SOLIDserver Administrator Guide-8.1
SOLIDserver Administrator Guide-8.1
Guide
Version 8.1
SOLIDserver Administrator Guide
SOLIDserver Administrator Guide
Revision: #121977
This document aims at detailing EfficientIP proprietary solutions. As our solutions rely on several third-party products, created by other
companies or organizations, it may redirect readers to third-party websites and documentation for further information. EfficientIP cannot
be liable for or expected to provide said information regarding products maintained or created by third parties.
In no event shall EfficientIP be liable for any special, punitive, indirect, incidental or consequential damages of any kind including, but
not limited to, loss of present or prospective profits or business, loss of data, business interruption, damages to reputation or image,
whether in an action of contract, negligence, or other action, arising out of or in connection with the use, reliance upon or performance
of the products provided by EfficientIP or any information contained herein.
All EfficientIP products and documentation are subject to separate licensing terms which users must agree to and comply with in order
to use such products and documentation.
Table of Contents
About This Guide ........................................................................................................... xxii
Documentation Organization .................................................................................. xxii
Documentation Convention .................................................................................... xxiii
I. Starting ......................................................................................................................... 1
1. Hardware Appliance Specificities ............................................................................ 3
5th Generation Hardware Appliances ................................................................. 3
4th Generation Hardware Appliances ............................................................... 13
2. First Configuration ............................................................................................... 19
Prerequisites .................................................................................................. 19
SOLIDserver-50 First Configuration .................................................................. 19
Rack Hardware Appliances First Configuration .................................................. 20
Completing the Basic Network Configuration via CLI ......................................... 26
3. Using SOLIDserver for the First Time .................................................................... 31
Connecting to SOLIDserver ............................................................................. 31
Requesting and Activating a License ................................................................ 32
Defining the Internal Module Setup .................................................................. 33
Configuring SOLIDserver Network and Services ............................................... 34
Configuring User Access to SOLIDserver ......................................................... 34
4. Understanding the GUI ........................................................................................ 36
SOLIDserver Main Dashboard ......................................................................... 37
Sidebar .......................................................................................................... 38
Top Bar .......................................................................................................... 44
Breadcrumb .................................................................................................... 49
Menu ............................................................................................................. 50
Listing Pages .................................................................................................. 53
Properties Pages ............................................................................................ 71
Wizards .......................................................................................................... 72
My Bookmarks ................................................................................................ 79
Charts ............................................................................................................ 81
Quick Wizards ................................................................................................. 85
Account Configuration ..................................................................................... 88
II. Configuring SOLIDserver ............................................................................................. 90
5. Configuring the Time and Date ............................................................................. 92
Configuring NTP Servers ................................................................................. 92
Forcing the NTP Update .................................................................................. 94
Setting the Appliance Time and Date Manually ................................................. 94
6. Configuring the Network ...................................................................................... 95
Configuring Basic IP Addressing on an Interface ............................................... 96
Setting the Routing ......................................................................................... 97
Setting the Hostname ...................................................................................... 99
Setting the DNS Resolver .............................................................................. 100
Setting the Firewall ........................................................................................ 100
Setting up a VLAN Interface ........................................................................... 103
Setting up an Ethernet Port Failover ............................................................... 105
Configuring a VIP .......................................................................................... 107
Setting up and Managing a VIF ...................................................................... 110
Configuring the Loopback Interface ................................................................ 112
Configuring a Media Interface ........................................................................ 114
7. Configuring the Services .................................................................................... 115
Handling Services ......................................................................................... 116
Configuring the SSH Account ......................................................................... 117
iv
SOLIDserver Administrator Guide
v
SOLIDserver Administrator Guide
vi
SOLIDserver Administrator Guide
vii
SOLIDserver Administrator Guide
viii
SOLIDserver Administrator Guide
ix
SOLIDserver Administrator Guide
x
SOLIDserver Administrator Guide
xi
SOLIDserver Administrator Guide
xii
SOLIDserver Administrator Guide
xiii
SOLIDserver Administrator Guide
xiv
SOLIDserver Administrator Guide
xv
SOLIDserver Administrator Guide
xvi
SOLIDserver Administrator Guide
xvii
SOLIDserver Administrator Guide
xviii
SOLIDserver Administrator Guide
xix
SOLIDserver Administrator Guide
xx
SOLIDserver Administrator Guide
xxi
About This Guide
SOLIDserver is a hardware or software appliance suite that allows to manage from one device
a network at all levels, from the IP addresses to the network devices, through key services, systems
and protocols.
The Administrator Guide describes and details the modules you might have purchased with your
license. This guide does not detail the existing license types and what they may contain or lack.
Note that some configurations described in this document should not be handled by end users
if they do not have previous knowledge of the basic principles of certain protocols and what the
operations imply on the network configuration.
Documentation Organization
The guide is divided into the following parts:
• Starting: the hardware appliances description, the installation of SOLIDserver on hardware
and software, the basic network configuration, the appliance first use procedures and a com-
prehensive presentation of the GUI.
• Configuring SOLIDserver: all the available time, network, service configurations to properly
set up and use the appliance.
• Imports and Exports: all the data import and export options available.
• Dashboards: all the dashboard and gadget management options available in the module
Dashboards.
• IPAM: all the options available in the module IPAM.
• DHCP: all the options available in the module DHCP.
• DNS: all the options available in the module DNS.
• Global Policies: all the behaviors you can set between and within modules via the parameters
inheritance and propagation and/or the advanced properties.
• Application: all the options available in the module Application.
• Guardian: all the options available in the module Guardian.
• NetChange: all the options available in the module NetChange.
• Workflow: all the options available in the module Workflow.
• Device Manager: all the options available in the module Device Manager.
• VLAN Manager: all the options available in the module VLAN Manager.
• VRF: all the options available in the module VRF.
• SPX: all the options available in the module SPX.
• Identity Manager: all the options available in the module Identity Manager.
• Rights Management: all the options available to manage the access to SOLIDservers, via
users, groups of users and authentication rules.
• Administration: all the management options available in the module Administration, from remotely
managing other appliances, to managing licenses, monitoring, maintaining, securing and up-
grading an appliance. It also details how to set High Availability or space synchronization
between two appliances.
• Customization: a description of all the options available in the module Administration to cus-
tomize your appliance: from images, IPv6 labels and Smart Folders to custom databases,
classes and customization packages.
xxii
About This Guide
At the end of the guide, you can also find appendices containing further information:
• Matrices of Network Flows details all the service flows to take into account to properly utilize
SOLIDserver on your network.
• Default Gadgets describes the type and purpose of the gadgets available by default.
• Synchronizing Cisco DNA details how to synchronize Cisco DNA pools, subpools and IP ad-
dresses in the IPAM.
• DHCP Options describes all supported DHCP options in dedicated categories.
• MAC Address Types References displays the reference number, in the GUI, of DHCP statics
supported MAC types.
• Custom AWS IAM Policy Route 53 Minimal Permissions details the required Amazon Account
permissions to configure before managing Amazon Route 53 servers from the GUI.
• DNS Resource Records Configuration Fields displays the fields that need to be configured
when adding resource records to a zone.
• Advanced Properties provides illustrated representations of all the advanced properties inter-
actions between the modules IPAM, DHCP and DNS.
• Multi-Status Messages contains the existing messages returned by the column Multi-status.
• Configuring OpenID Authentication details the preliminary configuration to authenticate external
users via the OpenID authentication rule.
• SNMP Metrics provides a list of the most relevant SOLIDserver indicators you can monitor
through an external solution.
• Class Studio Pre-defined Variables describes how to add and configure the class object Pre-
defined-variables.
• Configuring RADIUS describes the procedures to implement user authentication via FreeRadius,
RADIUS with Cisco ACS and OneTime Password with Token Authentication.
• Using Remote Authentication for SSH Connections to SOLIDserver provides the configuration
details to use LDAP or RADIUS authentication and grant access to existing LDAP/RADIUS
users to SOLIDserver via SSH.
• Configuring Non-Supported Options provides advanced configuration details to incorporate
non-supported firewall rules and options for the services Apache, Unbound, NSD, BIND, SNMP,
DHCP, NTP, syslog-ng and PostgreSQL.
Documentation Convention
Each part of this guide is divided into chapters where the available operations are detailed in
procedures. Throughout the guide, you will find the following elements.
Element Description
Procedure All configurations and operations are detailed in step by step procedures. In each procedure,
the key words of the Graphical User Interface (GUI) are formatted as detailed below.
Name All key words to browse the GUI, like a page name or a wizard title.
BUTTON The buttons in the GUI, like OK , EDIT or CANCEL .
Menu The menus and their entries. The navigation within menu entries is symbolized by arrows as
such: menu > option > sub-option.
xxiii
Part I. Starting
This part details the very first operations to connect to SOLIDserver, for hardware and software appliances
as well as a presentation of the GUI and the modules' dashboard. It contains the following chapters:
• Hardware Appliance Specificities: describes our hardware appliance suite. Depending on the model you
chose, the front panel and available buttons and possible configurations from the hardware appliance
differ.
• First Configuration: describes the hardware appliance installation procedures for all hardware models,
the installation via USB and the basic network configuration to complete the appliance configuration or
to reset the default configuration details.
• Using SOLIDserver for the First Time: describes the first steps and best practices to follow after setting
SOLIDserver with an IP address: from logging in and configuring the appliance service to adding users.
• Understanding the GUI: describes the default features of SOLIDserver Graphical User Interface. It includes
a presentation of the navigation philosophy, some tips and all the extra functionalities we provide: book-
marks, quick wizards, global search, etc.
Table of Contents
1. Hardware Appliance Specificities .................................................................................... 3
5th Generation Hardware Appliances ......................................................................... 3
4th Generation Hardware Appliances ....................................................................... 13
2. First Configuration ....................................................................................................... 19
Prerequisites .......................................................................................................... 19
SOLIDserver-50 First Configuration .......................................................................... 19
Rack Hardware Appliances First Configuration .......................................................... 20
Completing the Basic Network Configuration via CLI ................................................. 26
3. Using SOLIDserver for the First Time ............................................................................ 31
Connecting to SOLIDserver ..................................................................................... 31
Requesting and Activating a License ........................................................................ 32
Defining the Internal Module Setup .......................................................................... 33
Configuring SOLIDserver Network and Services ....................................................... 34
Configuring User Access to SOLIDserver ................................................................. 34
4. Understanding the GUI ................................................................................................ 36
SOLIDserver Main Dashboard ................................................................................. 37
Sidebar .................................................................................................................. 38
Top Bar .................................................................................................................. 44
Breadcrumb ............................................................................................................ 49
Menu ..................................................................................................................... 50
Listing Pages .......................................................................................................... 53
Properties Pages .................................................................................................... 71
Wizards .................................................................................................................. 72
My Bookmarks ........................................................................................................ 79
Charts .................................................................................................................... 81
Quick Wizards ......................................................................................................... 85
Account Configuration ............................................................................................. 88
2
Chapter 1. Hardware Appliance
Specificities
There are two generations of SOLIDserver rack hardware appliances that have specific plugs,
ports and/or connectors on their front and back panels that they may share.
• SOLIDserver fifth generation hardware appliances:
SOLIDserver-270 SOLIDserver-270.
SOLIDserver-570
SOLIDserver-1170 SOLIDserver-570, SOLIDserver-1170 and SOLIDserver-2270.
SOLIDserver-2270
SOLIDserver-Blast-3370 SOLIDserver-3370.
SOLIDserver-Blast-4070
SOLIDserver-Blast-5070 SOLIDserver-Blast Series.
SOLIDserver-Blast-5570
SOLIDserver-7070 SOLIDserver-7070.
They all come with SOLIDserver Bezel.
SOLIDserver-260 SOLIDserver-260.
SOLIDserver-550
SOLIDserver-1100 SOLIDserver-550, SOLIDserver-1100 and SOLIDserver-2200.
SOLIDserver-2200
SOLIDserver-3300
SOLIDserver-4000
SOLIDserver-3300 and SOLIDserver-Blast Series.
SOLIDserver-5000
SOLIDserver-5500
SOLIDserver Bezel
All fifth generation hardware appliances share a common LCD bezel that allows to set up the IP
address of the iDRAC used to configure SOLIDserver software and display hardware information.
3
Hardware Appliance Specificities
SOLIDserver TM
SOLIDserver-270
The sections below describe the front and back panel of SOLIDserver-270 appliances.
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The On/Off button. It is lit when the appliance is on.
The iDRAC micro-USB direct port.
The front USB 2.0 port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
iDRAC
4
Hardware Appliance Specificities
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
The iDRAC micro-USB direct port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
The hot swappable hard drive 2.
The hard drive health indicator. It flashes amber if any error occurs.
The hard drive activity indicator.
The hot swappable hard drive 1.
5
Hardware Appliance Specificities
iDRAC
iDRAC
6
Hardware Appliance Specificities
SOLIDserver-3370
The sections below describe the front and back panel of SOLIDserver-3370 appliances. Depending
on the current of your appliance, refer to the section AC or DC.
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
The iDRAC micro-USB direct port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
The hot swappable hard drive 2.
The hard drive health indicator. It flashes amber if any error occurs.
The hard drive activity indicator.
The hot swappable hard drive 1.
7
Hardware Appliance Specificities
iDRAC
The hardware status indicators, respectively the health indicator, temperature indicator,
electrical indicator, memory indicator and PCIe indicator.They flash amber if any error occurs.
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The front USB 3.0 port.
The front VGA port.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
8
Hardware Appliance Specificities
The system identification button, push it to light up the front and back indicators and locate
the appliance in a rack, push it again to turn them off. It flashes amber if anything is wrong
with the hardware.
The serial port.
The VGA port.
The first power supply unit, PSU1. Use both PSUs to prevent connection loss if one fails.
The second power supply unit, PSU2. Use both PSUs to prevent connection loss if one fails.
The ethernet connector igb3.
The ethernet connector igb2.
The ethernet connector igb1.
The ethernet connector igb0.
The back USB 3.0 ports.
The iDRAC ethernet port, it is dedicated to the remote management of the appliance.
SOLIDserver-Blast Series
The sections below describe the front and back panel of SOLIDserver-Blast Series appliances:
SOLIDserver-Blast-4070, SOLIDserver-Blast-5070 and SOLIDserver-Blast-5570. Depending on
the current of your appliance, refer to the section AC or DC.
The back panel provides two 10 Gbps optical fiber slots, for a full DNS Guardian protection.
9
Hardware Appliance Specificities
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
The iDRAC micro-USB direct port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
The hot swappable hard drive 2.
The hard drive health indicator. It flashes amber if any error occurs.
The hard drive activity indicator.
The hot swappable hard drive 1.
iDRAC
10
Hardware Appliance Specificities
The system identification button, push it to light up the front and back indicators and locate
the appliance in a rack, push it again to turn them off. It flashes amber if anything is wrong
with the hardware.
The back USB 3.0 ports.
The iDRAC ethernet port, it is dedicated to the remote management of the appliance.
The VGA port.
The hardware status indicators, respectively the health indicator, temperature indicator,
electrical indicator, memory indicator and PCIe indicator.They flash amber if any error occurs.
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The front USB 3.0 port.
The front VGA port.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
The iDRAC micro-USB direct port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
The hot swappable hard drive 2.
The hard drive health indicator. It flashes amber if any error occurs.
The hard drive activity indicator.
The hot swappable hard drive 1.
11
Hardware Appliance Specificities
The system identification button, push it to light up the front and back indicators and locate
the appliance in a rack, push it again to turn them off. It flashes amber if anything is wrong
with the hardware.
The optical slot ixl0.
The optical slot ixl1.
The serial port.
The VGA port.
The first power supply unit, PSU1. Use both PSUs to prevent connection loss if one fails.
The second power supply unit, PSU2. Use both PSUs to prevent connection loss if one fails.
The ethernet connector igb3.
The ethernet connector igb2.
The ethernet connector igb1.
The ethernet connector igb0.
The back USB 3.0 ports.
The iDRAC ethernet port, it is dedicated to the remote management of the appliance.
SOLIDserver-7070
The sections below describe the front and back panel of AC and DC SOLIDserver-7070 appliances.
The hardware status indicators, respectively the health indicator, temperature indicator,
electrical indicator, memory indicator and PCIe indicator.They flash amber if any error occurs.
The appliance information indicator. It flashes amber if anything is wrong with the hardware.
The front USB 3.0 port.
The front VGA port.
The On/Off button. It is lit when the appliance is on.
The front USB 2.0 port.
The iDRAC micro-USB direct port.
The hardware information tag. Pull it out to see the service tag (serial number) and express
service tag.
The hot swappable hard drive 2.
The hard drive health indicator. It flashes amber if any error occurs.
The hard drive activity indicator.
12
Hardware Appliance Specificities
The system identification button, push it to light up the front and back indicators and locate
the appliance in a rack, push it again to turn them off. It flashes amber if anything is wrong
with the hardware.
The optical slot ixl0.
The optical slot ixl1.
The serial port.
The VGA port.
The first power supply unit, PSU1. Use both PSUs to prevent connection loss if one fails.
The second power supply unit, PSU2. Use both PSUs to prevent connection loss if one fails.
The ethernet connector igb3.
The ethernet connector igb2.
The ethernet connector igb1.
The ethernet connector igb0.
The back USB 3.0 ports.
The iDRAC ethernet port, it is dedicated to the remote management of the appliance.
SOLIDserver-260
The sections below describe the front and back panel of SOLIDserver SOLIDserver-260 appli-
ances.
From the front panel, you can connect a keyboard and monitor to set up the access IP address
of the iDRAC. From the iDRAC interface, you can configure SOLIDserver IP address.
13
Hardware Appliance Specificities
14
Hardware Appliance Specificities
The AC power supply unit status indicator. When pressing the self-diagnostic button, it turns
green if a valid power source is connected. Otherwise, the PSU is not connected or faulty.
The USB ports 3 and 4 (3.0 compliant).
The ethernet connector bge3.
The ethernet connector bge2.
The system identification button, push it to light up the front and back indicators and locate
the appliance in a rack, push it again to turn them off. It flashes amber if anything is wrong
with the hardware.
The VGA port.
From the front panel LCD screen, you can set up the IP address of the iDRAC used to configure
SOLIDserver and display hardware information.
15
Hardware Appliance Specificities
From either appliance front panel LCD screen, you can set up the IP address of the iDRAC used
to configure SOLIDserver and display hardware information.
SOLIDserver-Blast Series appliances back panel provides two 10 Gbps optical fiber slots, for a
full DNS Guardian protection.
16
Hardware Appliance Specificities
17
Hardware Appliance Specificities
18
Chapter 2. First Configuration
This chapter is a recollection of the proper first configuration of all SOLIDserver hardware
appliances.
The first configuration requires to connect the appliance to the network and set it an IP address
to access the Graphical User Interface (GUI). To properly do so, you must:
• Meet the prerequisites.
• Identify your hardware appliance and follow the appropriate procedure:
• For SOLIDserver-50 appliances, refer to the section SOLIDserver-50 First Configuration.
• For all other SOLIDserver- hardware appliances, the rack appliances of the fifth or fourth
generation, refer to the section Rack Hardware Appliances First Configuration.
• For non-Efficient IP hardware appliances, you can install SOLIDserver software appliance
via a USB flash drive. For more details, refer to the guide SOLIDserver_Hardware_Reimaging-
1
x.x.pdf available on our download portal .
When the first configuration is done, you can further the basic network configuration of the appli-
ance (hostname, interfaces...) through a terminal. For more details, refer to the section Completing
the Basic Network Configuration via CLI.
Prerequisites
• One of the following supported web browsers installed on your computer: Google Chrome,
Mozilla Firefox, Microsoft Internet Explorer, Microsoft Edge or, for Mac computers, Safari. We
recommend using its latest and most stable version.
• A web browser with all pop-up blockers disabled for the IP address and domain name used
during the configuration of your appliance. Otherwise, you may not manage the iDRAC and/or
SOLIDserver properly.
Prerequisites
• A SOLIDserver-50 hardware appliance.
• A computer with a serial port.
• A terminal emulator able to connect to a serial port installed on your computer.
1
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
19
First Configuration
Your configuration is now complete and you can connect to SOLIDserver software using the IP
address you configured. For more details, refer to the chapter Using SOLIDserver for the First
Time.
For these reasons, the installation of these hardware appliance models requires to:
1. Configure an IP address for the iDRAC. On all appliances, except SOLIDserver-260, you can
set it from the LCD screen.
2. Connect to the iDRAC to configure SOLIDserver access IP address.
3. Once the software installation is over, you need to connect to SOLIDserver, add your license
and set up the Internal module setup. For more details, refer to the chapter Using SOLIDserver
for the First Time.
20
First Configuration
All rack hardware appliances, except the SOLIDserver-260, provide an LCD screen that allows
to set up
Prerequisites
• An EfficientIP rack hardware appliance:
• A 5th generation hardware appliance: SOLIDserver-270, SOLIDserver-570, SOLIDserver-
1170, SOLIDserver-2270, SOLIDserver-3370, SOLIDserver-Blast Series (SOLIDserver-
Blast-4070, SOLIDserver-Blast-5070 or SOLIDserver-Blast-5570) or SOLIDserver-7070.
• Or a 4th generation hardware appliance: SOLIDserver-260, SOLIDserver-550, SOLIDserv-
er-1100, SOLIDserver-2200, SOLIDserver-3300 or SOLIDserver-Blast series (SOLIDserver-
4000, SOLIDserver-5000 or SOLIDserver-5500). They require a browser with the latest
version of Java JRE installed.
• Making sure that the appliance power supply cables are plugged.
• Making sure that the iDRAC dedicated port and physical interface port are connected. Note
that you can set up an Ethernet port failover with up to 4 cables.
Once the iDRAC IP address is set, you can access it and configure SOLIDserver IP address.
Once the iDRAC IP address is set, you can access it and configure the IP address of your
SOLIDserver appliance. The iDRAC is already configured with a default IP address -
192.168.0.120, netmask - 255.255.255.0 and gateway - 192.168.0.0.
If this IP address is free and accessible on your network, you do not need to follow the procedure
below, you can go straight to the section Configuring the Access to SOLIDserver from the iDRAC.
21
First Configuration
F2 = System Setup
F10 = Lifecycle Controller
F11 = BIOS Boot Manager
F12 = PXE Boot
Now you can connect to the iDRAC to configure SOLIDserver as detailed in the section Config-
uring the Access to SOLIDserver from the iDRAC.
22
First Configuration
If you already configured the iDRAC IP address using a keyboard and monitor, following the
section Configuring the iDRAC IP address Without LCD Screen, you can go straight to the section
Configuring the Access to SOLIDserver from the iDRAC.
Once the iDRAC IP address is set, you can access it and configure the IP address of your
SOLIDserver appliance. The iDRAC is already configured with a default IP address -
192.168.0.120, netmask - 255.255.255.0 and gateway - 192.168.0.0.
If this IP address is free and accessible on your network, you do not need to follow the procedure
below, you can go straight to the section Configuring the Access to SOLIDserver from the iDRAC.
23
First Configuration
11. Press to highlight No and press to skip the DNS configuration. The screen displays:
Save: Yes | No, Yes is highlighted.
12. Press to save your configuration. The LCD screen is now empty.
Now you can connect to the iDRAC to configure SOLIDserver as detailed in the section Config-
uring the Access to SOLIDserver from the iDRAC below.
2
If the file .jnlp has not been automatically opened by Java, you have to associate it manually with the file javaws.exe located in the
folder jre\bin of the appropriate Java version.
24
First Configuration
If an error message is displayed on the screen, you need to reimage SOLIDserver. For more
details, refer to the guide SOLIDserver_Hardware_Reimaging-x.x.pdf available on our
3
download portal .
Once you are connected to SOLIDserver from the iDRAC console, you can configure its IP ad-
dress.
3
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
4
ixX interfaces correspond to 10 Gb ports.
25
First Configuration
Now your configuration is complete and you can connect to SOLIDserver software using the IP
address you configured.
Note that you can also configure a pre-authentication banner message for SSH connections. For
more details, refer to the section Configuring Non-Supported OpenSSH Settings in appendix.
By default there is already an interface configured for SOLIDserver image, it has the IP address
192.168.1.1 and the netmask 255.255.255.0.You can change both according to your need when
configuring the basic network settings or during the first installation.
26
First Configuration
3. Log in as the default admin user, the default password is admin. The Main menu appears.
4. The line N Network Configuration is highlighted.
27
First Configuration
Hit Enter to confirm the interface(s) selection. The menu IP addresses list opens.
b. The line 1 192.168.1.1 255.255.255.0 is highlighted. The IP address 192.168.1.1 and
the netmask 255.255.255.0 are the default values.
28
First Configuration
Hit Enter to save your changes, the menu IP addresses list menu opens again.
d. Hit E to select E EXIT and it Enter. The menu Network configuration opens.
7. Configure the appliance hostname
a. Hit G to select G Global configuration.
Hit Enter to save your changes, the menu Network configuration opens again.
c. Hit E to select E EXIT and it Enter. The menu Main menu opens.
8. The line C Commit modifications to system is highlighted.
29
First Configuration
Hit Enter to save the whole configuration. The last message appears.
9. The button Yes is highlighted.
Your configuration is now complete and you can access your SOLIDserver through the browser
of your choice. Make sure the browser version complies with the prerequisites mentioned above.
30
Chapter 3. Using SOLIDserver for the
First Time
When using SOLIDserver for the first time, you need to:
1. Log in.
2. Request and activate a license.
3. Define the modules interaction, or internal module setup.
4. Configure SOLIDserver on your network.
5. Configure user access to the appliance.
Connecting to SOLIDserver
No matter the browser you choose to use, to access SOLIDserver you need to follow the procedure
below.
If you defined a hostname for your SOLIDserver in your DNS, you can use its name in the URL
field rather than the IP address.
ddi.mycorp.com
Login
Password
On the dashboard the gadget System Information indicates that there is No license installed,
you must request a license and add it to manage SOLIDserver.
31
Using SOLIDserver for the First
Time
Each license key is unique and specific to one SOLIDserver appliance, you cannot use the
same license key on several appliances.
e. In the field SOLIDserver Model, specify your model number. This field is required. It
looks as follows SDS-570.
f. In the field Request Key, paste your request key or the content of your request key file.
This field is required.
g. In the field Number of External Managed Servers (MVSM, if any), specify the total
number of servers - DNS, DHCP... - you intend to manage from SOLIDserver.
h. In the section Optional Module, tick all the optional modules you might need: DNS
1
Guardian, DNS GSLB, NetChange, Device Manager or SPX.
i. If relevant, fill in the field If requester is NOT end customer, please provide your
contact information (Name, Company, Email, Phone): with all the appropriate data.
1
If you do not tick this box, you are using NetChange-IPL, NetChange basic options.
32
Using SOLIDserver for the First
Time
j. In the drop-down list Language, you can select in which language to display the Privacy
Policy. By default, English is selected, you can change to French, German or Spanish.
The panel provides a link towards EfficientIP Privacy Statement.
k. Tick the box I accept the Terms and Conditions.
l. Click on SUBMIT to send us your information.
Once EfficientIP has answered your request and sent you a license key, you can add it to the
appliance to activate your licence as detailed below. Note that the appliance should be time
synchronized before activating the license.
To make sure the appliance is on time, we strongly recommend configuring the NTP. For more
details, refer to the chapter Configuring the Time and Date.
To activate a license
1. From the EfficientIP email response to your license request, copy the license key.
2. Connect to SOLIDserver using the superuser credentials. The page Main dashboard opens.
3. In the gadget System Information, click on the link Add license . The wizard opens.
4. Read the License Agreement and click on NEXT . The page Add a license opens.
5. In the field License(s), paste the license key.
6. Click on OK to complete the operation.The page refreshes. In the gadget System Information
the License type is updated and all the modules that come with your license are visible.
If you need to renew your license, to have more services, extend the maintenance time or manage
the license metrics, refer to the chapter Managing Licenses.
The Internal module setup allows you to enable the interaction between the modules IPAM, DNS
and DHCP. That way you can manage your resources and objects on one page and update them
in other modules.
At any point, you can edit the internal module setup from the module Administration.
33
Using SOLIDserver for the First
Time
Being logged as the superuser, ipmadmin, you belong to the most privileged group, admin. Users
of that group can perform all operations and have access to all existing resources. Some operations
can only be performed by the users of that group, in which case it is specified in the procedure.
34
Using SOLIDserver for the First
Time
operations. If a group does not have resources, its users are granted rights that they cannot
use on any object.
Note that you can also configure and enable authentication rules relying on Active Directory,
LDAP, RADIUS and OpenID Connect to securely log in external users. For more details regarding
users and groups, refer to the part Rights Management.
35
Chapter 4. Understanding the GUI
SOLIDserver centralizes all the operations in a unified Graphical User Interface (GUI) divided
into modules with common management principles and navigation logic.
When you log in, the first page available is SOLIDserver Home Page.
Throughout the GUI, all management pages share common elements, detailed in the image below.
The sidebar gives access to the SOLIDserver dashboards, the modules, the Tree view and
the Smart folders. For more details, refer to the section Sidebar.
The top bar gives access to the Global search, all Notifications, Bookmarks, your settings
through the menu My Account and the menu Help. For more details, refer to the section
Top Bar.
The breadcrumb is a navigation bar available on all pages of all modules except Administra-
tion, where it is only displayed on some pages. It provides direct and hierarchical access to
the module objects. For more details, refer to the section Breadcrumb.
The menu is displayed on every page. Its content differs on each page. For more details,
refer to the section Menu.
In addition, the GUI provides Listing Pages, Properties Pages, Wizards, Charts, the page My
Bookmarks and Quick Wizards.
36
Understanding the GUI
The Main dashboard contains one or several gadgets depending on the user connected. For
more details, refer to the section Gadgets Displayed by Default.
You can edit the Main dashboard welcome banner with a different message or even an image.
For more details, refer to the chapter Customizing the GUI.
In the module Dashboards, you can add and manage dashboards and customize their content
with gadgets. For more details, refer to the part Dashboards.
37
Understanding the GUI
Sidebar
The sidebar allows to access all the modules as well as the Tree view and the Smart folders.
Modules
Each module has a dedicated section in the sidebar.
When you navigate from one module to another, the latest page visited is saved and you can
open it again if you go back to the module.
Clicking on the icon or name of the module you are currently in opens the page of the top level.
Figure 4.3. Overview of the page All networks in the module IPAM
When the sidebar is expanded, each module icon and name are displayed.
The button highlighted in blue indicates the module you are currently in.
The module you are currently in is displayed. The current page is highlighted in blue.
In the breadcrumb, the current page is also highlighted in blue.
The menu contains some options specific to the module. For more details, refer to the section
Menu.
38
Understanding the GUI
Figure 4.4. Overview of the page All networks in the module IPAM
The button highlighted in blue indicates the module you are currently in.
When the sidebar is collapsed, only the module icons are displayed.
When you hover over the icon of a module, its name and the list of the pages it contains are
displayed.
Keep in mind that in addition to the menu entries in the sidebar, the breadcrumb allow to access
the pages of the module. For more details, refer to the section Breadcrumb.
The module Administration has a dedicated sidebar and a homepage, Admin Home.
39
Understanding the GUI
Figure 4.5. Overview of Admin Home, the homepage of the module Administration
The button Quit Administration allows to leave the module Administration and to go back to
the other modules.
Admin Home is divided into six sections. In each section, you find links to open the different
pages of the module.
Two links on one line provide access to separate pages dedicated to one object. Here, the
link Alerts opens the page Alerts and the link Definitions opens the page Alerts Definition.
Note that the link turns light blue when you hover over it, here it is over Definitions.
The sidebar cannot be reduced in the module Administration. It allows to navigate between
specific pages of the module without displaying the homepage.
40
Understanding the GUI
Tree View
The Tree view is a side panel that allows to display and access the data of the modules IPAM,
v1 v2
DHCP and DNS. When one of these modules is open, the button Tree view is available at
the bottom of the sidebar and allows to display a panel that contains the following information:
DHCP
This section is divided among DHCP servers, DHCP scopes, DHCPv6 servers and DHCPv6
scopes. Open each type to display and access the servers and scopes you manage in the
module DHCP.
DNS
This section is divided among servers and zones. Open each type to display and access the
servers and zones you manage in the module DNS.
IPAM
This section is divided among the spaces you manage. Open each space sub-section to
display and access the objects it contains in the module IPAM.
41
Understanding the GUI
This button allows to open or close the Tree view. The button turns blue when the Tree view
is open.
These icons indicate that a branch of the Tree view hierarchy is opened or closed . They
allow to display or hide the content.
This button allows to refresh the Tree view content.
The right edge can be dragged to adjust the size of the Tree view panel. A double-click on
the right edge closes the panel.
42
Understanding the GUI
Smart Folders
Smart folders are gathered in a side panel accessible via the button My Smart Folders at the
bottom of the sidebar. Smart folders provide links towards properties pages, the objects are or-
ganized following your hierarchy. For more details, refer to the chapter Managing Smart Folders.
This button allows to open or close the Smart Folders panel. The button turns blue when
the Smart Folders panel is open.
These icons indicate that a branch of the Smart folders hierarchy is opened or closed .
They allow to display or hide the content.
This button allows to refresh the Smart Folders content.
The right edge can be dragged to adjust the size of the Smart Folders panel. A double-click
on the right edge closes the panel.
43
Understanding the GUI
Top Bar
The top bar is available on all pages. It gives access to 5 key elements useful to all users:
Note that banner messages can be displayed above the top bar. The banner color indicates the
message criticality. Blue messages are informative, orange ones are warnings and red ones are
critical. All license related messages can be closed for the remainder of the session.
Global Search
SOLIDserver includes a search engine called Global search that allows you to perform searches
in the database of several modules at once.
This Global search field is available from any page.You can look for data using full names, values
or look for fragments of information (some letters of a name for instance) to find all the partial
matches.
This field allows to specify the data you are looking for.
The magnifying glass allows to perform the search.
44
Understanding the GUI
This button allows to close the window. Once you performed a search, the window remains
open above the page you are currently on, until you close it.
The button allows to access the properties page of the object.
A click on the result line allows to display more information in the window Global search.
The data loads under the object line.
This button allows to resize the window Global search.
All matching results are returned in sections dedicated to all the relevant modules and objects
and preceded by their dedicated icon.
They are displayed progressively, module by module. You may need to wait until the
matching results in every module are returned.
45
Understanding the GUI
Notifications
SOLIDserver keeps track of all the operations performed during the last week in the dedicated
window Notifications. Whether the operation was successful or not, this window lists the services
run and allows to see and export the final report of the operation.
The button Notifications allows to open the window. The number in the red flag above the
icon Notifications indicates the number of error messages in the window.
This button allows to close the window. Once you open it, the window remains open above
the page you are currently on, until you close it.
This button allows to delete a notification. There is no warning before deletion.
The status is either if the operation was successful or if at least one error occurred.
Any other icon indicates that the operation is ongoing.
The operation performed is displayed, it may use the matching service as follows: <opera-
tion>:<object concerned>.
This button allows to resize the notifications window.
The notifications are listed in reverse chronological order.
Once you clicked on a line, the type and full details of the report appear in the window.
These buttons allow to export the final report in either format.
This button allows to go back to the list of notifications.
46
Understanding the GUI
Bookmarks
Bookmarks give quick access to the pages of your choice.
You can access any page that you have bookmarked in a dedicated window.
When bookmarks are available, a down arrow is displayed right of the icon . It allows to
display the list of all the available bookmarks.
Note that all the operations described below are performed from the top bar. To manage book-
marks from the page My Bookmarks, refer to the section My Bookmarks.
Adding Bookmarks
You can bookmark any page, except in the module Dashboards. In all other modules, you can
even bookmark pages displaying filtered data.
To bookmark a page
1. From any page that can be bookmarked, in the top bar, click on . The wizard Bookmark
this page opens.
47
Understanding the GUI
2. In the field Name, specify your own bookmark name if need be. By default a bookmark is
named Module: Page.
3. In the field Bookmark Folder, you can specify a name to organize the bookmarks in folders
in the window Bookmarks and on the page My Bookmarks.
The name you specify can add a folder or help you find existing ones, click on SEARCH to
find matching folders and select the one you need.
4. Tick the box Add to the gadget Bookmarks if you want to add the bookmark to the gadget
Bookmarks.
For more details, refer to the section Adding the Gadget Bookmarks in the chapter Managing
Gadgets.
5. Tick the box Share with the other users if you want to make the bookmark visible to any
user. If you leave it unticked, you are the only user who can see it.
6. Click on OK to complete the operation. The report opens and closes. The page is marked
. The bookmark is listed in the window Bookmarks and on the page My Bookmarks.
You can edit bookmarks from the page My Bookmarks. For more details, refer to the section
Editing Bookmarks.
You can also access bookmarked pages from the page My Bookmarks. For more details, refer
to the section My Bookmarks.
Deleting Bookmarks
You can delete bookmarks from the bookmarked page.
You can also delete bookmarks from the page My Bookmarks. For more details, refer to the
section My Bookmarks.
My Account
The menu My Account allows to:
• Access the connected user account configuration options via My Settings. For more details,
refer to the section Account Configuration.
• Change the connected user password.
48
Understanding the GUI
• Access the page My Quick Wizards. For more details, refer to the section Quick Wizards.
• Access the page My Smart Folders. For more details, refer to the chapter Managing Smart
Folders.
• Access the page My Bookmarks. For more details, refer to the section My Bookmarks.
• Access the page My Gadgets, that provides access to the pages Gadgets Library and My
Gadgets. For more details, refer to the chapter Managing Gadgets.
• Close your session via Logout.
Help
This menu allows to:
• Open SOLIDserver Administrator Guide, via Administrator Guide. The PDF file opens in a new
tab of your browser. You can save it on your computer to access it even when you are no
longer connected to the appliance.
• Open the Software License Agreement, via License Agreement.
• Open the license details of the major open source components embedded in SOLIDserver,
via Credits.
Breadcrumb
The breadcrumb is a navigation bar. It is available on all the pages of SOLIDserver except in the
module Dashboards and on most pages of the module Administration. It provides direct and
hierarchical access to the module objects, allows you to filter data displayed on the listing pages
and to access additional pages.
The icon and name displayed in blue show the page you are currently on, here the page All
networks. The current level and its parent(s) have a dark gray background.
The lower levels are displayed in a light gray area. Here All pools or All addresses. You can
access either directly.
49
Understanding the GUI
• The breadcrumb no longer displays All <objects> but <Object>: <object-name>, and everything
right of this filter only concerns the object name. For instance, if you filter the breadcrumb with
a specific DNS server and zone, the breadcrumb provides access to both properties page.
This display indicates that you are filtering data and browsing the content of the object
mentioned. Here, you are displaying the views, zones and records of the DNS server
ns1.mycompany.com.
With the breadcrumb filtered at server level, clicking on All views opens the page but only
displays the views of the server ns1.mycompany.com.
With the breadcrumb filtered, the object level All <objects> is renamed <Object>. It still
provides access to the page, here DNS zone opens the page All zones but only displays
the zones of the server ns1.mycompany.com as the breadcrumb is filtered at server level.
If it was not, it would list all existing zones regardless of their server.
With the breadcrumb filtered, the object name is a link toward its properties page. Here,
clicking on domain.com opens its properties page.
With the breadcrumb filtered at zone level, clicking on All RRs opens the page but only dis-
plays the records of the zone domain.com.
The chevron icon indicates that additional pages are available. Click on the icon to display
these pages in the breadcrumb.
When the additional pages are displayed in the breadcrumb, you can click on to hide
them.
All additional pages available are displayed to the right of the icon.
Menu
The menu is displayed on almost every listing page. Its content differs on each page and the
options available vary from one user to another depending on the rights they are granted. For
more details regarding rights, refer to the part Rights Management.
50
Understanding the GUI
Add
This menu is available on all the listing pages when relevant.
Delete
This menu is available on all the listing pages when relevant.
On some pages, the button Delete is grayed out. You need to select the object that you want
to delete in the list to be able to click on it.
Edit
This menu is available on all the listing pages when relevant.
For example, it allows to synchronize/refresh servers and devices, manage access to the objects
for groups of users or perform specific operations on the objects listed.
On the properties page of the objects, it allows to edit the panels on the page.
On some pages, the menu option Edit is grayed out. You need to select the object that you
want to edit in the list to have access to this menu.
Tools
This menu is available on all the listing pages. It allows to:
• Perform advanced operations on the objects listed.
• Perform Expert operations.
On the properties pages, this menu is available only for some specific advanced operations.
On some pages, the menu Tools is grayed out. You need to select an object in the list to
have access to this menu.
Import
This menu is available on all the listing pages when relevant.
In the IPAM, the DNS and Device Manager it allows to import the objects you manage on the
page as well as the objects they can contain. For instance, you can import IP addresses from
the page All spaces.
Report
This menu is available on the listing pages of all the modules when relevant. It allows to:
51
Understanding the GUI
• Export the list in a CSV, HTML, XML, EXCEL and PDF file.
• Generate a report specific to the data listed in a HTML or PDF file.
This menu also allows to generate reports from some properties pages.
For more details, refer to the chapters Managing Gadgets, Managing Alerts and Managing Smart
Folders.
Extra Options
Ancienne taille de la page
This menu is accessible from any listing page or properties page of SOLIDserver.
From all pages, it allows to access the page All templates where your can:
• Manage List templates, i.e. customized column layouts of the module. For more details, refer
to the section Managing List Templates.
• Manage Import and Export templates, i.e. specific configurations saved during imports and
exports in the module. For more details, refer to the sections Managing Import Templates and
Managing Export Templates.
Other Buttons
On the right-end side of the menu you can see other buttons.
List Templates
This button allows to display, edit or add list templates for the current page in a dedicated window.
For more details, refer to the section Managing List Templates.
Switch to IPv4
This toggle buttons is displayed next to on the pages that provide both IPv4 and IPv6 man-
agement in the IPAM, DHCP and NetChange. The gray button indicates the current version dis-
played. If you click on the white button, you display the other version.
52
Understanding the GUI
Switch to IPv6
This toggle buttons is displayed next to on the pages that provide both IPv4 and IPv6 man-
agement in the IPAM, DHCP and NetChange. The gray button indicates the current version dis-
played. If you click on the white button, you display the other version.
Show/Hide
In the module IPAM, it allows to show/hide subnet-type networks managed by other networks
under the column Address + prefix.
In the DHCP and the DNS, it allows to show/hide the physical servers managed via smart archi-
tectures under the Name of each smart architecture.
In the module Application, it allows to show/hide the deployed applications and traffic policies
under the Name of each application.
In the module Guardian, it allows to show/hide the deployed policies under the Name of each
policy.
Listing Pages
The listing pages display data as a list to simplify resource management.
The details of all resources are displayed in dedicated columns that you can:
• Expand and reduce columns. You can display a column full content or its reduced version,
as detailed in the section Expanding or Reducing Columns.
• Sort the data displayed on the page. When the name of a column is underlined, it indicates
that you can click on it to sort the data listed, as detailed in the section Sorting Columns.
• Filter data. Use the search engine located under the column name to only display the data
matching your search, as detailed in the section Filtering Columns.
Administrators can:
• Lock and unlock up to four columns in list templates, as detailed in the section Locking or
Unlocking Columns.
• Move and order columns in the list templates, as detailed in the section Moving Columns.
• Add new list templates, as detailed in the section Managing List Templates.
53
Understanding the GUI
• Allow to access the properties page of the objects listed, when relevant. For more details,
refer to the section Properties Pages.
• Provide a contextual menu with some options for the objects listed. For more details, refer to
the section Using the Contextual Menu.
• Provide Multi-statuses on some pages. For more details, refer to the section Understanding
the Column Multi-Status.
• Provide custom IPv6 labels in some modules, that can be displayed above the addresses of
your choice. For more details, refer to the section Displaying IPv6 Labels.
Each object can be selected and managed separately. You can tick objects one by one,
or you can tick a set of successive objects using the key SHIFT on your keyboard.
The line of each selected object is highlighted in blue until you deselect it.
All the objects can be selected at once. Above the list, you can tick the box left to the first
column to select all the objects listed, whether the list is filtered or not, it selects all the objects
counted in the result.
It allows to refresh the listing page.
Within the data listed, all the data underlined provides a link. Depending on the page, it
can be a filter to list the content of a container or open the properties page of an object. At
the lowest level of a module hierarchy, it can perform specific operations (assign the object
for instance) or open the edition wizard or properties page of the object.
There is no limit to the number of objects on a page but the more data you display, the more
resources SOLIDserver uses to display them. To define the number of elements per page, refer
to the procedure To configure the user settings.
If there are more lines to be displayed than the number selected in your settings, the listing area
contains sub-pages that allow to navigate within the object database. The GUI provides some
key fields, buttons and areas to navigate within these pages. The following elements only appear
when there are many elements on the same page:
54
Understanding the GUI
The results indicates the total number of objects listed on all pages, if no filter is applied. If
a filter is applied, it indicates the total number of objects matching your search.
The number of pages on which data is listed. The number highlighted in blue displays which
page you are currently on.
These buttons allow you to display, respectively, the next and last page of data.
These buttons allow you to display, respectively, the first and previous pages of data.
You can expand the columns that contain a lot of data and display their content.
To expand/reduce columns
1. Go to the module and listing page of your choice.
2. If one or more columns contains a lot of data, the icon or is displayed next to its name.
a. Click on to expand the column. The column gets wide enough to fully display all the
data.
b. Click on to reduce the column. The column is reduced back to its default width and
hides part of the data under ... .
55
Understanding the GUI
Sorting Columns
On all the listing pages, you can sort by ascending or descending order any column that has its
name underlined.
The underlined column names indicate that you can sort the data listed in direct/reverse al-
phabetical order.
This arrow indicates that the list is sorted through the column Date in descending order.
The columns name not underlined indicate that you cannot sort the column data.
To sort a column
1. Go to the module and listing page of your choice.
2. Click on any underlined column name. The list is sorted in descending order using the values
in the column. If this is the column that sorts the list by default, it reverses the default order.
3. If you click on the name of the same column again, you change the sorting order.
Filtering Columns
Almost all the data listed on the GUI pages can be filtered, using one or several columns.
This button allows to apply the filter using the data entered in the column search engine.
You can also hit Enter to perform a filtered search.
The search engine allows to specify the data you are looking for in the column. Without it,
you cannot filter the column data, you might only be able to sort.
56
Understanding the GUI
To filter columns
1. Go to the module and listing page of your choice.
2. In the search engine of any column, specify the values of your choice. You can even include
operators, they are all detailed in the table Filtering operators.
3. Click on the button Refresh or hit Enter. The page refreshes, the list is filtered.
4. You can filter more columns if need be.
To remove a column filter, in its search engine click on . The list refreshes.
To remove all filters, on the right-end side of the menu click on . The list refreshes. If the
page has columns filtered by default, they are removed as well. Default filters are set per
session, they are applied again the next time you connect.
57
Understanding the GUI
58
Understanding the GUI
59
Understanding the GUI
60
Understanding the GUI
Expression Description
last The results only include all the data matching the day, week, month or year prior to date
of the search.
n period ago The results only include data matching the number n of day, week, month, year prior to
date of the search.
day Used with the keyword ago following the format <n period ago>, day or
days allows to filter data based on a specific number of days prior to the
date of the search.
week Used with the keyword ago following the format <n period ago>, week or
weeks allows to filter data based on a specific number of weeks prior to
the date of the search.
month Used with the keyword ago following the format <n period ago>, month
or months allows to filter data based on a specific number of months prior
to the date of the search.
year Used with the keyword ago following the format <n period ago>, year or
years allows to filter data based on a specific number of years prior to
the date of the search.
day of the week Any day of the week can provide a filter like last <day-of-the-week> or n
<day-of-the-week> ago. The column search engine is not case sensitive.
Locking columns allows to always display them on the left-end side and right-end side of the
page.
Once you locked column(s), you can scroll the page horizontally to display, sort and filter the
unlocked columns.
Figure 4.26. Locked and unlocked columns in the window List Templates
Note that:
• You can only lock and unlock columns from the window List templates.
• By default, the first column displayed on the page is locked.
• You can only lock displayed columns. They are preceded by .
61
Understanding the GUI
• You can lock up to four columns on each side of the page, two on the left-end side and two on
the right-end side.
In the window List templates, they correspond to the first two and last two columns in the list
of displayed columns.
• Lockable columns are marked . Once the first or last column in the list is locked, the column
next to it can be locked.
• Locked columns are marked . Once the two first or two last columns in the list are locked,
you cannot move any columns between them.
• You cannot unlock the first or last column if the column next to it is locked, once it is unlocked
the first or last column can be unlocked as well.
To lock/unlock a column
Only users of the group admin can perform this operation.
1. Go to the listing page of your choice.
2. On the right-end side of the menu, click on List Templates. The window opens.
3. In the drop-down list Displayed list template, select the template of your choice. The page
refreshes and only displays the relevant columns.
4. To lock a column, next to its name, click on . The column is marked . The column next
to it may now be lockable.
You can lock the two first and two last displayed columns.
5. To unlock a column, next to its name, click on . The column is marked .
To unlock the first and last columns, make sure to unlock the columns next to them first.
6. Click on SAVE . The page refreshes. The column is locked or unlocked.
Moving Columns
From the List templates, users of the group admin can move columns. Note that administrators:
• Can only move columns from the window List templates.
• Can only move displayed columns. They are preceded by .
• Cannot move locked columns. Only unlocked columns can be moved.
• Cannot move a column between two locked columns.
To edit a list template from a dedicated wizard, refer to the section Editing List Templates.
To move a column
Only users of the group admin can perform this operation.
1. Go to the listing page of your choice.
2. On the right-end side of the menu, click on List Templates. The window opens.
3. In the drop-down list Displayed list template, select the template of your choice. The page
refreshes and only displays the relevant columns.
4. Make sure the column you want to move is ticked, otherwise click on it.
5. Next to the column name, click on and drag it. A line indicates the column new location.
6. Drop the column in the location of your choice in the list template.
7. Click on SAVE . The page refreshes. The column moved to its new location. The Displayed
list template is edited accordingly.
62
Understanding the GUI
The page is accessible from all modules, it provides columns that can be sorted and filtered but
their layout cannot be edited.
63
Understanding the GUI
3. In the column Type, you can type in List to only display list templates.
64
Understanding the GUI
• New templates are not automatically displayed, they must be selected as the Displayed list
template.
In the following procedure, we add a list template from the page All templates but they can also
be added from listing pages.
3. In the menu, click on . The wizard Add a new list template opens.
4. In the field Name, specify the template name. It must be unique to the Object.
5. In the drop-down list Object, select the resource of your choice. The list is unique to each
module, it matches the listing pages where you can customize the column layout.
Note that you cannot add list templates for the pages Analytics (DHCP and DNS), All config-
urations (NetChange) and All policies (Guardian).
6. Click on NEXT . The page <Objects> lists configuration opens.
7. Configure the list template using the lists Hidden columns and Displayed columns, they
contain the columns of the default list template of the page:
• To add a column to the template, select it in the list Hidden columns and click on . The
column is moved to the Displayed columns.
• To remove a column from the template, select it in the list Displayed columns and click
on . The column is moved to the Hidden columns.
• To set the order of the columns, select them one by one in the list Displayed columns
and click on or .
If you are adding a template at the highest level of a module, go to the step 10.
8. Click on NEXT . The last page opens.
9. In the drop-down list Parent level, None is selected.
If you want to take into account classes applied to a parent object, refer to the section Adding
An Automatic List Template.
10. Click on OK to complete the operation. The report opens and closes. The new template is
listed.
11. To display the template, go to the relevant listing page and in the menu select List
templates > Displayed list template > <your new template>.
Adding an automatic list template provides two templates to display in the drop-down list Displayed
list template:
65
Understanding the GUI
1. The option Automatic template, that allows to automatically change the column layout if and
when you display the content of an object configured with one of the classes included in the
list template.
2. The template itself, a customized column layout you can display no matter the class applied
to a parent object.
Note that:
• Automatic list templates cannot be added at the highest of any module. They rely on classes
applied on a parent object.
• The option Automatic template does not change the column layout on a page if the list is not
filtered to display the content of a parent object configured with a class included in a list template.
• If one class is included in several list templates on a page, the option Automatic template dis-
plays the most recent template.
In the following procedure, we add an automatic list template from a listing page, but they can
also be added from the page All templates.
66
Understanding the GUI
b. In the relevant column, click on the name of a parent object configured with one of the
classes selected in the template. The page refreshes.
The page only displays the selected object content, and only the columns configured
in the template.
13. To only display the template and ignore the class applied to a parent object, in the menu
select List templates > Displayed list template > <your new template>. The page re-
freshes.
In the following procedure, we edit a list template from a listing page, but they can also be edited
from the page All templates.
67
Understanding the GUI
68
Understanding the GUI
For more details regarding the options available on the properties page, refer to the section
Properties Pages.
The messages returned by this column do no always reflect configuration errors for the object.
For instance, in the DNS, the Multi-status message 61006: Server type incompatible with Hybrid
indicates that the server in question cannot be switched to Hybrid DNS, it is probably managing
authoritative and recursive zones; it does not mean that the server is not running properly or is
misconfigured.
The column is displayed by default on some pages of the modules DNS and DHCP. You can
display it on the other pages. For more details, refer to the section Managing List Templates.
69
Understanding the GUI
The column Multi-status returns colored squares containing messages. The color indicates
the severity of the message. In each square, a number indicates how many messages match
the severity. In this example, the gray square indicates that there is 1 informational message
returned for the smart architecture and its content.
Hovering over a square opens the window containing the message(s) of the object. In this
example, a zone returns the Multi-status 61004.
The column provides messages divided into 6 levels of severity. Each one provides useful status
and state information regarding the object or the configuration within the module.
Each message and level of severity is specific to each object. The number of the messages are
distributes among the modules: all DHCP messages start with 60000, all DNS messages with
61000... For more details, refer to the appendix Multi-Status Messages.
They are displayed above start addresses to highlight IPv6 containers. For more details, refer to
the chapter Managing IPv6 Labels.
Figure 4.29. Example of IPv6 labels used to highlight a geographical distribution in the IPAM
70
Understanding the GUI
Properties Pages
The properties pages gather all the information regarding an object. Note that:
• The properties page is accessible from a listing page. Some objects do not provide a properties
page because all their details are already displayed in the columns.
• The properties page allows to edit or configure further an object. Some options are only available
on the properties page.
• It distributes all the information among panels. All objects provide the panel Main properties,
it contains the most general information. All the extra panels contain more specific data, objects
of a common module or level in the hierarchy share panels. All the panels that can be edited
contain the button EDIT.
• Some objects do not have a properties page, if they are managed from a listing page that
already gathers all the information available.
71
Understanding the GUI
Some panels are specific to the object, others are available across the modules:
• Main properties: provides an overview of the main information regarding the object.
• Advanced properties: displays the advanced properties configuration of the object and the
level the property was inherited from.
This panel is available in the modules IPAM, DHCP and DNS for the resources that can be
configured with advanced properties, for more details refer to the chapter Managing Advanced
Properties.
• Audit: logs all the changes carried out on the object by the connected user over time.
This panel is available on all properties pages of the modules IPAM, DHCP and DNS; except
for DHCP servers, groups, scopes, leases and DNS views and RRs.
If the user belongs to a group with access to the modifications of all users, it displays all the
operations ever performed on the object. For more details, refer to the section Allowing Users
to Display All the Operations Performed.
• Groups access: displays all the groups that have the object as resource. Under each group
name are listed the rights granted over the resource and its content.
This panel is available in the modules IPAM, DHCP and DNS on all properties page, except
at the lowest level of each module hierarchy and on the properties page of DHCP groups and
ranges.
In the module NetChange, it is only available on the properties page of network devices.
In the module Administration, it is available on the properties page of users, except ipmadmin.
Only the name of the group is displayed but not the rights granted to the group. For more details,
refer to the part Rights Management.
Wizards
Within SOLIDserver every operation - an object addition, edition, configuration, deletion - is per-
formed via a wizard. All the modules share a common wizard structure, the fields and/or buttons
that it contains depend on each operation. The title of the wizard specifies the ongoing operation.
In addition to the wizards, SOLIDserver uses pop-up windows: when there are configuration errors
or when you select too many or not enough objects from a list before performing operations via
the menu. However, some pages, like the Administration pages Groups and Class Studio or the
IPAM page All addresses, use pop-up windows. Therefore, to use SOLIDserver to the best of
its potential, make sure your Internet browser is not configured to block pop-up windows.
All the wizards share a common structure detailed in the sections below.
72
Understanding the GUI
The gray areas are informational sections. The top of the wizard page is a location reminder
providing the object basic information and a container/class when relevant.The other sections
are read-only sections, they can be Comment areas or informational messages guiding you
during the configuration.
The wizard drag bar contains the title, a pushpin to save the wizard and a cross to
close the wizard without saving any changes. For more details on how to save a wizard,
refer to the section Quick Wizards.
The input fields are the most commonly used. Their border changes color in case of miscon-
figuration.
The button Set, Propagate allows to configure the inheritance or propagation properties of
the specified value in a dedicated layer. For more details, refer to the chapter Inheritance
and Propagation.
The fields name and border turn red in case of syntax error or misconfiguration, you cannot
save the configuration until the information is correct. Right of the field, the exclamation
mark may detail what must be changed.
The star icon indicates that a field is required. If you leave the field blank, you cannot save
your configuration, unless it has a default value.
The down arrow indicates a drop-down list, it provides several values to choose from.
The navigation buttons of the wizard, PREVIOUS , NEXT , OK and CANCEL .
The button OK indicates that you are on the last page of the wizard. Clicking on it saves and
applies your configuration.
The button CLOSE closes the wizard without saving the configuration or changes applied.
The box is present on many wizards. Ticking it usually reloads the wizard and allows to set
specific parameters in extra fields.
73
Understanding the GUI
For more specific configurations, the wizards embed extra information icons. These icons open
a window containing more detailed information to help with a thorough configuration of the object.
The question mark icon indicates extra details regarding a field. Hover over it to open the
field configuration help.
74
Understanding the GUI
For instance, all the object deletion wizards contain a warning message to make you confirm the
deletion or to provide extra information regarding the consequences of the deletion.
Warning messages are displayed in orange. Some specific required values that cannot be
directly verified by the wizard are introduced by warning messages.
Information messages are displayed in blue.
75
Understanding the GUI
This list displays all the available columns that are not yet configured in the list template. In
this example, the columns that could be displayed on the page All scopes.
Once you have selected a value in the list Hidden column, click on to move it to the list
Displayed columns and include them into the list template.
These buttons allow to order the list entries. Select them one at a time and move them up
or down until the order suits your needs.
This list displays all the columns that are part of the list template.
You can remove any column from the list template. Select them one at a time in the list
Displayed columns and click on to move them to the list Hidden columns.
76
Understanding the GUI
The module Administration provides a set of wizards where you can set up and edit multiple
entries in a single list.
Figure 4.35. An example of data edition in a wizard providing entries management in one list
Once you have selected an entry in the list at the bottom of the wizard page, in this example
IP addresses list, its configuration details appear in these fields.You can edit any white field.
Click on UPDATE to save your modifications and overwrite the former configuration and follow
the wizard to commit your changes.
Click on DELETE to delete the selected configuration entry and follow the wizard to commit
your changes.
Click on CANCEL to discard any modifications made in the fields and to select another entry
in the configuration list or to add a whole new set of data.
The list of existing configurations. The blue color indicates the selected line. During the
modification, it turns gray.
77
Understanding the GUI
The button SEARCH provides manual completion, it allows to query the DNS resolver of the
appliance. In this example, you can specify a hostname and click on the button to retrieve
the matching Management IP address.
78
Understanding the GUI
My Bookmarks
From the page My Bookmarks, you can access the pages you saved and manage bookmarks.
You can edit, share and delete them.
79
Understanding the GUI
The column Name displays the bookmark name. It allows to edit the bookmarks. For more
details, refer to the section Editing Bookmarks.
The column All users indicates if you share the bookmark visibility with other users (Yes)
or not (No).
The column Bookmark Folder indicates if the bookmark belongs to a folder. / means the
bookmark is not in any folder.
The column Path contains the link Access, toward the bookmarked page.
Editing Bookmarks
From the page My Bookmarks, you can edit your bookmarks. During the edition, you can rename
them, include or exclude them from a folder, attach them to the gadget Bookmarks and/or share
or unshare them.
To edit a bookmark
1. From any page, in the top bar, select My account > My Bookmarks. The page My
Bookmarks opens.
2. Click on the name of the bookmark of your choice. The wizard Edit Bookmarks opens.
3. Edit the Name according to your needs.
4. Edit or remove the Bookmark Folder to organize the bookmark according to your needs.
Note that you can SEARCH for existing names.
5. Tick or untick the box Add to the gadget Bookmarks according to your needs. Ticking the
box adds the bookmark to the gadget Bookmarks. For more details, refer to the section
Adding the Gadget Bookmarks in the chapter Managing Gadgets.
6. Tick or untick the box Share with the other users according to your needs. If the box is
ticked, the bookmark is visible to any user. If you leave it unticked, you are the only user
who can see it.
80
Understanding the GUI
7. Click on OK to complete the operation. The report opens and closes. The content of the
columns matches your modifications.
To share/unshare bookmarks
1. From any page, in the top bar, select My account > My Bookmarks. The page My
Bookmarks opens.
2. Tick the bookmark(s) of your choice.
3. In the menu, select Edit > Visible to all users > Yes or No. The wizard Bookmark
Visibility opens.
4. Click on OK to complete the operation. The report opens and closes. The bookmark is marked
Yes or No in the column All users.
Deleting Bookmarks
From the page My Bookmarks, you can delete one or more bookmarks at once.
Charts
A set of charts are available by default on properties pages and the page System statistics or
even in some gadgets and reports. For more details, refer to the sections Properties Pages,
Monitoring the Appliance Statistics, Managing Gadgets and Managing Reports.
All charts share a common structure and set of options. The illustration below contains a time-
based chart, therefore all time related options are not available on instant charts.
81
Understanding the GUI
The start and end dates of the data displayed on time-based charts. It matches the period
selected in the timeline and affects the scale of the x-axis. By default, it displays the last 3
hours.
The display options. They allow to open the chart in a pop-up window with the button , to
refresh the data with . On time-based charts, you can select a period with that opens
a drop-down list to display the Current hour, Last 3 hours, Day, Week, Month or Year, and
the button to select a specific date.
The data retrieved is represented in a chart, where the y-axis indicates the unit, axis scale
and unit prefix and the x-axis indicates the data displayed or period. On time-based charts,
the y-axis depend on the period selected and maximum value displayed. Following the
standard ISO 80000-1, all the y-axis units can have no prefix or any SI prefix such as: m
(milli), k (kilo) or M (mega).
The timeline, the overall period of data available, of any time-based chart. The period dis-
played is highlighted in gray. By default, it displays a maximum of 365 days, to change it
refer to the section Editing the Number of Days Available on the Timeline.
The legend of the chart. Each set of data has a name and a dedicated color. You can click
on any entry to hide or display the data in the chart.
All charts can be used as gadgets. For more details, refer to the section Assigning Gadgets in
the chapter Managing Gadgets.
Note that the options in the sections below are only available for time-based charts.
If you hover over the edge of the gray area, the mouse pointer turns into a two-sided arrow that
you can move left or right according to your needs.
82
Understanding the GUI
This period, represented by a gray area can also be dragged to select a different period.
If you hover over the gray area, the mouse pointer turns into a four-sided arrow.
In addition, you can click and drag on the timeline to select a period directly.
Within the timeline, with a left-click of the mouse over a white area, you can select the period
that suits your needs. The pointer changes from an arrow to a cross.
Once you release the mouse, the data displayed in the chart, x-axis points of reference and
y-axis scale adjust accordingly.
83
Understanding the GUI
When you hover over the chart, the arrow pointer turns into a four-sided arrow and the
background turns blue to indicate that you can interact with the data. You can display the
data date and time above the chart and the value at that time is displayed in the legend of
the chart.
A black vertical line indicates where you are on the chart, each measurements focus is
symbolized by a circle in the color of the element displayed. Using the scroll wheel on the
mouse, you can zoom in and out.
You can click on the elements of the chart legend to display or hide them from the chart.
When you are browsing the chart, the value of each measurement on the line is indicated
above each element of the legend.
By default, the period of data displayed in the timeline of all charts is one year, 365 days. This
period is set in a dedicated registry database entry.
If you change the default period, all time-based charts refresh and display only the data retrieved
over the period, number of days, that you set.
To edit the registry key that sets the number of days displayed in the timeline
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with module.graph.default.period.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
84
Understanding the GUI
6. In the field Value, specify the value of your choice, in days. The default value is 365.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
Quick Wizards
The quick wizard are shortcuts in essence that allow to save any wizard at any point of its config-
uration. The wizard's page and all the data filled or selected is saved within the quick wizard and
accessible at any time.
The quick wizards are saved and managed on a dedicated page but you can set shortcuts toward
each of them in a gadget or in a dedicated menu.
The column Name displays the quick wizard name. It allows to edit the quick wizards. For
more details, refer to the section Editing Quick Wizards.
The column All users indicates if the quick wizard is shared with other users (yes) or not
(no).
The column Description displays the description you might have set during the quick wizard
addition or edition.
The menu Quick access. It appears if at least one quick wizard was assigned to the
Quick access menu.
The column Dashboard indicates on which dashboard the Quick wizard gadget is displayed.
It is empty if you only saved it in the Quick access menu. You cannot filter this column.
The column Access is a link toward the wizard you saved.
The menu Quick access, can contain as many quick wizards as you want. You can access them
from any page as the menu is displayed in the top bar.
85
Understanding the GUI
86
Understanding the GUI
• Via the menu Quick Access that is visible on every page of the appliance in the top bar.
87
Understanding the GUI
Account Configuration
Each user can edit their account once they are connected. In the top bar, the menu My Account
allows to edit their account preferences.
Note that any user can close license related banner messages, displayed above the top bar, for
the remainder of their session.
Note that the superuser, ipmadmin, can change the account preferences from the gadget System
Information.
88
Understanding the GUI
5. In the drop-down list Date format, select mm/dd/yyyy or dd/mm/yyyy. By default, dd/mm/yyyy
is selected
6. In the drop-down list Language, you can set the interface language: English, French,
Spanish, German, Dutch, Chinese or Japanese. By default, English is selected.
7. Click on OK to complete the operation. The report opens and closes.
Keep in mind that remote users cannot edit their password. Remote users come from a third
party server or directory - AD, LDAP or RADIUS - and are authenticated via a dedicated rule.
For more details, refer to the chapter Managing Authentication Rules.
89
Part II. Configuring SOLIDserver
Before managing your network, your administrator needs to configure your appliance.
This part details all the available system configurations needed to set up SOLIDserver from the module
Administration, they are divided as follows:
• Configuring the Time and Date: describes the ways of setting the appliance time and date, a mandatory
configuration to ensure services synchronization and data reliability.
• Configuring the Network: describes the operations to integrate the appliance to your network. From its IP
address and hostname to its DNS resolver, firewall settings, routes and so on.
• Configuring the Services: describes all the services and servers that you can configure and/or manage
from SOLIDserver, like SSH, NTP, HTTP, DNS, DHCP, etc.
Note that the module Administration provides extra pages and features all described in the parts Adminis-
tration and Customization.
Table of Contents
5. Configuring the Time and Date ..................................................................................... 92
Configuring NTP Servers ......................................................................................... 92
Forcing the NTP Update .......................................................................................... 94
Setting the Appliance Time and Date Manually ......................................................... 94
6. Configuring the Network .............................................................................................. 95
Configuring Basic IP Addressing on an Interface ....................................................... 96
Setting the Routing ................................................................................................. 97
Setting the Hostname .............................................................................................. 99
Setting the DNS Resolver ...................................................................................... 100
Setting the Firewall ................................................................................................ 100
Setting up a VLAN Interface ................................................................................... 103
Setting up an Ethernet Port Failover ....................................................................... 105
Configuring a VIP .................................................................................................. 107
Setting up and Managing a VIF .............................................................................. 110
Configuring the Loopback Interface ........................................................................ 112
Configuring a Media Interface ................................................................................ 114
7. Configuring the Services ............................................................................................ 115
Handling Services ................................................................................................. 116
Configuring the SSH Account ................................................................................. 117
Changing the SFTP/SCP/RSYNC User Account Password ...................................... 118
Managing the TFTP Upload Authorizations ............................................................. 118
Configuring the SMTP Relay .................................................................................. 119
Changing the HTTPS Certificate ............................................................................ 120
Configuring Windows Events Collector ................................................................... 121
Configuring DNS Guardian .................................................................................... 121
Configuring GSLB Server ...................................................................................... 122
Configuring the SNMP Server ................................................................................ 123
Downloading a DNS or DHCP Configuration File ..................................................... 125
91
Chapter 5. Configuring the Time and Date
Your appliance must always be set with the proper time and date to prevent any manage-
ment problems. That way, all your services are properly synchronized and all the data you
manage is up-to-date.
There are two ways of configuring the appliance time and date:
1. Via NTP.
We strongly recommend configuring NTP servers on your appliance. You can configure sev-
eral servers and even force an update. For more details, refer to the sections Configuring NTP
Servers and Forcing the NTP Update.
2. Manually.
You can set the date and time yourself as detailed in the section Setting the Appliance Time
and Date Manually.
Note that every user can choose time and date display of their session. For more details, refer
to the section Configuring the User Display Settings.
Note that in the procedure below we configure NTP servers from the module Administration, but
you can also configure them from the Main dashboard, in the gadget SOLIDserver Configuration
Checklist.
92
Configuring the Time and Date
b. In the field Stratum, you can specify a level between 0 and 15. By default nothing is
specified, the stratum is retrieved from the server. We strongly advise against setting a
stratum if it is not necessary.
c. Click on ADD . The server and stratum are moved to the list NTP servers.
d. Repeat these steps for as many servers as you need.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up
or down .
6. Click on NEXT . The page Edit the NTP configuration opens.
7. Set the restrictions of the NTP server(s).
a. In the drop-down list Type, select IPv4 or IPv6.
b. In the field IP address, specify an IPv4 address, an IPv6 address or default.
c. In the field Mask, you can set the netmask of the IPv4 or IPv6 address you specified in
the field IP address. If you specified default, it is useless to set a mask.
d. In the field IP peer limit, you can specify the maximum number of requests for each
client IP address. The IP address and Mask you set identify the clients. You can set any
value between 0 and 65535 in the field, 0 means that no client can query the NTP
server(s). By default, no peer limit is configured, the field is set to -1.
e. In the field Flags, you can set one or several flags, separated by a space. The field
accepts the flags kod, limited, lowpriotrap, noepeer, nomodify, noquery, noserve, notrap,
notrust, ntpport and version.
f. Click on ADD . The configuration is moved to the Restriction list.
g. Repeat these steps for as many restrictions as you need.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
If you need to edit the NTP servers configuration, follow the procedure again and make your
changes. To take into account your changes immediately, you can stop the service NTP and
start it again. For more details, refer to the section Starting or Stopping a Service.
93
Configuring the Time and Date
We recommend configuring NTP servers on your appliance to make sure that the time and date
are regularly checked and updated, for more details refer to the section Configuring NTP Servers.
Note that, if you set up one or several NTP servers, the time and date you set manually will be
lost the next time an NTP server updates.
94
Chapter 6. Configuring the Network
This chapter details the page Network configuration where you can configure all the settings
necessary to run SOLIDserver on your network, including:
• Setting the Hostname of the appliance.
• Setting the DNS Resolver, the DNS server that SOLIDserver uses to resolve the names and
addresses that it manages.
• Setting the Firewall and reinforcing the appliance security by blocking potential dangerous
communications.
• Setting up the Default Gateway address that SOLIDserver uses to reach networks out of its
domain's broadcast.
• Setting up Specific Routes to set a specific path for the returned packets.
• Setting up Static Routes and enable data to be forwarded through the network with fixed paths.
• Configuring Basic IP Addressing on an Interface.
1
• Setting up a VLAN Interface , like using a physical interface as an 801.1Q interface.
• Setting up an Ethernet Port Failover, to allow aggregation of multiple network interfaces as
one virtual interface in order to provide fault-tolerance and high-speed links.
• Configuring a VIP, or Virtual IP address, that is not connected to a specific computer or network
interface card on a computer. Incoming packets are sent to the VIP address, but all packets
travel through real network interfaces.
• Setting up and Managing a VIF details how to add, edit and delete a VIF. A Virtual InterFace
is a container that allows to configure physical interfaces with IP addresses and services.
• Configuring the Loopback Interface of the appliance.
• Configuring a Media Interface, to define the option supported by the physical interface.
1
Virtual Local Area Network (VLAN) is a group of hosts with a common set of requirements that communicate as if they were attached
to the same broadcast domain, regardless of their physical location.
95
Configuring the Network
Keep in mind that the overlap of IP addresses linked with different physical interfaces is
not allowed in order to avoid asymmetrical routing. Indeed, if a packet is received from a phys-
ical interface it must not be forwarded to another one.
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
96
Configuring the Network
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
9. Click on NEXT . The last page opens.
10. Set the IPv6 address configuration of the interface.
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
11. Click on OK to complete the operation. If you configured LAGG, the protocol you chose is
displayed in the column Configuration.
12. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The page
refreshes.
Make sure that at least one interface is available, otherwise, you would lose your
current connection to SOLIDserver.
Keep in mind that the default gateway is only used if a packet is sent from a network address
unknown to SOLIDserver. For some networks, you might want to use route sourcing and set up
a specific route to send the response packet to the sender through the channel it came from
rather than using the default gateway to try and locate the sender. For more details, refer to the
section Setting up Specific Routes.
97
Configuring the Network
Keep in mind that the DHCP does not take into account the specific route. Therefore, the man-
agement IP address a DHCP server should always be on the same network as the default gateway.
Within SOLIDserver, you can set up several specific routes. To configure a specific route, refer
to the procedure To set up a Basic Interface Configuration.
98
Configuring the Network
Parameter Description
Netmask The netmask of the IP address. Depending on the specified address, several values
may be available. The netmask you select automatically updates the Prefix. This field
is optional.
Prefix The prefix of the IP address. It is automatically selected based on the address and
netmask. If you select a different prefix, the netmask is automatically updated. This
field is required.
Gateway The gateway of the static route. This field is required.
Once all the parameters needed are configured, click on ADD . The static route is moved to
the list Static routes.
Repeat these actions for as many static routes as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
4. Click on NEXT . The page Static routes (IPv6) opens. Follow the step 4 to configure an IPv6
static route.
5. Click on OK to complete the operation.
6. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
The hostname is used to identify and differentiate several appliances. It is all the more useful if
you manage remote appliances or configure appliances in High Availability.
99
Configuring the Network
Stateful filtering treats traffic as a bi-directional exchange of packets comprising a session. It allows
to determine if the session conversation between the originating sender and the destination follows
a valid procedure of bi-directional packet exchange. Any packet that does not properly fit the
session conversation template is automatically rejected.
In addition, you can track down attackers or prevent network attacks by tracking more state per
session. As firewall messages filing are supported, you can review and track information after
the fact. You can see which packets have been dropped, from which addresses they came from
and where they were going, etc.
You can Open the firewall, to disable it, and ignore all these rules.
2
also known as dynamic packet filtering.
100
Configuring the Network
101
Configuring the Network
Parameter Description
<address> An IP address specified without mask-length. It must follow the
format: x.x.x.x or xxxx:: .
Source port The source port on which the firewall rule should be applied. Use a comma to separate
several port numbers.
To The destination parameters, the accepted values are the following.
The fields From and To work together, so you must specify either two IPv4 addresses
or two IPv6 addresses, you cannot mix the protocol versions.
me A special keyword that matches any IP address configured on an
interface in SOLIDserver.
any A special keyword that matches any IP address.
<address>/<prefix> An IP address specified with mask-length. It must follow the format:
x.x.x.x/p or xxxx::/p .
<address> An IP address specified without mask-length. It must follow the
format: x.x.x.x or xxxx:: .
Destination port The destination port on which the firewall rule should be applied. Use a comma to sep-
arate several port numbers.
Via The interface the packets should go through. The parameter via causes the interface to
always be checked as part of the match process. By default, nothing is selected.
Log The logging status of the rule. By default, No is selected. You can decide to save, Yes,
the log parameter indicating if a packet matches a rule on the page Syslog; it is saved
with a facility SECURITY name.
Keep state The dynamic rule status of the rule. By default, No is selected. It allows to decide if you
want SOLIDserver firewall to add a dynamic rule, upon match, whose default behavior
is to match bidirectional traffic between source and destination IP/port using the same
protocol.
102
Configuring the Network
3. In the column Position, click on the underlined number corresponding to the rule you want
to edit. The wizard Firewall rule configuration opens.
4. Edit the parameters according to your needs, following the information described in Firewall
rules parameters procedure above.
5. Click on OK to complete the operation.
6. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
Keep in mind that firewall rules must not be deleted lightly. For instance, the rule #34 is a
delicate rule to delete as it refers to fragmented IP packets. As there is a maximum packet size
for transport level that depends on the transport medium (1500 bytes for Ethernet), if the IP
packet is larger than this, it needs to be broken up into fragments that get reassembled at the
destination. Without the rule #34, fragmented IP packets will be blocked by the firewall.
Note that to avoid asymmetrical routing, you cannot link overlapped IP addresses to different
physical interfaces. This way, if a packet is received from a physical interface it cannot be for-
warded to another interface.
103
Configuring the Network
4. In the field Virtual interface name, you can rename the interface if you want.
5. In the list Available physical interfaces, select the available interface, it is named after the
physical port and port MAC address as follows: eth# (##:##:##:##:##:##) and click on . It
is moved to the list Physical interfaces.
6. Click on NEXT . The next page opens.
7. If you selected at least two Physical interfaces, in the drop-down list LAGG procotol you
can select failover or LACP. By default, failover is selected. Click on NEXT . The next page
opens.
Note that a successful LAGG configuration requires interfaces with the same speed and
duplex and you can only configure LACP on appliances in version 6.0.2 or higher.
8. Set the IPv4 address configuration of the VLAN interface. The IP determines to which con-
figured VLAN they belong and the tag provides a more accurate filter.
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
9. Click on NEXT . The last page opens.
10. Set the IPv6 address configuration of the VLAN interface. The IP determines to which con-
figured VLAN they belong and the tag provides a more accurate filter.
104
Configuring the Network
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
11. Click on OK to complete the operation. If you configured LAGG, the protocol you chose is
displayed in the column Configuration.
12. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The page
refreshes.
Make sure that at least one interface is available, otherwise, you would lose your
current connection to SOLIDserver.
105
Configuring the Network
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
9. Click on NEXT . The last page opens.
10. Set the IPv6 address configuration of the interface.
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
11. Click on OK to complete the operation. If you configured LAGG, the protocol you chose is
displayed in the column Configuration.
12. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The page
refreshes.
Make sure that at least one interface is available, otherwise, you would lose your
current connection to SOLIDserver.
106
Configuring the Network
Configuring a VIP
SOLIDserver allows you to set up virtual IP addresses (VIP) on supported services. This mech-
anism, known as Common Address Redundancy Protocol (CARP) is a protocol which allows
multiple EfficientIP devices on the same local network to share a single IP address or the same
set of addresses. Its primary purpose is to provide failover redundancy. For example, if there is
a single SOLIDserver running a DNS service and it goes down, then, the networks on each side
of the DNS service can no longer communicate with each other, or, they communicate without
any DNS service. However, if there are two EfficientIP devices running CARP, if one fails, the
other can take over with SOLIDserver on either side of the DNS service not being aware of the
failure. Operations continue as normal. Note that through a VIP you can manage DNS smart ar-
chitectures Master/Slave and Multi-Master.
The general idea is to have a single IP address, and several physical servers behind. In the case
of a failure, the next available server takes the lead and provides the relevant services. This
mechanism is available for the services DNS, NTP, TFTP and SOLIDserver management, the
appliances configured in High Availability.
Note that:
• To configure a VIP, the interface must be set with at least another IP address configured with
the VIP service set to None. You cannot set a VIP on its own on an interface.
• With virtual appliances, the VMware ESXi host vSwitch must be configured as follows:
• The option Promiscuous mode must be enabled,
• The option MAC Address Changes must be enabled,
• The option Forged Transmits must be enabled,
• The option Net.ReversePathFwdCheckPromisc must be set to 1.
To configure a VIP
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Network configuration. The page Network configuration
opens.
3. In the column Name, click on the interface of your choice. All virtual interfaces are preceded
by an orange dot. The wizard Virtual network interface configuration opens.
4. In the field Virtual interface name, you can rename the interface if you want.
5. In the list Available physical interfaces, select the available interface, it is named after the
physical port and port MAC address as follows: eth# (##:##:##:##:##:##) and click on . It
is moved to the list Physical interfaces.
6. Click on NEXT . The next page opens.
7. If you selected at least two Physical interfaces, in the drop-down list LAGG procotol you
can select failover or LACP. By default, failover is selected. Click on NEXT . The next page
opens.
Note that a successful LAGG configuration requires interfaces with the same speed and
duplex and you can only configure LACP on appliances in version 6.0.2 or higher.
8. Set the IPv4 address configuration of the interface.
107
Configuring the Network
The drop-down list VIP service allows to set up the availability of the DNS, NTP, TFTP or
SOLIDserver management services if:
• Both appliances belong to the same LAN (layer 2).
• Both appliances are set with the exact same parameters in all the fields, except the the
Priority. To avoid any conflict, you must set one priority level for the first appliance and a
different one on the other.
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
Keep in mind that the list must contain at least one IP address configured with the VIP service
set to None, otherwise you cannot apply your VIP configuration.
9. Click on NEXT . The last page opens.
10. Set the IPv6 address configuration of the interface.
108
Configuring the Network
The drop-down list VIP service allows to set up the availability of the DNS, NTP or TFTP
services if:
• Both appliances belong to the same LAN (layer 2).
• Both appliances are set with the exact same parameters in all the fields, except the the
Priority. To avoid any conflict, you must set one priority level for the first appliance and a
different one on the other.
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
Keep in mind that the list must contain at least one IP address configured with the VIP service
set to None, otherwise you cannot apply your VIP configuration.
11. Click on OK to complete the operation. If you configured LAGG, the protocol you chose is
displayed in the column Configuration.
12. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The page
refreshes.
Make sure that at least one interface is available, otherwise, you would lose your
current connection to SOLIDserver.
109
Configuring the Network
By default, an existing VIF, called DEFAULT_INTERFACE is already applied to the system. You
can add new VIFs and edit or delete them.
Before adding, editing or deleting a VIF, make sure that you have at least one operating
interface connected to SOLIDserver or you might lose your point of access, and therefore be
unable to manage the appliance.
To add a VIF
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Network configuration. The page Network configuration
opens.
3. In the menu, click on Add. The wizard Virtual network interface configuration opens.
4. In the field Virtual interface name, name the interface.
5. In the list Available physical interfaces, select an interface and click on . It is moved to
the list Physical interfaces.
All interfaces are named after a physical port and port MAC address as follows: eth#
(##:##:##:##:##:##).
To remove an interface, select it in the list Physical interfaces and click on . The interface
is moved back to the list Available physical interfaces.
6. Click on NEXT . The next page opens.
7. If you selected at least two Physical interfaces, in the drop-down list LAGG procotol you
can select failover or LACP. By default, failover is selected. Click on NEXT . The next page
opens.
Note that a successful LAGG configuration requires interfaces with the same speed and
duplex and you can only configure LACP on appliances in version 6.0.2 or higher.
For more details, refer to the section Setting up an Ethernet Port Failover.
8. Set the IPv4 address configuration of the interface.
110
Configuring the Network
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
9. Click on NEXT . The last page opens.
10. Set the IPv6 address configuration of the interface.
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
11. Click on OK to complete the operation.
12. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
To edit a VIF
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Network configuration. The page Network configuration
opens.
3. In the column Name, click on the interface of your choice. All virtual interfaces are preceded
by an orange dot. The wizard Virtual network interface configuration opens.
111
Configuring the Network
4. In the field Virtual interface name, you can rename the interface if you want.
5. Edit its Physical interfaces, IPv4 address configuration and/or IPv6 address configuration,
as detailed in the procedure To add a VIF.
6. Click on OK to complete the operation.
7. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
To delete a VIF
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Network configuration. The page Network configuration
opens.
3. In the column Name, click on the interface of your choice. All interfaces are preceded by an
orange dot. The wizard Virtual network interface configuration opens.
4. In the field Physical interfaces, select one by one all the interfaces and click on . The
physical interfaces are moved back to the list Available physical interfaces.You must remove
all the Physical interfaces configured.
5. Click on NEXT . The IPv4 address configuration opens.
6. In the IP addresses list, select one by one all the addresses and click on DELETE . You must
delete all IPv4 addresses.
7. Click on NEXT . The IPv6 address configuration is displayed.
8. In the IPv6 addresses list, select one by one all the addresses and click on DELETE . You
must delete all IPv6 addresses.
9. Click on OK to complete the operation.
In the column Name, the VIF is struck out.
10. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
By default, the loopback interface lo0 is available. You can configure it with one or more IPv4
and/or IPv6 addresses.
Note that you cannot use the loopback interface in LAGG, CARP, 802.1q or specific route config-
urations.
112
Configuring the Network
3. In the column Name, click on LOOPBACK_0. The wizard Virtual network interface con-
figuration opens.
4. Set the IPv4 address configuration of the loopback interface.
By default, the IP addresses list already contains 127.0.0.1-255.0.0.0.You should not delete
this address, if you do you lose access to the GUI. You can add more addresses.
Once you specified the parameters, click on ADD . The new IP address is moved to the IP
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
Once the loopback interface configuration is applied, all the IP addresses you set are dis-
played in the column Name, under the line Physical interface: lo0.
5. Click on NEXT . The last page opens.
6. Set the IPv6 address configuration of the virtual loopback interface.
By default, the IPv6 addresses list already contains ::1-128. You should not delete this
address. You can add more addresses.
Once you specified the parameters, click on ADD . The new IP address is moved to the IPv6
addresses list.
Repeat these actions for as many IP addresses as needed. SOLIDserver is accessible
through all the IP addresses configured for the interface.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down in the list.
Once the loopback interface configuration is applied, all the IP addresses you set are dis-
played in the column Name, under the line Physical interface: lo0.
113
Configuring the Network
Note that you can only configure the media interface of physical interfaces already attached to
a VIF. All the available physical interfaces not used yet are listed under the Unused interfaces.
114
Chapter 7. Configuring the Services
This chapter details most of the services embedded in SOLIDserver, all gathered on the page
Services configuration:
• Handling Services details how to enable, disable, start and stop all available services.
• Configuring the SSH Account allows to set up the details of the connection to SOLIDserver via
a Secure Shell (SSH) client.
• Changing the SFTP/SCP/RSYNC User Account Password allows to edit the xfer account
1
password used by the protocols SFTP, SCP and RSYNC .
• Managing the TFTP Upload Authorizations allows to deliver Trivial File Transfer Protocol (TFTP)
services in order to send boot and configuration files to DHCP/BOOTP clients (such as IP
phones, thin clients, bootless stations).
• Configuring the SMTP Relay allows to configure the host relay that SOLIDserver uses to send
emails via Simple Mail Transfer Protocol (SMTP).
• Configuring Windows Events Collector allows to enable the communication between SOLID-
server and your AD domains controllers to retrieve data in the module Identity Manager.
• Configuring DNS Guardian allows to configure the listening interfaces and enable the service
DNS Guardian if your license includes it.
• Configuring GSLB Server allows to configure the listening interfaces and enable the service
GSLB server if your license includes it.
• Changing the HTTPS Certificate allows to change the Apache certificate used to connect to
SOLIDserver.
• Downloading a DNS or DHCP Configuration File allows to retrieve all DHCP and DNS config-
uration files.
• Configuring the SNMP Server allows to remotely monitor SOLIDserver performances and load
via SNMP.
1
SFTP stands for Secure File Transfer Protocol also known as SSH File Transfer Protocol. SCP stands for Secure Copy. RSYNC
stands for Remote Synchronization.
115
Configuring the Services
Handling Services
SOLIDserver allows you to completely disable a network service. While a network service is
disabled, it cannot run. Once a network service is enabled, its state is automatically updated after
having applied the configuration. To sum up, a user can easily handle the embedded services:
enabling/disabling and starting/stopping every service provided by SOLIDserver.
To enable/disable a service
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Services configuration. The page Services configuration
opens.
3. In the column Name, look for the service of your choice.
4. In the column Enabled:
a. To enable the service, click on Disabled. The wizard opens.
b. To disable the service, click on Enabled. The wizard opens.
5. Click on OK to complete the operation.
6. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
To start/stop a service
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Services configuration. The page Services configuration
opens.
3. In the column Name, look for the service of your choice.
4. In the column Running:
a. To start the service, click on Stopped. The wizard opens.
b. To stop the service, click on Started. The wizard opens.
5. Click on OK to complete the operation.
116
Configuring the Services
By default, only the account admin can access SOLIDserver via SSH.You cannot edit this account,
but you can edit its default password, admin, and its password level of security as detailed in the
sections below.
117
Configuring the Services
2. In the section Expert, click on Registry database. The page Registry database opens.
3. In the menu, select Tools > Configuration registry database.The wizard Configuration
of registry database opens.
4. Click on NEXT . The last page of the wizard opens.
5. In the drop-down list Security level of ssh password, select Low, Medium or Strong.
6. Click on OK to complete the operation. The report opens and closes.
The xfer account is not enabled and disabled like the services. Only one wizard allows to enable
and disable the account that manages the SFTP, SCP and RSYNC protocols.
You can enable uploads from remote appliances to SOLIDserver GUI. The uploaded files and
files available for download are listed on a dedicated page of the page Local files listing. For more
details, refer to the section Managing Files from the Local Files Listing.
118
Configuring the Services
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Services configuration. The page Services configuration
opens.
3. In the column Name, under the line TFTP server, click on Upload Authorization: Disabled.
The wizard TFTP File Upload Authorization opens.
4. Click on OK to complete the operation. The report opens and closes. The TFTP Upload
Authorizations status is now Enabled.
Once the uploads are enabled, following the procedure above disables them.
You can add an SMTP relay server and configure source email addresses, one can be dedicated
to mail notifications and the other to alerts.
You can also change the source email address of the outgoing mails and alerts notifications.
Note that you can only edit the source mail addresses locally.
119
Configuring the Services
5. Click on OK to complete the operation.The new address has now replaced the default address
in the list.
To eliminate these warning messages, you can change this certificate and use one that you
created or imported on the page All certificates. For more details, refer to the section Managing
SSL Certificates in the chapter Maintenance.
120
Configuring the Services
6. Click on OK to run the validity and configuration checks and complete the operation. During
these checks, a pop-up window may open and detail the checks progression. If it does, you
must accept the certificate to use the new SSL certificate.
If the checks fail, the operation is automatically rolled back and the certificate is not changed.
In this case, you need to import or create a valid certificate and follow this procedure again.
For more details on how to import or create certificates, refer to the section Managing SSL Certi-
ficates in the chapter Maintenance.
For more details, refer to the section Preparing the Module in the chapter Configuring Identity
Manager.
Keep in mind that to enable and configure the service DNS Guardian your appliance must have
at least 8 GB of RAM. For more details regarding DNS Guardian, refer to the part Guardian.
Note that if your license includes both DNS Guardian and DNS GSLB, you must configure the
line DNS Guardian / GSLB server as both features rely on the same service.
121
Configuring the Services
The DNS must be running as well. Make sure the services DNS Guardian and DNS server
(named) or DNS Guardian and DNS server (unbound) are both enabled and started.
Keep in mind that to enable and configure the service GSLB server your appliance must have at
least 8 GB of RAM. For more details regarding the configuration of applications with a GSLB
server, refer to the part Application.
Note that if your license includes both DNS Guardian and DNS GSLB, you must configure the
line DNS Guardian / GSLB server as both features rely on the same service.
122
Configuring the Services
To remove an interface from the list Selected interfaces, select it and click on . The inter-
face is moved back to the list Available interfaces.
6. Click on OK to complete the operation. The report opens and closes.
7. In the column Name, look for GSLB server or DNS Guardian / GSLB server.
8. In the column Enabled, click on Disabled to enable the service. The wizard opens.
9. Right now your configuration is pending. In the menu, select Tools > Apply configuration
to save your changes or Tools > Rollback configuration to discard them. The corres-
ponding wizard opens, click on OK to complete the operation. The page refreshes.
The DNS must be running as well. Make sure the services GSLB server and DNS server
(named / nsd / unbound) are both enabled and started.
On the page Services configuration, the columns Running and Enabled indicate the SNMP
server state. To enable, disable, start or stop the service, refer to the section Handling Services.
Note that SNMPv3 requires a properly configured NTP server. For more details, refer to the
section Configuring NTP Servers.
123
Configuring the Services
No matter what you select, the field Access is grayed out and displays Read-only.
b. If you left v1/v2c selected, complete the configuration via the following fields.
c. If you selected v3, complete the configuration via the following fields.
d. When the configuration is complete, click on ADD . The profile is moved to the SNMP
access list.
e. Repeat these actions for as many SNMP profiles as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
124
Configuring the Services
Parameter Description
Sends a trap Inform Allows to enable routers to send inform requests to SNMP managers. By default,
Yes is selected. This field is optional.
Host The IP address of the device that listens to the network and catches the trap.
Port The number of the port on the host used to catch the trap. This field is optional.
Community The community string that would act as a password to access the SNMP agent.
b. When your configuration is complete, click on ADD . The profile is moved to the Trap
list.
c. Repeat these actions for as many traps as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
If you are remotely managing other appliances, you can choose to download a local configuration
file or the configuration file of a remote appliance.
125
Part III. Imports and Exports
SOLIDserver supports many imports and exports methods in almost all the modules.
• Importing Data from a CSV File details how to import or reimport data from a CSV file in the modules
IPAM, DHCP, DNS, NetChange, Device Manager, VLAN Manager and Administration.
• Importing IPAM Data details how to import VitalQIP and Nortel NetID data to the module IPAM.
• Importing DHCP Data details how to import ISC, Alcatel-Lucent VitalQIP, Microsoft, Infoblox, MetaIP and
Nortel NetID configuration files to the module DHCP.
• Importing DNS Data details how to import BIND and VitalQIP zones from an archive file to the module
DNS.
• Exporting Data details how to export data from any module to CSV, HTML, XML, Excel or PDF files.
Note that the IPAM provides raw data export and import, it allows add or edit the database objects in bulk.
For more details, refer to the chapter Managing Raw Data.
Table of Contents
8. Importing Data from a CSV File .................................................................................. 128
The Import Wizard ................................................................................................. 129
Importing Data to the IPAM .................................................................................... 130
Importing Data to the DHCP .................................................................................. 145
Importing Data to the DNS ..................................................................................... 153
Importing Data to NetChange ................................................................................ 157
Importing Data to Device Manager ......................................................................... 159
Importing Data to VLAN Manager ........................................................................... 161
Importing Data to VRF ........................................................................................... 165
Importing Data to SPX ........................................................................................... 167
Importing Data to the Administration Module ........................................................... 171
Managing Import Templates ................................................................................... 174
9. Importing IPAM Data .................................................................................................. 176
Importing a VitalQIP Export ................................................................................... 176
Importing Nortel NetID IP Address Data ................................................................. 177
10. Importing DHCP Data .............................................................................................. 179
Importing an ISC DHCP Configuration .................................................................... 179
Importing an Alcatel-Lucent VitalQIP Configuration .................................................. 180
Importing a Microsoft DHCP Configuration .............................................................. 181
Importing an Infoblox DHCP Configuration .............................................................. 182
Importing a MetaIP DHCP Configuration ................................................................. 183
Importing a Nortel NetID Configuration ................................................................... 184
Aggregating DHCP Options from Ranges or Statics ................................................ 185
11. Importing DNS Data ................................................................................................. 187
Importing DNS Zones from a BIND Archive File ...................................................... 187
Importing DNS Zones from a VitalQIP Archive File .................................................. 188
12. Exporting Data ........................................................................................................ 190
The Export Wizard ................................................................................................ 192
Browsing the Exports Database ............................................................................. 192
Configuring Exports .............................................................................................. 193
Exporting Data to Reimport It Later ........................................................................ 195
Managing Scheduled Exports ................................................................................ 199
Managing Scheduled Exports Configuration Files .................................................... 200
Managing Export Templates ................................................................................... 200
127
Chapter 8. Importing Data from a CSV
File
You can massively import data from CSV formatted files in the modules IPAM, DHCP, DNS,
NetChange, Device Manager, VLAN Manager, VRF, SPX and Administration.
128
Importing Data from a CSV File
This section allows to specify the CSV import file details. They can be configured and saved
as templates to speed up the checking process. Its fields are detailed in the table CSV file
basic parameters.
This section contains some parameters (columns) that you can include in your import.
The first section of the import wizard is common to all objects and can be configured as follows.
129
Importing Data from a CSV File
Parameter Description
Template name The name of your New template. This name is available in the list Template the next time you
import the same resource. This field is required.
Save template Tick this box to save the changes made to an existing Template. This field is optional.
On the next page, Class parameters, there are as many drop-down lists as there are existing
class parameters and advanced properties for the resource you are importing. None of the lists
are required, they allow to import your parameters to the database one by one. Any class para-
meter that does not correspond to a class in the database is not displayed in the GUI once impor-
ted.
Finally, on the last page, CSV import parameters, a few options are available.
The drop-down list Existing records allows to decide if you want to replace or not existing
entries with the data you are importing.
The box Trigger the execution of all advanced properties allows to force the DNS, DHCP
and VLAN advanced property replication behaviors during the import of subnet-type networks,
pools and addresses. For more details, refer to the section Importing Data to the IPAM
The button CHECK performs a data validity check of the content of the CSV file. The last
pages of the wizard provide a Report: a data validity report and an import report.
The table below details where you can import them within the module.
130
Importing Data from a CSV File
Table 8.2. IPAM pages where you can import CSV files
IPAM page Objects that can be imported Option name in the menu Import
All spaces Spaces CSV spaces
Block-type networks CSV networks (block)
Subnet-type networks CSV networks (subnet)
Pools CSV pools
Addresses CSV addresses
IPv6 block-type networks CSV networks (block v6)
IPv6 subnet-type networks CSV networks (subnet v6)
IPv6 pools CSV pools (v6)
IPv6 addresses CSV addresses (v6)
All networks Block-type networks CSV networks (blocks)
Subnet-type networks CSV networks (subnets)
Pools CSV pools
IP Addresses CSV addresses
All networks (v6) IPv6 block-type networks CSV networks (block v6)
IPv6 subnet-type networks CSV networks (subnet v6)
IPv6 pools CSV pools (v6)
IPv6 addresses CSV addresses (v6)
All pools Pools CSV pools
Addresses CSV addresses
All pools (v6) IPv6 pools CSV pools (v6)
IPv6 addresses CSV addresses (v6)
All addresses Addresses CSV addresses
All addresses (v6) IPv6 addresses CSV addresses (v6)
To import VitalQIP or Nortel NetID data, refer to the chapter Importing IPAM Data.
To import SPX data, whether RIPE or APNIC, refer to the section Importing Data to SPX
To import or reimport IPAM objects exported as raw data to update your database in bulk, refer
to the chapter Managing Raw Data in the part IPAM.
Importing Spaces
When importing space(s), only the field Name is required. The other parameters are optional
and can be left empty.
131
Importing Data from a CSV File
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results.The last page opens.and displays a
report indicating the total number of spaces actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All spaces. The spaces are now listed.
Importing Networks
You can import block-type networks or subnet-type networks in IPv4 or IPv6.
132
Importing Data from a CSV File
When importing a file containing any type of network, the field First address and one of the fields
specifying the network size are required - Last address, Netmask, Prefix or Size.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
133
Importing Data from a CSV File
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of networks actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page All networks. The networks are now listed.
When importing a file containing any type of network, the field First address and one of the fields
specifying the network size are required - Last address, Netmask, Prefix or Size.
134
Importing Data from a CSV File
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of networks actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the list All networks. The networks are now listed.
135
Importing Data from a CSV File
Note that you cannot tick the box and specify a VLSM space name in one import. If you do,
the VLSM space name prevails and the option Imbricated networks is ignored. You can
configure them in two separate imports if you need them both in your network configuration.
If you want to import an organization without ticking the box, the subnet-type networks are
imported in a container Orphan Networks in the order saved in the CSV file. The first are
imported, the rest is considered overlap and is not imported.
If you import an organization and tick the box, the receiving container shapes the import be-
havior:
• If the selected Space name does not contain any block-type network to receive it, the first
non-terminal subnet-type network becomes a block-type network.
• If the selected Space name contains block-type networks:
• If an existing block-type network is bigger than the first non-terminal subnet-type network,
the whole hierarchy is added within the block-type network if there is enough space
available. Otherwise, only the subnet-type networks that fit in the block-type network are
imported.
• If an existing block-type network is the same size as the first non-terminal subnet-type
network, the first non-terminal subnet-type network is ignored. The subnet-type networks
it contains are imported in the block-type network if it can receive them. Otherwise, only
the subnet-type networks that fit in the block-type network are imported.
When importing a file containing any type of network, the field First address and one of the fields
specifying the network size are required - Last address, Netmask, Prefix or Size.
If you import IPv4 subnet-type networks on the page All networks (rather than within a specific
space or block-type network), the option Use best space is available in the drop-down list Space
name. It allows to put the content of the CSV file into the space containing the smallest block-
type network able to receive the subnet-type network(s). Other options are detailed in the section
Subnet-type Networks Import Specificities.
136
Importing Data from a CSV File
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
the configuration set on the page Class parameters and/or on the properties inherited
from higher level(s), they can include properties impacting the IPAM, DNS, DHCP and
VLAN Manager. For more details, refer to the section Network Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the subnet-type networks of your choice and in the menu select Tools > Expert >
Initialize rules. This operation also triggers the replication on the objects they contain.
137
Importing Data from a CSV File
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of networks actually imported.
If you want to download that import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All networks. The networks are now listed.
When importing a file containing any type of network, the field First address and one of the fields
specifying the network size are required - Last address, Netmask, Prefix or Size.
Note that in IPv6, the option Use best space is not available in the drop-down list Space name.
Available options are detailed in the section Subnet-type Networks Import Specificities.
138
Importing Data from a CSV File
Parameter Description
Class parameters All the class parameters declared in a single line, in URL format. The information you
specify in this drop-down list overwrites any class parameter you may specify on the
page Class parameters. This field is optional.
VLSM space name If you set up a space-based VLSM organization, select the sub space that uses the
subnet-type network you are importing as a block-type network. This field is optional.
Note that if you tick the box Imbricated networks, you must leave this field empty.
Space name The name of the space where you want to import the network(s). It can be a space of
the import file or an existing space in in the IPAM. This field is required.
Class name The network class name. This field is optional.
Imbricated networks Tick this box if you want to import a hierarchy of non-terminal and terminal subnet-
type networks. Note that if you tick this box, you should leave blank the fields Network
is terminal and VLSM space name.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
the configuration set on the page Class parameters and/or on the properties inherited
from higher level(s), they can include properties impacting the IPAM, DNS, DHCP and
VLAN Manager. For more details, refer to the section Network Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the subnet-type networks of your choice and in the menu select Tools > Expert >
Initialize rules. This operation also triggers the replication on the objects they contain.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of networks actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All networks. The networks are now listed.
Importing Pools
Before importing pools keep in mind that you cannot import pools in an empty space, you
must specify a space containing terminal networks that can receive them.
139
Importing Data from a CSV File
If you import IPv4 pools on the page All networks (rather than within a specific space or block-
type network), the option Use best space is available in the drop-down list Space name. It allows
to put the content of the CSV file into the space containing the smallest network able to receive
the pool(s).
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . Each available drop-down list is named after a
class parameter or advanced property. All the fields are optional.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
the configuration set on the page Class parameters and/or on the properties inherited
140
Importing Data from a CSV File
from higher level(s), they can include the IPAM to DHCP replication. For more details,
refer to the section Pool Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the pools of your choice and in the menu select Tools > Expert > Initialize rules.
This operation also triggers the replication on the IP addresses they contain.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The The last page opens.and displays
a report indicating the total number of pools actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All pools. The pools are now listed.
Note that in IPv6, the option Use best space is not available in the drop-down list Space name.
141
Importing Data from a CSV File
Parameter Description
Space name The name of the space where you want import the pool(s). It can be a space of the
import file or an existing space in the IPAM. This field is required.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . Each available drop-down list is named after a
class parameter or advanced property. All the fields are optional.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
the configuration set on the page Class parameters and/or on the properties inherited
from higher level(s), they can include the IPAM to DHCP replication. For more details,
refer to the section Pool Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the pools of your choice and in the menu select Tools > Expert > Initialize rules.
This operation also triggers the replication on the IP addresses they contain.
10. Click on CHECK . The The next page opens and displays a report indicating the total amount
of correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The The last page opens.and displays
a report indicating the total number of pools actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All pools. The pools are now listed.
Importing IP Addresses
Keep in mind that you can import addresses in an empty space, they are saved in a container
Orphan Addresses.
142
Importing Data from a CSV File
6. Specify the format of the import file using the fields Delimiter, Enclosure, Input format,
Skip the first line and set in as a Template if you want. For more details, refer to the table
CSV file basic parameters.
7. Select the columns of your CSV file you want to import.
The fields IP address, Name and Space name are required. All fields are detailed in the
table below.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
the configuration set on the page Class parameters and/or on the properties inherited
from higher level(s), they can include properties impacting the IPAM, DNS, DHCP and
Device Manager. For more details, refer to the section IP Address Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the IP addresses of your choice and in the menu select Tools > Expert > Initialize
rules.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of addresses actually imported.
143
Importing Data from a CSV File
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All addresses. The IP addresses are now listed.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page CSV import parameters opens:
a. In the drop-down list Existing records, select either Replace to overwrite the existing
records that have the same name or Don't replace to add the items to the listing. Don't
replace is selected by default.
b. Tick the box Trigger the execution of all advanced properties if you want to force
the advanced property mechanisms during the import. These mechanisms depend on
144
Importing Data from a CSV File
the configuration set on the page Class parameters and/or on the properties inherited
from higher level(s), they can include properties impacting the IPAM, DNS, DHCP and
Device Manager. For more details, refer to the section IP Address Advanced Properties.
After the import, you can still trigger the execution of the configured mechanisms. Tick
the IP addresses of your choice and in the menu select Tools > Expert > Initialize
rules.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of addresses actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All addresses. The IP addresses are now listed.
Table 8.12. DHCP pages where you can import CSV files
DHCP page Objects that can be imported Option name in the menu Import
All scopes Scopes CSV scopes
Ranges CSV ranges
Statics CSV statics
All scopes (v6) IPv6 scopes CSV scopes (v6)
IPv6 ranges CSV ranges (v6)
IPv6 statics CSV statics (v6)
All ranges Ranges CSV ranges
All ranges (v6) IPv6 ranges CSV ranges (v6)
All statics Statics CSV statics
All statics (v6) IPv6 statics CSV statics (v6)
145
Importing Data from a CSV File
To import an ISC, Alcatel-Lucent VitalQIP, Microsoft, Infoblox, MetaIP or Nortel NetID configuration,
refer to the chapter Importing DHCP Data.
Importing Scopes
You can import several scopes coming from different DHCP configurations into the same server.
If you plan on importing scopes into different servers, make sure that your CSV file contains a
column dedicated to the server name.
146
Importing Data from a CSV File
9. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
10. Click on NEXT . The page DHCP options opens. All the fields are optional, choose the data
you want to import. For more details, refer to the chapter Managing DHCP Options.
11. Click on NEXT . The page CSV import parameters opens.
12. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
13. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
15. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of scopes actually imported.
If you want to download the import report refer to the next step, otherwise go to step 17.
16. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
17. Click on CLOSE to go back to the page All scopes. The scopes are now listed.
147
Importing Data from a CSV File
9. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
10. Click on NEXT . The page DHCP options opens. All the fields are optional, choose the data
you want to import. For more details, refer to the chapter Managing DHCP Options.
11. Click on NEXT . The page CSV import parameters opens.
12. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
13. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
15. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of scopes actually imported.
If you want to download the import report refer to the next step, otherwise go to step 17.
16. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
17. Click on CLOSE to go back to the page All scopes. The scopes are now listed.
Importing Ranges
From the page All ranges, you can import IPv4 and IPv6 ranges. These ranges must be imported
within an existing scope.
148
Importing Data from a CSV File
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
9. Click on NEXT . The page DHCP options opens. All the fields are optional, choose the data
you want to import. For more details, refer to the chapter Managing DHCP Options.
10. Click on NEXT . The page CSV import parameters opens.
11. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
12. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
149
Importing Data from a CSV File
14. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of ranges actually imported.
If you want to download the import report refer to the next step, otherwise go to step 16.
15. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
16. Click on CLOSE to go back to the page All ranges. The ranges are now listed.
When importing a file containing IPv6 range(s), the fields Start address, End address and DHCP
server (v6) are required.
150
Importing Data from a CSV File
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The page Import data from a CSV
file opens and displays a report indicating the total number of ranges actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All ranges. The ranges are now listed.
Importing Statics
From the page All statics, you can import IPv4 and IPv6 static reservations. These statics can
be imported in a DHCP server or group.
If you are importing statics with IP address in a DHCP server, keep in mind that they are managed
like leases by the server. For more details, refer to the section Adding DHCPv4 Statics.
151
Importing Data from a CSV File
Field Description
DHCP server The name of the server where you want to import the static. At the bottom of the
list of columns of the CSV file, the existing servers are also listed, select the
server where you want to import the static(s). This field is required.
8. Click on NEXT . The page DHCP options opens. All the fields are optional, choose the data
you want to import. For more details, refer to the chapter Managing DHCP Options.
For EfficientIP DHCP servers, you can specify the Option host-name and leave the field
DHCP static name empty to use the value of the option as the name of the static.You should
specify either the DHCP static name or the Option host-name.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of statics actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page All statics. The static reservations are now listed.
152
Importing Data from a CSV File
8. Click on NEXT . The page DHCP options opens. All the fields are optional, choose the data
you want to import. For more details, refer to the chapter Managing DHCP Options.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of statics actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page All statics. The static reservations are now listed.
Table 8.19. DNS pages where you can import CSV files
DNS page Objects that can be imported Option name in the menu Import
All zones Zones CSV zones
All RRs Resource records CSV RRs
All RPZ rules RPZ rules CSV RPZ Rules
153
Importing Data from a CSV File
• The advanced properties can automate the addition of entries in your database after the import.
If all the advanced properties are activated, importing DNS data may automatically update the
IPAM and DHCP databases. If you do not want your import to impact other modules, edit the
Internal module setup before importing DNS data. For more details, refer to the chapter Man-
aging Advanced Properties.
To import zones from a BIND or VitalQIP archive file, refer to the chapter Importing DNS Data.
Importing Zones
When importing a file containing zone(s), the fields DNS zone name, DNS zone type and DNS
server name are required.
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
154
Importing Data from a CSV File
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of zones actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All zones. The zones are now listed.
155
Importing Data from a CSV File
Parameter Description
Class parameters All the class parameters declared in a single line, in URL format. The information you
specify in this drop-down list overwrites any class parameter you may specify on the
page Class parameters. This field is optional.
Class name The RR class name. This field is optional.
Zone name The name of the zone where you want to import the record. This field is optional.
DNS view The name of the view where you want to import the record. This field is optional.
DNS server The name of the server where you want to import the record. This field is optional.
When importing a file containing RPZ rules, the fields RR name, Value 1 and RR type are re-
quired.
156
Importing Data from a CSV File
Table 8.23. NetChange pages where you can import CSV files
NetChange page Objects that can be imported Option name in the menu Import
All network devices Network devices CSV file
157
Importing Data from a CSV File
2. In the menu, select Import > CSV network devices. The wizard Import a CSV file
opens.
3. Click on BROWSE to select the CSV file to import. The selected file is visible in the field File
name.
4. Click on NEXT . The page CSV fields association appears.
5. Specify the format of the import file using the fields Delimiter, Enclosure, Input format and
Skip the first line. For more details, refer to the table CSV file basic parameters.
6. The fields Address and Target space are required. All fields are detailed in the table below.
7. You can tick the box Expert mode to review and specify more details regarding the device(s)
information retrieval.
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . Each available drop-down list is named after a
class parameter or advanced property. All the fields are optional.
You must select a Target space and you can tick the Expert mode, both fields are described
in the previous step.
9. Click on NEXT . The last page opens.
158
Importing Data from a CSV File
You can select the SNMP profile(s) to use to access the SNMP agent on the devices, if they
are not associated with a version or community string in the CSV file. If you do not select
any profile, the default profile standard v2c is used.
It is the only way to specify authentication parameters in SNMPv3.
10. Click on OK to complete the operation. The Report opens and work for a while: the import
progression is visible. Once the import is over, the report lists the IP addresses imported as
well as the existing ones.
If you want to download the import report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
12. Click on CLOSE to go back to the page All network devices. The devices are now listed.
Table 8.27. Device Manager pages where you can import CSV files
Device Manager page Objects that can be imported Option name in the menu Import
All devices Devices CSV devices
Ports and/or interfaces CSV interfaces
All ports & interfaces Ports and/or interfaces CSV interfaces
Before importing, keep in mind that the ports and interfaces procedure below is based on imports
made on the page All ports & interfaces. You can also import the objects from the page All
ports & interfaces of a specific device, in which case the field Device is not displayed in the
wizard.
Importing Devices
When importing a file containing device(s), only the field Name is required.
159
Importing Data from a CSV File
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of devices actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All devices. The devices are now listed.
160
Importing Data from a CSV File
5. Specify the format of the import file using the fields Delimiter, Enclosure, Input format,
Skip the first line and set in as a Template if you want. For more details, refer to the table
CSV file basic parameters.
6. Select the columns of your CSV file you want to import.
Only the field Name is required. All fields are detailed in the table below.
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of ports and/or interface(s) actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All ports & interfaces. The ports and interfaces are
now listed.
161
Importing Data from a CSV File
Table 8.30. VLAN Manager pages where you can import CSV files
VLAN Manager page Objects that can be imported Option name in the menu Import
All domains Domains CSV domains
Ranges CSV ranges
VLANs or VXLANs CSV VLANs
All ranges Ranges CSV ranges
VLANs or VXLANs CSV VLANs
All VLANs VLANs or VXLANs CSV VLANs
Before importing, keep in mind that the range and VLAN procedure below is based on imports
made on the page All ranges and All VLANs. You can also import the objects from each page
of a specific domain, in which case the field Domain is not displayed in the wizard.
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
162
Importing Data from a CSV File
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of domains actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All domains. The VLAN domains are now listed.
163
Importing Data from a CSV File
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of VLAN ranges actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All ranges. The VLAN ranges are now listed.
164
Importing Data from a CSV File
Parameter Description
Domain The name of the domain where you want to import the VLAN or VXLAN. This field is
required.
Table 8.34. VRF pages where you can import CSV files
VRF page Objects that can be imported Option name in the menu Import
All VRFs VRFs CSV VRFs
VRF Route Targets CSV VRF Route Targets
All VRF Route Targets VRF Route Targets CSV VRF Route Targets
Before importing, keep in mind that the route target procedure below is based on imports made
on the page All route targets. You can also import objects from the page All route targets of
a VRF, in which case the field VRF name is not displayed in the wizard.
Importing VRFs
When importing VRF(s), the fields VRF name and VRF RD are required.
165
Importing Data from a CSV File
7. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . If you did not specify any class parameter on
the previous page, you can specify one by one the elements to import. Each available drop-
down list is named after a class parameter or advanced property. All the fields are optional.
Note that if you have already specified parameters in the field Class parameters on the
previous page, all the choices made on this page are ignored.
8. Click on NEXT . The page CSV import parameters opens.
9. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
10. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 12.
11. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
12. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of VRFs actually imported.
If you want to download the import report refer to the next step, otherwise go to step 14.
13. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
14. Click on CLOSE to go back to the page All VRFs. The VRFs are now listed.
166
Importing Data from a CSV File
5. Specify the format of the import file using the fields Delimiter, Enclosure, Input format,
Skip the first line and set in as a Template if you want. For more details, refer to the table
CSV file basic parameters.
6. Select the columns of your CSV file you want to import.
The fields Source RD of the VRF Route Targets and Target RD of the VRF Route Targets
are required. All fields are detailed in the table below.
From the IPAM page All networks you can import SPX allocated and assigned networks.
Table 8.37. IPAM pages where you can import SPX allocated and assigned networks
IPAM page Objects that can be imported Option name in the menu Import
All spaces SPX allocated networks SPX allocated networks
SPX assigned networks SPX assigned networks
IPv6 SPX allocated networks SPX allocated networks (v6)
IPv6 SPX assigned networks SPX assigned networks (v6)
All networks SPX allocated networks SPX allocated networks
SPX assigned networks SPX assigned networks
167
Importing Data from a CSV File
IPAM page Objects that can be imported Option name in the menu Import
All networks (v6) SPX IPv6 allocated networks SPX allocated networks (v6)
SPX assigned networks (v6) SPX assigned networks (v6)
From the Administration page All users you can import SPX users, i.e. persons.
Table 8.38. Administration page where you can import SPX users
Administration page Objects that can be imported Option name in the menu Import
Users SPX users SPX persons
From the SPX page All AS Numbers you can import SPX aut-nums.
Table 8.39. SPX page where you can import CSV files
SPX page Objects that can be imported Option name in the menu Import
All AS Numbers SPX aut-nums SPX aut-nums
Note that:
• Following the IPAM hierarchy, your allocated network(s) must belong to a space.
• You can upload the file ripe.db.inetnum to the Local files listing to speed up the import process.
In the import wizard, the box Use the "ripe.db.inetnum" file stored in the Local files listing allows
you to import the assigned networks from the file locally stored, rather than connecting to the
RIPE or APNIC to obtain the data. For more details regarding how to upload a file to the Local
files listing, refer to the section Managing Files from the Local Files Listing.
168
Importing Data from a CSV File
Note that you can import or add assigned networks to the allocated network(s) you imported. To
import them go to the next section, to add them refer to the chapter Managing SPX Networks.
Note that you can upload the file ripe.db.inetnum to the Local files listing to speed up the import
process. In the import wizard, the box Use the "ripe.db.inetnum" file stored in the Local files listing
allows you to import the assigned networks from the file locally stored, rather than connecting to
the RIPE or APNIC to obtain the data. For more details regarding how to upload a file to the
Local files listing, refer to the section Managing Files from the Local Files Listing.
Once you imported your network objects, editing the content of your assigned networks follows
the same procedures as regular assigned networks. For more details, refer to the chapters
Managing Pools and Managing IP Addresses.
169
Importing Data from a CSV File
8. In the drop-down list PI Assigned network class, you can choose a class if you manage
assigned networks of Provider Independent IP addresses.
9. Click on OK to complete the operation. The report opens and closes, the page refreshes.
The assigned networks are listed.
Once you imported your assigned networks, you can edit them from the GUI. Any change is sent
to the RIPE or APNIC via POST.
You can add a group for your SPX persons to gather them but, unlike standard users managed
via the appliance, there is no need to grant them specific rights.
The SPX persons listed on the page Users do not have access to the appliance if you do not
grant them rights (through the group they belong to) or configure credentials for them.
Importing of AS Numbers also imports AS routing policies. The routing policy is described by
enumerating all neighboring AS Number with which routing information is exchanged, they are
all listed in the page All policies. For each neighbor, the routing policy is described in terms of
170
Importing Data from a CSV File
exactly what is being sent (announced) and allowed (accepted). That way, each aut-num contains
policies that describes what can be implemented and enforced locally by said AS Number.
Keep in mind the page All policies is accessible from the page All AS Numbers. You can access
it through the breadcrumb.
Table 8.40. Administration pages where you can import CSV files
Administration page Objects that can be imported Option name in the menu Import
Groups Groups of users CSV groups
Users Users CSV file
Custom data Custom data CSV custom data
To import RIPE or APNIC users, i.e. persons, refer to the section Importing SPX Persons.
171
Importing Data from a CSV File
8. If classes are enabled and/or if advanced properties are available, the page Class parameters
opens when you click on NEXT . Each available drop-down list is named after a class para-
meter or advanced property. All the fields are optional.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of groups actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page Groups. The groups are now listed.
Importing Users
When importing a file containing user(s), only the field Login is required.
To import RIPE or APNIC users, i.e. persons, refer to the section Importing SPX Persons.
172
Importing Data from a CSV File
8. If custom classes are enabled and/or if advanced properties are available, the page Class
parameters opens when you click on NEXT . Each available drop-down list is named after a
class parameter or advanced property. All the fields are optional.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of users actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page Users. The users are now listed.
173
Importing Data from a CSV File
7. Specify the format of the import file using the fields Delimiter, Enclosure, Input format,
Skip the first line and set in as a Template if you want. For more details, refer to the table
CSV file basic parameters.
8. Select the columns of your CSV file you want to import.
Only the field Value 1 is required. There are in total 10 fields named Value 1 through to
Value 10.
9. Click on NEXT . The page CSV import parameters opens.
10. In the drop-down list Existing records, select either Replace to overwrite the existing records
that have the same name or Don't replace to add the items to the listing. Don't replace is
selected by default.
11. Click on CHECK . The next page opens and displays a report indicating the total amount of
correct lines within the file.
If you want to download the validity report refer to the next step, otherwise go to step 13.
12. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
validity report in the specified file format.
13. Click on OK to accept the validity check report results. The last page opens.and displays a
report indicating the total number of custom data entries actually imported.
If you want to download the import report refer to the next step, otherwise go to step 15.
14. In the section Export format of the wizard, click on TEXT , HTML , or EXCEL to download the
import report in the specified file format.
15. Click on CLOSE to go back to the page Custom data. The entries are now listed.
The content of the page depends on the module you access it from. Each template has a unique
Name, specific Type and applies to a specific Object of the module.
To edit a template, you must select it during an import and save your changes. For more details,
refer to the table CSV file basic parameters.
174
Importing Data from a CSV File
2. In the menu, select Extra options > Templates management. The page All templates
opens. It only contains the templates added in the module.
Ancienne taille de la page
175
Chapter 9. Importing IPAM Data
SOLIDserver offers several ways of importing existing IP addresses organizations without having
to recreate them manually in the GUI.
1
The classes listed were added and enabled on the page Class Studio and apply to the IPAM networks. For more details, refer to the
chapter Configuring Classes.
176
Importing IPAM Data
8. In the drop-down list Network (subnet) class, select an existing class to be applied to the
subnet-type networks you are importing. If no class exists or is enabled, only None is listed.
9. Click on OK to complete the operation. The report opens and closes. The data is listed ac-
cording to your import configuration.
To avoid missing any parameters or losing any data, we recommend that you follow the module
hierarchy during these imports in an existing space: block-type networks, subnet-type networks
and finally IP addresses .
For more details regarding CSV imports, refer to the section Importing Data to the IPAM in the
chapter Importing Data from a CSV File.
Table 9.1. Nortel NetID network fields name when importing networks
Nortel NetID field SOLIDserver field
Network number First address
Network name Name
Subnet type -
CIDR mask -
Subnet mask Netmask
For more details regarding CSV imports, refer to the section Importing Data to the IPAM in the
chapter Importing Data from a CSV File.
Table 9.2. Nortel NetID subnet fields name when importing networks
Nortel NetID field SOLIDserver field
Network number Address
Network name Name
Subnet type -
CIDR mask -
Subnet mask Netmask
For more details regarding CSV imports, refer to the section Importing Data to the IPAM in the
chapter Importing Data from a CSV File.
177
Importing IPAM Data
Table 9.3. Nortel NetID host addresses fields name when importing networks
Nortel NetID field SOLIDserver field
Host address IP address
Domain name Domain
Client ID -
MAC address MAC address
ClMAC type -
Custom fields -
For more details regarding CSV imports, refer to the section Importing Data to the IPAM in the
chapter Importing Data from a CSV File.
178
Chapter 10. Importing DHCP Data
You can import into EfficientIP DHCP servers the data, configuration file, of the following external
vendors:
• ISC configuration files.
• Alcatel-Lucent VitalQIP configuration files.
• Microsoft configuration files.
• Infoblox configuration files.
• MetaIP configuration files.
• Nortel NetID configuration files.
Keep in mind that the ISC import has the following restrictions:
• Scopes restriction: if the server you are importing contains overlapping scopes, only the first
scope is imported, the rest is ignored.
• Statics restriction: statics associated with an IP address not included in one the imported
scopes are ignored.
179
Importing DHCP Data
180
Importing DHCP Data
Keep in mind that Microsoft servers have some specificities and limitations:
• EfficientIP and Microsoft servers display ranges differently. On the page All ranges, the imported
data may vary because:
• No exclusion ranges are imported. Rather than having one range set with exclusions, the
page contains as many ranges as necessary to manage all the IP addresses that do not
belong to a Microsoft exclusion range.
181
Importing DHCP Data
182
Importing DHCP Data
• The import relies on a configuration file named dhcpd.conf that can contain the whole server
configuration.
It can add scopes, ranges, leases, statics, groups and DHCP options.
• You can import several configuration files one after the other in one DHCP server, to merge
different configurations in one server. However, no data is deleted between the imports even
if the imported configurations conflict with one another. Therefore, if two files contain a common
scope with different names, the name of the first scope imported is overwritten by the new
scope managing the same addresses.
• Before switching to the new DHCP server we recommend reducing the lease time to
one hour to minimize the risk of duplicating IP address assignments during the transition to
SOLIDserver. That way, once you turn off the legacy server, the DHCP clients unable to renew
their lease can broadcast their first DISCOVER message and get an answer from the new
server within the hour.
Keep in mind that the Infoblox import has the following restrictions:
• Scopes restriction: if the server you are importing contains overlapping scopes, only the first
scope is imported, the rest is ignored.
• Statics restriction: statics associated with an IP address not included in one the scopes you
are importing are ignored.
• Shared network restriction: shared network options are ignored.
• DHCP options restriction: only standard options are imported. If the server was configured
using non standard DHCP options, they are imported only if they were previously defined either
in the configuration file or within the SOLIDserver.
• Failover restriction: Failover channels are not imported.
• Infoblox options restriction: all Infoblox options are ignored (these options usually include
"infoblox" in their name).
• You cannot import an Infoblox configuration in a Split-Scope or a Stateless smart architecture.
You can only import it a One-to-One, One-to-Many or Single-Server smart architecture.
183
Importing DHCP Data
It can add scopes, ranges, leases, statics, groups and DHCP options.
• You can import several configuration files one after the other in one DHCP server, to merge
different configurations in one server. However, no data is deleted between the imports even
if the imported configurations conflict with one another. Therefore, if two files contain a common
scope with different names, the name of the first scope imported is overwritten by the new
scope managing the same addresses.
• Before switching to the new DHCP server we recommend reducing the lease time to
one hour to minimize the risk of duplicating IP address assignments during the transition to
SOLIDserver. That way, once you turn off the legacy server, the DHCP clients unable to renew
their lease can broadcast their first DISCOVER message and get an answer from the new
server within the hour.
Keep in mind that the MetaIP import has the following restrictions:
• Scopes restriction: if the server you are importing contains overlapping scopes, only the first
scope is imported, the rest is ignored.
• Statics restriction: statics associated with an IP address not included in one the scopes you
are importing are ignored.
• Shared networks restriction: shared network options are ignored.
• DHCP options restriction: only standard options are imported. If the server was configured
using non standard DHCP options, they are imported only if they were previously defined either
in the configuration file or within the SOLIDserver. You can configure conditional options after-
ward using the DHCP ACLs.
184
Importing DHCP Data
• Before switching to the new DHCP server we recommend reducing the lease time to
one hour to minimize the risk of duplicating IP address assignments during the transition to
SOLIDserver. That way, once you turn off the legacy server, the DHCP clients unable to renew
their lease can broadcast their first DISCOVER message and get an answer from the new
server within the hour.
8. Click on OK to complete the operation. The report opens and closes. The file content is listed.
185
Importing DHCP Data
3. If one DHCP option is configured on all the ranges or statics with IP address of a scope, but
their value is not the same on all the objects, the option is not aggregated at scope level.
186
Chapter 11. Importing DNS Data
You can use archive files to import zones and records of the following external vendors into Effi-
cientIP DNS servers:
• BIND archive files.
• VitalQIP archive files.
Prerequisites
• The archive file must be imported in a DNS server, preferably an EfficientIP server, an Effi-
cientIP Package server or a smart architecture.
• The archive file must contain all the directories of your BIND configuration including: the
file named.conf, the zone files and any other necessary files whether they belong to the same
directory or other sub directories.
• The archive file must have one of the following extensions: .tar, .tgz, .gz or .zip . It is not ne-
cessary to change the directory paths of your zone files in the file named.conf , if you are not
able to provide the whole directory organizations in the archive file, the system can retrieve
the files in the archive (several zone files may use the same name in different directories).
Limitations
• You cannot use the characters "_", "@" and ":" when importing a BIND archive file. Make
sure you did not use any of these characters in zone names, record names, etc. as it would
trigger either parsing errors (and not import the file) or import everything but the line containing
these characters. For more details, refer to the RFC 1034Domain Names - Concepts and Fa-
cilities.
• The archive must only contain supported BIND options. Any non-supported BIND option
declared in the archive file is ignored. Once the archive file is imported, you can configure
these extra options following the appendix Configuring Non-Supported BIND Options.
• The file named.conf can contain include directives linking to other files if any include directive
is declared outside existing clauses. Any include directive declared within existing clauses
like option {}, zone {}, etc. is ignored. The file(s) declared in the directive include must be part
of the archive file.
• The archive cannot contain the directive $GENERATE, this directive is not supported.
187
Importing DNS Data
10. Click on CLOSE to go back to the page All zones. The zones are now listed.
This import relies directly on the BIND zone file itself, <zone-name>, without extension located
in the DNS database.
188
Importing DNS Data
Note that the import file includes VitalQIP DNS as well as IPAM data at the same time. If the
archive file includes *_aud.qef files the import might take longer.
189
Chapter 12. Exporting Data
Within SOLIDserver, exporting data follows a set of rules:
• The object parameters that you can export correspond to the columns of the page
That way, on the one hand you can export the name of the object container: if you export a list
of zones you can also export the name of the server and view they belong to. And on the other
hand, you can export the customized parameters that you added through Class Studio and
displayed as columns.These columns are preceded by the mention Class param: in the wizard.
• An export is generated one level at a time
If you are exporting zones from the page All zones in the DNS, you only export the zones
themselves but not the RRs they contain.
• An export can be generated in five different formats
You can export lists of objects in .csv, .html, .xml, .xls and .pdf. Only the .csv file format provides
the possibility to reimport the list again in the GUI.
Keep in mind that for exports to PDF the number of columns is limited to 40. That many columns
affects the final display and might generate a file very hard to read.
• An export can take into account from 1 to n objects
On any page, exporting data takes into account every object listed. However, if you tick one
or more elements, only the parameters of the ones you ticked are exported.
• An export can be done at a specific time or scheduled to be generated regularly
From the export wizard, you can choose to export the data right away or later on, even on a
regular basis and at the frequency of your choosing.
• An export name provides time and format information
An export is always named after its format and moment of generation, never after what it con-
tains. Each export is named as follows: export_<extension>_<date>_<time>.<extension>.
Where extension refers to the export format; date is displayed as such: YYYYMMDD and time
as such: HHMMSS. For instance, "export_excel_20130301_073042.xls" is an export generated
in EXCEL on March 1st, 2013 at 07:30:42.
• If the page does not have the menu Report, you cannot export the data listed
Within SOLIDserver, almost any page allows to export data. To see the whole list of pages
where you can export data, refer to the section Pages where you can export data below.
All exports are displayed on a single page, however the configuration files of the scheduled exports
are displayed on their own page.
You can also import or reimport IPAM objects exported as raw data to update your database in
bulk. For more details refer to the chapter Managing Raw Data.
190
Exporting Data
You can export data from almost any page. The menu Report indicates which pages are con-
cerned:
191
Exporting Data
The drop-down list Template allows to save all your configuration as a template for later
exports of the list.
The drop-down list Delimiter allows to select which delimiter you want to use during the
CSV data export.
The box The export might be reimported allows to export the objects as raw data if you
want to reimport them.
The drop-down list Action allows to export right away your list or schedule the export it at
the frequency of your choice.
The list Columns allows to select the columns, i.e. parameters, of your choice. This list
contains all the columns that you can display on the page as well as the class parameters
related to the objects of the list.
The list Selected contains all the columns you are about to export, you can order them ac-
cording to your needs.
The box Translate the columns name allows to export columns using their name in the
GUI, when they are displayed on the page. It takes into account the interface Language.
Only the scheduled exports are available on the page Local files listing.The schedule configuration
is available on the page Scheduled exports.
192
Exporting Data
Configuring Exports
The export can be of numerous forms as you can choose an export format, to schedule it or not
and finally save your columns configuration in a template and later on use the template as is or
use it as a basis during another export.
193
Exporting Data
8. In the list Selected, you can order the columns according to your needs using and . To
remove a column from the export, select it and click on . It is moved back to the list
Columns.
9. The box Translate the columns name is ticked by default. If you do not want to export the
columns name as they are displayed in the GUI, untick the box.
10. Click on OK to complete the operation. The report opens and works for a while.
11. You can click on DOWNLOAD to save the export. The page refreshes when the export is over.
12. Click on CLOSE to go back to the page.
From the menu Report you can also schedule exports. Keep in mind that these exports are
managed differently, the generated file is available in the Local files Listing. In addition,
scheduling an export adds a configuration file that you can manage from the page Scheduled
exports. For more details, refer to the section Managing Scheduled Exports Configuration Files
below.
To schedule an export
1. Go to the page of your choice.
2. Tick the objects of your choice or none if you want to export the whole list.
3. In the menu, select Report > Export > <format of your choice>. The wizard Export
<format> file opens.
4. In the drop-down list Template, you can:
a. Choose not to add a template by selecting None and export your data.
b. Choose to add a template by selecting New template.The field Template name appears,
name your template. The template saves the columns you select as well as the delimiter
if you export the list in a .csv file.
5. If you chose to export a CSV file:
a. In the drop-down list Delimiter, select comma, semi-colon or tab. By default, comma is
selected.
b. Tick the box The export might be reimported to export the list or selected objects as
raw data. The exported file is faster to reimport in a SOLIDserver appliance.
Note that some columns, like Network is terminal in the IPAM, might not be reimported
at all if you do not tick this box.
6. In the drop-down list Action, select Schedule the report. The page refreshes.
7. In the list Columns, select one by one the columns that you want to export and click on .
They are moved to the list Selected.
8. In the list Selected, you can order the columns according to your needs using and . To
remove a column from the export, select it and click on . It is moved back to the list
Columns.
9. The box Translate the columns name is ticked by default. If you do not want to export the
columns name as they are displayed in the GUI, untick the box.
10. Click on NEXT . The last page opens.
11. Configure when the scheduled export should be generated.
194
Exporting Data
Field Description
Date of the month A specific day of the month or every day. By default, every day is selected. This field
is optional.
Month A specific month or every month. By default, every month is selected. This field is
optional.
Hour A specific hour, a set of hours, every hour, or every hour over a specific period. The
hour respects the UTC standard. By default, 20 is selected. This field is optional.
Minute A moment of the hour, either 00, 15, 30 or 45. The minute respects the UTC standard.
By default, 00 is selected. This field is optional.
Name The name of the report on the page Scheduled reports.You can edit the default name.
Mail to The name of the group which users should receive the export notification email. By
default, the first of your groups, in the ASCII alphabetic order, is selected. This field
is optional.
Note that no email can be sent if the users email address is not valid or if your SMTP
relay is not configured. For more details, refer to the section Configuring the SMTP
Relay in the chapter Configuring the Services.
Rights as The name of the user whose rights and limitations are applied in the report, as follows
<user> [<group>]. Only the items this user has access to are listed in the export. By
default, the first of your users, in the ASCII alphabetic order, is selected. This field is
optional.
Period Only for exports scheduled from the DNS page Analytics displaying Guardian data.
The overall period of data to export, either the last 1h, 3h or 6h.
12. Click on OK to complete the operation. The report works and displays the export report.
13. Click on CLOSE to go back to the page.
The export configuration is available on the page Scheduled exports. For more details, refer
to the procedure To display the scheduled exports configuration.
When the export is generated, it is available on the page Local files listing. For more details,
refer to the procedure To display the scheduled exports.
In the sections below, we only detail the required fields, i.e. columns. For more details on the
available fields for each module and page, refer to the chapter Importing Data from a CSV File.
You can also import or reimport IPAM objects exported as raw data to update your database in
bulk. For more details, refer to the chapter Managing Raw Data.
195
Exporting Data
Keep in mind that the field Space name of the import wizard allows you to:
• Select the corresponding column of your CSV file.
• Select one space among the ones in your database or the option Use best space, with IPv4,
the option uses the IP address and size to place the object in the best space, block-type network
and/or subnet-type network possible.
Keep in mind that the DHCP server and DHCP6 server fields of the import wizard allow you to:
• Select the corresponding column of your CSV file.
• Select one server among the ones in your database.
196
Exporting Data
197
Exporting Data
198
Exporting Data
VRF page Column(s) name on the Column name in the ex- Column name in the im-
page port wizard port wizard
RD VRF RD RD
All VRF Route Targets Source RD Source RD Source RD
Target RD Target RD Target RD
On all the pages where you can reimport data, some columns are required, they are all listed in
the table below. For more details, refer to the section Importing Data to the Administration Module.
Each column on the page corresponds to the parameters configured during the export configur-
ation. You can sort the list through each column, you can filter it through the columns Name,
Type and Owner. You cannot edit the listing layout of this page or access a properties page as
all the information is displayed.
199
Exporting Data
All the configuration files are listed and each column corresponds to the parameters set during
the scheduled export configuration. You can sort and filter the list through each column but you
cannot edit the listing layout of this page. The scheduled exports do not have a properties page
as all the information is displayed.
The content of the page depends on the module you access it from. Each template has a unique
Name, specific Type and applies to a specific Object of the module.
To edit a template, you must select it during an export and save your changes. For more details,
refer to the section Configuring Exports.
200
Exporting Data
6. In the field Name, edit the current template name to rename it.
This name must be unique to the object it applies to.
7. Click on OK to complete the operation.The report opens and closes.The template is renamed.
201
Part IV. Dashboards
Dashboards is the first module you see when you connect to SOLIDserver.
The Main dashboard is the appliance homepage. For the superuser, it provides an overview of the appliance
configurations and services.
Within dashboards, you can gather gadgets to monitor data or set up custom shortcuts and search engines
to ease up the management. You can add as many dashboards as you need.
203
Chapter 13. Managing Dashboards
From the module Dashboards, you can build dashboards to monitor the appliance data via existing
and custom gadgets or gathers links towards your most used pages and wizards.
In addition to the Main dashboard, available by default, users with sufficient rights can add, edit,
and delete dashboards. All dashboards are accessible to all users.
Within each dashboard, you can add and organize gadgets to set up a customized display of in-
formation. For more details regarding gadgets, refer to the chapter Managing Gadgets.
To access a dashboard
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. Click on the tab of the dashboard of your choice. The dashboard opens.
Note that if you upgraded to this version, all the dashboards that contained gadgets are available
in a dedicated tab.
204
Managing Dashboards
Adding Dashboards
In addition to the Main dashboard, you can add many dashboards as you need. Note that:
• A dashboard name cannot exceed 255 characters.
• A dashboard name must be unique.
To add a dashboard
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. In the tab bar, click on . The wizard Add a dashboard opens.
3. In the field Name, name your dashboard. If you use a name matching a label defined in
Language Editor, the dashboard name is translated when you display the interface in the
relevant language. For more details, refer to the section Customizing the Interface Names
and Fields in the chapter Customizing the GUI.
4. Click on OK to complete the operation. The dashboard is added as a new tab.
You can display, hide, order, edit and delete dashboards, as detailed in the next sections.
To display/hide a dashboard
1. In the sidebar, click on Dashboards. The last accessed dashboard opens.
2. On the right-end side of the tabs, click on . The dashboards window opens.
3. Set your list of Selected dashboards. All the displayed dashboards are preceded by .
a. To hide a dashboard, click on the name of a ticked dashboard. It is now unticked and
moved outside the list of ticked dashboards.
b. To display a dashboard again, click on the name of an unticked dashboard. It is now ticked
and moved at the end of the list of ticked dashboards.
To order displayed dashboards, refer to the section Ordering Dashboards.
4. Click on SAVE to complete the operation. Your changes update the available tab(s).
Ordering Dashboards
You can order custom dashboards. Note that:
• You cannot order the Main dashboard.
• You cannot order hidden dashboards. To display them, refer to the section Displaying or Hiding
Dashboards.
To order dashboards
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. On the right-end side of the tabs, click on . The dashboards window opens.
3. Next to the name of any ticked dashboard, click on . You can now move it.
205
Managing Dashboards
4. Drag and drop the dashboard where you want in the list, a line indicates where the dashboard
is moved.
5. Click on SAVE to complete the operation. All dashboards are displayed in the order you set,
right of the Main dashboard.
Editing Dashboards
You can edit custom dashboards. Editing a dashboard includes renaming it, assigning it gadgets,
organizing the gadgets it contains or hiding gadgets.
Renaming a Dashboard
You can rename a custom dashboard. Note that:
• You cannot rename the Main dashboard.
• A dashboard name cannot exceed 255 characters.
• A dashboard name must be unique.
To rename a dashboard
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. Click on the tab of the dashboard of your choice. The dashboard opens.
3. In the tab, click on Edit. The wizard Edit a dashboard opens.
4. Edit the field Name according to your needs. If the name matches a label defined in Language
Editor, the dashboard name is translated when you display the interface in the relevant lan-
guage.
5. Click on OK to complete the operation. The dashboard is renamed.
Note that you can also assign gadgets from the pages My gadgets, System statistics and some
objects properties page. For more details, refer to the section Assigning Gadgets of the chapter
Managing Gadgets.
206
Managing Dashboards
If you want to remove a gadget from a dashboard, refer to the section Hiding Gadgets from a
Dashboard.
To add, edit, disable, control the visibility or delete a gadget, refer to the chapter Managing
Gadgets.
To move a gadget
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. Click on the tab of the dashboard of your choice. The dashboard opens.
3. Click on the drag bar of the gadget of your choice.
4. Drag the gadget to its new location and drop it. Its former and potential new positions are
highlighted to show how much space it takes.
To collapse/expand a gadget
1. In the sidebar, click on Dashboards. The Main dashboard opens.
207
Managing Dashboards
2. Click on the tab of the dashboard of your choice. The dashboard opens.
3. Next to the gadget name, click on to collapse the gadget. Only its drag bar is visible, it
contains its name and buttons.
4. To expand the gadget again, click on .
Hiding a gadget removes it from the dashboard, it does not delete it. To display it again, refer to
the section Assigning a Gadget to a Dashboard.
Deleting Dashboards
You can delete custom dashboards. Note that:
• You cannot delete the Main dashboard.
• You cannot delete a dashboard that contains gadgets. To delete gadgets, refer to the section
Deleting Gadgets in the chapter Managing Gadgets.
If you want to hide rather than delete a dashboard, refer to the section Displaying or Hiding
Dashboards.
To delete a dashboard
1. In the sidebar, click on Dashboards. The Main dashboard opens.
2. Click on the tab of the dashboard of your choice. The dashboard opens.
3. In the tab, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation.The tab is deleted, the dashboard is no longer available
in the dashboards window.
208
Chapter 14. Managing Gadgets
The gadgets allow you to monitor the appliance and customize your dashboards.
In addition, the Main dashboard provides Descriptive and Configuration gadgets, these gadget
types cannot be added. For more details, refer to the section Gadgets Displayed by Default.
The upper gray part is the gadget drag bar. It contains the gadget name and the buttons
to collapse, expand or hide it. On some gadgets, the button allows to edit them.
The lower white part contains the information. Its content differs for every type of gadget.
You can add, assign, hide and/or delete gadgets. Some can even be edited.
Note that you can manage existing charts like gadgets. By default, a set of gadgets are available
on the page the Gadgets Library, for more details refer to the appendix Default Gadgets.
Browsing Gadgets
The gadgets are available on several pages:
• My Gadgets where you can manage all the gadgets already assigned to at least one dashboard.
• Gadgets Library where you can manage all the existing gadgets.
• System statistics that contains the appliance statistics. Every chart on the page can be used
as a gadget and assigned to a dashboard. For more details, refer to the section Assigning a
Chart of the Page System Statistics as Gadget.
209
Managing Gadgets
• Any properties page containing charts. For more details, refer to the section Assigning a
Chart on a Properties Page as Gadget.
A number of gadgets are displayed by default on some dashboards, as detailed in the section
Gadgets Displayed by Default.
The page contains the following columns, you cannot change their layout.
Table 14.1. The columns of the pages Gadgets Library and My Gadgets
Column Description
Name The gadget name.
All users The gadget visibility. It is set to Yes if it is visible to all users, or to No if it is only visible to the
user who added it.
Type The gadget type, either Chart, Configuration, Descriptive, Quick Search, Shortcut or Top List.
Dashboard The name of the dashboard(s) where the gadget is assigned.
Status The gadget status: Enabled or Disabled.
210
Managing Gadgets
Any user can display these default gadgets on their session dashboards, as detailed in the section
Assigning Gadgets from the Page Gadgets Library. They are described in the appendix Default
Gadgets.
System Information
This descriptive gadget is available by default on the Main dashboard of ipmadmin (the superuser
session).
211
Managing Gadgets
License type
The appliance license type, either Temporary (with the End date between brackets) or Official
(it has no end date, it is permanent).
End of Maintenance
The date of the end of the appliance maintenance period.
Manufacturer
The appliance manufacturer name. It indicates if the appliance is installed on a virtual machine
or a physical hardware appliance.
Product
The product name, either hardware (with its size) or software. It depends on the manufacturer.
Serial number
The appliance serial number. For hardware appliances, it is composed of 6 hexadecimal digits.
For virtual appliances, it is only visible on the page Centralized Management.
General Information
This descriptive gadget is available by default on the Main dashboard of ipmadmin.
212
Managing Gadgets
SOLIDserver role
The appliance role: Standalone, Master or Hot Standby. The last two roles imply that your
SOLIDserver is configured in High Availability (HA). Click on the role to open the page
Centralized Management. For more details, refer to the chapter Centralized Management.
Status
The appliance status. A Standalone appliance is always OK. The appliances configured
in HA can be marked , to indicate that the configuration is not working properly. Click on
the status to open the page Centralized Management. For more details, refer to the chapter
Centralized Management.
Only ipmadmin can share it to allow other users to display it, even if they belong to the group
admin.
This gadget provides a set of shortcuts to assist you in setting SOLIDserver main configurations
and making sure that your appliance is used at the best of its potential from the first connexion
onward. Any line marked is not configured yet, the completed configurations are marked .
The gadget provides a checklist and shortcuts toward specific configuration wizards:
Local SOLIDserver
Allows to configure locally the appliance from the gadget. Click on Configuration to open
the wizard Configure local SOLIDserver. For more details, refer to the section Configuring
SOLIDserver to Remotely Manage Other Appliances.
Remote SOLIDserver
Allows to add remote appliances to the page Centralized Management from the gadget. Click
on Add to open the wizard Add/modify remote SOLIDserver. For more details, refer to the
section Adding Remote Appliances.
NTP servers configuration
Allows to add NTP servers from the gadget. Click on Configuration to open the wizard NTP
servers configuration. For more details, refer to the section Configuring NTP Servers.
213
Managing Gadgets
This gadget provides links to help the connected user set their preferences:
Gadgets Library
This button is a link toward the page Gadgets Library in the module Administration.
214
Managing Gadgets
Set language
This button opens the wizard Change Language. For more details, refer to the section Account
Configuration.
Adding Gadgets
Each type of gadget has a specific addition and edition methods. For this reason, the addition of
Charts, Top List, Quick Search, Quick Wizards and Bookmarks gadgets is detailed separately.
Note that:
• You can add gadgets from any page of the module IPAM, DHCP, DNS, Application, NetChange,
Workflow, Device Manager or VLAN Manager and some pages of the module Administration.
• The descriptive and configuration gadgets are default gadgets, you cannot add new ones or
delete them, you can only enable or disable them and change their visibility.
Once a gadget has been added, you can assign it on any dashboard or share it with other users.
For more details, refer to the sections Assigning Gadgets and Setting the Gadgets Visibility.
215
Managing Gadgets
You can add charts gadgets from any listing page, except in the modules Administration and
SPX. Once added, you can display as many charts as you want on each dashboard.
In the GUI, some charts are already available on the page System Statistics or on the properties
page of some resources. These charts can be assigned as gadget thanks to the button in the
drag bar. For more details, refer to the section Assigning Gadgets.
216
Managing Gadgets
Note that:
• Charts remain empty as long as there is no data to retrieve on the page they are added from.
• When you hover over a segment of a chart, a tooltip containing information about the segment
is displayed.
• Chart gadgets provide specific buttons:
• The icon allows to zoom in on the chart in a pop-up window above the page.
• The icon allows to refresh the data displayed.
• From the legend you can click on any entry to hide or display data. For more details, refer
to the section Charts.
• Once a chart is added, you cannot edit it. If the data you configured it with no longer suits to
your needs, you have to delete the gadget and add a new one. For more details, refer to the
section Deleting Gadgets.
You can add Top List gadgets from most listing page and display as many of them as you want
on each dashboard.
Keep in mind that in the module Administration, you can only add aTop List from the pages
Session tracking, User tracking and Alerts.
217
Managing Gadgets
• To order the columns of the Top List, select them one by one and click on the arrows
to move them up or down .
e. In the field Limit, specify the number of items to display in the final gadget: 5, 10, 15,
20 or 25.
5. For Top List gadgets added from the DNS page Analytics displaying Guardian data, in the
drop-down list Period, select the overall period of data to retrieve, either the last 1h, 3h or
6h.
6. Click on OK to complete the operation. The report opens and closes. The gadget is visible
on the dashboard you selected. It is named Top X list: <your-gadget-name>, where X is the
Limit you selected.
You can edit the Top List gadgets. For more details, refer to the section Editing a Top List Gadget.
In the gadget, the selected columns are displayed as input fields. When you click on SEARCH , you
execute a search that automatically opens the target page and applies the filters of the gadget
to only return the matching results.
You can add Quick Search gadgets from most listing pages and display as many of them as you
want on each dashboard.
The fields available to configure the Quick Search depend on the list the gadget is set from.
218
Managing Gadgets
4. For Quick Search gadgets added from the DNS page Analytics displaying Guardian data,
in the drop-down list Period, select the overall period of data to retrieve, either the last 1h,
3h or 6h.
5. Click on OK to complete the operation. The report opens and closes. The Quick Search is
visible on the dashboard you selected.
You can edit the Quick Search gadgets. For more details, refer to the section Editing a Quick
Search Gadget.
You cannot add the gadget Quick Wizards on its own, you must include your quick wizards to
the gadget when you add or edit them.
Note that during the addition of a quick wizard you can only indicate one access location, either
a dashboard for the gadget or the menu Quick Access. However, you can edit the quick wizard
from the My Quick Wizards to specify more dashboards.
For more details regarding the quick wizards themselves, refer to the section Quick Wizards.
To add a link in the Quick Wizards gadget toward the Quick Wizard you are adding
1. On the wizard you want to save, click on in the wizard drag bar. The wizard Add a Quick
Wizard opens.
2. In the field Name, specify the quick wizard name.
3. In the drop-down list Save in, select the dashboard of your choice.
4. In the field Description, you can add a description.
5. Click on OK to complete the operation. The report opens and closes. The Quick Wizards
gadget is now displayed on the selected module dashboard, it contains a button named after
your quick wizard.
To add a link in the Quick Wizards gadget toward the Quick Wizard you are editing
1. From any page, in the top bar, select My account > My Quick Wizards. The page My
Quick Wizards opens.
2. Click on the name of a quick wizard you want to edit. The wizard Edit: Quick Wizard opens.
3. If need be, edit the fields Name and Description.
4. In the list Available, select one by one the dashboards of your choice and click on . The
dashboard is moved to the list Configured.
You can also select Quick access menu to add a shortcut toward the quick wizard in the
menu Quick Access. For more details, refer to the section Accessing Quick Wizards.
5. Repeat this action for as many dashboards as you need.
219
Managing Gadgets
To remove a dashboard from the list Configured, select it and click on . The dashboard
is moved back to the list Available.
6. Tick or untick the box Share with other users according to your needs. Sharing a quick
wizard makes it available for all users.
7. Click on OK to complete the operation. The report opens and closes. The Quick Wizards
gadget is now displayed on the dashboard of the selected modules and it contains a button
named after your quick wizard.
Once you added the Quick Wizards gadget, you can assign it from any dashboard. For more
details, refer to the section Assigning a Gadget to a Dashboard.
You can edit the content of a Quick Wizards gadget. For more details, refer to the section Editing
a Quick Wizards Gadget.
You cannot add the gadget Bookmarks on its own, you must add it when you are bookmarking
a page.
220
Managing Gadgets
• Every time you tick the box Add to the gadget Bookmarks, you edit the gadget content as you
add extra shortcuts to the gadget. You cannot edit the gadget from a dashboard. To remove
bookmark shortcuts from the gadget, refer to the section Editing the Bookmarks Gadget.
Assigning Gadgets
All gadgets can be assigned, i.e. displayed, on any dashboard from the pages My Gadgets and
Gadgets Library.
In addition, existing charts can be assigned as gadgets. Note that the chart available on the DNS
page Analytics cannot be assigned as a gadget.
To assign a gadget directly from a dashboard, refer to the section Assigning a Gadget to a
Dashboard in the chapter Managing Dashboards.
All the existing gadgets are listed on the page, even if they are not displayed on any dashboard
yet.
To assign gadgets to one or several dashboards from the page Gadgets Library
1. From any page, in the top bar, select My account > My Gadgets. The page My Gadgets
opens.
2. In the breadcrumb, click on Gadgets Library. The page Gadgets Library opens.
3. Tick the gadget(s) you want to assign to a dashboard.
4. In the menu, select Edit > Assign Gadget(s). The wizard Gadget configuration opens.
221
Managing Gadgets
5. In the list Available, double-click on the name of the dashboard you want the gadget to be
displayed on. The name is moved to the list Configured.You can select several dashboards.
Keep in mind that if you selected several gadgets already assigned, their current dashboard
configuration is not displayed and is overwritten if you assign them to a new dashboard.
6. Click on OK to complete the operation. The report opens and closes. The gadget is now
displayed on the selected dashboard(s).
All the charts on the page, except Processes state, can be used as a gadget. They provide:
• Traffic information, in the panels DNS traffic, DHCP traffic, HTTP traffic, SNMP traffic and
Database replication traffic.
• System information, in the panels Load average, CPU per process, Memory usage per process,
Disk operations, I/Os per process, SQL queries, Threads, User sessions and Disk Usage.
These charts are not listed on the page Gadgets Library, but once assigned, they are listed on
the page My Gadgets.
222
Managing Gadgets
To hide or display a gadget directly from a dashboard, refer to the section Editing Dashboards
in the chapter Managing Dashboards.
If you want to display or hide a gadget from several dashboards at once, refer to the section
Enabling or Disabling Gadgets.
Editing Gadgets
You can only edit the gadgets Top List, Quick Search, Quick Wizards and Bookmarks.
Any other type of gadget cannot be edited. You have to add a new gadget again and delete the
one you no longer need.
223
Managing Gadgets
• Any changes performed on a Quick Search gadget apply to all the dashboards it is displayed
on.
You can make unique changes to a Quick Wizards gadget. Any change performed on the gadget
only apply to the dashboard where you edited the gadget.
Any changes performed on the gadget Bookmarks apply to all the dashboards it is displayed on.
224
Managing Gadgets
225
Managing Gadgets
• You can click on a gadget Status to disable (if it is Enabled) or enable it (if it is Disabled).
To enable/disable gadgets
1. From any page, in the top bar, select My account > My Gadgets. The page My Gadgets
opens.
2. In the breadcrumb, click on Gadgets Library. The page Gadgets Library opens.
3. Tick the gadget(s) your choice.
4. In the menu:
a. To enable the gadget(s), select Edit > Status > Enable. The wizard opens.
b. To disable the gadget(s), select Edit > Status > Disable. The wizard opens.
5. Click on OK to complete the operation. The report opens and closes. The gadget is marked
Enabled or Disabled.
Deleting Gadgets
You can only delete gadgets from the page Gadgets Library. Deleting a gadget removes it from
the appliance altogether, and no matter on how many dashboards it is displayed.
To delete a gadget
1. From any page, in the top bar, select My account > My Gadgets. The page My Gadgets
opens.
2. In the breadcrumb, click on Gadgets Library. The page Gadgets Library opens.
3. Tick the gadget(s) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The gadget is now re-
moved from the dashboard(s) it was displayed on and from the pages Gadgets Library and
My Gadgets.
226
EAST ASIA
RIO DE
JANEIRO
Part V. IPAM
The Internet Protocol Address Management (IPAM) was designed to plan, track, organize and manage IP
addresses into networks. This organization can rely on IPv4 that manages 32-bit addresses or on IPv6 that
manages 128-bit addresses.
CLIENTS
USA CHINA
BRAZIL INDIA
AFRICA
BRASILIA NEW DELHI
OCEANIA
The IP address management requires to add a space, within which you add a block-type network, that
contains at least one subnet-type network that manages your IP addresses. You can also add a pool to
configure some or all of your IP addresses with extra parameters. If you want to import an existing IPAM
organization, refer to the part Imports and Exports.
Note that you can customize your organization display in the Tree view. For more details, refer to the section
Tree View of the chapter Understanding the GUI.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
15. Managing Spaces .................................................................................................... 231
Browsing Spaces .................................................................................................. 231
Adding Spaces ...................................................................................................... 231
Editing Spaces ...................................................................................................... 232
Automating the IPv4 to IPv6 Transition .................................................................... 233
Exporting Spaces .................................................................................................. 233
Deleting Spaces .................................................................................................... 233
Defining a Space as a Group Resource .................................................................. 234
16. Managing Networks ................................................................................................. 235
Browsing Networks ............................................................................................... 235
Adding Networks ................................................................................................... 237
Editing Networks ................................................................................................... 243
Splitting Networks ................................................................................................. 244
Merging Networks ................................................................................................. 244
Moving Networks .................................................................................................. 245
Discovering the Assigned IP Addresses in a Network .............................................. 246
Using Network Map to Display Assigned IP Addresses ............................................ 246
Managing or Unmanaging Networks ....................................................................... 248
Creating Networks from NetChange ....................................................................... 248
Finding Identity Manager Sessions at Network Level ............................................... 248
Automating the IPv4 to IPv6 Transition .................................................................... 249
Adding Pools from the Page All networks ................................................................ 249
Adding IP Addresses from the Page All networks .................................................... 249
Adding DHCP Scopes from the Page All networks ................................................... 250
Adding or Updating DNS Zones from the Page All networks ..................................... 250
Adding VLANs from the Page All networks .............................................................. 250
Exporting Networks ............................................................................................... 250
Deleting Networks ................................................................................................. 250
Defining a Network as a Group Resource ............................................................... 251
17. Managing Pools ....................................................................................................... 252
Browsing Pools ..................................................................................................... 252
Adding Pools ........................................................................................................ 253
Reserving Pools .................................................................................................... 254
Resizing Pools ...................................................................................................... 254
Adding Pools at Network Level ............................................................................... 254
Adding DHCP Ranges from the Page All pools ........................................................ 255
Exporting Pools ..................................................................................................... 255
Deleting Pools ....................................................................................................... 255
Defining a Pool as a Group Resource ..................................................................... 255
18. Managing IP Addresses ........................................................................................... 256
Browsing IP Addresses .......................................................................................... 256
Adding IP Addresses ............................................................................................. 258
Editing IP Addresses ............................................................................................. 262
Configuring and Managing IP Address Aliases ........................................................ 263
Configuring Multiple A Records for an IP Address ................................................... 266
Renaming IPv4 Addresses Massively ..................................................................... 267
Moving IP Addresses ............................................................................................ 268
Pinging IP Addresses ............................................................................................ 270
Populating Device Manager ................................................................................... 270
Finding Identity Manager Sessions at IP Address Level ........................................... 270
Adding Gateway IP Addresses at Network Level ..................................................... 271
229
IPAM
230
Chapter 15. Managing Spaces
The space is the highest level in the IPAM module's organization, the entry point of any IPv4 or
IPv6 addressing plan. It allows to manage unique ranges of IP addresses.
Browsing Spaces
Spaces are managed on the page All spaces. They contain the networks, pools and IP addresses.
ALIAS
Spaces provide uniformity and consistency check that ensure uniqueness of IP resources: there
cannot be two identical configurations of IP addresses, pools or networks within one space. To
manage identical N address plans, you can add N spaces in the IPAM module.
You can add as many spaces as you want to organize your addressing plan(s) or set up multiple
private networks following RFC 1918. Each space can contain as many block-type networks as
you need, their size defines the number subnet-type network, pools and IP addresses that you
actually manage.
By default, the space Local is present on the page All spaces. It is configured to receive all the
DHCP and DNS resources configured with replication that are not attached to any space.
Adding Spaces
Spaces allow to set up addressing plans containing either IPv4 or IPv6 addresses. You can add
as many spaces as you need or use the space Local, added by default.
231
Managing Spaces
Note that:
• You can also import spaces, for more details refer to the section Importing Spaces in the
chapter Importing Data from a CSV File.
• You can add spaces via the raw data imports, for more details refer to the chapter Managing
Raw Data.
• If you plan on adding different spaces with similar properties, adding a template might be
useful. For more details, refer to the chapter Managing IPAM Templates.
• The page may contain spaces synchronized from another appliance. For more details on
synchronized spaces, refer to the chapter Configuring Space Synchronization.
To add a space
1. In the sidebar, go to IPAM > Spaces. The page All spaces opens.
2. In the menu, click on Add. The wizard Add a space opens.
3. In the list VLSM parent space, select None or one of the existing empty spaces. If you select
an existing space as VLSM parent space, the new space is affiliated to the space you selec-
ted. For more details, refer to the chapter Using VLSM to Manage Your IPAM Network.
4. Click on NEXT . The next page opens.
5. If custom classes are enabled at space level, in the list Space class select a class or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. In the field Space name, name the space.
7. In the field Description, you can specify a description of the space.
8. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
9. Click on OK to complete the operation. The report opens and closes. The new space is listed.
Editing Spaces
You can edit any existing space from its properties page or via the contextual menu on the page
All spaces.
Note that you can edit space properties in bulk via the raw data management, for more details
refer to the chapter Managing Raw Data.
To edit a space
1. In the sidebar, go to IPAM > Spaces. The page All spaces opens.
2. At the end of the line of the space of your choice, click on . The space properties pages
opens.
3. In the panel Main properties, click on EDIT .
4. The wizard Edit a space opens.
5. In the list VLSM parent space, select a parent space if need be.
6. Click on NEXT . The next page opens.
7. If custom classes are enabled at space level, in the list Space class select a class or None.
Click on NEXT . The last page opens.
232
Managing Spaces
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
8. Edit the fields Space name and/or Description according to your needs.
9. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
10. Click on OK to complete the operation. The report opens and closes. The changes are listed
in the panel.
For more details, refer to the chapter Managing Advanced Properties in the section Configuring
the Transition from IPv4 to IPv6.
Exporting Spaces
From the page All spaces:
• You can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
• You can export spaces as raw data to add or edit them in bulk. For more details, refer to the
chapter Managing Raw Data.
Deleting Spaces
You can delete spaces, before doing so, keep in mind that:
• Deleting a space also deletes all the addresses, pools and networks it contains.
• You cannot delete a space containing other spaces. For more details regarding Variable Length
Subnet Masking, refer to the chapter Using VLSM to Manage Your IPAM Network.
• None of the resources added in the DNS and DHCP from the IPAM, through the advanced
properties, are deleted. This is a safety measure in case a space is deleted by mistake.
• If you delete a synchronized space, it is listed again after the next synchronization. Deleting
synchronized spaces requires to disable the space synchronization between appliances, for
more details refer to the chapter Configuring Space Synchronization.
To delete a space
1. In the sidebar, go to IPAM > Spaces. The page All spaces opens.
2. Tick the space(s) of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The selected spaces
are no longer listed.
233
Managing Spaces
Granting access to a space as a resource also grants access to every item it contains. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
234
Chapter 16. Managing Networks
Within the IPAM hierarchy the networks are a key level where you define ranges of IP addresses
to work with. Their management follows the recommendations introduced with the RFC 950, that
was aimed at providing a solution to the problems that the Internet community was facing with
dual hierarchical address levels.
The networks help you set the organization that suits your needs: it can allow to set a range of
addresses dedicated to your customers, and within that range a network for the customers of
specific country/city; or it can help delegate terminal network management tasks to administrators.
You can manage IPv4 and IPv6 networks, within one space.
To successfully set up your addressing organization, you must add within a space:
1. A block-type network, where you set the range of addresses you want to manage. This net-
work is by essence non-terminal, it must contain subnet-type networks.
2. One or several subnet-type networks. These networks can be terminal so you can assign
the IP addresses they contain, or non-terminal and contain other subnet-type networks. For
more details, refer to the chapter Using VLSM to Manage Your IPAM Network.
If you want to manage RIPE or APNIC networks and objects, refer to the part SPX.
You can synchronize cloud providers objects with networks. For more details, refer to the chapter
Managing Cloud Synchronization.
You can synchronize Cisco DNA pools and subpools as networks. For more details, refer to the
appendix Synchronizing Cisco DNA.
Browsing Networks
The page All networks manages both block-type and subnet-type networks, these subnet-type
networks can be terminal or not.
Block-type networks, or level 0 networks, belong to spaces and are the second level of the IPAM
hierarchy. They set the range of IPv4 or IPv6 addresses that you can divide into subnet-type
networks. On the page they are preceded by .
ALIAS
235
Managing Networks
1
Subnet-type networks, or level 1 (to n) networks, belong to block-type networks and are the third
level of the IPAM hierarchy. Terminal networks contain IPv4 or IPv6 addresses that you can assign.
On the page they are preceded by .
ALIAS
You can divide the IP addresses of a subnet-type network into pools. For more details, refer to
the chapter Managing Pools.
The icon color provides information on the network. When is blue it indicates small sized network
managing 2 or 1 IP address. It precedes /31 and /32 networks in IPv4, and /127 and /128 networks
in IPv6.
If IPAM to DHCP advanced properties are configured, some subnet-type networks have a panel
DHCP options on their properties page, to configure DHCP options for the scope associated
with the network. For more details, refer to the chapters Managing Advanced Properties and
Configuring DHCP Options.
1
Subnet-type networks can also belong to non-terminal subnet-type networks. For more details, refer to the chapter Using VLSM to
Manage Your IPAM Network.
236
Managing Networks
The page also provides columns specific to the management of SPX networks, whether
RIPE or APNIC, such as Waiting state or Assigned networks. For more details, refer to the part
SPX.
Creating The delayed status while you wait for the RIPE or APNIC to confirm the network creation.
Deleting The delayed status while you wait for the RIPE or APNIC to confirm the network deletion.
NOT VALID The subnet-type network size does not fit in the block-type network although it was validated
by the RIPE or APNIC. For more details, refer to the part SPX.
Adding Networks
To manage IP addresses, you must define a range of IP addresses to work with, with a block-
type network, and then set the range of addresses you can assign, with a terminal subnet-type
network.
To add a subnet-type network, refer to the section Adding Networks Manually or Adding Networks
Using the Option By Search. The option By search allows to find the first available section of free
IP addresses within a space based on a network size.
Note that:
• You can also import networks from a CSV file, for more details refer to the section Importing
Networks in the chapter Importing Data from a CSV File.
• You can add network via the raw data imports, for more details refer to the chapter Managing
Raw Data.
237
Managing Networks
• You can add networks from NetChange routes. For more details, refer to the section Creating
Routes in the IPAM.
By default, the first and last IP address of a terminal network you add are reserved for the network
and broadcast. The networks managing two or fewer addresses do not reserve any IP address.
6. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Add an IPv4 network or Add an IPv6 network opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. In the field Network Name, name the network.
8. In the field Description, you can specify a description.
9. In the field Address, specify the start address.
10. If you are adding an IPv4 network:
a. In the drop-down list Netmask select a netmask. The netmask value automatically edits
the Prefix.
b. In the drop-down list Prefix, select a value if you did not choose a netmask. The prefix
value automatically edits the Netmask.
The network size configuration is visible in the field Comment.
238
Managing Networks
11. If you are adding an IPv6 network, in the drop-down list Prefix, select a value between /16
and /64. The values depend on the Address you specified.
If your administrator disabled the RFC 4291 compliance registry database entry, you can
select a prefix between /16 and /128. For more details, refer to the section Enabling the
Addition of IPv6 Terminal Networks with Non-Standard Prefixes.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on OK to complete the operation. The report opens and closes. The network is listed.
Once you added a block-type network, you can add the subnet-type networks it contains.
239
Managing Networks
If your administrator disabled the RFC 4291 compliance registry database entry, you can
select a prefix between /16 and /128. For more details, refer to the section Enabling the
Addition of IPv6 Terminal Networks with Non-Standard Prefixes.
13. The box Terminal network is ticked by default to add a terminal network. You can untick
the box to add a non-terminal network, for more details refer to the section Setting Up a
Network-Based VLSM Organization.
If the box Terminal network is ticked, the network has a Gateway. Depending on what ad-
vanced properties are displayed:
• The field Gateway can be displayed and editable.
• The field Gateway can be hidden but the gateway is added anyway.
For more details, refer to the relevant section of the chapter Managing Advanced Properties.
14. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
15. Click on OK to complete the operation. The report opens and closes. The network is listed.
Before adding a network using the option By search keep in mind that:
• Several networks can be named the same.
• The option only allows to add subnet-type networks, they can be terminal or non-terminal.
• The wizard offers a list of the available start addresses matching your network size criteria.
These results are displayed in ascending order from the non-terminal network with the most
important fragmentation to the one with the least fragmentation. The hierarchy is symbolized
by stars, three stars being the most.
• Several subnet-type networks cannot overlap each other in one non-terminal network.
• By default in IPv6, you can only add /64, /127 or /128 terminal networks. If you want to configure
them with a different prefix, refer to the section Enabling the Addition of IPv6 Terminal Networks
with Non-Standard Prefixes.
240
Managing Networks
6. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Network size opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. Select a Size, Prefix or Netmask for your network. Selecting one value automatically changes
the other two. Click on NEXT . The page Search result opens.
If the pop-up window No network matching this size is available opens, click on CANCEL . You
can either change the network size details or, click on PREVIOUS to change the Parent network
class, if you selected a specific one, or even change the space if all available addresses are
already managed by terminal networks.
8. In the list Network address, select a start address. Click on NEXT . The page Add an IPv4
subnet opens.
9. In the field Network Name, name the network.
10. In the field Description, you can specify a description. The field may be in read-only if at a
higher level, its Inheritance property is Inherit. If you want to specify a different description
and/or restrict its propagation to lower levels, you must Set its Inheritance property and/or
Restrict its Propagation property before being able to specify any value in the field. For more
details, refer to the chapter Inheritance and Propagation.
11. The fields Address and Prefix display the values set on the pages Network size and Search
result.
12. The box Terminal network is ticked by default to add a terminal network. You can untick
the box to add a non-terminal network, for more details refer to the section Setting Up a
Network-Based VLSM Organization.
If the box Terminal network is ticked, the network has a Gateway. Depending on what ad-
vanced properties are displayed:
• The field Gateway can be displayed and editable.
• The field Gateway can be hidden but the gateway is added anyway.
For more details, refer to the relevant section of the chapter Managing Advanced Properties.
13. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
14. Click on OK to complete the operation. The report opens and closes. The network is listed.
241
Managing Networks
6. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Network size opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. The box Terminal network is ticked by default. You can untick it if you want to add a non-
terminal network that can contain other networks. For more details, refer to the section Setting
Up a Network-Based VLSM Organization.
8. In the drop-down list Network prefix, select the network prefix.
a. If the box Terminal network is ticked, select 64 bits, 127 bits or 128 bits.
b. If the box Terminal network is not ticked, select a prefix between 8 bits and 64 bits.
If your administrator disabled the RFC 4291 compliance registry database entry, you can
select a prefix between 8 bits and 128 bits whether the network is terminal or not. For more
details, refer to the section Enabling the Addition of IPv6 Terminal Networks with Non-
Standard Prefixes.
Click on NEXT . The page Search result opens.
9. In the list Network address, select a start address. Click on NEXT . The page Add an IPv6
network opens.
10. In the field Network Name, name the network.
11. In the field Description, you can specify a description. The field may be in read-only if at a
higher level, its Inheritance property is Inherit. If you want to specify a different description
and/or restrict its propagation to lower levels, you must Set its Inheritance property and/or
Restrict its Propagation property before being able to specify any value in the field. For more
details, refer to the chapter Inheritance and Propagation.
12. The fields Address and Prefix display the values set on the pages Network size and Search
result.
13. If the box Terminal network was ticked and depending on your administrator's display
configuration:
• The field Gateway can be displayed and editable.
• The field Gateway can be hidden but the gateway is added anyway.
For more details, refer to the relevant section of the chapter Managing Advanced Properties.
14. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
15. Click on OK to complete the operation. The report opens and closes. The network is listed.
If want to configure terminal networks with other, non-standard, prefixes, your administrator can
break the compliance with RFC 4291 by enabling the registry database entry module.ip.viol-
ate.rfc4291. Once the registry entry is enabled, any prefix matching the terminal network start
address is returned by the drop-down list Network prefix.
242
Managing Networks
Note that enabling the registry database also modifies the content of drop-down list Network
prefix for non-terminal networks.
To edit the registry key that enforces the compliance with RFC 4291
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with 4291.
4. Hit Enter. Only the key module.ip.violate.rfc4291 is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, type in 1 to enable it. By default, its value is 0.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
Editing Networks
You can edit networks from the page All networks via the contextual menu or from their properties
page.
Note that:
• You can edit networks added using a template, but this operation is limited. For more details,
refer to the chapter Managing IPAM Templates.
• You can edit network properties in bulk via the raw data management, for more details refer
to the chapter Managing Raw Data.
• To split, merge or move networks, refer to the sections Splitting Networks, Merging Networks
and Moving Networks.
To edit a network
1. In the sidebar, go to IPAM > Networks. The page All networks opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. At the end of the line of the network of your choice, click on . The properties pages opens.
4. In the panel Main properties, click on EDIT . The wizard opens.
5. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Edit an IPv4 network or Edit an IPv6 network opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. Edit the Network name, Description according to your needs.
7. If you are editing a subnet-type network, the box Terminal network is displayed. You can
either:
a. Tick the box to make the network terminal. In that case, it has a Gateway that may be
displayed or hidden, depending on your administrator display configuration.
b. Untick the box to make the network non-terminal. In that case, it can contain other net-
works. For more details, refer to the section Setting Up a Network-Based VLSM Organ-
ization.
243
Managing Networks
Keep in mind that you cannot make a terminal network non-terminal or vice versa if they
contain other networks or pools.
8. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
9. Click on OK to complete the operation. The report opens and closes. The changes are listed
in the panel.
Splitting Networks
You can split IPv4 or IPv6 networks to manage the IP addresses they contain in separate networks.
Before splitting network, keep in mind that:
• You can split a network into 2, 4 or 8 smaller networks of same size.
• The new networks are all named after the network you split.
• When splitting a terminal network, the new smaller networks all use the first available IP address
as their gateway.
• You can split a network containing other networks only if the operation does not impact the
networks it contains.
• If the networks are configured with advanced properties, splitting them might compromise your
original configuration.
• You cannot split unmanaged networks.
To split a network
1. In the sidebar, go to IPAM > Networks. The page All networks opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Tick the network(s) you want to split.
4. In the menu, select Edit > Split. The wizard Splitting networks opens.
5. In the drop-down list Number of networks to create, select 2, 4 or 8. By default, 2 is selected.
6. Click on OK to complete the operation. The report opens and closes. The networks are listed.
Merging Networks
You can merge IPv4 or IPv6 subnet-type networks, to manage more addresses. Before merging
networks, keep in mind that:
• You can merge subnet-type networks if:
• They belong to the same non-terminal network, either a non-terminal subnet-type network
or a block-type network.
• They are contiguous networks.
• They are of equal size.
• The new network is named after the very first network in the list that manages all the IP ad-
dresses of the selected networks.
• The number of networks before the merge must be a power of two (2, 4, 8, 16, 32, 64, ...).
• The new larger network uses one of the existing gateway addresses as gateway for the new
network.
• The result of the merge must produce a network with a netmask address boundary.
244
Managing Networks
Keep in mind that if the merge you are trying to execute is impossible, an error message appears
on the report page and only a partial report of some networks is executed.
Moving Networks
You can move IPv4 or IPv6 networks from one space to the other. Before moving a network keep
in mind that:
• The migration of a block-type network also moves the networks, pools and IP addresses it
contains.
• The migration of a subnet-type network is only possible if the target space contains a block-
type network that can receive it.
• You can overwrite an existing network in the target space if both networks have the same size.
• You cannot move a network if it overlaps partially an existing network in the target space.
• You cannot move an unmanaged network.
245
Managing Networks
The option Discover networks names the assigned IP addresses if the DNS resolver of the appli-
ance is properly configured and if these IP addresses are declared in a valid PTR record. For
more details, refer to the sections Setting the DNS Resolver and Adding a PTR Record.
Considering that pinging all the IP addresses of a network can take some time, you can choose
to perform this scan at different speeds: it can be fast, normal or slow. The slower the discovery,
the more likely you are to properly scan the network. The discovery mechanism sends 32 ICMP
echoes at once on the network. For more details, refer to the table below.
Table 16.2. The available speeds for the option Discover networks
Speed Timeout Retry
Slow 3 seconds 2 attempts
Normal 2 seconds 1 attempt
Fast 1 second no retry
When the operation is over, the assigned IP addresses are the ones that responded to the ping.
They are marked In use in the column Status and they have a Name if they are properly de-
clared in a PTR record.
Network map allows to see the occupancy rate of IPv4 block-type or subnet-type non-terminal
networks and to make sure you did not forget any IP addresses in your addressing strategy.
246
Managing Networks
2. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
3. Click on the name of the non-terminal network of your choice.The page refreshes and displays
the networks it contains.
4. In the breadcrumb on the right of the network name, click on to display additional pages.
5. Click on Network map. The page refreshes.
6. To access the properties page of a subnet-type network, click on any blue area.
On the page Network map, non-terminal networks are divided into lines of /24 terminal networks,
where free ranges are gray and used ranges are blue.
This column indicates the first IP address of the network segments. Every simple line rep-
resents a /24 segment. i.e. 256 consecutive IP addresses. They can be free or belong to a
network.
The first line matches the start address of the non-terminal network.
The blue areas indicate segments of used IP addresses, they belong to networks of the
non-terminal network. The different highlights allow to identify sizes:
• 3.2.7.0-3.2.7.255 is dark blue, this network uses exactly 256 addresses.
• 3.2.12.0-3.2.15.255 is dark and light blue, this network uses more than 256 addresses.
The light area indicates that no IP address is free in this portion of the non-terminal network.
• 3.2.255.0-3.2.255.63 is dark blue and short, this network uses only a portion of the /24
line. Right after the network, the line is gray to highlight all the free IP addresses before
the next network.
The gray areas indicates the free IP addresses within the non-terminal network. Here, all
IP addresses are free in the segment 3.3.4.0-3.3.255.255.
Hover over any blue area to display the network name, start and end IP addresses and size.
If you click on the area, the network properties page opens.
This column indicates the last IP address of the network segments.
247
Managing Networks
The last line matches the end address of the non-terminal network.
The option can be useful, for instance, if you are allocated a particular range of addresses by the
RIPE or APNIC through SPX, especially if you are still waiting on this range to be officially allocated
to you. As any network set as unmanaged is virtually non existent in the database, it gives you
time to add new networks managing the same start IP address and prefix as an existing unman-
aged network and assign in advance the addresses it contains if need be.
A report allows to find the sessions associated with the IP addresses of the networks you manage,
its result can be downloaded in TXT, HTML or EXCEL format.
Note that:
• The report can be generated for IPv4 and IPv6 networks.
• The report only looks for active sessions, it ignores inactive sessions. All inactive sessions are
available on the page All sessions in the module Identity Manager.
• The report finds active sessions and their identity across all directories.
248
Managing Networks
• The report looks for sessions associated with assigned IP addresses, any address which status
is not Free.You can choose to include free IP addresses. For more details on address statuses,
refer to the section Understanding the IP Address Type and Status in the chapter Managing
IP Addresses.
• The report is designed to find sessions in terminal networks. If you generate it for a block-type
network or a non-terminal subnet-type network, it looks for sessions in the terminal networks
it contains.
If you want to find active sessions at IP address level, refer to the section Finding Identity Manager
Sessions at IP Address Level.
For more details on Identity Manager sessions, refer to the chapter Managing Sessions.
For more details, refer to the chapter Managing Advanced Properties in the section Configuring
the Transition from IPv4 to IPv6.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
249
Managing Networks
The new scope is added in the selected DHCP failover channel and automatically set with the
network Gateway address as value of the option routers. In addition, all the IP addresses you
add within these networks can automatically add statics.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
Exporting Networks
From the page All networks:
• You can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
• You can export networks as raw data to add or edit them in bulk. For more details, refer to the
chapter Managing Raw Data.
Deleting Networks
You can delete networks, before doing so, keep in mind that:
• As a safety measure:
• Deleting a block-type network does not erase it from the database. If it contains objects -
networks, pools, used IP addresses - it is renamed Orphan Network and the objects it con-
tained are managed by the next block-type network added that matches the deleted network
configuration, i.e. the same start IP address, size and advanced properties.
250
Managing Networks
• Deleting a subnet-type network puts its used IP addresses in an Orphan Network. The free
IP addresses are deleted.
If you really want to delete a network, you must delete its content first, starting with its used IP
addresses and up the IPAM hierarchy until the network you want to delete is empty. For more
details, refer to the chapters Managing IP Addresses and Managing Pools.
• Deleting a network configured with the advanced property DNS server for reverse zones or
DNS view for reverse zones also deletes the corresponding reverse zone from the DNS, if it
only contains the default SOA and NS records.
To delete networks from a VLSM organization, refer to the chapter Using VLSM to Manage Your
IPAM Network.
To delete a network
1. In the sidebar, go to IPAM > Networks. The page All networks opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Tick the networks(s) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. Selected networks are
no longer listed, they might be replaced by Orphan networks or Orphan Addresses.
Granting access to a network as a resource also grants access to every item it contains. For
more details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
251
Chapter 17. Managing Pools
Within the IPAM hierarchy, pools are the fourth level of the IPAM module hierarchy, they are the
last container level. They can be added within terminal networks to manage IP addresses, their
use is optional.
Pools allow reserving IP addresses for restricted usage such as: address provisioning, planning
or migrations. Pools can also be used to delegate one or several ranges of IP addresses to groups
of administrators or to restrict access to users.
Browsing Pools
The pools belong to terminal networks and contain IPv4 or IPv6 addresses. They are managed
in the page All pools.
ALIAS
Keep in mind that in IPv6 you can display colored labels above parts of the IP addresses listed.
It allows to differentiate at a glance your containers. For more details, refer to the chapter Managing
IPv6 Labels.
252
Managing Pools
Adding Pools
Within any terminal network, a subnet-type network, you can add pools to organize further your
IP addresses and/or configure them with a common set of options.
Note that:
• You can add pools at pool level. The procedure below details how to add them from the page
All pools.
• You can add pools at network level. Pools can be added either from the properties page of
terminal networks, in the panel IP address pool, or when you add terminal networks configured
with the relevant advanced properties. For more details, refer to the section Network Advanced
Properties in the chapter Managing Advanced Properties.
• You can also import pools, for more details refer to the section Importing Pools in the chapter
Importing Data from a CSV File.
• You can add pools via the raw data imports, for more details refer to the chapter Managing
Raw Data.
To add a pool
1. In the sidebar, go to IPAM > Networks. The page All networks opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Click on the name of the subnet-type network of your choice. The page All addresses of
this network opens.
4. In the breadcrumb, click on All pools. The page All pools of the network opens.
5. In the menu, click on Add. The wizard opens.
6. If custom classes are enabled at pool level, in the list IP pool class select a class or None.
Click on NEXT . The page Add an IPv4 pool or Add an IPv6 pool opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. In the field Pool name, name the pool.
8. The box Pool read-only allows to reserve the pool, mark it as read-only. By default, the box
is not ticked. For more details, refer to the section Reserving Pools.
9. In the field Start address, specify the first address of the pool.
10. In the field End address, specify the last address of the pool. By default, the last address
of the parent network is displayed. The value of the End address automatically updates the
value of the field Size, based on the Start address.
11. In the field Size, you can specify the number of IP addresses you want the pool to manage.
The value of the Size automatically updates the value of the field End address, based on
the Start address.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on OK to complete the operation. The report opens and closes. The pool is listed. On
the page All addresses, the column Pool indicates the pool name next to all the addresses
it manages.
253
Managing Pools
Reserving Pools
You can reserve a pool when adding or editing a pool thanks to the box Pool read-only. This re-
servation may be useful to dedicate the use of IP addresses to the DHCP, identify a bunch of
printers, etc.
When adding a pool, you can tick the box as well to reserve it.
Resizing Pools
You can resize IPv4 pools to manage more or less addresses than they did when you added
them. Resizing a pool shifts the start and/or end IP address of the pool, you can specify a number
of addresses to include/exclude.
So, if your pool managed the addresses 192.168.100.10-192.168.100.125 you can decide to
resize it to manage the addresses 192.168.100.100-192.168.100.105 indicating a start address
shift of "90" and an end address shift of "-20".
You cannot resize a pool if the addresses you include or exclude are already used or belong to
another pool.
254
Managing Pools
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
The range is added in the DHCP failover channel you configured at network level.
For more details, refer to the chapter Managing Advanced Properties in the section Pool Advanced
Properties.
Exporting Pools
From the page All pools:
• You can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
• You can export pools as raw data to add or edit them in bulk. For more details, refer to the
chapter Managing Raw Data.
Deleting Pools
You can delete pools. Note that if you delete a pool you do not delete the addresses it con-
tains or add an orphan container. You only delete the pool itself and the parameters it was set
with.
If addresses inherited class parameters from the deleted pool, their value and the source of their
value remain the same: the Inheritance property of each class parameter is forced to Inherit or
Set to match the configuration of the deleted pool.
To delete a pool
1. In the sidebar, go to IPAM > Pools. The page All pools opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Tick the pool(s) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The pool is no longer
listed.
On the page All addresses, the free IP addresses managed by a deleted pool are no longer listed.
The addresses In use are still listed but next to them the column Pool is empty.
Granting access to a pool as a resource also grants access to every item it contains. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
255
Chapter 18. Managing IP Addresses
The IP address is the last level of the IPAM hierarchy, where you assign your IP addresses to
specific users, devices, etc.
The page All addresses provides management options for IPv4 and IPv6.
You can synchronize Cisco DNA IP addresses on the page. For more details, refer to the appendix
Synchronizing Cisco DNA.
Browsing IP Addresses
The IP addresses can belong to terminal subnet-type networks and pools. They can be configured
with one or several aliases.
ALIAS
For more details regarding statuses, refer to the section Understanding the IP Address Type and
Status.
256
Managing IP Addresses
2. On the right-end side of the menu, make sure the button V6 is black, otherwise click on it.
The page refreshes and the button turns black.
3. On the right-end side of the menu, click on Uncompress IPv6 addresses. The page
refreshes and all the addresses are displayed entirely.
Keep in mind that the Gateway address of terminal networks is different from the other Regular
IP addresses In use. It can be automatically added and named Gateway as you add a terminal
network and it can also be set with an IP address automatically calculated from the Gateway
offset of your choice. For more details, refer to the section Network Advanced Properties.
These columns provide information regarding the IPAM to DHCP interaction that can be set via
the advanced properties or directly when configuring statics. For more details, refer to the chapter
Managing Advanced Properties or the section Adding DHCPv4 Statics.
DHCP static The IP address was added in the IPAM and configured with the advanced property Add
a DHCP static. For more details, refer to the chapter Managing Advanced Properties.
DHCP lease The IP address belongs to a pool configured with the advanced property Add a DHCP
range. For more details, refer to the chapter Managing Advanced Properties.
257
Managing IP Addresses
Read-only / Free The IP address is currently free but cannot be assigned because it belongs to a pool in
read-only. That pool is not configured with DHCP advanced properties.
Read-only / In use The IP address is currently used but cannot be edited because it belongs to a pool in
read-only. That pool is not configured with DHCP advanced properties.
Invalid The IP address does not match any IP address in the DHCP database but it belongs to
an IPv4 network or pool or to an IPv6 network configured with DHCP advanced properties.
The IPAM to DHCP advanced properties are probably misconfigured, for more details
refer to the section Configuring IPAM Advanced Properties.
To delete invalid IP addresses, refer to the section Cleaning Invalid IP Addresses.
Adding IP Addresses
At address level, there are two ways of adding, or assigning, IP addresses:
• Manually: if you already know the IP address you want to assign and are sure that this IP ad-
dress is free. You can add it from the menu Add or from the list All addresses itself.
• By search: if you do not know if there is a free IP address within your terminal networks, you
can use this option to find available IP addresses.
Note that:
• You can also import IP addresses, for more details refer to the section Importing IP Addresses
in the chapter Importing Data from a CSV File.
• You can add IP addresses via the raw data imports, for more details refer to the chapter
Managing Raw Data.
When you add large terminal networks, the Broadcast and Network addresses are auto-
matically assigned. Both addresses are by default Non assignable in large networks, but you
can make them assignable. For more details, refer to the section Assigning the Broadcast and
Network Addresses.
From the page All addresses, you can add addresses from the menu or from the list.
258
Managing IP Addresses
259
Managing IP Addresses
From the page All addresses of any terminal network, you can click on any Free IP address to
name and configure it.
260
Managing IP Addresses
261
Managing IP Addresses
Field Description
Keep in mind that in IPv6, the MAC address corresponds to the last twelve
hexadecimal characters of the client DUID.
Shortname The name of the IP address. This field is required.
Advanced properties Default is selected, so only the fields/options included in the wizard default display
are visible. This field is optional.
You can display All available fields, but you may not be able configure them. For
more details, refer to the relevant module section in the chapter Managing Ad-
vanced Properties.
Depending on the way you organized your addressing plan, you might need to assign all the
addresses of your networks, including the Network and Broadcast addresses. A registry database
entry allows to make them both assignable.
Once the Broadcast and Network addresses are assignable, you can configure them like any
other IP address. Note that on the page All addresses, their Status remains Non assignable but
the IP address itself is underlined to indicate that you can assign them.
Editing IP Addresses
You can edit used IP addresses to change their class, name, MAC address or even their advanced
properties or class parameter configuration. This edition can be done from the list All addresses
or from the IP address properties page.
262
Managing IP Addresses
To edit an IP address
1. In the sidebar, go to IPAM > Addresses. The page All addresses opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Right-click over the Name of the IP address you want to edit. In the contextual menu, click
on Edit. The wizard opens.
4. If custom classes are enabled at IP address level, in the list IP address class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Edit the fields MAC address and/or Shortname according to your needs.
You cannot edit the fields IP address and IP address name. IP address name displays the
changes performed in the fields Shortname and/or Domain. For more details, refer to the
relevant section of the chapter Managing Advanced Properties.
6. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
7. Click on NEXT . The page Aliases configuration opens.
8. In the field Add an alias, name your alias(es). Click on ADD to add it to the Aliases list. For
more details regarding aliases, refer to the section Configuring and Managing IP Address
Aliases.
9. Click on OK to complete the operation. The report opens and closes. The address is listed,
its Type and Status depend on your configuration. For more details, refer to the section
Understanding the IP Address Type and Status.
One IP address can have one unique FQDN registered in the DNS, any additional names can
only be registered as IP aliases.
ALIAS
You can only properly configure IP address aliases if you already configured the IPAM to
DNS advanced properties. Otherwise, the IPAM changes are not replicated in the DNS database.
For more details, refer to the relevant section of the chapter Managing Advanced Properties.
When you configure an alias you are associating an IP addresses in the IPAM with A, AAAA
and/or CNAME record(s) in the DNS. The most commonly configured alias is the CNAME.
263
Managing IP Addresses
The aliases can be used to associate the IP addresses of a network toward one zone or different
zones:
• Within the same zone, the IP address alias is a CNAME record that follows the DNS standard
use and points to an A or AAAA record.
• Among different zones, the alias name is crucial. The IP address shortname.domain1 adds an
A record of the zone domain1 and a CNAME record in the zone domain2 with the value
shortname.domain2. That way, your alias name links to two of your zones.
You can configure aliases when you add IP addresses, when they are still Free.
To configure aliases on an existing IP address, an address In use, you must edit it.
264
Managing IP Addresses
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. At the end of the line of the IP address of your choice, click on . The properties page opens.
4. In the panel Aliases, click on EDIT . The wizard opens.
5. If custom classes are enabled at IP address level, in the list IP address class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. Click on NEXT . The page Aliases configuration opens.
7. In the field Name, name the alias. Note that the alias cannot have the same name as the IP
address. That way, if they share the same Domain they each add a unique record.
8. In the drop-down list Domain, select an existing domain or None. The alias full name is
displayed in the field Alias following the format: <name>.<domain> .
9. In the drop-down list Type, select CNAME, A or AAAA. By default, CNAME is selected.
10. Click on ADD to move your alias to the Aliases list. Repeat these actions for as many aliases
as you need. In the list, each alias is listed as follows: (<record-type>) <full-alias-name>.
11. Click on OK to complete the operation. The report opens and closes. The panel Aliases lists
all aliases.
265
Managing IP Addresses
Note that you can cancel an alias deletion, for more details refer to the section Cancelling Dele-
tions.
We strongly recommend against configuring your DNS with one IP address associated
with a set of A aliases. Indeed, a proper configuration of your DNS implies that a name zone
is configured with a reverse zone which allows DNS clients to query your domain, through its
name on the one hand and its IP address on the other.
In this configuration, DNS best practices advise to add a PTR record in the reverse zone for each
A record of the name zone to make sure the domain or sub-domain is accessible through its
name and IP address. If your name zone contains several A records with the same value, your
reverse zone should contain as many PTR records. These records would all be named after the
same IP address (the value of the A records). In this case, the reverse zone would contain sev-
eral PTR records with the same name pointing to different domains. Therefore querying this IP
address to get the corresponding domain or sub-domain is impossible, the server cannot know
which hostname to send when answering the DNS clients query. To make sure that a domain
can be accessed through its name and IP address, there should be one PTR record in the reverse
zone for each A record of the name zone. If you need to provide an alias, you should add a
CNAME record pointing to the A record in the master zone. For more details, refer to the sections
Adding an A Record, Adding a AAAA Record, Adding a PTR Record and Adding a CNAME Record.
266
Managing IP Addresses
Note that you can configure it with several A and AAAA records when you add a Free IP address
or when edit an IP address In use.
To edit or remove A and AAAA record aliases, refer to the sections Editing IP address Aliases
and Removing IP address Aliases.
267
Managing IP Addresses
2. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
3. Tick the IP address(es) you want to rename.
4. In the menu, select Edit > Replace > IP address name. The wizard Replace IP ad-
dresses name opens.
5. In the drop-down list Exact search, select Replace, Append or Prepend. By default, Replace
is selected.
6. Click on OK to complete the operation. The report opens and closes. The new IP addresses
names are visible in the list.
Moving IP Addresses
SOLIDserver provides several ways of moving, or migrating, IPv4 addresses within your database.
Migrating IP address can be useful when you have to relocate hosts.
Keep in mind that migrating an IP address edits its class parameters inheritance and propagation
configuration: the value of the parameters is kept but each property configuration is forced to
Set/Propagate.
Keep in mind that migrating an IP address edits its class parameters inheritance and propagation
configuration: the value of the parameters is kept but each property configuration is forced to
Set/Propagate.
268
Managing IP Addresses
Keep in mind that migrating an IP address edits its class parameters inheritance and propagation
configuration: the value of the parameters is kept but each property configuration is forced to
Set/Propagate.
The wizard provides the possibility to detect an IP address in a source space and change the IP
address itself, while keeping its properties in the target space.
Keep in mind that migrating an IP address edits its class parameters inheritance and propagation
configuration: the value of the parameters is kept but each property configuration is forced to
Set/Propagate.
269
Managing IP Addresses
4. In the drop-down list Source space, select a space or Auto-detection. This option can be
selected only if your IP address exists in only one space.
5. In the field IP address to migrate, specify the IP address you want to migrate.
6. In the drop-down list Target space, select a space or Same as source. This option can be
selected only if you specify a different IP address in the field New IP address.
7. In the field New IP address, specify the IP address of your choice. It can be a different one
or the same as the one specified in the field IP address to migrate.
8. Click on OK to complete the operation. The report opens and closes.
Pinging IP Addresses
From the IPAM module, you can ping IP addresses to check if the host they are associated with
is responding.
For more details, refer to the section Automatically Adding Devices from the IPAM in the chapter
Managing devices.
A report allows to find the sessions associated with the IP addresses you manage, its result can
be downloaded in TXT, HTML or EXCEL format.
270
Managing IP Addresses
Note that:
• The report can be generated for IPv4 and IPv6 addresses.
• The report only looks for active sessions, it ignores inactive sessions. All inactive sessions are
available on the page All sessions in the module Identity Manager.
• The report finds active sessions and their identity across all directories.
• The report looks for sessions associated with assigned IP addresses, any address which status
is not Free.You can choose to include free IP addresses. For more details on address statuses,
refer to the section Understanding the IP Address Type and Status.
If you want to find active sessions at network level, refer to the section Finding Identity Manager
Sessions at Network Level.
For more details on Identity Manager sessions, refer to the chapter Managing Sessions.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section Configuring
the Transition from IPv4 to IPv6.
271
Managing IP Addresses
If the terminal network adds a scope, the option routers is directly set. If the terminal network
matches an existing scope, the option routers is set or updated.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
The static is added in the DHCP failover channel configured at network level, it shares the same
IP address, MAC address and name as the new IP address.
For more details, refer to the chapter Managing Advanced Properties in the sections Network
Advanced Properties and Configuring DHCP Advanced Properties.
An A, AAAA, CNAME or PTR record is added in the zone configured at network level. The new
record is named after the complete IP address name and zone name.
For more details, refer to the chapter Managing Advanced Properties in the sections Network
Advanced Properties and IP Address Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section IP Address
Advanced Properties.
For more details, refer to the chapter Managing Advanced Properties in the section IP Address
Advanced Properties.
272
Managing IP Addresses
This property must be set at server level. For more details, refer to the chapter Managing Advanced
Properties in the section Configuring DHCP Advanced Properties.
This property must be set at server, view or zone level and propagated down to the records. For
more details, refer to the chapter Managing Advanced Properties in the section Configuring DNS
Advanced Properties.
Exporting IP Addresses
From the page All addresses:
• You can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
• You can export IP addresses as raw data to add or edit them in bulk. For more details, refer
to the chapter Managing Raw Data.
Deleting IP Addresses
At IP address level, deleting an address actually frees it. Even though it is no longer listed, you
can assign it again by search or manually. Note that:
• As deleting an address releases it, it is impossible to delete Free addresses.
• You cannot delete Invalid addresses, you need to clean them as detailed in the section
Cleaning Invalid IP Addresses.
• You can cancel IP address deletions. For more details, refer to the section Cancelling Deletions.
To delete an IP address
1. In the sidebar, go to IPAM > Addresses. The page All addresses opens.
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. Tick the IP address(es) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The selected addresses
are no longer listed.
273
Managing IP Addresses
Note that:
• You cannot delete Invalid IP addresses via the menu , you have to clean them via a dedicated
option.
• Cleaning invalid IP addresses is irreversible, it cannot be cancelled like regular deletions.
• Within a pool, you must select all the Invalid IP addresses to clean them. You can select all
the invalid IP addresses of several pools.
Cancelling Deletions
From the page User tracking, you can restore deleted IPv4 and IPv6 IP addresses and aliases,
i.e. cancel their deletion.
This menu allows to cancel one or several IP address and alias deletions.
This link allows to cancel an IP address or alias deletion individually.
274
Managing IP Addresses
• You cannot cancel the deletion of Invalid IP addresses, they had to be cleaned. Cleaning ad-
dresses is irreversible.
• You cannot cancel an alias deletion if:
• It was added again in the meantime.
• The IP address it is configured on was deleted in the meantime.
• It was deleted when the IP address it is configured on was deleted. You must cancel the IP
address deletion to restore the alias.
• If you upgraded to this version, the IP address and alias deletions history is cleared.You cannot
restore them.
To cancel a deletion
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, click on User tracking. The page User tracking opens.
3. Filter the column Service to only display the service Delete: IPv4 addresses, Delete: IPv6
addresses, Delete: IPv4 aliases or Delete: IPv6 aliases. Only these services can be canceled.
4. In the column Undo, click on Cancel deletion to restore the deleted object of your choice.
The wizard Cancel object(s) deletion opens.
5. Click on OK to complete the operation. The report opens and closes. In the column Service,
the IP address or alias is listed as Add: <object>.
In the IPAM, it is listed again on the page All addresses.
275
Chapter 19. Managing Raw Data
You can export all IPAM objects as raw data to a CSV file, and reimport them later to add or edit
objects in bulk.
The proper way to import raw data requires to use use a raw data export and edit it to make the
necessary changes before importing the CSV file.You should not create your own raw data import
file.
To simply import and export data via the standard CSV files. For more details, refer to the part
Imports and Exports.
Limitations
• The IP address aliases are ignored.
• The properties of the parent object are not exported, therefore they cannot be reimported.
• The raw data mechanism is not meant for cloud synchronizations or VLSM organisations. The
export includes dedicated columns for the relevant objects, but you cannot edit them.
The exported data only includes the essential properties of the objects. Each property is repres-
ented by column in the CSV file.
276
Managing Raw Data
You can only import a file containing data exported using the dedicated data export.
Importing raw data requires to prepare the raw data CSV file, and then import the edited file on
the relevant IPAM page.
To prepare the raw data import you must edit the exported raw data file. Keep in mind that:
1. For each object the CSV file contains several columns, some of them are required.
Spaces
• Required columns: site_id, site_name
site_id is only required if you want to edit the database.
• Optional columns: site_is_template, tree_level, site_description, parent_site_name,
site_class_name
tree_level is set to 0 if the space does not belong to a VLSM parent space.
All the other columns are dedicated to the class parameters and advanced properties.
Networks
• For IPv4 networks:
• Required columns: subnet_id, start_hostaddr, end_hostaddr, site_name
subnet_id is only required if you want to edit the database.
• Optional columns: subnet_name, vlmvlan_id, subnet_level, subnet_class_name,
row_enabled, is_terminal, tree_level, vlsm_site_name
tree_level is set to 0 if the space does not belong to a VLSM parent space.
All the other columns are dedicated to the class parameters and advanced properties.
• For IPv6 networks:
• Required columns: subnet6_id, start_hostaddr, end_hostaddr, site_name
subnet6_id is only required if you want to edit the database.
• Optional columns: subnet6_name, vlmvlan_id, subnet_level, subnet6_class_name,
row_enabled, is_terminal, tree_level, vlsm_site_name
tree_level is set to 0 if the space does not belong to a VLSM parent space.
All the other columns are dedicated to the class parameters and advanced properties.
Pools
• For IPv4 pools:
• Required columns: pool_id, start_hostaddr, end_hostaddr, site_name
pool_id is only required if you want to edit the database.
• Optional columns: pool_name, pool_class_name, pool_read_only
All the other columns are dedicated to the class parameters and advanced properties.
• For IPv6 pools:
• Required columns: pool6_id, start_hostaddr, end_hostaddr, site_name
pool6_id is only required if you want to edit the database.
277
Managing Raw Data
278
Managing Raw Data
Before importing raw data, keep in mind that you can prepare the target space. If your target
IPAM organization is already set with the relevant classes and advanced properties, the update
is transparent.
279
Chapter 20. Managing IPAM Templates
The IPAM provides a Template Mode where you can save fully preconfigured IPv4 organizations
as templates that can, then, automate the deployment of the addressing structures that suit your
needs.
For instance, you could add a template for a subnet-type network containing 3 pools and some
assigned IP addresses. Back in Normal Mode, adding a subnet-type network associated with the
same template class automatically deploys the template and configures the network with the
same content as the template.
POOL
Start address: 15.0.0.0 POOL
checkouts 1.0.0.1-1.0.0.10 Read-only: no Size: /16 checkouts 15.0.0.1-15.0.0.10 Read-only: no
IP ADDRESS 1.0.0.1 checkout1 Terminal network: yes IP ADDRESS 15.0.0.1 checkout1
IP ADDRESS 1.0.0.2 checkout2 IP ADDRESS 15.0.0.2 checkout2
POOL POOL
IP phones 1.0.0.11-1.0.0.15 Read-only: no IP phones 15.0.0.11-15.0.0.15 Read-only: no
IP ADDRESS 1.0.0.11 landline IP ADDRESS 15.0.0.11 landline
POOL POOL
printers 1.0.0.16-1.0.0.20 Read-only: yes printers 15.0.0.16-15.0.0.20 Read-only: yes
NETWORK Hong Kong
BLOCK 20.0.0.0/8
Figure 20.1. Example deployment of a network template containing pools and IP addresses
Note that you can export all Template Mode data. For more details, refer to the chapter Exporting
Data. However, you cannot export templates as raw data.
280
Managing IPAM Templates
You can rename or edit the template class as long as it is not applied to any object. For more
details, refer to the chapter Configuring Classes.
281
Managing IPAM Templates
You can rename or edit the template class as long as it is not applied to any object. For more
details, refer to the chapter Configuring Classes.
2. Configuring Templates
Once you added template classes, you can configure organizations from the Template Mode.
282
Managing IPAM Templates
Browsing Templates
All templates are added and managed from the Template Mode. This mode is accessible from
all the IPAM pages.
When the mode is displayed, a blue banner above the top bar indicates the mode is on and only
template objects are listed.
Any user can change the column layout of the page via the button List template, on the right-
end side of the menu. Only users of the group admin can add or edit list templates. For more
details, refer to the section Managing List Templates.
283
Managing IPAM Templates
If you want to configure a Template space with parameters and properties and propagate them
to lower levels, you must deploy network and/or pool templates within a space in Normal mode
that is configured with the exact same parameters and properties that the Template space. In
that case, the deployed templates can inherit all the parent space configuration details.
Once you have one template space, you can add the objects it contains, starting with networks.
You need at least one block-type network that can contain subnet-type network(s). These subnet-
type networks can be terminal or not and manage other subnet-type networks, pools and/or IP
addresses.
284
Managing IPAM Templates
Once you have a block-type network, you can add the subnet-type network(s) it contains.
If you added a block-type network template, all the objects it contains are added when you deploy
the template.
If your template configuration is complete, you can go to the section Deploying Templates.
285
Managing IPAM Templates
• Only the subnet-type networks configured with an enabled template class in Template Mode
are available for deployment as template in Normal Mode. For more details, refer to the section
Adding Template Classes in Class Studio.
• The Start address and Prefix of a subnet-type network template are only used to determine a
range of IP addresses to configure.
• Subnet-type networks can be non-terminal and contain other subnet-type networks, even in
Template Mode.
• You cannot overlap subnet-type networks, even in Template Mode.
• The IPAM/VLAN interaction advanced properties are limited. You cannot configure a subnet-
type network to Add a VLAN, you can only associate it with an existing VLAN.
• Any subnet-type network added in Template Mode that is not configured with a template class
can either belong to a network template that sets up an organization deployed at higher level,
or can be used to set up a template organization deployed at lower level.
You can add one or more subnet-type networks, manually or using the option By search.
286
Managing IPAM Templates
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
Note that the IPAM/VLAN interaction advanced properties are limited. It is impossible to Add
a VLAN in Template Mode, you can only associate a subnet-type network with an existing
VLAN.
13. Click on OK to complete the operation. The report opens and closes. The network is listed.
Once you have a subnet-type network, you can add the other subnet-type network(s), pool(s)
and/or assigned IP addresses it can contains. For more details, refer to the section Adding IP
Addresses in the IP address dedicated chapter.
If you added a subnet-type network template, all the objects it contains are added when you deploy
the template.
If your template configuration is complete, you can go to the section Deploying Templates.
287
Managing IPAM Templates
10. In the field End address, specify the last address of the pool. By default, the last address
of the parent network is displayed. The value of the End address automatically updates the
value of the field Size, based on the Start address.
11. In the field Size, you can specify the number of IP addresses you want the pool to manage.
The value of the Size automatically updates the value of the field End address, based on
the Start address.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on OK to complete the operation. The report opens and closes. The pool is listed.
Once you have a pool, it can contain assigned IP addresses. For more details, refer to the section
Adding IP Addresses in the IP address dedicated chapter.
If you added a pool template, all the IP addresses it contains are added when you deploy the
template.
If your template configuration is complete, you can go to the section Deploying Templates.
3. Deploying Templates
To deploy templates, you must apply the template class they are associated with in Template
Mode to an object you are adding in Normal Mode. You can deploy a template as many times
as you need.
288
Managing IPAM Templates
In the procedure below, a block-type template is deployed. The template deployment follows the
same logic at block-type network, subnet-type network and pool level.
6. In the list Network class, select the class template of your choice. The class name format
is as follows: your-template-name [template] or your-sub-directory/your-template-name
[template].
Click on NEXT . The page Add an IPv4 Network opens.
7. In the field Network Name, name the network. This name is overwritten by the name set in
the selected template.
8. In the field Description, you can specify a description. The field may display an inherited
value.
9. In the field Address, specify the network start address.
10. Set the Netmask and Prefix of your choice. Make sure that the network you are adding
matches the selected template size or can contain it.
If you add a bigger network, the template configuration is deployed within the network only
to the range of addresses configured for the template. The rest of the network can be man-
aged independently like any addition performed without templates.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The report opens and closes. The network is listed,
it is automatically named after the network template. You can edit it to rename it.
13. In the column Name, click on the network name to display its content.
289
Chapter 21. Using VLSM to Manage Your
IPAM Network
The Variable Length Subnet Masking (VLSM) is a technique that allows network administrators
to break down the IP address organization on different levels of spaces, networks or pools both
in IPv4 and IPv6.
From the space level you can use the IPAM hierarchy to model the organization of IP resources
and increase its capacity. There are two ways of using VLSM within the GUI, both can be used
to delegate user rights.
Table 21.1. VLSM icons on the pages All spaces and All networks
Icon Description
The dot, located left of the space or network icon, indicates that the object belongs to another object.
It specifies the level of the space or network in the VLSM hierarchy: one dot for level 1, two dots for
level 2, three dots for level 3, and so forth depending on how deep your organization is.
This icon indicates that the subnet-type network is non-terminal i.e. using VLSM. In a space-based
VLSM organization it indicates that it is linked to a block-type network of the child space. In a network-
based VLSM organizations, it indicates that the network contains other subnet-type networks.
This icon indicates that the block-type network is part of a space-based VLSM organization and belongs
to a level 2 space, or lower. It shows that the block-type network is linked to a non-terminal subnet-
type network in the parent space, they both share the same name and size.
In both cases, organizing your IPAM network using VLSM provides a way to delegate user rights
as it allows to limit what users belonging to certain groups can display and manage.
You can set up an organization that uses both methods but there are some requirements to meet.
For more details, refer to the section Properly Using Both Methods Simultaneously.
290
Using VLSM to Manage Your IPAM
Network
VLSM introduces a parent to child dependency relationship between two spaces. A child space
is then attached and related to a parent space, they are affiliated.
SPACE
NETWORK
BLOCK
Space filiation
NETWORK
SUBNET
CHILD
SPACE
CHILD
SPACE
CHILD
SPACE
The resources contained in the parent space can then be allotted to one of its child spaces. When
a non-terminal subnet-type network is added in a parent space, it can be allotted to a child space
where it becomes a block-type networks. This block-type network can then be divided into several
non-terminal subnet-type networks and become block-type networks in "grandchildren" spaces,
and so on.
291
Using VLSM to Manage Your IPAM
Network
SPACE
NETWORK /21
BLOCK
Space filiation
NETWORK /22
SUBNET
NETWORK /22
BLOCK
NETWORK /24
SUBNET
As spaces can be combined to map your organization, they can help network administrators to
delegate the IP address management per layer of space. For instance, large block-type networks
can be defined as root entries at the top level of the space hierarchy. These networks can be
divided into several non-terminal subnet-type networks to be allotted to child spaces, each non-
terminal subnet-type network becomes a block-type network in the child space. Within these child
spaces, the block-type networks are divided into subnet-type networks matching the size of your
choice to register a network device, manage a specific set of IP addresses within your company...
This hierarchy organizes the spaces, it allows to administer and distribute resources among all
levels. The consistency check of resources and their uniformity are made between all affiliated
spaces.
In the example above, the clients IP database is organized based on geography, each country
has a separate space affiliated to the continent it belongs to. These spaces were added before
the networks and pools in order to shape the rest of the IP addresses organization.
With this type of organization, the delegation of rights can be set per continent, per country or
within a country.
292
Using VLSM to Manage Your IPAM
Network
For more details regarding the manual VLSM implementation, refer to the section Setting Up a
Space-Based VLSM Organization.
SPACE
NETWORK /21
BLOCK
NETWORK /22
SUBNET
NETWORK /23
SUBNET
NETWORK /24
SUBNET
POOL
ADDRESS
Like the space-based implementation, it involves adding non-terminal subnet-type networks but
this time it sets up several levels of hierarchy within one space. Therefore, the semi-automated
VLSM allows you to distribute IP addresses on more than one level within a space without setting
a space affiliation.
In the example above, the block-type network Internal is divided into departments. Some depart-
ments are also divided into networks to organize their management geographically. As the division
is performed at the lower level, the delegation of rights to different administrators can be all the
more precise with limited access to the database if necessary.
There is no limit to the number of non-terminal subnet-type network levels you can set. It all de-
pends on their size and the size of the block-type network they belong to.
293
Using VLSM to Manage Your IPAM
Network
For more details regarding the network-based implementation, refer to the section Setting Up a
Network-Based VLSM Organization.
Keep in mind that, in a mixed organization, you can specify the inheritance and propagation
properties depending on your needs. For more details, refer to the section Editing a VLSM Block-
type Network Class Parameters Inheritance.
Once set up, you can move networks to edit the network links between a parent space and one
of its children but you cannot set up a deeper organization once the spaces contain affiliated
networks.
However, keep in mind that you cannot export or import space-based VLSM organisations as
raw data.
294
Using VLSM to Manage Your IPAM
Network
Figure 21.6. A space filiation where the space Clients contains the child space America
295
Using VLSM to Manage Your IPAM
Network
You can edit some aspects of the space-base organization even after you added networks, pools
and addresses. For more details, refer to the section Editing a Space-Based VLSM Organization.
296
Using VLSM to Manage Your IPAM
Network
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. In the menu, click on Add. The wizard opens.
4. In the drop-down list Network type, select Block. Click on NEXT . The next page opens.
Note that if your group's permissions do not include the addition of both block-type and
subnet-type networks, the page is automatically skipped.
5. In the list Choose a space, select the space in which you want to add the network. Click on
NEXT . The next page opens.
6. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Add an IPv4 network or Add an IPv6 network opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. In the field Network Name, name the network.
8. In the field Description, you can specify a description.
9. In the field Address, specify the start address.
10. If you are adding an IPv4 network:
a. In the drop-down list Netmask select a netmask. The netmask value automatically edits
the Prefix.
b. In the drop-down list Prefix, select a value if you did not choose a netmask. The prefix
value automatically edits the Netmask.
The network size configuration is visible in the field Comment.
11. If you are adding an IPv6 network, in the drop-down list Prefix, select a value between /16
and /64. The values depend on the Address you specified.
If your administrator disabled the RFC 4291 compliance registry database entry, you can
select a prefix between /16 and /128. For more details, refer to the section Enabling the
Addition of IPv6 Terminal Networks with Non-Standard Prefixes.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on OK to complete the operation. The report opens and closes. The network is listed.
To respect the levels of management you set, once you add a subnet-type non-terminal network
in a top level space, if you click on its Name on the page All networks you are redirected to the
content of the block-type network it added in the child space. This allows to navigate from one
level to the other and add your terminal networks, pools and IP addresses.
Once you added a block-type network in the parent space, you can add a non-terminal subnet-
type network(s) it contains.
On the page All networks of the parent space, you can display the column VLSM space to see
the name of the child space that receives non-terminal subnet-type networks as block-type net-
works.
297
Using VLSM to Manage Your IPAM
Network
Figure 21.8. A non-terminal network added in the block-type network of the space America
Figure 21.9. In the child space US, the non-terminal network is a block-type network
Keep in mind that, once you link block-type and subnet-type networks in a space affiliation, they
update each other:
• If you add objects in the non-terminal subnet-type network, they are also added in the block-
type network of the child space.
• If you add objects in the block-type network of the child space, they are also added in the
subnet-type network of the parent space.
In the procedures below, we add a non-terminal subnet-type network by search but you can also
add it manually.
298
Using VLSM to Manage Your IPAM
Network
13. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
14. Click on NEXT . The page VLSM space opens.
15. In the list VLSM space, select the child space where the non-terminal subnet-type network
becomes a block-type network.
16. Click on OK to complete the operation. The report opens and closes. The network is listed
with the icon . Depending on the organization depth, it is preceded by one or several .
For more details, refer to the table VLSM icons on the pages All spaces and All networks.
On the page All networks of the parent space, the selected child space is displayed in the
column VLSM space.
On the page All networks of the selected child space, the non-terminal subnet-type network
is listed as a block-type network.
299
Using VLSM to Manage Your IPAM
Network
On the page All networks of the selected child space, the non-terminal subnet-type network
is listed as a block-type network.
If you add another non-terminal subnet-type network in the parent space, a new block-type network
is added in the child space.
You cannot set up a deeper organization of spaces once they contain networks linked from one
level to the other.
300
Using VLSM to Manage Your IPAM
Network
Both the parents of a VLSM block-type network, i.e. the space and the non-terminal subnet-type
network, can have different values for the same class parameter. The VLSM block-type network
inherits the parameter that has been configured before the other.
You can edit the class parameters inheritance source of a VLSM block-type network. The class
parameter value can be inherited from:
• Space: the class parameter value is inherited from the lowest space in the organization, the
space where the selected block-type network is located. You cannot choose a space located
at higher level.
• Network: the class parameter value is inherited from the non-terminal subnet-type network it
is linked with, one level up in the space hierarchy. You cannot inherit the value of any subnet-
type network located higher in the hierarchy.
301
Using VLSM to Manage Your IPAM
Network
Depending on your configuration, you might be able to add the missing non-terminal subnet-type
network in the parent space using the option Attach network to its VLSM parent. This would allow
to continue using VLSM to delegate rights and resources or add and delete objects in both spaces
at once.
Keep in mind that you can only use this option if:
• The block-type network in the child space is not already associated with a non-terminal subnet-
type network of the parent space.
• The parent space can receive the child space block-type network as a non-terminal subnet-
type network:
1. In the parent space, a block-type network can receive the non-terminal subnet-type network.
2. There is no overlap.
302
Using VLSM to Manage Your IPAM
Network
4. In the menu, select Tools > Expert > Attach network to its VLSM parent. The wizard
Attach network to its VLSM parent opens.
5. Click on OK to complete the operation. The report opens and closes. The selected block-
type network is now preceded by .
In this case, you can use the option Aggregate VLSM networks from the page All spaces to add
the missing non-terminal subnet-type networks in the parent space.
The option Move addresses to VLSM network allows to automate the migration of IPv4 addresses
to the lowest terminal networks across the space hierarchy. It spreads the IP addresses in all the
available terminal networks that can contain them. That is to say, a terminal network at the lowest
level of the hierarchy which start address can receive the selected addresses.
303
Using VLSM to Manage Your IPAM
Network
You can insert non-terminal subnet-type networks in between a child subnet-type network and
its parent as detailed in the section Reparenting subnet-type networks.
However, keep in mind that you cannot export or import network-based VLSM organisations as
raw data.
304
Using VLSM to Manage Your IPAM
Network
POOL
ADDRESS
Contrary to the space-based organization, the network-based VLSM organization allows you to
display the IPAM hierarchy at a glance, in one block-type network. As all the networks can be
listed all together, there is no need to go through different spaces separately to list non-terminal
subnet-type networks and their content.
305
Using VLSM to Manage Your IPAM
Network
13. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
14. Click on OK to complete the operation.The report opens and closes.The non-terminal subnet-
type network is listed and preceded by .
Once you added a non-terminal subnet-type network, it can contain as many non-terminal subnet-
type networks as you need: it all depends on their size. And you can add a hierarchy as deep as
you need.
Within the non-terminal subnet-type networks you can add terminal networks to manage pool
and assign addresses. For more details, refer to the section Adding Networks.
306
Using VLSM to Manage Your IPAM
Network
Keep in mind that, in space-based VLSM organizations, this option can only be used in independ-
ent spaces or in spaces at the lowest level. For more details, refer to the section Properly Using
Both Methods Simultaneously.
1
If your group's permissions do not include the addition of both block-type and subnet-type networks, the page is automatically skipped.
307
Using VLSM to Manage Your IPAM
Network
3. On the right-end side of the menu, make sure the button V6 is black, otherwise click on it.
The page refreshes and the button turns black.
4. On the right-end side of the menu, make sure the button is black, otherwise click on it to
display all networks. The page refreshes and the button turns black. If you display networks
level by level, all the networks managed by non-terminal networks are no longer visible.
5. In the menu, click on Add. The wizard opens.
2
6. In the drop-down list Network type, select Subnet . Click on NEXT . The next page opens.
7. In the list Choose a parent space, select a non-terminal network among the ones listed
under each space. The + sign left of the spaces' name opens the list of their networks.
8. Tick the box Allow network reparenting. Click on NEXT . The next page opens.
9. If custom classes are enabled at network level, in the list Network class select a class or
None.
Click on NEXT . The page Add an IPv6 Network opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
10. In the field Network Name, name the network.
11. In the field Description, you can specify a description. The field may be in read-only if at a
higher level, its Inheritance property is Inherit. If you want to specify a different description
and/or restrict its propagation to lower levels, you must Set its Inheritance property and/or
Restrict its Propagation property before being able to specify any value in the field. For more
details, refer to the chapter Inheritance and Propagation.
12. In the field Address, specify the start address. By default, the start address of the block-type
network you selected is displayed in the field.
13. In the drop-down list Prefix, select /64, /127 or /128.
If your administrator disabled the RFC 4291 compliance registry database entry, you can
select a prefix between /16 and /128. For more details, refer to the section Enabling the
Addition of IPv6 Terminal Networks with Non-Standard Prefixes.
14. Untick the box Terminal network.
15. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
16. Click on OK to complete the operation. The report opens and closes. The network is listed.
The reparented network is now listed at a lower level in the VLSM hierarchy.
2
If your group's permissions do not include the addition of both block-type and subnet-type networks, the page is automatically skipped.
308
Using VLSM to Manage Your IPAM
Network
If you make the different pieces of a space organization resources to specific groups, you can
delegate the management one level at a time and whoever has access to the whole hierarchy
can keep track of all the changes.
For more details regarding users, groups and delegation within SOLIDserver, refer to the part
Rights Management.
309
Using VLSM to Manage Your IPAM
Network
In the example above, the hierarchy of VLSM spaces could be used to grant a group of users:
• Access and management permissions to the content of the space USA. That is to say, make
all the block-type networks of that space a resource of the group and grant them the relevant
rights over them. That way, the users of the group:
• Can display the space USA, as it is the container of the block-type networks they have on
the page Resources.
• Can access the content of the block-type networks they have among their resources. However,
they cannot display the content of the subnet-type networks and pools of these block-type
networks as they are not listed among their resources.
• Can manage the block-type networks listed among their resources, as they were granted
the relevant permissions.
Note that, if you grant the group access to the subnet-type networks and pools of the space
USA, users can display the entire space content, down to the IP addresses. With the relevant
permissions, they can manage these objects as well. For more details, refer to the section
Adding Resources to a Group.
• Access to the space America. That is to say, make that space a resource of the group. That
way, the users of the group:
• Can display the content of the space America, i.e. all the spaces it contains, including USA.
And therefore, see all changes performed in the spaces USA and America.
Keep in mind that granting access to a resource does not grant access to its container. Therefore,
if you grant users access to the space USA, they cannot display the content of America. In the
same ways, if you grant them access to America, they cannot display the content of Clients.
To delegate management, you could for instance grant access to these spaces to two different
groups of users. That way, one group could perform specific operations, while the other could
supervise these operations.
For more details on users, groups and rights, refer to the part Rights Management.
310
Using VLSM to Manage Your IPAM
Network
In the example above, the hierarchy of VLSM networks could be used to grant a group of users:
• Access and management permissions to all the terminal networks of the non-terminal subnet-
type network New York City. That is to say, make that network a resource of the group and
grant them the relevant rights over it. That way, the users of the group:
• Can display the network NY, as it is the container of the network they have on the page
Resources.
• Can display the terminal networks it contains. However, they cannot display the content of
the pools they may contain, as they are not listed among their resources.
• Can manage the objects listed among their resources if they were granted the relevant rights.
For more details, refer to the section Adding Resources to a Group.
• Grant access to the non-terminal subnet-type network East Coast. That is to say, make that
network a resource of the group. That way, the users of the group:
• Can display the content of the non-terminal subnet-type network New York City and see that
it contains another network named FL.
• Can see all changes performed within the network.
To delegate management, you could for instance grant access to these subnet-type networks to
two different groups of users. That way, one group could perform specific operations, while the
other could supervise these operations.
For more details on users, groups and rights, refer to the part Rights Management.
311
Chapter 22. Managing Cloud
Synchronization
The IPAM allows to synchronize addressing plans stored on some cloud providers. The module
Ecosystem provides a rule that allows to identify your addressing plans stored on AWS cloud,
Azure cloud and GCP environments.
To properly synchronize cloud addressing plans, i.e. all IP related information, you must:
1. Meet the prerequisites.
2. Take into account the limitations.
3. Configure the rule that suits your needs.
• For AWS, refer to the section Configuring AWS Synchronization.
• For Azure, refer to the section Configuring Azure Synchronization.
• For GCP, refer to the section Configuring GCP Synchronization.
Prerequisites
• Having all cloud provider details ready:
• For AWS, you need your AWS Account ID, Access key ID and an Access secret key. In
addition, you can specify a tag for VPCs, subnets and IP addresses, the tag is used to name
the objects synchronized in the IPAM.
• For Azure, you need your Azure tenant ID, Subscription ID, Client ID and Client secret key.
In addition, you must name Azure VNs and subnets.
• For GCP, you need your service account email and private key. From GCP console, you
must download your private key JSON file to retrieve them.
Depending on the size of you GCP data, you may need to adjust the Quota of your Read
request to avoid synchronization errors.
• Having an independent space ready to receive the data you want to synchronize. You cannot
synchronize cloud objects if they match existing IPAM networks delegated to another space.
• If your internal network policies do not allow cloud synchronization, you can configure a proxy.
For more details, refer to the section Configuring a Proxy Server.
312
Managing Cloud Synchronization
Limitations
• All the changes you perform in the IPAM on synchronized objects are overwritten during the
next synchronization.
• All synchronization error messages can only be seen on the page Syslog. For more details,
refer to the section Monitoring the Synchronization.
• For GCP environment synchronization:
• Only IPv4 GCP data are synchronized to the IPAM.
• VPC networks cannot be synchronized because they are not associated with any address.
• The aliases of the instance interfaces are not synchronized to the IPAM.
When the rule is configured, your data is available in the IPAM, it evolves at every synchronization.
313
Managing Cloud Synchronization
• You can specify a tag for VPCs, subnets and IP addresses, before you add the rule. The tag
is used to name the objects synchronized in the IPAM.
• You must have an independent space ready to receive the data you want to synchronize. You
cannot synchronize cloud objects if they match an existing IPAM network delegated to another
space.
• A new VPC is always added in the IPAM at the lowest level.
• If no blocks can contain the subnets, the VPC is added as a block. However, it is recommended
to add a space containing blocks able to receive AWS objects before the synchronization.
314
Managing Cloud Synchronization
b. In the field Access key ID, specify an access key ID. It cannot contain special characters.
c. In the field Access secret key, specify its secret key.
14. Configure the VPC(s) you want to synchronize:
a. In the drop-down list Associated IPAM Space, select a space that can receive the AWS
data.
Note that within a space, networks and IP addresses cannot overlap. Each network has
a unique start and end address, and each IP address is unique.
b. In the field VPC region, specify the code of the AWS region containing the VPC(s) to
synchronize. For instance, for the region Europe (Paris) you must type in eu-west-3.
c. In the field VPC, you can specify one or several VPC names and/or IDs, separated by
a semi-colon as follows: <VPC-ID-1>;<VPC-name-2>;<VPC-ID-3> or a regex, for instance
/^vpc-33.*/.
If you leave the field empty, all the VPCs of the specified VPC region are synchronized.
d. Once a VPC is configured, click on ADD . The entry is moved to the VPCs list.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
e. Repeat these steps for as many VPCs as you want.
15. Click on OK to complete the operation. The report opens and closes. The rule is listed. To
make sure the synchronization is successful, refer to the section Checking AWS Synchron-
ization.
Once the configuration is ready, keep in mind that the following behaviors can occur:
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If a synchronized object is deleted from the IPAM during the synchronization, its children are
deleted too.
• If an object fails to be synchronized, its children are ignored.
• If an AWS IPv4 object fails to be synchronized, it does not prevent its IPv6 counterpart from
being successfully synchronized, and vice-versa.
Note that you can edit the synchronization frequency, account details or VPCs list of the rule
from its properties page. Any change triggers a new synchronization and can edit the content of
the space configured for the rule. If you delete a space, all synchronized objects are deleted from
the configured space.
All synchronized information is available on the pages All networks and All addresses of the
configured space and on the properties page of the new objects.
On the page All networks, a set of Class param: columns are dedicated to AWS information.
Any user can display a list template containing these columns via the button List template,
on the right-end side of the menu. However, only users of the group admin can add or edit list
templates, for more details refer to the section Managing List Templates.
315
Managing Cloud Synchronization
Some objects may be missing from either pages as the data listed depend on the synchronization:
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If a synchronized object is deleted from the IPAM during the synchronization, its children are
deleted too.
• If an object fails to be synchronized, its children are ignored.
• If an AWS IPv4 object fails to be synchronized, it does not prevent its IPv6 counterpart from
being successfully synchronized, and vice-versa.
On the properties page of synchronized objects, all AWS parameters you configured for the rule
are listed in the panel Ecosystem.
On non-terminal network properties page, the panel contains AWS owner ID (Account ID), AWS
VPC region and VPC ID.
On terminal network properties page, the panel contains AWS availability zone, AWS subnet
ID and parameters inherited from the parent network.
On IP address properties page, the panel contains AWS instance ID and parameters inherited
from the terminal network and the parent network.
316
Managing Cloud Synchronization
When the rule is configured, your data is available in the IPAM, it evolves at every synchronization.
• You must name VNs and subnets before you add the rule. The tag is used to name the objects
synchronized in the IPAM.
• You must have an independent space ready to receive the data you want to synchronize. You
cannot synchronize cloud objects if they match an existing IPAM network delegated to another
space.
• A new VN is always added in the IPAM at the lowest level.
• If no blocks can contain the subnets, the VN is added as a block. However, it is recommended
to add a space containing blocks able to receive Azure objects before the synchronization.
317
Managing Cloud Synchronization
If you do not set a frequency, the synchronization happens only once and the information is
only retrieved during the rule addition.
Once the configuration is ready, keep in mind that the following behaviors can occur:
318
Managing Cloud Synchronization
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If an object is deleted from the IPAM during the synchronization, its children are deleted too.
• If an object fails to be synchronized, its children are ignored.
• If an Azure IPv4 object fails to be synchronized, it does not prevent its IPv6 counterpart from
being successfully synchronized, and vice-versa.
Note that you can edit the synchronization frequency, account details or Virtual network list of
the rule from its properties page. Any change triggers a new synchronization and can edit the
space configured for the rule. If you delete a space, all synchronized objects are deleted from
the configured space.
All synchronized information is available on the pages All networks and All addresses of the
configured space and on the properties page of the new objects.
On the page All networks, a set of Class param: columns are dedicated to Azure information.
Any user can display a list template containing these columns via the button List template,
on the right-end side of the menu. However, only users of the group admin can add or edit list
templates, for more details refer to the section Managing List Templates.
Some objects may be missing from either pages as the data listed depend on the synchronization:
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If an object is deleted from the IPAM during the synchronization, its children are deleted too.
• If an object fails to be synchronized, its children are ignored.
• If an Azure IPv4 object fails to be synchronized, it does not prevent its IPv6 counterpart from
being successfully synchronized, and vice-versa.
319
Managing Cloud Synchronization
On the properties page of synchronized objects, all Azure parameters you configured for the rule
are listed in the panel Ecosystem.
On non-terminal network properties page, the panel contains Azure virtual network location,
Azure resource group, Azure tenant ID, Azure virtual network ID and Azure subscription
ID.
On terminal network properties page, the panel contains Azure subnet ID and parameters inher-
ited from the parent network.
On IP address properties page, the panel contains Azure instance ID and parameters inherited
from the terminal network and the parent network.
When the rule is configured, your data is available in the IPAM, it evolves at every synchronization.
• GCP projects and Virtual Private Clouds (VPCs) are only used to identify subnets.
• You must have an independent space ready to receive the data you want to synchronize. You
cannot synchronize cloud objects if they match an existing IPAM network delegated to another
space.
• If no block-type network can receive the subnets, the corresponding terminal networks are
added in a container Orphan Networks.
• A new subnet is always added in the IPAM at the lowest level.
320
Managing Cloud Synchronization
321
Managing Cloud Synchronization
b. In the field Project ID, you can specify the identifier of a GCP project containing the
VPC(s) to synchronize. It can be one or several IDs separated by a semi-colon as follows:
<project-id-1>;<project-id-2> or a regex, for instance /^my-sample-project-.*/.
If you leave the field empty, all the projects of the specified Service account email are
synchronized.
c. In the field VPC network name, you can specify the name of a VPC containing the
subnet(s) to synchronize. It can be one or several names separated by a semi-colon as
follows: <VPC-name-1>;<VPC-name-2> or a regex, for instance /^unique-vpc-name-.*/.
If you leave the field empty, all the VPCs of the specified Project ID are synchronized.
d. Once a VPC is configured, click on ADD . The entry is moved to the VPC networks list.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
e. Repeat these steps for as many VPCs as you want.
15. Click on OK to complete the operation. The report opens and closes. The rule is listed. To
make sure the synchronization is successful, refer to the section Checking the GCP Syn-
chronization in the IPAM.
Once the configuration is ready, keep in mind that the following behaviors can occur:
• If a GCP subnet is configured with a secondary IP range during a synchronization, it is possible
that only one network is added, the other one should be added at the next synchronization.
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If an object is deleted from the IPAM during the synchronization, its children are deleted too.
• If a GCP subnet synchronization fails, the interfaces of its instances are ignored. Therefore,
an instance may be partially synchronized, only the interfaces belonging to a subnet successfully
synchronized are taken into account.
Note that you can edit the synchronization frequency, account details or VPC networks list of the
rule from its properties page. Any change triggers a new synchronization and can edit the content
of the space configured for the rule. If you delete a space, all synchronized objects are deleted
from the configured space.
All synchronized information is available on the pages All networks and All addresses of the
configured space and on the properties page of the new objects.
On the page All networks, a set of Class param: columns are dedicated to GCP information.
Any user can display a list template containing these columns via the button List template,
on the right-end side of the menu. However, only users of the group admin can add or edit list
templates, for more details refer to the section Managing List Templates.
322
Managing Cloud Synchronization
Some objects may be missing from either pages as the data listed depends on the synchronization:
• If a GCP subnet is configured with a secondary IP range during a synchronization, it is possible
that only one network is added, the other one should be added at the next synchronization.
• If any object no longer exists in the cloud providers, any IPAM object added during a previous
synchronization is deleted after the next one.
• If an object is deleted from the IPAM during the synchronization, its children are deleted too.
• If a GCP subnet synchronization fails, the interfaces of its instances are ignored. Therefore,
an instance may be partially synchronized, only the interfaces belonging to a subnet successfully
synchronized are taken into account.
On the properties page of synchronized objects, all GCP parameters you configured for the rule
are listed in the panel Ecosystem.
On terminal network properties page, the panel contains VPC network, Project ID, VPC network
region, Subnet ID, Subnet unique ID and Sync ID. Note that the Subnet unique ID and Sync
ID are only used for synchronization purposes, they do not come from GCP.
On IP address properties page, the panel contains Instance ID, Network interface, the unique
instance name, Availability zone and parameters inherited from the terminal network.
Note that you can filter the page via the filter constructor of the column Log:
323
Managing Cloud Synchronization
• To monitor AWS error messages, on one line you must select contains and specify the keyword
AWS, and on the second line you must select the filter parameter AND and then select contains
and specify the keyword Unable.
• To monitor Azure error messages, on one line you must select contains and specify the keyword
Azure, and on the second line you must select the filter parameter AND and then select contains
and specify the keyword Unable.
• To monitor GCP error messages, on one line you must select contains and specify the keyword
GCP, and on the second line you must select the filter parameter AND and then select contains
and specify the keyword Unable.
You can even add an alert dedicated to the synchronization. For more details, refer to the section
Managing Alerts.
If you disable or delete a rule, the synchronized objects remain listed in the IPAM but are no
longer updated. Note that to delete all synchronized data from the IPAM, you should start with
IP addresses and follow the module hierarchy up to block-type networks.
To disable a rule
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. Filter the list through the column Rule# of your choice and hit Enter.
4. Tick the rule of your choice.
5. In the menu, select Edit > Disable. The wizard opens.
6. Click on OK to complete the operation. The report opens and closes. In the column Status,
the rule is marked Disabled.
To enable a rule again, follow the procedure above and select Enable. In the column Status,
the rule is marked Enabled.
To delete a rule
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. Filter the list through the Rule# of your choice and hit Enter.
4. Tick the rule of your choice.
5. In the menu, click on Delete. The wizard opens.
6. Click on OK to complete the operation. The report opens and closes. The rule is no longer
listed.
324
Part VI. DHCP
The Dynamic Host Configuration Protocol (DHCP) is a network protocol which role is to automate the as-
signment of parameters to the clients connecting to the network, from a valid IP address to specific DHCP
options.
It allows to set up specific connection behaviors for current devices and new devices on the network. The
connection can be temporary, through dynamic addressing, or permanent, through fixed reservation. If
you want to import an existing DHCP configurations, refer to the part Imports and Exports.
The DHCP grants users access to the network following four steps:
1. Discovery: the DHCP client (host) broadcasts a DHCPDISCOVER packet on its physical subnet (usually
255.255.255.255) to discover the available DHCP servers;
2. Offer: all the available DHCP servers receiving the request respond to the host with a DHCPOFFER
packet containing their own IP address and valid connection settings, dynamic or fixed;
3. Request: the host sends a DHCPREQUEST packet to inform all the DHCP servers that offered an IP of
the acceptance. That packet includes the IP address of the DHCP server delivering access by the host,
the other servers can return the offered IP address to their pool of available addresses;
4. Acknowledge: the selected server sends all the configuration data to the host in a DHCPACK packet.
Discover
The client broadcasts a request for an IP address
Offer
The DHCP server offers an IP address
Request
The client broadcasts their IP address acceptance
DHCP client DHCP server
Acknowledge
The DHCP server confirms the IP address allocation
The DHCP hierarchy can include up to 4 levels of organization. These levels depend on the connection
behaviors you set, dynamic addressing or fixed reservation:
• Servers: the highest level of the hierarchy. It allows to set up fixed reservation and/or dynamic addressing.
It can contain shared networks, scopes, groups, ranges, leases and/or statics. For more details, refer to
the chapter Managing DHCP Servers. One or several servers can be managed via a smart architecture
to ensure service availability and prevent data or configuration loss. For more details, refer to the chapters
Understanding DHCP Smart Architectures and Managing DHCP Smart Architectures.
• Groups: an optional level of fixed reservation that belongs to a server and contains static reservations.
It allows to apply specific DHCP options to the statics of your choice. For more details, refer to the chapter
Managing DHCP Groups.
• Shared networks: an optional level of the hierarchy. They allow different scopes to serve a common
network segment. In DHCPv6, they can contain prefix delegations. For more details, refer to the chapter
Managing DHCP Shared Networks.
• Scopes: the second level of the hierarchy. It can contain ranges for dynamic addressing or directly statics
for static allocation. For more details, refer to the chapter Managing DHCP Scopes.
• Ranges: the third level of the hierarchy for dynamic addressing. They contain the IP addresses that are
randomly allocated to hosts for a limited period of time, the leases. When the lease time expires, the address
is returned to the range and can be reallocated. Ranges can be configured with Access Control Lists
(ACLs) to restrict or authorize access to specific users. For more details, refer to the chapter Managing
DHCP Ranges.
• Leases: the lowest level of the hierarchy for dynamic addressing. Each lease is an IP address belonging
to a range that is currently being allocated or was allocated to a host, you can track the leases history.
For more details, refer to the chapter Managing DHCP Leases.
• Statics: the lowest level of the hierarchy for fixed reservation. Static reservation ensures that a host always
gets the same access details when they connect to the network. A static identifies a host using their MAC
address and always provides them with an IP address and/or a set of DHCP options. For more details,
refer to the chapter Managing DHCP Statics.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
23. Understanding DHCP Smart Architectures ................................................................ 330
Implementing DHCP Smart Architectures ............................................................... 331
DHCP Vendors Compatible with Smart Architectures ............................................... 334
Building a Highly Available Service With Smart Architectures ................................... 335
24. Managing DHCP Smart Architectures ....................................................................... 336
Browsing DHCP Smart Architectures ...................................................................... 336
Adding DHCPv4 Smart Architectures ..................................................................... 337
Adding DHCPv6 Smart Architectures ..................................................................... 344
Editing DHCP Smart Architectures ......................................................................... 348
Handling the Status Locked Synchronization ........................................................... 353
Exporting DHCP Smart Architectures ..................................................................... 355
Deleting DHCP Smart Architectures ....................................................................... 355
Defining DHCP Smart Architectures as Group Resources ........................................ 355
25. Managing DHCP Failover Channels .......................................................................... 356
DHCP Failover Principles and Operational States .................................................... 356
Browsing DHCP Failover Channels ........................................................................ 359
Switching DHCP Servers to Partner-down .............................................................. 362
Exporting DHCP Failover Channels ........................................................................ 363
26. Managing DHCP Servers ......................................................................................... 364
Browsing DHCP Servers ....................................................................................... 364
Managing EfficientIP DHCP Servers ....................................................................... 366
Managing Microsoft Windows DHCP Servers .......................................................... 371
Managing ISC DHCP Servers on Linux ................................................................... 377
Synchronizing DHCP Servers ................................................................................ 386
Editing DHCP Servers ........................................................................................... 386
Repairing Leases .................................................................................................. 387
Configuring DHCP Options at Server Level ............................................................. 387
Exporting DHCP Servers ....................................................................................... 389
Deleting DHCP Servers ......................................................................................... 389
Defining DHCP Servers as Group Resources ......................................................... 389
27. Managing DHCP Shared Networks ........................................................................... 390
Browsing Shared Networks .................................................................................... 390
Adding DHCP Shared Networks ............................................................................. 391
Editing DHCP Shared Networks ............................................................................. 391
Exporting Shared Networks ................................................................................... 392
Deleting DHCP Shared Networks ........................................................................... 392
28. Managing DHCP Scopes .......................................................................................... 393
Browsing DHCP Scopes ........................................................................................ 393
Adding DHCP Scopes ........................................................................................... 394
Editing DHCP Scopes ........................................................................................... 395
Configuring DHCP Options at Scope Level ............................................................. 396
Defining a Specific IPAM Space for a Scope ........................................................... 398
Defining a Specific Failover Channel for Scopes ...................................................... 398
Replicating Scope Data in the IPAM ....................................................................... 399
Configuring Multiple Scopes for a Network Segment ............................................... 400
Copying or Moving DHCPv4 Scopes ...................................................................... 401
Configuring DHCP Relay Agents ............................................................................ 401
Adding DHCP Scopes from the IPAM ..................................................................... 402
Updating DHCP Scopes from the IPAM .................................................................. 403
Exporting DHCP Scopes ....................................................................................... 403
Deleting DHCP Scopes ......................................................................................... 403
327
DHCP
328
DHCP
329
Chapter 23. Understanding DHCP Smart
Architectures
The DHCP can quickly become an essential piece of any network data organization. Once
properly set up, it is usually hardly noticed, silently and faithfully performing its duties, day in and
day out.
The DHCP clients' needs must be considered, including which DHCP options are supported by
the client's operating system and which options and values need to be assigned. In large-scale
DHCP implementations, the topology of the network becomes a very important factor.The network
topology dictates where DHCP servers and/or relay agents must be placed. A final consideration
is planning for fault tolerance.
To ensure that the DHCP service is available at all times and that you do not lose specific config-
urations if a DHCP server crashes, we strongly recommend that you manage physical servers
through smart architectures. To understand the possible configurations of your service availability,
refer to the section Building a Highly Available Service With Smart Architectures.
Smart architecture pre-built DHCP configurations including backup and failover features with
IPv4 addressing. Their implementation reduces the risk of misconfiguration.
There are several architectures and possible configurations to choose from both for DHCPv4
and DHCPv6. In DHCPv6, smart architectures simply provide a configuration backup.
SOLIDserver supports a set of vendors detailed in the section DHCP Vendors Compatible with
Smart Architectures.
330
Understanding DHCP Smart
Architectures
Unlike DHCPv4 architecture, DHCPv6 architectures have some limitations and specificities:
• The failover protocol is not available in IPv6. Thus, the page All failover channels in v6 is merely
a list linking servers through the defined ports. For more details, refer to the chapter Managing
DHCP Failover Channels.
• IPv6 addressing is only possible from the EfficientIP servers.
• DHCPv6 servers operate on an appliance running in IPv4.
• In IPv6 there is no compatibility with the numerous vendors providing IP addressing.
DHCP DHCP
Master Backup
The One-to-One smart architecture allows two DHCP servers to share a range of common ad-
dresses. Should a server stop working, the second server would take over, depending on your
failover configuration. For more details regarding failover, refer to the section DHCP Failover
Principles and Operational States of the chapter Managing DHCP Failover Channels.
331
Understanding DHCP Smart
Architectures
DHCP
Master
DHCP DHCP
Backup Backup
This architecture is particularly relevant for organizations that have many sites and need to have
a dedicated DHCP service per site. It looks like a star configuration, where N DHCP servers, no
matter their location, share a failover channel with the central DHCP server of the smart architec-
ture: it is a N+1 servers configuration.
Split-Scope Split-Scope
80% 20%
There is no failover protocol between the two servers but being a smart architecture, the Split-
Scope provides a backup of the configuration: if anything were to happen to any of the managed
servers, installing them back to SOLIDserver would apply the smart architecture on both servers
again.
332
Understanding DHCP Smart
Architectures
Single
DHCP
Single
DHCP
DHCPv6
Split-Scope Split-Scope
80% 20%
DHCPv6
333
Understanding DHCP Smart
Architectures
There is no failover protocol between the two servers but being a smart architecture, the Split-
Scope provides a backup of the configuration: if anything were to happen to any of the managed
servers, installing them back to SOLIDserver would apply the smart architecture on both servers
again.
There is no master or backup servers per se in this configuration. By default, they all are inde-
pendent master servers sharing the same options configuration.
Stateless
DHCPv6
Keep in mind that the Stateless smart architecture only has an impact on the options available
to the DHCPv6 clients, therefore it is impossible to add ranges and static through this configuration.
In the same way, no leases are provided or managed.
SOLIDserver supports almost all features delivered by each vendor but does not add additional
features at service level.Thus, limitations depend on each vendor. For instance, Microsoft Windows
DHCP services do not provide failover, so you cannot configure it from the appliance.
334
Understanding DHCP Smart
Architectures
You can manage any supported vendor on one page from the GUI. SOLIDserver is an abstraction
layer that masks the specific processes of each DHCP vendor to network administrators. DHCP
services are not managed one server at a time but as a global service. It is possible to simultan-
eously configure Microsoft Windows running DHCP servers and Linux running ISC DHCP servers,
modify VoIP options on all DHCP servers or generate transversal reports to get an immediate
comprehensive understanding of network services configurations.
Each and every one of these servers can be managed by SOLIDserver smart architecture to
ease the management configuration and provide a backup of the chosen configuration. For more
details, refer to the chapter Managing DHCP Smart Architectures.
For more details, refer to the chapter Adding DHCPv6 Smart Architectures.
Two active DHCP servers cannot share an IP address pool since they have no way of knowing
with certainty which IP addresses are being distributed. Therefore, two active DHCP servers
cannot perform dynamic DHCP which is why scope splitting is necessary to separate IP address
ranges per server. This configuration, the Split-Scope, is available for both DHCPv4 and DHCPv6.
With a traditional active/passive pair of DHCP servers, if the active server fails, the network ad-
ministrator is required to manually turn on the passive DHCP server so that it can take over until
the initial active server is restored. DHCP High Availability with IP address scope splitting provides
failover but with the risk of meeting downtime as addresses are leased to more than one client
and have potential manual intervention to clean up the lease database. In order for two DHCP
servers to provide DHCP services for the same network segments, the servers must coordinate
their behavior. Each server must either know what the other is doing or be configured so that it
can operate without knowing what the other is doing. In order for each server to know what the
other is doing, the DHCP safe failover protocol can be implemented.
As the failover protocol is not available in DHCPv6, the DHCP Safe failover protocol is only
available for DHCPv4 servers.
335
Chapter 24. Managing DHCP Smart
Architectures
Once you determined the smart architecture(s) that suit your needs in the chapter Understanding
DHCP Smart Architectures, you can manage them.
From the page All servers, you can add, edit and delete DHCPv4 and DHCPv6 smart architectures.
In the column Name, all the smart architectures are preceded by the icon . They are listed with
the physical servers.
The column Status provides information on the configuration of each smart architecture.
Invalid settings The smart architecture does not contain any physical server, is missing one or sev-
eral physical servers or is not configured properly (it may contain objects incompatible
with at least one of the physical servers it manages).
The column Sync provides synchronization details on the exchanges between the smart archi-
tecture and its physical server(s).
336
Managing DHCP Smart
Architectures
Locked synchronization The synchronizing failed, the smart architecture cannot send its configuration file to
the physical server(s) it manages. The configuration of one of its EfficientIP or Effi-
cientIP Package server is not viable. For more details, refer to the section Handling
the Status Locked Synchronization.
With DHCPv4, there are four different kinds of smart architectures: One-to-One, One-to-Many,
Split-Scope and Single-Server. As for DHCPv6 smart architectures, SOLIDserver proposes the
Single-Server, Split-Scope and Stateless architectures. In the procedures below, we are going
to describe the configuration of the DHCP smart architectures with the DHCP servers they
manage, but you can go through the configuration without adding any server and do it later. For
more details, refer to the part Adding a DHCP Server into a Smart Architecture.
Once the configuration is completed, the DHCP smart architecture appears on the page All
servers as a server.
As you can see, the column Type mentions the kind of smart architecture applied, the DHCP
smart members column is marked N/A and for that reason, the server status is Invalid settings.
337
Managing DHCP Smart
Architectures
Parameter Description
Isolated Tick the box Isolated if you want to isolate the server within SOLIDserver. This
prevents the server, and its content, from executing any configured replication
rule or advanced property. The server still receives data if your network config-
uration allows it.
This field is optional and mainly useful during migrations. When the server con-
figuration is ready and you untick the box, you must manually execute the rules
and/or advanced properties, at all relevant levels of the module hierarchy, via
the menu Tools > Initialize rules.
Description A description, it is returned in the corresponding column on the page All servers.
This field is optional.
Advanced properties Default is selected, so only the fields/options included in the wizard default display
are visible. This field is optional.
You can display All available fields, but you may not be able configure them. For
more details, refer to the relevant module section in the chapter Managing Ad-
vanced Properties.
DHCP DHCP
Master Backup
338
Managing DHCP Smart
Architectures
Parameter Description
Maximum client lead time The MCLT of your choice for the failover channel, a value between 0 and 65535
(MCLT) seconds. By default it is set to 0, and uses the MCLT set on the appliance. This
field is optional.
The parameter MCLT allows to specify for how long each DHCP server can ex-
tend the lease of a client, beyond the time known by its partner server.
Automatic switch to part- The amount of time after which a failover channel in Communications-interrupted
ner-down delay (in hours) state should automatically switch to Partner-down, a value between 4 and 65535
hours. By default, it is disabled and set to 0. This field is optional.
Peer DHCP server The name of the backup server. This field is grayed out.
Split leases The distribution of the leases among the servers of the smart architecture, either
Balanced, Prefer backup or Prefer master. By default, Balanced is selected. This
field is optional.
Balanced The leases are delivered to the clients by both servers equally.
Prefer backup The leases are delivered to the clients by the backup server only.
Prefer master The leases are delivered to the clients by the master server only.
14. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DHCP server and marked Smart (one-to-one) in the column Type. To display
or hide the physical servers managed through the smart architecture click on on the right-
end side of the menu.
339
Managing DHCP Smart
Architectures
Parameter Description
and/or advanced properties, at all relevant levels of the module hierarchy, via
the menu Tools > Initialize rules.
Description A description, it is returned in the corresponding column on the page All servers.
This field is optional.
Advanced properties Default is selected, so only the fields/options included in the wizard default display
are visible. This field is optional.
You can display All available fields, but you may not be able configure them. For
more details, refer to the relevant module section in the chapter Managing Ad-
vanced Properties.
DHCP
Master
DHCP DHCP
Backup Backup
340
Managing DHCP Smart
Architectures
Field Description
Maximum client lead The MCLT of your choice for the failover channel, a value between 0 and
time (MCLT) 65535 seconds. By default it is set to 0, and uses the MCLT set on the appli-
ance. This field is optional.
The parameter MCLT allows to specify for how long each DHCP server can
extend the lease of a client, beyond the time known by its partner server.
Automatic switch to part- The amount of time after which a failover channel in Communications-inter-
ner-down delay (in rupted state should automatically switch to Partner-down, a value between
hours) 4 and 65535 hours. By default, it is disabled and set to 0. This field is optional.
Peer DHCP server The backup server of your choice for this failover. By default, None is selec-
ted. This field is optional.
Split leases The distribution of the leases among the servers of the smart architecture,
either Balanced, Prefer backup or Prefer master. By default, Balanced is
selected. This field is optional.
Balanced The leases are delivered to the clients by both servers
equally.
Prefer backup The leases are delivered to the clients by the backup server
only.
Prefer master The leases are delivered to the clients by the master server
only.
b. Click on UPDATE to save your configuration. The failover details are moved to the list
DHCP peering assignment.
14. Configure the remaining failover channels.
a. Follow the table One-to-Many failover parameters to configure the failover between the
master and each backup server.
b. Click on ADD to save your configuration. The failover details are moved to the list DHCP
peering assignment.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
c. Repeat these steps for as many failover channels as needed. There should be a failover
channel between each backup server and the master.
15. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DHCP server and marked Smart (one-to-many) in the column Type. To display
or hide the physical servers managed through the smart architecture click on on the right-
end side of the menu.
341
Managing DHCP Smart
Architectures
2. In the menu, select Add > Server > Smart architecture. The wizard Add a DHCP
server opens.
3. If custom classes are enabled at server level, in the list DHCP server class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. Fill in the fields according to the table below:
Split-Scope Split-Scope
80% 20%
342
Managing DHCP Smart
Architectures
12. In the field Distribution ratio (in percent), specify the ratio of IP ranges to be managed by
the Master DHCP server you just selected. By default, 80 is proposed, meaning that the re-
maining 20% are listed and managed by the backup server.
13. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DHCP server and marked Smart (split-scope) in the column Type. To display
or hide the physical servers managed through the smart architecture click on on the right-
end side of the menu.
Note that a virtual failover channel is automatically added with the smart architecture, it is
named failover-<smart_architecture_name> and listed on the page All failover channels.
343
Managing DHCP Smart
Architectures
Single
DHCP
With DHCPv6, there are three different kinds of smart architectures: Single-Server, Split-Scope
and Stateless. In the procedures below, we are going to describe the configuration of DHCPv6
smart architectures with DHCP servers but you can go through the configuration without adding
any server and do it later. For more details, refer to the part Adding a DHCP Server into a Smart
Architecture.
344
Managing DHCP Smart
Architectures
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. Fill in the fields according to the table below:
Single
DHCP
DHCPv6
345
Managing DHCP Smart
Architectures
Split-Scope Split-Scope
80% 20%
DHCPv6
346
Managing DHCP Smart
Architectures
347
Managing DHCP Smart
Architectures
Parameter Description
Advanced properties Default is selected, so only the fields/options included in the wizard default display
are visible. This field is optional.
You can display All available fields, but you may not be able configure them. For
more details, refer to the relevant module section in the chapter Managing Ad-
vanced Properties.
Stateless
DHCPv6
When you add one or more DHCP servers into a smart architecture, the smart data is
automatically replicated from the architecture to the DHCP servers it manages. So if the
smart architecture is empty (first use), the DHCP server added is totally overwritten.
348
Managing DHCP Smart
Architectures
349
Managing DHCP Smart
Architectures
14. Click on OK to complete the operation. The report opens and closes. To display or hide the
physical servers managed through the smart architecture click on on the right-end side
of the menu. The DHCP Smart members column of the smart architecture displays the
name of the new master server between brackets next to the name of the other backup
servers.
350
Managing DHCP Smart
Architectures
3. In the panel Main properties, click on EDIT . The wizard Edit a DHCP server or Edit a DH-
CPv6 server opens.
4. If custom classes are enabled at server level, in the list DHCP server class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Click on NEXT . The page Manage a DHCP server opens.
6. Click on NEXT . The next page opens.
7. Click on NEXT . The next page opens.
8. The servers managed by the smart architecture are listed in the list Selected DHCP servers.
You can remove any of them and add a new one by clicking on or . The server(s) is
moved accordingly between the lists Selected DHCP servers and Available DHCP servers.
9. For a Single-Server smart architecture, go to the last step of this procedure. Otherwise, click
on NEXT . The next page opens.
10. In the drop-down list Master DHCP server, select the master server.
11. For a Split-Scope architecture, in the field Distribution ratio (in percent), specify the ratio
of IP ranges to be managed by the selected Master DHCP server, the rate is managed by
the backup server.
12. If need be, edit the existing failover ports and split leases parameters between the master
and backup servers.
13. Click on OK to complete the operation. The report opens and closes. To display or hide the
physical servers managed through the smart architecture click on on the right-end side
of the menu. The column DHCP Smart members of the smart architecture displays the
name of the new master server between brackets next to the name of the other backup
servers.
351
Managing DHCP Smart
Architectures
6. You can edit the smart architecture basic parameters if need be.
Note that, during the conversion of Microsoft servers, any DHCPv4 scope not belonging to a
shared network automatically adds a shared network. Each new shared network is named after
a scope start_address/prefix.
Keep in mind that once you converted a server, it is no longer listed on the page All servers.
Therefore:
352
Managing DHCP Smart
Architectures
• You must add it again to manage it, for more details refer to the section Adding EfficientIP
DHCP Servers.
• Once it is listed on the page again, if you want to manage it from the new smart architecture,
you must edit the architecture as detailed in the section Adding a DHCP Server into a Smart
Architecture.
353
Managing DHCP Smart
Architectures
before it is sent to the physical server(s): this ensures the consistency of the configuration and
avoids pushing useless information to the server:
• If the check is conclusive, the information is sent to the server and, on the page All servers,
its status is Synchronized.
• If any error is found, the verification stops and the server Sync status changes to Locked
Synchronization once the page is refreshed. To get a valid synchronization status again, you
need to "undo" the latest changes. This action loads a new synchronization and uploads the
status accordingly.
Once the server is in Locked synchronization, the corrupted configuration file is automatically
stored locally on the appliance and available for download in the Local files listing. It is named
<server_name>-dhcpd.conf. We advice that you take a look at this file because after the first
found error, the check stops and returns the Locked synchronization status. So if there are sev-
eral errors, the status is returned over and over again until the file is conclusive and can be sent
to the physical server.
The check for failure in the configuration file can be done though CLI (we recommend it) or from
the GUI.
3. Use the following command to get a precise list of all the errors:
# /usr/local/nessy2/bin/dhcpd -t -4 -cf /data1/exports/<server_name>-dhcpd.conf
4. Adjust identified statements, once the check runs again, the Locked Synchronization status
disappears if you now have a valid configuration.
3. Use the following command to get a precise list of all the errors:
# /usr/local/nessy2/bin/dhcpd -t -6 -q -cf /data1/exports/<server_name>-dhcpd6.conf
4. Adjust identified statements, once the check runs again, the Locked Synchronization status
disappears if you now have a valid configuration.
To look for DHCP errors on the page Syslog of the local appliance
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, click on Syslog. The page Syslog opens.
3. In the SOLIDserver drop-down list, verify that the local appliance is selected. Only the host-
name appears with no IP address.
4. In the Services filed, select dhcpd. The logs appear.
354
Managing DHCP Smart
Architectures
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Granting access to smart architectures as resources also grants access to every physical server
they contain. For more details, refer to the section Adding Resources to a Group in the chapter
Managing Groups.
355
Chapter 25. Managing DHCP Failover
Channels
Failover channels establish the synchronization mechanism between DHCPv4 physical servers.
From the page All failover channels, you can only display the failover channels of servers managed
via smart architectures.
Note that from the page All scopes, you can associate a failover channel with one or several
scopes. For more details, refer to the section Defining a Specific Failover Channel for Scopes.
With EfficientIP DHCP servers, both the primary and secondary servers simultaneously provide
the DHCP service by default. You can change this configuration to ensure that only the primary
or the secondary server responds via Master/backup and Load balancing configurations. For
more details, refer to the section Operating in Normal State.
Keep in mind that the failover mechanism is virtual for DHCPv6 servers.
By default, the failover is based on load balancing, it is Balanced, on One-to-One and One-to-
Many smart architectures.
356
Managing DHCP Failover Channels
In the GUI, the page All failover channels provides the column State that includes detailed inform-
ation regarding each state. For more details regarding this column, refer to the table The different
failover states
Failover Channel
DHCP 1 DHCP 2
16 1
19 2
When configuring a One-to-One or One-to-Many smart architecture, the drop-down list Split
leases allows to choose if the primary server, Master, or the secondary server, Backup, should
respond to the DHCP clients requests or choose to balance the responses between the servers.
In other words, when configuring your smart architecture, you can set the failover to respect a
master/backup configuration or a load balancing configuration.
Which is why in Normal state, a server might seem to ignore a client request.
• Master/Backup Configuration
If you choose this configuration, you can decide which server of the failover answers to all the
requests, either the primary (Prefer master) or the secondary (Prefer backup). For more details,
refer to the sections DHCPv4 One-to-Many Smart Architecture and DHCPv4 One-to-One Smart
Architecture.
• Load Balancing Configuration
If you choose this configuration, you can balance the responses equally and make both servers
respond to the DHCP clients' requests. The standard load balancing algorithm specifies which
server answers DHCP requests: this deterministic hash algorithm operates on the clients' in-
formation, their MAC address, to equally assign a set of clients to one server and the rest to
the other server. The hash is performed on every broadcast message sent out by DHCP clients,
357
Managing DHCP Failover Channels
it produces a number between 0 and 255 that the servers are able to interpret and divide
equally. In addition, when configured in load balancing, EfficientIP DHCP servers are able to
detect if a client has not received a response yet from its failover peer. Thanks to the field secs
of the DHCP client message, the server identifies which clients are making a request for the
first time (the field value is zero) or if it is a retry (the field value is nonzero). In the case of a
retry, the first available server responds no matter the DHCP client hash number.
The secondary server might be operating and simply unable to communicate with the other
server or might not be operating. Each server responds to the full range of DHCP client messages
that it receives, but in such a way that graceful reintegration is always possible when its partner
comes back and contacts it again.
Communications-interrupted
DHCP 1 DHCP 2
20 5 23 3
16 1 19 2
Site A Site B
When operating in Partner-down state, a server assumes that its partner is not currently operating
but does make allowances for the other server's set of DHCP clients as long as the MCLT has
not passed. That way, any lease that was allocated by the other server while they were in com-
munication-interrupted state has expired and the remaining server can safely allocate leases to
358
Managing DHCP Failover Channels
all the DHCP clients of the failover. Once the MCLT expires, the server responds to all DHCP
client requests, it can reclaim any available IP address that belongs to its peer.
Partner-down
DHCP 1 DHCP 2
16 1
19 2
Once the peer server comes back up, it automatically connects to its failover channel to change
back to the Normal operational state. Once again, it has to wait until the MCLT passes to reclaim
its DHCP clients.
You can manually switch a server to Partner-down. It allows to better control the DHCP service,
for instance before moving a server: the administrator can manually switch the secondary server
of a failover channel to Partner-down. For more details regarding this option, refer to the section
Switching DHCP Servers to Partner-down.
In a One-to-One DHCP smart architecture, the administrator can also set an Automatic switch
to partner-down delay (in hours) after which a server in Communications-interrupted state should
automatically switch to Partner-down. For more details, refer to the section DHCPv4 One-to-One
Smart Architecture of the chapter Managing DHCP Smart Architectures.
In IPv4, only the One-to-One and One-to-Many smart architectures provide mutiple failover
channels, both include as many failover channels as physical secondary servers. For Single-
Server or a Split-Scope smart architectures, the failover channel is virtual. It links the physical
server(s) of the smart architecture and acts as a configuration backup for the file dhcpd.conf. For
more details, refer to the section DHCP Failover Principles and Operational States.
359
Managing DHCP Failover Channels
In IPv6, the concept of failover channels is not very widespread. Awaiting its implementation,
SOLIDserver already provides a dedicated listing page for the virtual failover channels. These
channels provide a backup of the smart architectures configuration. For more details, refer to the
DHCPv6 architectures of the section Implementing DHCP Smart Architectures.
Any user can change the column layout of the page via the button List template, on the right-
end side of the menu. Only users of the group admin can add or edit list templates. For more
details, refer to the section Managing List Templates.
Note that Split-Scope and Single-Server smart architectures provide little information. For these
architectures, the failover is virtual and therefore cannot be edited. Only the columns Name,
Smart DHCP and Status return data, other columns return None.
Table 25.1. The columns on the page All failover channels in IPv4
Column Description
Name The name of the failover channel, it is set during the smart architecture configuration.
Server The name of the server or smart architecture.
Type The failover channel type, either Primary or Secondary.
Local address The IP address of the primary server, or Master, in the smart architecture.
Local port The port number dedicated to the failover on the smart architecture primary server.
Remote address The IP address of the secondary server of the smart architecture.
Remote port The port number dedicated to the failover on the smart architecture secondary server.
360
Managing DHCP Failover Channels
Column Description
Split The leases' split configuration between the servers: Balanced, Prefer backup or Prefer
master.
State The failover operational state, either Normal, Startup, Recovering, Partner-Down, Commu-
nications-interrupted, Down, Unknown state or N/A. For more details, refer to the table
The different failover states below.
Multi-status The emergency, warning, critical, error and/or informational message(s) regarding the
failover channel. For more details, refer to the section Understanding the Column Multi-
Status or Multi-Status Messages.
Status The failover channel status, either OK, Delayed create or Delayed delete.
Recovering The server is recovering from a partner-down state. The failover channel is
operational.
! Partner-down The other server of the failover is Down. The failover channel is operational.
Unknown state The failover configuration for the smart architecture is incorrect. The failover
channel is not operational.
N/A The failover channel is virtual, therefore returning a state is not applicable, as
is the case of Split-Scope and Single-Server smart architectures.
Note that the Split-Scope and Single-Server smart architectures provide little information. For
these architectures, the port related columns return N/A.
Table 25.3. The columns on the page All failover channels in IPv6
Column Description
Name The name of the failover channel, it is set during the smart architecture configuration.
Type The failover channel type, either Primary or Secondary.
Local address The IP address of the primary server, or Master, in the smart architecture.
Local port The port number on the smart architecture primary server dedicated to the failover.
Remote address The IP address of the secondary server in the smart architecture.
Remote port The port number of the smart architecture secondary server dedicated to the failover.
State The connection state between the two servers. As nowadays there is no failover per se
in IPv6, this column is empty.
DHCP name The smart architecture name.
Multi-status Messages regarding the failover channel: emergency, warning, critical, error or informa-
tional, if relevant. For more details, refer to the section Understanding the Column Multi-
Status.
361
Managing DHCP Failover Channels
Column Description
Status The failover channel status, either OK, Delayed create or Delayed delete.
Delayed create The creation or update is delayed until the failover channel is created on the physical
server(s) of the DHCPv4 smart architecture. The creation is automatically done after a
maximum of 1 minute.
Delayed delete The deletion is delayed until the failover channel is deleted from the physical server(s) of
the smart architecture. The deletion is automatically done after a maximum of 1 minute.
When one of the servers of the smart architecture is unable to communicate with the other, or is
down, the failover channel switches to the Communications-interrupted state. At that point, you
can choose to place the other server in the Partner-down state and keep making allowances.
362
Managing DHCP Failover Channels
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
363
Chapter 26. Managing DHCP Servers
Servers are the entry point of any DHCP configuration. They contain all the necessary information
to provide IP addresses to DHCP clients. They allow to set up dynamic addressing or fixed
reservation organizations.
DHCP servers can provide IPv4 or IPv6 addresses. Both protocol versions intend to provide IP
addresses to client, but they each provide specific configurations and options that may only be
available in one version.
You can manage as many servers as you need to set up your DHCP organizations, each server
must:
1. Be configured with a unique IPv4 address, no matter if it delivers IPv4 or IPv6 addresses.
2. Contain at least one scope that listens on a particular network segment in order to discovers
clients request and answers them at the best of its capacity. If you manage large networks,
DHCP servers can rely on DHCP relays (also called helpers), for more details refer to the
section Configuring DHCP Relay Agents in the chapter Managing Scopes.
From the page All servers, you can manage DHCPv4 and DHCPv6 servers. Note that:
• In IPv4, you can add EfficientIP, EfficientIP Package and Microsoft DHCP servers.
• In IPv6, you can only add EfficientIP and EfficientIP Package servers.
• You can either manage your servers independently or a via a smart architecture. Smart archi-
tectures provide a backup of your configuration and a dedicated failover between a master
server and its backup(s) servers. For more details regarding the available smart architectures
for DHCPv4 or DHCPv6, refer to the chapters Understanding DHCP Smart Architectures and
Managing DHCP Smart Architectures.
Keep in mind that any parameter and/or option set at a lower level overwrites the configuration
set at server level.
SHARED
SCOPE RANGE LEASE
NETWORK
SERVER
GROUP STATIC
364
Managing DHCP Servers
Invalid credentials The SSL credentials are invalid or the server is already managed by another appliance
and you need to specify your credentials again. For more details, refer to the section
Editing DHCP Servers.
If the appliance database is encrypted, it may be that the Active key is missing. For
more details, refer to the section Troubleshooting the Database Encryption of the
chapter Securing.
Insufficient privileges The account configured for the Microsoft Windows DHCP server does not have
enough privileges to manage it.
Syntax error The server configuration contains syntax errors, it is not viable.
License The server is compatible with the license applied to your appliance. For more details
on licenses and their metrics, refer to the chapter Managing Licenses.
Not running The service DHCP server or DHCPv6 server is stopped on the appliance.
Busy The server synchronizing is ongoing. While the server is busy, the column Status
may return inaccurate information.
365
Managing DHCP Servers
The column Multi-status provides you with emergency, warning, critical, error or informational
messages regarding the server compatibility with Hybrid. For more details, refer to the section
Understanding the Column Multi-Status.
For instance, your DHCP server has 2 network interfaces configured: 192.168.10.3 and
192.168.10.5.To listen to both interfaces, you have to configure a scope with the network address
192.168.10.0 and the netmask 255.255.255.0. For more details regarding scope management,
refer to the chapter Managing DHCP Scopes.
EfficientIP DHCP server implements the safe DHCP failover protocol. For more details, refer to
the chapter Managing DHCP Failover Channels.
1
If you do not set a listening scope, you must configure a relay to communicate with DHCP clients.
366
Managing DHCP Servers
• SSL is used to manage a server while SNMP is used to monitor it. Therefore, you can
configure the SNMP monitoring parameters of the server. For more details, refer to the section
Editing the SNMP Monitoring Parameters of EfficientIP DHCP Servers.
• EfficientIP DHCP servers manage the IPv4 static reservations like leases.The MAC address
specified during the static reservation identifies the clients' IP address and allocates it a lease
as well as soon as they are visible on the network. Once the lease is allocated, if the IPAM
and DNS replication are configured, the data is sent to the IPAM and adds the corresponding
DNS entries. For more details, refer to the section Adding DHCPv4 Statics.
• You should not set a VIP as management address of your DHCP server.
• When you add a server, a random password is generated to secure the communication between
the appliance and the server. The default SSH credentials of the account admin are no longer
used to manage the server but to generate this random password.
For servers added before the upgrade to version 7.0, switching to this new management system
is not automatic. You need to edit the servers. For more details, refer to the section Editing
DHCP Servers.
• If your server is running in a container whose HTTP(S) port is only accessible through a reverse
proxy, refer to the section Configuring a Reverse Proxy for an EfficientIP DHCP Server.
5. If you have changed the default SSH password of the appliance embedding the DHCP
server, you must update the enrollment parameters.
a. Tick the box Configure enrollment parameters. The field "Admin" account password
appears, it contains the default admin account password.
367
Managing DHCP Servers
b. Empty the field "Admin" account password and specify your SSH password.
6. If you want to edit the server SNMP parameters, tick the box Configure SNMP monitoring
parameters.
A set of fields appear, configure them to monitor and retrieve the server statistics.
Table 26.4. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
7. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
8. Click on OK to complete the operation. The report opens and closes. The server is listed.
Table 26.5. SNMP monitoring parameters available when you edit a server
Field Description
SNMP version The version of the SNMP protocol used to retrieve the statistics. It can be either v1, v2c
or v3. By default, v2c is selected. This field is required.
368
Managing DHCP Servers
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1s, 2s, 3s, 4s, 5s, 10s
or 30s. By default, it is set to 5s. This field is required.
Use bulk For SNMP version v2c or v3. Allows to send several requests at once, it uses a bulk
transfer of data. This compact SNMP request method accelerates transfers. By default,
it is set to Yes. This field is required.
Use TCP The network communication protocol, either TCP (Yes) or UDP (No). By default, No is
selected. You should use TCP instead of UDP if the network link is unreliable. This field
is required.
SNMP transfer The number of minutes above which the SNMP transfer is aborted when you add or refresh
timeout (minutes) a device, a value between 0 and 999. By default, it is set to 0. This field is optional.
Note that you cannot edit an existing server to configure it with a reverse proxy server.
To enable the registry key that allows to configure a reverse proxy server
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with module.system.enable_reverse_proxy_config.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, type in 1 to enable it. By default, its value is 0.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
369
Managing DHCP Servers
Once you enabled the registry key, you can add an EfficientIP or EfficientIP package server and
configure it with a reverse proxy server.
5. If you have changed the default SSH password of the appliance embedding the DHCP
server, you must update the enrollment parameters.
a. Tick the box Configure enrollment parameters. The field "Admin" account password
appears, it contains the default admin account password.
b. Empty the field "Admin" account password and specify your SSH password.
6. If you want to edit the server SNMP parameters, tick the box Configure SNMP monitoring
parameters.
A set of fields appear, configure them to monitor and retrieve the server statistics.
Table 26.7. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
370
Managing DHCP Servers
Field Description
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
7. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
8. Click on OK to complete the operation. The report opens and closes. The server is listed.
Once you manage a Microsoft Windows server, you can also manage its superscopes, scopes,
ranges, statics, leases. Note that superscopes are listed on the page All shared networks. De-
pending on the version of Windows and if you add the server to a smart architecture, you can
manage its failover relationships.
The management of Microsoft DHCP servers is based on Microsoft Remote Procedure Calls
(MS RPC). It allows to retrieve and display data is real-time without installing any WinDHCP
agent.
Prerequisites
• A Microsoft Windows Server 2008, 2008 R2, 2012 R2, 2016 or 2019. The server must:
• Have the TCP ports 135 and 445 open. They are used by the port mapper interface, the
service that indicates to the clients which port provides access to each service.
• Have Firewall policies that allow traffic between SOLIDserver and the Microsoft servers it
manages. For more details, refer to the section Microsoft Windows DHCP Servers in the
appendix Matrices of Network Flows.
• In Windows Server, RPC uses by default the dynamic port range 49152-65535. Note that
you can reduce the number of available ports, using netsh, as long as the range of ports
2
contains at least 255 ports .
• The credentials of a member of the group DHCP Administrators. Users with insufficient privileges
cannot manage the server.
2
For information, refer to http://support.microsoft.com/kb/929851 .
371
Managing DHCP Servers
• The service DHCP must be properly started. For more details, refer to the chapter Configuring
the Services.
Limitations
Server Limitations
• To add or manage Microsoft servers from SOLIDserver, a user must have administrator
rights over the Microsoft server in your Windows environment.
• To display Microsoft servers in SOLIDserver, a user must have reading rights over the
Microsoft server in your Windows environment.
• You cannot manage Microsoft servers that are Master in one configuration and backup in
another in your Windows environment. Once added to the GUI, they take on one role or
the other.
• Changes performed directly on the Microsoft server are not automatically transferred to
SOLIDserver. You must synchronize the server, as detailed in the section Synchronizing
DHCP Servers.
• The synchronization of a Microsoft server within SOLIDserver is impossible if the server
is managed via a smart architecture, the smart configuration overwrites the new data.
• Microsoft policies are not supported, any policy configured on a Microsoft server is ignored.
• The statistics of Microsoft servers are not retrieved, the page Analytics does not include
them.
Scope and Superscope Limitations
• You can only manage active scopes from SOLIDserver, deactivated scopes are ignored.
• You can only manage DHCPv4 superscopes.
• You can only manage superscopes that contain at least one active scope. Empty super-
scopes and superscopes containing only deactivated scopes are ignored.
DHCP Options Limitations
• Encapsulated DHCP options are not supported by Microsoft DHCP servers.
Lease Limitations
• The start date of a lease is unknown. SOLIDserver displays an arbitrary start date that
corresponds to the moment when the lease is detected.
• DHCP configurations involving a very large number of leases trigger refresh problems. By
default, the registry database entry module.dhcp.refresh_server_time refreshes leases
every 10 seconds, when there are a lot of leases it can overload the service and create a
loop. To avoid this problem, you need to increase the value of the registry entry.
ACL Limitations
• You cannot configure ACLs on Microsoft servers.
For more details regarding the Microsoft Windows limitations, refer to their documentation.
SOLIDserver offers the same services as Microsoft but displays them differently from the Windows
Administrative Tools of your Microsoft DHCP server. You can add as many ranges as you need
from SOLIDserver GUI but only one is actually added on the Microsoft server.
Therefore, when SOLIDserver overwrites the configuration of the Microsoft DHCP server you
manage:
372
Managing DHCP Servers
• The unique Microsoft range start and end addresses match the assignable start and end ad-
dresses of the scope it belongs to.
• A number of exclusion ranges are added on the Microsoft server to match the ranges you added
from SOLIDserver.
SCOPE 192.168.10.0/24
Configuration pushed
RANGE
192.168.10.25 - 192.168.10.100
RANGE
192.168.10.5 - 192.168.10.10
SCOPE 192.168.10.0/24
As illustrated above, the scope management is exactly the same on SOLIDserver and Microsoft,
on both sides you have a 192.168.10.0/24 scope. However, the range management differs:
• Within SOLIDserver, if you add the two following ranges:
• First range: 192.168.10.5 - 192.168.10.10
• Second range: 192.168.10.25 - 192.168.10.100
• The configuration pushed on the Microsoft DHCP configuration looks as follows:
• One unique range: 192.168.10.1 - 192.168.10.254. A range managing all the assignable
addresses of the scope.
• Three exclusion ranges: 192.168.10.1 - 192.168.10.4, 192.168.10.11 - 192.168.10.24 and
192.168.10.101 - 192.168.10.254.
If your Microsoft DHCP server is integrated to an AD with several forests, you can use the Expert
mode during the server addition to specify the AD domain you want to authenticate.
Note that:
• If you manage a Microsoft Windows DHCP server 2012 R2 or higher from a smart architecture,
you can manage its failover relationships. For more details, refer to the section Managing the
Failover Channels of Microsoft Windows DHCP Servers.
373
Managing DHCP Servers
• Superscopes are managed as shared networks in the GUI. For more details, refer to the section
Managing Microsoft Windows Superscopes.
• Once you manage a Microsoft server from SOLIDserver, you should no longer edit it from
Windows DHCP Manager. If you do, you must synchronize it. For more details, refer to the
section Synchronizing DHCP Servers.
374
Managing DHCP Servers
To manage Microsoft failover channels, you must manage Microsoft servers from a smart
architecture. As managing servers from a smart erases their content, you must either prepare
the smart architecture before managing server with it or convert the server into a smart architecture
to keep its configuration.
Once you manage a Microsoft server with a smart architecture, you can even associate its scopes
with a specific failover. For more details, refer to the section Defining a Specific Failover Channel
for Scopes.
Prerequisites
• Meeting Microsoft prerequisites.
• Microsoft DHCP servers 2012 R2 or higher.
• All the Microsoft servers you manage in a smart architecture must use the same NTP pool.
Limitations
• Taking into account Microsoft limitations.
• Within SOLIDserver a failover is between two servers.
• SOLIDserver cannot add failover channels for Microsoft servers if they do not manage
valid ranges. Without a valid range, no failover can be added from SOLIDserver and pushed
to the server.
• Only the failover mode Load balance is supported:
• Three ratios are supported 100-0 (Prefer Master), 0-100 (Prefer Backup) and 50-50
(Balanced). Any other ratio is overwritten by the closest ratio we support.
• If you manage failovers in mode Hot standby, their mode is switched to Load balance.
• If you manage Microsoft servers from a smart architecture:
• It must only manage Microsoft servers.
• It must be One-to-One or One-to-Many smart architecture.You cannot manage Microsoft
failovers from a Single-Server smart architecture.
• In One-to-Many smart architectures, you can only have one Master server in the smart
architecture. It takes on the role of primary server.
• In One-to-Many smart architectures, you cannot manage more than 31 failover channels,
i.e. 32 Microsoft servers.
• The unique port numbers that you must specify in the GUI are actually ignored. Microsoft
automatically sets the proper port for the communication.
• If you manage Microsoft servers outside a smart architecture:
• You can manage their content but not their failover channels. You can only display them
on the page All failover channels.
• You cannot configure advanced properties between the IPAM and the DHCP as they
rely on failover channels. For more details, refer to the chapter Managing Advanced
Properties.
To manage your Microsoft failover channels from a smart architecture we recommend to:
1. Add all the Microsoft Windows DHCP servers that you want to manage from SOLIDserver.
For more details, refer to the section Adding Microsoft Windows DHCP Servers.
375
Managing DHCP Servers
When you add a Microsoft Windows server, its superscopes are retrieved. Note that:
• Only DHCPv4 superscopes are supported.
• Only superscopes containing at least one active scope are retrieved. Empty superscopes and
superscopes containing only deactivated scope(s) are ignored.
• Once in the GUI, superscopes cannot be configured with DHCP options because shared net-
works cannot be configured with DHCP options.
You can edit them, add new ones and delete them, all changes are sent to Microsoft. For more
details, refer to the chapter Managing DHCP Shared Networks.
If you managed Microsoft servers before upgrading to this version. Note that:
• The superscopes configured directly from Windows DHCP Manager are retrieved and manage-
able from the GUI.
The retrieval depends on your configuration:
On Microsoft servers managed outside a smart architecture
• Only the superscopes containing at least one scope are added as shared networks.
On Microsoft servers managed via a smart architecture
• The superscope configuration set in Windows DHCP Manager prevails and overwrites
the smart architecture configuration:
• If the smart architecture contained shared networks that do not match the configuration
of the Microsoft server, they may be updated.
• If the smart architecture contained empty shared networks, they are deleted.
• Only the superscopes of the master server(s) are retrieved. The configuration of the
master server is pushed to the backup server(s).
• If you managed Microsoft servers not configured with superscopes via a smart architecture, a
shared network is automatically added for each scope. Each shared network is named after
the scope start_address/prefix.
376
Managing DHCP Servers
To successfully install the DHCP packages on Linux, you must follow the prerequisites and pro-
cedures in the section that matches your environment:
• Installing an EfficientIP DHCP Package on Debian 8 or Higher.
• Installing an EfficientIP DHCP package on RedHat 6 and Higher.
Once your package is installed you can add an EfficientIP DHCP Package in the GUI as detailed
in the section Adding an ISC DHCP Server.
If you need to upgrade your package, refer to the section Upgrading EfficientIP DHCP Packages.
Prerequisites
• The DHCP package file, ipmdhcpxx-y.y.y-debianxx-amd64.deb, whose name provides you
with a number of information separated by hyphens: the type of package (ipmdhcpxx: a DHCP
package with a DHCP in version xx where xx is x dot x), the version of SOLIDserver (y.y.y);
the version of Debian (debianxx where xx is x dot x) and finally the Debian architecture (amd64).
In the procedure below, this file is referred to as <ipmdhcpxx-y.y.y-debianxx-amd64.deb>.
• The EfficientIP ISC package platform must have at least 20 Mb of free disk space.
• The EfficientIP ISC package may need certain libraries of your operating system, you must
3
have a shell access with root login in local, via ssh on the server to be installed.
• You must make sure that no other DNS/DHCP service on your Linux is running : it would inter-
fere with the BIND/ISC package installation.
• You must make sure that SOLIDserver and Debian are set to the same time and date.
• You must make sure that Apache server is up-to-date.
• You must make sure that the service dbus is installed.
• You must make sure that HTTPS (port 443), the DHCP service (port 67) and the failover ports
(647-667 and 847-867) are not blocked by a network filtering process (firewall).
If your Apache configuration already uses the port 443, you have to create an additional IP-
based VirtualHost dedicated to the DNS/DHCP management.
If you have not installed the DNS packages yet, you need to:
1. Follow the procedure To install the EfficientIP DHCP Package on Debian.
3
You could also connect via telnet but, for security purposes, we recommend that you favor ssh.
377
Managing DHCP Servers
2. Follow the procedure To complete the DHCP package installation on Debian if the DNS
package is not installed.
If you already installed the DNS packages, you only need to follow the procedure To install
the EfficientIP DHCP Package on Debian below.
The installation procedure below includes the commands that make the web services configurable.
3. Install the dependency packages, ONLY if you have not installed the EfficientIP DNS package,
using the following commands:
a. For Debian 8:
# apt-get install php5
# apt-get install sudo
# apt-get install snmpd
# apt-get install sqlite
# apt-get install php5-sqlite
5. Make the web services configurable: in the directory /etc/sudoers.d , create the file ipmdhcp
containing the line below.
www-data ALL = NOPASSWD: /usr/local/nessy2/script/install_dhcpd_conf.sh, \
/usr/local/nessy2/script/install_dhcpd6_conf.sh
Note that you can change the password admin of the web service using the command below:
# htpasswd /usr/local/nessy2/www/php/cmd/dhcp/.htpasswd admin
If you have not installed the DNS package or are not planning on installing it, you must
now follow the procedure below.
To complete the DHCP package installation on Debian if the DNS package is not
installed
1. If relevant, open an SSH session.
378
Managing DHCP Servers
2. Allow SNMP access to the DNS statistics: append the file /etc/snmp/snmpd.conf with the
following line.
view systemview included .1.3.6.1.4.1.2440
6. Make sure that a symbolic link to the default VirtualHost SSL configuration file is located in
the folder sites-enabled/ . If not, use the following command:
# a2ensite default-ssl
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/apache2/server.crt
SSLCertificateKeyFile /etc/apache2/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
379
Managing DHCP Servers
force-response-1.0
</VirtualHost>
8. Disable the default site in Debian Apache configuration using the following command:
# a2dissite 000-default
10. Make sure that the ipmdhcp package is running using the following command:
# service ipmdhcp status
Once the configuration is complete, you can add an EfficientIP Package DHCP server to manage
your ISC server from SOLIDserver GUI. For more details, refer to the procedure in the section
Adding an ISC DHCP Server.
Prerequisites
• The DHCP package file, ipmdhcpxx-y.y.y-redhatx.x86_64.rpm, whose name provides you with
a number of information separated by hyphens or a point: the type of package (ipmdhcpxx: a
DHCP package with a DHCP in version xx where xx is x dot x), the version of SOLIDserver
(y.y.y); the version of RedHat (redhatx) and finally the RedHat architecture (x86_64).
In the procedure below, this file is referred to as <ipmdhcpxx-y.y.y-redhatx.x86_64.rpm>.
• The EfficientIP ISC package platform must have at least 20 Mb of free disk space.
• The EfficientIP ISC package may need certain libraries of your operating system, you must
4
have a shell access with root login in local, via ssh on the server to be installed.
• You must make sure that no other DNS/DHCP service on your Linux is running : it would inter-
fere with the BIND/ISC package installation.
• You must make sure that SOLIDserver and RedHat/CentOS are set to the same time and date.
• You must make sure that Apache server is up-to-date.
• You must make sure that HTTPS (port 443), the DHCP service (port 67) and the failover ports
(647-667 and 847-867) are not blocked by a network filtering process (firewall).
If your Apache configuration already uses the port 443, you have to create an additional IP-
based VirtualHost dedicated to the DNS/DHCP management.
4
You could also connect via telnet but, for security purposes, we recommend that you favor ssh.
380
Managing DHCP Servers
If you have not installed the DNS packages yet, you need to:
1. Follow the procedure To install the EfficientIP DHCP Package on RedHat.
2. Follow the procedure To complete the DHCP package installation on RedHat if the DNS
package is not installed.
If you already installed the DNS packages, you only need to follow the procedure To install
the EfficientIP DHCP Package on RedHat below.
The installation procedure below includes the commands that make the web services configurable.
• On CentOS:
# service dhcpd stop
# chkconfig dhcpd off
5. Make the web services configurable: in the directory /etc/sudoers.d , create the file ipmdhcp
containing the line below.
apache ALL = NOPASSWD: /usr/local/nessy2/script/install_dhcpd_conf.sh, \
/usr/local/nessy2/script/install_dhcpd6_conf.sh
Note that you can change the password admin of the web service using the command below:
# htpasswd -c /usr/local/nessy2/www/php/cmd/dhcp/.htpasswd admin
If you have not installed the DNS package or are not planning on installing it, you must
now follow the procedure below.
To complete the DHCP package installation on RedHat if the DNS package is not
installed
1. If relevant, open an SSH session.
2. Disable the firewall using the following commands.
a. For RedHat 6:
# service iptables stop
# chkconfig iptables off
381
Managing DHCP Servers
4. Reboot the system to take into account the selinux policy changes :
# reboot
6. Allow SNMP access to the DHCP statistics. In the file /etc/snmp/snmpd.conf, in the section
entitled Access Control, enter the lines:
master agentx
view systemview included .1.3.6.1.4.1.2440
#You may need to specify another view, AllView or a custom one,
#if you edited the default SNMP configuration.
9. Configure the web services. In the file /etc/httpd/conf.d/ssl.conf, replace the FULL section
<VirtualHost *:443> with the configuration below.
a. For RedHat 6:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
AllowOverride All
</Directory>
382
Managing DHCP Servers
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
</VirtualHost>
b. For RedHat 7:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
</VirtualHost>
c. For RedHat 8:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
383
Managing DHCP Servers
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
</VirtualHost>
11. Make sure that the ipmdhcp package is running using the following command line:
# service ipmdhcp status
Once the configuration is complete, you can add an EfficientIP Package DHCP server to manage
your ISC server from SOLIDserver GUI. For more details, refer to the procedure in the section
Adding an ISC DHCP Server.
Note that the EfficientIP package is only available for DHCPv4 servers managed with SSL.
384
Managing DHCP Servers
Field Description
Isolated Tick the box Isolated if you want to isolate the server within SOLIDserver. This
prevents the server, and its content, from executing any configured replication
rule or advanced property. The server still receives data if your network config-
uration allows it.
This field is optional and mainly useful during migrations. When the server con-
figuration is ready and you untick the box, you must manually execute the rules
and/or advanced properties, at all relevant levels of the module hierarchy, via
the menu Tools > Initialize rules.
Description A description, it is returned in the corresponding column on the page All servers.
This field is optional.
5. If you have changed the default SSH password of the appliance embedding the DHCP
server, you must update the enrollment parameters.
a. Tick the box Configure enrollment parameters. The fields Login and Password ap-
pear. By default they both contain admin.
b. Edit the fields to make sure that the SSL credentials match your SSH credentials.
6. If you want to edit the server SNMP parameters, tick the box Configure SNMP monitoring
parameters.
A set of fields appear, configure them to monitor and retrieve the server statistics.
Table 26.10. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
7. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
8. Click on OK to complete the operation. The report opens and closes. The server is listed.
Once the EfficientIP Package server is added, you can manage your ISC server in Linux from
the GUI.
385
Managing DHCP Servers
2. You must install the new package following the relevant section:
• Installing an EfficientIP DHCP Package on Debian 8 or Higher.
• Installing an EfficientIP DHCP package on RedHat 6 and Higher.
If you edit a server directly, and not from the GUI, you must manually synchronize it to ensure
all data is up-to-date.
Keep in mind that the column Sync allows to monitor the synchronization. For more details, refer
to the section Understanding the Server Statuses.
If you want to add, edit or delete DHCP options, refer to the next section Configuring DHCP Options
at Server Level.
386
Managing DHCP Servers
4. In the panel of your choice, click on EDIT . The corresponding wizard opens.
5. Make all the changes you need. For an EfficientIP server, from the panel Main Properties
you can:
a. If you changed the default SSH password of the appliance embedding the DHCP server
or if you want to switch to the new management system, tick the box Configure enroll-
ment parameters. The field "Admin" account password appears.
b. In the field "Admin" account password, replace the value displayed with the relevant
SSH password.
6. Click on NEXT , if need be, until you get to the last page of the wizard.
7. Click on OK to complete the operation. The report opens and closes.
Repairing Leases
An option allows to check for lease inconsistencies between physical servers managed by a
common DHCP smart architecture.
The option Repair leases generates a file to compare the leases of the selected server. If any
error or inconsistency is found, it generates a file leasedb-patch-<smart-name>.tar.gz that you
must concatenate to the lease file of the relevant server.
387
Managing DHCP Servers
• The DHCP options of a server are inherited by the scopes, groups, ranges, leases and/or
statics it manages.
• On Microsoft DHCP servers, encapsulated DHCP options are not supported.
• You can aggregate range or static options on the scopes of a server.
For more details regarding the DHCP options configuration, refer to the chapter Managing DHCP
Options and/or to the appendix DHCP Options.
388
Managing DHCP Servers
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Keep in mind that you cannot delete a physical server if it is managed by a smart architecture.
Granting access to servers as a resource also grants access to every item they contain. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
389
Chapter 27. Managing DHCP Shared
Networks
Shared networks allow to make several scopes serve an entire IPv4 or IPv6 network segment
as a single entity. They are part of dynamic addressing organizations.
From the page All shared networks, you can add, edit or delete them.
You can manage DHCP and DHCPv6 shared networks on EfficientIP servers and smart architec-
tures. On Microsoft servers, you can only manage DHCP shared networks.
SHARED
SCOPE RANGE LEASE
NETWORK
SERVER
GROUP STATIC
390
Managing DHCP Shared Networks
All the columns, except Multi-status, are displayed by default, they can be ordered and filtered.
For more details regarding the column Multi-status, refer to the section Understanding the Column
Multi-Status.
391
Managing DHCP Shared Networks
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
392
Chapter 28. Managing DHCP Scopes
Scopes are used to determine the topology of the network, apply DHCP options for a routable
domain, describe network clients, and indicate the addresses to be allocated to certain clients.
They can be part of dynamic addressing and/or fixed reservation organizations.
In order to use the DHCP service, each terminal network to be served must have a DHCP scope
that matches its IP address and its netmask (size). When a DHCP server serves clients with
local physical networks, the scope is easily assimilated to its broadcast domain. A scope belongs
to a DHCP server and can contain several DHCP ranges.
SHARED
NETWORK SCOPE RANGE LEASE
SERVER
GROUP STATIC
393
Managing DHCP Scopes
Keep in mind that in IPv6 you can display colored labels above parts of the IP addresses listed.
It allows to differentiate at a glance your containers. For more details, refer to the chapter Managing
IPv6 Labels.
Delayed create The creation or update is delayed until the scope is created on the physical server(s) of
the smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed addition Only for Microsoft DHCPv4 servers. The addition is delayed until the scope is associated
(to failover) with the failover channel. Once associated, the scope is disabled by default.
Delayed enable Only for Microsoft DHCPv4 servers. The scope remains disabled until the servers of the
failover channel both receive the information. The scope is then enabled and marked
OK.
Delayed delete The deletion is delayed until the scope is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
394
Managing DHCP Scopes
6. If custom classes are enabled at scope level, in the list DHCP scope class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. Click on NEXT . The next page opens.
8. Fill in the following fields to configure the scope parameters:
9. Click on OK to complete the operation. The report opens and closes. The scope is listed.
Keep in mind that you cannot edit the field Shared network of a scope if it is the only one belonging
to a shared network associated with a prefix delegation.
395
Managing DHCP Scopes
5. If custom classes are enabled at scope level, in the list DHCP scope class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. Edit the Name, Shared network and DHCP scope space name according to your needs.
7. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
8. Click on OK to complete the operation. The report opens and closes. The changes are listed
in the panel.
Note that the DHCP option boot-unknown-clients can be set at scope level.
For more details regarding the DHCP options configuration, refer to the chapter Managing DHCP
Options and/or to the appendix DHCP Options.
396
Managing DHCP Scopes
9. Click on OK to complete the operation. The report opens and closes. The panel displays the
current configuration.
397
Managing DHCP Scopes
Defining a specific space at scope level allows to apply policy rules from the IPAM module to
several addresses and avoid any overlapping of ranges and spreads of reserved addresses.
You can associate scopes with a space one scope at a time or several scopes at once.
Once a scope is associated with a space, you can execute the DHCP to IPAM replication and
associate scopes with existing networks or add the corresponding network. As you can add
several terminal networks managing the same IP addresses in separate spaces, you can associate
these networks with scopes belonging to distinct DHCP servers.
You can associate scopes with a failover channel one scope at a time or several scopes at once.
398
Managing DHCP Scopes
3. At the end of the line of the scope of your choice, click on . The properties pages opens.
4. In the panel Main properties, click on EDIT . The wizard Edit a DHCP scope opens.
5. In the drop-down list Failover, select the failover of your choice or None to remove the as-
sociation.
6. Click on OK to complete the operation. The report opens and closes. The panel displays the
new space name.
Before replicating your DHCP data into the IPAM, keep in mind that:
• The option IPAM replication behaves as follows:
• If you specify a space that has no matching network, a network is added, it is named like
the scope.
• If you do not specify any space, with the value None, SOLIDserver automatically adds a
network matching the scope in the first space that can receive it.
• The option IPAM replication can only specify a target space for scopes that are not configured
with any space yet.
Either no space was specified when you added it or you set the space of a scope and selected
None, as detailed in the procedure To set the space of one or several scopes.
• The option IPAM replication does not change the associated space, it sets a replication asso-
ciation. If you want to change the target of a scope already associated with a space, you must
edit as detailed in the section Defining a Specific IPAM Space for a Scope.
399
Managing DHCP Scopes
7. Click on OK to complete the operation. The report opens and closes. The new space is listed
in the column Scope space.
Note that you can also replicate DHCP range and static data to the IPAM. For more details, refer
to the sections Replicating Range Data in the IPAM and Replicating Static Data in the IPAM.
For instance, if you configured multinetting on your network and one DHCP server answers client
requests on a single physical network that has multiple IP networks in use. With a shared network
containing several scopes, the server identifies that a client request was sent from one of the
scopes and that it has many available IP addresses to choose from and assign to the client.
If dynamic DHCP ranges appear within scopes using the same shared network, all ranges of
addresses are offered independently. Once the first range is full, the ranges that are declared
within the same shared network are used one after the other until all addresses are used.
You can set a shared network on one or several IPv4 scopes. In IPv6, you can only set it from
the scopes properties page.
400
Managing DHCP Scopes
5. In the field Shared network, specify the shared network of your choice. You can type in the
first digits of the address or the first letters of the name of an existing shared network, the
auto-completion provides a list matching your search.
6. Click on OK to complete the operation. The report opens and closes. The changes are listed
in the panel.
Migrating a scope also migrates the DHCP ranges and statics with IP address it contains. As for
the statics without IP migration, refer to the section Copying DHCPv4 Statics Without IP.
Keep in mind that if your physical server is managed via a smart, only the scope added on the
smart can be copied or moved.
Relay agents are configured with a list of one or more DHCP servers, two servers must be con-
figured for the DHCP failover. When a relay agent receives a message from a DHCP client on a
particular network segment, it records the IP address of the interface on which it received the
401
Managing DHCP Scopes
request in the field GiAddr of the message, and then it forwards the message to the DHCP
server. From there, the server directly responds to the client.
The DHCP relay is a mechanism that allows the transfer of DHCP/BOOTP messages between
clients and servers of different networks. The routers used to interconnect these networks possess
for the most part the functionality of TCP/IP relay agents. To conform to RFC 1542 and deal with
the relay agent, each router must be able to recogne BOOTP and DHCP messages and relay
them in an appropriate manner. A router equipped with the capacities of a BOOTP relay agent
generally relays DHCP packets, as well as all BOOTP packets transmitted on the network.
SOLIDserver supports DHCP relay transparently, if a scope has the same network address as
one of the interfaces of the DHCP server, then it is a local scope. This means that it belongs to
the same broadcast domain as the DHCP server. Otherwise, it is a relay scope.
The new scope is added in the selected DHCP failover channel and automatically set with the
network Gateway address as value of the option routers. In addition, all the IP addresses you
add within these networks can automatically add statics.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
402
Managing DHCP Scopes
If the terminal network adds a scope, the option routers is directly set. If the terminal network
matches an existing scope, the option routers is set or updated.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Granting access to scopes as resources also grants access to every item they contains. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
403
Chapter 29. Managing DHCP Ranges
DHCP ranges are a contiguous suite of valid IP addresses within a scope and allow to allocate
leases to clients. They are part of dynamic addressing organizations.
EfficientIP DHCP servers manage the statics with IP address like leases. Therefore the statics
added also add a lease whenever the MAC address declared is active on the network, these
leases can belong to your ranges and are listed on the page All leases. If you configured the
IPAM and DNS replication, they also add DNS entries. For more details, refer to the section
Adding DHCPv4 Statics.
SHARED
SCOPE RANGE LEASE
NETWORK
SERVER
GROUP STATIC
Keep in mind that in IPv6 you can display colored labels above parts of the IP addresses listed.
It allows to differentiate at a glance your containers. For more details, refer to the chapter Managing
IPv6 Labels.
404
Managing DHCP Ranges
Delayed create The creation or update is delayed until the range is created on the physical server(s) of
the smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the range is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
Note that you can also import ranges, for more details refer to the section Importing Ranges in
the chapter Importing Data from a CSV File.
Keep in mind that if IPAM to DHCP advanced properties are configured, new ranges may be
added for every pool added in the IPAM. For more details, refer to the relevant section of the
chapter Managing Advanced Properties.
405
Managing DHCP Ranges
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
9. Configure the DHCP range parameters following the fields below:
10. If you are adding a range on an EfficientIP DHCP server, click on NEXT . The ACLs configur-
ation page opens, depending on the classes configured by your administrator.
You can set the ACL configuration of your choice, using the following fields.
a. In the field Specific ACL, configure ACLs using the table below.
b. In the field General ACL, configure ACLs using the table below.
c. In the list DHCP range ACL, all the configured ACLs are listed. To reorder the entries,
select them one by one and click on the arrows to move them up or down .
To delete an ACL, select it and click on .
11. Click on OK to complete the operation. The report opens and closes. The ACLs are listed in
the ACL panel of the range properties page.
406
Managing DHCP Ranges
If you want to add ranges containing more than a million addresses, you must edit the dedicated
registry database key.
To edit the registry key that defines the ranges maximum size
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with module.dhcp.range_max_size.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, specify the value of your choice. The default value is 1000000 IPv4 ad-
dresses. For performance purposes, we strongly advise against setting a value greater than
7000000.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
407
Managing DHCP Ranges
Field Description
You can display All available fields, but you may not be able configure them. For
more details, refer to the relevant module section in the chapter Managing Ad-
vanced Properties.
10. Click on OK to complete the operation. The report opens and closes. The range is listed.
You cannot edit DHCPv6 ranges. The properties page displays all the available information.
408
Managing DHCP Ranges
Field Description
visible and suits your needs, click on . The configuration is then listed the
DHCP range ACL list.
DHCP range ACL This list sums up all the ACLs configured through the wizard.
10. Click on OK to complete the operation. The report opens and closes. The changes are visible
in the relevant panel.
Resizing Ranges
With DHCPv4, you can resize ranges. Basically, you can edit the ranges start and/or end address
so that they include more or less addresses. This shift in addresses is only possible if the ad-
dresses included or excluded are not already used or part of another range.
409
Managing DHCP Ranges
• The option IPAM replication is independent at range level, replicating scopes does not auto-
matically replicates to the ranges they contain. You must select ranges and execute the option
to update the IPAM pools with range data.
For more details regarding scope replication, refer to the section Defining a Specific IPAM
Space for a DHCPv4 Scope.
For more details regarding the DHCP options configuration, refer to the chapter Managing DHCP
Options and/or to the appendix DHCP Options.
410
Managing DHCP Ranges
411
Managing DHCP Ranges
For more details, refer to the chapter Managing Advanced Properties in the section Pool Advanced
Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
412
Chapter 30. Managing DHCP Leases
Leases correspond to an IP address. They belong to a range, and are therefore part of dynamic
addressing organizations.
Just like its name indicates it, a lease is limited in time. When a client requests an IP address to
a DHCP server, the server delivers an IP address that belongs to the scope that listens to the
network area where the client asked for an address. Which is why it is important to properly set
up the DHCP server.
As each lease allocates an IP address, you can display the corresponding IP address in the
IPAM.
EfficientIP DHCP servers manage the statics with IP address like leases. Therefore in IPv4:
• On the DHCP page All leases, all the clients are listed whether they requested access to the
server on parts of the network - defined through your scopes and ranges - or whether they
were identified through their MAC address. For more details, refer to the section Adding DHCPv4
Statics.
• On the IPAM page All addresses, if the IP address leased is also managed in the IPAM, the
columns Type and Status of the IP address reflect its use in the DHCP. For more details, refer
to the section Understanding the IP Address Type and Status.
SERVER
GROUP STATIC
413
Managing DHCP Leases
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. To display the list of leases of a specific server, in the column Server, click on the name of
the server of your choice. The page refreshes.
4. To display the list of leases of a specific scope, in the column Scope, click on the name of
the scope of your choice. The page refreshes.
5. To display the list of leases of a specific range, in the column Range, click on the name of
the range of your choice. The page refreshes.
Once leases have expired, are released or are deleted, they are moved to the page Lease
history or Lease history (v6).
Theses pages allow to track the leases delivered by all the DHCP servers you manage, they also
display active leases.
Note that the pages Lease history and Lease history (v6) are regularly purged, you can edit the
purge frequency. For more details, refer to the section Purging the DHCP Leases History.
414
Managing DHCP Leases
The columns on the page allow to display information on all active IPv4 or IPv6 leases, including
specific information:
Keep in mind that in IPv6 you can display colored labels above parts of the IP addresses listed.
It allows to differentiate at a glance your containers. For more details, refer to the chapter Managing
IPv6 Labels.
The columns on the page allow to display detailed information on each IPv4 and IPv6 lease
whether it expired, was released or was deleted:
Table 30.2. The columns available on the pages Lease History and Lease History (v6)
Field Description
IP address The IP address allocated.
MAC address The MAC address of the client that used the lease.
Client DUID Only available on the page V6. The DHCP Unique Identifier (DUID) sent by the client that
requested the DHCPv6 lease. For more details regarding the existing DUID structures,
refer to the section Managing DHCP Statics.
Start The lease allocation start time and date.
End The lease expiration time and date.
415
Managing DHCP Leases
Field Description
Server The name of the server that delivered the lease.
Client identifier Only available on the page V4. The value of the option client-identifier sent by the client
that requested the DHCPv4 lease.
GIADDR The gateway IP address of the relay agent of the lease.
Remote ID Only available on the page V4. The remote identifier provided by the relay agent that re-
ceived the DHCPv4 lease request and sent it to the server.
Circuit ID Only available on the page V4.The circuit identifier provided by the relay agent that received
the DHCPv4 lease request and sent it to the server.
Period Only available on the page V4. The total lifespan of the DHCPv4 lease.
Name The name of the lease as specified on the server, unless you chose to retrieve the option
domain-name sent by the DHCP clients instead. For more details, refer to the section
Using ACLs to Automatically Retrieve the DHCPv4 Lease Option domain-name.
OS name Only available on the page V4.The OS name and version of the client to which the DHCPv4
lease was allocated. The information is based on SOLIDserver fingerprint database.
Delayed create The creation or update is delayed until the lease is created on the physical server(s) of
the smart architecture. The creation is automatically done after maximum of 1 minute.
Delayed delete The deletion is delayed until the lease is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
EfficientIP DHCP server allows administrators to specify a default lease duration, a minimum
lease duration, and a maximum lease duration as defined below:
• default-lease-time specifies the duration of the lease that the DHCP server assigns if the client
requesting the lease does not ask for a specific expiration time.
• minimum-lease-time duration is used to force the DHCP client to take a longer lease than
the lease duration that it requests.
• maximum lease-time duration is used to define the longest lease that the DHCP server can
allocate. If a DHCP client asks for a longer lease than the maximum lease duration, then the
server limits the lease to the maximum lease duration.
Note that the maximum lease times does not apply to dynamic BOOTP leases. These
leases are not specified by the client and can exceed the maximum lease time configured.
416
Managing DHCP Leases
You can set up the lease duration at server, scope, range, group and static level in IPv4 and
at server and scope level in IPv6.You can also configure a DHCP class to set the lease duration.
DHCP lease duration is a topic of discussion among network administrators. Some use a lease
time of 6 months, some use lease time of 5 minutes. The right lease duration depends on each
network's context. Default lease duration on EfficientIP DHCP server is 12 hours.You can change
this default according to your requirements and set leases time at different levels, based on dif-
ferent factors. You can set a default lease time at the server, scope, range, group, DHCP class,
or static level of the EfficientIP DHCP organization.
It is not possible to convert an IPv6 lease into a static but you can add IPv6 statics.
When you convert a lease to static, a static reservation is added with the same name as the
lease. This reservation can have an IP address or not:
417
Managing DHCP Leases
• Converting into a static without IP address: the MAC address of the lease now connects
to the first available IP address on the network - no matter the server, scope or range managing
it. The purpose of the conversion is to configure DHCP options for the static reservation that
applies to the MAC address whenever it connects to the network.
• Converting into a static with IP address: the MAC address of the lease always connects to
the same IP address. The purpose of this conversion is to configure the same specific DHCP
options for a specific MAC address, or client, whenever they connect to the part of the network
that manages their IP address.
Once a lease is blacklisted, the corresponding static without IP is immediately added. The client
MAC address is saved in the DHCP server configuration as blacklist-<MAC_address> to ensure
that any lease request is denied. This static is automatically configured with a set of ACL restric-
tions that prevent the connection to the server and its failover. In the meantime, the lease remains
valid until it expires, the next client request for renewal is denied. Once the lease duration is up,
the client MAC address is disconnected and unable to connect again.
1
EfficientIP DHCP servers manage the statics with IP address like leases . The static reservations
add leases, identified via their MAC address, that you can also blacklist: a static without IP address
automatically replaces the static with IP address you blacklisted.
1
For more details, refer to the section Adding DHCPv4 Statics.
418
Managing DHCP Leases
4. In the menu, select Edit > Blacklist lease. The report opens and closes. The lease is
still visible on the page All leases and disappears once it has expired. On the page All
statics, every blacklisted MAC address as the following Name: blacklist.
An option on the page All servers allows to look for lease inconsistencies on the physical servers
of a smart architecture. For more details, refer to the section Repairing Leases in the chapter
Managing DHCP Servers.
This information is only available on EfficientIP DHCP servers, it is not available for the
other vendors.
The option relies on the sub-options Circuit ID, Remote ID and GIADDR:
• The Circuit ID generally contains information describing the port location that the DHCP request
is coming in from. It may contain additional information that helps describe which IP address
should be assigned, like a VLAN ID, wireless modem or ATM virtual circuit.
This value must be unique for a particular switch or router that is providing the Relay Agent
function. The value must also stay the same if modules are installed or removed in the Switch
or Router that implements the Relay Agent. Therefore, having subfields representing the
Module, Slot and Port is highly recommended.
• The Remote ID is intended to carry information describing the device at the remote end of the
link. However, in Ethernet systems, this is typically the MAC address of the Relay Agent. This
is not particularly useful since the MAC address would change if the Relay Agent was ever
replaced. Building a DHCP server database using the MAC address of the Relay Agent would
require that the table be rebuilt every time one of the Relay Agents was replaced. Some vendors
have modified this field to use the IP address of the Relay Agent or some other string describing
the Relay Agent.
This field must be unique to the entire network.
• The GIADDR (or Gateway IP Address) is part of the normal DHCP message. It contains the
IP address of the Relay Agent.
Since IP addresses must be unique, this field is unique for the entire network.
By combining the GIADDR and the Circuit ID, a network wide unique string can be added. This
string can be used for table lookup in the DHCP server. We call this string a pseudo MAC address,
as most DHCP servers establish a MAC to IP address mapping in their databases.
In its default configuration, the DHCP Relay Agent Information option passes along port and
agent information to SOLIDserver DHCP server. It is useful in statistical analysis for instance, as
it indicates where an assigned IP address physically connects to the network. It may also be
used to make DHCP decisions based on where the request is coming from or even which user
is making the request. For more details regarding its implementation, refer to the chapter Managing
DHCP Options.
419
Managing DHCP Leases
Note that the pages All leases and Lease history allow to display, sort and filter the Circuit ID,
Remote ID and GIADDR information in dedicated columns. For more details on how to add or
display customized list templates, refer to the section Managing List Templates.
The equivalent of the option 82 relay agent would be the DHCPv6 option 9 (relay message option)
and the option 47 (relay data option).
The new IP address shares the same address, MAC address and name as the new lease.
This property must be set at server level. For more details, refer to the chapter Managing Advanced
Properties in the section Configuring DHCP Advanced Properties.
Note that all DHCP to DNS properties rely on the IPAM and can only be configured if you set
DHCP to IPAM and IPAM to DNS advanced properties.
To configure DHCP to IPAM advanced properties, refer to the chapter Managing Advanced
Properties in the section Configuring DHCP Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Two rules are dedicated to this purge, one in DHCPv4 and the other in DHCPv6, you can change
their frequency.
420
Managing DHCP Leases
By default, it erases all leases older than 60 days, you can change this frequency.
To edit the rule 012 that sets the automatic purge frequency of DHCPv4 leases
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule # search field, type in 012. The rule Purge DHCP leases history is listed.
4. In the column Instance, click on auto_purge_histo_dhcplease. The rule properties page
opens.
5. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
6. Click on NEXT . The page Rule filters appears.
7. Configure the purge according to your needs.
By default, it erases all leases older than 60 days, you can change this frequency.
To edit the rule 384 that sets the automatic purge frequency of DHCPv6 leases
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule # search field, type in 384. The rule Purge DHCPv6 leases history is
listed.
4. In the column Instance, click on auto_purge_histo_dhcplease6. The rule properties page
opens.
5. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
6. Click on NEXT . The page Rule filters appears.
7. Configure the purge according to your needs.
421
Managing DHCP Leases
422
Chapter 31. Managing DHCP ACLs and
ACL Entries
In standard DHCP configurations, a client requests an IP address and the server offers in response
an IP address belonging to a range associated with the network segment of that client.
Within DHCP organizations, you can use Access Control Lists (ACLs) to tailor your dynamic
addressing configuration, set at server level. ACLs allow to identify clients and decide which
addresses to allocate them based on more than their location.
DHCP clients become members of an ACL when their request matches the ACL content, may
that be a rule or an ACL entry.
The ACL is a succession of checks that ultimately make sure that all the parameters you want
or refuse from your DHCP clients toward the DHCP server or smart architecture of your choice
are respected.
Note that one ACL can be used several times to set the access permissions to an object. For
instance, you can control the access to leases or restrict IP address allocation to unknown DHCP
clients. Using ACLs, one network can dynamically allocate known clients with IP addresses from
a particular segment and allocate addresses from another segment to unknown clients.
To restrict access to your dynamic addressing organization using ACLs, refer to the section
Managing DHCP ACLs.
To customize ACLs using ACL entries, refer to the section Managing DHCP ACL Entries.
423
Managing DHCP ACLs and ACL
Entries
SHARED
NETWORK SCOPE RANGE LEASE
SERVER ACL
The page All ACLs is accessible from any page in the DHCP, in the breadcrumb, it is part of the
additional pages right of All servers.
All the columns are displayed by default, you can filter and sort them but you cannot change their
order.
On the properties page, the panels Main properties and DHCP options are available.
Delayed create The creation or update is delayed until the ACL is created on the physical server(s) of the
smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the ACL is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
424
Managing DHCP ACLs and ACL
Entries
You can use predefined ACLs available upon addition if you want to apply specific behaviors, or
simply reuse the syntax and configure a custom-made ACL. Among them, only the MAC address
checks a list of data rather than parameters.
To add an ACL
1. In the sidebar, go to DHCP > Servers. The page All servers opens.
2. In the breadcrumb on the right of All servers, click on to display additional pages.
3. Click on All ACLs. The page refreshes.
4. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
5. In the menu, click on Add. The wizard opens.
6. In the list DHCP server, select one of your DHCP servers.
7. Click on NEXT . The next page opens.
8. In field ACL name, name the ACL.
9. In the drop-down list Predefined ACL, you can select one of the available ACLs. The ACL
syntax is displayed in the field Match expression and can be edited. By default, None is
selected.
10. In the field Match expression, type in or edit the syntax if need be.
11. Click on OK to complete the operation. The report opens and closes. The ACL is listed.
Once you added the ACL, you can configure it with ACL entries. For more details, refer to the
section Managing DHCP ACL Entries.
425
Managing DHCP ACLs and ACL
Entries
To copy an ACL
1. In the sidebar, go to DHCP > Servers. The page All servers opens.
2. In the breadcrumb on the right of All servers, click on to display additional pages.
3. Click on All ACLs. The page refreshes.
4. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
5. Tick the ACL(s) of your choice.
6. In the menu, select Edit > Migrate. The wizard Copying ACLs (v4) opens.
426
Managing DHCP ACLs and ACL
Entries
7. In the drop-down list Target server, select the server or smart architecture of your choice.
8. Click on OK to complete the operation. The report opens and closes. The copied ACLs are
listed, you may need to unset filters to display them.
If you copy an ACL to a smart architecture that manages physical servers, it is copied to the
smart and then pushed to the physical servers. The ACL remains in Delayed create until it is
successfully pushed.
Once your configuration is set, on the page All leases, the value of the option domain-name is
displayed in the column Name (DHCP lease name).
When your configuration is complete, any request matching the ACL you added sets the domain-
name you configured to the lease and automatically overwrites any inherited value.
Note that if your DHCP objects are set with advanced properties to update the IPAM and DNS
databases, the domain name you configure is sent to the IPAM and potentially the DNS as well.
For more details, refer to the chapter Managing Advanced Properties.
427
Managing DHCP ACLs and ACL
Entries
d. On the right-end side of the menu, make sure the button V4 is black, otherwise click on
it. The page refreshes and the button turns black.
e. In the menu, click on Add. The wizard opens.
f. In the list DHCP server, select one of your DHCP servers.
g. Click on NEXT . The next opens.
h. In field ACL name, specify the name of the ACL.
i. In the drop-down list Predefined ACL, select None.
j. In the field Match expression, specify the match of your choice.
k. Click on OK to complete the operation. The report opens and closes. The ACL is listed.
3. Configure the ACL with the option domain-name
a. At the end of the line of the ACL you just added, click on . The properties page opens.
b. In the panel DHCP options, click on EDIT . The wizard Configure DHCP options opens.
c. In the field Domain name (15), specify the name of the domain of your choice.
d. Click on OK to complete the operation. The report opens and closes. The DHCP option
is listed.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
To delete an ACL
1. In the sidebar, go to DHCP > Servers. The page All servers opens.
2. In the breadcrumb on the right of All servers, click on to display additional pages.
3. Click on All ACLs. The page refreshes.
4. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
5. Tick the ACL(s) of your choice.
6. In the menu, click on Delete. The wizard Delete opens.
7. Click on OK to complete the operation. The report opens and closes. The ACL is no longer
listed.
If you selected an ACL that belongs to a smart architecture managing physical servers, it
remains in Delayed delete until it is successfully removed from the architecture and the
server(s).
428
Managing DHCP ACLs and ACL
Entries
You can only add or delete ACL entries, you cannot edit them.
All the columns are displayed by default, you can filter and sort them but you cannot change their
order.
On the properties page, the panels Main properties and DHCP options are available.
Delayed create The creation or update is delayed until the ACL entry is created on the physical server(s)
of the smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the ACL entry is deleted from the physical server(s) of the
smart architecture. The deletion is automatically done after a maximum of 1 minute.
429
Managing DHCP ACLs and ACL
Entries
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
430
Managing DHCP ACLs and ACL
Entries
5. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
6. Tick the ACL entry of your choice, you can tick several.
7. In the menu, click on Delete. The wizard Delete opens.
8. Click on OK to complete the operation. The report opens and closes. The ACL entry is no
longer listed.
If you selected an ACL entry that belongs to a smart architecture managing physical servers,
it remains in Delayed delete until it is successfully removed from the architecture and the
server(s).
431
Chapter 32. Managing DHCP Groups
DHCP groups allow to configure specific parameters and DHCP options for the DHCPv4 or DH-
CPv6 statics they contain.They constitute an optional level within fixed reservation organizations.
They can manage statics with or without IP, therefore they allow configuring parameters not
strictly related to a per-network basis. For instance, they can be used to provide a consistent set
of parameters to clients that connect on more than one IP network.
SHARED
SCOPE RANGE LEASE
NETWORK
SERVER
GROUP STATIC
432
Managing DHCP Groups
Delayed create The creation is delayed until the group is created on the physical server(s) of the smart
architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the group is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
You can edit existing statics to manage them via the group of your choice, for more details refer
to the section Editing DHCP Statics.
Before adding a group, keep in mind that you cannot edit it. You need to delete it and replace it
with another one.
For more details regarding DHCP options, refer to the chapter Managing DHCP Options and/or
to the appendix DHCP Options.
433
Managing DHCP Groups
2. On the right-end side of the menu, click on V4 or V6 depending on your needs. The page
refreshes and the button turns black.
3. At the end of the line of the group of your choice, click on . The properties page opens.
4. In the panel DHCP options, click on EDIT . The wizard Configure DHCP options opens.
5. For DHCP options, in the drop-down list Option category, you can select a category. The
wizard refreshes and only displays the options of the category. By default, Most Used Option
is selected.
6. For DHCPv6 options, in the drop-down list Option category, you can select a category. The
wizard refreshes and only displays the options of the category. By default, DHCPv6 is selec-
ted.
7. Add, edit or delete the option(s) of your choice, via their input field or drop-down list.
You must empty out input fields or set drop-down lists to Unset to delete options.
For more details, refer to the section Configuring DHCP Options in the chapter Managing
DHCP Options.
8. Click on OK to complete the operation. The report opens and closes. The panel displays the
current configuration.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Keep in mind that you cannot delete a group if it contains statics. You must first remove the
statics from the group and then follow the procedure below.
434
Chapter 33. Managing DHCP Statics
DHCP statics are essentially lease reservations that ensure a specified client always uses the
same IP address on a network. They are part of fixed reservation organizations.
For clients who require a constant IP address, you can manually configure an IP address or assign
a DHCP static reservation, reserving a static allows to take advantage of the DHCP options.
Static reservations can match DHCP, PXE or BOOTP clients based on their MAC address or
DHCP-client-identifier . These reservations can belong to a DHCP server directly, a group, a
scope or a range. All the DHCP options set on these containers apply to the reservations, so if
you edit the DHCP options, the devices configured with the options are automatically updated
when they request the lease renewal.
Every DHCP static reservation must have a unique name which is usually used to identify it but,
in particular contexts, can be used to enforce the client's hostname.
When it comes to statics, there is a main difference between DHCP managing IPv4 and IPv6
addresses. DHCPv6 introduces a new piece of information, the DHCP Unique Identifier (DUID).
It should not exceed 128 bits in total and allows to identify a client rather than an equipment. It
contains the MAC address, therefore this address is not a unique independent set of numbers
anymore, it corresponds to the last 48 to 64 bits of the DUID depending on its type.
DUID-LLT
DUID type Hardware Time Stamp MAC Address
DUID-EN
DUID type Enterprise Vendor Vendor Identifier
DUID-LL
DUID type Hardware MAC Address
bits
DHCP servers in IPv4 use the MAC address specified during the static reservation to identify the
clients' IP address and allocate them a lease as well as soon as they are visible on the network.
Once the lease is allocated, if the IPAM and DNS replication are configured, the data is sent to
the IPAM and the DNS.
435
Managing DHCP Statics
SHARED
SCOPE RANGE LEASE
NETWORK
SERVER
GROUP STATIC
On the statics properties page you can display and set DHCP options from the dedicated panel.
None of the default options are listed in the panel, except for the type of DHCP server. For more
details, refer to the chapter Managing DHCP Options.
As EfficientIP DHCP servers manage IPv4 static reservations like leases, two new columns were
added to the page All statics: Last seen that indicates the last time the client was connected and
Expiration that indicates when the lease expires.
Keep in mind that in IPv6 you can display colored labels above parts of the IP addresses listed.
It allows to differentiate at a glance your containers. For more details, refer to the chapter Managing
IPv6 Labels.
436
Managing DHCP Statics
Delayed create The creation or update is delayed until the static is created on the physical server(s) of
the smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the static is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
During any static reservation you must specify a MAC address, or DUID in DHCPv6, and MAC
address type, this type is visible in the column Full MAC address. For more details, refer to the
appendix MAC Address Types References.
437
Managing DHCP Statics
Only EfficientIP DHCP servers, EfficientIP DHCP Package servers and smart architectures
containing only EfficientIP servers manage statics with IP address like leases.
10. Click on OK to complete the operation. The report opens and closes. The static is listed.
If you added a static in a range on an EfficientIP DHCP server, or a smart architecture managing
EfficientIP DHCP server(s), set with DHCP to DNS and DHCP to IPAM advanced properties,
once the client is connected to the network the static is listed on the page All leases. That lease
information updates the DNS with a new record. For more details, refer to the chapter Managing
Advanced Properties.
438
Managing DHCP Statics
10. Click on OK to complete the operation. The report opens and closes. The static is listed.
If you added a static in a range on an EfficientIP DHCP server, or a smart architecture managing
EfficientIP DHCP server(s), set with DHCP to DNS and DHCP to IPAM advanced properties,
once the client is connected to the network the static is listed on the page All leases. That lease
information updates the DNS with a new record. For more details, refer to the chapter Managing
Advanced Properties.
439
Managing DHCP Statics
440
Managing DHCP Statics
For more details regarding the DHCP options configuration, refer to the chapter Managing DHCP
Options and/or to the appendix DHCP Options.
441
Managing DHCP Statics
6. For DHCP options, in the drop-down list Option category, you can select a category. The
wizard refreshes and only displays the options of the category. By default, Most Used Option
is selected.
7. For DHCPv6 options, in the drop-down list Option category, you can select a category. The
wizard refreshes and only displays the options of the category. By default, DHCPv6 is selec-
ted.
8. Add, edit or delete the option(s) of your choice, via their input field or drop-down list.
You must empty out input fields or set drop-down lists to Unset to delete options.
For more details, refer to the section Configuring DHCP Options in the chapter Managing
DHCP Options.
9. Click on OK to complete the operation. The report opens and closes. The panel displays the
current configuration.
442
Managing DHCP Statics
2. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
3. Tick the static(s) of your choice.
4. In the menu, select Edit > Option > Delete. The wizard Delete DHCP options from
statics opens.
5. In the drop-down list Option name, select the option you want to delete.
6. In the field Option value filter, specify the option value.
7. Click on OK to complete the operation. The report opens and closes. On the static properties
page, the panel DHCP options no longer displays the DHCP option.
Statics with IP address are copied or moved when you migrate the scope they belong to.
The static is added in the DHCP failover channel you configured at network level, it shares the
same IP address, MAC address and name as the new IP address.
For more details, refer to the chapter Managing Advanced Properties in the sections Network
Advanced Properties and Configuring DHCP Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
443
Managing DHCP Statics
444
Chapter 34. Managing DHCP Options
DHCP options allow to provide extra information, e.g. specific configurations and/or access details,
on the clients or to the clients connecting to your servers. They can contains ACLs and/or option
definitions and can be set at several levels of the DHCP hierarchy. They can be configured in
dynamic addressing and fixed reservation organizations.
Most standard DHCP options are currently detailed in the RFC 2132 recommendation, "DHCP
Options and BOOTP Vendor Extensions". Even if most DHCP servers offer several options, the
vast majority of DHCP clients are generally conceived to request and take charge of just a sub-
part of the ensemble of standard RFC options.
You can configure and delete DHCP options on servers, groups, scopes, ranges and statics.
445
Managing DHCP Options
SHARED
SCOPE RANGE LEASE
NETWORK
OPTION OPTION
The page contains default option definitions, you cannot edit them but you can add new ones.
446
Managing DHCP Options
Delayed create The creation or update is delayed until the option definition is created on the physical
server(s) of the smart architecture. The creation is automatically done after a maximum
of 1 minute.
Delayed delete The deletion is delayed until the option definition is deleted from the physical server(s) of
the smart architecture. The deletion is automatically done after a maximum of 1 minute.
All options are propagated following the DHCP hierarchy. To avoid configuring the same
options on each object, you should start by configuring your servers with a default set of options.
To match specific clients, you can then set customize the options configuration at lower levels.
DHCP options apply to DHCP clients according to a defined precedence. The options hier-
archy is the following:
• An option set at ACL level overrides all other options.
• An option set at static level overrides options at the following levels: group, range, scope and
server.
• An option set at group level overrides options at scope and server level.
• An option set at range level overrides options at scope and server level.
• An option set at scope level overrides options at server level.
• An option set at server level is overridden by all other options.
447
Managing DHCP Options
2. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
3. At the end of the line of the object of your choice, click on . The properties page opens.
4. In the panel DHCP options, click on EDIT . The wizard Configure DHCP options opens.
5. In the drop-down list Option category, you can select Most Used Options, Basic, Server
Parameters, Lease Information, WINS/NetBIOS, Host IP, Interface, Servers, BOOTP Com-
patible, DHCP Packet Fields, Microsoft DHCP Client, NetWare Client, NIS/NISplus, Miscel-
laneous or any Vendor dedicated category.
The page refreshes and only displays the options of the category. By default, Most Used
Option is selected.
6. Add, edit or delete the option(s) of your choice, via their input field or drop-down list.
You must empty out input fields or set drop-down lists to Unset to delete options.
For more details, refer to the appendix DHCP Options.
7. Repeat these steps for as many options as needed.
8. Click on OK to complete the operation. The report opens and closes. The panel displays the
current configuration.
448
Managing DHCP Options
4. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
5. In the menu, click on Add. The wizard opens.
6. In the list DHCP server, select the server on which you want to specify the custom option.
7. Click on NEXT . The next page opens.
8. In the field Option name, name the custom option. The option is named option <your-option-
name> in the column Name.
9. In the field Option space, you can fill in the option space parameter that is used to build
encapsulated options.
If the space name you chose does not exist, it is added. If you do not you specify anything,
the default space dhcp is used.
10. In the field Option code, enter an option code. This code is a number between 1 and 255.
Keep in mind that if you are adding a code within the dhcp space, you must define a code
greater than 128. The option codes included between 1 and 128 are usually reserved: using
a code included in that range of numbers would overwrite existing options.
11. In the drop-down list Parameter counter, select the number of parameters you want to set
for that option. You can select up to 6 parameters with the corresponding number of fields
appearing.
12. In the drop-down list Parameter <number>, you have to choose one of the parameters below:
Keep in mind that the encapsulated options' type is binary but equivalent to the text format.
Its value is set in hexadecimal and looks as follows: \x01\xA2\x45\x12.
If you selected more than one Parameter counter, you need to repeat this step for each
one them.
13. In the drop-down list Type is array, select one of the values below.
449
Managing DHCP Options
14. The field Type sums up the selected parameters. Each letter that appears in this field cor-
responds to a parameter. For instance, if you specify an array of IP addresses the type
should be IA, if you specify an array of repeated addresses plus a boolean the type should
be IfA.
15. Click on OK to complete the operation. The report opens and closes. The option is listed.
With DHCPv6, you also have the possibility to add custom options. However, there are fewer
parameters available.
450
Managing DHCP Options
12. For each parameter, one or several boxes are available. Tick the boxes of your choice:
13. The Type field sums up the selected parameters. Each letter that appears in this field cor-
responds to a parameter. For instance, if you specify an array of IP addresses the type
should be IA, if you specify an array of repeated addresses plus a boolean the type should
be IfA.
14. Click on OK to complete the operation. The report opens and closes. The option is listed.
DHCP is used to locate the appropriate boot server or servers, with TFTP used to download the
initial bootstrap file. After it downloads the file, the host reboots and sends another IP address
request. When such a PXE client starts up, it first requests an IP address in order to download
the file it needs to boot.
The client, wishing to remotely boot an operating system image, broadcasts a DHCPDISCOVER
packet as per the DHCP protocol. This packet is transmitted to acquire an IP address. The client
also sends PXE protocol specific DHCP option 60 (Vendor Class Identifier) along with this
packet. The DHCP server responds to the above DHCPDISCOVER packet by sending a DH-
CPOFFER packet that contains the IP Address allocated to the client. In a PXE remote boot, the
DHCP server also sends:
• A special tag (option 60, with the value set to the string "PXEClient") to identify that it is capable
of configuring a PXE client.
• The next server to specify the server host address from which the initial boot file is to be
loaded.
• The filename to specify the name of the initial boot file to be loaded by a DHCP client.
The client downloads the executable file using either standard TFTP (port69) or MTFTP (port
assigned in Boot Server Ack packet). The file downloaded and the placement of the downloaded
451
Managing DHCP Options
code in memory is dependent on the client's CPU architecture. After it downloads the boot file,
the client reboots and sends a new DHCPDISCOVER.
You can set a different lease time for PXE boot requests to manage your dynamic ranges better.
The DHCP server can allocate an IP address with a shorter lease time to hosts that send PXE
boot requests in order to release IP addresses faster.
These options can be configured at multiple levels: server, scope, static reservation, DHCP group
or dynamic range.
The PXE parameters configuration only applies to DHCPv4. For now, it is impossible to set
them with IPv6 addressing.
452
Managing DHCP Options
address. In this case the DHCP server believes it negotiates IP addresses for two different clients,
one based on its MAC address and the other one on its client identifier.
To avoid this issue, SOLIDserver manages leases by setting a different lease time for PXE boot
request. SOLIDserver allows you to allocate an IP address with a shorter lease time to hosts that
send PXE boot requests, so IP addresses are not leased longer than necessary. By default the
lease duration for PXE client is set to 5 minutes (300 seconds). It can be changed by following
the next procedure.
When the DHCP server is considering dynamically allocating an IP address to a client, it first
sends an ICMP echo request (a ping) to the address being assigned. It waits for a second, and
if no ICMP echo response has been heard, it assigns the address. If a response is heard, the
lease is abandoned, and the server selects another free IP address and sends it a ping. The
DHCP server continues this process until it finds an IP address that does not respond to the ping.
The DHCP server then sends a DHCPOFFER message with the unused IP address to the DHCP
client.
You can configure the ping check with DHCPv4 and DHCPv6 options.
453
Managing DHCP Options
has been received before the timeout expires, it assigns the address. If a response is heard,
the lease is abandoned, and the server does not respond to the client. If no value is set, the
ping-timeout is of 1 second by default.
7. Click on OK to complete the operation. The report opens and closes. The panel displays the
current configuration.
With DHCPv6, the RFC 3315 defines the Vendor-specific Information Option. SOLIDserver
provides it through the option dhcp6.vendor-opts (option 17) in the list All option definitions.
454
Managing DHCP Options
• The field remote ID is intended to carry information describing the device at the remote end of
the link. However, in Ethernet systems, this is typically the MAC address of the Relay Agent.
This is not particularly useful since the MAC address would change if the Relay Agent was
ever replaced. Building a DHCP server database using the MAC address of the Relay Agent
would require that the table be rebuilt every time one of the relay agents was replaced. Some
vendors have modified this field to use the IP address of the Relay Agent or some other string
describing the relay agent. This field must be unique to the entire network.
• The GIADDR (or Gateway Address) field is part of the normal DHCP message. It contains the
IP address of the Relay Agent. Since IP addresses must be unique, this field is unique for the
entire network.
By combining the GIADDR and the circuit ID, a network wide unique string can be created. This
string can be used for table lookup in the DHCP server. We called this string a pseudo MAC ad-
dress, since most DHCP servers do a MAC to IP mapping in their databases.
In its default configuration, the DHCP Relay Agent Information option passes along port and
agent information to SOLIDserver DHCP server. It is useful in statistical analysis, as well as, in-
dicating where an assigned IP address physically connects to the network. It may also be used
to make DHCP decisions based on where the request is coming from or even which user is
making the request.
The following actions should be performed by the SOLIDserver DHCP when receiving a DHCP-
DISCOVER or DHCPREQUEST message with Option 82 set:
1. Relay Agent Information option is inserted by the DHCP relay agent when forwarding client-
originated DHCP packets to a DHCP server.
2. Relay Agent Information option is inserted by the DHCP relay agent when forwarding client-
originated DHCP packets to a DHCP server.
3. Servers recognizing the Relay Agent Information option may use the information to select the
IP address or other parameter assignment policies through the SOLIDserver ACL.
4. Switch or Router (as the DHCP relay agent) intercepting the DHCP requests, appends the
circuit ID with remote ID into the option 82 fields and forwards the request message to
SOLIDserver DHCP server.
The following procedure explains how to add an ACL rule allowing to restrict the IPv4 address
range to select or to send specific DHCP options according to the option 82 sent to the SOLID-
server DHCP server.
To add an ACL based on the option 82: Circuit ID within the leases user interface
1. In the sidebar, go to DHCP > Servers. The page All servers opens.
2. On the right-end side of the menu, make sure the button V4 is black, otherwise click on it.
The page refreshes and the button turns black.
3. In the column Name, click on the server or smart architecture of your choice to display the
scopes it contains.
4. In the breadcrumb on the right of All servers, click on to display additional pages.
5. Click on All ACLs. The page refreshes.
6. In the menu, click on Add. The wizard DHCP ACL parameters opens.
7. In the field ACL name, name your ACL.
8. In the drop-down list Predefined ACL, select None.
9. In the field ACL rule, type in the command below.
match if (substring(option agent.remote-id,0,6) = "dslam1");
455
Managing DHCP Options
It sets up an ACL that filters the DHCP option 82 as long as the first letters of the client's
remote-id match dslam1. You can set the keyword of your choice instead.
10. Click on OK to complete the operation. The report opens and closes. The ACL is listed.
Once the ACL is added, you can apply it to a DHCPv4 range to allow or restrict the access to all
clients that match this ACL rule. ACL can also be used to send specific DHCP options to the clients
that match this ACL rule. Edit the properties of the ACL to setup its DHCP option policies.
The equivalent of the option 82 relay agent would be the DHCPv6 option 9 (relay message option)
and the option 47 (relay data option).
By default, when you add a DHCP smart architecture or an EfficientIP DHCP server, the option
43 is added. This default option cannot be edited.
Within SOLIDserver, the vendor-specific information is stored in an ACL. Any client matching the
vendor information is attributed a set of options that you can configure through option definitions.
To properly setup option 43 on a DHCPv4 server in the GUI you need to:
1. Retrieve the vendor-class identifier from the DHCP handshake.
2. Add a new ACL that contains the vendor-class identifier.
3. Add as many DHCP option definitions as needed using the ACL as option space.
4. Configure the server ACL DHCP options to:
a. Set the Vendor option space that triggers the option 43 behavior on all the clients matching
the vendor-class identifier.
b. Set the value of your choice on all the option definitions you added.
Once the configuration is complete, the clients matching the vendor-class identifier are automat-
ically attributed the option definitions specified.
456
Managing DHCP Options
Seconds elapsed: 0
Bootp flags: 0x8000 (Broadcast)
Client IP address: 0.0.0.0 (0.0.0.0)
Your (client) IP address: 0.0.0.0 (0.0.0.0)
Next server To address: 0.0.0.0 (0.0.0.0)
Relay agent IP address: 172.16.206.2 (172.16.206.2)
Client MAC address: Polycom_e5:fa:69 (00:04:f2:e5:fa:69)
Client hardware address padding: 00000000000000000000
Server host name not given
Boot file name not given
Magic cookie: DHCP
Option: (t=53,l=1) DHCP Message Type = DHCP Discover
Option: (t=57,l=2) Maximum DHCP Message Size = 1456
Option: (t=55,l=20) Parameter Request List
Option: (t=12,l=16) Host Name - "SEP0004f2e5fa69"Option: (t=60,l=14) Vendor class
identifier = "Nortel-223x-A"
Option: (t=61,l=7) Client identifier
End Option
To add a DHCP option definition that uses the ACL value as option space
1. In the sidebar, go to DHCP > Servers. The page All servers opens.
2. In the breadcrumb on the right of All servers, click on to display additional pages.
3. Click on All option definitions. The page refreshes.
4. In the menu, click on Add. The wizard DHCP Option Definition opens.
5. In the list DHCP server, select the DHCPv4 server for which you configured the ACL.
6. Click on NEXT . The page DHCP option definition opens.
7. Configure the option. The accepted code, parameter counter, and type should be mentioned
in your device documentation.
a. In the field Option name, name your option.
b. In the field Option space, specify the ACL name.
c. In the field Option code, specify a code following your device documentation.
d. In the drop-down list Parameter counter, select a value following your device document-
ation.
e. In the drop-down list Parameter 1, select a value following your device documentation.
f. In the drop-down list Type is array, select one of the values below.
457
Managing DHCP Options
8. Click on OK to complete the operation. The report opens and closes. The option is listed as
follows: <option-space-name>.<option-name>.
Repeat this procedure for as many option definitions as needed, each definition adds a field in
the DHCP options configuration wizard which value you can set in the procedure below.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
458
Managing DHCP Options
459
Chapter 35. Configuring DHCPv6 Prefix
Delegation
DHCPv6 prefix delegation allows to delimit a number of IPv6 addresses, a delegation range, that
you distribute using a specific prefix and deliver independently in dynamic addressing organiz-
ations. The Customer Premises Equipment (CPE) can then use it to allocate addresses to their
clients.
abc::456a 2001:db8:0:1::a
2001:db8:0:1:: /64
DELEGATED
PREFIX abc::456b
2001:db8:0:2:: /64 2001:db8:0:2::8e
Start: 2001:db8:0:1::
End: 2001:db8:0:ffff:ffff:ffff:ffff:ffff
Prefixes: /64
This replaces the need for Network Address Translation (NAT) in an IPv6 network and is widely
required when implementing IPv6 network. DHCPv6 prefix delegation is currently detailed in the
RFC 3633 available on IETF website at https://tools.ietf.org/html/rfc3633.
You can manage prefix delegations and delegated prefixes on two dedicated pages.
Prerequisites
• Defining the delegation range. You must set the start address and end addresses to define
the number of IP addresses available for prefix delegation.
• Specifying a shared network that corresponds to one or more scopes. Any scope included in
a shared network can use any of the prefix delegations configured.
• Specifying a prefix that sets the size of the IP address segments delegated between the start
and end IP addresses.
• Belonging to a group of users configured with the proper rights and resources. Having a DHCPv6
server as group resource grants users access to the pages All prefix delegations (v6) and All
delegated prefixes (v6).
Specificities
• DHCPv6 prefix delegations are compatible with DHCP relay mechanisms.
• DHCPv6 prefix delegations must be associated with a shared network that contains at least
one scope.
460
Configuring DHCPv6 Prefix
Delegation
Limitations
• DHCPv6 prefix delegations are incompatible with DHCPv6 failover mechanisms since they
are not yet implemented in DHCPd 4.3 nor 4.4. For more details, refer to the RFC 8156 on
IETF website at https://tools.ietf.org/html/rfc8156.
• DHCPv6 prefix delegations:
• Cannot have a start address and end address that match existing DHCP ranges on the page
All ranges of the parent DHCPv6 server.
• Cannot be imported or edited, they can be added, exported and deleted.
• Cannot be configured on Split-scope smart architectures.
• DHCPv6 delegated prefixes can only be displayed and exported.
• The leases allocated within your delegated prefixes cannot be managed from the appliance.
The columns on the page provide details on each delegation. You can sort and filter them but
you cannot change their layout.
461
Configuring DHCPv6 Prefix
Delegation
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Keep in mind that deleting prefix delegations automatically deletes all their delegated prefixes.
462
Configuring DHCPv6 Prefix
Delegation
2. On the right-end side of the menu,make sure the button V6 is black, otherwise click on it.
The page refreshes and the button turns black.
3. In the breadcrumb on the right of All shared networks, click on to display additional
pages.
4. Click on All prefix delegations (v6). The page opens.
5. Tick the prefix delegation(s) of your choice.
6. In the menu, click on Delete. The wizard Delete opens.
7. Click on OK to complete the operation. The report opens and closes. The prefix delegation
is no longer listed.
From the page All delegated prefixes (v6), you can see how delegated prefixes are distributed.
Each delegated prefix has a unique MAC address, client DUID and lifespan.
Keep in mind that you can only display and export the delegated prefixes.
Several delegated prefixes can match one client. For each connection, clients obtain a new del-
egated prefix.
All expired delegated prefixes are available on the page Delegated prefix history.
463
Configuring DHCPv6 Prefix
Delegation
All the columns of the page All delegated prefixes (v6) can be sorted and filtered. The last two
columns of the table below are hidden by default.
Some columns are also available on the page Delegated prefix history, note that on this page
you cannot change their layout.
Table 35.1. The columns on the page All delegated prefixes (v6) and Delegated prefixes history
Column Description
Address The start address of the delegated prefix.
Prefix The prefix of the delegated range of IP addresses.
Client DUID The DHCP Unique Identifier (DUID) sent by the client that requested the delegated prefix.
For more details regarding DUID structures, refer to the section Managing DHCP Statics.
Full MAC address The full MAC address of the delegated prefix, a concatenation of its Type and short MAC
address.
MAC vendor Only on the page All delegated prefixes (V6). The MAC address of the network interface
vendor.
First seen The date when the prefix is first delivered to the client. Note that the client can connect
several times, and each time obtain a different prefix.
Start Only on the page All delegated prefixes (V6). The delegated prefix start time and date.
End The delegated prefix end time and date.
Server The name of the server that contains the shared network associated with the delegated
prefix.
Shared network The name of the shared network associated with the parent prefix delegation.
Range Only on the page All delegated prefixes (V6). The parent prefix delegation of the delegated
prefix.
Percent Only on the page All delegated prefixes (V6). The delegated prefix elapse time graph,
when it reaches 100 % the delegated prefix has expired.
Expires in Only on the page All delegated prefixes (V6). The time left before the expiration of the
delegated prefix.
Period Only on the page All delegated prefixes (V6). The total lifespan of the delegated prefix.
Related scopes Only on the page All delegated prefixes (V6). The name of the scopes that belong to the
shared network associated with the parent prefix delegation.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
464
Chapter 36. Monitoring and Reporting
DHCP Data
SOLIDserver provides tools dedicated to monitoring DHCP servers and generating reports. Note
that these tools only apply to DHCP objects managing IPv4 addressing:
• The alerts that you can set on the DHCP pages allow to customize your monitoring. For more
details, refer to the chapter Managing Alerts.
• A set of statistics are available in dedicated panels of the properties page of DHCP servers,
as detailed in the section Monitoring DHCP Servers from their Properties Page.
• A set of data sampling analytics are available on the page Analytics, as detailed in the section
Monitoring DHCP Servers from the Page Analytics.
• A set of rules allow to monitor your servers, as detailed in the section Monitoring DHCP
Servers Using Rules.
• A number of reports on IPv4 servers and scopes are available, as detailed in the section
Generating DHCP Reports.
Note that the server analytics panel and lease statistics panel display data retrieved using SNMP,
therefore, the graphs are empty if the SNMP is not configured properly. To edit the SNMP para-
meters of an EfficientIP DHCP server, refer to the section Editing the SNMP Monitoring Parameters
of EfficientIP DHCP Servers.
Keep in mind that you can zoom in and out of the charts or decide the period and data to display.
For more details, refer to the section Charts.
465
Monitoring and Reporting DHCP
Data
By default, on a smart architecture properties page, statistics panels are displayed for maximum
ten physical servers. For more details, refer to the section Setting the number of DHCP server
statistics panels to display.
To set the number of server statistics panels to display on the properties page of
a smart
Only users of the group admin can perform this operation.
466
Monitoring and Reporting DHCP
Data
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with www.display.properties_page.stats.max_servers.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value. The wizard Registry database edit a value opens.
6. In the field Value, specify the number of seconds of your choice. By default, it is set to 10.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new key value is displayed.
The analytics functionality is enabled by default and samples the DHCP messages over specific
periods of time. By default, it offers 5-minute samples. To set a shorter or larger periodicity, refer
to the section Configuring the Analytics Retrieval.
Limitations
• The analytics are only available for EfficientIP DHCP servers.
• Only the first 50 entries matching the selected data are listed. Therefore, if during the selected
period of time, 100 pieces of information are identical, the GUI only displays the first 50.
• You might slow your appliance down if you edit the purge mechanism to include more lines or
keep data longer than the default 30 days.
Each sample compares data retrieved over a specific periodicity, a limited period of time, that is
set by default to a sample time of 5 minutes. You can edit the sampling period following the pro-
cedure in the section Configuring the Periodicity.
Each column provides and compares message information over the specified sample time.
467
Monitoring and Reporting DHCP
Data
468
Monitoring and Reporting DHCP
Data
5. Under the menu, in the drop-down list Display, select the data of your choice. The page
data and columns refresh. All available analytics are detailed in the table below.
6. Under the drop-down list, you can tick the box Automatic refresh to automatically refresh
the data listed every minute. To edit the page refresh frequency, refer to the section Editing
the Automatic Refresh Frequency.
You can edit the sample time following the procedure in the section Configuring the Periodicity.
469
Monitoring and Reporting DHCP
Data
Statistic Description
Top 50 "Unknown network segment" The top 50 clients who received unknown network segment messages
during the configured Period. These clients are identified using their IP
address.
Top 50 "Unknown subnet" The top 50 clients who received message unknown subnet messages
during the configured Period. These clients are identified using their IP
address.
Message types All the messages sent and received by the DHCP server during the con-
figured Period. All messages are identified using their type.
a
The lease was either accepted by another client while being offered or declined by the client.
You can configure a shorter or larger periodicity on each physical server individually.
Note that no matter the periodicity, the data is available on the page at a frequency specified
through the rule 381. To edit that rule, refer to the section Configuring the DHCP Analytics Re-
trieval Frequency.
470
Monitoring and Reporting DHCP
Data
No matter the periodicity you set on the physical server, the data is available in the GUI depending
on the rule configuration.
To edit the rule 381 that sets the DHCP analytics data retrieval
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule #, type in 381 and hit Enter. The rule is the only one listed.
4. At the end of the line, click on . The properties page opens.
5. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
6. In the field Rule name, you can rename the rule. This field is required.
7. In the field Comment, you can insert, edit or delete the rule comment. This field is optional.
8. Click on NEXT . The page Rule filters opens.
9. Edit the rule frequency according to your needs.
10. Click on OK to complete the operation. The report opens and closes.
471
Monitoring and Reporting DHCP
Data
As both thresholds work together, once the number of days or the number of lines is met, the
unwanted data is deleted.
No matter the way you want to purge your database, keep in mind that if you set very high
thresholds, you may slow down your appliance because the database contains too much
information.
472
Monitoring and Reporting DHCP
Data
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
In the following procedures, we are going to configure a monitoring process to add the rules 105
and 082 that respectively check DHCP scope/range usage and send an alert if a DHCP scope
is full.
Before using the monitoring rules, make sure the server is responding.
To add the rule 105 that checks scopes and ranges usage
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select DHCP.
5. In the drop-down list Event, select Execution of a scheduled rule.
6. In the list Rule, select (105) Check DHCP scope/range usage.
7. In the field Rule name, name the rule. That name is then listed in the column Instance.
8. In the field Comment, you can specify a comment if you want.
9. Click on NEXT . The page Rule filters opens.
10. Edit the rule frequency according to your needs.
473
Monitoring and Reporting DHCP
Data
Once the rule 105 is added, add the rule 082. Make sure the SNMP service is configured properly.
For more details, refer to the section Configuring the SNMP Server.
To add the rule 082 that sends an alert when a scope is full
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select DHCP.
5. In the drop-down list Event, select Event.
6. In the list Rule, select (082) Send an alert if a DHCP scope is full.
7. In the field Rule name, name the rule. That name is then listed in the column Instance.
8. In the field Comment, you can specify a comment if need be.
9. Click on NEXT . The page Rule filters opens.
10. Click on NEXT . The page Rule parameters opens.
11. To be notified via SNMP trap:
a. In the field IP address of the SNMP trap, specify the IP address of the appliance that
should receive the SNMP trap.
b. In the field SNMP trap community, specify the community string for this trap. By default
it is ness.
12. To be notified via email, in the field Send a mail to, specify the email address that should
receive the notification.
13. Click on OK to complete the operation. The report opens and closes. The rule is listed.
Thanks to these two rules, if scopes from your DHCP servers exceed the percentage of usage
specified in the rule 105, you are automatically notified via email and/or SNMP trap.
Besides, you can display DHCP scope/range usage, in the panel State log of the scope properties
page.
474
Monitoring and Reporting DHCP
Data
For more details regarding the reports and their generation, refer to the section Managing Reports.
475
Part VII. DNS
The Domain Name System (DNS) is a hierarchical distributed naming system which main function is to
convert an IP address into an intelligible domain name (name resolution) or a domain name into an IP address
(reverse resolution). The DNS namespace can be seen as a reversed tree of domains managed by zones.
DELEGATION
root
At the root of the structure, the highest zone is represented by a silent dot ( . ) followed, in order, by the Top-
Level Domains (TLDs) and the Second-Level Domains (SLDs). The TLDs are divided into generic TLDs
(gTLD), like .com, .org or .net, and country code TLDs (ccTLD), like .us, .fr or .uk . The whole access path
to a domain reads from right to left: SLD.TLD .
At the top of the reverse tree, there are 13 root servers listed alphabetically from A to M and spread out
worldwide. They all gather the same information regarding the TLDs and, to avoid being saturated by
queries, they delegate names and IP addresses to accredited registrars.
In theory, a client that wants to access a web page would have to follow the whole hierarchy from the root
down to the sub-domain. For that reason, DNS servers offer a combination of authoritative, recursive or
cache functionalities.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
37. Understanding DNS Smart Architectures ................................................................... 481
Master/Slave Smart Architecture ............................................................................ 482
Multi-Master Smart Architecture ............................................................................. 482
Stealth Smart Architecture ..................................................................................... 483
Single-Server Smart Architecture ........................................................................... 483
Farm Smart Architecture ........................................................................................ 484
38. Managing DNS Smart Architectures .......................................................................... 485
Browsing DNS Smart Architectures ........................................................................ 485
Adding a DNS Smart Architecture .......................................................................... 486
Converting a DNS Server into a Smart Architecture ................................................. 496
Editing a DNS Smart Architecture .......................................................................... 497
Handling the Status Locked Synchronization ........................................................... 501
Exporting DNS Smart Architectures ....................................................................... 502
Deleting a DNS Smart Architecture ........................................................................ 502
Defining a DNS Smart Architecture as a Group Resource ........................................ 502
39. Managing DNS Servers ............................................................................................ 503
Browsing DNS Servers .......................................................................................... 504
Managing EfficientIP DNS Servers ......................................................................... 505
Managing Microsoft Windows DNS Servers ............................................................ 511
Managing BIND DNS Servers on Linux ................................................................... 514
Managing Generic DNS Servers ............................................................................ 523
Managing Amazon Route 53 Servers ..................................................................... 526
Managing Azure DNS Servers ............................................................................... 538
Synchronizing DNS Servers ................................................................................... 542
Editing DNS Servers ............................................................................................. 543
Securing the Management of DNS Servers Using a TSIG Key ................................. 544
Flushing the Cache of DNS Servers ....................................................................... 545
Exporting DNS Servers ......................................................................................... 546
Deleting DNS Servers ........................................................................................... 546
Defining a DNS Server as a Group Resource .......................................................... 546
40. Configuring DNS Servers ......................................................................................... 547
Configuring DNS Forwarding at Server Level .......................................................... 547
Configuring DNS Recursion at Server Level ............................................................ 549
Configuring DNS Notify Messages at Server Level .................................................. 552
Restricting DNS Queries at Server Level ................................................................ 553
Limiting Zone Transfers at Server Level .................................................................. 556
Configuring a Blackhole ......................................................................................... 557
Configuring Client Resolver Cache Options at Server Level ..................................... 558
Configuring EDNS Options at Server Level ............................................................. 559
Configuring Prefetch on a Server ........................................................................... 560
Improving the Server Performance ......................................................................... 560
Configuring a Sortlist at Server Level ...................................................................... 561
Limiting the Number of Responses of a Server ........................................................ 562
Configuring DNS64 ............................................................................................... 563
Configuring DNS Sources at Server Level ............................................................... 567
Authenticating the Zones Dynamic Update from the Server ...................................... 570
Configuring Access Control Lists for a Server ......................................................... 572
Configuring DNS Keys ........................................................................................... 574
Including Non-Supported DNS Settings .................................................................. 575
Setting up Anycast DNS ........................................................................................ 575
Integrating Cisco Umbrella ..................................................................................... 588
478
DNS
479
DNS
480
Chapter 37. Understanding DNS Smart
Architectures
The current approach of DNS service management is mainly limited at managing a single server,
restricting service configuration and management with a server per server approach even if it is
performed from a centralized platform. This approach is insufficient to ensure service reliability,
security and easiness of management. It could weaken your DNS architecture because:
• It increases the risk of misconfigurations.
• There is no Best Practices enforcement to ensure the high security of the network services
architecture.
• There is no automation of architecture implementation and management.
• There are difficult and risky architecture changes.
With this approach, even if the configuration is simplified from the GUI, it is still complex, expensive
and requires experts to deploy and configure all servers in coherent architectures of DNS-DHCP
services.
To drastically simplify the implementation and administration of your network service, we strongly
recommend managing every DNS server from a smart architecture. That way, you can manage
DNS services at server level and at architecture level. Smart architectures are virtual management
tools that allow to back up your configuration. If the server(s) you are managing from the smart
architecture were to crash, the architecture would save the configuration and allow you to push
it on some new server(s) automatically. In addition, you can change the type of smart architecture
and the physical server(s) it manages.
The smart architecture offers a library of DNS architectures that are ready to apply on a set of
servers. All the DNS smart architectures designed for more than one server can contain
several Master servers. This sets up an even more secure environment: if one Master server
crashes or stops responding, the other one takes over and ensures service availability.
Smart architectures allow to manage other DNS servers supporting DDNS (RFC2136) with the
single ability of updating the domains and not the server configuration or the zone configuration.
In that way, the server configuration and the zone configuration must be done locally on the
server. This configuration is useful when you are only allowed to update zones on a DNS partner.
481
Understanding DNS Smart
Architectures
DNS
Master
DNS DNS
Slave Slave
DNS
Master
DNS DNS
Master Master
With the smart architecture, updating a DNS server can be done from the management console,
from a DHCP allocation or from Microsoft DNS clients that update themselves their names by
using the Dynamic DNS (DDNS) mechanism:
• When a Multi-Master smart architecture is updated from the management console, the config-
uration is automatically pushed toward all the DNS servers belonging to the smart architecture.
• When a DNS server receives a dynamic update from a DNS client, the Multi-Master smart ar-
chitecture replicates the update to all the DNS servers it manages. This replication is automatic
and does not require any manual operations.
482
Understanding DNS Smart
Architectures
• When a DHCP server offers a new IP address, the SOLIDserver IPAM appliance updates the
Multi-Master smart architecture and, consequently, all the DNS servers it manages.
A primary DNS server is eliminated as a single point of failure. Traditional DNS replication is
single-master; it relies on a primary DNS server to update all the secondary servers. Unlike tra-
ditional DNS replication, Directory Server Replication is Multi-Master. Changes made to a zone
can be replicated to one or more Directory Servers. Which is why we recommend that you refer
to your vendor information regarding the Directory Server used and its replication capabilities.
DNS Hidden
Master
The visible secondary DNS server contains only slave zones, which exposes it less to DNS attacks
as the real authoritative primary server is hidden. Zone transfers can be allowed from the second-
ary servers as required but they do not transfer or accept transfers from the stealth server.
One of the main advantages of this architecture is that the primary server can be offline for
maintenance without causing any interruption to DNS service within the expiration duration (30
days) set for the validity of its zone data.
483
Understanding DNS Smart
Architectures
Single
DNS
This architecture is therefore a backup in itself. Moreover, managing a physical server through
a Single server architecture eases up any migration or change of architecture. If after a few
weeks, for instance, you want to set up a Master/Slave architecture, you can edit the smart archi-
tecture, change it to Master/Slave, add another physical server and define which one acts as a
master and which one as a slave.
DNS
Master
DNS
Slaves
The Farm architecture is especially useful for huge configurations where the use of load balancers
is necessary.
484
Chapter 38. Managing DNS Smart
Architectures
Once you chose the smart architecture(s) that suit your needs in the chapter Understanding DNS
Smart Architectures, you can manage them following the sections below.
In the column Name, all the smart architectures are preceded by the icon . They are listed with
the physical servers.
A set of panels on this page display all the query statistics of the server. For more details, refer
to the section Monitoring DNS Servers from their Properties Page.
The column Status provides information on the configuration of each smart architecture.
Invalid settings The smart architecture does not contain any physical server, is missing one or sev-
eral physical servers or is not configured properly (it may contain objects incompatible
with at least one of the physical servers it manages).
The column Sync provides synchronization details on the exchanges between the smart archi-
tecture and its physical server(s).
485
Managing DNS Smart Architectures
Locked synchronization The synchronizing failed, the smart architecture cannot send its configuration file to
the physical server(s) it manages. The configuration of one of its EfficientIP or Effi-
cientIP Package server is not viable. For more details, refer to the section Handling
the Status Locked Synchronization.
Table 38.3. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
• If your smart architecture manages physical servers from several vendors, you may get warning
messages when you add views, zones or records. Some vendors do not support views, RPZ
zones and specific DNS zone and record types. You can force the configuration to add them
to the server(s) that do support them.
To display all the potential incompatibilities of your architecture in the column Multi-Status, you
can generate the report Smart architecture incompatibilities. For more details, refer to the
section DNS Server Reports in the chapter Monitoring.
Once added, the DNS smart architecture is listed as a real server on the page All servers, the
column Type indicates which smart architecture was configured.
486
Managing DNS Smart Architectures
In the procedures below, we are going to add smart architectures and the physical servers they
manage, but you can go through the configuration without adding any server and do it later. For
more details, refer to the section Adding a DNS Server into a Smart Architecture.
DNS
Master
DNS DNS
Slave Slave
487
Managing DNS Smart Architectures
488
Managing DNS Smart Architectures
DNS
Master
DNS DNS
Master Master
489
Managing DNS Smart Architectures
490
Managing DNS Smart Architectures
DNS Hidden
Master
491
Managing DNS Smart Architectures
e. You can tick the box Force Hybrid DNS compatibility if you intend to manage BIND
servers that you might switch to Hybrid in the future. For more details, refer to the chapter
Hybrid DNS Service.
9. Click on NEXT . The last page opens.
10. Tick the box Use DNS as DNSSEC resolver if you want to activate DNSSEC validation on
all the servers the smart architecture manages. For more details, refer to the chapter
DNSSEC.
11. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
12. In the field Description, you can specify a description, it it displayed in the dedicated column
of the page All servers.
13. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
14. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DNS server and marked Smart (stealth) in the column Type. To display or
hide the physical servers managed through the smart architecture click on on the right-
end side of the menu.
During the first addition of a DNS smart architecture, the option allow-transfer is by
default configured with the ACL admin. Within SOLIDserver admin corresponds to any,
so you might want to change the ACL and restrict the option use as it is inherited by the
server zones. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
492
Managing DNS Smart Architectures
Single
DNS
493
Managing DNS Smart Architectures
12. In the field Description, you can specify a description, it it displayed in the dedicated column
of the page All servers.
13. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
14. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DNS server and marked Smart (single-server) in the column Type. To display
or hide the physical servers managed through the smart architecture click on on the right-
end side of the menu.
During the first addition of a DNS smart architecture, the option allow-transfer is by
default configured with the ACL admin. Within SOLIDserver admin corresponds to any,
so you might want to change the ACL and restrict the option use as it is inherited by the
server zones. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
DNS
Master
DNS
Slaves
494
Managing DNS Smart Architectures
a. To add a master server, in the drop-down list Available DNS servers, select a server
and click on + MASTER . The server is moved to the Master DNS server(s) list. To remove
a server from the list, select it and click on .
Repeat this action for as many servers as needed. With several master servers, if one
crashes the other one takes over.
b. To add a slave server, in the drop-down list Available DNS servers, select a server
and click on + SLAVE . The server is moved to the Slave DNS servers list. To remove a
server from the list, select it and click on . Note that Generic, Amazon Route 53 and
Azure servers cannot be slave.
Repeat this action for as many servers as needed.
8. Click on NEXT . The page Advanced settings opens. You must publish one or several name
servers or load balancers to complete the configuration.
a. In the field NS record, specify the name server of your choice. It can also be the host-
name of an external load balancer.
b. Click on ADD . The name is moved to the Published name servers list. Note that the
first server in this list is used as MNAME value of the SOA for all the Master zones
managed by this smart architecture.
Repeat these actions for as many NS records as needed, every record listed is saved
in all zones and displayed on the page All RRs of each of the physical servers managed
by the smart architecture.
You can edit the content of the Published name servers list:
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
9. If you want to manage BIND servers that you might switch to Hybrid in the future, you need
to complete the configuration as follows.
a. Tick the box Expert mode. The box Force Hybrid DNS compatibility appears.
b. Tick the box Force Hybrid DNS compatibility. For more details, refer to the chapter
Hybrid DNS Service.
10. Click on NEXT . The last page opens.
11. Tick the box Use DNS as DNSSEC resolver if you want to activate DNSSEC validation on
all the servers the smart architecture manages. For more details, refer to the chapter
DNSSEC.
12. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
13. In the field Description, you can specify a description, it it displayed in the dedicated column
of the page All servers.
14. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
495
Managing DNS Smart Architectures
15. Click on OK to complete the operation. The report opens and closes. The smart architecture
is listed as a DNS server and marked Smart (farm) in the column Type. To display or hide
the physical servers managed through the smart architecture click on on the right-end
side of the menu.
During the first addition of a DNS smart architecture, the option allow-transfer is by
default configured with the ACL admin. Within SOLIDserver admin corresponds to any,
so you might want to change the ACL and restrict the option use as it is inherited by the
server zones. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
Keep in mind that once you converted a DNS server into a smart, it is no longer listed as a
physical server on the page All servers. You have to add it again to be able to manage it, on its
own or from a smart architecture.
During the conversion, you can add DNS servers into the smart architecture. Considering that
you might want to manage the server you converted from the smart architecture, we recommend
converting the server and then editing the smart to add the servers as detailed in the section
Adding a DNS Server into a Smart Architecture.
496
Managing DNS Smart Architectures
Table 38.4. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
• If your smart architecture manages physical servers from several vendors, you may get warning
messages when you add views, zones or records. Some vendors do not support views, RPZ
zones and specific DNS zone and record types. You can force the configuration to add them
to the server(s) that do support them.
To display all the potential incompatibilities of your architecture in the column Multi-Status, you
can generate the report Smart architecture incompatibilities. For more details, refer to the
section DNS Server Reports in the chapter Monitoring.
If you do not have any physical server listed on the page All servers yet, refer to the chapter
Managing DNS Servers to add and manage them from a smart architecture.
Note that:
• Before managing a new server, make sure that the DNS service is properly started. For more
details, refer to the chapter Configuring the Services.
• If you want to manage several physical servers from a smart architecture, you should have
them all listed and ready before adding them into the smart architecture. Otherwise the archi-
tecture configuration may be invalid.
497
Managing DNS Smart Architectures
• When you add one or more DNS servers into a smart architecture, the smart data is
automatically replicated from the architecture to the DNS servers it manages. So if the
smart architecture is empty (first use), the configuration file of the physical DNS server it
manages is completely overwritten.
• If you want to add an Amazon Route 53 server to a smart architecture, refer to the section
Adding an Amazon Route 53 Server in an Existing Smart Architecture of the chapter Managing
DNS Servers.
498
Managing DNS Smart Architectures
2. At the end of the line of the smart architecture of your choice, click on . The properties
page opens.
3. In the panel Main properties, click on EDIT . The wizard Edit a DNS smart architecture
opens.
4. If custom classes are enabled at server level, in the list DNS server class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Click on NEXT . The page DNS servers role configuration opens.
6. In the Master DNS server(s) list or Slave DNS servers list, select the server of your choice
and click on . The server is moved back to the drop-down list Available DNS servers.
7. If you are editing a Farm architecture or if you configured NS records on another architecture,
click on NEXT . The page Advanced settings opens, it is detailed at the end of the relevant
addition procedure in the section Adding a DNS Smart Architecture.
8. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Description
and Advanced properties, refer to the relevant smart architecture addition procedure in the
section Adding a DNS Smart Architecture.
9. Click on OK to complete the operation. The report opens and closes. If your smart architecture
is still managing physical servers, you can display or hide them using the button on the
right-end side of the menu.
499
Managing DNS Smart Architectures
b. In the drop-down list Available DNS servers, select the server you previously removed,
and depending on the smart architecture click on + MASTER , + SLAVE or + HIDDEN-MASTER ,
+ PSEUDO-MASTER . The selected server is moved to the corresponding list.
Note that, within Stealth architectures, you can have several pseudo-master servers.
However, BIND/Unbound hybrid servers can only be defined as master or slave; Gen-
eric servers can only be defined as master; Amazon Route 53 and Azure servers can
only be defined as master or pseudo-master.
c. Repeat these actions for as many servers as needed.
9. If you are editing a Farm architecture or if you configured NS records on another architecture,
click on NEXT . The page Advanced settings opens, it is detailed at the end of the relevant
addition procedure in the section Adding a DNS Smart Architecture.
10. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Description
and Advanced properties, refer to the relevant smart architecture addition procedure in the
section Adding a DNS Smart Architecture.
11. Click on OK to complete the operation. The report opens and closes. To display or hide the
physical servers managed through the smart architecture click on on the right-end side
of the menu. The column Role displays the server(s) new role.
500
Managing DNS Smart Architectures
Note that, within Stealth architectures, you can have several pseudo-master servers.
However, BIND/Unbound hybrid servers can only be defined as master or slave; Gen-
eric servers can only be defined as master; Amazon Route 53 and Azure servers can
only be defined as master or pseudo-master.
c. Repeat these actions for as many servers as needed.
9. If you are editing a Farm architecture or if you configured NS records on another architecture,
click on NEXT . The page Advanced settings opens, it is detailed at the end of the relevant
addition procedure in the section Adding a DNS Smart Architecture.
10. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Description
and Advanced properties, refer to the relevant smart architecture addition procedure in the
section Adding a DNS Smart Architecture.
11. Click on OK to complete the operation. The report opens and closes. The column Type dis-
plays your changes.
Once the server is in Locked synchronization, the corrupted configuration file is automatically
stored locally on the appliance and available for download in the Local Files Listing. It is named
<server_name>-named.conf. We advice that you take a look at this file because after the first
found error, the check stops and returns the Locked synchronization status. So if there are sev-
eral errors, the status is returned over and over again until the file is conclusive and can be sent
to the physical server.
You can check for failure in the configuration file from the GUI or via CLI.
501
Managing DNS Smart Architectures
# ls -la /data1/exports/*-named.conf
3. Use the following command to get a precise list of all the errors:
# /usr/local/nessy2/bin/named-checkconf /data1/exports/<server_name>-named.conf
4. Adjust identified statements, once the check runs again, the Locked Synchronization status
disappears if you now have a valid configuration.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Granting access to a smart architecture as a resource also makes every physical server it contains
available. For more details, refer to the section Adding Resources to a Group in the chapter
Managing Groups.
502
Chapter 39. Managing DNS Servers
The server is the highest level of the DNS hierarchy. It allows to resolve host queries and access
specific areas of a network, as server can be:
• Authoritative: A server that has authority over a number of domain names and can delegate
them.
• Recursive: A server that might contain information, if not it directs the querying host toward
the relevant DNS server to solve the query.
• Cache: A server that retrieves and keeps information, query results, to answer the exact same
queries again.
You can add and manage EfficientIP DNS servers, EfficientIP Package DNS servers, Microsoft
Windows DNS servers (including via AD), Generic DNS servers, Amazon Route 53 servers and
Microsoft Azure servers. All server types can be managed independently or via a smart architec-
ture. For more details, refer to the chapters Understanding DNS Smart Architectures and Managing
DNS Smart Architectures.
In theory, when a host wishes to access a particular domain, a website for instance, a query is
sent to a DNS server that processes the resolution as follows:
1. The DNS client host sends a sequence of queries through a resolver to a recursive DNS
server.
2. The recursive server contacts the authoritative servers of the root domain. One of them returns
the IP address (an NS record) of the server that has authority over the concerned TLD.
3. The recursive server uses the IP address to connect to the TLD authoritative server and obtain
the IP address of the server that has authority over the zone.
4. The recursive server uses the IP address to connect to the zone authoritative server and obtain
the queried results.
5. The recursive server sends the results back to the DNS client.
.
root iterative server
.efficientip.com
domain iterative server
Figure 39.1. Diagram of a DNS query of www.efficientip.com via a recursive server
Obviously, such a mechanism would saturate the root zone, which is why a server can combine
recursive, cache and/or authoritative functionalities.
503
Managing DNS Servers
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
A set of panels on this page display all query statistics of the server, including RPZ queries if you
configure it with RPZ zones. For more details, refer to the section Monitoring DNS Servers from
their Properties Page. If you enabled the service DNS Guardian, this page also contains a set of
charts dedicated to DNS Guardian data. For more details, refer to the part Guardian.
504
Managing DNS Servers
License The server is compatible with the license applied to your appliance. For more details
on licenses and their metrics, refer to the chapter Managing Licenses.
Invalid credentials The SSL credentials are invalid or the server is already managed by another appliance
and you need to specify your credentials again. For more details, refer to the section
Editing DNS Servers.
If the appliance database is encrypted, it may be that the Active key is missing. For
more details, refer to the section Troubleshooting the Database Encryption of the
chapter Securing.
Syntax error The server configuration contains syntax errors, it is not viable.
Invalid resolver For Amazon Route 53 servers, SOLIDserver cannot resolve the AWS DNS service.
The Amazon services are unreachable and the server cannot be managed. Make
sure that the DNS resolvers declared on the page Network configuration are valid.
Invalid Time For Amazon Route 53 servers, no changes performed from the GUI are pushed to
the server because SOLIDserver time and date are incorrect. To correct the time
and date refer to the chapter Configuring the Time and Date. In addition, you must
ensure the appliance time zone is UTC, for more details refer to the section Config-
uring the User Display Settings.
Not running The service DNS server (named) is stopped on the appliance.
Busy The server synchronizing is ongoing. While the server is busy, the column Status
may return inaccurate information.
Locked synchronization For EfficientIP or EfficientIP Package servers, the server configuration is not viable.
If the server is managed from a smart architecture, the architecture cannot push its
configuration to the physical servers, for more details refer to the section Handling
the Status Locked Synchronization.
The column Multi-status provides you with emergency, warning, critical, error or informational
messages regarding the server compatibility with Hybrid. For more details, refer to the section
Understanding the Column Multi-Status.
505
Managing DNS Servers
• Edit the SNMP monitoring parameters or properties of EfficientIP servers. For more details,
refer to the sections Editing the SNMP Monitoring Parameters of an EfficientIP DNS Server
and Editing DNS Servers.
• Configure EfficientIP DNS servers with a reverse proxy server, if they are running in a container
whose HTTP or HTTPS port is only accessible through a reverse proxy. For more details, refer
to the section Configuring a Reverse Proxy for an EfficientIP DNS Server.
• Delete EfficientIP servers. For more details, refer to the section Deleting DNS Servers.
• Configure EfficientIP servers. For more details, refer to the chapter Configuring DNS Servers.
Before managing a new server, make sure that the DNS service is properly started. For
more details, refer to the chapter Configuring the Services.
Note that EfficientIP DNS servers can assume any role within a smart architecture:
Table 39.4. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
506
Managing DNS Servers
Table 39.5. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
507
Managing DNS Servers
9. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
10. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The report opens and closes. The server is listed.
The server might appear Busy in the column Status. It changes to OK after a while.
During the first DNS server addition, the allow-transfer option is by default configured
with the ACL any. As it is inherited by the server views and zones, you might need to restrict
the statement. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
Once added, you can edit your server to secure its data exchanges with SOLIDserver. For more
details, refer to the section Securing the Management of DNS Servers Using a TSIG Key.
Table 39.6. SNMP monitoring parameters available when you edit a server
Field Description
SNMP version The version of the SNMP protocol used to retrieve the statistics. It can be either v1, v2c
or v3. By default, v2c is selected. This field is required.
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1s, 2s, 3s, 4s, 5s, 10s
or 30s. By default, it is set to 5s. This field is required.
Use bulk For SNMP version v2c or v3. Allows to send several requests at once, it uses a bulk
transfer of data. This compact SNMP request method accelerates transfers. By default,
it is set to Yes. This field is required.
508
Managing DNS Servers
Field Description
Use TCP The network communication protocol, either TCP (Yes) or UDP (No). By default, No is
selected. You should use TCP instead of UDP if the network link is unreliable. This field
is required.
SNMP transfer The number of minutes above which the SNMP transfer is aborted when you add or refresh
timeout (minutes) a device, a value between 0 and 999. By default, it is set to 0. This field is optional.
Note that you cannot edit an existing server to configure it with a reverse proxy server.
To enable the registry key that allows to configure a reverse proxy server
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with module.system.enable_reverse_proxy_config.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, type in 1 to enable it. By default, its value is 0.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
Once you enabled the registry key, you can add an EfficientIP or EfficientIP package server and
configure it with a reverse proxy server.
509
Managing DNS Servers
3. If custom classes are enabled at server level, in the list DNS server class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. In the field Name, specify a DNS resolvable fully qualified domain name (FQDN) for your
server.
5. In the field Management IP address, specify the IPv4 address of the server you want to
manage.
If you already configured a resolver for the appliance, you can specify a name and click on
SEARCH , the matching IP address is retrieved from the DNS and displayed. For more details,
refer to the section Setting the DNS Resolver.
6. In the field Management URL, specify the URL of the reverse proxy server that forwards
client queries to the DNS server via HTTP or HTTPS.
7. If you want to secure the management of your server, you can associate it with a TSIG key.
a. Tick the box Configure TSIG parameters. The drop-down list TSIG key name appears.
b. In the drop-down list TSIG key name, select an existing key. Note that this key must
also be used in the statements allow-update and allow-transfer at view and/or zone level
to secure all exchanges. For more details, refer to the section Securing the Management
of DNS Servers Using a TSIG Key.
8. If you have changed the default SSH password of the appliance embedding the DNS server,
you must update the enrollment parameters.
a. Tick the box Configure enrollment parameters. The field "Admin" account password
appears, it contains the default admin account password.
b. Empty the field "Admin" account password and specify your SSH password.
9. If you want to edit the server SNMP parameters, tick the box Configure SNMP monitoring
parameters.
A set of fields appear, configure them to monitor and retrieve the server statistics.
Table 39.7. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
10. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
510
Managing DNS Servers
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
11. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on OK to complete the operation. The report opens and closes. The server is listed.
The server might appear Busy in the column Status. It changes to OK after a while.
During the first DNS server addition, the allow-transfer option is by default configured
with the ACL any. As it is inherited by the server views and zones, you might need to restrict
the statement. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
You can reproduce the Microsoft Windows Multi-Master behavior with the smart architecture
Multi-Master. This architecture supports Microsoft DNS server, SOLIDserver DNS and BIND
server. For more details, refer to the section Adding a Multi-Master Smart Architecture.
Note that Microsoft Windows DNS servers can assume any role within a smart architecture:
Table 39.8. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
Once you manage a server, you can also manage its parameters, zones and records.
The management of Microsoft DNS servers is based on Microsoft Remote Procedure Calls (MS
RPC) and allows to retrieve and display data is real-time and avoid installing any WinDHCP
agent. Microsoft DNS servers with agent are not supported.
Prerequisites
• A Microsoft Windows Server 2008, 2008 R2, 2012 R2, 2016 or 2019. The server must:
• Have the TCP ports 135 and 445 open. They are used by the port mapper interface, the
services that indicates to the clients which port provides access to each service.
• Have Firewall policies that allow traffic between SOLIDserver and the Microsoft servers it
manages.
511
Managing DNS Servers
• In Windows Server, RPC uses by default the dynamic port range 49152-65535. Note that
you can reduce the number of available ports, as long as you respect the minimum number
1
of ports required in the range, which is 255, via the netsh tool .
• The credentials of a member of the groups DnsAdmins and Domain Admins. Users with insuf-
ficient privileges cannot manage the server.
• The service DNS is properly started. For more details, refer to the chapter Configuring the
Services.
• The zones of the Microsoft Windows server must allow the server management IP address in
their statement allow-transfer.
Limitations
The management of Microsoft Windows DNS servers within SOLIDserver has some limitations.
For more details regarding the Microsoft limitations, refer to their documentation.
Server Limitations
• You must refresh manually the DNS server parameters, the list of zones and their paramet-
ers. However, the content of the zones is still refreshed automatically every 3600 seconds
(by default).
• The AD configuration of the AD integrated DNS servers often includes security settings
that prevent the addition or edition of the DNS zones.
• If the parameter Forward is set to != none at server level but a list of forwarders is provided
anyway, the forwarders are pushed onto the Microsoft DNS server.
ACL Limitations
• Microsoft processes as follows the ACL allow-update:
Zone Limitations
• The zones e164.arpa and ip6.int (deprecated reverse mapping name space) are not sup-
ported by Microsoft.
1
For information, refer to http://support.microsoft.com/kb/929851 .
512
Managing DNS Servers
• You cannot add forward zones with the forwarding parameter set to None on Microsoft
servers.
• If nothing is specified during the Notify configuration then by default, the notify is set to NS
only.
• You cannot edit the AD replication behavior set on the zones of an AD integrated Microsoft
server. Once set, you cannot edit or remove the replication behavior selected, you must
delete the zone and add it again with the configuration that suits your needs.
Resource Record Limitations
• Microsoft servers only support the records A, AAAA, CNAME, MX, NS, PTR, SOA, SRV
and TXT.
If your Microsoft DNS server is integrated to an AD with several forests, you can use the Expert
mode during the server addition to specify AD domain you want to authenticate.
In addition, you can manage AD integrated zones. For more details, refer to the section Managing
DNS Zones.
513
Managing DNS Servers
10. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The report opens and closes. The server is listed,
the column Version indicates the Microsoft server version.
To successfully install the DNS packages on Linux, you must follow the prerequisites and proced-
ures in the section that matches your environment:
• Installing an EfficientIP DNS Package on Debian 8 or Higher.
• Installing an EfficientIP DNS Package on RedHat 6 or Higher.
Once your package is installed you can add an EfficientIP Package in the GUI as detailed in the
section Adding BIND DNS Servers.
If you need to upgrade your package, refer to the section Upgrading EfficientIP DNS Packages.
Prerequisites
• The DNS package file, ipmdns-y.y.y-debianxx-amd64.deb, whose name provides you with a
number of information separated by hyphens: the type of package (ipmdns, so a DNS package),
the version of SOLIDserver (y.y.y); the version of Debian (debianxx where xx is x dot x) and
finally the Debian architecture (amd64).
In the procedure below, this file is referred to as <ipmdns-y.y.y-debianxx-amd64.deb>.
• The EfficientIP BIND package platform must have at least 20 Mb of free disk space.
• The EfficientIP BIND package may need certain libraries of your operating system, you must
2
have a shell access with root login in local, via ssh on the server to be installed.
• You must make sure that no other DNS/DHCP service on your Linux is running : it would inter-
fere with the BIND/ISC package installation.
• You must make sure that SOLIDserver and Debian are set to the same time and date.
• You must make sure that Apache server is up-to-date.
• You must make sure that the service dbus is installed.
• You must make sure that HTTPS (port 443) and the DNS service (port 53) are not blocked by
a network filtering process (firewall).
If your Apache configuration already uses the port 443, you have to create an additional IP-
based VirtualHost dedicated to the DNS/DHCP management.
2
You could also connect via telnet but, for security purposes, we recommend that you favor ssh.
514
Managing DNS Servers
If you have not installed the DHCP packages yet, you need to:
1. Follow the procedure To install an EfficientIP DNS Package on Debian.
2. Follow the procedure To complete the DNS package installation on Debian if the DHCP
package is not installed.
If you already installed the DHCP packages, you only need to follow the procedure To install
an EfficientIP DNS Package on Debian below.
The procedure below includes the commands that make the web services configurable.
3. Install the dependency packages, ONLY if you have not installed the EfficientIP DHCP
package, using the following commands:
# apt-get install php
# apt-get install sudo
# apt-get install snmpd
# apt-get install libuv1
5. Make the web services configurable: in the directory /etc/sudoers.d, create the file ipmdns
containing the line below.
www-data ALL = NOPASSWD: /usr/local/nessy2/script/install_named_conf.sh, \
/usr/local/nessy2/script/push_default_zone_params.sh, \
/usr/local/nessy2/script/push_dnssec_keys_zones.sh, \
/usr/local/nessy2/script/move_dnszone_file.sh, \
/usr/local/nessy2/script/restore_named_conf.sh, \
/usr/local/nessy2/script/delete_zone_file.sh, \
/usr/local/nessy2/script/restore_zone_file.sh, \
/usr/local/nessy2/script/install_keytab.sh, \
/usr/local/nessy2/bin/rndc
Note that you can change the password admin of the web service using the following com-
mand:
# htpasswd -c /usr/local/nessy2/www/php/cmd/dns/.htpasswd admin
If you have not installed the DHCP package or are not planning on installing it, you must
now follow the procedure below.
515
Managing DNS Servers
To complete the DNS package installation on Debian if the DHCP package is not
installed
1. If relevant, open an SSH session.
2. Allow SNMP access to the DNS statistics by appending the file /etc/snmp/snmpd.conf with
the following line:
view systemview included .1.3.6.1.4.1.2440
6. Make sure that a symbolic link to the default VirtualHost SSL configuration file is located in
the folder sites-enabled/ . If not, use the following command:
# a2ensite default-ssl
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/apache2/server.crt
SSLCertificateKeyFile /etc/apache2/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
516
Managing DNS Servers
</VirtualHost>
8. Disable the default site in Debian Apache configuration using the following command:
# a2dissite 000-default
10. Make sure that the ipmdns package is running using the following command:
# service ipmdns status
Once the configuration is complete, you can add an EfficientIP Package DNS server to manage
your BIND server from SOLIDserver GUI. For more details, refer to the procedure in the section
Adding BIND DNS Servers.
Prerequisites
• The DNS package file, ipmdns-y.y.y-redhatx.x86_64.rpm, whose name provides you with a
number of information separated by hyphens or a point: the type of package (ipmdns, so a
DNS package), the version of SOLIDserver (y.y.y); the version of RedHat (redhatx) and finally
the RedHat architecture (x86_64).
In the procedure below, this file is referred to as <ipmdns-y.y.y-redhatx.x86_64.rpm>.
• The EfficientIP BIND package platform must have at least 20 Mb of free disk space.
• The EfficientIP BIND package may need certain libraries of your operating system, you must
3
have a shell access with root login in local, via ssh on the server to be installed.
• You must make sure that no other DNS/DHCP service on your Linux is running : it would inter-
fere with the BIND/ISC package installation.
• You must make sure that SOLIDserver and RedHat/CentOS are set to the same time and date.
• You must make sure that Apache server is up-to-date.
• You must make sure that HTTPS (port 443) and the DNS service (port 53) are not blocked by
a network filtering process (firewall).
If your Apache configuration already uses the port 443, you have to create an additional IP-
based VirtualHost dedicated to the DNS/DHCP management.
3
You could also connect via telnet but, for security purposes, we recommend that you favor ssh.
517
Managing DNS Servers
If you have not installed the DHCP packages yet, you need to:
1. Follow the procedure To install an EfficientIP DNS Package on RedHat.
2. Follow the procedure To complete the DNS package installation on RedHat if the DHCP
package is not installed.
If you already installed the DHCP packages, you only need to follow the procedure To install
an EfficientIP DNS Package on RedHat below.
The installation procedure below also includes the commands that make the web services con-
figurable.
6. Make the web services configurable: in the directory /etc/sudoers.d, create the file ipmdns
containing the line below.
apache ALL = NOPASSWD: /usr/local/nessy2/script/install_named_conf.sh, \
/usr/local/nessy2/script/push_default_zone_params.sh, \
/usr/local/nessy2/script/push_dnssec_keys_zones.sh, \
/usr/local/nessy2/script/move_dnszone_file.sh, \
/usr/local/nessy2/script/restore_named_conf.sh, \
/usr/local/nessy2/script/delete_zone_file.sh, \
/usr/local/nessy2/script/restore_zone_file.sh, \
/usr/local/nessy2/script/install_keytab.sh, \
/usr/local/nessy2/bin/rndc
Note that you can change the password admin of the web service using the command below:
# htpasswd -c /usr/local/nessy2/www/php/cmd/dns/.htpasswd admin
If you have not installed the DHCP package or are not planning on installing it, you must
now follow the procedure below.
518
Managing DNS Servers
To complete the DNS package installation on RedHat if the DHCP package is not
installed
1. If relevant, open an SSH session.
2. Disable the firewall using the following commands.
a. For RedHat 6:
# service iptables stop
# chkconfig iptables off
Note that changing the selinux policy requires you to restart the system.
4. Reboot the system to take into account the selinux policy changes :
# reboot
6. Allow SNMP access to the DNS statistics. In the file /etc/snmp/snmpd.conf , in the section
entitled Access Control, enter the lines:
master agentx
view systemview included .1.3.6.1.4.1.2440
#You may need to specify another view, AllView or a custom one,
#if you edited the default SNMP configuration.
9. Configure the web services. In the file /etc/httpd/conf.d/ssl.conf, replace the FULL section
<VirtualHost *:443> with the configuration below.
a. For RedHat 6:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
AllowOverride All
</Directory>
519
Managing DNS Servers
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
</VirtualHost>
b. For RedHat 7:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
</VirtualHost>
520
Managing DNS Servers
c. For RedHat 8:
<VirtualHost *:443>
ServerName 127.0.0.1
DocumentRoot /usr/local/nessy2/www/php
<Directory /usr/local/nessy2/www/php>
Require all granted
AllowOverride Authconfig
Options Indexes FollowSymLinks
</Directory>
SSLEngine on
SSLCertificateFile /etc/httpd/server.crt
SSLCertificateKeyFile /etc/httpd/server.key
SSLProtocol all -SSLv2
SSLCipherSuite HIGH:MEDIUM
11. Make sure that the ipmdns package is running using the following command:
# service ipmdns status
Once the configuration is complete, you can add an EfficientIP Package DNS server to manage
your BIND server from SOLIDserver GUI. For more details, refer to the procedure in the section
Adding BIND DNS Servers.
Note that:
• Before managing a new server, make sure that the DNS service is properly started. For more
details, refer to the chapter Configuring the Services.
• EfficientIP package servers can assume any role within a smart architecture:
Table 39.11. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
521
Managing DNS Servers
Table 39.12. SNMP monitoring parameters available when you add a server
Field Description
SNMP port The port used to retrieve the server statistics. By default, the port 161 is used. If you
changed the UDP port of your SNMP server, you must use the same port. This field is
required. For more details, refer to the section Configuring the SNMP Server.
Use TCP The network communication protocol, either TCP (ticked) or UDP (unticked). By default,
the box is unticked. You should tick the box to use TCP instead of UDP if the network
link is unreliable. This field is optional.
SNMP profile The SNMP profile used to retrieve the statistics. By default, standard v2c is selected.
This field is optional. The list contains the default profiles (standard v1, standard v2c and
522
Managing DNS Servers
Field Description
standard v3) and the ones you may have added. Each profile has its own level of security
and enables the definition of a global security policy. For more details, refer to the section
Managing SNMP Profiles.
SNMP retries The number of connection attempts when the server is in timeout, a value between 0 and
5. By default, it is set to 2. This field is required.
SNMP timeout The number of seconds between each connection attempt, either 1, 2, 3, 4, 5, 10 or 30.
By default, it is set to 5. This field is required.
9. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
10. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The report opens and closes. The server appears in
the list with status Busy. It changes to OK after a while.
During the first DNS server addition, the allow-transfer option is by default configured
with the ACL any. As it is inherited by the server views and zones, you might need to restrict
the statement. For more details, refer to the chapter Limiting Zone Transfers at Server Level.
Once the EfficientIP Package server is added, you can manage your BIND server installed on
Linux from the GUI.
Note that:
• Unlike all other DNS servers, the management of generic servers is more limited. However,
following RFC 2136, they support dynamic update (DDNS).
• Generic servers retrieve data via zone transfer. Therefore, the remote server you manage as
a Generic server must allow zone transfer or you must configure TSIG parameters to secure
the exchanges between the server and the appliance.
523
Managing DNS Servers
• Before managing a new server, make sure that the DNS service is properly started. For more
details, refer to the chapter Configuring the Services.
• Generic DNS servers can only assume a limited number of roles within the architecture:
Table 39.13. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
524
Managing DNS Servers
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
8. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
9. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
10. Click on OK to complete the operation. The server is listed in the page All servers.
Once added, you can edit your server to secure its data exchanges with SOLIDserver. For more
details, refer to the section Securing the Management of DNS Servers Using a TSIG Key.
525
Managing DNS Servers
Field Description
Retry The retry interval if the server fails to reach the master during a refresh cycle.
Expire The period after which the records are considered to be no longer valid/authoritative and
the server stops responding to queries for the zone.
Minimum The negative caching period of the zone, in seconds. This period is used as TTL for every
NXDOMAIN returned to clients querying unexisting records.
TTL The TTL (Time to Live) of the SOA, its duration, in seconds. The drop-down list next to
the input field allows to select durations in human-readable format.
You can set the value by default for the parameters above, except for the Primary server
and Serial number. For more details, refer to the procedure To configure the default SOA
parameters of Master zones below.
12. Click on OK to complete the operation. The report opens and closes. The report opens and
closes. The zone is listed and marked Delayed create before being marked OK.
From the page All servers, you can add your Amazon Route 53 server using your AWS account
credentials. Once listed in the GUI, you can add, edit and/or delete the server zones and resource
records.
Note that Amazon Route 53 servers can be managed from a smart architecture. For more details,
refer to the section Managing an Amazon Route 53 Server With a Smart Architecture.
Prerequisites
• You must make sure that the DNS service is properly started before adding a new server. For
more details, refer to the chapter Configuring the Services.
• You must have an AWS account with a subscription to the service Amazon Route 53.
• You must have an Amazon IAM Account with sufficient permissions to manage the service
Amazon Route 53. For security reasons, we recommend granting access only to this service.
These permissions can be assigned using the predefined IAM policy AmazonRoute53FullAccess
or a custom one. For more details on which minimal permissions to grant, refer to the appendix
Custom AWS IAM Policy Route 53 Minimal Permissions.
• You must have the ID of an existing reusable delegation set ready, if you want to configure
this delegation set on a Private server and apply it to all its zones.
• You must configure NTP synchronization to ensure that SOLIDserver and AWS are time syn-
chronized. For more details, refer to the section Configuring the Time and Date.
Besides, we recommend displaying the time using UTC. For more details, refer to the procedure
To configure the user settings.
• You must make sure SOLIDserver is able to reach the endpoint of the service Amazon Route
53 using HTTPs. If the service is unreachable, the Amazon Route 53 server stays in Timeout.
For more details, go to https://docs.aws.amazon.com/general/latest/gr/r53.html.
Limitations
• SOLIDserver only supports unique zone names within one server.
If your Amazon Route 53 server contains several zones named the same way, none of them
can be managed from the GUI.
526
Managing DNS Servers
527
Managing DNS Servers
Keep in mind that several Private servers can manage the same domain only if each server is
configured with different VPCs.
For each AWS account, you can manage as many Private servers as you want, as long as
they have a unique list of VPCs.
Table 39.16. Public VPC configuration fields for Amazon Route 53 servers
Field Description
Filter An IPv4 address, IPv6 address, VPC name or region to filter the list of Available
VPCs. This field is optional.
Available VPCs The list of VPCs of the specified Access Key ID and Secret Access Key. They
are displayed as follows: <VPC name> - <Region>.
Right of the list, you can click on to query your AWS environment and refresh
the list.
Select one by one all the VPCs of your choice and click on to move them to
the list Selected VPCs.
Selected VPCs The list of all the VPCs of the server. It cannot exceed 300 VPCs. This field is
required.
To remove a VPC from the list, select it and click on to move it back to the list
Available VPCs.
Keep in mind that if you already manage the private zones of the server on AWS,
you must select the exact same list of VPCs to be able to synchronize them in
the GUI.
9. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
528
Managing DNS Servers
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
10. In the field Description, you can specify a description, it is displayed in the column Description
of the page All servers.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The server is listed on the page All servers.
529
Managing DNS Servers
Table 39.17. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
• If your smart architecture manages physical servers from several vendors, you may get warning
messages when you add views, zones or records. Some vendors do not support views, RPZ
zones and specific DNS zone and record types. You can force the configuration to add them
to the server(s) that do support them.
To display all the potential incompatibilities of your architecture in the column Multi-Status, you
can generate the report Smart architecture incompatibilities. For more details, refer to the
section DNS Server Reports in the chapter Monitoring.
• You can add it to a new smart architecture or to an existing one, as detailed in the sections
Adding an Amazon Route 53 Server When Adding a Smart Architecture and Adding an Amazon
Route 53 Server in an Existing Smart Architecture.
530
Managing DNS Servers
To remove an Amazon Route 53 server from a smart architecture, you must first delete the
resource records it contains. To delete a resource record, refer to the section Deleting Resource
Records of the chapter Managing DNS Resource Records.
This allows to automate the synchronization of the Amazon Route 53 server content. Therefore,
all your zones and records are retrieved by the smart and replicated to all the physical servers
you might manage as well with the new smart.
531
Managing DNS Servers
c. If you want to publish one or several name servers or load balancers or even force the
Hybrid compatibility of the smart architecture, tick the box Expert mode and complete
the configuration.
For more details, refer to the section Adding a Master/Slave Smart Architecture or Adding
a Multi-Master Smart Architecture in the chapter Managing DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the section Adding a Master/Slave Smart Ar-
chitecture or Adding a Multi-Master Smart Architecture in the chapter Managing DNS
Smart Architectures
e. Click on OK to complete the operation. The report opens and closes. The smart archi-
tecture is listed, if you do not see the servers it manages, click on on the right-end
side of the menu.
8. If you are adding a Stealth smart architecture:
a. In the drop-down list Available DNS servers, select an Amazon Route 53 server.
b. Click on + MASTER or + PSEUDO-MASTER to add it to the relevant list and manage it via the
smart architecture. Note that an Amazon Route 53 server cannot be slave or hidden-
master.
If you want to add other servers to the smart architecture, refer to the section Adding a
Stealth Smart Architecture in the chapter Managing DNS Smart Architectures.
c. If you want to publish one or several name servers or load balancers or even force the
Hybrid compatibility of the smart architecture, tick the box Expert mode and complete
the configuration.
For more details, refer to the section Adding a Stealth Smart Architecture in the chapter
Managing DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the section Adding a Stealth Smart Architecture
in the chapter Managing DNS Smart Architectures.
e. Click on OK to complete the operation. The report opens and closes. The smart archi-
tecture is listed, if you do not see the servers it manages, click on on the right-end
side of the menu.
9. If you are adding a Farm smart architecture:
a. In the drop-down list Available DNS servers, select an Amazon Route 53 server.
b. Click on + MASTER . The server is moved to the Master DNS server(s) list. To remove
a server from the list, click on . Note that an Amazon Route 53 server cannot be slave.
If you want to add other servers to the smart architecture, refer to the section Adding a
Farm Smart Architecture in the chapter Managing DNS Smart Architectures.
c. Click on NEXT . The page Advanced settings opens. Finish the configuration by publish-
ing one or several name servers or load balancers.
For more details, refer to the procedure in the section Adding a Farm Smart Architecture
in the chapter Managing DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the section Adding a Farm Smart Architecture
in the chapter Managing DNS Smart Architectures.
532
Managing DNS Servers
e. Click on OK to complete the operation. The report opens and closes. The smart archi-
tecture is listed, if you do not see the servers it manages, click on on the right-end
side of the menu.
On the page All servers and All zones, the column Multi-status indicates any incompatibilities
or replication problems.
You can check that the replication is properly performed on the page All RRs of the smart archi-
tecture. They should be all listed and OK.
For more details regarding the server content configuration, refer to the chapters Managing
Amazon Route 53 Zones and Managing Amazon Route 53 Records.
533
Managing DNS Servers
ure in the section Adding a DNS Smart Architecture in the chapter Managing DNS Smart
Architectures.
8. For a Master/Slave or Multi-Master smart architecture:
a. In the drop-down list Available DNS servers, select an Amazon Route 53 server.
b. Click on + MASTER to add it to the Master DNS server(s) list and manage it via the smart
architecture. Note that an Amazon Route 53 server cannot be slave.
If you want to add other servers to the smart architecture, refer to the section Adding a
Master/Slave Smart Architecture or Adding a Multi-Master Smart Architecture in the
chapter Managing DNS Smart Architectures.
c. If you want to publish one or several name servers or load balancers or even force the
Hybrid compatibility of the smart architecture, tick the box Expert mode and complete
the configuration as detailed in the section Adding a Single-Server Smart Architecture
in the chapter Managing DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the relevant smart architecture addition proced-
ure in the section Adding a DNS Smart Architecture in the chapter Managing DNS Smart
Architectures.
9. For a Stealth smart architecture:
a. In the drop-down list Available DNS servers, select an Amazon Route 53 server.
b. Click on + MASTER or + PSEUDO-MASTER to add it to the relevant list and manage it via the
smart architecture. Note that an Amazon Route 53 server cannot be slave or hidden-
Master.
If you want to add other servers to the smart architecture, refer to the section Adding a
Stealth Smart Architecture in the chapter Managing DNS Smart Architectures.
c. If you want to publish one or several name servers or load balancers or even force the
Hybrid compatibility of the smart architecture, tick the box Expert mode and complete
the configuration as detailed in the section Adding a Single-Server Smart Architecture
in the chapter Managing DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the relevant smart architecture addition proced-
ure in the section Adding a DNS Smart Architecture in the chapter Managing DNS Smart
Architectures.
10. For a Farm smart architecture:
a. In the drop-down list Available DNS servers, select an Amazon Route 53 server.
b. Click on + MASTER to add it to the Master DNS server(s) list and manage it via the smart
architecture. Note that an Amazon Route 53 server cannot be slave.
If you want to add other servers to the smart architecture, refer to the section Adding a
Farm Smart Architecture in the chapter Managing DNS Smart Architectures.
c. Click on NEXT . The page Advanced settings opens, finish the configuration following
the procedure in the section Adding a Farm Smart Architecture in the chapter Managing
DNS Smart Architectures.
d. Click on NEXT . The last page opens.
For more details regarding the fields Use DNS as DNSSEC resolver, Isolated, Descrip-
tion and Advanced properties, refer to the relevant smart architecture addition proced-
ure in the section Adding a DNS Smart Architecture in the chapter Managing DNS Smart
Architectures.
534
Managing DNS Servers
11. Click on OK to complete the operation. The report opens and closes. The synchronization,
sends the physical servers information to your AWS account server. You can display or hide
physical servers managed by the smart architecture using the button on the right-end
side of the menu.
On the page All servers and All zones, the column Multi-status indicates any incompatibilities
or replication problems.
You can check that the replication is properly performed on the page All RRs of the smart archi-
tecture. They should be all listed and OK.
For more details regarding the server content configuration, refer to the chapters Managing
Amazon Route 53 Zones and Managing Amazon Route 53 Records.
If the smart architectures manages other servers, now that it no longer manages the Amazon
Route 53 server, you must delete all AWS NS records.
535
Managing DNS Servers
Before managing Route 53 zones, you must take into account the prerequisites, specificities and
limitations.
For more details on how to add, edit and delete zones on Amazon Route 53 servers, refer to the
chapter Managing DNS Zones.
Prerequisites
• To manage existing Private zones from the GUI, the parent Amazon Route 53 server must be
configured with the exact same VPCs list as the zones in AWS.
• The zone name must be unique. If several zones of the Amazon Route 53 server share the
same name on your AWS account, you cannot manage any of them.
• The zone name must be FQDN and include a TLD.
• SOLIDserver and AWS must be time synchronized, ideally using NTP. Otherwise, any change
made from the GUI cannot be pushed to your AWS account server.
Specificities
• You can only add or import Master zones. For more details, refer to the sections Adding a
Master Zone in the chapter Managing DNS Zones or Importing Zones in the chapter Importing
Data from a CSV File.
• All the zones of a Private server are associated with the VPCs configured on the server.
• Your zone contains by default an SOA specific to Amazon Route 53 and four awsdns NS re-
cords.
• On the zones properties page, the Name servers panel lists all the NS records of the zone.
• Adding, editing or deleting zones automatically refreshes the server and replicates your changes
to the AWS account server.
• The report Zones NS and IP addresses allows to retrieve the IP address of each of your NS
records. For more details, refer to the section DNS Zone Reports.
Limitations
• If your AWS zones contain records configured with the options Heatlh Check and Routing
Policy, they cannot be synchronized. These options are not supported by SOLIDserver. You
536
Managing DNS Servers
must remove these options directly via your AWS account to then be able to synchronize and
manage the zone via the GUI.
• On Public Amazon Route 53 servers, once a delegation set is configured:
• The server can either host a domain in a zone, or subdomains in separate zones. It cannot
manage both a domain and any of its subdomains.
• The server cannot host more than 100 zones.
• On Private Amazon Route 53 servers:
• Several Private servers can manage the same domain only if they are configured with different
VPCs.
• Each zone cannot be associated with more than 300 VPCs.
Before managing Route 53 records, you must take into account the prerequisites, specificities
and limitations.
For more details on how to add, edit and delete records on Amazon Route 53 servers, refer to
the chapter Managing DNS Resource Records.
Prerequisites
• SOLIDserver and AWS must be time synchronized, ideally using NTP. Otherwise, any change
made from the GUI cannot be pushed to your AWS account server.
Specificities
• Each zone contains by default four NS records with the value awsdns, specific to Amazon
Route 53 servers.
• Each zone contains by default an SOA record named after one of the NS records. For that
reason, even if the server is managed by a smart architecture, the SOA name is not overwritten
by the name of the smart architecture server.
• TXT records containing characters considered invalid by AWS are listed in the GUI but are
never synchronized.
Limitations
• Amazon Route 53 servers only support the following records: NS, MX, A, AAAA, PTR, CNAME,
TXT and SRV.
• If your server is managed via a smart architecture, you can add other types of records, but
their status is N/A and they are not taken into account, or replicated, by your Amazon Route
53 server.
• AWS records configured with the options Heatlh Check and Routing Policy are not supported.
If a zone contains them, it cannot be synchronized.
• The AWS zones resolution relies on the awsdns NS records, so you cannot delete them from
a zone, an AWS server or a smart architecture managing an AWS server.
However, if you stop managing an Amazon Route 53 server via a smart architecture, you can
remove the awsdns records from the page All RRs of the smart architecture as they are no
longer relevant.
537
Managing DNS Servers
From the page All servers, you can add your Azure DNS server using your Microsoft Azure account
credentials. Once listed in the GUI, you can add, edit and/or delete the server zones and resource
records.
Note that:
• Azure DNS servers can be managed from a smart architecture, but they can only assume a
limited number of roles within the architecture:
Table 39.18. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
• The column Multi-status returns any incompatibility or limitation in the server configuration.
Prerequisites
• You must make sure that the DNS service is properly started before adding a new server. For
more details, refer to the chapter Configuring the Services.
• You must have an Azure Subscription. Keep your subscription ID ready to add Azure servers.
• You must have an Azure Application with sufficient permissions to manage Azure DNS Zones
and Private DNS Zones. Keep your tenant ID, application (Client) ID and secret key ready to
add Azure servers.
These permissions can be assigned using the predefined IAM roles DNS Zone Contributor
and Private DNS Zone Contributor, assigned to the application on the subscriptions and/or
resource groups you intend to manage.
• You must configure NTP synchronization to ensure that SOLIDserver and Microsoft Azure are
time synchronized. For more details, refer to the section Configuring the Time and Date.
Besides, we recommend displaying the time using UTC. For more details, refer to the procedure
To configure the user settings.
• You must make sure SOLIDserver is able to reach the endpoint of the services Microsoft Azure
using HTTPs. If the services are unreachable, the Azure server stays in Timeout.
Limitations
• Azure DNS servers do not support DNS views.
• Azure records management is limited, only a set of records are supported. For more details,
refer to the section Managing Azure Records.
538
Managing DNS Servers
Table 39.19. Public virtual network configuration fields for Azure servers
Field Description
Filter An IPv4 address, IPv6 address, resource group name, virtual network name or
location to filter the list of Available virtual networks. This field is optional.
Available virtual The list of virtual networks (VN) of the specified subscription ID.They are displayed
networks as follows: <resource-group>/<VN-name> - <Region>.
Right of the list, you can click on to query your Azure tenant and refresh the
list.
Select one by one all the VNs of your choice and click on to move them to the
list Selected virtual networks.
539
Managing DNS Servers
Field Description
Keep in mind that it is recommended to configure the server with all the virtual
networks associated with your existing zones in Azure.
Selected virtual The list of all the VNs of the server. It cannot exceed 1000 VNs. This field is re-
networks quired.
To remove a VN from the list, select it and click on to move it back to the list
Available virtual networks.
12. Tick the box Isolated if you want to isolate the server within SOLIDserver. This prevents the
server, and its content, from executing any configured replication rule or advanced property.
The server still receives data if your network configuration allows it.
This option is mainly useful during migrations. When the server configuration is ready and
you untick the box, you must manually execute the rules and/or advanced properties, at all
relevant levels of the module hierarchy, via the menu Tools > Initialize rules.
13. In the field Description, you can specify a description, it it displayed in the column Description
of the page All servers.
14. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
15. Click on OK to complete the operation. The server is listed on the page All servers.
540
Managing DNS Servers
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the key is listed.
Before managing Azure zones, you must take into account the prerequisites, specificities and
limitations.
For more details on how to add, edit and delete zones on Azure servers, refer to the chapter
Managing DNS Zones.
Prerequisites
• The zone name must include a TLD.
• SOLIDserver and Microsoft Azure must be time synchronized, ideally using NTP. Otherwise,
any change made from the GUI cannot be pushed to your Microsoft Azure account server.
Specificities
• You can only add or import Master name and Master reverse zones. For more details, refer to
the section Adding a Master Zone in the chapter Managing DNS Zones or Importing Zones in
the chapter Importing Data from a CSV File.
• All the zones of a Private server are associated with the virtual networks configured on the
server.
• If you manage existing Private zones from the GUI, it is recommended to configure the parent
server with all the virtual networks already associated with any of your zones in Azure.
• Adding, editing or deleting zones automatically refreshes the server and replicates your changes
to the Microsoft Azure account server.
• The report Zones NS and IP addresses allows you to retrieve the IP address of each of your
NS records. For more details, refer to the section DNS Zone Reports.
Limitations
• Azure Public servers only support 250 zones per subscription.
• Azure Private servers only support 1000 private zones per subscription.
• Azure Private zones cannot be associated with more than 1000 VNs.
• Azure DNS servers do not support RPZ zones.
• Zones cannot be named test.zone.
Before managing Azure records, you must take into account the prerequisites, specificities and
limitations.
For more details on how to add, edit and delete records on Azure servers, refer to the chapter
Managing DNS Resource Records.
541
Managing DNS Servers
Prerequisites
• SOLIDserver and Microsoft Azure must be time synchronized, ideally using NTP. Otherwise,
any change made from the GUI cannot be pushed to your Microsoft Azure account server.
Specificities
• Each zone contains by default an SOA record named after one of the NS records. For that
reason, even if the server is managed by a smart architecture, the SOA name is not overwritten
by the name of the smart architecture server.
Limitations
• Azure Public servers only support:
• A, AAAA, CNAME, MX, NS, PTR, SRV, TXT, CAA and SOA records. For TXT records, only
ASCII is supported.
• 10 000 RRsets per public zone.
• 20 RRs per RRset in public zones.
• Azure Private servers only support:
• A, AAAA, CNAME, MX, PTR, SRV, TXT, CAA and SOA records. For TXT records, only
ASCII is supported.
• 25 000 RRsets per private zone.
• If your server is managed from a smart architecture, you can add other types of records, but
their status is N/A and they are not taken into account, or replicated, by your Azure DNS
server.
Amazon Route 53 servers must be synchronized if they were edited directly from the AWS account.
Some data, like the panel Sources of physical servers, is only visible once the server has been
successfully synchronized at least once.
542
Managing DNS Servers
For more advanced configurations like forwarding, recursion, transfer, blackhole, sortlist..., refer
to the chapter Configuring DNS Servers.
543
Managing DNS Servers
to secure all exchanges. For more details, refer to the section Securing the Management
of DNS Servers Using a TSIG Key.
b. If you have changed the default SSH password of the appliance embedding the DNS
server or if you want to switch to the new management system, tick the box Configure
enrollment parameters. The field "Admin" account password appears.
In the field "Admin" account password, replace the value displayed with the relevant
SSH password.
c. Tick the box Configure SNMP monitoring parameters to edit the server SNMP para-
meters. A set of fields appear. To configure them, refer to the section Adding an Efficien-
tIP DNS Server.
d. Tick the box Use DNS as DNSSEC resolver, to enable DNSSEC resolution on the
server. For more details, refer to the chapter Managing DNSSEC on Recursive Servers.
6. Click on OK to complete the operation. The report opens and closes.
By default, EfficientIP physical servers managed via a smart architecture provide TSIG keys on
the properties page. You can use either key to secure the server. To add TSIG keys, refer to the
section Configuring DNS Keys.
Note that:
• The TSIG key used to secure the server must also be used in the statements allow-transfer
and allow-update. Setting these statements at server level allows for the server views and
zones to inherit the configuration.
By default, the statement allow-transfer is configured with the ACL any, and the statement allow-
update is configured with the ACL admin.
To include the relevant TSIG key in both statements you can include the key to the ACL admin.
In this case, you must edit the statement allow-transfer to replace the ACL any with the ACL
admin. The statement allow-update is automatically updated.
To avoid using ACLs, you can edit the statement allow-transfer to grant access to the TSIG
key instead of the ACL any. You also need to add it to the statement allow-update.
For more details, refer to the section Limiting Zone Transfers at Server Level.
• The TSIG key selected at server level can be used at zone level to set up dynamic update, if
you use the TSIG key in the statement allow-update. For more details, refer to the section
Configuring DNS Update Authorizations on a Zone.
If you manage your physical servers from a smart architecture, the TSIG keys of the smart archi-
tecture are pushed to the properties of each of the physical servers it manages. So keep in mind
that a TSIG key must be unique to each server, you cannot use the same for several servers.
544
Managing DNS Servers
3. Click on NEXT until you get to the last page of the wizard.
4. Tick the box Configure TSIG parameters if it is not already ticked.
5. In the drop-down list TSIG key name, select the key of your choice.
6. Click on OK to complete the operation. The report opens and closes.
4
The standardized protocol for key codes is HMAC-MD5.
545
Managing DNS Servers
Option Description
You can type in *.domain.com to delete all matching records.
5. The box Set Guardian entries as expired (do not flush) only applies to Guardian servers,
leave it unticked.
For more details, refer to the section Clearing Guardian Cache Manually in the chapter
Managing Guardian Cache.
6. Click on OK to complete the operation. The wizard closes.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Granting access to a server as a resource also makes every item it contains available. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
546
Chapter 40. Configuring DNS Servers
You can configure EfficientIP DNS servers and smart architectures with specific options from
their properties page. Note that:
• When a server is managed from a smart architecture, you cannot configure most of its options.
Instead, you must configure the smart architecture, all changes are applied to the server.
Only a few configurations can be set directly on a server managed from an architecture, to
override the architecture configuration.
• Any configuration set at server level is inherited by all the views and zones it contains.
• If you configure any of these options at view or zone level, the value set at server level
is overridden.
Setting a DNS server as a forwarder allows to prevent leaving DNS information exposed outside
of a network as your DNS servers do not need to send queries outside to their root hints. In ad-
dition, it allows to minimize the volume of external traffic which can be costly and inefficient for
a network with a slow Internet connection or a company with high Internet service costs.
If you specify a list of forwarders on a smart server, you can set the forwarding to:
• first: the DNS server queries the forwarders first, if none of the forwarders in the list are re-
sponsive, the server looks for the answer itself.
• only: the DNS only forward queries to the forwarders in order to avoid an answer seeking.
• none: the forwarding is disabled. This is the default value.
SOLIDserver always sends the query to the forwarder with the lowest round trip time (RTT) in
the list of forwarders configured. The RTT measures how long a remote name server takes to
respond to queries. Each time an EfficientIP DNS server sends a query to a forwarder it starts
an internal clock, and stops it when it receives a response. The RTT is stored to ensures that
queries are sent to the proper forwarder.
547
Configuring DNS Servers
7. Click on OK to complete the operation. The report opens and closes. The configuration is
displayed in the panel.
You can set a specific forwarding configuration for physical servers managed via a smart
architecture already configured with forward options. This new configuration is inherited by the
views, zones and records of the physical server. Keep in mind that:
• When a forward mode is set on a smart architecture, you cannot set the forward mode to None
on any physical server it manages. You can only set a different forward mode.
• Any configuration set at view or zone level overrides the server level configuration.
548
Configuring DNS Servers
a. In the field Add a forwarder, specify the address of a forwarder or its name and click
on SEARCH to retrieve its IP address.
b. Click on ADD to move it to the list Forwarders.
Repeat these actions for as many forwarders as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
9. Click on OK to complete the operation. The report opens and closes. The configuration is
displayed in the panel, the value of Forward is preceded by the message Smart configuration
is overwritten.
To revert the specific configuration and inherit it again, edit the Forwarding to untick the box
Overwrite the smart settings.
A recursive query requires the DNS server to return requested DNS data, or locate the data
through queries to remote DNS servers. When a DNS server receives a query for DNS data it
does not have, it first sends a query to any specified forwarders. If a forwarder does not respond
with any return, it resends the same query to the next configured forwarder until it receives an
answer. If it receives no answer or a negative answer, then it sends a non-recursive query to
specified internal root servers. If no internal root servers are configured, the DNS server sends
a non-recursive query to the Internet root servers.
By default, the DNS recursion is enabled. The DNS properties page displays the panel Recur-
sion that allows you can set different DNS recursion configurations.
Keep in mind that any configuration set at view or zone level overrides the server level
configuration.
549
Configuring DNS Servers
Keep in mind that any configuration set at view or zone level overrides the server level
configuration.
550
Configuring DNS Servers
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
5. Click on OK to complete the operation. The report opens and closes.
Once you set the recursion to yes, the recursive-client statement is enabled. To disable the re-
cursive-clients statement, you must disable the recursion.
The statement default value is 1000, meaning that 1000 simultaneous lookup requests can be
answered by the server. The minimum value is 1 and the maximum value is 4294967295.
551
Configuring DNS Servers
To edit the recursion configuration, refer to the section Limiting the Recursion at Server
Level.
8. Click on OK to complete the operation.
From the properties pages of a server, you can set the notification configuration in the panel
Notify. It contains:
• The current configuration of the server, the field Notify is either set to Yes, Explicit or No.
• The statement Also-notify, the IP address and port of the managing smart architecture(s) that
must be notified of any slave zones update.
By default, this statement is unset. Therefore, the smart architecture is informed of the changes
when it refreshes, every hour, and not instantly.
• The statement Allow-notify of the server slave zones. It can allow all the servers of a network
to notify your server slave zones or only some servers.
Note that this statement is implicitly set when you add a slave zone, when you set the Master
IP address of the slave zone you are allowing the master zones of this server to send notify
messages to your slave zone.
Keep in mind that any configuration set at view or zone level overrides the server level
configuration.
5. If you selected yes or explicit, you can set the IP address and port of the server(s) which
slave zones should receive the messages:
a. In the field IP address, specify the IP address of another server.
b. In the field Port, you can specify which port number, on the specified server, should
receive the notify messages.
c. Click on ADD . The IP address and port number are moved to the Also-notify list as
follows: <ip-address> port: <port-number>.
Repeat these actions for as many servers as needed.
552
Configuring DNS Servers
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
6. Click on NEXT . The page Allow-notify opens. It allows to specify if the server slave zones
can receive master zones notification messages.
Using the drop-down lists Type and Restriction, you can grant or deny access to as many
networks, IP addresses, ACLs and keys as you need. Select a Type and complete the con-
figuration as follows:
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on OK to complete the operation. The report opens and closes. The configuration is
displayed in the panel.
Allow query
You can specify which hosts are allowed to issue DNS queries. The allow-query properties can
be configured for an entire server including all the zones it contains. By default, queries are allowed
from the local host (localhost) and the local networks (localnets).
553
Configuring DNS Servers
Keep in mind that any configuration set at view or zone level overrides the server level
configuration.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down .
6. Click on NEXT twice to skip the pages Allow-query-cache and Allow transfer and open the
page Blackhole.
7. Click on OK to complete the operation. The report opens and closes.
554
Configuring DNS Servers
The match list defined controls recursive behavior as recursive queries would be useless without
access to the local cache. Typically, if a host is in the allow-recursion match list, it could access
the server the first time and get query result. However, if it is not part of the allow-query-cache
match list then it would not be able to make the same query a second time as it would be saved
on the cache to which it does not have access. On the contrary, if a host is in the allow-query-
cache match list but not in the allow-recursion match list, it would only get results for queries
already sent by another host with the proper access rights. Hence the need to configure carefully
both these statements to avoid conflicts and absurd access configurations.
Keep in mind that any configuration set at view level overrides the server level configuration.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
555
Configuring DNS Servers
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down .
7. Click on NEXT twice to skip the page Allow-transfer and open the page Blackhole.
8. Click on OK to complete the operation. The report opens and closes.
You can edit the statement allow-transfer of a server to specify which hosts, networks, or TSIG
keys are granted or denied the right to do transfers for all the zones it maintains.
556
Configuring DNS Servers
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down .
7. Click on NEXT . The page Blackhole opens.
8. Click on OK to complete the operation. The report opens and closes.
Configuring a Blackhole
By default, queries are allowed from the local host and the local networks. You can configure a
blackhole to identify specific IP addresses, networks, ACLs and keys you consider as spam.
The blackhole configuration is set at server level, it applies to the server, its views and its zones.
Once you configured a blackhole, the specified clients no longer receive any response. Their
queries remain unanswered, in other words they are ignored.
557
Configuring DNS Servers
Once a restriction is configured as needed, click on ADD . The entry is moved to the list ACL
values. All denied entries are preceded by an exclamation mark (!). Keep in mind that the
entries order matters, each restriction listed is reviewed following the order you set. To order
the entries, select them one by one and click on the arrows to move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down .
7. Click on OK to complete the operation. The report opens and closes.
These options can be set at server or view level. For more details regarding the configuration on
views, refer to the section Configuring Client Resolver Cache Options at View Level. Keep in
mind that any configuration set at view level overrides the server level configuration.
558
Configuring DNS Servers
If you configured DNSSEC on your server or are managing records that relay IPv6 information,
we strongly recommend configuring EDNS: in both cases, the messages sent out usually exceed
512 bytes.
Within SOLIDserver, two EDNS options can be configured at server and view level on EfficientIP
DNS servers using the SSL protocol:
edns-udp-size
This option sets the EDNS UDP buffer size advertised by the server when querying a remote
server. It is set in bytes and allows to specify the size of the packets that you receive.
Typically, you would set this option to enable UDP answers to pass through broken firewalls
that block fragmented packets and/or packets greater than 512 bytes. The value set for this
option is a preference.
max-udp-size
This option sets the maximum EDNS UDP message size sent by the server. It is set in bytes
and allows to specify the maximum size of the packets that you send to a remote server.
Typically, this option would be set to enable UDP answers to pass through broken firewalls
that block fragmented packets and/or packets greater than 512 bytes.
For more details regarding the configuration on views, refer to the section Configuring EDNS
Options at View Level. Keep in mind that any configuration set at view level overrides the
server level configuration.
559
Configuring DNS Servers
3. Open the panel Options using and click on EDIT . The wizard Options configuration
opens.
4. In the field Max-udp-size, specify the maximum size of the packets you send. This value is
in bytes and must be set between 512 and 4096. The default value is 4096.
5. Click on OK to complete the operation. The report opens and closes.
Note that:
• You can only configure prefetch on EfficientIP recursive servers, EfficientIP Package recursive
servers and the smart architectures that manage them.
• By default, prefetch is disabled.
• The parameters Prefetch "trigger" and Prefetch "eligibility" respectively allow to configure when
to prefetch entries, and define which entries are eligible.
Both parameters must have a value greater than 0, otherwise prefetch is disabled.
Enabling minimal-responses allows the server to only add records to the authority and additional
data sections of the response if they are specifically required by the protocol. For instance, these
sections are included in the delegations and negative responses.
560
Configuring DNS Servers
Within the GUI, the statement configuration is closely linked to the statement syntax in the zone
file. Here below is an example of the sortlist statement syntax in the zone file:
In a zone file, the statement would look as follows for the zone many.example.com :
// zone file example.com
$ORIGIN example.com.
many IN A 192.168.3.6
IN A 192.168.4.5
IN A 192.168.5.5
IN A 10.2.4.5
IN A 172.17.4.5
561
Configuring DNS Servers
};
As you can see after the client IP, the response preferences are defined one after the other and
separated by a semi-colon.
Keep in mind that any configuration set at view level overrides the server level configuration.
Amplification attacks are Distributed Denial of Service (DDoS) tactics in which an attacker uses
the IP address of any computer to send high volumes of forged queries using an authoritative
DNS server. The attacker queries are usually small-sized but designed to generate large re-
sponses, thus generating an amplified traffic toward the victim. Considering that the attacker
mimics the query format of the server, the client only sees a large number of responses and
cannot know if the response is real or malicious. This high volume of responses is likely to make
the victim's computer overload and eventually collapse.
In light of the increasing number of DDoS attacks on the Internet, in 2012 Paul Vixie and Vernon
Schryver proposed RRL as a method for preventing a caching server from being used in a DNS
Amplification attack. It allows to maintain the type of queries that have been made, that way the
server keeps track of the queries made and can limit the number of responses returned without
changing the nature of the DNS.
Limitations
• RRL cannot be set at view or zone level, it can only be configured for a whole server.
• RRL can only be configured on EfficientIP DNS servers, EfficientIP DNS Package servers,
smart architectures or Guardian servers configured with the parameter recursive set to 2.
562
Configuring DNS Servers
• If RRL settings are configured on a smart architecture managing servers that are not compatible
with RRL, for these servers the RRL configuration is ignored and the Multi-Status column
provides details regarding incompatibilities.
• RRL can be set on a BIND/NSD Hybrid server but the option Log only disables RRL on NSD
servers.
If you set it on a smart architecture that manages different types of servers, it only applies to the
relevant servers. The settings are ignored by all the servers that do not support it.
Configuring DNS64
SOLIDserver provides, for EfficientIP and BIND servers, a panel on the properties page dedicated
to configuring DNS Extensions for Network Address Translation from IPv6 Clients to IPv4 Servers,
or DNS64.
563
Configuring DNS Servers
This mechanism was described in RFC 6147 and allows to rely on a NAT64 server to synthesize
IPv6 addresses and enable communication between IPv6-only clients and IPv4-only DNS servers
and get a valid response to their queries. Which is why DNS64 mechanism is useless on its own.
SOLIDserver does not include a NAT64 server but provides a wizard to configure DNS64 with
the settings that you configured on your own NAT64 server.
Once NAT64 is configured, you can configure DNS64 on the server of your choice. All the fields
available in the GUI are optional, DNS64 can perform the synthesis using only the address and
prefix of the NAT64. It relies on your NAT64 server IPv6 address to IPv4 address translation
settings to synthesize AAAA records from A records. The synthesis is performed as follows:
1. DNS64 uses the NAT64 server address and prefix configuration as the start of the synthesized
IPv6 address.
2. The target IPv4 address is appended to the address and prefix in hexadecimal form.
3. The suffix is appended at the end of the synthesized IP address to get a 128 bit address to
send back to the client in the AAAA record.
When your DNS64 configuration is over, two reverse zones are automatically added. That way,
even the reverse queries of IPv6 clients can be synthesized and answered.
The mechanism is completely transparent: the client does not know that the queried server only
manages IPv4 related data as, after querying it, the client receives records that can be used in
an IPv6 environment.
Prerequisites
• You must have SOLIDserver in version 5.0.0 or greater.
• You must manage:
• An EfficientIP DNS server in version 5.0.0 or greater; or
• A BIND server in version 9.8 or higher (EfficientIP BIND package).
• You must manage your server through SSL.
• You must have a NAT64 server configured on your network.
• You must have the NAT64 server address and prefix ready when you start configuring. Note
that depending on your NAT64 server vendor, you might not be able to set the address and
prefix of your choice. In this case you must use the ones provided by the vendor during the
DNS64 configuration.
Limitations
• DNS64 can "break" DNSSEC. For more details, refer to the substatement break-dnssec.
• DNS64 cannot be configured on Hybrid DNS engines.
564
Configuring DNS Servers
565
Configuring DNS Servers
exclude
Allows you to set or use existing ACLs to exclude a list of IPv6 addresses. As DNS64 is
dedicated to synthesizing IPv6 addresses from IPv4 addresses, if any zone contains AAAA
records DNS64 ignores the zone. Therefore it ignores the A records it might contain. Setting
up the exclude substatement allows to ignore the AAAA records of a zone, your exclude
substatement ACL must contain all the IPv6 addresses declared in your AAAA records. That
way you can make sure that DNS64 synthesizes all the A records of the zone. The IPv6 ad-
dresses you declare must be part of or match the range of addresses declared for the NAT64
server (address and prefix).
Default value: none. If you only specify an address and prefix this value is automatically ap-
plied.
To disable it, you must open the wizard DNS64 configuration, empty all the fields and select None
in the drop-down lists.
566
Configuring DNS Servers
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
All the entries of the ACL values constitute your ACL.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
To order the entries, select them one by one and click on the arrows to move them up or
down .
8. Click on NEXT . The page DNS64 configuration: Mapped opens.
You can define an ACL that lists the IPv4 addresses that are ignored by DNS64. The ACL
configuration is detailed in the step 6 of this procedure. For more details regarding the sub-
statement, refer to the section DNS64 Supported Substatements.
9. Click on NEXT . The page DNS64 configuration: Exclude opens.
You can define an ACL that lists the IPv6 addresses that are ignored by DNS64. The ACL
configuration is detailed in the step 6 of this procedure. For more details regarding the sub-
statement, refer to the section DNS64 Supported Substatements.
10. Click on OK to complete the operation. The report opens and closes. The properties page
is available again, the panel DNS64 displays your configuration.
From the Sources and Sources V6 panels, through their IP address, you can configure physical
interfaces that should be used for the server transfer and notify options. These panels only appear
after the first synchronization of the physical server. When editing these panels, you can define
the following statements:
query-source
This statement allows to define the IPv4 address and/or port used as the source of the
server or view outgoing queries. By default, BIND uses any server or view interface IP address
and a random port for outgoing queries.
Using a fixed port number allows to control UDP operations but can be extremely dangerous:
it can lead to cache poisoning if used with any caching DNS server definition as any attacker
567
Configuring DNS Servers
would need to guess the transaction ID to get both the specified interface IP address and
port number. This statement is displayed on servers and views properties page.
query-source-v6
This statement allows to define the IPv6 address and/or port used as the source of the
server or view outgoing queries. By default, BIND uses any server or view interface IP address
and a random port for outgoing queries.
Using a fixed port number allows to control UDP operations but can be extremely dangerous:
it can lead to cache poisoning if used with any caching DNS server definition as any attacker
would need to guess the transaction ID to get both the specified interface IP address and
port number. This statement is displayed on servers and views properties page.
transfer-source
This statement allows to determine the IPv4 address of the physical interface used to execute
the zones transfer on the server. You can also specify a port for this statement. It is only
valid for slave zones and its configuration is therefore displayed on the physical server, views
and slave zones properties page.
transfer-source-v6
This statement allows to determine the IPv6 address of the physical interface used to execute
the zones transfer on the server. You can also specify a port for this statement. It is only
valid for slave zones and its configuration is therefore displayed on the physical server, views
and slave zones properties page.
use-alt-transfer-source
This statement allows to set the use of an alternate interface IP address for the transfer if
the transfer-source or the transfer-source-v6 were to fail. This statement configuration is
displayed on the physical server, view and slave zones properties page.
This statement definition is only configurable from the panel Sources but applies to interfaces
whether they were identified through an IPv4 or an IPv6 address.
Its default value is no if the server contains views and yes if the server does not contain any
view.
alt-transfer-source
This statement allows to determine the alternate IPv4 address of the interface used to execute
the zones transfer on the server if the transfer-source fails and if the use-alt-transfer-source
is enabled. You can also specify a port for this statement. Its configuration is displayed on
the physical server, views and slave zones properties page.
alt-transfer-source-v6
This statement allows to determine the alternate IPv6 address of the interface used to execute
the zones transfer on the server if the transfer-source-v6 failed and if the use-alt-transfer-
source is enabled.You can also specify a port for this statement. Its configuration is displayed
on the physical server, views and slave zones properties page.
notify-source
This statement allows to define the IPv4 address of the physical interface used for all the
server outgoing notify operations. You can also specify a port for this statement. It is used
by master zones and its configuration is therefore displayed on the physical server, views
and master zones properties page.
notify-source-v6
This statement allows to define the IPv6 address of the physical interface used all the server
outgoing notify operations.You can also specify a port for this statement. It is used by master
zones and its configuration is therefore displayed on the physical server, views and master
zones properties page.
568
Configuring DNS Servers
Keep in mind that any configuration set at view or zone level overrides the server level
configuration.
569
Configuring DNS Servers
570
Configuring DNS Servers
• Or add a new ACL that includes the TSIG key to its permissions. For more details, refer to
the section Configuring Access Control Lists for a Server.
3. Configure the statement allow-update of your master zones with the same TSIG key. For more
details, refer to the section Configuring DNS Update Authorizations on a Zone.
Note that if you edited the ACL admin of the server, the configuration is complete because,
by default, the ACL admin of the physical server is specified in the statement allow-update of
the master zones.
Note that instead of configuring the ACL admin to allow the securing TSIG key, you could allow
the IP address of SOLIDserver and restrict the default permissions. However, allowing updates
based on the requestor IP address is insecure, we strongly recommend using the TSIG key
protocol filtering rather than an IP address based filtering.
571
Configuring DNS Servers
10. Click on OK to complete the operation. The report opens and closes.
11. Once the ACL is added, you must add it to the permissions of the statement allow-update
of the master zone(s) of the server. For more details, refer to the section Configuring DNS
Update Authorizations on a Zone.
When set at server level, the ACLs can be used on the views and zones of the server. Once
added, you can use an ACL to configure the statements allow-recursion, allow-notify, allow-
query, allow-query-cache, allow-transfer, blackhole at any of relevant level of the DNS
hierarchy.You could, for instance, add one ACL that specifies which part of the network is denied
access or the IP address of the server that should always receive the notification messages, etc.
Note that by default EfficientIP servers provide the ACL admin. You can edit it according to your
needs but you cannot delete it.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
572
Configuring DNS Servers
All the entries of the ACL values constitute the content of your ACL.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on OK to complete the operation. The report opens and closes. The ACL is listed in
the panel.
Once added, an ACL includes permissions and restrictions that you allow or deny access
to depending on the configuration you set:
• If you allow access to the ACL, every permission it contains are granted access to,
every restriction it contains are denied access to.
• If you deny access to the ACL, the contrary is set: every permission it contains are
denied access to, every restriction it contains are granted access to.
573
Configuring DNS Servers
The information is encrypted via a technique called HMAC (Keyed-Hashing for Message Authen-
tication, see RFC 2104) which employs a shared secret and a one-way cryptographic hash
function to sign data. This shared secret is used a password known only to the two parties involved
in the exchange.
From the properties page of EfficientIP, EfficientIP Package and Generic servers as well as smart
architectures you can add, edit and delete TSIG keys. Once a key is added, you can use it:
• To secure the server with a unique TSIG key. For more details, refer to the section Securing
the Management of DNS Servers Using a TSIG Key.
• In any statement or in ACLs at server, view and/or zone level. For more details, refer to the
chapters Configuring DNS Servers, Configuring DNS Views and Configuring DNS Zones.
• When adding and editing slave zones, RPZ or not, and stub zones. For more details, refer to
the chapters Managing DNS Zones and DNS Firewall (RPZ).
• To set up dynamic update for you master zones. For more details, refer to the sections Config-
uring Access Control Lists for a Server and Authenticating the Zones Dynamic Update from
the Server.
Note that TSIG keys are not supported by Microsoft servers. However, you can configure their
zones for dynamic update via GSS-TSIG keys.
574
Configuring DNS Servers
Only administrators with a good understanding of BIND configuration files should perform
these operations.
The prerequisites, limitations and procedures to follow are all described in the appendix Config-
uring Non-Supported BIND Options.
Once the non-supported options are included to the configuration file, they are processed like
any other option unless their syntax is incorrect or the option itself was already set. In which case,
the included options are ignored until the proper changes have been made.
When relying on an anycast architecture, DNS clients always query the same IP address(es) but
their packets are routed to the nearest anycast DNS server according to the network topology.
If the closest DNS server is down, the related route is withdrawn and the packets are transparently
re-routed by the network to the nearest available DNS server in the topology.
575
Configuring DNS Servers
Note that since version 8, anycast no longer relies by default on a Quagga package to set
up anycast. If you upgraded your appliance, your configuration is now saved in the folder
/data1/etc/frr. To switch back to using quagga, execute the following commands:
sudo -s
/usr/local/nessy2/script/quagga_frr.sh quagga
Prerequisites
• An IP address that can be anycasted on the network and configured on a loopback of each
SOLIDserver belonging to the anycast group.
• Sufficient information and accesses to configure SOLIDserver routing daemon in order to es-
tablish neighboring relationships with the peer routers.
• The anycast configuration must be completed on every DNS server of the anycast group. This
applies whether or not the servers are managed from a smart architecture.
With this type of topology, the anycast IP address is advertised from multiple locations and the
router ends up choosing the best path to that IP address, according to the routing protocol al-
gorithm and configuration. Once you finished the configuration detailed in the sections below,
the DNS servers managed via SOLIDserver advertise the anycast IP address to the network.
576
Configuring DNS Servers
sudo -s
Note that you can support more than one routing protocol if you specify several daemons
in the configuration file, separated by a space. It could be set as follows frr_dae-
mons="zebra ospfd bgpd isisd".
e. Add the following line to the file to specify the anycast dedicated IP address:
# Expected syntax: ifconfig_<interface-name>_alias0="inet <IP-address> netmask
<netmask>"
# Example:
b. Add the following line to the file to configure your access credentials:
hostname dns-anycast-1
username root nopassword
Now that the appliance is ready, you need to set up OSPF using FRR, as detailed in the next
section.
577
Configuring DNS Servers
# Specify the name of the interfaces used by your clients. "bge1" and "lo0" are
examples.
interface bge1
ip address 192.168.53.2/24
interface lo0
ip address 192.168.55.2/32
5. In this directory, create the OSPF configuration file using the following commands:
# emacs ospfd.conf
It should contain the appliance hostname, authentication details, response time, interfaces
dedicated to OSPF, access list and log file location like in the example below.
# more /data1/etc/frr/ospfd.conf
hostname dns-anycast-1
# Specify the proper interface. "bge1" was specified in zebra.conf in our example.
interface bge1
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 mypassword
ip ospf priority 0
ip ospf hello-interval 1
ip ospf dead-interval 5
router ospf
log-adjacency-changes
ospf router-id 192.168.53.2
area 20 authentication message-digest
area 20 nssa
network 192.168.53.0/24 area 20
redistribute connected metric-type 1
578
Configuring DNS Servers
3. In the file /var/log/zebra.log you can check the FRR dedicated logs. If everything went
well, you should have three lines similar to the ones below:
// example of a sucssessfull configuration
579
Configuring DNS Servers
dns-anycast-1#
BGP Prerequisites
• Make sure the network flows are properly configured, as detailed in the appendix Matrices of
Network Flows.
• Have the following information ready:
580
Configuring DNS Servers
Note that you can support more than one routing protocol if you specify several daemons
in the configuration file, separated by a space. It could be set as follows frr_dae-
mons="zebra ospfd bgpd isisd".
e. Add the following line to the file to specify the anycast dedicated IP address:
# Expected syntax: ifconfig_<interface-name>_alias0="inet <IP-address> netmask
<netmask>"
# Example:
b. Add the following line to the file to configure your access credentials:
hostname dns-anycast-1
username root nopassword
581
Configuring DNS Servers
Now that the appliance is ready, you need to set up BGP using FRR, as detailed in the next
section.
# Specify the name of the interfaces used by your clients. "bge1" and "lo0" are
examples.
interface bge1
ip address 192.168.53.2/30
interface lo0
ip address 192.168.55.2/32
5. In this directory, create the BGP configuration file using the following commands:
# emacs bgpd.conf
It should contain the appliance hostname, authentication details, response time, interfaces
dedicated to BGP, access list and log file location like in the example below.
582
Configuring DNS Servers
# more /data1/etc/frr/bgpd.conf
hostname dns-anycast-1
password zebra
log syslog
router bgp 64500
bgp router-id 192.168.53.2
network 192.168.56.1/32
timers bgp 5 10
neighbor 192.168.53.1 remote-as 65000
neighbor 192.168.53.1 soft-reconfiguration inbound
neighbor 192.168.53.1 activate
583
Configuring DNS Servers
dns-anycast-1#
dns-anycast-1#
584
Configuring DNS Servers
Note that you can support more than one routing protocol if you specify several daemons
in the configuration file, separated by a space. It could be set as follows frr_dae-
mons="zebra ospfd bgpd isisd".
e. Add the following line to the file to specify the anycast dedicated IP address:
# Expected syntax: ifconfig_<interface-name>_alias0="inet <IP-address> netmask
<netmask>"
# Example:
585
Configuring DNS Servers
2. Create and configure the file that enables the communication between the FRRouting suite
components.
a. Create the file vtysh.conf as follows:
touch /data1/etc/frr/vtysh.conf
b. Add the following line to the file to configure your access credentials:
hostname dns-anycast-1
username root nopassword
Now that the appliance is ready, you need to set up IS-IS using FRR, as detailed in the next
section.
5. In this directory, create the IS-IS configuration file using the following commands:
586
Configuring DNS Servers
# emacs isisd.conf
It should contain interfaces used for IS-IS communication and for anycast, an IS-IS address
and log file location like in the example below:
# more /data1/etc/frr/isisd.conf
hostname dns-anycast-1
password mypassword
enable password mypassword
interface em3
ip router isis ISIS_0
interface lo0
ip router isis ISIS_0
3. In the file /var/log/zebra.log you can check the FRR dedicated logs using the following
command:
# tail -f /var/log/zebra.log
587
Configuring DNS Servers
[...]
192.168.99.0/32 is subnetted, 1 subnets
i L1 192.168.99.8 [115/20] via 192.168.1.50, 00:00:33, FastEthernet0/0
[...]
DNSCrypt is a protocol that authenticates communications between a DNS client and a DNS
resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses ori-
ginate from Cisco Umbrella and haven't been tampered with.
1
For more details regarding Cisco Umbrella services, refer to the proprietary website at https://umbrella.cisco.com/.
588
Configuring DNS Servers
1. Via Cisco Umbrella web interface, create a network device and retrieve its API key and secret
strings.
2. Via SOLIDserver GUI, configure the IP address dedicated to Umbrella as the only forwarder
for your local DNS appliance.
3. Via SOLIDserver CLI, configure and launch the proxy DNSCrypt.
Note that:
• The DNSCrypt protocol uses the port 443, in TCP and UDP, which is usually reserved to HTTPS.
It is possible that some equipments, such as firewalls, IDP or IPS detect a wrongful use of the
port. Make sure these equipments are configured to allow this traffic.
• You cannot integrate Cisco Umbrella on Hybrid servers. For more details on Hybrid servers,
refer to the chapter Hybrid DNS Service.
• Once you integrated Cisco Umbrella, you can complete the CLI configuration and forward the
client IP address. For more details, refer to the section Forwarding the Client IP Address.
589
Configuring DNS Servers
c. Retrieve your DNSCrypt parameters using the script umbrella_setup. You must specify
the API key and API secret you copied earlier and the name of the device of your choice,
as defined in your Network Devices list, as follows:
/usr/local/nessy2/script/umbrella_setup <Your-Cisco-Umbrella-API-Key>
<Your-Cisco-Umbrella-API-Secret> <Your-Network-Devices-Cisco-Umbrella-Device-Name>
3. Add the following line to the file to specify the IP address dedicated to the proxy
DNSCrypt:
ifconfig_lo0_alias53="inet 127.0.1.53 netmask 255.0.0.0"
Now, every DNS query trafficking through the appliance is directly forwarded to the
Cisco Umbrella Cloud for resolution using your organization ID and device ID, and
therefore, your Umbrella policies.
k. Repeat all the steps for each appliance you want to configure.
590
Configuring DNS Servers
If you have cascaded several resolvers, the IP address of a client is overwritten every time it is
forwarded. Therefore, once the query gets to the resolver that actually performs the resolution,
the source IP address it receives is no longer the one of the original client. Forwarding the original
client IP address between resolvers allows to track it, no matter how many resolvers forwarded
the original query.
To enable forwarding of the client IP address, you must configure the statement server with
the following options:
• edns-opendns set to yes.
• edns-opendns-orgid set with the administrative value of your choice, it must be composed of
digits. If you did not integrate Cisco Umbrella you can specify any value, otherwise you must
specify the relevant organization ID.
• edns-opendns-deviceid set with the administrative value of your choice, it must be hexadecimal.
If you did not integrate Cisco Umbrella you can specify any value, otherwise you must specify
the relevant device ID.
If you prefer to forward the client IP address declared in the OpenDNS EDNS option, you must
also set the option:
• edns-opendns-forward to yes. If you integrated Cisco Umbrella on any of your cascaded resolv-
ers, you should enable this option to benefit from Umbrella full reporting capabilities.
Note that:
• You should not set the option edns-opendns-forward on the closest server to the DNS clients.
• You cannot forward the client IP address on Hybrid servers. For more details on Hybrid servers,
refer to the chapter Hybrid DNS Service.
• DNS Guardian servers provide dedicated parameters to identify and monitor clients using their
IP address or EDNS options. For more details, refer to the section Managing Guardian Views
in the chapter Managing Guardian Protection.
591
Configuring DNS Servers
If you did not integrate Cisco Umbrella you can specify any value, it must be composed
of digits.
c. You must specify the device ID as follows:
edns-opendns-device <your-device-id>;
If you did not integrate Cisco Umbrella you can specify any value, it must be hexadecimal.
d. You can forward the client IP address declared in the OpenDNS EDNS option as follows:
edns-opendns-forward yes;
If you did not enable edns-opendns and set the edns-opendns-orgid and edns-opendns-
device with a value, the option is ignored.
The complete configuration may look as follows:
server 53.0.0.10 {
edns-opendns yes;
edns-opendns-orgid 2450948;
edns-opendns-deviceid "ab00b1f191132406";
edns-opendns-forward yes;
};
4. Make sure the whole configuration file is still viable using the command:
/usr/local/nessy2/bin/named-checkconf /etc/namedb/named.conf
If no errors are returned and the configuration file is OK, go to the next step. If not, you must
edit the content of the included file because incorrect configurations are ignored.
5. Once the configuration is OK, restart the DNS daemon to take into account your changes
with the command:
service ipmdns.sh restart
592
Chapter 41. Managing DNS Views
You can add and manage views to serve one version of a zone to one set of clients and a different
version of a zone to another set of clients. A view can manage DNS zones and RPZ zones.
Views provide a different answer to the same DNS query, depending on the IP source of the
query or the IP where the client packet is received. You can add multiple views of a given zone,
with a different set of records in each of them. You can also have common resource records in
multiple zones.
Note that you can configure views from their properties page. For more details, refer to the chapter
Configuring DNS Views.
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
593
Managing DNS Views
Delayed create The creation or update is delayed until the view is created on the physical server(s) of the
smart architecture. The creation is automatically done after a maximum of 1 minute.
Delayed delete The deletion is delayed until the view is deleted from the physical server(s) of the smart
architecture. The deletion is automatically done after a maximum of 1 minute.
You can also rely on the column Multi-status to monitor your view configuration with messages
regarding the compatibility with Hybrid. For more details, refer to the section Understanding the
Column Multi-Status.
The list match-clients filters access based on the location of the query. It allows to define which
IP address or network is able, or not, to access the zone(s) managed by the view.
Extranet Intranet
network 192.168.0.0 network 10.0.0.0
mycorp.com mycorp.com
accounting-app.intranet
ns1.mycorp.com
filtering on the filtering on the
network network
192.168.0.0 10.0.0.0
Zone access
based on the
client network
Figure 41.2. Defining access to zones using the list match-clients of two views
594
Managing DNS Views
The list match-destinations filters access based on the interface receiving the query. It allows
to define through which interface it possible, or not, to access the zone(s) managed by the view.
Extranet Intranet
network 192.168.0.0 network 10.0.0.0
mycorp.com mycorp.com
accounting-app.intranet
ns1.mycorp.com
filtering on the filtering on the
interface interface
192.168.0.0 10.0.0.0
Zone access
based on the
interface receiving
the query
Figure 41.3. Defining access to zones using the list match-destinations of two views
595
Managing DNS Views
Note that:
• By default, if you do not configure any list for a view:
• The match clients is configured with a key named key <viewname>.
• The match destinations is configured with a key key <viewname> and the ACL any. If you
do not edit or delete this ACL, it grants access to anyone.
596
Managing DNS Views
• Adding a view automatically edits the match clients and match destinations of the existing
view(s), with a key ! key <newviewname>. This ensures that the views deny access to each
other and manage separate zones and RRs.
• Every time you add a new view, the Status of all the views changes from OK to Delayed
create while their match clients is being updated. Once it is done, they all change back to OK.
1
The destination IP address is actually a DNS server interface.
597
Managing DNS Views
Ordering views on a server allows to specify in which order the match client and match destination
configurations of each view (ACL, networks, etc.) are reviewed. This, in turn, impacts the DNS
client queries responses. The order of the views you set is followed strictly: once a match is
found, the rest of the restrictions and permissions are ignored. The first view reviewed is 0, the
second on is 1, and so forth. This order is saved in the DNS server configuration.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
598
Managing DNS Views
If you want get rid of all the views and manage zones via the DNS server itself, refer to the section
Going Back to Managing Zones Without Views.
To delete a view
1. In the sidebar, go to DNS > Views. The page All views opens.
2. Tick the view of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The view is in Delayed
delete until it is no longer listed. If the server has several views, the zones and records
managed by the view you delete are deleted as well.
Granting access to a view as a resource also makes every item it contains available. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
With that in mind, we recommend that you follow the steps below to successfully get rid of the
views when you no longer need them.
599
Managing DNS Views
3. One by one, tick and delete the unwanted views. For more details, refer to the procedure
To delete a view.
4. Once the only remaining view is the one that holds all the zones you want to work with, tick
it and delete it. The zones and RRs it contains are kept and still listed in the pages All zones
and All RRs of the server. Now you can manage them through the server directly.
600
Chapter 42. Configuring DNS Views
Like EfficientIP DNS servers, the views can be configured individually from their properties page
to set a series of behaviors for the zones they contain.
Any configuration set at view level overwrites what was set at server level, on physical servers
or smart architectures.
601
Configuring DNS Views
7. Click on OK to complete the operation. The report opens and closes. The properties page
refreshes and displayed the new settings. In the panel Forwarding, your configuration is
displayed.
You can set a specific forwarding configuration for a view belonging to a physical server
managed via a smart architecture. This new configuration is inherited by the zones and records
of the view. Keep in mind that:
• When a forward mode is set on a smart architecture view, you cannot set the forward mode
to None on a view belonging to a physical server managed via a smart architecture. You can
only set a different forward mode.
• Any configuration set at zone level overrides the view level configuration.
9. Click on OK to complete the operation. The report opens and closes. The properties page
refreshes and displayed the new settings. In the panel Forwarding, the Forward value is
preceded by the message Smart configuration is overwritten.
To revert the specific configuration and inherit it again, edit the Forwarding to untick the box
Overwrite the smart settings.
602
Configuring DNS Views
From the properties pages of a view, you can set the notification configuration in the panel Notify.
It contains:
• The current configuration of the view, the field Notify is either set to Yes, Explicit or No. It can
be inherited from the server.
• The statement Also-notify, which slave zones receive the notify messages through their
managing view. It can be inherited from the server.
• The statement Allow-notify of the view slave zones. It can be inherited from the server.
Note that this statement is implicitly set when you add a slave zone, when you set the Master
IP address of the slave zone you are allowing the master zones of this server to send notify
messages to your slave zone.
Keep in mind that any configuration set at view level overrides the server level configuration
and any configuration set at zone level overrides the view level configuration.
6. If you selected Yes or Explicit, you can set the IP address and port of the server(s) which
slave zones should receive the messages:
a. In the field IP address, specify the IP address of another server.
b. In the field Port, you can specify which port number, on the specified server, should
receive the notify messages.
c. Click on ADD . The IP address and port number are moved to the Also-notify list as
follows: <ip-address> port: <port-number>.
Repeat these actions for as many servers as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on NEXT . The page Allow-notify opens. It allows to specify if the view slave zones can
receive master zones notification messages.
Using the drop-down lists Type and Restriction, you can grant or deny access to as many
networks, IP addresses, ACLs and keys as you need. Select a Type and complete the con-
figuration as follows:
603
Configuring DNS Views
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
8. Click on OK to complete the operation. The report opens and closes. Your configurations
are displayed in the panel Notify.
From the view properties page, you can edit its recursive behavior through the panel Recursion.
By default, its content is inherited from the server.
Keep in mind that any configuration set at view level overrides the server level configuration.
604
Configuring DNS Views
6. Click on NEXT . The page Allow recursion opens. For more details regarding the recursion
configuration, refer to the section Limiting the Recursion at View Level below.
7. Click on OK to complete the operation. In the panel the recursion is enabled.
Once the recursion is restricted at view level, it overrides the server recursion configuration
and applies to the zones it contains.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
605
Configuring DNS Views
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on OK to complete the operation. The report opens and closes.
Allow Query
You can specify which hosts are allowed to issue DNS queries.
The allow-query configuration set at view level overrides the allow-query defined at server level.
Once the statement is set for a view, it applies to all the zones it contains.
Keep in mind that any configuration set at view level overrides the server level configuration
and any configuration set at zone level overrides the view level configuration.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
606
Configuring DNS Views
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
6. Click on NEXT twice to skip the page Allow-query-cache and open the page Allow-transfer.
7. Click on OK to complete the operation. The report opens and closes. Your configuration is
listed in the list Allow-query of the panel Access control.
The allow-query-cache configuration set at view level overrides the allow query cache
defined at the server level. Once the statement is set for a view, it applies to all the zones it
contains.
Allow-query-cache statement particularities
The allow-query-cache is independent from the allow-query statement but closely linked to
the allow-recursion statement.
If the recursion is set to no, the cache cannot be queried, so it is useless to set an allow-
query-cache match list.
If the recursion is set to yes and the allow-recursion statement is not defined, by default the
localhost and localnets are permitted to query the server cache.
If the recursion is set to yes and the allow-recursion statement is defined with a specific match
list, the local cache access is granted to all the entries of the allow-recursion match list.
The match list defined controls recursive behavior as recursive queries would be useless without
access to the local view cache. Typically, if a host is in the allow-recursion match list, it could
access the view the first time and get query result. However, if it is not part of the allow-query-
cache match list then it would not be able to make the same query a second time as it would be
saved on the cache to which it does not have access. On the contrary, if a host is in the allow-
query-cache match list but not in the allow-recursion match list, it would only get results for
queries already sent by another host with the proper access rights. Hence the need to configure
carefully both these statements to avoid conflicts and absurd access configurations.
607
Configuring DNS Views
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on NEXT . The page Allow-transfer opens.
8. Click on OK to complete the operation. The report opens and closes. Your configuration is
listed in the list Allow-query-cache of the panel Access control.
At view level, you can edit the statement allow-transfer to specify which hosts, networks, or TSIG
keys are granted or denied the right to do transfers for all the zones it maintains.
Configuring the statement adds an ACL dedicated to controlling transfers. Keep in mind that the
order of the elements listed in the field ACL values is important as each restriction or per-
mission is reviewed following the order you set in the list.
608
Configuring DNS Views
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
8. Click on OK to complete the operation. The report opens and closes. Your configuration is
listed in the list Allow-transfer of the panel Access control.
These options set at view level override the server level configuration. Once they are con-
figured at view level, they apply to all the zones it contains.
For more details regarding these two options, refer to the section Configuring Client Resolver
Cache Options at Server Level.
609
Configuring DNS Views
These options set at view level override the server level configuration. Once they are con-
figured at view level, they apply to all the zones it contains.
For more details regarding these options, refer to the section Configuring EDNS Options at
Server Level.
610
Configuring DNS Views
For more details regarding the sortlist statement, refer to the section Configuring a Sortlist at
Server Level.
Keep in mind that any configuration set at view level overrides the server level configuration.
Configuring DNS sources allows to set physical interfaces at view level to be systematically used
for all notify operations and zone transfer. DNS sources configuration can be inherited from the
server. If set at view level, it is inherited by the zones. The inheritance details are visible on both
the views and zones properties page.
Keep in mind that any configuration set at view level overrides the server level configuration
and any configuration set at zone level overrides the view level configuration.
From the Sources and Sources V6 panels, through their IP address, you can configure physical
interfaces to be used for the view transfer and notify options. When editing these panels, you
can define the following statements:
query-source
This statement allows to define the IPv4 address and/or port used as the source of the
server or view outgoing queries. By default, BIND uses any server or view interface IP address
and a random port for outgoing queries.
Using a fixed port number allows to control UDP operations but can be extremely dangerous:
it can lead to cache poisoning if used with any caching DNS server definition as any attacker
611
Configuring DNS Views
would need to guess the transaction ID to get both the specified interface IP address and
port number. This statement is displayed on servers and views properties page.
query-source-v6
This statement allows to define the IPv6 address and/or port used as the source of the
server or view outgoing queries. By default, BIND uses any server or view interface IP address
and a random port for outgoing queries.
Using a fixed port number allows to control UDP operations but can be extremely dangerous:
it can lead to cache poisoning if used with any caching DNS server definition as any attacker
would need to guess the transaction ID to get both the specified interface IP address and
port number. This statement is displayed on servers and views properties page.
transfer-source
This statement allows to determine the IPv4 address of the physical interface used to execute
the zones transfer on the server. You can also specify a port for this statement. It is only
valid for slave zones and its configuration is therefore displayed on the physical server, views
and slave zones properties page.
transfer-source-v6
This statement allows to determine the IPv6 address of the physical interface used to execute
the zones transfer on the server. You can also specify a port for this statement. It is only
valid for slave zones and its configuration is therefore displayed on the physical server, views
and slave zones properties page.
use-alt-transfer-source
This statement allows to set the use of an alternate interface IP address for the transfer if
the transfer-source or the transfer-source-v6 were to fail. This statement configuration is
displayed on the physical server, view and slave zones properties page.
This statement definition is only configurable from the panel Sources but applies to interfaces
whether they were identified through an IPv4 or an IPv6 address.
Its default value is no if the server contains views and yes if the server does not contain any
view.
alt-transfer-source
This statement allows to determine the alternate IPv4 address of the interface used to execute
the zones transfer on the server if the transfer-source fails and if the use-alt-transfer-source
is enabled. You can also specify a port for this statement. Its configuration is displayed on
the physical server, views and slave zones properties page.
alt-transfer-source-v6
This statement allows to determine the alternate IPv4 address of the interface used to execute
the zones transfer on the server if the transfer-source fails and if the use-alt-transfer-source
is enabled. You can also specify a port for this statement. Its configuration is displayed on
the physical server, views and slave zones properties page.
notify-source
This statement allows to define the IPv4 address of the physical interface used for all the
server outgoing notify operations. You can also specify a port for this statement. It is used
by master zones and its configuration is therefore displayed on the physical server, views
and master zones properties page.
notify-source-v6
This statement allows to define the IPv6 address of the physical interface used all the server
outgoing notify operations.You can also specify a port for this statement. It is used by master
zones and its configuration is therefore displayed on the physical server, views and master
zones properties page.
612
Configuring DNS Views
613
Configuring DNS Views
3. Open the panel Sources using and click on EDIT . The wizard Configuration: Sources
opens.
4. Configure the transfer statements. Make sure to specify the IP address of an interface already
declared on SOLIDserver, otherwise all the transfer operations would fail.
a. In the field Query-source-v6 address, specify the IPv6 address of the interface used
for outgoing queries.
b. In the field Query-source-v6 port, you can specify the port number used for outgoing
queries. Keep in mind that specifying a port number can lead to cache poisoning if DNS
server definitions are not set properly.
c. In the field Transfer-source-v6 address, specify the IPv4 address to be used for the
zones transfer operations. Specify an interface that you already configured on the appli-
ance. If you defined the use-alt-transfer-source statement in the panel Sources, it applies
to the alternate interfaces declared in IPv4 (Alt-transfer-source address) and IPv6 (Alt-
transfer-source address-v6).
d. In the field Transfer-source-v6 port, you can specify which port on the interface should
be used.
e. If you enabled the use-alt-transfer-source in the Sources panel, in the field Alt-transfer-
source-v6 address, specify the IPv6 address of the alternate interface. It must also be
configured on the appliance.
f. If you enabled the use-alt-transfer-source in the Sources panel, in the field Alt-transfer-
source-v6 port, you can specify which port on the interface should be used.
5. Configure the notify statement. Make sure to specify the IP address of an interface already
declared on SOLIDserver, otherwise all the notify operations would fail.
a. In the field Notify-source-v6 address, specify the IPv6 address to be used for the
outgoing notify operations. Specify an interface that you already configured on the ap-
pliance.
b. In the field Notify-source-v6 port, you can specify which port on the interface should
be used.
6. Click on OK to complete the operation. The report opens and closes.
614
Chapter 43. Managing DNS Zones
When deploying a name server, it is important to understand the difference between a zone and
a domain. A zone is a delegated point within a DNS structure, and is made up of adjoining elements
of the domain structure, which are governed by a name server.
SOLIDserver allows you to add and manage 6 types of zones: Master, Slave, Forward, Stub,
Hint and Delegation-Only. Each type of zone provides specific options that you can set when
adding or editing the zones. Note that:
• You can configure zones from their properties page. For more details, refer to the chapter
Configuring DNS Zones.
• If you want to add and manage RPZ zones, refer to the chapter DNS Firewall (RPZ).
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
The properties page displays the configuration details of each zone in a set of panels. For more
details regarding how to edit the panel Name servers, Forwarding, Notify, Sources or Sources
V6 of a zone, refer to the chapter Configuring DNS Zones.
615
Managing DNS Zones
Delayed create The creation or update is delayed until the zone is created on the physical server(s)
of the smart architecture. The creation is automatically done after a maximum of 1
minute.
Delayed delete The deletion is delayed until the zone is deleted from the physical server(s) of the
smart architecture. The deletion is automatically done after a maximum of 1 minute.
Timeout The zone is not available.
Not authoritative The zone configuration is incorrect, in the SOA another server was set as authoritative.
Refused The DNS server refuses the transfer between the current zone and the management
platform, check the parameter allow-transfer on the zone or server properties page.
No RR Only for forward zones. There is no RR to transfer for the zone.
N/A Only for Amazon Route 53 servers. The zone is not a Master or does not have a
TLD.
Moreover, the column Multi-status provides you with emergency, warning, critical, error or in-
formational messages regarding the compatibility with Hybrid. For more details, refer to the section
Understanding the Column Multi-Status.
Note that:
• If you add a zone to a smart architecture managing server(s), the last page of the wizard returns
a warning message if any server does not support its type. You can force the addition to add
it to the server(s) that do support them.
• Amazon Route 53 and Azure zones have some prerequisites, specificities and limitations. For
details, refer to the sections Managing Amazon Route 53 Zones and Managing Azure Zones
of the chapter Managing DNS Servers.
• SOLIDserver can be used for Hosting Active Directory Domain Zones.
• You can also import zones, for more details refer to the section Importing Zones in the chapter
Importing Data from a CSV File.
616
Managing DNS Zones
If you want to add RPZ zones, refer to the chapter DNS Firewall (RPZ).
The most common use of Master zones is to configure them with a slave zone of the same name
that stores all its records, in a Master/Slave configuration where the master server contains the
master zones and the slave server contains the slave zones. However, if you want to make the
DNS available at all times, you can use a multiple master configuration. In which case, all DNS
servers are master servers for each zone. This disposition requires to propagate any change,
made to a zone file or the DNS configuration, to every DNS server configured as master.
Therefore, we recommend that you manage your master servers through a DNS Multi-Master
smart architecture. For more details regarding its configuration, refer to the section Adding a
Multi-Master Smart Architecture.
If you want to add an RPZ master name zone, refer to the chapter DNS Firewall (RPZ).
617
Managing DNS Zones
Field Description
Space The name of an IPAM space to associate with the zone or None. This field is op-
tional.
If DNS to IPAM advanced properties are configured, the selected space is updated
by the zone records. For more details, refer to the section Configuring DNS Ad-
vanced Properties.
10. If you are managing an Active Directory integrated Microsoft DNS server, you can configure
the Expert Mode and/or AD integrated parameters.
618
Managing DNS Zones
Field Description
All DNS servers in the AD forest allows to replicate the zone parameters and content
to all the DNS servers of the AD forest.
Note that the column AD integrated allows to display the AD integration configuration (Yes,
No, N/A) of each zone. For more details, refer to the section Managing List Templates.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on NEXT . The last page opens.
13. All fields are required and automatically filled, they configure the SOA of the zone. You can
edit them.
You can set the value by default for the parameters above, except for the Primary server
and Serial number. For more details, refer to the procedure To configure the default SOA
parameters of Master zones below.
14. Click on OK to complete the operation. The report opens and closes. The zone is listed and
is marked Delayed create before being marked OK.
During the first Master zone addition, the allow-update may be configured by default
with the ACL any. This configuration is inherited from the server or view, you might need
to restrict the statement. For more details, refer to the section Configuring DNS Update Au-
thorizations on a Zone.
Note that you can also configure the statement on several zones at once. For more details,
refer to the section Setting Authorizations.
Note that you can configure default values for the SOA record that is automatically added when
you add a master zone.
619
Managing DNS Zones
3. Edit the fields with the values you want to be automatically used when adding a master zone:
4. Click on OK to complete the operation. The report opens and closes. When adding a master
zone, the DNS zone advanced parameters now auto-completes with the values you indicated
for the SOA.
They are usually added on slave name servers that receive their information from master name
servers through a zone transfer, the master zone and the slave zone on each server are named
the same. During the zone transfer, the master zone sends a NOTIFY to all the slave zone(s) it
knows. The zone content is only sent to the slave zones authorized to receive the transfer, the
other zones receive an error message. Note that several master servers can be configured for
one slave server.
If you want to add an RPZ slave name zone, refer to the chapter DNS Firewall (RPZ).
620
Managing DNS Zones
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on NEXT . The last page opens.
621
Managing DNS Zones
Once the IP, port and key are configured, click on ADD . The configuration is moved to the
list Masters.
Repeat these actions for as many servers as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
622
Managing DNS Zones
11. If you are managing a Microsoft DNS server through a smart architecture, you might want
to configure the parameters of the Expert Mode:
623
Managing DNS Zones
Field Description
AD integrated If your server is AD integrated, you can tick this box to set the replication preferences.
The drop-down list AD replication appears. This field is optional.
AD replication The zone content and parameters replication, either All DC in the AD Domain (default),
All DNS servers in the AD domain or All DNS servers in the AD forest. By default, All
DC in the AD Domain (default) is selected.
All DC in the AD domain allows to replicate the zone parameters and content to all
the Domain Controllers of the AD domain. This option is not available for Stub zones.
All DNS servers in the AD domain allows to replicate the zone parameters and
content to all the DNS servers of the AD domain.
All DNS servers in the AD forest allows to replicate the zone parameters and content
to all the DNS servers of the AD forest.
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on NEXT . The last page opens.
14. Configure the forwarders and forward mode for the zone. The fields Forwarders list and
Forward Mode are mandatory.
a. In the field Add a forwarder (IP), specify the IP address of the master server to which
the queries should be forwarded to and click on ADD .
The IP address is moved to the Forwarders list. Repeat these actions for as many
servers as needed. The order of the servers in the list is not important.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
b. In the drop-down list Forward Mode, select First, Only or None. By default, First is se-
lected.
624
Managing DNS Zones
particularly for a restrained collection of servers. They are not part of the DNS standard zones,
they are specific to BIND implementations.
625
Managing DNS Zones
Field Description
Reverse type A resolution methods, your selection automatically changes the extension displayed
in the field Name. This field is required.
IPv4 in-addr.arpa Allows to configure IPv4 reverse-mapping.
E164 arpa Allows to configure reverse-mapping of telephone numbers
for the zone.
IPv6 int Allows to configure IPv6 reverse-mapping. Note that this ex-
tension is deprecated, as detailed in RFC 4159, so unless
your IPv6 configuration is older than 2001 we recommend
that you use the IPv6 arpa extension.
Ipv6 arpa Allows to configure IPv6 reverse-mapping.
View The view that manages the zone. The list is empty if the server does no have any
view.
Space The name of an IPAM space to associate with the zone or None. This field is op-
tional.
If DNS to IPAM advanced properties are configured, the selected space is updated
by the zone records. For more details, refer to the section Configuring DNS Ad-
vanced Properties.
11. If you are managing a Microsoft DNS server through a smart architecture, you might want
to configure the parameters of the Expert Mode:
12. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
13. Click on NEXT . The last page opens.
14. Configure the master servers of the zone.
626
Managing DNS Zones
Field Description
TSIG key A TSIG key, set at server level. This field is optional. For more details, refer to the
section Securing the Management of DNS Servers Using a TSIG Key.
Once the IP, port and key are configured, click on ADD . The configuration is moved to the
list Masters.
Repeat these actions for as many servers as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
15. Click on OK to complete the operation. The report opens and closes. The zone is listed and
is marked Delayed create before being marked OK. A stub zone only contains an SOA
and NS RRs.
The hint zone updates the local server cache with a list of the 13 root-servers saved in the form
of A records (from a.root-servers.net to m.root-servers.net). Therefore, one hint zone per server
or view is enough. When the server starts up, it uses the hint zone to query a root zone and obtain
the complete list of the current authoritative root servers. This list is then used by the name
server as a starting point for any domain query, if there is no locally defined zone (slave or master)
or cached answers. A hint zone should be updated every 12 months or whenever there are dis-
crepancies returned in the log messages, when the DNS server loads for instance.
Note that the hint zone can also contain an internal list and be used locally; in this case, the
configuration is running an internal name service on a closed network, or the name server is not
defined but recursive queries are required.
627
Managing DNS Zones
When a zone is declared as delegation-only, it does not contain any record. You can use deleg-
ation-only zones to filter out wildcard or synthesized data from NAT boxes or from authoritative
name servers whose undelegated (in-zone) data is of no interest.They can also be used to enforce
the delegation-only status of infrastructure zones (e.g. COM, NET, ORG).
The name of the delegation-only zone is the domain for which you send the NXDOMAIN response,
any subdomain responds normally.
628
Managing DNS Zones
Keep in mind that the name of your delegation-only zone is a domain that, once querried,
sends an NXDOMAIN response to the client.
11. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
12. Click on OK to complete the operation. The report opens and closes. The zone is listed and
marked OK.
629
Managing DNS Zones
On Active Directory integrated Microsoft DNS servers, when you add Master, Slave, Forward or
Stub zones the box AD integrated allows to set up the AD replication of your choice. Note than
once set, you cannot edit the AD replication configuration unless you delete the zone and add it
again. For more details, refer to the sections Adding a Master Zone, Adding a Slave Zone, Adding
a Forward Zone or Adding a Stub Zone.
Keep in mind that the DNS Multi-Master smart architecture can reproduce Microsoft's Multi-
Master behavior. For more details, refer to the section Multi-Master smart architecture.
You can synchronize zones to force a retrieval of the latest changes and records.
To synchronize zones
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zone(s) you want to synchronize.
3. In the menu, select Edit > Status > Synchronize. The wizard Synchronization opens.
4. Click on OK to complete the operation.The report opens and closes when the synchronization
is over. The page reloads.
You can also synchronize the entire content of a zone, rather than only the latest change. The
option Force full synchronization retrieves and uploads the complete content of a zone and resets
the serial number of the SOA of the zone.
Resetting the SOA serial ensures that the entire zone data is up to date. It can be useful if you
restored a server that you used to manage, as you might have a synchronization drift between
the data that SOLIDserver stored locally and all the changes that have been performed directly
on the server since you last managed it.
If you want to edit RPZ zones, refer to the chapter DNS Firewall (RPZ).
630
Managing DNS Zones
8. Click on OK to complete the operation. The report opens and closes. The changes are visible
in the relevant panel(s).
You can also add and delete NS records, for multiple master zones at once, from the page All
zones.
631
Managing DNS Zones
632
Managing DNS Zones
4. If custom classes are enabled at zone level, in the list DNS zone class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Edit the Space and/or the AD integrated and AD replication configuration if need be. Note
that you cannot edit any other parameter.
In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
You can display All available fields, but you may not be able configure them. For more details,
refer to the relevant module section in the chapter Managing Advanced Properties.
6. Click on NEXT . The last page opens.
7. If you want to add another forwarding master server refer to the step 14 of the To add a
forward zone procedure.
8. In the fields Add a forwarder (IP) and Forward Mode, fill in the address of the master
server and select if the zone should forward Only or send a query First.
9. If you want to delete a server, select it in the list Forwarders list and click on . The server
is no longer listed in the list.
10. Click on OK to complete the operation. The report opens and closes. The changes are visible
in the relevant panel(s).
633
Managing DNS Zones
9. Click on OK to complete the operation. The report opens and closes. The changes are visible
in the relevant panel(s).
634
Managing DNS Zones
635
Managing DNS Zones
To copy a zone
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zone (s) you want to copy on another server or view.
3. In the menu, select Edit > Migrate. The wizard Copying/Moving zones opens.
4. In the drop-down list Method, select Copy.
5. In the drop-down list Target server, select the DNS server where you want to copy the se-
lected zone. The wizard refreshes.
6. If the selected server has views, the drop-down list Target view appears, select the view of
your choice. The wizard refreshes.
7. Tick the box Asynchronous to run the records addition in the background. This option
shortens the process but the records do not appear instantly on the page All RRs.
8. Click on OK to complete the operation. The report opens and closes. The page displays the
duplicated zone. If you selected a view, the zone is also listed in the list All zones of said
view.
To move a zone
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zone (s) you want to copy on another server or view.
3. In the menu, select Edit > Migrate. The wizard Copying/Moving zones opens.
4. In the drop-down list Method, select Move.
5. In the drop-down list Target server, select the DNS server where you want to move the
selected zone. The wizard refreshes.
636
Managing DNS Zones
6. If the selected server has views, the Target view drop-down list appears, select the view of
your choice. The wizard refreshes.
7. Tick the box Asynchronous to run the records addition in the background. This option
shortens the process but the records do not appear instantly on the page All RRs.
8. Click on OK to complete the operation. The report opens and closes. The page displays the
migrated zone. If you selected a view, the zone is also listed on the page All zones of said
view.
Setting a Space
You can associate multiple zones, of any type, with the same IPAM space.
Setting Authorizations
All the authorizations set at server or view level are inherited by the zones. You can change the
statements allow-transfer, allow-query and allow-update of several zones at once.
Note that you can also limit zone transfers and queries or manage DNS update one zone at a
time.
637
Managing DNS Zones
638
Managing DNS Zones
639
Managing DNS Zones
6. If you want to set the properties of an existing zone to the selected zone(s):
a. In the drop-down list Source, select Use existing zone parameters. The wizard refreshes
and the drop-down list Zone appears.
b. In the drop-down list Zone, select the zone whose properties you want to apply to your
selection.
7. If you want to set a specific update policy:
a. In the drop-down list Source, select New settings.
b. Tick the box Use GSS-TSIG/update-policy. The wizard refreshes, the update-policy
related fields replace the other fields of the wizard, and the box Enable DDNS scavenging
appears.
c. You can tick the box Enable DDNS scavenging if you want to delete stale DDNS re-
cords. This box is only taken into account if the scavenging is enabled on the appliance.
For more details, refer to the section Configuring Scavenging on DNS Zones.
d. Configure the dynamic update permissions and restrictions for your zone:
640
Managing DNS Zones
Option Description
subdomain Allows to define the subdomain being updated. You must specify the
domain in the field Tname following the format <domain>.<tld> ,
everything left of the specified <domain> becomes a match.
wildcard Allows to define the record being updated.You must specify the record's
name in the field Tname using at least one wildcard (*). It can contain
only a wildcard, in which case any record name can match.
krb5-self Allows to define a rule based on Kerberos machine principal
(host/QDN@REALM). The record being updated matches the QDN
part of the Principal. The matching REALM must be specified exactly
in the fields Identity and Tname.
krb5-subdomain Allows to define a rule based on Kerberos machine principal
(host/QDN@REALM).The subdomain being updated matches the QDN
part of the Principal. The matching REALM is what is specified the field
Identity, or any subdomain of the specified Identity.
ms-self Allows to define a rule based on AD format principal (machine-
name$@REALM) to update machinename.realm in the DNS. The
matching REALM must be specified exactly in the fields Identity and
Tname.
ms-subdomain Allows to define a rule based on AD format principal (machine-
name$@REALM) to update machinename.realm in the DNS. The
matching REALM is what is specified the field Identity, or any subdo-
main of the specified Identity.
Tname A value to that applies the Matchtype subdomain, krb5-self, krb5-subdomain, ms-self or
ms-subdomain. The expected format is detailed above, with each Matchtype.
RR type The type(s) of records that the configuration applies to, either Specific or Any.
Specific The permissions of your choice for the record type A, AAAA, AFSDB,
CNAME, DNAME, HINFO, MX, NS, NSAP, PTR, SRV, TXT and/or
WKS.
Select each type in the list Available types and click on . The record
type is moved to the list Selected type(s).
Repeat this action for as many record types as you need.
Any Allows to apply the configuration to all the update-policy record types,
i.e. A, AAAA, AFSDB, CNAME, DNAME, HINFO, MX, NS, NSAP, PTR,
SRV, TXT and WKS.
e. Once you configured the fields, click on ADD . Your update-policy entry is moved to the
Update-policy list. The page refreshes.
f. You can configure as many entries as you want.
To organize the list, use the buttons and . Each restriction or permission is reviewed
and processed following the order set in the list.
8. Click on OK to complete the operation. The report opens and closes. The changes are visible
on the zone(s) properties page, in the panel Main properties.
Setting Forwarders
You can associate multiple master, slave, forward and stub zones to the same forward parameters
at once.
641
Managing DNS Zones
3. In the menu, select Edit > Properties > Set forwarders. The related wizard opens.
4. If you want to set the properties of an existing zone for the selected zone(s):
a. In the drop-down list Source, select Use existing zone parameters. The wizard refreshes
and the drop-down list Zone appears.
b. In the drop-down list Zone, select the zone whose properties you want to apply to your
selection.
5. If you want to set new properties for the selected zone(s):
a. In the drop-down list Source, select New settings.
b. In the drop-down list Forward mode, select Default, None, First or Only according to
your needs. If you select Only or First, the field Add a forwarder (IP) appears.
c. If you selected First or Only, in the field Add a forwarder (IP) specify the address of a
forwarder and click on ADD to move it to the list Forwarders. Repeat these actions for
as many forwarders as needed.
6. Click on ADD . The configuration is displayed in the list ACL at the bottom.
7. Repeat the operation with as many configuration parameters as needed.
8. Click on OK to complete the operation. The report opens and closes. The changes are visible
on the zone(s) properties page, in the panel Main properties.
642
Managing DNS Zones
Prerequisites
• You can only enable the scavenging on zones relying on secure dynamic update (DDNS), they
are marked Yes in the column GSS-TSIG. To configure secure dynamic update, refer to the
chapter Implementing Dynamic Update.
• The scavenging only deletes DDNS records dynamically updated.
Note that on the page All RRs, the columns GSS-TSIG auth. and Last updated on allow to
identify them. The column Last update (days) displays the number of days since the last update.
Limitations
• DDNS scavenging can only be configured on EfficientIP and EffcientIP Package DNS servers
serving Microsoft Active Directory clients.
• DDNS scavenging can only be configured on Master zones.
The rule configuration applies to all the zones you manage from the GUI, if their scavenging is
enabled.
Note that:
• By default the rule is disabled. You must edit it to match your needs and then enable it.
• Once the rule is enabled, you must configure the scavenging on the zones of your choice.
Only the DDNS records that have been stale for longer than the aging limit set for the rule are
deleted.
To edit the rule 416 that enables DDNS scavenging on the appliance
Only users of the group admin can perform this operation.
1. Take into account the prerequisites and limitations.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Expert, click on Rules. The page Rules opens.
4. In the column Rule#, type in 416 and hit Enter. The rule is the only one listed.
5. In the column Rule name, right-click over the name of the rule. The contextual menu opens.
6. Click on Edit. The wizard Edit a rule opens.
7. Click on Next . The page Rule filters opens. These filters define when the rule is executed.
8. Edit the rule frequency according to your needs.
643
Managing DNS Zones
Field Description
Hour A specific hour, a set of hours, every hour, or every hour over a specific period. The
hour respects the UTC standard. By default, every hour is selected. This field is op-
tional.
Minute A moment of the hour (00, 15, 30 or 45) or a frequency. The minute respects the UTC
standard. By default, 00 is selected. This field is optional.
In the procedure below, we configure DDNS scavenging from the page All zones, but you can
also enable or disable it from the properties page of a zone, if you edit its Update-policy configur-
ation in the panel Access control. For more details, refer to the chapter Configuring your Zone
for Secure Dynamic Update in the chapter Implementing Dynamic Update.
Note that:
• DDNS scavenging can be configured on the zones of smart architectures and physical servers.
• Only the records that have been stale for longer than the threshold of the rule 416 are deleted.
Each deletion is logged on the page Syslog of the module Administration. For more details,
refer to the section Managing the Logs in the chapter Monitoring.
644
Managing DNS Zones
From the page All RRs, you can display what records are deleted once DDNS scavenging is
enabled their zone:
• In the column GSS-TSIG auth., the record is marked Yes.
• In the column Last updated on, the record has a date.
• In the column Last update (days), the record has a number of days since the last update date.
You can force a notify, refresh or retransfer right away if needed. Keep in mind that:
• You can only force a zone content update on BIND and EfficientIP DNS servers. Other servers
do not support RNDC commands
• You cannot use these options on Hybrid DNS servers. For more details, refer to the chapter
Hybrid DNS Service.
The option Force notify allows to send a notify, or also-notify, from the zone(s) you select. Keep
in mind that:
• The option uses the information of NS records named like the zone you select. Therefore, it
cannot work if the selected zone does not contain at least one NS record named after the zone
itself.
• The notify, and also-notify, can be inherited from the server or view. If the notify is disabled on
the zone, the option cannot be used.
645
Managing DNS Zones
4. Click on OK to complete the operation. The report opens and closes when the operation is
over. The page reloads.
To also force the record addition, refer to the section Forcing DNS Zones Retransfer.
The option Force retransfer triggers the addition and update of the records present in the Master
zone(s), and their values, within the selected Slave zone(s). Note that:
• If your Slave zone contains more records than the Master zone, the option deletes the outdated
records.
• The option is taken into account immediately in the DNS database, but you need to synchronize
the zones to see them in the GUI.
To only update the values of the existing records of Slave zone(s), but not add new records, refer
to the section Forcing DNS Zones Refresh.
646
Managing DNS Zones
On smart architectures, you can disable a zone. Once disabled, a zone is no longer available
and therefore cannot be queried.
Disabling a zone allows to maintain or edit its content without impacting the physical server that
manages it, it can be helpful if you intend to move or repair its managing server(s).
To enable/disable a zone
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zones you want to enable or disable.
3. In the menu, select Edit > Status > Enable or Disable. The wizard opens.
4. Click on OK to complete the operation. The report opens and closes. The zone Status
changes to OK or Unmanaged.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
To delete a zone
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zone(s) of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The zone is marked
Delayed delete until it is no longer listed.
647
Managing DNS Zones
Granting access to a zone as a resource also makes every item it contains available. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
648
Chapter 44. Configuring DNS Zones
Like EfficientIP DNS servers, smart architectures and views, zones can be configured individually
from their properties page to set a series of behaviors for the records they contain.
Any configuration set at zone level overwrites what was set at server level, on physical servers
or smart architectures, and view level.
Note that some properties can be set on RPZ zones, as detailed in the sections Configuring
Delegation at Zone Level, Configuring DNS Notify Messages at Zone Level and Managing DNS
Security.
If, for any of these reasons, you could benefit from delegating zones, it might make sense to re-
structure your namespace by adding additional zones. When choosing how to structure zones,
you should use a plan that reflects the structure of your organization. When delegating zones
within your namespace, be aware that for each new zone you add, you need delegation records
(NS) in other zones that point to the authoritative DNS servers for the new zone. This is necessary
both to transfer authority and to provide correct referral to other DNS servers and clients of the
new servers being made authoritative for the new zone.
To make a server known to others outside of the new delegated zone, two RRs are needed in
the parent zone to complete delegation to the new zone. These RRs include:
• An NS record to effect the delegation. This RR is used to advertise that the server named is
an authoritative server for the delegated subdomain.
• An A record (also known as a glue record) is needed to resolve the name of the server specified
in the NS record to its IP address. The process of resolving the host name in this record to the
delegated DNS server in the NS record is sometimes referred to as glue chasing. In reality,
the A record is not required when it comes to configuring zones delegation; however, if you
add it, you save the DNS client some time as you give in one query the authoritative server of
the child zone and IP address. That way, there is no need to query twice to first get the server
and then its IP address.
649
Configuring DNS Zones
Configuring delegation only adds the NS record. For more details regarding the A record addition,
refer to the section Configuring the Delegation at Record Level.
In the parent master reverse zone, the classless in-addr.arpa delegation adds CNAME resource
records for each address you want to delegate. It also adds an NS record for each delegated
server. Note that the NS record of each delegated server can be added in a domain different
from in-addr.arpa using a suffix for the CNAME records value. For the reverse lookup to function
properly, the delegated server(s) should contain the PTR records associated with each address.
650
Configuring DNS Zones
9. In the field Specific suffix, specify the suffix of your choice. This suffix corresponds to the
domain in which you want to add the NS record. This suffix is added at the end of each of
the CNAME record you are adding.
10. Click on OK to complete the operation. The report opens and closes. There are as many
CNAME records as delegated addresses and as many a NS records as delegated servers.
In the column Value, each address is listed according to the format you chose, if you added
a suffix, it is visible in that column as well.
You can set a specific forwarding configuration for a zone belonging to a physical server
managed via a smart architecture. Keep in mind that:
651
Configuring DNS Zones
• When a forward mode is set on a smart architecture, you cannot set the forward mode to Default
on a zone belonging to a physical server managed via a smart architecture. You can only set
a different forward mode.
• Any configuration set at zone level overrides the view or server level configuration.
To revert the specific configuration and inherit it again, edit the Forwarding to untick the box
Overwrite the smart settings.
From the properties pages of a zone, you can set the notification configuration in the panel Notify.
It contains:
• The current configuration of the zone, the field Notify is either set to Yes, Explicit or No. It can
be inherited from the server or view.
• The statement Also-notify, which slave zones receive the notify messages. It can be inherited
from the server or view.
• The statement Allow-notify of the slave zones. It can be inherited from the server or view.
Note that this statement is implicitly set when you add a slave zone, when you set the Master
IP address of the slave zone you are allowing the master zones of this server to send notify
messages to your slave zone.
652
Configuring DNS Zones
Keep in mind that any configuration set at zone level overrides the configuration set at
server or view level.
6. If you selected Yes or Explicit, you can set the IP address and port of the server(s) which
slave zones should receive the messages:
a. In the field IP address, specify the IP address of another server.
b. In the field Port, you can specify which port number, on the specified server, should
receive the notify messages.
c. Click on ADD . The IP address and port number are moved to the Also-notify list as
follows: <ip-address> port: <port-number>.
Repeat these actions for as many servers as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on OK to complete the operation. The report opens and closes. Your notify and also-
notify settings are displayed in the panel Notify.
653
Configuring DNS Zones
6. If you selected Yes or Explicit, you can set the IP address and port of the server(s) which
slave zones should receive the messages:
a. In the field IP address, specify the IP address of another server.
b. In the field Port, you can specify which port number, on the specified server, should
receive the notify messages.
c. Click on ADD . The IP address and port number are moved to the Also-notify list as
follows: <ip-address> port: <port-number>.
Repeat these actions for as many servers as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
7. Click on NEXT . The page Allow-notify opens. It allows to specify if the slave zone can receive
master zones notification messages.
Using the drop-down lists Type and Restriction, you can grant or deny access to as many
networks, IP addresses, ACLs and keys as you need. Select a Type and complete the con-
figuration as follows:
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
654
Configuring DNS Zones
8. Click on OK to complete the operation. The report opens and closes. Your notify, also-notify
and allow-notify settings are displayed in the panel Notify.
You can configure the statement allow-query on all the zones of a specific server or view. For
more details, refer to the sections Restricting DNS Queries at Server Level and Restricting DNS
Queries at View Level.
You can configure the statement allow-query on multiple zones at once. For more details, refer
to the section Setting Authorizations.
Keep in mind that once the allow-query is configured at zone level, it overrides the config-
uration at server or view level.
655
Configuring DNS Zones
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
5. Click on NEXT . The page Allow-transfer opens.
6. Click on NEXT . The page Allow-update opens.
7. Click on OK to complete the operation. The report opens and closes. In the panel Access
control, your configuration is visible in the list Allow-query.
At zone level, you can edit the statement allow-transfer to specify which hosts, networks, or TSIG
keys are granted or denied the right to do transfers for all the zones it maintains.
• You can configure the allow-transfer authorization only for master and slave zones.
If you secured the exchanges between a DNS server and a SOLIDserver appliance, the
statement allow-transfer of its zones must allow access the same TSIG key. For more details,
refer to the section Securing the Management of DNS Servers Using a TSIG Key in the chapter
Managing DNS Servers.
• You can configure the statement allow-transfer on all the zones of a specific server or view.
For more details, refer to the sections Limiting Zone Transfers at Server Level and Limiting
Zone Transfer at View Level.
• You can configure the statement allow-transfer on multiple zones at once. For more details,
refer to the section Setting Authorizations.
• Once the allow-transfer is configured at zone level, it overrides the configuration set at
server or view level.
656
Configuring DNS Zones
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
6. Click on NEXT . The page Allow-update opens.
7. Click on OK to complete the operation. The report opens and closes. The parameters are
visible in the panel Access control, in the list Allow-transfer.
Dynamic update replaces or deletes records in a master server by sending it a special form of
DNS messages. The format and meaning of these messages is specified in RFC 2136 and indic-
ates which servers or clients are authorized to dynamically update the DNS master zones. By
default, all DNS update queries are rejected. Note that:
• You can only complete the master zones configuration from the GUI on EfficientIP and EfficientIP
Package servers.
• You cannot edit the statement allow-update of Generic servers from the GUI, it has to be done
locally.
• You cannot configure dynamic update on Microsoft servers as they do not support TSIG keys.
However you can configure them with secure dynamic update using GSS-TSIG keys. For more
details, refer to the section Configuring Secure Dynamic Update.
• You can configure the statement allow-update on multiple zones at once. For more details,
refer to the section Setting Authorizations.
657
Configuring DNS Zones
2. Configure the server for dynamic update. For more details, refer to the section Authenticating
the Zones Dynamic Update from the Server.
3. Configure the statement allow-update with the same TSIG key:
• If you edited the ACL admin of the server to include the TSIG key, the configuration may be
complete. By default, the statement allow-update of a physical server managed via smart
architecture is configured with the ACL admin and inherited by master zones.
• If you added an ACL that contains the TSIG key, you must edit the statement allow-update
and include the new ACL in the permissions.
• If you do not want to rely on ACLs, you must edit the statement allow-update and include
the TSIG key in the permissions.
Keep in mind that allowing updates based on the requestor IP address is insecure, we strongly
recommend using the TSIG key protocol filtering rather than an IP address based filtering.
Once a restriction or permission is configured as needed, click on ADD . The entry is moved
to the list ACL values. All denied entries are preceded by an exclamation mark (!). Keep in
mind that the entries order matters, each restriction or permission listed is reviewed following
the order you set. To order the entries, select them one by one and click on the arrows to
move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
658
Configuring DNS Zones
6. Click on OK to complete the operation. The report opens and closes. In the panel Access
control, your configuration is visible in the list Allow-update.
At zone level, configuring DNS sources allows to set physical interfaces that should be system-
atically used for all notify operations and zone transfer. DNS sources can be inherited from the
server and views or set for a zone. The inheritance details are visible the zones properties page.
Keep in mind that once the sources are configured at zone level, they override the config-
uration set at server or view level.
Keep in mind that once the sources are configured at zone level, they override the config-
uration set at server or view level.
659
Configuring DNS Zones
660
Configuring DNS Zones
Keep in mind that once the sources are configured at zone level, they override the config-
uration set at server or view level.
661
Configuring DNS Zones
to the alternate interfaces declared in IPv4 (Alt-transfer-source address) and IPv6 (Alt-
transfer-source address-v6).
b. In the field Transfer-source-v6 port, you can specify which port on the interface should
be used.
c. If you enabled the use-alt-transfer-source in the Sources panel, in the field Alt-transfer-
source-v6 address, specify the IPv6 address of the alternate interface. It must also be
configured on the appliance.
d. If you enabled the use-alt-transfer-source in the Sources panel, in the field Alt-transfer-
source-v6 port, you can specify which port on the interface should be used.
5. Click on OK to complete the operation. The report opens and closes.
662
Chapter 45. Managing DNS Resource
Records
The resource records belong to DNS zones. They usually belong to master zones and can be
replicated to slave zones if need be.
When you add a master zone, it automatically contains an SOA record and an NS record. This
NS is not generated until the server is synchronized.
From the page All RRs, you can manage resource records of many different types, all detailed
in the section Supported Resource Record Types.
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
If you added RPZ zones, their records; or rules, are listed on the page All RPZ rules. For more
details, refer to the chapter DNS Firewall (RPZ).
Resource records do not have a properties page, all their information is displayed in the list.
On the page All RRs, the columns allow you to know if you can edit a record or not.
663
Managing DNS Resource Records
A record name not underlined cannot be edited. Here, the record belongs to a physical
server managed via a smart architecture.
An underlined record name can be edited. You can click on it to open the edition wizard.
Here, the record belongs to a smart architecture, if you edit it the changes are pushed to
the physical server managed via the smart.
The SOA record is never underlined because, unlike other records, it cannot be edited from
the page All RRs.
This lock indicates that the server records cannot be edited. Here, the server listed is a
physical server managed via a smart architecture.
This button, when gray, indicates that you are displaying the records of smart architectures
and the physical server(s) they manages.
Some columns provide dedicated information regarding the records.You can display their Partial
RR name, value details, Class, class parameter details or even the Zone Type and/or View they
belong to.
664
Managing DNS Resource Records
Status Description
Delayed create The creation or update is delayed until the resource record is created on the physical
server(s) of the smart architecture. The creation is automatically done after a maximum
of 1 minute.
Delayed delete The deletion is delayed until the resource record is deleted from the physical server(s) of
the smart architecture. The deletion is automatically done after a maximum of 1 minute.
When you add master zones, the SOA record and an NS record are added automatically.
This NS is only generated after the server is synchronized. You can add other NS records in the
zone.
• Amazon Route 53 and Azure records have some prerequisites, specificities and limitations.
For details, refer to the sections Managing Amazon Route 53 Records and Managing Azure
Records of the chapter Managing DNS Servers.
• If you add records to a smart architecture managing server(s), the last page of the wizard returns
a warning message if any server does not support their type. You can force the addition to add
them to the server(s) that do support them.
665
Managing DNS Resource Records
666
Managing DNS Resource Records
Adding an A Record
The IPv4 Address (A) record maps a host name to an IPv4 address. It can be added to the page
All RRs of any Master zone. A single host can be mapped toward several A records, or IP ad-
dresses, that add an RRset. In this case, the DNS server responds to queries with all the addresses
defined but the order depends on the rrset-order statement of the server configuration file.
If you do not name an A record, it takes the same name as the zone it belongs to, which allows
DNS clients to find the IPv4 address of your host using only its domain name. This way, querying
the zone name example.com would be resolved immediately and provide access to your host
through its IP address.
667
Managing DNS Resource Records
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. In the drop-down list RR type, select AAAA.
6. In the field RR name, you can name your RR. The field Complete name auto-completes
and displays the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field IPv6 address, specify the IPv6 Address of the host.
9. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK. The RR name column displays its Complete name, the Value column
displays the host IP address you specified.
If you do not name an AAAA record, it takes the same name as the zone it belongs to, which allows
DNS clients to find the IPv6 address of your host using only its domain name. This way, querying
the zone name example.com would be resolved immediately and provide access to your host
through its IPv6 address.
668
Managing DNS Resource Records
669
Managing DNS Resource Records
6. In the field RR name, you can name your RR. The field Complete name auto-completes
and displays the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field Type specify the number, between 0 and 65535, that specifies the type of certi-
ficate. For more details, refer to the appendix DNS Resource Records Configuration Fields.
9. In the field Key tag, specify the certificate's key tag, a 16-bit value computed for the key
embedded in the certificate.
10. In the field Algorithm, specify the public key's cryptographic algorithm.
11. In the field Certificate or CRL, specify the certificate, encoded in base-64 format.
12. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
Keep in mind that each CNAME RR name is unique: you cannot have several records named
www in the same zone. Their complete name would be www.example.com and as the CNAME
is an alias, it should provide a link toward a canonical name that has not been declared in the
zone yet.
670
Managing DNS Resource Records
9. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
There should be as many hostname aliases as there are CNAME records in your zone.
Keep in mind that a DNAME record rewrites the subdomain suffix and applies to all its subdomains.
A DNAME record rewriting a query from support.company.com to support.company.corp also
applies to queries for fr.support.company.com or es.support.company.com . The DNAME config-
uration applies to any label located left of the specified domain name.
A zone configured with a DNAME has records that send back the proper information to DNS clients.
If the value of the DNAME is support.company.corp, there should be an A record, for instance,
named support.company.corp providing an IP address clients can reach.
Keep in mind that unlike a CNAME, the DNAME points a name and not to a record within the
zone.
671
Managing DNS Resource Records
You do not need to add a DNSKEY record if you signed zones from the GUI, it is added
automatically for each zone.
If you manage from the GUI an external DNS server that contains one or more zones already
signed with DNSSEC, you can add a DNSKEY record to each concerned zone. When the zone
signature is not performed using the appliance, SOLIDserver cannot push the DNSSEC keys to
the server and displays them like any other signed zone. Therefore:
• The DNSKEY record is not listed among the records of the zones.
• The DNSSEC keys of each zone are not listed on the page All DNSSEC keys.
• The zones are not displayed as DNSSEC compliant even though they are.
Adding a DNSKEY record can therefore ease up the zone management and ensure that the
zones you signed from another platform are marked yes in the column DNSSEC. For more details,
refer to the chapter DNSSEC.
To successfully add a DNSKEY record, you need the DNSKEY flags, protocol, algorithm and
key; all of which are available in txt file generated after the zone signature.
672
Managing DNS Resource Records
4. If custom classes are enabled at record level, in the list DNS RR class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. In the drop-down list RR type, select DNSKEY.
6. In the field RR name, you can name your RR. The field Complete name auto-completes
and displays the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field Flags, specify or paste the zone key flag.
9. In the field Protocol, specify or paste the protocol value.
10. In the field Algorithm, specify or paste the public key's cryptographic algorithm.
11. In the field Key, specify or paste the public key material.
12. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
Adding a DS Record
The Delegation Signer (DS) record is a DNSSEC that adds the chain of trust or authority from a
signed parent to a child zone. It can be used to verify the validity of the ZSK of a subzone. It is
composed of the parent zone key tag, key algorithm, digest type and digest itself. For more details,
refer to the section Managing DNSSEC on Authoritative Servers.
To add the DS records, refer to the section Publishing the Delegation Signer in the Parent Zone.
Keep in mind that if you name an HINFO record like an A or AAAA record, they are linked together
in the zone file and provide additional information when the domain name they share (an
identical Complete name in the GUI) is queried.
673
Managing DNS Resource Records
6. In the field RR name, you can name your RR. The field Complete name auto-completes
and displays the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. Next to the field CPU, select a CPU in the drop-down list. It is displayed in the field. If your
CPU is not listed, select Other in the drop-down list and specify your CPU in the field.
9. Next to the field OS, select an OS in the drop-down list. If your OS is not listed, select Other
in the drop-down list and specify your OS in the field.
10. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
The HINFO can also be used as a specific TXT record and contain other information.
Adding an MX Record
The Mail Exchanger (MX) record allows to set the name and relative preference of your mail ex-
changers, in other words, mail servers for the zone. Keep in mind that:
• An MX record should not point to a CNAME record, as detailed in section 10.3 of RFC
2181. Therefore, if you have a CNAME called mail for the zone example.com (its complete
name would be mail.example.com) and if one of your mail exchangers name is mail.ex-
674
Managing DNS Resource Records
ample.com, you need to remove the alias from the zone to be able to declare the mail exchanger
name in the MX record. To make the answer for the MX more efficient, you should also add
an A or AAAA record pointing to the IP address of the mail server.
• If the mail server stated in one of the MX records lies in the zone, you should add an A
record. This A record name becomes the mail server and its value becomes its IP address.
You can add as many MX records as you need in your master zones, it all depends on the
number of mail exchangers you want to declare.
675
Managing DNS Resource Records
Adding an NS Record
The Name Server (NS) record is used to list all the DNS name servers that have authority over
a zone. NS records must be declared both in the parent and the child zones. In the parent zone,
they indicate the zone authoritative server, in the child zone where they constitute the point of
delegation.
The requirement is that at least two name servers are defined for each public domain, so there
is at least two NS records in each zone. The first NS record, named after the zone is added
automatically when you add zones from the GUI to indicate the authoritative server; all other NS
records must be added manually following the procedure below.
We strongly recommend that you add an A record for each NS server to provide detailed inform-
ation to the domain name query. This process is called adding a glue record, that way once your
domain is queried, it can return its authoritative servers name and IP address.
Keep in mind that RFC 2181 stipulates that the NS record can point to other records but
never to a CNAME record as the query answer does not return an address with the NS record
and in some cases might make the query fail altogether.
676
Managing DNS Resource Records
4. If custom classes are enabled at record level, in the list DNS RR class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. In the drop-down list RR type, select NS.
6. In the field RR name, name your RR. The field Complete name auto-completes and displays
the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field DNS server, specify the DNS server hostname.
9. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
677
Managing DNS Resource Records
The PTR name is always displayed in the RR name column in reverse with the syntax
B4.B3.B2.B1.in-addr.arpa but it is treated like a name. Which is why it is possible to set IP ad-
dresses final section (B4) with a value that does not respect the IP protocol: a value greater than
255 in IPv4 and greater than ffff in IPv6. This lack of limitation in the interface provides an addi-
tional tool for specific configurations.
The PTR being used for reverse host name look ups, it does not make sense to name multiple
PTR records with the same name, i.e. same IP address. However, to provide reverse round-robin
configuration, you can set several IP addresses with different values. For more details, refer to
the section Load Balancing with Round-Robin.
678
Managing DNS Resource Records
6. Set the IP address in reverse via the field RR name or the field IP address. You must fill in
one of the two fields:
a. If you want to use the field RR name, you can type a number corresponding to the re-
maining section of the IP address of your choice. Filling in this field empties the field IP
address as only one of the two is required. The field Complete name auto-completes
and displays the RR full name as follows: RRname.reversezonename .
b. If you want to use the field IP address, the first sections of the IP address that you set
for the reverse zone is displayed, note that is not displayed in reverse. specify the
missing dot and final section of the IP address.The field Complete name auto-completes
and displays the RR full name as follows: RRname.reversezonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field Hostname, specify the hostname that should be returned when the IP address
you stated above is queried.
9. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
All the addresses used to name your PTR records provide as many entries toward the host names
of your choice in your reverse master zones.
679
Managing DNS Resource Records
11. Click on OK to complete the operation. The report opens and closes. The record is now listed
and marked OK.
This record only allows one piece of information per field, so if for instance you want to configure
a set of ports for one service, you can add several SRV records each with the same information
in all fields except the port, priority and weight.
680
Managing DNS Resource Records
Note that on Amazon Route 53 servers, any TXT containing characters considered invalid by
AWS are listed in the GUI but are never synchronized.
681
Managing DNS Resource Records
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. In the drop-down list RR type, select TXT.
6. In the field RR name, you can name your RR. The field Complete name auto-completes
and displays the RR full name as follows: RRname.zonename .
7. In the field TTL, specify an expiration time of the record in seconds. The default TTL for an
RR is 1 hour *. You can edit it if need be using the field on the left or one of the values listed
in the drop-down list on the right.
8. In the field Text, specify the text of your choice. This field text can contain a maximum of
2100 characters, including spaces.
9. Click on OK to complete the operation. The report opens and closes. The record is now listed
and its status is OK.
682
Managing DNS Resource Records
This record type is not obsolete, the SRV record can provide the same information.
From the list All RRs, you can differentiate the ones you can or cannot edit, refer to the image A
list of resource records above. For instance, the records of a physical server managed via a smart
architecture cannot be edited.
Note that SOA records cannot be edited like the other records: you can tick them to change their
TTL or value, but you cannot edit them individually from the page. For more details, refer to the
sections Editing Several Records at Once and Editing the SOA from the Zone Properties Page.
683
Managing DNS Resource Records
2. In the column Zone, click on the name of the zone of your choice to display the records it
contains.
3. In the column RR name, click on the name of the RR of your choice. The wizard Edit a DNS
RR opens.
4. If custom classes are enabled at record level, in the list DNS RR class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Edit, if need be, the values and TTL of the record following the table appropriate procedure
in the Adding Resource Records section above. The default TTL of an RR is 1 hour.
Keep in mind that if several records in a zone share the same name, editing the TTL on one
also edits the TTL on the records sharing that name.
6. Click on OK to complete the operation. The report opens and closes. The changes are visible
on the page.
You can tick several records and edit their Value. The wizard allows to replace existing values,
you can specify whole values or part of a value, for instance a domain name stated in all the re-
cords. Note that the wizard returns an error if you specify a value that does not exist.
684
Managing DNS Resource Records
8. Click on OK to complete the operation. The report opens and closes. The page refreshes,
the changes are visible in the list.
The SOA contains the zone's serial number, administrator email and configuration information
(refresh, retry, expiration...) all of which you can edit. Note that:
• You cannot rename an SOA, it is automatically named like the zone when you add it.
• The SOA also contains the name of the primary server, the DNS server that has authority over
the zone, but you cannot edit it.
To edit the TTL or Value of one or several SOA records, refer to the section Editing Several Re-
cords at Once.
685
Managing DNS Resource Records
Field Description
Minimum The negative caching period of the zone, in seconds. This period is used as TTL for
every NXDOMAIN returned to clients querying unexisting records.
TTL The TTL (Time to Live) of the SOA, its duration, in seconds. The drop-down list next
to the input field allows to select durations in human-readable format.
7. Click on OK to complete the operation. The wizard closes. The page refreshes, the changes
are listed.
Note that the primary NS record of a zone is generated once the server is synchronized and in-
dicates the authoritative server of the zone.
Delegating a sub-domain simply consists of adding both an NS and an A (or AAAA) RR in the
parent zone pointing to the sub-domain:
• The NS record indicates which servers are authoritative for the zone. You can also add addi-
tional NS records to delegate authority for the zone to other DNS servers.
• The A / AAAA record indicates the IP address of the server that has authority over the sub-
domain and therefore needs to be added in the RRs list of the parent zone.
Let's consider the zones efficientip.com and support.efficientip.com for the purpose of illustrating
the delegation configuration. The parent zone, efficientip.com, is managed through the server
ns1.efficientip.com and the child zone, support.efficientip.com, is managed through ns2.efficien-
tip.com . You need to add the relevant records in the parent zone. On the one hand, add the NS
record, name it support (it is then listed as support.efficientip.com as the RR name auto-completes
with the domain name at the end) and indicate the server that has authority over it in the adequate
field, in our case ns2.efficientip.com. On the other hand, add the A record named ns2 (once
again, its name auto-completes with the zone name and obtain the server actual name) and in-
dicate its IP address. That way, you should have two new records in the parent zone: an NS RR,
support.efficientip.com, pointing toward the delegated child zone and a glue A record, ns2.effi-
cientip.com.
686
Managing DNS Resource Records
7. In the field DNS server, specify the name of the server that has authority over the sub-domain.
8. Click on OK to complete the operation. The report opens and closes. The record is now listed
and marked OK.
Note that this option has nothing to do with the zones database replication of the DNS command
allow-transfer. Duplication and migration of a zone includes the records it manages.
To copy a record
1. In the sidebar, go to DNS > RRs. The page All RRs opens.
2. Tick the record(s) you want to duplicate.
3. In the menu, select Edit > Migrate. The wizard Copying/Moving RRs opens.
4. In the drop-down list Method, select Copy.
5. In the drop-down list Target server, select the server of your choice. The Target zone drop-
down list appears.
6. In the drop-down list Target zone, select the zone of your choice. If you added views in your
server, the zone is named zone (view).
7. In the drop-down list Existing records, choose if you want to overwrite RRs with the same
name. The wizard refreshes.
8. Click on OK to complete the operation. The report opens and closes. The page displays the
migrated record. Note that the complete name of the RR(s) in the column RR name is now
RRname.newzonename.
687
Managing DNS Resource Records
To move a record
1. In the sidebar, go to DNS > RRs. The page All RRs opens.
2. Tick the record(s) you want to move.
3. In the menu, select Edit > Migrate. The wizard Copying/Moving RRs opens.
4. In the drop-down list Method, select Move.
5. In the drop-down list Target server, select the server of your choice. The Target zone drop-
down list appears.
6. In the drop-down list Target zone, select the zone of your choice. If you added views in your
server, the zone is named zone (view).
7. In the drop-down list Existing records, choose if you want to overwrite RRs with the same
name.
8. Click on OK to complete the operation. The report opens and closes. The page displays the
migrated record. Note that the complete name of the RR(s) in the column RR name is now
RRname.newzonename.
For example, if you have three www servers with network addresses of 10.0.0.1, 10.0.0.2 and
10.0.0.3, a set of A resource records means that clients connect to each machine one third of
the time. When a resolver queries for these records, BIND rotates them and respond to the query
with the records in a different order. In the example above, clients randomly receive records in
the order 1, 2, 3; 2, 3, 1; and 3, 1, 2. Once the query is answered a first time with 1, the next client
querying the same name receives a different answer: 2; and so forth. There is no configuration
688
Managing DNS Resource Records
needed, the balancing is automatically activated if three different servers resolve to the same
domain name (to follow the example: www.yourdomain.com).
Note that if you configured the DNS advanced properties Add a PTR, a PTR record is added only
for the first A record you add.
SPF Record
Sender Policy Framework (SPF) is an email validation system designed to prevent email spam
by detecting email spoofing using the senders' IP address. SPF allows administrators to specify
which hosts are authorized, or not, to send emails from a given domain. Mail exchangers use
the DNS to verify that the host sending the email from a given domain is sanctioned by that do-
main's administrators. The SPF record is actually a single string of text found in the value of a
single TXT record.
In 2003, when SPF was first being developed, the requirements for assignment of a new DNS
RR type were considerably more stringent than they are now. In its review of the RFC 4408, the
IETF SPFbis working group concluded that its dual RR type transition model was fundamentally
flawed since it contained no common RR type that implementers were required to serve and re-
quired to check.
The Simple Mail Transfer Protocol allows any computer to send email claiming to be from any
source address. This is exploited by spammers who often use forged email addresses, making
it more difficult to trace a message back to its sender, and easy for spammers to hide their
identity in order to avoid responsibility. It is also used in phishing techniques, where users can
be duped into disclosing private information in response to an email purportedly sent by an or-
ganization such as a bank. SPF allows the owner of an Internet domain to specify which computers
are authorized to send mail with sender addresses in that domain. Receivers verifying the SPF
records may reject messages from unauthorized sources before receiving the body of the message.
The sender address is transmitted at the beginning of the SMTP dialog. If the server rejects the
sender, the unauthorized client should receive a rejection message, and if that client was a relaying
message transfer agent (MTA), a bounce message to the original sending address may be gen-
erated. If the server accepts the sender, and subsequently also accepts the recipients and the
body of the message, it should insert a field Return-Path in the message header in order to save
the sender address.While the address in the Return-Path often matches other originator addresses
in the mail header such as From or Sender, this is not necessarily the case, and SPF does not
prevent forgery of these other addresses.
689
Managing DNS Resource Records
This property must be set at server, view or zone level and propagated down to the records. For
more details, refer to the chapter Managing Advanced Properties in the section Configuring DNS
Advanced Properties.
An A, AAAA, CNAME or PTR record is added in the zone configured at network level. The new
record is named after the complete IP address name and zone name.
For more details, refer to the chapter Managing Advanced Properties in the sections Network
Advanced Properties and IP Address Advanced Properties.
Note that all DHCP to DNS properties rely on the IPAM and can only be configured if you set
IPAM to DNS and IPAM to DHCP advanced properties.
For more details, refer to the chapter Managing Advanced Properties in the section Configuring
DHCP Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Note that the stale records dynamically added via GSS-TSIG are automatically deleted if the
DDNS scavenging is enabled at zone level. Each deletion is logged on the page Syslog of the
module Administration. For more details, refer to the section Configuring Scavenging on DNS
Zones in the chapter Managing DNS zones.
690
Chapter 46. Implementing Dynamic
Update
Dynamic Domain Name Server (DDNS) is the system, detailed in RFC2136, through which IP
address assignment updates in the DHCP are immediately reflected in the DNS records for the
hosts. DDNS enables a DNS server to accept and receive an update every time a dynamic client
changes their IP address. Updating the DNS dynamically eliminates the need for an administrator
to manually set large numbers of records as authorized users can add, delete, and edit records
on the fly.
In the wrong hands, dynamic updates can open up your network to certain vulnerabilities as users
could update some or many of the records on a DNS server organization with incorrect information.
Which is why, within SOLIDserver, DDNS relies on the Transaction SIGnature (TSIG). Described
in RFC 2845, TSIG is based on the use of a symmetrical key, and we add one update key per
Efficient IP DNS server. That way, every transaction from DHCP servers to DNS servers is
automatically protected.
SOLIDserver supports both dynamic update via TSIG keys and secure dynamic update via
Generic Security Service Algorithm for Secret Key Transaction (GSS-TSIG) for DNS servers
serving Microsoft Active Directory clients.
You can configure your EfficientIP DNS server to authenticate your AD clients and grant or deny
them dynamic update rights on the master zone managing your AD server domain via the state-
ment update-policy. For more details, refer to the section Configuring Secure Dynamic Update.
You can configure dynamic update on all DNS servers except Amazon Route 53 DNS servers.
691
Implementing Dynamic Update
the server is set, you can configure the statement update-policy on the master zone managing
your AD domain to allow or deny dynamic update of your DNS server for AD users.
Prerequisites
• A windows Active Directory server porperly configured:
• Use an EfficientIP or EfficientIP Package DNS server, no need to rely on any Microsoft
Windows Server.
• With at least one user with sufficient DNS rights, able to generate GSS-TSIG keys. This user
must share the same name as your EfficientIP DNS server following the format my-ad-
user.my-ad-domain .
• At least one EfficientIP DNS server named after an AD user with sufficient DNS rights. The
server is named following the format my-ad-user.my-ad-domain .
The name of the DNS server can be set based on an existing user, or an AD user can be
named after the DNS server name. Either way, they must have the same name and that name
must include the full AD domain. For more details, refer to the procedure To add an EfficientIP
DNS server.
• The EfficientIP DNS server must contain a master zone managing your AD domain, so it named
with a format similar to my-ad-domain.corp . This master zone must be configured with 9 key
records (1 SOA, 2 A and 6 SRV) linking your AD server, AD domain and DNS server. For more
details, refer to the procedure To add a master zone.
• SOLIDserver and your AD server must be set at the same time.You should configure the same
NTP server on SOLIDserver and your AD server.
Limitations
• Secure dynamic update can only configured for EfficientIP or EfficientIP Package servers.
• For each physical DNS server there must be an AD user. Therefore, to configure secure dy-
namic update for a Multi-Master smart architecture, you need two AD users to generate the
GSS-TSIG key for the server named after them.
The zone configuration must contain the 9 records configured as detailed in the example below.
ad-domain.corp SOA TTL dns-server.ad-domain.corp X X X X X X dns-server.ad-domain.corp
A TTL IP ad-server.ad-domain.corp A TTL IP _kerberos._udp.ad-domain.corp SRV TTL 0 100
464 ad-server.ad-domain.corp _kerberos._udp.ad-domain.corp SRV TTL 0 100 88
ad-server.ad-domain.corp _kerberos._tcp.ad-domain.corp SRV TTL 0 100 464
692
Implementing Dynamic Update
Note that:
• These records can be added automatically, as detailed below.
• If you want to configure secure dynamic update on several AD domains, you must follow the
procedure for each of the relevant master zones.
c. Add the missing key records to the DNS server using the command below.
nltest /server:<ad-server-name>.<full-ad-domain> /dsregdns
The missing records link your AD server, AD domain and DNS servers.
4. Make sure the configuration is complete
a. Go back to SOLIDserver GUI.
b. In the sidebar, go to DNS > Zones. The page All zones opens.
c. Tick the zone managing your domain.
693
Implementing Dynamic Update
d. In the menu, select Edit > Status > Synchronize. The wizard Synchronization
opens.
e. Click on OK to complete the operation. The report opens and closes, the page reloads.
f. Click on the zone name, the page All RRs opens. The key records - 1 SOA, 2 A and 6
SRV - are listed and configured as expected.
5. If you want to configure secure dynamic update on several AD domains, you must follow the
steps 1 to 4 for each additional AD domain.
When the AD server, DNS server and master zone managing your AD domain are configured
properly, you can generate a GSS-TSIG key and upload it to SOLIDserver.
If you want to configure secure dynamic update on several AD domains, you must follow the
procedure for each of the relevant AD domains.
# <name> is the AD user sharing the same name as the DNS server. This user must be
used to generate all the GSS-TSIG you may need.
# <domain> is the full AD domain: domain.TLD .
# <password> is the password of the AD user specified.
# <encryption> is the encryption type: DES-CBC-CRC, DES-CBC-MD5, RC4-HMAC-NT,
AES256-SHA1, AES128-SHA1 or All.
5. Copy the file in the directory of your choice for the upload.
6. If you want to configure secure dynamic update on several AD domains, follow the steps 1
to 5 for each additional AD domain.
Each key must be generated using the same AD user.
Once you generated the key and saved it where you want, you must upload it to SOLIDserver.
Note that:
• SOLIDserver provides a page dedicated to All GSS-TSIG key. It details the key Name, Encryp-
tion Type and Encryption number in dedicated columns. You cannot edit the columns layout.
• If you want to configure secure dynamic update on several AD domains, you only need to
upload one GSS-TSIG key, even if you had to generate one key per AD domain. As they are
694
Implementing Dynamic Update
all configured with a single user, once you uploaded one key all AD domains are trusted for
dynamic update.
In the column Name, the uploaded key is displayed following the format declared during the
generation: DNS/<name>.<domain>@<domain> .
You can delete a GSS-TSIG key if you no longer use it on any server or zone. For more details,
refer to the section Disabling Secure Dynamic Update.
On the page All servers, the column Multi-Status indicates if the smart architecture has GSS-
TSIG enabled but there is no GSS-TSIG key configured on the physical server(s) it manages.
If you manage your physical server via a smart architecture, you must first enable GSS-TSIG on
the smart and then specify the .keytab file on the physical server.
To configure and specify the GSS-TSIG on a physical server managed via a smart
1. Enable GSS-TSIG on the smart architecture
a. In the sidebar, go to DNS > Servers. The page All servers opens.
b. At the end of the line of the smart server, click on . The properties page opens.
c. Open the panel GSS-TSIG using and click on EDIT . The wizard Edit GSS-TSIG
properties opens.
d. Tick the box Use GSS-TSIG.
e. Click on OK to complete the operation. The report opens and closes. In the panel, the
GSS-TSIG status is now Enabled. Now you must specify the GSS-TSIG key on the
physical server.
2. Specify the GSS-TSIG key on the physical server
a. In the sidebar, go to DNS > Servers. The page All servers opens.
b. At the end of the line of the physical server managing your AD domain, click on . The
properties page opens.
c. Open the panel GSS-TSIG using and click on EDIT . The wizard Edit GSS-TSIG
properties opens
695
Implementing Dynamic Update
If you manage your physical server outside a smart server, you must enable GSS-TSIG and
specify the GSS-TSIG on the EfficientIP DNS server itself.
Once you selected a keytab file on a physical server, the AD users can be authenticated, when
they query the AD domain. Now you need to configure the AD users permissions and restrictions
on the zone managing the AD domain.
On the page All zones, the column GSS-TSIG indicates if the zones are configured with a GSS-
TSIG key. The column has three possible values:
If your zone is managed via a view, SOLIDserver automatically adds the following policy:
grant "<view-name>" wildcard "*" ANY;
696
Implementing Dynamic Update
• If they suit your needs, we recommend that you configure the following update-policy entries:
1. Allow the AD server to edit the master zone managing your domain. That way the AD server
can advertise any hostname or IP address changes directly to the DNS server without con-
figuring dynamic update again. The final policy should look as follows:
grant "<server-name>$@<full-domain>" wildcard "*" ANY;
# In the GUI, this configuration is set as follows:
# Permission=grant, Identity=<server-name>$@<full-domain>,
# Matchtype=wildcard, Tname=*, RR type=Any
2. Allow Windows computers registered in the AD domain to add their A and AAAA records in
the zone.
grant "<full-ad-domain>" ms-self "<full-ad-domain>" specific A AAAA;
# In the GUI, this configuration is set as follows:
# Permission=grant, Identity=<server-name>$@<full-domain>, Matchtype=ms-self,
# Tname=<full-domain>, RR type=Specific, Selected type(s)=A, AAAA
Note that you can configure DDNS scavenging on GSS-TSIG zones to clean up the stale resource
records dynamically added via GSS-TSIG. For more details, refer to the section Configuring
Scavenging on DNS Zones in the chapter Managing DNS Zones.
697
Implementing Dynamic Update
Option Description
krb5-self Allows to define a rule based on Kerberos machine principal
(host/QDN@REALM). The record being updated matches the QDN part of
the Principal. The matching REALM must be specified exactly in the fields
Identity and Tname.
krb5-subdomain Allows to define a rule based on Kerberos machine principal
(host/QDN@REALM). The subdomain being updated matches the QDN
part of the Principal. The matching REALM is what is specified the field
Identity, or any subdomain of the specified Identity.
ms-self Allows to define a rule based on AD format principal (machine-
name$@REALM) to update machinename.realm in the DNS.The matching
REALM must be specified exactly in the fields Identity and Tname.
ms-subdomain Allows to define a rule based on AD format principal (machine-
name$@REALM) to update machinename.realm in the DNS.The matching
REALM is what is specified the field Identity, or any subdomain of the
specified Identity.
Tname A value to that applies the Matchtype subdomain, krb5-self, krb5-subdomain, ms-self or ms-
subdomain. The expected format is detailed above, with each Matchtype.
RR type The type(s) of records that the configuration applies to, either Specific or Any.
Specific The permissions of your choice for the record type A, AAAA, AFSDB,
CNAME, DNAME, HINFO, MX, NS, NSAP, PTR, SRV, TXT and/or WKS.
Select each type in the list Available types and click on . The record
type is moved to the list Selected type(s).
Repeat this action for as many record types as you need.
Any Allows to apply the configuration to all the update-policy record types, i.e.
A, AAAA, AFSDB, CNAME, DNAME, HINFO, MX, NS, NSAP, PTR, SRV,
TXT and WKS.
Once you configured the fields, click on ADD .Your update-policy entry is moved to the Update-
policy list. The page refreshes. Configure as many entries as you want.
To organize the list, use the buttons and . Each restriction or permission is reviewed
and processed following the order set in the list.
9. Click on OK to complete the operation. The report opens and closes. In the panel Access
control, the list Allow-update is now replaced by the list Update-policy.
Even if you do not configure any entry in the Update-policy list, once you click on OK ,
SOLIDserver automatically adds the entry grant "ipmadmin" wildcard "*" ANY; that allows it
to update your zone).
Each entry of the Update-policy list is listed on the page User tracking, in the column Description
as follows: DNS name: <name> Zone name: <name> Key: update-policy Value: <entry> .
Once you configured the update policy statement, all the AD users querying your DNS server
are authenticated by your AD server and only the allowed users can dynamically update the zone
managing your AD domain.
698
Implementing Dynamic Update
a. Go the page All GSS-TSIG keys to make sure you uploaded the proper .keytab file. If not,
upload it following the procedure in the section Generating and Uploading the GSS-TSIG
key.
b. Go to the properties page of the physical server managing the zone dedicated to your AD
domain, in the panel GSS-TSIG the .keytab file is displayed. If the file is not the correct one,
edit it following the procedure To configure a physical server with GSS-TSIG.
4. The DNS server name is the same as the AD user declared in the .keytab file.
The AD user that generated it on the AD server and the physical DNS server managing your
AD domain have the same name. If not, you might need to generate the .keytab file again
following the section Generating and Uploading the GSS-TSIG key. Then complete the phys-
ical server and zone configuration.
5. Your update-policy statement is properly configured. The order of the entries in the Update
policy list is important: each restriction or permission is reviewed following the order you set
in the list.
For more details, refer to the recommendations and procedure in the section Configuring your
Zone for Secure Dynamic Update.
Note that you cannot delete TSIG or GSS-TSIG keys if they are used. To delete them, you
must first disable dynamic update or secure dynamic update.
699
Implementing Dynamic Update
Once you cleared the content of the statement allow-update and checked the ACL configuration
of the server, you can remove TSIG keys following the section Deleting TSIG and GSS-TSIG
Keys.
Once you disabled dynamic update, you can delete the .keytab file following the procedure To
delete a GSS-TSIG key.
700
Implementing Dynamic Update
701
Chapter 47. DNS Firewall (RPZ)
A Response Policy Zone (RPZ) allows you to prevent DNS clients from accessing certain websites.
These zones allow to configure a DNS firewall on the server. When a client queries a domain,
subdomain or IP address listed in one of the RPZ zones, the server uses the configured response
policy to reply. This mechanism is similar to an email anti-spam blacklist.
An RPZ zone contains a set of resource records that associate domains, subdomains or IP ad-
dresses with specific response policies based on domain data feeds provided by an external
service or manually added by network administrators.
Malware
data feed
Dynamic policy
update
Forbidden request
RPZ allows setting up a granular approach as, instead of blocking an entire domain, you can set
exceptions or add individual response rules for each subdomain.
At zone level, RPZ allows to decide which queries get a specific response and which ones are
answered normally. Each zone contains rules that identify specific domain names or IP addresses
and set up redirection, NODATA, NXDOMAIN or PASSTHRU policies.
Prerequisites
1. Managing an EfficientIP DNS server or a BIND DNS server. For more details, refer to the
sections Managing EfficientIP DNS Servers and Managing BIND DNS Servers.
2. Adding at least one RPZ zone, as detailed in the section Adding RPZ Zones.
3. Adding rules to the zone to implement specific policies based on the queries, as detailed
in the section Managing RPZ Rules.
Limitations
• You can only implement the RPZ on BIND servers.
Within the GUI, this implies remotely managing a BIND server or adding an EfficientIP DNS
server. For more details, refer to the section Managing EfficientIP DNS Servers or Managing
BIND DNS Servers.
• You cannot add more than 32 RPZ zones:
702
DNS Firewall (RPZ)
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
RPZ zones are managed from the page All RPZ zones. Their content is managed from the page
All RPZ rules.
703
DNS Firewall (RPZ)
The column Order returns the position of the RPZ zone in the checking process, 0 being
the first zone to be checked. As soon as a domain name, IP address or name server is found
in one of the zones, its policies are applied and the following zones are ignored.
The page All RPZ rules details the zones content. All records, from the SOA and NS records,
to the policies configured via the rules.
Each zone configuration depends on the rules it contains. You can monitor the Status of each
one. For more details, refer to the section Understanding the RPZ Zone Statuses.
Delayed create The creation or update is delayed until the zone is created on the physical server(s)
of the smart architecture. The creation is automatically done after a maximum of 1
minute.
Delayed delete The deletion is delayed until the zone is deleted from the physical server(s) of the
smart architecture. The deletion is automatically done after a maximum of 1 minute.
704
DNS Firewall (RPZ)
Status Description
Timeout The zone is not available.
Not authoritative The zone configuration is incorrect, in the SOA another server was set as authoritative.
Refused The DNS server refuses the transfer between the current zone and the management
platform, check the parameter allow-transfer on the zone or server properties page.
No RR Only for forward zones. There is no RR to transfer for the zone.
N/A Only for Amazon Route 53 servers. The zone is not a Master or does not have a
TLD.
Moreover, the column Multi-status provides you with emergency, warning, critical, error or in-
formational messages regarding the compatibility with Hybrid. For more details, refer to the section
Understanding the Column Multi-Status.
For security reasons, we recommend that you avoid using an obvious RPZ zone name, such as
RPZ-List, which could indicate that RPZ is implemented. Keep in mind that:
• You can only configure RPZ on Name zones, it does not work on reverse zones.
• You can only configure RPZ on Master zones or Slave zones. Any other type of zone is ir-
relevant to the RPZ configuration.
• You cannot use the name of an existing zone when you add an RPZ zone, otherwise the
domain name that you use can no longer be resolved using DNS.
• The zone name is returned in the DNS answer when you set NODATA and NXDOMAIN policies.
• You cannot add more than 32 RPZ zones in one view or in one server if the server does not
contain any views.
• If you add an RPZ zone to a smart architecture managing server(s), the last page of the wizard
returns a warning message if any server does not support RPZ zones.You can force the addition
to add it to the server(s) that do support them.
705
DNS Firewall (RPZ)
17. Click on OK to complete the operation. The report opens and closes. The RPZ zone is listed
and marked Delayed create before being marked OK.
You can now add the rules it contains, as detailed in the section Managing RPZ Rules.
706
DNS Firewall (RPZ)
You can synchronize zones to force a retrieval of the latest changes and records.
You can also synchronize the entire content of a zone, rather than only the latest change. The
option Force full synchronization retrieves and uploads the complete content of a zone and resets
the serial number of the SOA of the zone.
Resetting the SOA serial ensures that the entire zone data is up to date. It can be useful if you
restored a server that you used to manage, as you might have a synchronization drift between
the data that SOLIDserver stored locally and all the changes that have been performed directly
on the server since you last managed it.
707
DNS Firewall (RPZ)
4. If custom classes are enabled at zone level, in the list DNS zone class select a class or
None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. The field Name and the box DNS firewall (RPZ) are grayed out. You cannot edit them.
6. In the drop-down list Overriding rule, select Given, Disabled, Passthru, Nxdomain, Nodata
or CNAME. For more details, refer to the section Overriding RPZ Rules.
7. Tick or untick the box Log RPZ operations according to your needs.
8. Click on NEXT . The next page opens.
9. In the list RPZ zones order, select one by one the zones and click on the arrows to move
them up or down to order them. Their order defines how they are sorted, from the first
one to the last one.
10. If you are configuring a Master zone, go to the next step.
If you are configuring a Slave zone, click on NEXT . The last page opens.
To add a master zone, configure the Master IP address, Port and TSIG key as detailed in
the procedure To add an RPZ zone.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
11. Click on OK to complete the operation. The report opens and closes.
Keep in mind that you can also edit an RPZ zone from its properties page panels:
• From Name servers, you can edit the Authoritative DNS servers. For more details, refer to
the section Configuring Delegation at Zone Level.
• From Notify, you can edit IP addresses that should be notified of any changes on the master
zone. For more details, refer to the section Configuring DNS Notify Messages at Zone Level.
• From Access control, you can set or edit allow-query, allow-transfer and allow-update options
on the zone. For more details, refer to the section Managing DNS Security.
You can order RPZ zones to set exceptions by placing zones configured by hand before those
automatically updated by a 3rd party provider, for instance.
In addition, rules within a same zone respect some precedence order. For more details, refer to
the section Understanding the RPZ Rules Order.
708
DNS Firewall (RPZ)
5. In the list RPZ zones order, the RPZ zones are sorted from the first one to be checked to
the last one.To order the zones, select them one by one and click on the arrows to move
them up or down .
6. Click on NEXT until you get to the last page of the wizard.
7. Click on OK to complete the operation. The report opens and closes. The RPZ zones position
is visible in the column Order.
Note that converting a slave zone to master adds an apex NS record to the new master zone.
During the conversion, you can keep or delete all the apex NS records of the former slave zone.
709
DNS Firewall (RPZ)
SOLIDserver automatically triggers the notification when you are Configuring DNS Notify Messages
at Zone Level, but you can force the notification for RPZ Master and Slave zones.
The option Force notify allows to send a notify, or also-notify, from the RPZ zone(s) you select.
Keep in mind that:
• The option uses the information of NS records named like the zone you select. Therefore, it
cannot work if the selected zone does not contain at least one NS record named after the zone
itself.
• The notify, and also-notify, can be inherited from the server or view. If the notify is disabled on
the zone, the option cannot be used.
To also force the record addition, refer to the section Forcing RPZ Zones Retransfer.
The option Force retransfer triggers the addition and update of the records, RPZ rules, present
in the RPZ Master zone(s), and their values, within the selected RPZ Slave zone(s). Note that:
• If your Slave zone contains more records than the Master zone, the option deletes the outdated
records.
• The option is taken into account immediately in the DNS database, but you need to synchronize
the zones to see them in the GUI.
To only update the values of the existing records of Slave zone(s), but not add new records, refer
to the section Forcing RPZ Zones Refresh.
710
DNS Firewall (RPZ)
From the page All RPZ zones, you can edit the zone Overriding rule to disable the policy of all
the rules it contains or to make them all respond to a specific policy different from the original
RPZ: <policy> they were added with.
You can set the Overriding rule when you add or edit RPZ zones. For more details, refer to the
section Overriding RPZ Rules.
On smart architectures, you can disable an RPZ zone. Once disabled, a zone is no longer
available and therefore its rules are longer applied.
Disabling an RPZ zone allows to maintain or edit its content without impacting the physical
server that manages it, it can be helpful if you intend to move or repair its managing server(s).
711
DNS Firewall (RPZ)
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
You cannot edit existing RPZ rules. You can only delete them. For more details, refer to the
section Deleting Rules.
You can add four different policies based either on the requested domain names (QNAME) or
on the requested IP addresses:
Redirection
The record RPZ: REDIRECT allows to define which domain or IP address should be redirected
toward a specific domain or IP address. You can set the following redirections:
• Domain > domain. The redirection source can be a domain name (QNAME) or a Name
Server Domain Name (NSDNAME).
• Domain > IP address.The redirection source can be a domain name (QNAME) or a Name
Server Domain Name (NSDNAME).
• IP address > domain.
• IP address > IP address.
NODATA
The record RPZ: NODATA allows to set a nodata response to a specific domain name
(QNAME), Name Server Domain Name (NSDNAME), IPv4 address, IPv6 address or Name
Server IP address (NSIP).
NXDOMAIN
The record RPZ: NXDOMAIN allows to set a denial of existence response to a specific domain
name (QNAME), Name Server Domain Name (NSDNAME), IPv4 address, IPv6 address or
Name Server IP address (NSIP).
PASSTHRU
The record RPZ: PASSTHRU allows to set an exception for a specific domain name (QNAME),
Name Server Domain Name (NSDNAME), IPv4 address, IPv6 address or Name Server IP
address (NSIP). The source you configure in the rule is identified to ensure it gets a DNS
answer that does not involve RPZ.
712
DNS Firewall (RPZ)
Note that:
• Upon addition, each RPZ rule has a TTL of 3600 seconds. Once the policy is applied, the TTL
automatically drops to 5 seconds, following BIND behavior.
• Adding an RPZ rule edits the server it belongs to. It adds the option response-policy to declare
that the server manages RPZ zones.
• You can monitor RPZ rules from the page Analytics via the RPZ data samples. For more details,
refer to the sections Monitoring DNS Servers from the Page Analytics.
DNS RECORD
ZONE
SERVER VIEW
RPZ RULE
ZONE
By default, the page All RPZ rules lists at least the SOA and NS record of each zone.
Table 47.3. The default columns on the page All RPZ rules
Column Description
Partial RR name The partial name of the rule. It is defined automatically when you add it.
DNS RR type The type of the resource record.
RR value 1 The value of the resource record: either the target domain name or IP address for redirection
rules, * for NODATA responses, . for NXDOMAIN responses and rpz-passthru for passthru
exceptions.
Status The RPZ rule status, either OK, Delayed create, or Delayed delete.
713
DNS Firewall (RPZ)
Delayed create The creation or update is delayed until the rule is created on the physical server(s)
of the smart architecture. The creation is automatically done after a maximum of 1
minute.
Delayed delete The deletion is delayed until the rule is deleted from the physical server(s) of the
smart architecture. The deletion is automatically done after a maximum of 1 minute.
Within each server, all RPZ zones and rules respect the following order:
1. The RPZ zones ordering matters
When a user queries a server that manages several RPZ zones, all the zones are reviewed
one after the other in the order you set. The first matching rule is used and the other zones
and rules are ignored. For more details, refer to the section Ordering RPZ Zones.
2. Within a single RPZ zone:
a. Rules respect a specific precedence. They are checked in the following order:
• QNAME rules (i.e. domain name based rules)
• IP based rules
• NSDNAME rules (i.e. name server domain name rules)
• NSIP rules (i.e. name server IP address rules)
b. Among name based rules, rules follow a specific order: Among applicable QNAME or
NSDNAME rules, the rule with the smallest name is preferred.
c. Among IP based rules, rules follow a specific order:
• Among applicable IP or NSIP rules, the rule with the longest prefix length is preferred.
• Among IP or NSIP rules with the same prefix, the smallest IP address is preferred.
You can also add RPZ rules based on IP addresses or name servers. For more details, refer to
the section Adding Rules Based on IP Addresses and Adding Rules Based on Name Servers.
714
DNS Firewall (RPZ)
You can either use a full domain name or specify some parts as variable, to include all the sub-
domains of a particular domain.
Table 47.5. Domain name possible syntax when adding an RPZ rule
Value Description
domain.extension The DNS client requesting this domain is redirected toward the domain name or IP
address of your choice.
*.domain.extension The DNS client requesting any matching subdomain is redirected toward the domain
name or IP address of your choice.
Note that the * (asterisk) is called the wildcard when used in front of a domain name.
<value>.domain.ex- The DNS client requesting this specific name is redirected toward the domain name
tension or IP address of your choice.
Each domain specific response is listed as a record RPZ: NODATA or RPZ: NXDOMAIN, depend-
ing on what you chose. Each domain exception is listed as a record RPZ: PASSTHRU.
You can either use a full domain name or specify some parts as variable, to include all the sub-
domains of a particular domain.
715
DNS Firewall (RPZ)
3. In the menu, click on Add. The wizard Add an RPZ Rule opens.
4. In the drop-down list Source, select Domain.
5. In the field Domain, specify the domain name of your choice, it should respect the following
syntax.
Table 47.6. Domain name possible syntax when adding an RPZ rule
Value Description
domain.extension The DNS client requesting this domain gets the Policy response of your choice.
*.domain.extension The DNS client requesting any matching subdomain gets the Policy response of your
choice.
<value>.domain.ex- The DNS client requesting this specific name gets the Policy response of your choice.
tension
You can also add RPZ rules based on domain names or name servers. For more details, refer
to the section Adding Rules Based on Domain Names and Adding Rules Based on Name Servers.
The details of RPZ rules based on IP addresses are managed using reverse:
IPv4 display
On the page All RPZ rules, the rules based on IPv4 addresses are displayed as follows:
<prefixlength.B4.B3.B2.B1>.
In the zone file, the rules based on IPv4 addresses respect the syntax: <pre-
fixlength.B4.B3.B2.B1.rpz-ip>.
IPv6 display
On the page All RPZ rules, the rules based on IPv6 addresses are displayed as follows:
<prefixlength.W8.W7.W6.W5.W4.W3.W2.W1>.
In the zone file, the rules based on IPv6 addresses respect the syntax: <pre-
fixlength.W8.W7.W6.W5.W4.W3.W2.W1.rpz-ip>.
On the page All RPZ rules, the column Partial RR name might contain .zz. for the rules configured
with IPv6 addresses. These letters assist the column filtering and represent the :: that you can
use when you add a rule to avoid specifying in full the omitted 0000: groups of the IPv6 addresses.
You can set up a redirection from a specific IP address or a range of IP addresses, like a network.
However, the redirection target can only be a specific IP address or domain name.
716
DNS Firewall (RPZ)
Each IP address specific response is listed as a record RPZ: NODATA or RPZ: NXDOMAIN,
depending on what you chose. Each IP address exception is listed as a record RPZ: PASSTHRU.
717
DNS Firewall (RPZ)
These rules can either identify the Namer Server IP Address (NSIP) or the Name Server Domain
Name (NSDNAME). Like the other rules, they allow to configure a redirection, an NXDOMAIN
or NODATA response or a PASSTHRU exception to any query made to any zone managed by
the Name Server.
Keep in mind that the rules based on Name Servers are reviewed last within the RPZ zone
records. Therefore, if for instance your Name Server manages a domain name or IP address
used in any passthru exception, this rule is found and applied even before reviewing any existing
rule based on the Name server. For more details, refer to the section Understanding the RPZ
Rules Order.
You can also add RPZ rules based on domain names or IP addresses. For more details, refer
to the section Adding Rules Based on Domain Names and Adding Rules Based on IP Addresses.
Keep in mind that the rules based on Name Servers are reviewed last within the RPZ zone records.
For more details, refer to the section Understanding the RPZ Rules Order.
718
DNS Firewall (RPZ)
Each Name Server specific response is listed as a record RPZ: NODATA or RPZ: NXDOMAIN,
depending on what you chose. Each Name Server exception is listed as a record RPZ:
PASSTHRU.
Keep in mind that the rules based on Name Servers are reviewed last within the RPZ zone records.
For more details, refer to the section Understanding the RPZ Rules Order.
719
DNS Firewall (RPZ)
The column Partial RR name displays the name server domain name followed by the suffix
rpz-nsdname. The column RR value 1 displays * for Nodata, . for Nxdomain or rpz-passthru
for Passthru.
Rules based on the source Other require to specify a partial record name that is automatically
completed with the zone name upon addition. The rule full name is displayed as follows: <partial-
rr-name>.<zonename>.
Keep in mind that there is no data consistency check for the advanced rules, so make sure the
rule you add is RPZ-compliant or set with the proper syntax.
720
DNS Firewall (RPZ)
You can override RPZ rules when you add or edit an RPZ zone. For more details regarding the
edition of RPZ zones, refer to the section Editing RPZ Zones.
1
For more details, refer to https://tools.ietf.org/html/rfc1034, on page 7.
721
DNS Firewall (RPZ)
Field Description
CNAME Applies a redirection to all the RPZ rules of the zone. Once selected, the field Domain appears,
specify the FQDN of your choice.
14. Click on OK to complete the operation. The report opens and closes. The selected overriding
rule is visible in the panel Main properties of the zone properties page.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting Rules
You can delete the RPZ rules of any zone.
722
DNS Firewall (RPZ)
723
Chapter 48. Hybrid DNS Service
SOLIDserver provides a Hybrid DNS service that reduces corruption risks for BIND DNS engines.
Hybrid DNS incorporates an alternative DNS engine based on NLnet Labs Unbound and NSD
engines that can automatically switch from standard BIND service to Hybrid if their configuration
is compatible.
Depending on your configuration, authoritative engines switch to BIND/NSD hybrid and re-
cursive engines switch to BIND/Unbound hybrid. Note that you cannot decide to switch to
NSD or Unbound, the switch is automatic and entirely dependent on the engine configuration.
Once the switch is complete, the DNS engine footprint is more complex to analyze and less prone
to malicious attacks as the DNS mechanism is different, it avoids BIND security flaws altogether.
Therefore, in the event of an attack or important security issue, the switch to Hybrid ensures data
security and avoids its potential corruption.
Keep in mind that Hybrid engines have some limitations compared to BIND engines.
Before switching, you need to understand that you cannot decide if your physical server switches
to BIND/NSD or BIND/Unbound. As a general rule, if your server is compatible with Hybrid, the
following switch occurs:
• If the smart server recursion is set to yes, a Hybrid compliant server can switch to
BIND/Unbound.
• If the smart server recursion is set to no, a Hybrid compliant server can switch to BIND/NSD.
On the page All servers, the columns Hybrid DNS compatibility and Forced Hybrid DNS
compatibility allow to see if you can switch your BIND physical servers. If they are managed by
a smart architecture, in the edition wizard you can also see in the field Compatible with a Hybrid
DNS Engine the Hybrid compatibility of the physical servers.
724
Hybrid DNS Service
In addition, on the pages All servers, All zones and All RRs, the column Multi-status returns all
the potential incompatibilities with Hybrid. For more details, refer to the section Understanding
the Column Multi-Status.
For more details on how to add and display customized list templates, refer to the section Managing
List Templates.
You cannot switch a physical server managed from a smart architecture to Hybrid if:
• On the page All servers, the smart architecture is marked No in the column Hybrid DNS com-
patibility.
You must change your configuration to match Hybrid requirements if you want to switch to Hybrid.
During the switch, SOLIDserver checks once more all the parameters to make sure that your
server is compatible once more.
If you want to have a complete list of all the parameters and options that need to be edited, refer
to the section Generating the Hybrid Incompatibilities Report below.
725
Hybrid DNS Service
3. In the menu, select Report > Hybrid DNS Engine incompatibilities. The wizard Hybrid
incompatibilities report opens.
4. In the Report format list, select HTML or PDF.
5. Click on NEXT . The last page of the report opens.
6. In the drop-down list Action, select Generate new data, Schedule the report or a former report,
they are listed using their date and time. By default, Generate new data is selected.
a. If you leave Generate new data selected, a report of all to the incompatibilities with Hybrid
is immediately generated.
b. If you select Schedule the report, you can configure the frequency at which all the reports
are generated.
Once you generated the report, you must review and correct all the parameters it contains that
are not compatible with Hybrid until your smart architecture is marked compatible. You can gen-
erate as many reports as you need.
726
Hybrid DNS Service
Once the physical server is Hybrid compliant, on the page All servers, the column Hybrid DNS
compatibility is marked Yes and, in the smart architecture edition wizard, the field Compatible
with a Hybrid DNS Engine is also marked Yes.
The smart architecture can contain one or several BIND servers that you can all switch. Keep in
mind that, if you only switch one server, the other servers share the same limitations that the
Hybrid servers. So, before switching to Hybrid you should probably make sure that none of its
limitations prevent you from using your server with all the parameters you usually need. For more
details, refer to the section Hybrid DNS Engines Limitations.
In some rare cases, you might have a Hybrid server listed among your servers outside a smart
architecture. As you cannot manage a Hybrid server outside a smart architecture, you need to
switch it to BIND, add it to your smart architecture and then switch it again to Hybrid. For more
details, refer to the procedures To switch a physical server from Hybrid to BIND DNS and To
switch a physical server from BIND to Hybrid DNS.
Your server configuration switches to Unbound or NSD on its own, based on its configuration.
Once the switch is complete, the compatibility with Hybrid is forced: this implies that a set of
configurations can no longer be set. For more details regarding NSD or Unbound specificities
and limitations, refer to the sections The Server Switched to NSD and The Server Switched to
727
Hybrid DNS Service
Unbound below. As for the Hybrid limitations in general, refer to the section Hybrid DNS Engines
Limitations.
To display the Hybrid engine the server switched to in the DNS module
1. In the sidebar, go to DNS > Servers. The page All servers opens.
2. In the column Version, the engine and version are displayed.
Like any other server, you can check on a Hybrid server from the columns Status and Sync. For
instance, make sure that the smart architecture can push your configuration on the physical
server, if not the smart is marked Locked synchronization. For more details regarding this status,
refer to the section Handling the Status Locked Synchronization.
To display the Hybrid engine the server switched to in the Administration module
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section System, click on Services configuration. The page Services configuration
opens.
3. Next to the DNS server, the engine that runs is indicated between brackets.
From the Services configuration page, you can enable, disable, stop and start the Hybrid DNS
server. For more details, refer to the section Handling Services.
In the same way, from this page you can download the NSD or Unbound configuration file de-
pending on which one is running. For more details, refer to the section Downloading a DNS or
DHCP Configuration File.
However, you should be aware of a set of NSD engines specificities and limitations that shape
the configuration that you can or cannot set from the GUI.
728
Hybrid DNS Service
• The allow-transfer and allow-notify clauses set on your BIND server are converted as follows
after a switch to NSD:
• If the allow-transfer clause is not specified at server or zone level, a default configuration is
pushed on the NSD server to allow any user to transfer master and slave zones via AXFR.
• If the allow-notify clause is not specified at server or zone level, the clause value on the NSD
server is set to respect BIND default behavior and allow proper synchronization of the master
and slave zones.
• NSD supports all the RRL settings except the Log only option. For more details, refer to the
section Limiting the Number of Responses of a Server.
729
Hybrid DNS Service
• You cannot integrate Cisco Umbrella on Hybrid servers. For more details, refer to the section
Integrating Cisco Umbrella in the chapter Configuring DNS Servers.
• You cannot forward the client IP address on Hybrid DNS servers. For more details regarding
client IP address forwarding, refer to the section Forwarding the Client IP Address in the chapter
Configuring DNS Servers.
Note that Hybrid DNS servers can only assume a limited number of roles within the architecture:
730
Hybrid DNS Service
Table 48.2. Possible role of a physical server within a smart architecture per vendor
Physical server vendor
Role a
Hybrid DNS Amazon
EfficientIP Microsoft Generic Azure
NSD Unbound Route 53
Master X X X X X X X
Slave X X X X
Hidden-Master X X X
Pseudo-Master X X X X X
a
EfficientIP and EfficientIP Package servers
731
Hybrid DNS Service
6. Click on OK to complete the operation. The report opens and works until the relevant DNS
service restarts. The physical server Status is OK and its Version indicates it switched
to BIND.
Once you switched a Hybrid server engine to BIND, the option Force Hybrid DNS compatibility
is still enabled. To be able to configure the BIND server without the Hybrid limitations, you must
edit the smart architecture and untick the box.
732
Chapter 49. DNSSEC
Domain Name System Security Extensions (DNSSEC) is used to strengthen DNS protocol security.
It controls the integrity of all DNS answers and ensures that client queries are answered by the
proper zone.
By providing origin authentication, it protects the DNS information exchanged between name
servers configured with DNSSEC. Within SOLIDserver, it can only be configured on EfficientIP
servers and smart architectures managed via SSL, you cannot configure it on other DNS vendors.
DNSSEC ensures data protection from one signed zone to the other, whether the answer is
successful or not:
1. DNS data in each zone is cryptographically signed with a couple of public and private Zone
Signing Keys (ZSK) that validate the integrity of the data of each zone. As a result:
a. Every RRset of the zone is assigned a new RRSIG record that includes its own signature.
b. The public key is then provided to the resolver or application that validates the integrity of
the received RR. The integrity is provided by a chain of trust starting with the public key of
a trust anchor.
2. NSEC3 records are generated for each RRset, thus creating an organized chain of all the
RRs of the zone that provides an authenticated denial of existence. If the data is supposed to
be located in an area of the zone where another RR is located, it means that it does not exist.
3. Delegated zones are part of a chain of trust that ensures that every zone is recognized as
legitimate by its parent zone. To implement the security of that relation, each delegated zone
ZSK is signed at the parent zone level thanks to a couple of cryptographic Key Signing Keys
(KSK) and a Delegation Signer (DS).
hash
comparison
Trust Anchor
.com .com
SOA KSK DNSKEY
DNS DNSSEC
NS DS
resolver validator
hash
comparison
.domain.com .domain.com
SOA KSK DNSKEY
Keep in mind that DNSSEC does not protect whole servers, it only protects the data exchanged
between signed zones.
Once DNSSEC is configured, the DNS packages sent and received often exceed 512 bytes, so
we recommend configuring EDNS to extend the size of your DNS messages. For more details,
refer to the section Configuring EDNS Options at Server Level.
Note that even signed zones can be exported from the page All zones. For more details, refer to
the chapter Exporting Data.
733
DNSSEC
domain.com
RRSIG
Public key
of the KSK
One ZSK is active right away and the other is added to replace the first one when it expires
or in case of problem.
• One Key Signing Key (KSK), to protect the ZSKs. It is active right away. The KSK validation
process is the following:
.com
is the DS
RRset valid?
DS
The response is verified
verified? The hash values match
and the DS RRset is valid
same
hash? The response is not verified
The hash values do not match
domain.com and/or the DS RRset is not valid
KSK DNSKEY
Once generated, you can manage these keys. For more details, refer to the section Managing
DNSSEC Signing Keys.
DNSSEC records
• The DNSKEY or Domain Name System KEY. This record contains the public key data of
the zone and is used to generate the zone public cryptographic keys, its ZSKs and KSK,
it signs and authenticates RRsets.
The DNSKEY is used by DNSSEC clients during the authentication process, it validates
the signatures. Three DNSKEY records are generated every time a zone is signed, one
for each signing key. The hash of each DNSKEY is compared with the hash of the corres-
ponding RRSIG to ensure that the RRset has not changed.
If you did not sign zones from SOLIDserver, you might need to add DNSKEY records, for
more details refer to the section Adding a DNSKEY Record.
734
DNSSEC
In case of unexpected KSK change, you might want to manually add CDNSKEY records
to inform the parent zone of these changes. For more details, refer to the table DNSSEC
resources records configuration fields in appendix.
• The RRSIG or Resource Record SIGnature.This record stores the digital private signatures,
it signs each set of RR of a zone. It does not sign individual records.
The RRSIG guarantees secure DNS operations, its hash is compared with the hash of the
DNSKEY to ensure that the RRset has not been changed.
• The NSEC, NSEC3 and NSEC3PARAM records. These records significantly extend zone
files.
NSEC or Next SECure. This record provides authenticated denial of existence for the re-
cords as it points to the next valid host name in the zone for each record. If the requested
name is not returned, it does not exist.
NSEC3 or NSEC version 3. This record was designed because NSEC records can help
map out the content of the zone. It hashes each label to prevent enumeration.
NSEC3PARAM or Next Secure 3 Parameter. This record assists the authoritative server
handling client requests. Thanks to it, they can calculate hashed owner names and choose
which set of NSEC3 records are included in the negative responses.
• The DS, or Delegation Signer. This record is used to secure delegations between a zone
and a subzone. In a parent zone, the DS stores the key tag, algorithm number and a digest
of the DNSKEY of its child zone. Both records allow DNSSEC resolvers to authenticate
the validity of a subzone. Therefore, once you signed a subzone, you must publish the DS
information in the parent zone to make sure it is integrated to the Chain of trust. For more
details, refer to the section Publishing the Delegation Signer in the Parent Zone.
In case of unexpected KSK change, you might want to manually add CDS records to inform
the parent zone of these changes. For more details, refer to the table DNSSEC resources
records configuration fields in appendix.
domain.com
RRSIG
Public key
of the ZSK
Once DNSSEC is configured, the DNS packages sent and received often exceed 512 bytes, so
we recommend configuring EDNS to extend the size of your DNS messages. For more details,
refer to the section Configuring EDNS Options at Server Level.
Signing a Zone
You can sign zones from the page All zones. It automatically generates the relevant signing keys
and records.
735
DNSSEC
Private
ZSK
Hashing Encoding
RR A RR A
RRSIG
ZSK DNSKEY
ZSK DNSKEY KSK DNSKEY
KSK DNSKEY
Hashing Encoding RRSIG
Private
KSK
736
DNSSEC
To sign a zone
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. Tick the zone(s) you want to sign.
3. In the menu, select Tools > DNSSEC > Sign zones. The wizard Signing zones opens.
4. Configure the ZSK, either use existing keys or generate a new one.
a. To use existing keys, tick the box Use existing ZSK(s). Two lists appear.
5. Configure the KSK, either use existing keys or generate a new one.
a. To use existing keys, tick the box Use existing KSK(s). Two lists appear.
b. To generate a new KSK, configure the fields according to your needs. Keep in mind
that your KSK value is probably set by your parent zone.
737
DNSSEC
b. To set up an SNMP Trap, tick the box. The related fields appear. All the fields are
compulsory, except the last one.
8. Click on OK to complete the operation. The report wizard opens and closes.
On the page All zones, in the column DNSSEC, the zone is marked yes.
738
DNSSEC
On the page All DNSSEC keys, in the column Status, the keys generated for the zone(s)
are marked Enabled. In the column Life span you can see which keys are active.
When the zone is signed, it contains DNSSEC records that hold the information of the Trust anchor
of the root zone ".". Therefore, your zone can be included in the chain of trust.
If you signed a subzone, you need to publish the DS record as detailed in the section below.
Without the DS pointing to the right subzone, DNSSEC resolvers cannot authenticate the subzone
as part of the chain of trust and clients cannot access it.
zone .com
security point of entry
zone domain.com
All the zones signed with SOLIDserver use the information of the trust anchor of the zone root
".". Therefore, you need to publish the DS of a subzone if its parent zone was signed, and
only in this case.
Note that if you added a trust anchor for a delegation of private zones, you also need to publish
your DS in the signed parent zone. For more details, refer to the section Adding a Trust Anchor.
739
DNSSEC
2. If you manage the parent zone, add a DS with that information in the parent zone.
If you do not manage the parent zone of the subzone you signed, copy the entire line of the
DS record that suits your needs, paste it in the appropriate file and send it.
Note that:
• You cannot add a DS record in a parent zone if the subzone you are delegating does not
contain a DS and a NS record named like the subzone. For more details, refer to the section
Adding an NS Record.
• If your parent zone supports it, you can also add a CDS record to let the parent zone retrieve
information and be informed of any changes. For more details, refer to the table DNSSEC re-
sources records configuration fields in appendix.
740
DNSSEC
Once the parent zone contains a DS record for each child zone, the chain of trust includes both
the zone and all its delegated subzones.
Two Zone Signing Keys (ZSK) are generated every time you sign a zone to protect it, one is
active right away and the other is ready to replace the first one. You can use existing ZSKs to
sign other zones. You can revoke, disable, enable, delete and clean expired ZSKs.
One Key Signing Key (KSK) is generated every time you sign a zone to protect the ZSKs. You
can use existing KSKs to sign other zones. You can generate, revoke, disable, enable, delete
and clean expired KSKs.
For both key types, you must monitor and execute the key rollover whenever necessary. It
ensures the security of your DNSSEC zones.
• The ZSK rollover is automatic and relies on the two keys generated when you sign a zone.
If you suspect a ZSK is compromised you can force an earlier check and generate a new key
if relevant. For more details, refer to the section Executing a ZSK Rollover.
• The KSK rollover is manual. Only one key is generated when you sign a zone, so you must
generate a new one to replace the one protecting the ZSKs of a zone when it expires or if you
suspect it is compromised. For more details, refer to the section Executing a KSK Rollover.
By default, all columns are displayed on the page. They return the keys Name, Type, Encryption
type and Key tag.
741
DNSSEC
Any user can change the column layout of the page via the button List template, on the right-
end side of the menu. Only users of the group admin can add or edit list templates. For more
details, refer to the section Managing List Templates.
Zone signing
ZSK 0
published and active inactive key deletion
It is deleted The inactive ZSK is deleted from the
from the GUI DNS after one third of its lifespan
but remains
in the DNS
All keys are listed on the page All DNSSEC keys. Inactive ZSKs are automatically deleted from
the GUI, but remain in the DNS for one third of their lifespan before being deleted from the DNS
as well. These inactive keys are kept in the DNS because that information has been cached by
other servers. Therefore, the information of the inactive ZSK is still used to secure the records,
unless you edited them after the activation of the new ZSK. Once the ZSK is deleted from the
DNS, all the records are automatically signed again using the currently active ZSK.
742
DNSSEC
Even if the ZSK rollover is automatic on signed zones, you can force an earlier check if you
suspect they are compromised.
The option Force automatic ZSK rollover allows to make sure that the selected ZSK is not com-
promised or soon to expire. If it is the case, a new one is generated to replace it.
If a key is compromised you must revoke it, for more details refer to the section Revoking a ZSK.
The KSK rollover is manual, so the option KSK rollover is all the more useful.
KSK
KSK t+1
1 2 3 4 5 6 7 8 9 10 11 12 13 14
months
If a KSK is compromised, you must revoke it. For more details, refer to the section Revoking a
KSK.
743
DNSSEC
To properly enable the rollover of the KSK and protect the ZSKs of your zone you must:
1. Generate a new KSK.
2. Publish the Delegation Signer (DS) that signs the new KSK in your parent zone.
We strongly recommend setting an alert to be notified when the KSK you generate is about to
expire, using the column Time left for instance. For more details, refer to the section Managing
Alerts.
If you manage the zone on several servers, you may need to sign the zone on these servers
using the generated KSK. For more details, refer to the section Signing a Zone With an Additional
KSK.
d. Click on OK to complete the operation. The report wizard opens and closes.
3. Publish the DS of the new KSK in the parent zone
a. In the breadcrumb on the right of All zones, click on to display additional pages.
b. Click on All DNSSEC keys. The page opens.
c. At the end of the line of the new KSK, click on . The properties page opens.
d. In the panel DS, copy the content of the list DS.
e. Transmit the DS to the parent zone. For more details, refer to the precedure To publish
the DS information of a subzone in its parent zone.
Some parent zones may also require the DNSKEY record of the new KSK.
744
DNSSEC
Revoking a KSK
If a KSK is compromised you should revoke it. Revoking a KSK invalidates its corresponding
DNSKEY record for the zone and can protect it from attacks.
Note that you cannot revoke a KSK if it is the only one protecting the ZSKs of a zone, it
would break the chain of trust and prevent from successfully querying your zone records, the
zone would be invalidated.
To revoke a KSK
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. In the breadcrumb on the right of All zones, click on to display additional pages.
3. Click on All DNSSEC keys. The page opens.
4. Generate a new KSK
a. Make sure that you have another KSK, a valid one, protecting the zone and that you
notified the parent zone.
b. If you do not have two KSKs attached to the zone listed on the page or if you have not
notified the parent zone of the new KSK generation, refer to section Generating a New
KSK.
5. Revoke the compromised KSK
a. Tick the KSK of your choice.
b. In the menu, select Edit > Revoke KSK Keys. The wizard Revoking Key Signing
Keys opens.
c. Click on OK to complete the operation. In the column Type, the KSK is now marked
KSK (invalidated) but its Status is still Enabled.
The KSK that now protects the zone is edited:
• Its Start date now matches the time and date of the revocation.
• Its Validity and Time left evolve to protect the zone until the intended End time and
date of the KSK you revoked.
Revoking a ZSK
If a ZSK is compromised, you must revoke it. As there are two ZSKs protecting a signed zone,
revoking a ZSK triggers the following behaviors:
• If the active ZSK is revoked
1. The revoked ZSK is deleted from the GUI and the DNS database.
2. The published ZSK is activated to replace it. The new ZSK lasts longer that the initial time
configured when you signed the zone: it lasts for the remaining time of the revoked key plus
it own lifespan.
3. Another ZSK is generated and published. It lasts as long as the active ZSK. When the active
ZSK expires, it replaces it, this time it lasts for the initial period configured when you signed
the zone.
745
DNSSEC
ZSK revocation
ZSK n
published Immediate deletion
and active The ZSK is deleted from
the GUI and the DNS
ZSK n+1
published active key deletion
The published ZSK is activated. It stays
active for the remaining lifetime of
the revoked ZSK and its own lifespan.
Figure 49.10. The mechanism when you revoke the active ZSK
ZSK n
published and active key deletion
ZSK revocation
ZSK n+1
published Immediate deletion
The ZSK is deleted from
the GUI and the DNS
Figure 49.11. The mechanism when you revoke the published ZSK
To revoke a ZSK
1. In the sidebar, go to DNS > Zones. The page All zones opens.
2. In the breadcrumb on the right of All zones, click on to display additional pages.
3. Click on All DNSSEC keys. The page opens.
4. Tick the ZSK(s) of your choice.
5. In the menu, select Edit > Revoke ZSKs. The wizard Revoking ZSKs opens.
6. Click on OK to complete the operation. The wizard closes and the page refreshes.
If your revoked an inactive key, it is replaced by a new key with a different Key tag and the
same Start and End dates.
If you revoked an active key, it is replaced by the inactive key and a new one is generated
to replace it when it expires.
746
DNSSEC
By default the generated ZSKs and KSKs are enabled, this does not mean that they are currently
used to protect the zone. In the column Life span, you can see that the KSK and one ZSK is
active, inactive keys are marked Not started yet.
To avoid breaking the chain of trust before disabling a KSK or ZSK you should:
• Make sure the key is inactive, and not currently used to sign any zone.
• Make sure another key is ready to protect the zone. Two ZSKs are generated when you
sign a zone, however you might need to generate a new KSK for the zone(s), before disabling
a KSK. For more details, refer to the section Generating a New KSK.
747
DNSSEC
748
DNSSEC
After generating a KSK for a zone, the additional KSK automatically signs the zone.You can sign
the zone on all other servers with this additional KSK. Keep in mind that:
• You can only protect a signed zone with a KSK generated for a zone with the same name.
• You can select several zones if they have the same name.
Unsigning a Zone
You can unsign zones to stop using DNSSEC to secure your DNS organization.
Unsigning a zone disables DNSSEC for a zone. Note that disabling DNSSEC on a zone is different
than disabling the signing keys of a zone. For more details, refer to the section Disabling Signing
Keys.
749
DNSSEC
Once a zone is unsigned, its signing keys are still listed on the page All DNSSEC keys and can
be used to sign the zone again.
Within SOLIDserver, you can enable DNSSEC validation, manage the trust anchors and disable
the validation.
You can set Efficient DNS servers and smart architectures as DNSSEC resolvers and as-
sociate them with a trust anchor.
The chain of trust ensures that clients are directed to valid zones. All queries and answers are
signed and compared at every DNS lookup node to authenticate the exchange and make sure
that both sides can be trusted. That way, at all relevant levels, a verified encrypted signature
provides validating resolvers with the correct path to secured zones and prevents directing clients
toward bogus IP addresses. This validation can be set all the way up to the TLD.
The starting point of the chain of trust is the trust anchor. Once configured on a validating resolver,
it allows the resolver to validate the integrity of the records sent by DNS clients and ensure the
chain of trust between a zone and its parent. Therefore, a zone or subzone has to be secured
750
DNSSEC
before being linked to the secured zone it is a delegated from. The trusted anchor of the parent
zone then covers the secured child zones that are delegated from it.
.com zone
security point of entry
.domain.com zone
751
DNSSEC
hash
Trust Anchor
comparison
.com
KSK DNSKEY
DNSSEC
validator DS
DNS client hash
comparison
.domain.com
KSK DNSKEY
Once DNSSEC is configured, the DNS packages sent and received often exceed 512 bytes, so
we recommend configuring EDNS to extend the size of your DNS messages. For more details,
refer to the section Configuring EDNS Options at Server Level.
You can add trust anchors, use one trust anchor on several resolvers and delete them.
752
DNSSEC
All trust anchors have a unique Name on the page All DNSSEC keys. By default, ICANN trust
anchors are available on the page.
If a local trust anchor is available, it is used to verify the zone without comparing the KSK protecting
the zone against all its signed parent zone.
is the DS
RRset valid?
DS
verified?
same
hash?
KSK DNSKEY
753
DNSSEC
b. In the field Key, paste the trust anchor information you just retrieved.
c. Click on OK to complete the operation. The trust anchor is now listed on the page All
DNSSEC keys. In the column Zone, the name of the zone it was retrieved from is listed.
6. Now you must add the trust anchor to the resolver managing your zones as detailed in the
procedure To enable DNSSEC validation.
Once the validation is disabled, the server is no longer part of the chain of trust of the trust anchor.
Both the server and the trust anchor information are updated.
754
DNSSEC
3. In the panel DNSSEC, click on EDIT . The wizard Edit DNSSEC properties opens.
4. Untick the box Use DNS as DNSSEC resolver. The wizard refreshes and no longer displays
the lists Available Trust Anchor and Configured Trust Anchors.
The box is not available for servers managed via a smart architecture, in this case to untick
the box you must edit the smart architecture.
5. Click on OK to complete the operation.The wizard closes. In the panel DNSSEC, the DNSSEC
resolution is now Disabled and the list Trust Anchors is empty.
On the page All servers, in the column DNSSEC the server is now marked No.
On the properties page of the trust anchor, in the panel DNS servers using this trust anchor
no longer lists the server.
755
Chapter 50. Monitoring and Reporting
DNS Data
SOLIDserver provides a set of tools to monitor DNS servers and generate reports.
• The alerts that you can set on the DNS pages allow to customize your monitoring. For more
details, refer to the chapter Managing Alerts.
• A set of statistics are available in dedicated panels of the properties page of DNS servers, as
detailed in the section Monitoring DNS Servers from their Properties Page.
• A set of data sampling analytics are available on the page Analytics, as detailed in the section
Monitoring DNS Servers from the Page Analytics.
• A couple of tools allow to monitor a DNS server querylog and answerlog, as detailed in the
section Monitoring DNS Queries and Answers.
• A number of reports on servers, views and zones are available, as detailed in the section
Generating DNS Reports.
Note that you might have additional panels called Guardian - <data> on the properties page, if
you have enabled DNS Guardian on your appliance. For more details, refer to the part Guardian.
756
Monitoring and Reporting DNS Data
• The panels can be displayed on any dashboard, like the other gadgets. For more details, refer
to the section Assigning a Chart on a Properties Page as Gadget.
By default, on a smart architecture properties page, statistics panels are displayed for maximum
ten physical servers. For more details, refer to the section Setting the number of DNS server
statistics panels to display.
To set the number of server statistics panels to display on the properties page of
a smart
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
757
Monitoring and Reporting DNS Data
Limitations
• The analytics are only available for EfficientIP DNS physical servers and Hybrid DNS servers.
• The analytics data is only retrieved based on UDP traffic.
• Only the first 50 entries matching the selected metrics are listed. Therefore, if on the selected
period of time, 100 pieces of information are identical, the GUI only displays the first 50.
• You might slow your appliance down if you edit the purge mechanism to include more lines or
keep data longer than the default 30 days.
Each sample compares data retrieved over a specific periodicity, a limited period of time, that is
set by default to a sample time of 5 minutes. You can edit the sampling period following the pro-
cedure in the section Configuring the Periodicity.
Note that the page might display DNSTOP, RPZ and Guardian analytics. If you display the ana-
lytics of a specific server, either DNS and RPZ data or Guardian data is displayed. For more
details on DNS Guardian data, refer to the section Monitoring Guardian Statistics.
All the columns displayed on the page depend on the DNSTOP or RPZ data selected. Keep in
mind that each column provides and compares data over the specified sample time.
758
Monitoring and Reporting DNS Data
759
Monitoring and Reporting DNS Data
You can edit the sample time following the procedure in the section Configuring the Periodicity.
760
Monitoring and Reporting DNS Data
In the following table, RPZ rule refers to a combination of source, pattern and policy configured
in rules that matched DNS client queries.
All DNS retrieval settings affect both DNS and RPZ analytics.
761
Monitoring and Reporting DNS Data
You can configure a shorter or larger periodicity on each physical server individually.
Note that no matter the periodicity, the data is available on the page at a frequency specified
through the rule 380. To edit that rule, refer to the section Configuring the DNS Analytics Retrieval
Frequency.
No matter the periodicity you set on the physical server, the data is available in the GUI depending
on the rule configuration.
To edit the rule 380 that sets the DNS analytics data retrieval
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
762
Monitoring and Reporting DNS Data
As both thresholds work together, once the number of days or the number of lines is met, the
unwanted data the deleted.
No matter the way you want to purge your database, keep in mind that if you set very high
thresholds, you may slow down your appliance because the database contains too much
information.
763
Monitoring and Reporting DNS Data
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
764
Monitoring and Reporting DNS Data
5. Untick the box Enable analytics collection.The page refreshes, the drop-down list Periodicity
(min.) is no longer visible.
6. Click on OK to complete the operation. In the panel, the field Enable analytics collection
is marked no.
Querylog is a toggle command that provides an overview of all the DNS queries in IPv4 and IPv6.
The logs structure is as follows:
a. The requesting client IP address and port number, the query name, class and type.
b. The recursion detailed, + or -. The Recursion Desired flag: + is set (the query was recursive),
- is not set (the query was iterative).
c. DNS options details if relevant: whether the query is signed (S), whether EDNS was used (E),
whether TCP was used (T), whether DO - DNSSEC OK - was set (D), whether CD - Checking
Disabled - was used (C).
d. The IP address the information was sent to.
Keep in mind that all the logs can be displayed in the page Syslog in real time. They can slow
this page down consistently as the querylog command can generate a substantial volume of data
very quickly.
765
Monitoring and Reporting DNS Data
The first logs are received control channel command 'querylog' and query logging is
now on; all the logs are listed below.
Answerlog is a toggle command that provides an overview of all the DNS answers in IPv4 and
IPv6. It uses the same information structure as querylog, each log contains: client information,
recursion details, DNS options when relevant... For more details, refer to the log structure in the
section Monitoring DNS Queries.
When answerlog is on, it displays two lines: first the initial query, second the answer received by
the client followed by the return code of the answer: NOERROR, SERVFAIL, NXDOMAIN...
766
Monitoring and Reporting DNS Data
For more details regarding the reports and their generation, refer to the section Managing Reports.
767
Part VIII. Global Policies
Global policies are options that allow to set specific behaviors within a module or between modules. They
are available in the modules IPAM, DHCP, DNS and Device Manager.
• Inheritance and Propagation allows to use meta-data, advanced properties and class parameters across
the hierarchy of most modules. You can set, inherit, propagate or restrict an object's property from one
level to the other.
• Managing Advanced Properties allows to configure advanced properties that define interactions between
and/or within the modules IPAM, DHCP, DNS, Device Manager and VLAN Manager.
Table of Contents
51. Inheritance and Propagation ..................................................................................... 770
Prerequisites ........................................................................................................ 771
Limitations ............................................................................................................ 772
Configuring the Inheritance of a Parameter Value .................................................... 772
Configuring the Propagation of a Parameter Value ................................................... 774
Setting Class Parameters ...................................................................................... 775
Reconciling Class Parameters ............................................................................... 776
52. Managing Advanced Properties ................................................................................ 778
Prerequisites ........................................................................................................ 779
Browsing Advanced Properties .............................................................................. 779
Configuring IPAM Advanced Properties .................................................................. 780
Configuring DHCP Advanced Properties ................................................................. 806
Configuring DNS Advanced Properties ................................................................... 810
Setting Advanced Properties .................................................................................. 812
769
Chapter 51. Inheritance and Propagation
Within all modules, you can propagate parameter values throughout the internal hierarchy.
For each meta-data, advanced property and class parameter, you can configure the Inherit-
ance property to Set or Inherit and/or the Propagation property to Propagate or Restrict in a
dedicated window.
By default, each parameter value is automatically propagated from one level to the next. The
Propagation property at parent level is configured to Propagate, while the Inheritance property
at child levels is configured to Inherit.
POOL
ADDRESS
DNS server: ns1.mycorp.com
Default domain: lab.mycorp.com
Gateway: 10.6.22.255
Figure 51.1. Example of the inheritance and propagation of some advanced properties in the IPAM
In the example above, advanced properties are automatically propagated and inherited within
the IPAM. Therefore, the IP addresses are configured with a DNS server set at space level, a
Default domain set at block-type network level and a Gateway set at subnet-type network level.
When you add or edit a resource, right of each meta-data, advanced property and class parameter,
an icon displays the current inheritance and propagation property configuration:
770
Inheritance and Propagation
You can tailor the propagation and inheritance of each parameter within the hierarchy of a module.
NETWORK
BLOCK
POOL
ADDRESS
In the example above, the advanced property DNS server has one value from space down to
block-type network level, and a different value from subnet-type network down to IP address
level.
Prerequisites
The Inheritance property and/or the Propagation property can be configured on:
• Advanced Properties within the IPAM, the DNS and/or the DHCP at all levels. For more details
regarding advanced properties, refer to the chapter Managing Advanced Properties.
• Meta-data throughout SOLIDserver. By default, all resources include meta-data in the class
global. For more details regarding meta-data, refer to the chapter Configuring Classes.
In addition, note that the meta-data Description is available by default when you add or edit
IPAM networks and Device Manager devices. You can define its inheritance and propagation
without editing the class global.
• Class Parameters throughout SOLIDserver. When you apply a custom class added from the
page Class Studio, all the class objects it contains become the class parameters of the resource.
For more details regarding custom classes, refer to the chapter Configuring Classes.
771
Inheritance and Propagation
Limitations
• The Inheritance property cannot be configured at some levels:
• At the top level of any module, you cannot switch the property to Inherit, it is forced to Set.
• The top level objects cannot inherit parameters, this includes IPAM spaces outside VLSM
organizations, DHCP servers, DNS servers, DNS RRs, NetChange devices, Workflow re-
quests, Device Manager devices, VLAN domains and groups of users, in the module Admin-
istration.
Note that within space-based VLSM organizations, this limitation only applies to the top level
space, all the spaces it contains can inherit parameters.
• The Propagation property cannot be configured at some levels:
• At the lowest level of any module, you cannot set the property to Propagate, it is forced to
Restrict.
• The lowest objects cannot propagate parameters, this includes IPAM IP addresses; DHCP
groups, ranges and statics; DNS zones and RRs; Device Manager interfaces and ports;
NetChange ports and VLAN Manager VLANs.
• Changing the inheritance/propagation of a parent object cannot trigger additions at
lower levels.
If parent objects already contain objects, changing the inheritance and propagation of advanced
properties that trigger additions does not automatically trigger additions at lower levels. For
instance, if you set and propagate the advanced property Add a DHCP static on a terminal
network, the assigned IP addresses it already contains are not added in the DHCP.
To trigger the addition behavior, you must tick all existing objects at lower levels and in the
menu select Tools > Expert > Initialize rules.
• Some operations are impossible, you cannot:
• Configure the Inheritance property and Propagation property to Inherit/Restrict in template
mode in the IPAM. An inherited parameter value must be propagated.
• Delete a class parameter from a parent object if its Inheritance property is Inherit.
• Restrict the propagation of a parameter that has already been propagated.
• Edit the inheritance or propagation property of an advanced property that is not displayed
by Default. Only users of the group admin can display All the available advanced properties
in the addition/edition wizard and configure them.
• Reconciling class parameter must follow a specific order.
If you plan on reconciling the meta-data, advanced properties and/or class parameters of all
the objects of a module, you must start from the lowest level of the hierarchy up to the highest
one.
772
Inheritance and Propagation
NETWORK
BLOCK
NETWORK
SUBNET
ADDRESS
No inherited Domain
Figure 51.3. Example of an advanced property changed and restricted at pool level
Once configured on a parent object, the value is used on all the objects it contains if their
inheritance property is configured to Inherit. In the example above, all objects from space
down to pool level have the property Default domain, but not the IP addresses. At space level,
a domain is configured to Set/Propagate. At network level, the same domain is configured to In-
herit/Propagate. At pool level, the domain has a different value configured to Set/Restrict, it ignores
the configuration of higher levels, therefore the IP addresses of the pool are not configured with
the property Domain.
In the following procedure, is only used to illustrate the inheritance and propagation properties
icon, it may not match your current configuration.
The inheritance property has to be configured directly in the addition/edition wizard of an object.
In this section, configuring includes defining the inheritance property for the first time or editing
its value.
773
Inheritance and Propagation
Note that deleting some objects of the IPAM and DNS hierarchy triggers the automatic
inheritance:
• When you delete a non-terminal subnet-type network, an IPAM pool or a DNS view that contains
other objects at lower levels, the child objects are automatically moved higher in the hierarchy.
• If the child objects inherited class parameters from the deleted container, for each class para-
meter:
• The Inheritance property is forced to Inherit or Set to match the configuration of the deleted
parent object. This way, the value and the source of the value remain the same.
• The Propagation property remains the same.
NETWORK
BLOCK
NETWORK
SUBNET
POOL
ADDRESS
Figure 51.4. Example of an advanced property inherited and restricted at network level
Once configured on a parent object, the value is used on all the objects it contains if their
propagation property is configured to Inherit. In the example above, all objects from the space
level down to subnet-type network level have the property DHCP failover channel, but not the
pools and IP addresses. At space level, a failover channel is configured to Set/Propagate. At
block-type networks level, the same failover channel is configured to Inherit/Propagate. At subnet-
type network level, it is configured to Inherit/Restrict, so the pools and IP addresses do not inherit
the property.
In the following procedure, is only used to illustrate the inheritance and propagation properties
icon, it may not match your current configuration.
774
Inheritance and Propagation
The propagation property has to be configured directly in the addition/edition wizard of an object.
In this section, configuring includes defining the propagation property for the first time or editing
its value.
If you only want to set advanced properties on several objects at once, we recommend that you
use the option Set advanced properties because the wizard already contains all the available
values and allows to choose them in dedicated drop-down lists rather than specifying them in
fields. For more details, refer to the section Setting Advanced Properties.
Using the option Set class parameters allows, as long as you are aware of the limitations, to:
• Set any parameter on an object: either a class parameter or meta-data.
• Overwrite any parameter configured or not.
• Overwrite the value of the Inheritance property and/or Propagation property of a parameter.
• Propagate a configured parameter to child objects if their Inheritance property is Inherit.
• Restrict a parameter at the level of your choice.
Note that, in the wizard, the drop-down lists Inheritance property and Propagation property are
only displayed if they are relevant to the object you selected.
775
Inheritance and Propagation
4. In the drop-down list Parameter, select the class parameter or meta-data of your choice.
The page refreshes.
5. In the drop-down list Inheritance property, select Set or Inherit. By default, Set is selected.
If you select Set, you can either configure a value for the parameter or overwrite its current
value.
If you select Inherit, you configure the parameter with the value of its parent object. The field
Value is no longer displayed.
6. If you selected Set, in the field Value specify the parameter value.
7. In the drop-down list Propagation property, select Propagate or Restrict. By default,
Propagate is selected.
If you select Propagate, you propagate the current parameter value to all child objects. The
propagation is only possible if the child objects have their Inheritance property configured
to Inherit.
If you select Restrict, you only configure the current parameter value to the object(s) you
ticked, it prevents the propagation to the child objects.
8. Click on ADD to move your parameter configuration to the Parameters list.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
9. Repeat the steps 5 to 8 for as many parameters as you need.
10. Click on OK to complete the operation. The report opens and closes. Any parameter value
and configuration previously set for the selected object(s) is overwritten.
For instance, after a migration of your database, from a version prior to 6.0.0, with parameters
configured that are all Set with the same value at all levels, you can use the option to make sure
they respect the internal module hierarchy and make the lower levels Inherit the top level para-
meter value. If you configured or edited classes, your objects are configured at each level but
the inheritance between each level is not implemented yet. Running this option allows comparing
all the properties and parameters set on the parent, for the selected child objects. If they are
configured on both levels and their values match, the inheritance property of the child objects is
forced to Inherit to set up the inheritance.
The option allows to force the Inheritance property of a parameter based on the value of the
parameter in the parent object. Therefore:
• The parameter value is forced to Set if it is not configured on the parent object.
• The parameter value is forced to Set if it is configured on the parent object with the Propagation
property configured to Restrict.
• The parameter value is forced to Set if it has a different value on the parent object.
• The parameter value is forced to Inherit if on the parent object: the parameter is configured,
has the same value and has the Propagation property configured to Propagate.
Keep in mind that the option is only available on pages managing objects that can inherit data.
Some class parameters might not be reconciled, for more details refer to the section limitations.
776
Inheritance and Propagation
777
Chapter 52. Managing Advanced
Properties
Advanced properties are specific class parameters that allow to set up replication behaviors
between the modules IPAM, DHCP, DNS, Device Manager and VLAN Manager.
DNS server: ns1.mycorp.com
SPACE
Update DNS: yes
America
NETWORK
SUBNET
New York
10.6.0.0/24
POOL
Manhattan
10.6.0.1-10.6.0.50
Figure 52.1. Replication from the DHCP to the DNS via the IPAM
All the advanced properties are represented in the appendix Advanced Properties.
778
Managing Advanced Properties
The advanced properties value is inherited by all the objects at lower levels, unless you configure
them otherwise. Therefore, you can configure spaces with properties that apply to IP addresses,
or servers with properties that apply to leases or records.
You can edit the advanced properties inheritance and propagation of several objects at a time.
For more details, refer to the section Setting Advanced Properties.
Prerequisites
• Defining the Internal module setup to select the modules IPAM, DNS and DHCP.
It is accessible from the pages Main dashboard and Admin Home. For more details, refer to
the section Defining the Internal Module Setup.
• Configuring or being granted access to the proper rights and resources.
• Any user can configure the advanced properties that are part of the Default display of the
addition/edition wizard, as long as the group they belong to is granted rights and resources
over the relevant modules and objects.
They can display All the advanced properties, if some are not part of the Default display,
however, only users of the group admin can configure these remaining properties.
• Users can define which properties are part of the Default display of the addition/edition wizards
if they belong to a group granted the right Edit: the wizard Advanced properties customization.
779
Managing Advanced Properties
The IPAM can be the reference point of all addressing decisions involving DHCP and DNS. Indeed,
the IPAM can update the DHCP and the DNS, and vice versa. However, the DHCP can only
update the DNS if the information is sent to the IPAM first. To have an overview of all the advanced
properties that can originate from the IPAM, refer to the appendix Advanced Properties.
In addition, from the IPAM you can impact Device Manager and VLAN Manager. Indeed, you
can add devices or link existing ones through ports and interfaces at IP address level, or allow
two subnet-type networks to communicate by associating them with the same VLAN.
Within the IPAM, you can configure dedicated properties. To set up the transition from IPv4 to
IPv6, refer to the section Configuring the Transition from IPv4 to IPv6.
Each property can be inherited at lower levels to automate the replication from the IPAM.
IPAM DHCP
DHCP failover channel: DHCP
SPACE SERVER
failover-dhcp1.mycorp.com
America dhcp1.mycorp.com
NETWORK
BLOCK
USA
10.6.0.0/15
NEW NEW
NETWORK SCOPE
SUBNET
Figure 52.3. IPAM to DHCP replication at network level inherited from the space
780
Managing Advanced Properties
You must first select the advanced properties to display and then configure them.
4. Tick the properties you want to display or enable in the addition/edition wizard.
a. To configure properties Within the IPAM, you can tick the following box.
By default, the box is not ticked.
• Display the IPv4 to IPv6 transition fields. For more details, refer to the section Config-
uring the Transition from IPv4 to IPv6.
b. To configure IPAM to DNS replication properties, you can tick the following boxes.
By default, all boxes are ticked.
• Display the selection field "DNS server".
• Display the selection field "DNS view".
• Display the selection fields "Domains list".
• Display the selection field "Default domain".
• Add a DNS reverse zone for every terminal network added.
The zone is added in the specified DNS server for reverse zone and DNS view for
reverse zone. This field is not displayed in the addition/edition wizard.
• Display the selection field "DNS sever for reverse zone".
• Display the selection field "DNS view for reverse zone".
• Display the box "Update DNS".
You must tick this box to be able to save any DNS replication configuration in the
addition/edition wizard.
c. To configure IPAM to DHCP replication properties, you can tick the following boxes.
By default, all boxes are ticked.
• Display the selection field "DHCP failover channel".
• Display the box "Add a DHCP static".
781
Managing Advanced Properties
• Some fields may not be visible, if they are not part of the wizard Default display.
In the drop-down list Advanced properties at the bottom of the page, you can select All.
The remaining fields appear in the sections, they are grayed out and not in the default
order. Only users of the group admin can configure or edit properties that are not displayed
by Default.
• All the advanced properties are described in the following tables:
• Available properties in the section Within the IPAM at space level.
• Available properties in the section IPAM to DNS replication at space level.
• Available properties in the section IPAM to DHCP replication at space level.
4. Click on OK to complete the operation. The report opens and closes.
Your configuration details are displayed on the space properties page, in the panel Advanced
properties.
Table 52.1. Available properties in the section Within the IPAM at space level
Activate the IPv4 to IPv6 transition
Default value Unticked
Description Tick this box to configure the IPv4 to IPv6 transition. For more details, refer to the section Con-
figuring the Transition from IPv4 to IPv6.
Table 52.2. Available properties in the section IPAM to DNS replication at space level
DNS server
Default value None
Description The server(s) of your choice, either All, None or a specific one. It defines the views and zones
to display in the next fields and allows to define which zone is updated when you add or edit IP
addresses.
You must tick the box Update DNS to take this parameter into account.
Once you select All or a server name, the lists DNS view, Domains list, Selected domains list
and Default domain appear if they were ticked during the Wizard customization.
All: allows to display all the views and zones in the next fields.
None: prevents the IPAM to DNS replication.
<server-name>: allows to display only the views and zones of the selected server in the next
fields.
DNS view
Default value All
Description The view(s) of your choice, either All or a specific one. It defines the zones to display in the next
fields.
You must tick the box Update DNS to take this parameter into account.
All: allows to display the zones of all existing views in the next fields.
<view-name>: allows to display only the zones of the selected view in the next fields.
Domains list and Selected domains list
Default value /
Description A domain, i.e. Master zone. Select it and click on to move it to the Selected domains list.
You can select several zones to make them all available in the drop-down list Default domain.
You must tick the box Update DNS to take this parameter into account.
Default domain
Default value None
Description The Master zone used by default, either None or a specific one. The list content depends on
the Selected domains list.
You must tick the box Update DNS to take this parameter into account.
782
Managing Advanced Properties
None: allows to provide a list of all the Master zones when you add or edit an IP address, you
can choose the zone to update in the drop-down list Domain.
<zone-name>: allows to select the Master zone to update when you add or edit an IP address,
the selected zone name is displayed in the grayed out field Domain.
DNS server for reverse zones
Default value None
Applies to Terminal networks only
Description The server(s) of your choice, either All, None or a specific one. This defines where are added
the PTR records matching the IP addresses you add or edit in the terminal network. If you select
All or a server name, the field DNS view for reverse zones appears, its content depends on your
selection.
If the box Add a DNS reverse zone for every terminal network added was ticked during the
Wizard customization, a reverse zone matching the terminal network you are adding or editing
is also added in the selected server.
You must tick the box Update DNS to take this parameter into account.
Keep in mind that deleting a network configured with this option also deletes the corres-
ponding reverse zone from the DNS, if it only contains the default records (SOA and NS).
DNS view for reverse zones
Default value All
Applies to Terminal networks only
Description The view(s) of your choice, either All or a specific one. This defines where are added the PTR
records matching the IP addresses you add or edit in the terminal network.
If the box Add a DNS reverse zone for every terminal network added was ticked during the
Wizard customization, a reverse zone matching the terminal network you are adding/editing is
also added in the selected view.
You must tick the box Update DNS to take this parameter into account.
Keep in mind that deleting a network configured with this option also deletes the corres-
ponding reverse zone from the DNS, if it only contains the default records (SOA and NS).
Update DNS
Default value Unticked
Description Tick this box to update the relevant zone(s) with A, AAAA and/or PTR records matching the IP
addresses you add or edit in the terminal network(s). The terminal network Gateway address
does not add any A or AAAA record in the DNS.
If an address is configured with aliases, it can also update the relevant zone(s) with CNAME
records.
Keep in mind that leaving this box unticked can delete any matching records, whether
they were added from the IPAM or directly within the DNS.
Table 52.3. Available properties in the section IPAM to DHCP replication at space level
DHCP failover channel
Default value None
Description The failover channel of your choice, to define in which servers is added the scope matching the
terminal network you add. The box Add a shared network using the Address and Prefix appears.
The scope name and addresses match the ones of the terminal network. In IPv4, the new scope
is automatically set with the option routers, its value is the network gateway address.
If an existing scope already manages the same addresses as the terminal network, its name is
overwritten. In IPv4, the option routers of the scope is set or updated.
In IPv6, the DHCP failover channel set at space level is not inherited, you must set it at network
level.
Add a DHCP static
Default value Unticked
Description Tick this box to add a DHCP static whenever you add an IP address. The box Use IPAM name
instead of DHCP client name appears.
Note that you can only add statics if you selected a DHCP failover channel.
783
Managing Advanced Properties
Adding networks in the IPAM can automatically add zones in the DNS.
IPAM DNS
SPACE Update DNS: yes DNS
SERVER
America ns1.mycorp.com
Add a DNS reverse zone for every
terminal network added: yes
NETWORK
BLOCK DNS server for reverse zone: VIEW
USA ns1.mycorp.com intranet
10.6.0.0/15 DNS view for reverse zone: intranet
NEW NEW
NETWORK REVERSE
SUBNET ZONE
784
Managing Advanced Properties
In the same way, adding a terminal network can automatically add a scope in the DHCP failover
channel of your choice. As the properties are inherited, the Gateway address of the terminal
network configures the option routers of that scope.
IPAM DHCP
DHCP failover channel: DHCP
SPACE SERVER
failover-dhcp1.mycorp.com
America dhcp1.mycorp.com
NETWORK
BLOCK
USA
10.6.0.0/15
NEW NEW
NETWORK Gateway offset: -1 SCOPE
SUBNET
Name: New York
Name: New York Address: 10.6.0.0/24
Address: 10.6.0.0/24
NEW IP NEW DHCP OPTION
ADDRESS routers: 10.6.0.254
Name: Gateway
Address: 10.6.0.254
DHCP advanced properties
DHCP failover channel: failover-dhcp1.mycorp.com
IPAM advanced properties
Gateway offset: -1
You can also link terminal or non-terminal subnet-type networks to a common VLAN to make
them communicate. From that point on, no matter what network they belong to or IP addresses
they manage, they can send and receive each other's packets.
NETWORK
BLOCK
USA
12.3.0.0/16
Add a VLAN: yes
NEW VLAN domain: sales
NETWORK NEW VLAN
SUBNET VLAN ID: 1
VLAN name: domestic ID: 1
New York Name: domestic
12.3.0.0/24 The VLAN is associated
with New York
NEW VLAN domain: sales EDITED
NETWORK VLAN ID: 1 (domestic - #) VLAN
SUBNET
ID: 1
Los Angeles Name: domestic
12.3.15.0/24 The VLAN is now
VLAN Manager advanced properties associated with
Add a VLAN: yes New York
VLAN domain: sales and Los Angeles
VLAN ID: 1
785
Managing Advanced Properties
Note that editing an existing non-terminal subnet-type network that contains terminal networks
to link it to a VLAN does not link the networks it contains to the VLAN.
You must first select the advanced properties to display and then configure them.
4. Tick the properties you want to display or enable in the addition/edition wizard.
a. To configure properties Within the IPAM, you can fill in and/or tick the following field
and boxes.
By default, the box Display the IPv4 to IPv6 transition fields is not ticked.
• Gateway offset allows to automatically calculate and add a gateway when adding
terminal networks.
By default, it is set to -1, the penultimate address of the network is used as gateway.
You can specify a positive value to calculate the gateway from the start address of
the network, or a negative value to calculate it from the end address of the network.
To disable the addition, and add terminal networks without gateway, you need to
leave the field empty.
• Display the field "Gateway".
If your Gateway offset disables the gateway addition, the field Gateway is never dis-
played in the addition/edition wizard even if this box is ticked.
• Display the selection field "Number of pools".
This property is only available when you add terminal networks.
• Display the IPv4 to IPv6 transition fields.
For more details, refer to the section Configuring the Transition from IPv4 to IPv6.
b. To configure IPAM to DNS replication properties, you can tick the following boxes.
By default, only the box Add a DNS reverse zone for every terminal network added is
ticked.
• Display the selection field "DNS server".
• Display the selection field "DNS view".
• Display the selection fields "Domains list".
• Display the selection field "Default domain".
• Add a DNS reverse zone for every terminal network added.
The zone is added in the specified DNS server for reverse zone and DNS view for
reverse zone. This field is not displayed in the addition/edition wizard.
• Display the selection field "DNS sever for reverse zone".
• Display the selection field "DNS view for reverse zone".
• Display the box "Update DNS".
You must tick this box to be able to save any DNS replication configuration in the
addition/edition wizard.
c. To configure IPAM to DHCP replication properties, you can tick the following boxes.
By default, no box is ticked.
• Display the selection field "DHCP failover channel".
786
Managing Advanced Properties
• Display the box "Add a shared network using the Address and Prefix".
This box is only displayed if the box Display the selection field "DHCP failover channel"
is ticked.
• Display the box "Add a DHCP static".
d. To configure the IPAM / VLAN Manager interaction properties, you can tick the following
boxes.
By default, no box is ticked.
• Display the VLAN association fields.
• Display the field "Add a VLAN".
This box is only displayed if the box Display the VLAN association fields is ticked.
In the procedure below, all properties are detailed but most fields are already filled with the value
set at higher level and inherited. For more details, refer to the chapter Inheritance and Propagation.
The existing networks are not impacted, to configure them like their container refer to the section
Setting Advanced Properties. You cannot use this option on VLAN Manager properties.
787
Managing Advanced Properties
Table 52.4. Available properties in the section Within the IPAM at network level
Activate the IPv4 to IPv6 transition
Default value Unticked
Applies to All networks
Description Tick this box to configure the IPv4 to IPv6 transition. For more details, refer to the section Con-
figuring the Transition from IPv4 to IPv6.
Gateway
Default value Matches the offset
Applies to Terminal networks only
Description The IP address displayed in the field is calculated from the Gateway offset, you can edit it.
The field is only displayed if, during the Wizard customization, the box Display the field "Gateway"
was ticked and a Gateway offset was specified.
Number of pools
Default value 0
Applies to Terminal networks, only during additions
Description The number of pool(s), between 1 and 5, to add within the terminal network you are adding.
The fields Size and Name or Size and Type appear for each pool.
If you select 0, no pool is added. This drop-down list is only available when you add terminal
networks.
Size
Default value /
Applies to Pools
Description If you selected a Number of pools of 1 or more, specify the number of IP addresses of each
pool.
Name
Default value /
Applies to Pools
Description If you selected a Number of pools of 1 or more, specify the name of each pool. This field is only
displayed if no custom class is enabled at pool level.
Type
Default value /
Applies to Pools
Description If you selected a Number of pools of 1 or more and custom classes are enabled at pool level,
select the class to apply to each pool. The class name is used as pool name.
Table 52.5. Available properties in the section IPAM to DNS replication at network level
DNS server
Default value None
Applies to Terminal networks only
Description The server(s) of your choice, either All, None or a specific one. It defines the views and zones
to display in the next fields and allows to define which zone is updated when you add or edit IP
addresses.
You must tick the box Update DNS to take this parameter into account.
Once you select All or a server name, the lists DNS view, Domains list, Selected domains list
and Default domain appear if they were ticked during the Wizard customization.
All: allows to display all the views and zones in the next fields.
None: prevents the IPAM to DNS replication.
<server-name>: allows to display only the views and zones of the selected server in the next
fields.
788
Managing Advanced Properties
DNS view
Default value All
Applies to Terminal networks only
Description The view(s) of your choice, either All or a specific one. It defines the zones to display in the next
fields.
You must tick the box Update DNS to take this parameter into account.
All: allows to display the zones of all existing views in the next fields.
<view-name>: allows to display only the zones of the selected view in the next fields.
Domains list and Selected domains list
Default value /
Applies to Terminal networks only
Description A domain, i.e. Master zone. Select it and click on to move it to the Selected domains list.
You can select several zones to make them all available in the drop-down list Default domain.
You must tick the box Update DNS to take this parameter into account.
Default domain
Default value None
Applies to Terminal networks only
Description The Master zone used by default, either None or a specific one. The list content depends on
the Selected domains list.
You must tick the box Update DNS to take this parameter into account.
None: allows to provide a list of all the Master zones when you add or edit an IP address, you
can choose the zone to update in the drop-down list Domain.
<zone-name>: allows to select the Master zone to update when you add or edit an IP address,
the selected zone name is displayed in the grayed out field Domain.
DNS server for reverse zones
Default value None
Applies to Terminal networks only
Description The server(s) of your choice, either All, None or a specific one. This defines where are added
the PTR records matching the IP addresses you add or edit in the terminal network. If you select
All or a server name, the field DNS view for reverse zones appears, its content depends on your
selection.
If the box Add a DNS reverse zone for every terminal network added was ticked during the
Wizard customization, a reverse zone matching the terminal network you are adding or editing
is also added in the selected server.
You must tick the box Update DNS to take this parameter into account.
Keep in mind that deleting a network configured with this option also deletes the corres-
ponding reverse zone from the DNS, if it only contains the default records (SOA and NS).
DNS view for reverse zones
Default value All
Applies to Terminal networks only
Description The view(s) of your choice, either All or a specific one. This defines where are added the PTR
records matching the IP addresses you add or edit in the terminal network.
If the box Add a DNS reverse zone for every terminal network added was ticked during the
Wizard customization, a reverse zone matching the terminal network you are adding/editing is
also added in the selected view.
You must tick the box Update DNS to take this parameter into account.
Keep in mind that deleting a network configured with this option also deletes the corres-
ponding reverse zone from the DNS, if it only contains the default records (SOA and NS).
Update DNS
Default value Unticked
Applies to Terminal networks only
789
Managing Advanced Properties
Description Tick this box to update the relevant zone(s) with A, AAAA and/or PTR records matching the IP
addresses you add or edit in the terminal network(s). The terminal network Gateway address
does not add any A or AAAA record in the DNS.
If an address is configured with aliases, it can also update the relevant zone(s) with CNAME
records.
Keep in mind that leaving this box unticked can delete any matching records, whether
they were added from the IPAM or directly within the DNS.
Table 52.6. Available properties in the section IPAM to DHCP replication at network level
DHCP failover channel
Default value None
Applies to Terminal networks only
Description The failover channel of your choice, to define in which servers is added the scope matching the
terminal network you add. The box Add a shared network using the Address and Prefix appears.
The scope name and addresses match the ones of the terminal network. In IPv4, the new scope
is automatically set with the option routers, its value is the network gateway address.
If an existing scope already manages the same addresses as the terminal network, its name is
overwritten. In IPv4, the option routers of the scope is set or updated.
Note that, on the properties page of the terminal network, the panel DHCP options details the
options set on the scope.
Add a shared network using the Address and Prefix
Default value Ticked
Applies to Terminal networks only
Description Tick this box to use the Address and Prefix of the IPv4 network you are adding as a shared
network.
This box is only visible when the DHCP failover channel is Set and has a value. It adds a new
scope in the DHCP servers of the selected failover channel.
Add a DHCP static
Default value Unticked
Applies to All networks
Description Tick this box to add a DHCP static whenever you add an IP address. The box Use IPAM name
instead of DHCP client name appears.
Note that you can only add statics if you selected a DHCP failover channel.
Use IPAM name instead of DHCP client name
Default value Unticked
Applies to All networks
Description Tick this box to name each static you add like its corresponding IP address. Each new static is
automatically configured with the IP address Shortname as value of its option host-name. If you
selected a Default domain, the static is also set with the selected domain as value of its option
domain-name.
If you do not tick the box, a nameless static is added. The static is named when the next DHCP
client connects to the network, it is named after the client.
Table 52.7. Available properties in the section IPAM / VLAN Manager interaction at network level
VLAN domain
Default value None
Applies to Terminal networks only
Description The domain containing the VLAN you want to associate with your subnet-type network, whether
you add it or not. The fields VLAN range, Add a VLAN and VLAN ID appear.
If you select None, the IPAM / VLAN interaction is removed.
VLAN range
Default value All
790
Managing Advanced Properties
791
Managing Advanced Properties
Adding pools in the IPAM can automatically add ranges in the DHCP.
IPAM DHCP
DHCP failover channel: DHCP
SPACE SERVER
failover-dhcp1.mycorp.com
America dhcp1.mycorp.com
NETWORK
BLOCK
USA
10.6.0.0/15 SCOPE
You must first select the advanced properties to display and then configure them.
In the procedure below, all properties are detailed but most fields are already filled with the value
set at higher level and inherited. For more details, refer to the chapter Inheritance and Propagation.
792
Managing Advanced Properties
The existing pools are not impacted, to configure them like their container refer to the section
Setting Advanced Properties.
Table 52.8. Available properties in the section IPAM to DHCP replication at pool level
Add a DHCP range
Default value Unticked
Description Tick this box to add a DHCP range matching the start and end address of the pool you are
adding. The range is added in the scope matching the terminal network the pool belongs to.
Add a DHCP static
Default value Unticked
Description Tick this box to add a DHCP static whenever you add an IP address. The box Use IPAM name
instead of DHCP client name appears.
Note that you can only add statics if you selected a DHCP failover channel.
Use IPAM name instead of DHCP client name
Default value Unticked
Description Tick this box to name each static you add like its corresponding IP address. Each new static is
automatically configured with the IP address Shortname as value of its option host-name. If you
selected a Default domain, the static is also set with the selected domain as value of its option
domain-name.
If you do not tick the box, a nameless static is added. The static is named when the next DHCP
client connects to the network, it is named after the client.
793
Managing Advanced Properties
Enabling the advanced properties allows to automatically add a DHCP static when you add an
IP address.
IPAM DHCP
DHCP failover channel: DHCP
SPACE
failover-dhcp1.mycorp.com SERVER
America dhcp1.mycorp.com
NETWORK
BLOCK
USA
10.6.0.0/15 SCOPE
NETWORK
SUBNET New York
10.6.0.0/24
New York
10.6.0.0/24
NEW IP NEW
ADDRESS Add a DHCP static: yes STATIC
You can automatically add a DNS record when you add an IP address.
IPAM DNS
DNS server: ns1.mycorp.com DNS
SPACE SERVER
Update DNS: yes
America ns1.mycorp.com
794
Managing Advanced Properties
You can link IP addresses with existing interfaces as illustrated below. Note that this link can also
be set without the advanced properties, for more details refer to the chapter Managing IP Ad-
dresses.
NETWORK
BLOCK
USA
12.3.0.0/16
NETWORK
SUBNET
Texas
12.3.1.0/24
You can also link an IP address with a port even if it is already linked with an interface, this
changes the device topology.
NETWORK
BLOCK
USA
12.3.0.0/16
NETWORK
SUBNET
Texas
12.3.1.0/24
795
Managing Advanced Properties
Finally, you can add a device and an interface when adding or editing an IP address.
NETWORK
BLOCK
USA
12.3.0.0/16
NETWORK
SUBNET
Texas
12.3.1.0/24
Add a device: yes
NEW IP Device name: device3 NEW
ADDRESS DEVICE
Interface name: interface3
Name: device3
Name: Houston
IP address: 12.3.1.23
MAC address: be:ef:12:34:be:ef NEW
Device Manager advanced properties INTERFACE
Add a device: yes Name: interface3
Device name: device3 IP address: 12.3.1.23
Interface name: interface3 MAC address: be:ef:12:34:be:ef
You must first select the advanced properties to display and then configure them.
4. Tick the properties you want to display or enable in the addition/edition wizard.
a. To configure properties Within the IPAM, you can select the following:
• IPv4 to IPv6 transition policy. This field is a drop-down list. For more details, refer to
the procedure Configuring the Transition at IP address Level.
b. To configure IPAM to DNS replication properties, you can tick the following boxes.
By default, only the first box is ticked.
• Enable the automatic construction of the IP address hostname: shortname.domain.
This box allows to display the field Shortname and automate the IP address name to
include a specific domain.
• Make the Domain selection mandatory in the hostname of the IP address and its ali-
ases.
This box is only displayed if the box Enable the automatic construction is ticked.
• Display the selection field "DNS server".
• Display the selection field "DNS view".
• Display the field "Domain".
• Display the box "Update DNS".
You must tick this box to be able to save any DNS replication configuration in the
addition/edition wizard.
c. To configure IPAM to DHCP replication properties, you can tick the following box.
796
Managing Advanced Properties
In the procedure below, all properties are detailed but most fields are already filled with the value
set at higher level and inherited. For more details, refer to the chapter Inheritance and Propagation.
797
Managing Advanced Properties
The existing addresses are not impacted, to configure them like their container refer to the section
Setting Advanced Properties. You cannot use this option on Device Manager properties.
Table 52.9. Available properties in the section Within the IPAM at IP address level
Corresponding IPv6 address
Default value IP address
Description The field is read-only and matches the transition configuration. For more details, refer to the
section Configuring the Transition from IPv4 to IPv6.
Table 52.10. Available properties in the section IPAM to DNS replication at IP address level
DNS server
Default value None
Description The server(s) of your choice, either All, None or a specific one. It defines the views and zones
to display in the next fields and allows to define which zone is updated when you add or edit IP
addresses.
You must tick the box Update DNS to take this parameter into account.
Once you select All or a server name, the lists DNS view, Domains list, Selected domains list
and Default domain appear if they were ticked during the Wizard customization.
<server-name>: allows to display only the views and zones of the selected server in the next
fields.
All: allows to display all the views and zones in the next fields.
None: prevents the IPAM to DNS replication.
DNS view
Default value All
Applies to Terminal networks only
Description The view(s) of your choice, either All or a specific one. It defines the zones to display in the next
fields.
You must tick the box Update DNS to take this parameter into account.
All: allows to display the zones of all existing views in the next fields.
<view-name>: allows to display only the zones of the selected view in the next fields.
Shortname
Default value /
Description The name of the IP address. The value updates the field IP address name as follows: <short-
name>.<domain_name>.
The full address name indicates in which zone, i.e. the selected Domain, the corresponding A
record is added.
This field is only displayed if the box Enable the automatic construction of the IP address host-
name: shortname.domain was ticked during the Wizard customization. Otherwise, you can directly
fill in the field IP address name.
Domain
Default value None
Description The domain, i.e. Master zone, updated when you add or edit the IP address. It completes the
IP address name.
It can be a field displaying the name of the domain inherited from a higher level, or a drop-down
list containing domains to choose from.
This field is required if the box Make the Domain selection mandatory in the hostname of the
IP address and its aliases is ticked during the Wizard customization.
Update DNS
Default value Unticked
798
Managing Advanced Properties
Description Tick this box to update the relevant zone(s) with A, AAAA and/or PTR records matching the IP
addresses you add or edit in the terminal network(s). The terminal network Gateway address
does not add any A or AAAA record in the DNS.
If an address is configured with aliases, it can also update the relevant zone(s) with CNAME
records.
Keep in mind that leaving this box unticked can delete any matching records, whether
they were added from the IPAM or directly within the DNS.
Table 52.11. Available properties in the section IPAM to DHCP replication at IP address level
Add a DHCP static
Default value Unticked
Description Tick this box to add a DHCP static whenever you add an IP address. The box Use IPAM name
instead of DHCP client name appears.
Note that you can only add statics if you selected a DHCP failover channel.
Use IPAM name instead of DHCP client name
Default value Unticked
Description Tick this box to name each static you add like its corresponding IP address. Each new static is
automatically configured with the IP address Shortname as value of its option host-name. If you
selected a Default domain, the static is also set with the selected domain as value of its option
domain-name.
If you do not tick the box, a nameless static is added. The static is named when the next DHCP
client connects to the network, it is named after the client.
Table 52.12. Available properties in the section IPAM / Device Manager interaction at IP address level
Add a device
Default value Unticked
Description Tick this box to link the IP address you add or edit with an interface and a device you add from
the IPAM. The fields Device name and Interface name are now required.
Device name
Default value /
Description The name of a device managing the interface to link with the IP address you are adding or
editing.
If you are adding a device, name the device.
If you are linking the IP address with existing objects, specify the name of a device. The field
provides auto-completion, you can specify the first letter(s) of a device name, the matching
device or a list of partial matches to choose from are displayed.
Interface name
Default value /
Description The interface linked with the IP address you are adding or editing. It is displayed as follows:
<interface name> (<device name> - <number of addresses linked with the interface>).
If you are adding a device and an interface, specify the name of the interface.
If you are linking the IP address with existing objects, you can specify an interface name or
leave the field empty to only link the IP address with the device. The field provides auto-comple-
tion, you can specify the first letter(s) of an interface name, the matching interface or a list of
partial matches to choose from are displayed.
Link with device
Default value /
Description The name of an existing device to link with the IP address you are adding or editing. You can
leave the field empty if you fill in the Link with port instead.
The field provides auto-completion, you can specify the first letter(s) of a device name, the
matching device or a list of partial matches to choose from are displayed.
Link with port
Default value /
799
Managing Advanced Properties
Description The name of an existing port. It is displayed as follows: <port name> (<device name>).
The field provides auto-completion, you can specify the first letter(s) of a port name, the
matching port or a list of partial matches to choose from are displayed.
You can leave the field empty if you only want to link the IP address with a device.
On the page All addresses, the columns Device manager name and Device manager interface
allow to display the interactions. For more details on how to add or display customized list tem-
plates, refer to the section Managing List Templates.
On the page Ports & Interfaces, any changes made from the IPAM change the content of the
column Manually linked to. For more details, refer to the section Tracking Changes on the Page
All ports & interfaces.
IPv4 IPv6
SPACE
America
Figure 52.13. Transition from IPv4 to IPv6 of a terminal network and an IP address
Transition Specificities
The transition options are configured at space or network level and inherited at lower levels where
you can apply them.
• For block-type networks, if the transition options are configured:
• The transition to IPv6 can be set when adding or editing IPv4 networks.
• The transition can only be set with existing IPv6 block-type networks.
800
Managing Advanced Properties
If you edit an IPv4 subnet-type network already configured with a VLAN to set the transition to
IPv6, the IPv6 corresponding network inherits the IPAM/VLAN interaction properties, both networks
then belong to the VLAN.
Limitations
• The transition can only be set within one space: you cannot add IPv4 subnet-type networks in
one space and expect to link them with IPv6 subnet-type networks in another space.
• If you set the transition parameters on an existing organization, they are not inherited and have
to be set one object at a time. For more details, refer to the section Setting Advanced Properties.
• For block-type networks, the transition can only be configured and activated with existing IPv6
block-type networks. The transition options do not add block-type networks in IPv6 but only
link IPv4 blocks with existing IPv6 blocks.
• The advanced properties set in IPv4 are not inherited by the corresponding IPv6 objects.
• At pool level, the transition options are not available.
• If you add an object in IPv4 and their IPv6 counterpart overlaps existing objects, only the IPv4
object is added.
• Deleting an IPv4 object linked to an IPv6 object does not delete the corresponding IPv6 object.
You must first select the advanced properties to display and then configure them.
4. Tick the box Display the IPv4 to IPv6 transition fields. It displays the fields Activate the
IPv4 to IPv6 transition and IPv6 network (block) in the addition/edition wizard.
5. Click on OK to complete the operation. The report opens and closes.
In the addition/edition wizard, all the properties you ticked are now configurable, they are
part of the Default display.
801
Managing Advanced Properties
The options you set at this level are inherited by the IPv4 blocks you add in your space. The
property can be inherited at lower levels.
Once the options are configured, the IPv4 networks it contains inherit them. You can untick the
box Activate the IPv4 to IPv6 transition if you do not want to set a transition for the objects at
lower levels.
You must first select the advanced properties to display and then configure them.
5. Tick the box Display the IPv4 to IPv6 transition fields. It displays the fields Activate the
IPv4 to IPv6 transition, IPv6 network (block) and IPv6 network (subnet) in the addition/edition
wizard.
6. Click on OK to complete the operation. The report opens and closes.
802
Managing Advanced Properties
In the addition/edition wizard, all the properties you ticked are now configurable, they are
part of the Default display.
Once the option is configured, the IPv4 networks you add within the block-type network inherit
it. You can untick the box Activate the IPv4 to IPv6 transition if you do not want to set a
transition for some of the objects at lower levels.
Once you have added the block-type network, you can add a subnet-type network.
803
Managing Advanced Properties
to an existing IPv6 block-type network and look as 1234 or 1234:4678 without consecutive
semi-colons.
7. The field IPv6 network (subnet) displays the start address and prefix of the IPv6 subnet-
type network added for the IPv4 network you are adding. It is automatically filled using the
value of IPv6 network (block) and cannot be edited.
8. In the drop-down list Advanced properties at the bottom of the page, Default is selected.
If some fields are not visible, you can select All. The remaining fields appear in the sections,
they are grayed out and not in the default order. Only users of the group admin can configure
or edit properties that are not displayed by Default.
Right of each property, you can click on to define its inheritance and/or propagation
property. For more details, refer to the chapter Inheritance and Propagation.
9. Click on OK to complete the operation. The report opens and closes.
Your transition details are displayed on the network properties page, in the panel Advanced
properties.
The existing networks are not impacted, to configure them like their container refer to the section
Setting Advanced Properties.
Once the options are configured, the IPv4 terminal networks and addresses you add within your
subnet-type network inherit them. You can untick the box Activate the IPv4 to IPv6 transition
if you do not want to set a transition for some of the objects at lower levels.
You must first select the transition policy and then configure it.
5. In the drop-down list IPv4 to IPv6 transition policy, select the IP address addition policy
to implement in the networks configured with the transition:
• Offset allows to take into account the position of the address you are adding within the
IPv4 terminal network and reuse it when adding the corresponding IPv6 address. The
100th address of the IPv4 subnet-type network adds the 100th address of the related IPv6
subnet-type network.
• Injection allows to convert in hexadecimal the IPv4 address you are adding and use the
whole address in its hexadecimal from as the last two bytes of the corresponding IPv6
address.
• First IP address available allows to add the first available IP address in the IPv6 terminal
network when you add an address in the IPv4 terminal network.
6. Click on OK to complete the operation. The report opens and closes.
In the addition/edition wizard, the selected policy is now part of the Default display.
804
Managing Advanced Properties
The existing addresses are not impacted, to configure them like their container refer to the section
Setting Advanced Properties.
805
Managing Advanced Properties
For instance, you could add an IP address every time you allocate a DHCP lease.
DHCP IPAM
DHCP Push leases to IPAM: yes SPACE
SERVER
dhcp1.mycorp.com America
NETWORK
Use client name BLOCK
SCOPE USA
(FQDN): yes 10.6.0.0/15
New York
10.6.0.0/24 NETWORK
SUBNET
New York
10.6.0.0/24
RANGE
10.6.0.1 POOL
-10.6.0.50
Manhattan
10.6.0.1-10.6.0.50
NEW NEW IP
LEASE ADDRESS
IP Address: 10.6.0.42 IP Address: 10.6.0.42
MAC address: be:ef:12:34:be:ef MAC address: be:ef:12:34:be:ef
Name: client.mycorp.com Name: client.mycorp.com
IPAM advanced properties
Push leases to IPAM: yes
Use client name (FQDN): yes
You must first select the advanced properties to display and then configure them.
806
Managing Advanced Properties
4. Tick the properties you want to display or enable in the addition/edition wizard.
a. To configure DHCP to IPAM replication properties, you can tick the following boxes.
By default, only the box Push leases to IPAM is ticked at server and range level.
• Display the box "Push leases to IPAM".
You must tick this box to be able to display the box Update DNS in the addition/edition
wizard.
• Display the drop-down list "Lease name".
In the addition/edition wizard, you can only display this box if the box "Push leases
to IPAM" is ticked.
• Display the box "Use client name (FQDN)".
In the addition/edition wizard, you can only display this box if the box "Push leases
to IPAM" is ticked.
b. To configure DHCP to DNS replication properties, you can tick the following box.
By default, the box is ticked at server and range level.
• Display the box "Update DNS".
You must tick this box to be able to save the DNS replication configuration in the ad-
dition/edition wizard.
In the addition/edition wizard, you can only display this box if the box Push leases to
IPAM is ticked.
In the procedure below, all properties are detailed. You must configure them at server level, if
you propagate them, most fields can already be filled at lower levels. For more details, refer to
the chapter Inheritance and Propagation.
807
Managing Advanced Properties
In the drop-down list Advanced properties at the bottom of the page, you can select All.
The remaining fields appear in the sections, they are grayed out and not in the default
order. Only users of the group admin can configure or edit properties that are not displayed
by Default.
• All the advanced properties are described in the following tables:
• Available properties in the section DHCP to IPAM replication at server, scope and range
level.
• Available properties in the section DHCP to DNS replication at server, scope and range
level.
5. Click on OK to complete the operation. The report opens and closes.
Your configuration details, whether set or inherited, are displayed on the object properties
page, in the panel Advanced properties.
The existing scopes and ranges are not impacted, to configure them like their container refer to
the section Setting Advanced Properties.
Table 52.13. Available properties in the section DHCP to IPAM replication at server, scope and range
level
Push leases to IPAM
Default value Unticked
Description Tick this box to add an IP address in the IPAM matching the client name and MAC address of
each allocated lease. The fields Lease name, Use client name (FQDN) and Update DNS appear
in the relevant sections.
If you set a space for the scope, the IP address is added or edited in that space. If you did not
set any space for the scope, the IPAM update applies to any matching IP address in the smallest
terminal network possible.
Lease name
Default value Only one client can update the IPAM
Description Allows to decide which name to send to the IPAM, either Only the first client updates the IPAM,
Only one client can update the IPAM or Clients always update the IPAM.
This box is useful in case of hostname conflict between the DHCP and the IPAM.
Keep in mind that, if the IPAM to DNS properties are set, what you chose to send from the DHCP
also affects the DNS as only the information of the IPAM updates the DNS.
Only the first client updates the IPAM: select this value if multiple clients with the same name
obtain a lease, only the first client sends their name to the IPAM. The following clients with the
same name, only send their IP and MAC addresses to the IPAM.
If the IPAM to DNS properties are set, only the first client updates the DNS.
Only one client can update the IPAM: select this value if you have mobile clients. If multiple
clients with the same name and different MAC addresses obtain a lease, the first client sends
their name to the IPAM, the next client only sends their IP and MAC addresses. That way, if the
IPAM to DNS properties are set, only one client updates the DNS, the first who obtained the
lease.
Note that if a client with a known name and known MAC address obtains a lease, their name,
MAC address and IP address are sent to the IPAM, and therefore may update the DNS.
Clients always update the IPAM: select this value to send the lease name to the IPAM no
matter what it already contains. This is the most permissive mode, every DHCP client sends their
lease information to the IPAM, no matter their name, IP or MAC address. The information of each
lease is sent to the IPAM even if it already contains entries of the same name.
If the IPAM to DNS properties are set, the latest lease information sent to the IPAM updates the
DNS, any existing record with same name, previously added from a lease, is deleted.
Use client name (FQDN)
Default value Unticked
Description Tick this box to push the lease client name in the IPAM, instead of the lease name.
808
Managing Advanced Properties
If you tick the box Update DNS as well, the zone matching the FQDN of the client name is updated.
Table 52.14. Available properties in the section DHCP to DNS replication at server, scope and range level
Update DNS
Default value Unticked
Description Tick this box to update the relevant records with the lease information. It is only displayed if the
box Push leases to IPAM is ticked.
Keep in mind that DHCP data can only update the DNS if it is sent to the IPAM first. For this
reason, the DNS server(s) configured for the IPAM to DNS replication are the ones updated by
the changes in the DHCP.
809
Managing Advanced Properties
Adding a record in the DNS can automatically add an IP address in the IPAM.
DNS IPAM
DNS Update IPAM: yes SPACE
SERVER
ns1.mycorp.com America
NETWORK
BLOCK
USA
ZONE 10.6.0.0/15
mycorp.com NETWORK
SUBNET
New York
10.6.0.0/24
NEW NEW IP
RECORD ADDRESS
Type: A Name: pc.mycorp.com
RR name: pc IP address: 10.6.0.142
Complete name: pc.mycorp.com
IP address: 10.6.0.142
IPAM advanced properties
Update IPAM: yes
Keep in mind that on servers managed via a smart architecture, the advanced properties must
be configured on the smart architecture itself. The addition/edition wizard of the physical server
and the scopes and ranges it contains do not display the advanced properties fields.
You must first select the advanced properties to display and then configure them.
810
Managing Advanced Properties
In the addition/edition wizard, all the properties you ticked are now configurable, they are
part of the Default display.
In the procedure below, all properties are detailed. You must configure them at server level, if
you propagate them, most fields can already be filled at lower levels. For more details, refer to
the chapter Inheritance and Propagation.
The existing views and zones are not impacted, to configure them like their container refer to the
section Setting Advanced Properties.
Table 52.15. Available properties in the section DNS to IPAM replication at server, view and zone level
Update IPAM
Default value Unticked
Applies to Master and Hint zones
Description Tick this box to update the IPAM when you add A, AAAA or CNAME resource records.
If you set a space for the zone, the IP address and alias are added or edited in that space. If you
did not set any space for the zone, the IPAM update applies to any matching IP address in the
smallest terminal network possible.
Table 52.16. Available properties in the section Within the DNS at server, view and zone level
Add a PTR
Default value Unticked
Applies to Master zones
Description Tick this box to add a PTR record for each A or AAAA resource record added in the DNS.
Note that if you add several A records with one IP address pointing to several names, only the
first PTR record is added.
811
Managing Advanced Properties
You cannot use this option on VLAN and Device Manager advanced properties.
Note that, in the wizard, the drop-down lists Inheritance property and Propagation property are
only displayed if they are relevant to the object you selected.
812
Managing Advanced Properties
8. Click on ADD to move your advanced property configuration to the Advanced properties
list.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
9. Repeat the steps 5 to 9 for as many advanced properties as you need.
10. Click on OK to complete the operation. The report opens and closes. Any property value and
configuration previously set for the selected object(s) is overwritten.
813
Part IX. Application
The module Application allows to maintain an application inventory, tailor application traffic on your network
and optimize user experience.
Every application you add is registered with a Fully Qualified Domain Name (FQDN) and configured with a
set of pools and nodes that define its infrastructure. The application infrastructure allows to define a traffic
policy.
Each traffic policy can be enforced on your network thanks to an existing DNS infrastructure. After enabling
Global Server Load Balancing (GSLB) on compatible SOLIDserver appliances, you can associate application
traffic policies with one or more GSLB servers and deploy the traffic policy on your network.
The way you configure your traffic policies can therefore maximize application availability and optimize the
way users access your applications.
Once an application is deployed, your application traffic policy takes over the DNS resolution if and only if
the query matches the FQDN of the application. If it does, the query is routed to the appropriate pool, the
load balancing configuration of that pool determines which node is the most suited to answer the query and
the node IP address is sent out to the querying client if its last health check was successful. Even if an ex-
isting record could have answered the query it does not, whether the server cached it or has authority over
it, the standard DNS answer is ignored.
When traffic policy deployments are complete, the GSLB server only handles queries if they match a registered
FQDN and if at least one application node is operational. In any other case, the DNS server answers the
queries.
domain
www.mydomain.com GSLB server FQDN: www.domain.com
mydomain
FQDN: www.mydomain.com
pool-v4
192.168.2.2 associated with the applications 192.168.2.1
mydomain and domain 192.168.2.2
192.168.2.3
Figure 212. How a deployed application takes over the DNS resolution
Before managing the Application objects you must configure the module as detailed in the chapter
Configuring Application.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
53. Configuring Application ............................................................................................ 816
Prerequisites ........................................................................................................ 816
Limitations ............................................................................................................ 816
Configuring and Enabling the Service GSLB Server ................................................ 817
54. Managing Applications ............................................................................................. 819
Browsing Applications ........................................................................................... 819
Adding and Deploying Applications ......................................................................... 820
Adding and Deploying Applications and Traffic Policies ............................................ 821
Editing Applications ............................................................................................... 823
Deleting Applications ............................................................................................. 824
55. Managing Pools ....................................................................................................... 825
Browsing Pools ..................................................................................................... 825
Adding Pools ........................................................................................................ 826
Editing Pools ......................................................................................................... 827
Deleting Pools ....................................................................................................... 828
56. Managing Nodes ..................................................................................................... 829
Browsing Nodes .................................................................................................... 829
Adding Nodes ....................................................................................................... 831
Editing Nodes ....................................................................................................... 834
Managing or Unmanaging Nodes ........................................................................... 834
Deleting Nodes ..................................................................................................... 835
815
Chapter 53. Configuring Application
To configure the module Application and use it to the fullest you must:
• Meet the prerequisites.
• Take into account the limitations.
• Configure and enable the service GSLB Server.
Prerequisites
• A SOLIDserver appliance in version 7.1 or higher.
• An appliance with at least 8 GB of RAM:
• Either one of our hardware appliance models, except SOLIDserver-260 and SOLIDserver-
3300.
• Or a virtual appliances must be configured with an intel network card (em*, ig*, igb*, ix*, ixg*,
ixv* or ixl*) or a VMware VMXNET network card (vmx*).
• The license DNS GSLB:
• Without it you cannot associate applications with GSLB servers, and therefore you cannot
deploy traffic policies on your network.
• It must be activated on every SOLIDserver appliance meant to load balance application
traffic.
• An appliance properly configured:
• The communication between a GSLB enabled SOLIDserver and its clients has to be over
UDP and/or TCP.
• Both DNS and GSLB dedicated services must be running to ensure service continuity. Make
sure that either the services GSLB Server and DNS server (named) or the services GSLB
Server and DNS server (unbound) are both enabled and started.
• Any FQDN registered for an application must be resolvable to be properly deployed. Either
the GSLB server manages an A or AAAA record matching the FQDN or it can cache the
initial FQDN answer.
• Make sure traffic policies can actually take over the resolution. You must adapt the TTL of
the resource records matching the FQDNs you register for any application. The new TTL
must take into account your traffic policy details, the pool session duration you may configure
and the configuration of your nodes health check.
• The appropriate rights and resources configured for end users.
• To be able to see the module Application and its content, users must belong to a group
granted the right Display: applications list, allowed by default.
• To be able to manage all objects, users must belong to a group granted access to all the
module Application rights.
• To be able to configure an application with a GSLB server, users must belong to a group
that is granted the right Display: DNS servers list and has the server among its resources.
Limitations
• One DNS server cannot be used for DNSSEC and GSLB.
If you associate an application with a GSLB server used as DNSSEC resolver and/or that has
signed zones, its resolution and/or answers are no longer DNSSEC compliant.
• DNS round-robin is not supported by the Application nodes.
816
Configuring Application
If a node does not answer, the server associated with the application answers the query.
However, any round-robin configuration in the DNS is ignored, only one record is used to answer
the query, the rest of the records configured are ignored.
• When you deploy an application on a GSLB server from the GUI, a comparison between the
GSLB objects in the GUI and the ones already on the GSLB server is done. The objects that
are on the GSLB server and also in the GUI are kept. The objects that are only present on the
GSLB server are deleted and the objects only in the GUI are added on the GSLB server.
When restoring a backup, whether you added, edited or deleted objects since the backup was
saved, all changes are lost and may not even be visible in the GUI. Before restoring a backup,
make sure you saved it when the Application database was up-to-date.
• You can only configure and apply classes at application level. For more details regarding
classes, refer to the chapter Configuring Classes.
The DNS must be running as well. Make sure the services GSLB server and DNS server
(named / nsd / unbound) are both enabled and started.
Note that if your license includes both DNS Guardian and DNS GSLB, you must configure the
line DNS Guardian / GSLB server as both features rely on the same service.
To configure the listening interfaces of GSLB server and enable the service
Only users of the group admin can perform this operation.
1. Configure the listening interfaces of GSLB server
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section System, click on Services configuration. The page Services configur-
ation opens.
c. In the column Name, click on GSLB server or DNS Guardian / GSLB server. The
wizard GSLB server configuration or DNS Guardian & GSLB server configuration
opens.
d. In the list Available interfaces, select the interface of your choice and click on . The
interface is moved to the list Selected interfaces.
Each interface is listed <interface-name> (<MAC-address>), whether it is active or not.
Only Intel network interfaces are listed as no other interface card can be configured for
the service.
e. Repeat this action for as many interfaces as you need.
To remove an interface from the list Selected interfaces, select it and click on . The
interface is moved back to the list Available interfaces.
f. Click on OK to complete the operation. The report opens and closes.
2. Enable the service GSLB server
a. In the column Name, look for GSLB server or DNS Guardian / GSLB server.
b. In the column Enabled, click on the link Disabled to enable the service. The wizard
opens.
c. Click on OK to complete the operation. The wizard closes.
817
Configuring Application
To stop or disable the service GSLB server, refer to the section Handling Services in the chapter
Configuring the Services.
818
Chapter 54. Managing Applications
From the page All applications you can manage applications and set up entire traffic policies.
Each application must be configured with a Fully Qualified Domain Name (FQDN) that can be
resolved.
To deploy an application or traffic policy on your network you must associate it with one or more
GSLB enabled servers able to resolve the application FQDN:
• On recursive servers, the initial query of the FQDN is cached in order to answer all the following
queries.
• On authoritative server, the FQDN must be declared as A or AAAA record in one of its zones.
Once an application is deployed on at least one GSLB server, when a client queries a domain:
1. The application handles the query if it is configured with the relevant FQDN.
2. It directs the query to the relevant pool and node.
You can either add an application and then add the pools and nodes it contains, or you can add
the application and its traffic policy from the page All applications. For more details, refer to the
section Adding and Deploying Applications and Traffic Policies.
Browsing Applications
The application is the highest level of the Application hierarchy.
NODE
APPLICATION POOL
NODE
819
Managing Applications
2. At the end of the line of the application of your choice, deployed or not, click on . The ap-
plication properties page opens.
! Warning The Operational status of at least one of the nodes of the application is Inactive.
Down The Operational status of all the nodes of the application is Inactive.
Delayed delete The content of the application is being deleted from the physical servers it is
deployed on.
GSLB Timeout The service GSLB server is unreachable.
GSLB Invalid credentials The SSL credentials of the GSLB server associated with the application are
invalid or this server is already managed by another appliance and you need
to specify your credentials again. For more details, refer to the section Editing
DNS Servers.
GSLB Stopped The service GSLB server is not running.
820
Managing Applications
Once added, you can edit the GSLB server association of an application. For more details, refer
to the section Editing Applications.
Before adding an application and its traffic policy keep in mind that:
• An application must have a unique name and FQDN.
821
Managing Applications
Several applications can share the same name if they manage different FQDNs. In the same
way, several applications can manage the same FQDN if they have different names.
• To deploy an application and its traffic policy on your network, you must associate it with at
least one GSLB server.
• Any FQDN registered for an application must be resolvable to be properly deployed. Either the
GSLB server manages an A or AAAA record matching the FQDN or it can cache the initial
FQDN answer.
• A GSLB server can only be associated once with one FQDN.
Once associated with an application, a GSLB server cannot be associated with another applic-
ation managing the same FQDN.
• After adding an application and traffic policies, the application, pool and node(s) it contains are
managed individually. To edit any, you must refer to the edition section of each object.
Field Description
Name The name of the pool. This field is required.
Protocol The IP protocol version of the pool and its nodes, either IPv4 or IPv6. This field is required.
Load balancing The mode of the pool, either Round-robin, Latency or Weighted. By default, Round-robin
mode is selected. This field is required.
Round-robin The traffic is evenly directed to all active nodes.
Latency The traffic is directed to the active nodes with the best latency. If you select
this mode, the field Max. preferred nodes appears.
Max. preferred The number of active nodes with the best latency that must
nodes answer queries.
Weighted The traffic is directed to the active nodes depending on their weight.
Enable session Allows to set a period of time during which all traffic is directed to the nodes. If you tick the
affinity box, the field Session duration appears.
Session The period of your choice, in seconds. By default, it is set to 300. This field
duration is required.
822
Managing Applications
Field Description
Name The name of the node. Each node name must be unique.
IP address The IPv4 or IPv6 address of the node, depending on the selected Pool protocol.
Each node IP address must be unique.
Mode The mode of the node, either Active or Backup. If the pool is configured with the
load balancing mode Latency, the field is in read-only and the node is Active by
default.
Health Check type The type of node health check, either None, HTTP(S), Ok, Ping or TCP. None is
selected by default.
None There is no health check configured for the node, whether the
node is answering queries or not, its Status is always OK.
HTTP(S) The health check of the node is performed via HTTPS.
Ok The health check of the node always marks the node Operational
status as OK.
Ping The health check of the node is performed using ping commands.
TCP The health check of the node is performed via TCP.
b. Click on ADD . The node is moved to the Node list and listed as follows: <node-name>
- <IP-address> - <health-check-type> (<mode>).
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
Repeat the operation for as many nodes as needed
12. Click on OK to complete the operation. The report opens and closes. The application is listed.
If you associated the application with one or more GSLB servers, click on on the right-
end side of the menu. Several lines appear under the application itself, there is a line for
each of the server(s) the application is deployed on.
If you associated the application with a GSLB server and configured it with a resolvable FQDN,
the application and the traffic policies are deployed right away.
Once added, you cannot edit a traffic policy. However you can individually edit the application,
pool and node(s) that compose it. For more details, refer to the sections Editing Applications,
Editing Pools and Editing Nodes.
Editing Applications
You can edit applications, whether they were added via the addition menu Application or Applic-
ation and traffic policy.
823
Managing Applications
To edit an application
1. In the sidebar, go to Application > Applications. The page All applications opens.
2. At the end of the line of the application of your choice, deployed or not, click on . The ap-
plication properties page opens.
3. In the panel Main properties, click on EDIT . The wizard Edit an application opens.
4. If custom classes are enabled at application level, in the list Application class select a class
or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. The Name and FQDN are displayed in a read-only gray field. You cannot edit them.
6. Edit the list Selected GSLB servers according to your needs. Only GSLB enabled physical
servers are listed, whether they are managed by a smart architecture or not.
Select a server in the list Available GSLB servers and click on to add it the list Selected
GSLB servers. Select a server in the list Selected GSLB servers and click on to remove
it move it back to the list Available GSLB servers.
7. Repeat the operation for as many as servers as needed.
8. Click on OK to complete the operation. The report opens and closes. The application prop-
erties are updated.
Deleting Applications
You can delete an application. Note that:
• Deleting an application also deletes the pools and nodes it contains.
• You cannot delete a deployed application.
You must either delete the application itself or dissociate the relevant GSLB server from the
application, the dedicated deployment line is no longer listed. For more details, refer to the
section Editing Applications.
To delete an application
1. In the sidebar, go to Application > Applications. The page All applications opens.
2. Tick the application(s) of your choice.
3. In the menu, click on . The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The application is no
longer listed, the deployed application lines are deleted as well.
824
Chapter 55. Managing Pools
From the page All pools you can manage IPv4 and IPv6 pools. Pools belong to applications and
manage nodes.
If the application they belong to is associated with a GSLB enabled server, the pools are deployed
on your network.
When an application is deployed on at least one GSLB server, when a client queries a domain:
1. The application handles the query if it is configured with the relevant FQDN.
2. It directs the query to the appropriate pool.
3. The pool load balancing configuration determines towards which node the query is directed.
Browsing Pools
The pool is the second level of the Application hierarchy.
NODE
APPLICATION POOL
NODE
825
Managing Pools
Down The Operational status of all the nodes of the pool is Inactive.
Adding Pools
From the page All pools you can add IPv4 and IPv6 pools in your applications, they allow to
manage nodes.
The page may list pools added from the page All applications via the menu Application and traffic
policy. For more details, refer to the section Adding and Deploying Applications and Traffic
Policies.
826
Managing Pools
To add a pool
1. In the sidebar, go to Application > Pools. The page All pools opens.
2. In the menu, select Add. The wizard Add a pool opens.
3. In the list Application name, select the application of your choice. If some application classes
are enabled, only the applications matching the selected Application class are displayed.
Click on NEXT . The last page opens.
4. In the field Name, specify the name of the pool.
5. In the drop-down list Protocol, select IPv4 or IPv6. The page refreshes. By default, IPv4 is
selected.
6. In the drop-down list Load balancing mode, select Round-robin, Latency or Weighted. By
default, Round-robin is selected.
Mode Description
Round-robin The traffic is evenly directed to all active nodes. Within the pool, all active nodes weight
1 and backup nodes weight 0.
Latency The traffic is directed to the active nodes with the best latency. If you select this mode,
the field Max. preferred nodes appears.
Max. preferred The maximum number of nodes with the lowest latency that must
nodes answer the queries made to the application FQDN. Only the active
nodes of the pool answer the queries. By default, it is set to 1.
Weighed The redirection of traffic depends on the weight you set for the active nodes, the nodes
set with the greater weight answer first. All backup nodes weight 0 .
7. You can tick the box Enable session affinity to set a period of time during which the pool
sends out the same answer to a given client, no matter how many times they query the same
information. If you tick the box, the field Session duration appears.
8. In the field Session duration, specify the duration of the session affinity, in seconds. By
default, it is set to 300.
9. Click on OK to complete the operation. The report opens and closes. The pool is listed.
If the application it belongs to is associated with one or more GSLB servers, click on on
the right-end side of the menu. Several lines appear under the pool itself, there is a line for
each of the server(s) the application is deployed on.
Editing Pools
You can edit pools, whether they were added from the page All pools or the page All applications
via the menu Application and traffic policy.
827
Managing Pools
To edit a pool
1. In the sidebar, go to Application > Pools. The page All pools opens.
2. At the end of the line of the pool of your choice, whether it belongs to a deployed application
or not, click on . The pool properties page opens.
3. In the panel Main properties, click on EDIT . The wizard Edit a pool opens.
4. Edit the pool Name, Load balancing mode and/or Enable session affinity configuration
according to your needs.
5. Click on OK to complete the operation. The report opens and closes. The pool properties
are updated.
Deleting Pools
You can delete a pool. Note that:
• Deleting a pool also deletes the nodes it contains.
• You cannot delete a deployed pool. In the column Application name, a deployed pool belongs
to a deployed application.
You must either delete the pool itself or dissociate the relevant GSLB server from the parent
application. Once the GSLB server is dissociated from the application, the dedicated pool de-
ployment line is no longer listed. For more details, refer to the section Editing Applications.
To delete a pool
1. In the sidebar, go to Application > Pools. The page All pools opens.
2. Tick the pool(s) of your choice.
3. In the menu, click on . The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The pool is no longer
listed, the deployed pool lines are deleted as well.
828
Chapter 56. Managing Nodes
From the page All nodes you can manage IPv4 and IPv6 nodes. As nodes belong to pools they
are configured with either an IPv4 or IPv6 address.
If the application they belong to is associated with a GSLB enabled server, the nodes are deployed
on your network.
A node is the endpoint of a query. Each node must be configured with a unique IP address and
can be configured with a heath check that verifies its status and allows it to answer queries.
When a traffic policy is set and deployed on at least one GSLB server, when a client queries a
domain:
1. The application handles the query if it is configured with the relevant FQDN.
2. It directs the query to the appropriate pool.
3. All the node health checks are executed within the pool. If the health checks succeed and the
node status is cleared, the IP address of one or all the nodes can be sent out to the client.
4. Depending on the pool load balancing mode and configuration, it determines which node is
best suited to answer the query.
You can monitor initial health check failures and node status changes on the page Syslog. For
more details, refer to the section Managing the Logs.
Browsing Nodes
The node is the lowest level of the Application hierarchy.
NODE
APPLICATION POOL
NODE
829
Managing Nodes
4. To display the nodes of a specific application, in the column Application Name, click on the
name of the application of your choice. The page refreshes.
5. To display the nodes of a specific pool, in the column Pool Name, click on the name of the
pool of your choice. The page refreshes.
Note that for IPv6 addresses, you can compress or uncompress the display via the button or
display IPv6 labels above parts of the addresses listed via the button . For more details, refer
to the chapter Managing IPv6 Labels.
Extra columns, dedicated to health checks are available. They display the Expert mode configur-
ation details or N/A.
830
Managing Nodes
Column Description
HC Failback threshold The number of times, between 1 and 10, the health check should return the same result
before setting the node Operational status to Active.
HC Failover threshold The number of times, between 1 and 10, the health check should return the same result
before setting the node Operational status to Inactive.
HC Frequency The number of seconds between health checks, either 10, 30, 60 or 500. The total number
of health checks performed depend on the HC Failback threshold and HC Failover
threshold.
HC Timeout The health check timeout, between 1 and 10 seconds. Beyond this period, the health check
times out if the node is not responding.
Active The health check configured for the node determined that the node is up.
Unknown The operating status of the node at first, it changes after the initial health check.
N/A The operating status is not applicable. The column only displays values for deployed
nodes.
Adding Nodes
From the page All nodes you can add nodes to IPv4 and IPv6 pools.
The page may list nodes added from the page All applications via the menu Application and traffic
policy. For more details, refer to the section Adding and Deploying Applications and Traffic
Policies.
831
Managing Nodes
• The health checks can only be performed if the GSLB server(s) associated with the application
the node belongs to and the node itself can communicate. You can monitor initial health check
failures on the page Syslog. For more details, refer to the section Managing the Logs.
• Within a pool configured with the load balancing mode Latency:
• All nodes must be configured with the same health check type to guaranty a fair comparison
of the latency of each node and ensure an appropriate traffic redirection.
• You must not configure nodes with the health check None because any node configured
without health check is directed traffic, in addition to the configured Maximum number of
preferred nodes.
• Each node status change is detailed in the logs. For more details, refer to the section Managing
the Logs.
Note that you can display labels on IPV6 nodes, for more details refer to the chapter Managing
IPv6 Labels.
To add a node
1. In the sidebar, go to Application > Nodes. The page All nodes opens.
2. In the menu, select Add. The wizard Add a node opens.
3. In the list Application name, select the application of your choice, each application is followed
by its FQDN. If application classes are enabled, only the application(s) matching the selected
Application class are displayed.
Click on NEXT . The next page opens.
4. In the list Pool name, select the pool of your choice, each pool is listed as follows: <pool-
name> [protocol-version].
Click on NEXT . The last page opens.
5. In the field Name, specify the name of the node.
6. In the field IP address, specify the IPv4 or IPv6 address of the node, depending on the se-
lected Pool protocol.
7. In the drop-down list Mode, select Active or Backup.
This field is not displayed if you selected a pool with the load balancing mode Latency, as
all nodes are active by default.
8. In the field Weight, specify the value of your choice. It must be an integer between 0 and
255. Within the pool, the active nodes with the greater weight are queried first.
This field is only displayed for Active nodes belonging to a pool set with the load balancing
mode Weighted. All Backup nodes have a weight of 0.
9. In the drop-down list Health Check type, select None, Custom, HTTP(S), Ok, Ping or TCP.
By default, None is selected. For all types, except None, one or more fields appear.
832
Managing Nodes
833
Managing Nodes
Editing Nodes
You can edit nodes, whether they were added from the page All nodes or the page All applications
via the menu Application and traffic policy.
To edit a node
1. In the sidebar, go to Application > Nodes. The page All nodes opens.
2. At the end of the line of the node of your choice, whether it belongs to a deployed application
or not, click on . The node properties page opens.
3. In the panel Main properties, click on EDIT . The wizard Edit a node opens.
4. Edit the node Name, Mode, Health Check type and/or Expert mode configuration according
to your needs. For more details regarding the types and expert configuration, refer to the
table above.
5. Click on OK to complete the operation. The report opens and closes. The pool properties
are updated.
By default, all nodes are managed when you add them. Unmanaging a node allows to make sure
that queries are never redirected toward the node you chose.
834
Managing Nodes
Keep in mind that you cannot unmanage a deployed node. In the column Application name, a
deployed node belongs to a deployed application.
To manage/unmanage a node
1. In the sidebar, go to Application > Nodes. The page All nodes opens.
2. Tick the node(s) of your choice.
3. In the menu, select Edit > Manage > Yes or No. The wizard opens.
4. Click on OK to complete the operation. The report opens and closes. In the column Status,
the selected nodes are marked OK or Unmanaged.
Deleting Nodes
You can delete a node. Note that:
• Instead of deleting a node, you may need to unmanage it. For more details, refer to the section
Managing or Unmanaging Nodes.
• You cannot delete a deployed node. In the column Application name, a deployed node belongs
to a deployed application.
You must either delete the node itself, delete the pool it belongs to, or dissociate the relevant
GSLB server from the parent application. Once the GSLB server is dissociated from the applic-
ation, the dedicated node deployment line is no longer listed. For more details, refer to the
section Editing Applications.
To delete a node
1. In the sidebar, go to Application > Nodes. The page All nodes opens.
2. Tick the node(s) of your choice.
3. In the menu, click on . The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The node is no longer
listed, the deployed node lines are deleted as well.
835
Part X. Guardian
Guardian offers adaptive security to DNS cache and recursive services by detecting threats and activating
adapted counter measures to ensure DNS services continuity and attack mitigation.
Guardian operates in a secured framework, with the cache separated from the recursive DNS engines. It
performs a continuous real-time analysis of the inbound and outbound traffic and therefore offers complete
DNS Transactions Inspection (DTI).
This analysis is especially reliable if a large number of queries is cached. By default, Guardian caches all
the answers to client queries. The answers not cached yet, are sent to the DNS resolver and transmitted to
Guardian, that caches them and sends them back to the client. That way, Guardian has an ever-growing
number of queries to refine its analysis of the network and avoid potential threats.
Guardian is managed from the graphical user interface and via command-line interface:
1. From the GUI, you can configure the module, monitor the server, set Guardian parameters, flush clients
and cache, manage and configure policies and triggers.
2. Via CLI, you can connect to Guardian using SSH to display its configuration, monitor and manage its
cache and client statistics, configure lists.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
57. Configuring Guardian ............................................................................................... 839
Prerequisites ........................................................................................................ 839
Limitations ............................................................................................................ 839
Enabling the Service DNS Guardian ....................................................................... 840
Getting Started With Guardian ............................................................................... 841
58. Setting Guardian Parameters .................................................................................... 844
Browsing Guardian Configuration ........................................................................... 844
Available Guardian Parameters .............................................................................. 845
Editing Guardian Configuration .............................................................................. 848
Configuring the Action Quarantine Redirect ............................................................ 849
Enabling or Disabling Guardian Cache ................................................................... 850
Capturing Guardian Traffic ..................................................................................... 852
59. Monitoring Guardian ................................................................................................ 853
Monitoring Guardian Statistics ............................................................................... 853
Monitoring Guardian Analytics ............................................................................... 857
60. Managing Guardian Statistics ................................................................................... 864
Managing Guardian Server Statistics ...................................................................... 864
Managing Guardian Client Statistics ....................................................................... 874
61. Managing Guardian Cache ....................................................................................... 884
Displaying Guardian Cache Content ....................................................................... 884
Resetting Guardian Cache ..................................................................................... 889
Saving Guardian Cache ......................................................................................... 890
Restoring Guardian Cache .................................................................................... 890
Forcing Cache Entries as Expired .......................................................................... 890
Clearing Guardian Cache Manually ........................................................................ 891
Clearing Guardian Cache Automatically .................................................................. 893
Sharing the Cache Between Several Guardian Servers ........................................... 895
62. Managing Policies .................................................................................................... 898
Browsing Policies .................................................................................................. 898
Adding and Deploying Policies ............................................................................... 899
Duplicating Policies ............................................................................................... 900
Editing Policies ...................................................................................................... 900
Deleting Policies ................................................................................................... 901
63. Managing Triggers ................................................................................................... 902
Prerequisites ........................................................................................................ 902
Limitations ............................................................................................................ 903
Browsing Triggers .................................................................................................. 903
Adding Triggers ..................................................................................................... 904
Enabling Querylog and Answerlog on Triggers ........................................................ 918
Editing Triggers ..................................................................................................... 920
Managing or Unmanaging Triggers ......................................................................... 921
Deleting Triggers ................................................................................................... 921
64. Managing Guardian Views ........................................................................................ 922
Displaying the Views Configuration ......................................................................... 922
Enabling or Disabling Views ................................................................................... 923
Identifying the Clients Querying the Views .............................................................. 924
Using Lists to Filter Guardian Views ....................................................................... 927
Logging List Filters Client Activity ........................................................................... 932
Setting a Transparent DNS Proxy for Guardian Views .............................................. 933
65. Managing Lists ........................................................................................................ 934
Displaying the Lists Content ................................................................................... 935
837
Guardian
838
Chapter 57. Configuring Guardian
To configure the module Guardian and use it to its fullest, you must:
• Meet the prerequisites.
• Take into account the limitations.
• Configure and enabling the service DNS Guardian.
Once the module is configured, we recommend that your make the first configurations detailed
in the section Getting Started.
Prerequisites
• An appliance with at least 8 GB of RAM:
• Either a Blast-series hardware appliance, or any hardware model, except SOLIDserver-260
and SOLIDserver-3300, with a license including the option Guardian.
• Or a virtual appliance with a license including the option Guardian. It must be configured
with an intel network card (em*, ig*, igb*, ix*, ixg*, ixv* or ixl*) or a VMware VMXNET network
card (vmx*).
SOLIDserver-4000 Blast and SOLIDserver-Blast-4070 virtual appliances require a PCI Pass-
1
through to a physical Intel X520 NIC in virtual environments .
• A license key on every appliance where DNS Guardian is enabled.
• An appliance properly configured:
• The communication between the server and its clients has to be over UDP and/or TCP.
• Both DNS and Guardian dedicated services must be running to ensure Guardian is used at
its full potential. Make sure that either the services DNS Guardian and DNS server (named)
or the services DNS Guardian and DNS server (unbound) are both enabled and started.
• The appropriate rights and resources configured for end users:
• To see the module Guardian and its content, users must belong to a group that is granted
the right Display: policies list. This right is allowed by default.
• To manage the objects in the module Guardian, users must belong to a group that is granted
access to the policies and triggers Guardian rights.
• To deploy a policy on a Guardian server, users must belong to a group that is granted the
right Display: DNS servers list and has the server among its resources.
• To manage Guardian parameters in the module DNS, users must belong to a group that is
also granted the rights Add: Guardian parameters.
Note that Guardian is designed to express its full potential when combined with SOLIDserver
Blast series hardware appliances, whose recursive service can manage up to 17 million QPS.
Limitations
• Guardian servers in version lower than 7.1 can only be configured and managed through CLI.
If the server is in a lower version, you cannot manage it from the GUI.
• Guardian servers cannot be configured with more than 16 views.
• Guardian servers do not allow capturing the network traffic answered by the service.
1
As in VMware environments: https://kb.vmware.com/s/article/1010789
839
Configuring Guardian
Note that if your license includes both DNS Guardian and DNS GSLB, you must configure the
line DNS Guardian / GSLB server as both features rely on the same service.
840
Configuring Guardian
You can manage the service DNS Guardian, like any other service. For more details, refer to the
section Enabling or Disabling a Service in the chapter Configuring the services. Note that:
• Disabling DNS Guardian:
• Stops the service and automatically saves Guardian cache.
• In the GUI, the server statistics and analytics are no longer available, on Guardian properties
page and on the page Analytics.
• Enabling DNS Guardian again, starts the service and restores the latest saved version of the
cache.
• Stopping DNS Guardian does not disable it, all the server statistics and analytics data is still
available but the information is outdated and therefore no longer reliable.
841
Configuring Guardian
You can edit or delete any of these triggers according to your needs. Note that configuring a
trigger with the action quarantine provides service continuity to your clients, as all cached
queries would get answered. For more details, refer to the sections Editing Triggers and De-
leting Guardian Triggers in the chapter Managing Triggers.
Your changes are applied to the trigger deployment.
3. Analyze the statistics and analytics
When your triggers match your needs, you should monitor them to analyze which of their
metric(s) and threshold(s) armed and disarmed the triggers:
• The GUI provides cache, client and request data statistics on the server properties page,
and analytics on a dedicated page. For more details, refer to the chapter Monitoring
Guardian.
• Via CLI, you can also display and manage client and server statistics. For more details,
refer to the chapter Managing Guardian Statistics.
4. Update your triggers
After analyzing the statistics and analytics, you have an overview of your network traffic and
actions triggered.
You can now update your triggers. You may need to prevent executing some triggers on
trusted clients, configure new thresholds on existing triggers or even add new triggers for un-
wanted clients. For more details, refer to the sections Editing Triggers and Adding Triggers in
the chapter Managing Triggers.
5. Use the client information in your triggers
The statistics and analytics analysis allowed to highlight specific client data, like who regularly
queried your server. Thanks to Guardian lists, you can gather this client information and use
it in your trigger configurations.
There are two client dedicated list types, client and specific client-id, that you can take into
account in your triggers, to avoid false positive on trusted clients or to execute specific actions
on untrusted ones.
For more details on how to configure lists, refer to the section Configuring the Content of a
List in the chapter Managing Lists.
For more details on list use, refer to the section Adding Triggers Relying on Lists Metrics in
the chapter Managing Triggers or to the section Identifying Clients via a List in the chapter
Managing Lists.
6. Manage Guardian cache
The statistics and analytics analysis also gave you an overview of cached answered.
You can display the server cache, reset it, save it, restore it, clear it and share it with other
Guardian servers. For more details, refer to the chapter Managing Guardian Cache.
7. Customize the Rescue mode
By default, Guardian is configured with a Rescue mode that can take over answering clients
if the server is saturated to ensure service continuity.
Its default values are set high enough to avoid unintentionally switching the server to Rescue
mode.
You can customize the Rescue mode settings or to force the Rescue mode. For more details,
refer to the chapter Managing the Rescue Mode.
You can configure further the server with up to 16 views. By default, only view0 is enabled and
used. The views configuration relies on a set of dedicated parameters, that can take into account
your lists, and allow for instance to redirect traffic or even identify clients in the statistics. For
more details, refer to the chapter Managing Guardian Views.
842
Configuring Guardian
In addition, as your Guardian server can be both recursive and authoritative, you may need to
manage the zones it has authority over, and the records they contain. For more details, refer to
the chapters Managing DNS Zones and Managing DNS Resource Records of the part DNS.
843
Chapter 58. Setting Guardian Parameters
Once you configured the module and started the service DNS Guardian, you can manage your
Guardian server parameters.
You can display, set or edit and save Guardian configuration from the GUI or via CLI.
3. Display Guardian current configuration, all its parameters and values, use the command:
show config
Note that if a parameter is configured with its default value, it is not displayed in the panel is only
available in the configuration wizard, accessible if you click on EDIT.
844
Setting Guardian Parameters
845
Setting Guardian Parameters
846
Setting Guardian Parameters
847
Setting Guardian Parameters
Note that you can define Guardian parameters on a smart architecture so that the servers in the
smart inherit them. At server level, you can override the inherited values.
If you set a parameter via CLI, after a couple of minutes, it appears in the GUI.
848
Setting Guardian Parameters
2. At the end of the line of the Guardian server of your choice, click on . The properties page
opens.
3. In the panel Options, click on EDIT . The wizard Options configuration opens.
4. Click on NEXT until you reach the last page of the wizard. The list of all Guardian parameters
is displayed.
5. In the drop-down list Display options(s), select which parameters to display: all, using non-
default values, using default values or different from smart.
6. For the parameters of your choice, select or specify a value. For more details, refer to the
table Guardian configuration parameters.
Note that if you change the filter in the drop-down list Display option(s), and if you have
changed the value of a parameter that is not displayed anymore, it is not saved.
7. Click on OK . The report works for a while and closes.
In the panel Options, the parameters with a value different from the default one are displayed.
where the expected parameter and value are detailed in the table Guardian configuration
parameters. Note that hitting the tabulation key on your keyboard returns help information.
By default the action is disabled, as it redirects clients to the localhost.You must set the redirection
to the IP address of your choice.
Before configuring the quarantine redirect, keep in mind that it relies on:
1. A target IP address, where clients are redirected when the trigger is armed or when their
query matches a list configuration on a view.
• In IPv4, the target IP is defined by the parameter Quarantine redirect a. By default, it is
set to 127.0.0.1
• In IPv6, the target IP is defined by the parameter Quarantine redirect aaaa. By default, it
is set to ::1
2. A duration defined by the parameter Quarantine redirect ttl. By default, it is set to 30 seconds,
it applies to the IPv4 and IPv6 redirections.
849
Setting Guardian Parameters
2. At the end of the line of the Guardian server of your choice, click on . The properties page
opens.
3. In the panel Options, click on EDIT . The wizard Options configuration opens.
4. Click on NEXT until you reach the last page of the wizard. The list of all Guardian parameters
is displayed.
5. In the drop-down list Display options(s), all is selected.
6. Scroll down until you get to the parameters, they are listed in alphabetical order:
a. In the field Quarantine redirect a, specify the IPv4 address of your choice. By default,
it is set to 127.0.0.1.
b. In the field Quarantine redirect aaaa, specify the IPv6 address of your choice. By default,
it is set to ::1.
c. In the field Quarantine redirect ttl, specify the number of seconds of your choice. By
default, it is set to 30.
7. Click on OK . The report works for a while and closes.
In the panel Options, the values you changed are displayed.
3. Specify the IPv4 address of your choice in the parameter quarantine_redirect_a using
the command:
set quarantine_redirect_a=<IPv4-address>
Once your configuration is complete, it applies to all the triggers and views configured with the
action Quarantine redirect. For more details, refer to the sections Adding Triggers and Using
Lists to Filter Guardian Views.
The parameter blast allows to enable or disable the server cache. Disabling the cache allows
to stop answering clients while updating its content.
850
Setting Guardian Parameters
Note that the cache must be enabled to manage triggers or the Rescue mode.
However it can be disabled to stop using Guardian cache to answer client queries directly but
still update its content. For more details, refer to the section Disabling Guardian Protection.
851
Setting Guardian Parameters
When the capture is done, you can disable the parameter pcap. Note that you can also enable
and disable this parameter from the GUI, for more details refer to the section Editing Guardian
Configuration.
You can complete the command and specify the UDP port number of your choice.
5. You can disable the parameter pcap using the command:
set pcap=0
852
Chapter 59. Monitoring Guardian
Once you configured the module, the GUI allows to monitor the cache, client and request data
of the local DNS EfficientIP Guardian thanks to:
Statistics
Guardian cache is monitored in dedicated charts on the server properties page. For more
details, refer to the section Monitoring Guardian Statistics.
Analytics
Guardian client and request data is analyzed in dedicated tops on the page Analytics. For
more details, refer to the section Monitoring Guardian Analytics.
Malicious operations on the DNS infrastructure, such as DDoS, DNS tunneling or data exfiltration
attacks, usually result in overloaded servers and service loss for legitimate clients. You can use
the information provided by the Guardian client statistics to identify the different types of threats.
Note that:
• You can also display and manage statistics via CLI. For more details, refer to the chapter
Managing Guardian Statistics.
• By default, Guardian servers are both authoritative and recursive, the parameter recursive is
set to 2. This configuration may impact your statistics and analytics data as each authoritative
query results in a cache miss.
To lower this impact on the trigger executions, you can add a list containing the domain names
that the server has authority over and take it into account in your trigger(s). For more details,
refer to the section Configuring the Content of a List in the chapter Managing Lists and to the
sections Adding Triggers Relying on Lists Metrics in the chapter Managing Triggers.
Note that:
• All the information returned is based on server statistics available via CLI. Each panel
chart relies on statistics described in the table Guardian Server statistics of the chapter Managing
Guardian Statistics, where you can find more server statistics, client statistics and options via
CLI.
• All the panels contain at least one chart. The y-axis of these charts indicates the unit, the axis
scale and unit prefix depend on the period selected and maximum value displayed. Following
the standard ISO 80000-1, all the y-axis units can have no prefix or any SI prefix such as: m
(milli), k (kilo) or M (mega).
• Each panel can be used as a gadget and displayed on any dashboard. For more details, refer
to the section Assigning a Chart on a Properties Page as Gadget in the chapter Managing
Gadgets.
853
Monitoring Guardian
854
Monitoring Guardian
855
Monitoring Guardian
Sent YXRRSET rcode, Sent NXRRSET rcode, Sent NOTAUTH rcode and Sent NOTZONE
rcode.
Guardian - Triggers
A chart displaying the number of times each of the first 8 available triggers were armed. The
chart is generated using the position of each trigger, therefore even if you edit the trigger
name, action, period and/or threshold, the graph keeps evolving but might not always have
the same meaning, especially if you duplicate a policy as it resets the trigger positions. For
more details, refer to the chapters Managing Policies and Managing Triggers.
Based on: Number of time trigger #0 was armed, Number of time trigger #1 was armed,
Number of time trigger #2 was armed, Number of time trigger #3 was armed, Number of time
trigger #4 was armed, Number of time trigger #5 was armed, Number of time trigger #6 was
armed and Number of time trigger #7 was armed.
Guardian - Recursive queries latency
A chart displaying the recursive query latency distribution of Guardian, in queries per second.
The latency is divided into 6 periods and ranges from less than 10 milliseconds to more than
1600 milliseconds. Clients traffic rate can be limited to 100 queries per second using the
trigger action Ratelimit. For more details, refer to the chapter Managing Triggers.
Based on: Recursive queries with latency < 10ms, Recursive queries with latency >= 10ms
and < 100ms, Recursive queries with latency >= 100ms and < 500ms, Recursive queries
with latency >= 500ms and < 800ms, Recursive queries with latency >= 800ms and < 1600ms
and Recursive queries with latency >= 1600ms.
Guardian - Rate limited traffic (Queries)
A chart displaying the number of queries dropped by Guardian because source clients reached
the configured query limit rate (of 100 QPS), in queries per second. Clients traffic rate can
be limited to 100 queries per second using the trigger action Ratelimit. For more details, refer
to the chapter Managing Triggers.
Based on: Ratelimited queries.
856
Monitoring Guardian
All Guardian tops allow to monitor metrics measured via 5-minute samples over a specific time
window. As illustrated below, a dedicated chart allows to set the time widow and filter the data
to display.
The drop-down list Display allows to select the top of your choice. If you are displaying the
page Analytics of a Guardian server, only Guardian - Top <data> are listed.
Three view displays are available, Overview, Detailed view and Consolidated view. The
number of entries they return depend on the time window you set.
The time window displayed. The two buttons allow to open the calendar where you set
the start and end date and time.
The calendar displays in light gray the selected date. All the dates when data is available
are underlined, you can click on any one to set it as start or end. At the bottom, you can
select the hour and minute of your choice. If you click on NOW you can use the current date
and time as start or end.
A chart representation of the data returned by the top. It allows to zoom in and out to narrow
down the data returned and filter the list.
The timeline provides an overview of the chart. It also allows, like in the image, to select a
specific period to display in the chart and return in the list. For more details, refer to the
section Charts in the chapter Understanding the GUI.
The data matching the selected top, view and time window. Some columns are always empty
in Overview and Consolidated view.
857
Monitoring Guardian
Prerequisites
• Making sure that client statistics are enabled on the Guardian server. They are enabled by
default.
If on the server properties page, in the panel Options, the parameter Client stats is listed, it
means that it is not set with the default value and you need to enable it. For more details, refer
to the section Making Sure Guardian Client Statistics Are Enabled.
• Making sure the analytics are collected, as detailed below.
Note that until you display the analytics of a specific server, the page might display DNSTOP,
RPZ and Guardian analytics. For more details on DNS and RPZ data, refer to the section Monit-
oring DNS Servers from the Page Analytics in the chapter Monitoring and Reporting DNS Data.
858
Monitoring Guardian
Under these lists, a chart allows to set a time window and narrow down the data to return in
the columns. If no data is available for the selected top, the chart is empty.
Guardian analytics provide dedicated columns., depending on the top and view selected some
of them may be empty or not displayed.
You can filter and sort data through all columns, except Start date and Period that you can only
sort.
859
Monitoring Guardian
All tops return detailed 5-minute samples of data measurements of the server traffic, in number
of queries, size or recursion time. These metrics either return information based on the IP address
of a client or queried domain/record.
The information returned by each Guardian top depends on the selected view and on the
time window set.
All Guardian tops provide three different views for the chosen time window:
1. Overview returns a simplified display of the data for each 5-minute sample within the selected
time window. With the column Total, you can identify peaks in the traffic and get more inform-
ation with the consolidated or detailed view. These peaks are also displayed in the chart.
2. Consolidated view focuses on the client or query data, depending on the selected Top. When
a client IP address or a queried domain/record is repeatedly identified over the different 5-
minute samples within the selected time window, these sampling periods add up in the column
Period.
3. Detailed view focuses on a sampling period. For each 5-minute sampling period, this view
lists the number of times one IP address or a domain and RR type has been identified within
the selected time window.
860
Monitoring Guardian
All tops are based on some of the server statistics available via CLI. The data used is indicated
after each description. For more details, refer to the tables Guardian client statistics and Guardian
analytics columns.
861
Monitoring Guardian
862
Monitoring Guardian
863
Chapter 60. Managing Guardian
Statistics
Once you configured the module, you can fully manage Guardian statistics via CLI.
Malicious operations on the DNS infrastructure, such as DDoS, DNS tunneling or data exfiltration
attacks, usually result in overloaded servers and service loss for legitimate clients. You can use
the information provided by the Guardian client statistics to identify the different types of threats.
DNS Guardian statistics gather all the metrics related to the client-server interactions in:
Server statistics
You can display, monitor or reset all server statistics, as detailed in the section Managing
Guardian Server Statistics.
Client statistics
You can display, reset and clear client statistics, as detailed in the section Managing
Guardian Client Statistics.
Note that:
• From the GUI, you can monitor Guardian cache, client and request data through statistics and
analytics. For more details, refer to the chapter Monitoring Guardian.
• By default, Guardian servers are both authoritative and recursive, the parameter recursive is
set to 2. This configuration may impact your server statistics data as each authoritative query
results in a cache miss.
To lower this impact on the trigger executions, you can add a list containing the domain names
that the server has authority over and take it into account in your trigger(s). For more details,
refer to the section Configuring the Content of a List in the chapter Managing Lists and to the
section Adding Triggers Relying on Lists Metrics in the chapter Managing Triggers.
• You can also monitor Guardian data yourself via SNMP. For more details, refer to the section
Monitoring Using SNMP in the chapter Monitoring.
864
Managing Guardian Statistics
865
Managing Guardian Statistics
866
Managing Guardian Statistics
Metrics Description
Sent TCP DNS answers The number of answers sent out by Guardian via TCP.
Sent TLS DNS answers The number of answers to DoT queries (DNS over TLS) sent out
by Guardian.
Sent DOH DNS answers The number of answers to DoH queries (DNS over HTTPS) sent
out by Guardian.
Received DNS queries The number of queries received by Guardian.
Received DNS queries (bytes) The total size of the packets received by Guardian.
Queries sent to the local recursive server The number of queries not already cached by Guardian that were
sent to the local DNS recursive server.
Queries sent to the local recursive server The total size of the packets not already cached by Guardian that
(bytes) were sent to the local DNS recursive server.
Answers sent by the local recursive server The number of queries not already cached by Guardian that were
answered by the local DNS recursive server.
Answers sent by the local recursive server The total size of the packets not already cached by Guardian that
(bytes) were answered by the local DNS recursive server.
Sent DNS answers in quarantine mode The number of answers sent out by Guardian to quarantined clients.
Sent DNS answers in quarantine mode The total size of the packets sent to quarantined clients.
(bytes)
Sent DNS answers in quarantine_redirect The number of answers redirected to an IP address because a
mode trigger or view executed the action Quarantine redirect. For more
details, refer to the section Configuring the Action Quarantine Re-
direct.
Sent DNS answers in quarantine_redirect The total size of the packets redirected to an IP address because
mode (bytes) a trigger or view executed the action Quarantine redirect. For more
details, refer to the section Configuring the Action Quarantine Re-
direct.
Sent DNS answers in rescue mode The number of queries sent by Guardian once it switched to rescue
mode.
Sent DNS answers in rescue mode (bytes) The total size of the packets sent by Guardian once it switched to
rescue mode.
Received Invalid DNS queries The number of invalid queries received by Guardian.
Received Invalid DNS queries (bytes) The total size of the invalid queries packets received by Guardian.
Received SERVFAIL from local recursive The number of SERVFAIL error messages received by Guardian
server (rcode changed) from the local recursive server that previously returned a different
rcode for the same query. To stop taking into account these results,
refer to the section Ignoring the SERVFAIL Error Message Differ-
ences.
List matched queries The number of queries that match a Guardian list entry. For more
details, refer to the chapter Managing Lists.
Discarded outgoing DNS packets The number of DNS packets received and discarded by Guardian.
Discarded outgoing DNS packets (received The number of DNS packets sent to the local DNS recursive server
by local recursive server) and transmitted to the client.
Discarded incoming packets The number of incoming packets that were discarded.
Discarded DNS queries (sent to local recurs- The number of packets sent to the local DNS recursive server that
ive server) were discarded.
Recursive queries with latency < 10ms The number of recursive queries which answering time is lower than
10 milliseconds.
Recursive queries with latency >= 10ms and The number of recursive queries which answering time is equal to
< 100ms 10 or lower than 100 milliseconds.
Recursive queries with latency >= 100ms The number of recursive queries which answering time is equal to
and < 500ms 100 or lower than 500 milliseconds.
867
Managing Guardian Statistics
Metrics Description
Recursive queries with latency >= 500ms The number of recursive queries which answering time is equal to
and < 800ms 500 or lower than 800 milliseconds.
Recursive queries with latency >= 800ms The number of recursive queries which answering time is equal to
and < 1600ms 800 or lower than 1600 milliseconds.
Recursive queries with latency >= 1600ms The number of recursive queries which answering time is equal to
or higher than 1600 milliseconds.
Sent NOERROR rcode The number of NOERROR error messages sent by Guardian.
Sent FORMERR rcode The number of FORMERR error messages sent by Guardian.
Sent SERVFAIL rcode The number of SERVFAIL error messages sent by Guardian.
Sent NXDOMAIN rcode The number of NXDOMAIN error messages sent by Guardian.
Sent NOTIMP rcode The number of NOTIMP error messages sent by Guardian.
Sent REFUSED rcode The number of REFUSED error messages sent by Guardian.
Sent YXDOMAIN rcode The number of YXDOMAIN error messages sent by Guardian.
Sent YXRRSET rcode The number of YXRRSET error messages sent by Guardian.
Sent NXRRSET rcode The number of NXRRSET error messages sent by Guardian.
Sent NOTAUTH rcode The number of NOTAUTH error messages sent by Guardian.
Sent NOTZONE rcode The number of NOTZONE error messages sent by Guardian.
Received NOERROR rcode from local recurs- The number of NOERROR error messages received by Guardian
ive server from the local recursive server.
Received FORMERR rcode from local recurs- The number of FORMERR error messages received by Guardian
ive server from the local recursive server.
Received SERVFAIL rcode from local recurs- The number of SERVFAIL error messages received by Guardian
ive server from the local recursive server.
Received NXDOMAIN rcode from local re- The number of NXDOMAIN error messages received by Guardian
cursive server from the local recursive server.
Received NOTIMP rcode from local recursive The number of NOTIMP error messages received by Guardian from
server the local recursive server.
Received REFUSED rcode from local recurs- The number of REFUSED error messages received by Guardian
ive server from the local recursive server.
Received YXDOMAIN rcode from local re- The number of YXDOMAIN error messages received by Guardian
cursive server from the local recursive server.
Received YXRRSET rcode from local recurs- The number of YXRRSET error messages received by Guardian
ive server from the local recursive server.
Received NXRRSET rcode from local recurs- The number of NXRRSET error messages received by Guardian
ive server from the local recursive server.
Received NOTAUTH rcode from local recurs- The number of NOTAUTH error messages received by Guardian
ive server from the local recursive server.
Received NOTZONE rcode from local recurs- The number of NOTZONE error messages received by Guardian
ive server from the local recursive server.
Note that:
• You can filter the server statistics by view.
• Some of the server statistics are used to generate charts available in the GUI, for more details
refer to the section Monitoring Guardian Statistics.
• By default, Guardian servers are both authoritative and recursive, the parameter recursive is
set to 2. This configuration may impact your server statistics data as each authoritative query
results in a cache miss.
To lower this impact on the trigger executions, you can add a list containing the domain names
that the server has authority over and take it into account in your trigger(s). For more details,
868
Managing Guardian Statistics
refer to the section Configuring the Content of a List in the chapter Managing Lists and to the
section Adding Triggers Relying on Lists Metrics in the chapter Managing Triggers.
• You can also monitor the server or view statistics to display more information, refreshed every
second. For more details, refer to the section Monitoring Guardian Server Statistics in Real-
Time.
4. To display the Guardian server statistics of a specific view, use the command:
show stats view=#
where # is an integer between 0 and 15 that corresponds to the order you set for the local
recursive server views. For more details, refer to the chapter Managing Guardian Views.
The monitoring command returns Guardian data statistics as follows, the column Avg /s is updated
every second, while the column Cumulative displays the values collected since the last reset.
DNS Blast> monitor
869
Managing Guardian Statistics
The command returns the following data, it includes all the statistics described in the table
Guardian Server statistics, and are preceded by the current measurement rates:
870
Managing Guardian Statistics
Metrics Description
Cache miss rate The percentage of queries that cannot be answered by the cache, all modes
taken together. This line is only returned if you monitor the statistics. For
more details, refer to the section Monitoring Guardian Server Statistics in
Real-Time.
Block query rate The percentage of queries that are blocked. This line is only returned if you
monitor the statistics. For more details, refer to the section Monitoring
Guardian Server Statistics in Real-Time.
Note that:
• A set of filters allow to monitor more specific data.
• You can reset the data of the column Cumulative. For more details, refer to the section Resetting
Guardian Server Statistics.
871
Managing Guardian Statistics
872
Managing Guardian Statistics
Resetting the data updates the content of the column Cumulative returned by the command
monitor.
You can force Guardian to stop detecting this difference in the commands show stats and
monitor, it allows to ignore the line Received SERVFAIL from local recursive server (rcode
changed) when you execute either command. For more details, refer to the sections Displaying
Guardian Server Statistics and Monitoring Guardian Server Statistics in Real-Time.
873
Managing Guardian Statistics
3. In the panel Options, click on EDIT . The wizard Options configuration opens.
4. Click on NEXT until you reach the last page of the wizard.
5. In the drop-down list Display option(s), select all. The list of all Guardian parameters is
displayed.
6. To disable the detection of SERVFAIL message differences, in the field Servfail diff, select
no (0).
7. Click on OK to complete the operation. The wizard closes.
If on the Guardian server properties page, in the panel Options, the parameter Client stats is
listed, it means that it is not set with the default value and you need to enable it.
874
Managing Guardian Statistics
RCODE RETURNED:
RCODE | Total | Percent
NOERROR | 569609 | ( 63.87%)
SERVFAIL | 6673 | ( 0.75%)
NXDOMAIN | 308101 | ( 34.55%)
RCODE RETURNED:
RCODE | Total | Percent
NOERROR | 2 | (100.00%)
875
Managing Guardian Statistics
876
Managing Guardian Statistics
Note that:
• Some of the client data is used to generate analytics available in the GUI. For more details,
refer to the section Displaying Guardian Analytics Tops.
• You can limit and order the statistics, even if you filter them.
By default, the command displays 50 clients, the ones with the highest number of queries.
6. To sort the entries in descending order based on specific data, use the command:
show clients order=<data-type>
877
Managing Guardian Statistics
where filter is one of the following, that you can combine with limit and order.
878
Managing Guardian Statistics
Table 60.9. Available distribution data filters for Guardian client statistics
Filter Description
distribution-value = <value> The information to return and distribute, the available data is detailed below.
avg-recurs-time The average recursion time, recurs-time, spent by the local
recursive server to answer queries, in milliseconds.
c-hit The number of cache hits, queries for which the answer was
in the cache.
c-miss-not-exist The number of cache misses never queried, queries for which
the answer was not in the cache because they were never
queried.
c-miss The number of cache misses, queries for which the answer
was not in the cache.
last-used The last time the client queried the server, in seconds.
qa-sz-ratio The ratio of the queries and answers size, in bytes, returned
by hit-Q-sz, miss-Q-sz, hit-A-sz and miss-A-sz.
distribution-range = <number> The range of distribution of the data specified in the distribution-value.
distribution-minimum = <number> The minimum value to return. Only the data specified in the distribution-value
that match or exceed the minimum value you set are returned and distributed
into ranges specified in distribution-range.
RCODE RETURNED:
RCODE | Total | Percent
NOERROR | 6985k | ( 73.88%)
SERVFAIL | 147597 | ( 1.56%)
NXDOMAIN | 2267k | ( 23.98%)
879
Managing Guardian Statistics
where any accepted filter is described of the table Available filters for Guardian client statistics.
You can combine the filters.
880
Managing Guardian Statistics
where any accepted filter is described of the table Available filters for Guardian client statistics.
You can combine the filters.
clean_client0.cmd=lastused>86400
clean_client1.cmd=lastused>3600
max_client_entries
1000000 max_clean_client_percent
95
The clean commands are executed
if they match entries and 95%
of max_client_entries is reached
min_clean_client_percent
5
The clean commands are stopped
to keep 5% of max_client_entries
881
Managing Guardian Statistics
A set of parameters allow to define a maximum number of client identifiers in the cache, the
threshold to be reached to start the automatic clearing of the client entries and the maximum
number of remaining entries after the clearing:
• Clean client#.cmd allows to set up to 10 different clearing commands, numbered between 0
and 9. These parameters trigger clearing commands matching the filters of your choice.
The clearing commands are the entry point of the automated client clearing. The amount of
entries, or client identifiers, cleared depends on the parameters Max client entries, Max clean
client percent and Min clean client percent.
The automated clearing is only executed if:
1. At least one parameter Clean client#.cmd has a value. By default, the first two clearing
commands are configured.
2. The number of client identifiers left in the cache matches or exceeds the value of Min clean
client percent.
• Max client entries sets the maximum number of client identifiers, client entries, to store in the
cache. It applies to all the parameters Clean client#.cmd.
Its default value depends on the memory of each appliance:
• Max clean client percent sets the percentage of Max client entries to reach before clearing
the client entries matching one or more parameters Clean client#.cmd.
When the maximum percentage of client identifiers is reached, the clearing commands are
automatically executed in ascending order.
• Min clean client percent sets the percentage of Max client entries to keep in the cache after
clearing the client entries matching one or more parameters Clean client#.cmd.
The clearing commands are automatically executed until the number of remaining entries
equals or exceeds the minimum percentage of client entries.
Once Max clean client percent is reached, the cleaning command Clean client0.cmd is executed.
If the cache still contains more entries than the value of Min clean client percent, the command
Clean client1.cmd is executed. All the commands Clean client#.cmd are executed in order until
the percentage of entries remaining in the cache matches or is lower than the value of Min clean
client percent.
882
Managing Guardian Statistics
883
Chapter 61. Managing Guardian Cache
Once you configured the module, you can manage Guardian cache.
From the GUI, you can clear Guardian cache or share it incrementally.
Note that the cache data is then used at server and client levels to generate statistics that you
can manage via CLI and visualize from the GUI. For more details, refer to the chapter Managing
Guardian Statistics.
RCODE RETURNED:
RCODE | Total | Percent
NOERROR | 62362 | ( 81.61%)
SERVFAIL | 1481 | ( 1.94%)
NXDOMAIN | 12576 | ( 16.46%)
884
Managing Guardian Cache
RR TYPE:
Type | Total | Percent
A | 67047 | ( 87.74%)
NS | 34 | ( 0.04%)
CNAME | 10 | ( 0.01%)
SOA | 76 | ( 0.10%)
PTR | 1815 | ( 2.38%)
MX | 26 | ( 0.03%)
TXT | 555 | ( 0.73%)
AAAA | 6739 | ( 8.82%)
SRV | 80 | ( 0.10%)
NAPTR | 3 | ( 0.00%)
DS | 2 | ( 0.00%)
SSHFP | 12 | ( 0.02%)
DNSKEY | 3 | ( 0.00%)
ANY | 16 | ( 0.02%)
ORIGIN:
Origin | Total | Percent
L | 76419 | (100.00%)
885
Managing Guardian Cache
By default, the command displays 50 entries, in particular, the 50 most queried domains.
5. To sort the entries in descending order based on specific data, use the command:
show cache order=<data-type>
where filter is one of the following. You can combine the order and limit parameters with one
or several filters in one command.
886
Managing Guardian Cache
Filter Description
c-miss (>|<|=|!=) <number> The number of queries for which the TTL has expired.
recurs-time (>|<|=|!=) <milliseconds> The query recursion time, in milliseconds.
avg-recurs-time (>|<|=|!=) <milliseconds> The average recursion time, in milliseconds.
client_oid = <OID> The OID of any client in hexadecimal format, as follows <0-9a-
f>{16}. The client OID is returned by the command show clients,
for more details refer to the section Displaying Guardian Client
Statistics.
nb_client (>|<|=|!=) <number> The number of clients who queried the record, an integer
between 0 and 16.
ttl (>|<|=|!=) <seconds> The record TTL value, in seconds.
pkt-sz (>|<|=|!=) <bytes> The packet size of the query, in bytes.
qname-sz (>|<|=|!=) <bytes> The size of the domain name queried, in bytes.
qname-depth (>|<|=|!=) <number> The depth of the domain name queried, the number of subdo-
mains that the record includes.
lastused (>|<|=|!=) <seconds> The last time the entry was queried, in seconds.
first-used (>|<|=|!=) <seconds> The first time the entry was queried, in seconds.
view = # The entries matching a specific view, where # is an integer
between 0 and 15. If you did not enable any view, only view=0
returns data.
origin = <L|S> The origin of the record, either L for records cached by the local
Guardian server or S for records shared or sent by another
Guardian server. For more details, refer to the section Sharing
the Cache Between Several Guardian Servers.
opt = <-|DNSSEC|EDNS> The type of option configured on the record, either DNSSEC or
EDNS. Note that - indicates that no option was set.
aa-flag = <0|1> The AA flag setting returned by the server. All cached entries
set to 1 belong to an authoritative zone, all cached entries set
to 0 were obtained via recursion.
error (=|!=) <ERROR> The errors returned, either FORMERR, NOERROR, NOTIMP,
NXDOMAIN, REFUSED or SERVFAIL.
type_number = <0-65535> The number matching each record type, an integer between 0
and 65535., for instance, 1 for A records.
type = <RRTYPE> The type of the record in capital letters: A, AAAA, PTR, DS...
expired = <0|1> The records TTL expiration status, where 0 returns cached re-
cords with a valid TTL and 1 returns the expired records in the
cache. If you do not specify this filter, all the records are returned
no matter their TTL.
distribution-range = <number> A way to distribute the data in ranges based on their value. For
more details, refer to the section Distributing the Cache Statistics.
distribution-minimum = <number>
distribution-value = <value>
(!) <string> A regular expression or a domain, you can specify a full or partial
name. The specified value is excluded if preceded by !.
If you specify a domain, it must be the last parameter of the
command.
887
Managing Guardian Cache
Table 61.4. Available distribution data filters for Guardian cache statistics
Filter Description
distribution-value = <value> The information to return and distribute, the available data is detailed
below.
avg-recurs-time-all-hit: The average recursion time spent to answer all
the query hits, in seconds.
avg-recurs-time: The average recursion time spent to answer each query
hit, in seconds.
last-used: The last time the record was queried, in seconds.
pkt-sz-all-hit: The packet size of all query hits.
pkt-sz: The packet size of each query hit.
qname-depth-all-hit: The depth of all domain name query hits.
qname-depth: The depth of each domain name queried.
qname-sz-all-hit: The size of all domain name query hits.
qname-sz: The size of the domain name queried.
ttl-all-hit: The TTL of all query hits.
ttl: The TTL of each query hit.
distribution-range = <number> The range of distribution of the data specified in the distribution-value.
distribution-minimum = <number> The minimum value to return. Only the data specified in the distribution-
value that match or exceed the minimum value you set are returned and
distributed into ranges specified in distribution-range.
888
Managing Guardian Cache
RCODE RETURNED:
RCODE | Total | Percent
NOERROR | 40743 | ( 86.49%)
SERVFAIL | 3861 | ( 8.20%)
NXDOMAIN | 2501 | ( 5.31%)
RR TYPE:
Type | Total | Percent
A | 34748 | ( 73.77%)
NS | 5 | ( 0.01%)
SOA | 10 | ( 0.02%)
PTR | 2735 | ( 5.81%)
MX | 19 | ( 0.04%)
TXT | 59 | ( 0.13%)
AAAA | 5994 | ( 12.72%)
SRV | 71 | ( 0.15%)
NAPTR | 3 | ( 0.01%)
TYPE65 | 3461 | ( 7.35%)
ORIGIN:
Origin | Total | Percent
L | 47105 | (100.00%)
TTL distribution:
Value range | Total | Percent | % sum
0 -> 99 | 24744 | ( 52.53%) | ( 52.53%)
100 -> 199 | 2797 | ( 5.94%) | ( 58.47%)
200 -> 299 | 2406 | ( 5.11%) | ( 63.57%)
300 -> 399 | 5434 | ( 11.54%) | ( 75.11%)
400 -> 499 | 280 | ( 0.59%) | ( 75.71%)
500 -> 599 | 329 | ( 0.70%) | ( 76.40%)
600 -> 699 | 1123 | ( 2.38%) | ( 78.79%)
700 -> 799 | 212 | ( 0.45%) | ( 79.24%)
800 -> 899 | 271 | ( 0.58%) | ( 79.81%)
900 -> 999 | 1279 | ( 2.72%) | ( 82.53%)
1000 -> 1099 | 113 | ( 0.24%) | ( 82.77%)
1100 -> 1199 | 108 | ( 0.23%) | ( 83.00%)
1200 -> 1299 | 182 | ( 0.39%) | ( 83.38%)
1300 -> 1399 | 113 | ( 0.24%) | ( 83.62%)
1400 -> 1499 | 202 | ( 0.43%) | ( 84.05%)
1500 -> 1599 | 109 | ( 0.23%) | ( 84.28%)
1600 -> 1699 | 87 | ( 0.18%) | ( 84.47%)
1700 -> 1799 | 118 | ( 0.25%) | ( 84.72%)
1800 -> 1899 | 1114 | ( 2.36%) | ( 87.08%)
1900 -> INF | 6084 | ( 12.92%) | (100.00%)
889
Managing Guardian Cache
3. To completely reset the current version of Guardian cache, use the command:
reset cache
where any accepted filter is described in the table Available filters for Guardian cache stat-
istics. You can also limit and order the data.
Keep in mind that every time you stop or restart DNS Guardian, the cache is automatically saved
or restored.
The cache is saved in the file /data1/dnsblast_cache.dump . Note that you cannot browse the
content of this file, it can only be used for restoration purposes.
The file /data1/dnsblast_cache.dump contains the latest version of the cache and is automatically
used when you restore the Guardian server cache.
3. Restore the last saved version of Guardian cache using the command:
load cache
890
Managing Guardian Cache
Forcing cache entries as expired allows to keep them in the cache. These entries are no longer
used to answer client queries, but they are still monitored in the statistics.
4. To set only a part of Guardian cache entries as expired, use the command:
expire cache <filter>
where any accepted filter is described in the table Available filters for Guardian cache stat-
istics. You can also limit and order the data.
5. Tick the box Set Guardian entries as expired (do not flush) to force the specified entries
as expired. They remain in the cache.
If you do not tick the box, all specified entries are flushed. This operation is irreversible.
6. Click on OK to complete the operation. The wizard closes.
891
Managing Guardian Cache
3. To clear the cache records content, entirely or partly, use the command:
clear cache
4. To clear only a part of the cache records content, use the command:
clear cache <filter>
where any accepted filter is described of the table Available filters for Guardian cache stat-
istics. You can also limit and order the data.
The command returns the number of entries that were deleted as follows:
DNS Blast> clear cache (mit.edu|ietf)
32 entries flushed
done
892
Managing Guardian Cache
5. Leave the box Set Guardian entries as expired (do not flush) unticked to flush the specified
entries.
If you tick the box, the entries are forced as expired, but they are not deleted.
6. Click on OK to complete the operation. The wizard closes.
clean_cache0.cmd=lastused>86400
clean_cache1.cmd=lastused>60 used<10
clean_cache2.cmd=error!=NOERROR
max_cache_entries
1000000 max_clean_cache_percent
95
The clean commands are executed
if they match entries and 95%
of max_cache_entries is reached
min_clean_cache_percent
5
The clean commands are stopped
to keep 5% of max_cache_entries
A set of parameters allow to define a maximum number of entries in the cache, the threshold to
be reached to start the automatic clearing of the cache and the maximum number of remaining
entries after the clearing:
• Clean cache#.cmd allows to set up to 10 different clearing commands, numbered between 0
and 9. These parameters trigger clearing commands matching the filters of your choice.
The clearing commands are the entry point of the automated queries clearing. The amount of
entries cleared depends on the parameters Max cache entries, Max clean cache percent and
Min clean cache percent.
The automated clearing is only executed if:
1. At least one parameter Clean cache#.cmd has a value. By default, the first three clearing
commands are configured.
2. The number of entries left in the cache matches or exceeds the value of Min clean cache
percent.
• Max cache entries sets the maximum number of entries to store in the cache. It applies to all
the parameters Clean cache#.cmd.
Its default value depends on the memory of each appliance:
893
Managing Guardian Cache
• Max clean cache percent sets the percentage of Max cache entries to reach before clearing
the entries matching one or more parameters Clean cache#.cmd.
When the maximum percentage of entries is reached, the clearing commands are automatically
executed in ascending order.
• Min clean cache percent sets the percentage of Max cache entries to keep in the cache after
clearing the entries matching one or more parameters Clean cache#.cmd.
The clearing commands are automatically executed until the number of remaining queries
equals or exceeds the minimum percentage of entries.
Once Max clean cache percent is reached, the cleaning command Clean cache0.cmd is executed.
If the cache still contains more entries than the value set with Min clean cache percent, the
command Clean cache1.cmd is executed. All the commands Clean cache#.cmd are executed
in order until the percentage of entries remaining in the cache is equal or lower than the value
set with Min clean cache percent.
894
Managing Guardian Cache
Note that you can monitor cache sharing in the servers statistics, for more details refer to the
section Monitoring Guardian Cache Sharing Statistics in Real-Time in the chapter Managing
Guardian Statistics.
To set the cache sharing between Guardian servers, on each of them you must:
• Specify a common multicast IP address.
• Specify a common multicast port.
• Specify a common sharing key.
• Enable the sharing service.
• Set the TTL of the IP packets sent. By default, it is set to 1.
3. Set the multicast IP address for the sharing using the command:
set shared_cache_mcast_addr=<multicast-IP-address>
4. Set the multicast port used for the cache sharing using the command:
set shared_cache_mcast_port=<multicast-port>
895
Managing Guardian Cache
8. Repeat the steps 3 to 7 using the exact same IP address, port and key on all the Guardian
servers that should send and receive the new entries in their cache.
The entries on the local Guardian are marked origin: L while they are marked origin: S on the
receiving one. For more details, refer to the section Displaying Guardian Cache Content.
896
Managing Guardian Cache
• Use the IP address of the target Guardian server. This command, unlike cache sharing, is a
one-time operation that uses a unicast IP address. Any IP address configured on the target
server can be used.
3. Make sure that cache sharing is configured and enabled. For more details, refer to the section
Sharing the Cache Between Several Guardian Servers.
4. To send the entire content of your cache, use the command:
share cache <target-DNS-Guardian-server-IP-address>
5. If you do not want to incrementally update the cache of both servers with the new records,
you need to disable the cache sharing parameters once the target Guardian has received
the cache entries.
The entries are marked origin: L on the local DNS Guardian and origin: S on the receiving one.
897
Chapter 62. Managing Policies
From the page All policies, you can manage and configure Guardian policies. A Guardian policy
is a container for triggers and allows you to deploy a set of triggers on a Guardian server.
By default, the read-only policies default and empty are available. You can duplicate them to edit
the trigger they contain.
Browsing Policies
To display the list of Guardian policies
1. In the sidebar, go to Guardian > Policies. The page All policies opens.
2. To display or hide policy deployments, on the right-end side of the menu, click on . The
page refreshes.
In the column Name, the icon precedes every policy.
If policies are deployed, they are preceded by the icon and listed under the parent policy
name as many times as there are Guardian servers associated with the policy.
Two policies are available by default and read-only.You can add policies from scratch as described
below or duplicate already existing policies. For more details, refer to the section Duplicating
Policies.
There are 5 columns on the page All policies that you can sort and filter. By default, all the columns
are displayed on the page and you cannot change their order.
Delayed create The policy is being deployed, i.e. created on the associated server.
Delayed delete The policy is being deleted from the associated server.
898
Managing Policies
To avoid adding and configuring a new policy, you can duplicate the policy default and edit its
triggers. For more details, refer to the section Duplicating Policies.
Once you added and deployed a policy, you must configure the triggers it contains. For more
details, refer to the chapter Managing Triggers.
You can duplicate, edit or delete it, as detailed in the sections Duplicating Policies, Editing Policies
and Deleting Policies.
899
Managing Policies
Duplicating Policies
You can duplicate policies to avoid configuring them again.
When you get started with the module, you could duplicate the policy default to edit its triggers
or delete the ones you do not need.
To duplicate a policy
1. In the sidebar, go to Guardian > Policies. The page All policies opens.
2. Tick the policy of your choice. You can only duplicate policies one by one.
3. In the menu, select Edit > Duplicate. The wizard Duplicate a policy opens.
4. In the field Policy, name the new policy. The name must be unique.
5. Click on OK to complete the operation. The new policy is listed.
Editing Policies
You can edit policies. Before editing a policy, note that:
• You can edit a policy, even a read-only one, to:
• Associate it with extra Guardian servers, to deploy it.
• Dissociate it from one or more Guardian servers. When you dissociate a policy from a
Guardian server, all the triggers are deleted from the server.
• You cannot rename policies.
• You cannot edit policy deployments . You must edit the policy itself .
• You cannot deploy more than one policy per Guardian server. Only servers in version 7.1 or
higher support policy deployments.
• You can edit the content of a policy, if it is not read-only, from the page All triggers. For more
details, refer to the chapter Managing Triggers.
To edit a policy
1. In the sidebar, go to Guardian > Policies. The page All policies opens.
2. Right-click on the name of the policy that you want to edit. The contextual menu appears.
3. Click on Edit. The wizard Edit a policy opens.
900
Managing Policies
4. Edit the policy Description according to your needs. If you are editing a read-only policy,
this field is grayed out.
5. Edit the list Selected Guardian servers according to your needs. Only Guardian enabled
physical servers are listed, whether they are managed by a smart architecture or not.
Select a server in the list Available Guardian servers and click on to add it the list Selected
Guardian servers. Select a server in the list Selected Guardian servers and click on to
move it back to the list Available Guardian servers.
6. Click on OK to complete the operation. The page refreshes.
Deleting Policies
You can delete a policy. Deleting a policy also deletes the triggers it contains. Note that:
• You cannot delete read-only policies.
• You cannot delete policies deployed on a Guardian server. You must dissociate the server
first. For more details, refer to the section Editing Policies.
• You cannot delete policy deployments . Once the policy is dissociated from the server, the
dedicated deployment line is no longer listed.
To delete a policy
1. In the sidebar, go to Guardian > Policies. The page All policies opens.
2. Tick the policy of your choice. You can tick several.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The policy is no longer listed.
901
Chapter 63. Managing Triggers
From the page All triggers, you can add, configure, edit, disable and delete triggers.
Triggers belong to policies, they allow to execute specific actions on the clients querying Guard-
ian servers cache.
For instance, one of the default triggers monitors SERVFAIL answers over 5 seconds and set a
threshold to maximum 40. If more than 40 SERVFAIL answers were sent in the last 5 seconds,
the trigger is armed and the requesting clients are put in quarantine.
Threshold
Trigger armed
Trigger Action
applied over the
defined period
Once the metric reaches its threshold, the trigger is armed for the whole duration period, even if
the metric drops immediately below said threshold.
If the threshold is reached again while the trigger is armed, the action duration is renewed but
you are not notified. However, the rearming operation is logged and listed on the page Syslog,
under the service named . For more details, refer to the section Syslog.
Note that you can monitor trigger analytics and statistics from the GUI, or monitor them all in real-
time via CLI. For more details, refer to the chapter Monitoring Guardian or to the section Monitoring
Trigger Statistics in Real-Time in the chapter Managing Guardian Statistics.
Prerequisites
• To use triggers, you must enable the cache, the parameter blast. For more details, refer to the
section Enabling or Disabling Guardian Cache in the chapter Setting Guardian Parameters.
• If a trigger belongs to a policy not deployed on any server, it is never used. For more details,
refer to the chapter Managing Policies.
902
Managing Triggers
Limitations
• Any change made in the GUI overwrites the changes made via CLI. The modifications
made in the CLI are erased and replaced with the data available in the GUI.
• Restoring a backup on a management appliance leads to a synchronization between
the GUI and the Guardian server: The objects that are on the server and also in the GUI are
kept. The objects that are only present on the server are deleted and the objects only in the
GUI are added on the server.
Therefore, if you added, edited or deleted objects since the backup was saved, all changes
are lost and may even not be visible in the GUI. Before restoring a backup, make sure you
saved it when the Application or Guardian database was up-to-date.
Browsing Triggers
To display the list of triggers
1. In the sidebar, go to Guardian > Triggers. The page All triggers opens.
2. To display or hide policy deployments, on the right-end side of the menu, click on . For
more details regarding policy deployments, refer to the section Browsing Policies.
By default, there are five triggers available in the policy default. You cannot modify these triggers
as the policy default is in read-only.
Every time a trigger is armed or disarmed, the operation is logged and can be monitored from
the page Syslog. Note that this is the only page where you can display triggers that were renewed
while their action is being executed.
In this example, the Trigger-B is armed when its metric threshold is reached, and then dis-
armed. While the trigger is armed, it blocks clients who reach the threshold, here the client
IP address is 142.12.0.101. They are no longer blocked when the trigger is disarmed.
If the trigger is tagged, the logs include the metric and value reached when the trigger was
armed and disarmed. For more details, refer to the section Adding Tagged Triggers.
Note that you can also monitor your triggers via CLI. For more details, refer to the section Monit-
oring Trigger Statistics in Real-Time in the chapter Managing Guardian Statistics.
903
Managing Triggers
There are 9 columns on the page All triggers that you can sort and filter. By default, all the columns
are displayed on the page.
Delayed create The trigger is being deployed, i.e. created on the associated server.
Delayed delete The trigger is being deleted from the associated server.
Adding Triggers
By default, a set of triggers are available in the default policy. You can duplicate this policy and
the triggers it contains to edit them to suit your needs, as detailed in the section Editing Triggers.
You can add as many triggers you need in your policies. All triggers contain:
• One action to execute, the available actions are illustrated below.
• A duration in seconds, for the selected action.
• A rule definition defined using Reverse Polish Notation (RPN), that sets the client metrics
and thresholds to meet before executing the action during the specified duration. All available
metrics are described in the table trigger metrics.
Following the example in the chapter introduction, the default trigger based on a number of
SERFVAIL answers, Servfail protection, is configured as follows:
1. Its action is Quarantine.
904
Managing Triggers
2. Its duration is 60 seconds. Clients are put in quarantine for 1 minute if the rule definition is
met.
3. Its rule definition is defined in RPN as follows: answer_servfail@5 40 >=
where:
• answer_servfail@5 defines the metric and how long it should be monitored, here it monitors
the number of answers returning a SERVFAIL rcode, during (@) the last 5 seconds.
• 40 >= ensures that the number of answers does not exceed 40. If it does, the trigger is
armed.
On the page All triggers, the trigger Rule definition is listed as answer_servfail@5 >= 40 to make
it easier to read.
All trigger configurations share the same actions, illustrated below, and metrics, described
in the next table.
100
905
Managing Triggers
All the metrics available to protect your servers are described below.
906
Managing Triggers
Metric Description
miss_answer_servfail The number of answers (cache miss) returning a SERVFAIL rcode.
miss_answer_nxdomain The number of answers (cache miss) returning a NXDOMAIN rcode.
miss_answer_notimp The number of answers (cache miss) returning a NOTIMP rcode.
miss_answer_refused The number of answers (cache miss) returning a REFUSED rcode.
On the page All triggers, the trigger Rule definition is displayed as query@5 >= 5000 to make it
easier to read.
907
Managing Triggers
8. In the field Duration (in seconds), specify an integer between 0 and 999999 that sets how
many seconds the Action lasts once the trigger is armed.
Note that the duration can be silently renewed, if the trigger is rearmed because its threshold
is reached again during the initial duration. In this case, the rearming event is only visible in
the logs.
9. In the section Action options, you can enable Querylog to log all client queries and/or An-
swerlog to log all answers. For more details, refer to the section Enabling Querylog and
Answerlog on Triggers.
10. In the field Rule definition, specify in Reversed Polish Notation the values and thresholds
of your choice. The selected Action is triggered when the rule definition is met.
Your rule definition must contain at least the following:
<metric>@<nb-of-seconds> <threshold-value> <threshold-operator>
where:
• metric is one of the entries described in the table trigger metrics.
• @ introduces the monitoring period of the metric.
• nb-of-seconds is the period during which the metric is monitored, an integer between 0
and 999999.
• threshold-value is the metric value to look for over the period, an integer between 0 and
999999.
• threshold-operator is the operator, either =, !=, >=, <=, < or >, applied to the metric threshold
value.
908
Managing Triggers
Note that you can also use a metric operator to combine two or more metrics and use that
result as a threshold:
<metric1>@<nb-of-seconds> <metric2>@<nb-of-seconds> <metric-operator> <threshold-
value> <threshold-operator>
where:
• metric-operator is +, -, * or / . It determines how to use the metrics. This operator must be
located between the metrics and the thresholds.
• threshold-value is the value to look for over the period, the result of the operation between
the metrics, an integer between 0 and 999999.
To configure a more complex rule definition, refer to the sections Adding Triggers Relying
on Lists Metrics and Adding Triggers Armed by Several Thresholds.
To display in the logs the metric involved in the trigger (dis)arming, refer to the section Adding
Tagged Triggers.
11. The box Manage is ticked by default, it activates the trigger. You can untick the box to deac-
tivate the trigger, in which case the Action and Rule definition are ignored and the trigger is
never armed. For more details, refer to the section Managing or Unmanaging Triggers.
12. Click on OK to complete the operation. The report works for a while before closing. The list
is updated.
In the list, the trigger Rule definition no longer follows RPN format.
If you added the trigger in a policy deployed on several Guardian servers, click on on
the right-end side of the menu. The page refreshes and several lines appear under the trigger
itself, one for each of the servers the policy is deployed on.
Once you added a trigger, you can edit, unmanage or delete it, as detailed in the sections Editing
Triggers, Managing or Unmanaging Triggers and Deleting Guardian Triggers.
Configuring a trigger with list metrics allows to take into account the content of a list before arming
the trigger. For instance, you could avoid false positives if your rule definition excludes queries
towards the legitimate domains of one list, or from the IP address of trusted clients of another
list.
All the list metrics are described in the table below. Each metric matches a specific list, via list#
where # identifies one of the 8 available lists using a number between 0 and 7.
909
Managing Triggers
Triggers relying on list metrics can be configured with one or several thresholds. Their rule
definition includes at least one threshold that applies to an operation involving a standard metric
and its corresponding list metric.
On the page All triggers, the trigger Rule definition is displayed as ( cache_miss@10 -
list1_cache_miss@10 ) > 100 to make it easier to read.
910
Managing Triggers
8. In the field Duration (in seconds), specify an integer between 0 and 999999 that sets how
many seconds the Action lasts once the trigger is armed.
Note that the duration can be silently renewed, if the trigger is rearmed because its threshold
is reached again during the initial duration. In this case, the rearming event is only visible in
the logs.
9. In the section Action options, you can enable Querylog to log all client queries and/or An-
swerlog to log all answers. For more details, refer to the section Enabling Querylog and
Answerlog on Triggers.
10. In the field Rule definition, specify in Reversed Polish Notation the values and thresholds
of your choice. It must include at least one standard metric and one list metric. The selected
Action is triggered when the rule definition is met.
Your rule definition must contain at least the following:
<metric>@<nb-of-seconds> <list_metric>@<nb-of-seconds> <metric-operator> <threshold-
value> <threshold-operator>
where:
• <metric>@<nb-of-seconds> specifies a standard metric:
• metric is one of the entries described in the table trigger metrics.
• @ introduces the monitoring period of the metric.
• nb-of-seconds is the period during which the metric is monitored, an integer between 0
and 999999.
• <list_metric>@<nb-of-seconds> specifies the corresponding list metric:
• list_metric is one of the entries described in the table list metrics.
911
Managing Triggers
Once you added a trigger, you can edit, unmanage or delete it, as detailed in the sections Editing
Triggers, Managing or Unmanaging Triggers and Deleting Guardian Triggers.
With several thresholds, the trigger can be armed when all or only some of them are reached.
In this example, the trigger is armed when all its metrics are reached, it monitors the number of
cache misses that were never cached over two different periods. On the page All triggers, the
trigger Rule definition is displayed as ( cache_miss_not_exist@15 >= 30 ) & (
cache_miss_not_exist@2 < 70 ) to make it easier to read.
A trigger rule definition including a view and a threshold could be view 2 = cache_miss@30
50 > | where:
912
Managing Triggers
• view 2 = identifies queries made only (=) to view2, where 2 is the view ID, it identifies the third
view of the server (30 >=);
• cache_miss@30 50 > monitors the number of cache misses over the last 30 seconds and
ensures it does not exceed 50 (50 >); and
• | (or) ensures that if the view is queried or if the metric threshold is met, the trigger is armed
and its Action is executed.
In this example, the trigger is armed if part of its rule definition is met, either a view or a metric.
On the page All triggers, the trigger Rule definition is displayed as ( view = 2 ) | ( cache_miss@30
> 50 ) to make it easier to read.
913
Managing Triggers
Action Description
Ratelimit The client traffic is capped to 100 queries per second, this value is set by default and cannot
be changed. When the trigger is armed or disarmed, the action is logged.
8. In the field Duration (in seconds), specify an integer between 0 and 999999 that sets how
many seconds the Action lasts once the trigger is armed.
Note that the duration can be silently renewed, if the trigger is rearmed because its threshold
is reached again during the initial duration. In this case, the rearming event is only visible in
the logs.
9. In the section Action options, you can enable Querylog to log all client queries and/or An-
swerlog to log all answers. For more details, refer to the section Enabling Querylog and
Answerlog on Triggers.
10. In the field Rule definition, specify in Reversed Polish Notation the values and thresholds
of your choice. The selected Action is triggered when the rule definition is met.
Your rule definition must contain at least the following:
<metric1>@<nb-of-seconds> <metric1-threshold> <threshold1-value> <threshold1-operator>
<metric2>@<nb-of-seconds> <metric2-threshold> <threshold2-value> <threshold2-operator>
<logical-operator>
where:
• <metric1>@<nb-of-seconds> <metric1-threshold> <threshold1-value> <threshold1-oper-
ator> specifies the first metric:
• metric1 is the first metric of the rule, one of the entries described in the trigger metrics
table.
• @ introduces the monitoring period of the metric.
• nb-of-seconds is the period during which the metric is monitored, an integer between 0
and 999999.
• threshold1-value is the value of the first metric to look for over the period, an integer
between 0 and 999999.
• threshold1-operator is the first metric operator, either =, !=, >=, <=, < or >, applied to
the metric threshold value.
• <metric2>@<nb-of-seconds> <metric2-threshold> <threshold2-value> <threshold2-oper-
ator> specifies the second metric.
• logical-operator is the operator, either & or |, applied to the metrics and their threshold.
To display in the logs the metric involved in the trigger (dis)arming, refer to the section Adding
Tagged Triggers.
11. The box Manage is ticked by default, it activates the trigger. You can untick the box to deac-
tivate the trigger, in which case the Action and Rule definition are ignored and the trigger is
never armed. For more details, refer to the section Managing or Unmanaging Triggers.
12. Click on OK to complete the operation. The report works for a while before closing. The list
is updated.
In the list, the trigger Rule definition no longer follows RPN format.
If you added the trigger in a policy deployed on several Guardian servers, click on on
the right-end side of the menu. The page refreshes and several lines appear under the trigger
itself, one for each of the servers the policy is deployed on.
Once you added a trigger, you can edit, unmanage or delete it, as detailed in the sections Editing
Triggers, Managing or Unmanaging Triggers and Deleting Guardian Triggers.
914
Managing Triggers
Tagged triggers allow to monitor one or several metrics on the page Syslog. Their name and rule
definition must include specific parameters to tag the metrics.
On the page All triggers, the trigger Rule definition is displayed as query@10 >= 100 to make it
easier to read.
On the page Syslog, both the metric and its value are displayed when the trigger is armed and
disarmed. Here, the metric named Queries. For more details, refer to the procedure To monitor
trigger operations in the logs.
01/03/2018 18:13:18 solid named[12962]: ARMING trigger on 142.12.0.101 (action:BLOCK)
(Trigger-T1 Queries 100)
01/03/2018 18:13:18 solid named[12962]: DISARMING trigger on 142.12.0.101 (action:BLOCK)
(Trigger-T1 Queries 0)
915
Managing Triggers
• cache_miss@30 push_param 50 >= monitors the number of cache misses over the last 30
seconds, tags it (push_param) and ensures that it does not exceed or match 50;
• | (or) ensures that if the number of queries or if the cache misses is reached, the trigger is
armed and its Action is executed.
On the page All triggers, the trigger Rule definition is displayed as ( query@10 >= 100 ) | (
cache_miss@30 >= 50 ) to make it easier to read.
On the page Syslog, both the metrics and their value are displayed when the trigger is armed
and disarmed. Here, the value of both the metric named Queries and Cache-Miss are returned,
even if only one metric triggered the arming or disarming. For more details, refer to the procedure
To monitor trigger operations in the logs.
01/03/2018 18:13:18 solid named[12962]: ARMING trigger on 142.12.0.101 (action:BLOCK)
(Trigger-T2 Queries 0 Cache-Miss 50)
01/03/2018 18:13:18 solid named[12962]: DISARMING trigger on 142.12.0.101 (action:BLOCK)
(Trigger-T1 Queries 0 Cache-Miss 0)
916
Managing Triggers
• <metric1-name> %<metric-position> names and identifies the first metric, %0, specified
in the Rule definition.
• <metric2-name> %<metric-position> names and identifies the second metric, %1, specified
in the Rule definition.
7. In the drop-down list Action, select the action to execute when the trigger is armed. Except
for Log only (none), all trigger actions are countermeasures:
8. In the field Duration (in seconds), specify an integer between 0 and 999999 that sets how
many seconds the Action lasts once the trigger is armed.
Note that the duration can be silently renewed, if the trigger is rearmed because its threshold
is reached again during the initial duration. In this case, the rearming event is only visible in
the logs.
9. In the section Action options, you can enable Querylog to log all client queries and/or An-
swerlog to log all answers. For more details, refer to the section Enabling Querylog and
Answerlog on Triggers.
10. In the field Rule definition, specify in Reversed Polish Notation the values and thresholds
of your choice. The selected Action is triggered when the rule definition is met.
Your rule definition must contain at least the following:
<metric>@<nb-of-seconds> push_param <threshold>
where:
• metric is one of the entries described in the table trigger metrics.
• @ introduces the monitoring period of the metric.
• push_param precedes each metric threshold, it tags the metric. In the trigger Name, this
metric is renamed, and as it is the only metric in the rule its position is %0.
• nb-of-seconds is the period during which the metric is monitored, an integer between 0
and 999999.
It can include several metrics as follows:
<metric1>@<nb-of-seconds> push_param <threshold1-value> <threshold1-operator>
<metric2>@<nb-of-seconds> push_param <threshold2-value> <threshold2-operator> <lo-
gical-operator>
where:
917
Managing Triggers
Once you added a trigger, you can edit, unmanage or delete it, as detailed in the sections Editing
Triggers, Managing or Unmanaging Triggers and Deleting Guardian Triggers.
You can configure triggers to log all the queries and/or answers when they are armed, during the
whole action duration.
With either parameter enabled, the page Syslog returns more information.
918
Managing Triggers
For instance a trigger Trigger-Z, configured with the action Log only (none) and the options
Querylog and Answerlog enabled, logs all queries and answers once it is armed. For more details,
refer to the procedure To monitor trigger operations in the logs.
01/03/2018 15:17:37 solid named[12962]: DISARMING trigger on 10.0.252.11 (action:NONE)
(Trigger-Z)
01/03/2018 15:17:32 solid named[12962]: client 10.0.252.11#38824 (wikipedia.com): answer:
wikipedia.com IN A (10.0.81.4) -> SERVFAIL
01/03/2018 15:17:32 solid named[12962]: client 10.0.252.11#38824: query: wikipedia.com
IN A (10.0.81.4)
01/03/2018 15:16:45 solid named[12962]: client 10.0.252.11#35200 (reddit.com): answer:
reddit.com IN A (10.0.81.4) -> SERVFAIL
01/03/2018 15:16:45 solid named[12962]: client 10.0.252.11#35200: query: reddit.com IN
A (10.0.81.4)
01/03/2018 15:16:42 solid named[12962]: client 10.0.252.11#16781 (reddit.com): answer:
reddit.com IN A (10.0.81.4) -> SERVFAIL
01/03/2018 15:16:42 solid named[12962]: client 10.0.252.11#16781: query: reddit.com IN
A (10.0.81.4)
01/03/2018 15:16:37 solid named[12962]: ARMING trigger on 10.0.252.11 (action:NONE)
(Trigger-Z)
8. In the field Duration (in seconds), specify an integer between 0 and 999999 that sets how
many seconds the Action lasts once the trigger is armed.
919
Managing Triggers
Note that the duration can be silently renewed, if the trigger is rearmed because its threshold
is reached again during the initial duration. In this case, the rearming event is only visible in
the logs.
9. In the section Action options:
a. Tick the box Querylog to log all queries when the trigger is armed.
b. Tick the box Answerlog to log all answers when the trigger is armed.
10. In the field Rule definition, specify in Reversed Polish Notation the values and thresholds
of your choice. The selected Action is triggered when the rule definition is met.
What you specify depends on the trigger you add. For more details, refer to the sections
Adding Armed by a Single Threshold, Adding Triggers Relying on Lists Metrics, Adding
Triggers Armed by Several Thresholds and Adding Tagged Triggers.
11. The box Manage is ticked by default, it activates the trigger. You can untick the box to deac-
tivate the trigger, in which case the Action and Rule definition are ignored and the trigger is
never armed. For more details, refer to the section Managing or Unmanaging Triggers.
12. Click on OK to complete the operation. The report works for a while before closing. The list
is updated.
In the list, the trigger Rule definition no longer follows RPN format.
If you added the trigger in a policy deployed on several Guardian servers, click on on
the right-end side of the menu. The page refreshes and several lines appear under the trigger
itself, one for each of the servers the policy is deployed on.
Once you configured the trigger Action options you can edit them; you can also unmanage the
trigger or delete it, as detailed in the sections Editing Triggers, Managing or Unmanaging Triggers
and Deleting Guardian Triggers.
Editing Triggers
You can edit your triggers. Before editing a trigger, note that:
• You cannot edit the trigger Position but any other parameter can be edited.
• You cannot edit a trigger belonging to a read-only policy or a policy deployment.
To edit a trigger
1. In the sidebar, go to Guardian > Triggers. The page All triggers opens.
2. Right-click on the name of the trigger you want to edit. The contextual menu opens.
3. Click on Edit. The wizard Edit a trigger opens.
4. Edit the trigger Name, Action, Duration (in seconds), Action options, Rule definition
and/or Manage configuration according to your needs. All parameters are detailed in the
section Adding Triggers.
If you untick the box Manage, the trigger can no longer be armed. For more details, refer to
the section Managing or Unmanaging Triggers.
5. Click on OK to complete the operation. The report works for a while before closing. The list
is updated.
If you edited the trigger in a policy that is deployed on one or more Guardian servers, on the
right-end side of the menu, click on . Several lines appear under the trigger itself, there
is a line for each of the server(s) the policy is deployed on.
920
Managing Triggers
Deleting Triggers
You can delete your triggers. Before deleting a trigger, note that:
• You cannot delete a trigger if it is deployed on a server. In the column Guardian server, it must
be marked N/A.
To delete a trigger
1. In the sidebar, go to Guardian > Triggers. The page All triggers opens.
2. Tick the trigger(s) of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The trigger is no longer
listed.
921
Chapter 64. Managing Guardian Views
You can manage up to 16 views on a Guardian server with specific traffic restrictions.
By default, only view0 is enabled. To enable the 15 other views, refer to the section Enabling or
Disabling Views.
You can configure and order the views of a Guardian server. The position of a view is visible in
the column Order on the page All views. For more details, refer to the chapters Managing DNS
Views and Configuring DNS Views.
All views can be configured using the following parameters via CLI and from the GUI. Each view
is identified using its order on the local server, a number between 0 and 15 replaced by #
throughout this section.
922
Managing Guardian Views
• The section Advanced options contains all the Guardian parameters set with a value
different from the default value. For more details, refer to the section Available Guardian
Parameters.
• Each parameter listed has its own status. For more details, refer to the section Understand-
ing Guardian Parameter Statuses.
To display all the available parameters, refer to the section Editing Guardian Configuration.
Via CLI, the server configuration contains the configuration parameters of each view.
3. Display all Guardian parameters, including the views configuration, using the command:
show config
All view parameters start with with view#_, where # identifies each of the 16 views with a
number between 0 and 15.
If you do not have at least one view enabled, Guardian cannot answer clients.
The parameter view#.enabled defines if the view is enabled 1 or disabled 0. By default, the views
view1 to view15 are disabled.
923
Managing Guardian Views
To identify the querying clients, rather than the last resolver that transmitted their query, you can
set the parameter client identifier on each view. You can identify them using the IP address,
DSCP or VLAN of the query and/or the value of an EDNS option of the query, that can be an IP
address, a MAC address, or a CPE, device or organisation identifier.
12.0.1.200 view0
view0.client_identifiers set to
all ecs=ecs_ip
12.0.1.250 Forwarding the
client IP address view0 identifies clients using the
via the EDNS EDNS option ECS of their query
option ECS Client ID
Clients querying a 12.0.1.250
Guardian server via
cascaded recursive
DNS servers
Guardian server
view1
15.0.0.100
view1.client_identifiers not set
By default when you display client statistics, the column Client ID returns the source IP address
of the DNS query received by Guardian server, whether it was forwarded or not. If you identify
clients at view level, the values returned in the column Client ID change accordingly.
For each Guardian view you can specify which field(s) of the DNS query to use as client identifier.
The parameter View#.client identifiers can identify:
Only the IP address or DSCP of the query, when preceded by default
• default ip retrieves the source IP address of the query.
• default rev_ip retrieves the source IP address of the query, in reverse format.
• default destination_ip retrieves the destination IP address of the query.
• default destination_rev_ip retrieves the destination IP address of the query, in reverse
format.
• default dscp retrieves the DSCP of the query.
After the filter default you can combine values, you must separate them with a space, e.g.
default rev_ip destination_ip .
924
Managing Guardian Views
Only an EDNS option or the VLAN of the query, when preceded by all
• all <EDNS-option>=<identifier> retrieves the identifier declared in the EDNS option of the
query.
• all vlan retrieves the VLAN information of the query. A 802.1q VLAN ID between 1 and
4096.
With an option or VLAN specified, clients are identified using the specified information in the
client statistics, if and only if it is in the query. The keyword all implies a match to look for.
The matching clients are identified, their Client ID could look as follows: 70.0.0.24 if the
parameter contains all ecs=ecs_ip .
A combination of information sent in the query, several identifiers, when preceded by all
• all <EDNS-option>=<identifier> <ip|rev_ip|destination_ip|destination_rev_ip|dscp|vlan>
retrieves the identifier declared in the EDNS option and the source or destination IP address,
DSCP or VLAN of the query. You can choose the IP address format, standard or reverse.
With an option and the query IP address specified, the matching clients are identified in the
clients statistics. Their Client ID could look as follows: 70.0.0.24.4.3.2.1 if the parameter
contains all ecs=ecs_ip rev_ip .
Note that even after the EDNS option, you can combine all the values that identify the IP
address of the query. Their Client ID could look as follows: 70.0.0.24.4.3.2.1.192.168.25.125
if the parameter contains all ecs=ecs_ip rev_ip destination_ip .
The parameter View#.client identifiers can identify the following EDNS options.
ecs The IP address of the EDNS Client Subnet (ECS), in standard or reverse format. The option
accepted identifiers are:
• ecs_ip. The ECS IP address.
• ecs_rev_ip. The ECS IP address, in reverse format.
nominum_cpeid The CPE ID received from a Nominum/Akamai DNS. The option accepted identifier is:
• nominum_cpeid. The client CPE ID.
nominum_deviceid The Device ID received from a Nominum/Akamai DNS. The option accepted identifier is:
• nominum_deviceid. The client device ID.
opendns_deviceid The Device ID received from OpenDNS/Umbrella. The option accepted identifier is:
• opendns_deviceid. The client device ID.
925
Managing Guardian Views
For more details, refer to the section Managing Guardian Client Statistics in the chapter Man-
aging Guardian Statistics.
• If you identify clients using several identifiers, the clients are only identified if they match the
whole definition.
For instance, if you use all ecs=ecs_ip rev_ip to identify clients using an EDNS option and the
IP address of the query, but the option is not found in the query, the whole definition is ignored.
Clients are not identified using rev_ip. Instead, either the clients are identified using the IP
address of the original query, or, if you specified several definitions, the next one may match
their query and identify them.
• You can specify several identifiers, separated by a comma. With several identifiers, the para-
meter is used as an ACL. All the options are reviewed in order, the first one that matches the
client query is used to identify clients. For instance, with all opendns_ip ecs=opendns_ip
ecs_rev_ip specified:
• If the option opendns_ip is in the client query, the client is identified using the IP specified
in the EDNS option. The ecs identifier details are ignored.
• If the option opendns_ip is not in the client query, then we look for the option ecs. If ecs is
in the query, the client is identified using the reverse IP specified in the EDNS option.
• If none of them are found, the client is identified using the IP address of the original query,
as if the parameter was set to default ip.
• You can use client lists to filter traffic to the view and complete the client identifier configuration.
In this case, the parameter View#.list id filter identifies the lists to take into account and the
policy to apply.
• If you use a client list, the list content must match the order and format of the identifiers
specified in the parameter View#.client identifiers.
• If you use a client specific-id list, the list content must match the identifier specified in the
List#.client identifiers.
For more details, refer to the sections Configuring the Content of a List and Identifying Clients
via a List in the chapter Managing Lists.
• To stop identifying clients, you must empty the parameter View#.client identifiers. The clients
of the view are identified using the last resolver that transmitted their query again, whether it
was forwarded or not.
926
Managing Guardian Views
You can combine the values if you separate them with a space, e.g. default rev_ip
destination_ip.
b. To only identify clients using a VLAN, you can set the parameter as follows:
all vlan
c. To only identify clients using a specific EDNS option, you can set the parameter as fol-
lows:
all <EDNS-option>=<identifier>
All accepted values are described in the table Available EDNS options and values.
Note that if an EDNS option specified is not found in the query, the client is identified
using the source IP address of the original query, as if the parameter was set to default
ip.
d. To identify clients using several EDNS options, you can set the parameter as follows:
all <EDNS-option1> <EDNS-option2>=<identifier1> <identifier2>
You define the options to look for on the one hand, before =, and the format of their
value on the other hand, after =. All options and values are separated by a space.
Note that if the option specified is not found in the query, the whole identifier definition
is ignored. In this case, the client is either identified using two options or using next
identifier, if you specify several.
e. To identify clients using both an EDNS option and the IP address, DSCP or VLAN of
the query, you can set the parameter as follows:
all <EDNS-option>=<identifier> <ip|rev_ip|destination_ip|destination_rev_ip|dscp|vlan>
You can combine all the values that identify the IP address of the query if you separate
them with a space.
Note that if the option specified is not found in the query, the whole identifier definition
is ignored. In this case, the client is either identified using the IP address of the original
query or using next identifier, if you specify several.
f. To configure several identifiers for the view, you must separate them with a comma ","
as follows:
all <EDNS-option1>=<identifier1>, all <EDNS-option2>=<identifier2> <ip|rev_ip|destin-
ation_ip|destination_rev_ip|dscp|vlan>, default rev_ip
Each identifier is reviewed in order. If the first one matches a client query, all the other
are ignored. If the first one does not match a client query, the next one is reviewed, etc.
Note that if none of the values specified match a query, the client is identified using the
source IP address of the original query.
8. If you want to use client lists to complete the client identifier configuration of the view, in the
View#.list id filter you must specify the relevant list(s) and set their policy.
For more details, refer to the section Using Lists to Filter Guardian Views.
9. Click on OK to complete the operation. The wizard closes.
The parameter View#.list id filter allows to define traffic policies for each Guardian view based
on the content of existing domain, client or specific client identifier lists. For instance, your policy
could, based on the view traffic, differentiate domain names associated with many IP addresses
or redirect clients.
927
Managing Guardian Views
2. Specify the list(s) and entry tag(s) to use, the filter you define only applies to the content
of the specified list.
Every list is specified using its ID, a number between 0 and 7. The list ID allows to take into
account the content of one or several lists:
• To use the content of a list in your filter, specify its ID as follows: 1.
• To avoid the content of a list in your filter, type in ! before its ID as follows: !0.
If you automatically update the content of a list using an authoritative zone, the TXT records
of the zone may include tags for specific entries of a list. For more details on how to tag list
entries, refer to the section Automatically Updating the Content of a List in the chapter Managing
Lists.
List entry tags allow to configure Client Query Filtering (CQF) and secure traffic to the view,
they can narrow down specific domains (destinations) and/or clients (sources) thanks to the
following configuration parameters:
tagmatch (<list-id>, <tags>)
Allows to look for tagged entries within one list, where:
• <list-id> is the ID the list.
• , separates the list ID and tag information. Both are taken into account.
• <tags> is one or several tags separated by a space. All tags must be included in the
field Text of the TXT records or the zone configured to automatically update the list.
If you specify several tags, for instance with tagmatch (0, untrusted unsafe), you apply
one of the list filters to entries set with either tag in the specified list. To look for all these
tags in one list, you must specify tagmatch for as many tags as needed, here it would be
tagmatch (0, untrusted) tagmatch (0, unsafe) .
You can use ! in front of a tagmatch configuration, or within the configuration in front of a
list or tag. For instance all tagmatch (!0, safe) passthru would let any client query an entry
tagged safe except if the entry belongs to list 0.
tagjoin (<list-ids>, <tags>)
Allows to look for tagged entries within one or more lists, where:
• <list-ids> is the ID of one or several lists separated by a space.
• , separates the list ID and tag information. Both are taken into account.
• <tags> is one or several tags separated by a space. All tags must be included in the
field Text of the TXT records or the zone configured to automatically update the list.
928
Managing Guardian Views
If you specify several lists, for instance with tagjoin (1 2, untrusted), you apply one of the
list filters to the tag in either of the specified lists. To look for one tag in all these lists, you
must specify tagjoin for as many lists as needed, here it would be tagjoin (1, untrusted)
tagjoin (2, untrusted) .
If you specify several tags, for instance with tagjoin (3, untrusted unsafe), you apply one
of the list filters to entries set with either tag in the specified list. To look for all these tags
in one list, you must specify tagjoin for as many tags as needed, here it would be tagjoin
(3, untrusted) tagjoin (3, unsafe) .
You can use ! in front of a tagjoin configuration, or within the configuration in front of a list
or tag. For instance all tagjoin (3, untrusted !safe unsafe) quarantine would put in quarantine
any client querying an entry of the list 3 if it is tagged untrusted or unsafe but would let
them query entries with the tag safe.
Your list configuration can use tagjoin and tagmatch, you mut seperate them with a space:
<any|all|none> tagmatch (<list-id>, <tags>) tagjoin (<list-id>, <tags>) <action>
3. Specify which action to execute, to the specified filter and list. Except for nocache and
passthru all view actions are countermeasures:
The filter, list and action define and apply a traffic policy for the view.
Note that:
• The parameter View#.list id filter can be set for each of the 16 Guardian views available, #
identifies each view using its ID, a number between 0 and 15.
• Each view can be set with several policies.
929
Managing Guardian Views
• The parameter configuration applies to clients present in the match-client configuration of the
view and querying an entry present in the specified list(s).
• The parameter configuration extends the match-destination configuration of a Guardian view
to apply an advanced traffic policy. This policy can be based on a domain, client or client
identifier. For more details on the list types, refer to the section Defining the Type of a List.
• If a domain, client or client identifier involved in the query is not in the list(s), Guardian applies
the default policy passthru.
• To stop using lists to filter view traffic, you must empty the parameter View#.list id filter.
930
Managing Guardian Views
• In IPv4, the target IP is defined by the parameter List redirect a. By default, it is set to
127.0.0.1
• In IPv6, the target IP is defined by the parameter List redirect aaaa. By default, it is set to
::1
2. A duration defined by the parameter List redirect ttl. By default, it is set to 300 seconds, it
applies to the IPv4 and IPv6 redirections.
3. Specify the IPv4 address of your choice in the parameter list_redirect_a using the
command:
set list_redirect_a=<IPv4-address>
931
Managing Guardian Views
Once your configuration is complete, it applies to all the views you configure with the parameter
view#.list_id_fiter and the action Redirect. For more details, refer to the section Using Lists to
Filter Guardian Views.
To configure logging based on the lists used to filter Guardian views you must:
• Set Guardian parameters Querylog, Answerlog and/or List log to 2. For more details, refer to
the chapter Setting Guardian Parameters.
• Specify the option +querylog, +answerlog and/or +listlog when you set the parameter View#.list
id filter.
For instance, you can decide to enable the querylog, answerlog and list log for all the entries of
the lists mylist1 and mylist2, with mylist1 containing wikipedia.com and reddit.com and mylist2
containing reddit.com. If a client requests these two domains, the following information is available
on the page Syslog:
May 31 15:17:32 solid named[63380]: client 10.0.252.11#38824 (wikipedia.com): answer:
wikipedia.com IN A (10.0.81.4) -> SERVFAIL
May 31 15:17:32 solid named[63380]: client 10.0.252.11#38824: query: wikipedia.com IN
A (10.0.81.4)
May 31 15:17:32 solid named[63380]: List Matched 10.0.81.4#38824: query: wikipedia.com
IN A (10.0.81.4){mylist1}
May 31 15:16:46 solid named[63380]: client 10.0.252.11#26822 (reddit.com): answer:
reddit.com IN A (10.0.81.4) -> SERVFAIL
May 31 15:16:46 solid named[63380]: client 10.0.252.11#26822: query: reddit.com IN A
(10.0.81.4)
May 31 15:16:46 solid named[63380]: List Matched 10.0.81.4#26822: query: reddit.com IN
A (10.0.81.4){mylist1,mylist2}
For more details regarding how to display the logs, refer to the section Syslog.
932
Managing Guardian Views
6. In the field View#.list id filter, specify the logging configuration of your choice as last value
of the parameter.
a. To enable the option answerlog, specify <filter> <lists> <action> +answerlog.
b. To enable the option querylog, specify <filter> <lists> <action> +querylog.
c. To enable the option list log, specify <filter> <lists> <action> +listlog.
d. To enable several, or all three options, specify them one after the other without spaces:
<filter> <lists> <action> +querylog+listlog+answerlog.
Keep in mind that +listlog is ignored if you use the filter none.
For more details on the available <filter>, <lists> and <action> preceding the logging option,
refer to the list filters, list configuration and view actions.
7. Click on OK to complete the operation. The wizard closes.
933
Chapter 65. Managing Lists
Guardian provides by default 8 lists that you can configure and use to tailor client traffic at view
level or to customize trigger definitions.
All lists are empty by default, which is why you must specify their content before anything else.
All the list parameters are described in the table below. Each parameter matches a specific list,
via list# where # is one of the 8 available lists using a number between 0 and 7.
934
Managing Lists
As by default all 8 Guardian lists are empty, to display any data at least one list must contain
entries. For more details, refer to the section Configuring the Content of a List.
DNS Blast> show list
935
Managing Lists
0 | * | = | 0 | 3 | verybadzone.ws
...
When the command is executed without filters, it returns the Top 50 entries most Used entries
and sorts them by Name. All the information is returned in the following columns.
By default, the command displays the 50 most Used entries in all lists.
4. To display the entries of a specific list, use the command:
show list list_id=#
Note that the list was renamed, so its ID is followed by the list {name}. In addition, one of its
entries is tagged, the (tag) is also returned after the list ID. For more details, refer to the
sections Renaming a List and Automatically Updating the Content of a List.
936
Managing Lists
Renaming a List
By default, the 8 Guardian lists are named from list0 to list7. This default name is always used
in each parameter name but you can rename lists.
Your new list name is available on the properties page of the Guardian server, along with all the
list parameters you configured. In addition, it is returned between brackets when you display the
lists content. For more details, refer to the section Displaying the Lists Content.
3. Specify the name of your choice in the parameter list#.type. In the following command,
list1 is renamed domains:
set list1.name=domains
937
Managing Lists
• For specific client-id lists, the expected format of the entries of the list depends on the identifier(s)
specified in the parameter List#.client identifiers.
For more details, refer to the section Identifying Clients via a List.
3. Specify the type of your choice in the parameter list#.type. By default, it is set to 0.
Set it to 0 for a domain list, 1 for a client list or 2 for a list specific client-id list. In the following
command, we define list0 as a client list.
set list0.type=1
You cannot configure a list with both methods, you either automatically update a list content
or manually configure it. Once you set a list to automatically retrieve a zone data, any entry not
matching a record of the zone is deleted at the next refresh.
938
Managing Lists
cific format (type 2). By default, all lists are domain lists. To change their type and make them
client lists, refer to the section Defining the Type of a List.
• By default, Guardian servers are both authoritative and recursive, the parameter recursive is
set to 2. Therefore, each authoritative query results in a cache miss. To avoid arming triggers
based on cache miss answers for clients querying your domains, you can add a list containing
all the domains your server has authority over. Once the list is configured, you can take it into
account in the relevant trigger(s). For more details, refer to the section Adding Triggers Relying
on Lists Metrics in the chapter Managing Lists.
• If you want to use lists to identify clients, keep in mind that:
• You can configure the content of a specific client-id list, of type 2. The expected format of
the entries of the list depends on the identifier(s) specified in the parameter List#.client
identifiers. For more details, refer to the section Identifying Clients via a List.
For instance, if the List#.client identifiers is the EDNS option ecs_rev_ip, your entries must
be match ECS IP addresses in reverse, e.g. 250.48.16.16.
• You can also configure the content of a client list, of type 1. The list expected entries and
their format depend on the identifier(s) specified in the parameter View#.client identifiers.
The values of each entry must match the order and format of the client identifier set on the
view. For more details, refer to the section Identifying the Clients Querying the Views in the
chapter Managing Views.
For instance, if the View#.client identifiers is all ecs dnsmasq_mac=ecs_rev_ip dnsmasq_mac,
your entries must include both an ECS IP address in reverse and a DNSMASQ MAC address,
separated by a dot ".", e.g. 250.48.16.16.00:aa:18:18:aa:00. The options must always be
specified in this order, you must not change it.
In both cases, your list is only used if you specify it in the parameter View#.list id filter of the
relevant view. This parameter allows to apply the policy of your choice to the list content, you
can include or exclude it.
You should use this method to avoid any list content misconfiguration. Instead of manually
adding each list entry, this configuration allows to retrieve and synchronize the content of a zone
and automatically add the relevant entries in the list.
The parameters List#.request xfer and List#.zone name allow to specify one of the following:
• A zone located on a third party DNS server, like SURBL.
• An authoritative zone on your local DNS server, or any DNS server.
The list content update relies on the command dig and zone transfer. All the CNAME and TXT
records of the zone add entries to the list, the content refreshes every minute. Which is why,
once you configure the automatic update, you can no longer manually add entries to the list, they
are overwritten or deleted at the next refresh.
939
Managing Lists
When you add TXT records, any keyword specified in the field Text can be used as a tag for
the matching entry in the list. If you specify several tags, you must separate them with a space.
For more details, refer to the section Adding a TXT Record in the chapter Managing DNS Re-
source Records.
Once you configured your entry tags, you can use them in the configuration of the parameter
View#.list_id_filter. For more details, refer to the section Using Lists to Filter Guardian Views
in the chapter Managing Guardian Views.
Once your list content is configured, you can use the list in a view or trigger configuration. For
more details, refer to the section Using Lists to Filter Guardian Views in the chapter Managing
Views and to the section Adding Triggers Relying on Lists Metrics in the chapter Managing
Triggers.
1
For more details regarding the command dig, refer to the ISC documentation, available at ftp://ftp.isc.org/www/bind/arm95/man.dig.html.
940
Managing Lists
All list parameters start with with list#_, where # identifies each of the 8 list with a number
between 0 and 7.
For each list, the value of list#.type indicates if it is a domain list (0), client list (1) or list
specific client-id list (2). Each type impacts the expected entries.
4. Add a list entry using the command:
create list_entry list_id=# <list-entry>
where # is the list ID, a number between 0 and 7, and list-entry is specified using:
• A Fully Qualified Domain Name, for domain lists (0), it can include the wildcard * to
specify a subdomain. For instance:
create list_entry list_id=0 *.verybadzone.ws would add any subdomain of verybadzone.ws
to the first list, list 0.
• An IPv4 or IPv6 address for client list (1) or list specific client-id lists (2). This IP address
identifies a client. If you configure the parameter View#.client identifiers or List#.client
identifiers, the IP address is sent along with the original query of the client, potentially via
an EDNS option. It can include the wildcard * to specify several IP addresses or a network.
For instance:
create list_entry list_id=1 192.168.* would add any IP address or network between the
addresses 192.168.0.0 and 192.168.255.255 to the second list, list 1.
create list_entry list_id=2 *.10.168.192 would add any IP address or network between the
addresses 0.10.168.192 and 255.10.168.192 to the third list, list 2.
For more details, refer to the section Identifying the Clients Querying the Views in the
chapter Managing Views or to the section Identifying Clients via a List.
• Any other identifier, for list specific client-id lists (2). In each list, the entries expected
format depends on the configuration of the parameter List#.client identifiers. That identifier
is sent along with the original query of the client, it can be a DSCP, MAC address, CPE
ID, device ID, organization ID, record type or VLAN ID, depending on the configuration of
the parameter List#.client identifiers. It can include the wildcard * to match several values.
For instance:
create list_entry list_id=3 12 would add the DSCP 12 to the fourth list, list 3. This entry is
only relevant if the parameter List3.client identifiers is set to dscp.
For more details, refer to the section Identifying Clients via a List.
• A combination of identifiers separated by a dot for client list (1) if you want to use lists
to identify clients at view level, or for list specific client-id lists (2) if a list client identifiers
contains several values. Each entry expected values, order and format depend on the
configuration of the parameter View#.client identifiers or List#.client identifiers. It can include
the wildcard * to match several values.
create list_entry list_id=4 12.12.150.250.1035 would add an entry including an IP address
and VLAN ID to the fifth list, list 4. It matches a client identifier configured on a view set
to all opendns_ip vlan=opendns_ip vlan. Both values, the IP address 12.12.150.250 and
the VLAN ID 1035 must be separated by a dot. This entry is only relevant if it matches the
format and order set in View#.client identifiers.
create list_entry list_id=4 PTR.22.58.54.1 would add an entry including a record type and
an IP address in reverse to the sixth list, list 5. It matches a client identifier configured on
941
Managing Lists
a list set to rr_type destination_rev_ip. Both values, the record type PTR and the IP address
22.58.54.1 must be separated by a dot. This entry is only relevant if it matches the format
and order set in List#.client identifiers.
For more details, refer to the section Identifying the Clients Querying the Views in the
chapter Managing Views or to the section Identifying Clients via a List.
5. To delete a list entry, indicate its exact name and use the command:
clear list list_id=# <list-entry>
Identifying clients via lists is useful if you have cascaded several resolvers. With such a configur-
ation, the IP address of a client is overwritten every time it is forwarded. Therefore, once the
query gets to the Guardian server, the source IP address it receives is no longer the one of the
original client.
To identify the querying clients, rather than the last resolver that transmitted their query, you can
set the parameter client identifier. You can identify them using the IP address, DSCP, VLAN or
record type of the query and/or the value of an EDNS option of the query, that can be an IP ad-
dress, a MAC address, or a CPE, device or organisation identifier.
For each client list you can specify which field(s) of the DNS query to use as client identifier. The
parameter List#.client identifiers accepts the following identifiers.
942
Managing Lists
Identifier Description
dscp The DSCP of the original query.
ecs_ip The ECS IP address, sent in the EDNS Client Subnet (ECS). It is declared in an EDNS
option in the original query.
ecs_rev_ip The ECS IP address, sent in the EDNS Client Subnet (ECS), in reverse format. It is declared
in an EDNS option in the original query.
ip The source IP address of the original query.
nominum_cpeid The client CPE ID, received from a Nominum/Akamai DNS. It is declared in an EDNS
option in the original query.
nominum_deviceid The client device ID, received from a Nominum/Akamai DNS. It is declared in an EDNS
option in the original query.
opendns_deviceid The client device ID, received from OpenDNS/Umbrella. It is declared in an EDNS option
in the original query.
opendns_ip The client IP address, received from OpenDNS/Umbrella. It is declared in an EDNS option
in the original query.
opendns_orgid The client organization ID, received from OpenDNS/Umbrella. It is declared in an EDNS
option in the original query.
opendns_rev_ip The client IP address, received from OpenDNS/Umbrella, in reverse format. It is declared
in an EDNS option in the original query.
rev_ip The source IP address of the original query, in reverse format.
rr_type The original query record type.
vlan The 802.1q VLAN ID, a value between 1 and 4096, of the original query.
Note that:
• The parameter List#.client identifiers should only be set on specific client identifier lists, or list
specific client-id (2) lists.
• The querying clients are identified whether their query involves IPv4 or IPv6. All the client
identifier parameters that accept an IP address, identify an IPv4 address or an IPv6 address.
• The client identifiers you set in the parameter List#.client identifier must match the list content.
Their identifiers order and format must be the same.
• Unlike the parameter View#.client identifier, setting the parameter List#.client identifiers does
not impact client monitoring. The value you specify in the field does not change how clients
are displayed in the column Client ID. For more details, refer to the section Identifying the Clients
Querying the Views in the chapter Managing Guardian Views.
• To stop identifying clients, you must empty the parameter List#.client identifiers. The clients of
the view are identified using the last resolver that transmitted their query again, whether it was
forwarded or not.
943
Managing Lists
8. In the field List#.client identifiers, specify the client identifier(s) of your choice for the list.
<identifier>
where the expected identifier is described in the table Available client identifiers in lists.
To specify several identifiers, you must separate them with a space: <identifier1> <identifier2>
9. Click on OK to complete the operation. The wizard closes.
Once your list client identifier configuration is done, keep in mind that:
• You may still need to configure its content to match your configuration, as detailed in the section
Configuring the Content of a List.
• The list is only used if it is part of a view or trigger configuration. For more details, refer to the
section Using Lists to Filter Guardian Views in the chapter Managing Views and to the section
Adding Triggers Relying on Lists Metrics in the chapter Managing Triggers.
You can decide to clear the list(s) of your choice every time the service DNS Guardian restarts.
3. To save a list every time DNS Guardian restarts, set the parameter list#.save to 1. This
is the default value. In the following command, we set the parameter for list0:
set list0.save=1
4. To clear a list every time DNS Guardian restarts, set the parameter list#.save to 0. In
the following, command we set the parameter for list0:
set list0.save=0
944
Managing Lists
4. To reset only the counter of entries that have expired (1) or have not yet expired (0), use the
command:
reset list list_id=# expired=<0|1>
Clearing a List
You cannot delete your lists but you can clear their content. Clearing a list can delete all its entries
or only some, based on their expiration time.
4. To clear only the entries that have expired (1) or have not yet expired (0), use the command:
clear list list_id=# expired=<0|1>
945
Chapter 66. Managing the Rescue Mode
The Rescue mode allows Guardian to answer as many queries as possible if the local DNS
server is saturated and unable to answer clients. It provides service continuity.
If your recursive server is under DDoS attack or looses its Internet connection, the Rescue mode
temporarily provides best-effort delivery and prevents your server from being overloaded or victim
of cache-poisoning.
In Rescue mode, Guardian buffers all the queries and behaves as follows:
1. If the queried record is in the cache, the response is immediate.
2. Usually, if the queried record is not cached yet, Guardian relays it to your local DNS server.
In Rescue mode, the local DNS server offers a best-effort service to deliver answers to the
clients. If the query is answered, it is cached by Guardian.
3. If the queried record has expired, Guardian sends it to the client with the TTL that you have
set beforehand (300 seconds by default) to preserve the local DNS server and potentially
avoid querying it altogether. Keep in mind that you can manually expire all or part of your cache
entries.
Note that:
• You must meet the prerequisites before configuring or forcing the Rescue mode.
• You can configure the Rescue mode to automatically trigger the Rescue mode when the
parameters set are met. If you do not want the Rescue mode to be triggered automatically,
you can disable the Rescue detection.
• You can force the Rescue mode and then stop it manually.
• Guardian provides you with charts to visualize different Rescue mode statistics on the properties
page of the server. For more details, refer to the section Monitoring Guardian Statistics.
Prerequisites
By default, Guardian is ready for the Rescue mode. The Rescue mode is set with default values
high enough to ensure that the automated switch cannot be triggered by accident.
To customize or force a switch to Rescue mode, you must make sure that:
1. Guardian cache is enabled. It is enabled when you start the service DNS Guardian, but can
be disabled.
2. The rescue mode detection is enabled. It is enabled by default, but can be disabled.
946
Managing the Rescue Mode
2. At the end of the line of the Guardian server of your choice, click on . The properties page
opens.
3. In the panel Options, click on EDIT . The wizard Options configuration opens.
4. Click on NEXT until you reach the last page of the wizard.
5. In the drop-down list Display option(s), select all. The list of all Guardian parameters is
displayed.
6. Make sure Guardian cache is enabled, the field Blast must be set to yes (1).
7. Make sure the Rescue mode detection is enabled, the field Rescue detection must be set
to auto (1).
8. Click on OK to complete the operation. The wizard closes.
4. Make sure Guardian cache is enabled, the parameter blast must be set to 1, as follows:
blast=1
5. Make sure the Rescue mode detection is enabled, the parameter rescue_detection must
be set to 1, as follows:
rescue_detection=1
Now that you prepared Guardian, you can either configure the Rescue mode or force the Rescue
mode.
The Rescue mode configuration relies on the following parameters, you can change their value
to match your needs:
947
Managing the Rescue Mode
Before configuring the Rescue mode, you must meet the prerequisites, if you want your parameters
to be taken into account.
948
Managing the Rescue Mode
• In the field Rescue unanswered rate, specify the percentage of unanswered queries of
Rescue min rec packet. When the specified percentage is reached, the server switches
to Rescue mode.
• In the field Rescue high rec packet, you can specify a maximum number of queries per
second that triggers the Rescue mode.
• In the field Rescue servfail qps, you can specify a number of queries per second answered
with SERVFAIL error messages that triggers the Rescue mode.
• In the field Rescue ratio servfail, you can specify a percentage of queries per second
answered with SERVFAIL error messages that triggers the Rescue mode.
9. Click on OK to complete the operation. The wizard closes.
3. Set the Rescue mode parameters to the value of your choice. In the following command, we
set them to their default value:
set rescue_time=5
set rescue_ttl=300
set rescue_min_rec_packet=5000
set rescue_unanswered_rate=10
set rescue_high_rec_packet=200000
set rescue_servfail_qps=50000
set rescue_ratio_servfail=90
Before forcing the Rescue mode, you must meet the prerequisites.
949
Managing the Rescue Mode
To switch back to the automated Rescue mode detection, set the parameter rescue_de-
tection to 1.
4. To disable the Rescue mode detection, set the parameter rescue_detection to 0 as fol-
lows:
set rescue_detection=0
950
Part XI. NetChange
NetChange allows to locate and monitor your network devices. You can import them using their IP address
and the CDP, NDP and LLDP layer 2 discovery protocols to find more devices on the network.
Once imported, NetChange relies on the SNMP protocol to retrieve information in the MIB of each device.
It provides monitoring for the routes, VLANs and ports the devices contain and the IP addresses of their in-
terfaces as well as the devices connected to them. In addition, it allows to monitor the configuration file
versioning on the devices that support it.
Remote
discoveries
Local discoveries
Small office
Local discoveries
Data center
Headquarters
We recommend importing all your devices to have a clear overview of your network. All supported devices
are listed on the Knowledge Base, at https://kb.efficientip.com/index.php/Main_Page in the category
NetChange/IPLocator.
Note that depending on the license you chose, you can either retrieve network devices information or
partially configure your network devices and their content. There are two NetChange licenses available:
1. NetChange-IPL, a light version that provides basic management options of your network devices.
2. NetChange, the full license that allows advanced management of your Avaya, Cisco and HP network
devices as it provides configuration options for VLANs and ports, 802.1X authentication, versioning...
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
67. Managing Network Devices ...................................................................................... 955
Browsing Network Devices .................................................................................... 955
Adding Network Devices ........................................................................................ 957
Importing Network Devices Using Discovery Protocols ............................................ 958
Enabling or Disabling the 802.1X Authentication Protocol ........................................ 960
Editing the SNMP Properties of a Network Device ................................................... 961
Refreshing the Network Devices Database ............................................................. 962
Connecting to a Network Device Via a Console ....................................................... 964
Making a Network Device Snapshot ....................................................................... 964
Automatically Adding New Network Devices as Group Resource .............................. 965
Adding Network Devices in Device Manager ........................................................... 966
Exporting Network Devices .................................................................................... 966
Deleting Network Devices ...................................................................................... 966
Defining a Network Device as a Group Resource .................................................... 966
68. Managing Routes .................................................................................................... 967
Prerequisites ........................................................................................................ 967
Limitations ............................................................................................................ 967
Browsing Routes ................................................................................................... 967
Enabling the Registry Key Required to Display the VRF Routes ............................... 969
Creating Routes in the IPAM .................................................................................. 970
Exporting Routes .................................................................................................. 971
69. Managing VLANs ..................................................................................................... 972
Browsing VLANs ................................................................................................... 972
Adding a VLAN ..................................................................................................... 973
Editing a VLAN ...................................................................................................... 973
Creating a VLAN in VLAN Manager ........................................................................ 973
Exporting VLANs ................................................................................................... 974
Deleting a VLAN ................................................................................................... 974
70. Managing Ports ....................................................................................................... 975
Browsing Ports ...................................................................................................... 976
Enabling or Disabling a Port ................................................................................... 977
Editing a Port Interconnection ................................................................................ 977
Editing a Port Speed and Duplex Mode .................................................................. 978
Updating a Port Description ................................................................................... 978
Managing the 802.1X Authentication Protocol on a Port ........................................... 979
Restricting Access to a Port with the Protocol Port-security ...................................... 980
Limiting Port Edition Rights to Specific Groups of Users .......................................... 983
Configuring VLAN Tagging on a Port ....................................................................... 984
Exporting Ports ..................................................................................................... 987
71. Managing Configuration Versioning ........................................................................... 988
Prerequisites ........................................................................................................ 988
Limitations ............................................................................................................ 988
Browsing Configuration Files .................................................................................. 988
Managing Connection Profiles ............................................................................... 990
Configuring the Versioning of a Network Device ...................................................... 992
Refreshing a Configuration File .............................................................................. 994
Comparing Configuration Files ............................................................................... 995
Monitoring the Configuration Versioning in the Logs ................................................. 996
Downloading Versioning Information ....................................................................... 997
Configuring Advanced Versioning Options ............................................................... 998
Exporting Configuration Files ................................................................................. 999
953
NetChange
954
Chapter 67. Managing Network Devices
NetChange uses the SNMP protocol to query network devices and centralize all collected inform-
ation in its database. You can add, import and delete network devices with an IPv4 address from
the page All network devices. The devices can manage interfaces with IPv4 or IPv6 addresses
that are displayed on the dedicated page All addresses. There are several ways to integrate new
network devices in NetChange database:
• Adding one or several network devices using their IPv4 address.
• Importing network devices through discovery protocols (like CDP, DP or LLDP) once you added
a device.
• Importing network devices using a CSV file. For more details, refer to the section Importing
Data to NetChange in the chapter Importing Data from a CSV File.
To use NetChange at the maximum of its potential, we strongly suggest that you add at least
one device using its IP address and then use the discovery protocols to add all your network
devices to the page All network devices.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
955
Managing Network Devices
2. At the end of the line of the network device of your choice, click on . The properties page
opens.
The properties page of a network device contains a set of panels detailing its configuration:
Refresh properties
The device refresh configuration, for both data and configuration file refresh. For more details,
refer to the chapter Managing Configuration Versioning.
Additional information
More specific data that is not displayed in the other panels like the Stack identifier, Uptime,
Number of ports, System OID, System contact and Complete description. For more details,
refer to the section Customizing the Display on the Page All Network Devices.
SNMP properties
All the SNMP monitoring information of the device: its profile name, version, port, number of
retries, timeout, transfer timeout, supported MIBs, etc. For more details, refer to the section
Editing the SNMP Properties of a Network Device.
Configuration versioning properties
The versioning configuration status: unsupported, enabled, disabled. Once enabled and
configured, the connection profile is also displayed in the panel. For more details, refer to
the chapter Managing Configuration Versioning.
IP Addresses List
All the IP addresses configured on the interfaces of the device, whether IPv4 or IPv6. You
can list them all on the page All addresses, for more details refer to the chapter Managing
Addresses.
Network device ports status
A graph representing the active, inactive and disabled ports of the device.
956
Managing Network Devices
Column Description
Slot serial number The slot number and slot serial number (identifier) of used slots as follows:
<slot-number>:<slot-serial-number>. That column only retrieves information
for used slots, empty slots are not listed.
SNMP profile The name of the SNMP profile used on the network device.
SNMP refresh The scheduled database refresh frequency configured on the network device
Status The network device status
OK The network device is up and running.
Timeout The network device is not responding.
Note that:
• You can also import network devices from a CSV file. For more details, refer to the section
Importing Data to NetChange in the chapter Importing Data from a CSV File.
• Standard users cannot see the network devices they add, unless a user of the group admin
either:
• Adds the new devices to the resources of the group(s) they belong to.
• Configures the rule 407 to automatically add every new device as resource of the group(s)
they belong to. For more details, refer to the section Automatically Adding New Network
Devices as Group Resource.
957
Managing Network Devices
7. In the drop-down list Target space, select the IPAM space to associate with the network
device(s). The IP address of each device is imported in the selected space. The space also
helps differentiate devices on the page.
8. You can tick the box Expert mode to review and specify more details regarding the device(s)
information retrieval.
9. Click on OK to complete the operation. The report opens and works for a while before closing.
The page displays the network device(s).
Note that depending on the group they belong to, users may not see the device(s) they added
on the page until an administrative user either:
• Adds the new devices to the resources of the group(s) they belong to.
• Configures the rule 407 to automatically add every new device as resource of the group(s)
they belong to. For more details, refer to the section Automatically Adding New Network
Devices as Group Resource.
Once you added one device, you can retrieve all the devices it is directly connected (plugged)
to via the discovery protocol option detailed in the next section.
958
Managing Network Devices
Note that you can also import network devices from a CSV file before using the discovery protocols.
For more details, refer to the section Importing Data to NetChange in the chapter Importing Data
from a CSV File.
The discovery protocol import option retrieves all the information via three layer 2 protocols: the
Cisco Discovery Protocol (CDP), the Nortel Discovery Protocol (NDP) and the Link Layer Discovery
Protocol (LLDP). The information gathered through these protocols is then retrieved using SNMP,
among which, the devices neighbors i.e. the devices connected to the devices listed on the page
All network devices.
The Cisco Discovery Protocol (CDP)
The CDP is a proprietary Data Link Layer network protocol developed by Cisco Systems to
share information between devices, from their topology to their OS version, IP address or
interfaces' status. NetChange uses CDP to discover Cisco network devices.
The Nortel Discovery Protocol (DP)
The DP is a Data Link Layer (OSI Layer 2) network protocol for discovery of Nortel devices
and their topology. NetChange uses it to automatically discover Nortel, Avaya and Ciena
network devices.
The Link Layer Discovery Protocol (LLDP)
The LLDP is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by net-
work devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local
area network, principally wired Ethernet. LLDP is supported by the following switch vendors:
HP, H3C, Nortel, Extreme Networks, Cisco and Juniper, Dell and Entreats.
The LLDP being the only vendor-neutral protocol, you might need to enable it on your devices,
especially if the devices connected are from different vendors or if you connected a Nortel or
Cisco device with a device from a different vendor.
959
Managing Network Devices
Depending on your firmware version, some options may be unrecognized. For VLAN, unfortunately,
you need to issue the command each time you add a VLAN. When using MT, EAST or SMELT,
you may want to disable ingress filtering:
vlan ports ALL filter-unregistered-frames disable
For Nortel RES 8600, there is no support for LLDP. For Nortel Switch for IBM Blade canter (Nortel
Layer 2-3 and 2-7), you need version 5.1 or more recent.
On capable and configured devices, you can see LLDP information with:
show lldp <detail>
960
Managing Network Devices
On the page All network devices, the column 802.1X allows to see if the devices support the
authentication, and if it is enabled or not. For more details on how to add and display customized
list template, refer to the section Managing List Templates.
This panel also provides an overview of the MIBs supported by the device.
961
Managing Network Devices
Field Description
SNMP transfer The number of minutes above which the SNMP transfer is aborted when you add or refresh
timeout (minutes) a device, a value between 0 and 999. By default, it is set to 0. This field is optional.
7. Click on CLOSE to go back to the page All network devices. The page refreshes.
962
Managing Network Devices
5. You can tick the box Device data to refresh the database of the selected network device(s)
at the scheduled time. By default, the box is ticked.
6. You can tick the box Configuration versioning to retrieve the configuration file of the selected
device(s) if changes are detected. By default, the box is unticked.
Note that you can only retrieve the configuration file if the versioning is enabled on the
device(s). For more details, refer to the section Refreshing a Configuration File.
7. Click on OK to complete the operation. The report opens and closes. The refresh frequency
configuration is displayed in the panel Refresh properties of each network device properties
page.
963
Managing Network Devices
3. In the menu, select Edit > Scheduled refresh > Disable. The wizard Disable the
scheduled refresh opens.
4. Tick the box Device data to disable the scheduled refresh for the selected network device(s).
5. Tick the box Configuration versioning if you enabled versioning on the selected device(s).
For more details, refer to the section Refreshing a Configuration File.
6. Click on OK to complete the operation. The report opens and closes.
EfficientIP support team might ask for a device snapshot in case of missing or distorted information
on the equipment you want to add to NetChange. The snapshot is generated in .pcap format and
stored in the Local files listing. Keep in mind that the SNMP service and profiles must be configured
beforehand. Note that SNMPv3 is not accepted as a profile. For more details, refer to the sections
Configuring the SNMP Server and Managing SNMP Profiles.
964
Managing Network Devices
a. In the sidebar, go to NetChange > Network devices. The page All network devices
opens.
b. In the menu, select Tools > Make a snapshot. The wizard Make a network device
snapshot opens.
c. In the drop-down list Interface, select the network interface through which you want to
make the snapshot.
d. In the drop-down list SNMP profile, select the SNMP protocol version of the snapshot
generation, either standard v1 or standard v2c. By default, standard v1 is selected.
e. If you are generating a Cisco device snapshot, tick the box Cisco device.
f. In the field IP address, specify the device IP address.
g. Click on OK to complete the operation. The report opens and works for a while before
closing.
2. Download the snapshot:
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section Maintenance, click on Local files listing. The page Local files listing
opens filtered through the bullet Local, under the menu.
In the column Name, the snapshot file is named <chosen_interface>_<chosen_SN-
MP_profile>_snapshot.pcap.
c. Click on the snapshot file name to download it.
To avoid having to manually define new network device as group resource, administrators can
configure the rule 407 and automatically add every new network device as resource of the groups
of users of the relevant group(s) of users.
To add the rule 407 that sets which groups have new network devices as resource
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select NetChange.
5. In the drop-down list Event, select NetChange refresh.
6. In the list Rule, select (407) (POC) Add new network devices as group resource.
7. In the field Rule name, name the rule. That name is then listed in the column Instance.
8. In the field Comment, you can specify a comment.
9. Click on NEXT . The page Rule filters opens.
10. Click on NEXT . The page Rule parameters opens.
965
Managing Network Devices
11. In the list Available groups, select a group of users and click on . The group is moved to
the list Selected groups. You can add as many groups as you want.
To remove a group from the list Selected groups, select it and click on . The group is
moved back to the list Available groups.
12. Click on OK to complete the operation. The report opens and closes. The rule is listed.
For more details, refer to the section Automatically Adding Network Devices in Device Manager.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Note that administrative users can add a rule to ensure that every new network device is added
to the resources of the groups of users of their choice. For more details, refer to the section
Automatically Adding New Network Devices as Group Resource.
Granting access to a network device as a resource also grants access to every item it contains.
For more details, refer to the section Adding Resources to a Group in the chapter Groups.
966
Chapter 68. Managing Routes
The page All routes is dedicated to the network devices routing tables and displays the existing
routes on the layer 3 network devices you manage.
All the information displayed is retrieved via SNMP. Each route corresponds to a subnetwork
and has a unique IP address and prefix. The prefix size can be any number between 0 and 32
for IPv4 addresses and between 0 and 128 for IPv6 addresses.
NetChange supports more MIBs to provide detailed route information on the page. Thanks to
L3VPN you can now display the VRF routes configured on your network and also retrieve the
routes Type and Protocol.
Prerequisites
• Managing network devices and/or routers that support and have SNMP enabled.
• To discover VRF routes on your network you must:
• Make sure the routers support the MIB MPLS-L3VPN-STD-MIB.
• Make sure the routers configured with VRF have MPLS enabled.
• Make sure the routers configured with VRF have BGP enabled.
• Enable the registry key module.netchange.enable_vrf_route.
Limitations
• Routes are retrieved automatically when you import network devices. You cannot add, edit or
delete them.
• You can only export routes.
• To display the routes' Type and Protocol, the MIBs IP-FORWARD-MIB and IANA-RTPROTO-
MIB must be implemented on the routers.
• Depending on your infrastructure, enabling the VRF routes discovery can significantly increase
the database size.
Browsing Routes
The routes are the second level of organization in NetChange, along with the VLANs, configura-
tions, ports and addresses.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
967
Managing Routes
Keep in mind that you can use colored labels to differentiate at a glance IPv6 address containers.
For more details, refer to the chapter Managing IPv6 Labels.
In addition to the route and network device dedicated columns, the columns VRF name, VRF
RD and Next hop provide detailed information.
968
Managing Routes
Value Description
indirect The routing is working, the route destination is not connected to the network device and
relies on a next-hop.
invalid The routing is not working, the route is either invalidated or discarding traffic.
local The routing is working, the route destination is directly connected to the network device.
other The routing is not working, we do not know why.
reject The routing is not working, the route is either invalidated or discarding traffic.
remote The routing is working, the route destination is not connected to the network device and
relies on a next-hop.
Another column returns the Protocol via which the route was found.
Enabling the key updates the data on the page All routes, including additional information in the
columns VRF name and VRF RD.
You can create these retrieved routes in the IPAM. For more details, refer to the section Creating
Routes in the IPAM.
969
Managing Routes
To enable the registry key that controls the switch based on time drift
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with module.netchange.enable_vrf_route.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, type in 1 to enable it. By default, its value is 0.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
970
Managing Routes
Exporting Routes
From the page All routes, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
971
Chapter 69. Managing VLANs
The page All VLANs provides an overview of the existing Virtual Local Area Networks for each
network device and their ID if you purchased the license NetChange-IPL. If you have the
NetChange license, it also allows to add, edit and delete VLANs on your devices. For more details
regarding the two available NetChange licenses, refer to the table NetChange licenses differences.
Browsing VLANs
The VLANs are the second level of organization in NetChange, along with the routes, configura-
tions, ports and addresses.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
Keep in mind that the column Port list contains the number of all the ports associated with each
VLAN. You can edit this list if you purchased the license NetChange, otherwise this list is merely
informative.
972
Managing VLANs
Adding a VLAN
With the NetChange license, you can add VLANs to the page All VLANs and then associate them
with existing ports. Using 802.1q VLAN Trunking protocol, a VLAN can cover a network area on
multiple switches.
You can also add a VLAN from the list All VLANs of a specific device, in this case the Network
device drop-down list does not appear.
Editing a VLAN
Editing a NetChange VLAN means renaming it.
Note that depending on your NetChange license, you may be able to associate a VLAN with one
or several network ports. For more details, refer to the section Associating a Port With a VLAN.
To rename a VLAN
1. In the sidebar, go to NetChange > VLANs. The page All VLANs opens.
2. Right-click over the ID of the VLAN you want to rename. The contextual menu opens.
3. Click on . The wizard Add a VLAN opens.
4. In the field Name, rename the VLAN.
5. In the field VLAN ID, the ID is displayed but cannot be edited.
6. Click on OK to complete the operation. The report opens and closes. The list refreshes, the
new VLAN name is listed.
973
Managing VLANs
4. In the drop-down list VLAN Domain, select the domain of your choice. The field VLAN Range
appears.
5. In the drop-down list VLAN Range, you can select the range of your choice. By default,
None is selected.
6. In the drop-down list Existing records, select Replace to overwrite any existing VLAN or
Don't replace to create it. By default, Don't replace is selected.
7. Click on OK to complete the operation. The report opens and closes.
8. To display the created VLAN(s), in the sidebar, go to VLAN Manager > VLANs. The page
All VLANs opens. Each new VLAN is assigned the ID and Name of the selected NetChange
VLAN.
Exporting VLANs
From the page All VLANs, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting a VLAN
With the NetChange license you can delete any VLAN from any network device as long as it is
not used on any port.
To delete a VLAN
1. In the sidebar, go to NetChange > VLANs. The page All VLANs opens.
2. In the column Network device, click on the name of the device of your choice to display
only its VLANs.
3. Tick the VLAN(s) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The VLAN is no longer
listed.
974
Chapter 70. Managing Ports
The ports are physical interfaces of the network devices. NetChange discovers the network
devices ports using a discovery algorithm that automatically analyzes each port and displays its
type and status. It also allows to know which MAC or IP addresses should be looked for and the
devices connection on the network. Typically the listed ports can be:
• Edge or terminal ports: used to connect the terminal network devices of the network (servers,
workstations, printers, ...);
• Interconnection ports: used to link the network devices between them (the backbone).
Depending on your network devices, some ports can actually be both. Some columns on the
page provide all this information:
• Interco (for interconnection) is purely informative even if you can manually force its value to
Yes, No or Autodetect in the GUI.
• Trunking/Tagging mode provides the actual port type, edge ports are marked Access and
interconnection ports are marked Trunk or Tagged.
NetChange module allows to edit a port and associate it with existing VLANs on your device
(existing by default or that you added). To be able to edit a port, you must meet the following
prerequisites:
1. The SNMP service is configured properly. For more details, refer to the section Configuring
the SNMP Server.
2. The SNMP profile used with network devices has a read/write access to interact with the
device(s). For more details, refer to the sections Managing SNMP Profiles and Editing the
SNMP Properties of a Network Device.
3. You have the NetChange license. NetChange-IPL does not provide port edition options. For
more details, refer to the table NetChange licenses differences.
4. The network device on which you edit the port supports MIBs that allow port edition.
Once these prerequisites are met, you can edit your ports. This allows to associate them with
any VLAN on your network or even use them in a tagged or untagged mode and influence their
behavior on the network. As a general rule, when choosing to tag or not a port you should take
into account the following:
• The untagged mode (called Access on Cisco devices) uses the ID of the tagged VLAN the port
is associated with when sending and receiving data. That way packages are identified
throughout the transfer on the network from the sending port to the receiving one. Once the
package is received, the tag number is dismissed, in other words, untagged. This transfer
mode is based on terminal, or edge, ports as packages always reach their destination thanks
to their tag once sent. In the columns VLAN name list and VLAN # list, the untagged/access
VLAN of the port is followed by a star.
• The tagged mode (called Trunk on Cisco devices) uses the ID of the VLANs associated with
the port only when sending packages. The tag identifies the target port. Once the package is
received, the tag number is kept. This transfer mode is based on interconnection ports as it
allows to send out data all over the network.
975
Managing Ports
Browsing Ports
The ports are the second level of organization in NetChange, along with the routes, configurations,
VLANs and addresses.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
Some columns provide more specific information regarding port settings, like Trunking/Tagging
mode, Configured speed, Configured duplex, VLAN name list, VLAN # list, Operating speed,
Operating duplex, or even Port-security action.
976
Managing Ports
LowerLayerDown
The port is inactive. These statuses are very rare. For more details, refer to the description
NotPresent of the MIB IF-MIB.
Dormant
Unknown The port status is unknown.
Disabled The port was disabled. For more details, refer to the section Enabling or Disabling a Port.
Keep in mind that you should never disable interconnection ports as you take the risk of
losing access to your network device.
To enable/disable a port
1. In the sidebar, go to NetChange > Ports. The page All ports opens.
2. Tick the port(s) for which you want to change the status.
3. In the menu, select Edit > Port status > Enable or Disable.The wizard opens.
4. Click on OK to complete the operation. The report opens and closes.
Keep in mind that on some devices, especially Cisco Catalyst, the configuration is not written
after the modification has been done, so if no write configuration command is made through
CLI, modifications can be lost if the switch is reloaded.
NetChange discovery algorithm automatically isolates interconnection ports: they are marked
Yes in the column Interco if the number of discovered items on a port is greater than a defined
limit (4 by default).
The value of the column Interco is merely a way of filtering the ports in the list. However, if a port
interconnection is set to Yes, any MAC address discovered via the port is not logged on the page
Discovered item history. For more details, refer to the section Tracking the Discovered Items
History of a Specific Device.
977
Managing Ports
Keep in mind that you can only see the speed and duplex changes of active ports. If you edit the
port and speed of an inactive port, the changes are never visible in the GUI.
Once you edited the port tagging mode, to see your changes in the columns Configured speed
and Configured duplex, you must refresh the device the port belongs to. For more details, refer
to the section Refreshing a Device Manually.
978
Managing Ports
Note that:
• To work properly, you must have defined the Write community of the SNMP profile used by
the network device.
• The new description is directly updated on the port itself. It is visible in the column Description
and available to any user who discovers the device.
Prerequisites
• The license NetChange.
• The network device that the port belongs to must support 802.1X authentication.
• 802.1X authentication must be enabled on the device to be managed from the GUI.
• 802.1X authentication must be configured on each port individually.
• 802.1X authentication must be enabled at device level to be enabled at port level. If it is disabled
on the device, the port is configured with it but not used for authentication.
Limitations
• On HP devices, only the HP-DOT1X-EXTENSIONS-MIB is supported.
• On Cisco devices, the interface vlanTrunkPortDynamicState should not be set to auto or desir-
able.
On the page All ports, the column 802.1X allows to see if the authentication is enabled or not on
each port. For more details on how to add and display customized list template, refer to the
section Managing List Templates.
979
Managing Ports
Note that you can enable both 802.1x authentication and port-security on a port, but on HP
devices, if 802.1x is enabled, only the port-security mode 8021xAuthorised is available.
This protocol allows to restrict input to an interface by limiting and identifying MAC addresses
that are allowed to access the port.
By default, the protocol is enabled on the devices that support it and you can enable or disable
it individually on each port.
Prerequisites
• The license NetChange.
• On Cisco devices, the port mode Trunking/Tagging (i.e. switchport) is set to Access or Trunk.
Limitations
• On Cisco devices, only the CISCO-PORT-SECURITY-MIB is supported.
• Only HP devices supporting the HP-ICF-GENERIC-RPTR MIB can be configured.
• On HP devices, if you enable Port-security and 802.1x on a port, only the port-security mode
8021xAuthorised can be configured.
• On HP devices, if you enable Port-security and 802.1x on a port, you cannot limit the number
of MAC addresses that can access the port.
On the page All ports, the column Port-security allows to see which ports support it. For more
details on how to add and display customized list template, refer to the section Managing List
Templates.
980
Managing Ports
On the page All ports, the column MAC number limit allows to see which ports are restricted,
by default it contains the value 1. For more details on how to add and display customized list
template, refer to the section Managing List Templates.
Note that on HP devices you cannot set a maximum number of MAC address on a port configured
both with 802.1x authentication and Port-security, the Port-security mode 8021xAuthorised does
not allow it.
981
Managing Ports
8. If you are editing the port of a HP device, make sure the Port-security Mode selected is
either FirstN or LimitedContinuous.
9. In the field Maximum number of secured MAC addresses, specify the number of MAC
addresses that can access the port. This number depends on your device. By default, Port-
security is configured with 1 MAC address.
To configure an Action for the port once the number of secured MAC addresses exceeds
the one you just set, refer to the section Configuring Port-Security Modes.
10. Click on OK to complete the operation. The report opens and closes. The column MAC
number limit displays the new value.
On the page All ports, the configuration modes are displayed in the column Port-security action.
If you configured a Maximum number of secured MAC addresses, the Action applies to
the extra MAC addresses, the addresses that try to connect to the port once the value spe-
cified in this field is exceeded.
10. Click on OK to complete the operation. The report opens and closes.
982
Managing Ports
Keep in mind that once you configured the rule, and enabled and applied the class to a port, only
the users belonging to a group of users authorized in the rule can edit that port. Even users with
edition permissions on the ports and the proper resources are not allowed to edit the ports con-
figured with the class reserved if they do not belong to an authorized group of users.
Keep in mind that once the rule is configured, its configuration overrides the port permissions set
for any group of users. Even if a group has all the existing ports within its resources and edition
permissions over them, its users are not allowed to edit the ports set with the class reserved if
they are not listed among the Authorized groups.
To add the rule 378 that defines the groups of users allowed to edit reserved ports
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select NetChange.
5. In the drop-down list Event, select Edit: ports properties.
983
Managing Ports
On the page All ports, the column Class allows to see to which ports you applied the class re-
served. For more details on how to add and display customized list template, refer to the section
Managing List Templates.
Once the class is applied on a port, only users belonging the Authorized groups configured in
the rule can edit the port.
Keep in mind that the untagged/access VLAN tag of a port is followed by a star (*) in the columns
VLAN name list and VLAN # list.
There are different tagging modes available depending on the network device vendor: Cisco or
others.
984
Managing Ports
Keep in mind that you can only edit a device Trunking/Tagging mode if the SNMP configuration
set at device level allows to retrieve the MIBs.
Once you edited the port tagging mode, to see your changes in the column Trunking/Tagging
mode, you must refresh the device the port belongs to. For more details, refer to the section
Refreshing a Device Manually.
Once you edited the port tagging mode, to see your changes in the column Trunking/Tagging
mode, you must refresh the device the port belongs to. For more details, refer to the section
Refreshing a Device Manually.
985
Managing Ports
To rapidly see your port/VLAN association, make sure the columns VLAN # list and VLAN name
list are displayed.
986
Managing Ports
b. To remove the port association with tagged VLANs, in the list Trunk/Tagged VLAN
list, select a VLAN and click on , or double-click on it, to move it back to the list
Available VLANs.
6. Click on OK to complete the operation. The report opens and closes. The VLANs associated
with the port are displayed in the columns VLAN # list and VLAN name list.
Exporting Ports
From the page All ports, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
987
Chapter 71. Managing Configuration
Versioning
You can manage the configuration file versioning of network devices. Versioning allows to auto-
matically save all the changes in the configuration files, and all the revisions of the files are saved
in SOLIDserver backup file. To monitor versioning from NetChange you must:
1. Add a connection profile from the Administration module.
2. Enable versioning and configure the connection profile on the device.
Once configured, all the revisions are listed on the page All configurations, and you can compare
changes on the page Configuration and download entire files or only changes.
Prerequisites
• SOLIDserver with the license NetChange.
• The network device must support versioning, like HP, Cisco, Juniper or Extreme.
• The network device must already be managed from SOLIDserver. To add a network device,
refer to the section Adding Network Devices.
Limitations
• Disabling the configuration files versioning on a device deletes all the configuration file revisions
from the database.
• Configurations files are local. You cannot push them to the network device you manage from
SOLIDserver.
• Configurations files are read-only. You cannot rollback to a former file version.
• On appliances configured in High Availability, the configuration files versioning of your network
devices can only be managed from the Master appliance.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
988
Managing Configuration Versioning
There are 6 columns on the page All configurations that you can sort and filter. By default, all
the columns are displayed on the page, you cannot change their order.
At the end of the line of each revision listed, you can find two links.
Do not hesitate to set up alerts on the page to monitor any changes. For more details, refer to
the chapter Managing Alerts.
For more details regarding downloads, refer to the section Downloading Versioning Information.
To display the latest configuration file from the page All network devices
1. In the sidebar, go to NetChange > Network devices. The page All network devices
opens.
2. In the column Revision, click on r.<revision-number>. The page Configuration opens
and displays the latest version of the network device configuration file.
Above the configuration file content, a gray area contains the network device details: its
name, its IP address, and the date and time when the configuration version was saved.
989
Managing Configuration Versioning
By default, the configuration file displays all the passwords in plain text, if you do not want
all the users to see them you can edit a registry database entry to hide them. For more details,
refer to the section Configuring the Passwords Display in the Configuration Files.
Do not hesitate to set up alerts based on these dedicated columns. For more details, refer to the
chapter Managing Alerts.
990
Managing Configuration Versioning
Connection profiles are managed on the page Network devices connection profiles in the
module Administration.
Only users of the group admin can add, edit and delete connection profiles.
Keep in mind that one profile can be used for several devices as long as the profile configuration
suits all the devices it is associated with.
10. Click on OK to complete the operation. The report opens and closes. In the list Network
devices connection profiles, the new profile is listed as follows: <profile-name> [PRO-
TOCOL].
991
Managing Configuration Versioning
Keep in mind that editing a connection profile associated with a device sets its status in the
column Versioning to Yes on the page All network devices.
If you want to delete a connection profile already associated with a network device, you must
edit the network device in question and select another connection profile. For more details, refer
to the section Configuring Versioning on One Device.
When versioning is enabled, you can manage the configuration files versioning from the pages
All configurations, Configuration and All network devices.
992
Managing Configuration Versioning
You can change the connection profile associated with your network device. Follow the procedure
above and select another connection profile.
Once you enabled versioning, the page All configurations allows to display the list of configur-
ation file revisions and click on a revision number to open that version of the configuration file.
To refresh a configuration files database, compare revisions or download revisions, refer to the
dedicated sections.
You can change the connection profile associated with several network devices. Follow the pro-
cedure above and select another connection profile.
993
Managing Configuration Versioning
Once you enabled versioning, the page All configurations allows to display the list of configur-
ation file revisions and click on a revision number to open that version of the configuration file.
To refresh a configuration files database, compare revisions or download revisions, refer to the
dedicated sections.
Note that you can limit the refresh and only allow it for network devices which Status is OK. For
more details, refer to the section Limiting Configuration Refresh Based on the Network Device
Status.
Keep in mind that the device parameter SNMP transfer timeout can impact the success of the
refresh. For more details, refer to the section Editing the SNMP Properties of a Network Device.
994
Managing Configuration Versioning
5. The box Device data is ticked. This box refreshes the database at the scheduled time but
not the configuration file of the selected network device(s). You can leave it ticked if you
want. For more details, refer to the section Refreshing the Network Devices Database.
6. Tick the box Configuration versioning to retrieve the latest revision of the configuration
file of the selected device(s). This revision is retrieved only if any changes are detected at
the time of the scheduled refresh.
7. Click on OK to complete the operation. The report opens and closes. The refresh frequency
that you set is displayed in the panel Refresh properties on the properties page of your
network device.
You can compare consecutive revisions of a device configuration file or even non-consecutive
revisions of a configuration file or configuration files from different network devices.
995
Managing Configuration Versioning
The very first revision available compares an empty file with that revision.
Versioning dedicated logs include: notifications if the device does not support it, if versioning is
enabled/disabled, the new configurations, etc.
996
Managing Configuration Versioning
From the page Configuration, you can download one revision or the differences between two
compared configuration files.
From the page All configurations, you can display an archive file containing as many configuration
file revisions as you need.
Keep in mind that the downloaded file only contains the differences between the two revisions,
even if you display the Full diff.
997
Managing Configuration Versioning
Thanks to a registry database key, you can show or hide all or some of the passwords of the
configuration file. By default, they are all hidden and we strongly recommend leaving it this way.
Table 71.6. Available display options for passwords in the configuration file
Value Description
0 Allows to hide all the passwords in the configuration files.
1 Allows to display only the encrypted passwords of the configuration files, in their encrypted form.
All the non-encrypted passwords are hidden.
This display option can be useful to keep track of the password changes without displaying them.
2 Allows to display all the passwords of the configuration files.
This display option is not recommended.
998
Managing Configuration Versioning
8. Click on OK to complete the operation. The report opens and closes. The column Value
contains the value you set.
Table 71.7. The accepted values of the configuration file refresh key
Value Description
0 Prevent users from refreshing the configuration of network devices which Status is not OK.
1 Allow configuration refresh of network devices no matter their Status. This is the default value.
8. Click on OK to complete the operation. The report opens and closes. The column Value
contains the value you set.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Keep in mind that disabling the configuration files versioning on a device deletes all the
configuration file revisions saved in the database.
999
Managing Configuration Versioning
3. In the panel Configuration versioning properties, click on EDIT . The wizard Network
device connection profile opens.
4. Untick the box Enable configuration versioning. The page refreshes and the drop-down
list Network device connection profile is no longer visible.
5. Click on OK to complete the operation. The report opens and closes. In the panel, only the
line Enable configuration versioning remains, it is marked no.
Once disabled, the network device is marked No in the column Versioning on the page All
network devices.
Once disabled, all the network devices selected are marked No in the column Versioning on the
page All network devices.
1000
Chapter 72. Managing Addresses
The page All addresses lists the IP addresses configured for the interfaces of each network
device managed from the page All network devices.
Browsing Addresses
The addresses are the second level of organization in NetChange, along with the routes, VLANs,
ports and configurations.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
1001
Managing Addresses
Column Description
Status The interface status: Active or Inactive.
Keep in mind that you can use colored labels to differentiate at a glance IPv6 address containers.
For more details, refer to the chapter Managing IPv6 Labels.
Exporting Addresses
From the page All addresses, you can export the data listed in a CSV, HTML, XML, XLS or PDF
file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1002
Chapter 73. Managing Discovered Items
The discovered items are devices connected to NetChange network devices. Usually these items
are edge devices, like workstations, servers, printers and so on. All these devices are identified
through their MAC address.
Discovered items are automatically retrieved from NetChange devices after each discovery and
put in the history. They can be discovered through many types of interface such as physical
ethernet interfaces, virtual aggregated interfaces, VLAN interfaces or loopbacks.
The page All discovered items provides detailed information on where a device IP or MAC address
has been connected to the network, when it connected, which device port was used, in which
VLAN etc.
ROUTE
VLAN
NETWORK DISCOVERED
DEVICE VLANITEM
PORT
CONFIG
VLANADDRESS
One MAC address can be listed multiple times. It is listed for each unique IPv4 and/or IPv6 address
associated with the discovered item.
The discovered items do not have a properties page, all the information is displayed on the page.
1003
Managing Discovered Items
Some columns on the page provide specific information regarding the discovered items:
To enable the retrieval of the data displayed in the column First seen, you must add a dedicated
key in the registry database and reboot SOLIDserver.
1004
Managing Discovered Items
b. In the section Expert, click on Registry database. The page Registry database opens.
c. In the menu, click on Add. The wizard Registry database Add an item opens.
d. In the field Name, type in module.iplocator.activate_first_seen .
e. In the field Value, type in 1 to enable the data retrieval.
f. Click on OK to complete the operation. The report opens and closes. The key is listed.
2. Reboot SOLIDserver
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section Maintenance, click on Reboot SOLIDserver. The wizard Reboot the
system opens.
c. Click on OK to complete the operation. You are logged out, the login page details the
progression until the connection is lost.
d. Refresh the page until the login page appears.
Once the reboot is complete and the login page is visible again, log in and go to the page
All discovered items. In the column First seen, all the information available is displayed.
To refresh manually or schedule the refresh of a network device and all its discovered items,
refer to the section Refreshing the Network Devices Database.
For more details, refer to the section Automatically Adding Discovered Items in Device Manager.
To successfully create IP addresses in the IPAM from NetChange, make sure that:
1. The IP address of the discovered item is actually retrieved and displayed. It might not be
available if the router has not found any equivalence between the MAC and IP address, neither
from the equipment nor from the DHCP.
2. The IP address of the discovered item is available in the IPAM. The option allows to:
1005
Managing Discovered Items
• Select a Target space, either the same space as the one set for the network device managing
your item or another space, as long as this space contains a terminal network with free ad-
dresses that you can assign to your discovered items. For more details regarding the space
selection at network level, refer to the section Adding Network Devices.
• Tick the box Use best space to automatically find a space that can receive the discovered
item in the smallest terminal network available.
All MAC addresses discovered prior to the period you set are removed from the page and only
available on the page Discovered items history. For more details, refer to the section Tracking
the Discovered Items History of a Specific Device.
Note that you can also configure or refine the purge frequency via the rule 008, for more details
refer to the section Keeping NetChange Data Up-to-date.
1006
Managing Discovered Items
That way, using a MAC address, you can see the different IP addresses an edge device had, at
different periods of time, which switch and port it was connected and which VLAN it belonged to.
This function also allows to track laptops on the network and see on which switches and ports
they have been successively connected to.
To manage the columns display, refer to the section Customizing the Display on the Page All
Discovered Items.
To limit the number of discovered items saved in the history, you can configure and enable a rule
dedicated to purging the NetChange database, including discovered items. For more details,
refer to the section Keeping NetChange Data Up-to-date.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1007
Chapter 74. Managing Statistics
NetChange can provide a set of specific statistics. These statistics are all displayed as pie and
bar charts that can present vendors, speed, usage, etc.
In addition to these holistic charts, NetChange provides specific charts on the network devices
and port properties pages.
1008
Managing Statistics
The charts contain In and Out parameters. To better understand them, refer to the table below.
1009
Chapter 75. Monitoring and Tuning
NetChange offers a set of options to monitor and tune your network devices and discovered
items.
For more details regarding the reports and their generation, refer to the section Managing Reports.
The choice of periodicity depends completely on your environment and what you intend to do
with NetChange, you may need to have a history of all movements (so you might need to purge
the database every month or trimester) or you may only need the most relevant data when
looking for a host (so you might want to purge every week).
To configure the purge frequency of the data listed on the page All discovered items, you must
edit and enable the rule 008.
1010
Monitoring and Tuning
Field Description
Month A specific month or every month. By default, every month is selected. This field
is optional.
Hour A specific hour, a set of hours, every hour, or every hour over a specific period.
The hour respects the UTC standard. This field is optional.
Minute A moment of the hour (00, 15, 30 or 45) or a frequency. The minute respects the
UTC standard. By default, 30 is selected. This field is optional.
To retrieve the list of devices, you must edit the rule, specify the path to the local CSV file and
enable the rule. If the CSV file contains devices that are not managed by NetChange yet, they
are automatically imported during the synchronization.
To edit the rule 010 that retrieves network devices from a CSV file
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule #, type in 010 and hit Enter. The rule is the only one listed.
4. Configure the rule
a. At the end of the line, click on . The properties page opens.
b. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
c. Click on NEXT . The page Rule filters opens.
d. Edit the rule frequency according to your needs.
1011
Monitoring and Tuning
To customize the network devices Type, users with administrative rights over SSH connections
to SOLIDserver must:
1. Create a file <vendor-id>.inc for each vendor and place it in the directory /data1/etc/netchange/
You need one file per vendor that includes all the devices you need, the device Vendor ID is
displayed in the column System OID.
1012
Monitoring and Tuning
2. Add a line per device that includes its OID and the information to display in the column in json
format.
Note that first part of all devices OID .1.3.6.1.4.1. is already taken into account, so you only
need to specify the device OID from vendor to device.
For instance, to customize the type of Cisco Nexus 6004 devices, you can create a file 9.inc,
9 being Cisco's vendor ID, containing the following information:
{
"9.12.3.1.3.1237": { "model": "Nexus 6004 Switches in the US"}
{
The column Type now displays Cisco Nexus 6004 Switches in the US instead of Cisco Nexus
6004.
f. Click on CLOSE to go back to the page All network devices. The page refreshes.
In the column Type, the information regarding the device(s) matching the OID you
specified in the files are updated.
1013
Part XII. Workflow
The Workflow is a request-based module allowing standard users to ask for changes in the IPAM and DNS:
• DNS zones addition, edition or deletion.
• IPAM non-terminal networks addition, edition or deletion. These can be block-type or subnet-type net-
works.
• IPAM terminal networks addition, edition or deletion.
• IPAM pools addition, edition or deletion.
• IPAM IP addresses addition, edition or deletion.
Keep in mind that to use the Workflow at the best of its potential you must:
1. Grant sufficient rights to requestors and request managers: the group they belong to needs to be
granted the appropriate IPAM, DNS and/or Workflow rights. For more details, refer to the section Managing
the Rights of a Group of Users in the chapter Managing Groups.
2. Grant users access to request classes, the existing classes or the ones you added. For more details,
refer to the chapter Granting Access to Workflow Classes.
3. Customize the page Incoming requests if need be. For more details, refer to the chapter Customizing
the Requests Administration.
4. Grant relevant users access to the Workflow pages, that way they can add or deal with the requests.
5. Executing the action required in the requests if they are accepted.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
76. Granting Access to Workflow Classes ..................................................................... 1016
77. Managing Outgoing Requests ................................................................................. 1017
Browsing Outgoing Requests ............................................................................... 1017
Adding Requests for Creation .............................................................................. 1017
Adding Requests for Edition ................................................................................. 1019
Adding Requests for Deletion ............................................................................... 1020
Editing Requests ................................................................................................. 1022
Exporting Outgoing Requests .............................................................................. 1023
Canceling Requests ............................................................................................ 1023
78. Managing Incoming Requests ................................................................................. 1025
Browsing Incoming Requests ............................................................................... 1025
Managing the Requests Content .......................................................................... 1025
Administrating Requests Using the Default Statuses and Options ........................... 1026
Administrating Requests Using Your Own Settings ................................................. 1029
Exporting Incoming Requests .............................................................................. 1029
79. Executing Requests ............................................................................................... 1030
Executing Requests Using the Execute Option ...................................................... 1030
Executing Requests Using Classes ...................................................................... 1031
80. Customizing the Requests Administration ................................................................ 1034
Editing the Workflow Statuses .............................................................................. 1035
Editing the Email Notification Details ..................................................................... 1037
Adding a Workflow Status .................................................................................... 1038
Customized Statuses Best Practices .................................................................... 1039
1015
Chapter 76. Granting Access to Workflow
Classes
As every request is based on a specific Workflow class, users need to be granted access to the
relevant ones. That way, they can select a class when adding a request and fill in the fields
defined through the class.
There are five classes dedicated to Workflow requests. They define all the required fields when
asking for the addition, edition or deletion of the object they are named after:
• request_dns_zone is dedicated to requests regarding DNS zones.
• request_ip_block is dedicated to requests regarding IPv4 non-terminal networks, block-type
or subnet-type.
• request_ip_subnet is dedicated to requests regarding IPv4 terminal networks.
• request_ip_pool is dedicated to requests regarding IPv4 pools.
• request_ip_address is dedicated to requests regarding IPv4 addresses.
The users that do not have access to Workflow request classes are not able to properly complete
the request addition wizard: the request addition wizard is still available, but it is impossible to
define the needed containers or resources to apply the requested changes to.
Obviously, you can add your own Workflow request classes. These classes must be dedicated
to the Module Workflow and the Type Request. For more details, refer to the chapter Configuring
Classes.
Keep in mind that in this case, the Execute option is not available in the page Incoming requests.
For more details, refer to the section Executing Requests Using the Execute Option.
Once the classes of your choice are part of the resources of a group, its users can choose from
one of them when requesting the addition, edition or deletion of objects in the DNS or IPAM
database.
1
Any group EXCEPT the admin group as, by default, it has authority over all the resources of SOLIDserver database.
1016
Chapter 77. Managing Outgoing
Requests
From the page Outgoing requests, users with sufficient Workflow rights can:
• Add requests for creation, edition or deletion.
• Edit the requests they added.
• Cancel the requests they added.
The requests management respects the groups hierarchy by default. Therefore, once added if
the user belongs to a group that has a parent group, then by default the request can be dealt
with by all the users of the parent group as well as the users of the group admin. If the users
want the request to be dealt with by specific users, they can set a managing group when adding
or editing the request.
1017
Managing Outgoing Requests
13. Click on OK to complete the operation. The report opens and closes. The request is listed
and marked as New in the column Status.
On the request properties page, the Main properties and Request parameters sum up the re-
quest details.
1018
Managing Outgoing Requests
The edition request only applies to the values that you can usually edit in each module, so:
• You cannot ask for the edition of anything configured for DNS zones.
• You can only ask for the edition of the name of the networks, pools and addresses.
1019
Managing Outgoing Requests
Field Description
Managing group The name of the group of users which request managers are allowed to
accept the request and deal with it, or deny it. This field is optional.
15. Click on OK to complete the operation. The report opens and closes. The request is listed.
It is marked New in the column Status and Modified in the column Action.
On the request properties page, the Main properties and Request parameters sum up the re-
quest details.
Note that to the class request_ip_block applies to non-terminal networks of both subnet and block
type.
Reminder
To add a terminal network deletion request, the group of the user must have at least been
granted the following rights:
• In the panel Workflow, all the rights that suit your needs
• In the panel IPAM, the right Display: spaces list.
To edit an IP address related request, the group of the user must include among its resources:
• At least one space to grant access to all the objects it contains.
1020
Managing Outgoing Requests
13. Click on OK to complete the operation. The report opens and closes. The request is listed.
It is marked New in the column Status and Delete in the column Action.
On the request properties page, the Main properties and Request parameters sum up the re-
quest details.
It automatically adds a request in the Workflow using the default class request_ip_subnet for
terminal networks or request_ip_block for non-terminal networks (block-type or subnet-type).
Reminder
To add a network deletion request, the group of the user must have at least been granted
the following rights:
• In the panel Workflow, all the rights that suit your needs.
• In the panel IPAM, the right Display: spaces list.
To edit an IP address related request, the group of the user must include among its resources:
• At least one space to grant access to all the objects it contains.
1021
Managing Outgoing Requests
Editing Requests
Once you added a request, you can edit its details or provide additional information via a note
and/or file upload.
Uploading a File
Requestors can add up to 10 files to their request. They cannot upload more than 5 Mb of files.
1022
Managing Outgoing Requests
7. Click on to add the file to the list Attached files. Repeat these actions for as many files
as you want.
8. Click on OK to complete the operation. The report opens and closes. The panel Upload file
contains the file(s).
Adding a Note
Requestors can add notes to their request in addition to the Motivation expressed when adding
the request.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Canceling Requests
You can cancel a request you added. By default, this action is only possible is the request status
is New. Once it is handled or accepted, you can no longer cancel it.
Once canceled, you no longer see it on the page, only request managers can still see it.
To cancel a request
1. In the sidebar, go to Workflow > Outgoing requests. The page Outgoing requests
opens.
2. Tick the request you want to cancel.
3. In the menu, select Edit > Cancel. The wizard Status edition opens.
4. In the field Enter a note, you can type in a text of 3000 characters at most, explaining why
you want the request canceled.
5. Click on OK to complete the operation. The report opens and displays the cancellation report
status.
1023
Managing Outgoing Requests
6. You can click on CSV (DATA) , TEXT , HTML or EXCEL to download the cancellation report in the
corresponding format.
7. Click on CLOSE to go back to the page Outgoing requests. The request is no longer listed.
1024
Chapter 78. Managing Incoming
Requests
From the page Incoming requests, administrators or request managers can:
1. Deal with pending requests using the default options of the menu Edit: handle, edit, execute,
reject, finish and finally delete the requests.
2. Deal with pending requests using custom options. The available options would then depend
on the administrator configuration and intern use of the module.
Keep in mind that by request managers, we mean users belonging to a group with sufficient rights
and resources. Make sure they belong to a group configured with:
• All the Workflow rights, to be able to manage the requests completely.
• All the DNS and IPAM objects that regular users can add requests for among the group re-
sources.
• All the relevant IPAM and DNS rights that allow them to comply with the request.
1025
Managing Incoming Requests
On the request properties page are displayed all the request details as well as the requestor
notes and uploaded files. In the Request history are listed all the administrators and request
managers notes added when editing the request status.
To display notes
1. In the sidebar, go to Workflow > Outgoing requests. The page Outgoing requests
opens.
2. Right-click over the Name of the request you want to edit. The contextual menu opens.
3. Click on . The request properties page opens.
4. In the panel Note, all the notes are displayed under the Date and User. You can scroll down
if there are several notes.
The administrators and request managers can also add notes and upload files. For more details,
refer to the section Adding Information to a Request.
Every time a request status is edited, it sends an email to the user who requested it to inform
them of the request evolution. Therefore, make sure your requesting users profile is set up
properly. For more details, refer to the chapter Managing Users.
Only the Archive option does not correspond to any status as it basically deletes the request from
the page and stores it on the page Local files listing.
1026
Managing Incoming Requests
Status Description
Canceled The request was canceled by the requestor. The requested object creation, edition or deletion
has to be ignored by the request manager or administrator handling it. This status can only be
set from the page Outgoing requests.
Finished The requested creation, edition or deletion was performed. This status can only be set from the
page Incoming requests.
By default, the requests managers can set these statuses as long as they respect the following:
• New requests can be handled, accepted, rejected and canceled.
• Handled requests can be accepted, rejected and canceled.
• Accepted requests can only be dealt with and finished.
• Rejected requests can only be archived.
• Canceled requests can only be archived.
• Finished requests can only be archived.
Using the default options and statuses is useful as it allows to use the Execute option. This option
allows to execute a request from the Incoming requests directly. For more details, refer to the
section Executing Requests Using the Execute Option.
Handling Requests
The request managers and administrators can at any point handle New requests.
To handle a request
1. In the sidebar, go to Workflow > Incoming requests. The page Incoming requests
opens.
2. Tick the request(s) you want to handle.
3. In the menu, select Edit > Handle. The wizard Status edition opens.
4. In the field Enter a note, you can specify a reason for accepting or the user performing the
task. This text is available on the request properties page, in the Request history panel.
5. Click on OK to complete the operation. The report opens and indicates the operation success.
6. Click on CLOSE to go back to the page Incoming requests.
Accepting Requests
The request managers and administrators can, at any point, accept New and Handled requests.
To accept a request
1. In the sidebar, go to Workflow > Incoming requests. The page Incoming requests
opens.
2. Tick the request(s) you want to accept.
3. In the menu, select Edit > Accept. The wizard Status edition opens.
4. In the field Enter a note, you can specify a reason for accepting or the user performing the
task. This text is available on the request properties page, in the Request history panel.
5. Click on OK to complete the operation. The report opens and indicates the operation success.
1027
Managing Incoming Requests
Rejecting Requests
The request managers and administrators can at any point reject New and Handled requests.
To reject a request
1. In the sidebar, go to Workflow > Incoming requests. The page Incoming requests
opens.
2. Tick the request(s) you want to reject.
3. In the menu, select Edit > Reject. The wizard Status edition opens.
4. In the field Enter a note, you can specify a reason for accepting or the user performing the
task. This text is available on the request properties page Request history module.
5. Click on OK to complete the operation. The report opens and indicates the operation success.
6. Click on CLOSE to go back to the page Incoming requests.
Finishing Requests
Once the request has been dealt with, when the object has been added, edited or deleted, the
request managers and administrators can set the requests to Finished.
To finish a request
1. In the sidebar, go to Workflow > Incoming requests. The page Incoming requests
opens.
2. Tick the request(s) you want to finish.
3. In the menu, select Edit > Finish. The wizard Status edition opens.
4. In the field Enter a note, you can specify a reason for accepting or the user performing the
task. This text is available on the request properties page Request history module.
5. Click on OK to complete the operation. The report opens and indicates the operation success.
6. Click on CLOSE to go back to the page Incoming requests.
Archiving Requests
Archiving a request actually means moving it to the Local Files Listing. This means that it is no
longer listed on the Incoming requests and Outgoing request pages.
Archiving a request is useful for requests that have been dealt with, have been canceled or that
were rejected. In any of these cases, once the requesting user has been informed, it is probably
useless to keep the request in the list.
The request managers and administrators can archive Canceled, Rejected and Finished requests.
To archive a request
1. In the sidebar, go to Workflow > Incoming requests. The page Incoming requests
opens.
1028
Managing Incoming Requests
Once you customized these entries, the restrictions detailed in the section Administrating Requests
Using the Default Statuses and Options might not apply anymore. However, requests managers
and administrators may still rely on the procedures detailed in said section to administer the re-
quests from the page Incoming requests.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1029
Chapter 79. Executing Requests
There are different ways of executing requests:
1. Use the Execute option from the page Incoming requests if you are using the Workflow default
classes. For more details regarding this option, refer to the section Executing Requests Using
the Execute Option.
2. Use classes to integrate the requests to the addition, edition or deletion wizard. This method
can be used if you use the default Workflow classes or if you use customized ones. For more
details, refer to the section Executing Requests Using Classes.
3. Go to the IPAM or DNS module and add, edit or delete the requested objects and change the
status to Finished once the request was executed.
1030
Executing Requests
3. At the end of the line of the request for edition you want to execute, click on Execute. The
wizard opens.
4. Depending on the classes configured you might have class dedicated pages. Select a class
or none and click on NEXT .
5. On the object edition page, the object name and details are in a gray field as a reminder.
6. If need be, you can fill in the optional object details fields and configure default parameters.
Click on NEXT . The Workflow dedicated page opens.
7. In the drop-down list Request, the request you are executing is selected by default. The list
can contain other request numbers if other requests for edition of a similar resource were
added.
8. Under this field, the fields Requested <object> name and Requestor motivation contain
the request original details as a reminder.
9. The requests for IP address edition have an extra page: the page Aliases configuration. You
can add aliases if need be. Then click on NEXT to display the last page of the wizard.
10. Click on OK to complete the operation. The report opens and closes. The request status is
now Finished, the object is now edited.
Once the request is executed, the requestor receives a notification email. The administrator or
request manager can archive the request. For more details, refer to the section Archiving Requests.
On the request properties pages, in the panel Attached objects, are listed all the object configur-
ation details if the request concerned an addition or an edition. For instance, if a specific class
or default parameters were set by the administrator or request manager.
1031
Executing Requests
If you do not already use a class for which you would like to add the Pre-defined variable, add a
class. Otherwise, directly follow the procedure To add a Workflow request association pre-defined
variable.
1032
PNG
Executing Requests
original
9. Click on to save the class configuration. If you exit without saving, your changes are
lost.
10. Click on to close Class Editor.
Once the class is configured, you can apply it from the DNS and/or IPAM module to automate
the addition or edition of objects.
Once the request is executed, the requestor receives a notification email. The administrator or
request manager can archive the request. For more details, refer to the section Archiving Requests.
1033
Chapter 80. Customizing the Requests
Administration
Depending on your needs, you can entirely customize the menu Edit of the page Incoming requests
as well as the restrictions associated with the status edition. As detailed in the section Adminis-
trating Requests Using the Default Statuses and Options, you cannot set all the statuses to the
requests as you please. As you can see in the image below.
New
Handle
Request
Accept execution
Reject Cancel
Finish
Archive
These default edition restrictions are all set in the registry database. The default configuration of
the Workflow in the registry database is the following:
1034
Customizing the Requests
Administration
You can edit default statuses, remove default statuses from the GUI and add new statuses.
Whatever the customization you have in mind, we recommend that you take into consideration
the section Customized Statuses Best Practices.
Whether you decide to edit an existing status or hide it from the GUI, to make sure the request
cycle is complete, we recommend that you follow, the sections Status Edition Best Practices and
Status Deletion Best Practices.
The Workflow configuration entries are all named module.workflow.state<detail>. There are
seven entries dedicated to the default statuses.
1. module.workflow.state.accept .
2. module.workflow.state.archive .
3. module.workflow.state.cancel .
4. module.workflow.state.finish .
5. module.workflow.state.handle .
6. module.workflow.state.new .
7. module.workflow.state.reject .
1035
Customizing the Requests
Administration
Each entry is important as it sets the permissions and restrictions related to the status. The status
key value is a string in which the order matters. They must be separated by a coma as follows:
<page>, <icon>, <visibility>, <callback>, <attribute_1, attribute_2, ..., attribute_n> .
In this example, the Accept status is displayed (t) on the page Incoming requests (incoming) and
is preceded by the green icon. Any user with sufficient rights can accept New requests (new-
target) and only the request manager who Handled or Rejected the request can accept it (accept-
operator, reject-operator).
Each element of the string has a set of acceptable values that define the request status logic and
organization that suits your needs:
Page
incoming specifies that the status is available on the page Incoming requests.
outgoing specifies that the status is available on the page Outgoing requests.
Icon
wf-accept allows to display the icon 3 , before the status name.
wf-archive does not display any icon as archiving means removing the request from the list.
wf-cancel allows to display the icon 5, before the status name.
wf-finish allows to display the icon 6, before the status name.
wf-handle allows to display the icon , before the status name.
wf-new allows to display the icon 1 , before the status name.
wf-reject allows to display the icon 4 , before the status name.
Visibility
t stands for true and indicates that the status is available in the menu Edit of the specified
<page>.
1036
Customizing the Requests
Administration
f stands for false and indicates that the status is not displayed in the menu Edit of the specified
<page>.
Callback parameters
This parameter is obsolete. You can find in the keys the values: callback, nocallback,
archive_callback and cancel_callback. Do not edit them, they are part of the string.
Attributes
This last part of the string sets which user can set the status described in the string. This
permission depends on who set the previous status: the user who set the status listed can
now set the status described in the string.
The permissions structure follows the format: <action>-<user> in which action can be: accept,
archive, cancel, finish, handle, new and reject, each one corresponds to the default
statuses.
The users are:
• admin that is to any user in the group admin, including ipmadmin.
• operator the user that deals with the request.The other users belonging to the same group
cannot perform the actions associated with operator: only the user who performed the action
detailed in the status entry Value is the operator.
• source the user who added the request, i.e. the requestor.
• target any user with sufficient Workflow permissions, including ipmadmin. In other words,
any user that can see the request in the list.
Therefore, only the users specified in the field Value of the status entry can set the status
described and only if the previously set one of the statuses associated with their <user>
name.
The default configuration sends an email to the requestors whenever the status request they
added is edited. This is why, by default, it contains new,handle,accept,reject,finish .
The requestors only receive an email if their User profile was set properly. For more details, refer
to the chapter Managing Users in the section Adding Users or Editing Users.
1037
Customizing the Requests
Administration
g. Click on OK to complete the operation.The report opens and closes.The page refreshes
and the new value is displayed.
2. Register your changes:
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section Expert, click on Register new macros & rules. The wizard Register all
the latest macros and rules opens.
c. Click on OK to complete the operation. The report opens and works for a while. A noti-
fication pop-up appears in the lower right corner of the GUI when the operation is over.
Once the entry is added and registered, the new status is visible in the menu Edit of the selected
page as followed: rq_<your-status-name>. Once you attributed the status to a request, the request
Status is rq_in_<your-status-name>. You can translate both using the page Language editor.
1038
Customizing the Requests
Administration
1
This example is only valid if you still use the default statuses cycle.
1039
Customizing the Requests
Administration
1040
Part XIII. Device Manager
Device Manager provides an overview of all the equipment on your network. Relying on both manual and
automatic management options, it helps to piece together the data registered in the modules NetChange,
IPAM, DHCP and DNS to map out the device interactions and their connections through interfaces and
ports. It allows to organize devices and their content.
NetChange DHCP
Device Manager
Figure 237. The information Device Manager retrieves from NetChange and the DHCP
Note that all the data saved in Device Manager is never deleted, unless you decide to delete it. Therefore
you can save a lot of information regarding users or pieces of equipment through their MAC address or IP
address without impacting the other modules.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
81. Managing Devices ................................................................................................. 1043
Browsing Devices ................................................................................................ 1043
Adding Devices ................................................................................................... 1044
Editing Devices ................................................................................................... 1049
Duplicating Devices ............................................................................................. 1049
Merging Devices ................................................................................................. 1050
Adding Devices from the IPAM ............................................................................. 1050
Exporting Devices ............................................................................................... 1050
Deleting Devices ................................................................................................. 1050
82. Managing Ports and Interfaces ............................................................................... 1052
Browsing Ports and Interfaces .............................................................................. 1052
Adding Ports and Interfaces ................................................................................. 1053
Editing Ports and Interfaces Properties ................................................................. 1060
Tracking Changes on the Page All ports & interfaces ............................................. 1064
Updating Ports and Interfaces from the IPAM ........................................................ 1065
Exporting Ports and Interfaces ............................................................................. 1065
Deleting Ports and Interfaces ............................................................................... 1065
83. Managing the Interaction with the IPAM ................................................................... 1066
Assigning IP Addresses to an Interface Using their MAC Address ........................... 1066
Managing the IP Addresses / Interfaces Link from the IPAM ................................... 1068
84. Rules Impacting Device Manager ............................................................................ 1071
DHCP Rules Impacting Device Manager ............................................................... 1071
Adding Device Manager Rules ............................................................................. 1071
Enabling or Disabling Device Manager Rules ........................................................ 1072
1042
Chapter 81. Managing Devices
The devices are managed from the page All devices, where any device on the network can be
managed (network devices, computers, virtual machines...) and uniquely identified based on the
ports or interfaces it manages.
You can add them manually or automatically retrieve them. Devices can contain interfaces and/or
ports, depending on the discovered MAC and IP addresses.
You can merge devices, duplicate them, edit their content or delete them. You cannot rename
them.
Browsing Devices
Within the module Device Manager, the devices are the highest level of the hierarchy. It is required
to add devices to manage ports and interfaces.
INTERFACE
DEVICE
PORT
Keep in mind that a set of columns provides an overview of the devices interfaces and ports
content:
• Interfaces usage and Ports usage: the total portion, in percent of used interfaces/ports on a
device, along with a progression bar,
• Number of Interfaces and Number of Ports: the total number of interfaces/ports on the device,
• Free Interfaces and Free Ports: the number of available interfaces/ports on the device.
Note that the data listed in the column IP Address can be sorted but not filtered. It only retrieves
and displays the IP address of all the interfaces of the device.
1043
Managing Devices
The option Manage allows to manage or unmanage the device of your choice, whether you added
it yourself or it was Imported from another module.
Keep in mind that you cannot unmanage a device associated with an IP address of the IPAM.
To manage/unmanage devices
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. Tick the device(s) of your choice.
3. In the menu, select Edit > Manage > Yes or No. The wizard opens.
4. Click on OK to complete the operation. The report opens and closes. The device is marked
Unmanaged or Managed in the column Status.
Adding Devices
You can add devices manually or automatically from several modules.
Before adding any device, we recommend Configuring Device Manager to make sure the data
listed is consistent with the equipment configuration of your network.
Once added, you can decide which devices you want to display and deal with on the page All
devices. For more details, refer to the section Managing the Devices Visibility.
Keep in mind that Device Manager does not delete on its own the entries that you might delete
in other modules. In that way, it provides an overview of former devices. To delete devices and
their content refer to the section Deleting Devices.
Note that you can also import devices on the page All devices. From then on, you can add or
import the ports and interfaces it contains and organize your network as you please. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
We recommend configuring Device Manager before managing any device, port and interface
because it compares the information of the other modules with what is listed in Device Manager.
On the page All ports & interfaces of each device, the columns Manually linked to and Automat-
ically linked to identify how the devices are linked together. If the column Manually linked to is
empty, configuring Device Manager overwrites its content with the information collected during
the automatic addition. This ensures that the data listed reflects the interaction between the
devices on your network.
This option has to be ticked once. Afterward, a data check is performed each time a port or inter-
face is added or edited.
1044
Managing Devices
Once you retrieved data automatically, you should monitor the column Reconciliation on the
page All ports & interfaces to prevent any drift. For more details, refer to the section Tracking
Changes on the Page All ports & interfaces.
Note that you can also import devices on the page All devices. From then on, you can add or
import the ports and interfaces it contains and organize your network as you please. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
The option Automatic discovery performs a sweep of the other modules data and retrieves all
the devices along with the ports and interfaces they contain. The option analyzes data in the
modules NetChange, DHCP, IPAM and DNS. The more information there is in these modules,
the more efficient is the option as it behaves as follows:
1. It retrieves NetChange data: network devices, ports and discovered items. The MAC ad-
dresses linked to the ports that have the interconnection set to No become interfaces in Device
Manager. The discovered items DNS name is retrieved as well, the IP address is only retrieved
if it is part of the IPAM. NetChange network devices can be managed as several devices in
Device Manager depending on their content.
Note that if several ports in NetChange are linked to one MAC address, the option retrieves
all the ports and the MAC address but randomly links it to one of the ports.
2. It retrieves the names of the devices, ports and interfaces if the information is available in
the modules NetChange, IPAM, DHCP or DNS:
a. In NetChange, on the page All discovered items, the option retrieves all the MAC addresses,
DNS names and IP addresses, only if they are part of the IPAM database.
If the MAC addresses retrieved have a DNS name, the option stops here.
If the MAC addresses do not have a DNS name, the option looks for it in the IPAM.
b. In the IPAM, on the page All addresses, the option tries to match the collected MAC ad-
dresses with a name, using the available IPv4 and IPv6 addresses.
If a name is found for the MAC addresses, the option stops here.
If no name is found, the option looks for it in the DHCP.
c. In the DHCP, on the page All statics, the option tries to match the collected MAC addresses
with a name, using the available IPv4 statics and statics without IP.
If a name is found for the MAC addresses, the option stops here.
1045
Managing Devices
1
# is a number used to differentiate all these devices.
1046
Managing Devices
Keep in mind that the automatic discovery retrieves data but does not automatically update
it, if you delete data or make changes in NetChange, you must make the same changes in Device
Manager.
If the automatic discovery added more devices that your need, you can merge devices to reor-
ganize the data as you need. For more details, refer to the section Merging Devices.
If the option creates more devices that your need, you can merge devices to reorganize the data
as you need. For more details, refer to the section Merging Devices.
2
# differentiates interfaces within one device.
3
# differentiates interfaces within one device.
1047
Managing Devices
If the option creates more devices that your need, you can merge devices to reorganize the data
as you need. For more details, refer to the section Merging Devices.
If the option creates more devices that your need, you can merge devices to reorganize the data
as you need. For more details, refer to the section Merging Devices.
Note that you can also import devices on the page All devices. From then on, you can add or
import the ports and interfaces it contains and organize your network as you please. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
1048
Managing Devices
Note that, from the device addition wizard, you can also add the ports and/or interfaces it manages.
For more details, refer to the section Manually Adding Ports and Interfaces.
Editing Devices
You can edit devices from their properties page or from the contextual menu on the page All
devices.
To edit a device
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. Right-click over the Name of the device you want to edit. The contextual menu opens.
3. Click on . The wizard Edit a device opens.
4. If custom classes are enabled at device level, in the list Device class select a class or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. Edit the Device name and/or Description according to your needs.
6. Click on OK to complete the operation. The report opens and closes. The changes are visible
on the page.
Duplicating Devices
You can duplicate the content and class parameters of a device. Duplicating devices can be used
to anticipate provisioning.
If you know that you will add a new network device to NetChange and an existing device in Device
Manager has configuration similar, you should duplicate the device to import more easily the
network device to the page All devices. In this case you should:
1. Duplicate your device and name it like the NetChange network device to come, as detailed in
the procedure below.
2. Edit the device content to make sure it matches the network device to come, starting with its
MAC address but also the number of ports and/or interfaces it manages, the links between
the devices, etc. For more details, refer to the sections Adding Ports and Interfaces, Editing
Ports and Interfaces Properties and Deleting Ports and Interfaces.
To duplicate a device
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
1049
Managing Devices
2. Tick the device you want to duplicate. You can only duplicate one device at a time.
3. In the menu, select Edit > Duplicate. The wizard Duplicate device opens.
4. In the field Device name, specify the name of the new device.
5. Click on OK to complete the operation. The report opens and closes. The device is listed. It
contains the same ports and/or interfaces. However, the link from ports to device has to be
set manually and interfaces MAC addresses are automatically generated.
Merging Devices
You can merge devices to manage the ports and interfaces they contain from a unique device.
Merging devices can be useful if you want to correct what was automatically found on the network.
For instance, if after automatically retrieving information from NetChange, a port and an interface
end up in two different devices even if they both belong to one laptop, you can merge these
devices to manage them from a single device.
To merge devices
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. Tick the devices you want to merge.
3. In the menu, select Edit > Merge. The wizard Merge device opens.
4. In the drop-down list Name, select the device that should include all the ports and interfaces.
The other device(s) are emptied and deleted.
5. Click on OK to complete the operation. The report opens and closes. The device is listed,
the other devices are no longer listed.
For more details, refer to the chapter Managing Advanced Properties in the section IP Address
Advanced Properties.
Exporting Devices
From the page All devices, you can export the data listed in a CSV, HTML, XML, XLS or PDF
file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting Devices
You can delete a device, this also deletes the ports and interfaces it contains. This action is non-
reversible.
To delete a device
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
1050
Managing Devices
1051
Chapter 82. Managing Ports and
Interfaces
From the page All ports & interfaces, you can manage the ports and the interfaces that belong
to your devices.
You can add them to a specific device or when you add a device. You can also automatically
retrieve them, along with the device they belong to, from other modules.
The ports link devices together, the interfaces are connected to the ports.
The interfaces have a MAC address and can have one or several IPv4 and/or IPv6 addresses.
Both IPv4 and IPv6 addresses are listed on the page.
Note that, to minimize any error or distortion between what is really connected to the network
and what is listed, you can track changes and reconcile data on this page. For more details, refer
to the section Tracking Changes on the Page All ports & interfaces.
INTERFACE
DEVICE
PORT
INTERFACE
DEVICE
PORT
1052
Managing Ports and Interfaces
2. Filter the column Type, type in port or interface to list the objects that suit your needs.
3. At the end of the line of the port or interface of your choice, click on . The properties page
opens.
Keep in mind that the column Addition date provides extra information regarding the devices'
content. You can use it to sort or filter the list.
The option Manage allows to manage or unmanage the port or interface of your choice, whether
you added it yourself or it was Imported from another module.
To manage/unmanage a device
1. In the sidebar, go to Device Manager > Ports & interfaces. The page All ports & inter-
faces opens.
2. Tick the port and/or interface of your choice. You can tick more than one.
3. In the menu, select Edit > Manage > Yes or No. The wizard opens.
4. Click on OK to complete the operation. The report opens and closes. The device is marked
Unmanaged or Managed in the column Status.
Before adding any port or interface, we recommend Configuring Device Manager to make sure
the data listed is consistent with the equipment configuration of your network.
Once added, you can decide which items you display and deal with on the page, as detailed in
the section Managing the Ports and Interfaces Visibility.
Keep in mind that Device Manager does not delete the entries that you might delete in other
modules on its own. In that way, it provides an overview of former port and interface interactions,
to delete ports and interfaces refer to the section Deleting Ports and Interfaces.
Note that you can also import ports and/or interfaces on the page All ports & interfaces. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
1053
Managing Ports and Interfaces
This option has to be ticked once, if you already configured Device Manager there is no need
to do it again.
On the page All ports & interfaces of each device, the columns Manually linked to and Automat-
ically linked to identify how the devices are linked together. If the column Manually linked to is
empty, configuring Device Manager overwrites its content with the information collected during
the automatic addition. This ensures that the data listed reflects the interaction between the
devices on your network.
Once you retrieved data automatically, you should monitor the column Reconciliation on the
page All ports & interfaces to prevent any drift. For more details, refer to the section Tracking
Changes on the Page All ports & interfaces.
Note that you can also import ports and/or interfaces on the page All ports & interfaces. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
Automatically Adding Ports and Interfaces from the page All Devices
After Configuring Device Manager you can use the option Automatic discovery from the page
All devices to retrieves devices, and the ports and interfaces they contain. The name of all the
objects reflect the amount of information available in the modules NetChange, IPAM, DHCP and
DNS.
This option adds devices from network devices. Some of these devices manage only ports and
others manage one or several interfaces based on the MAC addresses retrieved.
On the page All network devices, the ports can have the following names:
• Ethernet ports can be named Ethernet <slot>/<port>, FastEthernet <slot>/<port>, GigaEthernet
<slot>/<port> or TenGigaEthernet <slot>/<port>.
• Wifi ports are named wifi#, where # differentiates the ports belonging to one device.
• Virtual ports are named Virtual port <slot>/<port>.
On the page All network devices, the interfaces can have the following names:
• Interfaces linked to an ethernet port are named eth#, where # differentiates the interfaces be-
longing to one device
• Interfaces linked to a wifi port are named wifi#.
• Interfaces linked to a virtual port are named vm_interface_#.
1054
Managing Ports and Interfaces
• Interfaces from which few information - except the MAC address - was retrieved are named
generic_#.
For more details regarding what data is retrieved and how it is named, refer to the section Auto-
matically Adding Devices from the Page All Devices.
To automatically add ports and interfaces from the page All devices
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. In the menu, select Tools > Automatic Discovery. The wizard Automatic discovery
opens.
3. Click on OK to complete the operation. The report opens and closes.
4. In the bread crumb, click on All ports & interfaces. The page opens.
5. In the column Status, the ports and interfaces are marked Imported.
Once the automatic discovery retrieved ports and interfaces, you can rename or edit them if need
be. For more details, refer to the section Editing Ports and Interfaces Properties. You should also
monitor the column Reconciliation as detailed in the section Tracking Changes on the Page All
ports & interfaces.
Keep in mind that the option retrieves data but does not automatically update it, if you delete data
or make changes in NetChange, you must make the same changes in Device Manager.
No ports are added as the interfaces are created using the MAC address of the selected IP ad-
dresses.
1055
Managing Ports and Interfaces
Once you added data, you should monitor the column Reconciliation on the page All ports &
interfaces to prevent any drift. For more details, refer to the section Tracking Changes on the
Page All ports & interfaces.
Note that you can also import ports and/or interfaces on the page All ports & interfaces. For more
details, refer to the section Importing Data to Device Manager in the chapter Importing Data from
a CSV File.
To manually add a device and its ports from the page All devices
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. In the menu, click on Add. The wizard Add a device opens.
3. If custom classes are enabled at device level, in the list Device class select a class or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. In the field Device, name your device.
5. Tick the box Add port(s)/interface(s). The ports and interfaces configuration fields appear
6. In the drop-down list Type, select Port. The port related fields appear.
7. Specify the number of ports and their name:
8. You can specify a device and port or interface to link the port you are adding with another
device.
1056
Managing Ports and Interfaces
Field Description
Link with port/interface The name of the port or interface you want to link the port with. The auto-com-
pletion retrieves a list of available ports and interfaces matching this name that
you can choose from.
9. Click on ADD . The port is listed as such: port: <number of ports> <port name> in the Inter-
faces/Ports list. If you want to add more ports to the device. Repeat these actions for as
many ports as needed.
10. In the list Interfaces/Ports, you can reorder the entries by selecting them one by one and
click on the arrows to move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
11. Click on OK to complete the operation. The report opens and closes. The device is listed.
On the pages All devices and All ports & interfaces, in the column Status, the device and
the port(s) are marked Managed.
To manually add a port from the page All Ports & Interfaces
1. In the sidebar, go to Device Manager > Ports & interfaces. The page All ports & inter-
faces opens.
2. In the menu, click on Add. The wizard Add port/interface opens.
3. In the drop-down list Device, select one of your existing devices.
4. Click on NEXT . The next page opens.
5. If custom classes are enabled at port and interface level, in the list Port/Interface class
select a class or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. In the field Name, name the port.
7. In the drop-down list Type, select Port.
8. You can specify a device and port or interface to link the port you are adding with another
device.
9. Click on OKto complete the operation. The report opens and closes. The port is listed and
marked Managed.
1057
Managing Ports and Interfaces
Keep in mind that you can also add devices and the interfaces they contain from the IPAM. For
more details, refer to the section Adding Devices from the IPAM.
To manually add a device and its interfaces from the page All devices
1. In the sidebar, go to Device Manager > Devices. The page All devices opens.
2. In the menu, click on Add. The wizard Add a device opens.
3. If custom classes are enabled at device level, in the list Device class select a class or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. In the field Device, name your device.
5. Tick the box Add port(s)/interface(s). The ports and interfaces configuration fields appear.
6. In the drop-down list Type, select Interface.
7. In the field Name, specify the interface name.
8. You can link the interface with an IP address using the following fields.
9. In the drop-down list Space, you can select one of the existing IPAM spaces.
10. You can link the interface you are adding with another device port or interface using the fol-
lowing fields.
1058
Managing Ports and Interfaces
11. Click on ADD . In the list Interfaces/Ports, the interface is listed as such: interface: <interface
name> <MAC address> <IP Address>. Repeat these actions for as many interfaces as you
need.
12. In the list Interfaces/Ports, you can reorder the entries by selecting them one by one and
click on the arrows to move them up or down .
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the field(s)
and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
13. Click on OK to complete the operation. The report opens and closes. The device is listed.
On the pages All devices and All ports & interfaces, in the column Status, the device and
the interface(s) are marked Managed.
To manually add an interface from the page All Ports & Interfaces
1. In the sidebar, go to Device Manager > Ports & interfaces. The page All ports & inter-
faces opens.
2. In the menu, click on Add. The wizard Add port/interface opens.
3. In the drop-down list Device, select one of your existing devices.You can use your keyboard
to find the device you are looking for.
4. Click on NEXT . The next page, regarding ports and interfaces, opens.
5. If custom classes are enabled at port and interface level, in the list Port/Interface class
select a class or None.
Click on NEXT . The next page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
6. In the field Name, name the interface.
7. In the drop-down list Type, select Interface. The interface related fields appear.
8. You can link the interface with an IP address using the following fields.
9. In the drop-down list Space, you can select one of the existing IPAM spaces.
10. You can link the interface you are adding with another device port or interface using the fol-
lowing fields.
1059
Managing Ports and Interfaces
Field Description
Link with port/interface The name of the port you want to link the interface with. The auto-completion
retrieves a list of available ports and interfaces matching this name that you can
choose from.
11. Click on OK to complete the operation. The report opens and closes. The interface is listed
and marked Managed.
Editing port and interfaces is required if you duplicated existing devices. Once you duplicated
the relevant device, you must edit its content as follows:
1. Add/delete the ports and interfaces it contains as needed. For more details, refer to the sections
Adding Ports and Interfaces and Deleting Ports and Interfaces.
2. Manually link the ports/interfaces to the needed device as detailed in the sections Editing a
Port and Editing an Interface.
Keep in mind that ports retrieved from NetChange had a name before you chose to manage them
in Device Manager. Once you renamed a port, both NetChange and Device Manager names are
displayed on its properties page: the field Name displays your name, the field NetChange port
name displays the port original name.
1060
Managing Ports and Interfaces
Editing a Port
You can edit port links toward devices.
If you duplicated a device, you must edit these links. Once a device is duplicated, the newly
added device ports are not linked to any other device. In this case, you have to add the link
between the ports and the needed device port or interface. To successfully edit the port links
between devices, you must:
1. Add a new link toward the newly added device interfaces.
2. Perform an automatic discovery if both the ports and interfaces links are edited.
3. Check the data.
1061
Managing Ports and Interfaces
6. Click on OK to complete the operation.The report opens and closes.The device you selected
is visible in the panel Main properties in the Manually linked to line, the selected interface
is between brackets. If you go back to the page All ports & interfaces, you have the same
information in the column Manually linked to.
Now that the links are saved, if you already added the new device in NetChange, you can run
the automatic discovery. For more details, refer to the section Adding Network Devices.
If you also have interfaces in that device, edit their links and MAC addresses before running
the automatic discovery. For more details, refer to the section Editing an Interface.
Once your changes are done and the list of ports is up-to-date, you can compare the data added
manually and automatically.
Editing an Interface
You can edit interface links toward devices.
If you duplicated a device, you must edit the links. Once a device is duplicated, the newly added
device interfaces are not linked to any other device and their MAC address is probably incorrect.
In this case, you have to add the link between the interfaces and the needed device port or inter-
face. To successfully edit the interfaces' links between devices, you must:
1. Add a new link toward the new device interfaces.
2. Update the MAC address of the interface.
3. Perform an automatic discovery if both the ports and interfaces links are edited.
4. Check the data.
1062
Managing Ports and Interfaces
6. Click on OK to complete the operation.The report opens and closes.The device you selected
is visible in the panel Main properties in the Manually linked to line, the selected interface
is between brackets. If you go back to the page All ports & interfaces, you have the same
information in the Manually linked to column.
Once you linked the interfaces to another device interface, update its MAC address.
Now that the links are saved and the MAC addresses updated, if you already added the new
device in NetChange, you can run the automatic discovery. For more details, refer to the section
Adding Network Devices.
If you also have ports in that device, edit their links as well before running the automatic
discovery. For more details, refer to the section Editing a Port.
Once your changes are done and the list of interfaces is up-to-date, you can compare the data
added manually and automatically.
1063
Managing Ports and Interfaces
The reconciliation allows to compare the manual and/or automatic links between devices through
ports and interfaces.
! Drift The information displayed in the columns Automatically linked to and Manually linked to is not a match.
The Top List Alert on ports/interfaces reconciliation drift tracks any drift in the column. For more
details, refer to the section Gadgets Displayed by Default.
However, if you decided to enter some data manually, you can reconcile both link related columns
with the reconciliation option.That is to say, the content of the column Manually linked to overwrites
the content of the column Automatically linked to.
1064
Managing Ports and Interfaces
For more details, refer to the chapter Managing Advanced Properties in the section IP Address
Advanced Properties.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1065
Chapter 83. Managing the Interaction
with the IPAM
From Device Manager, you can manage the interaction of interfaces with IPAM IPv4 and IPv6
addresses via their MAC addresses or the option Link IP addresses to Device Manager interfaces.
From the IPAM module, a set of options allows to edit Device Manager database. You can:
• Add devices from the page All addresses when assigning an IP address.
• Associate IP addresses to existing interface or remove that link.
• Edit the link between devices from the page All addresses.
For more details, refer to the part Global Policies, in the section IP Address Advanced Properties.
This assignation links an IPAM IP address with an interface through a MAC address retrieved
by Netchange discovered items. There is no automatic detection of matching MAC addresses
within these modules, therefore you must manually assign each IP address to each interface.
Keep in mind that adding, editing or deleting a MAC address saved in Device Manager may
change or remove the IP address/interface link you configured.
1066
Managing the Interaction with the
IPAM
1067
Managing the Interaction with the
IPAM
You can use the procedure above for as many IP addresses as needed for one interface. Beyond
one IPv6 address, the addition wizard displays a report step listing the IP addresses already used
on this interface to make sure that you actually want to use an extra IP address.
The columns Device manager name and Device manager interface allow to display the inter-
actions on that page. For more details on how to add and display customized list templates, refer
to the section Managing List Templates.
Any ports and interfaces changes made from the IPAM change the content of the column
Manually linked to. For more details, refer to the section Tracking Changes on the Page All ports
& interfaces.
1068
Managing the Interaction with the
IPAM
The auto-completion provided in the device name and interface name only lists the device and
interfaces marked as Managed and Imported. The Unmanaged items are not listed.
6. Click on OK to complete the operation. The report opens and closes. The changes are visible
in the dedicated columns, on the IP address properties page and in Device Manager.
First, as detailed in the section Linking IP Addresses with Existing Interfaces, you can simply
specify a device and interface and tick the box Overwrite.
Second, if the IP address was assigned a MAC address, you can simply edit the MAC address
to link the IP address with another interface. For more details regarding IP address edition, refer
to the section Editing IP Addresses.
1069
Managing the Interaction with the
IPAM
then follow the procedure below to remove the link with the interface. For more details regarding
IP address edition, refer to the section Editing IP Addresses.
1070
Chapter 84. Rules Impacting Device
Manager
From the module Administration, you can add, enable or disable rules related to Device Manager.
Note that the rules are first organized by modules ans then event, so even if they both ultimately
impact Device Manager, you will find them under the module DHCP and the event Add: <DHCP-
object>.
Rule 221
Enabling this rule adds an interface every time you add a static, with or without an IPv4 ad-
dress. The interface has the same name as the static and belongs to a device also named
after the static. To add this rule, refer to the procedure To add a Device Manager rule and
select the Module DHCP and the Event Add: DHCP statics.
Rule 225
Enabling this rule adds an interface every time an IPv4 lease is generated. The interface is
named generic_# and belongs to a device named using the lease hostname. To add this
rule, follow the procedure To add a Device Manager rule and select the Module DHCP and
the Event Add: DHCP leases.
1071
Rules Impacting Device Manager
1072
Part XIV. VLAN Manager
VLAN Manager allows to create and handle Virtual Local Area Networks (VLANs) and Virtual Extensible
LAN (VXLAN) to set up layer 2 data exchange between networks and devices.
Keep in mind that the VLAN Manager VLANs are different from the VLAN interfaces you can set up on the
page Network configuration. For more details, refer to the section Setting up a VLAN Interface.
VLAN ID: 1
VLAN Name: Atrium
From the module VLAN Manager you can include up to 3 levels of organization:
• Domains: the highest level of the hierarchy. They contain ranges and VLANs. For more details, refer to
the chapter Managing VLAN Domains.
• Ranges: an optional second level in the hierarchy. They contain VLANs. For more details, refer to the
chapter Managing VLAN Ranges.
• VLANs: the lowest level of the hierarchy. They are unique with a VLAN Identifier (ID) and belong to a
domain or range. For more details, refer to the chapter Managing VLANs.
Once you organized your VLANs, you can connect them with IPAM subnet-type networks belonging to dif-
ferent spaces or networks and make them communicate no matter their IP address. For more details, refer
to the Global Policies chapter Managing Advanced Properties.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
85. Managing VLAN Domains ....................................................................................... 1075
Browsing VLAN Domains ..................................................................................... 1075
Adding VLAN Domains ........................................................................................ 1075
Editing VLAN Domains ........................................................................................ 1076
Automatically Adding New VLAN Domains as Group Resource .............................. 1077
Exporting VLAN Domains .................................................................................... 1078
Deleting VLAN Domains ...................................................................................... 1078
Defining a VLAN Domain as a Group Resource ..................................................... 1078
86. Managing VLAN Ranges ........................................................................................ 1079
Browsing VLAN Ranges ....................................................................................... 1079
Adding VLAN Ranges .......................................................................................... 1079
Editing VLAN Ranges .......................................................................................... 1080
Exporting VLAN Ranges ...................................................................................... 1081
Deleting VLAN Ranges ........................................................................................ 1081
Defining a VLAN Range as a Group Resource ...................................................... 1082
87. Managing VLANs ................................................................................................... 1083
Browsing VLANs ................................................................................................. 1083
Adding VLANs ..................................................................................................... 1084
Editing VLANs ..................................................................................................... 1085
Adding VLANs from the IPAM ............................................................................... 1085
Creating VLANs from NetChange ......................................................................... 1085
Exporting VLANs ................................................................................................. 1085
Deleting VLANs ................................................................................................... 1086
1074
Chapter 85. Managing VLAN Domains
VLAN domains are managed from the page All domains.They can be composed of VLAN ranges
and VLANs or exclusively of VLANs depending on your organizational needs.
A domain is defined by its name and start and end ID. These IDs corresponds to the first and
last VLAN ID that it manages, it sets the number of VLANs it can contain:
• A VLAN domain can contain between 1 and 4094 VLANs.
• A VXLAN domain can contain between 1 and 16777215 VLANs.
Every time you add a domain, you can set the same set of IDs. They are duplicated on the page
All VLANs, and even if you have several VLANs with the ID 1, they are different. Indeed, they do
not belong to the same domain or range and might be assigned different names.
RANGE
DOMAIN
VLAN
1075
Managing VLAN Domains
• You can import domains from a CSV file. For more details, refer to the section Importing VLAN
Domains in the chapter Importing Data from a CSV File.
• Once you added a domain, you cannot edit its start and end ID, or decide to make it a VXLAN
domain instead of VLAN or vice versa.
• Users that do not belong to the group admin cannot see the domains they add, unless an ad-
ministrative user either:
• Adds the new domains to the resources of the group(s) they belong to
• Configures the rule 408 to automatically add every new domain as resource of the group(s)
they belong to. For more details, refer to the section Automatically Adding New VLAN Domains
as Group Resource.
You can edit a VLAN domain from the page All domains, via the contextual menu, or from its
properties page.
1076
Managing VLAN Domains
If a domain no longer matches you needs and you want to edit its start ID, end ID, make it a
VXLAN domain or make it a VLAN domain, you must:
1. Add a new domain configured with the settings that suit your needs.
You can either add again the VLANs it contains and name them the same or export the VLANs
of the domain you want to edit and reimport them into the domain you added. For more details,
refer to the part Imports and Exports.
2. Delete the obsolete domain.
To avoid having to manually define new VLAN domain as group resource, administrators can
configure the rule 408 and automatically add every new VLAN domain as resource of the groups
of users of the relevant group(s) of users.
To add the rule 408 that sets which groups have new VLAN domains as resource
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select VLAN Manager.
5. In the drop-down list Event, Add: VLAN domains is selected.
6. In the list Rule, select (408) (POC) Add new VLAN domains as group resource.
7. In the field Rule name, name the rule. That name is then listed in the column Instance.
8. In the field Comment, you can specify a comment.
9. Click on NEXT . The page Rule filters opens.
10. Click on NEXT . The page Rule parameters opens.
1077
Managing VLAN Domains
11. In the list Available groups, select a group of users and click on . The group is moved to
the list Selected groups. You can add as many groups as you want.
12. In the list Selected groups, you can select and reorder the groups using and .
To remove a group, select it and click on . The group is moved back to the list Available
groups.
13. Click on OK to complete the operation. The report opens and closes. The rule is listed.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Note that administrative users can add a rule to ensure that every new VLAN domain is added
to the resources of the groups of users of their choice. For more details, refer to the section
Automatically Adding New VLAN Domains as Group Resource.
Granting access to a domain as a resource also grants access to every item it contains. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
1078
Chapter 86. Managing VLAN Ranges
VLAN ranges provide an extra level of management for your VLANs. They are optional.
A VLAN range can contain as many VLANs as the domain it belongs to, or just or portion of the
VLANs.
Like the domain, a range is defined by its name, its start ID and its end ID. Considering that it
belongs to a domain, it cannot manage VLANs that are not managed by the domain, in other
words you cannot add a range with the start and end IDs 5-10 in a domain managing the IDs 6-
10.
Within a domain, you can add as many ranges as you want to manage the VLANs of the domain.
Your ranges can manage the same VLAN IDs if you allow overlapping, the VLANs are different
as they belong to different ranges.
RANGE
DOMAIN
VLAN
If you want to add ranges with unique sets of VLAN ID, you can tick the box No ID overlapping.
Keep in mind that the overlap restriction applies whether it was set on existing ranges or on
1079
Managing VLAN Ranges
ranges you are trying to add. Therefore, if a range managing the VLAN IDs 1-512 already exists
and you try to add the range 512-550, an error message is returned whether the box was ticked
on the existing range or on the range you are adding.
With the overlapping allowed, if you set several ranges with common VLANs, the common VLAN
ID is replicated on the page All VLANs. You can differentiate them through their range, and po-
tentially their name.
Note that you can also import ranges from a CSV file. For more details, refer to the section Im-
porting VLAN Ranges in the chapter Importing Data from a CSV File.
You can edit a VLAN range from the page All ranges, via the contextual menu, or from its prop-
erties page.
1080
Managing VLAN Ranges
In case of overlap, you can either delete the used VLAN and add it again in the new range or
export it and reimport it in the new range.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1081
Managing VLAN Ranges
Granting access to a range as a resource also grants access to every item it contains. For more
details, refer to the section Adding Resources to a Group in the chapter Managing Groups.
1082
Chapter 87. Managing VLANs
Once you have added at least one domain, the VLANs it contains are listed on the page All
VLANs. They can belong to ranges.
All the VLANs are differentiated through their ID. You can assign them a name to set up an inter-
action with the module IPAM at network level between several subnet-type networks or devices
within a network. For this reason, once a VLAN has a name, the range and/or domain it belongs
to cannot be deleted.
Browsing VLANs
Within VLAN Manager, the VLANs are the lowest level of the hierarchy.
RANGE
DOMAIN
VLAN
For more details regarding statuses, refer to the section Understanding the VLAN Statuses.
1083
Managing VLANs
Used The VLAN was assigned a name, it can interact with the IPAM. The domain and range it belongs
to cannot be deleted.
Adding VLANs
Adding a VLAN means using it as all the VLANs were added at the same time as the domain
they belong to. When you add a VLAN, you can assign it a name.
Note that you can import VLANs from a CSV file. For more details, refer to the section Importing
VLANs or VXLANs in the chapter Importing Data from a CSV File.
You can also use existing NetChange VLANs to create VLANs in VLAN Manager. For more details,
refer to the section Creating a VLAN in VLAN Manager.
1084
Managing VLANs
7. If custom classes are enabled at VLAN level, in the list VLAN class select a class or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
8. In the field VLAN name, you can name the VLAN.
9. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the VLAN is now marked as Used. If you gave it a name, is displayed in the column
Name.
Editing VLANs
You can edit a VLAN name.
Keep in mind that renaming a VLAN breaks the IPAM / VLAN interaction.
To edit a VLAN
1. In the sidebar, go to VLAN Manager > VLANs. The page All VLANs opens.
2. Right-click over the VLAN ID of your choice. The contextual menu opens.
3. Click on Edit. The wizard opens.
4. If custom classes are enabled at VLAN level, in the list VLAN class select a class or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. In the field VLAN name, you can rename the VLAN.
6. Click on OK to complete the operation. The report opens and closes. The new VLAN name
is displayed.
For more details, refer to the chapter Managing Advanced Properties in the section Network
Advanced Properties.
Exporting VLANs
From the page All VLANs, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1085
Managing VLANs
Deleting VLANs
You can only delete Used VLANs. Before proceeding keep in mind that:
• Once deleted, the VLANs are still listed, if you are displaying the VLANs of a specific domain
or range, but are Free and no longer have a name.
• If the VLANs were associated with a subnet-type network, deleting VLANs breaks the association
and removes the VLAN information from the network properties. For more details, refer to the
chapter Network Advanced Properties.
The Free VLANs are unused so you cannot delete them. They are listed on the page All VLANs
of the domain or range they belong to. To delete unused VLANs from the list, you must delete
the range and/or domain they belong to.
To delete a VLAN
1. In the sidebar, go to VLAN Manager > VLANs. The page All VLANs opens.
2. Tick the Used VLAN(s) of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The VLAN is no longer
listed.
5. To see this VLAN, display the list of the VLANs for the domain or range it belongs to. This
VLAN no longer has a name in the column Name and its status is Free.
1086
Part XV. VRF
VRF, Virtual Routing and Forwarding, allows to simultaneously define and maintain multiple instances of a
routing table on a single router.
This technology is commonly used for implementing L3 VPN(s) provided by MPLS service providers. In
such networks MPLS encapsulation is used to isolate individual customer traffic, and an independent routing
table (VRF) is maintained for each one of them.
Following RFC 4364, each VRF has a unique Route Distinguisher (RD) identifier. In that context, MP-BGP
is commonly employed to facilitate complex redistribution schemes to import and export routes to and from
VRFs (using route targets) to provide Internet connectivity or inter-VRF communication. Technically, you
should keep in mind that:
• Each VRF behaves like an independent router with its own interfaces, IP subnet-type networks and routing
protocol.
• Each VRF has separate routing and forwarding tables used only for the packets that traffic through the
VRF based on its interface mapping.
VPN A
CE
VPN B
PE P PE CE
VPN B
CE P P
VPN A
VPN A Tunnel
PE PE CE
VPN B Tunnel
Service Provider
MPLS Network
From the module VRF, you can display and have an overview of the VRF and Route Targets that associate
them on your network on two dedicated pages. All available options are detailed in the chapters:
• Managing Virtual Routing and Forwarding.
• Managing VRF Route Targets.
Table of Contents
88. Managing Virtual Routing and Forwarding ............................................................... 1089
Browsing VRFs ................................................................................................... 1089
Adding VRFs ....................................................................................................... 1089
Editing VRFs ....................................................................................................... 1090
Exporting VRFs ................................................................................................... 1090
Deleting VRFs ..................................................................................................... 1090
89. Managing VRF Route Targets ................................................................................. 1091
Browsing VRF Route Targets ................................................................................ 1091
Adding VRF Route Targets ................................................................................... 1091
Exporting VRF Route Targets ............................................................................... 1092
Deleting VRF Route Targets ................................................................................. 1092
1088
Chapter 88. Managing Virtual Routing
and Forwarding
From the page All VRFs, you can add, import, edit and delete Virtual Routing and Forwarding
(VRF) for basic management purposes. The page inventories all VRFs using their name and
unique Route Distinguisher or RD.
You can oversee the communication configurations between your VRFs via the Route Targets.
For more details, refer to the chapter Managing VRF Route Targets.
Browsing VRFs
Within the module VRF, the VRFs are the highest level, the entry point of your inventory.
Adding VRFs
You can add as many VRFs as you need.
Note that you can also import VRFs, for more details refer to the section Importing Data to VRF
in the chapter Importing Data from a CSV File.
To add a VRF
1. In the sidebar, go to VRF > VRFs. The page All VRFs opens.
2. In the menu, click on Add. The wizard Add a VRF opens.
3. If custom classes are enabled at VRF level, in the list VRF class select a class or None.
Click on NEXT . The page Add a VRF opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
4. In the field Name, name your VRF.
1089
Managing Virtual Routing and
Forwarding
5. In the field RD, specify the Route Distinguisher of your VRF. Following RFC 4364, the three
accepted types rule the RD format:
6. In the field Comment, you can specify a comment. This field is optional.
7. Click on OK to complete the operation. The report opens and closes. The VRF is listed.
Editing VRFs
You can edit VRFs from the page All VRFs or from their properties page. Keep in mind that
editing a VRF name or RD also edits its VRF Route Target(s) in the GUI.
Exporting VRFs
From the page All VRFs, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting VRFs
You can delete one or more VRFs at once. Keep in mind that deleting a VRF also deletes its
VRF Route Targets from the GUI.
To delete a VRF
1. In the sidebar, go to VRF > VRFs. The page All VRFs opens.
2. Tick the VRF(s) of your choice.
3. In the menu, click on Delete. The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The VRF is no longer
listed, its VRF Route Targets are deleted as well.
1090
Chapter 89. Managing VRF Route Targets
From the page All VRF Route Targets, you can oversee the communication you set or want to
set on your network between the VRFs. This page simply illustrates the VRF communication
configuration, it assists in inventorying it all.
A Route Target sets up an exchange of routes between two VRFs, via their RD. They allow to
import and/or export the routes of the VRFs, one is the source VRF, the other is the target VRF.
Every VRF can be associated with one or more Route Targets.
VRF Route Targets do not have a properties page as all the information is displayed on the page.
1091
Managing VRF Route Targets
2. Add another Route Target that establishes that the Source VRF site B can export the routes
the Target VRF site A.
To properly set up the exchange of routes, an import must be confirmed by an export,
and vice versa.
Note that:
• You can also import Route Targets, for more details refer to the section Importing VRF Route
Targets in the chapter Importing Data from a CSV File.
• A Route Target may be edited if its Source or Target VRF is edited.
• You cannot edit Route Targets from the page All VRF Route Targets. You must delete the
Route Target that no longer suits your needs and add it again.
To add the Route Targets that establish the communication between two VRFs
1. In the sidebar, go to VRF > VRF Route Targets. The page All VRF Route Targets opens.
2. Add the first Route Target
a. In the menu, click on Add. The wizard Add a VRF Route Target opens.
b. In the field Source VRF name, specify the VRF of your choice.
Type in the first letters of the source VRF, the auto-completion provides the list of
matching names, select the one you want.
c. In the field Target VRF name, specify the VRF of your choice using auto-completion.
d. You can tick the box Import to let the Target VRF retrieve the routes of the Source VRF.
e. You can tick the box Export to let the Source VRF send out its routes to the Target
VRF.
f. Click on OK to complete the operation. The report opens and closes. The VRF is listed.
3. Add the second Route Target
a. In the menu, click on Add. The wizard Add a VRF Route Target opens.
b. In the field Source VRF name, specify the Target VRF of the first Route Target.
c. In the field Target VRF name,specify the Source VRF of the first Route Target.
d. If you ticked the box Export in the first Route Target, tick the box Import to confirm the
communication configuration.
e. If you ticked the box Import in the first Route Target, tick the box Export to confirm the
communication configuration.
f. Click on OK to complete the operation. The report opens and closes. The VRF is listed.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Note that Route Targets can be deleted from the page when one of the VRFs they link is deleted.
1092
Managing VRF Route Targets
1093
Part XVI. SPX
The Service Provider eXtension (SPX) assists Local Internet Registry (LIR) declarations as it allows to
manage the complete life cycle of the IP address networks allocated to you by a Regional Internet Registry
(RIR) member. From SOLIDserver GUI, SPX helps you manage networks that were allocated to you by the
RIPE (Réseaux IP Européens) or the APNIC (Asia-Pacific Network Information Center).
The module SPX comes in addition to the IPAM and is available through a dedicated license option. To
make sure you do have this license option, the administrator can go to the page Admin Home and, in the
section System, click on License. When the page opens, in the panel Current license, all the license options
are listed: SPX must be listed.
1095
Chapter 90. Configuring SPX
No matter what RIR you depend on, there is only one wizard to configure SOLIDserver.
Once SPX is properly set and matches your allocated network(s), you can add and edit the ag-
gregated and assigned networks they contain, the allocated networks are managed by the RIR
itself. Whenever you add or edit aggregated and assigned networks from the GUI, your RIR is
notified via POST.
1096
Configuring SPX
• You have all your RIPE or APNIC network details: maintainer, organization, registry identifier,
administrator contact (admin-c) and user contact (person).
• Your SPX classes and rules are enabled. They apply to IPv4 and IPv6 allocated networks,
IPv4 and IPv6 assigned networks, autnums and finally users. For more details, refer to the
sections Enabling the SPX Classes and Enabling the SPX Rules.
Field Description
RIR The Regional Internet Registry, either RIPE or APNIC.
Comment A comment regarding the organization.
Maintainer Your RIPE or APNIC maintainer full name. This information is contained in the
field mntner and reused in the field mnt-by of your assigned networks.
Password Your RIPE or APNIC password. It is used to authenticate the database updates.
Source The selected RIR to configure your official database or TEST to configure your
test database.
NCC REGID Your registry identifier. It was provided to you by your RIR, if not, you should
contact them to obtain it.
From (email) The email address used as source address in the emails sent to your RIR.
Notify (email) The email address of the person notified of any change made in the RIPE or
APNIC database.
Changed (email) The email address displayed in the field changed of the description of your as-
signed network in the RIPE or APNIC database. It can be a generic address or
the address of a person.
AW validation (email) The email of the person notified if you exceed the number of IP addresses of
your Assigned Window. This person must be granted sufficient rights to perform
the appropriate operations if your new assigned networks exceed the allocated
range of addresses.
AW size The number of IP addresses you are allocated in the RIPE or APNIC Assigned
Window.
Expert mode Tick this box if you want to set up a proxy server to communicate changes to
your RIR. Once ticked, the following fields appear.
Whois RIR host The full name of the proxy server.
Whois port The number of the Whois RIR host port used to
transmit information. Port 80 is generally used.
RIR Update host The name of the server of your RIR receiving the up-
dates
RIR update URL The URL of the RIPE or APNIC server receiving your
updates.
1097
Configuring SPX
1
All the classes name can be preceded by a / if they belong to a specific directory, following the format: <directory-name>/<class-
name>. In this case, the default class RIPE_Block belongs to the directory SPX.
1098
Configuring SPX
a. In the drop-down list User class, select one of your classes or the default class
SPX/RIPE_person.
The selected class is moved to the field New user class.
b. Click on ADD to confirm its selection. The class is moved to the List of SPX users.
c. Repeat these steps for as many classes as needed.
12. Click on OK to complete the operation. The report opens and closes, the page refreshes.
You can edit these settings or add new maintainers. For more details, refer to the section Editing
the Connection to the RIPE or APNIC.
Keep in mind that you should not edit the maintainer name, registry identifier or AW size if
you already imported your allocated networks.
1099
Configuring SPX
10. Click on NEXT . The page SPX users classes configuration opens.
11. Click on OK to complete the operation. The report opens and closes, the page refreshes.
1100
Chapter 91. Managing SPX Persons
Before managing SPX networks, you need to add or import RIPE and APNIC persons.
Within the GUI, SPX persons are managed from the page Users of the module Administration.
Like other users, you need to add SPX persons to groups and grant them rights and resources.
For more details, refer to the part Rights Management.
Users of the group admin can include these columns to the Displayed list template of the page.
To add them to a new list template instead, refer to the section Adding List Templates.
Note that most of these parameters are only available if you properly enabled the classes
of the Directory SPX. For more details, refer to the chapter Enabling the SPX Classes.
6. Click on SAVE . The page refreshes.
7. You can filter the column Class with RIPE to only display SPX users, or any Class param:
column according to your needs.
1101
Managing SPX Persons
To make sure the person addition was confirmed, you can display the column Waiting. For more
details, refer to the section Browsing the SPX Persons.
Every time you edit a person, you have to wait for the RIPE or APNIC confirmation. To make
sure the person edition was confirmed, you can display the column Waiting. For more details,
refer to the section Browsing the SPX Persons.
1102
Managing SPX Persons
A dedicated option allows to resend the person information to the RIPE or APNIC.
Every time you delete a person, you have to wait for the RIPE or APNIC confirmation. To make
sure the assigned network edition was confirmed, you can display the column Waiting. For more
details, refer to the section Browsing the SPX Persons.
Before deleting a person, make sure that the assigned networks they were managing are
already managed by someone else. You need to edit the relevant assigned networks Contacts
details before deleting the person. For more details, refer to the section Editing SPX Networks.
1103
Managing SPX Persons
1104
Chapter 92. Managing SPX Networks
Once you imported allocated networks, you can add, edit or delete the aggregated and assigned
networks they contain.
Within the GUI, SPX networks are managed from the IPAM page All networks. All imported alloc-
ated networks are displayed as block-type networks, the aggregated and assigned networks
you add are displayed as subnet-type networks.
SPX aggregated and assigned networks addition is assisted by dedicated classes that
administrators should enable in Class Studio, all these classes belong to the Directory SPX. For
more details, refer to the chapter Configuring SPX.
More generally, SPX networks can be managed the same way as regular networks, For more
details, refer to the chapters Managing Networks, Managing Pools and Managing IP Addresses.
Users of the group admin can include these columns to the Displayed list template of the page.
To add them to a new list template instead, refer to the section Adding List Templates.
Note that the column Status indicates if the addition requests to the RIPE or APNIC are confirmed
or denied.
1
For more details, refer to http://www.ripe.net/lir-services/member-support/info/faqs/isp-related-questions/pa-pi.
1105
Managing SPX Networks
Note that most of these parameters are only available if you properly enabled the classes
of the Directory SPX. For more details, refer to the chapter Enabling the SPX Classes.
6. Click on SAVE . The page refreshes.
7. You can filter the column Class with RIPE to only display SPX networks, or any Class
param: column according to your needs.
1106
Managing SPX Networks
In IPv6, you can add aggregated and assigned networks, as detailed in the section Adding
SPX IPv6 Networks.
Once added, you have to wait for the RIPE or APNIC confirmation. To make sure the network
addition was confirmed, you can display the column Waiting state. For more details, refer to the
section Browsing SPX Networks.
Note that you can also import assigned networks. For more details, refer to the section Importing
SPX Assigned Networks in the chapter Importing Data from a CSV File.
1107
Managing SPX Networks
i. In the drop-down list Country, you can select the country where the organization is
located.
11. Click on NEXT . The next page opens and allows you to set up a notify mail:
a. In the field Notify mail, you can specify the email address of the person notified of any
change made on the assigned network you are adding.
b. Click on ADD . The address is moved to the list Notify.
c. In the field Remarks, you can specify a comment regarding the assigned network.
12. Click on NEXT . The page Contacts opens.
a. Specify the assigned network technical contacts (tech-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Technical contacts.
b. Specify the assigned network administrative contacts (admin-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Administrative contacts.
13. Click on OK to complete the operation. The report opens and closes. The assigned network
is listed, its state is Creating. Its status is not OK, until the RIPE or APNIC has confirmed
the addition. The column Waiting details the states.
If the assigned network status stays in wait_mail_add, refer to the section Registering SPX
Network Changes.
If the assigned network status stays in wait_aw_confirm, refer to the section Validating a
New Assignment Window.
1108
Managing SPX Networks
• Assigned networks are set with the status ASSIGNED. Within allocated networks, they are the
lowest level in the networks hierarchy.
• They cannot have a prefix greater than /64, the RIPE database does not support greater
prefixes.
• They are terminal networks, they cannot contain other networks.
• They can belong to an aggregated network or a local IPAM network not sent to the RIPE. If
they belong to an aggregated network, their prefix must match the assignment size of their
parent network.
• As your IPAM organization can include RIPE networks and local networks, a set of warning
messages are returned in the GUI if your changes do not respect the expected configuration
of aggregated and assigned networks in the RIPE database. You can ignore these messages
and force network additions, in this case the changes are applied locally but the RIPE may not
take them into account.
Once added, you have to wait for the RIPE or APNIC confirmation. To make sure the network
addition was confirmed, you can display the column Waiting state. For more details, refer to the
section Browsing SPX Networks.
Note that you can also import assigned networks. For more details, refer to the section Importing
SPX Assigned Networks in the chapter Importing Data from a CSV File.
1109
Managing SPX Networks
f. In the drop-down list Country, you can select the country where the organization is
located.
g. In the drop-down list RIPE status, select AGGREGATED-BY-LIR. The field Assignment
size appears.
h. In the field Assignment size, specify the prefix of the assignment size. It must be
greater than the network prefix. By default, it is set to 64.
12. Click on NEXT . The next page opens and allows you to set up a notify mail:
a. In the field Notify mail, you can specify the email address of the person notified of any
change made on the IPv6 assigned network you are adding.
b. Click on . The address is moved to the list Notify.
c. In the field Remarks, you can specify a comment regarding the assigned network.
13. Click on NEXT . The page Contacts opens.
a. Specify the assigned network technical contacts (tech-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Technical contacts.
b. Specify the assigned network administrative contacts (admin-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Administrative contacts.
14. Click on OK to complete the operation. The report opens and closes. The assigned network
is listed, its state is Creating. Its status is not OK, until the RIPE or APNIC has confirmed
the addition. The column Waiting details the states.
1110
Managing SPX Networks
c. In the drop-down list Number of pools, you can select a value between 1 and 5, de-
pending on the number of pools you want to add in the assigned network. Once you
selected a value, you need to set the Size and Type of each pool.
d. In the drop-down list Advanced properties, Default is selected, so only the fields/options
included in the wizard default display are visible.
Depending on your rights, you may be able to display All available fields and set partic-
ular behaviors for the assigned network. For more details, refer to the IPAM section of
the chapter Managing Advanced Properties.
e. At the bottom of the wizard, in the field IPv6 assigned network, the inet6num start
address and prefix are displayed.
f. In the field Name, name the assigned network (inet6num). It must contain letters, digits,
an underscore and an hyphen. The first character must be a letter, the last character
must be a letter or a digit. The field automatically displays capital letters. The name is
also displayed in the field Network name.
g. In the field Description, specify a description for the network.
h. In the drop-down list Country, you can select the country where the organization is
located.
i. In the drop-down list RIPE status, select ASSIGNED.
12. Click on NEXT . The next page opens and allows you to set up a notify mail:
a. In the field Notify mail, you can specify the email address of the person notified of any
change made on the IPv6 assigned network you are adding.
b. Click on . The address is moved to the list Notify.
c. In the field Remarks, you can specify a comment regarding the assigned network.
13. Click on NEXT . The page Contacts opens.
a. Specify the assigned network technical contacts (tech-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Technical contacts.
b. Specify the assigned network administrative contacts (admin-c):
1. In the field Nic handle / Person, specify the user's Nic handle or name (as displayed
in the RIPE or APNIC person field).
2. Click on SEARCH to retrieve their details.
3. Click on ADD . The contact is moved to the field Administrative contacts.
14. Click on OK to complete the operation. The report opens and closes. The assigned network
is listed, its state is Creating. Its status is not OK, until the RIPE or APNIC has confirmed
the addition. The column Waiting details the states.
If the IPv6 assigned network status stays in wait_mail_add, refer to the section Registering
SPX Network Changes.
1111
Managing SPX Networks
To edit the content of your aggregated or assigned networks, refer to the chapters Managing
Pools and Managing IP Addresses.
Once you edited an aggregated or assigned network via the GUI, you have to wait for the RIPE
or APNIC confirmation.To make sure the assigned network edition was confirmed, you can display
the column Waiting state. For more details, refer to the section Browsing SPX Networks.
1112
Managing SPX Networks
11. Edit the list of notification email addresses and Remarks field according to your needs:
a. Add a new email address if need be. In the field Notify mail, specify the new email ad-
dress. Click on to move the address in the list Notify. In the field Remarks, you can
specify a comment regarding the assigned network to fill the RIPE or APNIC field re-
marks.
b. Remove an address from the list Notify. Select the address you want to delete and click
on . The address is no longer listed.
c. In the field Remarks, you can edit the comment regarding the assigned network.
12. Click on NEXT . The page Contacts opens.
13. You can edit the lists Technical contacts and Administrative contacts of assigned network:
find new persons in the field Nic handle / Person and ADD them. Or select a person in the
list and DELETE it.
14. Click on OK to complete the operation. The report opens and closes. The changes are listed
in the panel.
15. Go to the page All networks to see the assigned network state and make sure it was con-
firmed by the RIPE or APNIC. Its status is not OK, until the RIPE or APNIC has confirmed
the edition. The column Waiting details the states.
If the assigned network status stays in wait_mail_add, refer to the section Registering SPX
Network Changes.
In IPv4, if the assigned network status stays in wait_aw_confirm, refer to the section Validating
a New Assignment Window.
You can also send any change made on SPX persons to the RIPE or APNIC. For more details,
refer to the section Registering SPX Person Changes.
1113
Managing SPX Networks
If the Assignment Window is exceeded, you can either delete the network or purposely continue
exceeding the Assignment Window.
By exceeding, we mean:
• Configuring an assigned network which start and/or end address exceeds the range of IP ad-
dresses available in the allocated network.
• Allocating an assigned network to a user even if this allocation exceeds the total number of IP
addresses you are allowed to allocate. This sum takes into account the total number of IP ad-
dresses in your Assignment Window over the last 12 months.
For more details, refer to the prerogatives of section 7.0 Assignment Window in the document
RIPE-599, available at http://www.ripe.net/ripe/docs/ripe-599#Assignment-Window.
If you exceed the Assignment Window, keep in mind that you need to:
1. Follow the appropriate RIPE or APNIC procedure to be able to extend your Assignment Window.
2. Once your request is approved by the RIPE or APNIC, you can use the option Validate AW.
If your request is denied, you should delete the assigned network. For more details, refer to the
section Deleting SPX Allocated Networks.
1114
Managing SPX Networks
1115
Chapter 93. Managing SPX AS Numbers
From the module SPX, you can manage RIPE or APNIC registration details.You can add or import
Autonomous System (AS) Numbers, or aut-nums, on the page AS numbers and display the
routing policies they contain on the page All policies.
Each AS number contains routing policies that detail what can be implemented and enforced
locally. Indeed, each policy is obtained by enumerating all the neighboring AS numbers with
which routing information is exchanged. The policies returned detail exactly what is being sent
(announced) and allowed (accepted).
Note that:
• AS numbers are necessary to implement BGP Anycast routing in the module DNS. For more
details, refer to the section Setting up Anycast Using BGP.
• AS numbers can also be displayed, when used in a Route Distinguisher, on the page All routes
of the module NetChange. For more details, refer to the chapter Managing Routes.
Users of the group admin can include these columns to the Displayed list template of the page.
To add them to a new list template instead, refer to the section Adding List Templates.
Note that the column Status indicates if the addition requests to the RIPE or APNIC are confirmed
or denied.
Note that most of these parameters are only available if you properly enabled the classes
of the Directory SPX. For more details, refer to the chapter Enabling the SPX Classes.
1116
Managing SPX AS Numbers
7. Click on OK to complete the operation. The report opens and closes. The user is listed, its
state is Creating. Until its status is not OK, the RIPE or APNIC has not confirmed the
addition. Have a look in the column Waiting state for more details regarding the addition
confirmation.
1117
Managing SPX AS Numbers
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1118
Managing SPX AS Numbers
If you want to delete the policies of an AS Number refer to the section Editing SPX AS Numbers.
1119
Part XVII. Identity Manager
The module Identity Manager allows to retrieve Windows Active Directory (AD) authentication events.
Within the module, you can add your AD domains as directories. All the users of the domain are retrieved
using the related LDAP repository. In addition, SOLIDserver retrieves all Windows Event Logs, via Windows
Event Forwarding, to allow you to monitor the authentication events of each user within each domain.
Once events are retrieved, you can monitor the activity of all users as identities. These identities can have
one or more sessions that individually identify the connection events of a user and an IP address.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Table of Contents
94. Configuring Identity Manager .................................................................................. 1122
Prerequisites ....................................................................................................... 1122
Limitations .......................................................................................................... 1122
Preparing the Module .......................................................................................... 1122
Configuring the Directory Synchronization Frequency ............................................ 1126
95. Managing Directories ............................................................................................. 1127
Browsing Directories ............................................................................................ 1127
Adding Directories ............................................................................................... 1128
Synchronizing Directories .................................................................................... 1129
Editing Directories ............................................................................................... 1129
Deleting Directories ............................................................................................. 1130
96. Managing Identities ................................................................................................ 1131
Browsing Identities .............................................................................................. 1131
97. Managing Sessions ................................................................................................ 1133
Browsing Sessions .............................................................................................. 1133
Finding Active Sessions in the IPAM ..................................................................... 1134
Purging Inactive Sessions .................................................................................... 1135
1121
Chapter 94. Configuring Identity Manager
To configure the module Identity Manager and use it to the fullest you must:
1. Meet the prerequisites.
2. Take into account the limitations.
3. Follow the section Preparing the Module to properly configure SOLIDserver and your AD domain
controller(s).
To go further, you can even configure the data synchronization frequency, before adding direct-
ories. For more details, refer to the section Configuring the Directory Synchronization Frequency.
Prerequisites
• A SOLIDserver appliance in version 7.3 or higher.
• An AD domain with a Group Policy (GPO).
• A user with administrative rights over the domain.
• An SSL certificate and its related CA ready, in PEM format, both are required on your appliance
and AD domain controller. Keep in mind that you must use a unique CA:
• If you are configuring the module on several appliances, you need one SSL certificate per
appliance. All certificates must rely on the same CA.
• If you are configuring the module for an AD domain managed from several AD domain con-
trollers, all controllers must rely on the same CA.
Limitations
• Imports and exports are not available in the module.
When both configurations are set, SOLIDserver can communicate with your AD domain control-
ler(s) and retrieve the data you monitor from the module Identity Manager.
1. Configuring SOLIDserver
To properly prepare Identity Manager on your appliance you must:
1. Allow traffic on the port 5986, it is dedicated to communicating with AD domain controllers.
2. Configure the service Windows Events Collector. You must configure it with the SSL cer-
tificate and its related CA. This CA must also be used on the AD domain controller(s) managing
the AD domain you intend to monitor from the appliance.
If you are configuring Identity Manager on appliances configured in High Availability, you must
follow the procedure on both the Master appliance and Hot Standby appliance.
To configure SOLIDserver
Only users of the group admin can perform this operation.
1122
Configuring Identity Manager
1. Make sure your appliance network flows allow traffic on the port 5986. For more details, refer
to the section Identity Manager of the appendix Matrices of Network Flows.
2. Make sure the firewall rule of the port 5986 allows traffic.
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section System, click on Firewall rules. The page Firewall rules opens.
c. In the column Destination port, type in 5986 and hit Enter. The rule is the only one
listed.
d. Make sure its Action is set to allow and its Protocol is tcp4 / tcp6.
If not, you must edit the rule, as detailed in the section Editing a Firewall Rule of the
chapter Configuring the Network.
3. Import both certificates.
a. Locate the SSL certificate and CA certificate you want to use. Both must be in PEM
format.
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section Authentication & Security, click on Certificates and keys. The page
All certificates opens.
d. In the menu, select Import > Certificate. The wizard Import an SSL object opens.
e. In the field Name, name the certificate.
f. In the drop-down list Type, select Certificate.
g. In the field Certificate, paste in the certificate, in PEM format.
h. In the field Private key, paste in its private key.
i. Click on OK to complete the operation. The report opens and closes. The certificate is
listed, its private key is available on the certificate properties page.
j. Once you imported one certificate, repeat the steps b to j for the other one.
4. When both certificates are imported, configure the service Windows Events Collector.
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section System, click on Services configuration. The page Services configur-
ation opens.
c. Under the menu, in the drop-down list SOLIDserver, make sure the local appliance is
selected.
d. In the column Name, click on Windows Events Collector. The wizard Change the
current SSL certificate opens.
e. In the drop-down list SSL Certificate, select the SSL certificate you imported.You must
use the same SSL certificate within SOLIDserver and your AD domain controller(s). By
default, None is selected.
f. In the drop-down list Certificate Authority, select the CA certificate you imported. You
must use the same CA certificate within SOLIDserver and your AD domain controller(s).
By default, None is selected.
g. Click on OK to complete the operation. The wizard works for a while and closes. The
name of the SSL certificate and CA certificate you selected are listed.
5. If you are configuring Identity Manager on appliances configured in High Availability, repeat
the steps 1 to 4 on the Hot Standby appliance.
1123
Configuring Identity Manager
If you intend to retrieve data from several AD domain controllers, you must perform these config-
urations on each domain controller.
2. From your Microsoft Management Console (MMC), import the client authentication certi-
ficate.
If you used OpenSSL to generate it:
a. In the Certificates snap-in of the Local Computer, click on More actions > All Tasks >
Import...â and import the file client.pfx. The file must contain the public and private in-
formation of the SSL certificate for the domain controller and the public information of
the CA. The same CA was imported in SOLIDserver.
b. Enter the private key password, if relevant.
c. Make sure the box Include all extended properties is ticked.
3. From Windows HTTP Services Certificate Configuration Tool (WinHttpCertCfg.exe)
configure the NetworkService account.
a. Grant the NetworkService account the proper permissions to access the client certificate.
b. Make sure that the NetworkService account has access to the private key file of the
client authentication certificate using following command:
winhttpcertcfg -g -c LOCAL_MACHINE\my -s <certificate subject name> -a
NetworkService
4. From the Group Policy MMC snap-in (gpedit.msc), configure the source host security policy
to enable event forwarding.
a. Go to Computer Configuration > Administrative Templates > Windows Components >
Event Forwarding.
b. Right-click over the SubscriptionManager setting and select Properties.
c. Enable the SubscriptionManager setting, and click on Show to add a server address.
d. Specify the SOLIDserver appliance that collects your events following the format:
Server=HTTPS://<FQDN of the SDS>:5986/wsman/,Refresh=<Refresh interval in
seconds>,IssuerCA=<certificate authority certificate thumbprint>.
1124
Configuring Identity Manager
Note that you can copy the IssuerCA fingerprint from your MMC. In the Certificates
snap-in of the Local Computer, you can find the Issuing CA certificate, in the Thumbprint
of the tab Details.
e. Make sure the SubscriptionManager configuration is applied using the following com-
mand:
gpupdate /force
Once the event forwarding is configured on all relevant AD domain controllers, you must configure
the log generation. This configuration applies to all related AD domain controllers.
Policy Value
Audit Credential Validation Success
Audit Kerberos Authentication Service Success
Audit Kerberos Service Ticket Operations Success
Audit Other Account Logon Events Success
4. Go to Computer Configuration > Windows Settings > Security Settings > Advanced Audit
Policy Configuration > System Audit Policies > Logon/Logoff and configure the following:
Policy Value
Account Logon Success
Account Logoff Success
Once your AD domain controller(s) configuration is complete, SOLIDserver can retrieve AD domain
data.
If you want to configure the synchronization frequency of the AD domains you add, refer to the
next section.
1125
Configuring Identity Manager
By default, each directory is synchronized every minute to retrieve all its identities, based on its
credentials and endpoint.
As you can manually synchronize directories, you may want to edit the rule 410 and change the
synchronization frequency.
To edit the rule 410 that sets the directory synchronization frequency
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule #, type in 410 and hit Enter. The rule is the only one listed.
4. At the end of the line, click on . The rule properties page opens.
5. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
6. In the field Rule name, you can rename the rule. The name is listed in the column Instance.
7. In the field Comment, you can insert, edit or delete the rule comment.
8. Click on NEXT . The page Rule filters opens.
9. Edit the rule frequency according to your needs.
10. Click on OK to complete the operation. The report opens and closes.
1126
Chapter 95. Managing Directories
Directories are the AD domains that you monitor from SOLIDserver. Each directory contains
identities, AD users, and sessions automatically synchronized.
From the page All directories, you can add, edit, synchronize, monitor and delete directories.
Note that any user granted the relevant rights over the directories can display all directories as
well as the identities and sessions they contain. Within Identity Manager, no object can be set
as a group resource.
Browsing Directories
The directory is the highest level of Identity Manager hierarchy.
SESSION
DIRECTORY IDENTITY
SESSION
All the columns on the page can be sorted and filtered. By default, the page displays the directory
Name and Type.
You can also display the columns Synchronization status, Windows Event Collector Status
and Metas to import. Both status columns are detailed in the next section.
1127
Managing Directories
Timeout The endpoint configured for the directory is unreachable, or the AD domain controller is
taking too long.
Invalid credentials The login and password configured for the directory are invalid.
N/A No information is available.
The column Event Collector Status returns information regarding the domain controller that
sends information to each directory.
Table 95.2. The event collector statuses on the page All directories
Status Description
OK The domain controller event collection and forwarding is operational.
! Warning No information was received from the domain controller in the last 5 minutes.
Error No information was received from the domain controller in the last hour.
N/A No information was received, either the domain is misconfigured or no certificate was
a
found .
a
To ensure your certificates are properly configured, refer to the chapter Configuring Identity Manager.
Adding Directories
You can add AD domains as directories to monitor user activity. Note that:
• Before adding a directory, you must configure Identity Manager. During this configuration you
must configure one or more AD domain controllers, if several AD domain controllers manage
your AD domain. For more details, refer to the chapter Configuring Identity Manager.
• All directories are automatically synchronized to retrieve user identities and sessions. By default,
all information is retrieved every minute, you can edit this frequency. For more details, refer to
the section Configuring the Directory Synchronization Frequency.
• All directories can be configured with metadata that allow to import the specific user settings
of your domain or repository, like their contact details, company details, country... and
propagate them to the identities.
To add a directory
1. In the sidebar, go to Identity Manager > Directories. The page All directories opens.
2. In the menu, click on Add. The wizard Add a directory opens.
3. If custom classes are enabled at directory level, in the field Directory class select a class
or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
1128
Managing Directories
4. In the field Name, specify the name of the AD domain of your choice.
5. In the field Session TTL, specify in seconds the maximum lifetime of your AD users ticket.
It sets the maximum length of the sessions.
6. In the field Endpoint, specify the URL of the AD domain controller used to synchronize the
identities of the directory. It must follow the format ldap://<IP-or-name-of-the-server> or
ldaps://<IP-or-name-of-the-server>.
7. In the field Login, specify the login of a user with sufficient rights.
8. In the field Password, specify the corresponding password.
9. In the list Available metadata, select one by one the AD user account details you want to
import for the directory. They are considered metadata entries and can be displayed as a
column on the page All identities.
The available user details are the following: City, Company, Country, Country (abbr.), Creation
date, Description, Email, Fax, First name, Home phone, IP Phone, Job department, Job title,
Last name, Mobile phone, Office, Postal box, State/Province, Street, Telephone and Zip
code.
10. Click on . The entry is moved to the list Metadata to import. To remove an entry from the
list, select it and click on , it is moved back to the list Available metadata.
11. Click on OK . The report opens and closes. The new directory is listed.
Make sure that its Synchronization status and Event collector Status are OK. If any
other status is returned, it may be that either the directory or the module is misconfigured.
For more details, refer to the section Understanding the Statuses on the Page All Directories.
Once a directory is added, its identities and sessions are automatically retrieved.
Synchronizing Directories
All directories are automatically and regularly synchronized.
If you edited the metadata of a directory you can manually synchronize it, rather than wait for the
automated synchronization to ensure that its information is up-to-date.
To synchronize a directory
1. In the sidebar, go to Identity Manager > Directories. The page All directories opens.
2. Tick the directory of your choice, you can tick several.
3. In the menu, click on Edit > Synchronize. The wizard Synchronization opens.
4. Click on OK to complete the operation. The report opens and closes. The directory is listed,
its information is up-to-date.
Note that administrators can edit the default synchronization settings. For more details, refer to
the section Configuring the Directory Synchronization Frequency in the chapter Configuring
Identity Manager.
Editing Directories
You can edit directories from the page All directories or from their properties page. Note that:
• You cannot edit the name of a directory.
• If you add or remove Metadata to import, the changes are not taken into account until the dir-
ectory is synchronized. For more details, refer to the section Synchronizing Directories.
1129
Managing Directories
To edit a directory
1. In the sidebar, go to Identity Manager > Directories. The page All directories opens.
2. Right-click over the Name of the directory of your choice. The contextual opens.
3. Click on Edit. The wizard Edit a directory opens.
4. If custom classes are enabled at directory level, in the field Directory class select a class
or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
5. The Name is displayed in a read-only gray field. You cannot edit it.
6. Edit the Session TTL, Endpoint, Login, Password and/or Metadata to import of the dir-
ectory according to your needs. For more details on the fields, refer to the procedure in the
section Adding Directories.
7. Click on OK to complete the operation. The report opens and closes. The directory is listed,
its properties are updated.
Deleting Directories
You can delete your directories to stop monitoring an AD domain.
To delete a directory
1. In the sidebar, go to Identity Manager > Directories. The page All directories opens.
2. Tick the directory of your choice, you can tick several.
3. In the menu, click on . The wizard Delete opens.
4. Click on OK to complete the operation. The report opens and closes. The directory is no
longer listed.
1130
Chapter 96. Managing Identities
Identities are the users of each directory. They are automatically retrieved from the AD domain
thanks to the LDAP repository.
All identities are displayed in read-only on the page All identities, where you can monitor them:
• All identities are named after the login used for the connection to the AD domain.
• Each identity inherit the metadata of its directory, you can display them in dedicated columns.
Until the directory is synchronized, some metadata may be missing.
By default, all identities are retrieved every minute, you can edit this frequency. For more details,
refer to the section Configuring the Directory Synchronization Frequency.
• Identities can contain one or more sessions, each session indicates a user connection.
• If the page is missing identities or is empty, it may be that there is a problem at directory level
or that the module was not properly configured. For more details, refer to section Configuring
the Directory Synchronization Frequency in the chapter Managing directories or to the chapter
Configuring Identity Manager.
Note that any user granted the relevant rights over the directories can display all identities.
Within Identity Manager, no object can be set as a group resource.
Browsing Identities
The identity is the second level of Identity Manager hierarchy.
SESSION
DIRECTORY IDENTITY
SESSION
1131
Managing Identities
By default, a set of columns are displayed on the page.You can also display the metadata inherited
from the directory in dedicated columns. All the columns can be sorted and filtered.
Disabled The user account is disabled, they cannot connect, no session is available.
N/A The identity was retrieved, but the AD domain controller has not sent status inform-
ation yet.
1132
Chapter 97. Managing Sessions
Sessions are unique user connections to an AD domain. They are automatically retrieved from
your identities and directories.
All user sessions are displayed in read-only on the page All sessions, where you can monitor
and purge them:
• All sessions are displayed on dedicated lines, they can rely on IPv4 or IPv6.
• A session details a user connection activity and indicates when a user was last seen.
• All active sessions combine an identity, an IP address and a start. The user is currently
connected.
• All inactive sessions combine an identity, an IP address, a start and an end.The user session
ended, they may have started a new session.
• Each session duration is set at directory level. The Session TTL set on each directory defines
when the session becomes inactive.
• One identity can have several sessions if there are active and inactive sessions for one IP
address; or if the sessions have a different IP address.
• If the page is missing sessions or is empty, it may be that there is a problem at directory level
or that the module was not properly configured. For more details, refer to section Understanding
the Statuses on the Page All Directories in the chapter Managing directories or to the chapter
Configuring Identity Manager.
Note that any user granted the relevant rights over the directories can display all sessions.
Within Identity Manager, no object can be set as a group resource.
Browsing Sessions
The session is the lowest level of Identity Manager hierarchy.
SESSION
DIRECTORY IDENTITY
SESSION
1133
Managing Sessions
3. To display the sessions of a specific identity, in the column Identity, click on the name of
your choice. The page refreshes.
All session information is displayed on the page, sessions do not have a properties page.
All the columns on the page are displayed by default, they can be sorted and filtered.
From the pages All networks and All addresses, a report allows to find active sessions and their
identity across all directories. You can download the results in TXT, HTML or EXCEL format.
To find sessions at network level, refer to the section Finding Identity Manager Sessions at Network
Level in the chapter Managing Networks.
To find sessions at IP address level, refer to the section Finding Identity Manager Sessions at
IP Address Level in the chapter Managing IP Addresses.
1134
Managing Sessions
To edit the rule 411 that sets the sessions purge mechanism
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the column Rule #, type in 411 and hit Enter. The rule is the only one listed.
4. At the end of the line, click on . The rule properties page opens.
5. In the panel Main properties, click on EDIT . The wizard Edit a rule opens.
6. In the field Rule name, you can rename the rule. The name is listed in the column Instance.
7. In the field Comment, you can insert, edit or delete the rule comment.
8. Click on NEXT . The page Rule filters opens.
9. Edit the rule frequency according to your needs.
These filters define when the rule executes the checks to purge the sessions, if the thresholds
you set on the next page are met.
1135
Part XVIII. Rights Management
Configuring access rights to operations and resources is essential to properly manage an appliance. Rights
management relies on users, group of users and authentication rules.
Users belong to groups, they can access any module if their group has sufficient resources and rights. For
that reason, configuring user access requires to:
1. Add or import users.
2. Add a group of users.
3. Configure that group with users. At group level, the users are considered a resource.
4. Configure that group with rights. From the page Rights of each group you can grant or deny access to
operations in all modules to the users of the group.
5. Configure that group with resources. From the page Resources of each group, you can add existing objects
as resource. The resources define the list of objects on which users can perform operations. If a group
does not have resources, its users are granted rights that they cannot use on any object.
Rights
display: space
add: network
edit: network
delete: network display: space
...
display: network
IPAM
edit: pool
add: address
Group A Resources
...
IPAM
Group B
display: server
display: scope
edit: range
delete: range
...
DHCP
Group C
Figure 249. The rights and resources of a user depend on the group they belong to
From the module Administration, the hierarchy of Rights Management can include up to 3 levels:
• Groups: the highest level of the hierarchy.The groups contain Rights and Resources, the users and objects.
For more details, refer to the chapter Managing Groups.
• Authentication Rules: an optional second level. The rules define if external Microsoft Active Directory,
RADIUS, LDAP and OpenID users can access SOLIDserver.These rules allow to retrieve user credentials
stored in the corresponding remote directory and to secure remote authentications. The authenticated
users are granted the rights defined by the group they belong to. For more details, refer to the chapter
Managing Authentication Rules.
• Users: the lowest level of the hierarchy. You can manage local and external users on one page. Once
added, you can set them as resource of a group to manage their access rights and restrictions. For more
details, refer to the chapter Managing Users.
Note that the superuser, ipmadmin, is the only user available at first, and belongs to the most privileged
group, admin. They are granted all rights and have access to all existing objects.
Table of Contents
98. Managing Groups .................................................................................................. 1138
Browsing Groups of Users ................................................................................... 1138
Adding Groups of Users ....................................................................................... 1139
Managing the Rights of a Group of Users .............................................................. 1140
Managing the Resources of a Group of Users ....................................................... 1141
Managing the Users of a Group of Users .............................................................. 1145
Editing Groups of Users ....................................................................................... 1146
Enabling or Disabling Groups of Users .................................................................. 1147
Exporting Groups of Users ................................................................................... 1147
Deleting Groups of Users ..................................................................................... 1147
99. Managing Users .................................................................................................... 1148
Browsing Users ................................................................................................... 1148
Adding Users ...................................................................................................... 1149
Editing Users ...................................................................................................... 1150
Changing the User Password ............................................................................... 1151
Configuring the User Password Complexity ........................................................... 1151
Configuring Users Connection Parameters ............................................................ 1152
Configuring User Sessions ................................................................................... 1153
Enabling or Disabling Users ................................................................................. 1154
Generating User Reports ..................................................................................... 1155
Exporting Users .................................................................................................. 1155
Deleting Users .................................................................................................... 1155
100. Managing Authentication Rules ............................................................................. 1156
Browsing Authentication Rules ............................................................................. 1157
Adding Authentication Rules ................................................................................ 1157
Editing Authentication Rules ................................................................................. 1167
Enabling or Disabling Authentication Rules ........................................................... 1167
Deleting Authentication Rules .............................................................................. 1168
1137
Chapter 98. Managing Groups
The groups of users allow to delegate administrative rights to the users they manage. Groups
define user profiles and levels of management. You can add as many groups as you want.
The rights and resources of a group determine what operations its users can perform and on
which resources. Any operation denied to the group is off limits to its users, any resource not
listed among its resources is not available on the managing page even if the group has access
the page itself.
Once users belong to a group configured with rights and resources, their user profile is set.
The groups can manage remote users authenticated via Microsoft Active Directory (AD), RADIUS,
LDAP and OpenID Connect. For more details regarding users secure authentication, refer to the
chapter Managing Authentication Rules.
AUTHENTICATION
GROUP OF USER
USERS
RESOURCE
RIGHT
By default, the group admin is listed on the page Groups. This group manages ipmadmin, the
superuser, and is granted access to all rights and resources by default.You cannot deny it access
to rights or resources. Any user added to this group has full administrative rights, like ipmadmin.
1138
Managing Groups
Note that you can also import groups of users from a CSV file. For more details, refer to the
section Importing Groups of Users in the chapter Importing Data from a CSV File.
If you intend to add authentication rules, we strongly suggest configuring group of users
before enabling them. Once the authentication rules are enabled, the corresponding users can
access the web interface and are added to the page Users; as they do not belong any group,
they cannot access any module or perform any operation. For more details on Active Directory,
LDAP, RADIUS and OpenID authentication, refer to the chapter Managing Authentication Rules.
To add a group
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Authentication & Security, click on Groups. The page opens.
3. In the menu, click on Add. The wizard Add a group opens.
4. In the list Parent group, select the parent group of your choice or None. The selected parent
group can add users to the group you are adding.
5. Click on NEXT . The next page opens.
6. If classes are enabled, in the list Group class, select a class or None.
Click on NEXT . The last page opens.
If no custom class is enabled, the class dedicated page is automatically skipped. Note that
applying a class on an object can impact the configuration fields available and/or required.
7. In the field Group name, name the group. If you intent to authenticate users via AD, name
the group after an existing AD group.
8. In the field Description, you can specify a description.
9. In the drop-down list Copy rights from group, you can select any group, except admin, or
None. The rights of the selected group are granted or denied to the group you are adding,
their rights configuration is exactly the same. You can edit the Rights of the new group later
on.
10. Click on OK to complete the operation. The report opens and closes. The group is listed.
1139
Managing Groups
AUTHENTICATION
GROUP OF USER
USERS
RESOURCE
RIGHT
The name of each right includes a verb detailing the operation. The most used verbs are the
following:
Table 98.2. The most common operations in the name of the rights
Verb Description
Add The service allows to add and edit an object.
Delete The service allows to delete an object.
Display The service allows to display the complete list of objects on its management page.
1140
Managing Groups
Verb Description
Edit The service allows to perform specific edition operations on an object.
List The service allows to delegate administrative rights from one administrator to the other, usually
group management related rights.
There are more operations available: Configure, Convert, Copy/Move, Display, Migrate, Split...
The other rights, to add, edit, delete... objects must be granted specifically in each module panel
of the properties page. For instance, if you grant a group the right to edit networks but did not
assign them any network, the users of the group have access to the page All networks and to
the menu Edit but cannot see the list of existing networks. Hence the need to grant right AND
assign resources.
AUTHENTICATION
GROUP OF USER
USERS
RESOURCE
RIGHT
1141
Managing Groups
3. Click on the Name of the group of your choice. The page Resources opens.
Following each module internal hierarchy, once an object is set as a resource the whole path in
the internal hierarchy of the module is available for display. In the same way, the objects set as
resource provide read-only access to lower levels.
DNS SERVER
ns1.mycorp.com
IPAM resources
• Spaces as resource provide read-only access to the IPv4 and IPv6 block-type networks,
IPv4 and IPv6 subnet-type networks, IPv4 and IPv6 pools and IPv4 and IPv6 addresses
they contain.
• IPv4 block-type network as resource provide read-only access to the subnet-type net-
works, pools and IP addresses they contain.
• IPv6 block-type network as resource provide read-only access to the subnet-type net-
works, pools and IP addresses they contain.
• IPv4 subnet-type network as resource provide read-only access to the pools and IP ad-
dresses they contain.
• IPv6 subnet-type network as resource provide read-only access to the pools and IP ad-
dresses they contain.
• IPv4 pool as resource provide read-only access to the IP addresses they contain.
• IPv6 pool as resource provide read-only access to the IP addresses they contain.
DHCP resources
• Servers as resource provide read-only access to the shared networks, scopes, ranges,
statics, groups, failover channels, option configurations, option definitions and ACLs they
contain.
• Servers (v6) as resource provide read-only access to the shared networks, scopes, ranges,
statics, groups, failover channels, option configurations and option definitions they contain.
• Scopes as resource provide read-only access to the ranges, statics and option configura-
tions they contain as well as to the shared networks of the server they belong to.
• Scopes (v6) as resource provide read-only access to the ranges, statics and option con-
figurations they contain as well as to the shared networks of the server they belong to.
1142
Managing Groups
DNS resources
• Servers as resource provide read-only access to the options (all) - including forwarding,
access control, notify... -, views, zones, resource records, keys, access control lists and
RPZ rules they contain.
• Views as resource provide read-only access to the options (all) - including forwarding,
access control, notify... -, zones, resource records, keys, access control lists and RPZ
rules they contain.
• Zones as resource provide read-only access to the zone options, resource records, access
control lists and RPZ rules they contain.
• RPZ zones as resource provide read-only access to the resource records, access control
lists and RPZ rules they contain.
Applications resources
• Applications, pools and nodes cannot be assigned as resources. All users have read-only
access to these objects.
• DNS servers as resource provide read-only access to the traffic policy deployments for
applications associated with the selected servers.
Guardian resources
• Policies and triggers cannot be assigned as resources. All users have read-only access
to these objects.
• DNS servers as resource provide read-only access to deployments of policies they are
associated with.
NetChange resources
• Network devices as resource provide read-only access to the ports, VLANs and discovered
items they contain.
VLAN Manager resources
• VLAN domains as resource provide read-only access to the VLAN ranges and VLANs
they contain.
• VLAN ranges as resource provide read-only access to the VLANs they contain.
Identity Manager resources
• Directories, identities and sessions cannot be set as resource. However, once a group is
granted the right to list directories, its users can see all the added directories as well as
the identities and sessions they contain.
Administration resources
• Classes as resource provide read-only access to the class objects (Class Editor) they
contain.
1143
Managing Groups
• Users of the group admin have access to all resources by default. There is not need to assign
it resources.
• The objects that can be set as resource provide access to their container and the objects they
contain in read-only. You cannot perform operations on objects at higher or lower level if they
are not part of your resources, you only have a clear overview of the objects organization
around the objects that are part of your resources.
You can add objects as resource of a group from the page Resources, the listing page All <object>
or the properties page of an object.
1144
Managing Groups
To remove an object from the Resources of a group, in the list Selected group(s), select a
group and click on , or double-click on it. The group is moved back to the list Available
group(s).
4. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the panel is updated.
For instance, take a group with the space Local and the network local-terminal-network as re-
sources. If you remove the space Local from the resources of a group, its users can no longer
perform operations on this space, but they can still access its content because the network local-
terminal-network is still part of their resource.
Keep in mind that by default only users from the group admin, or users with the appropriate rights,
can remove resources from a group.
Note that you can also remove resources from any listing page, or from the properties pages of
an object.
For more details regarding user addition, refer to the chapter Managing Users.
1145
Managing Groups
4. In the menu, click on Add > Users. The wizard Rights & delegation: Users opens.
5. Tick the user(s) of your choice.
6. Click on OK to complete the operation. The wizard closes and the page refreshes. The user
is listed among the resources of the group.
If you want to edit the users, rights or resources of a group, refer to the sections Managing the
Users of a Group of Users, Managing the Rights of a Group of Users and Managing the Resources
of a Group of Users.
1146
Managing Groups
Keep in mind that if you disable a group, the users it contains can still connect to SOLID-
server but do not have access to any module or resource.
To enable/disable a group
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the sidebar, go to Users, Groups & Rights > Groups. The page Groups opens.
3. Tick the group(s) of your choice.
4. In the menu, select Edit > Status > Enable or Disable. The corresponding wizard opens.
5. Click on OK to complete the operation. The report opens and closes. The group(s) is marked
OK or Disabled in the column Status.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Keep in mind that if you delete a group, the users it contains can still connect to SOLIDserver
but do not have access to any module or resource.
To delete a group
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the sidebar, go to Users, Groups & Rights > Groups. The page Groups opens.
3. Tick the group(s) you want to delete.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The group is no longer
listed.
1147
Chapter 99. Managing Users
Depending on the group they belong to, users can have administrative or standard access to the
appliance. You can add as many users as you want.
By default, user authentication is performed using the local database. However you can have:
Local users
To use local authentication, you must configure a group and manually add this local user into
the group. Once added to a group, a user is considered as a resource of the group. For more
details, refer to the section Managing the Users of a Group of Users in the chapter Managing
Groups.
Remote users
To use remote user authentication via Microsoft Active Directory (AD), RADIUS, LDAP or
OpenID Connect, you must configure the relevant rule. For more details, refer to the chapter
Managing Authentication Rules.
Once the rule is configured, remote users are automatically added the first time they are
authenticated and granted access to the interface. Until they belong to a group, they cannot
access any module or resource or perform any operation. Therefore, you must either add
them as resource of a group after their first connection to the appliance, or add the remote
users to the page Users and set them as resource of the relevant group before their first
connection.
To ensure access to the appliance if your remote directory is unreachable, you must have
at least one local user in the group admin.
Keep in mind that if you manage local and remote users, every remote and local user must have
a unique login. If a remote user and a local user share the same login, it is no longer possible to
authenticate the remote user.
If you want to manage RIPE or APNIC persons, refer to the part SPX.
Note that any connected user can set their display settings and change their password, as detailed
in the section Account Configuration.
Browsing Users
In the rights management hierarchy, users constitute the lowest level, along with resources and
rights, the services. Users must belong to one or several groups to set profiles.
AUTHENTICATION
GROUP OF USER
USERS
RESOURCE
RIGHT
By default, the superuser ipmadmin is the only user listed on the page. It belongs to the admin
group and has all the rights and every manageable object among its resources.
1148
Managing Users
Adding Users
You can add as many users as you want on the page Users. Once listed on the page, users are
part of local database.
If you locally add users of Microsoft Active Directory (AD), RADIUS, LDAP or OpenID Connect,
make sure that their login is unique. Once you manage local and remote users, if a remote user
and a local user share the same login, it is no longer possible to authenticate the remote user.
Note that you can also import users from a CSV file. For more details, refer to the section Importing
Users in the chapter Importing Data from a CSV File.
1
If the user is of Unix type and the password is not printable, the system password is used.
1149
Managing Users
Connected users can edit their session time and date or listing page display, interface language
or password. For more details, refer to the section Account Configuration.
Editing Users
Administrators and users granted the sufficient rights can edit a user details or group.
Note that users must belong to a group, otherwise they can connect to SOLIDserver but their
session cannot access any module or resource, and they cannot perform any operation.
Note that you can edit the details of the superuser, ipmadmin.
1150
Managing Users
Note that:
• Changing a user password takes effect immediately. This change overwrites their current
password and can log them out, they may no longer be able to log in.
• If you want to set a specific password complexity, refer to the section Configuring the User
Password Complexity.
From the registry database, you can add a dedicated key and set its value using the regular ex-
pression, regex, that suits your needs. For instance:
1151
Managing Users
# The following regex requires in the password at least: one uppercase character, one
lowercase
# character, one digit and one punctuation mark.
.*(?=.{8,})(?=.*[a-z])(?=.*[A-Z])(?=.*[0-9])(?=.*[^0-9a-zA-Z]).*
Once you added the registry key, you must change the passwords that do not match the regular
expression you set.
To edit the registry key to set the maximum number of failed connection attempts
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with ipmserver.login.bad_login_retry_before_freeze.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value set for the key. The wizard Registry database Edit
a value opens.
6. In the field Name, the key name is displayed in read-only.
7. In the field Value, specify the maximum number of failed connection attempts, from a same
IP address, after which these attempts are locked out.
8. Click on OK to complete the operation. The report opens and closes. The new value is dis-
played.
1152
Managing Users
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with ipmserver.login.bad_login_test_window.
4. Hit Enter. Only this key is listed.
5. In the column Value, click on the value set for the key. The wizard Registry database Edit
a value opens.
6. In the field Name, the key name is displayed in read-only.
7. In the field Value, specify the authentication period during which the maximum number of
failed connection attempts is allowed.
8. Click on OK to complete the operation. The report opens and closes. The new value is dis-
played.
1153
Managing Users
To enable/disable a user
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Authentication & Security, click on Users. The page opens.
3. Tick the user(s) of your choice.
4. In the menu, select Edit > Status > Enable or Disable. The corresponding wizard opens.
5. Click on OK to complete the operation. The report opens and closes. The user(s) is marked
OK or Disabled in the column Status.
1154
Managing Users
For more details regarding the reports and their generation, refer to the section Managing Reports.
Exporting Users
From the page Users, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting Users
Deleting local users prevents them from connecting to SOLIDserver and removes them from the
page Users.
Keep in mind that deleting users connecting remotely, like AD users, does not prevent them from
connecting. Once the rule is enabled, users are added locally upon connection and placed in an
existing group of users if their name matches the name of the group they belong to in the Active
Directory.
1155
Chapter 100. Managing Authentication
Rules
Authentication rules allow to securely log in external users to the GUI. These rules set up access
for users whose credentials are stored on remote Microsoft Active Directory, LDAP, RADIUS
servers and/or OpenID compatible identity providers.
To provide secure user connections, all remote authentications are challenged when a user
connects with their login and password. If several authentications rules are configured, the con-
nection process is the following:
1. The first authentication rule is used to authenticate the user. If it fails, SOLIDserver tries the
next authentication rule. Each configured authentication rule is tried and used, whether it relies
on Active Directory, LDAP, RADIUS or OpenID Connect, until it is successful or all authentic-
ations fail.
2. Either the user is granted access, or all rules failed and the user access to the GUI is denied.
3. When the authentication succeeds, the user rights are based on the group they belong to in
SOLIDserver.
Group Admin
[email protected]
[email protected]
...
Group B
LDAP
LDAPserver
server [email protected]
[email protected]
...
LDAP authentication
rule enabled
Group A
SOLIDserver
Group C
Figure 100.1. The user connection process when an authentication rule is enabled
To remedy any remote authentication issue, you must have at least one local admin user
configured. With a user in the group admin, you ensure that you have access to SOLIDserver
and can intervene in case of authentication failures, whether a remote directory or server is un-
reachable or a local group of users matching a remote group has insufficient rights or resources.
To set up LDAP or RADIUS remote authentication for SSH connections, refer to the appendix
Using Remote Authentication for SSH Connections to SOLIDserver.
1156
Managing Authentication Rules
AUTHENTICATION
GROUP OF USER
USERS
RESOURCE
RIGHT
By default, the list is empty. Only the rules you add are displayed on the page.
Each rule allows to enable user authentication relying on Active Directory, LDAP, RADIUS and
OpenID Connect. Note that:
• User credentials can be saved in several remote servers.
• SOLIDserver systematically checks all rules. To provide secure authentication, the credentials
of the user requesting access are compared to all the configured remote servers.
• If the user is found in Active Directory, LDAP, RADIUS and/or OpenID, they are granted
access. The rights and resources they have access to depend on the configuration set for
the local group(s) of users they belong to.
• If the user is not found in any server, or rule, they are denied access.
• The authentication rules check does not follow any specific order. Therefore, you must
keep your authentication servers up-to-date, with the same data. If a user is in the group A on
1157
Managing Authentication Rules
a server and in the group B on another server, there is no mean to set a preference for one
authentication rule over the other.
Active Directory (AD) is a technology created by Microsoft that provides a variety of network
services, including LDAP like directory services and other network information. SOLIDserver
supports remote authentication with any AD running on Microsoft Window Server 2008, 2008
R2, 2012 R2, 2016 or 2019.
To successfully authenticate users and take into account existing AD groups, you must:
1. Already have at least one group added both on the AD server and among SOLIDserver groups
of users with the exact same name, down to the case. The group name in SOLIDserver must
match the AD group name, the group name is case sensitive.
2. Configure said group with the resources and rights that define the users profile.
3. Add and configure the AD authentication rule with the option Synchronize set to Yes. You can
even configure it to deny access to users that do not belong to an AD group.
With this configuration, AD users are automatically added as resource of the matching local
group when they connect, they are granted the relevant rights and resources.
Note that you can import all your users via CSV, you must choose rule as Authentication method.
For more details, refer to the section Importing Users in the chapter Importing Data from a CSV
File.
Once the rule is added, AD users can connect to SOLIDserver. Note that:
• The changes performed on the AD server are not immediately taken into account by SOLID-
server. To avoid waiting, you can delete the AD users you modified from the page Users, when
they connect again, SOLIDserver contacts the AD server and authenticates them with their
new parameters.
• If several email addresses are available for one user, only the first non-empty value is taken
into account.
1158
Managing Authentication Rules
1159
Managing Authentication Rules
14. Click on OK to complete the operation. The report opens and closes. The rule now is listed,
its Instance matches the Rule name you set.
If some users connections fail, some guidelines may help an administrator to troubleshoot the
authentication.
Most of the time, the source of the problem is that the AD connection is impossible. The
column may even indicate that the AD user credentials are not recognized as a member of
any existing SOLIDserver group.
Lightweight Directory Access Protocol (LDAP) is an application protocol over TCP/IP for querying
and modifying directory services that might hold passwords, addresses, groups, public encryption
keys and other exchange-facilitating data.
To set up authentication for SSH connections, refer to the appendix Using Remote Authentication
for SSH Connections to SOLIDserver.
To successfully authenticate users and take into account an existing LDAP group, before
the first user connection you must:
1. Add a group of users within SOLIDserver matching the relevant LDAP group. This local group
must have the same name as the LDAP group. Therefore, to include the whole LDAP repository
tree structure, it may look as follows: cn=group1,ou=Groups,dc=example,dc=com.
2. Add and configure the LDAP authentication rule with the option Group attribute set to match
this LDAP group.
With this configuration, LDAP users are automatically added as resource of the matching local
group when they connect, they are granted the relevant rights and resources.
If you have clients distributed among several LDAP groups, you can decide to add local groups
that only use the section Common Name (CN) of your LDAP groups. To do so, you need to tick
the relevant box during the rule configuration. Keep in mind that if you tick this box, the name of
1160
Managing Authentication Rules
all LDAP groups you add within SOLIDserver must only use the CN. You cannot mix long and
short group names in the database to authenticate LDAP users.
Note that you can import all your users via CSV, you must choose rule as Authentication method.
For more details, refer to the section Importing Users in the chapter Importing Data from a CSV
File.
Once the rule is added, LDAP users can connect to SOLIDserver. Note that:
• The changes performed on the LDAP server are not immediately taken into account by
SOLIDserver. To avoid waiting, you can delete the LDAP users you modified from the page
Users, when they connect again, SOLIDserver contacts the LDAP server and authenticates
them with their new parameters.
• If several email addresses are available for one user, only the first non-empty value is taken
into account.
1161
Managing Authentication Rules
Field Description
LDAP group granted "admin" The name of any group on the LDAP server. All the users of the specified
rights group are granted access to SOLIDserver with the same rights as the users
of the group admin. These users are also listed as resource of the group
admin. This field is optional.
Login The login of an account that can retrieve the LDAP attributes of the users
that you want to grant access to SOLIDserver. This field is optional and
based on the attribute uid. Note that if your LDAP is configured in a very
strict manner and do not not specify an account with sufficient rights,
standard users might not be able to browse their own attributes.
Password If you specified a Login, specify its account password.
10. Click on OK to complete the operation. The report opens and closes. The rule now is listed,
its Instance matches the Rule name you set.
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that uses access
servers to provide centralized access management to large networks.
To set up authentication for SSH connections, refer to the appendix Using Remote Authentication
for SSH Connections to SOLIDserver.
You can use FreeRADIUS or RADIUS for Cisco ACS with SOLIDserver. For more details, refer
to the appendix Configuring RADIUS.
1162
Managing Authentication Rules
10. Click on OK to complete the operation. The report opens and closes. The rule now is listed,
its Instance matches the Rule name you set.
OpenID Connect is an authentication protocol, based on the OAuth 2.0 family of specifications.
It uses simple JSON Web Tokens (JWT), which you can obtain using flows conforming to the
OAuth 2.0 specifications. It is commonly used by external identity providers like Google or Microsoft
Azure.
Note that once users are authenticated and logged in SOLIDserver, when they log out of their
GUI session they are not logged out of their identity provider session.
Prerequisites
1. SOLIDserver system configuration
• Make sure that the appliance is time synchronized using NTP.
1163
Managing Authentication Rules
• Make sure that the appliance can reach a DNS resolver and resolve domain names.
• Make sure that the appliance can be accessed through a URL.This URL is used to configure
the application on the provider side.
2. On the provider side, register and configure an application with the proper tokens
• You must name your application and set it with the URL of your SOLIDserver appliance.
• The identity provider must support the following claims: name, email, given name and family
name. For Azure users, the email address must be specified in the field upn. You can also
include the user image.
All the users that can access the application can also access your SOLIDserver appliance,
but they cannot perform any operation if they do not belong to any group.
3. On SOLIDserver side, configure user access
As OpenID authentication does not rely on any group, you must prepare groups locally:
• Add one or more groups of users, grant them all the relevant rights and resources to set
user profiles.
• Add the application users and configure them with the email address declared.
• Add all users as resource of the relevant group(s).
When users connect for the first time, they are identified using their email address and granted
the rights of the group they belong to. If they are not part of any group of users, they cannot
access any module or perform any operation.
Limitations
• You can only configure one OpenID provider per SOLIDserver appliance.
• You can only add the OpenID authentication rule once.
• You can only configure the authentication details via CLI, through an SSH connection to
SOLIDserver.
• If you configure OpenID authentication on appliances configured in High Availability:
• To be able to access the Hot Standby appliance, users must have logged to the Master ap-
pliance first. Once they do, their user information is saved on the Master and replicated on
the Hot Standby.
• If no VIP is set for the appliances, both appliances must have their own authentication con-
figuration. Therefore, each must have an application on the provider side and a unique au-
thentication configuration file that includes its URL. If a VIP is set, one application can au-
thenticate both appliances, the local configuration file of the Master is replicated on the Hot
Standby.
• There is no user synchronization, you need to manually edit the group(s) of users if you want
to grant or deny access to specific users.
Keep in mind that if you configure the authentication on appliances in High Availability, you must
perform both operations on each appliance.
1164
Managing Authentication Rules
<IfDefine UseModAuthOpenIDC>
LoadModule auth_openidc_module libexec/apache24/mod_auth_openidc.so
OIDCProviderMetadataURL
"https://accounts.google.com/.well-known/openid-configuration"
OIDCClientID "<client-id>"
OIDCClientSecret "<secret>"
OIDCRedirectURI "https://<solidserver>.int.efficientip.com/auth/redirect_uri"
OIDCCryptoPassphrase "<passphrase>"
OIDCScope "openid email"
OIDCSessionInactivityTimeout 900
OIDCCacheType "file"
</IfDefine>
For more details, refer to the section Configuring OpenID Authentication for Google in the ap-
pendix Configuring OpenID Authentication.
<IfDefine UseModAuthOpenIDC>
LoadModule auth_openidc_module libexec/apache24/mod_auth_openidc.so
OIDCProviderMetadataURL
"https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration"
OIDCClientID "<client-id>"
OIDCClientSecret "<secret>"
OIDCRedirectURI "https://<solidserver>.int.efficientip.com/auth/redirect_uri"
OIDCCryptoPassphrase "<passphrase>"
OIDCScope "openid profile email"
OIDCSessionInactivityTimeout 900
OIDCCacheType "file"
</IfDefine>
For more details, refer to the section Configuring OpenID Authentication for Azure in the ap-
pendix Configuring OpenID Authentication.
Note that if you configure the authentication on appliances in High Availability, you only need to
add the rule on the Master appliance, the Hot Standby retrieves it.
1165
Managing Authentication Rules
Now the login page includes a link External authentication under the default login fields. You
should customize the page to specify the identity provider in the link message or include their
logo.
Note that if you configure the authentication on appliances in High Availability, you only need to
customize the login page of the Master appliance, the Hot Standby retrieves all details.
If you want to include the identity provider image, you must upload it to the Local files listing and
then set the image name as value of the dedicated registry database entry. The image is shrunk
if it exceeds 100x100 pixels.
1166
Managing Authentication Rules
d. Click on BROWSE to look for the image of your choice on your computer.
e. In this new window, find the image you want to upload and select it.
f. Click on Open. The window closes. The name of the selected image is displayed in the
field File name.
g. Click on OK to complete the operation. The report wizard opens and closes. The image
is listed.
3. Include the image on the login page:
a. In the sidebar, click on Admin Home. The page Admin Home opens.
b. In the section Expert, click on Registry database. The page Registry database opens.
c. Filter the column Name with login.auth.ext.image.
d. Hit Enter. Only this key is listed.
e. In the column Value, click on <empty>. The wizard Registry database Edit a value
opens.
f. In the field Value, specify the full name of the image, including its extension.
g. Click on OK to complete the operation.The report opens and closes.The page refreshes
and the new value is displayed.
You can disable them and stop authenticating the corresponding remote users. When you enable
it again, the rule is checked again at every user connection.
1167
Managing Authentication Rules
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the sidebar, go to Users, Groups & Rights > Authentication rules. The page Authen-
tication rules opens.
3. Tick the rule(s) of your choice.
4. In the menu, select Edit > Enable or Disable. The corresponding wizard opens.
5. Click on OK to complete the operation. The report opens and closes. The rule is listed and
marked OK or Disabled in the column Status.
1168
Part XIX. Administration
The module Administration should be handled by an administrator as it allows to manage remote appliances
and monitor, maintain or upgrade SOLIDserver. Its homepage, Admin Home, is divided into six sections
that contain links toward all the pages of the module.
Note that from the module Dashboards, you can monitor the module data or set up custom shortcuts and
search engines using gadgets. For more details, refer to the part Dashboards.
Some pages and options of the module Administration are detailed in other parts:
• The link Certificates and keys opens the pages All certificates, detailed in the section Changing the HTTPS
Certificate, All GSS-TSIG keys, detailed in the chapter Implementing Dynamic Update and All database
keys detailed in the chapter Securing.
• The part Configuring SOLIDserver details Network configuration, Services configuration and Licenses.
• The part Rights Management details Users, Groups and Authentication rules.
• The part Customization details the GUI customization options, including Language editor, and the pages
Class Studio, Custom DB and Packager. This part also details Smart Folders and IPv6 labels.
Table of Contents
101. Centralized Management ...................................................................................... 1173
Browsing Centralized Management ...................................................................... 1173
Configuring SOLIDserver to Remotely Manage Other Appliances ........................... 1177
Adding Remote Appliances .................................................................................. 1177
Managing the Services and Network Configuration of Another Appliance ................ 1179
Monitoring the Appliances Managed from the Page Centralized Management ......... 1180
Configuring Two Appliances in High Availability ..................................................... 1183
Editing Remote Appliances .................................................................................. 1186
Managing a High Availability Configuration ............................................................ 1186
Replacing Appliances Managed Remotely ............................................................ 1198
Exporting Remote Appliances .............................................................................. 1199
Deleting Remote Appliances ................................................................................ 1199
102. Managing Licenses .............................................................................................. 1202
Browsing the License and License Metrics ............................................................ 1202
Refreshing the Metrics of a License ...................................................................... 1204
Renewing the Licenses ........................................................................................ 1205
Exporting Licenses .............................................................................................. 1209
103. Monitoring ........................................................................................................... 1210
Managing Reports ............................................................................................... 1210
Managing Alerts .................................................................................................. 1219
Managing the Logs .............................................................................................. 1226
Monitoring the Appliance Statistics ....................................................................... 1229
Monitoring from Session Tracking ......................................................................... 1231
Monitoring from User Tracking .............................................................................. 1231
Forwarding Events ............................................................................................... 1233
Managing SNMP Profiles ..................................................................................... 1243
Monitoring Using SNMP ...................................................................................... 1245
Displaying Netstat Data ....................................................................................... 1246
Sizing the Database Tables .................................................................................. 1246
104. Maintenance ........................................................................................................ 1248
Managing Files from the Local Files Listing ........................................................... 1248
Using the Maintenance mode ............................................................................... 1255
Updating the Macros and Rules ........................................................................... 1255
Clearing the Appliance Cache .............................................................................. 1255
Troubleshooting ................................................................................................... 1256
Managing Backups and Restoring Configurations .................................................. 1258
Shutting Down and Rebooting .............................................................................. 1264
105. Securing .............................................................................................................. 1268
Managing SSL Certificates .................................................................................. 1268
Encrypting the Database ..................................................................................... 1277
106. Configuring Space Synchronization ....................................................................... 1284
Prerequisites ....................................................................................................... 1284
Limitations .......................................................................................................... 1284
Exposing a Space ............................................................................................... 1285
Synchronizing an Exposed Space ........................................................................ 1286
Completing the Synchronization Configuration ...................................................... 1287
Monitoring IPAM Synchronization ......................................................................... 1288
Disabling Space Synchronization ......................................................................... 1288
107. Upgrading ............................................................................................................ 1290
Prerequisites ....................................................................................................... 1290
Recommendations .............................................................................................. 1290
1171
Administration
1172
Chapter 101. Centralized Management
In the module Administration, the page Centralized Management allows administrators to:
• Monitor appliances, locally and remotely. The page returns system, hardware, licence and
maintenance information. For more details, refer to the section Monitoring the Appliances
Managed from the Page Centralized Management.
• Manage remotely other appliances. From the Management appliance you can manage the
service and network configuration, monitor and upgrade remote appliances.
• Set up High Availability between the local appliance and a remote one. In such a configuration
the Master appliance contains all the data you manage and the Hot Standby replicates the
Master database but can have a specific configuration of its services and network.
Whether you want to manage remote appliances or set up a High Availability configuration, you
must:
1. Configure the local appliance.
2. Add a remote appliance to the page Centralized Management.
Note that with remote appliances or a High Availability configuration, the upgrade can be performed
remotely. For more details, refer to the chapter Upgrading.
Appliances do not have a properties page, all details and properties can be displayed in the
columns. Note that the columns Local and Role provide specific information on the local or remote
appliances. For more details, refer to the next section.
The columns on the page provide details regarding the local appliance and any remote appliance,
whether it is configured in High Availability or not. A set of columns are displayed by default, extra
columns dedicated to more specific data are also available.
1173
Centralized Management
1174
Centralized Management
Column Description
System state The overall state of the appliance. It monitors and returns the information of the columns
CPU load (5 min), Disk I/O load (%), Fans status, HDD space, LAGG status, Memory usage
(%), Power Supply Units status and RAID status. The statuses of these columns are de-
scribed in the next table.
OK The appliance overall state is normal. None of the monitored
columns is alerting.
Unknown One of the monitored columns returns no information.
Critical One of the monitored columns is in critical state.
Warning One of the monitored columns requires attention.
HA UID The key that identifies two appliances configured in High Availability.
Last write period The last time the Hot Standby replicated the Master database.
Time drift The difference, in seconds, between the Master NTP and the Hot Standby NTP. That drift
should not exceed a minute (60 in the column) as this could have consequences on the
DHCP failover replication.
Replication offset The difference, in kilobytes, between the Master database and the Hot Standby database.
As the replication is almost in real time, the difference should be minimal. A great value
in this column could indicate a network disruption. If the Replication offset is Unknown,
the remote SOLIDserver is in Timeout.
Status The appliance status, for more details refer to the section Understanding the Statuses on
the Page Centralized Management.
Security events The security events collection status of the appliance, Yes or No. For more details, refer
to the section Forwarding Security Events in the chapter Monitoring.
In addition to the default columns, you can display columns dedicated to system and hardware
information, among other things.
Table 101.2. The other columns available on the page Centralized Management
Column Description
Firmware date The software image release date.
Device OS version The appliance architecture, either amd64 or i386. i386 is only displayed for remotely
managed appliances in version prior to 6.0.x.
CPU load (5 min) The load of all the appliances' CPU cores, on an average of 5 minutes. You can monitor
and use the values in this column to return the specific statuses in the column System
State, as detailed in the section Configuring Specific Thresholds to Monitor the Column
System State.
Disk I/O load (%) The load of the appliance disk I/O, in percent. You can monitor and use the values in this
column to return the specific statuses in the column System State, as detailed in the section
Configuring Specific Thresholds to Monitor the Column System State.
Memory usage (%) The memory usage of the appliance, in percent. You can monitor and use the values in
this column to return the specific statuses in the column System State, as detailed in the
section Configuring Specific Thresholds to Monitor the Column System State.
PSU status OK The appliance power supply unit(s) is/are up and running.
N/A No information can be retrieved from the power supply unit(s). For in-
stance, on a virtual appliance or if the appliance has only one PSU.
Disabled No PSU redundancy is available on the appliance.
Critical One of the appliances' power supply units is unplugged or defective.
RAID status The status of the RAID disk(s) of SOLIDserver 4th generation hardware appliances (from
SOLIDserver-550) and of all SOLIDserver 5th generation hardware appliances.
OK The appliance RAID disk(s) is/are up and running.
N/A No information can be retrieved from the appliance RAID disk(s).
1175
Centralized Management
Column Description
Disabled No RAID disk is enabled on the appliance.
Critical The appliance RAID disk(s) is/are enabled but is degraded or offline.
Fans status OK The appliance fan(s) is/are up and running.
N/A No information on the appliance fan(s) is available.
Disabled The appliance fan(s) is/are set to disabled.
Critical At least one appliance fan returns an error (not running, on failure...).
HDD space The space used on the partition /data1 of the appliance, in percent. You can monitor and
use the values in this column to return the specific statuses in the column System State,
as detailed in the section Configuring Specific Thresholds to Monitor the Column System
State.
LAGG status OK The appliance LAGG interface(s) is/are up and running.
N/A No information can be retrieved from the appliance LAGG interface(s).
Disabled No LAGG interface is configured as active on the appliance.
Critical At least one appliance LAGG interface is down.
Time (Management) The time of the remote appliance(s) managed through the local appliance.
Time (Local) The local appliance date and time.
Last write time The exact time of the last database replication.
Multi-status The emergency, warning, critical, error and/or informational message(s) regarding the
appliance. For more details, refer to the section Understanding the Column Multi-Status
or Multi-Status Messages.
Not configured The Local appliance has not been configured yet.
Managed (remote) The appliance is being managed remotely, i.e. listed on the page Centralized Man-
agement of another appliance.
Upgrading... The appliance is being upgraded.
Split-brain Two appliances are in Restricted mode due to a split-brain. For more details, refer
to the section Troubleshooting a Split-brain.
Repl. stopped The replication stopped, the connection is lost between the appliances. For more
details, refer to the section Configuring Specific Behaviors if the Replication Takes
a Long Time or Stopped.
1176
Centralized Management
Configuring an appliance locally means assigning it an IP address. It sets the grounds for remote
management and differentiates appliances:
• For remote management, it differentiates the Management appliance from the remote appliance.
• For High Availability configurations, it differentiates the Master appliance from the Hot Standby
appliance.
Once the appliance is configured, you need to add other appliances to remotely manage them
from the pages Centralized Management, Network configuration and Services configuration.
The local appliance becomes a management platform where you remotely manage and/or
monitor other SOLIDserver appliances via the drop-down list SOLIDserver available on the pages
Network configuration, Services configuration, Syslog and System statistics of the module Admin-
istration.
1177
Centralized Management
• On all appliances, the NTP should be configured to make sure they are all set at the same
time and date. For more details, refer to the section Configuring NTP Servers.
Once you configured locally the future Master or Management appliance, you can add remote
appliances to the page Centralized Management. Keep in mind that:
• You can add as many remote appliances as you want to the page.
• You cannot display several High Availability configuration pairs on the page.
• Appliances remotely managed are still accessible locally.
9. Click on OK to complete the operation. The new appliance is listed. Its Role is Standalone
and its Status is Remote (managed).
1178
Centralized Management
• You can configure it in High Availability, as detailed in the section Configuring Two Appliances
in High Availability.
Keep in mind that you can edit any service except the source email address of the alert.
The address [email protected] that sends you the alert notifications has to be edited locally.
1179
Centralized Management
Note that, if your remote appliances are in version 6.0.1 or higher, you can even generate the
statistics reports of a remote appliances. For more details, refer to the section Generating a Report.
For more details regarding each chart, refer to the section Monitoring the Appliance Statistics.
1180
Centralized Management
With High Availability configurations, monitoring any time drift between the Master and Hot
Standby is paramount. Both appliances should be set at the same time. To ensure there is no
shortage of data on the Hot Standby appliance in case it needs to become a Master:
1. We strongly recommend that you configure the time and date of both the Master and
Hot Standby appliances via NTP servers. For more details, refer to the section Configuring
NTP Servers.
2. You can configure the alert Member clock drift that monitors the time drift between the Master
and the Hot Standby.
If you do not want to enroll any remote appliance as Hot Standby, the synchronization is optional.
If your local and remote appliances are set at the exact same time, it is useless to configure the
alert Member clock drift; you might even disable it. For more details, refer to the section Enabling
or Disabling Alerts.
You can edit the alert definition settings to suit your needs. By default:
• The alert is based on a filter of the column Time drift. The filter is set with a 20 seconds threshold
as follows: > 20 || < -20. The alert is raised:
• If the absolute time difference between the remote appliance and the Management or Master
appliance is higher than 20 seconds.
• If the absolute time difference between the remote appliance and the Management or Master
appliance is lower than 20 seconds.
To edit the threshold, refer to the procedure To edit the threshold of the alert Member clock
drift.
• The time difference check is performed every 5 minutes. To edit the frequency, refer to the
procedure To edit the alert Member clock drift default frequency and recipients.
• The alert sends an email alert to the users of the group admin. If you did not configure the
users' email address properly, they are not notified. To edit the recipients, refer to the procedure
To edit the alert Member clock drift default frequency and recipients below.
1181
Centralized Management
5. In the search engine of the column Time drift, the default filter > 20 || < -20 is visible.
6. Edit the filter according to your needs.
7. On the right-end side of the menu, click on . The wizard Quit editing the alert filters
opens.
8. Tick the box Save changes before quitting to save your new filter.
9. Click on OK to complete the operation. The report opens and closes. You are redirected
back to the page Alerts Definition.
To edit the alert Member clock drift default frequency and recipients
Only users of the group admin can perform this operation.
1. Connect to the Master or Management appliance GUI.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Monitoring, next to Alerts, click on Definition. The page Alerts Definition
opens.
4. At the end of the line of the Member clock drift, click on . The properties page opens.
5. In the panel Main properties, click on EDIT . The wizard Edit an alert definition opens.
6. Tick the box Expert mode.
7. To edit the alert check frequency:
a. Tick the box Edit scheduling. The schedule drop-down lists appear.
b. By default, only the drop-down list Minutes is set to Every 5 minutes.
c. Select the values that suit your needs.
8. To edit the group of users receiving the alert or add recipients:
a. Make sure the box Send mail is checked.
b. In the drop-down list Mailing lists, select the group of users of your choice.
c. In the field Additional Mail, specify the email address of a user that does not belong
to the group selected. Click on ADD . The email address is moved to the Additional Mail
List. Repeat these actions for as many users as you need.
9. Click on OK to complete the operation. The report opens and closes.
You can edit some registry database entries to set up thresholds and ensure that the system
state is Warning or Critical based on the value of the columns CPU load (5 min), Disk I/O load
(%), HDD space and Memory usage (%).
Table 101.5. The configurable registry database entries to return Critical and Warning System states
Registry database entry Description
module.system.member_snmp_cpu_crit The status Critical is returned if the value of the column CPU load
(5 min) matches or exceeds the value you set for the entry.
By default, it is set to 150.
module.system.member_snmp_cpu_warn The status Warning is returned if the value of the column CPU load
(5 min) matches or exceeds the value you set for the entry.
1182
Centralized Management
The thresholds that you set only apply to the column System State on the appliance where you
configure the registry database. For that reason, if you manage remote appliances or a High
Availability configuration, you should edit the entries on the Management or Master appliance.
1183
Centralized Management
With SOLIDserver, High Availability implies that you connect together two appliances where one
local appliance is a Master and the other, a remote one, is a Hot Standby, i.e. a read-only backup
server replicating the content of the Master appliance database.
The Master and Hot Standby appliances work together to make sure that when the automatic
switch is enabled, if the Master crashes or encounters any problem, the Hot Standby can
replace it immediately and vice versa. Therefore, the Hot Standby must replicate the Master
database as often as possible.
Prerequisites
• You must have two SOLIDserver appliances.
• The HA configuration can only be configured from and with appliances using an IPv4 address.
• The Master appliance should be configured locally as detailed in the section Configuring
SOLIDserver to Remotely Manage Other Appliances.
• The future Hot Standby must be added to the page Centralized Management of the Master as
detailed in the section Adding Remote Appliances.
Limitations
• The database High Availability is configurable only for two appliances.
• We strongly advise against displaying several HA configurations on the page Centralized
Management. If you add an appliance to this list, it means that you want to manage it.Therefore,
if you decide to add to your managing appliance two appliances configured in High Availability,
it means that you intend to manage them from the managing appliance. On the page Centralized
Management of the appliances in HA, the appliance Status changes from OK to Invalid creden-
1184
Centralized Management
tials because the local admin management password overwrites the management password
locally set on the Master appliance of this other HA configuration.
• The HA does not support the configuration of a NAT between the two appliances. Both
appliances send their local IP address when they communicate, therefore the converted IP
address cannot be used in the HA communication. Configuring a NAT might even break the
HA configuration.
• If you encrypted the database, you cannot enroll a remote appliance as Hot Standby if the
Active key of the local appliance, the future Master, is missing or corrupted.
This configuration has to be done from the future Master appliance and can be done on layer 2
or 3 of the network. For more details, refer to the section Frequently Asked Questions.
Keep in mind that for the configuration to be viable and effective the two appliances must:
• Meet the prerequisites.
• Be set at the same time. For more details, refer to the section Configuring NTP Servers.
• Have the same version of SOLIDserver.
• Have the same performance rate, to ensure a smooth transition. In the event of a switch, the
former Hot Standby has retrieved all the database information and can actually provide the
same performance and efficiency as the original Master.
• Have the same architecture (32 bits or 64 bits).
1185
Centralized Management
You can no longer edit the remote appliance database locally but you can still edit the services
and network configuration of both appliances separately. For more details, refer to the sections
Managing the Network Configuration of a Remote Appliance and Managing the Services
Configuration of a Remote Appliance.
4. The Hot Standby appliance replicates the content of the Master appliance database to provide
a backup if it has to replace the current Master appliance.
• From the page Centralized Management of the Master appliance, you should monitor the
columns Time drift and Replication offset, to make sure that the Hot Standby appliance
properly replicates the database. If at some point the replication stops, you can enroll again
the Hot Standby appliance following the procedure To configure High Availability between
two appliances.
• You can, for instance, configure and enable the automatic switch so that, if the Hot Standby
has not replicated the Master database in the last 60 seconds, it should check the Master
status three times in a row, every 4 seconds. If there is no response (timeout, etc.), the Hot
Standby switches to Master. For more details, refer to the section Controlling the Automatic
Switch Mechanisms if the Network is Unreliable.
Note that the automatic switch is not enabled by default. You can manually enable it.
For more details, refer to section Configuring High Availability Advanced Options.
1186
Centralized Management
• Configure advanced options to make sure your High Availability appliances behave as ex-
pected if your network is unreliable or may be disrupted or if the replication is slow or stopped,
as detailed in the section Configuring High Availability Advanced Options.
• Replace SOLIDserver appliances and keep a viable High Availability configuration. You can
replace either appliance, with or without backup, as detailed in the section Replacing An Appli-
ance in High Availability.
• Troubleshoot the configuration as detailed in the section High Availability Configuration
Troubleshooting Solutions.
• Answer some frequently asked questions, all detailed in the section High Availability Con-
figuration Troubleshooting Solutions.
This option is useful if any new file on the Master appliance has not been replicated yet on the
Hot Standby or if you intend to manually switch the appliances roles in the configuration, as detailed
in the section Switching the High Availability Configuration
Note that if you enabled the automatic switch, the option is automatically launched before the
switch.
Via the option Manually switch local SOLIDserver to master you can switch a configuration. Note
that:
• The option must be executed from the Hot Standby as you cannot make a Master change
its role to Hot Standby.
• The switch is no longer automatic by default. If you want to automatically detect potential
problems on the Master (timeout, crash...) and switch the appliances roles, you must enable
this behavior. For more details, refer to the section Configuring High Availability Advanced
Options.
• Even with the automatic switch enabled, you can manually switch the configuration.
1187
Centralized Management
1. Connect to the Hot Standby appliance GUI. The message This SOLIDserver is a Hot
Standby: Database is in READ-ONLY mode is present on every page.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section System, click on Centralized Management. The page Centralized Manage-
ment opens.
4. Update the Hot Standby database:
a. In the menu, select Tools > Update HA files database. The report opens.
b. Click on OK to complete the operation. The report opens and closes. The columns Last
write periods, Time drift and Replication offset are updated.
5. Switch the configuration:
a. In the menu, select Tools > Manually switch local SOLIDserver to master. The
report opens.
b. Click on OK to complete the operation.
The Role of the former Hot Standby appliance is Master (recovered). The former
Master appliance is marked Master (Hot Standby init). For more details, refer to the
table The default columns on the page Centralized Management.
The Hot Standby appliance is unavailable until it has replicated the Master database.
The High Availability dedicated keys each serve a specific purpose and can impact or be impacted
by one another. They allow to:
1188
Centralized Management
1189
Centralized Management
By default, it is set to 4 seconds, if the Hot Standby does not get an answer from the Master,
it tries every 4 seconds n times (depending on the number of retries you set for the key
module.system.hot_standby_switch_retry).
Prevent unexpected switches during minor issues on the network
Among other configurations, the registry database entries can be used to prevent unexpected
switches if the network experiences minor issues. To do so you should increase the switch
lag period (the value of the key module.system.hot_standby_max_replication_lag) and/or
the number of retries (the value of the key module.system.hot_standby_switch_retry). Keep
in mind that a large number of retries might overload the network.
To disable the automatic switch altogether, refer to the section detailing how to control the
automatic switch.
To configure the High Availability switch behavior from the registry database
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. Filter the column Name with the name the key of your choice. For more details, refer to the
High Availability keys.
4. Hit Enter. Only the key of your choice is listed.
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, specify the value of your choice. For more details, refer to the High
Availability keys.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
Indeed, in any event of a network disruption, the appliances configured in High Availability go in
Timeout or switch their roles. If the switch is unsuccessful, when the appliances start again you
may have two Master appliances and a potential case of split-brain. With no appliance set as
Hot Standby, you need to decide which one should switch to this role. For more details, refer to
the section Troubleshooting a Split-brain.
To prevent any loss of data, we suggest that you follow the procedure in the section Disabling
the High Availability Configuration. Once the network is back on, you must configure the HA
again.
1190
Centralized Management
Keep in mind that the automatic re-enrollment configuration of the Hot Standby is ignored during
an upgrade of appliances configured in High Availability.
1191
Centralized Management
5. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
6. In the field Value, specify the value of your choice, in kB. The default value is 10240.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
To set how long the maximum replication offset can be exceeded before
re-enrollment
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. Make sure the key module.system.auto_replication_repair is enabled, set to 1. If it is disabled,
the automatic re-enrollment is not triggered.
3. In the section Expert, click on Registry database. The page Registry database opens.
4. Filter the column Name with module.system.auto_replication_repair.threshold.
5. Hit Enter. Only this key is listed.
6. In the column Value, click on the value listed. The wizard Registry database Edit a value
opens.
7. In the field Value, specify the value of your choice. The default value is 60 time 10 seconds,
i.e. 10 minutes.
8. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new value is displayed.
1192
Centralized Management
Note that, if you do not meet all these requirements, warning messages are displayed above the
top bar of the Hot Standby appliance GUI.
The two SOLIDserver appliances you configured in High Availability have DIFFERENT
ARCHITECTURES. They must have the same architecture for the database replication to
work.
• Appliance: Master.
• Problem: The Master and Hot Standby appliances do not have the same architecture version,
therefore the database replication is impossible.
• Solution: Upgrade the Hot Standby appliance from the Master appliance: the Hot Standby is
automatically upgraded to the architecture version of the Master. For more details, refer to the
section Upgrading Appliances Managed Remotely in the chapter Upgrading.
The two SOLIDserver appliances you configured in High Availability have DIFFERENT
VERSIONS. To avoid configuration problems you should upgrade the Hot Standby from
the Master.
• Appliance: Master.
• Problem: The Master and Hot Standby appliances do not have the same version of SOLIDserver,
therefore the database replication may encounter some problems.
1193
Centralized Management
• Solution: Upgrade the Hot Standby appliance from the Master appliance: the Hot Standby is
automatically upgraded to the version of SOLIDserver of the Master. For more details, refer to
the section Upgrading Appliances Managed Remotely in the chapter Upgrading.
You are in Restricted mode. From the page Centralized Management you can go back to
Normal mode: either configure the local SOLIDserver or delete all the remote appliances.
• Appliance: Master and Hot Standby.
• Problem: Either your appliances are in split-brain, one of them is in Timeout or the replication
stopped.
• Solution: Follow the troubleshooting solution of the other message displayed in the GUI. Each
problem has a specific solution.
Troubleshooting a Split-brain
If appliances configured in High Availability did not successfully switch roles and both end up as
Master appliances, they may be in split-brain. In which case, the replication stops and you may
need to intervene.
With two Master appliances, whether they are both Master or one is Master and the other is
Master (recovered), there no longer is a backup appliance and both appliances could potentially
overwrite each other's changes.
1
This information is displayed in the gadget System information of the Master appliance Home page.
1194
Centralized Management
To help prevent the split-brain, a set of checks are performed, when the appliances communicate
once again:
1. SOLIDserver starts up in Restricted mode and goes back in normal mode if and only if no High
Availability conflicts are detected.
2. SOLIDserver checks if both appliances share the same version. If not, a message is displayed
on every page of the appliance with the latest version.
3. SOLIDserver checks if both appliances share the same role.
If it turns out that both appliances are Master, the automated detection checks are ran to avoid
staying in Restricted mode.
If the automated resolution cannot reconfigure the High Availability, you need to perform the
manual resolution.
Automated Detection
When a Master appliance detects that the other appliance is also a Master, SOLIDserver performs
three checks to try and avoid a case of split-brain:
1. If no appliance has been edited since the last synchronization: the last appliance that
switched to Master remains Master and enrolls the other appliance as Hot Standby.
2. If one appliance has been edited since the last synchronization: the last appliance that
was modified becomes Master and enrolls the other appliance as Hot Standby.
3. If both appliances have been edited since the last synchronization: SOLIDserver puts
them in Restricted mode with the status Split-brain, as specified in the red banner message
displayed above the top bar of both appliances. To configure the appliances in High Availability
again, refer to the manual resolution.
Manual Resolution
The manual resolution is only needed when the appliances in HA are in a case of split-brain that
puts them in Restricted mode, as specified in the red message displayed on every page of both
appliances. This mode implies two behaviors:
1. The synchronization between the appliances stopped, as if you had two Standalone appliances
with the same HA UID.
2. You can still edit the database of both appliances but no changes are actually pushed on the
physical server(s).
1195
Centralized Management
• Your appliances in High Availability disconnected somehow and the automatic switch was
disabled using the registry key detailed in the section Controlling the Automatic Switch
Mechanisms if the Network is Unreliable. In which case, the replication stopped and you
need to set it up again.
In any other case, disabling the configuration should be done using the standard procedure
detailed in the section Disabling the High Availability Configuration.
2. It is impossible to switch a Master appliance to Standalone if it has a Hot Standby.
3. The Hot Standby appliance must always be the first one to be switched to Standalone.
4. Switching an appliance to Standalone erases the database entirely whether the appliance is
a Hot Standby or a Master. So if you switch both appliances to Standalone, you erase your
entire database.
5. Switching an appliance to Standalone automatically saves a backup file for the appliance.
6. Switching an appliance to Standalone has to be done locally.You must connect to the appliance
via its IP address.
Once the former Hot Standby appliance has rebooted and is reachable:
• Connect to its GUI via its IP address and log in using the credentials of a user belonging to the
group admin.
• Configure the Internal module setup once again. For more details, refer to the section Defining
the Internal Module Setup.
• Make sure the appliance is a Standalone, either in the gadget General information of the appli-
ance Main dashboard or directly on the page Centralized Management.
• You can display or download its backup file from the page Backup & Restore. For more details,
refer to the section Managing Backups and Restoring Configurations.
1196
Centralized Management
• Delete it from the page Centralized Management of the Master appliance. For more details,
refer to the procedure To disable the High Availability configuration.
• Add it to page the Centralized Management again. For more details, refer to the procedure
To add a remote appliance.
• Enroll it as the Hot Standby. For more details, refer to the procedure To configure High
Availability between two appliances.
1197
Centralized Management
However, you cannot restore the backup of an appliance in High Availability. You need to
disable the High Availability, restore the backup and then configure the High Availability
again.
To replace appliances you must take into account if they are simply remotely managed or con-
figured in High Availability.
1198
Centralized Management
• Second, enroll the Hot Standby. For more details, refer to the procedure To configure High
Availability between two appliances in the section Setting a High Availability Configuration.
6. If you restored your backup directly on your Hot Standby, manually switch the appli-
ances' role. If you followed this procedure from step 2, your current Master used to be the
Hot Standby so you may need to switch their role back again. For more details, refer to the
section Switching the High Availability Configuration.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1199
Centralized Management
If the appliance is configured in High Availability, refer to the section Disabling the High Availab-
ility Configuration.
1200
Centralized Management
• Connect to the Hot Standby via its IP address, log in using the credentials of a user belonging
to the group admin.
• The appliance is no longer in read-only mode but its database is empty.
• Configure the Internal module setup once again. For more details, refer to the section Defining
the Internal Module Setup.
• The page Centralized Management displays the following information:
1. The appliance itself (Local) is the only one listed, the former Master appliance is no longer
part of that list.
2. The appliance role is now Standalone.
3. The appliance needs to be configured locally again (Tools > Configure local SOLIDserver).
1201
Chapter 102. Managing Licenses
Licenses define the operations that can be performed on an appliance. They are unique to each
appliance.
The details of each license include the available configurations and operations as metrics. These
metrics can match the license lifetime or be metric subscriptions that expire after a while.
If you manage remote appliances, you can manage the license and metrics of the remote appli-
ances from the Management appliance.
Note that the license metrics and maintenance are monitored. If the maintenance or a metric
approaches or reaches its limit, a banner message above the top bar notifies you. You can close
the message for the remainder of the session.
The local license properties are displayed on the page License, in dedicated panels. This page
is only accessible locally, so if you manage remote appliances you must connect to each appliance
to access the page.
On the properties page, the panel License subscriptions displays the name and the end date
of the module(s) you subscribed to.
1202
Managing Licenses
You can sort and filter all the columns on the page All licenses. The columns detail the information
of each license metric, the ones of the local license and of the license of the remote appliance(s).
All columns are displayed by default, except the column Start of license.
1203
Managing Licenses
Column Description
End of maintenance The date and time when the maintenance period reaches its expiration.
Time left (maintenance) The number of days, hours and minutes until the End of maintenance.
Status The status of the appliance the license is activated on, for more details, refer to the
section Understanding the Statuses on the Page All Licenses.
Not configured The Local appliance has not been configured yet.
Managed (remote) The appliance is being managed remotely, i.e. listed on the page Centralized Man-
agement of another appliance.
Upgrading... The appliance is being upgraded.
Split-brain Two appliances are in Restricted mode due to a split-brain. For more details, refer
to the section Troubleshooting a Split-brain in the chapter Centralized Management.
Repl. stopped The replication stopped, the connection is lost between the appliances. For more
details, refer to the section Configuring Specific Behaviors if the Replication Takes
a Long Time or Stopped in the chapter Centralized Management.
1204
Managing Licenses
It is necessary to renew a license if you are notified, in the gadget System Information or in a
banner above the top bar, that a temporary license, the maintenance period or a metric subscription
is expiring on a local or remote appliance. The banner above the top bar may indicate that:
• 30 days remain before the metric subscription expires.
• The current use of a metric reaches 90% or 100%, hardware metric messages only appear
when their use exceeds 100%. Note that even if 100% is reached, you can still add and edit
its corresponding object.
• A metric subscription expired. However, you can still use its modules.
Note that any license related banner message can be closed for the remainder of the session.
Requesting a License
To request a license, whether it includes metric subcriptions or not, you must retrieve the request
key of your local or remote appliance and send it to EfficientIP.
1205
Managing Licenses
d. Copy the content of the field Request key, it is required when you fill out the request
license form.
e. Click on OK to close the wizard.
2. Send the request key to Efficient IP via the form Request Your License.
a. Go to the page http://www.efficientip.com/license-request/.
b. In the fields First Name, Last Name, Email, Phone, Company and Country Name,
specify your contact details. All these fields are required.
c. In the field License Period Request, select the length of your choice: 1 month, 2 months,
3 months, 6 months or Permanent. This field is required.
d. If you selected Permanent, the following fields appear.
Fill them with the information provided by EfficientIP.
e. In the field SOLIDserver Model, specify your model number. This field is required. It
looks as follows SDS-570.
f. In the field Request Key, paste your request key or the content of your request key file.
This field is required.
g. In the field Number of External Managed Servers (MVSM, if any), specify the total
number of servers - DNS, DHCP... - you intend to manage from SOLIDserver.
h. In the section Optional Module, tick all the optional modules you might need: DNS
1
Guardian, DNS GSLB, NetChange, Device Manager or SPX.
i. If relevant, fill in the field If requester is NOT end customer, please provide your
contact information (Name, Company, Email, Phone): with all the appropriate data.
j. In the drop-down list Language, you can select in which language to display the Privacy
Policy. By default, English is selected, you can change to French, German or Spanish.
The panel provides a link towards EfficientIP Privacy Statement.
k. Tick the box I accept the Terms and Conditions.
l. Click on SUBMIT to send us your information.
Once EfficientIP has answered your request and sent you a license key, you can renew your li-
cence as detailed in the section Activating a License.
1
If you do not tick this box, you are using NetChange-IPL, NetChange basic options.
1206
Managing Licenses
e. In the field SOLIDserver Model, specify your model number. This field is required. It
looks as follows SDS-570.
1207
Managing Licenses
f. In the field Request Key, paste your request key or the content of your request key file.
This field is required.
g. In the field Number of External Managed Servers (MVSM, if any), specify the total
number of servers - DNS, DHCP... - you intend to manage from SOLIDserver.
h. In the section Optional Module, tick all the optional modules you might need: DNS
2
Guardian, DNS GSLB, NetChange, Device Manager or SPX.
i. If relevant, fill in the field If requester is NOT end customer, please provide your
contact information (Name, Company, Email, Phone): with all the appropriate data.
j. In the drop-down list Language, you can select in which language to display the Privacy
Policy. By default, English is selected, you can change to French, German or Spanish.
The panel provides a link towards EfficientIP Privacy Statement.
k. Tick the box I accept the Terms and Conditions.
l. Click on SUBMIT to send us your information.
Once EfficientIP has answered your request and sent you license keys, you can renew your li-
cences as detailed in the section Activating a License.
Activating a License
Once you received the license key(s), you must activate it:
• For local appliances, you can add the license key on the page License or import it on the page
Centralized Management.
• For remote appliances, you can import all the license keys at once on the page Centralized
Management.
Before activating the license, the appliance should be time synchronized. To make sure the ap-
pliance is on time, we strongly recommend configuring the NTP. For more details, refer to the
chapter Configuring the Time and Date.
If you are activating a license that includes metric subscriptions, note that you can refresh the li-
cense metrics any time. For more details, refer to the section Refreshing the Metrics of a License.
1208
Managing Licenses
4. In the menu, select Tools > Import licenses. The wizard opens.
5. Read the License Agreement and click on NEXT . The page Importing licenses opens.
6. In the drop-down list Import type, choose the import method.
a. To paste the key(s) yourself, select Manual copy and, in the field License(s), paste
the license key(s). If you paste several keys, enter two line breaks between each key.
b. To look for the key(s) on your computer, select File and click on BROWSE to select the
.txt file containing the license key(s).
Note that the license you import automatically overwrites the current license on the relevant
appliance(s).
7. Click on OK to complete the operation.
Exporting Licenses
From the page All licenses, you can export the data listed in a CSV, HTML, XML, XLS or PDF
file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1209
Chapter 103. Monitoring
There are many ways of monitoring SOLIDserver, for administrators and standard users, from
the resources to the logs and SNMP profiles and more. This chapter gathers the following mon-
itoring possibilities:
• Managing Reports.
• Managing Alerts.
• Managing the Logs.
• Monitoring the Appliance Statistics.
• Monitoring from Session Tracking.
• Monitoring from User Tracking.
• Forwarding Events.
• Managing SNMP Profiles.
• Monitoring Using SNMP.
• Displaying Netstat Data.
• Sizing the Database Tables.
Note that from the page Centralized Management, you can monitor the status, hardware or li-
cense and maintenance information of an appliance, local or remote. For more details, refer to
the chapter Centralized Management.
Managing Reports
The menu Report allows to generate a number of HTML or PDF reports in the modules DHCP,
DNS, NetChange and Administration. These reports can be generated at a given time or sched-
uled, all existing reports are detailed in the section Available Reports.
Note that this menu is also available on two pages of the module IPAM where it allows to find
Identity Manager sessions, and generate a list in TXT, HTML or EXCEL format. For more details,
refer to the section Finding Active Sessions in the IPAM.
Browsing Reports
The reports you generate are available on dedicated pages, depending if you generated them
immediately or scheduled them.
The configuration details of all the scheduled reports are available on a dedicated page.
1210
Monitoring
Available Reports
The menu Report indicates on which modules and pages the reports are available, you can
generate:
• DHCP Reports,
• DNS Reports,
• NetChange Reports, or
• Administration Reports.
DHCP Reports
You can generate advanced reports for DHCP servers and scopes.
1211
Monitoring
• Description: Contains lease and request dedicated charts providing an overview of a server
usage evolution. The chart results are based on server usage a daily, monthly, semestrial and
yearly basis.
Scopes summary
• Prerequisite: Selecting at least one scope.
• Description: Provides detailed tables of the DHCP options activity and origin of the selected
scope(s). For instance, it indicates if the option was set at scope level or inherited from the
managing server.
DNS Reports
You can generate advanced reports for DNS servers, views and zones.
Route 53 incompatibilities
• Prerequisite: Selecting at least one Amazon Route 53 server.
• Description: Contains a list of all the selected server options and configurations incompatible
with Amazon Route 53. No piece of information listed in the tables can ever be replicated on
the Amazon Route 53 server you are managing via SOLIDserver.
1212
Monitoring
• Description: Contains a list of all the NS records and their corresponding IP address of all the
zones of the server. It also indicates if they were pushed to the smart architecture, that is to
say replicated on all the servers managed by the smart.
Servers configuration
• Prerequisite: Selecting at least one server.
• Description: Contains all the server configuration details divided into 4 tables: Settings (all the
options), ACLs (all the access control lists), Keys (all the DNS keys configured) and Groups
(all the group of users that have access to the server).
1213
Monitoring
• Description: Contains tables that allow to compare the selected servers configurations: DNS
server parameters, DNS server ACLs and DNS server keys.
View statistics
• Prerequisite: Selecting at least one view.
• Description: Contains two tables detailing the zones and records of every selected view. The
first table sums up the total number of zones and indicates how many of them are Forward
zones. The second table details for each zone their name, their type and the total number and
distribution of the records they contain. It focuses on A, CNAME, DNSKEY, NS, NSEC3PARAM,
PTR, SOA and TXT records.
Route 53 incompatibilities
• Prerequisite: Selecting at least one Amazon Route 53 server.
• Description: Contains a list of all the selected zone options and configurations incompatible
with Amazon Route 53. No piece of information listed in the tables can ever be replicated on
the Amazon Route 53 server you are managing via SOLIDserver.
1214
Monitoring
Zone statistics
• Prerequisite: Selecting at least one zone.
• Description: Contains a table, for each server, detailing the name, the type and the total number
and distribution of the records of the selected zones. It focuses on A, CNAME, DNSKEY, NS,
NSEC3PARAM, PTR, SOA and TXT records.
NetChange Reports
You can generate advanced reports for NetChange network devices.
1215
Monitoring
Administration Reports
From the module Administration, you can generate advanced reports for the appliance statistics
and users.
Statistics chart
• Prerequisite: No selection required. However, only users of the group admin can access the
page.
• Description: Contains all the charts available on the page System statistics. Their content de-
pends on the time of the generation.
Network traffic
• Prerequisite: No selection required. However, only users of the group admin can access the
page.
• Description: Contains charts representing all the ingoing and outgoing traffic on your network
over the last 24 hours, last 7 days, last 30 days and last 12 months.
User Reports
A report allows to export all the permissions of a user from the page Users. To generate this report,
refer to the section Generating a Report.
Generating a Report
From a set of listing and properties pages you can generate and download reports in PDF or
HTML format.
1216
Monitoring
Note that from the page System statistics, in the drop-down list SOLIDserver, you can
select your local appliance or a remote one, only if the remote appliance is in version 6.0.1
or higher.
3. In the menu, select
1
Report > <report-of-your-choice> .The corresponding wizard opens.
4. In the list Report format, select an export format, either HTML or PDF. By default, HTML
is selected.
5. Click on NEXT . The next page opens.
6. In the drop-down list Action, select Generate new data. If you already have generated a
report for the same object, the drop-down list allows to select and generate it again.
7. Click on OK to complete the operation. The report opens and closes.
8. You can click on DOWNLOAD to save the report immediately.
When the report is generated, it is available on the page Reports. For more details, refer to
the procedure To display the list of reports.
9. Click on CLOSE to go back to the page.
Scheduling a Report
The generation of reports can easily be scheduled for all types of reports through the same wizard
as for immediate generation.
1
The reports dedicated to Compare DNS data with IPAM data and Amazon Route 53 are all listed in the submenu of the same name.
1217
Monitoring
6. In the drop-down list Action, select Schedule the report. The page refreshes and displays
the scheduling fields.
7. Configure the export frequency or date and time of export using the table below.
For more details regarding scheduled reports refer to the section Managing Scheduled Reports
Configuration Files.
All the generated reports are listed on this page whether they were generated at a specific time
or scheduled.
1218
Monitoring
Managing Alerts
SOLIDserver offers a number of customization options that include the alert configuration from
any page. You can be notified of the changes of your choice (new value, status, etc.) either via
email or via an SNMP trap. Alerts provide an extra monitoring system.
Prerequisites
• To properly set an SNMP trap on an alert, make sure the SNMP and SMTP servers are properly
configured. For more details, refer to the chapters Configuring the SNMP Server and Configuring
the SMTP Relay.
• To properly set mail notifications on an alert, you need to specify a group of users or specific
mail addresses. Make sure the email addresses of the group members and/or those you spe-
cified in the wizard are valid as incorrect email addresses cannot receive alerts. Also, make
1219
Monitoring
sure the groups you specify is configured with sufficient rights to assess the situation. For more
details, refer to the chapter Managing Users.
Browsing Alerts
The Administration module contains two pages dedicated to alerts. You cannot configure the
columns display on these pages.
• The page Alerts displays the details of all the alerts that have been raised: their priority, when
they were raised and released, their current state, etc.
• The page Alerts Definition contains all the alerts configured in SOLIDserver. It displays the
configuration details of each alert, provides a link to edit the alert filters and allows to enable/dis-
able each alert.
1220
Monitoring
The alert properties page displays extra information that can be configured such as the severity,
priority, recipients of the email, etc.
To display the alerts that were dismissed or set back to monitored, refer to the procedure To
display the page Alerts.
Adding Alerts
From any page you can add alerts via the menu Alerts, gadgets & Smart Folders.
1221
Monitoring
Before adding alerts you can filter the list to customize the trigger and add the alerts that suit
your needs. So if you decide to filter the page All zones via the column Status with !=OK and
then add an alert, the alert would be triggered when any zone listed changes status to a status
different from OK and send you an email and/or an SNMP trap depending on what you configure.
To add an alert
This procedure is an example, it sends an alert if any zone status changes to anything but OK.
1. Go to the page of your choice and filter the list according to your needs.
a. In the sidebar, go to DNS > Zones. The page All zones opens.
b. In the column Server, click on the name of the server of your choice to display the zones
it contains.
c. In the search engine of the column Status, click on . The filter constructor opens.
d. In the drop-down list on the left, select != (different from).
e. In the field on the right, click on . The statuses drop-down list opens.
f. Select OK and click on APPLY . The page refreshes. The column search engine now
contains != OK and only the zones with a status different from OK are displayed.
2. In the menu, select Alerts, gadgets & Smart Folders > Add an Alert. The wizard Add
an alert definition opens.
3. In the field Name, name the alert. By default, the alert is named after the module and page
from where you configure it, in our example DNS: Zones.
4. In the field Description, you can specify a description if needed.
5. For alerts added from the DNS page Analytics displaying Guardian data, in the drop-down
list Period, select the overall period of data to retrieve, either the last 1h, 3h or 6h.
6. In the section Expert mode, tick the box to display the expert configuration fields.
7. Through the fields Filter results and Value, you can configure the alert execution parameters.
For instance, if you do not want the alert to be triggered for less than 2 zones with a status
different from OK, you can select Greater than in the drop-down list Filter results and 2 in
the field Value.
8. In the section Triggered by change, tick the box if you want your alert to match your filter
only by change. In the case of our example, if you do not tick the box and three zones already
correspond to the filter (they could be in delayed create, timeout...), the alert is triggered if,
at the next check, the zones are still not set to OK.
9. In the drop-down list Alert Priority, define the alert priority. It can be Low, Normal, High,
Urgent or Immediate.
10. In the drop-down list Alert Severity, define the alert severity. You can choose among Minor,
Major, Crash and Block.
11. In the drop-down list Alert Group Owner, select a group of users among the ones you added.
12. You can tick the box Edit scheduling to configure a specific check frequency for the alert.
By default, the check is performed every 5 minutes of every hour, every day and every month.
1222
Monitoring
13. You can tick the box Send mail to notify the users of your choice via email when the alert
definition is met. The following fields appear.
a. In the drop-down list Mailing lists, select an existing group of users. The email address
of the users of the group must be configured, otherwise they can never receive the alert
notification.
b. In the field Additional Mail, specify the target email address of the alert notification.
c. Click on ADD to move the information to the Additional Mail List. The list contains all
the recipients of the alert email.
d. Repeat these actions from as many recipients as needed.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
14. You can tick the box SNMP Trap to send a trap to the device of your choice when the alert
definition is met. The following fields appear.
15. Click on OK to complete the operation. It is now listed in the page Alerts Definition and
marked as Released.
Editing Alerts
The alerts can be edited in two different ways:
1. You can edit the alert definition: rename it, change the check frequency, add or remove email
recipients, set or remove an SNMP trap...
2. You can edit the filters that were set on the page when the alert was added.
1223
Monitoring
To enable/disable an alert
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, next to Alerts, click on Definition. The page Alerts Definition
opens.
3. Tick the alert(s) of your choice.
4. In the menu, select Edit > Enable or Disable. The wizard opens.
1224
Monitoring
5. Click on OK to complete the operation. The report opens and closes. The alert definition
State is marked as Enabled or Disabled.
From the column State, you can also directly click on Enabled or Disabled to, respectively, disable
or enable a definition.
The option Force alert update immediately checks if the selected alert is Raised or Released.
Dismissing an Alert
Once an alert was raised, you can dismiss it in order to make sure that next time it is raised you
actually only see the instances that matter and not old ones. The alert does no longer appear on
the page Alerts unless you tick the box Display All Alerts.
To dismiss an alert
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, click on Alerts. The page Alerts opens.
3. Tick the raised alert(s) that you want to dismiss.
4. In the menu, select Edit > Dismiss. The wizard Dismiss an alert opens.
5. Click on OK to complete the operation. The report opens and closes. The alert is no longer
listed.
6. Under the menu, tick the box Display All Alerts to display all the previous instances.
To monitor an alert
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, click on Alerts. The page Alerts opens.
3. Tick the raised alert(s) that you want to reinstate.
4. In the menu, select Edit > Monitor. The wizard Monitor an Alert opens.
1225
Monitoring
5. Click on OK to complete the operation. The report opens and closes. The alert is displayed
even though the box Display All Alerts is unticked.
Exporting Alerts
From the page Alerts, you can export the data listed in a CSV, HTML, XML, XLS or PDF file.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Deleting an Alert
For safety measures, you cannot delete an alert instance on its own. However, from the page
Alerts Definition, you can delete an alert completely i.e. delete its configuration details and the
instances of when it was raised.
To delete an alert
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Monitoring, next to Alerts, click on Definition. The page Alerts Definition
opens.
3. Tick the alert(s) of your choice.
4. In the menu, select Edit > Delete an Alert. The wizard Delete an alert opens.
5. Click on OK to complete the operation. The report opens and closes. The alert is no longer
listed on the pages Alerts Definition and Alerts.
Syslog
The page Syslog lists the logs of all the services executed. You can filter the list using the menu
or the columns to display a specific operation. Note that:
• You can display the logs of remote appliances from the management SOLIDserver. For more
details regarding remote management, refer to the chapter Centralized Management.
• The service ipmserver includes the cloud synchronization error messages. For more details,
refer to the chapter Managing Cloud Synchronization.
• You can export the logs in a CSV, HTML, XML, XLS or PDF file. For more details refer to the
chapter Exporting Data.
1226
Monitoring
Service Description
named The DNS log messages.
dns-firewall The log messages related to RPZ processing.
dhcpd The DHCP log messages.
ipmserver The internal transactional engine log messages.
messages All the system log messages.
auth The authentication log messages. By default, it logs failed authentications. To also
log successful authentications refer to the section Monitoring Successful Authentica-
tions.
ipmserver-rules The operations executed by rules.
gslb-check The Application log messages regarding initial health check failures and node status
changes.
5. You can tick the box Automatic refresh to automate the refresh of all the logs.
By default, the refresh is scheduled to be executed every 10 seconds. To change the refresh
frequency, refer to the section Editing Syslog Refresh Frequency.
6. You can look for specific logs by filtering the following columns:
a. From the column Time, you can sort and filter the logs based on the date and time of
the service execution. Note that you can edit the time and date format from the top bar
menu My Account > My Settings.
b. From the column Log, you can filter the logs based on the details of the operation per-
formed.
1227
Monitoring
You can redirect the logs of a particular service and severity level. The available severity levels
are listed below.
Note that selecting a log level automatically includes the logs with a higher severity, the ones
with a smaller code number. Therefore, if you select Warning (4) logs, you also redirect the Error
(3), Critical (2), Alert (1) and Emergency (0) logs.
Note that the service impserver includes the cloud synchronization error messages. For more
details, refer to the chapter Managing Cloud Synchronization.
1228
Monitoring
5. In the drop-down list Level, select the severity level of your choice. Note that any severity
other than Emergency (0) also redirects higher severity levels, the ones with a lower code.
For more details, refer to the table Syslog severity levels.
6. In the field Target server, specify the IP address and port number of the Syslog server re-
ceiving the logs following the format <ip-address>:<port-number>.
7. Click on OK to complete the operation. The report opens and closes. The page displays the
list of logs redirections.
1229
Monitoring
• Every chart displaying local data is a gadget in essence and can be displayed on any dashboard
using the dedicated pushpin. For more details, refer to the chapter Managing Gadgets.
• The charts are empty during the first appliance use, without any traffic, there is no data to dis-
play.
• You cannot use the statistics charts of a remote appliance as a gadget.
• You can export all the charts on the page, whether they display local or remote data, in specific
reports. For more details, refer to the section Appliance Statistics Reports below.
• Except for the panel Processes states, on each chart you can zoom in and out of the charts
or decide the period and data to display. For more details, refer to the section Charts.
1230
Monitoring
For more details regarding the reports and their generation, refer to the section Managing Reports.
You can export user sessions in a CSV, HTML, XML, XLS or PDF file. For more details refer to
the chapter Exporting Data.
You can also track previous sessions on the page Session history.
1231
Monitoring
Administrators can grant user access to see the changes performed by all the users, including
ipmadmin, if their group of users has the permission User Tracking Display: changes from all the
users.
To grant access to all the changes performed on the appliance to a group of users
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the sidebar, go to Users, Groups & Rights > Groups. The page Groups opens.
3. At the end of the line of the group of your choice, click on . The properties page opens.
4. In the panel Administration, click on EDIT . The wizard Edit group rights opens.
5. The Unauthorized services list displays the services that are not granted to the group.
Select User Tracking Display: changes from all the users and click on . The service is
moved to the list Authorized services.
6. Click on OK to complete the operation. The report opens and closes. The page refreshes.
In the panel, the list Permissions displays the service.
1232
Monitoring
Once the permission is granted, all the users of the group can see the operations performed by
anyone who logged in SOLIDserver on the page User tracking and in the panel Audit of the
properties page of an object.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
Forwarding Events
It is possible to forward SOLIDserver events to an external device. Administrators can forward:
• The local user events available on the page User tracking of an appliance.
• A set of security events available on the page Syslog of a local or remote appliance.
1233
Monitoring
Both forwarding methods rely on the rule 412, each method requires a unique configuration.
On any appliance, the rule allows to specify a forwarding target and to define which events to
forward.
It can also include service related filters, all services are described in the API Reference guides,
2
available on our download portal .
As SOLIDserver can generate many event logs, we recommend that you set a granular for-
warding policy. Otherwise, you may overload the target device or reduce your appliance per-
formances.
• The rule can only forward events if the external device is responding.
If the external device you configure is in timeout, the event forwarding stops.
If the external device returns an error, the event is not forwarded, the next event is forwarded
instead.
2
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
1234
Monitoring
Once you added the rule, you can tick it to disable it to stop forwarding events. You can enable
it again later. Note that you can monitor any forwarding errors from the page Syslog.
14. In the field Retention, specify a retention period threshold, in hours. Every event log older
than the period you specify is not forwarded.
1235
Monitoring
15. In the field Max. number of events, you can specify the maximum number of event logs to
include in the forwarding message. If there are more events matching the Log level and
Forward policy you set, several messages are sent. By default, the field is empty.
16. In the field Forward policy, specify the events that you want to forward, in JSON format.
The policy defines the forwarding configuration and payload.
The expected format depends on the method set in the Target URI. You can find a few ex-
amples after the procedure.
a. If you forward events via HTTP or HTTPS, specify the policy following the format:
[{
"source": "user_tracking",
"filter": {
},
"method": "<HTTP VERB>",
"query": "<URI query>",
"headers": [
<list of HTTP headers>
],
"content": "<your payload>"
}]
Note that:
• Any module specified in the filter must respect the expected module name in the
policy filter.
• If you do not specify a content, all event details are forwarded, including class para-
meters.You can find these details in the column Description of the page User tracking.
b. If you forward events via Redis, specify the policy following the format:
[{
"source": "user_tracking",
"filter": {
<filters of your choice>
},
"command": "<PUBLISH|RPUSH|LPUSH> <channel>",
"content": "<your payload>"
}]
Note that:
• Any module specified in the filter must respect the expected module name in the
policy filter.
• If you do not specify a content, all event details are forwarded, including class para-
meters.You can find these details in the column Description of the page User tracking.
17. Click on OK to complete the operation. The report opens and closes. The rule is listed.
Here below are some Forward policy examples dedicated to addition, edition and deletion events,
via HTTP(S) and Redis.
Example of a Forward policy for DNS addition events via HTTP(S)
[{
"source": "user_tracking",
"filter": {
"Event_Type": "ADD",
"Event_Name": "dns.*"
},
"method": "POST",
"headers": [
{"Content-Type": "application/json"},
}]
1236
Monitoring
Example of a Forward policy for DNS server edition events via HTTP(S)
[{
"source": "user_tracking",
"filter": {
"Event_Type": "EDIT",
"Event_Name": "dns_.*"
},
"method": "POST",
"headers": [
{"Content-Type": "application/json"},
{"Custom-Header": "<your-forwarded-log-header>"}],
"content":"{\"ACTION\":${event_type},\"DNS SERVER NAME\":${params[dns_name]}"
}
All DNS editions events are analyzed, but with this content the forwarded message only in-
cludes the name of the DNS server.
Example of a Forward policy for DNS zone deletion events via HTTP(S)
[{
"source": "user_tracking",
"filter": {
"Event_Type": "DELETE",
"Event_Name": "^dns_zone.*"
},
"method": "POST",
"headers": [
{"Content-Type": "application/json"},
}]
Example of a formatted Forward policy for all DNS record event types via HTTP(S)
[{
"source": "user_tracking",
"filter": {
"Event_Type": ".*",
"Event_Name": "dns_rr_.*"
},
"method": "POST",
"headers": [{
"Content-Type": "application/json"
}],
"content": "{\"RR event\": \"$raw{usr_login} $raw{event_type} RR
$raw{params[rr_full_name_utf]} $raw{params[rr_type]} $raw{params[value1]} \" }"
}]
1237
Monitoring
Example of a Forward policy for IPv6 block-type network and space deletion events via
Redis
[{
"source": "user_tracking",
"filter": {
"Event_Type": "DELETE",
"Event_Name": "ip6.*"
},
"command": "PUBLISH 2",
"content":"{\"ACTION\":${event_type},\"BLOCK NAME\":${params[subnet6_name]},\"SPACE
NAME\":${params[site_name]}"
}]
All IPv6 block-type networks deletion events are analyzed, but with this content the forwarded
message only includes the name of deleted block-type networks and spaces.
Example of a formatted Forward policy for all DNS record event types via Redis
[{
"source": "user_tracking",
"filter": {
"Event_Type": ".*",
"Event_Name": "dns_rr_.*"
},
"command": "PUBLISH 2",
"content":"{\"RR event\": \"$raw{usr_login} $raw{event_type} RR
$raw{params[rr_full_name_utf]} $raw{params[rr_type]} $raw{params[value1]} \" }"
}]
Unlike the forwarding of user tracking events, security events can be forwarded from local and/or
remote appliances.
The procedures below depend on each appliance role, available on the page Centralized Man-
agement:
• Standalone appliances are not managing or managed by another appliance.
• Management appliances remotely manage other appliances.
• Master appliances manage a Hot Standby appliance in a High Availability configuration
1238
Monitoring
1239
Monitoring
a. In the menu, select Tools > Configure local SOLIDserver. The wizard Configure
local SOLIDserver opens.
b. In the drop-down list SOLIDserver IP address, select the IP address of the appliance.
c. Click on OK to complete the operation. The report opens and closes. On the page
Centralized Management, the local appliance details are now complete. Its Role is
Standalone and its Status OK.
5. Tick the appliance(s) of your choice.
If you connected to a Standalone appliance, you must tick your local appliance.
If you connected to a Master appliance, you can select the Master appliance and/or the Hot
Standby appliance.
If you connected to a Management appliance, you can select the local appliance and/or any
remote appliance.
6. In the menu, select Tools > Security events collection > Enable. The wizard Enable
security events collection opens.
7. Click on OK to complete the operation.
To edit the retrieval frequency of the rule 421 that collects security events
Only users of the group admin can perform this operation.
1. Connect to a Standalone, Master or Management appliance.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Expert, click on Rules. The page Rules opens.
4. In the column Rule #, type in 421 and hit Enter. The rule is the only one listed.
5. In the column Status, make sure the rule is OK, it means that it is enabled.
6. Right-click over the rule Description, the contextual menu opens.
7. Click in Edit. The wizard Edit a rule opens.
8. Click on NEXT . The page Rule filters opens. These filters define when the rule is executed.
9. Edit the rule frequency according to your needs.
By default, all the lists are empty, the rule is executed every minute.
1240
Monitoring
Field Description
Date of the month A specific day of the month or every day. This field is optional.
Month A specific month or every month. This field is optional.
Hour A specific hour, a set of hours, every hour, or every hour over a specific period. The
hour respects the UTC standard. This field is optional.
Minute A moment of the hour (00, 15, 30 or 45) or a frequency. The minute respects the UTC
standard. This field is optional.
10. Click on OK to complete the operation. The report opens and closes. The rule Filter is up-
dated.
Once you added the rule, you can tick it to disable it to stop forwarding events. You can enable
it again later. Note that you can monitor any forwarding errors from the page Syslog.
1241
Monitoring
8. In the field Rule name, name the rule. That name is then listed in the column Instance.
9. In the field Comment, you can specify a comment.
10. Click on NEXT . The page Rule filters opens. These filters define when the rule is executed.
11. Edit the rule frequency according to your needs.
By default, all the lists are empty, the rule is executed every minute.
15. In the field Retention, specify a retention period threshold, in hours. Every event log older
than the period you specify is not forwarded.
16. In the field Max. number of events, you can specify the maximum number of event logs to
include in the forwarding message. If there are more events matching the Log level and
Forward policy you set, several messages are sent. By default, the field is empty.
17. In the field Forward policy, specify the security events that you want to forward, in JSON
format. The policy defines the forwarding configuration and payload.
The expected format depends on the method set in the Target URI.
a. To forward security events via HTTP or HTTPS, specify the policy following the format:
[{
"source": "security_events",
"filter": {
"Event_Type": "sshd.*",
"Event_Name": ".*"
},
"method": "POST",
"headers": [
{"Content-Type": "application/json"},
1242
Monitoring
{"Custom-Header": "<your-forwarded-log-header>"}],
"content":"{\"<custom-name1>\":${<variable>},\"<custom-name2>\":${<variable>}"
}]
where:
• security_events indicates that only security events are forwarded. If the appliance
is not properly configured, no events are forwarded.
• Event_Type can contain a process or a keyword matching any Event watcher log
received.
• content is the policy payload, it is optional. If you include a payload, it can contain
one or several log variables separated by , (a comma).
Each <variable> can be preceded by the text of your choice a <custom-name>.
The accepted variables are:
b. To forward security events via Redis, specify the policy following the format:
[{
"source": "security_events",
"filter": {
"Event_Type": ".*",
"Event_Name": ".*"
},
"command": "PUBLISH 1"
"content":"{\"<custom-name1>\":${<variable>},\"<custom-name2>\":${<variable>}"
}]
These profiles can only be used if, on the page Services configuration, the service SNMP server
is configured and enabled. For more details, refer to sections Handling Services and Configuring
the SNMP Server.
By default, the profiles standard v1, standard v2c and standard v3 are available. To edit them,
refer to the section Editing an SNMP Profile.
1243
Monitoring
10. Click on OK to complete the operation. The profile is listed in the panel.
1244
Monitoring
Combined with an effective alerting system, it allows to gather and store metrics about key system
health indicators to analyze and correlate information. Based on that data, you can intervene in
case of malfunction, define alert triggers and set up automatic actions that prevent an overall
failure of the system.
3
You can monitor these metrics through an external solution such as Nagios as well as some
related plug-ins.
Once your system is properly configured, you can set various SNMP alerts on SOLIDserver objects
to be notified of any unusual behavior. For more details, refer to the chapter Managing Alerts.
3
https://www.nagios.org
4
At https://downloads.efficientip.com/support/downloads/MIBs/, log in using your credentials. If you do not have credentials yet, request
them at www.efficientip.com/support-access.
1245
Monitoring
For more details regarding the available metrics, refer to the appendix SNMP Metrics.
1246
Monitoring
Users of the group admin can edit the rule to change the database vacuuming frequency. You
should only edit this rule if a member of an EfficientIP technical team specifically asked
for it.
1247
Chapter 104. Maintenance
SOLIDserver needs to be properly maintained over time to run smoothly and reach its maximum
performance. This chapter details the pages and options that allow administrators to manage
local files, troubleshoot SOLIDserver or even enable the Maintenance mode.
All the files are separated among 6 subpages: Local, TFTP, Logs, Config files, Custom images
and Custom WSDL. From each of these pages, you can upload, download and delete local files.
For more details, refer to the section Managing Local Files below.
All subpages, except Custom WSDL, share a common set of columns but contains specific files.
1248
Maintenance
1249
Maintenance
Clicking on a WSDL file allows to display all the services it contains. For more details, refer to
the section Managing WSDL Files.
The page Custom WSDL contains a set of specific options detailed in the section Managing
WSDL Files.
Uploading Files
From the pages Local, TFTP and Custom images you can upload files. This upload updates the
appliance local database from the GUI.
Downloading Files
Any file listed on the Local Files Listing can be downloaded to your local computer from the GUI.
Deleting Files
From any page of the Local files Listing you can delete files from the appliance local database.
1250
Maintenance
6. Click on OK to complete the operation. The report opens and closes. The file is no longer
listed.
By default a full WSDL file including all the services is available (https://<ip_address>/inter-
faces/wsdl_eip_full.wsdl). Keep in mind that using wsdl_eip_full.wsdl drastically reduces the
performances of the application you develop because it parses all SOLIDserver services one
after the other every time you use it. Therefore, we recommend creating your own files to only
contain the information relevant to the required services.
You can add, edit, dump and delete WSDL files from the page Custom WSDL of the Local files
listing.
1251
Maintenance
9. Click on OK to complete the operation. The report opens and closes. The file is listed on the
page and saved in the directory custom_wsdl. To display the list of services it contains refer
to the next procedure.
10. To use the services listed in the WSDL file, you must integrate the file location to your source
code using its absolute address within SOLIDserver database: https://<ip_address>/inter-
faces/custom_wsdl/<your-WSDL-file-name>.wsdl.
The services that you configured in the file are all listed on a dedicated page.
1252
Maintenance
b. In the drop-down list WSDL EndPoint, you can edit the EndPoint. By default, the current
Endpoint is selected.
9. Click on OK to complete the operation. The report opens and closes. The new services are
listed. If you edited the Endpoint, its new value is visible.
If you ticked the box Dump WSDL file(s), the file Status is Dumped and can be used imme-
diately, the changes are saved.
If you did not tick the box Dump WSDL file(s), the file Status is Modified since dump and
you must dump it to take into account your changes. For more details, refer to the section
Dumping an Edited Custom WSDL File.
If you edited the Endpoint, its new value is visible.
10. To go back, above the list tick the radio button Custom WSDL. The page opens.
1253
Maintenance
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Maintenance, click on Local files listing. The page Local files listing opens.
3. Above the menu, tick the radio button Custom WSDL. The page opens.
4. Tick the file(s) of your choice.
5. In the menu, select Tools > Dump WSDL File(s). The wizard Dump WSDL file(s) opens.
6. If you want to change the EndPoint:
a. Tick the box Dump WSDL file(s). The field WSDL Endpoint appears.
b. In the drop-down list WSDL EndPoint, you can edit the EndPoint. By default, the current
Endpoint is selected.
7. Click on OK to complete the operation. The report opens and closes. The file(s) Status is
marked Dumped.
If you edited the Endpoint, its new value is visible.
1254
Maintenance
1255
Maintenance
3. Click on OK to complete the operation. The report opens and closes. Any internal modification
of the code has been taken into account.
Troubleshooting
Troubleshooting is a logical and systematic search for the source of a problem. It is needed to
develop and maintain complex systems where symptoms can have many possible causes.
Before Troubleshooting
There is set of simple checks that might help you avoid troubleshooting. These checks are often
overlooked in times of functional problems when they should be an administrator reflex.
1. Make sure that the appliance and the objects it manages are set at the same time. If they
are not, set the appliance time.
Typically, if your appliances and the servers it manages are not the same time, you can en-
counter management problems: the DHCP should be the first impacted with the leases and
then the DNS, especially if you set time check keys for the zones. We recommend that you
configure NTP servers on the appliance as detailed in the section Configuring NTP Servers.
Besides, we strongly advise against setting the time through CLI because it might make
SOLIDserver crash, disrupt your services, trigger errors in the logs, etc. If you do it anyway,
restart SOLIDserver to make sure that all the services impacted by the time change are restarted
and all set at the same time.
2. Make sure there is no Multi-Management of your DNS and DHCP physical servers.
Through the smart architectures, you can manage the servers of your choice so make sure
you did not add and manage twice the same server in two different smart architectures. Every
minute the smart architecture checks that its configuration is pushed to the physical server, if
not it pushes it again. So if one physical server is managed through two different architectures
every minute a configuration is pushed and then overwritten by the other smart architecture.
Troubleshooting Guidelines
Determining what might be the causes of a dysfunction is often a process of elimination.
Troubleshooting also requires confirmation that the solution restores the system to its working
state.
The following guidelines give a generic overview of troubleshooting, and since each case is dif-
ferent, you might need to vary your approach to the problem.
1256
Maintenance
6. Check if the issue is not due to the customer background, i.e. the customer's use of the
services, operating system, network topology components and levels of software that were
running when the incident occurred.
7. Check the product logs. Do not hesitate to check the DNS logs, DHCP logs, PostgreSQL
logs, the management logs as well as the system logs. For more details, refer to the section
Syslog.
8. Check the system logs. Do not hesitate to check the sysaudit.log file, available on the
Local Files Listing page. For more details, refer to the section Managing Files from the Local
Files Listing.
9. Use the troubleshooting tools described in the section below.
10. Check for any improvement until the complete restoration of the system after every
step in the troubleshooting process.
If the problem remains, do not hesitate to contact the support team with all the information you
have collected. The set of files needed include: the network capture file, the troubleshooting dump
file and the last system backup.
Troubleshooting Tools
SOLIDserver provides users of the group admin with two ways of analyzing the system in case
of a crash:
• The Network Capture, that indicates the DHCP or DNS traffic on a given duration.
• The Troubleshooting Dump, that allows to retrieve key debug information.
Network Capture
Performing a network capture allows to analyze DHCP and DNS traffic packets for a given period
of time, through the interface, port and via the protocol of your choice.
The retrieved data is saved in a .pcap archive file available on the page Local files listing.
4. In the drop-down list Interface, select the name of the network interface for which you want
to capture packets. The available interfaces depend on what is set on the page Network
configuration. For more details, refer to the chapter Configuring the Network.
5. In the field Port, you can specify or edit the port number.
1257
Maintenance
6. In the field IP address, you can specify the IP address of your choice.
7. In the drop-down list Protocol, select either Any, udp or tcp. By default Any is selected, to
use both protocols.
8. In the drop-down list Duration, select the network capture duration, either 10s, 30s, 1mn,
2mn or 5mn.
9. Click on OK to complete the operation. The report opens and closes. The generated .pcap
file is available on the page Local files listing, accessible from the section Maintenance.
Troubleshooting Dump
The troubleshooting dump is a file containing debug data regarding DNS, DHCP and/or system,
as well as any extra file you consider relevant to troubleshoot the appliance.
Dumping troubleshooting details generates a .tbz archive file containing all the debug information.
This file is available on the page Local files listing.
The backup process can either be scheduled or triggered on demand. Note that:
• SOLIDserver automatically generates a new backup before each upgrade to allow revert-
ing back its data and configuration.
• The backup files are stored on the appliance itself, but you can also decide to store the backup
files on a remote FTP server or SFTP server. For ease of use and to prevent confusion, binaries,
system and log files are not included in the backup stored on the appliance. Still, they can be
restored separately, either when you reinstall SOLIDserver or when you update the system.
1258
Maintenance
• You can archive backup files on a remote server, as detailed in the section Archiving the Backup
Files on an FTP or SFTP Server.
• During the restoration of DNS zones managed via a smart architecture, you can chose to keep
the latest version of the records they contain, or discard the record latest changes. For more
details, refer to the section Restoring a Backup File.
1259
Maintenance
If you activated the database encryption on your appliance, you should download your database
keys, or at least the Active one. That way, if you need to restore the backup, you can import the
key(s) when the restoration is over. For more details, refer to the section Downloading Database
Keys in the chapter Securing.
Keep in mind that creating an instant backup during the enrollment of a Hot Standby appliance
in High Availability may trigger an error.
Once generated, you can download your backup if need be. For more details, refer to the section
Downloading a Backup File.
Editing the backup settings can maximize the disk space of your appliance if you schedule a
backup rotation, the automatic deletion of obsolete backup files.
Keep in mind, that if you activated database encryption on your appliance, you should download
your database keys, or at least the Active one. That way, if you need to restore a backup, you
can import the keys when the restoration is over. For more details, refer to the section Downloading
Database Keys in the chapter Securing.
1260
Maintenance
3. Under the menu, in the drop-down list SOLIDserver, select the local appliance or a remote
appliance.
4. In the menu, select Edit > Local backup files. The wizard Archive backup parameters
opens.
5. In the drop-down list Hour of backup (SOLIDserver system time), select at what time you
want to generate the daily backup. By default, it set to 1:00.
6. To only save the database, configuration files and certificates, and avoid generating a large
backup file, you can tick any of the following boxes:
• Exclude all the reports, i.e. all the performed operations of the window Notifications in
the top bar.
• Exclude all the files from the directory "tftpboot".
• Exclude all the files from the directory "users". By default, this box is ticked.
7. In the drop-down list Retention, select the number of days beyond which a backup should
be automatically deleted.
8. Click on OK to complete the operation.
1261
Maintenance
Field Description
Remote login The login of the account used to connect to the FTP or SFTP server. If you selected
SFTP, the remote login is required.
Remote password If you selected Active FTP or Passive FTP, the password of the account used to
connect to the FTP server.
DNS
DNS firewall (RPZ)
Tick any of these boxes to save the corresponding logs on the remote server.
DHCP
System
Retention The number of days, from 4 days to Unlimited, beyond which a backup should be
automatically deleted from the FTP server. By default, 4 days is selected.
7. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the panel Remote archive displays the configuration you just set.
8. If you selected SFTP, the panel SSH local key displays the SSH public key used. You must
COPY it and paste it on the SFTP server to secure the communication with SOLIDserver.
1262
Maintenance
1263
Maintenance
Therefore, if you added, edited or deleted objects since the backup was saved, all changes
are lost and may even not be visible in the GUI. Before restoring a backup, make sure you
saved it when the Application or Guardian database was up-to-date.
• If you activated the database encryption you must ensure you downloaded the database
keys, as you need to import them after you restore your backup. For more details, refer to the
section Downloading Database Keys in the chapter Securing.
If you restored a backup on an appliance where the encryption database is activated, a banner
above the top bar notifies you to import your database keys again. You must import them to
synchronize the DHCP and DNS services and enable NetChange discoveries again. For more
details refer to the section Importing Database Keys in the chapter Securing.
Note that once SOLIDserver operating system is stopped, the power supplies are automatically
turned off.
Rebooting SOLIDserver
There are two ways of rebooting SOLIDserver safely, from the GUI and via CLI.
Note that only users with sufficient rights can reboot SOLIDserver.
1264
Maintenance
Note that only users with sufficient rights can reboot SOLIDserver software, however you
can also shut down an appliance from the hardware itself.
1265
Maintenance
1266
Maintenance
It must be done as a last resort if it is impossible from the GUI or via CLI, note that shutting
down the hardware appliance also shuts down the software.
1267
Chapter 105. Securing
To secure SOLIDserver, administrators can use SSL certificates to secure access to appliances
and/or encrypt all sensitive data. This chapter gathers the following:
• Managing SSL Certificates.
• Encrypting the Database.
By default, each appliance uses a self-signed certificate to secure connections. As this certificate
is not trusted by your web browser, warning messages appear to inform you that the certificate
is not from a trusted certifying authority, that its hostname is invalid, etc. This connection can be
prone to a man-in-the-middle (MITM) attack.
When you receive such warnings, you can accept the certificate for the current session and save
it in the certificate store of your browser.
To eliminate the warning messages altogether, you can import or create a valid SSL certificate
and use this one instead of the default one to secure connections.
For more details on how to change the SSL certificate that authenticates the connections to the
appliance, refer to the section Changing the HTTPS Certificate in the chapter Configuring the
Services.
Note that the public key of each certificate is not listed, it is available on the certificate properties
pages.
1268
Securing
2. In the section Authentication & Security, click on Certificates and keys. The page All
certificates opens.
The properties page contains the panels Certificate, Private key and/or Public key. Any configured
Subject Alternative Name is available in the panel Certificate.
The content of every panel can be downloaded, for more details refer to section Downloading
SSL objects.
Note that you cannot edit SSL objects. If you import the wrong object, you can only delete it and
perform the import again for the right one. For more details, refer to the section Deleting SSL
Objects.
Importing Certificates
You can import as many self-signed certificates and CA signed certificates as you need. The
import wizard allows to paste in the certificate details, including any Subject Alternative Names,
and its private key.
To import a certificate
Only users of the group admin can perform this operation.
1269
Securing
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Authentication & Security, click on Certificates and keys. The page All
certificates opens.
3. In the menu, select Import > Certificate. The wizard Import an SSL object opens.
4. In the field Name, name the certificate.
5. In the drop-down list Type, select Certificate.
6. In the field Certificate, paste in the certificate, in PEM format.
7. In the field Private key, paste in its private key.
8. Click on OK to complete the operation. The report opens and closes. The certificate is listed,
its private key is available on the certificate properties page.
Once you imported a valid certificate, if it is not a CA certificate, you can use it as HTTPS certi-
ficate for your local appliance. For more details, refer to the section Changing the HTTPS Certi-
ficate.
If you are configuring the module Identity Manager, once you imported the SSL certificate and
the CA certificate, you must configure the service Windows Event Collector as detailed in the
section Configuring SOLIDserver.
If you imported a CA certificate, you must enable two registry database keys to validate the cer-
tificate used during the SSL communications between SOLIDserver appliances.
Once you imported a valid CA certificate and enabled the registry database entries, you can use
it as HTTPS certificate for your local appliance. For more details, refer to the section Changing
the HTTPS Certificate.
1270
Securing
Importing CSRs
You can import as many Certificate Signing Requests (CSR) as you need. The import wizard
allows to paste in the certificate details, including any Subject Alternative Names, and its private
key.
To import a CSR
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Authentication & Security, click on Certificates and keys. The page All
certificates opens.
3. In the menu, select Import > Certificate. The wizard Import an SSL object opens.
4. In the field Name, name the CSR.
5. In the drop-down list Type, select Certificate Signing Request. The page refreshes.
6. In the field Certificate, paste in the certificate, in PEM format.
7. In the field Private key, paste in its private key.
8. Click on OK to complete the operation. The report opens and closes. The CSR is listed, its
private key is available on the CSR properties page.
If you imported a private key, you can use it to create a certificate or a CSR. For more details,
refer to the section Creating Self-signed Certificates or Creating CSRs.
1271
Securing
• CSRs (Certificate Signing Request), in PEM format. During the creation you can generate a
private key or use an existing one. For more details, refer to the section Creating CSRs.
• Private keys, as detailed in the section Creating Private Keys.
Note that you cannot edit SSL objects. If you create a misconfigured object, you can only delete
it and create it again. For more details, refer to the section Deleting SSL Objects.
As each certificate is unique to a SOLIDserver appliance, you can configure it with Subject Altern-
ative Names for all the DNS names and IP addresses of the appliance.
The certificate creation wizard allows to either configure and generate the certificate private key
or use an existing private key. For more details on private keys import or creation, refer to the
sections Importing Private Keys and Creating Private Keys.
1272
Securing
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
• To delete an entry from the list, select it and click on DELETE .
• To discard changes, click on CANCEL .
e. Repeat these operations for all the DNS names and IP addresses of the appliance.
13. Click on OK to complete the operation. The report opens and closes. The certificate is listed,
its private key is available on the certificate properties page.
Once you created a valid certificate, you can use it as HTTPS certificate for your local appli-
ance. For more details, refer to the section Changing the HTTPS Certificate.
1273
Securing
e. Repeat these operations for all the DNS names and IP addresses of the appliance.
13. Click on OK to complete the operation. The report opens and closes. The certificate is listed.
Once you created a valid certificate, you can use it as HTTPS certificate for your local appli-
ance. For more details, refer to the section Changing the HTTPS Certificate.
Creating CSRs
From the page All certificates, you can create as many Certificate Signing Requests (CSR) files
as you need. The CSR details can be sent to the Certificate Authority that generates your certi-
ficate. Then you must import the certificate you receive, as detailed in the section Importing
Certificates.
As a CSR is used to generated a unique certificate for a SOLIDserver appliance, you can configure
it with Subject Alternative Names for all the DNS names and IP addresses of the appliance.
The CSR creation wizard allows to either configure and generate the certificate private key or
use an existing private key. For more details on private keys import or creation, refer to the sections
Importing Private Keys and Creating Private Keys.
To create a CSR
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Authentication & Security, click on Certificates and keys. The page All
certificates opens.
3. In the menu, click on Add. The wizard Create an SSL object opens.
4. In the field Object Name, name the CSR.
5. In the drop-down list SSL File Type, select CSR File. The page refreshes.
6. In the drop-down list Encryption type, RSA is displayed in read-only.
7. In the field Encryption, specify the value of your choice. By default, 2048 is displayed.
8. Click on NEXT . The last page opens.
9. Configure the file details:
a. In the field Country Code, specify the two letter code of your country.
b. In the field State or Province, specify the state, province or region name in full letters.
c. In the field Locality, specify the city name.
d. In the field Organization Name, specify your company name.
e. In the field Organization Unit Name, specify the name of the department of the final
user.
f. In the field Common Name, specify the appliance hostname.
g. In the field Email address, specify your email address.
10. You can configure Subject Alternative Names for the appliance:
a. In the drop-down list Type, select DNS or IP. The page refreshes.
b. In the field Value, specify the DNS name (hostname) or the IP address of the appliance.
c. In the field Subject Alternative Name, the Type and Value are displayed.
d. Click on ADD . The Subject Alternative Name is moved to the list Subject Alternative
Names.
• To update an entry in the list, select it. It is displayed in the field(s) again. Edit the
field(s) and click on UPDATE .
1274
Securing
1275
Securing
Once you created a CSR, you can go to its properties page to download the content of the
panel Certificate and send it to the Certificate Authority. For more details, refer to the section
Downloading SSL objects.
Private keys can be used to create certificates or CSRs. For more details, refer to the sections
Creating Self-signed Certificates and Creating CSRs.
Note that the panel Certificate is displayed in PEM format and includes all the configured Subject
Alternative Names.
1276
Securing
By default, only on fresh installations, a database key is available on the page. You can sort and
filter all the columns on the page but you cannot change their layout.
The panel Database key displays all the properties of the key and allows to download it.
1277
Securing
! Active (missing) The key should be active but is missing from the key file. The database is not encryp-
ted. To activate the database encryption, you must import the key. For more details,
refer to the section Importing Database Keys.
Inactive The key is inactive and saved, it can be used to encrypt the database. For more
details, refer to the section Activating the Database Encryption.
! Inactive (missing) The key is inactive and missing from the key file. It cannot be used to encrypt the
database. If you want to use it to encrypt the database, you must import the key. For
more details, refer to the section Importing Database Keys.
! Inactive (unsaved) The key is inactive and unsaved, it cannot be used to encrypt the database. This is
the default status of all the keys you add. If you want to use the key to encrypt the
database, you must download it. For more details, refer to the section Downloading
Database Keys or Activating the Database Encryption.
1278
Securing
If a banner above the top bar notifies you of any activation error, refer to the section
Troubleshooting the Database Encryption.
Once the database encryption is active, you can use a different database key to encrypt sensitive
data. Note that, in the procedure below, we tick the key that replaces the current active one, but
you can also execute the option Activate encryption without ticking any key and select it on the
last page of the wizard.
1279
Securing
Importing keys is useful if you already have database keys that can be used to encrypt sensitive
data, if the key used to encrypt the database has the Status Active (missing) or after restoring a
backup.
Note that if you configured appliances in High Availability, the Hot Standby automatically replicates
the database keys of the Master.
It is recommended to download the relevant keys before you generate a backup or before upgrad-
ing the appliance.
1280
Securing
1281
Securing
If the active key is missing but you did not download your database keys
The encryption is deactivated but all sensitive data has been encrypted and you can no longer
decrypt it. You need to decide if you want to encrypt the database again or if you want to
deactivate the encryption. The procedure differs if you are troubleshooting a Standalone
appliance or appliances in High Availability.
For Standalone appliances:
• To encrypt the database again, you must:
1. Specify again the password of all servers, appliances, and relevant profiles of your ap-
pliance to decrypt them:
If you manage DHCP servers, DNS servers and/or remote appliances, their status is
Invalid credentials. You must specify again the "Admin" account password of each
server and appliance. For more details, refer to the section Editing DHCP Servers,
Editing DNS Servers and Editing Remote Appliances.
If you have SNMPv3 profiles and/or network devices connection profiles, you must edit
each one of them and specify again the password and access parameters. For more
details, refer to the section Editing an SNMP Profile and Editing Connection Profiles.
2. Add a new database key and activate it. For more details, refer to the sections Adding
Database Keys and Activating the Database Encryption.
• To stop encrypting the database, you must:
1. Specify again the password of all servers, appliances, and relevant profiles of your ap-
pliance to decrypt them:
If you manage DHCP servers, DNS servers and/or remote appliances, their status is
Invalid credentials. You must specify again the "Admin" account password of each
server and appliance. For more details, refer to the section Editing DHCP Servers,
Editing DNS Servers and Editing Remote Appliances.
If you have SNMPv3 profiles and/or network devices connection profiles, you must edit
each one of them and specify again the password and access parameters. For more
details, refer to the section Editing an SNMP Profile and Editing Connection Profiles.
2. Deactivate the database encryption. For more details, refer to the section Deactivating
the Database Encryption.
3. You can delete the database keys. For more details, refer to the section Deleting
Database Keys.
For appliances configured in High Availability:
• To encrypt the database again on both appliances, you must:
1. Disable the High Availability as detailed in the section Disabling the High Availability
Configuration.
2. Specify again the password of all servers, remote appliances, and relevant profiles of
your Master appliance to decrypt them:
If you manage DHCP servers, DNS servers and/or remote appliances, their status is
Invalid credentials. You must specify again the "Admin" account password of each
server and appliance. For more details, refer to the section Editing DHCP Servers,
Editing DNS Servers and Editing Remote Appliances.
If you have SNMPv3 profiles and/or network devices connection profiles, you must edit
each one of them and specify again the password and access parameters. For more
details, refer to the section Editing an SNMP Profile and Editing Connection Profiles.
3. Add a new database key on the Master appliance and activate it. For more details, refer
to the sections Adding Database Keys and Activating the Database Encryption.
4. Add and enroll again the Hot Standby appliance. For more details, refer to the sections
Adding Remote Appliances and Configuring Two Appliances in High Availability.
1282
Securing
1283
Chapter 106. Configuring Space
Synchronization
SOLIDserver appliances can locally synchronize the space of an external appliance.
Via two dedicated rules, administrators can first expose a space on one appliance and then
synchronize this space from another appliance. This configuration allows to display in read-only
a remote space and its content in the module IPAM.
SOLIDserver1.mycorp.com SOLIDserver2.mycorp.com
SUPPLIERS STAFF
EUROPE R&D
CLIENTS
CLIENTS
(EXTERNAL)
Prerequisites
• Having at least two SOLIDserver appliances configured with the appropriate rule.
• Making sure the appliances can communicate via HTTPS through the TCP port 443.
Limitations
• You can only synchronize IPv4 data.
• You can only expose one space per appliance. The exposed space can be synchronized on
as many appliances as you need.
• You cannot expose a space belonging to a VLSM organization.
1284
Configuring Space Synchronization
Exposing a Space
To allow other appliances to synchronize one of the local spaces, you must expose it.
Adding the rule 300 allows to specify which space is exposed and lets other appliances synchronize
all its data. Note that:
• One appliance can only expose one space.
• You cannot add several instances of the rule on one appliance.
• You can synchronize the exposed space on as many appliances as you need.
After adding the rule, you must complete the configuration by granting the exposing right to one
of your groups of users.
11. Click on NEXT . The page Expose a space to external IPAM(s) opens.
12. In the drop-down list Space, select the space of your choice. Note that you cannot expose
several spaces or a space belonging to a VLSM organization.
13. Click on OK to complete the operation. The report opens and closes. The rule is listed.
Once you added the rule, you must grant the exposing right to at least one local group of users.
The credentials of any user of that group are required to configure the synchronization of the
exposed space on external appliances. Therefore you must:
1. Go to the module Administration and open the page Groups.
1285
Configuring Space Synchronization
2. Add or edit a group of users to grant it the right Expose: a local space to external SOLIDservers.
For more details, refer to the section Configuring the Rights of a Group of Users in the chapter
Managing Groups.
When the appliance exposing a space is configured, you must synchronize it from another appli-
ance.
Adding the rule 301 allows to identify an appliance exposing a space. Once configured with the
proper credentials, it automatically synchronizes the data of the exposed space.
Note that you can synchronize the exposed space of several appliances. Therefore, you can add
several instances of the rule as long as they each synchronize the spaces of different appliances.
To add the rule 301 that synchronizes the exposed space of another appliance
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Rules. The page Rules opens.
3. In the menu, click on Add. The wizard Add a rule opens.
4. In the drop-down list Module, select Administration.
5. In the drop-down list Event, select Execution of a scheduled rule.
6. In the list Rule, select (301) Synchronize an exposed IPAM space.
7. In the field Rule name, name the rule. We recommend naming the rule after the space you
want to retrieve. That name is then listed in the column Instance.
8. In the field Comment, you can specify a comment.
9. Click on NEXT . The page Rule filters opens.
10. Edit the rule frequency according to your needs.
This allows to set the synchronization frequency, we recommend setting it to at least every
hour.
If you leave the fields empty, the rule is not executed.
11. Click on NEXT . The page Synchronize an exposed IPAM space opens.
12. In the field Remote SOLIDserver, specify the IP address or FQDN of an appliance exposing
a space.
13. In the field Remote login, specify the login of a user granted the right Expose: a local space
to external SOLIDservers.
1286
Configuring Space Synchronization
Now that you have synchronized an exposed space, you must complete the configuration.
Note that:
1287
Configuring Space Synchronization
• Adding synchronized spaces to the resources of a group does not grant them any right, it allows
them to see the space and its content in the IPAM.
• Only users of the group admin should be able to edit synchronized spaces and their content.
They should be in read-only for everyone else.
Note that:
• The rule 300 that exposes a space should not be disabled or deleted on its own. Disabling
or deleting it breaks the synchronization, therefore you should also disable or delete the cor-
responding instance of the rule 301, and stop the synchronization on the relevant appliance(s).
• The rule 301 that synchronizes an external space can be disabled or deleted on its own.
Disabling or deleting it does not impact the synchronization configured on other appliances.
To disable a rule
Only users of the group admin can perform this operation.
1. Connect to the appliance on which you configured the rule you want to disable.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Expert, click on Rules. The page Rules opens.
4. Filter the list through the column Rule # and hit Enter. Only the matching rules are listed.
5. Tick the rule of your choice.
1288
Configuring Space Synchronization
To enable a rule again, follow the procedure above and select Enable. In the column Status,
the rule is marked Enabled.
To delete a rule
Only users of the group admin can perform this operation.
1. Connect to the appliance on which you configured the rule you want to delete.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Expert, click on Rules. The page Rules opens.
4. Filter the list through the column Rule # and hit Enter. Only the matching rules are listed.
5. Tick the rule of your choice.
6. In the menu, click on Delete. The wizard opens.
7. Click on OK to complete the operation. The report opens and closes. The rule is no longer
listed.
1289
Chapter 107. Upgrading
This chapter details the procedures to successfully upgrade SOLIDserver 8.1 to a higher patch.
To upgrade SOLIDserver from a previous minor or major version, refer to the guide SOLIDserv-
1
er_Upgrade_to_Version_8.1.pdf available on our download portal .
Prerequisites
1. Have an Internet connection and your credentials ready to download the version of
SOLIDserver that suits your needs on our download portal.
2. Have an installed license under maintenance contract to be able to upgrade to the latest
version.
3. Make sure you have sufficient rights to upgrade. Only users of the group admin, like ipmad-
min, can perform the operations detailed in this document.
4. If you installed hot-fixes, they are deleted during the upgrade. The upgrade wizard retrieves
a list of all installed hot-fixes that you can download.
Note that hot-fixes are only detected locally. When you upgrade a remote SOLIDserver from
the Management appliance, hot-fixes are deleted but the list of files is not available.
5. Keep the upgrade file as is. You cannot rename SOLIDserver upgrade files, otherwise the
upgrade may fail.
6. If you encrypted the database, make sure you have access to the database encryption key
file before upgrading a Standalone or Management appliance, in case you need to import the
keys again. For more details, refer to the section Downloading Database Keys in the chapter
Securing.
Recommendations
1. Follow the proper upgrade procedure.
• If you want to upgrade an appliance, either managing remote appliances or not, refer to the
section Upgrading an Appliance.
• If you want to upgrade appliances managed remotely, refer to the section Upgrading Appli-
ances Managed Remotely.
• If you want to upgrade appliances configured in High Availability, refer to the section Upgrad-
ing Appliances in High Availability.
2. Save the backup file generated during the upgrade. All backup files are automatically deleted
after the number of days defined in the Retention duration you set. If for any reason you need
to troubleshoot the upgrade beyond that period, you will need the latest backup. For more
details regarding troubleshooting, refer to the section Troubleshooting the Upgrade.
1
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
1290
Upgrading
For more details regarding the backup retention time, refer the section Managing Backups and
Restoring Configurations.
Upgrading an Appliance
If you meet the prerequisites, you can upgrade SOLIDserver to a higher patch, it implies to:
1. Download the image of the latest patch of version 8.1.
2. Upgrade the appliance.
3. Save the backup generated during the upgrade.
Note that:
• Once the appliance is upgraded, the page Services configuration might display different statuses:
any service that was stopped restarts when SOLIDserver reboots. Only disabled services are
not started after an upgrade.
• If an error occurs during the upgrade, refer to the section Troubleshooting the Upgrade of a
Standalone or Remote Appliance.
If you are upgrading an appliance in High Availability, refer to the section Upgrading Appliances
in High Availability.
If you are upgrading a Management appliance and its remote appliance(s), refer to the section
Upgrading Appliances Managed Remotely.
1291
Upgrading
After a while, the connection is automatically interrupted as the appliance shuts down
and reboots. Do not interrupt the process. Once the GUI is reachable again, it displays
the restart progression. When the login fields appear, you can connect to the appliance.
3. Save the backup file
a. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
b. In the section Maintenance, click on Backup & Restore. The page Backup & Restore
opens.
c. In the panel Local backup file, select the latest backup file. It is named solid-<host-
name>-<year><month><day>-<hour><minutes>.gz.
d. Click on DOWNLOAD to save the file locally.
You can upgrade all remote appliances at once to the same version and architecture as their
Management appliance. Which is why you must:
1. Check the version of your Management appliance.
2. Upgrade the remote appliance(s) to the same version from the Management appliance.
3. Save the backup file of each remote appliance, it is generated during the upgrade.
Note that:
• To upgrade a remote appliance, the Management appliance should already be upgraded.
• When you upgrade remote appliances from the Management appliance, you cannot retrieve
the list of hot-fixes because it is only available locally.
• Once appliances are upgraded, the page Services configuration might display different statuses:
any service that was stopped is started when SOLIDserver reboots. Only disabled services
are not started after an upgrade.
• If an error occurs during the upgrade, refer to the section Troubleshooting the Upgrade of a
Standalone or Remote Appliance.
If you are upgrading a Standalone appliance or only the Management appliance, refer to the
section Upgrading an Appliance.
If you are upgrading appliances in HA, refer to the section Upgrading Appliances in High Availab-
ility.
1292
Upgrading
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section System, click on Centralized Management. The page Centralized
Management opens.
d. Tick the appliance(s) you want to upgrade.
e. In the menu, select Edit > Upgrade remote SOLIDserver. The wizard Upgrade
remote SOLIDserver opens.
If you installed hot-fixes, you cannot retrieve the list of these files as they are only
available locally.
f. To start the upgrade, click on OK . The report opens and works until the selected appli-
ance(s) version matches the version of the Management appliance. The wizard closes.
The appliance(s) is not accessible for a few minutes.
3. Save the backup file of each remote appliance
a. Connect to the remote appliance GUI.
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section Maintenance, click on Backup & Restore. The page Backup & Restore
opens.
d. In the panel Local backup file, select the latest backup file. It is named solid-<host-
name>-<year><month><day>-<hour><minutes>.gz.
e. Click on DOWNLOAD to save the file locally.
f. Repeat steps a to e for each of the remote appliances you upgraded.
Upgrading appliances in High Availability must be performed from the Master appliance.
This process ensures that the appliances do not switch roles and that the Hot Standby database
is available even during the upgrade. Note that:
1293
Upgrading
• Once the appliances are upgraded, the page Services configuration might display different
statuses as any service that was stopped is started when SOLIDserver reboots. Only disabled
services are not started after an upgrade.
• If an error occurs during the upgrade, refer to the section Troubleshooting the Upgrade of Ap-
pliances in High Availability.
• Since version 7.1.3, you can no longer manually upgrade appliances from the Hot Standby.
If you are not upgrading an appliance in High Availability, refer to the section Upgrading an Ap-
pliance or Upgrading Appliances Managed Remotely.
1294
Upgrading
After a while, the connection is automatically interrupted as the appliance shuts down
and reboots. Do not interrupt the process. Once the GUI is reachable again, it displays
the restart progression. When the login fields appear, you can connect to the appliance.
5. Check that both appliances are upgraded
a. Connect to the Master appliance GUI.
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section System, click on Centralized Management. The page Centralized
Management opens.
d. In the column Version, the value for the Master should match the one on the Hot
Standby appliance.
e. Connect to the Hot Standby appliance GUI and repeat steps b to d to make sure both
appliances are in the same version of SOLIDserver. If they do not, refer to the section
Troubleshooting the Upgrade of Appliances in High Availability.
6. Save the backup file of both appliances
a. Connect to the Master appliance GUI.
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section Maintenance, click on Backup & Restore. The page Backup & Restore
opens.
d. In the panel Local backup file, select the latest backup file. It is named solid-<host-
name>-<year><month><day>-<hour><minutes>.gz.
e. Click on DOWNLOAD to save the file locally.
f. Connect to the Hot Standby appliance GUI and repeat the steps b to e if you set a
specific network/services configuration.
1295
Upgrading
Note that you need the backup file of the previous version or patch to be stored locally on the
appliance. It was generated during the upgrade to version 8.1.
c. Hit the key T to select T Tools and hit the key Enter. The page Tools opens.
d. The line S Start a shell is selected, hit Enter. The terminal closes.
e. Execute the following command to get root permissions:
sudo -s
1296
Upgrading
Note that only the backup files saved when the previous version was installed are listed,
so if you upgraded a few days ago, none of the backup files saved between the upgrade
and the rollback are listed.
h. Once the backup file of your choice is highlighted, click on Enter. The page WARNING
ROLLBACK WILL RESTORE A BACKUP opens.
i. Hit the key Y to highlight the line ( ) Y CONFIRM ROLLBACK. Press the key Space to
select this option, the * indicates the line is selected: (*) Y CONFIRM ROLLBACK.
j. Hit Enter to confirm.
After a while, the connection is automatically interrupted as the appliance shuts down
and reboots. Do not interrupt the process. Once the GUI is reachable again, it displays
the restart progression. When the login fields appear, you can connect to the appliance.
If both appliances were properly upgraded to the desired version but the High Availability
configuration was broken, you only need to reconfigure it. For more details, refer to the section
Setting a High Availability Configuration.
1297
Upgrading
c. Hit the key T to select T Tools and hit the key Enter. The page Tools opens.
d. The line S Start a shell is selected, hit Enter. The terminal closes.
e. Execute the following command to get root permissions:
sudo -s
1298
Upgrading
i. Hit the key Y to highlight the line ( ) Y CONFIRM ROLLBACK. Press the key Space to
select this option, the * indicates the line is selected: (*) Y CONFIRM ROLLBACK.
j. Hit Enter to confirm.
After a while, the connection is automatically interrupted as the appliance shuts down
and reboots. Do not interrupt the process. Once the GUI is reachable again, it displays
the restart progression. When the login fields appear, you can connect to the appliance.
k. Connect to the Hot Standby appliance CLI and repeat the steps b to j.
After the rollback, you might want or need to re-enroll the appliances to make sure there is no
replication delay. For more details, refer to the section Configuring High Availability Advanced
Options.
Note that:
• You need the backup file, generated during the upgrade, to be stored locally on each appliance.
• You need to disable the High Availability configuration, if it is enabled, before downgrading
both appliances separately.
1299
Upgrading
1300
Upgrading
c. Hit the key B to select B Backup Management and hit the key Enter. The page Backup
Management opens.
d. Select R Restore backup and hit Enter. The page Backup files opens.
e. Using the digit keys, select the backup file generated before the unsuccessful upgrade.
f. Hit Enter to select it. The message Do you also want to restore the configuration
of the system? appears.
g. The answer Yes is selected. Hit Enter to select it.
The message Do you really want to restore <backup-file-name>? Your server will
automatically be rebooted to complete the process if you continue appears and
the answer Yes is selected
h. Hit Enter to confirm.
After a while, the connection is automatically interrupted as the appliance shuts down
and reboots. Do not interrupt the process. Once the GUI is reachable again, it displays
the restart progression. When the login fields appear, you can connect to the appliance.
i. Connect to the Hot Standby appliance CLI and repeat steps b to h if you want to restore
the network/services configuration of the future Hot Standby appliance.
Note that, if you do not need to restore the network/services configuration of your Hot
Standby appliance, you can restore only the Master appliance.
6. Enroll the Hot Standby again
a. Connect to the Master appliance GUI.
b. In the sidebar, click on Administration or Admin Home. The page Admin Home
opens.
c. In the section System, click on Centralized Management. The page Centralized
Management opens.
d. In the menu, click on Add. The Add/Modify remote SOLIDserver appears.
e. In the field SOLIDserver IP address, specify the IPv4 address of the appliance you
want to add to the list.
f. If the field "Admin" account password is empty, specify the SSH password, i.e. the
default one (admin) or the one you set if you changed it.
g. Click on OK to complete the operation. The report opens and closes. The new appliance
is listed and marked Standalone in the column Role and Managed (remote) in the
column Status.
h. Tick the future Hot Standby.
i. In the menu, select Edit > Enroll SOLIDserver as Hot Standby. The wizard Enroll
SOLIDserver as Hot Standby opens.
j. Click on OK to complete the operation. The report opens and works for a while, until the
Hot Standby appliance database is erased and replaced by the Master appliance
database. The appliance set as Hot Standby is unavailable for a while. Each appliance
role is modified according to the configuration, they both get the same HA UID.
7. Contact your reseller's support team to correct your database and successfully upgrade
SOLIDserver.
After the rollback, you might want or need to re-enroll the appliances to make sure there is no
replication delay. For more details, refer to the section Configuring High Availability Advanced
Options.
1301
Part XX. Customization
There are many ways of customizing SOLIDserver to suit your needs from the GUI to the data you manage.
You can also customize your databases even further following the chapters:
• Configuring Classes details how administrators can manage classes to configure custom properties for
your resources and tailor your database.
• Custom DB details how to add databases tailored to your needs. They can, for instance, be used when
to ease the configuration of your classes.
• Managing Customization Packages details how to install packages to import customized functionalities
from an archive file.
Table of Contents
108. Customizing the GUI ............................................................................................ 1304
Customizing SOLIDserver Login Page .................................................................. 1304
Customizing the Main Dashboard Welcome Banner ............................................... 1307
Customizing the Interface Names and Fields ......................................................... 1309
109. Managing Smart Folders ...................................................................................... 1311
Browsing Smart Folders ....................................................................................... 1311
Adding Smart Folders .......................................................................................... 1312
Editing Smart Folders .......................................................................................... 1313
Sharing Smart Folders ......................................................................................... 1313
Deleting Smart Folders ........................................................................................ 1314
110. Managing IPv6 Labels .......................................................................................... 1315
Limitations .......................................................................................................... 1315
Adding Labels ..................................................................................................... 1315
Displaying or Hiding Labels .................................................................................. 1316
Editing Labels ..................................................................................................... 1316
Deleting Labels ................................................................................................... 1317
111. Configuring Classes ............................................................................................. 1318
Browsing Class Studio Database .......................................................................... 1319
Managing Classes ............................................................................................... 1321
Configuring the Classes Content .......................................................................... 1328
112. Configuring Custom Databases ............................................................................. 1376
Managing Custom Databases .............................................................................. 1376
Managing Custom Data ....................................................................................... 1378
113. Managing Customization Packages ....................................................................... 1381
Browsing the Packages Database ........................................................................ 1381
Uploading Packages ............................................................................................ 1382
Creating Packages .............................................................................................. 1382
Editing Packages ................................................................................................. 1384
Installing Packages .............................................................................................. 1384
Uninstalling Packages ......................................................................................... 1384
Downloading Packages ........................................................................................ 1385
Deleting Packages .............................................................................................. 1385
1303
Chapter 108. Customizing the GUI
You can customize the Login page and the Main dashboard, SOLIDserver homepage, with images
and messages or even edit most GUI fields name.
• Customizing SOLIDserver Login Page
• Customizing the Main Dashboard Welcome Banner
• Customizing the Interface Names and Fields
Note that only users of the group admin can perform these changes.
In the Login page backgound, behind the login window and the disclaimer, you can display
an image.
In the login window, above the appliance hostname and credentials fields, you can display
a different logo.
At the bottom of the page, a banner includes the disclaimer and its title.
You can customize the Login page with images, as background and in the login window, or with
a disclaimer:
• Customizing the Login Page With Images
• Customizing the Login Page With a Disclaimer
1304
Customizing the GUI
Uploading an Image
You can upload as many images as you need to the page Local files listing. Keep in mind that:
• Uploading images with a transparent background allows to fully integrate them to the graphical
interface.
• The image used to customize the logo must not exceed 373x74 pixels.
If you have not uploaded an image yet on Local files listing, refer to the section Uploading an
Image.
To change the background image, upload the new image and click on the Value of the registry
database entry to specify the name of the other image.
1305
Customizing the GUI
To stop displaying the image, click on the Value of the registry database entry and empty the
field. The default background is displayed again.
If you have not uploaded an image yet on Local files listing, refer to the section Uploading an
Image.
To change the login window logo, upload the new image and click on the Value of the registry
database entry to specify the name of the other image.
To stop displaying the logo, click on the Value of the registry database entry and empty the field.
The default logo is displayed again.
The disclaimer is saved in the appliance backup. If you have appliances configured in High
Availability, the disclaimer configured on the Master is also visible from the Hot Standby login
page.
1306
Customizing the GUI
To edit the disclaimer or its title, click on the Value of the relevant registry database entry to
specify the new information.
To stop displaying the disclaimer or its title, click on the Value of the relevant registry database
entry and empty the field. It is no longer displayed.
You can edit the welcome banner message, display an image or hide it altogether:
• Editing the Welcome Banner Message
• Displaying an Image on the Welcome Banner
• Hiding the Welcome Banner
Only users of the group admin can edit the welcome banner.
1307
Customizing the GUI
If you want to display a different image, follow the procedure and select another image.
Keep in mind that the selected image(s) is saved on the page Local files listing and listed on the
sub-page Custom images. For more details, refer to the section Managing Files from the Local
Files Listing.
1308
Customizing the GUI
1309
Customizing the GUI
1310
Chapter 109. Managing Smart Folders
Smart folders are a customization tool that allow to organize your items in a different way than
what you find on listing pages.
Smart folders provide a view of your database that helps you organize data into a tree-like hier-
archy. This display is completely virtual and does not affect in any way your data.
You can add, edit, delete and/or share smart folders with other users based on data available
from the modules IPAM, DHCP (only in v4), DNS, NetChange, Device Manager and Identity
Manager.
Each smart folder organization can have as many levels as you need and be composed of any
of the columns from the page it is added from, including meta-data (class parameters).
Like the gadgets, smart folders can either be personal or shared with other users. For more details,
refer to the section Sharing Smart Folders.
Note that:
• If a level does not appear when you expand the hierarchy of the smart folder, it means there
is no data to display.
• If a level is called N/A, it represents a level not relevant to the resource at the lowest level. For
instance, if you add a smart folder from the page All addresses and include a level "pool name",
if some IP addresses are not managed by a pool, they are listed under N/A.
1311
Managing Smart Folders
Once added, the smart folder is listed in the Tree view. If you do not see it use the button.
1312
Managing Smart Folders
Once edited, the smart folder new configuration can be displayed in the Tree view. Click on
to refresh the display.
Note that you can also decide how to share smart folders when you add them. For more details,
refer to the section Adding Smart Folders
The same procedure allows you to make a smart folder visible only to you.
1313
Managing Smart Folders
1314
Chapter 110. Managing IPv6 Labels
Labels provide a visual aid for IPv6 addresses management that allows to display the letters and
colors of your choice above a defined part of the addresses.
They allow to gather at a glance IP addresses belonging to a common container in the modules
IPAM, DHCP, Application and NetChange.
In the example above, the labels are named after the block-type and subnet-type networks. The
colors reflect the hierarchy. Also, the label goes above, and therefore hides, the configured ad-
dress, whether it is a full IP address or part of an address.
Limitations
• When configuring a label, you must specify the uncompressed version of the IP address. For
instance, to add a label for a network starting with the address 12:: , you must type in 0012::
• A label applies to IPv6 addressing regardless of the module, once set it applies to IPAM, DHCP,
Application and/or NetChange. Within the IPAM, if you have common network start addresses
among several spaces or networks, they all have the same label (see the East Coast and NYC
network labels in the example above).
Adding Labels
The labels are all managed from the same wizard, accessible in the menu Extra options.
You can add as many labels as you need on the following pages:
Ancienne taille de la page
• In the module IPAM, you can manage labels on the IPv6 pages All networks, All pools and All
addresses.
• In the module DHCP, you can manage labels on the IPv6 pages All scopes, All ranges, All
leases and All statics.
• In the module Application, you can manage the labels on the page All nodes.
• In the module NetChange, you can manage the labels on the IPv6 pages All addresses and
All routes.
To add a label
1. Depending on your needs, in the sidebar:
a. Go to IPAM > Networks, Pools or Addresses. The page opens.
b. Go to DHCP > Scopes, Ranges, Leases or Statics. The page opens.
1315
Managing IPv6 Labels
4. In the field IPv6, type in or paste the uncompressed address you want to label, or part of it.
5. In the field Label Name, specify the label name of maximum 3 characters, letters or numbers.
The label is visible in the Preview.
6. Under Choose a color, click on the color of your choice.
The color is visible in the Preview.
7. Click on ADD . The label is moved to the List of labels.
Repeat these steps for as many labels as you need.
8. Click on OK to complete the operation.
Editing Labels
You can edit existing labels directly in their addition wizard.
To edit a label
1. Depending on your needs, in the sidebar:
a. Go to IPAM > Networks, Pools or Addresses. The page opens.
b. Go to DHCP > Scopes, Ranges, Leases or Statics. The page opens.
c. Go to Application > Nodes. The page opens.
d. Go to NetChange > Addresses or Routes. The page opens.
1316
Managing IPv6 Labels
2. If you accessed IPAM, DHCP or NetChange, make sure the button V6 is black, otherwise
click on it. The page refreshes and the button turns black.
3. In the menu, select Extra options > Configure IPv6 labels. The wizard Configure IPv6
labels opens.
Ancienne taille de la page
4. In the field List of labels, select the label you want to edit.
5. Edit the label IPv6, Label Name and/or Color.
6. Click on UPDATE to save the changes. The label is no longer listed in the field.
Repeat these steps for as many labels as you need.
7. Click on OK to complete the operation.
Keep in mind that the labels need to be displayed manually. For more details, refer to the section
Displaying or Hiding Labels.
Deleting Labels
Like for the edition, you can delete existing labels directly in their addition wizard.
To delete a label
1. Depending on your needs, in the sidebar:
a. Go to IPAM > Networks, Pools or Addresses. The page opens.
b. Go to DHCP > Scopes, Ranges, Leases or Statics. The page opens.
c. Go to Application > Nodes. The page opens.
d. Go to NetChange > Addresses or Routes. The page opens.
2. If you accessed IPAM, DHCP or NetChange, make sure the button V6 is black, otherwise
click on it. The page refreshes and the button turns black.
3. In the menu, select Extra options > Configure IPv6 labels. The wizard Configure IPv6
labels opens.
Ancienne taille de la page
4. In the field List of labels, select the label of your choice. You can only delete labels one at
a time.
5. Click on DELETE . The label is no longer listed in the field.
Repeat these steps for as many labels as you need.
6. Click on OK to complete the operation.
1317
Chapter 111. Configuring Classes
Classes allow to configure properties and behaviors that change the addition and edition wizard
of the resources of your choice, they allow to tailor databases to their needs.
From the page Class Studio, users of the group admin can add, edit, rename, duplicate or move
classes, to another directory or resource.
Within SOLIDserver, you can apply existing classes to resources from their addition/edition wizard.
1318
Configuring Classes
meters when they edit a resource. For more details regarding user resources, refer to the
section Adding Resources to a Group.
Applying an enabled class may change the fields available in the addition/edition wizard of the
resource. In the example below, an administrator configured a network class called location in-
cluding an input field labeled City. When editing the network internal, a user selected this class,
and can now specify that the network is located in the City of Chicago.
Note that classes can also be used to configure automatic list templates based on the class applied
to parent objects. For more details, refer to the section Adding An Automatic List Template.
The classes are all listed on the page, while their content must be listed and managed from a
dedicated window, Class Editor.
Browsing Classes
To display the list of classes
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
By default, Class Studio displays as many global and default classes as there are resources
within SOLIDserver.
1319
Configuring Classes
Class Editor opens when you click on the name of any class on the page Class Studio.
1320
Configuring Classes
The information banner. It displays the edition state and allows to save or cancel the latest
changes.
The search bar allows to filter class objects.
This button allows to close Class Editor. If you exit the window without saving your
changes, they are lost.
The right section displays the list of available class objects.
The left section is the class content, it displays the Label of the class objects you added. Its
name in the wizard where the class is applied.
This button allows to drag and drop, reorder, the class objects.
Note that the information banner is gray by default, it changes color depending on the class edition
state:
• If the banner is blue, you must save your configuration.
• If the banner is green, your configuration is successfully saved or canceled.
• If the banner is red, an error occurred.
Class Editor allows to edit any of your own classes and the class global of any resource.
Managing Classes
From Class Studio, you can add, edit, rename, duplicate, move, stop using and/or delete classes.
Once added you can apply classes to the type of resource they were configured for.
Keep in mind that two types of class are available by default but their management is more limited:
• Default classes: you cannot edit or delete any default class. However, you can choose the
advanced properties you want to use, for more details refer to the chapter Managing Advanced
Properties.
• Global classes: you can edit each global class from the menu Extra options > Meta-data
but you cannot delete them. For more details, refer to the section Editing Classes.
Ancienne taille de la page
This section only describes the classes themselves, to configure their content, or class objects,
refer to the section Configuring the Classes Content.
You can add and manage classes for the following resources, the columns correspond to the
drop-down lists available in the class addition wizard.
1321
Configuring Classes
Module Type
Device Manager Device, Port/Interface.
IPAM Space, Network, Network (v6), Pool, Pool (v6), Address, Address (v6).
NetChange Network device, port.
Rights & delegation Group, User. The groups of users are managed from the module Administration.
SPX Autnum. The Autnums are managed from the module IPAM.
VLAN manager VLAN domain, VLAN range, VLAN. Each type can be applied to VLAN and VXLAN objects.
VRF VRF.
Workflow Request. The resource Requests only applies to outgoing requests.
Adding Classes
You can add as many classes as you need. The custom classes must then be applied to the re-
sources of your choice, when you add or edit them.
Class Studio is case sensitive, therefore, even if the name of each class must be unique, you
can add classes with the same name if they have different cases.
To add a class
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the menu, click on Add. The wizard Add a new class wizard.
4. Configure the class:
5. Click on OK to complete the operation. The report opens and closes. The class is listed.
1322
Configuring Classes
Only global classes are enabled by default and can be edited and automatically integrated to
the wizards of the resources they are set for.
Applying Classes
Once at least one custom class is added and enabled, the addition and edition wizard of the re-
source it can be applied to displays a dedicated page <resource> class.
This page allows to select and apply a class, that is to say load and configure its class objects
in the wizard.
Note that in some modules, you can configure and apply classes at many levels. When you are
adding resources at low levels without filtering the page to display the content of a specific con-
tainer, you need to select the resource container(s). If classes are applied at container levels,
you need to select a <resource> class for each container level, this does not load class objects
in the wizard, it allows to filter the list of potential containers for the resource you are adding.
To apply a class
Only users of the group admin can perform this operation.
1. Go to the page All <resources> of a resource for which you enabled a class.
2. Add or edit a resource. The wizard opens.
3. On the page <resource> class, select a value.
a. If no class was added at higher level:
1323
Configuring Classes
Option Description
<class-name> Select a class to apply it on the resource and load its content in the wizard. Classes
belonging to a directory are listed as follows: <directory>/<class-name>.
b. If you need to select a container and at least one class was applied at higher level:
4. Click on NEXT . The next page opens. All the class object fields are displayed in addition to
the standard fields, you can or must configure them. They may be displayed on several
pages.
If you are adding a low level resource and did not filter the list, you need to select its contain-
er(s) and potential classes set at higher level before getting to the page <resource> class.
5. Click on OK to complete the operation. The report opens and closes.
Editing Classes
You can edit the content of a custom class or the class global, that is to say edit the class objects
it contains or edit their order.
To edit a class
Only users of the group admin can perform this operation.
1. Make sure your browser allows pop-up windows.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Customization, click on Class Studio. The page Class Studio opens.
4. In the column Name, click on the class you want to edit. Class Editor opens.
5. Edit the class object according to your needs following the procedure that suits your needs
in the section Configuring the Classes Content.
6. Click on OK to complete the operation. The object is updated in the left side of the wizard.
Keep in mind that you can also edit the configuration of the class global of a specific resource
directly from its management page, except for the following objects:
• DHCP groups, leases, ACLs, ACL entries, option definitions and failover channels.
• DNS views, DNSSEC keys, RPZ zones and RPZ rules.
• NetChange configurations, routes, addresses, VLANs and discovered items.
• VRF Route Targets.
• SPX policies.
1324
Configuring Classes
4. Edit the class object according to your needs following the procedure that suits your needs
in the section Adding Class Objects.
5. Click on OK to complete the operation. The object is updated in the left side of the window.
Renaming Classes
You can rename custom classes from their properties page. Renaming a class does not affect
the class objects it contains. Once a class has been renamed, it is updated on the properties
page of the concerned resources.
To rename a class
Only users of the group admin can perform this operation.
1. Make sure your browser allows pop-up windows.
2. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
3. In the section Customization, click on Class Studio. The page Class Studio opens.
4. At the end of the line of the class of your choice, click on . The properties page opens.
5. In the menu, select Edit > Rename. The wizard Rename class opens.
6. In the field Old, the current class name is displayed.
7. In the field New Name, specify the new name for the class.
8. Click on OK to complete the operation. The class new name is displayed in the panel and
modified in the list.
Duplicating Classes
You can duplicate custom classes. These duplicates can then be edited and renamed to manage
them more easily, for instance you might need to apply them to other types of resource or even
move them.
Duplicating classes can be useful since object values set for a resource are automatically inherited
by the resources it contains. For instance, if the value "Chicago" is set for a block-type network
through an input field "city", it is automatically inherited by the subnet-type networks it contains
if said subnet-type network also has an input field named "city".
To duplicate a class
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. Tick the class(es) you want to duplicate.
4. In the menu, select Edit > Duplicate. The wizard Duplicate class opens.
5. Click on OK to complete the operation. The duplicated class is listed and named as such:
copy_<original class name>.
1325
Configuring Classes
Moving Classes
You can move custom classes from a directory to another or from a type of resource to another.
For instance, a class added for DNS servers can be moved and made available for a completely
different type of resource, like the DHCP ranges.
To move a class
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. Tick the class(es) you want to move.
4. In the menu, select Edit > Move. The wizard Move class wizard.
5. In the field Sub-directory, specify a directory if need be. It can be a new directory for the
class or an existing one.
6. In the drop-down list Module, select a module for the class. It can be the same one or a new
one.
7. In the drop-down list Type, select a resource to which the class should be applied. It can be
the same one or a new one.
8. Click on OK to complete the operation. The report opens and closes. The data is updated
in the list.
There are two ways to enable a class, either from Class Studio or from a listing page.
1326
Configuring Classes
5. Click on OK to complete the operation. The report opens and closes, the page refreshes.
The class is marked as Enabled or Disabled in the column Status.
3. In the list Classes library, select a class and click on to enable it. The class is moved to
the list Enabled classes. You can enable as many classes as you need.
4. In the list Enabled classes, the classes enabled for this type of object are listed. You can
select the classes one by one and click on to disable them. Each class is moved back to
the list Classes library.
5. Click on OK to complete the operation. The report opens and closes.
As classes must not be used at all in SOLIDserver to be deleted, the following procedure might
come in handy. Keep in mind that the columns layout on the page can help you find the resources
using a class. For more details, refer to the section Managing List Templates.
Deleting Classes
Only custom classes can be deleted. Keep in mind that:
• You can delete custom classes if and only if they are not used by any resource within SOLID-
server. Therefore, you might need to stop using the class before deleting it. For more details,
refer to the section Changing or Stop Using Classes.
• Deleting a class deletes the class objects it contained and displayed on the resources properties
page. You might simply want To enable/disable a class from Class Studio or To enable/disable
a class from a listing page to use it again later.
1327
Configuring Classes
To delete a class
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. Tick the class(es) of your choice.
4. In the menu, click on Delete. The wizard Delete class.
5. Click on OK to complete the operation. The report opens and closes. The class has been
deleted is no longer listed.
Granting access to a class as a resource also grants access to its class parameters, so users
can configure them when they add or edit the objects configured with the class. If a group does
not have a customized class in its resources, editing objects configured with it empties the value
of all the class parameters. For more details, refer to the section Adding Resources to a Group
in the chapter Managing Groups.
Once set, a class customizes addition and edition wizards of the resource with extra pages,
comments, boxes, lists, input fields etc. that can be prefilled with a value retrieved automatically
or set manually.
You need to add class objects within a class to configure its behavior. Keep in mind that:
• custom classes only affect the addition and edition wizard of a resource if they are enabled.
Whereas global classes automatically affect them.
• The object values set for a resource are automatically inherited by the objects it contains. For
instance, if the value Chicago is set for a block-type network through an input field city, it is
automatically inherited by the subnet-type networks it contains if said subnet-type network also
has an input field named city.
You can set the inheritance or propagation property of class parameters on several objects at
once. For more details, refer to the section Inheritance and Propagation.
For each class, Class Editor includes a large library of class objects listed in alphabetical order:
1328
Configuring Classes
Note that you can sort and filter resources on listing pages thanks to your classes. All applied
classes can be returned in the column Class and every class object can be displayed in a dedicated
Class param: column on all relevant pages. For more details on how to add and display customized
list templates, refer to the section Managing List Templates.
1329
Configuring Classes
Autocompletion
The class object Autocompletion allows to display an autocompletion field in the wizard. It config-
ures an input field that allows to SEARCH for values matching what users type in. The available
values in the drop-down list depend on your configuration and can be based on:
• SOLIDserver services. All services and parameters are described in the API Reference guides
1
on our download portal .
• A custom database. For more details, refer to the chapter Custom DB.
1330
Configuring Classes
13. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1331
Configuring Classes
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Select type, select Custom DB.
10. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
11. Click on NEXT . The next page opens.
12. Configure the autocompletion based on a custom database:
a. In the field Custom DB name, specify the name of the Custom database of your choice.
The field autocompletes and the wizard refreshes. For more details on Custom data-
bases, refer to the chapter Custom DB.
b. In the drop-down list Key column, select the column containing the values to retrieve.
The values to save in SOLIDserver database (string of characters: _a-z0-9 only). To
prevent GUI conflicts, avoid names that are already used in the code such as: site, mac-
addr, gateway, vlan, domain, user, port, password...
c. In the drop-down list Label column, select the column containing the information you
want to display in the wizard, the label of the values.
d. Tick the box Allow non-matching values if you want to allow the input field to accept
values that are not part of the database.
e. Tick the box Automatic accept if you want the field to provide a list of matching Custom
DB entries when the user types in values.
PNG
13. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Checkbox
The class object Checkbox allows to insert a box in a wizard. This box is configured using the
true and false value of your choice, the true value is applied when the box is ticked. You can use
checkboxes alone or in combination with other class objects and parameters to validate complex
regular expressions.
To add a checkbox
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Checkbox.
1332
Configuring Classes
5. In the class objects list, click on Checkbox or drag and drop it among the class objects. The
wizard Checkbox opens.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. In the field "TRUE" value, specify the value you want to set for your box when it is ticked
(value yes or 1).
9. In the field "FALSE" value, specify the value you want to set for your box when it is not
ticked (value no or 0).
10. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Translate the label if you want the name of the class object, its
Label, to be translated when users set the GUI in another language. If you tick the box,
the label translation must be available on the page Language editor. For more details,
refer to the section Customizing the Interface Names and Fields.
b. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
c. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
d. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
11. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section.
1333
PNG
Configuring Classes
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Comment
The class object Comment allows to include your own information, notice or warning message
in the wizard. The Comment is always placed after the wizard standard fields.
To add a comment
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Comment.
5. In the class objects list, click on Comment or drag and drop it among the class objects. The
wizard Comment wizard.
6. In the field Comment, specify the message you want to display in the wizard.
7. In the drop-down list Style, select the information type of comment. It can either be the
content of the Comment field in a gray area (None), a Warning or a Notice.
Value Description
None The message is a comment displayed in a gray area.
Warning The message is a warning displayed in an orange area entitled WARNING.
Notice The message is informational and displayed in a blue area entitled INFO.
8. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors. PNG
9. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. The selected comment style is displayed.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Note that the Comment is displayed on one line. You can hover over it to display the entire
message.
Counter
The class object Counter allows to count the number of times the class was applied to a resource.
Its value automatically increments and displays a read-only field in the wizard.
To add a counter
Only users of the group admin can perform this operation.
1334
Configuring Classes
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Counter.
5. In the class objects list, click on Counter or drag and drop it among the class objects. The
wizard Counter wizard.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Padding to display all the digits of the counter, including the zeros.
9. In the field Number of digits, you can specify the number of digits for your counter.
10. In the field Min value, you can specify the counter start value. It appears when the page is
accessed for the first time.
11. In the field Max value, you can specify the maximum value you want to set for your counter.
PNG
12. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
DHCP options
The class object DHCP options allows to include the DHCP option configuration fields in the
wizard. That way, you can configure DHCP options when adding or editing servers, groups,
scopes, ranges and statics, instead of relying on the dedicated wizard only available on the
properties page of each object. For more details regarding the options, refer to the appendix
DHCP Options.
1335
Configuring Classes
PNG
7. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
The shared network you select is displayed as a parameter on the properties page of the resource
the class is applied to.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
c. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
1336
Configuring Classes
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
d. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Force VLSM
The class object Force VLSM is used to prevent the addition of terminal networks. It allows to
untick and hide the box Terminal network in the subnet-type network addition wizard. For more
details, refer to the section Adding Networks Manually.
With this class object, at the network level of your choice, any new network can be forced to non-
terminal, and contain other networks. For more details on network-based VLSM organizations,
refer to the chapter Using VLSM to Manage Your IPAM Network.
If you add the object Force VLSM, you cannot set the predefined variable NO_VLSM_SUBNET.
For more details, refer to the appendix Class Studio Pre-defined Variables.
1337
Configuring Classes
8. In the drop-down list Network level, select a value between 0 (block-type networks) and 15
(subnet-type networks). This value defines at which level of network organizations the Force
VLSM is applied. By default, None is selected.
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. Select in the list Spaces, one of your existing spaces. In a space-based VLSM organiz-
ation where two sub-spaces are at the same level, this allows to favor the space you
select and set up the delegation within the space of your choice.
Click on . The space in moved to the list Spaces. Only the spaces of this second list
are available in the list VLSM space, at the end of the wizard, when you add a non ter-
minal subnet-type network in a parent space and the corresponding block-type network
in a child space.
b. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
10. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Force class
This class object Force class allows to determine which classes are available at a lower level.
For instance at space level, it allows to decide that only two classes can be configured at network
level; even if ten network classes exist, only the ones you set are available in the addition and
edition wizard of the networks that space. Note that:
• The classes you force on lower level resources must be configured and enabled.
• You can force several classes on the same resource, so make sure they do not have conflicting
class object names.
1338
Configuring Classes
9. In the drop-down list Type, select one of the lower levels of objects displayed according to
your needs. The wizard refreshes.
If you are forcing a class on IPAM objects, selecting Networks displays the drop-down list
Network level. In that list you can select a level between 0 (block-type networks) and 15
(subnet-type networks). This value defines at which level of network organizations the Force
class is applied. By default, None is selected.
10. Select the class(es) to force at lower level:
a. In the list Class, double-click on the class of your choice. The available classes depend
on the Module and Type set for the class. The class is moved to the list Classes.
b. In the list Classes, you can select any class and reorder the classes using and or
remove any class using .
11. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
12. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Force prefix
The class object Force prefix allows to force a specific prefix on a network and can be applied
on the subnet-type network itself or on the block-type network or space it is belongs to.
This object can also be set as the Pre-defined variable, it corresponds to FORCE_SUBNET_PRE-
FIX.
1339
Configuring Classes
7. In the drop-down list Network level, select a value between 0 (block-type networks) and 15
(subnet-type networks). This value defines at which level of network organizations the Force
prefix is applied. By default, None is selected.
8. In the field Value, specify the prefix you want to force for the resource. By default, it is set
to 24.
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors. PNG
10. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Hidden data
The class object Hidden data allows to configure a resource with a parameter that is not displayed
in the wizard. It allows to set a class object that does not require any configuration from the user
or to hide another class object of the class.
This non-displayed data string could be used as a hidden signature for a class or to populate
other fields if you configure the field Constructor, via the Expert mode.
You can also configure the class object to force a value and overwrite a preexisting content, for
instance if its value is inherited from a parent. Note that all class object values, inherited or
overwritten, are visible on the properties pages of the resource configured with the class.
1340
Configuring Classes
For example, you could type in %v{<value1>}, %v{<value2>} where <value#> is the
value of an existing class object in the class. If <value1> is a city and <value2> is a
state, the field Name would be replaced with Chicago, Illinois in the wizard.
b. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
c. You can tick the box Force the object value to force the value of your choice when
you apply the class. The field Value to force appears.
In the field Value to force, specify a value or leave it empty. The vaIue you set is applied
without being displayed in the wizard. If you specified the Name of another class object
in the field Name, it overwrites the value of that object.
If you do not tick the box, the hidden data you add is configured for the class but has
no value to apply. PNG
8. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Hide IP alias
The class object Hide IP alias allows to shorten the IP address addition wizard and skip the page
Aliases configuration. For more details, refer to the section Configuring and Managing IP Address
Aliases.
This object can also be set as the Pre-defined variable, it corresponds to HIDE_IP_ALIAS.
1341
Configuring Classes
PNG
9. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Horizontal separator
The class object Horizontal separator allows to display a line to structure and divide the class
objects in the wizard.
7. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Icon
The class object Icon allows to display an image next to the name of a class applied to Device
Manager devices, in the column Class.
Before configuring an Icon for a device class, you must upload it to the page Custom images.
For more details, refer to the section Uploading an Image.
1342
Configuring Classes
8. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
9. To display the icon next to the class name:
a. In the sidebar, go to Device Manager > Devices. The page All devices opens.
b. On the right-end side of the menu, click on List Templates. The window opens.
c. In the drop-down list Displayed list template, select a template containing the column
Device class name.
Only users of the group admin can add or edit list templates. For more details, refer to
the section Managing List Templates.
Include class
The class object Include class allows to embed another class and the objects it contains. That
way, if you configure a class X to include the class Y, that already includes the class Z, when
users apply the class X they actually have the class objects of all three classes in the wizard.
To include a class
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Include class.
5. In the class objects list, click on Include class or drag and drop it among the class objects. The
wizard Include class opens.
6. In the drop-down list Module, select the module associated with the class you want to include.
7. In the drop-down list Type, select the type of resources associated with the class you want
to include.
8. In the drop-down list Class name, select the class you want to include.
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section.
1343
PNG
Configuring Classes
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Input
The class object Input allows to display an input field in the wizard that users can fill in with a
data string.
Note that an Input is different from a Multiple input. For more details, refer to the section Multiple
input.
1344
Configuring Classes
f. In the field Placeholder, you can specify a short hint describing the expected value of
the input field. If it exceeds 45 characters, including spaces, the placeholder is not entirely
readable in the input field.
g. In the field Regex match, you can type in a regular expression that checks the syntax
of the value specified in the field. Some basic regular expression symbols are detailed
after the procedure.
h. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
i. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
j. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
11. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. It is followed by if you ticked the box Required and displayed in
gray, as a read-only field, if you made it Not editable.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
In the field Regex match you can enforce the format of data accepted in the Input field using
regular expressions. For instance, you could allow alpha characters in lower and uppercase using
[a-zA-Z], limit numbers to the range [1-99] or set a maximum string length using {}.
1345
Configuring Classes
Symbol Description
[] A bracket expression. Matches a single symbol contained within the brackets. For example, [abc]
matches "a", "b", or "c". [a-z] specifies a range matching any lowercase letter from "a" to "z". These
forms can be mixed: [abcx-z] matches "a", "b", "c", "x", "y", or "z", as does [a-cx-z]. The - symbol is
treated as a literal symbol if it is the last or the first (after the ^) symbol within the brackets: [abc-], [-
abc]. Note that backslash escapes are not allowed. The ] symbol can be included in a bracket expres-
sion if it is the first (after the ^) symbol: []abc].
[^ ] Matches a single symbol that is not contained within the brackets. For example, [^abc] matches any
symbol other than "a", "b", or "c". [^a-z] matches any single symbol that is not a lowercase letter from
"a" to "z". Likewise, literal symbols and ranges can be mixed.
^ Matches the starting position within the string. In line-based tools, it matches the starting position of
any line.
$ Matches the ending position of the string or the position just before a string-ending newline. In line-
based tools, it matches the ending position of any line.
() Defines a marked subexpression.
* Matches the preceding element zero or more times. For example, ab*c matches "ac", "abc", "abbbc",
etc. [xyz]* matches "", "x", "y", "z", "zx", "zyx", "xyzzy", and so on. (ab)* matches "", "ab", "abab",
"ababab", and so on.
Jump to page
The class object Jump to page allows to display class objects on the new page of the wizard,
you can name this page and include a message above the class objects if you want.
Any class object located after the Jump to page is moved to a new page, users have to click on
NEXT to display them.
1346
Configuring Classes
PNG
9. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. The new page Title is listed in a bigger font size than the other class objects.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Multiple input
The class object Multiple input allows to include a list under an Input field of the class and
therefore configure several values for the field. Under the Input field, a button ADD and a list are
displayed to configure the list of values.
Note that a Multiple input is different from an Input. For more details, refer to the section Input.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
1347
Configuring Classes
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
12. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
13. Make sure the multiple input is located right under the input field. To reorder the list, refer to
the section Reordering Class Objects.
Multiple select
The class object Multiple select allows to include a list under a Select of the class and therefore
configure several values of the list. The first list provides the button , to move one by one the
selected values in the second list. The data listed can be:
• Fixed values added to the list directly from the wizard.
• CSV values retrieved from a CSV file using a semi-colon ; to separate values.
• Service list values picked from the SOLIDserver services. All services and parameters are
2
described in the API Reference guides on our download portal . Note that this type of data can
help you display custom databases in the wizard.
Note that a Multiple select is different from a Select. For more details, refer to the section Select.
2
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
1348
Configuring Classes
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Multiple select.
5. In the class objects list, click on Multiple select or drag and drop it among the class objects.
The wizard Multiple select wizard.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. This name is used for
both lists. Only this name is seen by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Select type, select Fixed values. The wizard refreshes.
10. Configure the content of the multiple select:
a. In the field Key, specify an object name for the database using only the string of char-
3
acters _a-z0-9 . The key is displayed in the field Label/Key.
b. In the field Label, specify the label of the Key to display in the wizard. The label and the
key are displayed in the field Label/Key as follows: <Label>#<Key>.
c. Click on ADD . The value is moved to the list Options.
d. Repeat these actions for as many values as needed. You can use to remove one by
one values from the list, or and to reorganize them.
11. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Have none label if you want to include the value None to the drop-
down list.
b. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
c. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
d. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
3
To prevent GUI conflicts, avoid names that are already used in SOLIDserver database like site, mac-addr, gateway, vlan, domain,
user, port, password...
1349
Configuring Classes
Value Description
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
e. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
12. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1350
Configuring Classes
b. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
c. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
d. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
e. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
12. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1351
Configuring Classes
7. In the field Label, specify the name of the class object in the wizards. This name is used for
both lists. Only this name is seen by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Select type, select Service list values. The wizard refreshes.
10. Configure the content of the multiple select:
a. In the field Service, start specifying the name of a service. The matching services are
listed, select the one that suits your needs.
b. In the field Key, specify the object name as it should be saved in SOLIDserver database
(string of characters: _a-z0-9 only). To prevent GUI conflicts, avoid names that are
already used in the code such as: site, mac-addr, gateway, vlan, domain, user, port,
password...
c. In the field Label, specify the name of the input parameter, the label of the value to
display in the wizard.
d. In the field Where, specify an SQL condition to filter the retrieved values if need be.
e. In the field Order by, specify an SQL condition to sort the results if need be.
11. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Have none label if you want to include the value None to the drop-
down list.
b. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
c. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
d. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
e. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
1352
Configuring Classes
PNG
12. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Object name
The class object Object name allows to build an automatic naming rule for a resource, such as
%v{city}-%v{store code} where city and store code are the names of objects belonging to the
same class. By convention, an Object name and the class objects used to build it should be
placed in the first page of the wizard.
8. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Owner
The class object Owner allows to display the name of the user who added the resource and applied
the class, no matter who edits it later.
1353
Configuring Classes
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Owner.
5. In the class objects list, click on Owner or drag and drop it among the class objects. The
wizard Owner wizard.
6. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors. PNG
7. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left section. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Pre-defined variable
The class object Pre-defined variable allows to apply specific behaviors and configurations in
classes dedicated to IPAM objects, DHCP statics, DNS zones, Workflow requests, Device Manager
devices and Administration users.
Most IPAM pre-defined variables and the DNS zone pre-defined variable are dedicated to
Workflow requests.
Each variable can be enabled with a specific Value. For more details, refer to the appendix Class
Studio Pre-defined Variables.
Select
The class object Select allows to display a drop-down list in the wizard returning:
• Fixed values added to the list directly from the wizard.
• CSV values retrieved from a CSV file using a semi-colon ; to separate values.
• Service list values picked from the SOLIDserver services. All services and parameters are
4
described in the API Reference guides on our download portal .
• Custom DB values retrieved directly from your custom databases. We strongly recommend
using this type rather than a CSV file. For more details, refer to the chapter Custom DB.
Note that a Select is different from a Multiple select. For more details, refer to the section Multiple
select.
4
At https://downloads.efficientip.com/support/downloads/docs/, in the relevant version folder. Log in using your credentials. If you do
not have credentials yet, request them at www.efficientip.com/support-access.
1354
Configuring Classes
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Select.
5. In the class objects list, click on Select or drag and drop it among the class objects. The wizard
Select wizard.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Select type, select Fixed values. The wizard refreshes.
10. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Translate the label if you want the name of the class object, its
Label, to be translated when users set the GUI in another language. If you tick the box,
the label translation must be available on the page Language editor. For more details,
refer to the section Customizing the Interface Names and Fields.
b. You can tick the box Have none label if you want to include the value None to the drop-
down list.
c. You can tick the box Reload on change if you want to reload the wizard page when a
value is selected in the drop-down list.
d. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
e. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
f. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
1355
Configuring Classes
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
g. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
11. Click on NEXT . The last page opens.
12. Configure the content of the select based on fixed values:
a. In the field Key, specify the object name as it should be saved in SOLIDserver database
(string of characters: _a-z0-9 only). To prevent GUI conflicts, avoid names that are
already used in the code such as: site, mac-addr, gateway, vlan, domain, user, port,
password... The field Label/Key autopopulates.
b. In the field Label, specify the word string, corresponding to the key, as it should be
displayed in the list. The field Label/Key autopopulates following the format <La-
bel>#<Key>.
c. Click on . The value is moved to the list Options.
d. Repeat these actions for as many values as needed. You can use to remove one by
one values from the list, or and to reorganize them.
13. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1356
Configuring Classes
the label translation must be available on the page Language editor. For more details,
refer to the section Customizing the Interface Names and Fields.
b. You can tick the box Have none label if you want to include the value None to the drop-
down list.
c. You can tick the box Reload on change if you want to reload the wizard page when a
value is selected in the drop-down list.
d. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
e. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
f. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
g. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
12. Click on NEXT . The last page opens.
13. Configure the content of the select based on a CSV file:
a. In the field CSV file, specify the complete path of the file stored in the appliance. This
file must separate values with a semi-colon.
b. In the field Value column, specify the number of the column in the CSV file containing
the values to retrieve.
c. In the field Label column, specify the number of the column in the CSV file containing
the values to display in the wizard, the label of each value.
14. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
1357
PNG
Configuring Classes
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
e. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
1358
Configuring Classes
Value Description
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
f. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
g. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
11. Click on NEXT . The last page opens.
12. Configure the content of the select based on services:
a. In the field Services, start specifying the name of the service to call. The matching
services are listed, select the one that suits your needs.
b. In the field Key, specify the name of the input parameter corresponding to the values
to retrieve.
c. In the field Label, specify the name of the input parameter corresponding to the label
of the values to display in the wizard.
d. In the field Where, specify an SQL condition to filter the retrieved values if need be.
e. In the field Order by, specify an SQL condition to sort the results if need be.
f. In the field Limit, specify the maximum number of results to display.
g. In the field Tags, specify an SQL condition to filter the retrieved class parameters if
need be. You might need assistance from Efficient IP support team to fill in this field.
13. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1359
Configuring Classes
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Select type, select Custom DB. The wizard refreshes.
10. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Translate the label if you want the name of the class object, its
Label, to be translated when users set the GUI in another language. If you tick the box,
the label translation must be available on the page Language editor. For more details,
refer to the section Customizing the Interface Names and Fields.
b. You can tick the box Have none label if you want to include the value None to the drop-
down list.
c. You can tick the box Reload on change if you want to reload the wizard page when a
value is selected in the drop-down list.
d. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
e. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
f. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
g. In the field Default value, you can specify a default value for the field if no data is spe-
cified. The value you specify is by default displayed in the wizard and users can edit it.
11. Click on NEXT . The last page opens.
12. Configure the content of the select based on a custom database:
a. In the field Custom DB name, specify the name of the Custom database of your choice.
The field autocompletes and the wizard refreshes. For more details on Custom data-
bases, refer to the chapter Custom DB.
1360
Configuring Classes
b. In the drop-down list Key column, select the column containing the values to retrieve.
The values to save in SOLIDserver database (string of characters: _a-z0-9 only). To
prevent GUI conflicts, avoid names that are already used in the code such as: site, mac-
addr, gateway, vlan, domain, user, port, password...
c. In the drop-down list Label column, select the column containing the information you
want to display in the wizard, the label of the values.
13. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
1361
Configuring Classes
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1362
Configuring Classes
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1363
Configuring Classes
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1364
Configuring Classes
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Class Studio. The page Class Studio opens.
3. In the column Name, click on the class you want to edit. Class Editor opens.
4. In the search bar, type in Select DHCP static.
5. In the class objects list, click on Select DHCP static or drag and drop it among the class objects.
The wizard Select DHCP static opens.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
1365
PNG
Configuring Classes
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
e. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
1366
Configuring Classes
Value Description
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
The DNS server you select is displayed as a parameter on the properties page of the resource
the class is applied to.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
1367
Configuring Classes
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
c. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
d. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1368
Configuring Classes
9. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
b. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
c. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
10. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Select class
The class object Select class allows to include a drop-down list containing existing classes in the
wizard. It can only return classes that apply to IPAM spaces, IPv4 networks, pools and addresses;
DNS servers and zones; DHCPV4 servers, scope, ranges and statics; and Administration groups
and users.
1369
Configuring Classes
5. In the class objects list, click on Select class or drag and drop it among the class objects. The
wizard Select class wizard.
6. In the field Name, specify the name of the class object in the database. That name is never
displayed in Class Editor.
Note that names must be unique and in lowercase. You can use hexadecimal characters
and underscores "_", but no spaces. To prevent GUI conflicts, avoid names that are already
used in the GUI, like site, mac-addr, gateway, vlan, domain, user, port, password...
7. In the field Label, specify the name of the class object in the wizards. Only this name is seen
by the users.
8. You can tick the box Required to make the class object configuration compulsory in the re-
source addition and edition wizards.
9. In the drop-down list Type, select the resource to which apply the classes you want to display:
Space, Network, Pool, Address, DNS server, DNS zone, DHCP server, DHCP scope, DHCP
range, DHCP static, User or Group.
10. In the drop-down list Expert mode, you can select Yes to further configure the class object.
a. You can tick the box Translate the label if you want the name of the class object, its
Label, to be translated when users set the GUI in another language. If you tick the box,
the label translation must be available on the page Language editor. For more details,
refer to the section Customizing the Interface Names and Fields.
b. In the drop-down list Inheritance property, you can configure the inheritance behavior
of the value of the class object:
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
c. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
d. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
1370
Configuring Classes
11. Click on OK to complete the operation. The object is now displayed in the left section and
PNG
part of the class content. You can preview the drop-down list content in Class Editor. It is
followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Text area
The class object Text area allows to display an input area in the wizard.
In Class Editor, it looks like an input with a black square at the right-end of the field, as illustrated
in the image The window Class Editor in the section Browsing the Class Objects.
Value Description
None The property is not set, this is the default value. Users can set it to Inherit or Set.
Inherit The property is forced to Inherit. Users cannot change it to None or Set.
Set The property is forced to Set. Users cannot change it to None or Inherit.
For more details regarding the inheritance property, refer to the chapter Inheritance and
Propagation.
d. In the drop-down list Propagation property, you can configure the propagation behavior
of the value of the class object:
1371
Configuring Classes
Value Description
None The property is not set, this is selected by default. Users can set it to Propagate or
Restrict.
Propagate The property is forced to Propagate. Users cannot change it to None or Restrict.
Restrict The property is forced to Restrict. Users cannot change it to None or Propagate.
For more details regarding the propagation property, refer to the chapter Inheritance
and Propagation.
e. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
10. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content. It is followed by if you ticked the box Required.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Time stamp
The class object Time stamp allows to include the exact time and date of addition of a resource
in a dedicated field of the wizard. It respects the format mm/dd/yyyy regardless of the date format
on your Settings.
Note that if you edit a resource that was not configured with this class object, the time stamp
matches the moment you apply the class and not its actual addition date and time.
1372
PNG
Configuring Classes
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
Upload file
The class object Upload file allows to include an upload tool in the wizard. It displays a field File
name and a button BROWSE to upload any file. Keep in mind that:
• Uploaded files cannot exceed 300 MB.
• Uploaded files are stored temporarily in the directory /tmp of the appliance and deleted shortly
after. The upload tool can therefore be used to import CSV files or other types of files to be
processed straight away by other class objects.
9. Click on OK to complete the operation. The object is now embedded into the class and listed
in the left side of the window.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1373
Configuring Classes
• You must save your configuration before closing Class Editor, otherwise your changes are not
taken into account.
• After an hour of inactivity, any unsaved changes are lost and your configuration can no longer
be saved.
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
4. In the left section, within the class content, drag and drop the class objects one by one to
change their display order.
original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1374
Configuring Classes
5. Click on OK to complete the operation. The object is no longer listed in the left side of the
wizard. original
You must click on to save the class configuration or to undo the object addition. If you
exit without saving, your changes are lost. Note that you can keep adding other class
objects to the same class and save it.
1375
Chapter 112. Configuring Custom
Databases
You can add your own custom databases on the page Custom DB. These databases are directly
embedded in SOLIDserver and can contain a maximum of 10 pieces of information, custom data,
displayed on the dedicated page as columns named Label #.
Custom databases can come in handy when configuring classes with parameters like select,
multiple select or autocompletion. For more details, refer to the chapter Configuring Classes.
By default, a custom database named Vendor is already available, it cannot be edited. This
database is used by SOLIDserver to link MAC address and the Vendor of the Ethernet card to-
gether.
By default, the page Custom database displays all the columns. You can sort and filter them, but
you cannot change their layout.
On the properties page, the panel Main properties displays the custom database name, Type,
Description, Read only status, and the labels it contains.
1376
Configuring Custom Databases
5. Click on OK to complete the operation. The report opens and closes. The custom database
is listed.
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1377
Configuring Custom Databases
Once your database contains everything you need, you can use it within classes and apply it to
the resource(s) that suits your needs. For more details, refer to the chapter Configuring Classes.
By default, the page Custom data displays all the columns. You can sort and filter them, but you
cannot change their layout.
On the properties page, the panel Main properties displays the name of the custom database
it belongs to, and its defined labels and their value.
You can also import custom data. For more details, refer to the section Importing Custom Data
in the chapter Importing Data from a CSV File.
1378
Configuring Custom Databases
Like any other export, you can retrieve the data immediately or schedule it. For more details,
refer to the chapter Exporting Data.
1379
Configuring Custom Databases
3. In the column Name, click on the custom database of your choice. The page Custom data
opens.
4. Tick the custom data entry of your choice, you can tick several.
5. In the menu, click on Delete. The wizard Delete opens.
6. Click on OK to complete the operation.
1380
Chapter 113. Managing Customization
Packages
From the Administration module, you can import archive files, or packages, containing a set of
customized functionalities from the page Packager.
Once imported and uploaded, installing these packages can affect interfaces, databases, system
files, etc. depending on what they contain. These functionalities can take the form of classes,
services (also called macros), reports or rules.
Packager is composed of two pages: All Packages and All package files. From the page All
Packages, you can import or create, install, uninstall and delete your packages. The page All
package files provides the content of the packages.
Packager reuses the principle of the module of the same name in 3.0.1, however, it uses different
services. Therefore, packages created or used in previous versions of SOLIDserver cannot be
used with the current version.
The page All packages contains seven columns: Name, Description, Version, Vendor, Creation
time, Install time and Status. You cannot change their layout.
To display all the information in one panel, open the package properties page.
1381
Managing Customization Packages
3. Click on the name of the package of your choice. The page All package files of the selected
package opens.
The page All package files contains five columns: filename, Directory, Type, Package version
and Version. You cannot change their layout.
Uploading Packages
From the page All packages, you can upload your own packages in a .tar archive file.
To upload a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. In the menu, click on Add. The wizard Upload a package opens.
4. Click on BROWSE to search for the .tar file to import. A window opens to help you browse
through folders.
5. Double-click on the needed file. The window closes and the file is visible in the field File
name of the wizard.
6. Click on OK to complete the operation. The report opens and closes. The package is listed
but it is not installed yet.
Creating Packages
You can create your own packages and configure them with existing rules, services, reports and
classes.
To create a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. In the menu, select Tools > Expert > Create a package. The wizard Create a package
opens.
1382
Managing Customization Packages
1383
Managing Customization Packages
11. Click on OK to complete the operation. The report opens and closes. The package is listed
but it is not installed yet.
Editing Packages
You cannot edit a package. If one of your packages contains files that you no longer require or
if it misses files, you need to replace it.
1. Uninstall the useless package.
2. Upload the package that replaces it or create another package. To make sure you do not forget
any file, you can look at the list All package files of the package you want to replace.
3. Delete the useless package.
4. Install the new package.
Installing Packages
Installing a package pushes its files to the relevant parts of the appliances. When uploading or
creating a package, it is simply listed in the GUI. If you do not install it, the files it contains are
simply stored locally but not used.
To install a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. Tick the package(s) you want to install.
4. In the menu, select Edit > Install. The wizard Install a package opens.
5. Click on OK to complete the operation. The report opens and works until all the files are
pushed. In the column Status the package is marked installed.
Uninstalling Packages
Uninstalling a package allows to revert all the changes that the files it contains were performing.
It also allows to delete a package: you cannot delete a package if it is installed, i.e. used.
To uninstall a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. Tick the package(s) you want to uninstall.
4. In the menu, select Edit > Uninstall. The wizard Uninstall a package opens.
5. Click on OK to complete the operation. The report opens and closes. In the column Status
the package is marked uninstalled.
1384
Managing Customization Packages
Downloading Packages
You can download a package, whether it is installed or not. Keep in mind that you can only
download one package at a time.
To download a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. Tick the package you want to download.
4. In the menu, select Edit > Download. The wizard Downloading a package opens.
5. Click on OK to complete the operation. The report opens and displays the package which is
an archive .tar file that can be downloaded from the page Local files listing available from
the page Admin Home.
6. Click on DOWNLOAD to download the file before closing the wizard.
7. Click on CLOSE .
Deleting Packages
Once you no longer need a package, you can delete it as long as it is no longer used. This means
that if the package you want to delete is currently installed, you need to uninstall it before following
the procedure below. For more details, refer to the section Uninstalling Packages.
To delete a package
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Customization, click on Packager. The page All packages opens.
3. Tick the package(s) of your choice.
4. In the menu, click on Delete. The wizard Delete opens.
5. Click on OK to complete the operation. The report opens and closes. The package is no
longer listed.
1385
Appendix A. Matrices of Network Flows
This appendix maps out the networks flows that you must open to manage your SOLIDserver
appliance or remotely manage servers. They are detailed in tables divided as follows:
• SOLIDserver network flows.
• IPAM network flows.
• DHCP network flows.
• DNS network flows.
• NetChange network flows.
• Identity Manager network flows.
• Remote Management network flows.
Each flow detail includes its Source IP, Port, Destination IP, Port, Protocol, Service used and
Notes, when relevant. The Source IP and Destination IP may contain the following:
1386
Matrices of Network Flows
SOLIDserver
Basic Configuration
Source IP Port Destination IP Port Protocol Service Notes
administrator any SOLIDserver 80 TCP HTTP Graphic User Interface (GUI)
administrator any SOLIDserver 443 TCP HTTPS Graphic User Interface (GUI)
administrator any SOLIDserver 22 TCP SSH Command Line Interface (CLI)
SOLIDserver any DNS server 53 UDP DNS DNS resolution, DDNS update
SOLIDserver any DNS server 53 TCP DNS DNS resolution, DNS zone transfer
SOLIDserver any NTP server 123 UDP NTP Time synchronization
SOLIDserver any FTP server 21 TCP FTP Remote archive on an FTP or SFTP
SOLIDserver any SFTP server 22 TCP SFTP server
External Authentication
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver any LDAP/AD 389 TCP LDAP LDAP or AD authentication
SOLIDserver any LDAPS/AD 636 TCP LDAPS LDAPS or AD authentication
SOLIDserver any RADIUS 1812 UDP RADIUS RADIUS authentication
iDRAC
Source IP Port Destination IP Port Protocol Service Notes
administrator any iDRAC 22 TCP SSH iDRAC SSH
administrator any iDRAC 80 TCP HTTP iDRAC GUI
administrator any iDRAC 443 TCP HTTPS iDRAC GUI
administrator any iDRAC 5900 TCP VNC Virtual Console
1387
Matrices of Network Flows
IPAM
Cisco DNA
Source IP Port Destination IP Port Protocol Service Notes
Required to configure DNA synchroniza-
DNA center any SOLIDserver 443 TCP HTTPS
tion
SPX
RIPE
APNIC
1388
Matrices of Network Flows
DHCP
EfficientIP DHCP Servers
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver Required to manage an EfficientIP DH-
any DHCP server 443 TCP HTTPS
Management CP server on a SOLIDserver appliance
Failover channel port on the backup
DHCP master any DHCP backup 647 TCP Failover
server
Failover channel port on the master
DHCP backup any DHCP master 847 TCP Failover
server
DHCP client 68 DHCP server 67 UDP DHCP Required by the service DHCP
DHCP server 67 DHCP client 68 UDP DHCP Required by the service DHCP
DHCP client 546 DHCP server 547 UDP DHCP Required by the service DHCPv6
DHCP server 547 DHCP client 546 UDP DHCP Required by the service DHCPv6
Broadcast ad- Required by the DHCP protocol on the
DHCP client 68 67 UDP DHCP
dress local segment
a
DHCP server - any - ICMP ICMP Only if the option ping-check is enabled
a
For more details, refer to the section Preventing IP Address Duplication.
Linux Packages
Prerequisite before configuring a Linux Package: configuring DHCP network flows as detailed
in the section EfficientIP DHCP Servers.
1389
Matrices of Network Flows
DHCP Statistics
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver SNMP v1, v2c and v3 to retrieve the
any DHCP server 161 UDP SNMP
Management server statistics
1390
Matrices of Network Flows
DNS
EfficientIP DNS Servers
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver Required to manage an EfficientIP DNS
any DNS server 443 TCP HTTPS
Management server on a SOLIDserver appliance
SOLIDserver DNS resolution, DDNS update, DNS
any DNS server 53 UDP/TCP DNS
Management zone transfer
DNS resolution, DDNS update, DNS
DNS server any DNS server 53 UDP/TCP DNS
zone transfer
DNS client any DNS server 53 UDP/TCP DNS DNS resolution
10000
SOLIDserver a
DNS server - 2053 UDP DNS DNS notify (optional)
Management
65535
a
The port 2053 allows to speed up zone transfers between SOLIDserver Management and its managed DNS servers.
Keep in mind that not all DNS engines support this functionality, for instance Microsoft DNS engines do not support it.
1391
Matrices of Network Flows
Linux Packages
Prerequisite before configuring a Linux Package: configuring the DNS network flows as detailed
in the section EfficientIP DNS Servers.
DNS Statistics
Source IP Port Destination IP Port Protocol Service Notes
SNMP v1,v2c or v3 to retrieve the stat-
SOLIDserver
any DNS server 161 UDP SNMP istics of DNS servers on SOLIDserver
Management
appliances or Linux Packages
GSS-TSIG
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver Kerberos serv-
any 88 Protocol Kerberos Kerberos authentication
Management ers
Guardian
Cache Sharing via Unicast
1392
Matrices of Network Flows
DoT
DoH
1393
Matrices of Network Flows
NetChange
Source IP Port Destination IP Port Protocol Service Notes
Network
NetChange any 161 UDP SNMP SNMP v1, v2c, v3
device
NetChange any DNS server 53 UDP DNS DNS resolution
Network
NetChange any 22 TCP SSH
device
Save the configuration
Network
NetChange any 23 TCP SNMP
device
1394
Matrices of Network Flows
Identity Manager
Source IP Port Destination IP Port Protocol Service Notes
Windows AD
any SOLIDserver 5986 TCP WEF Required to retrieve sessions.
Controller
1395
Matrices of Network Flows
Remote Management
High Availability
Source IP Port Destination IP Port Protocol Service Notes
SOLIDserver SOLIDserver
any 443 TCP HTTPS
Hot Standby Master
Health check
SOLIDserver SOLIDserver
any 443 TCP HTTPS
Master Hot Standby
SOLIDserver SOLIDserver
any 5432 TCP PostgreSQL
Hot Standby Master
Replication
SOLIDserver SOLIDserver
any 5432 TCP PostgreSQL
Master Hot Standby
1396
Appendix B. Default Gadgets
SOLIDserver offers gadgets by default in the Gadgets Library. Among them, 4 are displayed by
default on the Main dashboard.
Alert on ports/interfaces reconciliation drift
• Type: Top List.
• Description: The 5 first port and/or interfaces in Device Manager that have a Drift in the
Reconciliation column of the page All ports & interfaces. For more details, refer to the
section Tracking Changes on the Page All ports & interfaces.
If you upgraded to this version, this gadget may be displayed on Device Manager dashboard.
Alerts
• Type: Top List.
• Description: The 10 latest raised alerts. Click on the alert name to go to the page Alerts.
For more details, refer to the chapter Managing Alerts.
All networks
• Type: Quick Search.
• Description: A search engine gadget to find networks in the IPAM. The data entered in the
fields automatically add filters on the page All networks through the columns Name and
Address.
DHCP ranges
• Type: Top List.
• Description: A list of the 10 first DHCP ranges sorted by address with the server they belong
to, their occupation rate and status.
DHCP Servers
• Type: Top List.
• Description: A list of the 10 first DHCP servers sorted by name with their type, protocol,
synchronization status and status.
DNS RR type
• Type: Chart.
• Description: A pie chart representing the managed records repartition per type.
DNS Servers
• Type: Top List.
• Description: The 10 first DNS servers sorted by name with their IP address, synchronization
status and status.
General information
• Type: Descriptive.
• Description: A gadget gathering the appliance configuration information, running services,
hostname, IP address(es), default gateway(s), role and status. For more details, refer to
the section General Information in the chapter Managing Gadgets.
This gadget is displayed by default on the Main dashboard of the superuser session.
My account preferences & configuration
• Type: Shortcut.
• Description: A gadget gathering user dedicated shortcuts, toward the Gadgets Library and
the wizard Change Language.
This gadget is displayed by default on the Main dashboard of all users.
1397
Default Gadgets
1398
Default Gadgets
• Description: A gadget gathering appliance configuration shortcuts. For more details, refer
to the section SOLIDserver Configuration Checklist in the chapter Managing Gadgets.
This gadget is displayed by default on the Main dashboard of the superuser session.
1399
Appendix C. Synchronizing Cisco DNA
You can configure your Cisco DNA Center to push its pools, subpools and IP addresses to
SOLIDserver.
Once the configuration is complete, all the pools, subpools and IP addresses you add are available
as block-type networks, subnet-type networks and IP addresses in the IPAM. If you configure
advanced properties, the information sent by DNA Center can even update the DNS and the
DHCP.
Prerequisites
• A SOLIDserver appliance in version 7.3.1 or higher configured with the relevant network flows.
For more details, refer to the IPAM network flows in the dedicated appendix.
• Sufficient Cisco DNA Center permissions. The user must be allowed to edit the system settings
and manage pools.
• Sufficient SOLIDserver permissions. The user must be granted sufficient rights and resources
to manage IPAM networks.
Limitations
• Configuring DNA synchronization only takes into account the new pools, subpools and IP ad-
dresses you add to Cisco DNA center. The objects you managed from DNA center before the
configuration are not pushed.
• Synchronizing DNA pools, subpools and IP addresses allows to register them into the IPAM,
however their edition is limited.
• You can edit synchronized DNA data in the IPAM, but any change is performed locally, it is
not pushed to your DNA center.
• You can delete synchronized DNA data from the IPAM, but it does not affect the data of your
DNA center.
Preparing SOLIDserver
To push DNA data in SOLIDserver, you must prepare the IPAM:
• DNA pools correspond to block-type networks in the IPAM, they require a space.
• DNA subpools correspond to subnet-type networks in the IPAM, they require a space containing
a block-type network that can receive them.
• DNA IP addresses correspond to IP addresses in the IPAM, they require a space containing
a block-type network and a terminal network that can receive them.
Keep in mind that all DNA data is pushed to one space of the IPAM.
1400
Synchronizing Cisco DNA
1401
Synchronizing Cisco DNA
b. Configure IPAM advanced properties at space and/or network level. All properties are
inherited by the pools, subpools and IP addresses you add and synchronize as networks
and IP addresses. For more details, refer to the chapter Managing Advanced Properties.
Now that the IPAM is ready to receive your DNA data, you can configure the synchronization
from Cisco DNA center.
Once the configuration is complete, the pools, subpools and IP addresses you add to Cisco DNA
center are pushed to SOLIDserver and listed in the IPAM on the pages All networks and All Ad-
dresses.
1402
Synchronizing Cisco DNA
1403
Appendix D. DHCP Options
This appendix describes all the DHCP options that you can configure at server, group, scope
range and static level.
They are described following their Option category in the configuration wizard:
• Most Used Options.
• Basic.
• Server Parameters.
• Lease Information.
• WINS/NetBIOS.
• Host IP.
• Interface.
• Servers.
• BootP Compatible.
• DHCP Packet Fields.
• Microsoft DHCP Client.
• NetWare Client.
• NIS/NISplus.
• Miscellaneous.
• Vendor Nwip.
• Vendor MSFT Options.
At all levels, the properties page allows to configure DHCP options from a dedicated panel.
1404
DHCP Options
Basic
Table D.2. Basic DHCP options
Name Code Value type Description
auto-configure 116 boolean Allows to ask whether, and be notified if, auto-
configuration should be disabled on the local
subnet.
For more details, refer to the RFC2563 available
on IETF website at
https://tools.ietf.org/html/rfc2563.
broadcast-address 28 IP address The broadcast address for the interface subnet.
host-name 12 text (name) The client host name.
allow-booting N/A boolean Allows to decide whether or not to respond to
queries from a particular client. It must be set in
a host declaration.
By default, booting is allowed. If you disable it
for a particular client, that client cannot to get an
address from the DHCP server.
allow-bootp N/A boolean Allows to decide whether or not to respond to
bootp queries. By default, bootp queries are al-
lowed.
authoritative N/A boolean Allows to check and allocate leases to clients
based on the network segment they connect
from.
ping-timeout N/A duration in seconds The maximum timeout answer for a ping from
the DHCP server.
1405
DHCP Options
Server Parameters
These options concern the technical parameters on the server side.
1406
DHCP Options
Lease Information
These options concern the technical mechanisms on the client side of SOLIDserver DHCP protocol.
WINS/NetBIOS
Table D.5. WINS/NetBIOS options
Name Code Value type Description
netbios-dd-server 45 list of IP addresses The list of NetBIOS datagram distribution servers
(NBDD), defined by RFC1001 and RFC1002.
These servers are sorted by order of preference.
netbios-name-servers 44 list of IP addresses The list of WINS servers or of Net-BIOS name
servers (NBMS). These servers are sorted by
order of preference.
For more details, refer to RFC1001 available on
IETF website at https://tools.ietf.org/html/rfc1001
and to RFC1002 at
https://tools.ietf.org/html/rfc1002.
netbios-node-type 46 number The type of NetBIOS knot described in RFC1001
and RFC1002. The value is represented by a
numerical code: 1 for B-node, 2 for P-node, 4
for M-node, 8 for H-node.
netbios-scope 47 text (name) The Netbios-scope name value of NetBIOS
scope specified in RFC1001 and RFC1002.
Host IP
Table D.6. Host IP options
Name Code Value type Description
default-ip-ttl 23 duration in seconds The default lifetime that the client must use to
send a datagram on the network. Valid values
between 1 and 255.
1407
DHCP Options
Interface
Table D.7. Interface options
Name Code Value type Description
all-subnets-local 27 boolean Allows to ensure that all the subnets communic-
ating with the IP interface use the same MTU as
the physical interface.
arp-cache-timeout 35 duration in seconds The timeout in seconds for ARP cache entries.
auto-configure 116 boolean Allows to ask whether, and be notified if, auto-
configuration should be disabled on the local
subnet.
For more details, refer to the RFC2563 available
on IETF website at
https://tools.ietf.org/html/rfc2563.
broadcast-address 28 IP address The broadcast address for the interface's subnet.
classless-static-route 121 list of IP addresses Allows to use the routers used by the IP protocol
to set up a packet transmission path between
two IP hosts (one source and one destination
host) through the router IP address, listed in the
routing table.
This option obsoletes the Static Route option
(option 33).
1408
DHCP Options
Servers
Table D.8. Server options
Name Code Value type Description
cookie-servers 8 list of IP addresses The list of cookie servers available for this client.
These servers are listed by order of preference.
1409
DHCP Options
1410
DHCP Options
BootP Compatible
Table D.9. BOOTP compatibility options
Name Code Value type Description
boot-size 13 number The length in block of 512 bytes of the boot im-
age file for this client.
bootfile-name 67 number The name of the boot file to use when the File
field is used to carry options.
cookie-servers 8 list of IP addresses The list of Cookie servers available. These
servers are sorted by order of preference.
For more details, refer to the RFC865 available
on IETF website at
https://tools.ietf.org/html/rfc865.
domain-name-servers 6 list of IP addresses The list of domain name servers (DNS), available
for this client. These servers are listed by order
of preference.
extensions-path 18 path The name of the file containing additional options
to be interpreted. The format is described in
RFC2132.
For more details, refer to the RFC2132 available
on IETF website at
https://tools.ietf.org/html/rfc2132.
impress-servers 10 list of IP addresses The list of Imagen Impress servers available for
this client. These servers are listed by order of
preference.
merit-dump 14 path The path of file in which the client must copy the
memory image in the event of a crash. This path
is constituted by a set of NVT ASCII characters.
resource-location-servers 11 list of IP addresses The list of resource servers available for this
client. These servers are listed by order of pref-
erence.
For more details, refer to the RFC887 available
on IETF website at
https://tools.ietf.org/html/rfc887.
root-path 17 path The path of the disk route for this client. This
path is constituted by a set of NVT ASCII char-
acters.
filename N/A file name The name of the boot file to use when the field
is used to carry options.
next-server N/A IP address Allows to specify the IP address of the server
from which the initial boot file (specified in the
statement filename) has to be loaded. The
server-name should be a numeric IP address.
If no next-server parameter applies to a given
client, the DHCP server's IP address is used.
Some clients prefer to receive the server name
in the server-name option.
1411
DHCP Options
1412
DHCP Options
NetWare Client
Table D.12. NetWare client options
Name Code Value type Description
nds-context 87 text The initial NDS context the client should use.
nds-servers 85 IP address One or more NDS servers for the client to con-
tact for access to the NDS database. Servers
should be listed in order of preference.
nds-tree-name 86 name The initial NDS context the client should use.
nwip-domain 62 name Allows to convey the NetWare/IP domain name
used by the NetWare/IP product.
autoretries 8 provided by the A list of Quote of the Day servers available to
vendor the client. The servers should be listed in order
of preference.
autoretry-secs 9 provided by the A list of LPR servers available to the client. The
vendor servers should be listed in order of preference.
nearest-nwip-server 7 provided by the A list of MIT-LCS UDP servers available to the
vendor client. The servers should be listed in order of
preference.
nsq-broadcast 5 provided by the A list of Name servers available to the client.
vendor The servers should be listed in order of prefer-
ence.
1413
DHCP Options
NIS/NISplus
Table D.13. NIS/NISplus options
Name Code Value type Description
nis-domain 40 name The name of the client's NIS domain. The do-
main is formatted as a character string consisting
of characters from the NVT ASCII character set.
nis-servers 41 list of IP addresses The list of IP addresses of NIS servers available
for the client. The servers can be sorted by order
of preference.
nisplus-domain 64 name The name of the client's NIS+ domain. The do-
main is formatted as a character string consisting
of characters from the NVT ASCII character set.
nisplus-servers 65 list of IP addresses A list of IP addresses indicating NIS+ servers
available to the client. Servers should be listed
in order of preference.
Miscellaneous
Table D.14. Miscellaneous DHCP options
Name Code Value type Description
Avaya-96xxx 242 ascii string The private use options - Useful for Avaya 96xxx
(Refer to vendor documentation)
Mitel-DSCP-Priority 133 unsigned integer Allows to set the IEEE 802.1D/P Layer 2 Priority,
between 1 and 6 useful for Mitel IP phones. For more details, refer
to vendor documentation.
Mitel-IP-PHONE 130 ascii string Allows to set a discrimination string, useful for
Mitel IP phones. For more details, refer to vendor
documentation.
Mitel-RTC-Controller 129 IP address Allows to set the IP address of the call server,
useful for Mitel IP phones. For more details, refer
to vendor documentation.
Mitel-TFTP-Server 128 IP address Allows to set the IP address of the TFTP server,
useful for Mitel IP phones. For more details, refer
to vendor documentation.
Mitel-VLAN-ID 132 unsigned integer Allows to set the VLAN ID, useful for Mitel IP
between 1 and 4094 phones. For more details, refer to vendor docu-
mentation.
default-url 114 ascii string The default URL to present in a web browser.
1414
DHCP Options
1415
DHCP Options
1416
DHCP Options
Vendor Nwip
All NetWare/IP Domain Name options below apply to servers, so when configuring these options,
make sure to list all the servers in order of preference. For more details, refer to the RFC2242
available on IETF website at https://tools.ietf.org/html/rfc2242.
Vendor MSFT
Table D.16. Vendor MSFT options
Name Code Value type Description
default-routers-ttl 3 list of IP addresses A list of 32 bit IP addresses for routers on the
client's subnet. The routers should be listed in
order of preference.
disable-netbios 1 provided by the The subnet mask for the network segment to
vendor which the client is connected.
release-on-shutdown 2 provided by the The offset of the client's subnet in seconds from
vendor Coordinated Universal Time (UTC).
1417
Appendix E. MAC Address Types
References
This appendix lists all the MAC address types used in SOLIDserver that you can display on the
page DHCP All statics both in IPv4 and IPv6. There is a set of 31 different types of MAC addresses
that you can specify when adding or editing DHCP statics. Each type corresponds to a protocol
that has been assigned a reference number defined in the IANA Address Resolution Protocol
(ARP). In the GUI, this reference adds an extra byte at the beginning of the MAC addresses listed
in the column MAC address on the page All statics. Typically, the MAC addresses listed in this
column look as follows: <1_byte_MAC_type_reference>:<6_bytes_MAC_address>.
The different types of MAC addresses can be listed separately from the MAC address itself using
the DHCP static MAC type column. This column displays two columns: the column MAC type
that displays the MAC type code (except for Ethernet that is listed in full letters) and the column
MAC address that displays the MAC address in its traditional format.
Note that every reference is listed in hexadecimal form in the wizard. Therefore, the ARP
parameter 10 (for Autonet) is listed as 0a and so forth.
1418
MAC Address Types References
1419
Appendix F. Custom AWS IAM Policy
Route 53 Minimal Permissions
Before managing Amazon Route 53 servers from the GUI, you must configure your Amazon
Account to grant sufficient permissions to users.
From AWS Management console, the service Identity and Access Management (IAM) allows to
manage the user permissions of your account via policies, ideally set on groups.
Among the default policies, you can assign the predefined IAM policy AmazonRoute53FullAccess
to allow users to manage Amazon Route 53 servers. However, if it is too permissive, you can
add a custom policy.
Before adding and assigning a custom policy, note that the IAM policy should contain the fol-
lowing minimal permissions. The AWS expected format may change without notice.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"route53:GetChange",
"route53:GetHostedZone",
"route53:GetReusableDelegationSetLimit",
"route53:ChangeResourceRecordSets",
"route53:CreateQueryLoggingConfig",
"route53:GetReusableDelegationSet",
"route53:CreateVPCAssociationAuthorization",
"route53:ListTagsForResource",
"route53:DeleteVPCAssociationAuthorization",
"route53:ListTagsForResources",
"route53:ListResourceRecordSets",
"route53:ChangeTagsForResource",
"route53:DeleteHostedZone",
"route53:GetHostedZoneLimit",
"route53:AssociateVPCWithHostedZone",
"route53:UpdateHostedZoneComment",
"route53:DeleteQueryLoggingConfig"
],
"Resource": [
"arn:aws:route53:::hostedzone/*",
"arn:aws:route53:::change/*",
"arn:aws:route53:::queryloggingconfig/*",
"arn:aws:route53:::delegationset/*"
]
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"route53:GetAccountLimit",
"route53:ListReusableDelegationSets",
"route53:CreateHostedZone",
"route53:DisassociateVPCFromHostedZone",
"route53:TestDNSAnswer",
"route53:ListHostedZones",
"route53:GetHostedZoneCount",
"route53:ListHostedZonesByName"
],
1420
Custom AWS IAM Policy Route 53
Minimal Permissions
"Resource": "*"
}
]
}
Once the permissions of your Amazon account are configured, you can add Amazon Route53
servers. For more details, refer to the section Managing Amazon Route 53 Servers in the chapter
Managing DNS Servers.
1421
Appendix G. DNS Resource Records
Configuration Fields
This appendix details the fields to configure when adding resource records to a DNS or DNSSEC
master zone.
Note that if you add records to a smart architecture managing server(s), the last page of the
wizard returns a warning message if any server does not support their type. You can force the
addition to add them to the server(s) that do support them.
Note that only the records supported by SOLIDserver are detailed, these records may not be
supported by all DNS servers. For more details on supported servers, refer to the section Adding
Resource Records in the chapter Managing DNS Resource Records.
1422
DNS Resource Records
Configuration Fields
1423
DNS Resource Records
Configuration Fields
1424
DNS Resource Records
Configuration Fields
1425
DNS
DNS IPAM DHCP
IPAM properties
Update IPAM: yes DHCP properties IPAM properties
DNS SPACE DHCP failover channel: failover-dhcp1.mycorp.com
DHCP Push leases to IPAM: yes
SERVER DNS properties SERVER
Add a PTR: yes DNS properties Use client name (FQDN): yes
ns1.mycorp.com America DNS server: ns1.mycorp.com dhcp1.mycorp.com DNS properties
DNS view: intranet Update DNS: yes
Update DNS: yes
DNS properties
VIEW NETWORK Add a DNS reverse zone for every terminal network added: yes
BLOCK Default domain: mycorp.com
intranet USA DNS server for reverse zone: ns1.mycorp.com
IPAM
10.6.0.0/15 DNS view for reverse zone: intranet
NEW SCOPE
NEW IPAM properties NEW NETWORK SUBNET Name: New York
NEW NETWORK SUBNET NETWORK
ZONE ZONE REVERSE 10.6.0.0/24 Gateway offset: -1 Name: New York 10.6.0.0/24 SCOPE
ZONE SUBNET 10.6.0.0/24 DHCP option
mycorp.com Name: routers: 10.6.0.254
0.6.10.in-addr.arpa
1426
10.6.0.1-10.6.0.50 10.6.0.1-10.6.0.50
NEW IP ADDRESS
IP ADDRESS IP address: 10.6.0.42 NEW LEASE
RECORD RECORD TWO NEW IP Address: 10.6.0.42 ADDRESS IP address: 10.6.0.42 MAC: ab:ba:12:34:ab:ba LEASE
RECORDS Name: laptop.mycorp.com MAC: ab:ba:12:34:ab:ba Name: laptop.mycorp.com
Name: laptop.mycorp.com
Type: A Type: PTR IP: 10.6.0.42
Name: laptop.mycorp.com
Figure H.1. All the advanced properties between the modules IPAM, DNS and DHCP
DHCP
Advanced Properties
On EfficientIP DHCP servers, if IPAM to DHCP, DHCP to IPAM and IPAM to DNS advanced
properties are configured, DHCP statics do not update the DNS until the client connects to the
network. When clients with static reservation connect to the network, they are allocated a lease
and that lease information is sent to the DNS to add the matching record once the IPAM is updated.
NETWORK ZONE
SCOPE SUBNET
New York New York mycorp.com
10.6.0.0/24 10.6.0.0/24
RANGE POOL
10.6.0.1-10.6.0.50 Manhattan
10.6.0.1-10.6.0.50
NEW
STATIC IP Address: 10.6.0.10
IP Address: 10.6.0.10 MAC address: be:ef:00:00:be:ef
MAC address: be:ef:00:00:be:ef Name: <empty>
Name: <empty>
Figure H.2. The replication of DHCP statics in the DNS for EfficientIP DHCP servers
1427
Appendix I. Multi-Status Messages
This appendix provides a list of messages returned in the column Multi-status in the modules:
• DHCP.
• DNS.
• Application.
For more details, refer to the section Understanding the Column Multi-Status in the chapter Un-
derstanding the GUI.
1428
Multi-Status Messages
1429
Appendix J. Configuring OpenID
Authentication
To authenticate external users via OpenID Connect, you must:
1. Take into account prerequisites and limitations detailed in the section Adding OpenID Authen-
tication of the chapter Managing Authentication Rules.
2. Configure the relevant environment:
• Either configure the authentication details on Google and then on SOLIDserver side.
• Or configure the authentication details on Azure side and then on SOLIDserver side.
Keep in mind that if you configure the authentication on appliances in High Availability, you must
perform both operations on each appliance.
Now that you have configured the application and retrieved the client ID and secret, you can
configure the authentication on SOLIDserver.
1430
Configuring OpenID Authentication
Users with administrative rights over SSH connections to SOLIDserver must create and configure
the file ext-identity.inc, it incorporates authentication details directly in the configuration of the
service Apache, or httpd.
Keep in mind that there is a validation check for this file, and any invalid configuration may prevent
the service from running properly or prevent you from accessing the GUI altogether.
<IfDefine UseModAuthOpenIDC>
LoadModule auth_openidc_module libexec/apache24/mod_auth_openidc.so
OIDCProviderMetadataURL
"https://accounts.google.com/.well-known/openid-configuration"
OIDCClientID "<client-id>"
OIDCClientSecret "<secret>"
OIDCRedirectURI "https://<solidserver>.int.efficientip.com/auth/redirect_uri"
OIDCCryptoPassphrase "<passphrase>"
OIDCScope "openid email"
OIDCSessionInactivityTimeout 900
OIDCCacheType "file"
</IfDefine>
3. Make sure the whole configuration file is still viable using the command:
apachectl configtest
If no errors are returned and the file syntax is OK, go to the next step. If not, you must edit
the content of the included file(s) because you might no longer be able to access or GUI or
prevent the service from running.
4. Once the configuration is OK, restart the Apache daemon to take into account your changes
with the command:
apachectl restart
1431
Configuring OpenID Authentication
When the file is ready, you can add the OpenID authentication rule and complete the authentic-
ation. For more details, refer to the section Adding the OpenID Authentication Rule in the chapter
Managing Authentication Rules.
Keep in mind that if you configure the authentication on appliances in High Availability, you must
perform both operations on each appliance.
Now that you have configured the application and retrieved the tenant ID, client ID and client
secret, you can configure the authentication on SOLIDserver.
1432
Configuring OpenID Authentication
Users with administrative rights over SSH connections to SOLIDserver must create and configure
a file ext-identity.inc, that you must name. It incorporates authentication details directly in the
configuration of the service Apache, or httpd.
Keep in mind that there is a validation check for this file, and any invalid configuration may prevent
the service from running properly or prevent you from accessing the GUI altogether.
<IfDefine UseModAuthOpenIDC>
LoadModule auth_openidc_module libexec/apache24/mod_auth_openidc.so
OIDCProviderMetadataURL
"https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration"
OIDCClientID "<client-id>"
OIDCClientSecret "<secret>"
OIDCRedirectURI "https://<solidserver>.int.efficientip.com/auth/redirect_uri"
OIDCCryptoPassphrase "<passphrase>"
OIDCScope "openid profile email"
OIDCSessionInactivityTimeout 900
OIDCCacheType "file"
</IfDefine>
3. Make sure the whole configuration file is still viable using the command:
apachectl configtest
If no errors are returned and the file syntax is OK, go to the next step. If not, you must edit
the content of the included file(s) because you might no longer be able to access or GUI or
prevent the service from running.
4. Once the configuration is OK, restart the Apache daemon to take into account your changes
with the command:
apachectl restart
When the file is ready, you can add the OpenID authentication rule and complete the authentic-
ation. For more details, refer to the section Adding the OpenID Authentication Rule in the chapter
Managing Authentication Rules.
1433
Appendix K. SNMP Metrics
This appendix provides a list of the most relevant indicators, the SNMP metrics, you can monitor
from an external solution.
The SNMP metrics are detailed in Management Information Bases (MIB) that formally describe
the network objects you can monitor. The MIB content is hierarchized thanks to a suite of numbers
called Object IDentifiers (OID). All the OIDs of a MIB are organized like a tree of information with
common trunks appended by unique ends that refer to a specific node, a unique set of information.
Each OID node can therefore match a network object, such as the status of a power supply, or
a specific property of the network object, like a variable name or values.
This appendix includes proprietary, IANA, IEEE and IETF managed MIBs:
• IDRAC-MIB
• UCD-SNMP-MIB
• HOST-RESOURCES-MIB
• IF-MIB
• EIP-STATS
• EIP-DNSGUARDIAN
• EIP-MON-MIB
Prerequisites
• Have an Internet connection and your credentials ready to download the files *.mib on our
1
download portal .
You can get a tree overview of each MIB at http://www.oidview.com.
• Make sure each monitored SOLIDserver is configured to allow the SNMP collector to retrieve
the SNMP information:
• From SOLIDserver, you must configure the SNMP agent with an access list using either
community strings in SNMP v1/v2c, or authentication credentials in SNMP v3.
By default, a v1/v2c profile exists with the community string public. For more details, refer
to the section Configuring the SNMP Server.
1
At https://downloads.efficientip.com/support/downloads/MIBs/, log in using your credentials. If you do not have credentials yet, request
them at www.efficientip.com/support-access.
1434
SNMP Metrics
• From the SNMP collector's side, you must use SNMP v2c or v3 and configure the external
monitoring solution to ensure it can access SOLIDserver SNMP agent and leverage the
metrics that you need.
Note that you can also configure SNMP traps.
Once your system is properly configured, you can set various SNMP alerts on SOLIDserver objects
to be notified of any unusual behavior. For more details, refer to the chapter Managing Alerts.
The asterisk represents subsets, for which, the default value of the first object can be 0 or 1. In
the case of the OID 1.3.6.1.4.1.674.10892.5.4.600.12.1.5.1.*, if you have two power supply units:
• You can specify 1.3.6.1.4.1.674.10892.5.4.600.12.1.5.1.0 to retrieve the status of the first
supply unit, or
• You can specify 1.3.6.1.4.1.674.10892.5.4.600.12.1.5.1.1 to retrieve the status of the second
one.
In the following example, we execute the command snmpget via SNMP v2c with the community
string public to retrieve the OID .1.3.6.1.4.1.674.10892.5.4.600.12.1.5.1.1 (the status of the first
power supply) and the value 3 (the status ok). This OID is described the IDRAC-MIB:
You can also use the command snmpwalk to search and list information of all the objects in a
particular subset. Here, requesting .1.3.6.1.4.1.674.10892.5.4.600.12.1.5.1 returns the status of
two power supplies:
1435
SNMP Metrics
Power Unit
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
Power Redundancy
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
Power Supply
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
CPU
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
1436
SNMP Metrics
Memory
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
Virtual Disk
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
Physical Disk
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
Temperature
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
1437
SNMP Metrics
Fan
All the OIDs described in this section are part of the MIB extension IDRAC-MIB.
CPU(s) Load
All the OIDs described in this section are part of the MIB extension UCD-SNMP-MIB.
2
https://github.com/centreon/centreon-plugins
1438
SNMP Metrics
Memory Usage
All the OIDs described in this section are part of the MIB extension UCD-SNMP-MIB.
Swap Usage
All the OIDs described in this section are part of the MIB extension UCD-SNMP-MIB.
Disk IO
SOLIDserver is deployed on top of the physical RAID controller. In the ucdDiskIOMIB, diskIOTable
lists all available devices.
The RAID virtual drive should be identified by the following names: ad[0-9], ada[0-9], mfid[0-9].*.
Other listed devices should be ignored.
All the OIDs described in this section are part of the MIB extension UCD-SNMP-MIB.
1439
SNMP Metrics
Disk Usage
Usage should remain under 80% for each mount point's total disk size entry, i.e. the system paths
/, /dev, /tmp, /var, /proc or /data1.
All the OIDs described in this section are part of the MIB extension HOST-RESOURCES-MIB.
Network Traffic
Any NIC with ifAdminStatus set to up (i.e. 1) should also have an ifOperStatus set to up (i.e. 1).
Any sudden and rapid increase in the metrics of discard or error packet count should be noticed.
All the OIDs described in this section are part of the MIB extension IF-MIB.
1440
SNMP Metrics
Expected values: up (i.e. 1) or down (i.e. 2). When the system initializes, all interfaces should be down
(i.e. 2) until explicit notice from the system to set it up (i.e. 1).
.1.3.6.1.2.1.2.2.1.8.*
Variable name: ifOperStatus Type: integer
Description: The NIC operational status, i.e. the current operational state of the interface.
Expected values: up (i.e. 1), down (i.e. 2), testing (i.e. 3), dormant (i.e. 5) or notPresent (i.e. 6).
It should be up (i.e. 1), if ifAdminStatus is up (i.e. 1), when the interface is ready to transmit or receive network
traffic.
It should be down (i.e. 2) if ifAdminStatus is down (i.e. 2) or if there is a fault that prevents it from being up
(i.e. 1).
It remains in the state testing (i.e. 3) if no operational packets can be passed.
It should be up dormant (i.e. 5) when the interface is waiting for external actions, such as a serial line
waiting for an incoming connection.
It should be notPresent (i.e. 6) if the interface is missing, usually hardware, components.
.1.3.6.1.2.1.2.2.1.10.*
Variable name: ifInOctets Type: integer
Description: The total traffic received through the interface, including framing characters, in bytes.
.1.3.6.1.2.1.2.2.1.16.*
Variable name: ifOutOctets Type: integer
Description: The total traffic transmitted out of the interface, including framing characters, in bytes.
.1.3.6.1.2.1.2.2.1.13.*
Variable name: ifInDiscards Type: integer
Description: The number of inbound packets which were chosen to be discarded even though no errors
had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for
discarding such a packet could be to free up buffer space.
.1.3.6.1.2.1.2.2.1.19.*
Variable name: ifOutDiscards Type: integer
Description: The number of outbound packets which were chosen to be discarded even though no errors
had been detected to prevent their being transmitted. One possible reason for discarding such a packet
could be to free up buffer space.
.1.3.6.1.2.1.2.2.1.14.*
Variable name: ifInErrors Type: integer
Description: The number of inbound packets that contained errors preventing them from being deliverable
to a higher-layer protocol. For character- oriented or fixed-length interfaces, the number of inbound trans-
mission units that contained errors preventing them from being deliverable to a higher-layer protocol.
.1.3.6.1.2.1.2.2.1.20.*
Variable name: ifOutErrors Type: integer
Description: The number of outbound packets that could not be transmitted because of errors. For char-
acter-oriented or fixed-length interfaces, the number of outbound transmission units that could not be
transmitted because of errors.
Running Processes
SOLIDserver relies on several processes to operate:
• IPMServer, Postgres and HTTPd should always be running on the monitored SOLIDserver.
• DHCPd should be listed in the hrSWRunName table when running the DHCP service on the
monitored SOLIDserver.
1441
SNMP Metrics
• Named should be listed in the hrSWRunName table when running the DNS service on the
monitored SOLIDserver. Exception is made for the Hybrid DNS engine where Named (both
authoritative and recursive) can be replaced by NSD (authoritative) or Unbound (recursive).
All the OIDs described in this section are part of the MIB extension HOST-RESOURCES-MIB.
The EfficientIP proprietary MIB EIP-STATS references values as Integers, yet, they represent
counters. As in any counter, when the previous value is greater than the current one, this means
that the counter has either looped or has been reset. Therefore, itâ  s necessary to interpret
these values properly:
DHCP service
All the OIDs described in this section are part of the MIB extension EIP-STATS.
3
MAX Signed INT = 2147483647
4
MIN Signed INT = -2147483648
1442
SNMP Metrics
The EfficientIP proprietary MIB EIP-STATS references values as Integers, yet, they represent
counters. As in any counter, when the previous value is greater than the current one, this means
that the counter has either looped or has been reset. Therefore, itâ  s necessary to interpret
these values properly:
5
MAX Signed INT = 2147483647
6
MIN Signed INT = -2147483648
1443
SNMP Metrics
1444
SNMP Metrics
1445
SNMP Metrics
Each section describes OIDs regarding DNS Guardian cache and the cache of the its views. The
only way of monitoring DNS Guardian views is to know their identifier (ID). In the tables below
we provide the OIDs until the <view-ID> that you must provide as it depends on your configuration.
<view-ID> is an integer between 0 and 7.
DNS Guardian metrics should be graphed over time for troubleshooting purposes.
Cache Size
All the OIDs described in this section are part of the MIB extension EIP-DNSGUARDIAN.
1446
SNMP Metrics
Client Size
All the OIDs described in this section are part of the MIB extension EIP-DNSGUARDIAN.
Cache Statistics
All the OIDs described in this section are part of the MIB extension EIP-DNSGUARDIAN.
1447
SNMP Metrics
Description: The total number of queries that did not hit the cache because the related entry doesn't exist
in the cache of the specified view.
1448
SNMP Metrics
.1.3.6.1.4.1.2440.1.11.2.4.40.0
Variable name: eipDNSGUARDIANStatCacheMissRescue Type: counter64
Description: The total number of cache misses in Rescue mode.
.1.3.6.1.4.1.2440.1.11.2.3.1.40.<view-ID>
Variable name: eipDNSGUARDIANViewStatCacheMissRescue Type: counter64
Description: The total number of cache misses in Rescue mode in the cache of the specified view.
.1.3.6.1.4.1.2440.1.11.2.4.41.0
Variable name: eipDNSGUARDIANStatCacheMissExistRescue Type: counter64
Description: The total number of queries that did not hit the cache because the related entry has expired
in Rescue mode.
.1.3.6.1.4.1.2440.1.11.2.3.1.41.<view-ID>
Variable name: eipDNSGUARDIANViewStatCacheMissExistRescue Type: counter64
Description: The total number of queries that did not hit the cache of the specified view because the related
entry has expired in Rescue mode.
.1.3.6.1.4.1.2440.1.11.2.4.42.0
Variable name: eipDNSGUARDIANStatCacheMissNotExistRescue Type: counter64
Description: The total number of queries that did not hit the cache because the related entry doesn't exist
in Rescue mode.
.1.3.6.1.4.1.2440.1.11.2.3.1.42.<view-ID>
Variable name: eipDNSGUARDIANViewStatCacheMissNotExistRescue Type: counter64
Description: The total number of queries that did not hit the cache of the specified view because the related
entry doesn't exist in Rescue mode.
Filters Statistics
All the OIDs described in this section are part of the MIB extension EIP-DNSGUARDIAN.
1449
SNMP Metrics
Description: The number of times each specified trigger has been armed. Note that <trigger-ID> identifies
each of the 64 available triggers, in the Variable name it is an integer between 0 and 63 and in the OID it
is an integer between 00 and 63.
.1.3.6.1.4.1.2440.1.11.2.3.1.2<trigger-ID>.<view-ID>
Variable name: eipDNSGUARDIANViewStatTrigger<trigger-ID>Armed Type: counter64
Description: The number of times each specified trigger has been armed in the specified view.
1450
SNMP Metrics
Description: The total incoming traffic matching the specified view in bytes.
.1.3.6.1.4.1.2440.1.11.2.4.7.0
Variable name: eipDNSGUARDIANStatSendDNSByte Type: counter64
Description: The total outgoing traffic in bytes.
.1.3.6.1.4.1.2440.1.11.2.3.1.7.<view-ID>
Variable name: eipDNSGUARDIANViewStatSendDNSByte Type: counter64
Description: The total outgoing traffic matching the specified view in bytes.
1451
SNMP Metrics
1452
SNMP Metrics
.1.3.6.1.4.1.2440.1.11.2.4.106.0
Variable name: eipDNSGUARDIANStatReplyREFUSED Type: counter64
Description: The number of queries the server refused to answer, returning the message REFUSED
(RCODE: 5).
1.3.6.1.4.1.2440.1.11.2.3.1.106.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyREFUSED Type: counter64
Description: The number of queries matching the specified view the server refused to answer, returning
the message REFUSED (RCODE: 5).
.1.3.6.1.4.1.2440.1.11.2.4.107.0
Variable name: eipDNSGUARDIANStatReplyYXDOMAIN Type: counter64
Description: The number of queries for which the name exists when it should not, returning the message
YXDOMAIN (RCODE: 6).
.1.3.6.1.4.1.2440.1.11.2.3.1.107.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyYXDOMAIN Type: counter64
Description: The number of queries matching the specified view for which the name exists when it should
not, returning the message YXDOMAIN (RCODE: 6).
.1.3.6.1.4.1.2440.1.11.2.4.108.0
Variable name: eipDNSGUARDIANStatReplyYXRRSET Type: counter64
Description: The number of queries for which the RR set exists when it should not, returning the message
YXRRSET (RCODE: 7).
.1.3.6.1.4.1.2440.1.11.2.3.1.108.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyYXRRSET Type: counter64
Description: The number of queries matching the specified view for which the RR set exists when it should
not, returning the message YXRRSET (RCODE: 7).
.1.3.6.1.4.1.2440.1.11.2.4.109.0
Variable name: eipDNSGUARDIANStatReplyNXRRSET Type: counter64
Description: The number of queries for which the RR set should exist but does not, returning the message
NXRRSET (RCODE: 8).
.1.3.6.1.4.1.2440.1.11.2.3.1.109.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyNXRRSET Type: counter64
Description: The number of queries matching the specified view for which the RR set should exist but
does not, returning the message NXRRSET (RCODE: 8).
.1.3.6.1.4.1.2440.1.11.2.4.120.0
Variable name: eipDNSGUARDIANStatReplyNOTAUTH Type: counter64
Description: The number of queries for which the server is not authoritative for the zone, returning the
message NOTAUTH (RCODE: 9).
.1.3.6.1.4.1.2440.1.11.2.3.1.120.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyNOTAUTH Type: counter64
Description: The number of queries matching the specified view for which the server is not authoritative
for the zone, returning the message NOTAUTH (RCODE: 9).
.1.3.6.1.4.1.2440.1.11.2.4.121.0
Variable name: eipDNSGUARDIANStatReplyNOTZONE Type: counter64
Description: The number of queries for which the name is not in the zone, returning the message NOTZONE
(RCODE: 10).
.1.3.6.1.4.1.2440.1.11.2.3.1.121.<view-ID>
Variable name: eipDNSGUARDIANViewStatReplyNOTZONE Type: counter64
Description: The number of queries matching the specified view for which the name is not in the zone,
returning the message NOTZONE (RCODE: 10).
1453
Appendix L. Class Studio Pre-defined
Variables
This appendix details how to configure a class with pre-defined variables. For more details re-
garding classes and all other class objects, refer to the chapter Configuring Classes.
1454
Class Studio Pre-defined Variables
a. In the field Show if..., you can condition the display of the class object in the wizard in
the form of an "if" statement, like $object_value > 0 or $city=="Washington" that allows
to only display the class object if your condition is matched.
Note that the condition can only be taken into account if the value of the class object
has already been saved in the wizard, either via inheritance or because it is located
after a Jump to page. You can set multiple conditions but they must be separated by
boolean connectors.
PNG
9. Click on OK to complete the operation. The object is now displayed in the left section and
part of the class content.
original
10. Click on to save the class configuration. If you exit without saving, your changes are
lost.
11. Click on to close Class Editor.
1455
Class Studio Pre-defined Variables
1456
Class Studio Pre-defined Variables
1457
Class Studio Pre-defined Variables
Module IPAM
Type Address, Address (v6)
Configuration details
Value 1 to enable the variable, 0 to disable it.
1458
Appendix M. Configuring RADIUS
This appendix details the following configurations for RADIUS authentication:
• Configuring FreeRadius.
• Configuring RADIUS with Cisco ACS.
• Configuring OneTime Password with Token Authentication.
Configuring FreeRADIUS
If you intend to authenticate users via RADIUS, you can configure FreeRadius to retrieve your
groups of users. Once FreeRadius is configured, do not forget to add the RADIUS users authen-
tication rule as detailed in the section Adding RADIUS Authentication Rules.
1459
Configuring RADIUS
BEGIN-VENDOR efficientip
END-VENDOR efficientip
clients.conf
client SDS-1000 {
ipaddr = 192.168.100.100
secret = abc123
}
users
localuser Cleartext-Password := "Password123"
efficientip-groups = "mygroup",
In this command, the number 5 is an unused ACS RADIUS vendor slot number and efficien-
tip.ini is the name of the EfficientIP RADIUS vendor/VSA import file you created earlier.
4. Press Enter. A CSUtil.exe confirmation prompt appears.
5. Confirm that you want to add the RADIUS vendor and halt all ACS services during the pro-
cess, type in Y and press Enter. CSUtil.exe halts ACS services, parses the vendor/VSA input
file, and adds the new RADIUS vendor and VSAs to ACS. This process may take a few
minutes. After it is complete, CSUtil.exe restarts ACS services.
Example of an import file "efficientip.ini" for RADIUS vendor/VSA where EfficientIP is set
as a vendor and 2440 is the IETF code number:
[User Defined Vendor] Name=EfficientIP IETF Code=2440
VSA 1=efficientip-version
VSA 2=efficientip-service-class
1460
Configuring RADIUS
VSA 3=efficientip-identity-type
VSA 16=efficientip-first-name
VSA 17=efficientip-last-name
VSA 18=efficientip-pseudonym
VSA 19=efficientip-ip-host
VSA 20=efficientip-email
VSA 32=efficientip-first-login-path
VSA 33=efficientip-maintainer-group
VSA 34=efficientip-groups
VSA 35=efficientip-admin-group
VSA 64=efficientip-extra-blob
[efficientip-version]
Type=INTEGER
Profile=OUT
[efficientip-service-class]
Type=INTEGER
Profile=OUT
[efficientip-identity-type]
Type=INTEGER
Profile=OUT
[efficientip-first-name]
Type=STRING
Profile=OUT
[efficientip-last-name]
Type=STRING
Profile=OUT
[efficientip-pseudonym]
Type=STRING
Profile=OUT
[efficientip-ip-host]
Type=STRING
Profile=OUT
[efficientip-email]
Type=STRING
Profile=OUT
[efficientip-first-login-path]
Type=STRING
Profile=OUT
[efficientip-maintainer-group]
Type=STRING
Profile=OUT
[efficientip-groups]
Type=STRING
Profile=MULTI OUT
[efficientip-admin-group]
Type=STRING
Profile=OUT
[efficientip-extra-blob]
Type=STRING
Profile=OUT
1461
Configuring RADIUS
SOLIDserver caches the credentials to authenticate every user operation. When the cache expires,
SOLIDserver uses the cached credentials to generate and send a new authentication request to
the RADIUS server. If this request fails, the user is disconnected.
To control when the client is disconnected, a set of registry database entries allow to define for
how long SOLIDserver should cache the data:
1. You can either define for how long SOLIDserver should cache passwords, as detailed in the
section Caching OTP Credentials For a Certain Time.
2. Or you can make sure that the cache does not expire while the user is active, as detailed in
the section Renewing Cached OTP Credentials for Logged Users.
Prerequisites
• Configuring RADIUS authentication rule. For more details, refer to the section Adding RADIUS
Authentication Rules.
• Belonging to a group admin, the only group that can access to the page Registry database.
If you would rather edit one key and ensure your users are not disconnected while their session
is active, refer to the section Renewing Cached OTP Credentials for Logged Users.
1462
Configuring RADIUS
c. In the field Value, specify the value of your choice, in seconds. By default, it is set to
1800, the minimal accepted value is 300.
It should be shorter than the value set for the key ipmserver.login.password_cache_time
to ensure the user OTP credentials do not expire before SOLIDserver session ends.
d. Click on OK to complete the operation.The report opens and closes.The page refreshes
and the new value is displayed.
e. Hit F5 to refresh the web page and take into account your changes. Each user is auto-
matically logged out if no actions are performed above the specified number of seconds.
To edit the registry key that renews cached credentials while the session is active
Only users of the group admin can perform this operation.
1. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
2. In the section Expert, click on Registry database. The page Registry database opens.
3. In the menu, click on Add. The wizard Registry database Add an item opens.
4. In the field Name, type in ipmserver.login.password_cache_time_renew .
5. In the field Value, type in 1 to enable the protection of OTP authenticated .
6. Click on OK to complete the operation. The report opens and closes. The page refreshes
and the new key is listed.
1463
Appendix N. Using Remote
Authentication for SSH Connections to
SOLIDserver
This appendix details how to enable Secure Shell (SSH) connections for remote authentications:
• Configuring LDAP Authentication for SSH Connections.
• Configuring RADIUS Authentication for SSH Connections.
This configuration allows to grant existing users access to as many SOLIDserver appliances as
you want.
Prerequisites
• An LDAP server must be properly configured and running.
• The LDAP server and SOLIDserver must be set at the same time:
• Make sure the LDAP server is on time.
• Configure NTP servers on SOLIDserver. If you want LDAP authentication for several
SOLIDserver appliances, the NTP must be configured on every appliance. For more details,
refer to the section Configuring NTP Servers.
• To set up the LDAP authentication for several appliances, you must:
1. Configure the authentication from the managing SOLIDserver.
2. Once the configuration is complete, apply it the remote appliance(s).
Specificities
The configuration of LDAP authentication for SSH connections:
• Must be done via CLI.
• Must be done locally from a SOLIDserver Management appliance. When the configuration is
complete, you can apply it to the remote SOLIDserver appliance(s) you manage.
On appliances configured in High Availability, the Hot Standby automatically replicates the
configuration.
1464
Using Remote Authentication for
SSH Connections to SOLIDserver
• Allows to grant access to SOLIDserver to existing LDAP users, there is no need to edit
SOLIDserver local user or group of users database. That way, if your LDAP server is not re-
sponding, local users with sufficient rights can still access the appliance via SSH.
# Specify for the following attributes the name of the LDAP user class that can access
SOLIDserver.
pam_filter objectclass=<userclass>
nss_map_objectclass posixAccount <userclass>
# Specify for the following attributes the name of the attribute of the selected user
class
# that contains the user login.
pam_login_attribute <login-attribute>
nss_map_attribute uid <login-attribute>
# If the specified user class is not already set with the attributes: uidNumber,
gidNumber,
# loginShell, homeDirectory.
# You must specify for the following attributes the name of the attribute of the
selected user
# class that contains the users uidNumber and gidNumber.
nss_map_attribute uidNumber <UnixUID-attribute>
nss_map_attribute gidNumber <UnixGID-attribute>
# You can specify for the following attributes the name of the attribute of the
selected user
# that contains the loginShell and homeDirectory used to connect to your appliance.
# These attributes are optional, so if you do not want to set them either comment
the lines or
# do not include them at all. These attributes cannot be declared without value.
nss_map_attribute loginShell <attribute-containing-the-shell-you-connect-to>
nss_map_attribute homeDirectory <attribute-containing-the-path-to-the-directory-"home">
# Set the level of permissions of the LDAP users accessing SOLIDserver via SSH.
# If you set the value of the example below, you grant administrative rights to all
the users
# belonging to the classes specified with "pam_filter" and "nss_map_objectclass".
nss_override_attribute_value uidNumber 1001
1465
Using Remote Authentication for
SSH Connections to SOLIDserver
4. Edit the file /data1/etc/ldap.secret to insert your own LDAP password for the account root-
binddn using the following command:
% emacs /data1/etc/ldap.secret
# Edit the value of "passwd" to retrieve LDAP data. Initial value: "passwd: compat"
passwd: files ldap
# Comment the line "passwd_compat: nis"
# passwd_compat: nis
shells: files
services: compat
services_compat: nis
protocols: files
rpc: files
1466
Using Remote Authentication for
SSH Connections to SOLIDserver
# auth
auth sufficient pam_opie.so no_warn no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow_local
#auth sufficient pam_krb5.so no_warn try_first_pass
#auth sufficient pam_ssh.so no_warn try_first_pass
# Add the following line to specify that LDAP is used for authentication.
auth sufficient /usr/local/lib/pam_ldap.so no_warn
auth sufficient pam_unix.so no_warn try_first_pass
# account
account required pam_nologin.so
#account required pam_krb5.so
account required pam_login_access.so
# Add the following line to specify that you want the credentials to be verified via
LDAP.
account sufficient /usr/local/lib/pam_ldap.so no_warn
ignore_authinfo_unavail ignore_unknown_user
account required pam_unix.so
# session
#session optional pam_ssh.so want_agent
session required pam_permit.so
# password
#password sufficient pam_krb5.so no_warn try_first_pass
password required pam_unix.so no_warn try_first_pass
Once you edited the files ldap.conf, nsswitch.conf and pam.d/sshd, follow the procedure below.
#BASE dc=example,dc=com
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
#SIZELIMIT 12
#TIMELIMIT 15
1467
Using Remote Authentication for
SSH Connections to SOLIDserver
#DEREF never
BEGIN-VENDOR efficientip
END-VENDOR efficientip
Once you edited the LDAP communication settings, you need to make sure the configuration is
properly set.
This command returns the list of all the users that can connect via SSH. All local, LDAP
and/or RADIUS users are listed as follows:
<username>:*:1001:1000:admin:/data1/users/admin:/bin/csh
Once the configuration is properly set, you need to apply the configuration to remote appliances.
1468
Using Remote Authentication for
SSH Connections to SOLIDserver
Before applying the configuration, refer to the section Making Sure the Configuration is Properly
Set to ensure you are not pushing an erroneous configuration on your network. If the configuration
is incorrect, pushing it might prevent you from connecting to the remote appliance(s) via SSH.
To apply the local LDAP authentication configuration for SSH to remote appliances
1. Open a browser.
2. Connect to the SOLIDserver management appliance you configured using its IP address or
hostname.
3. In the sidebar, click on Administration or Admin Home. The page Admin Home opens.
4. In the section System, click on the button Centralized Management. The page Centralized
Management opens.
5. Tick the remote appliance(s) to which you want to apply the local LDAP authentication.
6. In the menu, select Tools > Push local LDAP/RADIUS configuration. The wizard Push
the local LDAP/RADIUS authentication opens.
7. Click on OK to complete the operation. The report opens and closes.
Prerequisites
• A RADIUS server properly configured and running.
• The RADIUS server and SOLIDserver must be set at the same time.
• To set up the RADIUS authentication for several appliances, you must:
1. Configure the authentication from the managing SOLIDserver.
2. Apply it to the remote appliance(s).
• The user must exist on SOLIDserver.
Specificities
The configuration of RADIUS authentication for SSH connections:
• Must be done via CLI.
1469
Using Remote Authentication for
SSH Connections to SOLIDserver
• Must be done locally from a SOLIDserver Management appliance. When the configuration is
complete, you can apply it to the remote SOLIDserver appliance(s) you manage.
On appliances configured in High Availability, the Hot Standby automatically replicates the
configuration.
• If your RADIUS server is not responding, local users with sufficient rights can still access the
appliance via SSH.
The edited file should include the RADIUS server IP address, secret key, timeout in seconds
and the maximum number of attempts, as follows: <radius_server_ip>:<port> <secret_key>
<timeout> <maximum_attempts>. Not indicating the port, as in the example below, automat-
ically sets it to the default RADIUS port:
#radius_server_ip:port secret_key timeout maximum_attempts
1.2.3.4 RadiusSecretKey 3
# auth
auth sufficient pam_opie.so no_warn no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow_local
#auth sufficient pam_krb5.so no_warn try_first_pass
#auth sufficient pam_ssh.so no_warn try_first_pass
# Radius authentication
1
For more details, refer to the radius.conf Linux man page available at https://linux.die.net/man/5/radius.conf.
1470
Using Remote Authentication for
SSH Connections to SOLIDserver
# account
account required pam_nologin.so
#account required pam_krb5.so
account required pam_login_access.so
account required pam_unix.so
# session
#session optional pam_ssh.so want_agent
session required pam_permit.so
# password
#password sufficient pam_krb5.so no_warn try_first_pass
password required pam_unix.so no_warn try_first_pass
If you want a user to connect in SSH only via RADIUS authentication, make sure that his password
is empty. Such user cannot log in using SSH any other way than using RADIUS since, by default,
the server does not allow login to accounts with an empty password.
Any user added to the list will be able to connect SOLIDserver using the secret key configured
in the section Editing the RADIUS Configuration for SSH Daemon.
Note that, as a best practice, setting a uid above 10000 allows to easily identify "Radius-only
users".
Once you edited the RADIUS users list, you need to make sure the configuration is properly set.
1471
Using Remote Authentication for
SSH Connections to SOLIDserver
This command returns the list of all the users that can connect via SSH. All local, LDAP
and/or RADIUS users are listed as follows:
<username>:*:1001:1000:admin:/data1/users/admin:/bin/csh
Once your configuration is properly set, you need to apply the configuration to remote appliances.
Before applying the configuration, refer to the section Making Sure the Configuration is Properly
Set to ensure you are not pushing an erroneous configuration on your network. If the configuration
is incorrect, pushing it might prevent you from connecting to the remote appliance(s) via SSH.
1472
Appendix O. Configuring Non-Supported
Options
Via CLI, administrators can incorporate non-supported options, i.e. configurations or settings,
that cannot be configured from SOLIDserver GUI.
Before going further, you must take into account prerequisites and limitations.
Prerequisites
• Configuring local servers, DHCP EfficientIP servers, DNS EfficientIP servers or Hybrid DNS
servers.
• The service you want to configure must be running.
• The user configuring the non-supported options must have:
• Administrative rights over SSH connections to SOLIDserver.
• A good understanding of the environment and of the services configuration file, syntax and
options.
• Checking the changes before applying them to the production environment.
1473
Configuring Non-Supported Options
Limitations
• All changes must be performed via SSH, you cannot configure or display non-supported options
from the GUI.
• The configuration of non-supported options can only be done in a specific sections of the files
and nowhere else.
• You can only configure locally non-supported options.
• You can only configure non-supported options on physical servers EfficientIP DNS or DHCP
servers, you cannot set them on a smart architecture.
If you want to add non-supported options on several physical servers managed via the same
architecture, you must set them on each server configuration file individually.
• The non-supported options that you configure overwrite the current configuration. So make
sure that the options you incorporate are not already set in the configuration because the GUI
might not reflect these changes. Besides, configuring options twice may prevent the service
from running properly.
1474
Configuring Non-Supported Options
By default, both files exist in the directory /ipfw. Note that the current firewall mode of your appli-
ance, Restricted and Open, is visible in the GUI on the page Network configuration, for more
details refer to the section Setting the Firewall.
Before configuring non-supported rules, keep in mind that there is no validation check for these
files, so if you misconfigure either you can lose access to your appliance, via SSH or other-
wise.
ipfw.rules
#!/bin/sh
/sbin/ipfw -q flush
if [ -f /etc/ipfw.rules.stats ]; then
. /etc/ipfw.rules.stats
fi
if [ -f /etc/ipfw.rules.sourcerouting ]; then
. /etc/ipfw.rules.sourcerouting
fi
Before configuring non-supported rules, keep in mind that there is no validation check for these
files, so if you misconfigure either you can lose access to your appliance, via SSH or other-
wise.
1475
Configuring Non-Supported Options
5. In the directory /usr/local/nessy2/etc/ipfw/, edit the file ipfw.rules.inc to incorporate the non-
supported firewall rules of your choice.
Keep in mind that if you misconfigure this file you can lose access to your appliance.
6. Restart the firewall daemon to take into account your changes with the command:
service ipfw restart
ipfw_open.rules
#! /bin/sh
/sbin/ipfw -q flush
if [ -f /etc/ipfw.rules.stats ]; then
. /etc/ipfw.rules.stats
fi
if [ -f /etc/ipfw.rules.sourcerouting ]; then
. /etc/ipfw.rules.sourcerouting
fi
Before configuring non-supported rules, keep in mind that there is no validation check for these
files, so if you misconfigure either you can lose access to your appliance, via SSH or other-
wise.
1476
Configuring Non-Supported Options
sudo -s
1477
Configuring Non-Supported Options
By default, each directory contains a file httpd.conf.inc that you can edit to specify the settings
of your choice.
Note that you can add as many *.inc files as you need in the directories /pre and /post.
httpd.conf
## Include files for customizations
## USE WITH CAUTION
IncludeOptional /usr/local/nessy2/etc/httpd/pre/*.inc myhttpconf.inc
#
# This is the main Apache HTTP server configuration file. It contains the Listen 81
# configuration directives that give the server its instructions.
...
ServerRoot "/usr/local"
...
Listen 80
Include etc/apache24/Includes/*.conf
<VirtualHost 10.10.10.10:81>
DocumentRoot /data1/customer-portal
ServerName portal.customer.com
ErrorLog "/var/log/httpd-portal_error_log"
<Directory /data1/customer-portal>
AllowOverride All
Order deny,allow
allow from all
</Directory>
</VirtualHost>
1478
Configuring Non-Supported Options
Before configuring non-supported settings, keep in mind that there is a validation check for these
files but any invalid configuration may prevent the service from running properly or prevent
you from accessing the GUI altogether.
If no errors are returned and the file syntax is OK, go to the next step. If not, you must edit
the content of the included file(s) because you might no longer be able to access or GUI or
prevent the service from running.
7. Once the configuration is OK, restart the Apache daemon to take into account your changes
with the command:
apachectl restart
1479
Configuring Non-Supported Options
unbound.conf
server:
verbosity: 1
interface: 0.0.0.0
interface: ::0
port: 53
do-ip4: yes
do-ip6: yes
do-udp: yes
do-tcp: yes
chroot: ""
directory: "/etc/unbound/"
pidfile: "/var/run/unbound/unbound.pid"
hide-identity: yes
hide-version: yes
msg-cache-size: 128m
username: named
# include: /usr/local/nessy2/etc/unbound/global_include.conf global_include.conf
remote-control:
log-time-ascii: yes
control-enable: yes
control-interface: 127.0.0.1
server-key-file: /etc/unbound/unbound_server.key
server-cert-file: /etc/unbound/unbound_server.pem
control-key-file: /etc/unbound/unbound_control.key
control-cert-file: /etc/unbound/unbound_control.pem
# include: /usr/local/nessy2/etc/unbound/remote_include.conf remote_include.conf
control-interface: 192.168.3.4
Before configuring non-supported settings, keep in mind any invalid option is ignored.
1480
Configuring Non-Supported Options
6. Make sure the whole configuration file is still viable using the command:
unbound-checkconf /etc/unbound/unbound.conf
If no errors are returned, go to the next step. If not, you must edit the content of the included
file(s) because incorrect configurations are ignored.
7. Once the configuration is OK, restart the Unbound daemon to take into account your changes
with the command:
service ipmdns.sh restart
1481
Configuring Non-Supported Options
nsd.conf
remote-control:
control-enable: "yes"
control-interface: ::1
control-interface: 127.0.0.1
control-port: 8953
server-key-file: "/data1/etc/nsd/nsd_server.key"
server-cert-file: "/data1/etc/nsd/nsd_server.pem"
control-key-file: "/data1/etc/nsd/nsd_control.key"
control-cert-file: "/data1/etc/nsd/nsd_control.pem"
# include: /usr/local/nessy2/etc/nsd/remote_include.conf remote_include.conf
server:
control-interface: 192.168.3.4
include: /data1/etc/nsd/ip-address.conf
database: "/data1/etc/nsd/nsd.db"
pidfile: "/var/run/nsd/nsd.pid"
difffile: "/data1/etc/nsd/ixfr.db"
xfrdfile: "/data1/etc/nsd/xfrd.state"
server-count: 4
zonesdir: "/data1/etc/namedb/zones"
port: 53
hide-version: yes
verbosity: 0
username: named
ipv4-edns-size: 4096
ipv6-edns-size: 4096
# include: /usr/local/nessy2/etc/nsd/global_include.conf global_include.conf
identity: "myserver"
Before configuring non-supported settings, keep in mind any invalid option is ignored.
1482
Configuring Non-Supported Options
6. Make sure the whole configuration file is still viable using the command:
nsd-checkconf /etc/nsd/nsd.conf
If no errors are returned, go to the next step. If not, you must edit the content of the included
file(s) because incorrect configurations are ignored.
7. Once the configuration is OK, restart the NSD daemon to take into account your changes
with the command:
service ipmdns.sh restart
1483
Configuring Non-Supported Options
Before configuring non-supported settings, keep in mind any invalid option is ignored.
named.conf
key "rndc_key" {
statistics-channels {
algorithm hmac-md5;
inet 10.0.0.11 port 8053;
secret "c3Ryb25nIGVub3VnaCBmb34gYnV0IG1hZGUgZm9yIGEgd29tYW4K" };
;}
controls {
inet 127.0.0.1 port 953 allow {
localhost;
};
};
acl "admin" {
any;
};
options {
listen-on-v6 { any; };
directory "/etc/namedb";
...
include "/usr/local/nessy2/etc/named/options_include.conf"; options_include.conf
};
check-sibling yes;
zone "mycorp.com"{ transfers-in 100;
tcp-client 400;
type slave;
file "zones/slave/mycorp.com/mycorp.com";
masters {
10.0.3.30;
};
};
1484
Configuring Non-Supported Options
Before configuring non-supported settings, keep in mind any invalid option is ignored.
5. Incorporate non-supported BIND settings for the server in the file that suits your needs:
• To configure settings in the section global, edit the file global_include.conf according to
your needs. The full path to the file is /usr/local/nessy2/etc/named/global_include.conf
• To configure settings in the section options, edit the file options_include.conf according
to your needs. The full path to the file is /usr/local/nessy2/etc/named/options_include.conf
6. Make sure the whole configuration file is still viable using the command:
/usr/local/nessy2/bin/named-checkconf /etc/namedb/named.conf
If no errors are returned and the configuration file is OK, go to the next step. If not, you must
edit the content of the included file because incorrect configurations are ignored.
7. Once the configuration is OK, restart the DNS daemon to take into account your changes
with the command:
service ipmdns.sh restart
If you installed Linux packages, you must stop and start the daemon using the commands:
service ipmdns stop service ipmdns start
If you installed Linux packages, you must use the following command:
service ipmdns status
1485
Configuring Non-Supported Options
named.conf
key "rndc_key" {
algorithm hmac-md5;
secret "c3Ryb25nIGVub3VnaCBmb34gYnV0IG1hZGUgZm9yIGEgd29tYW4K";
};
controls {
inet 127.0.0.1 port 953 allow {
localhost;
};
};
acl "admin" {
any;
};
view "intranet" {
match-clients {
key myview;
192.168.0.0/24;
};
match-destinations {
!external;
!42.42.42.0/24;
192.168.100.15
};
zone "mycorp.com"{
type slave;
file "zones/slave/mycorp.com/mycorp.com";
masters {
10.0.3.30;
};
};
cleaning-interval 120;
max-journal-size 1m;
empty-zones-enable no;
Figure O.7. Example of non-supported BIND settings configured for a view called "intranet"
Before configuring non-supported settings, keep in mind any invalid option is ignored.
1486
Configuring Non-Supported Options
If no errors are returned and the configuration file is OK, go to the next step. If not, you must
edit the content of the included file because incorrect configurations are ignored.
7. Once the configuration is OK, restart the DNS daemon to take into account your changes
with the command:
service ipmdns.sh restart
If you installed Linux packages, you must stop and start the daemon using the commands:
service ipmdns stop service ipmdns start
If you installed Linux packages, you must use the following command:
service ipmdns status
Keep in mind that if any option is invalid, the included configuration is ignored until you correct
what needs to be changed. As for conflicting options, they overwrite your configuration.
1487
Configuring Non-Supported Options
By default, the directory /snmpd contains a file custom.conf that you can edit to specify the settings
of your choice.
Note that you can add as many files as you need in the directory /snmpd.
snmpd.conf
sysDescr EfficientIP SOLIDserver
sysObjectID .1.3.6.1.4.1.2440
sysServices 72
sysContact EfficientIP Support <[email protected]>
sysLocation Unknown
master agentx
agentaddress udp:161
com2sec secu0 default 'public'
group MyROGroup v1 secu0
group MyROGroup v2c secu0
view all included .1 80
access MyROGroup "" any noauth exact all none none
access MyRWGroup "" any noauth exact all none none
trapcommunity public
trapsess -v 2c -c public 10.0.11.3
authtrapenable 1
Before configuring non-supported settings, keep in mind that there is no validation check for
this file. Any invalid configuration may prevent the service from running properly.
5. In the directory /usr/local/nessy2/etc/snmpd, edit the file custom.conf according to your needs
or create a file to incorporate the non-supported SNMP options of your choice.
6. Once the configuration is OK, restart the SNMP daemon to take into account your changes
with the command:
1488
Configuring Non-Supported Options
1489
Configuring Non-Supported Options
Before configuring non-supported options, keep in mind any invalid option is ignored.
dhcpd.conf
include "/usr/local/nessy2/etc/dhcp/global_include.conf"; global_include.conf
ddns-update-style none;
ddns-updates off; if (exists host-name) {
option server.log-facility local7; log (info,concat("We have host-name:", option host-name));
authoritative; }
option server.min-lease-time 60;
...
Before configuring non-supported options, keep in mind any invalid option is ignored.
If no errors are returned, go to the next step. If not, you must edit the content of the included
file(s) because incorrect configurations are ignored.
7. Once the configuration is OK, restart the DHCP daemon to take into account your changes
with the command:
service ipmdhcp.sh restart
1490
Configuring Non-Supported Options
dhcpd6.conf
include "/usr/local/nessy2/etc/dhcp6/global_include.conf"; global_include.conf
authoritative;
ddns-update-style none; if (exists host-name) {
option server.omapi-port 7912; log (info,concat("We have client-id:", option dhcp6.client-id));
}
...
subnet6 2001:db8:0:1::/64 {
range6 2001:db8:0:1::129 2001:db8:0:1::254;
}
Before configuring non-supported options, keep in mind any invalid option is ignored.
If no errors are returned, go to the next step. If not, you must edit the content of the included
file(s) because incorrect configurations are ignored.
7. Once the configuration is OK, restart the DHCPv6 daemon to take into account your changes
with the command:
service ipmdhcp6.sh restart
1491
Configuring Non-Supported Options
By default, the directory /etc contains a file ntp.conf.inc that can de edited to specify the settings
of your choice.
ntp.conf
# By default, exchange time with everybody, but dont allow configuration.
restrict -4 default kod notrap nomodify nopeer noquery limited
restrict -6 default kod notrap nomodify nopeer noquery limited
Before configuring non-supported settings, keep in mind that there is no validation check for
this file. Any invalid configuration may prevent the service from running properly.
5. In the directory /usr/local/nessy2/etc/, edit the file ntp.conf.inc according to your needs to
incorporate the non-supported NTP options of your choice.
6. Once the configuration is OK, restart the NTP daemon to take into account your changes
with the command:
service ntpd restart
1492
Configuring Non-Supported Options
By default, the directory /include can contain any file that you can configure with the settings of
your choice.
syslog.conf
@version:3.7
@define allow-config-dups 1
@include "scl.conf"
@include "eip_syslog-ng.conf"
@include "syslog-ng.d/eip_redirect.conf"
log {
destination{ file("/tmp/test.log"); };
flags(catchall);
};
If no errors are returned, go to the next step. If not, you must edit the content of the included
files because incorrect configurations are ignored.
7. Make sure the daemon is running with the command:
service syslog-ng status
1493
Configuring Non-Supported Options
postgresql.conf
log_destination = 'syslog'
autovacuum = on
max_connections = 100
maintenance_work_mem = 64MB
update_process_title = off
wal_level = hot_standby
max_wal_senders = 2
listen_addresses = '*'
hot_standby = on
wal_keep_segments = 256
log_min_duration_statement = -1
synchronous_commit = off
commit_delay = 50000
commit_siblings = 5
wal_writer_delay = 2000
geqo_threshold = 9
shared_preload_libraries = 'auto_explain'
auto_explain.log_min_duration = '1000ms'
Before configuring non-supported options, keep in mind that there is no validation check for
these files. Any invalid configuration may prevent the service from running properly.
5. In the directory /usr/local/nessy2/etc/, edit the file postgresql.conf.inc according to your needs
to incorporate the non-supported PostgreSQL options of your choice.
6. Restart the PostgreSQL daemon to take into account your changes with the command:
service postgresql restart
1494
Configuring Non-Supported Options
sshd_config
## Include file for customizations
## USE WITH CAUTION
Include /usr/local/nessy2/etc/ssh/sshd_config.inc sshd_config.inc
Include /usr/local/nessy2/etc/ssh/sshd_eip_default_config.inc
PermitEmptyPasswords yes
#Port 22 PrintLastLog no
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
#HostKey /usr/local/etc/ssh/ssh_host_rsa_key
#HostKey /usr/local/etc/ssh/ssh_host_ecdsa_key
#HostKey /usr/local/etc/ssh/ssh_host_ed25519_key
# Logging
#SyslogFacility AUTH
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin prohibit-password
#StrictModes yes
#MaxAuthTries 6
#MaxSessions 10
...
Figure O.14. Example of non-supported OpenSSH settings and SSH banner customization
1495
Configuring Non-Supported Options
Before configuring non-supported options, keep in mind that there is no validation check for these
files, so if you misconfigure sshd_config.inc you can lose access to your appliance via
SSH.
If no errors are returned, go to the next step. If not, you must edit the content of the included
file(s) because incorrect configurations can prevent you from connecting with SSH.
7. Once the configuration is OK, restart the OpenSSH daemon to take into account your changes
with the command:
service sshd restart
1496
updating
Index Device Manager interfaces, 1066
updating from
NetChange discovered items, 1005
A Administration
ACL (DHCP), 423 Alerts (see alerts)
adding, 425 All licenses (see license)
adding ACL entries, 430 Backup & Restore (see backup)
adding an ACL based on option 82, 455 Centralized Management (see centralized manage-
copying (DHCPv4), 426 ment)
deleting, 428 Certificates and keys
deleting ACL entries, 430 certificates (see SSL)
editing, 426 database keys (see database encryption)
granting access to known clients, 425 GSS-TSIG keys (see GSS-TSIG)
retrieving lease "domain-name" (DHCPv4), 427 Class Studio (see Class Studio)
ACL (DNS) Custom DB (see Custom DB)
configuring on a server, 572 custom packages (see Packager)
editing a view match clients list, 597 customization (see Customization)
editing a view match destination list, 597 exporting data (see exports)
Active Directory Firewall rules (see firewall rules)
authenticating users, 1158 importing via CSV, 171
domain controllers (see Identity Manager) Internal module setup, 33
dynamic update authentication, 691 Local files listing (see local files listing)
hosting AD domain zones, 630 maintenance (see maintenance)
addresses monitoring (see monitoring)
device addresses (see NetChange) Network capture (see troubleshooting)
IP addresses (see addresses (IPAM)) Network configuration (see network configuration)
addresses (IPAM), 256 Network devices & SNMP profiles
adding, 258 Network devices connection profiles (see ver-
adding by search, 261 sioning (NetChange))
adding manually, 258 SNMP profiles configuration (see SNMP)
aliases (see aliases (IPAM)) Reboot the system, 1264
assigning, 258 Services configuration (see services configuration)
automating IPv4 to IPv6 transition, 804 Session tracking (see tracking)
cleaning invalid addresses, 273 Shutdown the system, 1265
cloud addresses (see cloud synchronization) Syslog (see logs)
deleting, 273 System statistics (see statistics)
DNA synchronization, 1400 Time & Date configuration, 92
editing, 262 Troubleshooting dump (see troubleshooting)
editing the network/broadcast address, 262 Upgrade (see upgrade)
finding Identity Manager sessions, 270 User tracking (see tracking)
importing Users, Groups & Rights, 1136
NetID data, 177 Authentication rules (see authentication rules)
VitalQIP data, 176 Groups (see groups of users)
importing via CSV, 142 Resources (see groups of users)
migrating IPv4 addresses properties, 269 Rights (see groups of users)
moving IPv4 addresses across networks, 268 Users (see users)
moving IPv4 addresses across spaces, 269 advanced properties, 778
moving IPv4 addresses across the VLSM, 303 configuring DHCP properties
pinging an address, 270 to update the DNS, 806
raw data export/import, 276 to update the IPAM, 806
renaming IPv4 addresses massively, 267 configuring DNS properties
restoring deleted IP addresses, 274 to update the IPAM, 810
statuses and types, 257 configuring IPAM properties
1497
Index
1498
Index
1499
Index
D renaming, 1060
managing IPAM interaction, 1066
Dashboards, 202
using the link option, 1069
dashboards, 204
using the MAC address, 1066
adding, 205
ports, 1052
deleting, 208
adding manually, 1056
displaying/hiding, 205
deleting, 1065
editing, 206
discovering, 1054
ordering, 205
editing, 1061
gadgets, 209
managing/unmanaging, 1053
adding, 215
renaming, 1060
assigning, 221
rights, 1140
default gadgets, 1397
tracking changes, 1064
deleting, 226
updating from
displayed by default, 211
IPAM addresses automatically, 1048
displaying/hiding, 223
IPAM addresses manually, 1066
editing, 223
NetChange discovered items, 1047
enabling/disabling, 225
NetChange network devices, 1047
setting visibility, 225
devices
database encryption, 1277
devices (see Device Manager)
activating, 1278
network devices (see network devices
adding database keys, 1278
(NetChange))
deactivating, 1281
DHCP, 325
deleting database keys, 1281
ACL (see ACL (DHCP))
downloading database keys, 1280
delegated prefixes (v6), 463
importing database keys, 1280
exporting data (see exports)
DDNS
failover (see failover channels)
Dynamic DNS (see dynamic update)
groups (see groups (DHCP))
scavenging, 642
importing data (see imports)
secure Dynamic DNS (see secure dynamic up-
IP address labels (see labels in IPv6)
date)
IP helper, 401
delegated prefixes (DHCPv6), 463
ISC server packages on Linux, 377
Device Manager, 1041
leases (see leases)
configuring Device Manager, 1044
monitoring
devices, 1043
audit, 466
adding automatically, 1045
from the page Analytics, 467
adding from DHCP lease/static, 1071
from the properties page, 465
adding manually, 1048
lease statistics, 465
deleting, 1050
server analytics, 465
duplicating, 1049
state log, 466
editing, 1049
using rules, 473
managing/unmanaging, 1044
options (see DHCP options)
merging, 1050
prefix delegations (see DHCPv6 prefix delegations)
dual stack (see dual stack)
preventing IP address duplication, 453
exporting data (see exports)
ranges (see ranges (DHCP))
importing data via CSV, 159
reporting (see reports)
interfaces, 1052
rights and resources, 1138
adding automatically, 1055
scopes (see scopes)
adding from DHCP lease/static, 1071
servers (see servers (DHCP))
adding manually, 1058
shared networks (see shared networks)
deleting, 1065
smart architectures (see smart architectures)
discovering, 1054
statics (see statics)
editing, 1062
DHCP options, 445
managing/unmanaging, 1053
all available options, 1404
1500
Index
1501
Index
1502
Index
1503
Index
1504
Index
1505
Index
1506
Index
1507
Index
restricting access with port-security, 980 configuring the management appliance, 1177
updating description, 978 deleting remote appliances, 1199
prefetch, 560 editing remote appliances, 1186
prefix delegations (see DHCPv6 prefix delegations) managing remote network and services, 1179
propagation property monitoring logs/statistics/time drift, 1180
configuring, 774 replacing an appliance, 1198
setting on advanced properties, 812 statuses, 1176
setting on several objects parameters, 775 upgrading remote appliances, 1292
PXE, 452 reports, 1210
available reports, 1211
Q downloading and displaying, 1218
query-source generating, 1216
at server level, 567 managing scheduled reports, 1219
at view level, 611 on DHCP scopes, 1212
query-source-v6 on DHCP servers, 1211
at server level, 568 on DNS servers, 1212
at view level, 612 on DNS views, 1214
querylog on DNS zones, 1214
DNS, 765 on NetChange network devices, 1215
Guardian, 918 on system statistics, 1216
on users, 1155
scheduling, 1217
R resource records, 663
RADIUS
adding, 665
authenticating users, 1162
A, 667
configuring a FreeRadius server, 1459
AAAA, 667
configuring authentication via SSH, 1469
AFSDB, 668
configuring OneTime Password, 1462
CAA, 669
configuring with Cisco RADIUS ACS, 1460
CERT, 669
ranges (DHCP), 404
CNAME, 670
adding, 405
DHCID, 671
configuring options, 410
DNAME, 671
deleting, 412
DNSKEY, 672
editing, 408
DS, 740
importing
HINFO, 673
Infoblox data, 182
MINFO, 674
ISC data, 179
MX, 674
MetaIP data, 183
NAPTR, 675
Microsoft data, 181
NS, 676
NetID data, 184
NSAP, 677
VitalQIP data, 180
OPENPGPKEY, 677
importing via CSV, 148
PTR, 678
replicating in the IPAM, 409
SRV, 680
resizing, 409
SSHFP, 679
raw data (IPAM)
TLSA, 680
exporting objects as raw data, 276
TXT, 681
importing objects as raw data, 277
URI, 682
records (see resource records)
WKS, 682
recursion
changing hostname convention, 688
at server level, 549
copying, 687
at view level, 604
delegation, 686
recursive-clients, 551
deleting, 690
remote management, 1173
DNSSEC records (see DNSSEC)
adding remote appliances, 1177
editing, 683
1508
Index
1509
Index
1510
Index
1511
Index
1512
Index
1513
Index
adding, 616
adding or removing an NS record, 636
classless in-addr.arpa delegation, 650
configuring, 649
configuring name servers, 649
converting, 635
copying, 636
delegation, 649
delegation-only zones, 628
deleting, 647
disabling/enabling, 647
editing, 630
force-notify, 645
force-refresh, 646
force-retransfer, 646
forcing a full synchronization, 630
forward zones, 622
forwarding, 651
hint zones, 627
hosting active directory domain zones, 630
importing
BIND data, 187
VitalQIP data, 188
importing via CSV, 154
master zones, 617
moving, 636
RPZ zones (see RPZ)
scavenging (DDNS), 642
setting authorizations on multiple zones, 637
setting forwarders, 641
setting master servers, 642
setting space, 637
slave zones, 620
statuses, 616
stub zones, 624
synchronizing, 630
1514