Squid Proxy) installed in the VM.
- Outbound non-HTTP traffic (e.g., SDTP) from SAP RISE is NAT-ed via Azure Standard Load Balancer.
- Outbound internet traffic from Non-RISE application is routed to Azure firewall in Syensqo Hub.
The following outbound traffic is configured in SAP RISE.
| Source | Destination | Port/Protocol | Method |
|---|---|---|---|
| All S/4HANA Application server | Mailjet (34.22.188.249) | 587/SMTP TLS | Azure Load balancer |
Following is the Customer Gateway server connection details.
| Region | Hostname | Port |
|---|---|---|
| EU | proxy | 3128 |
| China |
Inbound Internet traffic
| Info |
|---|
Currently there is no requirements for inbound internet traffic to SAP RISE and non-RISE systems. This method of connectivity will be considered if there are no other alternatives and will require cybersecurity approval. |
draw.io Diagram border true diagramName Inbound Internet traffic simpleViewer false width 800 links auto tbstyle top lbox true diagramWidth 825 height 582 revision 8
- SAP RISE uses Azure Application Gateway with Web Application Firewall to manage inbound HTTPS traffic. Non-HTTP inbound traffic are not permitted and will required further approvals from SAP.
- For non-RISE, Syensqo's Azure DMZ which uses Azure WAF + Application Gateway will be leveraged. Incoming HTTPS will also be filtered through Azure firewall in Syensqo Hub vNET before it is routed to the non-RISE vNET.
User Access
The following sections describes how SAP RISE and non-RISE systems are access by users within (internal) and outside (external) Syensqo network. For SaaS application access, users can access them through their existing internet access.
These section cover the network perspective and does not include the authentication processes where single sign-on will be configured with Syensqo Identity provider.
Internal Access
End users will access SyWay systems via browser, mobile app or SAPGUI (for S/4HANA) (refer KDD036). The figure below describes the network traffic from user's terminal to SyWay systems.
| draw.io Diagram | ||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
SAP RISE Web Access:
- Primary mode of access for SAP RISE system is through HTTPS.
- User's HTTPS traffic is routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection.
- In SAP RISE, Azure load balancer is provisioned to load balance the incoming HTTPS traffic to SAP web dispatchers.
- SAP web dispatchers act as proxies and forward the request to S/4HANA application server.
SAP RISE SAPGUI Access
- SAP administrators and support staff may access S/4HANA using SAPGUI which uses TCP protocol.
- User's SAPGUI connections are routed from Syensqo local site network to SAP RISE through SDWAN and ExpressRoute connection.
- In SAP RISE, a pacemaker cluster is configured between SCS and ERS servers for HA and Azure load balancer is used to direct network traffic to the active SCS node.
- SCS redirects users to one of the available S/4HANA application server and there after, the communication is directly between user's SAPGUI and the application server.
Non-RISE Access:
- User traffic is routed from Syensqo local site network to Syensqo's Hub vNET through SDWAN, Megaport and ExpressRoute connection.
- In the hub vNET, traffic is filtered through Azure firewall before being routed to Non-RISE vNET and non-RISE application.
SaaS:
- Primary mode of access for SaaS applications is via HTTPS.
- User's HTTPS traffic is routed from Syensqo local site network to Zscaler which acts as a proxy and connects to the SaaS applications.
External Access
No direct external access from the internet is enabled for SyWay systems hosted in RISE. Users with a Syensqo-issued device can access systems hosted in RISE from outside the Syensqo network via ZScaler Private Access (ZPA).
ZPA App Connectors will be deployed in non-RISE Azure vNET and will be registered with Syensqo's Zscaler Exchange. Users will connect from their terminal using Zscaler client connector and the network traffic will traverse as shown below.
| draw.io Diagram | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| Anchor | ||||
|---|---|---|---|---|
|
The following sections describes the network design and flow for the following integration scenarios.
SAP Cloud Connector
The SAP Cloud connector are deployed in SAP RISE and acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and S/4HANA.
To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.
| draw.io Diagram | ||||||
|---|---|---|---|---|---|---|
|
Non-RISE
<<Placeholder>>
SAP RISE Network Connectivity
North America (NAM) and Europe (EMEA) SAP RISE vNETs will be connected to Syensqo regional hub routers via ExpressRoute and Megaport Virtual Cross Connect (VXC) as shown below.
| draw.io Diagram | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
The table below lists down the regional hub and Azure edge location for NAM and EMEA regions.
...
|
EIM Data Provisioning Agent
EIM Data Provisioning Agent (DPA) is used to integrate S/4HANA and SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere.
DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.
| draw.io Diagram | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
OpenText Connector
OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS.
The HTTPS protocol is used for communication between all components.
| draw.io Diagram | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
SAP Router
SAP has configured a VPN connection between the Syensqo SAP RISE tenant and SAP's Management network (used by SAP support). SAP Router is deployed in SAP RISE to manage SAP support's connection to SAP systems.
| draw.io Diagram | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Appendix
Azure Management Roles and Responsibility
| Anchor | ||||
|---|---|---|---|---|
|
Following is the roles and responsibility for SyWay's Azure tenants management.
Domain | Sub-Domain | SyWay | Syensqo Azure | Syensqo Security |
|---|---|---|---|---|
Project management | Overall timeline and delivery | A, R | R | R |
Application | Application management and administration | A, R | I | I |
Application security (authorization, authentication) | A, R | I | I | |
Infrastructure | Network design and build (vNET & ExpressRoute) | C | A, R | C |
VM and Storage requirements | R | A | I | |
VM build | C | A, R | I | |
Integration with DNS and Syensqo domain | C | A, R | I | |
Security | Azure Security Architecture for SyWay vNETs | C | R | A, R |
Firewall request | R | C | A | |
Operations | Backup management | R | A, R | I |
Monitoring and alerting | R | A, R | I | |
OS management, access & patching | C | A, R | I | |
Azure administration (including DaaS) | C | A, R | I |
<<Placeholder for China>>
DNS Architecture
SAP RISE Domain
The following domains will be used for the respective RISE regions.
...
...
...
DNS Integration
SAP RSIE supports 3 different DNS integration types: DNS Zone Transfer, Conditional DNS Forward and DNS Domain Delegation.
Conditional DNS forwarding has been choose for Syensqo for the following reasons:
- Reduced network traffic and complexity.
- Limits security exposure by only forwarding queries for specified domains.
- Easier to manage in the event Syensqo changes it DNS provider.
- Simple configuration and maintenance.
The table below lists down the Syensqo and SAP DNS that will be integrated.
...
Network Firewall
An active-active cluster of Palo-Alto Firewall VM-Series is deployed to North America and Europe Megaport locations along slide SD-WAN regional hub routers. The figure below illustrates the architecture Europe regional hub routers and firewall. The same architecture applies for North America.
Network connection to and from SyWay systems (SAP RISE and Non-RISE), will be controlled by the respective regional firewalls. To allow network connections, firewall requests for must be submitted to the network team
<<placeholder for allowed east to west traffic>>
<<firewall request procedure>>
Internet Traffic
All inbound and outbound internet traffic will be filtered by the firewalls hosted in Megaport except for integration scenarios mentioned in integration
Outbound Internet Traffic
...
Outbound internet traffic from SAP RISE or Syway vNET will be routed to the regional hub router and firewall. The firewall will filter the traffic before allowing it to the external application.
If the external application requires source IP to be whitelisted before accepting the connection, a public IP can be assigned at the firewall.
<<placeholder for China>>
Inbound Internet traffic
...
Inbound traffic from external application will be filtered through the firewall before the region hub router routes it to SAP RISE or Syway vNET. The external application will need to provide a static public IP or FQDN to be whitelisted on Syensqo firewall. Syensqo firewall will also manage the public IP and translation to internal IP.
<<placeholder for China>>
User Access
...

