OcNOS System Management Quick Config
OcNOS System Management Quick Config
Open Compute
Network Operating System
for Service Providers
Version 4.0
System Management
Quick Configuration Guide
January 2021
This documentation is subject to change without notice. The software described in this document and this documentation
are furnished under a license agreement or nondisclosure agreement. The software and documentation may be used or
copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced, stored
in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and
recording for any purpose other than the purchaser's internal use without the written permission of IP Infusion Inc.
IP Infusion Inc.
3965 Freedom Circle, Suite 200
Santa Clara, CA 95054
+1 408-400-1900
http://www.ipinfusion.com/
Trademarks:
IP Infusion, OcNOS, VirNOS, ZebM, ZebOS, and ZebOS-XP are trademarks or registered trademarks of IP Infusion. All
other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective
owners.
Use of certain software included in this equipment is subject to the IP Infusion, Inc. End User License Agreement at http://
www.ipinfusion.com/license. By using the equipment, you accept the terms of the End User License Agreement.
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Chapter Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
This guide describes how to configure protocols for system management such as SSH, Telnet, Syslog, DNS, and
DHCP in OcNOS.
Audience
This guide is intended for network administrators and other engineering professionals who configure system
management protocols.
Conventions
Table P-1 shows the conventions used in this guide.
Convention Description
monospaced type Code elements such as commands, functions, parameters, files, and directories
Contents
This guide contains these chapters and appendices:
• Chapter 1, Understanding User Configuration
• Chapter 2, Understanding SSH
• Chapter 3, Understanding Telnet
• Chapter 4, Understanding Syslog
• Chapter 5, Understanding DNS
• Chapter 6, Understanding DHCP
Related Documents
Use this guide with the System Management Command Reference for details about the commands used in the
configurations.
Note: All OcNOS technical manuals are available to licensed customers at http://www.ipinfusion.com/support/
document_list.
Chapter Organization
The chapters in this guide are organized into these major sections:
• An overview that explains a configuration in words
• Topology with a diagram that shows the devices and connections used in the configuration
• Configuration steps in a table for each device where the left-hand side shows the commands you enter and the
right-hand side explains the actions that the commands perform
• Validation which shows commands and their output that verify the configuration
Support
For support-related questions, contact [email protected].
Comments
If you have comments, or need to report a problem with the content, contact [email protected].
Overview
User management is an authentication feature that provides administrators with the ability to identify and control the
users who log into the network.
User management feature provides the following:
1. Configure user account: Create a user by specifying a username and a password and also by assigning role to the
user.
2. Modify user account: Change the password and role of the user specified.
Topology
Configuration
Validation
Switch1#show user-account
User:testuser
roles: network-user
Switch1#show role
Role Name Info
------------------------------------------------------------------------
network-admin Network Administrator - Have all permissions
network-operator Network Operator - Can not save configuration
network-user Network User - Can not change configuration
Overview
SSH is a network protocol that allows data to be exchanged using a secure channel between two networked
devices.SSH was designed as a replacement for Telnet and other insecure remote shells, which send information,
notably passwords in plain text rendering them susceptible to packet analysis.The encryption used by SSH is intended
to provide confidentiality and integrity of data over an unsecured network, such as the Internet. SSH uses public-key
cryptography to authenticate the remote computer and allow the remote computer to authenticate the user. SSH is
typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP
ports and X11 connections, and transferring files using the associated SFTP or SCP protocols. SSH uses the client-
server model.The standard TCP port 22 has been assigned for contacting SSH servers.
Topology
Configuration
Validation
Switch1#show ssh server
ssh server enabled port: 22
authentication-retries 3
Overview
Telnet is a TCP/IP protocol used on the Internet and local area networks to provide a bidirectional interactive text-
oriented communications facility using a virtual terminal connection. The Telnet program runs connects it to a server on
the network. A user can then enter commands through the Telnet program and they will be executed as if the user were
entering them directly on the server console.Telnet enables users to control the server and communicate with other
servers on the network. The default port number for Telnet protocol is 23.Telnet offers users the capability of running
programs remotely and facilitates remote administration.
Topology
Configuration
Validation
Switch1#show telnet server
telnet server disabled port: 786
Overview
Syslog is a standard for logging program messages. It allows separation of the software that generates messages from
the system that stores them and the software that reports and analyzes them. It also provides devices that would
otherwise be unable to communicate a means to notify administrators of problems or performance issues. OcNOS
supports logging messages to a syslog server in addition to logging to a file or the console (local or ssh/ telnet console).
OcNOS messages can be logged to a local syslog server (the machine on which OcNOS executes) as well as to one or
more remote syslog servers. Remote syslog servers can either be configured as IPv4 or IPv6 addresses or as host
names.
Topology
Configuration
Switch1#terminal monitor This will copy debug output to this terminal line.
Switch1#configure terminal Enter configure mode.
Validation
Switch1#show logging console
Console logging : enabled Severity: (debugging)
Overview
The Domain Name System (DNS) is an Internet service that translates domain names into IP addresses. When a
domain name is used, DNS service translates the name into the corresponding IP address. If one DNS server does not
know how to translate a particular domain name, it gathers information from other Domain Name Systems to obtain the
correct IP address.
Topology
Configuration
Validation
Switch1#show hosts
DNS lookup is enabled
Default domain : company.com
Additional Domain : company.com
Name Servers : 128.10.0.22 2000::1
Host Address
---- -------
abc 10.12.17.12
Overview
Dynamic Host Configuration Protocol (DHCP) protocol is used for assigning dynamic IP addresses to systems on a
network. Dynamic addressing allows a system to have an IP address each time it connects to the network. DHCP
makes network administration easier by removing the need to manually assign a unique IP address every time a new
system is added to the network. It is especially useful to manage mobile users. Once a system is configured to use
DHCP, it can be automatically configured on any network that has a DHCP server. DHCP uses a client-server model, in
which the DHCP server centrally manages the IP addresses used in the network. DHCP clients obtain an IP address
on lease from the DHCP server.
Topology
Configuration
Validation
Switch1#show running-config dhcp
interface eth1
ip address dhcp
!
interface eth2
ipv6 address dhcp
!
A
authentication 7
D
DHCP 19
DNS 17
I
IP 17
P
password 7
S
SCP 9
SFTP 9
SSH 9
Syslog 13
T
TCP 9
Telnet 9, 11
U
user management 7
username 7