cc/td/doc/product/rtrmgmt/vpnsc/mpls/1_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Cisco IP Manager Administration

Cisco IP Manager Administration

Cisco IP Manager (CIPM) is a software tool used by MPLS VPN Solution to download configlets to provider edge routers and customer edge routers. Prior to installing the MPLS VPN Solution software, you must install the Cisco IP Manager release 2.0, which is bundled with this product. For information on installing CIPM 2.0, refer to Chapter 2, "Installing and Starting Cisco IP Manager 2.0" in the Cisco VPN Solutions Center: MPLS Solution Installation Guide.

The Cisco IP Manager is part of the network management subnet: the MPLS VPN Solution host and the Cisco IP Manager host are on the same LAN with a connection to the management CE (MCE).


Figure 2-1: Cisco IP Manager in the Network Management Subnet


As MPLS VPN Solution provisions, the product uses Cisco IP Manager to access the routers, first to get a configuration file, and then to download the new changes. MPLS VPN Solution's provisioning is all done through CIPM (including configuration file collection), but MPLS VPN Solution can also be instructed to access the devices directly for other reasons. For example, in a PoP (point of presence) with little new provisioning activity, it is possible for MPLS VPN Solution to obtain configuration files directly on a collection schedule; this is useful for auditing, but is unnecessary in sites with high activity because the activity of provisioning retrieves fresh configuration files on a regular basis. MPLS VPN Solution also collects large amounts of performance data directly from the routers, not via CIPM.

To use these features, then, both the CIPM host and the MPLS VPN Solution host should be allowed access to PEs and CEs. Cisco recommends that you allow Telnet, SNMP, and TFTP outbound from the CIPM host and the MPLS VPN Solution host, and permit responses of these types with "tcp established." Everything else should be denied, except for any other requirements the customer has for packages running on the network management subnet.

Refer to "Cisco IP Manager and MPLS VPN Solution Administration Model," for more information.

Cisco IP Manager Overview

The Cisco IP Manager software is part of the Cisco Service Management System of provisioning and management tools for service providers and operators of large enterprise networks. The Cisco IP Manager program interacts with other tools in the suite to provide a fully scalable element-level management system for high quality, rapid network services.

The Cisco IP Manager software meets business requirements for scalable, reliable Layer 3, IOS-based element management in very large networks by:

Operators may use the software to either configure new devices before they are brought on-line, or to change existing configurations in live elements to support new services. Import/export features allow you to write current device configurations to files prior to provisioning the network with new data and restore the saved configurations if you need to perform a rollback.

Cisco IP Manager 2.0 Features

The Cisco IP Manager software provides automated, push-button services for network-element configuration. Its features include:

Creating, Validating, and Managing Configuration Files

Service provider operators can propagate multiple configuration files across a large network from a single template, allowing use of standardized configuration variables such as host names, IP addresses, and subnet masks.

The template-building interface provides a mechanism for defining variables in a template file and their values in a companion data file. Configuration files can then be generated en masse, similar to a word processing application's mail-merge operation.

Variables can also pass through a CORBA IDL interface for other network management systems or operating systems.

The software can manage multiple discrete customer networks that use the same unregistered IP address ranges. The flow-through interface enables communication with static or dynamic IP address pool management tools. System administration allows user-based authentication. Network managers can organize elements into domains and subdomains and assign permissions to each, based on user group. Service provider operators must enter a password to obtain access to permitted domains.

The Cisco IP Manager software also partitions and controls data access.

Cisco IP Manager Software Elements

A fully installed Cisco IP Manager 2.0 system consists of the following elements:


Tips MPLS VPN Solution requires that you install all of these components, as well as the GUI package, on the same Cisco IP Manager host. The installation process is described in Chapter 3, "Installing and Starting Cisco IP Manager 2.0" in the Cisco VPN Solutions Center: MPLS Solution Installation Guide.

Changing the CIPM Username and Password in MPLS VPN Solution

Cisco IP Manager 2.0 requires a password to access the CIPM workstation. When you first install Cisco IP Manager 2.0, the defaults for the username and password are as follows:

If the CIPM username or password are changed on the CIPM workstation, you must change the settings for the CIPM username or password to correspond in MPLS VPN Solution software.

The CIPM username and password are stored in the MPLS VPN Solution Repository. If the MPLS VPN Solution software cannot find the username and password in the Repository, it uses the defaults.

The username and password can consist of any combination of alphanumeric characters (upper- or lowercase), plus the underscore character, hyphen, and period. These fields cannot contain leading, trailing, or embedded spaces. The maximum length for these fields is 64 characters.

To change the username or password in MPLS VPN Solution software to match the CIPM workstation values, follow these steps:


Step 1 Log in as the vpnadm user on the MPLS VPN Solution workstation.

Step 2 Go to the bin/solaris directory.

Step 3 From the vpnadm user terminal window, enter the following command:

setCIPMUserPassword

You are prompted for the CIPM username.

Step 4 Enter the CIPM username.

If you do not wish to change the username, enter the current username.

After you enter the username, you are prompted for the CIPM password.

Step 5 Enter the CIPM password; then re-enter the password as prompted to confirm it.

Step 6 Exit from the vpnadm user.

To implement the new username or password, you must stop the Watchdog, then restart it.

Step 7 Open the terminal window where the Watchdog is running.

Step 8 Stop the Watchdog with the stopwd -y command; then restart the Watchdog.

For details on starting the Watchdog, refer to "Starting the Watchdog and the VPN Console" in Chapter 4 of the Cisco VPN Solutions Center: MPLS Solution Installation Guide.


On Specifying the Fully Domain-Qualified Hostname

In general, Cisco recommends that domain name qualification be used only when necessary to resolve the appropriate IP addresses.

The existence of a domain server or the ability to resolve to a fully domain-qualified hostname does not require the use of that qualified hostname. If the host is in the default domain, you do not need to specify the fully domain-qualified hostname.

There are three occasions when MPLS VPN Solution software requires you to configure domain names:

The domain name assignment is part of the Oracle configuration. If Cisco IP Manager is reinstalled, it should use the same naming convention previously configured during the initial installation.
If you are reinstalling Cisco IP Manager and you retain the existing Oracle installation, the domain name convention used in the previous Cisco IP Manager installation must be entered again for the new installation.
If the Cisco IP Manager workstation is directly resolvable, specifying the domain name is not necessary.
The domain name is required in this instance only if a fully domain-qualified hostname is needed to resolve the IP address of the Cisco IP Manager workstation.
Specifying the domain name in this context is necessary only if a fully domain-qualified hostname is needed to resolve the IP address of the target (router).

Setting Access to Routers with VTY, Console, or TACACS

This section describes how you configure Cisco IP Manager 2.0 to access the CE or PE routers via any one of three following methods:

Accessing the Router Via the Telnet-VTY Method

When MPLS VPN Solution software creates elements, it does so using Telnet-VTY to access the device; thus, the Telnet-VTY method is the default access method. For information on changing the access method to TFTP, see the "Using TFTP to Transport Router Configuration Files" section.

Accessing the Router Via the TACACS Method

MPLS VPN Solution, in concert with DIPM, can use only one username to log in to Cisco IP Manager. However, you can coordinate the login username and password pair used to log in to CIPM with the router and the TACACS username and password.


Note Terminal Access Control Access Control System Plus (TACACS+) is supported in Cisco's family of routers and access servers, providing complete network access security (NAS) for dial-in connections. This protocol is a completely new version of the TACACS protocol referenced by RFC 1492.

To coordinate the router's login username and password with MPLS VPN Solution and Cisco IP Manager, follow these steps:


Step 1 On the target router (or TACACS server), discover the login username and password.

Step 2 In Cisco IP Manager, create a new user and password identical to that of the target router.

Cisco IP Manager's default user ID is admin. For instructions on creating a new user, refer to "Adding Users" in Chapter 7, "System Administration and Log Management," of the Cisco IP Manager (Lite) Users Guide, Version 2.0.

Step 3 Give the new user root access.

Step 4 In the Cisco IP Manager Device Properties dialog box, choose the VTY tab.

The VTY dialog box appears (see Figure 2-2).


Figure 2-2: Device Properties Dialog Box


Step 5 Select CIPM Auth in the Login Security panel.

This creates a "pass-through" user name and password.

For more information about the Device Properties dialog box, refer to "Creating Elements" in Chapter 5, "Managing Network Elements," of the Cisco IP Manager (Lite) User's Guide, Version 2.0.


Accessing the Router Via the Console Method

If you choose to use a terminal (or communications) server to access the router(s), you must configure CIPM to use the console method. MPLS VPN Solution does not alter the connect method configured in Cisco IP Manager. Cisco IP Manager communicates with this device's console port through the terminal server.


Step 1 Open the Device Properties dialog box as described in Chapter 5 of the Cisco IP Manager (Lite) User's Guide, Version 2.0.

Step 2 Select the Console tab.


Figure 2-3: CIPM Device Properties Dialog Box---Console Tab


Step 3 Fill in the appropriate fields in the Console tab dialog box, then click OK.


Note The fields you need to complete and the information you need to enter depends on terminal server setup and the configuration of the router you want to access.


Using TFTP to Transport Router Configuration Files

By default, MPLS VPN Solution software uses Telnet to upload and download configuration files to and from Provider Edge Routers (PEs) and Customer Edge Routers (CEs) in the service provider network.

If you wish to change that setting after CIPM is installed and use the Trivial File Transfer Protocol (TFTP) instead, you must complete these tasks:

Setting Up a TFTP Server on the CIPM Workstation

The Cisco IP Manager software is designed to use the Trivial File Transfer Protocol (TFTP) to upload and download network element data. Before you can use this protocol, however, you must configure the Cisco IP Manager workstation to be a TFTP server.

If you use a remote TFTP server, the /tftpboot directory must be mounted on the NEMServer host.

Enabling the TFTP Daemon

To enable the TFTP daemon, follow these steps:


Step 1 Log in as the superuser and edit the file /etc/inetd.conf. Locate the line that enables TFTP:

#tftp dgram udp wait root /usr/sbin/in.tftpd in.tftpd -s /tftpboot

Step 2 Remove the comment character (#) from the beginning of the line. Save your changes and exit the text editor.

Step 3 The Cisco IP Manager TGServer requires the TFTP directory to be named /tftpboot.

If you are not able to do this, you must set up a symbolic link to your TFTP directory. (The user who launches the servers must have write permission to this directory.) If for some reason your network requires you to use something like myTftp, create a symbolic link by entering the following on the command line:

ln -s /myTftp /tftpboot

Step 4 To verify that your workstation is TFTP-enabled, enter the following on the UNIX command line:

ps -ef | grep -v grep | grep inetd

The output displays the process identification number for the inetd configuration:

root 106 1 0 Sep 21 ? 0:00 /usr/sbin/inetd -s

The first column shows the user ID of the user who owns the process (inetd is owned by root). The process ID is the number in the second column. In the example, the process ID is 106.

Step 5 Issue a kill command with a -1 (the number one) or -HUP argument to force the inetd process to read the newly edited inetd.conf file:

kill -1 106

Step 6 Verify that TFTP is enabled by entering the following:

netstat -a | grep tftp

The Cisco IP Manager workstation is enabled as a TFTP server if you see the following:

*.tftp Idle

If there is no output from the netstat command, TFTP is not enabled. Check the /etc/inetd.conf file for errors and repeat the previous instructions. For more information about TFTP or the kill command, see the UNIX man pages for tftp, tftpd, and kill.


Creating the TFTP Home Directory

To create the TFTP home directory, follow these steps:


Step 1 While logged in as the superuser on the CIPM workstation, create the /tftpboot directory if it does not already exist, by entering the following on the command line:

mkdir /tftpboot

Step 2 Modify the permissions for this directory to give all users read, write, and execute permissions, by entering the following command:

chmod 777 /tftpboot

Step 3 If you intend to specify a subdirectory of /tftpboot for your Cisco IP Manager TFTP communications from within the GUI (Domain Properties dialog box), you should create that at this time as well, and set its permissions to the same value.


The Cisco IP Manager workstation is now enabled to act as a TFTP server.

Changing Existing CIPM Elements to Use TFTP

If there are existing CIPM network elements set to use Telnet, use the CIPM GUI to change those elements to use TFTP. For information on how to edit the properties of a network element, refer to "Element Properties" on page 5-11 of the Cisco IP Manager (Lite) User's Guide, Version 2.0.

Enabling TFTP on the MPLS VPN Solution Workstation

MPLS VPN Solution software is set by default to use Telnet to transport configuration files to and from routers. To set MPLS VPN Solution software to use TFTP instead, you must edit the csm.properties file as described below.


Step 1 On the MPLS VPN Solution workstation, log in as superuser (root).

Step 2 Go to the /opt/vpnadm/vpn/etc directory.

Step 3 Open the csm.properties file with a text editor.

Step 4 Find the following section in the csm.properties file:

    # Transfer Mode on Create: when creating new elements in CIPM, this mode
    # will be set for uploading and downloading router configuration.
    # Once an element is created, the current transfer mode is set via the
    # CIPM GUI will be used for these operations.
    # Values: "tftp" or "telnet"
     
    DIPMServer.CIPMTransferModeOnCreate = telnet
    

Step 5 Change the telnet value to tftp, then save your changes and exit the file.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Apr 21 10:56:52 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.