Configuring DataPower API Gateway

You can configure the DataPower® API Gateway to prepare for a registration with the API Connect Management server.

Before you begin

  • These instructions are for DataPower Gateway deployments in a non-Kubernetes environment. Do not use these instructions if you installed API Connect on Kubernetes, with your DataPower Gateway Service also in the Kubernetes environment. To review deployment scenarios, see Deploying DataPower Gateway.
  • Ensure you have installed the version of DataPower Gateway that matches the version of the API Connect Management server. See Installing DataPower Gateway.
  • A shared certificate and private key is used for securing the communication between the API Connect Management server and the gateway. See Generating keys and certificates in the DataPower Gateway IBM documentation for instructions on how to create them with the DataPower tools.

  • Ensure that the time zone for the DataPower Gateway is set to UTC.

About this task

  • These instructions provide the basic steps for configuring a gateway service with a single gateway server. The lowest-level configuration objects are created first, then used in other configuration objects. The procedures for configuring the two types of gateways are very similar, so only one procedure is provided. Any specific differences are identified.
  • Adding gateways to configure a peering environment is similar to creating the first gateway, and is recommended for resiliency in a production environment. A minimum of three gateway servers in a gateway service is recommended for high availability. See Gateway peering for more information about configuring additional gateways for peering. See Providing gateway service for API Connect in the DataPower Gateways IBM Knowledge Center content for more details about the DataPower settings and procedures.

Procedure

To configure a DataPower gateway to communicate with API Connect, complete the following steps:

Note: Use these instructions only for DataPower API Gateway . If you are configuring DataPower Gateway (v5 compatible) see Configuring DataPower Gateway (v5 compatible).

  1. Open the DataPower WebGUI interface.
    Most of the configuration procedure is done in the DataPower WebGUI interface, not in the Blueprint Console.
  2. Enable the XML management interface in the default domain, if required. The XML management interface is optional for DataPower API Gateway.
    1. Search for XML management interface in the navigation search bar, and select it.
    2. Set the Administrative state to enabled.
    3. You can specify a different port number if you do not want to use the default of 5550.
    4. Select Apply to make the changes
    5. Save changes to the default domain by selecting Save Configuration.
  3. Create an application domain.
    This domain receives your traffic.
    1. Search for Application domain in the navigation search bar, and select it.
    2. Select Add to create the application domain.
    3. Enter a unique name for your domain.
    4. Ensure that enabled is selected for the Administrative state.
    5. Ensure that the default domain is listed in the Visible application domain list.
    6. Select Apply.
    7. Change to your new application domain by selecting Domain in the menu bar, and selecting the domain that you created.
    8. Select Save changes and switch domains.
      All of the remaining steps on the DataPower gateway must be done in the application domain that you created.
    9. Save changes to the domain by selecting Save Configuration.
  4. Ensure that your deployment includes an NTP server to synchronize time between each of the DataPower Gateways.
  5. Ensure that you have set a unique Appliance name (System Identifier) for each DataPower gateway. See Initializing the DataPower Gateway.
  6. Create a self-signed certificate and private key to be used to protect the traffic between the management server and the API gateway service process. You can generate a certificate and private key using DataPower or by using other tools, such as OpenSSL. See Generating keys and certificates in the DataPower Gateway IBM documentation for instructions on how to create a crypto key with the DataPower tools.
  7. Upload your private crypto key file to the domain.
    1. Search for Crypto key in the navigation search bar, and select it.
    2. Select Add to create a key object.
    3. Create a unique name for the key object in the Name field.
    4. Select Upload....
    5. Browse for the key file (which must be a .pem or .p12 file) and select it.
    6. If you want to rename it, enter a new name for the file.
    7. Select Upload to move it to the server in the cert:// folder.
    8. Select Apply to save the changes.
  8. Upload your crypto certificate file to the domain.
    Note: If your certificate is signed by an Intermediate CA, you must include the entire chain in a single key file (either .pem or .p12) for uploading.
    1. Search for Crypto certificate in the navigation search bar, and select it.
    2. Select Add to create a certificate object.
    3. Create a unique name for the certificate object in the Name field.
    4. Select Upload....
    5. Browse for the key file (which must be a .pem or .p12 file) and select it.
    6. If you want to rename it, enter a new name for the file.
    7. Select Upload to move it to the server in the cert:// folder.
    8. Select Apply to save the changes.
  9. Associate the Crypto key with the Crypto certificate by setting the Identification credential.
    1. Search for Crypto Identification Credentials in the navigation search bar, and select it.
    2. Select Add.
    3. Enter a name for your credential.
    4. Ensure that the Administrative state has a value of enabled.
    5. In the Crypto Key field, select the name of the key object that you created from the drop-down menu.
    6. In the Certificate field object, select the name of the certificate object that you created from the drop-down menu.
    7. Select Apply to commit your changes.
  10. Create your SSL Client profile.
    1. Search for SSL Client profile in the navigation search bar, and select it.
    2. Select Add to create a client profile.
    3. Create a unique name for the profile in the Name field.
    4. Select your Identification credential from the drop-down list.
    5. Ensure that the value of Validate server certificate is set to off.
    6. Select Apply to save the changes.
  11. Create your SSL Server profile.
    1. Search for SSL Server Profile in the navigation search bar, and select it.
    2. Select Add to create a server profile.
    3. Create a unique name for the profile in the Name field.
    4. Select your Identification credential from the drop-down list.
    5. Ensure that the value of Request client authentication is set to off.
    6. Select Apply to save the changes.
  12. For the DataPower API Gateway only: Define a configuration sequence.
    The API Connect gateway service uses the configuration sequence to configure DataPower to implement the APIs that are defined in API Connect.
    1. Search for Configuration sequence in the navigation search bar, and select it.
    2. Select Add.
    3. Enter a name for your configuration sequence.

      The name apic-config is not allowed because it is already used internally.

    4. Ensure that the Administrative state has a value of enabled.
    5. Ensure that the value in the Location profiles field is set to local:///
      This is the default value, so you might not need to change it.
    6. Select the Access profile. See Configuring the access profile for a configuration sequence in the DataPower Gateway IBM Knowledge Center for instructions on how to create access profiles.
    7. Change the value of the Configuration execution interval field to 3000.
      The other fields can retain their default settings.
    8. Select Apply to commit your changes.
  13. Configure your gateway peering object for the API Connect Gateway Service.
    This step is required when you set up a peer group of gateways, even if there is only a single gateway server in the gateway service.
    1. Search for Gateway peering in the navigation search bar, and select it.
    2. Select Add.
    3. Enter a unique name for your gateway peering object.
    4. Ensure that the Administrative state has a value of enabled.
    5. Select a local address for the communications among the members of the peer group.
    6. Select a local port for the communication.
      You can use the default value of 16380.
    7. Select a monitor port for the communication.
      You can use the default value of 26380.
    8. Because this procedure uses only one gateway, ensure that Peer group mode is not selected.
    9. Clear the Enable SSL checkbox. SSL is not needed for a single peer.
    10. Set the Persistence location value to Memory for either physical DataPower appliance or virtual DataPower appliance.
    11. Select Apply to commit your changes.
  14. Configure your gateway peering object for rate limit information.
    Note: Version 2018.4.1.7 or later is required.
    1. Search for Gateway peering in the navigation search bar, and select it.
    2. Select Add.
    3. Enter a unique name for your gateway peering object.
    4. Ensure that the Administrative state has a value of enabled.
    5. Select a local address for the communications among the members of the peer group.
    6. Select a local port for the communication.
      Use a unique port, different than the ports used for communication by other gateway peering objects.
    7. Select a monitor port for the communication.
      Use a unique port, different than the ports used for monitoring by other gateway peering objects.
    8. Because this procedure uses only one gateway, ensure that Peer group mode is not selected.
    9. Clear the Enable SSL checkbox. SSL is not needed for a single peer.
    10. Set the Persistence location value to Memory for either physical DataPower appliance or virtual DataPower appliance.
    11. Select Apply to commit your changes.
  15. Configure your gateway peering object for subscription information.
    Note: Version 2018.4.1.7 or later is required.
    1. Search for Gateway peering in the navigation search bar, and select it.
    2. Select Add.
    3. Enter a unique name for your gateway peering object.
    4. Ensure that the Administrative state has a value of enabled.
    5. Select a local address for the communications among the members of the peer group.
    6. Select a local port for the communication.
      Use a unique port, different than the ports used for communication by other gateway peering objects.
    7. Select a monitor port for the communication.
      Use a unique port, different than the ports used for monitoring by other gateway peering objects.
    8. Because this procedure uses only one gateway, ensure that Peer group mode is not selected.
    9. Clear the Enable SSL checkbox. SSL is not needed for a single peer.
    10. Set the Persistence location value to Memory for either physical DataPower appliance or virtual DataPower appliance.
    11. Select Apply to commit your changes.
  16. Configure the gateway peering manager.
    Note: Version 2018.4.1.7 or later is required.
    1. Search for Gateway Peering Manager in the navigation search bar, and select it.
    2. Set the Administrative state to enabled.
    3. In the pull-down menu next to API Connect Gateway Service, select the gateway peering object configured in Step 13 for the API Connect Gateway Service.
    4. In the pull-down menu next to Rate Limit, select the gateway peering object configured in Step 14 for rate limit information.
    5. In the pull-down menu next to Subscription, select the gateway peering object configured in Step 15 for subscription.
    6. Select Apply to commit your changes.
  17. Set the API Connect Gateway service to define the communication interface with the API Connect Management server and for API transactions.
    1. Search for API Connect Gateway service in the navigation search bar, and select it.
    2. Ensure that the Administrative state is set to enabled.
    3. In the Local address field, enter the IP address of the DataPower gateway to which you want the traffic from the API Connect Management server to be sent.
    4. Specify a value for Local Port. You can use the default port value of 3000, or specify a different port value.
      Note: The Local port specifies the port through which API Connect connects to manage the API Connect Gateway Service. Use this port when you configure a Gateway Service on API Connect. Beyond this port, the gateway service uses two additional consecutive ports after the defined local port to bind to a loopback address. Therefore, you must ensure that there are no conflicts on all three consecutive ports that start from the defined local port.
    5. In the SSL client field drop-down list, select the name of the SSL client profile that you created.
    6. In the SSL server field drop-down list, select the name of the SSL server profile that you created.
    7. In the API gateway address field, enter the IP address for the DataPower gateway to which you want the API traffic sent.
    8. Use the default port value of 9443 for the API gateway port.
      If the port is not being used by another service, you can also change it to port 443 if you want API transactions to be sent to the default port for HTTPS.
    9. For DataPower API Gateway, set the Gateway Peering to (none).
      When no gateway peering object is configured for the DataPower API Gateway, the peering configuration defined in the Gateway Peering Manager configuration is used.
    10. Select whether you want the DataPower Gateway (v5 compatible) or the DataPower API Gateway.
      When the option is selected, it enables the registration of a DataPower Gateway (v5 compatible) gateway. Clear it to enable a DataPower API Gateway.
  18. Register the gateway service in the API Connect Cloud Manager console:
    1. Open the API Connect Cloud Manager console.
    2. Navigate to Configure Topology.
    3. Select Register Service.
    4. Select DataPower API Gateway for the DataPower API Gateway.
    5. Add a title, name, and summary for the gateway connection.
    6. Optional: Configure the OAuth Shared Secret.
      This setting allows OAuth tokens to be shared across multiple gateway services.
    7. Enter one of the following values in the API Invocation Endpoint field:
      • IP address of the load balancer for the API transactions
      • IP address or host name of one of the gateways
      For example:https://192.0.2.0:9443/
    8. Enter the one of the following values in the Management Endpoint field:
      • IP address of the load balancer for the management server traffic set to port 3000
      • IP address or hostname of one of the gateways
      For example:https://192.0.2.0:3000/
  19. Select the default TLS Client Profile
  20. Optional: Configure Server Name Indication (SNI) profiles.
    SNI profiles allow different TLS certificates to be used for API transaction requests from different host names.