Introduction to the Junos Operating System



Similar documents
JUNOS Command Line Interface. Copyright 2003 Juniper Networks, Inc. 1

JUNOS Secure Template

7750 SR OS System Management Guide

DAY ONE: CONFIGURING JUNOS BASICS

Junos OS. System Log Messages. Release Modified: Copyright 2015, Juniper Networks, Inc.

7450 ESS OS System Management Guide. Software Version: 7450 ESS OS 10.0 R1 February 2012 Document Part Number: * *

Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter , Cisco Systems, Inc. All rights reserved.

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Introduction to Junos Space Network Director

Planning Maintenance for Complex Networks

Network Management Card. User Manual

Simple Network Management Protocol

Management, Logging and Troubleshooting

Managing the System Event Log

APC by Schneider Electric Release Notes AP9537 Network Management Card. APC part number: Released: 26 October 2012

Backing Up and Restoring Data

NMS300 Network Management System

After you have created your text file, see Adding a Log Source.

Managing the System Event Log

NTP and Syslog in Linux. Kevin Breit

Troubleshooting Procedures for Cisco TelePresence Video Communication Server

Juniper Networks Certified Associate Junos Bootcamp, IJOS and JRE (JNCIA-Junos BC)

Manage Log Collection. Panorama Administrator s Guide. Version 7.0

Managing the System Event Log

Technology Overview. Lawful Intercept Using Flow-Tap. Published: Copyright 2014, Juniper Networks, Inc.

Configuration and File Management Feature Guide for QFabric Systems

Configuring CSS Remote Access Methods

Monitoring the Firewall Services Module

Administering Cisco ISE

Device Log Export ENGLISH

Junos OS. DDoS Protection Configuration Guide. Release Published: Copyright 2012, Juniper Networks, Inc.

Junos OS. DDoS Protection Configuration Guide. Release Published: Copyright 2012, Juniper Networks, Inc.

Junos Space Security Director

Syslog Monitoring Feature Pack

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Network Configuration Example

Configuring Logging. Information About Logging CHAPTER

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Chapter 1 Introduction to Network Maintenance Objectives

Simple MPLS network topology for Dynamips/Olive

Configuring System Message Logging

PRiSM Security. Configuration and considerations

User s Guide. SNMPWEBCARD Firmware Version through Revision A

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Savvius Insight Initial Configuration

Web Browser Interface User s Guide

Configuring System Message Logging

User s Manual UPS SERIES. Network Interface Card UPS-IPCARD. I Rev B

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Sophos Anti-Virus for Linux user manual

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Best Practices. SNMP-Based Network Management on Devices Running the Junos OS. Published: Copyright 2014, Juniper Networks, Inc.

Accellion Secure File Transfer

Troubleshooting. System History Log. System History Log Overview CHAPTER

Siteminder Integration Guide

Managing the System Event Log

For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.

NNMi120 Network Node Manager i Software 9.x Essentials

Junos Space. Network Director Quick Start Guide. Release 2.0. Published: Copyright 2015, Juniper Networks, Inc.

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

Juniper Secure Analytics

CTPView Network Management System Administration

NETASQ ACTIVE DIRECTORY INTEGRATION

Junos OS. Common Criteria Secure Configuration for SRX Series Security Devices. Release 12.1X44-D15. Published:

IMM2 Configurations User's Guide Version 1.0 (Jan 2013)

Junos OS. Firewall User Authentication for Security Devices. Release 12.1X44-D10. Published: Copyright 2013, Juniper Networks, Inc.

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

AT-S95 Version AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes

P330-ML Version 4.5 Release Notes

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

SonicWALL PCI 1.1 Implementation Guide

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

OnCommand Unified Manager

User s Guide. Network Management Card AP9631-IBM

Network Management Card Security Implementation

Configuring Logging with CLI

JUNOScope IP Service Manager

Logging and SNMP Trap Notification Of Events. Isonas Access Control System. Release 12 June 2007

REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

SNMP Manager User s Manual

Gigabyte Content Management System Console User s Guide. Version: 0.1

Enabling Management Protocols: NTP, SNMP, and Syslog

Table of Contents. Cisco Network Time Protocol: Best Practices White Paper

Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings...

Juniper Secure Analytics

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Monitoring the NTP Server. eg Enterprise v6.0

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

How to Set Up Your NSM4000 Appliance

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Version Filename Part Number Opcode V_ FL bin FL bin.md5 FL pkg

Securing Networks with PIX and ASA

Cisco Change Management: Best Practices White Paper

Transcription:

Introduction to the Junos Operating System Chapter 5: Secondary System Configuration 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services

Chapter Objectives After successfully completing this chapter, you will be able to: Describe and configure user authentication Configure and analyze system logging and tracing Configure and monitor NTP Archive configurations Configure and monitor SNMP www.juniper.net 5-2

Agenda: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP www.juniper.net 5-3

User Authentication Local database Name and password Individual accounts and home directories RADIUS and TACACS+ Centralized user management Users mapped to locally defined template users RADIUS or TACACS+ server Local authentication database www.juniper.net 5-4

Authentication Order Order of authentication methods is configurable Attempts each configured method until password is accepted If radius and tacplus authentication methods fail to reply, local authentication (password) is always consulted [edit] user@router# show system authentication-order authentication-order [ radius tacplus password ]; Supported authentication methods www.juniper.net 5-6

Authentication Order Example (1 of 3) [edit] user@router# show system authentication-order authentication-order [ radius tacplus password ]; RADIUS server Username = lab Password = lab123 Step 1 (lab, lab789) Step 8 ACCEPT Step 4 (lab, lab789) Step 5 REJECT TACACS+ server Username = lab Password = lab456 Local authentication database Username = lab Password = lab789 www.juniper.net 5-7

Authentication Order Example (2 of 3) [edit] user@router# show system authentication-order authentication-order [ radius tacplus ]; RADIUS server Username = lab Password = lab123 Step 1 (lab, lab789) Step 6 REJECT Step 4 (lab, lab789) Step 5 REJECT TACACS+ server Username = lab Password = lab456 Local authentication database Username = lab Password = lab789 www.juniper.net 5-8

Authentication Order Example (3 of 3) [edit] user@router# show system authentication-order authentication-order [ radius tacplus ]; RADIUS server Username = lab Password = lab123 Step 1 (lab, lab789) Step 6 ACCEPT Step 3 (lab, lab789) TACACS+ server Username = lab Password = lab456 Local authentication database Username = lab Password = lab789 www.juniper.net 5-9

Components of Authorization (1 of 2) User Class Permissions deny-commands deny-configuration allow-commands allow-configuration Authorized or Denied User CLI activity is either authorized or denied based on the components of authorization Users Member of a single class Class Container for permissions and explicit overrides Four predefined classes for common groups of permissions operator, read-only, super-user, and unauthorized www.juniper.net 5-10

Components of Authorization (2 of 2) User Class Permissions deny-commands deny-configuration allow-commands allow-configuration Authorized or Denied Permissions Predefined sets of related commands Allow and deny overrides Define exceptions for commands and configuration statements that would otherwise be allowed or denied Can be specified using regular expressions www.juniper.net 5-11

Authorization Configuration Example User Class Permissions deny-commands deny-configuration allow-commands allow-configuration Authorized or Denied [edit system login] root@router# show class noc-admin { permissions [ clear network reset view ]; allow-commands "(configure private)"; deny-commands "(file)"; allow-configuration "(interfaces) (firewall)"; deny-configuration "(groups)"; } user nancy { uid 2002; class noc-admin; authentication { encrypted-password "$1$KQXKa/VQ$ijv77WXLnyf7XR/.1IbTq0"; ## SECRET-DATA } } www.juniper.net 5-13

Agenda: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP www.juniper.net 5-14

System Logging Overview System logging: Uses UNIX syslog-style configuration syntax Primary syslog file is /var/log/messages Supports numerous facilities and severity levels The facility defines the class of log message and the severity level determines the level of logging detail Provides local and remote logging support Remote logging (and archiving) recommended for troubleshooting www.juniper.net 5-15

Syslog Configuration Example [edit system syslog] user@router# show user * { any emergency; } host 10.210.14.174 { any notice; authorization info; } file messages { any any; authorization info; } file interactive-commands { interactive-commands any; } file config-changes { change-log info; } Emergency messages go to all logged-in users (*) Logs to a remote host (recommended for archiving logged events) Primary syslog file (*) Logs all CLI commands (*) Logs configuration changes (recommended for tracking user activity) Note: (*) indicates a factory-default setting www.juniper.net 5-16

Interpreting Syslog Messages Standard log entries consist of the following fields: Timestamp, host name, software process name or PID, a message code, and the message text Jul 27 10:48:37 host mgd[4350]: UI_DBASE_LOGOUT_EVENT: User 'user' exiting configuration mode Use help syslog to help interpret message codes: user@router> help syslog UI_DBASE_LOGOUT_EVENT Name: UI_DBASE_LOGOUT_EVENT Message: User '<username>' exiting configuration mode Help: User exited configuration mode Description: The indicated user exited configuration mode (logged out of the configuration database). Type: Event: This message reports an event, not an error Severity: notice www.juniper.net 5-17

Traceoptions Overview Tracing is the Junos OS equivalent of debug Requires configuration Provides local and remote logging support Logs are written to /var/log/filename or a remote server Can enable tracing in a production network www.juniper.net 5-19

Traceoptions Configuration Example Include the traceoptions statement at the [edit protocols protocol-name] hierarchy level Traceoptions also available for other hierarchies The protocol or function being traced File where trace results are written (/var/log/ospf-trace) [edit protocols ospf] user@router# show traceoptions { file ospf-trace replace size 128k files 10 no-stamp no-world-readable; flag event detail; flag error detail; } Can trace multiple options (flags) to a single file-- flags identify what aspects of the protocol are traced and at what level of detail Trace file options www.juniper.net 5-21

Analyzing Log and Trace Files Use show log file-name to display file contents: Enter h at the more prompt for help on available options Use pipe ( ) to make log parsing much easier! Syntax: user@router> show log messages match "support info" May 31 23:49:16 host mgd[2711]: %INTERACT-6-UI_CMDLINE_READ_LINE: User 'user', command 'request support information ' Use multiple instances to evoke a logical AND search: user@router> show log messages find "Apr 1 09:" match error Use quotes to evoke a logical OR search: user@router> show log messages match "error kernel panic" www.juniper.net 5-23

Miscellaneous Log File Commands Use monitor to perform real time monitoring: user@router> monitor start filename Use pipe ( ) to filter file being monitored! Use Esc+q to halt and resume real-time output to screen Use monitor stop to cease all monitoring Log and trace file manipulation Use clear to clear contents of log and trace files: user@router> clear log filename Use file delete to delete log and trace files: user@router> file delete filename www.juniper.net 5-24

Agenda: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP www.juniper.net 5-26

NTP Clock Synchronization Use NTP to synchronize clocking on network devices Correlated timestamps on log files for troubleshooting The Junos OS cannot provide primary time reference Support for client, server, and symmetric active modes Message Digest 5 authentication support Boot server is used to set initial NTP time upon boot [edit system ntp] user@router# show boot-server 10.210.14.173; server 10.210.14.173; The configured list of possible synchronization sources A simple NTP client-mode configuration www.juniper.net 5-27

Monitoring NTP Clock Synchronization Use the show ntp associations command to confirm synchronization status: [edit] user@router# run show ntp associations remote refid st t when poll reach delay offset jitter ============================================================================== *10.210.14.173 10.210.8.73 4 u 63 64 377 0.268-24.258 7.290 Indicates peer stratum level IP address or name of peer reference IP address or name of NTP peer Asterisk indicates that this peer was selected for synchronization www.juniper.net 5-28

Agenda: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP www.juniper.net 5-29

Archiving Configuration Files Configure host to automatically back up configuration file at the [edit system archival] hierarchy Perform regular backups at scheduled intervals or whenever a new configuration file is committed [edit system archival] user@router# show configuration { transfer-on-commit; archive-sites { "ftp://user@10.210.9.178:/archive" password "$9 "; ## SECRET-DATA "scp://user@172.15.100.2:/archive" password "$9 "; ## SECRET-DATA } } Transfer options include both FTP and SCP Backup occurs when commit is issued First URL listed is used unless transfer fails www.juniper.net 5-30

Monitoring the Archival Process Configuration files are queued for transmission in the /var/transfer/config directory The transfer is logged in the /var/log/messages file: user@router> show log messages match transfer Jan 21 13:52:45 host logger: transfer-file: Transferred /var/transfer/config/host_juniper.conf.gz_20120425_215150 [edit] user@router> file list /var/transfer/config detail Destination filename format: /var/transfer/config: host-name_juniper.conf.gz_yyyymmdd_hhmmss_utc time total 12 -rw-r----- 1 root wheel 1530 Apr 25 13:51 host_juniper.conf.gz_20120425_215150 instructor@server1.dx1.sv$pwd /home/ftp/pub/archive instructor@server1.dx1.sv$ls host_juniper.conf.gz_20120425_215150 Output from the UNIX server www.juniper.net 5-31

Agenda: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP www.juniper.net 5-32

SNMP Overview (1 of 2) SNMP facilitates communication between an SNMP agent and a network management system NMS and agent communication: Get, GetBulk, and GetNext requests Set requests Notifications (traps SNMP v2c or informs SNMP v3) Agents respond to requests from NMS and send notifications of network events (traps and informs) Poll NMS Agent (device running the Junos OS) Response www.juniper.net 5-33

SNMP Overview (2 of 2) MIB: Used to define managed objects in a network device Designed in hierarchical tree structure Standard or enterprise specific Consists of object identifiers Junos SNMP support: Versions 1, 2c, and 3 Remote monitoring events, alarms, and history www.juniper.net 5-34

Example: Configuring SNMP Device contact information Defining an SNMP community is the minimum SNMP configuration Defines NMS for trap delivery [edit snmp] user@router# show description My JUNOS Device"; location "BSU East Campus Closet - Rack 4"; contact "Jim Davis - x1865"; community cardinals { authorization read-only; clients { 10.210.14.0/24; } } trap-group my-trap-group { version v2; categories { chassis; link; } targets { 10.210.14.173; } } Default authorization SNMP requests limited to 10.210.14/24 subnet; can also restrict to an interface Sends SNMPv2 notifications regarding link or chassis events www.juniper.net 5-35

Monitoring SNMP Operation Operation: Monitor the SNMP agent with NMS tools Monitor SNMP protocol using traceoptions, syslog, and show commands MIB walks and gets are available from the CLI: user@router> show snmp mib walk jnxoperatingdescr jnxoperatingdescr.1.1.0.0 = midplane jnxoperatingdescr.2.1.1.0 = Power Supply 0 jnxoperatingdescr.2.1.2.0 = Power Supply 1 jnxoperatingdescr.4.1.1.1 = FAN 0 jnxoperatingdescr.7.1.0.0 = FPC: EX3200-24T, 8 POE @ 0/*/* jnxoperatingdescr.8.1.1.0 = PIC: 24x 10/100/1000 Base-T @ 0/0/* jnxoperatingdescr.8.1.2.0 = PIC: 4x GE SFP @ 0/1/* jnxoperatingdescr.9.1.0.0 = RE-EX3200-24-T www.juniper.net 5-36

Summary In the chapter, we: Described and configured user authentication Configured and analyzed system logging and tracing Configured and monitored NTP Archived configurations Configured and monitored SNMP www.juniper.net 5-37

Review Questions 1. Which user authentication methods are available? 2. Which command displays the primary syslog file? 3. Why should you use configuration archival? 4. What is the purpose of SNMP traps? www.juniper.net 5-38

Lab 3: Secondary System Configuration Perform tasks normally associated with secondary system configuration. www.juniper.net 5-39

Worldwide Education Services