|
|
Cisco IP Manager (CIPM) is a software tool used by MPLS VPN Solution to download configlets to provider edge routers and customer edge routers. Prior to installing the MPLS VPN Solution software, you must install the Cisco IP Manager release 2.0, which is bundled with this product. For information on installing CIPM 2.0, refer to Chapter 2, "Installing and Starting Cisco IP Manager 2.0" in the Cisco VPN Solutions Center: MPLS Solution Installation Guide.

As MPLS VPN Solution provisions, the product uses Cisco IP Manager to access the routers, first to get a configuration file, and then to download the new changes. MPLS VPN Solution's provisioning is all done through CIPM (including configuration file collection), but MPLS VPN Solution can also be instructed to access the devices directly for other reasons. For example, in a PoP (point of presence) with little new provisioning activity, it is possible for MPLS VPN Solution to obtain configuration files directly on a collection schedule; this is useful for auditing, but is unnecessary in sites with high activity because the activity of provisioning retrieves fresh configuration files on a regular basis. MPLS VPN Solution also collects large amounts of performance data directly from the routers, not via CIPM.
Refer to "Cisco IP Manager and MPLS VPN Solution Administration Model," for more information.
The Cisco IP Manager software is part of the Cisco Service Management System of provisioning and management tools for service providers and operators of large enterprise networks. The Cisco IP Manager program interacts with other tools in the suite to provide a fully scalable element-level management system for high quality, rapid network services.
The Cisco IP Manager software meets business requirements for scalable, reliable Layer 3, IOS-based element management in very large networks by:
Operators may use the software to either configure new devices before they are brought on-line, or to change existing configurations in live elements to support new services. Import/export features allow you to write current device configurations to files prior to provisioning the network with new data and restore the saved configurations if you need to perform a rollback.
The Cisco IP Manager software provides automated, push-button services for network-element configuration. Its features include:
The template-building interface provides a mechanism for defining variables in a template file and their values in a companion data file. Configuration files can then be generated en masse, similar to a word processing application's mail-merge operation.
Variables can also pass through a CORBA IDL interface for other network management systems or operating systems.
The software can manage multiple discrete customer networks that use the same unregistered IP address ranges. The flow-through interface enables communication with static or dynamic IP address pool management tools. System administration allows user-based authentication. Network managers can organize elements into domains and subdomains and assign permissions to each, based on user group. Service provider operators must enter a password to obtain access to permitted domains.
The Cisco IP Manager software also partitions and controls data access.
A fully installed Cisco IP Manager 2.0 system consists of the following elements:
![]() |
Tips MPLS VPN Solution requires that you install all of these components, as well as the GUI package, on the same Cisco IP Manager host. The installation process is described in Chapter 3, "Installing and Starting Cisco IP Manager 2.0" in the Cisco VPN Solutions Center: MPLS Solution Installation Guide. |
Cisco IP Manager 2.0 requires a password to access the CIPM workstation. When you first install Cisco IP Manager 2.0, the defaults for the username and password are as follows:
If the CIPM username or password are changed on the CIPM workstation, you must change the settings for the CIPM username or password to correspond in MPLS VPN Solution software.
The CIPM username and password are stored in the MPLS VPN Solution Repository. If the MPLS VPN Solution software cannot find the username and password in the Repository, it uses the defaults.
The username and password can consist of any combination of alphanumeric characters (upper- or lowercase), plus the underscore character, hyphen, and period. These fields cannot contain leading, trailing, or embedded spaces. The maximum length for these fields is 64 characters.
To change the username or password in MPLS VPN Solution software to match the CIPM workstation values, follow these steps:
Step 2 Go to the bin/solaris directory.
Step 3 From the vpnadm user terminal window, enter the following command:
setCIPMUserPassword
You are prompted for the CIPM username.
Step 4 Enter the CIPM username.
If you do not wish to change the username, enter the current username.
After you enter the username, you are prompted for the CIPM password.
Step 5 Enter the CIPM password; then re-enter the password as prompted to confirm it.
Step 6 Exit from the vpnadm user.
To implement the new username or password, you must stop the Watchdog, then restart it.
Step 7 Open the terminal window where the Watchdog is running.
Step 8 Stop the Watchdog with the stopwd -y command; then restart the Watchdog.
For details on starting the Watchdog, refer to "Starting the Watchdog and the VPN Console" in Chapter 4 of the Cisco VPN Solutions Center: MPLS Solution Installation Guide.
In general, Cisco recommends that domain name qualification be used only when necessary to resolve the appropriate IP addresses.
The existence of a domain server or the ability to resolve to a fully domain-qualified hostname does not require the use of that qualified hostname. If the host is in the default domain, you do not need to specify the fully domain-qualified hostname.
There are three occasions when MPLS VPN Solution software requires you to configure domain names:
When MPLS VPN Solution software creates elements, it does so using Telnet-VTY to access the device; thus, the Telnet-VTY method is the default access method. For information on changing the access method to TFTP, see the "Using TFTP to Transport Router Configuration Files" section.
To coordinate the router's login username and password with MPLS VPN Solution and Cisco IP Manager, follow these steps:
Step 2 In Cisco IP Manager, create a new user and password identical to that of the target router.
Cisco IP Manager's default user ID is admin. For instructions on creating a new user, refer to "Adding Users" in Chapter 7, "System Administration and Log Management," of the Cisco IP Manager (Lite) Users Guide, Version 2.0.
Step 3 Give the new user root access.
Step 4 In the Cisco IP Manager Device Properties dialog box, choose the VTY tab.
The VTY dialog box appears (see Figure 2-2).

Step 5 Select CIPM Auth in the Login Security panel.
This creates a "pass-through" user name and password.
For more information about the Device Properties dialog box, refer to "Creating Elements" in Chapter 5, "Managing Network Elements," of the Cisco IP Manager (Lite) User's Guide, Version 2.0.
If you choose to use a terminal (or communications) server to access the router(s), you must configure CIPM to use the console method. MPLS VPN Solution does not alter the connect method configured in Cisco IP Manager. Cisco IP Manager communicates with this device's console port through the terminal server.
Step 2 Select the Console tab.

Step 3 Fill in the appropriate fields in the Console tab dialog box, then click OK.
![]() |
Note The fields you need to complete and the information you need to enter depends on terminal server setup and the configuration of the router you want to access. |
If you wish to change that setting after CIPM is installed and use the Trivial File Transfer Protocol (TFTP) instead, you must complete these tasks:
The Cisco IP Manager software is designed to use the Trivial File Transfer Protocol (TFTP) to upload and download network element data. Before you can use this protocol, however, you must configure the Cisco IP Manager workstation to be a TFTP server.
If you use a remote TFTP server, the /tftpboot directory must be mounted on the NEMServer host.
To enable the TFTP daemon, follow these steps:
#tftp dgram udp wait root /usr/sbin/in.tftpd in.tftpd -s /tftpboot
Step 2 Remove the comment character (#) from the beginning of the line. Save your changes and exit the text editor.
Step 3 The Cisco IP Manager TGServer requires the TFTP directory to be named /tftpboot.
If you are not able to do this, you must set up a symbolic link to your TFTP directory. (The user who launches the servers must have write permission to this directory.) If for some reason your network requires you to use something like myTftp, create a symbolic link by entering the following on the command line:
ln -s /myTftp /tftpboot
Step 4 To verify that your workstation is TFTP-enabled, enter the following on the UNIX command line:
ps -ef | grep -v grep | grep inetd
The output displays the process identification number for the inetd configuration:
root 106 1 0 Sep 21 ? 0:00 /usr/sbin/inetd -s
The first column shows the user ID of the user who owns the process (inetd is owned by root). The process ID is the number in the second column. In the example, the process ID is 106.
Step 5 Issue a kill command with a -1 (the number one) or -HUP argument to force the inetd process to read the newly edited inetd.conf file:
kill -1 106
Step 6 Verify that TFTP is enabled by entering the following:
netstat -a | grep tftp
The Cisco IP Manager workstation is enabled as a TFTP server if you see the following:
*.tftp Idle
If there is no output from the netstat command, TFTP is not enabled. Check the /etc/inetd.conf file for errors and repeat the previous instructions. For more information about TFTP or the kill command, see the UNIX man pages for tftp, tftpd, and kill.
To create the TFTP home directory, follow these steps:
mkdir /tftpboot
Step 2 Modify the permissions for this directory to give all users read, write, and execute permissions, by entering the following command:
chmod 777 /tftpboot
Step 3 If you intend to specify a subdirectory of /tftpboot for your Cisco IP Manager TFTP communications from within the GUI (Domain Properties dialog box), you should create that at this time as well, and set its permissions to the same value.
The Cisco IP Manager workstation is now enabled to act as a TFTP server.
If there are existing CIPM network elements set to use Telnet, use the CIPM GUI to change those elements to use TFTP. For information on how to edit the properties of a network element, refer to "Element Properties" on page 5-11 of the Cisco IP Manager (Lite) User's Guide, Version 2.0.
Step 2 Go to the /opt/vpnadm/vpn/etc directory.
Step 3 Open the csm.properties file with a text editor.
Step 4 Find the following section in the csm.properties file:
# Transfer Mode on Create: when creating new elements in CIPM, this mode # will be set for uploading and downloading router configuration. # Once an element is created, the current transfer mode is set via the # CIPM GUI will be used for these operations. # Values: "tftp" or "telnet" DIPMServer.CIPMTransferModeOnCreate = telnet
Step 5 Change the telnet value to tftp, then save your changes and exit the file.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Apr 21 10:56:52 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.