Lighthouse User Guide: Revision 2022.Q1.0 June 2022
Lighthouse User Guide: Revision 2022.Q1.0 June 2022
User Guide
Revision 2022.Q1.0
June 2022
2
Lighthouse User Guide
TABLE OF CONTENTS
2. Lighthouse overview 10
2.1 Lighthouse VM host requirements 10
2.2 Lighthouse architecture 10
2.2.1 Lighthouse to Node interactions 11
2.2.2 User to Lighthouse interactions 11
2.2.3 Node organization and filtering 12
2.2.4 Multiple Instance Feature 12
3. Lighthouse VM installation 13
3.1 Lighthouse VM components 13
3.2 VMware vSphere 6.0 via the VMware vSphere 6.0 client on Windows 13
3.2.1 Launch the vSphere Client and connect to a vSphere instance. 13
3.2.2 Import the Lighthouse VM Open Volume Format (.ovf) image 14
3.2.3 Launch the Opengear Lighthouse virtual machine 15
3.2.4 Access the console of a running but headless Opengear Lighthouse instance 16
3.3 VMware Workstation Player on Windows as host 16
3.4 VMware Workstation Pro on Windows as host 17
3.5 VMware Workstation Player or Pro on Fedora Workstation as host 17
3.6 Local deployment on Hyper-V running on Windows 10/Windows Server 2016 18
3.7 Remote Hyper-V deployment with pre-authenticated user 18
3.8 Remote Hyper-V deployment with different user 18
3.9 VirtualBox on Windows as host 19
3.10 VirtualBox on macOS as host 20
3.11 VirtualBox on Ubuntu as host 21
3.12 VirtualBox on Fedora Workstation as host 22
3.13 Virtual Machine Manager (KVM) on Ubuntu as host 23
3.14 Boxes on Fedora Workstation as host 23
3.15 Boxes on CentOS as host 24
3.16 Azure environment 24
3.17 Amazon Web Services (AWS) environment 25
7. Using Lighthouse 52
7.1 Licensing third-party nodes before enrollment 52
7.1.1 Adding a license using the Lighthouse UI 52
7.1.2 Showing installed licenses in the Lighthouse UI 53
7.1.3 Showing installed licenses via the Local Terminal 53
7.2 Enrolling nodes 54
7.2.1 Enrollment overview 54
7.2.2 Enrollment bundles 55
7.2.3 Creating an enrollment bundle 55
7.2.4 Structure of an enrollment bundle 57
7.2.5 Enrollment via Lighthouse Web UI 57
7.2.6 Enrollment via Node Web UI 60
7.2.7 Lighthouse Enrollment via OM, ACM, CM, and IM Web UI 60
7.2.8 Mass Enrollment using ZTP 60
7.2.9 Enrollment via USB drive 61
7.3 The Enrolled Nodes page 62
7.4 Filtering pages displaying nodes 63
7.4.1 Filtering using the Free Text Search field 64
7.4.2 Filtering using the Smart Group Filtering drop-down menu 64
7.4.3 Filtering using the Managed Device Filtering drop-down menu 65
7.5 Node Upgrade via the UI 66
7.5.1 Upload a firmware file 66
7.5.2 Delete a firmware file 67
7.5.3 Create an upgrade task 67
7.5.4 Cancel an upgrade task 68
7.5.5 Delete an upgrade task 68
7.5.6 Copy a scheduled task 69
4
Lighthouse User Guide
9. Notifications 106
13. Lighthouse CLI, Serial Port and REST API logging 137
13.1 Logging overview and limitations 137
13.2 Using ogconfig-cli to enable logging 137
13.2.1 Add node and port to Lighthouse logs 138
6
Lighthouse User Guide
NOTE: OPERATIONS MANAGER support may be partial for earlier releases. Partial support may currently involve: Mass
node enrollment using ZTP Enrollment via USB drive. All template types are supported.
GLOSSARY
Terms used in this guide to define Lighthouse elements and concepts are listed below.
TERM DEFINITION
AUTHDOWNLOCAL (RADIUS/LDAP/AAA) When this authentication option is selected, if
remote authentication fails because the user
does not exist on the remote AAA server, the
user is denied access.
AUTHLOCAL (RADIUS/LDAP/AAA) When this authentication option is selected, if
remote authentication fails because the user
does not exist on the remote AAA
server, Lighthouse tries to authenticate the user
using a local account.
CELLULAR HEALTH Status of the cellular connection of a node.
DARK MODE Changes the user interface to display mostly
dark colors, reducing the light emitted by device
screens.
DOCKER An open platform for developing, shipping, and
running applications. Docker enables you to
separate your applications from your
infrastructure so you can deliver software
quickly.
Docker powers the NetOps platform within the
Lighthouse product.
ENROLLMENT Connecting a node to Lighthouse
ENROLLMENT BUNDLE Used to assign a number of tags to a set of
nodes when they are enrolled. During enrollment,
the bundle is specified using its name, and a
bundle-specific enrollment token.
ENROLLED NODE Node that has been connected to Lighthouse and
is ready for use.
ENROLLMENT TOKEN A password that authorizes the node with
Lighthouse. Used when performing Node-based,
or ZTP enrollment.
INSTANCE A single running Lighthouse.
LIGHT MODE Changes the user interface to display mostly
light colors. This is the default UI setting.
LIGHTHOUSE System for accessing, managing and monitoring
Opengear console servers.
LIGHTHOUSE ENTERPRISE Offers an elevated centralized management
solution with additional functionality. It supports
8
Lighthouse User Guide
2. Lighthouse overview
NOTE: This diagram depicts High Availability. Without a secondary Lighthouse set up, the diagram remains the
same but without the secondary elements.
Secondary instances are read-only. They may be used to view Lighthouse information specific to that
instance, and to connect to its nodes via pmshell. Configuration changes must be performed on the
primary instance, which will then update the information displayed on the secondary instance.
See Chapter 10 for specific information on using the multiple instance feature.
13
Lighthouse User Guide
3. Lighthouse VM installation
To host Lighthouse, the VM needs to be configured to support a 50GB SCSI disk.
3.2 VMware vSphere 6.0 via the VMware vSphere 6.0 client on Windows
This procedure assumes VMware vSphere 6.0 is installed and running on available hardware. User must
have access to a Windows computer on which the VMware vSphere 6.0 client is installed and that this
installed client application can connect to and manage the VMware Sphere 6.0 instance. Finally, a copy of
the Lighthouse binary in Open Volume Format is required, the .ovf file, either copied to the Windows
computer running the VMware vSphere 6.0 client or available via a URL.
This procedure was tested using the VMware Sphere Client 6.0 running on Windows 7 Enterprise SP 1.
2. Select the IP address or name of the VMware vSphere instance where Lighthouse will be installed from
the IP address/Name drop-down list.
3. Enter the User name and Password required to gain management privileges to the selected VMware
vSphere instance.
4. Click Login or press Return.
The login window displays progress text in the bottom left corner:
Connecting
Loading inventory
Loading main form
Displaying main form
The vSphere main form window opens.
6. The Disk Format screen displays which data-store the Lighthouse VM’s virtual disk uses, how much
free space the virtual disk has available and which provisioning scheme is being used. Click Next.
7. The Network Mapping screen shows which destination or inventory network the Lighthouse VM’s
virtual network is mapped to. Click Next.
8. The Ready to Complete screen appears, listing the basic properties of the about-to-be-deployed
virtual machine. To be able to power-up the new virtual machine after deployment, select the Power
on after deployment checkbox. Click Finish.
9. The Deploying Opengear Lighthouse VM progress dialog appears.
10. Once deployment has finished the Deployment Completed Successfully alert appears. Click Close.
The new virtual machine is now deployed and appears in the inventory list.
The vSphere Client provides several ways of launching a Virtual Machine hosted on a vSphere instance.
Begin by selecting the Opengear Lighthouse VM from the vSphere Client’s inventory list. The selected VM
can then be launched by doing one of the following:
• Select Inventory > Virtual Machine > Power > Power On.
• Press Ctrl-B.
• Click the Power on the virtual machine link in the Basic Tasks section of the Getting Started tab.
This option requires the Getting Started tab be front-most. If it is not already the front-most tab,
make it active by clicking it.
• Select Inventory > Virtual Machine > Open Console and then:
o Press Ctrl-B.
NOTE: Only the fourth option above results in the running virtual machine being accessible from within
the vSphere Client. The first three boot the Lighthouse VM and get it running headless.
3.2.4 Access the console of a running but headless Opengear Lighthouse instance
If direct interaction with a running but headless *Opengear Lighthouse VM* is required, open a console
window.
Select the running Opengear Lighthouse VM in the vSphere Client’s inventory list, then do one of the
following:
NOTE: A Lighthouse VM is running a bash shell with no other interactive options. As a result, when the
vSphere Client opens its console window, the Lighthouse VM captures the mouse pointer, making it
unavailable for use by any other window. Press CTRL+ALT to release the pointer.
Follow these steps when VMware Workstation Player is installed on the host Windows machine. VMware-
ready virtual machine files are stored in C:\Users\%USERNAME%\Virtual Machines\. This is the
location selected by default by VMware Workstation Player. If another location is preferred, adjust this
procedure as required.
Prepare the Lighthouse VM file for import into VMware Workstation Player.
Assuming this is the case, double-click Virtual Machines and then double-click
Lighthouse.
4. If only one file — Lighthouse — is visible, double-click it to add the Lighthouse virtual machine
to the VMware Workstation 12 Player virtual machines list. If more than one file appears, double-
click Lighthouse.vmx.
5. The Lighthouse virtual machine is added to the VMware Workstation 12 Player virtual machines
list.
6. With Opengear Lighthouse VM selected in the VMware Workstation 12 Player virtual machine list,
click Play virtual machine to boot Lighthouse.
This procedure assumes VMware Workstation Pro is already installed on the host Windows machine and
that VMware-ready virtual machine files are stored in C:\Users\%USERNAME%\Virtual Machines\.
If another location is preferred, adjust the steps as needed.
Prepare the Opengear Lighthouse VM file for import into VMware Workstation Pro.
Opengear does not support this particular combination of host operating system and virtual machine
manager.
This procedure assumes Hyper-V is already installed on a Windows 10/Windows Server 2016 host
machine and the required Zip archive, ironmam-hyperv.zip is
in C:\Users\%USERNAME%$\Downloads.
1. Unzip lighthouse-hyperv.zip.
2. Navigate to the extracted folder. Make sure lighthouse.vhd and
lighthouse_virtual_machine_registration.ps1 are in the folder.
3. Right-click and choose Run with Powershell to execute the Powershell script.
4. Leave the host name empty when prompted to deploy Lighthouse to local machine.
5. Launch Hyper-V Manager. Lighthouse should be registered as a new VM image under Virtual
Machine.
6. Select Lighthouse from the list and click Start in the Action Panel to boot Opengear Lighthouse.
In this scenario, the user who performs Lighthouse deployment does not have local access to Hyper-V
installed on Windows Server 2016. However, user has access to Windows 10 which can manage the
Hyper-V server remotely. The user who performs the deployment must have permission to both execute
the Powershell script and deploy the image on Hyper-V. This procedure assumes Hyper-V is installed on
Windows Server 2016 host machine and the required Zip archive, ironmam-hyperv.zip, is
in C:\Users\%USERNAME%$\Downloads. Windows 10 is already configured to manage Hyper-V on
Windows Server 2016.
19
Lighthouse User Guide
1. Login to windows 10 with a user who does not exist on Windows Server 2016.
2. Unzip lighthouse-hyperv.zip.
3. Navigate to the extracted folder. Make sure lighthouse.vhd and
lighthouse_virtual_machine_registration.ps1 are in the folder.
4. Right-click and choose Run with Powershell to execute the Powershell script.
5. Enter the fully qualified domain name for Windows Server 2016 when prompted to deploy
Lighthouse to remotely managed Windows Server 2016 machine.
6. Enter the user details created on Windows Server 2016 which has permission to deploy Hyper-V.
7. Launch Hyper-V Manager. Lighthouse should be registered as a new VM image under Virtual
Machine for Windows Server 2016.
8. Select Lighthouse from the list and click Start in the Action Panel to boot Opengear Lighthouse.
NOTE: when a Skylake processor is available, we do not recommend the use of VirtualBox.
NOTE: We recommend that VirtualBox users customize their instances and change their network cards to
one other than e1000. We also suggest virtio for better performance.
This procedure assumes VirtualBox is already installed on the host machine and the required PKZip
archive, lighthouse-22.Q1.0-ovf.zip is in C:\Users\%USERNAME%$\Downloads.
22. Choose Machine > Settings. Or click the Settings icon in the VirtualBox Manager toolbar or press
Control+S.
23. The Opengear Lighthouse VM — Settings dialog appears.
24. Click the System option in the list of options running down the left-hand side of the dialog.
25. The dialog shows the System options available as three tabs: Motherboard, Processor, and
Acceleration. Depending on the underlying hardware platform, Acceleration may be greyed-out
and unavailable. The Motherboard tab is preselected.
26. In the Motherboard tab, select the Hardware Clock in UTC Time checkbox.
27. Click OK or press Return.
28. Select Opengear Lighthouse VM from the list and click Start in the Oracle VM VirtualBox
Manager toolbar to boot Lighthouse. Double-clicking Opengear Lighthouse VM in the list also
boots Lighthouse.
NOTE: Selecting the Hardware Clock in UTC Time checkbox is necessary because Lighthouse
expects the hardware clock to be set to UTC, not local time. Unlike other Virtual Machine
Managers, Virtual Box both exposes this option as a user-adjustable setting and does not set it to
UTC by default.
VirtualBox should already installed on the host macOS machine and the required PKZip archive,
lighthouse-22.Q1.0-ovf.zip is in ~/Downloads.
1. Unzip lighthouse-22.Q1.0-ovf.zip.
This creates a folder — Lighthouse-ovf — in ~/Downloads that contains the following files
and folders:
Lighthouse-ovf
└── Opengear Lighthouse VM
├── Opengear Lighthouse VM.ovf
└── Opengear_Lighthouse_VM-disk1.vmdk
NOTE: Selecting the Hardware Clock in UTC Time checkbox is necessary because Lighthouse
expects the hardware clock to be set to UTC, not local time. Unlike other Virtual Machine Managers,
Virtual Box both exposes this option as a user-adjustable setting and does not set it to UTC by
default.
NOTE: By default, VirtualBox stores virtual machines in ~/VirtualBox VMs. If this is the first virtual
machine setup by VirtualBox, it creates the VirtualBox VMs folder in the current user’s home-
directory and a folder — Opengear Lighthouse VM — inside the VirtualBox VMs folder. The
Opengear Lighthouse VM folder contains the files and folders which make up Lighthouse when
run under Virtual Box.
Before beginning, make certain that VirtualBox and all required support files are installed on the host
machine and the PKZip archive, lighthouse-22.Q1.0-ovf.zip is in ~/Downloads.
1. Unzip lighthouse-22.Q1.0-ovf.zip.
This creates a folder — Lighthouse-ovf — in ~/Downloads that contains the following files
and folders:
Lighthouse-ovf
└── Opengear Lighthouse VM
├── Opengear Lighthouse VM.ovf
└── Opengear_Lighthouse_VM-disk1.vmdk
NOTE: VirtualBox stores virtual machines in ~/VirtualBox VMs. If this is the first virtual machine
setup by VirtualBox it creates the VirtualBox VMs folder in the current user’s home-directory and a
folder — Opengear Lighthouse VM — inside the VirtualBox VMs folder. Inside Opengear
Lighthouse VM are the files and folders which make up Lighthouse when run under Virtual Box.
Before beginning, make certain that VirtualBox and all required support files are already installed on the
host machine and the PKZip archive, lighthouse-22.Q1.0-ovf.zip is in ~/Downloads.
Lighthouse.ovf
└── Opengear Lighthouse VM
├── Opengear Lighthouse VM.ovf
└── Opengear_Lighthouse_VM-disk1.vmdk
11. Select Opengear Lighthouse VM from the list and click Start in the Oracle VM VirtualBox
Manager toolbar to boot Lighthouse. Double-clicking Opengear Lighthouse VM in the list also
boots Lighthouse.
NOTE: VirtualBox stores virtual machines in ~/VirtualBox VMs. If this is the first virtual machine setup
by VirtualBox, it creates the VirtualBox VMs folder in the current user’s home-directory and a folder —
Opengear Lighthouse VM — inside the VirtualBox VMs folder. Inside Opengear Lighthouse
VM are the files and folders which make up Lighthouse when run under Virtual Box.
Virtual Machine Manager and all required support files should be installed on the host machine and the
the .tar archive, lighthouse-22.Q1.0-raw.hdd.tar is in ~/Downloads.
Boxes and all required support files should be installed on the host machine and lighthouse-
22.Q1.0-ovf.zip is in ~/Downloads.
Lighthouse.ovf
└── Opengear Lighthouse VM
├── Opengear Lighthouse VM.ovf
└── Opengear_Lighthouse_VM-disk1.vmdk
2. Launch Boxes.
3. Click New in the Boxes window title bar. The Source Selection window opens.
4. Click Select a file. A Select a device or ISO file dialog opens.
5. Navigate to ~/Downloads/Lighthouse.ovf/Opengear Lighthouse VM/.
24
Lighthouse User Guide
6. Select the file Opengear_Lighthouse_VM-disk1.vmdk and click Open in the top right-hand
corner of the dialog. A Review window opens providing basic information about the virtual
machine (or ‘box’, as Boxes calls them) to be created
7. Click Create in the top right corner of the Review window.
8. A new virtual machine instance, Opengear_Lighthouse_VM-disk1 is created and presented in the
Boxes window.
9. To rename the virtual machine instance, right-click on the machine instance and choose
Properties from the contextual menu that appears. Click anywhere in the Name field to select and
edit the name. Click Close to save the changes.
CentOS should be installed, complete with the Gnome desktop environment as the host operating system.
CentOS includes the full complement of KVM-centric virtualization tools including the GUI-based
virtualization management tools Boxes and virt-manager and the shell-based virtualization management
tool virsh.
This procedure assumes Boxes is used to setup and manage the Lighthouse VM and that the required
PKZip archive, lighthouse-22.Q1.0-ovf.zip is in ~/Downloads.
1. Unzip lighthouse-22.Q1.0-ovf.zip.
This creates a folder — Lighthouse.ovf — in ~/Downloads that contains the following files
and folders:
Lighthouse.ovf
└── Opengear Lighthouse VM
├── Opengear Lighthouse VM.ovf
└── Opengear_Lighthouse_VM-disk1.vmdk
2. Launch Boxes
3. Click New in the Boxes title bar.
4. Navigate to ~/Downloads/Lighthouse.ovf/Opengear Lighthouse VM/
5. Select Opengear Lighthouse VM and click Open. A new virtual machine, called Opengear
LighthouseVM is added to the list of virtual machines available to Boxes.
Note: External endpoint addresses (IPv6) are not automatically populated for Azure Lighthouses. These
must be manually updated on Lighthouse by the user.
To use Lighthouse with AWS, you will need to create an account, create an AWS EC2 instance, and create
an Amazon Machine Image. You will need to spin up a standard AWS EC2 instance with 30 gigs or more
of disk space to ensure there is enough room for the necessary operations.
To use the AWS environment, you will need to complete several steps. Visit AWS Help for assistance in
completing the following steps:
We do not have a public AMI. You will need to launch a Linux build-box instance in order to create a
Lighthouse AMI. This is a one-time procedure, as once Lighthouse is running, you can upgrade it from the
Lighthouse Web GUI.
26
Lighthouse User Guide
We have a compressed binary image and a script. On the first deployment of Lighthouse you do need to
spin up a Linux host in EC2 to use as a “build-box”, upload the Lighthouse AWS-specific aws.raw.tar
image, untar it, then run the Lighthouse aws-bootstrap script, which creates a private AMI. You can then
use this to launch one or more Lighthouse instances.
5. Click Review and Launch to let the wizard complete the other configuration settings for you.
6. On the Review Instance Launch page, under Security Groups, the wizard created and selected a
security group for you. You can use this security group, or you can select the security group that
you created when getting set up using the following steps:
a. Choose Edit security groups.
b. On the Configure Security Group page, ensure that Select an existing security group is
selected.
c. Select your security group from the list of existing security groups, and then click Review
and Launch.
7. On the Review Instance Launch page, choose Launch.
When prompted for a key pair, select Choose an existing key pair, then select your key pair.
NOTE: Don't select Proceed without a key pair. If you launch your instance without a key pair,
then you can't connect to it.
8. Click View Instances to close the confirmation page and return to the console.
1. Click the acknowledgement check box, and then choose Launch Instances.
2. It can take a few minutes for the instance to be ready so that you can connect to it. Check that
your instance has passed its status checks in the Status Checks column.
Upload Lighthouse software to the build-box and run script to create the AMI
NOTE: At a minimum, the access key sufficient permissions to create, attach, delete, and snapshot EBS
volumes as well as create an Amazon Machine Image (AMI).
27
Lighthouse User Guide
NOTE: lighthouse-aws-bootstrap.sh creates an AMI from a Lighthouse image and has the
following options:
-f FILENAME Use the specified local file to create the image
-r URI Download the image file from the specified URI
-d DEVICE Attach temporary disk images to the specified device (eg, xvde)
-n NAME The name to use for generated images (default: Lighthouse)
-h Display help message
8. When complete, you'll have an AMI called Lighthouse you can use to create a Lighthouse
instance with any hardware configuration you require.
9. To set a password for the root user on Lighthouse:
a. Open the Configure instance details page of the AMI launch process.
b. Under the Advanced Details section, add a root password using the userdata field in the
format password=Whatever123. If you do not, you will have to log in via SSH to set it.
NOTE: Optionally, you can specify a custom startup script in the Advanced Details
section with script_uri=http://my.domain/my_script.sh. This script will be run once on first
boot. Different user options should be provided on separate lines.
10. When done, the EC2 instance can be shut down and removed. Future instances can be created
from the AMI.
NOTE: boot up is headless, so most of the information in section 4. First boot of the Lighthouse VM does not
apply. The root password must be specified in the Advanced Details.
28
Lighthouse User Guide
The selected image is Lighthouse Root 1. Two other images are available: Lighthouse Root 1 and
Root 2. Do not change the boot image the VM boots from.
2. The second screen prompts to Select Lighthouse boot mode and displays four options:
Graphics console boot is preselected and should not be changed. After the first boot has
completed a message appears:
5. Enter a password and press Enter. Keep in mind that non-US-English keyboards are not supported
in the graphics console.
NOTE: We recommend you set a temporary password at this point and change it to a very strong high-
entropy password as soon as possible using the WebUI.
7. Re-enter the password and press Enter. Multiple configuration notices appear ending with a login
prompt:
lighthouse login:
29
Lighthouse User Guide
Password:
Enter the newly-set password and press Enter. A standard bash shell prompt appears with the list of
static, DHCP, and IPv6 addresses.
net1 192.168.0.1/24
net1:dhcp 192.168.1.186/24
net1 fe80::a00:27ff:fe39:daa3/64
root@lighthouse:~#
30
Lighthouse User Guide
Only the first two options are available out-of-the-box. The static IP on another subnet has to be
configured first.
If there is no DHCP and Lighthouse is not reachable on the default address 192.168.0.1 then the static IP
address can be changed from the console using the ogsetnetwork.sh command.
Example:
Tip: Type ogset<tab> and tab completion will give you the full command.
To login to Lighthouse:
1. Enter a username in the Username field. The first time you log in, the Username will be root.
2. Enter the password in the Password field.
3. Click Log In or press Enter. The Dashboard loads.
When you log in, you will see a few standard Lighthouse interface elements including:
• The primary menu options MONITOR, MANAGE, CONFIGURE, and SETTINGS on the left.
• A light/dark mode toggle switch on the bottom left of the interface. This control allows you to
modify the appearance of Lighthouse for low lighting situations.
• System menu options Add Node, Help, System, and Log Out on the top right.
• Some column headings have Arrow Icons next to them. Click to toggle between ascending and
descending order.
The elements that appear on the Dashboard page depend on the privileges granted to the currently
logged in user.
32
Lighthouse User Guide
For root users, the Dashboard displays Enrolled Nodes, Cellular Health Status, Current Node Status, and
Licensing Information.
Cellular Health is clickable and will take you to the MANAGE > NODES > Node Web UI page where you
can view the Cellular Health column with information on each node.
Clicking on:
NOTE: The appearance of the Dashboard, the sidebar, and other Lighthouse pages depends on the
privileges assigned to the currently logged in user. In this guide, screenshots represent what the root user
sees. Users with different privileges will see filtered views of available nodes, managed devices, users,
groups, tags, and Smart Groups have different privileges with regards to creating and changing settings
within Lighthouse.
33
Lighthouse User Guide
To see the network connections available to Lighthouse, select SETTINGS > NETWORK CONNECTIONS >
Network Interfaces
This displays three connections: static and DHCP IPv4 interfaces and by default, an automatic IPv6
connection.
NOTE: Don’t change the configuration method. Instead, disable the interface which will not be
used by unchecking the Enabled checkbox. If default-static and default-DHCP are changed to the
same configuration method (i.e. both are set to Static assignment or both are set to DHCP)
neither interface works.
34
Lighthouse User Guide
3. Click Apply.
2. In the Address field of the External Network Addresses section, enter an IP address.
35
Lighthouse User Guide
3. Change the API Port, VPN Port, or Multi-Instance VPN Port if the ports used on the entered IP
address are different from the default settings.
4. Click Apply.
1. Click the + button. A second row appears in the External Network Addresses section.
2. In the Address field, enter an IP address.
3. Change the API Port, VPN Port, or Multi-Instance VPN Port if the ports used on the entered IP
address are different from the default settings.
4. Click Apply.
To change the order in which manually added IP addresses are sent to remote nodes:
1. Click the up and down arrows in the Order column to change the order in which the IP addresses
are listed.
2. Click Apply.
If external IP addresses are manually added to a Lighthouse configuration, these addresses are sent to a
remote node during enrollment. If no external IP address is manually added, default external IP addresses
are used.
The external IP addresses are sent to a remote node during enrollment in the following order:
1. net1:dhcp
2. net1:static1
3. The IP address connected to the default gateway.
Lighthouse ships with a private SSL Certificate that encrypts communications between it and the
browser.
NOTE: If you plan to use the Lighthouse multiple instance feature, the certificate will be used on all
instances. In this case, we recommend using a wildcard certificate.
To examine this certificate or generate a new Certificate Signing Request, select SETTINGS > SERVICES >
HTTPS Certificate. The details of the Current SSL Certificate appear.
Below this listing is a Certificate Signing Request form, which can be used to generate a new SSL
certificate.
37
Lighthouse User Guide
To modify Web and CLI session settings select SETTINGS > SERVICES > Session Settings.
• Web Session Timeout: This value can be set from 1 to 1440 minutes.
• CLI Session Timeout: This value can be set from 1 to 1440 minutes or set it to 0 to disable the
timeout. Changes take effect the next time a user logs in via the CLI.
• Enable additional enrollment-only REST API port: This port defaults to 8443. When this option is
enabled, only /nodes endpoint is accessible via port 8443(GET/POST/PUT) and all other
endpoints return a 404 Not Found error. Enabling this API allows users who are using NAT for the
Lighthouse to expose an external port publicly only for nodes that are attempting to enroll to the
Lighthouse, and not for the other functionality available from the REST API. After this option is
disabled, all endpoints should be accessible as per normal usage.
38
Lighthouse User Guide
The MTU setting can be configured for traffic that is travelling through the Lighthouse VPN in an attempt
to solve MTU path discovery problems. To modify the MTU of the Lighthouse VPN tunnel select
SETTINGS > SERVICES > Lighthouse VPN. Allowed values are between 1280 and 1500.
Lighthouse supports both v1/v2 and v3 SNMP versions, which can be running at the same time. The
SNMP service is not enabled by default and starts once it has been configured correctly. If the user does
not provide an Engine ID, the auto-generated ID coming out of snmpd is displayed. Only standard
enterprise MIBs can be used. Lighthouse Health statistics (load/uptime/memory usage, etc.) can be
retrieved.
When cell health checks are enabled, the network carrier, IMEI, IMSI and ICCID of the downstream SIM
being utilized are part of the information that is displayed in Lighthouse for managed nodes
If a managed node has the modem disabled/off, an appropriate status is shown in Lighthouse for the
node.
NOTE: Cellular Health Reporting requires Console Server firmware version 4.5 or greater.
40
Lighthouse User Guide
Lighthouse can be configured to expose managed node information such as node name, node model
number, node port label, license status, etc. via SNMP.
Some generic information about Lighthouse version and nodes count can be found at:
ogLhStatus:
ogLhVersion
ogLhNodes
ogLhNodesTotal
ogLhNodesPending
ogLhNodesConnected
ogLhNodesDisconnected
ogLhNodesTable with detailed information about nodes.
ogLhNodeIndex
ogLhNodeName
ogLhNodeModel
ogLhNodeProductType
ogLhNodeVpnAddress
ogLhNodeSerialNumber
ogLhNodeUptime
ogLhNodeConnStatus
ogLhNodePortsTable:
ogLhPortIndex
ogLhPortLabel
ogLhPortID
ogLhNodeInterfacesTable:
ogLhNodeInterfaceIndex
ogLhNodeInterfaceName
ogLhNodeInterfaceAddress
42
Lighthouse User Guide
ogLhThirdPartyNodesTable:
ogLhThirdPartyNodeIndex
ogLhThirdPartyNodeSSHPort
ogLhThirdPartyNodeName
ogLhThirdPartyNodeModel
ogLhThirdPartyNodeProductType
ogLhThirdPartyNodeAddress
ogLhThirdPartyNodeSerialNumber
ogLhThirdPartyNodeUptime
ogLhThirdPartyNodeConnStatus
ogLhThirdPartyNodePortsTable:
ohLhThirdPartyPortIndex
ogLhThirdPartyPortLabel
ogLhThirdPartyPortConnectionMethod
ogLhThirdPartyPortMode
ogLhThirdPartyRemotePort
ogLhThirdPartyPortLineID
ogLhLicenseStatus:
ogLhLicInstalled
ogLhLicSupported
ogLhLicExpiry
ogLhLicStatus
ogLhLicFeatureName
You can also query for enrolled node cellular health information.
ogLhNodeCellularHealth
Get serial number with enrolled node having VPN address 192.168.128.2:
snmpwalk -m ALL -v1 -c public 192.168.1.1 ogLhNodeSerialNumber.192.168.128.2
snmpget -m ALL -v1 -c public 192.168.1.1 ogLhNodeSerialNumber.192.168.128.2
For v2c:
1. Choose TRAP or INFORM as the SNMP Message Type.
2. Enter the SNMP Community to use for messages.
For v3:
For all three SNMP versions, trigger TRAP/INFORM notifications by checking either or both of the Node
Connection Status and the Node Cellular Heath Status checkboxes. Click Apply.
When a node connection status changes, a nodeStatusNotif notification is sent, populated with data
about the node's connection status, address and name.
nodeStatusNotif
ogLhNodeName
ogLhNodeIndex
ogLhNodeConnStatus
thirdPartyNodeStatusNotif
ogLhThirdPartyNodeIndex
ogLhThirdPartyNodeName
ogLhThirdPartyNodeAddress
ogLhThirdPartyNodeConnStatus
This page lists any previously added external syslog servers. To add a new one,
1. Click the + symbol. The Add External Syslog Server dialog opens.
46
Lighthouse User Guide
To edit an existing syslog server, click the Edit button . Delete a server by clicking the x button .
Here are a few examples of what lines in the syslog look like:
Edit the user “fred” and make him a member of the admin group
Administrative users can enable automatic node backup. Up to 10 backups can be stored on a rolling
basis.
2. For the Start time, choose either Immediately or choose Set Time to open editable Date and Time
fields.
3. Choose how often you wish to Repeat the backup by adjusting the values for Interval.
49
Lighthouse User Guide
NOTE: You can modify these options by returning to SETTINGS > SERVICES > Node Backup at any time.
Lighthouse allows you to view all nodes including connected, not connected, enrolled, and pending, as
well as nodes using cellular. Go to MONITOR > Nodes.
This page displays the cellular health and number of ports. It also offers a button on the right of
connected nodes to access the Web UI.
To the right of the table, you can filter by Smart Group, connection status, and perform a text search. By
default, the Show all filter is selected.
You can click on any connected node to view the node details, list of connected devices, and a list of
unconfigured ports. From this detail page, you can access the web terminal and SSH of each connected
device. You can also unenroll a connected node or visit the Web UI using the buttons on the top right of
the page.
50
Lighthouse User Guide
You can keep track of jobs in Lighthouse which are scheduled, running, or have run.
NOTE: For the 21.Q3.0 release (onwards until notified otherwise), this can only monitor system-created
jobs. Future releases will add increased functionality.
At the top of the page, you can click on CURRENT, SCHEDULED, or ENDED links to see those jobs. You
can also use the FILTER BY form on the right to further refine your results by type, ID, job duration, dates
the job began, and owner.
51
Lighthouse User Guide
2. At the Local Terminal login prompt enter a username with administrative privileges (e.g. root).
3. At the Password: prompt, enter that account’s password. A Last login date and time for that
account are returned to STD OUT and a shell prompt for the logged in user appears.
4. Enter the command shutdown now and press Return. The virtual machine shuts down.
To restart a running Lighthouse instance, follow the first three steps of the Shutting down a running
Lighthouse instance procedure above. At the shell prompt, enter one of these commands and press
Return:
• reboot
• shutdown -r now
7. Using Lighthouse
After Lighthouse has been installed and configured, a small set of nodes should be enrolled, and a set of
tags and smart groups should be created that allow nodes access to be filtered to the correct subset of
users.
Once these nodes are installed, access to the Node’s Web UI and serial ports should be tested.
Lighthouse includes support for managing third-party remote nodes at no cost. Support for third-party
remote nodes is not built-in to a new Lighthouse instance, however: it is added via a license.
A license is an encrypted, RFC 7519-compliant, JSON web token that contains key-values. Licenses are
distributed by Opengear and are available as .zip files by e-mail via a fulfillment procedure.
Before enrolling a third-party remote node, its corresponding license must be added to Lighthouse as
follows:
To see all installed licenses, select SETTINGS > SYSTEM > Licensing.
Installed licenses are also shown on the Lighthouse dashboard under the LICENSING INFORMATION
section. Select MONITOR > Dashboard to open the Dashboard.
oglicdump is a shell-based tool that writes the current licensing status of a Lighthouse instance to STD
OUT (or, using the -o switch, a file).
For example:
# oglicdump
{
"OGLH": {
"contact": {
"email": "[email protected]",
"name": "test",
"phone": "test"
},
"features": {
54
Lighthouse User Guide
"additional": {
"multipleinstance": "1",
"thirdpartynodes": "1"
},
"maintenance": 1548806400,
"nodes": 20
}
}
}
# oglicdump
No data found
Enrolling nodes is the process of connecting nodes to Lighthouse to make them available for access,
monitoring, and management. Enrollment can be performed via:
Credentials must be provided to authenticate either the Lighthouse during enrollment via the Lighthouse
WebUI, or the node during the other enrollment scenarios.
The Lighthouse VPN uses certificate-authenticated OpenVPN tunnels between Lighthouse and remote
nodes. These tunnels rely on the time being synchronized between the Lighthouse instance and the
console server or other remote node. During enrollment, if a remote node is not relying on an NTP server
to set its time, it inspects the HTTP Date header sent by Lighthouse and sets its local time to match that
of the Lighthouse instance.
If a remote node is relying on an NTP server to set its own time, it still checks the HTTP Date header sent
by Lighthouse to affect the time synchronization but does not set its local time to that of the Lighthouse
instance.
When enrolling via Lighthouse, an administration username and password for the node must be provided.
When enrolling via the node, an enrollment token must be provided. A default enrollment token can be set
on the CONFIGURE > NODE ENROLLMENT > Enrollment Settings page, and individual tokens set per
enrollment bundle.
1. Once enrollment starts, nodes receive their enrollment package, and establish a VPN connection
to Lighthouse.
55
Lighthouse User Guide
2. The node is now in the Pending state and needs to be Approved before the node is available for
access, management, or monitoring.
NOTE: This second step can be skipped by selecting the Auto-approve node checkbox when
configuring an enrollment bundle.
An enrollment bundle is a downloadable file that stores provisioning information, allowing for bulk
enrollment and manipulation of remote nodes.
Applying an enrollment bundle during enrollment allows tags to be associated with nodes when they’re
first enrolled, rather than manually assigning tags after the nodes are enrolled.
This is useful for larger roll outs where there are many nodes deployed with a similar configuration and
responsibilities. If relevant Smart Groups and tags have been set up, newly enrolled nodes are
immediately visible for the relevant users to configure and use.
Associating templates with an enrollment bundle allows to run a set of templates on a node, after it has
been enrolled. Any template defined on the Lighthouse can be added to an enrollment bundle, and each
bundle supports any number of templates.
NOTE: NetOps modules (see NetOps User Guide) can also be associated with enrollment bundles.
3. Enter a Name and Authentication Token for the bundle in the respective fields.
4. Select the number of Tags and Values to apply to any nodes that enroll using this enrollment
bundle.
5. (Optional) Select the Auto-approve node checkbox.
When this is checked, a device configured using this enrollment bundle is not placed in pending
mode during the enrollment process. Instead, it is automatically approved for enrollment after it
has been identified.
6. You can also use this bundle to automatically activate NetOps modules for any supported nodes.
Scroll down to the NETOPS MODULES section and press the + button to open the MODULE
DETAILS dialog.
7. Select the desired Module Name from the drop-down list. Click Apply.
With the enrollment bundle named, use the ENROLLMENT BUNDLE NODE TAGS to populate it with the
desired name-value pairs:
With the enrollment bundle named, use the TEMPLATES to populate it with the desired list of templates
to be applied post-enrollment:
An enrollment bundle file, manifest.og, contains a series of field-value pairs that an unconfigured
device can use to configure itself.
Options that can be set in manifest.og include new firmware, custom configuration scripts, OPG config
files, and Lighthouse enrollment details.
By default, manifest.og includes the following field-value pairs (with example values):
address=192.168.88.20
api_port=4443
bundle=bne-dc
password=secret
Custom field-value pairs can be added manually. The field names are potential field names for a real-
world, customized file, but the values following each field name are examples:
script=configure_ports.sh
image=acm7000-3.16.6.image
external_endpoints=192.168.1.2:4444,192.168.1.3:4445
Enrollment via Lighthouse Web UI only works if the Node is reachable from Lighthouse.
1. Select the Add Node shortcut in the top menu bar to open a NEW ENROLLMENT dialog.
2. Select the Product type from the Product drop-down menu.
3. Available options in the Product drop-down menu are:
• An Opengear device
• A generic third-party device
• An Avocent ACS6000
• An Avocent ACS8000
• An Avocent ACS Classic
58
Lighthouse User Guide
4. Enter the Name, Network Address, Username, and Password of the node being enrolled. The
Username and Password fields are for the login credentials required by the remote node being
enrolled, not the login credentials used to login to the Lighthouse instance.
NOTE: Lighthouse populates the node name field with the hostname of the enrolled node rather
than a user provided value. It is no longer possible for users to specify a custom name, except
when enrolling third party nodes. Console servers with firmware 4.1.1 and higher provide their
hostname in the node information, with pre-4.1 nodes instead just having their node id used as
the name. Nodes enrolled prior to upgrading to 5 have their names switched to the new standard
if the node is running 4.1.1 firmware but retain their old name if older firmware is still installed.
5. To enroll a generic third-party device, there are three more required fields: Connection Method,
Base Protocol Port, and Port Count.
59
Lighthouse User Guide
6. Choose SSH or Telnet from the Connection Method drop-down menu, as appropriate for the
connection method supported by the third-party device.
7. Enter a base number in the Base Protocol Port. By default, this is set to 3000. The Base Protocol
Port number is the starting port number from which the third-party device’s individual serial port
network port numbers will be derived.
8. Enter the number of serial ports the third-party device has in the Port Count field. Below the Port
Count field is a Serial Port Labels section. Whatever number is entered in the Port Count field, the
Port Label x fields in this section update to match.
9. Optionally, edit the labels used to identify each serial port in the Serial Port Labels section.
10. Click Apply.
Once enrolled, the console server’s details are removed from the Pending Nodes page and added to
the CONFIGURE > NODE ENROLLMENT > Enrolled Nodes page.
60
Lighthouse User Guide
If the node is situated behind a firewall, Lighthouse is not able to initiate an enrollment. It needs to be
triggered from the Node Web UI.
• OM: Nodes can be enrolled into a Lighthouse instance on OPERATIONS MANAGER Web UI using
the CONFIGURE > LIGHTHOUSE Enrollment menu item and the lhvpn-callhome command.
See the OPERATIONS MANAGER User Guide for more details.
• ACM, CM and IM: On the Web UI, select Serial & Network > Lighthouse to open the Request
Enrollment with Lighthouse Server page.
For mass node enrollments using ZTP, three new custom DHCP fields are handled by ZTP scripts.
These fields contain the URL, Bundle Name and Enrollment Password used in an enrollment which is
kicked off after all other ZTP handling is completed. If a reboot is required because of a config file being
provided the enrollment starts after the reboot. Otherwise it happens immediately.
class "opengear-config-over-dhcp-test" {
match if option vendor-class-identifier ~~ "^Opengear/";
vendor-option-space opengear;
option opengear.config-url "http://192.168.88.1/config.xml";
option opengear.enroll-url "192.168.88.20";
option opengear.enroll-bundle "";
option opengear.enroll-password "default";
}
NOTE: The maximum amount of data allowable as DHCP options is 1200 bytes, including all overhead
inherent in the structuring of this data. Individual options are limited to 255 characters.
USB Enrollment enables the configuration of a device using a manifest file copied to a USB drive and
inserted into the unconfigured device before it first boots.
Once created (see Creating an enrollment bundle above), manifest.og files can be downloaded from a
Lighthouse instance as follows:
1. Select CONFIGURE > NODE ENROLLMENT > Enrollment Bundles. A list of existing Enrollment
Bundles appears.
2. In the Actions column of the particular bundle, click the download button, a downward arrow in a
circle.
3. Depending on the browser’s configuration, a manifest.og file is either downloaded to the local
system or the browser opens a dialog asking to specify where download should be copied.
On first boot, the device looks for a file — manifest.og — on any USB drives attached to the
device and configures the device based on their contents.
62
Lighthouse User Guide
CONFIGURE > NODE ENROLLMENT > Enrolled Nodes lists all enrolled nodes in the order they are enrolled
to Lighthouse.
On the bottom right of the page is an Items per page drop-down that allows you to select the number of
nodes per page. Choose a default value of 10, 20, 50, 80, or 100 nodes per page, or enter a custom value
between 1 and 100. This setting applies to the current user session only and will be lost when current
user logs out. This drop-down is also presented on Pending Nodes, Console Gateway, and Node Web UI
pages.
It also displays details about each node (such as model, firmware version, serial number) and status.
Status is the current connection status of the node and displays either of two things:
• Connected: Last status change x [time unit] ago: The time since Lighthouse connected to the
console server.
• Disconnected: last status change x [time unit] ago: The time since Lighthouse disconnected from
the console server.
Configuration Retrieval Status displays if any configuration retrieval sections failed when performing a
configuration sync with this node, such as Groups, Users, Node Description, Authorization, or Serial Ports.
Configuration Template Run Status displays the result of the most recent configuration template push on
this node, listing which templates finished applying, or failed to apply to the node. This information is
displayed until the next template push has completed on this node.
The Configuration Retrieval Status and Configuration Template Run Status are not displayed if there is
no relevant data to display and are only displayed for users with Lighthouse Administrator or Node
Administrator permissions.
Results of the Configuration Retrieval Status and Configuration Template Run Status will indicate:
• Partial Failure: some templates failed to execute on the node, or some config sections failed to
synchronize.
• Failure: all templates failed to execute on the node, or all config sections failed to synchronize.
The detailed information is shown in a popover that appears when the summary of each status is
clicked on, navigated to, or hovered over. The format of the detailed information for each status
shown on relevant popovers is as follows:
If SETTINGS > SERVICES > Cellular Health Reporting is Enabled, the Cellular Health column appears and
displays the node’s current cellular status. If this state is Good|Moderate|Bad, the color indicator and the
text are clickable links that open a popup containing detailed health information.
There are three ways to filter search results: Free Text Search, Smart Group Filtering, and Managed
Device Filtering. They can be used independently from each other or in combination. MANAGE >
MANAGED DEVICES > Console Gateway uses all of them because it is the only page which lists all nodes
with managed devices.
64
Lighthouse User Guide
The Free Text Search input field allows near real-time filtering of nodes and managed devices. It searches
over node name, firmware version, management VPN address, MAC address, serial number and port
label.
To use the Free Text Search, enter your search term and press the Enter key. The Free Text Search field
treats multiple search terms separated by the space character as being combined with the logical AND
operator, returning results only if all terms are present in the item.
For example, the search phrase production switch returns only nodes that contain both production
AND switch anywhere in searchable fields.
To search for a multi-word term, enclose the search term in double quote characters. For example,
“production switch” will return results only if the entire search term is matched in the item.
Selecting from the Select Smart Group drop-down menu sets the page to display the subset of nodes that
belong to the selected group. See Creating Smart Groups for how to create such groups.
Once a particular Smart Group has been selected, further filtering options become available under Fields
to search:
65
Lighthouse User Guide
In the example above, the CONFIGURE > NODE ENROLLMENT > Enrolled Nodes page is being filtered on
the Sandy-4 Smart Group.
Selecting from the Managed Device Filter drop-down menu sets the page to display the subset of nodes
that belong to the selected group. See Creating Smart Groups below for how to create such groups.
Once a particular Managed Device Filter has been selected, further filtering options become available
under Fields to search:
Note: You can also set up a Node Upgrade in the CLI, see 12.2 node-upgrade.
The Node Upgrade UI is available in the Web UI under Settings > Services > Node Firmware Upgrade.
Overview
The Node Upgrade UI allows up to 5000 connected nodes per task to be upgraded to the latest firmware
for security fixes through an easy to manage user interface, either immediately or at a scheduled time,
even outside normal business hours.
Completed jobs with the nodes selected can be duplicated so as to allow easy sequential upgrades.
Nodes that failed to upgrade can be re-scheduled.
Upon opening the Node Firmware Upgrade window there are two tabs accessible, plus access to the
upgrade scheduling wizard, these are:
Upgrade Tasks – a filtered dashboard where you can view scheduled and completed tasks and see their
status.
File Manager – An area that allows upgrade files to be uploaded and a table that displays previously
uploaded files.
Node Firmware Upgrade scheduling wizard –This is where you can set up and schedule firmware
upgrades. The wizard is accessed by clicking on the + button in the Upgrade Tasks tab.
Note: Firmware files that are still needed by an ongoing or upcoming firmware upgrade task cannot be
deleted, an error flag will inform you if this occurs.
2. The Node Firmware Upgrade Scheduling wizard is opened. Enter a name/title for the upgrade
task.
3. From the firmware list, select the firmware upgrade for the upgrade task then click the Select
Firmware button.
Note: You can also upload new firmware at this stage.
4. Use the checkboxes to select which nodes will be upgraded in this task.
Note: Compatible nodes that have already been scheduled for an upgrade cannot be selected,
these are visible in the list but appear greyed-out. Nodes that are not compatible with the
firmware file will not be listed.
5. Select Next, to go to the scheduling screen.
6. In the Scheduling screen select either Immediately after creation for immediate start, or, Set
time for a delayed schedule.
Note: The scheduled time is always given in UTC – the current UTC time is provided on-screen for
reference.
68
Lighthouse User Guide
7. If Upgrade in Failover is selected, it is selected either in bulk, by dropdown selection (a), or,
individually by a toggle switch beside each table row (b):
Note: Selecting this option may result in considerable cell charges in the event of a failover.
8. Click Next – Review and Confirm to go to the review screen. Check the schedule details are
correct. To change schedule details, click Back – Schedule Upgrade, all data local data will be
preserved while you change parameters on previous screens.
9. Select Confirm, and type Yes at the popup prompt, then click Confirm to create the task.
Note: You cannot cancel tasks that have already been completed. Please review the cancellation
limitations below.
Limitations:
• Do not cancel an upgrade job just as it is about to begin, for example, 10 seconds before
or after the start time. This may result in a race condition where the command to cancel
the upgrade may be ignored and the upgrade runs even though it was cancelled.
• If an upgrade is cancelled while in progress, only nodes that have not yet been upgraded
will be cancelled.
Note: If the relative Firmware file has been deleted, the Repeat for failed upgrades button is
not displayed.
NOTE: Lighthouse does not check or validate the version jumps for nodes, so there is a risk that the
upgrade could fail if major versions are being skipped. Skipping versions is not recommended or
supported, however, it is not disallowed.
Smart Groups are saved search parameters used within Lighthouse for grouping related remote nodes.
A user group can be linked to a particular Smart Group. When a group is linked in this fashion, members
of the group inherit rights over all nodes in the group based on the group’s role. See 8.3 Modifying existing
groups for how to set a group’s role and linked Smart Group.
71
Lighthouse User Guide
Smart Groups can also be used to filter visible nodes on pages that display enrolled nodes (such as
CONFIGURE > NODE ENROLLMENT > Enrolled Nodes) to make it easier to drill down to a particular
console.
Smart Groups are dynamic, so as more nodes are added to the system, the filters update.
1. Navigate to any page which displays the Smart Group search interface, for example CONFIGURE
> NODE ENROLLMENT > Enrolled Nodes or MANAGE > NODES > Node Web UI.
2. Click on the Select Smart Group drop-down and select New Smart Group...
3. Click the Field to search drop-down to select a node attribute to filter on.
These attributes include details about the device (Internal VPN Address, MAC Address, Name,
Product, SSH Port, Firmware Version, Model, Serial Number, Node ID, Connection Status, Cell Health),
and include any tags that have been configured in the system. For filtering access to devices, tags are
the most useful attributes to filter on. When a tag is selected, the Field to search text box contains tag
values.
4. Click the Operator drop-down to select the operator to apply to the Value.
5. Select the Value to be matched against.
6. Click Apply to see the results of the filter.
7. Click Save As and type in a name for your new Smart Group.
This Smart Group can now be used for filtering nodes for display and for access.
1. Navigate to a page that displays Smart Groups for filtering (e.g. CONFIGURE > NODE
ENROLLMENT > Enrolled Nodes).
2. Select the required Smart Group to be changed from the Select Smart Group drop-down menu.
3. Change the Tag and Operator values as required.
4. Click Save as.
5. Leave the Smart Group name unedited and click Apply. The changed Smart Group overwrites the
existing Smart Group.
Managed Device Filters are saved search parameters for grouping related managed devices on remote
nodes. Managed Device Filters can be used to filter visible nodes with managed devices on the MANAGE
> MANAGED DEVICES > Console Gateway page to make it easier to find a particular console.
Managed Device Filters are dynamic, so as more nodes with managed devices which match saved filters
are added to the system, the filters update.
73
Lighthouse User Guide
1. Navigate to the MANAGE > MANAGED DEVICES > Console Gateway page.
2. Click on the Select Managed Device Filter drop-down and select New Managed Device Filter.
3. Click the Field to search drop-down to select a node attribute to filter on.
4. Select Port Label configuration.
5. Click the Operator drop-down to select the operator to apply to the Value.
6. Populate the Value to be matched against.
7. Click Apply to see the results of the filter.
8. Click Save As and type in a name for the filter.
This Managed Device Filter can now be used for filtering nodes with managed devices.
To edit an existing Managed Device Filter, select CONFIGURE > Edit Managed Device Filters page.
1. Navigate to a page that displays Managed Device Filter, such as MANAGE > MANAGED DEVICES
> Console Gateway.
2. Select the Managed Device Filter to change from the Select Managed Device Filter drop-down
menu.
3. Change the parameters (e.g. Operator values) as required.
4. Click Save as.
5. Leave the Managed Device Filter name unedited and click Apply. The modified Managed Device
Filter overwrites the existing Managed Device Filter.
Once a node has been enrolled, its own web-management interface can be accessed from within the
Lighthouse UI. To connect to an enrolled node’s web-management interface:
At the bottom of the browser window is a visual indication that the console server session is being
mediated through Lighthouse and a link allowing for a quick return to Lighthouse.
Searching for serial ports on Lighthouse can be accomplished by selecting MANAGE > MANAGED
DEVICES > Console Gateway and MANAGE > MANAGED DEVICES > Quick Search.
The Items per page drop-down on Quick Search page allows user to select the number of ports per page.
Choose a default value of 10, 20, 50, 80, or 100 ports per page, or enter a custom value between 1 and
100. This setting applies to the current user session only and will be lost when user logs out.
NOTE: Port-centric search allows filtering via the Managed Device Filters and displays a list of ports
within enrolled nodes that match the search terms, while node-centric search allows filtering via Smart
Groups and node properties. Quick Search can be used to filter on the managed device label.
Node-centric searching
Port-centric searching
Once the serial port is located, serial port access via Console Gateway can be accomplished in two ways:
Quick Search
To provide easy console port access, Lighthouse includes a HTML5 Web Terminal. The HTML5 Web
Terminal includes native cut, copy and paste support. The terminals available on nodes do not.
1. Locate the particular port by using one of the search techniques discussed above.
2. Click the Web Terminal link for the particular port. A new tab opens containing the Web Terminal.
To close a terminal session, close the tab, or type ~. in the Web Terminal window.
To access ports via SSH, the user can either use a console chooser menu to select the node and the
console port or use a direct SSH link from the Web UI to connect to the port.
1. Locate the particular port by using one of the search techniques discussed above.
2. Click the SSH link to connect to the URL.
These auto-generated links use the colon (:) as the field-delimiter. The auto-generated SSH link has the
following form:
ssh://user-name:console-server-name:port-number@lighthouse-ip-address
Some web browsers associate the colon character with delimiting the protocol at the beginning of a URI
so they don’t pass these auto-generated URIs correctly.
To work around this, the default delimiter character can be changed. To change this character:
• Enter a delimited character in the Console Gateway Port Delimiter text-entry field. The carat, ^, is
the most common alternative.
• Use the Console Gateway SSH Address drop-down menu to choose an address from which to
SSH. The list of available addresses contains the current network interfaces and external network
addresses. The value defaults to net1:dhcp if it exists and net1:static otherwise. The additional
external addresses can be added to this list using the SETTINGS > SYSTEM> Administration
page.
To use the console chooser menu, SSH to the Lighthouse appliance with the username format
username:serial. This connects to the Lighthouse and presents a list of nodes that the user can access.
Once the user selects a node, they are presented with a list of console ports they have access to. When
one is selected, the user is connected to that port. For faster access, there are username format
shortcuts that give more specific lists of serial ports, or direct access without a menu.
• username:node_name
When a valid node name is specified, a list of console ports that the user can access on that node
is shown. If they do not have access to this node, the connection fails.
• username:node_name:port_name
When a valid node name and port name are specified, and the user has access to that node and
port, the user is connected to this port. If they do not have access to that port, the connection
fails.
• username:port_name
When a valid port name is specified, the user is connected to first port with that port name found.
If the user does not have access to this port, the connection fails.
NOTE: Node names and port names are not case sensitive.
$ ssh adminuser:serial@lighthouse-name-or-ip-here
1: cm71xx
Users must be members of one or more groups. Each group has a role assigned to it which controls the
level of access that group members have to the system. These roles are:
Role Description
Lighthouse The Lighthouse Administrator role is assigned to groups whose members need to manage and
Administrator maintain the Lighthouse appliance. Members have access to all data on the Lighthouse system
The Node Administrator role is assigned to groups that need to manage and maintain a set of Nodes.
Node
Each group with the Node Administrator role must have an associated Smart Group which is evaluated
Administrator
to define the set of nodes that the group members have access to.
The Node User role is assigned to groups that need to access a set of nodes. Each group with the Node
User role must have an associated Smart Group which is evaluated to define the set of nodes that the
Node User
group members have access to. Optionally, access to the managed devices can be limited by
associating the saved Managed Device Filter with the Node User role.
Group membership can either be defined locally for local users or defined on the AAA server. Groups that
are assigned by the AAA servers must still exist locally.
All password fields in Lighthouse are write-only. They accept data from the clipboard or pasteboard but
do not pass data out.
1. Select SETTINGS > USER MANAGEMENT > Groups and Roles. The User Groups tab should be
selected.
Group Name is case sensitive. It can contain numbers and some alphanumeric characters. When
using remote authentication, characters from a user's remote groups that are not allowed on
Lighthouse are converted to underscores during authentication. Local groups can be created that
take that into account, allowing the authentication to continue.
4. The CLI Permissions section displays permissions based on the roles you have assigned to this
group. To change the permissions, you can edit or add new roles with the desired CLI
Permissions. See CREATE A NEW ROLL below.
5. Click Enabled to enable group.
6. If desired, you can select a Linked Managed Device Filter and Linked Smart Group to associate
with this group.
7. Add one or more roles by clicking Add Role and checking the desired roles.
Each role has specific operation permissions associated with it and CLI (Command Line
Interface) access levels for console shell, shell, and PM shell. Click view details to see the
information for each group.
81
Lighthouse User Guide
8. You can also control the new group’s permissions independently of the roles you add to your
group. Scroll to the bottom of the page to specify Full Access, Read Only, or Deny. Click to the
right of each Operation row to see all options.
NOTE: See Available Operations Permissions below for a list of all options.
Available Roles:
Lighthouse Administrator: Members of groups with this role have Full access to all nodes and
managed devices.
NodeAdmin: Has no shell access. Has Read Only access to Netops Modules, all Nodes &
Congfiguration Operations, Cell Health, Smart Groups, Tags, and Jobs.
NodeUser: Has PM Shell access. Has Read Only access to Nodes & Devices (Base) and Tags.
Lighthouse Reporter: Has no shell access. Has Read Only access to all Operations.
You can also create a custom role that allows you to modify CLI Permissions and Operations
Permissions by clicking Create New Role on the New Group page.
A new role can also be based on an existing role with the Use as template link on the upper right of a
role’s detail page.
Actions
Events – Enable or disable if events are used to generate notifications.
Subscriptions – Manage third-party access to events.
Logging
Port Logging – Manage port logging settings.
Syslog – Manage system syslog settings.
Netops
Netops Modules
Nodes & Configuration
Nodes & Devices (Base) – Access to dashboard, nodes, managed devices, node enrollment,
console gateway, and Node web UI.
Nodes & Devices (Advanced) – Access to jobs, pending nodes, smart groups, and managed
device filters.
Template Push – Manage templates and push templated to nodes.
Service Settings
LHVPN
Cell Health
83
Lighthouse User Guide
Console Gateway
Date & Time
HTTPS
Netops – Install Netops modules and manage local Netops repositories.
Node Backup
Session Settings
SNMP
SSH
Syslog
Smartgroups & Tags
Bundles – Manage and use bundles.
Smart Groups – Manage and use smart groups.
Tags – Manage and use tags.
System
Admin & Licensing – Manage access settings for Lighthouse and license settings.
Backup & Restore
Jobs
Multi-instance – Manage multi-instance settings and control state of instances.
Network Interfaces – Manage network interface settings.
System Upgrade & Reset
Users & Permissions
Authentication – Manage authentication settings including methods, policies, and restrictions.
Groups & Roles – Create and edit groups and roles. May not assign them to users.
Users – View, manage, create, and delete users.
84
Lighthouse User Guide
NOTE: When a new group is given the Lighthouse Administrator role, members of the group have access
to the sudo command. Groups or users with the Lighthouse Administrator role are added to the admin
group, which is in the list of allowed sudoers. On first boot of a new Lighthouse instance, the root user is
the only member of the admin group and the only user with sudo access.
6. You can also control the new roles Operation Permissions independently. Specify Full Access,
Read Only, or Deny. Click to the right of each Operation row to see all options.
A new role can also be based on an existing role with the Use as template link on the upper right of a
role’s detail page.
1. Select SETTINGS > Groups and Roles. If necessary, click on the USER GROUPS tab.
2. Click the name of the group to be modified.
3. Click the Edit icon on the upper right and make desired changes.
4. Click Save Group.
86
Lighthouse User Guide
The group details page allows the group’s Description, Role, Linked Smart Group, and Linked Managed
Device Filter to be set and changed.
If a Group’s Role is Lighthouse Administrator, the group’s Linked Smart Group is All Nodes and Linked
Managed Device Filter is All Managed Devices. This cannot be changed. If a Group has a Linked Smart
Group other than All Nodes or a Linked Managed Device Filter other than All Managed Devices, the group’s
Role cannot be set to Lighthouse Administrator.
See 7.5 Creating Smart Groups for details regarding creating and using Smart Groups and Creating
Managed Device Filters for details regarding creating and using Managed Device Filters.
The Groups page also allows you to delete groups. All users who were members of the deleted group lose
any access and administrative rights inherited from the group.
NOTE: The netgrp group is inherited as the primary group for all remote AAA users who are not defined
locally on Lighthouse. By default, netgrp has the Lighthouse Administrator role and is disabled - it must
be enabled to take effect for remote AAA users.
1. Select SETTINGS > USER MANAGEMENT > Groups and Roles. If necessary, click on the USER
GROUPS tab.
2. Click the name of the group to be used as a template.
3. Click the Use as Template icon on the upper right. This opens a new group page with the settings
from the group you selected as a template.
4. Change the Group Name and make and other desired changes.
5. Click Save Group.
87
Lighthouse User Guide
To create a new user without password which causes them to fail back to remote authentication:
NOTE: When a new user is created, an entry is added to the syslog, indicating the new user's name, the
user that performed the operation, database queries, and the time that it occurred:
If the created user is set to disabled, the configurator_users message does not appear as they have
not been added to the passwords file.
The syslog can be accessed from Lighthouse by clicking Help > Technical Support Report.
The Edit Users dialog also allows the user’s Description to be changed and the user’s Password to be
reset. The username cannot be changed. To disable a user, uncheck the Enabled checkbox.
Disabled users cannot login to Lighthouse using either the Web-based interface or via shell-based logins
(i.e. sshusername-disabled@lighthouse-name-or-ip). The user and the /home/username-disabled directory
still exist in the Lighthouse VM file system.
The next time this user logs in, the user will be required to change the password.
90
Lighthouse User Guide
Lighthouse Administrators can apply Password Policies. To do so, select SETTINGS > USER
MANAGEMENT > Login Restrictions, choose Enabled, and click Save. Click Password Policy.
To delete a user:
1. Make sure that another user exists that is in a group that has the Lighthouse Administrator role.
2. Select SETTINGS > USER MANAGEMENT > Local Users
3. Click Disable in the Actions section of the root user.
4. Click Yes in the Confirmation dialog.
To enable root user back log in with another user exists that is in a group that has the Lighthouse
Administrator role and click Enable in the Actions section of the root user.
An Identity Provider (IdP) stores and manages users' digital identities An IdP may check user identities via
username-password combinations and other factors, or it may simply provide a list of user identities that
another service provider (like an SSO) checks. An IdP can authenticate any entity connected to a network
or a system, including computers and other devices.
SAML is the framework used to integrate applications with identity providers for single sign-on (SSO).
This is mostly (if not completely) reflected when a user logs in and authenticates with their IdP or is
already logged in (if they have already authenticated with their identity provider prior to accessing
Lighthouse).
Lighthouse supports the independent, concurrent use of both SAML and AAA authentication. SAML
authentication is independent of, and does not interact with, other authentication methods.
Note: From release 21.Q4 onwards, SAML is only supported for authentication to the lighthouse Web GUI.
When SAML is configured and enabled, users can authenticate to the Lighthouse Web GUI either through
SAML or another configured authentication mechanism such as Local or AAA. Users can SSH only via the
other configured authentication mechanism (Local or AAA) if Remote Authentication is configured.
The default authentication is Local, with Lighthouse using locally defined users and groups. If AAA
(TACACS, RADIUS or LDAP) Remote Authentication is configured, this will be used for Web GUI and SSH
login authentication to Lighthouse (except for root which is always locally authenticated). Users are
authenticated against AAA server(s) with group membership returned to Lighthouse, which is used to
determine user roles and permissions. AAA Remote Authentication can support 2FA/MFA, depending on
the AAA server capabilities.
92
Lighthouse User Guide
• OKTA
• Azure Active Directory (Azure AD)
• One Login
Note: In the following instructions, any text in braces {} for example, {main lighthouse
address} needs to be substituted with the value for your environment.
{main lighthouse address} - The address (without the protocol or path) most users use to connect to
your primary lighthouse's web interface. e.g. lighthouse.example.com or 192.168.1.10
{provider} - Each IdP implements the spec slightly differently lighthouse needs to know which style to
expect to handle these differences. If your IdP is not one of our officially supported IdPs, try configuring
lighthouse using the generic provider option as the most widely applicable. (You could also try using our
other explicit IdP options but these often expect provider specific intricacies).
Please also review the limitations of the Lighthouse Saml SSO feature.
Note: You must have your user groups setup in lighthouse prior creating & assigning them via the IdP. See
the example in step 6 of the Okta configuration later in this topic.
Note: The {provider} in the steps must exactly match one of our provider strings i.e. generic, okta,
azure_ad, onelogin.
Example:
Depending on your IdP you may need to include the /saml/sp_init/ URLs.
• Set the recipient as lighthouse-{provider} and use the onelogin option as your
provider configuration.
• Or if you only access each via a single address you could create a separate
application integration per lighthouse.
6. If your IdP has the option then set the initiator to the Service Provider
7. Set your IdP to sign the Assertion for SAML.
You will also need to configure your IdP to send an additional attribute LH_Groups as part of the SAML
response.
In most IdPs this is done by adding an Attribute Statement or Parameter configuration in your application
integration. This parameter should be set as a multi-value parameter I.e. multiple values should be
provided by multiple duplicative either Attribute Value tags or Attribute tags in the SAML assertion.
We recommend setting the value of this attribute to be populated with the names of the user's Roles (or
Groups) in your IdP. This method allows you to create roles in your IdP with the same names as the user
groups on your lighthouse that can be assigned in your IdP to grant users that level of access to
lighthouse.
Alternatively, you can populate the LH Groups attribute with the names of the lighthouse user groups the
user should be granted by any other mechanism that your IdP provides. i.e. custom user properties
Note: Your IdP can populate the LH_Groups attribute to place users in any lighthouse user group except
lighthouse’s default admin group. You can allow users to login with admin privileges by simply creating
another user group in lighthouse with the admin role and assigning the matching role/group in your IdP to
the user (i.e. populate LH_Groups to include its value).
You will need to export an IdP metadata xml file for your lighthouse application integration from your IdP.
If your IdP requires that requests be signed by the Service Provider then you will also need to provide an
94
Lighthouse User Guide
x509 certificate & private key in .pem format (either exported from your IdP or created locally then
configured in your IdP).
1. Upload your IdP metadata XML (and if required certificate & private key) to your primary
lighthouse i.e. scp
2. Use the saml-idp-metadata command to configure each lighthouse individually. Each
lighthouse is configured individually with the same or a different metadata xml (and certificate +
key).
Note: the commands to configure each lighthouse individually, all must be run from your primary
lighthouse.
The following are examples of how you could configure officially supported IdPs. They are based on the
above generic step and the IdP’s configuration options as of 10/2021.
Okta
Create an Application
You need to create an application that Okta will be doing authentication on behalf of. NOTE: you’ll need to
know what the addresses of your lighthouses before creating the application.
a. Tick both:
95
Lighthouse User Guide
i. Name: LH_Groups
ii. Name Format: Basic
iii. Filter: Matches Regex .*
IdP Metadata
In the Sign On tab for your Okta application, find the line:
Open the link and save the page as an XML file (recommend naming the file okta_metadata.xml). This is
the metadata XML file that you will need to configure lighthouse.
Configure Lighthouse
Groups setup
1. If you do not already have your own User groups setup in lighthouse:
a. Login to Lighthouse as a local user (or any non-SAML user) i.e. root
Note: After this initial setup, you will be able to login as a SAML user.
b. Create the User groups with the Roles and permission that you desire. See “10.1 Creating
new users and groups templates” in the Lighthouse User manual.
96
Lighthouse User Guide
The assigned users are now able to login to lighthouse with the permission levels which that group grants
them.
Onelogin
Create an Application.
1. Go to Applications > Add App > Search for and choose SAML Custom Connector (Advanced)
2. Name your connector i.e. Lighthouse
3. In the Configuration tab for your new app
a. Set Audience (EntityID) to lighthouse-onelogin
b. Set Recipient to lighthouse-onelogin
c. Set ACS (Consumer) URL to:
d. Set ACS (Consumer) URL Validator to a regex expression that matches only all your
lighthouses' SSO addresses (IP & DNS for Primary & Secondary lighthouses).
i. Ensure it begins with ^ and ends with $ to match the whole url.
ii. Recommended pattern:
^https:\/\/ {lighthouse addresses}
\/api\/v3\.7\/sessions\/saml\/sso\/onelogin$
iii. For example to allow Onelogin login for lighthouse addresses 192.168.1.10 and
lighthouse.example.com , you could use the following: (note the additional ()
around your hostnames and the | separating them.
^https:\/\/(192\.168\.1\.10|lighthouse\.example\.com)\/api\/v3\.7\/sessions\/
saml\/sso\/onelogin$
IdP Metadata
Configure Lighthouse
Roles Setup
1. Login to Lighthouse as a local user (or any non-SAML user) i.e. root
Note: After this initial setup, you will be able to login as a SAML user.
2. Create the Usergroups with the Roles and permission that you desire. See “8.2 Creating new
groups and roles” in the Lighthouse User manual.
3. In Onelogin Go to Users > Roles
4. Click New Role
b. Set the Role’s name to match the lighthouse group you want it to map to.
c. Select your Lighthouse app to associate the role with.
d. Save.
98
Lighthouse User Guide
a. If you used a mapping then go to Users > Mappings and run Reapply All Mappings
Done; the assigned users are now able to login to lighthouse with the permission levels which that
Onelogin Role/Lighthouse group grants them.
Lighthouse can be added as an Enterprise application to Azure Active Directory. This example uses “App
roles” to grant users permissions.
IdP Metadata
Configure Lighthouse
Note: If you do not already have your own Usergroups setup in lighthouse:
1. Login to Lighthouse as a local user (or any non-SAML user) i.e. root
Note: After this initial setup, you will be able to login as a SAML user.
2. Create the Usergroups with the Roles and permission that you desire. See “8.2 Creating
new groups and roles” in the Lighthouse User manual.
See Add app roles and get them from a token - Microsoft identity platform for up to date documentation
on how to create and assign App Roles.
The assigned users are now able to login to lighthouse with the permission levels which that App
Role/Lighthouse group grants them.
100
Lighthouse User Guide
8.11.5 Limitations
The IdP metadata XML file that you export to configure lighthouse contains a certificate that is used to
authenticate that SAML response came from your IdP. Different IdPs have different expiry periods for
these certificates, consult your IdP’s documentation to find their expiry period. When your IdP’s certificate
expires you will need to regenerate it then re-export your IdP metadata and update your lighthouse
configurations. If your IdP supports sending expiry notifications to your admin, we recommend you
enable these notifications.
When you change the permissions assigned to a lighthouse user in your IdP (via LH_Groups SAML
attribute), the changes will not take effect until the user logs out and back into lighthouse.
If you need to quickly restrict a user's access, consider altering the permissions of or deleting that user’s
usergroups on lighthouse, see lighthouse user manual “8.3 Modifying existing groups”. You can also set a
low Web Session Timeout. See Lighthouse user manual “5.9 Examine or modify Lighthouse Session
Settings”.
The LH_Groups attribute can be used to place SSO users in any lighthouse usergroup except lighthouse’s
default admin group. You can allow users to login with admin privileges by simply creating another
usergroup in lighthouse with the admin role and assigning the matching role/group in your IdP to the user
(i.e. populate LH_Groups to include its value).
SAML Users can only be managed in your IdP and will not appear under lighthouse User Management.
Authentication works much the same with each, but group membership retrieval varies. The following
sections detail the configuration settings for each provider and explain how group membership retrieval
works.
NOTE: See the Glossary for more information about these modes.
3. Add the Address and optionally the Port of the LDAP server to query.
4. Add the LDAP Base DN that corresponds to the LDAP system being queried.
5. Add the LDAP Bind DN. This is the distinguished name of a user with privileges on the LDAP
system to perform the lookups required for retrieving the username of the users, and a list of the
groups they are members of.
6. Add and confirm a password for the binding user.
7. Add the LDAP username attribute. This depends on the underlying LDAP system. Use
sAMAccountName for Active Directory systems, and uid for OpenLDAP based systems.
102
Lighthouse User Guide
8. Add the LDAP group membership attribute. This is only needed for Active Directory and is
generally memberOf.
9. If desired, check Ignore referrals option. When checked, LDAP will not follow referrals to other
remote authentication servers when logging users in to Lighthouse. If multiple remote
authentication servers exist on the network, checking this option may improve login times.
10. Under the SSL section, choose the desired Server protocol.
LDAP over SSL preferred: this will attempt LDAPS before trying LDAP without SSL
LDAP (no SSL) only: non-SSL LDAP is always used
LDAP over SSL only: LDAP over SSL is always used
11. If desired, check Ignore SSL certificate errors to ignore any SSL certificate errors.
12. CA Certificate is used to upload an SSL Certificate which will verify any LDAP servers you specify
on the page.
NOTE: The certificate will be uploaded but will not be used if you've chosen to ignore certificate
errors.
13. Install the CA certificate by clicking the Browse… button and locating the appropriate file.
14. Click Apply.
NOTE: Multiple servers can be added. The LDAP subsystem queries them in a round-robin fashion.
To configure RADIUS:
2. In the Settings section, select RADIUS from the Scheme drop-down menu.
3. Choose the desired Mode from the drop-down menu.
• RADIUSDownLocal
103
Lighthouse User Guide
• Radius
• RADIUS/Local
• Local/RADIUS
NOTE: See the Glossary for more information about these modes.
4. Add the Address and optionally the Port of the RADIUS authentication server to query.
5. Add the Address and optionally the Port of the RADIUS accounting server to send accounting
information to.
6. Add the Server password, also known as the RADIUS Secret.
NOTE: Multiple servers can be added. The RADIUS subsystem queries them in a round-robin fashion.
To provide group membership, RADIUS needs to be configured to provide a list of group names via the
Framed-Filter-Id attribute. The following configuration snippet shows how this can be configured for
FreeRADIUS:
To configure TACACS+:
• TACACSDownLocal:
• TACACS: Default behavior
• TACACS/Local
• Local/TACACS
NOTE: See the Glossary for more information about these modes.
4. Add the Address and optionally the Port of the TACACS+ authentication server to query.
5. Select the Login Method. PAP is the default method. However, if the server uses DES-encrypted
passwords, select Login.
6. Add the Server password, also known as the TACACS+ Secret.
7. Add the Service. This determines the set of attributes sent back by the TACACS+ server
NOTE: Multiple servers can be added. The TACACS+ subsystem queries them in a round-robin fashion.
To provide group membership, TACACS+ needs to be configured to provide a list of group names This
following configuration snippet shows how this can be configured for a tac_plus server:
user = operator1 {
service = raccess {
groupname = west_coast_admin,east_cost_user
}
}
To do this with Cisco ACS, see Setting up permissions with Cisco ACS 5 and TACACS+ on the Opengear
Help Desk.
Login restrictions can be applied by administrator users to prevent unauthorized login attempts via the UI
and REST API.
• Maximum attempts – choose a number of attempts a user can enter an incorrect password
before being locked out.
• Lockout period – enter a number of minutes until a user can try to login again after reaching
maximum incorrect login attempts.
After a user has been locked out, an administrator can unlock the account. To do this, go to SETTINGS >
USER MANAGEMENT > Local Users. Click the Unlock button associated with the locked out user’s row in
the User table.
106
Lighthouse User Guide
9. Notifications
Lighthouse has a MessageBus functionality that allows you to connect Lighthouse to third party systems
for notifications, ticket creation, and alerts.
• Create a trouble ticket with your companies Zendesk trouble ticketing system
• Trigger an alert to the companies on call scheduled via PagerDuty
Zapier is the first integration that is available within Lighthouse. In order for events to be fired from
Lighthouse and received by Zapier:
Once these requirements are met, a user will be able to receive Lighthouse event messages via third-party
apps integrated with Zapier.
To enable events, go to SETTINGS > NOTIFICATIONS > Events. Click the checkbox next to the desired
event to select it and click the Enable button at the top of the table to enable it. To enable all events, click
the checkbox on the top left of the screen and click the Enable button.
To disable an event, select the checkbox next to it, then the Disable button at the top of the screen.
107
Lighthouse User Guide
Known Issues/Limitations/Warnings
Administrators can access CONFIGURE > CONFIGURATION TEMPLATING > Users and Groups
Templates to create, edit, and delete users and groups templates. Each template must contain at least
one group.
Each template contains a list of user-defined groups and/or individual users. Each group has a defined
role which determines what privileges group members have. User roles are defined by the groups they are
a member of.
1. Select CONFIGURE > CONFIGURATION TEMPLATING > Users and Groups Templates.
2. Click the + button. The New Users and Groups Template page loads.
110
Lighthouse User Guide
3. Enter a Name and Description for a template in the Template Details section.
4. Click the + Add a group button in the Set Group List section to add a new group. The Group
Details dialog loads.
5. Enter a Group Name, a Description, and select a Role for the group.
6. If Node User role is selected, the Restrict accessible Serial Ports checkbox and Serial Ports
range appear.
7. Use the checkbox to restrict access and specify as port or range of ports in the Serial Ports range
text box.
8. Click Apply.
9. Click the + Add a user button in the Set User List section to add new users. The User Details
dialog loads.
10. Enter a Username, a Description, and a Password for the user. Type the password again in the
Confirm Password text box.
11. Optionally, click checkboxes next to the groups this user should belong to. Only groups from this
template are available.
12. Click Apply.
13. Continue adding new groups and users until finished.
14. Click Save Template.
NOTE: When a users and groups template is pushed to a node, all custom groups on that node are
replaced by groups defined in the template. If no users are in the new template, existing users will
111
Lighthouse User Guide
remain on the node. To push users, the selected nodes need to be running firmware version 4.3.0 or
later.
The Edit Users and Groups Template dialog allows a template’s Description, Group List, and User List to
be set and changed.
To modify a template:
1. Select CONFIGURE > CONFIGURATION TEMPLATING > Users and Groups Templates.
2. Click Edit button next to the template to be modified. The Edit Users and Groups Template dialog
appears.
3. Make changes to the template’s details, group list, or Individual user list as required.
4. Click the x button under Actions next to any groups or users which need to be removed.
5. Click Save Template.
112
Lighthouse User Guide
To delete a template:
1. Select CONFIGURE > CONFIGURATION TEMPLATING > Users and Groups Templates.
2. Click the Edit button in the Actions section of the template.
3. Click the x button under Actions next to any groups or users which need to be removed.
4. Click Save Template to save the changes.
To delete a template:
1. Select CONFIGURE > CONFIGURATION TEMPLATING > Users and Groups Templates.
2. Click the Delete button next to the template to be removed. The Confirmation alert box appears.
3. Click Yes in the Confirmation dialog. The template is deleted.
Only users assigned to the Lighthouse Administrator role can access CONFIGURE > CONFIGURATION
TEMPLATING > Authentication Templates and create authentication templates.
The supported modes are Local, Radius, TACACS+, and LDAP. For example, if an authentication template
is configured to use RADIUS as an authentication source, that corresponds to RADIUSDownLocal with Use
Remote Groups ticked on the downstream node.
3. Enter a Name and Description for a template in the Template Details section.
113
Lighthouse User Guide
4. Select a desired Scheme or click Pre-populate to pre-populate a template with the current
Lighthouse remote authentication configuration.
5. Enter or update authentication settings if required. See 8.10 Configuring AAA for an example.
6. Click Save Template.
NOTE: When an authentication template is pushed to a node, the authentication settings at that node are
replaced by the those defined in the authentication template.
NOTE: The authentication templates do not support the full list of settings that the Opengear console
servers support. However, templates can be applied, and then additional settings configured manually.
The Edit Authentication Template dialog allows the template’s Description and Authentication Settings to
be set and changed.
2. Click Edit next to the template to be modified. The Edit Authentication Template dialog appears.
114
Lighthouse User Guide
Users assigned to the Lighthouse Administrator role can access CONFIGURE > CONFIGURATION
TEMPLATING > Script Templates and create script templates.
Script Templates allow the user to upload arbitrary shell scripts to be run on a node. A script may set
additional configuration settings not available in other templates or store additional files onto the node
such as certificates, for example. The uploaded script must have a .sh extension and can’t be more than
1MB in size. Other than those, there are no other restrictions on the script file to be uploaded. Once saved,
the template stores the size and SHA1 checksum of the script. This can be used to verify the script
contents of the template once saved. To apply script templates, the selected nodes need to be running
firmware version 4.1.1 or later.
3. Enter a Name and Description for a template in the Template Details section.
4. To select a script to upload, click Choose file.
5. Click Save Template. Script checksum and Script size are shown after template with uploaded
script is saved.
The Edit Script Template dialog allows the template’s Description, Script timeout, and Script File to be
uploaded. To modify an existing script template:
2. Click Edit next to the template to be modified. The Edit Script Template dialog appears.
116
Lighthouse User Guide
Users with Lighthouse Administrator privileges (i.e. users with the Lighthouse Administrator role or users
who are members of groups with the Lighthouse Administrator role) can access CONFIGURE >
CONFIGURATION TEMPLATING > Apply Templates and execute templates affecting any node.
Users with Node Administrator privileges (i.e. users with the Node Administrator role or users who are
members of groups with the Node Administrator role) can access CONFIGURE > CONFIGURATION
TEMPLATING > Apply Templates and execute templates affecting nodes in Smart Groups linked to their
role.
Apply Templates consists of four stages, each one a step in the overall wizard. The steps are:
1. Select Template.
2. Select Nodes.
3. Preflight. This test run simulates what happens if the template is pushed to the selected nodes.
4. Execution.
To apply a template:
2. Select a template from the existing template tree. Template Details populates with details from
the selected template.
3. Click Next — Select Nodes. The Select Nodes stage loads.
4. Select nodes from the list of enrolled nodes. Smart Group Filtering and Free Text Search
Filtering can be used to narrow down the results.
5. Scroll to the bottom of the page and click Next — Preflight. The Preflight stage loads. This stage
requires manual refresh to retrieve updated Preflight Result and Details.
After all nodes finish preflight, a success message appears and Next — Push Configuration
becomes active.
118
Lighthouse User Guide
6. Select desired nodes for template execution and click Next — Push Configuration. The
Configuration Status stage loads. This stage requires manual refresh to retrieve updated Push
Result and Details.
After all nodes finish the template push, a success message appears.
Users assigned to the Lighthouse Administrator role can manually apply the Secure Provisioning NetOps
Module or Software Defined Infrastructure to desired OPERATIONS MANAGER nodes.
11.1 Licensing
Multiple instance functionality requires the installation of a valid license with the multiple instance
feature. This license must only be installed on the primary Lighthouse instance.
NOTE: The certificate will be used on all instances. For the multiple instance feature, we recommend
using a wildcard certificate.
1. Start with what will be the primary instance and one or more Lighthouse instances to act as
secondary. All instances must have the same version of Lighthouse. To support more than one
instance you must use 19.Q3 or later.
2. Configure the networking information for each instance (hostname, external endpoints, network
addresses).
3. Configure time settings of each instance.
4. Install a license with the multiple instance feature on the primary Lighthouse.
a. On the primary Lighthouse, click Configure > MULTIPLE INSTANCE > Dependent
Lighthouse Instances.
b. Click Add. Enter the network address, username and password of a Lighthouse instance
to enroll as secondary. Optionally enter a valid, unused network subnet to use as the
dependent lhvpn address range. If none is entered, a default will be assigned.
121
Lighthouse User Guide
5. Dependent Lighthouse enrollment will show status as it moves from Pending > Registered >
Enrolled.
6. When the VPN connection is established between primary and secondary Lighthouse, this page
will display Connected with the time since the last status change and Disconnected when the
connection is lost. Any errors in the enrollment process will be displayed in the status column.
122
Lighthouse User Guide
Lighthouse with multiple instance support requires multiple separate subnets for Lighthouse VPN
connections: between each instance and its nodes, and between the primary and dependent Lighthouses.
Each subnet must not overlap any subnet in use by another Lighthouse instance.
The subnet between the primary Lighthouse and its nodes is modified under SETTINGS > SERVICES >
Lighthouse VPN on the primary Lighthouse. Calculated Node capacity displays the addressable nodes
based on the network address and CIDR mask.
A secondary Lighthouse is read-only and cannot be modified. The SETTINGS > SERVICES > Lighthouse
VPN page displays the subnet used by this Lighthouse instance, but it cannot be modified directly.
The subnet between each secondary Lighthouse and its nodes can be modified on the primary
Lighthouse under CONFIGURE > MULTIPLE INSTANCE > Dependent Lighthouse Instances > Edit.
123
Lighthouse User Guide
The subnet between the primary Lighthouse and dependent Lighthouse instance can be modified on the
primary Lighthouse under CONFIGURE > MULTIPLE INSTANCE > Lighthouse VPN
Other information that is specific to dependent Lighthouse should be configured before enrolling but can
be modified on the primary Lighthouse via ogconfig-cli.
Instance specific information includes:
• hostname
• time zone
• networking
• external interfaces
The instance specific information is present on both Lighthouses but read-only on the secondary
Lighthouse. Both configurations can be viewed via ogconfig-cli.
View all secondary Lighthouse instance specific configuration (can be run on either Lighthouse instance):
ogconfig-cli
print lighthouse_configurations[1]
124
Lighthouse User Guide
You can modify secondary configuration from primary Lighthouse. For example, to update the hostname
of the secondary Lighthouse, run the following commands on the Primary Lighthouse:
ogconfig-cli
set lighthouse_configurations[1].hostname new_name
push
Dependent Lighthouse instances can be removed from the primary Lighthouse. To do so, click
CONFIGURE > MULTIPLE INSTANCE > Dependent Lighthouse Instances, and click the x button under
Actions next to the instance.
The secondary Lighthouse will begin unenrollment, which will factory reset the secondary Lighthouse. A
user will be required to enter a new root password via console when it reboots.
You will need to manually remove the connection to the secondary Lighthouse from each connected
node. Clean dead connections from node side by clicking the Delete link in the Console Server.
NOTE: This should only be performed if the primary Lighthouse has no chance of returning, the procedure
is not reversible and will break all node connections with the previous primary instance. The previous
primary instance must be factory reset before it can be used again.
Note: After promotion, the primary and secondary Lighthouses might not report the correct status.
To resolve this issue, run the /etc/scripts/primary_lighthouse_resync_replication.sh script in the primary
Lighthouse’s CLI.
125
Lighthouse User Guide
To promote a secondary instance to primary, login as root on the secondary instance via console or ssh
and run
promote-secondary-lighthouse
You will need to remove all dead connections from node side from the Console Server. The Promotion
tool deletes connection between primary and secondary instance but does not touch node connections.
The new primary can then be used to enroll a secondary Lighthouse if required.
NOTE: If the previous primary becomes accessible again, it will not be able to connect to its enrolled
nodes or the previous secondary Lighthouses.
When the primary Lighthouse is updated, any secondary Lighthouses will be updated in a rolling fashion
after the primary has successfully booted. If any Lighthouse fails to successfully update along the way,
the update will stop.
Please see 14.3 Upgrading Dependent Multiple Instances of Lighthouse for additional information.
126
Lighthouse User Guide
2. At the presented login prompt, enter an administrator’s username and press Return.
3. A password: prompt appears. Enter the administrator’s password and press Return.
4. A bash shell prompt appears.
This shell supports most standard bash commands and also supports copy-and-paste to and from the
terminal.
node-command --list-nodes
== node-command ID 2017-05-19T14:08:33.360164_29534 ==
14:08:33 [SUCCESS] BNE-R01-ACM7004-5 192.168.128.2:22
OpenGear/ACM7004-5 Lighthouse 3b90d826 -- Tue May 9 13:42:16 EST 2017
12.1 node-info
node-info is a shell-based tool for pulling more detailed information from console servers.
$ node-info -A
BNE-R01-ACM7004-5
address: 192.168.128.2
id: nodes-1
127
Lighthouse User Guide
ssh port: 22
description: Brisbane Rack 1
enrollment status: Enrolled
connection status: Connected
BNE-R02-IM7216
address: 192.168.128.3
id: nodes-2
ssh port: 22
description: Brisbane Rack 2
enrollment status: Enrolled
connection status: Connected
12.2 node-upgrade
Note: You can also set up a Node Upgrade in the UI, see 7.5 Node Upgrade via the UI.
node-upgrade is a tool for running firmware upgrades on multiple managed console servers with a single
command and returns the results in tabular form to stdout.
When the node-upgrade command is run with valid arguments and parameters, the program will return
exit status 0 and the following results and error messages may be returned for each node listed.
Result Causes
SUCCESS Node upgrade succeeded
FileNotFoundError No upgrade file found matching provided device family or version
UpgradeError Device already has same or higher firmware version
Network connection lost
IncompatibleFirmwareError Firmware file provided does not match the product family
12.3 ogadduser
NOTE: When a new user is created via ogadduser, an entry is added to the syslog.
12.4 ogconfig-cli
ogconfig-cli allows users to inspect and modify the configuration tree from the command line. It is
transactional in nature, allowing users to ensure their configuration is correct before pushing it to the
configuration server.
ogconfig-cli
• help
• get .
• print . 2
• print users[0].username
• find users enabled false
Simple config searches can be performed from inside ogconfig-cli with the find command.
NOTE: The element being searched must be a list, otherwise the command returns an error.
find <path of list to search> <element to search for> <value to search for>
$ cat /etc/hostname
A configuration change doesn’t take effect until it is pushed to the configuration server. For example,
from inside ogconfig-cli:
$ cat /etc/hostname
Configuration is validated before being applied so that an incorrect configuration cannot be accidentally
set. For example, from inside ogconfig-cli, setting an invalid ethernet link speed is rejected:
ogcfg> quit
12.4.5 Modify LHVPN keepalive timeout for different sized deployments with ogconfig-cli
The lhvpn timeout (in seconds) should be adjusted depending on the number of nodes to ensure stable
connections are maintained. We recommend these settings:
The lhvpn timeout can be modified by running the following commands, where <timeout_val> is the
number of seconds:
131
Lighthouse User Guide
NOTE: VPN connections will be restarted after pushing a new timeout value.
Extra hard disks can be mounted in the Lighthouse VM by adding them to the configuration. Each new
disk needs to have a partition created and formatted. Partitions can be created using fdisk or cfdisk,
and should be formatted using the ext4 filesystem, using the mkfs.ext4 command:
The directory in which to mount the filesystem must be created. In general, new filesystems should be
mounted in the provided mountpoint of /mnt/aux. Any other filesystems should be mounted within the
filesystem mounted here.
Add the information to the configuration system using ogconfig-cli as follows, modifying the path for
the specific situation.
Configuration system information can be displayed, searched, and set from both the primary and
secondary Lighthouse instances. To reference the primary instance, use
lighthouse_configurations[0]. The secondary instance is reachable with
lighthouse_configurations[1].
For example, to display nodes all network connections to the primary Lighthouse, use:
12.5 oglicdump
oglicdump is a shell-based tool for displaying and saving the current third-party licensing status of a
Lighthouse instance.
When used without a switch, oglicdump writes the current status to STD OUT.
132
Lighthouse User Guide
To write this status out to a file, or in machine readable form, or as a raw license container string, or to
write out a sub-set of the licensing information (such as licenses for a given SKU), use one of the
switches oglicdump supports:
12.6 cron
The cron service can be used to schedule file execution at specific times. Daemon can be managed via
the /etc/init.d/crond interface, and cron tables managed via crontab.
Usage:
crontab [options] file
crontab [options]
crontab -n [hostname]
Options:
-u <user> define user
-e edit user's crontab
-l list user's crontab
-r delete user's crontab
-i prompt before deleting
-n <host> set host in cluster to run users' crontabs
-c get host in cluster to run users' crontabs
-x <mask> enable debugging
/etc/init.d/crond start
/etc/init.d/crond status
To check current cron jobs running with the following command to list all crontabs:
crontab -l
crontab -e
133
Lighthouse User Guide
This opens a personal cron configuration file. Each line can contain one command to run. The following
format is used:
For example, the following entry will run a the specified backup.sh script every day at 3am:
0 3 * * * /etc/config/backup.sh
12.7 sysflash
sysflash is the shell-based tool for upgrading a Lighthouse instance’s system. Sysflash will warn you if
you do not have enough available space to upgrade to, though this is unlikely as space is reserved
specifically for the upgrade process.
NOTE: URLs must be Percent-encoded and image filenames cannot include spaces.
sysflash includes eight flags which modify the standard upgrade behavior as well as the -h or --help
flag, which returns all the available flags and their effects:
There are a number of ways to select nodes, also known as console servers, as targets on which to run a
command. These can be used multiple times, or together, to select a range of console servers:
Select individually by name, address, Lighthouse VPN address, config index or smart group (as per --list-
nodes output):
node-command --all
Once nodes are selected, the commands to be run for each can be given. These are run on each managed
node in parallel. Any command which can be run from a node shell can be run on each managed node.
For example, to check the version on two specific, configured nodes, selecting one by name and the other
by index, run the following command:
NOTE: When using non-trivial selection arguments, check which target nodes have been selected on the
initial command pass by using the --list-nodes switch rather than the final command.
1. In the Hypervisor configuration, add a 2nd network interface, and bind it to the required external
network.
2. Reboot Lighthouse, and verify that net2 is visible.
3. Edit /etc/config/conman.conf and add two custom conns. The first conn configures the physical
interface. The 2nd conn will vary depending if you want DHCP on the 2nd interface, or a Static IP
address. Do not put both network-services-conns in.
conn network-services-conn-init_net2
var ifname net2
start ip addr flush dev %ifname%
start ip link set dev %ifname% up
start mii-tool --restart %ifname%
start sleep 2
start ifconfig %ifname% up
start sleep 2
start bash -c "infod_client -o push -p %ifname%.link_local -d $(
ifconfig %ifname% | grep fe80 | sed -r 's/.*(fe80::[^ ]+).*/\1/' )"
stop ifconfig %ifname% down
4. Restart conman to bring the 2nd interface up, then validate that net2 has an address.
root@lighthouse:~#
6. Editing the file, add this line after any existing rules,
chmod +x /etc/config/scripts/firewall-post
136
Lighthouse User Guide
8. Force the firewall configurator to run, to install the new firewall rule
root@lighthouse:~# configurator_local_network
root@lighthouse:~# ifconfig net2:dhcp
net2:dhcp Link encap:Ethernet HWaddr 52:54:00:8c:38:73
inet
addr:192.168.82.39 Bcast:192.168.82.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
root@lighthouse:~#
137
Lighthouse User Guide
Enabling logging
Once enabled, CLI and REST API logs can be found in /var/log/messages. All passwords are masked
in the logs so that sensitive information is not stored in plain text or leaked.
When you enable logging, you do not need to restart or log out and in again.
• CLI logging only works for Interactive (human-controlled) terminals. Commands generated by
automated scripts will be logged.
• Commands such as ssh or telnet do not produce logs for the commands sent over the
connection.
• Requests can be logged for all endpoints, however, only endpoints implemented in Lipy can have
responses logged.
• The time format is temporarily different between logs made in Lipy and those made with the old
system. In a future release, all endpoints will be implemented in Lipy, have consistent logs, and be
able to log responses.
NOTE: These logs are not intended to be used as a definitive record of all commands that have ever been
run. A malicious user with full root access can circumvent anything.
Logging should be enabled using ogconfig-cli. Use the following commands in a Lighthouse terminal
to view, enable or disable logging:
Node and port logs will log all access to nodes via Lighthouse using the pmshell function, including which
console, and which port was accessed by the user when logged in.
When system logging is enabled, user and node selection and user and Port selection is logged.
root@lighthouse:~# ogconfig-cli
ogcfg> push
OK
ogcfg> exit
Once node and port logging is enabled, you can view any logs recorded in your Lighthouse’s syslog,
located at /var/log/messages.
NOTE: These logs differ slightly due to being logged with different systems:
139
Lighthouse User Guide
root@lighthouse:~# ogconfig-cli
root@lighthouse:~# ogconfig-cli
ogcfg> push
OK
ogcfg> exit
• system.logging_cli_enabled
• system.logging_rest_enabled
• system.logging_rest_request_enabled (requires system.logging_rest_enabled)
• system.logging_rest_response_enabled (requires system.logging_rest_enabled)
140
Lighthouse User Guide
root@lighthouse:~# ogconfig-cli
ogcfg> push
OK
ogcfg> exit
• system.logging_cli_enabled
• system.logging_rest_enabled
• system.logging_rest_request_enabled
• system.logging_rest_response_enabled
141
Lighthouse User Guide
Although upgrades do not overwrite existing configurations or user files, you should perform a
Configuration Backup prior to upgrading.
Once the upgrade is complete, the Lighthouse instance reboots. It is unavailable during the reboot
process.
From the release of 20.Q3.x, Lighthouse uses Logical Volume Management (LVM) for the disks to
support expanding the available disk space for the Lighthouse virtual machine, as well as enable other
benefits of LVM such as snapshot and restore functionality.
NOTE: You cannot directly upgrade from pre-LVM Lighthouse to LVM based Lighthouse. In order to
upgrade, you must have the release 20.Q2.x installed before upgrading to 20.Q3.x and later upgrades by
following the process outlined below.
You need to:
1. Perform a configuration backup of your pre-LVM primary Lighthouse and keep it safe.
2. Unenroll any secondary Lighthouse instances from your primary Lighthouse.
3. Upgrade your Lighthouse system to 20.Q2.x using the .lh_upg file. Skip this step if your
Lighthouse is already running 20.Q2.x.
4. Perform another configuration backup of Lighthouse running 20.Q2.x and save it as a separate
file. This configuration backup will be imported into the LVM based Lighthouse.
5. Shut down the 20.Q2.x Lighthouse before continuing these steps.
6. Deploy a new instance of Lighthouse version 20.Q3.x (LVM).
▪ The new instance must have all the same IP addresses and hostname as the previous
Lighthouse instance; this allows nodes and secondary Lighthouse instances to reconnect.
7. Import the configuration backup of 20.Q2.x into the new primary Lighthouse.
8. Confirm nodes successfully connect to the new primary Lighthouse.
9. Upgrade the primary Lighthouse to each major release in sequence up to the latest release.
10. Deploy new LVM based secondary Lighthouse instances of the latest release and make sure their
external endpoint addresses are correct.
11. Enroll the new secondary Lighthouse instances, one by one, to the new primary Lighthouse.
You will be able to upgrade from LVM based version to a new LVM based version following the steps
in sections 14.1 and 14.2.
NOTE: There is a logical volume called lh_upg which is reserved for performing upgrades. You should
not delete or use this logical volume.
142
Lighthouse User Guide
NOTE: Starting with 20.Q3.x release, Lighthouse must be upgraded in succession. For example, to
upgrade to a version that is several releases newer than your current release, you will need to install
all the major releases in between to install the newest one.
1. Enter the URL for the system image in the Image URL text-entry field.
2. Click Perform Upgrade.
NOTE: The Advanced Options section, which expands to present an Upgrade Options text-entry field,
should only be used if a system upgrade is being performed as part of an Opengear Support call.
Once the upgrade has started, the System Upgrade page displays feedback as to the state of the process.
A system upgrade attempt returns the error System version was not higher than the current version if the
selected image file is not a more recent version than the installed version.
143
Lighthouse User Guide
Lighthouse includes a shell-based tool — sysflash — that allows a user with administrative privileges to
upgrade the instance’s system from the Local Terminal.
NOTE: Before using sysflash, we recommend that you check available disk space when manually
uploading .lh upgrade files. We also suggest you use /mnt/nvram as the path.
At the Local Terminal bash shell prompt, enter a URL. It must be URL-encoded:
sysflash http[s]%3A%2F%2Fdomain.tld%2Fpath%2Fto%2Ffirmware-upgrade-
image.lh_upg
5. Press Return.
To use sysflash in conjunction with a .lh_upg file available via the local file system:
sysflash /path/to/system-upgrade-image.lh_upg.
2. Press Return.
NOTE: sysflash includes several flags that allow for variations in the standard system upgrade
process. These flags should not be used unless directed to do so by Opengear Support.
Flags are listed by running either of the following at a Local Terminal bash shell prompt:
• sysflash -h or
• sysflash --help
• The same listing is presented in the sysflash entry of the Command line tools chapter.
NOTE: Starting with 20.Q3.x release, Lighthouse must be upgraded in succession. For example, to
upgrade to a version that is several releases newer than your current release, you will need to install
all the major releases in between to install the newest one.
Before a multiple instance upgrade is attempted, compatibility and status checks are performed on
primary/secondary instances to pre-empt possible failure points.
144
Lighthouse User Guide
Secondary Lighthouse upgrades are performed in parallel (not in a queue) to speed up the overall process
of rolling upgrades.
Where there are multiple instances of Lighthouse, when a system upgrade is being performed the status
of dependent instances is flagged in the System Upgrade page:
Click the Dependent Lighthouses link (red text) to view the upgrade process status for dependent
Lighthouse nodes. Click View Job Details link to see details of the update progress and any problems.
During a system upgrade, notification/status elements are flagged in the following scenarios:
The system is designed to be stable enough in a post-failure situation for an administrator to diagnose
and fix any error(s) manually and re-attempt the upgrade. In cases where an upgrade on an instance is
attempted and fails, Lighthouses in the MI environment will make a "best effort" attempt to return to a
stable state.
Information about the upgrade progress and status is visible in the Lighthouse Jobs page.
145
Lighthouse User Guide
Launch an LVM Lighthouse instance as per our guidelines or your own deployment processes and note
the instance ID.
To add a volume to an AWS Lighthouse without having to shut down the LH:
1. In the AWS web console, go to Volumes and create a new 5GB volume.
NOTE: Make sure this volume in the same availability zone as your LH instance.
2. Once the volume is created, select it and click the Actions button and select Attach Volume.
3. Enter the LH instance ID for the instance field and /dev/xvdb (or /dev/xvdd, /dev/xvde and
so on) as the device and click Attach.
When you SSH into the LH you should be able to see the new volume as /dev/xvdb (or whatever device
name you gave it).
Launch a qemu Lighthouse instance as per our guidelines or your own deployment.
2. Create a new disk for the LH. You can use a different number for “count” which is in MiB.
3. Restart your qemu instance but make sure to add the new qcow2 disk to the command.
Here is an example of what you should add to your qemu command when launching the
instance:
-drive if=scsi,file=/tmp/new_lh_disk.qcow2
NOTE: this is just an example. You should specify the disk in a similar way to how you specified
the primary Lighthouse disk. and you should make sure that the new disk is specified last,
otherwise your disk will appear out of order when you boot the Lighthouse.
4. Once the LH boots you should have a new /dev/sdX device and the 'unused_disks' command
should report that disk when you log in.
146
Lighthouse User Guide
Launch the LVM Lighthouse instance as per our guidelines or your own deployment.
To add a volume to the instance, use the following link to attach a new disk to your Lighthouse VM. Stop
before you reach the section, "Connect to the Linux VM to mount the new disk."
https://docs.microsoft.com/en-us/azure/virtual-machines/linux/attach-disk-portal
Launch the LVM Lighthouse instance as per our guidelines or your own deployment.
Launch the LVM Lighthouse instance as per our guidelines from the .ova file or your own deployment.
15.2 Using the new disk to increase the lh_data logical volume
2. Log into the shell on Lighthouse. you should see the new "unused" disk listed in the welcome
message. This is the case for any non-system disks aren't currently being used by the LVM
system.
3. Create a partition on the new disk:
pvcreate /dev/sdb1
10. Assuming the new disk gives you at least 2GB of extra space, expand the lh_data logical
volume.
11. Update the file system of the lh_data disk to use the extra space.
resize2fs /dev/mapper/lhvg-lh_data
12. When you log into the shell, the disk should no longer be listed as "unused".
148
Lighthouse User Guide
16. Troubleshooting
This chapter covers:
1. Click System on the top right of the Lighthouse instance’s web UI.
2. The Details menu appears, listing the Lighthouse instance’s Current version, REST API version,
Hostname, and Current user.
The current Lighthouse instance’s version is returned to STD OUT. For example:
NOTE: The procedure above uses the Web UI to reach the Lighthouse Local Terminal. This is not the only
way to reach the Lighthouse shell and cat /etc/version works in any circumstance where an
administrator has access to the Lighthouse shell. For example, many of the Virtual Machine Manager
applications that can run a Lighthouse instance offer virtual console access. If this is available and an
administrator logs in to the Lighthouse shell via this console, the command string works as expected.
149
Lighthouse User Guide
Two other command strings can be useful when specifics about a particular Lighthouse instance are
needed.
Both these commands can be run by an administrator with access to a running Lighthouse instance’s
bash shell.
First is cat /etc/sw*. This command concatenates the following four files to STD OUT:
/etc/sw_product
/etc/sw_variant
/etc/sw_vendor
/etc/sw_version
For example:
# cat /etc/sw*
lighthouse
release
opengear
2022.Q1.0
Second is cat /etc/issue. /etc/issue is a standard *nix text file which contains system
information for presenting before the system’s login prompt. On a Lighthouse instance, /etc/issue
contains the vendor and Lighthouse product version.
# cat /etc/issue
Opengear Lighthouse 2022.Q1.0 \n \l
Lighthouse can generate a technical support report that includes Lighthouse configuration information
and the current system log for the Lighthouse VM.
In the case of contacting the Opengear Technical Support, the support technician may ask for this report.
To generate a complete configuration and status report regarding a given Lighthouse VM:
Lighthouse generates this support report on demand and the report includes the current system log.
This process can take several minutes.
This downloads a PKZip archive to the local system. The archive’s filename is structured as follows:
support-[host-name]-[iso-8601-order-date-and-time-stamp].zip
▪ system.txt — the configuration information also presented in the Technical Support Report
window.
▪ messages — the current Lighthouse VM system log.
The two files are also presented in the Support Report text box below the Download support report link.
Because the report includes the current system log, this is a long but scrollable presentation and is
searchable using the web browser’s built-in search function.
To generate a complete configuration and status report regarding a given Lighthouse VM:
The -z switch generates the same combined file produced by the Download support report link noted in
the Lighthouse UI-specific procedure.
NOTE: In the example above, the redirect saves the generated PKZip file to /tmp/support.zip.
However, be aware that the /tmp directory is deleted during a reboot, so the file might be saved to a
different location.
151
Lighthouse User Guide
Here are two options for copying the file from Lighthouse:
• Use SCP from a Mac or Windows client. As scp only requires ssh access, no additional
configuration is required on Lighthouse for this to work.
$ scp [email protected]:/tmp/support.zip .
[email protected]'s password:
support.zip 100% 321 604.0KB/s 00:00
• Use the FTP client on Lighthouse to copy the file to an FTP server. Passive mode must be used
for this to work. Example:
root@LH5-UK-Lab:/tmp# ftp
ftp> open 192.168.0.216
Connected to 192.168.0.216.
220 im7200-demo-uk FTP server (GNU inetutils 1.4.1) ready.
Name (192.168.0.216:root): fred
331 Password required for fred.
Password:
230- *** Opengear UK Demo IM7216 ***
230 User fred logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> bin
200 Type set to I.
ftp> put support.zip
227 Entering Passive Mode (192,168,0,216,208,166)
150 Opening BINARY mode data connection for 'support.zip'.
226 Transfer complete.
4132664 bytes sent in 0.128 seconds (32262492 bytes/s)
ftp> quit
221 Goodbye.
152
Lighthouse User Guide
Before performing a factory reset or system upgrade, you may want to backup the current Lighthouse
configuration. To do so:
To restore the configuration and user files you backed up using Configuration Restore:
2. Locate the file you downloaded when you performed the Configuration Backup.
3. If you chose Encrypt backup when creating the backup, enter the Backup Password.
4. Click Restore Backup.
5. A Configuration Restore Confirmation dialog opens, click Yes.
6. Lighthouse will restore the backup and any included user files and restart.
NOTE: During this process, the current Lighthouse configuration will be overwritten and user files will be
deleted. If you wish, you can create a backup of the configuration and any desired user files.
1. Login to the Lighthouse web-based interface as root. Other users, even those with full
administrative privileges, do not have the permissions required to reset the Lighthouse VM to its
factory settings.
2. Select SETTINGS > SYSTEM > Factory Reset.
Running the following shell script as root performs a full factory reset:
/usr/bin/factory_reset
154
Lighthouse User Guide
This script prompts for confirmation before performing the factory reset. The factory reset procedure and
the shell script are equivalent to logging in to a console server’s web-based management interface (see
Connecting to a console server’s web-management interface above) and doing the following:
1. Select Administration
2. Check the Config Erase checkbox.
3. Click Apply.
155
Lighthouse User Guide
To update Dockers subnet, you need to alter 2 parameters, Docker's default subnet and the NetOps modules
subnet. To do so:
1. Login to the Lighthouse shell CLI as a Lighthouse Administrator or the root user
2. Ascertain the number of running containers to ensure you select an appropriate subnet size
sudo docker ps -q | wc -l
3. Open a config CLI session on the Lighthouse Server and run the following to enter configuration
management
ogconfig-cli
push
exit
8. Restart Docker
NOTE: The network mask selected for these subnets limits the maximum number of containers that can
run on Lighthouse. NetOps currently runs up to approximately 10 containers.
156
Lighthouse User Guide