Tutorial: NETCONF and YANG
|
|
|
- Noreen Boyd
- 10 years ago
- Views:
Transcription
1 Tutorial: NETCONF and YANG Presented by Stefan Wallin, Tail-f
2 Today s Topic: #1 Market Leader in Configuration Management 2
3 Origins of NETCONF and YANG (the Beginning) Several meetings at events in 2001 (NANOG-22, RIPE-40, LISA-XV, IETF 52) Operators expressing opinion that the developments in IETF do not really address requirements configuration management. June of 2002, the Internet Architecture Board (IAB) held invitational workshop on Network Management [RFC3535] to Identify a list of technologies relevant for network management with their strengths and weaknesses Identify the most important operator needs. May 11, TAIL F all rights reserved 3
4 Best Practices Coming Together CLI Best Prac5ces SNMP Experience Operator Requirements NETCONF and YANG May 11, TAIL F all rights reserved 4
5 Agenda Quick Overview (RFC 6244, 2011) Background and Motivation (RFC 3535, 2003) NETCONF (RFC 6241, 2006, 2011) YANG (RFC 6020, 2010) Complete Example Demo May 11, TAIL F all rights reserved 5
6 NETCONF and YANG What is it? MAY 27,
7 NETCONF and YANG in Context Management Applications NETCONF Manager Yang Models YANG Modules NETCONF YANG Modules YANG Modules YANG Modules MAY 27,
8 What is a Data-Model? What is a Network Management Protocol? Protocol Data-Model Data-Model A data-model explicitly and precisely determines the structure, syntax and semantics of the data that is externally visible Consistent and complete Protocol Remote primitives to view and manipulate the data Encoding of the data as defined by the datamodel MAY 27,
9 Confusion and Comparison Protocol The SNMP Protocol NETCONF Data-Model MIB Modules YANG Modules Data-Models and information Models Information models are for humans Not everything Not always detailed and precise Star5ng- point for data- model Protocol Confusion between domain-specific network management protocols and general RPC mechanisms NETCONF vs. SOAP, REST, MAY 27,
10 NETCONF A Protocol to Manipulate Configuration IETF network management protocol Distinction between configuration and state data Multiple configuration data stores (candidate, running, startup) Configuration change validations Configuration change transactions Selective data retrieval with filtering Streaming and playback of event notifications Extensible remote procedure call mechanism Why you should care: NETCONF provides the fundamental programming features for comfortable and robust automation of network services MAY 27,
11 YANG A Data Modeling Language for Networking Human readable, and easy to learn representation Hierarchical configuration data models Reusable types and groupings (structured types) Extensibility through augmentation mechanisms Supports definition of operations (RPCs) Formal constraints for configuration validation Data modularity through modules and sub-modules Well defined versioning rules Why you should care: YANG is a full, formal contract language with rich syntax and semantics to build applications on MAY 27,
12 Who? NETCONF Phil Shafer, Rob Enns Juniper Jürgen Schönwälder Jacobs University Martin Björklund Tail-f Andy Bierman Yumaworks Ken Crozier Eliot Lear Cisco Systems Ted Goddard IceSoft YANG Phil Shafer Juniper, XML Jürgen Schönwälder Jacobs University, SNMP SMIng Martin Björklund Tail-f David Partain Ericsson, made it happen Steve Waldbusser Margaret Wasserman Painless Security, LLC MAY 27,
13 Language Bindings MAY 27,
14 Momentum MAY 27,
15 Standards background, motivation and history RFC 3535: Operators problems and requirements on network management
16 Informational RFC 3535 Abstract This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. SNMP had failed For configuration, that is Extensive use in fault handling and monitoring CLI scripting Market share 70%+ configuration MAY 27,
17 Operator Requirement #1/14 1. Ease of use is a key requirement for any network management technology from the operators point of view. Maybe not assume integrators and solware developers for any addi5on or change Manage MAY 27,
18 Operator Requirement #2-3/14 2. It is necessary to make a clear distinction between configuration data, data that describes operational state and statistics. 3. It is required to be able to fetch separately configuration data, operational state data, and statistics from devices, and to be able to compare these between devices. Clearly separating configuration Ability to compare across devices $show running-config MAY 27,
19 Operator Requirement #4-5/14 4. It is necessary to enable operators to concentrate on the configuration of the network as a whole rather than individual devices. 5. Support for configuration transactions across a number of devices would significantly simplify network configuration management. Service and Network management, not only device management Network wide transactions VPN Configura5on All or nothing MAY 27,
20 Operator Requirement #6-7/14 6. Given configuration A and configuration B, it should be possible to generate the operations necessary to get from A to B with minimal state changes and effects on network and systems. It is important to minimize the impact caused by configuration changes. 7. A mechanism to dump and restore configurations is a primitive operation needed by operators. Standards for pulling and pushing configurations from/to devices are desirable. Devices figure out ordering No unnecessary changes Finally: backup/restore of configuration The litmus- test of a management interface configura5on MAY 27,
21 Operator Requirement #8, 10/14 8. It must be easy to do consistency checks of configurations over time and between the ends of a link in order to determine the changes between two configurations and whether those configurations are consistent. 10. It is highly desirable that text processing tools such as diff, and version management tools such as RCS or CVS, can be used to process configurations, which implies that devices should not arbitrarily reorder data such as access control lists. Validation of configuration Validation at network level Text based configuration Text VPN Configura5on Valid? MAY 27,
22 Operator Requirement #9/14 9. Network wide configurations are typically stored in central master databases and transformed into formats that can be pushed to devices, either by generating sequences of CLI commands or complete configuration files that are pushed to devices. There is no common database schema, although the models used by various operators are probably very similar. It is desirable to extract, document, and standardize the common parts of these network wide configuration database schemas. Standardized data models Interfaces Data- Model MAY 27,
23 Operator Requirement #13/ It is important to distinguish between the distribution of configurations and the activation of a certain configuration. Devices should be able to hold multiple configurations. Support for multiple configuration sets Delayed, orchestrated activation Config, Config, Commit MAY 27,
24 Operator Requirement #11,12,14/ Typical requirements are a rolebased access control model and the principle of least privilege, where a user can be given only the minimum access necessary to perform a required task. 12. It must be possible to do consistency checks of access control lists across devices. 14. SNMP access control is data-oriented, while CLI access control is usually command (task) oriented. As such, it is a requirement to support both dataoriented and task-oriented access control Role-Based Access Control (RBAC) Data oriented Task oriented MAY 27,
25 Implications of RFC 3535, legacy situation OSS NMS EMS NETCONF Manager Cost and complexity No well-defined protocols and data-models Lack of atomicity Ordering problem MAY 27,
26 Implications of RFC 3535, with transactions OSS NMS EMS NETCONF Manager Reduced Cost and complexity Transac5ons Models Standardized Protocols Cost/ Value MAY 27,
27 Introduction to NETCONF MAY 27,
28 What makes NETCONF/YANG different? SNMP NETCONF SOAP REST Standard IETF IETF W3C - Resources OIDs Paths URLs Data models Defined in MIBs YANG Core Models Data Modeling Language SMI YANG (WSDL, not data) Undefined, (WSDL), WADL, text RESTConf Management Operations SNMP NETCONF In the XML Schema, not standardized HTTP operations Encoding BER XML XML XML, JSON, Transport Stack UDP SSH TCP SSL HTTP TCP SSL HTTP TCP MAY 27,
29 NETCONF Features API to configure network devices XML RPC mechanism Connection-oriented (SSH) Closely mirrors the device functionality Capability Discovery Separation of configuration and state data Sub-tree filtering Client Applica5on Server Device MAY 27,
30 Layers Content Config Data No5fica5on Data Opera5ons <EDIT- CONFIG> <GET- CONFIG> Messages <RPC> <RPC- REPLY> <NOTIFICATION> Secure Transport SSH MAY 27,
31 NETCONF Capabilities A capability is a set of functionality that supplements base NETCONF spec Capabilities augment: Additional operations Content allowed inside these operations Capabilities advertised by server during session establishment Base NETCONF specification provides very restricted set of operations for lightweight server implementations MAY 27,
32 NETCONF Configuration Data Stores Copy Copy Candidate Running Startup Files / URLs Commit Always! Only one! Named configuration stores Each data store may hold a full copy of the configuration Running is mandatory, Startup and Candidate optional (capabilities :startup, :candidate) Running may or may not be directly writable (:writable-running) Need to copy from other stores if not directly writable MAY 27,
33 Common Operations Data Manipulation <get>! <get-config>! <edit-config>! <copy-config>! <delete-config>! <discard-changes> (:candidate)!! Session Management <close-session>! <kill-session>! Locking <lock>! <unlock>!! Transaction Management <commit> (:candidate, :confirmed) <cancel-commit> (:confirmed) Schema Management <get-schema> (:monitoring)! RPC Extensions <rpc>! May 11, TAIL F all rights reserved 33
34 Anatomy of NETCONF Sessions Ambitious version: Hello exchange including capabilities Lock running Lock candidate Discard changes on candidate Edit config on candidate Commit confirmed (with timeout) Confirm commit Copy running to startup Unlock candidate Unlock running Short version: Hello exchange including capabilities Edit config on running database May 11, TAIL F all rights reserved 34
35 Distributed Transactions (for Bonus Points) Management System 1. Connect to and lock R1, R2, R3 2. Edit candidate databases and commit with timeout 3. (Optionally) do assurance checks during timeout 4. Confirm commit, copy to startup and release locks Transaction context manager simply kills all sessions on communication failure, failed commits -> Rollback R1 R2 R3 May 11, TAIL F all rights reserved 35
36 NETCONF Example Configuration Sequence <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 message-id="5">! <edit-config xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0">! <target>! <candidate/>! </target>! <test-option>test-then-set</test-option>! <error-option>rollback-on-error</error-option>! <config>! <interface xmlns= urn:ietf:params:xml:ns:yang:ietf-interfaces">! <name>eth1</name>! <ipv4-address> </ipv4-address>! <macaddr>aa:bb:cc:dd:ee:ff</macaddr>! </interface>! </config>! </edit-config>! </rpc>!! <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 message-id="6">! <validate>! <source>! <candidate/>! </source>! </validate>! </rpc>!! <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 message-id="7">! <commit>! <confirmed/>! </commit>! </rpc>! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1"! message-id="5">! <ok/>! </rpc-reply>! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1"! message-id="6">! <ok/>! </rpc-reply>! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1"! message-id= 7">! <ok/>! </rpc-reply>! MAY 27,
37 NETCONF RFC6241 Optional Capabilities :writable-running! :candidate! :confirmed-commit! :rollback-on-error! :validate! :startup! :url (scheme=http, ftp, file, ) :xpath (filters) MAY 27,
38 Non-base NETCONF Capabilities :notification, :interleave (RFC 5277) :partial-lock (RFC 5717) :with-defaults (RFC 6243) :ietf-netconf-monitoring (RFC 6022) And you can define your own, like :actions (tail-f) :inactive (tail-f) MAY 27,
39 NETCONF Operations MAY 27,
40 NETCONF <hello> Operation Capabilities exchange Data model ID exchange Encoding Framing NETCONF 1.0 EOM, ]]>]]> NETCONF 1.1 Chunk Framing <?xml version="1.0" encoding="utf-8"?>! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! </capabilities>! </hello>! MAY 27,
41 NETCONF <hello> Operation <?xml version="1.0" encoding="utf-8"?>! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! <capability>urn:ietf:params:netconf:capability:writable-running:1.0</capability! <capability>urn:ietf:params:netconf:capability:candidate:1.0</capability>! <capability>urn:ietf:params:netconf:capability:confirmed-commit:1.0</capability! <capability>urn:ietf:params:netconf:capability:xpath:1.0</capability>! <capability>urn:ietf:params:netconf:capability:validate:1.0</capability>! <capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capabilit! <capability> <capability> <capability> <capability> <capability>urn:ietf:params:xml:ns:yang:ietf-inet-types? revision= &module=ietf-inet-types</capability>! </capabilities>! <session-id>5</session-id> </hello>! MAY 27,
42 NETCONF <get-config> Operation Sub-tree filtering XPATH filtering <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 message-id="1">! <get-config>! <source>! <running/>! </source>! <filter xmlns=" <aaa/>! </filter>! </get-config>! </rpc>! MAY 27,
43 NETCONF <get-config> Operation <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 messageid="1">! <data>! <aaa xmlns=" <authentication>! <users>! <user>! <name>admin</name>! <uid>9000</uid>! <gid>0</gid>! <password>$1$3zhhr6ow$acznsyclfc0keo3b3bvjx/</password>! <ssh_keydir>/var/confd/homes/admin/.ssh</ssh_keydir>! <homedir>/var/confd/homes/admin</homedir>! </user>! <user>! <name>oper</name>!! </users>! </authentication>! </aaa>! </data>! </rpc-reply>! MAY 27,
44 NETCONF <edit-config> Operation <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.1 message-id="1">! <edit-config>! <target><running/></target>! <config>! <dhcp xmlns=" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1">! <defaultleasetime nc:operation="merge >PT1H </defaultleasetime>! </dhcp>! </config>! </edit-config>! </rpc>! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" messageid="1">! <ok/>! </rpc-reply>! MAY 27,
45 NETCONF <edit-config> Operation nc:test-option (:validate)! test-then-set (default) set! test-only! nc:error-option! stop-on-error (default) continue-on-error! rollback-on-error (:rollback-on-error)! nc:operation! merge! replace! create! delete! Error if item exists Error if item to delete does not exist remove (:base:1.1)! url can be used instead of inline config (:url capability) Ok if item to delete does not exist MAY 27,
46 NETCONF <copy-config> Operation Copy and replace configuration data between stores or URLs <rpc message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base: 1.1">! <copy-config>! <target><running/></target>! <source>! </url>! </source>! </copy-config>! </rpc>! <rpc-reply message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <ok/>! </rpc-reply>! MAY 27,
47 NETCONF <delete-config> Operation Delete a complete data store (not running) <rpc message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base: 1.1">! <delete-config>! <target>! <startup/>! </target>! </delete-config>! </rpc>! <rpc-reply message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <ok/>! </rpc-reply>! MAY 27,
48 NETCONF <lock>, <unlock> Operation Lock/unlock a complete data store <rpc message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <lock>! <target>! <candidate/>! </target>! </lock>! </rpc>! <rpc-reply message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base: 1.1">! <ok/>! </rpc-reply>! MAY 27,
49 NETCONF <get> Operation Read configuration and status <rpc message-id="101 xmlns= urn:ietf:param <get>! <filter type="subtree">! <top xmlns=" <interfaces>! <interface>! <ifname>eth0</ifname>! </interface>! </interfaces>! </top>! </filter>! </get>! <rpc-reply message-id="101 xmlns= urn:ie! <data>! <top xmlns=" <interfaces>! <interface>! <ifname>eth0</ifname>! <ifinoctets>45621</ifinoctets>! <ifoutoctets>774344</ifoutoctet! </interface>! </interfaces>! </top>! </data>! </rpc-reply>! MAY 27,
50 NETCONF <close-session> Operation Polite way of disconnecting <rpc message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <close-session/>! </rpc>! <rpc-reply message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base: 1.1">! <ok/>! </rpc-reply>! MAY 27,
51 NETCONF <kill-session> Operation Not so polite way of disconnecting another session Releases any locks, aborts any confirmed commit related to session <rpc message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <kill-session>! <session-id>17</session-id>! </kill-session>! </rpc>! <rpc-reply message-id="101 xmlns="urn:ietf:params:xml:ns:netconf:base: 1.1">! <ok/>! </rpc-reply>! MAY 27,
52 NETCONF capabilities :writable-running! <edit-config> and <copy-config> can have candidate as a <target>! :candidate! Share scratch-pad! <commit> to running! <discard-changes>! :confirmed-commit! <confirmed> parameter to commit! <cancel-commit>! :validate! <validate>! <test-option> parameter to the <edit-config>! :startup! :url! :xpath! MAY 27,
53 NETCONF <partial-lock> Operation Lock parts of the configuration in the running store <nc:rpc xmlns= partial-lock! xmlns:nc= netconf! message-id= 135 >! <partial-lock>! <select xmlns:rte= > /rte:routing/rte:virtualrouter [rte:routername='router1']! </select>! <select xmlns:if= >! if:interfaces/ if:interface[if:id='eth1']! </select>! </partial-lock>! </nc:rpc>!!! <nc:rpc-reply xmlns:nc= net! xmlns= partial-lock! message-id="135">! <lock-id>127</lock-id>! <locked-node xmlns:rte=! /rte:routing/rte:virtualrouter [rte:routername='router1']! </locked-node>! <locked-node xmlns:if=! /if:interfaces/ if:interface[if:id='eth1']! </locked-node>! </nc:rpc-reply>! MAY 27,
54 NETCONF FILTERS MAY 27,
55 NETCONF Filters Namespace Selection Containment Nodes Selection Nodes Content Match Nodes Attribute Match Expression XPATH (capability) MAY 27,
56 NETCONF Filters: Namespace selection <filter type="subtree"> <top xmlns="hcp://example.com/schema/1.2/config"/> </filter> Selec5on Node An empty leaf node within a filter <top/> <top></top> MAY 27,
57 NETCONF Filters: Containment <filter type="subtree"> <top xmlns="hcp://example.com/schema/1.2/config"> <users/> </top> </filter> MAY 27,
58 NETCONF Filters: Content Match <filter type="subtree"> <top xmlns="hcp://example.com/schema/1.2/config"> <users> <user> <name>fred</name> </user> </users> </top> </filter> MAY 27,
59 NETCONF Filters: Attribute Match Containment Nodes <filter type="subtree"> <t:top xmlns:t="hcp://example.com/schema/1.2/config"> <t:interfaces> <t:interface t:ifname="eth0"/> </t:interfaces> </t:top> </filter> XML Acribute. Selec5on Node MAY 27,
60 NOTIFICATIONS MAY 27,
61 Event Notifications What is right for you? SNMP Traps over UDP SYSLOG Messages over UDP NETCONF Notifications over SSH Define your own! NETCONF Requires open connection Supports replay SNMP Much used, works ok Limited payload Connection-less SYSLOG Lacks standard format MAY 27,
62 Example: VPN provisioning using NETCONF Network-wide Transactions MAY 27,
63 VPN Scenario Site B Site A North East An operator owns a network of routers and other equipment from different vendors They have a management station connected to all the devices in the network to provision and monitor services Now, we need to set up a VPN between two customer sites There is no point what so ever to make any changes on any device unless all changes succeed We need a Network-wide Transaction West MAY 27,
64 Hello Exchange capabilities >>>>> Router-West (Sun Nov 15 14:41:25 CET 2009)! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! </capabilities>! </hello>! Site B Site A West North East <<<< Router-West (Sun Nov 15 14:41:25 CET 2009)! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! <capability> <capability> <capability> </capabilities>! <session-id>4</session-id>! </hello>! MAY 27,
65 Lock the candidate data stores >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="2">! <nc:lock>! <nc:target>! <nc:candidate></nc:candidate>! </nc:target>! </nc:lock>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="2">! <ok></ok>! </rpc-reply>! MAY 27,
66 Lock the running data stores >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="3">! <nc:lock>! <nc:target>! <nc:running></nc:running>! </nc:target>! </nc:lock>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="3">! <ok></ok>! </rpc-reply>! MAY 27,
67 Clear the candidate data stores >>>>> Router-West (Sun Nov 15 15:24:32 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="1">! <nc:discard-changes></nc:discard-changes>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="1">! <ok></ok>! </rpc-reply>! MAY 27,
68 Edit the candidates >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="5">! <nc:edit-config>! <nc:target><nc:candidate></nc:candidate></nc:target>! <nc:config>! <quagga:system xmlns:quagga=" <quagga:vpn>! <quagga:ipsec>! <quagga:tunnel>! <quagga:name>volvo-0</quagga:name>! <quagga:local-endpoint> </quagga:local-endpoint>! <quagga:local-net> </quagga:local-net>! <quagga:local-net-mask> </quagga:local-net-mas! <quagga:remote-endpoint> </quagga:remote-endpoint>! <quagga:remote-net> </quagga:remote-net>! <quagga:pre-shared-key>ford</quagga:pre-! <quagga:encryption-algo>default! <quagga:hash-algo>defau! MAY 27,
69 Validate candidates >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="6">! <nc:validate>! <nc:source>! <nc:candidate></nc:candidate>! </nc:source>! </nc:validate>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="6">! <ok></ok>! </rpc-reply>! MAY 27,
70 Commit candidates to running >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="7">! <nc:commit></nc:commit>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="7">! <ok></ok>! </rpc-reply>! Confidential Information May 11, 2014 MAY 27,
71 Unlock candidates >>>>> Router-West (Sun Nov 15 15:24:33 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="8">! <nc:unlock>! <nc:target>! <nc:candidate></nc:candidate>! </nc:target>! </nc:unlock>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:24:33 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="8">! <ok></ok>! </rpc-reply>! MAY 27,
72 Using confirmed-commit Now do the same thing again, but instead of commit >>>>> Router-West (Sun Nov 15 15:29:19 CET 2009)! <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" nc:message-id="16">! <nc:commit>! <nc:confirmed></nc:confirmed>! <nc:confirm-timeout>120</nc:confirm-timeout>! </nc:commit>! </nc:rpc>! <<<< Router-West (Sun Nov 15 15:29:19 CET 2009)! <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.1" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.1" message-id="16">! <ok></ok>! </rpc-reply>! MAY 27,
73 Disaster happens One of the devices disconnected The management station disconnects all the rest They all roll back to the previous configuration The management station reconnects >>>>> Router-West (Sun Nov 15 15:30:22 CET 2009)! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! </capabilities>! </hello>! <<<< Router-West (Sun Nov 15 15:30:22 CET 2009)! <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.1">! <capabilities>! <capability>urn:ietf:params:netconf:base:1.1</capability>! <capability>urn:ietf:params:netconf:capability:writable-running:1.! MAY 27,
74 Common NETCONF Use Cases Network-wide transactions Applying and testing a configuration Testing and rejecting a configuration Rollback when device goes down Transactions requiring all devices to be up Backlogging transactions Synchronizing MAY 27,
75 YANG Overview and Examples MAY 27,
76 YANG? Data modeling language Configuration data State data Tree structure Close to device Managing device features Data and Types Constraints Augmentation Reusable structures Extensions SMI translation XML NETCONF Transport Encoding YANG XML Model mapping acme- box module proper5es container name: string, config interfaces container interface: list, index = name name: string, config oper- state: enum, config MAY 27,
77 YANG? MAY 27,
78 YANG Module Contents Header information Imports & Includes Type definitions Configuration & Operational data declarations Action (RPC) & Notification declarations MAY 27,
79 YANG Header URI MAY 27,
80 YANG Data Definitions MAY 27,
81 Data Modeling Nodes Leaf Leaf-List Container List MAY 27,
82 Leaf Statement Holds a single value of a particular type Has no children host-name cpu-temp leaf host-name {! type string;! mandatory true;! config true;! description "Hostname for this system";! leaf cpu-temp {! type int32;! units degrees-celsius;! config false;! description Current temperature in CPU";!! NETCONF XML: <host-name>my.example.com</host-name> cpu- temp not returned in NETCONF get- config MAY 27,
83 Attributes for leaf config! default! Whether this leaf is a configurable value ( true ) or operational value ( false ). Inherited from parent container if not specified Specifies default value for this leaf. Implies that leaf is optional mandatory! Whether the leaf is mandatory ( true ) or optional ( false ) must! XPath constraint that will be enforced for this leaf type! when! descripti on! The data type (and range etc) of this leaf Conditional leaf, only present if XPath expression is true Human readable definition and help text for this leaf reference! Human readable reference to some other element or spec units! Human readable unit specification (e.g. Hz, MB/s, ) status! Whether this leaf is current, deprecated or obsolete MAY 27,
84 Leaf-list Statement Holds multiple values of a particular type Has no children domain-search leaf-list domain-search {! type string;! ordered-by user;! description "List of domain names to search";! NETCONF operations to insert first, last, before, after NETCONF XML: <domain-search>high.example.com</domain-search> <domain-search>low.example.com</domain-search> MAY 27,
85 Container Statement Groups related leafs and containers system services container system {! container services {! container ssh {! presence "Enables SSH";! description "SSH service specific configuration";! // more leafs, containers and other things here...! Presence containers explicitly created/deleted by NETCONF client. They also represent config themselves. Normal containers have no meaning, just organiza5on of data. ssh Presence NETCONF XML: <system> <services> <ssh> </ssh> </services> </system> MAY 27,
86 List Statement user name uid full-name class Default list user {! key name;! leaf name {! type string;! leaf uid {! type uint32;!! leaf full-name {! type string;! leaf class {! type string;! default viewer;! NETCONF XML: <user> <name>glocks</name> </user> <user> <name>snowey</name> </user> Non- config lists can skip key Given at create! NETCONF operations to insert first, last, before, after MAY 27,
87 Putting things together MAY 27,
88 Attributes for list and leaf-list maxelements! minelements! orderedby! Max number of elements in list. If max-elements is not specified, there is no upper limit, i.e. unbounded Min number of elements in list. If min-elements is not specified, there is no lower limit, i.e. 0 List entries are sorted by system or user. System means elements are sorted in a natural order (numerically, alphabetically, etc). User means the order the operator entered them in is preserved. ordered-by user is meaningful when the order among the elements have significance, e.g. DNS server search order or firewall rules. MAY 27,
89 Keys user name uid full-name class Default yang 1010 Yan Goode admin hawk 1152 Ron Hawk oper ling 1202 Lin Grossman viewer The key field is used to specify which row we re talking about. No two rows can have same key value /user[name= yang ]/name = yang! /user[name= yang ]/uid = 1010! /user[name= yang ]/class = admin!! /user[name= ling ]/class = viewer! MAY 27,
90 Keys user uid name full-name class Default 1010 yang Yan Goode admin 1152 hawk Ron Hawk oper 1202 ling Lin Grossman viewer If we want, we could select the uid to be key instead. /user[uid= 1010 ]/name = yang! /user[uid= 1010 ]/uid = 1010! /user[uid= 1010 ]/class = admin!! /user[uid= 1202 ]/class = viewer!! MAY 27,
91 Unique Statement user uid name full-name class Default 1010 yang Yan Goode admin 1152 hawk Ron Hawk oper 1202 ling Lin Grossman viewer Non- key fields can also be declared unique. Multiple fields can be declared unique separately or in combination list user {! key uid;! unique name;!!! No two rows above can have same uid, nor name! MAY 27,
92 Multiple keys route ip prefix next-hop metric Default Multiple key fields are needed when a single key field isn t unique. Key fields must be a unique combination list route {! key ip prefix ;!!! /route[ip= ][prefix= 16 ]/nexthop = !! Key order significant MAY 27,
93 Leafref To make an element reference one of the rows in a list, set the element type to leafref For lists with multiple keys, the #leafrefs must match #keys in list A valid leafref can never be null/empty But the parent leaf can be optional A valid leafref can never point to a row that has been deleted or renamed System checks validity of leafrefs automatically MAY 27,
94 Leafref interface rip name address eth0.16 eth eth network-ifname ifname eth0.19 Here, the RIP routing subsystem has a list of leafrefs pointing out existing interfaces container rip {! list network-ifname {! key ifname;!! leaf ifname {! type leafref {! path /interface/name ;! MAY 27,
95 Multiple Key Leafref client video ip port v-ip v-port container video {! leaf v-ip {! type leafref {! path "/client/ip";! leaf v-port {! type leafref {! path "/client[ip=current()/../v-ip]/port";! MAY 27,
96 Deref() XPATH Operator container video {! leaf v-ip {! type leafref {! path "/client/ip";! leaf v-port {! type leafref {! path "/client! [ip=current()/../v-ip]/port";! leaf v-stream {! type leafref {! path "/client! [ip=current()/../v-ip] [port=current()/../v-port] /stream";! container video-deref {! leaf v-ip {! type leafref {! path "/client/ip";! leaf v-port {! type leafref {! path "deref(../v-ip) /../port ;! leaf v-stream {! type leafref {! path "deref(../v-port) /../stream";!!! } MAY 27,
97 Grouping Statement Think macro expansion grouping target {! leaf address {! type inet:ip-address;! description "Target IP";! leaf port {! type inet:port-number;! description "Target port number";! container peer {! container destination {! uses target;! Groupings can be refined when used target peer address port destination address port MAY 27,
98 Grouping Statement with Refine Groupings may be refined when used grouping target {! leaf address {! type inet:ip-address;! description "Target IP";! leaf port {! type inet:port-number;! description "Target port number";! container servers {! container http {! uses target {! refine port {! default 80;! MAY 27,
99 IMPORT AND INCLUDE MAY 27,
100 Imports & Includes Module X Namespace Module Y Namespace Fragment A.yang import include include Fragment B.yang include Fragment E.yang Imported fragments are just referenced, not included Fragment C.yang Fragment D.yang Each included fragment is a complete YANG file; can never be included in any other module/namespace MAY 27,
101 Submodules Each submodule belongs to one specific main module module acme-module {! namespace ;! prefix acme;!! import ietf-yang-types" {! prefix yang;! include "acme-system";!! submodule acme-system {! belongs-to acme-module {! prefix acme;!! import ietf-yang-types" {! prefix yang;!! container system {!! Attention: The submodule cannot reference definitions in main module MAY 27,
102 YANG Types MAY 27,
103 YANG Base Types Most YANG elements have a data type Type may be a base type or derived type Derived types may be simple typedefs or groupings (structures) There are 20+ base types to start with And more in modules like ietf-yang-types, RFC 6021 Type Name int8/16/32/64! Meaning Integer uint8/16/32/64! Unsigned integer decimal64! string! enumeration! boolean! bits! binary! leafref! identityref! empty! Non-integer Unicode string Set of alternatives True or false Boolean array Binary BLOB Reference pointer Unique identity No value, void and more MAY 27,
104 Typedef Statement Defines a new simple type typedef percent {! type uint16 {! range " ";! description "Percentage";!! leaf completed {! type percent;! percent completed Can be scoped MAY 27,
105 Type Restrictions Integers typedef my-base-int32-type {! type int32 {! range " ";!! typedef derived-int32 {! type my-base-int32-type {! range "11..max"; // ! }! Strings typedef my-base-str-type {! type string {! length "1..255";!! typedef derived-str {! type my-base-str-type {! length " max"; pattern "[0-9a-fA-F]*";! MAY 27,
106 Union Statement A value that represents one of its member types! typedef threshold {! description Threshold value in percent";! type union {! type uint16 {! range " ";! type enumeration {! enum disabled {! description "No threshold";! MAY 27,
107 Common YANG Types Commonly used YANG types defined in RFC 6021 Use import ietf-yang-types { prefix yang; } to reference these types as e.g. type yang:counter64;! counter32/64! gauge32/64! objectidentifier! date-and-time! timeticks! timestamp! phys-address! ip-version! flow-label! port-number! ip-address! ipv4-address! ipv6-address! ip-prefix! ipv4-prefix! ipv6-prefix! domain-name! uri! mac-address! bridgeid! vlanid! and more MAY 27,
108 YANG RPCs & Notifications MAY 27,
109 RPC Statement Administrative actions with input and output parameters rpc activate-software-image {! input {! leaf image {! type binary;! output {! leaf status {! type string;! activate-software-image image status MAY 27,
110 Notification Statement Notification with output parameters notification config-change {! description! The configuration changed";! leaf operator-name {! type string;! leaf-list change {! type instance-identifier;! config- change operator- name change Instance-identifier values <change>/ex:system/ex:services/ex:ssh/ex:port</change>! <change>/ex:system/ex:user[ex:name='fred']/ex:type</change>! <change>/ex:system/ex:server[ex:ip=' '][ex:port='80 ]</change>! MAY 27,
111 Advanced YANG Statements MAY 27,
112 Must Statement Restricts valid values by Xpath 1.0 expression container timeout {! leaf access-timeout {! description "Maximum time without server response";! units seconds;! mandatory true;! type uint32;! leaf retry-timer {! description "Period to retry operation";! units seconds;! type uint32;! must current() <../access-timeout" {! error-app-tag retry-timer-invalid;! error-message "The retry timer must be "! + "less than the access timeout";! MAY 27,
113 Must Statement leaf max-weight {! type uint32 {! range " ";! default 100;!! must "sum(/sys:sys/interface[enabled = 'true']/weight)! < current()" {!! error-message "The total weight exceeds the configured! max weight";! MAY 27,
114 Augment Statement user + name uid full-name class expire Default augment /sys:system/sys:user {! leaf expire {! type yang:date-and-time;! MAY 27,
115 When Statement user + name uid full-name class expire shell Default When augment /sys:system/sys:user {! when sys:class = wheel ";! leaf shell {! type string;! MAY 27,
116 Choice Statement Choice allows one of several alternatives transfer- method transfer- interval choice transfer-method {! leaf transfer-interval {! transfer- on- commit description "Frequency at which file transfer happens";! type uint16 {! range " ";! units minutes;! leaf transfer-on-commit {! description "Transfer after each commit";! type empty;! MAY 27,
117 Choice Statement Each alternative may consist of multiple definitions Either as a named or anonymous group choice counters {! case four-counters {! leaf threshold { leaf ignore-count { leaf ignore-time { leaf reset-time { container warning-only {!! default four-counters;! Only in schema tree Not in the data tree or NETCONF Device handles dele5on of other case when case is created. MAY 27,
118 Identity Statement Identities for modeling families of related enumeration constants module phys-if {!! identity ethernet {! description! identity eth-1g {! base ethernet;! identity eth-10g {! base ethernet;! module newer {!! identity eth-40g {! base phys-if:ethernet;! identity eth-100g {! base phys-if:ethernet;!! leaf eth-type {! type identityref {! base phys-if:ethernet";!! MAY 27,
119 Feature Statement Mark data as conditional feature has-local-disk {! description! System has a local file! system that can be used! for storing log files ;!! container system {! container logging {! if-feature has-local-disk;! presence Logging enabled ;! leaf buffer-size {! type filesize;! system logging Feature, Presence buffer-size The features supported by a system are meant to stay relatively constant. Adding a feature is comparable to a hardware upgrade. MAY 27,
120 Deviations Systems should conform to standard Yang Modules Still, if a device can t, that can be properly declared deviation /base:system/base:user/base:type {! deviate add {! default "admin"; // new users are 'admin' by default! deviation /base:system/base:name-server {! deviate replace {! max-elements 3;! MAY 27,
121 Current IETF Status MAY 27,
122 IETF Activities NETCONF Working Group Rechartering in progress NETCONF over TLS Reverse SSH NETMOD Working Group Interface configuration IP address management Basic routing management System management (i.e. MIB-II) SNMP Configuration Maybe: RESTCONF DHCPv6 option for server discovery Efficiency extensions Maybe: Topologies ACLs OSPF MAY 27,
123 NETCONF RFC Overview RFC 3535 Informational: Background RFC 6244 NETCONF+Yang Architectural Overview RFC 6241 Base NETCONF Protocol RFC 6242, , 5539 Transport Mappings RFC 5277 Notifications RFC 5717 Partial Locking RFC 6243 With defaults RFC 6470 Base Notifications RFC 6536 NETCONF Access Control Model! MAY 27,
124 YANG RFC Overview RFC 6020 YANG Base Specification RFC 6021 YANG Types RFC 6087 Guidelines for YANG Authors and Reviewers RFC 6110 Mapping and Validating YANG RFC 6244 NETCONF+Yang Architectural Overview RFC 6643 Translation of SMIv2 MIBs to YANG! MAY 27,
125
Instant YANG. The Basics. Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com)
Instant YANG Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com) This is a short primer on the NETCONF data modeling language YANG. To learn more about YANG, take a look at the tutorials and examples
Tail-f White Paper. Configuration Management Simplified. Executive summary. Why NETCONF and YANG?
Configuration Management Simplified Executive summary The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented
Network Configuration Management Using NETCONF and YANG
ACCEPTED FROM OPEN CALL Network Configuration Management Using NETCONF and YANG Jürgen Schönwälder, Jacobs University Martin Björklund, Tail-f Systems Phil Shafer, Juniper Networks ABSTRACT The Internet
Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14
Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,
TAIL-F SYSTEMS TECHNOLOGY BRIEF Creating and modifying network services using Tail-f NCS
TAIL-F SYSTEMS TECHNOLOGY BRIEF Creating and modifying network services using Tail-f NCS Table of Contents Introduction...3 Terminology...3 Defining a New Service Type...3 Changing Service Models...6 Benefits
OpenFlow Configuration and Management Protocol OF-CONFIG 1.0
OpenFlow Configuration and Management Protocol OF-CONFIG 1.0 1 OF-CONFIG 1.0 OpenFlow Configuration and Management Protocol Version 1.0 ONF Document Type: OpenFlow Config ONF Document Name: of-config1dot0-final
A Guide to NETCONF for SNMP Developers
A Guide to NETCONF for SNMP Developers IEEE 802 Plenary, San Diego, CA US Andy Bierman July 14, 2014 v0.6 2014-07-10 Abstract NETCONF is a standards track protocol developed in the
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Outline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Outline of the SNMP Framework Management Program
NCClient: A Python Library for NETCONF Client Applications
NCClient: A Python Library for NETCONF Client Applications Shikhar Bhushan, Ha Manh Tran, Jürgen Schönwälder IPOM 2009, Venice, 2009-10-30 Support: EU IST-EMANICS Network of Excellence (26854) 1 / 1 Outline
Network Configuration Management with NETCONF and YANG. 84th IETF Meeting, Vancouver, 2012-07-29
Network Configuration Management with NETCONF and YANG Jürgen Schönwälder 84th IETF Meeting, Vancouver, 2012-07-29 1 / 90 Network Management Protocol Soup GDMO/CMIP [OSI] SMI/SNMP [IETF] IE/IPFIX [IETF]
NCS. EMS/NMS Platforms for Network Equipment Providers
NCS EMS/NMS Platforms for Network Equipment Providers NCS Overview Tail-f s Network Control System (NCS) is a powerful solution for developing centralized management platforms that configure and element
TELE 301 Network Management
TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
SNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
Better management of large-scale, heterogeneous networks toward a programmable management plane
Better management of large-scale, heterogeneous networks toward a programmable management plane Joshua George, Anees Shaikh Google Network Operations www.openconfig.net Agenda 1 2 3 Management plane challenges
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
MIB Explorer Feature Matrix
MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series
CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Monitoring the Firewall Services Module
24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
SNMP Informant. SNMP Informant, the default Microsoft SNMP extension agents and WMI January 2009
Informant Systems, Inc. 11135-23A Avenue Edmonton, AB T6J4W5 Canada p: 780.908.6669 f: 780.434.8991 www.informant-systems.com SNMP Informant SNMP Informant, the default Microsoft SNMP extension agents
Configuring Stickiness
CHAPTER5 This chapter describes how to configure stickiness (sometimes referred to as session persistence) on an ACE module. It contains the following major sections: Stickiness Overview Configuration
Replication and High-Availability
ConfD XML-Based Network Management Software Next-Generation Configuration Management The increasing complexity of operator and enterprise networks and the requirement to deliver new services is driving
Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings...
Table of Contents Overview...2 System Requirements...3 Hardware...3 Software...3 Loading and Unloading MIB's...3 Settings...3 SNMP Operations...4 Multi-Varbind Request...5 Trap Browser...6 Trap Parser...6
P. van der Stok. Intended status: Standards Track Expires: April 18, 2016. J. Schoenwaelder Jacobs University A. Sehgal. consultant.
core Internet-Draft Intended status: Standards Track Expires: April 18, 2016 P. van der Stok consultant A. Bierman YumaWorks J. Schoenwaelder Jacobs University A. Sehgal consultant October 16, 2015 CoAP
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
WebNMS Go SNMP API. Help Documentation. Created: Monday, March 16, 2015. Copyright Zoho Corp.. All Rights Reserved.
WebNMS Go SNMP API Help Documentation Created: Monday, March 16, 2015 Copyright Zoho Corp.. All Rights Reserved. [Go SNMP API - Help] copyright Zoho Corp.. All rights reserved. http://gosnmpapi.webnms.com/
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
SNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized
SNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
Abstract. An SNMP Agent for a DTV Data Server. Dinkar Bhat David Catapano James Kenealy Gomer Thomas
An SNMP Agent for a DTV Data Server by Dinkar Bhat David Catapano James Kenealy Gomer Thomas Abstract This paper presents a framework for remote control and monitoring of a DTV data server using the Simple
Automating Network and Service Configuration Using NETCONF and YANG
Automating Network and Service Configuration Using NETCONF and YANG Stefan Wallin Luleå University of Technology [email protected] Claes Wikström Tail-f Systems AB [email protected] Abstract Network
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
Manage Firewalls and Log Collection
Manage Firewalls and Log Collection Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Smart Management for Robust Carrier Network Health & Reduced TCO. Colby Barth, Distinguished Engineer, Juniper Networks
Smart Management for Robust Carrier Network Health & Reduced TCO Colby Barth, Distinguished Engineer, Juniper Networks PHILOSOPHICALLY SPEAKING Only you know your network! Enable smart network management
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Web Services Technologies
Web Services Technologies XML and SOAP WSDL and UDDI Version 16 1 Web Services Technologies WSTech-2 A collection of XML technology standards that work together to provide Web Services capabilities We
LifeSize UVC Access Deployment Guide
LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
vrealize Automation Load Balancing
vrealize Automation Load Balancing Configuration Guide Version 6.2 T E C H N I C A L W H I T E P A P E R A U G U S T 2 0 1 5 V E R S I O N 1. 0 Table of Contents Introduction... 4 Load Balancing Concepts...
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Network Management (NETW-1001)
Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Adding an Extended Access List
CHAPTER 11 This chapter describes how to configure extended access lists (also known as access control lists), and it includes the following topics: Information About Extended Access Lists, page 11-1 Licensing
BEA WebLogic Server. and BEA WebLogic Express. SNMP Management Guide
BEA WebLogic Server and BEA WebLogic Express SNMP Management Guide BEA WebLogic Server Version 6.1 Document Date: December 19, 2001 Copyright Copyright 2001 BEA Systems, Inc. All Rights Reserved. Restricted
SNMPc Release 7.0 Disaster Recovery Support. Castle Rock Computing March, 2004
SNMPc Release 7.0 Disaster Recovery Support Castle Rock Computing March, 2004 Overview Communication networks have become an indispensable part of modern enterprises. Employee and customer interaction,
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
LDAP User Service Guide 30 June 2006
LDAP User Service Guide 30 June 2006 This documents usage of the LDAP User Service for NiagaraAX version 3.1. INSTALLATION... 2 PALETTE... 3 LDAPUSERSERVICE... 3 ACTIVEDIRECTORYSERVICE... 3 KEY CONCEPTS...
Configuring VIP and Virtual IP Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual IP Interface Redundancy This chapter describes how to plan for and configure Virtual IP (VIP) and Virtual IP Interface Redundancy on the CSS. Information in this chapter
The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14
The presentation explains how to create and access the web services using the user interface. Page 1 of 14 The aim of this presentation is to familiarize you with the processes of creating and accessing
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN)
OpenFlow and Software Defined Networking presented by Greg Ferro Software Defined Networking (SDN) would like to thank Greg Ferro and Ivan Pepelnjak for giving us the opportunity to sponsor to this educational
EMC ViPR Controller. ViPR Controller REST API Virtual Data Center Configuration Guide. Version 2.3.0.0 302-002-070 01
EMC ViPR Controller Version 2.3.0.0 ViPR Controller REST API Virtual Data Center Configuration Guide 302-002-070 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in USA. Published
White Paper Case Study:
White Paper Case Study: SNMP CLI Abstract: The purpose of this document is to convey to the reader the usefulness of an SNMP (Simple Network Management Protocol) CLI (Command Line Interface). This document
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
Configuration Commands. SNMP System Commands. engineid. 7950 XRS System Management Guide Page 303 SNMP. Syntax [no] engineid engine-id
SNMP Configuration Commands SNMP System Commands engineid Syntax [no] engineid engine-id Context config>system>snmp Description This command sets the SNMP engineid to uniquely identify the SNMPv3 node.
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Domain Name Resolver (DNR) Configuration
CHAPTER 7 Domain Name Resolver (DNR) Configuration This chapter provides an overview of the information required to customize Cisco IOS for S/390. It includes these sections: Introducing the Domain Name
SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel
SOFTWARE DEFINED NETWORKS REALITY CHECK DENOG5, Darmstadt, 14/11/2013 Carsten Michel Software Defined Networks (SDN)! Why Software Defined Networking? There s a hype in the industry!! Dispelling some myths
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Chapter 3 Configuring Basic IPv6 Connectivity
Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Chapter 3 Using Access Control Lists (ACLs)
Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol
Veriton. Getting the Best out of Hardware Load Balancers in an Oracle Environment. What is a Load Balancer? Agenda. What s out there?
Getting the Best out of Hardware Load Balancers in an Oracle Environment Simon Haslam Veriton Limited Veriton Oracle Partner, established 13 years Demanding web & call-centre applications Oracle ias &
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
