Network Configuration Management with NETCONF and YANG. 84th IETF Meeting, Vancouver,
|
|
|
- Irma Pearson
- 10 years ago
- Views:
Transcription
1 Network Configuration Management with NETCONF and YANG Jürgen Schönwälder 84th IETF Meeting, Vancouver, / 90
2 Network Management Protocol Soup GDMO/CMIP [OSI] SMI/SNMP [IETF] IE/IPFIX [IETF] TL1 [TELCORDIA] CLI [VENDORS] DME/DCE [OSF] CMIN/WBEM [DMTF] TR069/SOAP [BROADBANDFORUM] DEN/LDAP [DMTF] TINA/ODL/CORBA [TINA C] SYSLOG [BSD/IETF] SID/TAM [TMFORUM] EC2 [AMAZON] YANG/NETCONF [IETF] SPPI/COPS PR [IETF] POLICY/COPS [IETF] See RFC 6632 for further details about the IETF s contribution to the network management protocol soup. 2 / 90
3 Today s Menu... NETCONF The Network Configuration Protocol (NETCONF) provides mechanisms to install, manipulate, and delete the configuration of network devices. [RFC 6241] YANG YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [RFC 6020] 3 / 90
4 Configuration Management [15 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 4 / 90
5 The Network is the Record Policy Management Systems Service Management Systems Network Topology Information Network Status and Performance Information Device Configuration Device Configuration Device Configuration Device Configuration Device Configuration Configuration Backup Repository Network operators typing / scripting proprietary CLIs Often coupled with a backup repository to track changes Labor intensive, expensive, error prone, widely deployed 5 / 90
6 Generate Everything (RFC 3139) Policy Management Systems Service Management Systems Network Topology Information Network Wide Configuration Database Network Status and Performance Information Configuration Data Translator Device Configuration Device Configuration Device Configuration Device Configuration Device Configuration Changes go to a network-wide configuration database Device configurations are automatically pushed to devices Devices are (ideally) never touched manually 6 / 90
7 Configuration Management Requirements R1 A configuration management protocol must be able to distinguish between configuration state and operational state. (configuration state vs. operational state) Configuration state: Everything explicitely configured (e.g., IP addresses assigned manually to network interfaces) Operational state: Usage and error counters obtained by the device State learned from interaction with other devices (e.g., an IP address obtained from a DHCP server) 7 / 90
8 Configuration Management Requirements R2 A configuration management protocol must provide primitives to prevent errors due to concurrent configuration changes. (concurrency support) Goal: Prevent two operators from making configuration changes simultaneously that lead to undesired results Requires either strict locking or a conflict resolution mechanism Computer programs generally deal better with strict locking, conflict resolution requires intelligence Scope of locks determines how much concurrency is possible 8 / 90
9 Configuration Management Requirements R3 A configuration management protocol must provide primitives to apply configuration changes to a set of network elements in a robust and transaction-oriented way. (configuration transactions) Example: renumbering a whole network All devices need to pick up new addresses During the renumbering process (activation of a new configuration), connectivity might be temporarily lost Devices need to be able to decide whether they keep the new configuration (addressing scheme) or rollback to the previous configuration 9 / 90
10 Configuration Management Requirements R4 A configuration management protocol must be able to distinguish between several configurations and devices should be able to hold multiple configurations. (multiple configurations) Configurations can become large and complex Often useful to keep a few configurations on the device to easily switch between them (backup configs) Distinction between the running configuration and the configuration used at next re-initialization 10 / 90
11 Configuration Management Requirements R5 It is important to distinguish between the distribution of configurations and the activation of a certain configuration. (distribution vs. activation) Example: peak hours vs. off-peak hours An operator wants to turn off links during off-peak hours This might happen once per day or even more frequently Instead of shipping a complete new configuration each time, it is much more efficient to activate a different already locally stored configuration Implementations may internally keep data derived from known locally stored configurations in order to make the activation as smooth as possible 11 / 90
12 Configuration Management Requirements R6 A configuration management protocol must be clear about the persistence of configuration changes. (persistence of configuration state) Sometimes changes are temporary and should be forgotten after the next restart of a device Sometimes changes should be applied immediately and be remembered after reboots Sometimes changes should only be applied at the next restart of a device 12 / 90
13 Configuration Management Requirements R7 A configuration management protocol must be able to report configuration change events. (configuration change events) Example: firewall rules break applications Customers report that certain applications suddenly fail to function correctly Reason: A new firewall rule causes certain messages these applications rely on to be blocked A log of configuration change events often helps during fault isolation / resolution 13 / 90
14 Configuration Management Requirements R8 A full configuration dump and a full configuration restore are primitive operations frequently used by operators and must be supported appropriately. (configuration dump and restore) This seems to be rather obvious to operators Some network management protocols fail badly here 14 / 90
15 Configuration Management Requirements R9 A configuration management protocol must represent configuration state and operational state in a form enabling the use of existing tools for comparison, conversion, and versioning. (support for standard tools) Many operators use home-grown software systems Such systems often rely on standard tools for processing network management data Data formats enabling the use of off the shelf tools eases integration saves time cuts costs 15 / 90
16 Configuration Management in the IETF No Description SNMP NETCONF R1 config vs. oper state - + R2 concurrency support o + R3 config transactions - [+] R4 multiple configs - [+] R5 distribution vs. activation - [+] R6 persistence of config state o + R7 config change notifications - + R8 config dump and restore - + R9 support of standard tools - + These requirements originate from an IAB workshop that paved the way for NETCONF and YANG [RFC3535] 16 / 90
17 NETCONF and YANG Timeline Date Milestone Jun 2002 IAB network management workshop May 2003 NETCONF working group established work work work Dec 2006 NETCONF 1.0 RFCs published Apr 2008 NETMOD working group established work work work Oct 2010 YANG 1.0 RFCs published Jun 2011 NETCONF 1.1 RFCs published tutorial IETF 84 Q Core configuration data models published 17 / 90
18 NETCONF Protocol [20 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 18 / 90
19 NETCONF RFCs (as of today) RFC Status Content RFC 6241 PS NETCONF Protocol Version 1.1 RFC 6242 PS NETCONF over SSH Version 1.1 RFC 6243 PS NETCONF With-defaults Capability RFC 6470 PS NETCONF Base Notifications RFC 6536 PS NETCONF Access Control Model RFC 5717 PS NETCONF Partial Locking RFC 5277 PS NETCONF Event Notifications RFC 6022 PS NETCONF Monitoring RFC 6244 I NETCONF / YANG Architecture Further RFCs define additional transports Some of the transports may be declared historic soon 19 / 90
20 Deployment Model NETCONF Manager Server Applications Remote NETCONF CLI CLI Client Client CLI Client Server Server Agent Server Instrumentation NETCONF Device Instrumentation NETCONF Device Instrumentation NETCONF Device NETCONF enabled devices include a NETCONF server Management applications include a NETCONF client Device CLIs can be a wrapped around a NETCONF client 20 / 90
21 Layering Model (RFC6241) Layer Example Content Configuration Data Notification Data Operations <get config>, <edit config> Messages <rpc>, <rpc reply> <notification> Secure Transport SSH, TLS, (BEEP/TLS), (SOAP/HTTP/TLS),... Security is provided by the transport layer Operations focus on primitives to manage configurations The set of operations is designed to be extensible 21 / 90
22 Configuration Datastores (RFC6241) A configuration datastore is the complete set of configuration information that is required to get a device from its initial default state into a desired operational state. The <running> configuration datastore represents the currently active configuration of a device and is always present The <startup> configuration datastore represents the configuration that will be used during the next startup The <candidate> configuration datastore represents a configuration that may become a <running> configuration through an explicit commit 22 / 90
23 Transaction Models (RFC6241) Direct Model <edit config> running Candidate Model (optional) <edit config> candidate <commit> running Distinct Startup Model (optional) <edit config> <commit> running <copy config> startup Some operations (edit-config) may support different selectable error behaviours, including rollback behaviour 23 / 90
24 Capability Exchange (RFC6241) After estabilishing a session over a secure transport, both NETCONF protocol engines send a hello message to announce their protocol capabilities, the supported data models, and the server s session identifier. S: <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> S: <capabilities> S: <capability> S: urn:ietf:params:xml:ns:netconf:base:1.1 S: </capability> S: <capability> S: urn:ietf:params:xml:ns:netconf:capability:startup:1.0 S: </capability> S: <capability> S: urn:ietf:params:xml:ns:yang:ietf-interfaces? S: module=ietf-interfaces&revision= S: </capability> S: </capabilities> S: <session-id>4<session-id> S: </hello> 24 / 90
25 Remote Procedure Calls (RFC6241) The Remote Procedure Call (RPC) protocol consists of a <rpc/> message followed by an <rpc-reply/> message. C: <rpc message-id="101" C: xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <get-config> C: <source> C: <running/> C: </source> C: </get-config> C: </rpc> S: <rpc-reply message-id="101" S: xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" S: <data><!--...contents here... --></data> S: </rpc-reply> 25 / 90
26 Remote Procedure Calls (RFC6241) RPC failures are indicated by one or more <rpc-error/> elements contained in the <rpc-reply/> element. C: <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <get-config><source><running/></source></get-config> C: </rpc> S: <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> S: <rpc-error> S: <error-type>rpc</error-type> S: <error-tag>missing-attribute</error-tag> S: <error-severity>error</error-severity> S: <error-info> S: <bad-attribute>message-id</bad-attribute> S: <bad-element>rpc</bad-element> S: </error-info> S: </rpc-error> S: </rpc-reply> 26 / 90
27 NETCONF Operations (RFC6241) get-config(source, filter) data Retrieve all or part of the configuration datastore source. edit-config(target, default-operation, test-option, error-option, config) Edit the configuration datastore target by merging, replacing, creating, or deleting new config elements. The test-option parameter allows to do a dry run while the error-option parameter controls how the server reacts to errors (stop, continue, rollback). copy-config(target, source) Copy the content of the configuration datastore source to the configuration datastore target. 27 / 90
28 NETCONF Operations (RFC6241) delete-config(target) Delete the named configuration datastore target. lock(target) Lock the configuration datastore target. unlock(target) Unlock the configuration datastore target. validate(source) Validate the configuration datastore source (:validate capability). 28 / 90
29 NETCONF Operations (RFC6241) get(filter) data Retrieve all or part of the running configuration data store and merged with the device s state information. close-session() Gracefully close the current session. kill-session(session-id) Force the termination of the session session-id. 29 / 90
30 NETCONF Operations (RFC6241) discard-changes() Revert the candidate configuration datastore to the running configuration (:candidate capability). commit(confirmed, confirm-timeout, persist, persist-id) Commit the candidate to the running configuration datastore with an optional automatic rollback (:candidate, :confirmed-commit capability). cancel-commit(persist-id) Cancel an ongoing confirmed commit identified by persist-id (:confirmed-commit capability). 30 / 90
31 More NETCONF Operations (RFC5717, RFC5277) partial-lock(select) Create a partial lock on the running configuration datastore on the nodes / subtree identified by the select XPath expression (RFC 5717). partial-unlock(lock-id) Remove a previously established partial lock (RFC 5717). create-subscription(stream, filter, start, stop) Subscribe to a notification stream using an optional filter; the optional start/stop times support the replay of notifications (RFC 5277). 31 / 90
32 Editing (Patching) Configuration Embedded operation attributes specify how a configuration is modified by an edit-config() configuration. merge: Configuration data is merged with the configuration. replace: Configuration data replaces existing configuration. create: Configuration data is added iff it does not already exist. delete: Configuration data is deleted from the datastore. 32 / 90
33 Editing (Patching) Configuration Example C: <rpc message-id="101" C: xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <edit-config> C: <target> C: <running/> C: </target> C: <config xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"> C: <interface nc:operation="replace"> C: <name>ethernet0/0</name> C: <mtu>1500</mtu> C: </interface> C: </interfaces> C: </config> C: </edit-config> C: </rpc> 33 / 90
34 Subtree Filtering Subtree filter expressions select XML subtrees to include in get and get-config responses (XPath expressions can be used as well if the :xpath capability is supported). namespace selection (wildcarding) A non-null namespace of a node in a subtree filter matches the node in the given namespace. A null namespace acts as a wildcard. attribute match expressions The set of XML attributes present in any type of filter node form an attribute match expression ; the selected data must have matching values for every attribute of an attribute match expression. 34 / 90
35 Subtree Filtering (cont.) containment nodes For each containment node of subtree filter, all data model instances must exactly match the specified namespaces, element hierarchy, and any attribute match expressions. selection nodes An empty leaf node of a filter selects the specified subtree(s) and it suppresses the automatic selection of the entire set of sibling nodes. content match nodes A leaf node of a filter containing simple content selects some or all of its sibling nodes. 35 / 90
36 Subtree Filtering Example <filter type="subtree"> <!-- namespace selection and containment node selection --> <t:top xmlns:t=" <!-- containment node selection --> <t:interfaces> <!-- containment node selection and attribute match expression --> <!-- (note that YANG does not use XML attributes) --> <t:interface t:ifname="eth0"> </t:interface> </t:interfaces> </t:top> </filter> <!-- selection node --> <t:ifspeed/> <!-- content match node --> <t:type>ethernet</t:if-type> 36 / 90
37 NETCONF over SSH (RFC6242) Motivation: Use an already widely deployed security protocol for CLIs, reducing the costs associated with key management. SSH supports multiple logical channels over one transport layer association For framing purposes, the special end of message marker ]]>]]> is used for the initiall hello message Subsequent NETCONF 1.1 messages use a chunked framing format (if both parties use NETCONF 1.1) SSH is the mandatory to implement NETCONF transport 37 / 90
38 NETCONF over SSH: End-of-Message Framing S: <?xml version="1.0" encoding="utf-8"?> S: <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> S: <capabilities> S: <capability> S: urn:ietf:params:xml:ns:netconf:base:1.1 S: </capability> S: <capability> S: urn:ietf:params:xml:ns:netconf:capability:startup:1.0 S: </capability> S: <capability> S: urn:ietf:params:xml:ns:yang:ietf-interfaces? S: module=ietf-interfaces&revision= S: </capability> S: </capabilities> S: <session-id>4<session-id> S: </hello> S: ]]>]]> Server announces protocol version, startup capability, and the ietf-interfaces data model 38 / 90
39 NETCONF over SSH: End-of-Message Framing C: <?xml version="1.0" encoding="utf-8"?> C: <hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <capabilities> C: <capability> C: urn:ietf:params:xml:ns:netconf:base:1.1 C: </capability> C: </capabilities> C: </hello> C: ]]>]]> Client announces protocol version Client and server switch to chunked framing (both announced support for NETCONF 1.1) 39 / 90
40 NETCONF over SSH: Chunked Framing C: #350 C: <rpc message-id="105" C: xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> C: <get-config> C: <source> C: <running/> C: </source> C: <filter type="subtree"> C: <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"/> C: <interface> C: <type>ethernetcsmacd</type> C: </interface> C: </filter> C: </get-config> C: </rpc> C: ## Messages are send in chunks (limiting buffer sizes) Each chunk is prefixed by its length A special marker indicates the end of a message 40 / 90
41 NETCONF over SSH: Chunked Framing S: #165 S: <rpc-reply message-id="105" S: xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> S: <data> S: <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"> S: #174 S: <interface> S: <name>eth0</name><type>ethernetcsmacd</type> S: <location>0</location><enabled>true</enabled> S: <if-index>2</if-index> S: </interface> S: #174 S: <interface> S: <name>eth1</name><type>ethernetcsmacd</type> S: <location>1</location><enabled>false</enabled> S: <if-index>7</if-index> S: </interface> S: #40 S: </interfaces> S: </data> S: </rpc-reply> S: ## 41 / 90
42 YANG Data Modeling Language [20 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 42 / 90
43 YANG RFCs (as of today) RFC Status Content RFC 6020 PS YANG Version 1 RFC 6021 PS Common Data Types RFC 6087 PS Guidelines for Authors/Reviewers RFC 6095 E YANG Language Abstractions RFC 6110 PS Mapping YANG to DSDL RFC 6643 PS Mapping SMIv2 to YANG RFC 6244 I NETCONF / YANG Architecture YANG data models can be found in RFC 6022, RFC 6241, RFC 6243, RFC 6470, RFC 6536,... We expect this list to grow soon with your help 43 / 90
44 YANG, YIN, XSD, RELAX NG, Schematron YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol, NETCONF operations, and NETCONF notifications. YANG uses a compact syntax since human readability is highest priority YIN is an XML representation of YANG (lossless roundtrip conversion) YANG can be translated to XML Schema and RELAX NG so that existing XML tools can be utilized YANG can be translated to Schematron to validate NETCONF content 44 / 90
45 Modules and submodules import include Module 1 SubMod A Module 2 SubMod X SubMod Y SubMod Z A module is a self-contained collection of YANG definitions A submodule is a partial module definition which contributes derived types, groupings, data nodes, RPCs, and notifications to a module 45 / 90
46 Module Example module ietf-inet-types { namespace "urn:ietf:params:xml:ns:yang:ietf-inet-types"; prefix "inet"; organization "IETF NETMOD (NETCONF Data Modeling Language) Working Group"; contact "WG Web: < description "This module contains a collection of generally useful derived YANG data types for Internet addresses and related things."; revision { description "Initial revision."; reference "RFC 6021: Common YANG Data Types"; 46 / 90
47 Built-in Data Types Category Types Restrictions Integral {u,int{8,16,32,64 range Decimals decimal64 range, fraction-digits String string length, pattern Enumeration enumeration enum Bool and Bits boolean, bits Binary binary length References leafref path References identityref base References instance-identifier Other empty The data type system is mostly an extension of the SMIng type system, accommodating XML and XSD requirements Compatible with the XSD / RelaxNG type systems 47 / 90
48 Derived Types: typedef module ietf-inet-types { namespace "urn:ietf:params:xml:ns:yang:ietf-inet-types"; prefix "inet"; typedef ipv4-address { type string { pattern (([0-1]?[0-9]?[0-9] 2[0-4][0-9] 25[0-5])\.){3 + ([0-1]?[0-9]?[0-9] 2[0-4][0-9] 25[0-5]) + (%[\p{n\p{l]+)? ; typedef ip-address { type union { type inet:ipv4-address; type inet:ipv6-address; description "The ip-address type represents an IP address and is IP version neutral. The format of the textual representations implies the IP version."; 48 / 90
49 Data Nodes: Leafs, Leaf-lists, Container, Lists leaf: A leaf has one value, no children, one instance. leaf-list: A leaf-list has one value, no children, multiple instances. container: A container has no value, holds related children, has one instance. list: A list has no value, holds related children, has multiple instances, has a key property. 49 / 90
50 Example: leaf and leaf-list leaf domain { type inet:domain-name; // values are typed (type imported) mandatory true; // must exist in a valid configuration config true; // part of the set of configuration objects description "The host name of this system."; // XML: <domain>example.com</domain> leaf-list search { type inet:domain-name; // imported from the module with prefix inet ordered-by user; // maintain the order given by the user description "List of domain names to search."; // XML: <search>eng.example.com</search> // XML: <search>example.com</search> 50 / 90
51 Example: container container system { config true; leaf hostname { type inet:domain-name; container resolver { leaf domain { /* see above */ leaf-list search { /* see above */ description "The configuration of the resolver library."; // XML: <system> // XML: <hostname>server.example.com</hostname> // XML: <resolver> // XML: <domain>example.com</domain> // XML: <search>eng.example.com</search> // XML: <search>example.com</search> // XML: </resolver> // XML: </system> 51 / 90
52 Example: list list nameserver { key address; leaf address { type inet:ip-address; leaf status { type enumeration { enum enabled; enum disabled; // XML: <nameserver> // XML: <address> </address> // XML: <status>enabled</status> // XML: </nameserver> // XML: <nameserver> // XML: <address> </address> // XML: <status>disabled</status> // XML: </nameserver> 52 / 90
53 Augment, Must, When, Presence augment: The augment statement places nodes into an existing hierarchy using the current module s namespace. must: The must statement expresses constraints (XPath expressions) that must be satisfied by a valid configuration. when: The when statement can be used to define sparse augmentations where nodes are only added when a condition (XPATH expression) is true. presence: The existance of a presence container carries a certain meaning (a single bit of configuration data). 53 / 90
54 Example: augment and presence augment /system/resolver { container debug { presence "enables debugging"; description "This container enables debugging."; leaf level { type enumeration { enum low; enum medium; enum full; default "medium"; mandatory false; description "The debugging level; default is medium debug information."; // XML: <system><resolver> // XML: <debug/> // XML: </resolver></system> 54 / 90
55 Example: augment and must augment /system/resolver { leaf access-timeout { type uint32; unit "seconds"; mandatory true; description "Maximum time without server response."; leaf retry-timer { type uint32; units "seconds"; description "Period after which to retry an operation"; must ". <../access-timeout" { error-app-tag "retry-timer-invalid"; error-message "The retry timer must be less " + "than the access timeout"; 55 / 90
56 Example: augment and when augment /system/resolver/nameserver { when "status = enabled "; leaf tx { type yang:counter32; config false; leaf rx { type yang:counter32; config false; // XML: <nameserver> // XML: <address> </address> // XML: <status>enabled</status> // XML: <tx>2345</tx> // XML: <rx>1234</rx> // XML: </nameserver> // XML: <nameserver> // XML: <address> </address> // XML: <status>disabled</status> // XML: </nameserver> 56 / 90
57 Grouping, Choice, Notification, RPC grouping: A grouping is a reusable collection of nodes and it can be used to emulate structured data types. A grouping can be refined when it is used. choice: A choice allows one alternative of the choice to exist. It can be used to provide extensibility hooks to be exploited using augments. notification: The notification statement can be used to define the contents of event notifications. rpc: The rpc statement can be used to define operations and their input and output parameters. 57 / 90
58 Example: grouping grouping target { leaf address { type inet:ip-address; description "Target IP address."; leaf port { type inet:ip-port; description "Target port number."; list nameserver { key "address port"; uses target; // XML: <nameserver> // XML: <address> </address> // XML: <port>53</port> // XML: </nameserver> 58 / 90
59 Example: choice container transfer { choice how { default interval; case interval { leaf interval { type uint16; default 30; units minutes; case daily { leaf daily { type empty; leaf time-of-day { type string; units 24-hour-clock; default 1am; case manual { leaf manual { type empty; 59 / 90
60 Example: notification notification nameserver-failure { description "A failure of a nameserver has been detected and the server has been disabled." leaf address { type leafref { path "/system/resolver/nameserver/address"; // MSG: <notification> // MSG: <eventtime> t18:34:50+02:00</eventtime> // MSG: <nameserver-failure> // MSG: <address> </address> // MSG: </nameserver-failure> // MSG: </notification> 60 / 90
61 Example: rpc rpc activate-software-image { input { leaf image-name { type string; output { leaf status { type string; // RPC: <rpc message-id="42"> // RPC: <activate-software-image xmlns="urn:mumble"> // RPC: <image-name>image.tgz</image-name> // RPC: </activate-software-image> // RPC: </rpc> 61 / 90
62 Core Configuration Data Models [15 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 62 / 90
63 Core Interfaces Data Model +--rw interfaces +--rw interface [name] +--rw name +--rw description? +--rw type +--rw location? +--rw enabled? +--ro if-index +--rw mtu? +--rw link-up-down-trap-enable? string string ianaift:iana-if-type string boolean int32 uint32 enumeration A technology agnostic model of network interfaces To be augmented with interface type specific nodes Interfaces can be layered 1:N and N:1 Configuration of layering is technology specific 63 / 90
64 Core IP Interfaces Data Model +--rw if:interfaces +--rw if:interface [name] rw ipv4 +--rw enabled? +--rw ip-forwarding? +--rw address [ip] boolean boolean +--rw ip inet:ipv4-address +--rw (subnet)? +--:(prefix-length) +--rw ip:prefix-length? uint8 +--:(netmask) +--rw ip:netmask? inet:ipv4-address IPv4 interface configuration augments interfaces The (subnet)? line indicates a choice and the (prefix-length) and (netmask) lines indicate a case Both, choice and case do not appear in the config 64 / 90
65 Core IP Interfaces Data Model +--rw if:interfaces +--rw if:interface [name] rw ipv6 +--rw enabled? boolean +--rw ip-forwarding? boolean +--rw address [ip] +--rw ip inet:ipv6-address +--rw prefix-length? uint8 +--rw dup-addr-detect-transmits? uint32 +--rw autoconf +--rw create-global-addresses? boolean +--rw create-temporary-addressed? boolean +--rw temporary-valid-lifetime? uint32 +--rw temporary-preferred-lifetime? uint32 IPv6 interface configuration similarily augments interfaces 65 / 90
66 Core IP Routing Data Model static filter routes main routing filter additional routing direct routes filter table filter table filter filter filter filter routing protcol routing protcol The main routing table is always present, additional routing tables can be configured Route filters control the propagation of routes Core data model plus IP4 and IPv6 unicast routing models 66 / 90
67 Core IP Routing Data Model (ietf-routing) +--rw routing +--rw router [name] +--rw name +--rw router-id? +--rw description? +--rw enabled? +--rw interfaces +--rw interface [name] +--rw name +--rw routing-protocols +--rw routing-protocol [name] +--rw name +--rw description? +--rw type +--rw connected-routing-tables +--rw routing-table [name] +--rw name +--rw import-filter? +--rw export-filter? +--rw static-routes 67 / 90
68 Core IP Routing Data Model (ietf-routing) +--rw routing-tables +--rw routing-table [name] +--rw name +--rw address-family? +--rw safi? +--rw description? +--ro routes +--ro route +--ro source-protocol +--ro age +--rw recipient-routing-tables +--rw recipient-routing-table [name] +--rw name +--rw filter? +--rw route-filters +--rw route-filter [name] +--rw name +--rw description? +--rw type? 68 / 90
69 Core System Data Model: System Identification rpcs: +---x set-current-datetime +--ro input +--ro current-datetime yang:date-and-time +---x system-restart +---x system-shutdown +--rw system +--rw contact? string +--rw name? string +--rw location? string +--ro platform +--ro os-name? string +--ro os-release? string +--ro os-version? string +--ro machine? string +--ro nodename? string Basic information about a device Operations to restart/shutdown as device 69 / 90
70 Core System Data Model: System Time Mgmt +--rw clock +--ro current-datetime? yang:date-and-time +--ro boot-datetime? yang:date-and-time +--rw (timezone)? +--:(timezone-location) +--rw timezone-location? iana:timezone +--:(timezone-utc-offset) +--rw timezone-utc-offset? int16 +--rw ntp +--rw use-ntp? boolean +--rw ntp-server [address] +--rw address inet:host +--rw enabled? boolean Information about current and boot time Timezone configuration Basic NTP client configuration 70 / 90
71 Core System Data Model: User Authentication +--rw dns +--rw search* inet:host +--rw server* inet:ip-address +--rw options +--rw ndots? uint8 +--rw timeout? uint8 +--rw attempts? uint8 +--rw radius +--rw server [address] +--rw address inet:host +--rw authentication-port? inet:port-number +--rw shared-secret? string +--rw options +--rw timeout? uint8 +--rw attempts? uint8 +--rw authentication +--rw user-authentication-order* identityref +--rw user [name] +--rw name string +--rw password? crypt-hash +--rw ssh-dsa? binary +--rw ssh-rsa? binary 71 / 90
72 Other Yang Data Models Description NETCONF Monitoring Data Model NETCONF Access Control Data Model IPFIX Configuration Data Model SNMP Configuration Data Model Status RFC6022 RFC6536 RFC Editor WG Draft The groundwork has been done Time to build data models on top of it Should ideally be done by subject matter experts YANG experts are happy to assist and review 72 / 90
73 Implementations, Tools, and Usage [10 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 73 / 90
74 NETCONF Implementations Commercial (not necessarily complete) Applied Informatics Centered Logic MG-Soft Oracle Tail-f WebNMS YumaPro Open Source (not necessarily complete) EnSuite ncclient netconfx netconf4j netconf4android netopeer Yuma 74 / 90
75 NETCONF in Devices Device Vendors (not necessarily complete) Alaxala Telco Systems BigBand/Arris Brocade Cisco Systems Edgeware Ericsson H3C Huawei Juniper Networks Nexor RuggedCom Sonus Taseon Verivue 75 / 90
76 YANG Implementations Commercial (not necessarily complete) MG-Soft SNMP Research Tail-f (ConfD) YumaPro Open Source (not necessarily complete) jyang libsmi pyang Yuma 76 / 90
77 YANG Data Models IETF (not necessarily complete) IPFIX IPFIX Configuration Model NETMOD Interfaces Core Configuration Model NETMOD IP and Routing Core Data Models NETMOD System Configuration Data Model NETMOD SNMP Configuration Data Model NETCONF NETCONF Monitoring Data Model NETCONF NETCONF Access Control Data Model Other SDOs (not necessarily complete) Open Networking Found. OF-Config 1.1 CableLabs CM-SP-CCAP-OSSI-I Metro Ethernet Forum PM and FM (to be published) 77 / 90
78 Future Directions [10 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 78 / 90
79 YANG Mapping to JSON The mapping defines a procedure for translating the subset of YANG-compatible XML documents to JSON text. The translation is driven by a YANG data model which must therefore be known in advance. JSON is a popular compact and easy to parse data format used by many REST APIs Translation of YANG namespaces is supported YANG datatype information is used to translate leaf values to the most appropriate JSON representation Slightly more compact (irrelevant with compression) Increased human readability (less noise) 79 / 90
80 YANG to JSON Example { "ietf-interfaces:interfaces": { "interface": [ { "name": "eth0", "type": "ethernetcsmacd", "location": "0", "enabled": true, "if-index": 2, { "name": "eth1", "type": "ethernetcsmacd", "location": "1", "enabled": false, "if-index": 2 ] 80 / 90
81 YANG to JSON Example (XML) <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"> <interface> <name>eth0</name> <type>ethernetcsmacd</type> <location>0</location> <enabled>true</enabled> <if-index>2</if-index> </interface> <interface> <name>eth1</name> <type>ethernetcsmacd</type> <location>1</location> <enabled>false</enabled> <if-index>7</if-index> </interface> </interfaces> 214 octets in JSON format (all white space removed) 347 octets in XML format (all white space removed) 81 / 90
82 RESTful API for YANG A RESTful protocol that provides a programmatic interface over HTTP for accessing data defined in YANG, using the datastores defined in NETCONF. Configuration data and state data are exposed as resources that can be retrieved with the GET method. Resources representing configuration data can be modified with the DELETE, PATCH, POST, and PUT methods. Data-model specific RPC operations defined with the YANG rpc statement can be invoked with the POST method. Optional transaction resource is used to allow to allow batching of edits and handling of concurrent editing transactions. 82 / 90
83 RESTful API for YANG Example C: GET /yang-api HTTP/1.1 C: Host: example.com S: HTTP/ OK S: Date: Mon, 23 Apr :01:00 GMT S: Server: example-server S: Content-Type: application/vnd.yang.api+json S: S: { S: "yang-api": { S: "capabilities": { S: "edit-model": "direct", S: "persist-model": "automatic", S: "transaction-model": "none" S:, S: "modules": { S: "module": [ S: "urn:ietf:params:xml:ns:yang:ietf-yang-api?module=ietf-yang-api&r S: ] S:, S: "version": "1.0" S: S: 83 / 90
84 RESTful API for YANG Example C: POST /yang-api/datastore/jukebox HTTP/1.1 C: Host: example.com S: HTTP/ Created S: Date: Mon, 23 Apr :01:00 GMT S: Server: example-server S: Location: S: Last-Modified: Mon, 23 Apr :01:00 GMT S: ETag: b3a3e673be2 C: POST /yang-api/datastore/jukebox/artist HTTP/1.1 C: Host: example.com C: Content-Type: application/vnd.yang.data+json C: C: { "artist" : { "name" : "The Foo Fighters" S: HTTP/ Created S: Date: Mon, 23 Apr :02:00 GMT S: Server: example-server S: Location: S: Last-Modified: Mon, 23 Apr :02:00 GMT S: ETag: b3830f23a4c 84 / 90
85 Discussion [20 min] 1 Configuration Management [15 min] 2 NETCONF Protocol [20 min] 3 YANG Data Modeling Language [20 min] 4 Core Configuration Data Models [15 min] 5 Implementations, Tools, and Usage [10 min] 6 Future Directions [10 min] 7 Discussion [20 min] 85 / 90
86 Summary and Advice... If you are working on configuration of something, consider NETCONF seriously before rolling your own protocol NETCONF is based on years of experience NETCONF over BEEP or SOAP may disappear There are solid (open source) implementations Writing data models in YANG can actually be fun There are very good (open source) tools around Review existing YANG modules to see how your model fits into the core set of data models being defined Check RFC 6087: Guidelines for Authors and Reviewers Ask YANG doctors for help as needed 86 / 90
87 Reading Material I [1] J. Schönwälder, M. Björklund, and P. Shafer. Network Configuration Management Using NETCONF and YANG. IEEE Communications Magazine, 48(9): , September [2] P. Shafer. An Architecture for Network Management Using NETCONF and YANG. RFC 6244, Juniper Networks, June [3] J. Schönwälder. Overview of the 2002 IAB Network Management Workshop. RFC 3535, International University Bremen, May [4] L. Sanchez, K. McCloghrie, and J. Saperia. Requirements for Configuration Management of IP-based Networks. RFC 3139, Megisto, Cisco, JDS Consultant, June [5] M. Ersue and B. Claise. An Overview of the IETF Network Management Standards. RFC 6632, Nokia Siemens Networks, Cisco Systems, June [6] M. Bjorklund. YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF). RFC 6020, Tail-f Systems, October [7] J. Schönwälder. Common YANG Data Types. RFC 6021, Jacobs University, October [8] A. Bierman. Guidelines for Authors and Reviewers of YANG Data Model Documents. RFC 6087, Brocade, January / 90
88 Reading Material II [9] L. Lhotka. Mapping YANG to Document Schema Definition Languages and Validating NETCONF Content. RFC 6110, CESNET, February [10] J. Schönwälder. Translation of Structure of Management Information Version 2 (SMIv2) MIB Modules to YANG Modules. RFC 6643, Jacobs University, July [11] B. Linowski, M. Ersue, and S. Kuryla. Extending YANG with Language Abstractions. RFC 6095, Nokia Siemens Networks, 360 Treasury Systems, March [12] R. Enns, M. Bjorklund, J. Schönwälder, and A. Bierman. Network Configuration Protocol (NETCONF). RFC 6241, Juniper Networks, Tail-f Systems, Jacobs University, Brocade, June [13] M. Wasserman. Using the NETCONF Protocol over Secure Shell (SSH). RFC 6242, Painless Security, June [14] A. Bierman and B. Lengyel. With-defaults Capability for NETCONF. RFC 6243, Brocade, Ericsson, June [15] A. Bierman. Network Configuration Protocol (NETCONF) Base Notifications. RFC 6470, Brocade, February [16] A. Bierman and M. Bjorklund. Network Configuration Protocol (NETCONF) Access Control Model. RFC 6536, YumaWorks, Tail-f Systems, March / 90
89 Reading Material III [17] S. Chisholm and H. Trevino. NETCONF Event Notifications. RFC 5277, Nortel, Cisco, July [18] M. Scott and M. Bjorklund. YANG Module for NETCONF Monitoring. RFC 6022, Ericsson, Tail-f Systems, October [19] B. Lengyel and M. Bjorklund. Partial Lock Remote Procedure Call (RPC) for NETCONF. RFC 5717, Ericsson, Tail-f Systems, December [20] M. Bjorklund. A YANG Data Model for Interface Configuration. Internet-Draft (work in progress) <draft-ietf-netmod-interfaces-cfg-05>, Tail-f Systems, July [21] M. Bjorklund. A YANG Data Model for IP Configuration. Internet-Draft (work in progress) <draft-ietf-netmod-ip-cfg-05>, Tail-f Systems, July [22] L. Lhotka. A YANG Data Model for Routing Configuration. Internet-Draft (work in progress) <draft-ietf-netmod-routing-cfg-04>, CZ.NIC, July [23] A. Bierman and M. Bjorklund. YANG Data Model for System Management. Internet-Draft (work in progress) <draft-ietf-netmod-system-mgmt-02>, YumaWorks, Tail-f Systems, July [24] L. Lhotka. Modeling JSON Text with YANG. Internet-Draft (work in progress) <draft-lhotka-yang-json-01>, CZ.NIC, June / 90
90 Reading Material IV [25] A. Bierman and M. Bjorklund. YANG-API Protocol. Internet-Draft (work in progress) <draft-bierman-netconf-yang-api-00>, YumaWorks, Tail-f Systems, May / 90
Network Configuration Management Using NETCONF and YANG
ACCEPTED FROM OPEN CALL Network Configuration Management Using NETCONF and YANG Jürgen Schönwälder, Jacobs University Martin Björklund, Tail-f Systems Phil Shafer, Juniper Networks ABSTRACT The Internet
Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14
Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,
Instant YANG. The Basics. Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com)
Instant YANG Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com) This is a short primer on the NETCONF data modeling language YANG. To learn more about YANG, take a look at the tutorials and examples
NCClient: A Python Library for NETCONF Client Applications
NCClient: A Python Library for NETCONF Client Applications Shikhar Bhushan, Ha Manh Tran, Jürgen Schönwälder IPOM 2009, Venice, 2009-10-30 Support: EU IST-EMANICS Network of Excellence (26854) 1 / 1 Outline
Working with YANG Data Models and Instances Using (Mainly) pyang
Working with YANG Data Models and Instances Using (Mainly) pyang Ladislav Lhotka [email protected] 20 July 2014 Agenda Required software, Editing YANG modules, pyang plugins, Preparing a sample instance document,
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
OpenFlow Configuration and Management Protocol OF-CONFIG 1.0
OpenFlow Configuration and Management Protocol OF-CONFIG 1.0 1 OF-CONFIG 1.0 OpenFlow Configuration and Management Protocol Version 1.0 ONF Document Type: OpenFlow Config ONF Document Name: of-config1dot0-final
Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26
Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22 SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained
Tutorial: NETCONF and YANG
Tutorial: NETCONF and YANG Presented by Stefan Wallin, Tail-f [email protected] Today s Topic: #1 Market Leader in Configuration Management 2 Origins of NETCONF and YANG (the Beginning) Several meetings
TAIL-F SYSTEMS TECHNOLOGY BRIEF Creating and modifying network services using Tail-f NCS
TAIL-F SYSTEMS TECHNOLOGY BRIEF Creating and modifying network services using Tail-f NCS Table of Contents Introduction...3 Terminology...3 Defining a New Service Type...3 Changing Service Models...6 Benefits
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
P. van der Stok. Intended status: Standards Track Expires: April 18, 2016. J. Schoenwaelder Jacobs University A. Sehgal. consultant.
core Internet-Draft Intended status: Standards Track Expires: April 18, 2016 P. van der Stok consultant A. Bierman YumaWorks J. Schoenwaelder Jacobs University A. Sehgal consultant October 16, 2015 CoAP
Tail-f White Paper. Configuration Management Simplified. Executive summary. Why NETCONF and YANG?
Configuration Management Simplified Executive summary The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented
Replication and High-Availability
ConfD XML-Based Network Management Software Next-Generation Configuration Management The increasing complexity of operator and enterprise networks and the requirement to deliver new services is driving
A Guide to NETCONF for SNMP Developers
A Guide to NETCONF for SNMP Developers IEEE 802 Plenary, San Diego, CA US Andy Bierman July 14, 2014 v0.6 2014-07-10 Abstract NETCONF is a standards track protocol developed in the
NCS. EMS/NMS Platforms for Network Equipment Providers
NCS EMS/NMS Platforms for Network Equipment Providers NCS Overview Tail-f s Network Control System (NCS) is a powerful solution for developing centralized management platforms that configure and element
SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0
SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 Document Scope This document describes the DHCP enhancements in SonicOS Enhanced 4.0, including DHCP server options and DHCP server persistence.
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
Automating Network and Service Configuration Using NETCONF and YANG
Automating Network and Service Configuration Using NETCONF and YANG Stefan Wallin Luleå University of Technology [email protected] Claes Wikström Tail-f Systems AB [email protected] Abstract Network
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
VoIP Security Management
VoIP Security Management Humberto Abdelnur, Vincent Cridlig, Jérome Bourdellon, Radu State, Olivier Festor LORIA-INRIA Lorraine, France {abdelnur, cridligv, bourdellon, state, festor}@loria.fr http://madynes.loria.fr
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Link Layer Discovery Protocol and MIB
Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Spring 2013. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology. This presentation is based on the slides listed in references.
Network Management Protocols Network Management Spring 2013 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology This presentation is based on the slides listed in references. Outline
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Specific Simple Network Management Tools
Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Detecting Embedded Devices using Network Discovery
International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-2, Issue-5, April 2014 Detecting Embedded Devices using Network Discovery Rajula Aravinda Reddy, J C
emerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
MIB Explorer Feature Matrix
MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
IP Address, Domain and Hostname for IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1)
IP Address, Domain and Hostname for IM and Presence Service on Cisco Unified Communications Manager, Release 9.1(1) November 28, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
orrelog SNMP Trap Monitor Software Users Manual
orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No
About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Configuring your network settings to use Google Public DNS
Configuring your network settings to use Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses
Network Configuration Example
Network Configuration Example Logging Network Statistics Using Accounting Profiles Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
DHCP and DNS Protocols
DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
NETCONF-based Integrated Management for Internet of Things using RESTful Web Services
NETCONF-based Integrated Management for Internet of Things using RESTful Web Services Hui Xu, Chunzhi Wang, Wei Liu and Hongwei Chen School of Computer Science, Hubei University of Technology, Wuhan, China
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
System Admin Module User Guide. Schmooze Com Inc.
Schmooze Com Inc. Chapters Overview Using the Module DDNS DNS Email Setup FTP Server Intrusion Detection License Network Settings Notification Settings Port Management Power Options Storage Time Zone Updates
Clustered Data ONTAP 8.3
Clustered Data ONTAP 8.3 Remote Support Agent Configuration Guide For Use with Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer
WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction
Cisco Unified CM Disaster Recovery System
Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
Remote Access API 2.0
VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Simple Network Management Protocol
Simple Network Management Protocol This document describes how to configure the Simple Network Management Protocol (SNMP). This document consists of these sections: Understanding SNMP, page 1 Configuring
Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation
Qualys API Limits July 10, 2014 Overview The Qualys API enforces limits on the API calls a customer can make based on their subscription settings, starting with Qualys version 6.5. The limits apply to
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
The Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Configuring Syslog Server on Cisco Routers with Cisco SDM
Configuring Syslog Server on Cisco Routers with Cisco SDM Syslog is a standard for forwarding log messages in an Internet Protocol (IP) computer network. It allows separation of the software that generates
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
EncrypTight User Guide
ET0010A ET0100A ET1000A EncrypTight User Guide EncrypTight acts as a transparent overlay that integrates easily into any existing BLACK network BOX architecture, providing encryption rules and keys to
Configuration Commands. SNMP System Commands. engineid. 7950 XRS System Management Guide Page 303 SNMP. Syntax [no] engineid engine-id
SNMP Configuration Commands SNMP System Commands engineid Syntax [no] engineid engine-id Context config>system>snmp Description This command sets the SNMP engineid to uniquely identify the SNMPv3 node.
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture
Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance
7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01*
7450 ESS OS System Management Guide Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: 93-0101-09-01 *93-0101-09-01* This document is protected by copyright. Except as specifically
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Chapter 11 Network Address Translation
Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Ethernet. Customer Provided Equipment Configuring the Ethernet port.
Installing the RDSP-3000A-NIST Master Clock. Ethernet Connect the RJ-45 connector to a TCP/IP network. Equipment The following equipment comes with the clock system: RDSP-3000A-NIST Master Clock Module.
Interconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
IP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
Simplifying the Management of Virtualized Network Elements in
WHITE PAPER Intel Xeon Processors Tail-f* Management Solutions Telecom Industry Simplifying the Management of Virtualized Network Elements in Telecom Tail-f* provides an abstraction layer between operations
Document ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability
White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure
