cc/td/doc/product/rtrmgmt/ciscoasu/nr/nr30t
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Using the Nrcmd Commands

Using the Nrcmd Commands

The Network Registrar nrcmd program is a command-line based configuration tool. It allows you to set all Network Registrar configurable options as well as start and stop the servers.

This chapter contains an alphabetic listing of all the commands and their properties.

Admin

The admin command allows you to configure administrators for the cluster. You can choose any string for the name. Network Registrar uses the password to authenticate the name. If you create an administrator without a password, Network Registrar cannot authenticate the name, and thus will deny that user access to the cluster.

Because the password is sensitive information, Network Registrar prints its value as'********'.

The syntax is:

admin name create [prop=value]

admin name delete

admin list

Examples

To create the administrator bob with the password xyz, type:

nrcmd> admin bob create password=xyz
 

To delete the administrator bob, type:

nrcmd> admin bob delete

Admin Properties

Use the set, get, and show commands to assign and retrieve values from the admin's properties.

The syntax is:

admin name set prop=value [prop=value]

admin name get prop

admin name show

admin name enterPassword [password]

To enter a password and not have Network Registrar display the password on your screen, create an administrator and do not supply a password. Then use the enterPassword command to enter a password and prevent Network Registrar from echoing it on the screen. Network Registrar prompts you to verify the password before it accepts it.

Table 2-1 lists and describes the admin property.
Table 2-1: Admin Property
Properties Description

password

The administrator's password

Client

The client and client-class commands let you create and manipulate clients and groups of clients for the purpose of determining what type of IP address and/or policy to assign to requesting hosts.

Using the client command you can assign properties to a specific client entry, based on the client's MAC address or the literal string default, which matches any client that does not have a specific client configuration. The properties you can assign include such things as a class of client, a policy, an action, and the inclusion or exclusion of scope selection tags. The DHCP server looks up these properties to determine how it should process the host's request for an IP address.

You can configure common client properties such as selection criteria, in one client-class configuration, and have multiple client configurations use it.

The DHCP server reads the client configuration information each time it receives a request for an IP address, so you do not have to reload the server after modifying these client configurations. If you modify the default client configuration however, you must reload the server in order for the change to take effect.

The way that you specify the client is by using the MAC address in the format of hardware-type,hardware-length,hardware address or the word default. Note that the commas are required.

A sample Ethernet MAC address might be 1,6,06:44:40:26:f5:0f.

The syntax is:

client name create [prop=value]

client name delete

client list

Examples

To create a client that is a member of the external client-class, type:

nrcmd> client 1,6,02:02:02:02:02:02 create 
client-class-name=external

To delete client 1,6,02:02:02:02:02:02:, type:

nrcmd> client 1,6,02:02:02:02:02:02 delete
 

To list all the client-classes, type:

nrcmd> client list

Note Use lower case when creating clients, because no matter how you specify the client Network Registrar stores the client's name in lower case. Using lower case allows you to consistently reference the client in all instances, such as in scripts like the pre-client-lookup extension.

Client Properties

The property list contains the name and values in the following format: prop=value{,value}.

For the host-name and domain-name strings to have any effect, you must have enabled dynamic DNS update in the scope from which the IP address was allocated.

Use the set and get commands to set and display their values.

The syntax is:

client macaddress set prop=value

client macaddress get prop

client macaddress show

Table 2-2 lists the client command properties.


Table 2-2: Client Command Properties
Property Description

action

The action to take for this client. You can specify either exclude, ignore, or one-shot. For more information about these actions, see the "Action Strings" section.

authenticate-until

(Client-only) Specifies whether to limit the authentication time to the duration you have specified. For more information about how to specify the time, see the "Authenticate-Until" section.

client-class-name

(Client-only) The client-class to which the client belongs. Note that the client-class-name property may only appear in the client entry. It is an error to specify a client-class name property in a client-class object. If the client is not a member of a client-class, then the DHCP server uses the default client-class properties.

domain-name

The domain name to use when performing DNS updates. Places the client's A record in this DNS domain.

host-name

The host name. Use this string to replace any host-name DHCP option sent by the DHCP client. For more information about host names, see the "Host Name Strings" section.

policy-name

The policy to add to Network Registrar's DHCP policy search list for this client.

selection-criteria

The scope selection tags to build the scope inclusion list.

selection-criteria-excluded

The scope selection tags to build the scope exclusion list.

unauthenticated-client-class-
name

The name of the client-class to use if this client is no longer authenticated.

user-defined

A user-defined string that can be set and queried. This property has no effect on the operation of the DHCP server.

Action Strings

The action string is made up of one or more comma-delimited tokens. Valid tokens are the following:

One-Shot Action

Use the one-shot action to allocate provisional addresses, which are useful when you want an unknown client to have an address for only a short period of time.

To use the one-shot action in this way, configure it as the action for the default client (or in the client-class specified by the default client). This configuration causes the server to give a lease to an unknown client, but when the lease expires, the server will not respond to that client for the duration of the grace period. After the grace period expires, the server will not respond to that client until the now available lease is reallocated to another client. This final period may be short or long, depending on the number of leases in the scope, and the number of clients using them. Newly available leases go on the end of a queue, and are allocated from the beginning of a queue, so that it might be quite some time before this lease is reallocated to another client.

It is possible to allow the client a relatively short lease time, such as one day, and then specify a long grace period, such as two weeks. In this manner, you can offer an incentive to the client to register with some authority and become a known client, while preventing the lease from being reallocated to another client.

After the lease expires, the client is unable to get another address for the extent of the two-week grace period. Note that you can configure the lease and grace period differently for each scope, so that the non-provisional leases can have different lease and grace periods.

After the lease is reallocated to another client, all record of the first client's use is lost, and the first client could get another lease as an unknown client and have another opportunity to register.

Using provisional addresses would be less restrictive if you use multiple DHCP servers, because each one operates its one-shot capabilities independently. Thus, with the above approach and two DHCP servers, an unregistered client could get two days of provisional address use every two weeks.

Authenticate-Until

The authenticate-until property provides a mechanism for limiting the authentication of a client entry. By default, client entries are authenticated forever, but by using the authenticate-until property it is possible to specify an expiration time for the authentication.

When the authentication for a client entry is no longer authenticated, the DHCP server uses the value of the unauthenticated-client-class property for the name of the client-class entry to use in answering this DHCP request. If the unauthenticated-client-class property is not set or if there is no client-class entry in the unauthenticated-client-class property, the DHCP server ignores the DHCP request; that is, the server will not provide the client an IP address.

The following are valid authentication values:


Note Wherever you specify a date using the nrcmd command, you should enter the time that is local to the nrcmd process. This means that if the server is running in another time zone than your nrcmd process, you should disregard the time zone where the server is running and use local time instead.

Host Name Strings

The value you specify in the host-name property can be one of two general forms.

The first form is a string that does not start with a "@." This form of host-name value is used to override the DHCP client-request host name. When you enter a valid name, you cause the DHCP server to ignore any host name specified by this client, and instead use this client-entry property. The actual value of the host-name option in the client's DHCP packet is ignored.

The second form is a string that starts with the special token "@." Network Registrar uses this form of host-name value to signal the following special handling.

Client-Class

The client-class command allows you to apply a set of properties to a group or class of clients.

Client-Class Creation and Deletion

The syntax is:

client-class name create [prop=value]

client-class name delete

client-class list

Examples

To create the client-class internal, type:

nrcmd> client-class internal create
 

To delete the client-class internal, type:

nrcmd> client-class internal delete
 

To list the all the client-classes, type:

nrcmd> client-class list

Note Client-class names are case sensitive. When referencing a client-class, you need to type the name just as it was created.

Client-Class Properties

The client-class command allows you to configure and display common properties for DHCP client configurations using the set, get and show commands.


Note Although you can use the same properties as the client command, you cannot use the two properties: client-class-name and unauthenticated-client-class-name. These two properties provide names of client-class configurations that the DHCP server can use to initialize property values for a specific client configuration.

Unlike most client configurations, the DHCP server reads the client-class configurations at server start-up time, and thus you must reload the server for changes to take affect.

The syntax is:

client-class name set prop=value [prop=value]

client-class name get prop

client-class name show

For descriptions of the properties, see the "Client Properties" section.

Client and Client-Class Hierarchy

The server processes client and client-class property values in the following way:


Note If you delete the dhcp-lease-time option from client or client-class policies, Network Registrar uses the system-default policy whose dhcp-lease-time option cannot be deleted.

Client-Class Policy

The client-class-policy command allows you to configure DHCP embedded policies for client classes. A client-class-policy is a policy object embedded within (and limited to) a client-class object. Each client-class may contain option data within its embedded policy, and may refer to a named policy with more option data, such as a router IP address.

Embedded client-class-policies are implicitly created and deleted when you create or delete the corresponding client-classes. You manipulate the client-class-policy using the name of the client-class to which the embedded policy is attached.

Client-Class-Policy Features

You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.

The syntax is:

client-class-policy client-class-name enable feature

client-class-policy client-class-name delete feature

client-class-policy client-class-name get

Table 2-3 lists and describes the client-class-policy features. For more information about lease time, see "Lease Times" section.
Table 2-3: Client-Class-Policy Features
Feature Description

allow-lease-time-override

Optional, default none. Clients may request a specific lease time. The server does not honor those requested lease times if this attribute is false. The server does not honor a client's lease time if the time is longer than the server's normal lease time.

permanent-leases

Optional, default none. Specifies that leases for this client-class policy should be permanently granted to requesting clients.

split-lease-times

Optional, default none. Controls whether the server uses the value of the server-lease-time property to determine the length of a lease, rather than using the lease time returned to the client.

Client-Class-Policy Properties

Use the set and get commands to assign and retrieve values from the client-class-policy's properties.

The syntax is:

client-class-policy client-class-name get prop

client-class-policy client-class-name set prop=value

Table 2-4 lists and describes the client-class-policy properties.
Table 2-4: Client-Class-Policy Properties
Property Description

bootp-reply-options

Optional, default none. A list of the names of options that should be returned in any replies to BOOTP clients. The options themselves do not have to have been configured in the same client-class-policy as the reply-options list. The server searches the hierarchy of policies for each option named in the list. For more information about this property, see the "Client-Class-Policy Reply Options" section.

boot-file

Optional, default none. Supplies the name of the executable file from which to boot or obtain configuration data. This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

dhcp-reply-options

Optional, default none A list of the names of options that should be returned in any replies to DHCP clients. The options themselves do not have to have been configured in the same policy as the reply-options list. The server searches the hierarchy of policies for each option named in the list. For more information about this property, see the "Client-Class-Policy Reply Options" section.

grace-period

Optional, default none. The length of time between the expiration of a lease and the time it is made available for re-assignment.

offer-timeout

Optional, default none. If the server offers a lease to a client, but the offer is not accepted, the server waits the specified number of minutes before making the lease available again.

packet-file-name

Optional, default none. The name of a boot file to be used in a client's boot process. The server returns this file name in the file field of its replies. The packet-file-name cannot be longer than
128 characters.

This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

packet-server-name

Optional, default none. The host name of a server to use in a client's boot process. The server returns this file name in the sname field of its replies. The packet-server-name field cannot be longer than
64 characters.

packet-siaddr

Optional, default none. The IP address of the next server in a client's boot process. For example, this might be the address of a TFTP server used by BOOTP clients. The server returns this address in the siaddr field of its reply.

server-lease-time

Optional, default none. The time that the server believes the lease is valid. It may be useful to have the server consider leases leased for a longer period than the client in order to get more frequent client communication along with the stability of long lease times.

vendor-class-identifier

Optional, default none. This property is used by clients and servers to exchange vendor-specific information. The information is an opaque object of n octets, presumably interpreted by vendor-specific code on the clients and servers. The vendor is indicated in the vendor-class-identifier option.

Example

To set the grace period to three days for client-class-policy 168.1-net, type:

nrcmd> client-class-policy 168.1-net set grace-period=3d

Client-Class-Policy Reply Options

When the server is getting ready to return option data to a client, it examines up to seven policies: the client's embedded policy, the client's policy, the client's client-class's embedded policy, the client's client-class's policy, the client's lease's scope's embedded policy, the client's lease's scope's policy, and the system default policy, in that order. The server looks through these policies for option data that the client has asked for.

Then the server looks through the policies for a reply-options list. It looks for bootp- or dhcp-reply-options depending on the client. The server uses the first list it finds. For each option in the list, the server looks through all of the policies, in order, and returns the data from the first policy that has a matching option. There is no requirement that the data that the server returns must come from the same policy that the reply-options list came from. If the server finds a reply-options list, it looks for each option in the list individually, and searches all of the related policies if necessary.

There is also no requirement that the options mentioned in a reply-options list be present in the client-class-policy that contains the list. The nrcmd program allows you to type in a string, and that string can name any option. The Network Registrar GUI, however, presents a special dialog box for adding a reply-options property to a client-class-policy that restricts you to the options already configured in the client-class-policy. This is a GUI-only restriction; the server does not impose this restriction.

Client-Class-Policy Option Method Commands

You can set individual option values with the setOption command, unset option values with the unsetOption command, and view option values with the getOption and listOptions commands. When you set an option value, the DHCP server replaces any existing value or creates a new one, as needed, for the given option name.


Note For a list of all the DHCP options that you can configure, type the nrcmd program help dhcp-option.

The syntax is:

client-class-policy client-class-name listOptions

client-class-policy client-class-name setOption optname value

client-class-policy client-class-name getOption optname

client-class-policy client-class-name unsetOption optname

Table 2-5 lists and describes the client-class-policy options.
Table 2-5: Client-Class-Policy Options
Property Description

listOptions

Lists the options in the named client-class-policy.

setOption

Sets the option name and value to the specified client-class-policy. The format is optname value. For example, dhcp-lease-time 3600.

getOption

Gets the value of the named option.

unsetOption

Removes the named option from the specified client-class-policy.

Examples

To specify the lease time in a client-class-policy, type:

nrcmd> client-class-policy 168.1-net setOption dhcp-lease-time 608400
 

To list the options in a client-class-policy, type:

nrcmd> client-class-policy 168.1-net listOptions

Client-Class-Policy Lease Time Method Commands

The setLeaseTime command allows you to set the values of lease times and the getLeaseTime command to display the value of a lease time.

The syntax is:

client-class-policy client-class-name setLeaseTime value

client-class-policy client-class-name getLeaseTime

The lease time is the value of the dhcp-lease-time option. You should specify the time in seconds.

Lease Times

A client-class-policy contains two lease times: the lease time and the server lease time.

Client-Policy

The client-policy command allows you to configure DHCP embedded policies for clients. A client-policy is a policy object embedded within (and limited to) a client object. Each client may contain option data within its embedded policy, and may refer to a named policy with more option data, such as a router IP address.

Embedded client-policies are implicitly created and deleted when you create or delete the corresponding client. You manipulate the client-policy using the name of the client to which the embedded policy is attached.

Client-Policy Features

You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.

The syntax is:

client-policy client-name enable feature

client-policy client-name delete feature

client-policy client-name get

Table 2-6 lists and describes the client-policy features. For more information about lease time, see "Lease Times" section.


Table 2-6: Client-Policy Features
Feature Description

allow-lease-time-override

Optional, default none. Clients may request a specific lease time. The server does not honor those requested lease times if this attribute is false. The server does not honor a client's lease time if the time is longer than the server's normal lease time.

permanent-leases

Optional, default none. Specifies that leases for this client-policy should be permanently granted to requesting clients.

split-lease-times

Optional, default none. Controls whether the server uses the value of the server-lease-time property to determine the length of a lease, rather than using the lease time returned to the client.

Client-Policy Properties

Use the set and get commands to assign and retrieve values from the client-policy's properties.

The syntax is:

client-policy client-name get prop

client-policy client-name set prop=value

Table 2-7 lists and describes the client-policy properties.


Table 2-7: Client-Policy Properties
Property Description

bootp-reply-options

Optional, default none. A list of the names of options that should be returned in any replies to BOOTP clients. The options themselves do not have to have been configured in the same client-policy as the reply-options list. The server searches the hierarchy of client-policies for each option named in the list. For more information about this property, see the "Client-Policy Reply Options" section.

boot-file

Optional, default none. Supplies the name of the executable file from which to boot or obtain configuration data. This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

dhcp-reply-options

Optional, default none A list of the names of options that should be returned in any replies to DHCP clients. The options themselves do not have to have been configured in the same client-policy as the reply-options list; the server searches the hierarchy of client-policies for each option named in the list. For more information about this property, see the "Client-Policy Reply Options" section.

grace-period

Optional, default none. The length of time between the expiration of a lease and the time it is made available for re-assignment.

offer-timeout

Optional, default none. If the server offers a lease to a client, but the offer is not accepted, the server waits the specified number of minutes before making the lease available again.

packet-file-name

Optional, default none. The name of a boot file to be used in a client's boot process. The server returns this file name in the file field of its replies. The packet-file-name cannot be longer than 128 characters.

This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

packet-server-name

Optional, default none. The host name of a server to use in a client's boot process. The server returns this file name in the sname field of its replies. The packet-server-name field cannot be longer than 64 characters.

packet-siaddr

Optional, default none. The IP address of the next server in a client's boot process. For example, this might be the address of a TFTP server used by BOOTP clients. The server returns this address in the siaddr field of its reply.

server-lease-time

Optional, default none. The time that the server believes the lease is valid. It may be useful to have the server consider leases leased for a longer period than the client to get more frequent client communication and the stability of long lease times.

vendor-class-identifier

Optional, default none. This property is used by clients and servers to exchange vendor-specific information. The information is an opaque object of n octets, presumably interpreted by vendor-specific code on the clients and servers.The vendor is indicated in the vendor-class-identifier option.

Example

To set the grace period to three days for client-policy 168.1-net, type:

nrcmd> client-policy 168.1-net set grace-period=3d

Client-Policy Reply Options

When the server is getting ready to return option data to a client, it examines up to seven policies: the client's embedded policy, the client's policy, the client's client-class's embedded policy, the client's client-class's policy, the client's lease's scope's embedded policy, the client's lease's scope's policy, and the system default policy, in that order.

Then the server looks through the policies for a reply-options list. It looks for bootp- or dhcp-reply-options depending on the client. The server uses the first list it finds. For each option in the list, the server looks through all of the policies, in order, and returns the data from the first policy that has a matching option. There is no requirement that the data that the server returns must come from the same policy that the reply-options list came from. If the server finds a reply-options list, it looks for each option in the list individually, and searches all of the related policies if necessary.

There is also no requirement that the options mentioned in a reply-options list be present in the client-policy that contains the list. The nrcmd program allows you to type in a string, and that string can name any option. The Network Registrar GUI, however, presents a special dialog box for adding a reply-options property to a client-policy. This dialog box restricts you to the options already configured in the client-policy. This is a GUI-only restriction; the server does not impose this restriction.

Client-Policy Option Method Commands

You can set individual option values with the setOption command, unset option values with the unsetOption command, and view option values with the getOption and listOptions commands. When you set an option value the DHCP server replaces any existing value or creates a new one, as needed, for the given option name.


Note For a list of all the DHCP options that you can configure, type the nrcmd program help dhcp-option.

The syntax is:

client-policy client-name listOptions

client-policy client-name setOption optname value

client-policy client-name getOption optname

client-policy client-name unsetOption optname

Table 2-8 lists and describes the client-policy options.
Table 2-8: Client-Policy Options
Property Description

listOptions

Lists the options in the named client-policy.

setOption

Sets the option name and value to the specified client-policy. The format is optname value. For example, dhcp-lease-time 3600.

getOption

Gets the value of the named option.

unsetOption

Removes the named option from the specified client-policy.

Examples

To specify the lease time for a client, type:

nrcmd> client-policy 168.1-net setOption dhcp-lease-time 608400
 

To list the options in a client-policy, type:

nrcmd> client-policy 168.1-net listOptions

Client-Policy Lease Time Method Commands

The setLeaseTime command allows you to set the values of lease times and the getLeaseTime command to display the value of a lease time.

The syntax is:

client-policy client-name setLeaseTime value

client-policy client-name getLeaseTime

The lease time is the value of the dhcp-lease-time option. You should specify the time in seconds.

Lease Times

A client-policy contains two lease times: the lease time and the server lease time.

Custom-Option

The custom-option command allows you to create, list, or delete a custom DHCP option.

You can also use the custom-option command to redefine any predefined DHCP options. The newly defined option's definition will override the original option. If you delete this option, its definition returns to its original value.

The syntax is:

custom-option name create optnum opttype

custom-option name delete

custom-option name show

custom-option list

custom-option name get prop

custom-option name set prop=value

Table 2-9 lists and describes the custom-option properties.
Table 2-9: Custom-Option Properties
Property Description

optnum

Specifies the option number. Read-only.

opttype

Specifies the option type. It can be BOOL, BYTE, WORD, INT, UINT, STRING, IPADDR, BYTE_ARRAY, WORD_ARRAY, INT_ARRAY, UINT_ARRAY, or IPADDR_ARRAY. For more information about types, see the "Option Types" section.

desc

Optional, default null-string. Use this property for a description.

Option Types

Table 2-10 lists the option types supported by the nrcmd program.
Table 2-10: Option Types
Option Type <opttype> Definition

boolean

BOOL

TRUE or FALSE

byte

BYTE

8-bit unsigned integer

word

WORD

16-bit unsigned integer

signed integer

INT

32-bit signed integer

unsigned integer

UINT

32-bit unsigned integer

string

STRING

ASCII text string

IP address

IPADDR

IP address in the form of a.b.c.d

byte array

BYTE_ARRAY

Binary string of the form xx[:xx] in which x is 0-9a-f

word array

WORD_ARRAY

Array of 16-bit unsigned integers

signed array

INT_ARRAY

Array of 32-bit signed integers

unsigned array

UINT_ARRAY

Array of 32-bit unsigned integers

IP address array

IPADDR_ARRAY

Array of IP addresses

Examples

To create a custom option called red, mapped to number 100, of type IPADDR, type:

nrcmd> custom-option red create 100 IPADDR
 

To create a custom option called blue, mapped to number 101, that is an array of bytes, type:

nrcmd> custom-option blue create 101 BYTE_ARRAY
 

To give custom-option blue a description, type:

nrcmd> custom-option blue set desc="this is another option called blue." 
 

To create a custom-option that overlays pre-defined option 2 (time-offset), type:

nrcmd> custom-option green create 2 INT desc="Option green overlays time-offset." 
 

Note We recommend that you do not create case-sensitive option names; for example, if you create a custom-option named BLUE, then reference it as blue in another command, the option will not work. It is better to name your options consistently with lower-case letters.

To list the custom-options you have created, type:

nrcmd> custom-option list 
 

To cause option 2 to revert to its original definition, type:

nrcmd> custom-option green delete 
 

To redefine time-offset option to change the format of its user-printable name, type:

nrcmd> custom-option TimeOffset create 2 INT 
 

To display the option's new definition, type:

nrcmd> custom-option TimeOffset show 
 

Do not map numbers to custom options that are already used by DHCP or BOOTP options. For a complete list of pre-assigned numbers, see Table D-2.

Dhcp

The dhcp command allows you to configure the DHCP server in the cluster. Because there is only one DHCP server per cluster, you do not need to reference the server by name.

The syntax is:

dhcp disable feature

dhcp enable feature

dhcp get feature

Table 2-11 lists and describes the DHCP features.
Table 2-11: DHCP Features
Feature Description

cisco-dhcp-proxy

Controls whether the DHCP server uses the source address of the packet, if it is non-zero, in lieu of the giaddr field. Note that the DHCP server uses this feature only for DHCP packets, not BOOTP packets. The default is enabled. For more information about this feature, see the "Cisco DHCP Proxy" section.

client-class

Controls whether or not the DHCP server uses the client and client-class configuration objects to affect request processing. Default disabled.

defer-lease-extensions

Controls whether or not the DHCP server extends leases that are less than half expired. Default disabled, which means that the DHCP server will always extend leases (except in the first 30 seconds) to accommodate protocol retries. For more information about this feature, see the "Defer Lease Extensions" section.

discover-interfaces

Causes the DHCP server to find all the interface cards on the host and process DHCP requests that it receives from any of them. It will, however, only offer addresses to requests from subnets in which you have defined a valid scope with available addresses. If you do not enable this feature, the DHCP server uses only its list of configured interfaces. Default enabled. See the "Dhcp-interface" section.

drop-packet-on-extension-
failure

Causes the server to drop a packet (if possible) when it encounters a failure in an extension. Default enabled.

failover

Controls whether all scopes configured to use the server's failover configuration will be able to engage in failover. If disabled, only those scopes with failover explicitly enabled will do so. Default disabled. For more information, see the "Scope" section.

force-dns-updates

Forces the DHCP server to attempt a DNS update for each client that obtains or renews a lease, whether or not the DHCP server's state has recorded a successful update. This feature is useful when you need to restore a DNS server's database from a backup and have lost dynamic DNS records.

Note that this command causes increased dynamic update load, which can adversely affect performance. If only a few DHCP clients' DNS names need to be refreshed, we recommend that you do not use force-dns-updates. Instead, request that DHCP clients individually release and renew their leases.

hardware-unicast

Controls whether the DHCP server sends unicast rather than broadcast responses when a client indicates that it can accept a unicast. This feature may not be available on all platforms.

ignore-icmp-errors

If you enable this feature and you have configured the DHCP server to send ICMP ECHO (ping before offer) requests before offering addresses, the server will make unavailable any address for which it receives an ECHO reply within its configured timeout period. If you disable this feature, the DHCP server will also treat ICMP DEST_UNREACHABLE and TTL_EXPIRED error messages which it receives after sending ICMP ECHO requests as grounds for making an address unavailable.

import-mode

Causes the DHCP server to recognize only packets generated from the nrcmd program's import leases command and ignore all others. You can use this property if you want to update your DHCP server and prevent clients from receiving addresses during this period. Default disabled. For more about import mode, see the "Import Mode" section.

mac-address-only

Causes the DHCP server to use the client's MAC address as the only client identifier. The standard behavior, as specified in RFC 2132, is to use the client ID option (if it is present) as the unique client identifier. If you specify the mac-address-only argument, the DHCP server ignores the client's ID and uses its MAC address instead. You can use this argument to have a single, consistent way of identifying all clients that use your DHCP server. Default disabled.

one-lease-per-client

Causes the DHCP server to release any other leases the client may have had on this server. Since the default behavior for the Network Registrar DHCP server is to store all the leases a client obtains, this command ensures that only one lease is stored. A client might obtain a number of leases if a user with a laptop traveled throughout the building and requested leases at different locations on the network. Default disabled.

update-dns-for-bootp

If the server is replying to a BOOTP request, and is offering a lease from a scope that is configured for DNS updates, the DHCP server checks this property before beginning the update. You can use this feature to prevent DNS updates for BOOTP clients, while allowing updates for DHCP clients.

use-ldap-client-data

Controls whether the DHCP server attempts to read client-entry data through LDAP, that is, using the configuration supplied by the ldap command. Default disabled. For more information about the ldap command, see the "LDAP Features" section.

save-relay-agent-data

Controls whether the DHCP server saves the relay agent data for a particular IP address in the DHCP server's state when it writes the lease data for that IP address. Enable this feature if you expect the DHCP server to respond to leasequery messages. The default is disabled.

Cisco DHCP Proxy

The cisco-dhcp-proxy feature provides support for certain Cisco devices that implement a DHCP proxy function. The cisco-dhcp-proxy feature causes the DHCP server to use a non-zero IP source address as the giaddr (gateway address) of a DHCP packet when no giaddr is specified in the packet. This feature causes no change in the processing for DHCP clients that are not local or for any BOOTP clients. For locally connected DHCP clients (where the giaddr must be zero), the source address is normally zero (per the DHCP RFC), and so the subnet on which they belong is determined using the interface address on which the packet arrived---which is the correct behavior.

Because it might be possible that some locally connected clients might be affected by the cisco-dhcp-proxy feature, you can disable it. Such a client would have to send packets to the DHCP server using a non-zero source address (which they should not do), and this would cause them to be unable to get an IP address. If a client is having difficulty receiving an IP address, you can determine whether it is caused by the cisco-dhcp-proxy feature by checking the logs. Look for the phrase "with source IP address x.y.z.a" in the message that begins: "Server received a packet-type packet from... via: {Interface | Garrett} e.f.g.h" and that contains the client's MAC address or Client ID and hostname (if any). If you see such a message for a locally connected client, then you should consider disabling cisco-dhcp-proxy feature.

Defer Lease Extensions

You might want to use the defer-lease extensions feature to reduce the number of writes to the Network Registrar database. These writes can occur because the Network Registrar DHCP server commits fresh information to the database any time it changes the duration of a client's lease. Since the DHCP server renews leases for the full lease interval every time the client contacts the server, these database writes may have a performance impact if the server is on a busy network.

Some database writes can be eliminated if the data being written is redundant, that is, the same as the old data. Instead of granting the full lease duration, the server can re-grant the lease with a new duration equal to the remaining time on the old lease. Since the absolute expiration time does not change, no database write is needed.

There are three cases of lease extensions to consider:

As a complication, the server also keeps track of the time at which it last heard from the client. Known as "last-transaction-time," this information is sometimes used by sites as a debugging aid (for example, "How long has it been since we've heard from Beth's PC?"). Maintaining this time robustly requires a write to the database on every client interaction. For more information about this property, see the "last-transaction-time-granularity" section.

Because the last-transaction-time is not integral to the protocol, it does not have to be updated synchronously. And since it is used primarily as a debugging aid, it does not have to be entirely accurate. Furthermore, because the in-memory copy is always accurate, you can use the export leases -server command to display the current information even if the data is not up-to-date in the database. For more information about the export leases command, see the "Export Leases" section.

Import Mode

You can put the DHCP server into import mode by enabling the import-mode feature and then restarting the server. You take the server out of import mode by disabling the feature and restarting the server. You can use import mode to exclude all DHCP lease requests except for the specially tagged ones that come from the nrcmd program during lease import. For more information about the import command, see the "Import Leases" section.

Examples

To enable the client-class facility for this DHCP server, type:

nrcmd> dhcp enable client-class
 

To disable import mode, type:

nrcmd> dhcp disable import-mode
 

To display whether discover-interface is enabled or disabled, type:

nrcmd> dhcp get discover-interfaces

DHCP Properties

Use the set, get, unset, and show commands to assign and retrieve values from the DHCP's name-value properties.

The syntax is:

dhcp get prop

dhcp set prop=value [prop=value]

dhcp unset prop

dhcp show

Table 2-12 lists and describes the DHCP properties.
Table 2-12: DHCP Properties
Property Description

dns-timeout

Controls the number of milliseconds the DHCP server will wait for a response before retrying a dynamic DNS request. Default 500.

docsis-version-id-missing

Specifies a string that gets substituted with the %@docsis-vers% variable in the policy command's boot-file property. This substitution occurs if the DHCP request packet either does not contain a vendor-class-id option or if the option does not contain a docsis version id. Default is none. The string can contain 255 characters.

extension-trace-level

Is the default value of the extension trace level for every request object. You can override this value by setting the extension-trace-level in a user-written extension. Setting the level to zero causes very little tracing. Setting the level to three causes considerable tracing. For more information about DHCP extension creation, see the "Extension Properties" section. Default 0.

failover-backup-percentage

The percentage of currently available (unreserved) addresses that the main server should send to the backup server to be used for allocations to new DHCP clients when the main server is down. The value is only meaningful in the main server. If it is defined in a backup server, it is ignored (to enable copying of configurations). Default 10 percent.

failover-backup-server

If failover is enabled server-wide, this is the DNS name of the backup server associated with all scopes that do not have an explicit failover-backup-server value configured. If this DNS name resolves to the IP address of the current server, then this server operates as the backup server for all of these scopes. It is an error if both the main and backup server names resolve to IP addresses that reside on the same server. Default none.

failover-dynamic-bootp-backup-
percentage

The percentage of currently available (unreserved) addresses that the main server should send to the backup server for scopes on which dynamic BOOTP has been enabled. For more information, see the "Failover Backup Percentage" section. Default none.

failover-lease-period-factor

Is the multiple of the desired lease period used to update the backup server when the main server informs it of a new DHCP client lease period. For more information, see the "Failover-Lease-Period-Factor" section. Default 1.50.

failover-main-server

If failover is enabled server-wide, this is the DNS name of the main server associated with all scopes that do not have an explicit failover-main-server value configured. If this DNS name resolves to the IP address of the current server, then this server operates as the main server for all of these scopes. It is an error if both the main and backup server names resolve to IP addresses that reside on the same server. Default none.

failover-maximum-client-lead-
time

This is maximum client lead time, in seconds. The MCLT controls how much ahead of the backup server the client's lease expiration can be. You must define it in the main server. If you define it in the backup server, it is ignored (to enable copying of configurations). Default 3600 seconds (one hour).

failover-poll-interval

Failover partners will poll one another at this interval (in seconds) in order to confirm network connectivity. Default 15 seconds.

failover-poll-timeout

The interval (in seconds) after which failover partners, who cannot communicate, will know that they have lost network connectivity. Default 60 seconds.

failover-recover time

Controls whether the server performs initialization and then goes into RECOVER state. If server A is running, server B issues this command to ask for the state of server A. This property takes a time argument. You enter the time as month (name or its first three letters), day, hour (24 hour) year (fully specified year or last two digits), all enclosed in double quotes. For example, "Jun 30 20:00:00 1998".

failover-safe-period

This is the safe period, in seconds. It does not have to be the same on both main and backup servers. It only has meaning if you have enabled the failover-use-safe-period property. You must define it in the main server. Default is 24 hours. For more information see the Network Registrar Concepts Guide.

failover-use-safe-period

If you have specified a failover-safe-period, you have to enable the failover-use-safe-period property to cause Network Registrar to go into the PARTNER-DOWN state automatically. If you do not enable failover-use-safe-period, Network Registrar will never go into the PARTNER-DOWN state automatically, you must use the server dhcp setPartnerDown command. For more information, see the "setPartnerDown" section.

get-subnet-mask-from-policy

Causes the DHCP server to search all relevant policies for a subnet mask option, when constructing a response to send to a client. Normally, the DHCP server retains the subnet mask configured in the scope containing the base being granted to the DHCP client. Available values are true and false. Default is false. The default is false. For more information, see the "Example" section and the Network Registrar User's Guide.

last-transaction-time-granularity

Specifies the number of seconds Network Registrar guarantees that the last transaction time is accurate. The default is 30 seconds. Do not set it lower than 30 seconds. For optimal performance set it to a value that is greater than half your lease interval. For more about this property, see the "Defer Lease Extensions" section.

log-settings

Controls whether the DHCP server logs additional detail about the events listed in the log-settings. This can be helpful when you are analyzing a problem, but leaving it enabled for a long period can cause the log files to fill up. Default incoming-packets, missing options. For more information about the different log settings, see the "Log Settings" section.

max-dhcp-requests

Controls the size of buffers DHCP allocates for responding to DHCP clients. At least 100 buffers of each type should be allocated, and perhaps as many as several thousand would be reasonable in some installations. Default 500.

max-dhcp-responses

Controls the size of buffers DHCP allocates for receiving packets from DHCP clients. At least 100 buffers of each type should be allocated, and perhaps as many as several thousand would be reasonable in some installations. Default 500.

max-dns-packets

Controls the size of buffers DHCP allocates for communication with DNS servers. You can reduce the DHCP server's memory requirement by reducing the number of DNS packets, at the risk of missing updates. Dafault none.

max-dns-renaming-retries

Controls the number of times the DHCP server can try to add a host into DNS even if it detects that the host's name is already present in DNS. This field controls the number of times the DHCP server will attempt to modify a host's name in order to resolve a conflict. Default 2.

max-dns-retries

Controls the number of times the DHCP server attempts to send dynamic DNS updates to a DNS server. Default 3.

max-dns-ttl

Sets the Time To Live (TTL) ceiling, in seconds, for DNS records added through dynamic DNS. When the DHCP server adds a DNS record, it sets the TTL to less than one-third of the lease time, or this ceiling value. Note that the DNS record's effective TTL may be determined by the DNS zone's minimum TTL. Default 86400.

max-ping-packets

The number of buffers the server will allocate for sending and receiving ICMP ping messages. Default none. For more information, see the scope's ping-client's feature, see the "Scope Features" section.

save-lease-renewal-time

Specifies whether the server saves the lease renewal time. If 1 is specified, the server saves the lease renewal time (i.e., the minimum time in which the client is expected to issue a lease renewal) as part of the lease in persistent memory. The default is 0 (no saving of the lease renewal time).

save-vendor-class-id

Specifies whether the server saves the vendor-class-identifier. If 1 is specified, the server saves the vendor-class-identifier as offered in the DHCP request's vendor-class-identifier option as part of the lease in persistent memory. The default is 0. (Do not save the vendor-class-identifier.)

scope-selection-tags

The list of scope selection tags associated with this server property. In this context the term tags refers to a named entity that is used to control matching client and client-class entries with candidate scopes. Default none.

Example

To set the value of the get-subnet-mask-from-policy property, type:

nrcmd> dhcp set get-subnet-mask-from-policy=true

Failover Backup Percentage

For all servers or scopes for which you have enabled failover, you need to set the failover-backup-percentage. This is the number of currently available (not reserved) leases that the backup server can use for allocations to new DHCP clients when the main server is down. You can use the default, which is 10 percent, or specify another value.

For scopes on which you have enabled dynamic BOOTP, you need to use the failover-dynamic-bootp-backup-percentage rather than the failover-backup-percentage property. The failover-dynamic-bootp-backup-percentage is the percentage of available addresses that the main server should send to the backup server for use with BOOTP clients.


Note You must define this percentage on the main server. If you define it on the backup server, Network Registrar ignores it (to enable duplicating configuration through scripts). If you do not define it, Network Registrar uses the default or specified failover-backup-percentage.

The failover-dynamic-bootp-backup-percentage is distinct from failover-backup-percentage property, because if dynamic BOOTP is enabled on a scope, a server will never, even in PARTNER-DOWN state, grant leases on addresses that are available to the other server. Network Registrar will not grant leases because they may be given out by the partner using dynamic BOOTP, and can never safely be assumed to be available again.

In order to properly support dynamic BOOTP while using the failover protocol, do the following on every LAN segment in which you want BOOTP support:

For more information, see the Network Registrar Concepts Guide and the Network Registrar CLI User's Guide.

Failover-Lease-Period-Factor

The failover-lease-period-factor controls how much ahead of the client the backup server's idea of the lease expiration can be. Whereas, the failover-maximum-client-lead-time controls how much ahead of the backup server the client's lease expiration can be.

The larger the value, the more independent the main server is of the operation of the backup and the less performance impact the failover protocol has on the main server. However, the larger the value, the longer the backup will have to wait to time-out an expired lease and re-use it for a different client in the event that the main fails and the backup takes over DHCP functions.

You must define this property for the scope in the main server. If it is defined in a backup server, it is ignored (to enable duplicating the configurations through scripts). The default is 1.5 which is a good value for most sites.

The lease period interacts with the lease renewal period. If you increase the lease renewal period to a value greater than 50 percent, you need to also increase the lease factor. There should be a ratio of 2:1 between the renewal and lease factor. For example if you increase the renewal time to 80 percent the lease factor should be 1.8.

Log Settings

You can set the following flags:

Examples

To suppress warning messages for unconfigured or missing options, type:

nrcmd> dhcp set log-settings=default,incoming-packets
 

To turn on client and client-class debugging for the DHCP server, type:

nrcmd> dhcp set log-settings=client-detail
nrcmd> server dhcp reload
 

To turn off debugging for the DHCP server, type:

nrcmd> dhcp set log-settings=default
nrcmd> server dhcp reload

Troubleshooting MAC Addresses

As an additional aid to troubleshooting your configuration, you can use the example extension, dextrace, distributed on the Network Registrar CD. It looks for a particular MAC address in every input packet. When it finds that MAC address, it enables packet sniffing for just that input and any corresponding output packet. You can configure this extension using the CLI, and the configuration commands are in the example source file for dexextension.c. This extension places only a very small load on the server, and is suitable for long-term use when trying to diagnose some DHCP problem in which a troublesome MAC address is known, but it is not possible (or perhaps not convenient) to manually stimulate that DHCP client directly in order to find the problem.

DHCP Extension Commands

Use the method commands attachExtension, detachExtension, and listExtensions to configure the extensions points in the server you have defined. You can name each extension point and associate one extension with it. For more information about extensions, see the "Extension" section.

The syntax is:

dhcp attachExtension extension-point extension-name

dhcp detachExtension extension-point

dhcp listExtensions

Examples

After you have defined an extension, use the attachExtension command to add the test extension at the extension point post-packet-decode by typing:

nrcmd> dhcp attachExtension post-packet-decode test
 

To remove the extension test from the extension point post-packet-decode, type:

nrcmd> dhcp detachExtension post-packet-decode
 

To list all the extensions points and any extensions associated with them, type:

nrcmd> dhcp listExtensions

Dhcp-interface

The dhcp-interface command allows you to add, remove, and list the IP addresses of your server's hardware card (such as Ethernet or Token Ring), also called the Interface card. Interfaces are named with the IP address and net mask for the physical device.

Network Registrar uses the distinguished interface named default to provide configurable default values for interfaces that the DHCP server discovers automatically. If you delete the default interface, the DHCP server uses hard-coded default values for port numbers and socket buffer sizes for the interfaces that it auto-discovers.

You can list the interfaces to provide either an explicit list of interfaces that the DHCP server should listen on, or an explicit list of interfaces that the DHCP server should not listen on.

The dhcp-interface command provides more functionality than that is provided through the GUI, and in a different form:

The syntax is:

dhcp-interface ipaddr / maskbits create [prop=value]

dhcp-interface ipaddr / maskbits delete

dhcp-interface list

dhcp-interface ipaddr / maskbits show

dhcp-interface ipaddr / maskbits get prop

dhcp-interface ipaddr / maskbits set prop=value [prop=value]

dhcp-interface ipaddr / maskbits unset prop

The maskbits parameter defined for scopes can be specified as 24 (for a 24-bit network, such as a 2.255.255.255.0 netmask) or 16 ( for a 16-bit network, such as a 255.255.00 netmask).

Table 2-13 lists and describes the DHCP interface properties.
Table 2-13: DHCP Interface Properties
Property Description

addr

The IP address of the interface.

ignore

Indicates that the server should ignore this interface, which might be the case if you had several interfaces. Use this property to temporarily disable a specific interface in a list of interfaces.

mask

The subnet number.

Examples

To create two different interface configurations, type:

nrcmd> dhcp-interface 192.168.1.12/24 create 
nrcmd> dhcp-interface 10.1.2.3/24 create
 

To cause Network Registrar not to look at one interface, type the following. Note that you must have created the interface specification before you can set it to be ignored.

nrcmd> dhcp-interface 10.1.2.3/24 set ignore=true
 

To delete the interface specification 10.1.2.3/24, type:

nrcmd> dhcp-interface 10.1.2.3/24 delete
 

To list all the specified interfaces, type:

nrcmd> dhcp-interface list

DNS

The dns command allows you to enable or disable DNS server features. Note that in Network Registrar there is only one DNS server per cluster, hence you do not need to reference the server by name.

The syntax is:

dns disable feature

dns enable feature

dns get feature

Table 2-14 lists and describes the DNS features.
Table 2-14: DNS Features
Feature Description

hide-subzones

Required, default disabled. Configures the server to hide information about the subzone hierarchy for all zones delegated from this server. This feature collapses a portion of the domain namespace into one virtual zone.

ixfr-enable

Required, default enabled. Controls the incremental transfer behavior for zones for which you have not configured a specific behavior. For more information about incremental transfer, see the "Incremental Transfer" section.

lame-deleg-notify

Required, default disabled. Controls whether you want Network Registrar to notice and log when a DNS server listed in a parent-zone's delegation of subzones does not know that it is authoritative for the zone.

no-fetch-glue

Required, default disabled. Controls whether you want the DNS server, when composing a response to a query, to fetch missing glue records. Glue records are DNS A records that specify the address of a domain's authoritative name server. Normal DNS responses include NS records and their A records related to the name being queried.

no-recurse

Required, default disabled. Controls whether you want to disable forwarding client queries to other name servers when your DNS server is not authoritative for data being queried. If you disable recursive queries, you make your name server a noncaching server.

notify

Required, default enabled. Controls NOTIFY sending notification for zones for which you have not configured a specific behavior. For more information about NOTIFY, see the "NOTIFY" section.

round-robin

Required, default enabled. Controls whether you want round-robin cycling of equivalent records in responses to queries. Equivalent records are records of the same name and type. Because clients often only look at the first record of a set, enabling this feature can help balance loads and keep clients from forever trying to talk to an out-of-service host.

slave-mode

Required, default disabled. Controls whether you want this server to be a slave server, which is a server that relies entirely on forwarders for data that is not in its cache. This command has no effect unless you also specify the corresponding forwarders. Note that you can override slave-mode for specific domains with the DNS exception method. For more information about the exception method, see the "Exception Method" section.

subnet-sorting

Required, default disabled, as implemented in BIND 4.9.7. Specifies whether you want the address records in responses to queries to be reordered based on the subnet of the client. Because clients often only look at the first record of a set, enabling this feature can help localize network traffic onto a subnet. This feature only applies on answers to queries from clients located on the same subnet as the DNS server.

update-relax-
zone-name

Required, default disabled. Enables relaxation of the RFC 2136 restriction on the zone name record in dynamic updates. This feature allows updates to specify a zone name, which is any name within an authoritative zone, rather than the exact name of the zone.

Incremental Transfer

The incremental transfer feature (ixfr-enable) allows you to control how your DNS server handles incremental transfer. If you enable incremental transfer, you need to set or accept the default value of the ixfr-expire-interval property.

If you enable incremental transfer, you need to set or accept the defaults for the following property.

Table 2-15 lists and describes the incremental transfer property.
Table 2-15: Incremental Transfer Property
Property Description

ixfr-expire-interval

Required, default 604800 seconds (7 days). Indicates the longest interval to allow a secondary zone to be maintained solely with incremental transfers. After this period, the server requests a full zone transfer. Validation: 0 <= x <= 2147483647.

Examples

To enable incremental transfer for all your zones, type:

nrcmd> dns enable ixfr-enable
 

To disable incremental transfer for the single secondary zone example.com, type:

nrcmd> zone example.com disable ixfr
 

To disable incremental transfer for the single remote-dns server (or subnet) 128.103.1.1, type:

nrcmd> remote-dns create 128.103.1.1 set ixfr=false
 

For more information about setting incremental transfer on specific zones or remote DNS servers, see the "Zone" section or the "Remote-Dns" section.

NOTIFY

NOTIFY enables a Network Registrar DNS master server to inform its slaves that changes have been made to its zone. The changes are not communicated in the NOTIFY packet, instead the slaves initiate a zone transfer in response.

Because a master server for a zone does not know specifically which slaves transfer from it, Network Registrar notifies all registered name servers for the zone (name servers listed in the NS Resource Records) when the zone changes. The sole exception to this policy is that Network Registrar does not notify the server named in the SOA mname field (the primary master). For more information about NOTIFY, see RFC 1996.

If you enable NOTIFY, you need to set or accept the defaults for the following properties.
Table 2-16: NOTIFY Properties
Property Description

notify-defer-cnt

Required, default 100. The maximum number of changes you want to accumulate during the notify-wait period. If this number is exceeded, Network Registrar sends notification before the notify-wait period has passed.

notify-min-interval

Required, default 2 seconds. The minimum interval required before sending notification of consecutive changes on the same zone to a particular server.

Validation: 0 <= x <= 2147483647.

notify-rcv-interval

Required, default 5 seconds. For secondary zones, the minimum amount of time between the completion of processing of one notification (serial number testing and/or zone transfer), and the start of processing of another notification.

Validation: 0 <= x <= 2147483647.

notify-send-stagger

Required, default 1 second. The interval to stagger notification of multiple servers of a particular change.

Validation: 0 <= x <= 2147483647.

notify-wait

Required, default 5 seconds. The period of time to delay, after an initial zone change, before sending change notification to other name servers. This property allows you to accumulate multiple changes, and thus limit the number of times the serial number advances.

Validation: 0 <= x <= 2147483647.

Examples

To disable NOTIFY for all the zones, type:

nrcmd> dns disable notify
 

You can use IXFR and NOTIFY together, but you do not have to. You might want to disable NOTIFY for a quickly changing zone for which immediate updates on all secondaries does not warrant the constant NOTIFY traffic. Such a zone might benefit from having a short refresh time and a disabled NOTIFY.

nrcmd> zone example.com set refresh=30m
nrcmd> zone example.com disable notify
 

For more information about setting zone properties, see the "Zone" section.

DNS Properties

Use the set, get, and unset commands to assign and retrieve values from the DNS server's name-value properties.

The syntax is:

dns get prop

dns set prop=value [prop=value]

dns unset prop

dns show

Table 2-17 lists and describes the DNS properties.
Table 2-17: DNS Properties
Property Description

local-port-num

Required, default 53. Specifies the UDP and TCP port number on which the DNS server listens for queries.

Validation: [1, 65535].

max-cache-ttl

Required, default 7 days. Indicates the maximum amount of time that you want Network Registrar to retain cached information.

Validation: 0 <= x <= 2147483647.

mem-cache-size

Required, default 200 KB. Indicates the size of the in-memory record cache, in kilobytes.

Validation: 0 <= x <= 2147483647.

neg-cache-ttl

Required, default 10 minutes. Indicates how long information learned from other name servers about non-existent names or data should be cached.

Validation: 0 <= x <= 2147483647.

remote-port-num

Required. Specifies the UDP and TCP port to which the DNS server sends queries to other servers.

Validation: [1, 65535].

DNS Methods

The dns method commands let you add, list or remove specific servers for dealing with root-hint servers, exception servers, forwarding servers, and flushing the cache.

RootHint Method

The root hint method allows you to specify the names and addresses of the root servers. After you specify these servers, Network Registrar queries them for their root-name server records, which in turn are used to resolve other names. As such, these values need not be exact, but they need to be accurate enough for the Network Registrar DNS server to be able to retrieve the correct information.

The syntax is:

dns
addRootHint name addr [addr]

dns
removeRootHint name

dns
listRootHints

Examples

To add the root name server a.root-servers.net, type:

nrcmd> dns addRootHint a.root-servers.net 198.41.0.4
 

To remove the root name server a.root-servers.net, type:

nrcmd> dns removeRootHint a.root-servers.net
 

To list the root name servers, type:

nrcmd> dns listRootHints 

Exception Method

You only need to use the exception method if you do not want your DNS server to use the standard name resolution for querying root name servers for names outside the domain. The exception method allows you to specify the resolution exception domains and the associated servers' IP addresses.

The syntax is:

dns
addException name addr [addr]

dns
removeException name

dns
listExceptions

Examples

For example, the sample company, QuickExample, has four subsidiaries: red, blue, yellow, and green. Each of them has its own domain under the.com domain. But when users at red.com. want to use resources at blue.com, their DNS server knows that it is not authoritative for blue.com., and thus attempts to locate blue.com. by asking the root name servers.

To use exception handling, the administrator at red.com. lists all the domains that users might want to access, and at least one corresponding name server. In this case, the administrator would list the three other domains for the QuickExample company.

To add the exception server blue.com., type:

nrcmd> dns addException blue.com. 192.168.1.4
 

To remove the name server blue.com., type:

nrcmd> dns removeException blue.com.
 

To list the name servers, type:

nrcmd> dns listExceptions 
 

Forwarder Method

The forwarder method allows you to specify the addresses of any name servers that you want your Network Registrar DNS server to use as forwarders. Network Registrar forwards recursive queries to these servers before forwarding queries to the Internet-at-large. Note that you can use the exception method to override forwarding for specific domains.

The syntax is:

dns
addForwarder addr [addr]

dns
removeForwarder addr

dns
listForwarders

Examples

To add the forwarder server 192.168.1.4, type:

nrcmd> dns addForwarder 192.168.1.4
 

To remove the name server 192.168.1.4, type:

nrcmd> dns removeForwarder 192.168.1.4
 

To list the forwarder servers, type:

nrcmd> dns listForwarders 

Flushing the Cache

Use the dns flushCache command to stop the disk cache file from growing, but the actual behavior depends on whether your DNS server is running or stopped.

To completely clear a cache that has grown too large, stop the server, type the command, and restart the server.

The syntax is:

dns
flushCache

Rebuilding Resource Records Indexes

Use the dns rebuildRR-Indexes command if you need to rebuild your resource records indexes. You might need to rebuild your resource records indexes, if you observe resource or host list data that appears inconsistent or if data appears to be missing.

Rebuilding your resource records should correct any inconsistencies.

The syntax is:

dns rebuildRR-Indexes

Exit

The exit command allows you to exit the current nrcmd program session. Network Registrar writes all your unsaved changes to the database. If Network Registrar is unable to save your changes, it displays the same error code as if you had used the save command.

The syntax is:

exit

Example

To quit Network Registrar's command line interface when you are in interactive mode, type:

nrcmd> exit

Export

The export command allows you to export Network Registrar DHCP and DNS server information.

The syntax is:

export addresses {file=CSV text file | database=data source name user=db user name password=db user password [config=config file] [table=table name} [mask-bits=integer] [dhcp-only] [time-ascii | time-numeric]

export leases [-server | -client] filename [time-ascii | time-numeric]

export zone zone name [{static | dynamic | both} [file]]

export zonenames {forward | reverse | both} [file]

export hostfile [file]

Export Addresses

The export addresses command allows you to export all active IP addresses into a specified database or CSV (comma-separated value) text file.


Note The export addresses command is a replacement for the listaddr command.

The syntax is:

export addresses [file=<CSV text file> | { database=<data source name>
user=<db user name> password=<db user password>
[table=<table name>] } ]
[dhcp-only] [time-ascii | time-numeric]


To specify the clusters that you want the export command to query, use the .nrconfig configuration file. This is the same configuration file that the report command uses. If there is an [export-addresses] section in the configuration file, the export command uses the clusters specified in that section instead of the default cluster.

When you run the export addresses command, its output depends on what you specify:

If the table already exists in the specified database when you run the export command, it is cleared (and the columns reset) before the new data is written. Network Registrar does not provide a warning or confirmation if it clears an existing table.

Note You cannot specify both file= and database= in the same command.

The time-ascii and time-numeric options specify how date/time fields are output to a CSV text file or when the timestamp data type is not supported by the target database. The default is time-ascii.

Specifying the Config File

If you do not specify a config file, the export addresses command looks for a default .nrconfig file in your current directory, then in your home directory, and finally in the AIC_INSTALL_PATH/conf directory. Network Registrar uses the first file it encounters.

Each line of the file must either begin with the character # (comment), a section header enclosed in square brackets, or a parameter=value pair or its continuation.

[export addresses]
clusters=machine1 username password, machine2 username password
 

Network Registrar strips leading white space from each line and ignores blank lines.

Specifying Clusters

You can specify cluster in a variety of ways and Network Registrar follows a precedence order. Any of the specific cluster specifications can override the default specification or previous specification.

# Cluster information for export addresses

[export addresses]

# clusters=<clustername> <username> <password>,...

clusters=host1 admin, host2,
host3 admin3 passwd3




If Network Registrar cannot find a user name or password or the supplied user name and password are incorrect, the lease-notification command issues a warning for that cluster.

Reported Errors

The export addresses command attempts to establish communication with the clusters you have specified. It reports an error in the following cases:


Note If successful, the export addresses command prints "100 OK" both before and after Network Registrar lists the addresses. The first "100 OK" means that the command is being processed (without rejection because of existing locks, licensing problems, or command syntax errors). The second "100 OK" indicates that the command successfully completed its processing.

Data Format

The export addresses command writes the database output to the ip_addresses table or to the specified table name. Table 2-18 shows the columns in the ip_addresses table.


Table 2-18: ip_address Table
Column Data Type May Be Null? Description

ip_address

unsigned integer

no

32-bit IP address

ip_text

varchar(15)

no

IP address in dotted decimal notation

type

varchar(20)

no

STATIC, DYNAMIC, or RESERVED

state

varchar(20)

no

Available, Assigned, Unavailable, Leased, Expired, de-activated, Released,
Other Available, Pending Available

cluster_name

varchar(256)

no

Cluster name from which the information came

scope_pool_name

varchar(256)

yes

Scope name address (DHCP) from which the address was allocated

failover-role

varchar(64)

yes

Failover role, if any, of leases

subnet_bits

integer

yes

Number of bits in subnet mask for the scope

dns_name

varchar(256)

yes

Fully qualified DNS name for assigned addresses

requested_name

varchar(64)

yes

UNIX or WINS host name (DHCP)

mac_address

varchar(256)

yes

MAC address as text

client_id

varchar(256)

yes

Client ID for the lease (DHCP)

client_class

varchar(256)

yes

Client-class name (DHCP)

lease_state_change_time

timestamp

yes

Date/time when the lease last changed state (DHCP)

lease_expiration_time

timestamp

yes

Date/time when the lease expires (DHCP)

lease_transaction_time

timestamp

yes

Date/time of the last transaction (DHCP)

The fields listed as "May be NULL" are null if the specified information is not available:

The mac_address field is a text field of the form type-length-hex:hex:hex..., such as "1,6,06:44:40:26:f5:0f". The type and length are both in decimal whereas the data is in hexadecimal.

Field data types that are not supported by the target database are replaced with text (varchar) fields with the formats listed in Table 2-19:
Table 2-19: Field Data Types
Field Data Type Text Replacement

ip_address

varchar(10) in hexadecimal, such as "0x1234abcd"

other integers

varchar(11) in decimal, such as "28"

timestamp

varchar(26) as either a string of the form "Wed Jan 02 02:03:55 1980" if time-ascii is specified or an unsigned integer string of seconds since midnight GMT Jan 01 00:00:00 1970 if time-numeric is specified. Times are always in UTC.

NULL

varchar(1) ""

Column names that exceed the target database's supported maximum name width are truncated to the allowable width.

CSV Text File

If you specify writing the output to a CSV text file, the export addresses command writes each line in the file as one row in the database. The export addresses command outputs each field to the text file in the order listed in Table 2-18. Each field is terminated by a comma, except for the last. The first line in the file is not a table row, but instead contains a "#" followed by the text of each of the column names separated by commas. All fields that require text substitution are handled as described in the previous section.


Note The output is in no guaranteed order. The order can depend on the data in the system. Therefore, if order is important to you, use a tool to sort the data.

Addresses Reported

The export addresses command reports every address configured in every server that is specified in the config file. This includes addresses specified in DHCP scope ranges, DNS static addresses, and explicitly reserved addresses both for DNS and DHCP servers. Addresses in DHCP scope ranges that are not in use (allocated or reserved) however, do not appear in the table.


Note The export addresses command differs from the listaddr command in that it does not report "Unallocated" addresses, which are addresses declared in scope ranges that have not been allocated.

The report displays multiple entries for an address if the address is served by more than one server, in more than one scope, or has multiple DNS names. Thus you cannot use a unique column as a key, but you can generate a unique key from a set of columns such as ip_address, type, cluster_name, scope_pool_name, or dns_name.

Export Leases

The export leases command writes the state of the leases to a file. It has two modes: client-side and server-side.

When you use the export leases -client command, Network Registrar reads the database. If the servers are running, system performance may be affected.
When you use the export leases -server command, Network Registrar does not read the database, so it is significantly faster. You also can only run the command if the server is running. Because the server is doing some extra work while it is building the export file, it may be slowed somewhat, but the time involved is usually so short that the performance impact is not noticeable.

Note Network Registrar exports the time values as day, month, date, time, year, for example, Mon Apr 13 16:35:48 1998. For more information about the file formats, see the
"Import and Export File Formats" section.

The syntax is:

export leases [-server | -client] filename [time-ascii | time-numeric]

The filename is the name of output file or "-" for standard out for client-side exports. You cannot use the dash with the -server option. In addition, the server-side export does not permit filenames with any non-alphanumeric character, such as "." for example.

The time-ascii and time-numeric options control which date/time format the export command uses. The default is time-ascii.

Examples

To export the client leases to the output file leaseOut, type:

nrcmd> export leases -client leaseOut 
 

The export leases -client command writes out the lease time as a string, which is the day, month, date, time, year format, such as Apr 13 16:35:48 1998.

To export all the currently held and expired leases to the output file leaseOut, type:

nrcmd> export leases -server leaseOut 
 

The export leases -server command writes out the lease times as integers, which are the number of seconds since midnight GMT Jan 1, 1970. For example, 903968580.

Export Zone

The export zone command writes the specified DNS zone into a file in the BIND format.

The syntax is:

export zone zone-name arguments output-file

For example, to write the contents of the Example domain, type:

nrcmd> export zone example.com static hosts.local 

Export Zonenames

The export zonenames command exports the names of the zones in the server. You can specify forward, reverse, or both to cause the command to export the forward zones, reverse zones, or all the zones, respectively.

The syntax is:

export zonenames {forward|reverse|both} output-file

Export Hostfile

The export hostfile command creates a hostfile, in UNIX hostfile format, from all the zones in the server. It ignores reverse zones. It creates hostfile records from A records, CNAME records, and HINFO records. The hostfile record consists of the IP Address, the FQDN, aliases created from the A records and CNAME records, and comments created from HINFO records.

The syntax is:

export hostfile output-file

Extension

The extension command allows you to configure and integrate user-written DHCP extensions into the DHCP server.

To extend the DHCP server with an extension, do the following:

    1. Write the extension in either Tcl, C or C++, and install it in the server extensions directory.

    2. Configure the DHCP server to recognize this extension, using the extension command.

    3. Attach the configured extension to one or more DHCP extension points using the dhcp attachExtension command. For more information about the command, see the "DHCP Extension Commands" section. For more information about choosing extensions points and writing extensions, see "Using Extension Points."

    4. Reload the server.


Note The DHCP server only reads extensions when you reload the server. So if you change an extension, you must reload the DHCP server.

The syntax is:

extension name create lang file entry [prop=value]

extension name delete

extension list

Example

To configure a Tcl extension, type:

nrcmd> extension mytclext create Tcl mytclfile.tcl mytclentry
 

The contents of mytclfile.tcl might be:

proc mytclentry{request response environ}{
	$environ log LOG_INFO "helloworld"
{

Extension Properties

Use the set, get, and unset commands to assign and retrieve values from the extension's properties.

The syntax is:

extension name get prop

extension name set prop=value [prop=value ]

extension name unset prop

extension name show

Table 2-20 lists and describes the extension properties.


Table 2-20: Extension Properties
Property Description

entry

Required (set by create), default none. The name of the entry point for the module. This function is called from any extension point to which this module is bound. The arguments for this function are server-implementation specific.

file

Required (set by create), default none.This file name is relative to the directory extensions in the installation. It cannot be a absolute pathname, nor can it contain any sequence of two dots (..).

init-args

Optional, default none.The arguments that should be passed to the init-entry point function. For more information about how the DHCP server parses this information, see the "The Init-Entry Entry Point" section.

init-entry

Optional, default none.The name of the init-entry point. If you set it, Network Registrar calls this function when the server loads the module and when the server shuts down. For more information about this entry point, see "The Init-Entry Entry Point" section.

lang

Required (set by create), default none. The language in which the extension or module is implemented. Tcl indicates that the module is a Tcl extension (tcl7.5). Dex indicates that the module is a shared object with C calling interfaces.

name

Required (set by create), default none. The name of the extension or module. Network Registrar uses this name to assign extensions or modules to extension points. Changing this property renames the extension.

Force-Lock

The nrcmd program uses the same locking mechanism as Network Registrar. When you execute a command, the program attempts to get an exclusive lock for the cluster to which it is connected. If it is unable to get an exclusive lock, it displays a warning. You can only issue the following commands: client, lease, zone add, help, and force-lock.

The force-lock command obtains an exclusive lock. Use this command with caution, because running more than one program that updates the Network Registrar database can cause database corruption.

If you use the force-lock command to unlock a cluster, the command writes the warning to the log file on the client machine not on the cluster.

Example

To force an exclusive lock, type:

nrcmd> force-lock

Help

The help command allows you to display the nrcmd program's online help.

You can select the sections of the man page output by specifying the section names after the help cmd command. The section names are:

The syntax is:

help

help cmd [section ]

Examples

To print the list of commands, type:

-> help 
100 Ok
 

To print the contents of the help man page, type:

-> help help
100 Ok
 

To print the contents of the help command's synopsis, type:

-> help help synopsis
    100 Ok
    SYNOPSIS
    help 
    help <cmd> [<section>...]

Import

The import command allows you to import lease information into the DHCP server configuration or import the contents of a BIND named.boot file into the DNS server configuration.

Import Leases

Before you can import leases, you need to perform several configuration steps:

    1. Configure scopes in the DHCP server for the leases that you plan to import. For more information, see the "Scope" section.

    2. If the host names for the leases are to be dynamically entered into DNS as part of the import, configure zones in the DNS server to allow dynamic updates. For more information, see the "Zone" section.

    3. Set the DHCP server to import mode so that it will not respond to other lease requests during the lease importing. For more information, see the "Dhcp" section.

After you have imported the leases, take the DHCP server out of import mode so that it can respond to other lease requests.


Note For all the time fields, use either the number of seconds since midnight GMT January 1, 1970, or day, month, date, time, year format (Mon Apr 13 16:35:48 1998). For more information about the file formats, see the "Import and Export File Formats" section.

The syntax is:

import leases file


Note Importing permanent leases fails, if you have disabled the permanent leases option.

Example

To import the file LeaseIn to the DHCP server, type:

nrcmd> import leases LeaseIn
 

If the lease time in the import file is greater than the lease time the client would have received if it were to acquire a lease, the client is given the lesser lease time. In other words, suppose it is 2 p.m. and your scope is configured for a one hour lease. According to the file you are importing, the lease time will not expire until 5 p.m. After you import the file, the lease will expire at 3 p.m., not 5 p.m.

If your import file specifies a zone name, the zone name will not be used when DNS is updated. If it specifies a host name, the host name will be used when DNS is updated, unless overridden by a host-name specification in a client or client-class entry.

The only way to indicate to the DHCP server that the client's host name should be placed in a zone other than the default associated with the scope, is to specify that zone in a client or client-class entry.

Import Named.boot Files

BIND uses a boot file, called named.boot, to point the server to it database files. You can import your entire BIND configuration by using the import command.

The syntax is:

import named.boot file

Example

To import the file /etc/named.boot to the DNS server, type:

nrcmd> import named.boot /etc/named.boot
 

You should use "UNIX style" paths even when running the import command on Windows NT. The previous example on Windows NT might look like this:

nrcmd> import named.boot c:/etc/named.boot
 

There is one known incompatibility between the way BIND loads named.boot configurations and the way the nrcmd command loads named.boot configurations.

When a zone file contains an $INCLUDE directive, BIND searches for the include file relative to the directory specified by the directory directive in the named.boot file, whereas the nrcmd program searches for the include file relative to the directory containing the zone file being processed.

You can avoid this problem completely if your BIND configuration uses absolute paths whenever specifying an include file in a zone file. If your zone files contain relative paths when specifying include files and the directory containing the zone file is not the same as the directory specified by the directory directive in the named.boot file, your configuration will not load properly. You will need to convert the relative paths in your zone files to absolute paths to import your BIND configuration into Network Registrar. An example of a configuration and how it might be fixed follows.

Directory Hierarchy

/etc/named.boot

/usr/local/domain/primary/db.example

/usr/local/domain/primary/db.include

/usr/local/domain/secondary

Configuration Files

/etc/named.boot:

# BIND searches for zone files and include files relative to

# /usr/local/domain

directory /usr/local/domain

# BIND finds zone file in /usr/local/domain/primary primary

example.com primary/db.example

# end of /etc/named.boot

/usr/local/domain/primary/db.example

# BIND searches for include file relative to /usr/local/domain

$INCLUDE primary/db.include

# end of /usr/local/domain/primary/db.example

To make the configuration loadable, change the relative path in the file db.example to an absolute path.

$INCLUDE primary/db.include

$INCLUDE /usr/local/domain/primary/db.include

Mapping Boot File Directives to Nrcmd

Table 2-21 lists and describes the boot file directives that are supported by the BIND 4.9.6 distribution and the corresponding nrcmd command syntax that is generated. Directives that Network Registrar does not support are marked with the word unsupported, and the directives that require no action from Network Registrar are marked with the word none.

Table 2-21 lists the BIND to nrcmd commands.


Table 2-21: BIND to Nrcmd
BIND Nrcmd

directory new-directory

None supported within the named.boot file parser

include file

None supported within the named.boot file parser

primary domain-name-of-zone file

zone create domain-name-of-zone primary file=file

secondary domain-name-of-zone ip-addr-list [backup-file]

zone create domain-name-of-zone secondary ip-addr [,ip-addr...]

forwarders ip-addr-list

dns addForwarder ip-addr [ip-addr...]

slave

dns enable slave-mode

tcplist ip-addr-or-network-list

zone domain-name-of-zone enable restrict-xfer

zone domain-name-of-zone set restricted-set=ip-addr [,ip-addr...]

xfernets ip-addr-or-network-list

zone domain-name-of-zone enable restrict-xfer zone domain-name-of-zone set restricted-set=ip-addr [,ip-addr...]

max-fetch number

dns set xfer-client-concurrent-limit=number

domain local-domain-name

unsupported

cache domain-name file

unsupported

sortlist network-list

unsupported

stub domain ip-addr-list [backup-file]

unsupported

bogusns ip-addr-list

unsupported

check-names primary/secondary/response fail/warn/ignore

unsupported

options forward-only

dns enable slave-mode

options no-recursion

dns enable no-recurse

options no-fetch-glue

dns enable no-fetch-glue

options fake-iquery

None---Network Registrar only supports fake iquery

options query-log

unsupported

limit transfers-in number

dns set xfer-client-concurrent-limit=number

limit transfers-per-ns number

unsupported

limit datasize number

unsupported

limit files number

unsupported

Ldap

The ldap command allows you to associate remote LDAP servers with Network Registrar, and then set their attributes.

The syntax is:

ldap name create hostname [prop=value]

ldap name delete

ldap list

Examples

To create an LDAP server object myserver with a host name of myserver.mycompany.com, type:

nrcmd> ldap myserver create myserver.mycompany.com
 

To delete an ldap server object myserver, type:

nrcmd> ldap myserver delete
 

To list the ldap server objects, type:

nrcmd> ldap list

LDAP Features

Use the enable, disable, or get commands to enable, disable, or determine whether the feature has been set.

The syntax is:

ldap name disable feature

ldap name enable feature

ldap name get feature

Table 2-22 lists and describes the LDAP features. After you enable a feature you can set its properties.


Table 2-22: LDAP Features
Feature Description

can-create

Optional, default false. Enables you to create entries for the LDAP server. When you enable can-create, you must enable can-update as well.

can-query

Optional, default false. Enables you to define queries to the LDAP server.

can-update

Optional, default false. Enables you to specify the types of updates to the LDAP server.

limit-requests

Optional, default false. Enables you to limit the number of outstanding queries to the LDAP server. If you enable this feature you can set the maxprequest property.

LDAP Properties

Use the set, get, and unset commands to assign and retrieve values from the LDAP server's properties.

The syntax is:

ldap name get prop

ldap name set prop=value [prop=value]

ldap name unset prop

Table 2-23 lists and describes the LDAP properties.
Table 2-23: LDAP Properties
Property Description

connections

The number of connections that the server should make to a particular LDAP server. This is primarily a performance-tuning parameter. In some cases, more than one connection can improve overall throughput.

create-object-classes

Specifies the names of the object classes that a newly created entry inherits.

create-string-dictionary

Creates a separate string dictionary to contain attributes that with values not in the lease object. This allows the addition of attributes containing an arbitrary text string.

default-attribute-value

Allows you to specify a string that is assigned to any LDAP attributes, listed in the create or update dictionaries, that do not have their matching lease attribute present. These LDAP attributes can be listed in the create update dictionaries. If you specify no value, Network Registrar uses the string <default>.

dn-attribute

If the dn (distinguished name) of the LDAP object to update (or create) can be constructed from one of the lease attributes, the specified dn-attribute is formatted using the dn-format string to construct the object filter that specifies the LDAP server to be modified.

dn-create-format

Specifies the dn (distinguished name) for entry creation. A %s is required and is replaced with the value of the dn-attribute.

dn-format

Formats the dn-attribute. A %s is required and is replaced with the value of the dn-attribute.

hostname

The host name of the server to connect to. Network Registrar needs the host name for LDAP servers.

max-referrals

The limit on the number of LDAP referrals Network Registrar will follow when querying. A value of zero means "don't follow referrals."

max-requests

Limits any single LDAP connection to this number of outstanding queries. You may choose to limit the number of outstanding queries to improve performance. The DHCP server uses this configuration information when preparing client-entry queries.

password

The password of a user with access to the parts of the directory that DHCP will use. (LDAP servers can be configured to allow anonymous access, so this is optional.)

port

The port to connect to. (There is a default.)

preference

A positive integer. LDAP servers can be used in preference order: 1 is the highest preference value.

referral-attr

The name of the LDAP attribute that may indicate that an LDAP response is a referral. The referral may or may not contain the dn to query for. If the dn is present (the current server assumes this), it is used as the search path along with a wildcard search scope in the query that follows the referral. If not, the search path is built by formatting the data in the referral attribute with the referral filter, and the existing search scope is used.

referral-filter

If the referral attribute does not contain a dn, the referral-attribute's data is formatted with this filter expression to build a search path, and the existing search scope for the LDAP server is used.

search-filter

The filter to be applied in the query. A %s is required and is replaced by the value of the dn attribute.

search-path

The name of an object in the directory to use as a query's starting-point. The path and the scope together control the portion of the directory that are searched.

search-scope

The scope can be SUBTREE (all children of the search path will be searched), ONELEVEL (only one the immediate children of the base object will be searched), or BASE (only the base object will be searched).

timeout

The number of seconds the DHCP server should wait for a response to an individual query. After a query times out, the server may re-try another LDAP server connection, or drop it.

threadwaittime

The interval (in milliseconds) at which each LDAP client connection polls for results, if it has outstanding queries or updates.

update-search-attribute

If the LDAP object's dn cannot be determined directly, the DHCP server must issue a query to retrieve the dn. In that case, the DHCP server uses these parameters to extract the data from a lease attribute (specified by the search-attribute, and format it using the search-filter expression).

update-search-filter

Formats the update-search-attribute. A %s is required and is replaced with the value of the dn-attribute.

update-search-path

The search filter (built using either the dn attribute or the search attribute) is used along with the path and scope to specify the LDAP object that should be updated.

update-search-scope

The search scope is used to specify the LDAP object that should be updated.

username

The distinguished name of an object with access to the parts of the directory that DHCP will use. (Because you can configure LDAP servers to allow anonymous access, this property is optional.)

The create-string-dictionary can contain multiple pairs of LDAP attributes. To assign different string values to the attributes givenname and carlicense, type:

nrcmd> ldap test-server setEntry create-string-dictionary givenname="abcdefg"
 
nrcmd> ldap test-server setEntry create-string-dictionary carlicense="123-456"

LDAP Dictionaries

Use the setEntry, getEntry, and unsetEntry commands to set, query, and clear elements of the various dictionary properties in the LDAP server configuration. These dictionary properties provide a convenient mapping from strings keys to string values.

The syntax is:

ldap name setEntry prop key=value

ldap name getEntry prop key=value

ldap name unsetEntry prop key


Note An LDAP attribute can appear only once in each dictionary. A second setEntry command that supplies an existing key will replace that key.

Table 2-24 lists and describes the LDAP dictionary properties.
Table 2-24: LDAP Dictionary Properties 
Properties Description

create-dictionary

Creates a dictionary that maps LDAP attributes to DHCP lease attributes. This property describe a set of attributes to be written for entry creation and may contain lease attribute references.

create-string-dictionary

Creates a string dictionary of attributes with literal values not contained in the DHCP lease object. You can then assign arbitrary text strings to these attributes. This property is useful if you want to search for the attributes using the text string.

env-dictionary

Controls whether additional LDAP attributes are retrieved along with client-entry attributes. If any of these are present in a query's results, their values are made available to scripts through the request's environment dictionary. The LDAP value is keyed by the value in the LDAP query env-dictionary.

query-dictionary

Controls the mapping between the names of LDAP attributes and client-entry attributes. The server attempts to retrieve all of the LDAP attributes specified in the dictionary. When a query succeeds, the values for any LDAP attributes that it returns are set in the corresponding client-entry attributes.

This property also controls the mapping of an LDAP attribute name to the embedded-policy. The LDAP attribute name associated with the embedded-policy value is used to create an embedded policy. If the server finds the particular LDAP attribute name, it decodes the attribute data as if it were an encoding of the client-embedded policy.

For more information, see Chapter 11 of the Network Registrar User's Guide.

update-dictionary

The dictionary that maps LDAP attributes to DHCP lease attributes. When an LDAP object is modified, each LDAP attribute that is present in this dictionary is set to the value of its corresponding DHCP lease attribute.

Examples

To configure a query-dictionary to search for the surname (sn) and use its data to specify the client's DHCP host name, type:

nrcmd> ldap dirserver setEntry query-dictionary sn=host-name
 

To configure a query-dictionary to search for the first name (givenname) to use for the specific client-class name, type:

nrcmd> ldap myserver setEntry query-dictionary givenname=client-class-name
 

To configure a query-dictionary to search for the localityname to use for the domain name, type:

nrcmd> ldap myserver setEntry query-dictionary localityname=domain-name
 

To create a string-dictionary with an attribute named myattribute assigned to the string my string, type:

nrcmd> ldap myserver setEntry create-string-dictionary
myattribute="my string"
 

Lease

The lease command allows you to view and manipulate the current DHCP leases in the cluster.

The syntax is:

lease list

lease withMACaddr mac address

lease name show

lease name activate

lease name de-activate

lease name force-available

lease name macaddr

Table 2-25 lists and describes the lease command actions.
Table 2-25: Lease Command Actions
Action Description

activate

Removes the de-activate flag from the lease, but does not change the status of a lease marked as unavailable.

de-activate

Prevents the lease from being given out or renewed, but does not change the state of the lease.

force-available

Makes a currently held lease available, even a lease marked as unavailable. Because using the force-available action may compromise the integrity of your IP address allocations, make sure that before you use the command the client holding the lease has stopped using the lease.

macaddr

Displays the most recent MAC address associated with this lease. If no MAC address was ever associated with this lease (or if the lease has become unavailable), then Network Registrar displays the error message, "302 Not Found."

show

Displays the lease attributes for a specific address.

withMACaddr

Lists all leases that are associated with the specified MAC address.

All lease command actions take effect immediately. You do not need to reload the server.

Example

To activate lease 192.168.1.9, type:

nrcmd> lease 192.168.1.9 activate 

Lease Command Properties

Use get to display the values from the lease properties. These properties are read-only.

The syntax is:

lease name get prop

Table 2-26 lists and describes the lease command properties.
Table 2-26: Lease Command Properties
Properties Description

address

The IP address of this lease.

client-dns-name

The DHCP server attempted (possibly successfully) to enter this name into the DNS server for this client. It is related to the client-host-name, but may not be identical due to name collisions in the DNS server database.

client-domain-name

The domain name specified (if any) into which to put the client's DNS name.

client-flags

A variety of flags relating to the client. For more information about these flags, see the "Client Flags" section.

client-host-name

The DNS name that the client requested the DHCP server place into the DNS server.

client-id

The client-id specified by the client, or one synthesized by the DHCP server for this client (if client-id-created-from-mac-address is set in the client-flags).

client-last-transaction-time

The time at which the client most recently contacted the DHCP server.

client-mac-addr

The MAC address which the client presented to the DHCP server.

expiration

The time at which the lease will expire.

flags

Flags for the lease are either "reserved" or "de-activated." The lease is reserved for some MAC address or the lease is de-activated, which means that it should not be used. Any clients that are using de-activated leases will be NAK'ed on their next renewal.

lease-renewal-time

The minimal time in which the client is expected to issue a lease renewal.

start-time-of-state

The time at which the state last changed to its current value. Use this property to determine when the lease was made unavailable.

state

The current state of the lease.

Client Flags

Use the following client flags:

The following flags are for internal use only: client-valid, client-fqdn-present, client-updates-name, clear-host-name, host-name-has-changed, and domain-name-has-changed.

States

Lease-notification

The lease-notification command allows you to receive notification when the number of available addresses in a scope is exceeded. You can specify the notification limit either as the number of free addresses or the percentage of free addresses. You can also specify who will receive e-mail notification.

The syntax is:

lease-notification available=number|percentage%
[config=config file] [leasing-only]
[
recipients=recipient[,recipient] [mail-host=name [errors-to=receipient]]]
[
scopes=scope name|address range[,scope name|address range,...]]

Although you can use the lease-notification command interactively, its primary use is as an automated command. For more information, see the "Running Lease-notification Automatically on UNIX" section and the "Running Lease-notification Automatically on NT" section.

Examples

To specify scope 1 with an available value of 10% and e-mail recipients billy, joe, and jane, type:

nrcmd> lease-notification available=10% scopes=scope1 recipients=billy,joe,jane mail-host=mailhost
 

To specify the range of scopes 192.32.1.0-192.32.1.255, the config file .nrNotification, the recipients admin, an available value of 13 leases, and the NT mail host as mailhost, type:

nrcmd> lease-notification scopes=192.32.1.0-192.32.1.255
config=/home/bob/.nrNotification recipients=admin@comco.com available=13
mail-host=mailhost

Note If successful, the lease-notification command prints "100 OK" both before and after Network Registrar lists the addresses. The first "100 OK" means that the command is being processed (without rejection because of existing locks, licensing problems, or command syntax errors). The second "100 OK" indicates that the command successfully completed its processing.

Lease-Notification Properties

Table 2-27 lists and describes the lease-notification command properties.
Table 2-27: Lease-notification Properties
Property Description

available

Specify either a number or percentage of available addresses. If the number or percentage of available addresses is equal to or less than the specified value for the scopes being checked, Network Registrar generates a report listing information about the scopes that reach or exceed the available value.

config

Specify a configuration file. If you do not specify a configuration file, Network Registrar searches for the default .nrconfig file. For more information about the search order, see the "Specifying the Config File" section.

errors-to

If you specify a mail-host, you may also specify the e-mail address of the sender of the e-mail in order to provide a return path for bounced e-mail. The default value is postmaster.

leasing-only

If you specify leasing-only, Network Registrar displays only the scopes that can offer leases. If failover is enabled, this includes scopes for which one of the following conditions applies:

  • The role is main and the failover state is NORMAL, COMM-INTERRUPTED, or PARTNER DOWN.

  • The role is backup and the failover state is COMM-INTERRUPTED or PARTNER DOWN.

mail-host

On NT, you must specify a mail-host.

On UNIX, the mail host is generally already configured for the sendmail program. You can verify that your UNIX system is properly configured by issuing the command date | mail your-email-address and observing whether or not the date is e-mailed to you. If mail is not configured, you must specify a mail-host.

recipients

If you specify the e-mail addresses of one or more recipients, Network Registrar sends an e-mail report to those addresses. Otherwise, Network Registrar directs the report to standard output.

scopes

Specify the scopes either by their names or as a range or ranges of addresses. Network Registrar checks any scope containing any address that falls within the range of address. If you do not list any scopes or addresses, Network Registrar checks all scopes managed by the specified cluster.

Specifying the Config File

If you do not specify a config file, the lease-notification command looks for a default .nrconfig file in your current directory, then in your home directory, and finally in the AIC_INSTALL_PATH/conf directory. Network Registrar uses the first file it encounters.

Each line of the file must either begin with the character # (comment), a section header enclosed in square brackets, or a parameter=value pair or its continuation. Network Registrar strips leading white space from each line and ignores blank lines.

Specifying Clusters

You can specify cluster in a variety of ways and Network Registrar follows a precedence order. Any of the specific cluster specifications can override the default specification or previous specification:

# Cluster information for lease notification

[lease-notification]

# clusters=<clustername> <username> <password>...

clusters=host1 admin, host2,
host3 admin3 passwd3




If Network Registrar cannot find a user name or password or the supplied user name and password are incorrect, the lease-notification command issues a warning for that cluster.

Running Lease-notification Automatically on UNIX

You can run the lease-notification command periodically by means of the cron(1) command by supplying crontab(1) with the command to run. For example, to run the lease-notification command at 00:15 and 12:15 (15 minutes after midnight and noon) Monday through Friday, specify the following command to crontab:

15 0,12 * * 1-5 . .profile; /opt/nwreg2/usrbin/nrcmd lease-notification available=10\% config=/home/jsmith/.nrconfig addresses=192.32.1.0-192.32.128.0 recipients=jsmith,jdoe@example.com >/dev/null 2>&1

You can perform crontab editing by running the UNIX crontab -e command. Set your EDITOR environment variable before running the command, unless you want to use ed(1). See the crontab(1) man page for additional details.

Note that you must supply the nrcmd command's full path name on the crontab command line. You can determine the full path name in your environment with the UNIX which nrcmd command.

Also note that when you run the nrcmd lease-notification command by means of crontab, the user environment variables AIC_CLUSTER, AIC_NAME, and AIC_PASSWORD are ignored. Because the command being run could be viewed by others, for security reasons you should not provide the password through the -P option on the command line.

The cluster name, user, and password information for the cluster you want the nrcmd command to run from should be supplied in a .profile or other file in the home directory of the user running crontab -e, as shown in the following example:

AIC_CLUSTER=host1 
export AIC_CLUSTER
AIC_NAME=admin1
export AIC_NAME
AIC_PASSWORD=passwd1
export AIC_PASSWORD
 

The file must be read explicitly in the crontab entry with . .profile specification. Note that the first "." is the shell command that causes the file to be read and must be followed by white space. For notification on a different cluster, or clusters, than the one on which ncrmd is running, you need to specify the following information:

You can prevent others from examining or changing the contents of the .profile and the configuration file you create by changing its permissions with the UNIX command chmod go-rw config_file.

Running Lease-notification Automatically on NT

Use the Scheduled Tasks service available in Windows NT Explorer under My Computer to schedule the nrcmd lease-notification command. If you do not find a Scheduled Tasks folder under My Computer, you will need to add this optional component from Microsoft Internet Explorer 4.0 or later, or use some third-party task scheduler. You can also use the at command to schedule the nrcmd lease-notification command. Put multiple entries into the at queue, one for each time of day at which you want to run the job.

License

The license command allows you to specify the license key for a cluster, or to view the license key or the license's expiration date.

Your license key is located on the back of the Cisco Network Registrar 3.0 CD case. You need to enter your license the first time you configure any cluster.

The syntax is:

license set prop=value

license get prop

license show

Table 2-28 lists and describes the license command properties.
Table 2-28: License Command Properties
Properties Description

expiration

The expiration date of the license. Note that the date is read-only.

key

The license key

Example

To set the license, you must run the nrcmd program in interactive mode, then exit and rerun the nrcmd program. To set the license to key 1234 abcd 5678 efgh, type:

nrcmd -C cluster1 -N admin -P aicuser
nrcmd> license set key=1234-abcd-5678-efgh
100 Ok
nrcmd> exit

Listaddr

The listaddr command provides the address utilization reporting functionality of the listaddr.bat command available in earlier versions of Network Registrar. Because the output from this command was designed for analysis tools such as spreadsheets, the formatting is not ideal for end-users.

In future releases of Network Registrar, the listaddr command will no longer be supported. You should instead use the export addresses command. For more information, see the "Export Addresses" section.


Note If successful, the listaddr command prints "100 OK" both before and after Network Registrar lists the addresses. The first "100 OK" means that the command is being processed (without rejection because of existing locks or licensing problems). The second "100 OK" indicates that the command successfully completed its processing.

The output for the listaddr command is a series of eight-column, comma-separated rows. There is one row for each known address. Thus, the total output can be quite verbose. A column may be empty if the usage of that column does not apply to the address. Table 2-29 lists and describes the meanings of the columns.
Table 2-29: listaddr Output
Column Description

1

IP address in unsigned hexadecimal format.

2

IP address in the canonical dotted format.

3

Type of the address. These types are defined as follows:

STATIC---assigned to a host through DNS.

DYNAMIC---assigned to a host through a DHCP lease.

UNALLOCATED---the address is in the range of a DHCP scope, but is not in use.

RESERVED---the address is reserved for a host through DHCP.

4

DNS name of host, for assigned addresses only.

5

State of the address. This field is blank for any address other than those assigned through DHCP leases. The values for such addresses are: Available, Unavailable, Leased, Expired, de-activated.

6

Native host name, for addresses assigned through a DHCP lease. This is usually the Windows or UNIX name for the host.

7

MAC address, for addresses assigned through a DHCP lease.

8

Expiration time, for DHCP dynamic addresses.

The syntax is:

listaddr

Example

To run listaddr, type:

nrcmd> listaddr

Policy

The policy command allows you to configure DHCP policy configurations. A policy is a collection of DHCP option values that can be associated with a range of addresses in a scope, or with a specific client or client-class configuration.

The syntax is:

policy name create [prop=value]

policy name delete

policy list

Example

To create the policy CompanyB, type:

nrcmd> policy CompanyB create

Policy Features

You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.

The syntax is:

policy name enable feature

policy name delete feature

policy name get

Table 2-30 lists and describes the policy features. For more information about lease time, see "Lease Times" section.
Table 2-30: Policy Features
Feature Description

allow-lease-time-override

Optional, default true Clients may request a specific lease time. The server will not honor those requested lease times if this attribute is false. The server will not honor a client's lease time if the time is longer than the server's normal lease time.

permanent-leases

Optional, default false. Specifies that leases for this client should be permanently granted to requesting clients.

split-lease-times

Optional, default false. Controls whether the server uses the value of the server-lease-time property to determine the length of a lease, rather than using the lease time returned to the client.

Policy Properties

Use the set and get commands to assign and retrieve values from the policy's properties.

The syntax is:

policy name get prop

policy name set prop=value

Table 2-31 lists and describes the policy properties.
Table 2-31: Policy Properties
Property Description

bootp-reply-options

Optional, default none. A list of the names of options that should be returned in any replies to BOOTP clients. The options themselves do not have to have been configured in the same policy as the reply-options list; the server will search the hierarchy of policies for each option named in the list. For more information about this property, see the "Policy Reply Options" section.

boot-file

Optional, default none. Supplies the name of the executable file from which to boot or obtain configuration data. This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

dhcp-reply-options

Optional, default none A list of the names of options that should be returned in any replies to DHCP clients. The options themselves do not have to have been configured in the same policy as the reply-options list; the server will search the hierarchy of policies for each option named in the list. For more information about this property, see the "Policy Reply Options" section.

grace-period

Optional, default 5 minutes. The length of time between the expiration of a lease and the time it is made available for re-assignment.

offer-timeout

Optional, default 2 minutes. If the server offers a lease to a client, but the offer is not accepted, the server will wait the specified number of minutes before making the lease available again.

packet-file-name

Optional, default none. The name of a boot file to be used in a client's boot process. The server returns this file name in the 'file' field of its replies. The packet-file-name cannot be longer than 128 characters.

This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

packet-server-name

Optional, default none. The host name of a server to use in a client's boot process. The server returns this file name in the sname field of its replies. The packet-server-name field cannot be longer than
64 characters.

packet-siaddr

Optional, default none. The IP address of the next server in a client's boot process. For example, this might be the address of a TFTP server used by BOOTP clients. The server returns this address in the siaddr field of its reply.

server-lease-time

Optional, default none. The time that the server believes the lease is valid. It may be useful to have the server consider leases leased for a longer period than the client in order to get more frequent client communication along with the stability of long lease times.

vendor-class-identifier

Optional, default none. This property is used by clients and servers to exchange vendor-specific information. The information is an opaque object of n octets, presumably interpreted by vendor-specific code on the clients and servers. The vendor is indicated in the vendor-class-identifier option.

Example

To set the grace period to three days for policy 168.1-net, type:

nrcmd> policy 168.1-net set grace-period=3d

Policy Reply Options

When the server is getting ready to return option data to a client, it examines up to seven policies: the client's embedded policy, the client's policy, the client's client-class's embedded policy, the client's client-class's policy, the client's lease's scope's embedded policy, the client's lease's scope's policy, and the system default policy, in that order.

Then the server looks through the policies for a reply-options list. It looks for bootp- or dhcp-reply-options depending on the client. The server uses the first list it finds. For each option in the list, the server looks through all of the policies, in order, and returns the data from the first policy that has a matching option. There is no requirement that the data that the server returns must come from the same policy that the reply-options list came from. If the server finds a reply-options list, it looks for each option in the list individually, and searches all of the related policies if necessary.

There is also no requirement that the options mentioned in a reply-options list be present in the policy that contains the list. The nrcmd program allows you to type in a string, and that string can name any option. The Network Registrar GUI, however, presents a special dialog box for adding a reply-options property to a policy that restricts you to the options already configured in the policy. This is a GUI-only restriction; the server does not impose this restriction.

Policy Option Method Commands

You can set individual option values with the setOption command, unset option values with the unsetOption command, and view option values with the getOption and listOptions commands. When you set an option value, the DHCP server replaces any existing value or creates a new one, as needed, for the given option name.


Note For a list of all the DHCP options that you can configure, type the nrcmd program help dhcp-option.

The syntax is:

policy name listOptions

policy name setOption optname value

policy name getOption optname

policy name unsetOption optname

Table 2-32 lists and describes the policy options.
Table 2-32: Policy Options
Property Description

listOptions

Lists the options in the named policy.

setOption

Sets the option name and value to the specified policy. The format is optname value. For example, dhcp-lease-time 3600.

getOption

Gets the value of the named option.

unsetOption

Removes the named option from the specified policy.

Examples

To specify the lease time in a scope, type:

nrcmd> policy 168.1-net setOption dhcp-lease-time 608400
 

To list the options in a policy, type:

nrcmd> policy 168.1-net listOptions

Policy Lease Time Method Commands

The setLeaseTime command allows you to set the values of lease times and the getLeaseTime command to display the value of a lease time.

The syntax is:

policy name setLeaseTime value

policy name getLeaseTime

The lease time is the value of the dhcp-lease-time option. You should specify the time in seconds.

Lease Times

A policy contains two lease times: the lease time and the server lease time.

Remote-Dns

The remote-dns command allows you to control the behavior of the DNS server when it is communicating with other DNS servers. Use it to either control incremental transfer or to send multiple records per TCP packet.

The syntax is:

remote-dns create addr [ /maskbits] [prop=value]

remote-dns name delete

remote-dns list

Table 2-33 lists and describes the remote-dns properties.
Table 2-33: Remote-dns Properties
Property Description

addr

The address of the server or network to which this information applies.

maskbits

The number of bits in the addr attribute that are significant.

Example

To create the remote server description 128.103.1.1 with the net mask of 255.255.255.255, type:

nrcmd> remote-dns create 128.103.1.1/16 
 

Note Each net mask octet is composed of 8 bits. In the example above the first two octets are significant, thus the netmask is 16. If just the first three octets were significant, the net mask would be 24, etc.

Remote-dns Features

You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.

remote-dns name disable feature

remote-dns name enable feature

remote-dns name get feature

Table 2-34 lists and describes the remote DNS server description features.
Table 2-34: Remote-dns Features
Feature Description

ixfr

Optional, default false. Indicates whether or not a foreign server supports incremental transfer and should be queried for incremental (IXFR) before full (AXFR) when asking for zone transfers. Although unwittingly setting this to true is generally harmless, doing so may result in additional transactions to accomplish a zone transfer.

multirec

Optional, default false. Indicates whether or not a remote server can be sent zone transfers (AXFR) with multiple records in one TCP packet. Older DNS servers will crash when receiving such transfers, despite being allowed by the protocol.

Examples

When you enable or disable incremental transfer, Network Registrar looks for the most specific match, that is, it matches the machine with the longest mask. Use this feature to specify a group of servers with a single command.

To enable all DNS servers on this network to perform incremental transfer, type:

nrcmd> remote-dns create 128.103.1.0/16 ixfr=true
 

To disable all DNS servers 128.103.1.1/32 from performing incremental transfers, type:

nrcmd> remote-dns create 128.103.1.1/32 ixfr=false

Note A netmask of 32 is equivalent to no netmask.

Report

The report command allows you to produce a summary of dynamic and static IP address utilization for one or more clusters.

The syntax is:

report [config=config file][column-separator=character string] [dhcp-only][file=output file][leasing-only]
[mask-bits=
value]

Table 2-35 lists and describes the report properties.
Table 2-35: Report Properties
Property Description

column-separator

Specifies the character string you want used between the columns in the report. The default is a single space. If you specify whitespace, you must escape it with a backslash (\) and if it is entered on the command line, use quotes. For example, =,\ or = ",\".

config

A file that allows you to specify multiple clusters.

dhcp-only

Specifies a summary of just the DHCP information.

file

Specifies the file name to which the report command writes the output. If you do not specify a file name, the report command writes to standard out. Note that, because it can take a long time to collect DNS data, you should not run the report command interactively when requesting DNS summaries.

leasing-only

Specifies that only scopes that are able to offer leases appear in the report. If failover is enabled, this includes scopes for which one of the following conditions applies:

  • The role is main and the failover state is NORMAL, COMM-INTERRUPTED, or PARTNER DOWN.

  • The role is backup and the failover state is COMM-INTERRUPTED or PARTNER DOWN.

mask-bits

Specifies the number of high-order bits set in the network mask that define a logical subnet for which the report command produces a summary. The default value is 16.

If the value of the mask-bits is less than the default or less than the largest mask of any scope's mask in the report, the report command uses the default value.

Examples

To create a report of static DNS addresses and dynamic DHCP addresses, type:

nrcmd> report
 

To create a report of only DHCP scopes, type:

nrcmd> report dhcp-only

Note If successful, the report command prints "100 OK" both before and after Network Registrar lists the addresses. The first "100 OK" means that the command is being processed (without rejection because of existing locks, licensing problems, or command syntax errors). The second "100 OK" indicates that the command successfully completed its processing.

Specifying Clusters

You can specify cluster in a variety of ways and Network Registrar follows a precedence order. Any of the specific cluster specifications can override the default specification or previous specification.

# Cluster information for summary reports

[report]

# clusters= clustername username password, ...

clusters=host1 admin, host2, host3 admin3 passwd3



If Network Registrar cannot find a user name or password or the supplied user name and password are incorrect, the report command issues a warning for that cluster.

Displaying the Summary

The report command displays a row of information for each subnet specified by scope or deduced from DNS static address assignments outside of scopes.

The report command displays subtotal rows when more than one scope shares a common subnet, and for addresses that share a common subnet as specified by their address and mask. Note that the report commands assumes that there is no overlap between static addresses and scope ranges.

For each scope or subnet, the report command displays the following information:

For each scope-specified subnet, the report command also displays the following values:

Addresses have both a current state and a pending state after their lease expires.The categories leased and unavailable represent current states. The categories dynamically leased, reserved, and de-activated may represent current or pending states. The category free represents the current state available minus addresses flagged reserved or de-activated. Note that, the leased category overlaps other categories and is not incorporated in the scope total.

For each subtotal row, the report command provides summaries of any scope values in the subnet, and additionally, displays the following values:

The grand total, at the end of the report a total that summarizes all the data in the subnets

The rows and columns in Table 2-36 represent potential states and flags that an address within a DHCP scope can possess. The cells within the table indicate the category into which Network Registrar places addresses with a given state and flag. When multiple flags are set, de-activated takes priority over reserved, and reserved takes priority over any remaining flags for reporting purposes.

Table 2-36 lists and describes the potential states and flags for IP Addresses.
Table 2-36: Potential States and Flags for IP Addresses
Flags None Reserved de-activated Reserved and de-activated

State

available

free

reserved

de-activated

de-activated

offered

dynamically leased, leased

dynamically leased, leased

de-activated,
leased

de-activated,
leased

leased

dynamically leased, leased

dynamically leased, leased

de-activated
leased

de-activated,
leased

expired

dynamically leased, leased

dynamically leased, leased

de-activated,
leased

de-activated,
leased

pending-
available

dynamically leased, leased

dynamically leased, leased

de-activated,
leased

de-activated,
leased

other-
available

other available

reserved

de-activated

de-activated

unavailable

unavailable

unavailable

unavailable

unavailable

Save

The save command allows you to validate and save your changes to the database.

The syntax is:

save

Validation

The nrcmd program performs validation when you create objects or modify their properties. It checks that you have supplied the required properties and that their values are valid. It also checks the validity of property values when you set them.

When you issue the save command, Network Registrar performs three levels of validation:


Note If you create dangling references by deleting a referred-to-object such as the policy for a scope, or the client-class for a client, the nrcmd program does not alert you by displaying an error message.

Error Codes

All nrcmd commands return a status code as the first line of output. The status codes are affected by SMTP and other line-oriented protocols. The first word on the line is a three-digit status code, and the remaining output is the descriptive text. The first digit of the status code determines the class of the status.

Table 2-37 lists and describes the save command error codes.
Table 2-37: Save Error Codes
Error Code Description

100 OK

Indicates a successful save.

3xx

Indicates an error in processing the command.

4xx

Indicates an error in communicating with the cluster database server.

5xx

Indicates an internal error in the command.

For more information about error codes, see "Error Codes."

Scope

The scope command allows you to create and edit DHCP scopes.

The syntax is:

scope name create addr mask [prop=value]

scope name delete

scope list

Examples

To create a scope, type:

nrcmd> scope testScope create 192.168.1.0 255.255.255.0
 
You need to specify the scope mask in the base of 10 (such as 255.255.255.0), not in hexadecimal.

To delete a scope, type:

nrcmd> scope testScope delete 
 

To list scopes, type:

nrcmd> scope list

Scope Features

The scope command allows you to enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands. Note that the get command displays the value of the feature.

The syntax is:

scope name disable feature

scope name enable feature

scope name get feature

Table 2-38 lists and describes the scope features.
Table 2-38: Scope Features
Feature Description

bootp

Optional, default disabled. Controls whether the server accepts BOOTP requests. If you want clients to always receive the same addresses, you need to reserve IP addresses for all your BOOTP clients. For information about how to reserve address, see Scope Reservations.

dhcp

Optional, default enabled. Controls whether the DHCP server will accept DHCP requests for this scope. You would only disable DHCP for a scope to cause the scope to be used for BOOTP exclusively, or to temporarily de-activate a scope.

dynamic-bootp

Optional, default disabled. Controls whether the server will accept dynamic BOOTP requests for this scope. Dynamic BOOTP requests are BOOTP requests that do not match a reservation, but can be satisfied from the available lease pool. To use this feature, you must also enable bootp.

dynamic-dns

Optional, default disabled. Controls whether the DHCP server should attempt to update a DNS server with the name and address information from leases that are granted to requesting clients.

failover

See scope properties.

ping-clients

Optional, default disabled. Controls whether the server should attempt to ping an address.

renew-only

Optional, default none. Controls whether to allow existing clients to re-acquire their leases, but not to offer any leases to new clients. Note that a renew-only scope will not change the client associated with any of its leases, other than to allow a client currently using an available IP address to continue to use it.

synthesize-name

Optional, default disabled. Controls whether the DHCP server automatically creates DNS host names for DHCP clients who do not provide names. The server can synthesize unique names for clients based on the synthetic-name-stem property.

trap-free-address-high-threshold

Optional, default disabled. Controls whether you set a trap on the scope to alert you when the number of free addresses gets high. For more information, see the "Trap" section.

trap-free-address-low-threshold

Optional, default disabled. Controls whether you set a trap on the scope to alert you when the number of free addresses gets low. For more information, see the "Trap" section.

update-dns-first

Optional, default disabled. Controls whether the DHCP server is updated before the lease is granted.

Examples

To enable dynamic DNS update, type:

nrcmd> scope testScope enable dynamic-dns
 

To disable dynamic BOOTP, type:

nrcmd> scope testScope disable dynamic-bootp

Scope Properties

Use the set and get commands to assign and retrieve values from the scope's properties.

The syntax is:

scope name get prop=value

scope name set prop=value [prop=value ...]

scope name show

Table 2-39 lists and describes the scope properties.
Table 2-39: Scope Properties
Property Description

addr

Optional, default none. The address of the subnet for which this scope contains addresses. (Read-only)

de-activated

Optional, default none. A scope that does not extend leases to clients. It treats all of the addresses in its ranges as if they were individually de-activated.

dns-rev-server-addr

Optional, default none. The address of the reverse DNS server for the zone into which the server should add PTR records.

dns-reverse-zone-name

Optional, default none. The name of the inverse (in.addr.arpa) zone that is updated with PTR and TXT records.

dns-server-addr

Optional, default none. The IP address of the primary DNS server on which the forward zone resides.

dns-zone-name

Optional, default none. The name of the DNS zone to which a DHCP client's host name should be added (A record).

failover

Controls whether the server uses failover. It has three possible states. For more information, see the "Failover Property States" section.

failover-backup-server

String representing the DNS name of the backup server associated with this LAN segment. If the DNS name resolves to the IP address of the current server, then this server operates as the backup server for this scope. It is an error if the names of both the main and backup server resolve to the IP addresses that reside on the same server.

If the backup-server is not configured on this scope or in the server-wide default, then this server is considered to be the main server for this scope.

failover-main-server

String representing the DNS name of the main server associated with this LAN segment. If the DNS name resolves to the IP address of the current server, then this server operates as the main server for this scope. It is an error if the names of both the main and backup server resolve to the IP addresses that reside on the same server.

If the main-server is not configured on this scope or in the server-wide default, then this server is considered to be the main server for this scope.

mask

Optional, default none. The mask associated with the scope's network address. (Read-only)

ping-timeout

Optional, default none. The number of milliseconds the DHCP server should wait for ping responses. If you make this value too large, you will slow down the lease offering processes. If you make this value too small, you will reduce the effectiveness of pinging addresses before offering them.

policy

Optional, default none. The name of the policy associated with this scope.

primary-addr

Optional, default none. The IP address of the primary scope for this (secondary) scope.

primary-mask

Optional, default none. The subnet mask of this scope's primary scope (if this is a secondary scope).

primary-scope

Optional, default none. The primary scope for this (secondary) scope. Use the distinguished name none to indicate no primary scope. You need to specify a primary scope if you have multiple logical subnets on the same physical network segment, and if you allow DHCP to offer addresses from any of the subnets.

selection-tags

Optional, default none. The list of selection criteria associated with a scope. The scope compares a client's selection criteria to this list in order to determine whether the client can obtain a lease from the scope.

synthetic-name-stem

Optional, default none. The prefix of the default host name to use if clients do not supply host names.

trap-free-address-reset

Optional, default none. Sets the number or percentage of the reset value for the free-address trap on this scope. For more information, see the "Trap" section.

trap-free-address-threshold

Optional, default none. Sets the number or percentage threshold for the free-address trap on this scope. For more information, see the "Trap" section.

update-dns-for-bootp

Optional, default enabled. If the server is replying to a BOOTP request, and is offering a lease from a scope that is configured to perform DNS updates, it will check this property before beginning the DNS update. This property allows you to prevent DNS updates for BOOTP clients, while allowing updates for DHCP clients.

Failover Property States

The failover over property has three possible states:

If more than one scope on the same LAN segment is scope-enabled for failover, then the main and backup servers must be identical for each. It is an error for one scope on a LAN segment to be scope-enabled and another to be scope-disabled, unless the other server has failover enabled server-wide then no error occurs.

Examples

To set the name of the reverse zone, type:

nrcmd> scope testScope set dns-reverse-zone-name=10.in-addr.arpa.
 

To get the DNS zone name, type:

nrcmd> scope testScope get dns-zone-name

Scope Method Commands

The scope method commands allow you to add, remove, show, and list ranges and reservations.

Ranges

You can specify the start and end values as host numbers or IP addresses. Note that the start and end values must fall within the network addresses as defined by the scope's addr and the network mask attributes.

The syntax is:

scope name addRange start end

scope name listLeases

scope name listRanges

scope name removeRange start end

Table 2-40 lists and describes the scope range methods.
Table 2-40: Scope Range Methods
Method Description

addRange

Adds a range of addresses to the named scope.

listLeases

Lists the leases in the named scope.

listRanges

Lists the available addresses in the named scope.

removeRange

Removes the range of available addresses in the named scope.

Examples

To add a range, type:

nrcmd> scope testScope addRange 192.168.1.10 192.168.1.20
 

To delete a range, type:

nrcmd> scope testScope removeRange 192.168.1.10 192.168.1.15

Scope Reservations

The scope command, with the name argument allows you to add, delete, or list the reservations on the named scope.

The syntax is:

scope name addReservation ipaddr macaddr

scope name listReservations

scope name removeReservation [ipaddr|macaddr]

Table 2-41 lists and describes the scope reservation methods.
Table 2-41: Scope Reservation Methods
Method Description

addReservation

Adds the reservation to the named scope.

listReservations

Lists the reservations in the named scope.

removeReservation

Deletes a reservation from the named scope.

Examples

To add a reservation, type:

nrcmd> scope testScope AddReservation 192.168.1.10 1,6,00:a0:24:2e:9c:20
 

To remove a reservation, type the following, specifying either the client's MAC or IP address:

nrcmd> scope testScope removeReservation 192.168.1.10 

Scope-Policy

The scope-policy command allows you to configure DHCP embedded policies for scopes. A scope-policy is a policy object embedded within (and limited to) a scope object. Each scope may contain option data within its embedded policy, and may refer to a named policy with more option data, such as a router IP address.

Embedded scope-policies are implicitly created and deleted when you create or delete the corresponding scopes. You manipulate the scope-policy using the name of the scope to which the embedded policy is attached.

Scope-Policy Features

You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.

The syntax is:

scope-policy scope-name enable feature

scope-policy scope-name delete feature

scope-policy scope-name get

Table 2-42 lists and describes the scope-policy features. For more information about lease time, see "Lease Times" section.
Table 2-42: Scope-Policy Features
Feature Description

allow-lease-time-override

Optional, default none. Clients may request a specific lease time. The server does not honor those requested lease times if this attribute is false. The server does not honor a client's lease time if the time is longer than the server's normal lease time.

permanent-leases

Optional, default none. Specifies that leases for this scope-policy should be permanently granted to requesting clients.

split-lease-times

Optional, default none. Controls whether the server uses the value of the server-lease-time property to determine the length of a lease, rather than using the lease time returned to the client.

Scope-Policy Properties

Use the set and get commands to assign and retrieve values from the scope-policy's properties.

The syntax is:

scope-policy scope-name get prop

scope-policy scope-name set prop=value

Table 2-43 lists and describes the scope-policy properties.
Table 2-43: Scope-Policy Properties
Property Description

bootp-reply-options

Optional, default none. A list of the names of options that should be returned in any replies to BOOTP clients. The options themselves do not have to have been configured in the same scope-policy as the reply-options list; the server will search the hierarchy of client-policies for each option named in the list. For more information about this property, see the "Scope-Policy Reply Options" section.

boot-file

Optional, default none. Supplies the name of the executable file from which to boot or obtain configuration data. This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

dhcp-reply-options

Optional, default none A list of the names of options that should be returned in any replies to DHCP clients. The options themselves do not have to have been configured in the same scope-policy as the reply-options list; the server will search the hierarchy of client-policies for each option named in the list. For more information about this property, see the "Scope-Policy Reply Options" section.

grace-period

Optional, default none. The length of time between the expiration of a lease and the time it is made available for re-assignment.

offer-timeout

Optional, default none. If the server offers a lease to a client, but the offer is not accepted, the server will wait the specified number of minutes before making the lease available again.

packet-file-name

Optional, default none. The name of a boot file to be used in a client's boot process. The server returns this file name in the 'file' field of its replies. The packet-file-name cannot be longer than 128 characters.

This property can also contain the following variable substitution values:

  • %@docsis-vers%. If you specify the %@docsis-vers% value, it is substituted with the docsis version presented in the DHCP request packet's vendor-class-identifier option. This version can be either "docsis1.0" or "docsis1.1". If the vendor-class-id option is missing or does not contain a docsis version string, the server substitutes the docsis-version-id-missing string. For more information about this string, see Table 2-12.

  • %@mac-addr%. If you specify the %@mac-addr% value, %@mac-addr% is substituted with the source MAC address, presented in the DHCP request packet.

packet-server-name

Optional, default none. The host name of a server to use in a client's boot process. The server returns this file name in the sname field of its replies. The packet-server-name field cannot be longer than
64 characters.

packet-siaddr

Optional, default none. The IP address of the next server in a client's boot process. For example, this might be the address of a TFTP server used by BOOTP clients. The server returns this address in the siaddr field of its reply.

server-lease-time

Optional, default none. The time that the server believes the lease is valid. It may be useful to have the server consider leases leased for a longer period than the client in order to get more frequent client communication along with the stability of long lease times.

vendor-class-identifier

Optional, default none. This property is used by clients and servers to exchange vendor-specific information. The information is an opaque object of n octets, presumably interpreted by vendor-specific code on the clients and servers.The vendor is indicated in the vendor-class-identifier option.

Example

To set the grace period to three days for scope-policy 168.1-net, type:

nrcmd> scope-policy 168.1-net set grace-period=3d

Scope-Policy Reply Options

When the server is getting ready to return option data to a client, it examines up to seven policies: the client's embedded policy, the client's policy, the client's client-class's embedded policy, the client's client-class's policy, the client's lease's scope's embedded policy, the client's lease's scope's policy, and the system default policy, in that order.

Then the server looks through the policies for a reply-options list. It looks for bootp- or dhcp-reply-options depending on the client. The server uses the first list it finds. For each option in the list, the server looks through all of the policies, in order, and returns the data from the first policy that has a matching option. There is no requirement that the data that the server returns must come from the same policy that the reply-options list came from. If the server finds a reply-options list, it looks for each option in the list individually, and searches all of the related policies if necessary.

There is also no requirement that the options mentioned in a reply-options list be present in the scope-policy that contains the list. The nrcmd program allows you to type in a string, and that string can name any option. The Network Registrar GUI, however, presents a special dialog box for adding a reply-options property to a scope-policy that restricts you to the options already configured in the scope-policy. This is a GUI-only restriction; the server does not impose this restriction.

Scope-Policy Option Method Commands

You can set individual option values with the setOption command, unset option values with the unsetOption command, and view option values with the getOption and listOptions commands. When you set an option value the DHCP server replaces any existing value or creates a new one, as needed, for the given option name.


Note For a list of all the DHCP options that you can configure, type the nrcmd program help dhcp-option.

The syntax is:

scope-policy scope-name listOptions

scope-policy scope-name setOption optname value

scope-policy scope-name getOption optname

scope-policy scope-name unsetOption optname

Table 2-44 lists and describes the scope-policy options.
Table 2-44: Scope-Policy Options
Property Description

listOptions

Lists the options in the named scope-policy.

setOption

Sets the option name and value to the specified scope-policy. The format is optname value. For example, dhcp-lease-time 3600.

getOption

Gets the value of the named option.

unsetOption

Removes the named option from the specified scope-policy.

Examples

To specify a router on a scope-policy, type:

nrcmd> scope-policy 168.1-net setOption routers 168.1.96.180
 

To list the options in a scope-policy, type:

nrcmd> scope-policy 168.1-net listOptions

Scope-Policy Lease Time Method Commands

The setLeaseTime command allows you to set the values of lease times and the getLeaseTime command to display the value of a lease time.

The syntax is:

scope-policy scope-name setLeaseTime value

scope-policy scope-name getLeaseTime

The lease time is the value of the dhcp-lease-time option. You should specify the time in seconds.

Lease Times

A scope-policy contains two lease times: the lease time and the server lease time.

Scope-selection-tag

The scope-selection-tag command allows you to define tags that are added to the scope selection tag list. After you have defined scope selection tags you can associate them with scopes, clients, and client-classes.


Note If you delete a selection tag, Network Registrar removes it from the selection tag list, but does not remove it from any existing scope, client, or client-class configurations.

The syntax is:

scope-selection-tag name create

scope-selection-tag name delete

scope-selection-tag list

Examples

To create the scope selection tag internal, type:

nrcmd> scope-selection-tag internal create
 

To delete the scope selection tag internal, type:

nrcmd> scope-selection-tag internal delete
 

To list the scope selection tags, type:

nrcmd> scope-selection-tag list

Number of Scope Selection Tags

Network Registrar limits you to a total of 30 scope selection tags. When the DHCP server configures itself, it checks the number of scope selection tags defined for any network. A network in this context is the aggregation of all of the scopes that are related to a particular subnet. This includes all of the scopes that belong together (because they share a common network number and subnet mask) and all of the scopes that are related to one of these through the use of the primary scope reference. Thus, within all of the scopes that make up a network, there can be no more than 30 scope selection tags.

When the DHCP server reads a client entry (from the local database or from LDAP), the server checks its scope selection inclusion and exclusion criteria against the scope selection tags defined for the scopes on this network. If the client entry references tags that are not present in any scope in the network, then how the server handles the tags depends on whether the reference is to included or excluded tags. If the reference is for excluded tags, then the tag will have no effect. If the reference is for included tags, then the server determines that there is no acceptable scope on that network for this client.

Server

The server command allows you to affect the behavior of the server. After you have used the server command or any other time you have changed the server's configuration, you need to reload the server. Use the server command or the Network Registrar GUI to reload the server.

Server Commands

The syntax is:

server [DNS|DHCP|TFTP] cmd

server DHCP setPartnerDown other-server name {date}

server DHCP getRelatedServers [column-separator=string]

Table 2-45 lists and describes the arguments to the server commands.
Table 2-45: Server Commands
Command Description

disable

Disables the server.

enable

Enables the server.

getHealth

Gets the specified server's current health.

getRelatedServers

Reports the status of the connection between the server and its DNS, LDAP, or failover servers. For more information, see the "getRelatedServers" section.

getStats

Gets the specified server's current statistics.

reload

Causes the specified server to be stopped and then immediately restarted. When the server restarts it re-reads all of its configuration information and its previously saved state information and then begins operating.

setDebug

Sets the debugging level and the location of the debug messages. You can specify either MLOG or WINDOW as locations. The default location is MLOG.

setPartnerDown

Notifies one DHCP server that another DHCP is down and moves all appropriate scopes into the PARTNER-DOWN state. For more information, see the "setPartnerDown" section.

start

Starts the specified server (DNS, DHCP, or TFTP).

stop

Stops the specified server (DNS, DHCP, or TFTP).

unsetDebug

Turns off debugging output.

Examples

To stop the DNS server, type:

nrcmd> server DNS stop
 

To start the DHCP server, type:

nrcmd> server DHCP start
 

To display the health of the DHCP server, type:

nrcmd> server DHCP getHealth

getRelatedServers

The getRelatedServers command allows you to create a report on the connection status of the other servers associated with this DHCP server. Information is reported for DNS, LDAP, and failover-associated DHCP servers.

Table 2-46 displays the columns in the report.
Table 2-46: getRelatedServers Report
Column Description

Type

Main, Backup, DNS, or LDAP

Name

DNS host name

Address

IP address in dotted octet format

Requests

Number of outstanding requests or two dashes (--) if not applicable

Communications

OK or INTERRUPTED. Information about DHCP and DNS servers that a DHCP server has tried to update

localhost State

Failover state of this server or two dashes (--)

Partner State

Failover state of the associated failover server or two dashes (--)

Network Registrar displays the columns sorted by type, name, and IP address.

setPartnerDown

The setPartnerDown command allows you to notify a DHCP server that a failover server associated with the DHCP server has been verified to be down. When you run the setPartnerDown command all of the scopes in this server, which are running failover with the partner server, move into PARTNER-DOWN state.

When you use the setPartnerDown command, you can specify a date and time, which represents a value equal to or later than the last known data and time the partner server could have been operational. If you do not specify a value, Network Registrar uses the current date and time.

You might want to specify a value on this command to shorten the waiting period associated with entering PARTNER-DOWN state. In particular, IP addresses that were available in the partner server cannot be allocated to different DHCP clients until a waiting period equal to the maximum client lead time has passed. For more information about the maximum-client-lead-time, see the "failover-maximum-client-lead- time" section.

Caution Make sure that the partner server is really down before issuing the setPartnerDown command.

The following are valid values:


Note Wherever you specify a date and time using the nrcmd command, you should enter the time that is local to the nrcmd process. This means that if the server is running in another time zone than your nrcmd process you should disregard the timezone where the server is running and use local time instead.

Examples

To notify the backup server that its main server is down now, type:

nrcmd> server DHCP setPartnerDown backup.mycompany.com 

To notify the backup server that its main server went down at 12 midnight on October 31, 1998 type:

nrcmd> server DHCP setPartnerDown backup.mycompany.com Oct 31 24:00:00 1998

Server Features

The server features allow you to enable or disable a feature. You use the enable or disable commands to affect the following feature.

The syntax is:

server [DNS | DHCP | TFTP] enable feature

server [DNS | DHCP | TFTP] disable feature

Table 2-47 lists and describes the server argument.
Table 2-47: Server Command Argument
Argument Description

start-on-reboot

Controls whether the server is started by the AIC server agent when you reboot. You might want to disable this feature for clusters that want to provide a single protocol service. By default, both the DNS and DHCP servers are enabled, while TFTP is disabled.

Example

To disable the DNS server from automatically restarting on reboot, type:

nrcmd> server DNS disable start-on-reboot

Server Properties

Table 2-48 lists and describes the server property.
Table 2-48: Server Property
Property Description

version

The version string for the server. This property is useful when describing version information to Technical Support.

Session

The session command allows you to set session control parameters on your nrcmd command session. You can control the visibility level that determines which properties are displayed, and the default output format.

The syntax is:

session set prop=value

session get prop

session show

Table 2-49 lists and describes the session command arguments.
Table 2-49: Session Command Arguments
Property Description

default-format

An enumerated string that can have the following values:

script---show objects in script-suitable format, that is, one attribute per line.

user---show objects in a user-readable format, that is, one object per line.

cluster

The name of the current cluster. This is a read-only property.

user-name

The name of the current user. This is a read-only property.

visibility

Controls which properties are displayed. The default visibility is 5.

Example

To set the output so that it is suitable for script processing, type:

nrcmd> session set default-format=script

TFTP

The tftp command allows you to enable or disable TFTP server features. Since there is only one TFTP server per cluster within Network Registrar, you do not need to refer to the server by name.

The syntax is:

tftp disable feature

tftp enable feature

tftp get feature

Table 2-50 lists and describes the TFTP features.
Table 2-50: TFTP Features
Feature Description

docsis-access

Required, default disabled. Specifies how the TFTP server should respond to DOCSIS file requests from TFTP clients. If this feature is disabled, the TFTP server refuses DOCSIS file requests and sends an access violation error to the client.

docsis-file-logging

Required, default disabled. Specifies whether the TFTP server should log generated DOCSIS files to disk. If this feature is enabled, the TFTP server will log each generated DOCSIS configuration file to a tftp subdirectory within the server logs directory.

read-access

Required, default enabled. Specifies how the TFTP server should respond to file read requests from TFTP clients. If this feature is disabled, the TFTP server refuses file read requests and sends an access violation error to the client.

ldap-use-ssl

Required, default disabled. Specifies whether or not the TFTP server will use SSL when communicating with a LDAP server. If this feature is disabled, the TFTP server does not use SSL when communicating with LDAP.

write-access

Required, default disabled. Specifies how the TFTP server should respond to file write requests from TFTP clients. If this feature is disabled, the TFTP server refuses file write requests and sends an access violation error to the client.

use-home-directory-as-root

Required, default disabled. Specifies whether or not the TFTP server treats pathnames contained within TFTP requests as if the paths were rooted at the specified home directory. If this feature is enabled, the TFTP server attempts to resolve both absolute and relative pathnames to paths located beneath the specified home directory.

Tftp Properties

Use the set, get, and unset commands to assign and retrieve values from the DNS server's name-value properties.

The syntax is:

tftp get prop

tftp set prop=value [prop=value]

tftp unset prop

tftp show

Table 2-51 lists and describes the TFTP properties.
Table 2-51: TFTP Properties
Property Description

active-directory-domain

Required, default none. Specifies the name of an active directory domain that the TFTP server uses to provide dynamic configuration file support.

default-device

Required, default none. Specifies the name of the default disk device the TFTP server uses when none is specified in the pathname contained in the TFTP request. This property is designed for use on NT to specify a default drive letter.

docsis-log-file-count

Required, default 100. Specifies the maximum number of DOCSIS configuration log files the TFTP server maintains in the TFTP subdirectory within the server logs directory. Once this limit is reached, the TFTP server removeS one DOCSIS log file for each new log file it creates.

docsis-pathname-prefix

Required, default: /docsis. Specifies a pathname prefix the TFTP server recognizes as the trigger to create a DOCSIS configuration file. This prefix must match the one the DHCP server is using to generate the DOCSIS filename that DHCP sends to the TFTP client.

home-directory

Required, default none. Specifies a path to a home directory the TFTP server uses to resolve TFTP requests. If use-home-directory-as-root is disabled, the the value of home-directory is used in conjunction with the paths specified in the search-list to resolve TFTP requests.

initial-packet-timeout

Required, default 5 seconds. Specifies the initial length of time the TFTP server waits after sending a response to a client before declaring that response timed-out and sending a retransmission to the client.

ldap-host-name

Required, default localhost. Specifies the hostname or IP address of a LDAP server the TFTP server uses to provide dynamic configuration file support.

ldap-initial-timeout

Required, default 10 seconds. Specifies the initial length of time the TFTP server wait after sending a request to a LDAP server before declaring that request timed-out and sending a retransmission to the server.

ldap-maximum-timeout

Required, default 60 seconds. Specifies the maximum length of time the TFTP server waits after transmitting the initial LDAP request before giving up retrying on that request.

ldap-password

Required, default none. Specifies the password the TFTP server uses when connecting to a LDAP server.

ldap-port-number

Required, default 389. Specifies the port number the TFTP server uses when communicating with a LDAP server.

ldap-root-dn

Required, default none. Specifies the root distinguished name the TFTP server uses to locate the root of the directory tree for dynamic configuration file support.

ldap-user-name

Required, default none. Specifies the user name the TFTP server uses when connecting to a LDAP server.

log-file-count

Required, default 4 files. Specifies the number of log files the TFTP server will maintain in the server logs directory.

log-file-size

Required, default 1 megabyte. Specifies the size of each log file that the TFTP server will maintain in the server logs directory.

log-level

Required, default: 3. Specifies the level of verbosity the TFTP server will employ when writing log messages to the TFTP server log file. Each integer value from zero through four enables the following log levels:

  • None (0)---There is no writing of log messages.

  • Error (1)---The present condition inhibits the operation of the TFTP server, such as no LDAP server.

  • Warning (2)---The present condition may cause operational problems such as connection timeouts.

  • Information (3)---Normal server informational messages are provided.

  • Activity (4)---There is normal server operation such as client requests and replies.

max-inbound-file-size

Required, default 1 megabye. Specifies the maximum file size limit the TFTP server will enforce for a file written to the TFTP server.

min-socket-buffer-size

Required, default 65536. Specifies the minimum socket buffer size the TFTP server uses for the well known port on which it is listening for TFTP requests.

packet-trace-level

Required, default 0. Specifies the level of verbosity the TFTP server will employ when writing messages to the server trace file. Each integer value from 0 through 4 enables the following log levels:

  • 0---Packet tracing is turned off.

  • 1---All logging is turned on (the equivalent to log-level 4).

  • 2---Client IP and port number are logged for all incoming and outgoing packets.

  • 3---Packet headers are logged for each incoming/outgoing TFTP packet.

  • 4---Thirty-two bytes of packet data are logged for each incoming/outgoing TFTP packet.

Note that you should only turn on packet tracing if instructed to do so by technical support. Packet tracing has a significant impact upon performance level.

port-number

Required, default 69. Specifies the UDP port number the TFTP server uses to listen for TFTP requests.

search-list

Required, default none. Specifies a comma-separated list of paths the TFTP server uses to resolve TFTP requests. If you enable use-home-directory-as-root, the paths in the search list are ignored and the home directory is used to resolve all TFTP requests.

session-timeout

Required, default 60. Specifies the maximum length of time the TFTP server will wait after transmitting the initial response before giving up retrying on that response. If no response is received from the client within this timeout period, the TFTP session is terminated.

TFTP TraceLevel Commands

Use the setTraceLevel and getTraceLevel commands to specify and report the trace levels for the TFTP server.

The syntax is:

tftp getTraceLevel

tftp setTraceLevel value

Table 2-52 describes these TFTP commands.
Table 2-52: TFTP Commands
Command Description

getTraceLevel

Optional, default none. Reports the trace level that the TFTP server is currently using. Enable TFTP server tracing only when investigating server problems. For normal server operation the trace level should be zero.

setTraceLevel

Optional, default 0. Specifies the level of tracing used for the TFTP server. Trace output is written to the file file_tftp_1_trace in the server logs directory. Trace levels are cumulative and defined as follows:

  • 0---Disables all server tracing.

  • 1---Displays all server log messages in the trace file

  • 2---Displays the client IP address and port for all TFTP packets.

  • 3---Displays header information for all TFTP packets.

  • 4---Displays the first 32 bytes of TFTP packet data.

Trap

The trap command allows you to enable or disable SNMP (Simple Network Management Protocol) traps. You can use traps to warn you of error conditions, and possible problems with Network Registrar's TFTP or DHCP servers. These conditions include depleting the DHCP server scope address pools and loss of communication with other servers.

Using the enable, disable, and get commands you can activate, de-activate, and list the state of the traps:

The syntax is:

trap disable feature

trap enable feature

trap get feature

Table 2-53 describes the trap command's features and the corresponding SNMP notification name.
Table 2-53: Trap Features
Feature SNMP Notification Description

address-conflict

ciscoNetRegAddressConflict

Indicates that an address conflict has been detected with another DHCP server.

dhcp-failover-config-mismatch

ciscoNetRegFailover
ConfigurationMismatch

Indicates that a DHCP server has detected a configuration mismatch with a failover peer.

dns-queue-too-big

ciscoNetRegDNSQueueToo
Big

Indicates whether Network Registrar has detected the DNS server queue has become too large.

duplicate-address

ciscoNetRegDuplicateAddress

Indicates whether Network Registrar has detected a duplicate IP address.

free-address-high

ciscoNetRegFreeAddressHigh

Indicates that the number of free IP addresses is no longer too low.

free-address-low

ciscoNetRegFreeAddressLow

Indicates that the number of free IP addresses is too low.

other-server-not-responding

ciscoNetRegOtherServerNot Responding

Indicates the Network Registrar DHCP or DNS server is not responding.

other-server-responding

ciscoNetRegOtherServer Responding

Indicates that the other Network Registrar DHCP or DNS server is responding.

server-start

ciscoNetRegServerStart

Indicates whether the Network Registrar DHCP or DNS server has been started

server-stop

ciscoNetRegServerStop

Indicates whether the Network Registrar DHCP or DNSserver has been stopped.

Trap Properties

You can use the set, unset, get, and show commands to assign and retrieve values from the various name-value properties associated with traps.

The syntax is:

trap set prop=value [prop=value ...]

trap unset prop

trap get prop

trap show

Table 2-54 describes the trap command properties.
Table 2-54: Trap Properties
Property Description

free-address-low-threshold

A string representation of an integer or percentage indicating the threshold value for the free-address-low trap.

Valid values are digits [0-9] and optionally a single trailing % character. 0-2147483647 and percentages must lie within the range 0-100 inclusive.

free-address-high-threshold

A string representation of an integer or percentage indicating the reset value for the free-address trap.

Valid values are digits [0-9] and optionally a single trailing % character. 0-2147483647 and percentages must lie within the range 0-100 inclusive.

Threshold traps are throttled through the use of a hysteresis mechanism. At any time either the free-address-low trap or the free-address-high trap may be armed, but not both. The free-address-low trap is armed when the DHCP process starts. If a free-address-low event occurs, Network Registrar generates the free-address-low trap and unarms it, and then arms the free-address-high trap.

The occurrence of one condition is used to arm the trap for the opposite condition---even if one trap is disabled through the nrcmd command, its opposite will still be sent as needed. You need to specify both the low and high values in the same manner, that is, if you specify the low threshold as a percentage, then you must also specify the high threshold as a percentage, and vice-versa. The high value must be greater than or equal to the low threshold value.

The low and high values are always expressed as units of resource free in which the units are either numeric or percent. In the case of the free-address trap, the resource being measured is the number of free addresses available in a scope.

The DHCP server issues a trap when the number of free addresses is equal to or less than the trap low value, after which the server automatically disables the trap. By default, both the trap low and high threshold values are set to 20 percent.

Examples

To set the free-address-low-threshold to 12 percent and the free-address-high-threshold to 22 percent, type:

nrcmd> trap set free-address-low-threshold=12% 
nrcmd> trap set free-address-high-threshold=22%
 

To set the free-address-low-threshold to 100 and the free-address-high-threshold to 130, type:

nrcmd> trap set free-address-low-threshold=100 free-address-high-threshold=30

Trap Recipients Methods

You can use the methods addRecipient, removeRecipient, and listRecipients in conjunction with the trap command to define a list of trap recipients that are shared by all of the traps.

The syntax is:

trap addRecipient recipient-name host-name [community] [port-number]

trap removeRecipient recipient-name

trap listRecipients

Table 2-55 lists and describes the trap method arguments.
Table 2-55: Trap Method Arguments
Argument Description

community

An optional community string that you can specify as part of the trap PDU for authentication purposes. Note that the default community string is public.

host-name

A string representation of the host name or IP address of the recipient platform.

port-number

An optional port number parameter to which Network Registrar directs the trap. The default port number is 162.

recipient-name

A unique (cluster-wide) identifier for the recipient.

The Network Registrar DNS and DHCP servers reference the trap recipients through aliases in order to allow multiple recipients at the same address, but at different ports. You can add or delete a particular trap recipient from the list, but you cannot modify the recipients.

Zone

The zone command allows you to create and edit DNS zones, as well as force transfer zones.

The syntax is:

zone name create primary file=BINDfile

zone name create primary ns person [prop=value]

zone name create secondary addr [prop=value]

zone name delete

zone name forceXfer [secondary|primary]

zone list

Examples

To create a zone, type:

nrcmd> zone QuickExample.com create primary file=host.local

Note The zone command automatically creates the NS and SOA resource record for you. You need to use the addRR command to create an A record for the name server named in the ns field.

To create both an SOA record with values (ns.test.org. andy.test.org.) and an NS record with value ns.test.org, type:

nrcmd> zone test.org create primary ns andy
 

Both of these records will have the name of the zone ("test.org." or "@"). Because the name ns.test.org. is within the test.org. zone, you have to provide an A record for ns.test.org:

nrcmd> zone test.org. addRR ns A 24.10.2.2
 

To have the primary server initiate a forced zone transfer to one or more secondary servers, use the forceXfer primary argument. To have a secondary server force a zone transfer from the primary, use the forceXfer secondary argument. For example, to force a zone transfer to the secondary server test.org from the primary, type:

nrcmd> zone test.org forceXfer secondary

Note Currently, the primary argument is not implemented.

Zone Feature Commands

You can enable, disable, or determine the feature that has been set with the enable, disable, or show commands.

The syntax is:

zone name disable feature

zone name enable feature

zone name show

Table 2-56 lists and describes the zone features.
Table 2-56: Zone Features
Feature Description

dynamic

Required, default enabled. (Primary server only) Enables or disables RFC 2136 dynamic updates to the zone. The most typical source of these updates is a DHCP server.

restrict-xfer

Required, default disabled. Restricts zone transfers to a specific set of hosts. If you restrict zone transfers, you need to use the restricted-set property to list the servers that are allowed to perform zone transfers.

ixfr

Optional, default none. Applies to secondary zones only. Enables requesting incremental transfer for this zone. When set, (to either to true or false) it overrides the global ixfr-enable value for this zone.

notify

Optional, default none. Enables the notification of other authoritative servers when this zone changes. When set, (to either true or false) it overrides the global notify value for this zone.

Incremental Transfer

Using the server global value (not setting this value per-zone) gives you an easy way of globally turning IXFR on or off, or setting a general policy for your zones and specific exceptions to the server global value.

Zone Properties

Use the set and get commands to assign and retrieve values from the zone's properties. These properties depend on the type of zone that you are creating.

The syntax is:

zone name set prop=value [prop=value ...]

zone name get prop

Table 2-57 lists and describes the zone properties.
Table 2-57: Primary Zone Create Properties
Property Description

auth-servers

(Secondary-only). The list of servers from which Network Registrar will transfer data for this zone.

dynupdate-set

The set of IP addresses from which dynamic updates will be accepted, when you have enabled the dynamic feature. The nrcmd program treats addresses with zeroes in the least significant octets as network numbers, with implicit masks in octet multiples.

expire

Optional, default: 604800. The expire interval, in seconds, of the zone. The length of time a secondary can continue to serve zone data without confirmation that it is still current.

Validation: refresh < x < 2147483647.

minttl

Optional, default: 86400. The minimum TTL value to expose in resource records for this zone. Records with lower TTL values will be published with this value.

Validation: 0 <= x <= 2147483647.

notify-set

An optional list of additional servers to notify when this zone changes. All servers listed in NS records for the zone with the exception of the server described by the ns property of the zone (the mname field of the SOA record) will receive notifications. Servers listed in the notify-set will also be notified.

ns

Required, default: none.The fully-qualified domain name of the primary for this zone. This host is the original or primary source of data for this zone.

person

Required, default: none. A domain name which specifies the mailbox of the person responsible for this zone. The first label is a user or mail alias, the rest of the labels are a mail destination. A mailbox of hostmaster@test.com would be represented as hostmaster.test.com.

refresh

Optional, default: 10800. The refresh interval, in seconds, of the zone. Used by secondaries as the period of polling for zone changes.

Validation: 1 <= x <= 2147483647.

restricted-set

The set of IP addresses that may request zone transfers when you have enabled the restrict-xfer feature.

retry

Optional, default: 3600. The retry interval, in seconds, of the zone. Used by secondaries as the period of retrying when polling for changes, or attempting zone transfer after encountering errors.

Validation: < (expire - refresh)

serial

Optional, default: 1. The current serial number of the zone. Maintained automatically by the DNS server.

Validation: 0 <= x <= 4294967295.

Zone Host Method Commands

You use the following commands to add, remove, and list the hosts for the zone.

The syntax is:

zone name addHost name addr [alias]

zone name
removeHost name

zone name
listHosts

Table 2-58 lists and describes the host properties.
Table 2-58: Host Properties
Property Description

name

The host's domain name.

addr

The list of addresses assigned to the host.

aliases

An optional list of alias domain names for this host.

Example

To add a host to the QuickExample zone, type:

nrcmd> zone QuickExample.com addHost bethpc 192.168.1.10

Zone Resource Record Method Commands

You use the following commands to add, remove, and list the resource records in the zone or to delete a zone's unused or obsolete resource records.

The syntax is:

zone name addRR name [ttl] [class] type [preference] data

zone name
removeRR name [type [data]]

zone name
removeDynRR name [type]

zone name
cleanRR

zone name
listRR {all|static|dynamic}

Table 2-59 lists and describes the resource record properties.


Table 2-59: Resource Record Properties
Property Description

class

The class of resource record, which is always IN (for Internet) in DNS.

name

The resource record's domain name (owner name).

preference

Prevents mail routing loops. Is an unsigned 16 bit number (between 0 and 65535) that indicates the mail exchanger's priority. [...] Mailers attempt delivery to the mail exchangers with the lowest preference values first.

ttl

The resource record time to live (in seconds). The length of time the record the client may cache the resource record.

type

The type of resource record, such as PTR or A.

addRR

The addRR command adds a resource record of the type that you specify.

If you are adding an MX record, you can specify a preference to determine the order of mail servers. The system will try the mail server with the lowest number and if that server is not available it will try the next lowest number. You can have two mail servers with the same number, and the system will randomly try either one


Note In order for the addition to take effect, you need to reload the server.

cleanRR

The cleanRR command deletes zone records that are left after you have deleted a zone. It uses the DNS server's historical zone data to determine what part of this data can be removed. Use the cleanRR command if you periodically delete and reimport zones, which can cause your database to grow.

The behavior of the cleanRR command depends on whether there is a new zone:

The cleanRR command does not print out a list of records to be deleted or prompt you for confirmation. You can safely run it at any time.

listRR

The listRR command displays resource records in the named zone. You can display all the resource records, or just the static or the dynamic resource records.

removeDynRR

The removeDynRR command removes all specified dynamic resource records. You can specify resource records by name or name and type. To use the command, the DNS server must be running. Changes take effect immediately; you do not need to reload the server.

removeRR

The removeRR command removes all specified static resource records. You can specify resource records by name, name and type, or name, type, and data (in which the specified data is in BIND-style format). Note that for the removal to take effect, you need to reload the server.

Examples

To add a name server resource record, type:

nrcmd> zone QuickExample.com addRR green ns green.QuickExample.com
 

You can specify the name as either the relative name (if the server is within the same domain), as an absolute name (by supplying the fully qualified domain name), or the same name as the zone name (by using the @ symbol).

To delete a zone's unused or obsolete resource records, type:

nrcmd> zone QuickExample.com cleanRR 
 


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Nov 18 13:20:46 PST 1999
Copyright 1989-1999©Cisco Systems Inc.