Copyright Statements
2009, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Infoblox, Inc. The information in this document is subject to change without notice. Infoblox, Inc. shall not be liable for any damages resulting from technical errors or omissions which may be present in this document, or from use of this document. This document is an unpublished work protected by the United States copyright laws and is proprietary to Infoblox, Inc. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use of this document by anyone other than authorized employees, authorized users, or licensees of Infoblox, Inc. without the prior written consent of Infoblox, Inc. is prohibited. For Open Source Copyright information, see Appendix C, "Open Source Copyright and License Statements", on page 769.
Trademark Statements
Infoblox, the Infoblox logo, DNSone, NIOS, IDeal IP, bloxSDB, bloxHA and bloxSYNC are trademarks or registered trademarks of Infoblox Inc. All other trademarked names used herein are the properties of their respective owners and are used for identification purposes only.
Company Information
Infoblox is located at: 4750 Patrick Henry Drive Santa Clara, CA 95054-1851, USA Web: www.infoblox.com
support.infoblox.com
Phone: 408.625.4200 Toll Free: 888.463.6259 Outside North America: +1.408.716.4300 Fax: 408.625.4201
Product Information
Hardware Models: Infoblox-250, -500, -550, -550-A, -1000, -1200, -1050, -1050-A, -1550, -1550-A, -1552, -1552-A, and -2000 Document Number: 400-0172-004, Rev. A Document Updated: July 17, 2009
Warranty Information
Your purchase includes a 90-day software warranty and a one year limited warranty on the Infoblox appliance, plus an Infoblox Warranty Support Plan and Technical Support. For more information about Infoblox Warranty information, refer to Infoblox Web site, or contact Infoblox Technical Support.
Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Document Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Documentation Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Documentation Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Whats New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Customer Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Software Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
NIOS 4.3r5
Multilingual Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Host Names Support for Microsoft Windows Code Pages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 UTF-8 Supported Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 UTF-8 Support Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Exporting Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Exporting Data from Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Exporting Data to a CSV File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
NIOS 4.3r5
Testing the RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Maintaining the RADIUS Admins Server List on the NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Disabling a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Configuring a RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Configuring Admin Groups on the Remote RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Configuring Remote Admin Accounts on the Remote RADIUS Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Authorization Groups Using RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Accounting Activities Using RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Authenticating Admin Accounts Using Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Admin Authentication Using Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Configuring Active Directory Authentication for Admins. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Defining the Admin Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Specifying a List of Remote Admin Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Configuring the Default Admin Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Configuring a List of Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Changing Password Length Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Notifying Administrators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
NIOS 4.3r5
Using the MGMT Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Appliance Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Grid Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 DNS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Setting Static Routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Enabling DNS Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Managing Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Viewing the Installed Licenses on a NIOS Appliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Obtaining a 60-Day Temporary License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Obtaining and Adding a License. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Removing Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Using the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Disabling the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Enabling the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Viewing the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Restoring Objects in the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Emptying the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Shutting Down, Rebooting, and Resetting a NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Rebooting a NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Shutting Down a NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Resetting a NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Managing the Disk Subsystem on the Infoblox-2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 About RAID 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Evaluating the Status of the Disk Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Appliance Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Replacing a Failed Disk Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Disk Array Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Restarting Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Canceling a Scheduled Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
NIOS 4.3r5
Monitoring Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Using the Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Using the Replication Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Using the Traffic Capture Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Using the Capacity Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Monitoring DNS Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
NIOS 4.3r5
Configuration Example: Deploying a NIOS Appliance for External DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Cable the Appliance to the Network and Turn On Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Specify Initial Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Specify Appliance Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Define a NAT Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Enable Zone Transfers on the Legacy Name Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Import Zone Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Designate the New Primary on the Secondary Name Server (at the ISP Site) . . . . . . . . . . . . . . . . . . . . . . . . . 276 Configure NAT and Policies on the Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 Deploying an Independent HA Pair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Method 1 Using the Infoblox NIOS Startup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Method 2 Using the GUI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Configuration Example: Configuring an HA Pair for Internal DNS and DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Cable Appliances to the Network and Turn On Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Specify Initial Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Specify Appliance Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Enable Zone Transfers on the Legacy Name Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Import Zone Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Define Networks, Reverse-Mapping Zones, DHCP Ranges, and Infoblox Hosts. . . . . . . . . . . . . . . . . . . . . . . . 289 Define Multiple Forwarders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 Enable Recursion on External DNS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Modify the Firewall and Router Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Enable DHCP and Switch Service to the NIOS Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Manage and Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Verifying the Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Single Independent Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Independent HA Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Forcing an HA Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Infoblox Tools for Migrating Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Upgrading Software on an Independent Appliance or HA Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Acquiring Software Upgrade Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Distributing Software Upgrade Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Running the Software Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Import DHCP Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Import DNS Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Using the Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 After Using the Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Enabling IPv6 On a Grid Member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 About IPv6 Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Configuring IPv6 on a Grid Member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Configuration Example: Configuring IPv6 on a Grid Member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Managing a Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Changing Grid Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Setting the MTU for VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Removing a Grid Member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Promoting a Master Candidate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Upgrading NIOS Software on a Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Lite Upgrades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Uploading NIOS Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 About Upgrade Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Distributing Software Upgrade Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Testing a Software Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Performing a Software Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 Monitoring Distribution and Upgrade Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Restoring Zone Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Restoring Zone Data After a Zone Import Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Restoring Zone Data After a Zone Reimport Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Configuring Delegated, Forward, and Stub Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Configuring a Delegated Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Configuring a Forward Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Configuring Stub Zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Using Name Server Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Creating Name Server Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Applying Name Server Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Managing Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 Locking and Unlocking Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 Modifying Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Removing Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Enabling and Disabling Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 About DNSSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 DNSSEC Resource Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 DNSKEY Resource Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 RRSIG Resource Record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 NSEC Resource Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 DS Resource Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Configuring NIOS Appliances to Support DNSSEC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Enabling DNSSEC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 Using the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Viewing the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Restoring Objects in the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Emptying the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 Specifying Host Name Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 Grid Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 Member Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Zone Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Obtaining a List of Invalid Record Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 Associating Shared Record Groups With Zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 Configuring Extensible Attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 Host Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Understanding Host Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Adding Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 Adding Bulk Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Specifying Bulk Host Name Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Before Defining Bulk Host Name Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Configuring Bulk Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434 Adding Resource Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 Entering MAC Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 Adding A Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Adding NS Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Adding AAAA Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Adding PTR Records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Adding MX Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 Adding SRV Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441 Adding TXT Records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442 Adding CNAME Records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Adding DNAME Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Specifying Time To Live Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
10
NIOS 4.3r5
Managing Hosts and Resource Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Modifying, Disabling, or Deleting a Host or Record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Viewing DNS Record Listings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
NIOS 4.3r5
11
12
NIOS 4.3r5
NIOS 4.3r5
15
16
NIOS 4.3r5
RFC Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763 DNS RFC Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763 DHCP RFC Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Rack Mounting Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831 Chassis Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831 Rack Mounting and Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831 Hardware Platform Specifications and Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 System Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Environmental Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 AC Electrical Power Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 DC Electrical Power Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
NIOS 4.3r5
19
20
NIOS 4.3r5
Preface
This guide explains how to install, configure, and manage a NIOS appliance. This preface describes the content and organization of this guide, and provides information about how to find additional product information, including accessing Technical Support:
Document Overview on page 22 Documentation Organization on page 22 Documentation Conventions on page 24 Whats New on page 26 Related Documentation on page 27 Customer Care on page 27 User Accounts on page 27 Software Upgrades on page 27 Technical Support on page 27
NIOS 4.3r5
21
Preface
Document Overview
This guide describes how to install, configure, and manage NIOS appliances using NIOS 4.3r5. This manual was last updated on July 17, 2009. For updated documentation, visit our Support site at: http://support.infoblox.com.
Documentation Organization
This guide consists of five parts, as described in the following table.
Section
Content
Chapters 1 7
Provides general information about the NIOS software, plus provides definitions of the terms used to explain how NIOS appliances operate. It provides examples of how the appliances can be used in your network. Explains how to use the GUI of the NIOS appliance by defining what the GUI components are and how to use them. Explains how to configure and manage administrator groups and accounts in the local database and on external RADIUS servers. Explains how to configure NTP, secure administrative access, set routes, enable DNS resolution, activate licenses, and reset the NIOS appliance. It also provides information about ethernet and service port usage. Explains the purpose of the various logs and provides information on using syslog to monitor the NIOS appliance. Explains how to configure SNMP to monitor the NIOS appliance. It also describes the SNMP traps that the NIOS appliance can send and the Infoblox MIBs. Explains how to upgrade and downgrade software, and how to backup, merge, revert, and restore configuration files.
Chapter 7, Changing Software and Merging Files, on page 251 Part 2 Appliance Deployment Chapter 8, Deploying Independent Appliances, on page 263 Chapter 9, Deploying a Grid, on page 299
Chapters 8 9
Explains how to deploy single independent appliances and independent HA (high availability) pairs. Addresses grid deployment considerations and explains how to deploy single NIOS appliances and HA pairs as grid masters and members.
Chapters 10 18
Explains how to manage grid data configurations that are inherited by DNS members and zones, such as zone type and mapping information. This chapter also describes how to configure DNS views and how to modify, remove and disable authoritative, delegated, and forward zones. It concludes with how to add, modify, remove, and disable hosts and records.
22
NIOS 4.3r5
Document Overview
Section
Content Explains how to configure and use shared records. Shared records are groups of DNS resource records that you can assign to one or more zones. Use shared records to create and update multiple resource records shared by different zones. Explains how to configure the DNS services provided by the grid, which includes time-to-live (TTL) settings, zone transfers, queries, root name servers, dynamic updates, sort lists, and Transaction Signatures (TSIG) for DNS. This chapter also describes how to specify broadcast addresses, routers, and DNS servers. It describes how to specify and update zones on external servers and for fixed addresses. This chapter concludes with how to use the view DNS configuration files and statistical reports. Explains how to enable and configure anycast addressing as well as configure multiple IP address on loopback interfaces on the NIOS appliance. Explains how to configure networks, and features such as creating split and shared networks. This chapter also describes how to modify, remove and disable networks. This chapter concludes with how to add, modify, remove, and disable fixed addresses and DHCP address ranges. Templates are provided for creating networks, ranges, and fixed addresses. Explains how to manage grid data configurations that are inherited by DHCP members and networks, DHCP address ranges, and fixed addresses. This chapter explains how to configure the DHCP services provided by each member, which includes lease times, BOOT servers, and custom options. This chapter concludes with how to use the view DHCP configuration files and statistical reports. Explains how to configure and manage the network discovery feature. Explains how to set up DHCP and DNS services to work together to support DDNS (dynamic DNS) updates. Explains how to monitor IP address usage using the IPAM (IP address management) software module. Provides an overview of the NAC Foundation module and its components, and describes how to set parameters and configure various security functions. Explains the TFTP, HTTP and FTP services that the NIOS appliance provides for uploading and downloading data to and from a NIOS appliance.
Chapter 17, Configuring DDNS Updates from DHCP, on page 581 Chapter 18, Managing IP Data IPAM, on
page 627
Chapter 21, RADIUS Services, on page 681 Explains how to configure RADIUS services on a NIOS appliance. Chapter 22, IPAM WinConnect, on page
711 Explains how to configure a NIOS appliance to run the IPAM WinConnect service. This chapter describes how to upload an IPAM WinConnect bundle, set operational parameters, and monitor the WinConnect service.
NIOS 4.3r5
23
Preface
Section
Content Explains how to configure NIOS appliances as VitalQIP DNS and DHCP remote servers. This chapter describes how to configure NIOS appliances to upload and manage VitalQIP binary bundles and policy files in a grid. Explains how to configure the bloxTools Environment, which provides a pre-installed environment for hosting custom web-based applications.
Part 4 API Interface Chapter 25, Infoblox DMAPI, on page 739 Part 5 Reference Material Appendix A, "Product Compliance", on
page 759
Chapter 22
Provides an overview of the DMAPI interface and describes how to set up and use the Infoblox API.
Appendices A E
Provides product information, such as hardware and software specification and requirements. This appendix also supplies agency compliance and safety information and concludes with RFC compliance information for the product. Lists regular expressions that the NIOS appliance supports for searches. Provides the Open Source copyright and license information for the product. Describes the hardware components and explains how to rackmount and cable an Infoblox appliance. It also lists the hardware requirements and specifications. Describes the limitations of the NIOS virtual appliances.
Appendix C, "Open Source Copyright and License Statements", on page 769 Appendix D, "Hardware Information", on
page 821
Documentation Conventions
The text in this guide follows these style conventions. Style bold
input
Usage Indicates anything that you input by clicking, choosing, selecting, or typing in the GUI, or by pressing on the keyboard. Signifies command line entries that you type. Signifies variables typed into the GUI that you need to modify specifically for your configuration, such as command line variables, file names, and keyboard characters. Indicates that you will select the named tab.
variable
+ (for tabname)
24
NIOS 4.3r5
Document Overview
Variables
Infoblox uses the following variables to represent values that you type, such as file names and IP addresses: Variable Value Name of a group of administrators Name of the appliance administrator IP address range DHCP template Domain name Directory name Filter name Fixed address template Grid Master Grid Member Host name of an independent appliance Grid name IPv4 address Grid member name Subnet mask IP address of a network Name of a NAS Network template Network view Name of a policy on RADIUSone Name of a Policy Group Number of a port; predefined for certain protocols Name of a RADIUS server One of the services available from the Grid Manager DHCP template DNS view DNS zone
admin_group admin_name addr_range DHCP_template domain_name directory filter_name fixed_address_template grid_master grid_member hostname grid ip_addr member netmask network network_access_server network_template network_view policy policy_group port RADIUS_server service template_type dns_view zone
Navigation
Infoblox technical documentation uses an arrow -> to represent navigation through the GUI. For example, to access Grid Properties, the description is as follows: From the Grid perspective, click grid -> Edit -> Grid Properties.
NIOS 4.3r5
25
Preface
Whats New
The following sections are new or have been updated in this version of this guide: DHCP Roaming Hosts: Roaming hosts are hosts with dynamically assigned IP addresses. You can create roaming hosts for network devices such as laptop computers and mobile phones, which require different IP addresses each time they are moved from one network to another. For information, see Adding a Fixed Address or a Roaming Host on page 507. Allow/Deny IP Addresses to DHCP Clients: You can configure the appliance to assign or deny IP addresses within an address range to known and unknown DHCP clients. Known clients include roaming hosts and clients with fixed addresses or DHCP host entries. Unknown clients include clients that are not roaming hosts and clients that do not have fixed addresses or DHCP host entries. You can set this parameter when you configure the DHCP properties of an IP address range. For information, see Configuring DHCP Properties on page 530. Secure Upload to bloxTools: The bloxTools environment now supports SFTP (SSH File Transfer Protocol) for secure file transfers. You can enable both the FTP and SFTP services, and then use either one to upload data. For information, see Uploading Files on page 734. Support for Additional MAC Address Formats: In the Infoblox GUI, you can enter a MAC address using one of the following formats: aa:bb:cc:dd:ee:ff: Six groups of two hexadecimal digits separated by colons (:) aa-bb-cc-dd-ee-ff: Six groups of two hexadecimal digits separated by hyphens (-) aabb.ccdd.eeff: Three groups of four hexadecimal digits separated by periods (.) aabbcc-ddeeff: Two groups of six hexadecimal digits separated by a hyphen (-) aabbccddeeff: One group of 12 hexadecimal digits without any separator
26
NIOS 4.3r5
Related Documentation
Related Documentation
Other NIOS appliance documentation:
Infoblox CLI Guide Infoblox API Documentation Infoblox Administrator Guide for IP Address Manager Infoblox-500, Infoblox-1000 and Infoblox-1200 Quick Start Infoblox User Guide for the Infoblox-1050, 1550, and 1552 Appliances Infoblox User Guide for the Infoblox-500, 550 Appliance Infoblox Installation Guide for the Infoblox-550, -1050, -1550, and -1552 Appliances Infoblox Installation Guide for the Infoblox-550-A, -1050-A, -1550-A, and -1552-A Appliances Infoblox Installation Guide for the Infoblox-250 Appliance Infoblox Installation Guide for the Infoblox-2000 Appliance Quick Start Guide for Installing NIOS Software on Riverbed Services Platforms Quick Start Guide for Installing vNIOS Software on Cisco Application eXtension Platforms Infoblox Safety Guide
To provide feedback on any of the Infoblox technical documents, please e-mail techpubs@infoblox.com.
Customer Care
This section addresses user accounts, software upgrades, licenses and warranties, and technical support.
User Accounts
The Infoblox appliance ships with a default user name and password. Change the default admin account password immediately after the system is installed to safeguard its use. Make sure that the NIOS appliance has at least one administrator account with superuser privileges at all times, and keep a record of your account information in a safe place. If you lose the admin account password, and did not already create another superuser account, the system will need to be reset to factory defaults, causing you to lose all existing data on the NIOS appliance. You can create new administrator accounts, with or without superuser privileges. For more information, refer to Managing Administrators on page 41.
Software Upgrades
Software upgrades are available according to the Terms of Sale for your system. Infoblox notifies you when an upgrade is available. Register immediately with Infoblox Technical Support at http://www.infoblox.com/support/product_registration.cfm to maximize your Technical Support.
Technical Support
Infoblox Technical Support provides assistance via the Web, e-mail, and telephone. The Infoblox Support web site at http://support.infoblox.com provides access to product documentation and release notes, but requires the user ID and password you receive when you register your product online at: http://www.infoblox.com/support/product_registration.cfm.
NIOS 4.3r5
27
Preface
28
NIOS 4.3r5
NIOS 4.3r5
29
30
NIOS 4.3r5
Chapter 1 Overview
This chapter provides general information about the NIOS appliance operating system and software modules. It defines terms used in this manual and describes various deployment scenarios. The topics in this chapter include:
NIOS Appliance Software Packages and Upgrades on page 32 Product Terminology on page 32 Deployment Scenarios on page 34 Scenario 1 Independent NIOS Appliances on page 34 Scenario 2 Basic Grid with Independent NIOS Appliances on page 35 Scenario 3 Infoblox Grid with NIOS Virtual Appliances as Grid Members on page 36 Scenario 4 Multiple Grids on page 37 Scenario 5 Primary and Secondary NIOS Appliances on page 38
NIOS 4.3r5
31
Overview
Product Terminology
Before you begin, review Table 1.1 for a description of some key terminology. Some terms, such as grids and high availability, are used in different ways by other networking-product vendors. The alphabetically arranged table can help you understand the terms and concepts as Infoblox uses them and as they are used in this guide.
HA pair
32
NIOS 4.3r5
Product Terminology
Description The grid member that maintains the semantic database that is distributed among all members of the grid. You connect to the GUI of the grid master to configure and monitor the entire grid. Any single NIOS appliance or HA pair of Infoblox appliances that belong to a grid. Each member can use the data and the services of the grid. You can also modify settings so that a member can use unique data and member-specific services. The Grid upgrade provides grid capabilities. The IP address of the LAN port. The active node of the grid master uses this address for management protocols if the MGMT port is disabled. The passive node uses its LAN port for grid communications and management protocols if the MGMT port is disabled. See Ethernet Port Usage on page 143. Enables a grid member to assume the role of grid master as a disaster recovery measure. The IP address that both nodes comprising the grid master use for management protocols. Also, when you enable the MGMT port, the active node of the grid master uses the MGMT address for GUI access. See Ethernet Port Usage on page 143. Infoblox appliances and Infoblox Virtual Appliances that run NIOS software. A third-party hardware platform that runs the vNIOS software package. Supported platforms are Riverbed Steelhead appliances with Riverbed Services Platform modules and Cisco Application eXtension Platforms in Integrated Services Routers. A single component of an HA (high availability) pair. An HA pair consists of an active node and a passive node. Specifying the services provided by your NIOS appliances, such as enabling DNS and DHCP, configuring dynamic updates, creating sort lists, using custom options and filters at the grid, member, zone, and network level. The shared IP address of an HA pair. A VIP address links to the HA port on the active node. The VRID (virtual router ID) identifies the VRRP (Virtual Router Redundancy Protocol) HA pair to which the NIOS appliance belongs. Through this ID, two HA nodes identify each other as belonging to the same HA pair and they obtain a virtual MAC address to share together with a VIP (virtual IP address). The VRID can be any number between 1 and 255, and it must be unique on the local LAN so that it does not conflict with any other NIOS appliances using VRRP on the same subnet. A portion of the domain name space for which a NIOS appliance or another name server is authoritative (for example, has the SOA [start of authority] record). A zone can also be delegated or forwarded. Zones are the primary objects used to manage DNS data and DNS services.
Grid Member
Zone
NIOS 4.3r5
33
Overview
Deployment Scenarios
The NIOS appliances can fit into network topologies in a variety of ways, and can provide DNS and DHCP services in a variety of ways. This section introduces some typical ways that you can deploy your NIOS appliances:
Scenario 1 Independent NIOS Appliances on page 34 Scenario 2 Basic Grid with Independent NIOS Appliances on page 35 Scenario 3 Infoblox Grid with NIOS Virtual Appliances as Grid Members on page 36 Scenario 4 Multiple Grids on page 37 Scenario 5 Primary and Secondary NIOS Appliances on page 38
Network Clients
GUI Client
In the sample deployment that is shown above, three appliances are deployed as independent appliances as follows: An independent HA pair of Infoblox appliances that provides DNS services An independent standalone Infoblox appliance that provides DHCP services
An Infoblox appliance can provide network services as an HA pair or as an independent appliance without being part of a grid. Independent appliances can provide DNS and DHCP services at the same time. Note: When an Infoblox appliance is used as an independent appliance, that appliance assumes the identity of the grid master in the GUI, even though it is not part of an actual grid.
34
NIOS 4.3r5
Deployment Scenarios
Network Clients
GUI Client
Internet
A grid is controlled through a single GUI. The Infoblox GUI allows you to centrally configure and monitor any or all grid members. This approach reduces the time normally required to configure multiple network appliances and services because you can enter all of the settings, appliance data, and network services for each member using one interface, not all the individual interfaces of each member on a recurring basis. The Infoblox distributed database architecture enables all grid members to instantaneously receive changes to the grid configuration settings because there is automatic synchronization between all of the NIOS appliances via a secure link.
NIOS 4.3r5
35
Overview
Figure 1.3 illustrates NIOS virtual appliances in a grid. In the illustration, the grid master and the grid master
candidate are Infoblox HA pairs in the data center. The Cisco vNIOS virtual appliance is a grid member in one branch office, the Riverbed vNIOS virtual appliance is a grid member in another branch office, and the other grid members are Infoblox appliances.
Cisco vNIOS Virtual Appliance Branch Office - West Branch Office - South Riverbed vNIOS Virtual Appliance
36
NIOS 4.3r5
Deployment Scenarios
Australian Grid
GUI Clients
NIOS 4.3r5
37
Overview
Network Clients
Internet
GUI Client
Because the external secondary name server is outside of the corporate network, it provides an offsite source of name resolution for the corporate customers and partners should the corporate connection to the Internet fail. Moreover, even when the corporate link to the Internet is up, the external secondary server receives most of the queries for data in the corporate external zones. This type of deployment results in the following benefits: The use of the corporate Internet connection for name resolution traffic is minimized. Name resolution by Internet name servers is faster.
NIOS appliances can also operate as forwarders or caching-only servers, either as a single node or as part of an HA pair. A forwarder is responsible for handling queries from the internal name servers for Internet domain names (queries that they cannot process themselves because they lack Internet connectivity). Just as the primary DNS server is located inside the corporate internal firewall, the forwarder is also located inside the firewall. Consequently, you must configure firewall rules that allow the forwarder to perform the following tasks: Send queries to the Internet name servers Receive responses from those Internet name servers Block unsolicited DNS messages from the Internet name servers
38
NIOS 4.3r5
The chapter lists the requirements for the management system you use to access a NIOS appliance, explains how to access the NIOS appliance, describes the components of the Infoblox Grid Manager GUI, and introduces the IP Address Manager GUI. Topics in this chapter include:
Management System Requirements on page 41 Accessing the Infoblox GUI on page 41 Connecting to a NIOS Appliance with JWS (Java Web Start) on page 42 About the Grid Manager on page 46 Installing the Grid Manager on page 46 Connecting to a NIOS Appliance Using the Grid Manager on page 47 Setting Login Options on page 48 SSL (Secure Sockets Layer) Protocol on page 50 Managing Certificates on page 51 Understanding the GUI Components on page 53 Main Interface Components on page 53 Customizing a Perspective Layout on page 56 Creating a Login Banner on a NIOS Appliance on page 57 Customizing Columns on page 57 Home Perspective on page 58 Using Global Search on page 60 Printing from the GUI on page 61 Accessing IP Address Manager on page 62 Logging in to IP Address Manager on page 62
NIOS 4.3r5
39
Infoblox GUI
Multilingual Support on page 62 UTF-8 Supported Fields on page 63 UTF-8 Support Limitations on page 64 Exporting Data on page 65 Exporting Data on page 65 Exporting Data on page 65 Exporting Data from Panels on page 65 Exporting Data to a CSV File on page 67
40
NIOS 4.3r5
Figure 2.1 Software and Hardware Requirements for the Management System
Management System Software Requirements GUI ACCESS Internet Explorer 6.0 or higher on Microsoft Windows XP and Internet Explorer 7.0 on Windows Vista or Mozilla 1.7 or higher on Linux Fedora Core 5 or higher, Red Hat and Sun Java Runtime Environment (JRE) version 1.5.0_14 or version 1.6 JWS application, which is automatically installed with JRE 1.5.0_14 or higher CLI ACCESS Secure Socket Shell (SSH) client that supports SSHv2 Terminal emulation program, such as minicom or Hilgraeve Hyperterminal Microsoft
Management System Hardware Requirements Minimum System: 500 MHz CPU with 256 MB RAM available to the product GUI, and 56 Kbps connectivity to NIOS appliance Recommended System: 1 GHz (or higher) CPU with 512 MB RAM available for the product GUI, and network connectivity to NIOS appliance Monitor Resolution: 1024 x 768 (minimum) to 1600 x 1200 (maximum)
Note: If the browser used to manage the NIOS appliance has a pop-up blocker enabled, you must turn off the pop-up blocker for the IP address used to manage the NIOS appliance.
Alternatively, you can install the Grid Manager on management systems running one of the supported Microsoft Windows operating systems, as described in About the Grid Manager on page 46.
NIOS 4.3r5
41
Infoblox GUI
b. JWS checks for the JNLP file in its cache and, if it finds it, compares it with the recently received JNLP file.
42
NIOS 4.3r5
JWS downloads the Infoblox GUI application and any other items it needsor, for subsequent connections, just the items it needs to update. For this initial connection, JWS downloads the GUI application. It might also download a different version of JRE. The NIOS appliance supports JRE 1.5.0_14 or JRE 1.6. 6. After the Infoblox GUI application download is complete, begin the login process by choosing the host name of the NIOS appliance from the Hostname drop-down list. 7. Enter the user name and password. The default user name is admin, and the default password is infoblox. Note: The user name and password are case-sensitive. Infoblox recommends changing them after you log in. For more details, refer to Authenticating Administrators on page 107. To reuse the same user name, select Options -> Save User Name. The NIOS appliance saves the user name and it appears automatically the next time you invoke the GUI. The GUI application initiates an SSL connection to the NIOS appliance. The NIOS appliance sends its server certificate to authenticate itself to the application. If the default certificate is in use, warning messages appear stating the certificate is not from a trusted certifying authority and that the host name on the certificate is either invalid or does not match the name of the site. 8. Accept the certificate for this session, or save it permanently to the server certificate store of the GUI application. Note: To manage CA (Certificate Authority) and server certificates in the Infoblox GUI application, open the GUI application login prompt, and select Options -> Manage Certificates. The SSL tunnel completes, and the login process continues. If the login is successful, the connection between the Infoblox GUI application and the NIOS appliance is complete. If the login is not successful, an error message appears and the login prompt returns. When the session ends, the Infoblox GUI application remains in the Java sandbox. You can launch it from this location the next time you want to connect to the NIOS appliance.
NIOS 4.3r5
43
Infoblox GUI
= Infoblox Server Certificate (authenticates the appliance when establishing an SSL tunnel) = Application Certificate (authenticates GUI application during download)
NIOS appliance
Java Certificates
Java Sandbox
+
Certificates authenticating appliance and downloaded GUI application to Java application
has the latest GUI application and downloads it if necessary. Java and the appliance form a new SSL tunnel between themselves. If Java automatically accepts the two certificatesone authenticating the appliance and the other authenticating the GUI applicationor if the administrator accepts them manually, the GUI application download proceeds. Commands
GUI Certificates
GUI Application
application and 3 The Infoblox GUI third SSL tunnel.thethe GUI appliance form a If application accepts the appliance certificate automatically or the administrator accepts it manually, the administrator can complete the login and begin sending commands to the appliance.
After you make the initial connection, you can start the Infoblox GUI application with one of these methods: Browser This is identical to the initial connection. Start your browser, and enter https://domain_name or https://ip_addr to reach the NIOS appliance. Infoblox GUI Application Shortcut If you created a shortcut (when prompted by JWS), double-click the shortcut icon on your desktop. JWS checks the JNLP file and the NIOS appliance resource files (.jar files containing components of the Infoblox GUI application) for updates. JWS downloads any updated items it might find, and then the GUI application login prompt appears. Java Application Cache Viewer Open the Java Application Cache Viewer, and click the Infoblox GUI application that you want to use. Then click either Launch Online or Launch Offline. When you select Launch Online, JWS checks the JNLP file and the NIOS appliance resource files for updates before the GUI application connects to the NIOS appliance. When you select Launch Offline, JWS does not check for updates before the Infoblox GUI application connects to the NIOS appliance.
Infoblox Administrator Guide (Rev. A) NIOS 4.3r5
44
3. When the login prompt appears, either select an existing host name from the Hostname drop-down list, or type a new host name in the Hostname field. Then enter the correct user name and password, and click Login.
Enter the following commands on a Linux terminal window to clear your computer's cache:
cd /.java/deployment/cache/javaws rm -rf https
This clears the cache. 1. Open a web browser and go to the same web address (https://xx.xx.xx). 2. Click Launch ID Grid.
NIOS 4.3r5
45
Infoblox GUI
The Grid Manager installs the NIOS appliance JRE files and GUI application files in a container within a Java sandbox on your computer. After the installation, the files remain in the sandbox and the Grid Manager always launches from this location. The files in the sandbox are used only by the Grid Manager and do not affect any other Java application on your system. Thus, your system can have a different version of the JRE for other applications. The Grid Manager installs a complete, self-contained application package that can handle multiple versions of NIOS. It automatically caches the GUI version it uses to connect to a NIOS appliance. When you attempt to connect to a NIOS appliance that is running a different GUI version, the Grid Manager automatically detects the difference and downloads the other GUI version, after your confirmation. This allows you to easily connect to NIOS appliances running different versions of the NIOS software. You can configure the number of cached versions on your local computer as explained in Managing Cache Settings on page 49.
These restrictions pertain to the Grid Manager installation only. After it is installed, any user can access the Grid Manager. To install the Grid Manager: 1. Download the Grid Manager setup.exe file from the Infoblox Support web site. 2. Double-click the .exe file to launch the Grid Manager Wizard. 3. In the Welcome splash screen, click Next. 4. Accept the License Agreement, and click Next. 5. Verify and/or change information in the Customer Information screen, and click Next. 6. Verify and/or change the local installation folder (C:\Program Files\Infoblox) on your computer, and click Next. 7. Verify the installation settings, and click Install. The Wizard installs the new files in the destination folder. 8. At the end of the installation procedure, click Finish. A Launch Infoblox Grid Manager icon appears on the desktop and Infoblox Grid Manager appears in the Start menu of your computer.
46
NIOS 4.3r5
Note that you can change the directory as described in Changing the File Location. Creates a log file for the GUI deployment called ibdeploy.log. Launches the login dialog box. 2. Enter the IP address of the NIOS appliance or grid master to which you are connecting. Infoblox Grid Manager looks for the correct software version in the cache on the computer: If this is the first time you are connecting to that NIOS appliance, it does not find the files in the cache and displays a message indicating that the appropriate version of the software is not found in the cache, and offers to download the new version. If you click OK, Grid Manager downloads the files to a folder in C:\Documents and Settings\user\Application Data\Infoblox\Install\NIOS version. After the download is complete, the Infoblox Grid Manager login screen displays. When you launch Grid Manager to connect to the same NIOS appliance, it detects the server software information in the current cache and launches using this cache file; if there is a more recent version, it picks up the more recent version and stores this in the cache. 3. Enter your user name and password. The default user name is admin, and the default password is infoblox. Note: The user name and password are case-sensitive. To reuse the same user name, select Options -> Save User Name. The NIOS appliance saves the user name and it appears automatically the next time you invoke the GUI. The GUI application initiates an SSL connection to the NIOS appliance. The NIOS appliance sends its server certificate to authenticate itself to the application. If the default certificate is in use, warning messages appear stating that the certificate is not from a trusted certifying authority and that the host name on the certificate is either invalid or does not match the name of the site.
NIOS 4.3r5
47
Infoblox GUI
4. Accept the certificate for this session, or save it permanently to the server certificate store of the GUI application. Note: To manage CA (Certificate Authority) and server certificates in the Infoblox GUI application, open the GUI application login prompt, and select Options -> Manage Certificates. The SSL tunnel completes, and the login process continues. If the login is successful, the connection between the Infoblox GUI application and the NIOS appliance is complete. If the login is not successful, an error message appears and the login prompt returns. When the session ends, the Infoblox GUI application remains in the Java sandbox. It launches from this location the next time you want to connect to the NIOS appliance.
Manage Certificates
You can manage CA (Certificate Authority) and server certificates in the NIOS appliance. You can import certificates, select and view their details, or remove them. 1. Select Options -> Manage Certificate. The NIOS GUI Certificates dialog appears. 2. Select the Server Certificates or the CA Certificates tab and click Import. 3. Navigate to where the certificate is located and click Open. You can manually import a certificate into the clients data store. You can also delete a certificate (select it and click Remove) and view detailed information on it (select it and click Details).
48
NIOS 4.3r5
NIOS 4.3r5
49
Infoblox GUI
Client contacts the NIOS appliance and recommends certain parameters, such as SSL version, cipher settings, and session-specific data.
The appliance either agrees or recommends other parameters. It also sends its certificate which contains its public key. Plain Text Cipher Text
Client encrypts random number with the public key and sends it to the appliance. The appliance uses its private key to decrypt the message.
Cipher The client and the appliance generate the master secret, and then the symmetric keys. Text The client and the appliance agree to encrypt all messages with symmetric keys.
Cipher Text
The client and the appliance send all their messages through the SSL tunnel which uses the cipher settings and encryption to secure their connection. Public Key Private Key
50
NIOS 4.3r5
Managing Certificates
The NIOS appliance generates a self-signed certificate when it first starts. A self-signed certificate is signed by the subject of the certificate, and not by a CA (Certificate Authority). This is the default certificate. When your computer first connects to the NIOS appliance, it sends this certificate to authenticate itself to your browser. Because the default certificate is self-signed, your browser does not have a trusted CA certificate or a cached NIOS appliance server certificate (saved from an earlier connection) to authenticate the NIOS appliance certificate. Also, the host name in the default certificate is www.infoblox.com, which is unlikely to match the host name of your NIOS appliance. Consequently, messages appear warning that the certificate is not from a trusted certifying authority and that the host name on the certificate is either invalid or does not match the name of the site that sent the certificate. Either accept the certificate just for this session or save it to the certificate store of your browser. To eliminate certificate warnings, you can replace the default self-signed certificate with a different certificate that has the host name of your NIOS appliance. The NIOS appliance supports X.509 certificates in .PEM format. After initial login, you can do one of the following: Generate another self-signed certificate with the correct host name and save it to the certificate store of your browser. Generate a self-signed certificate, see Generating a Self-Signed Certificate on page 51. Request a CA-signed certificate with the correct host name and load it on the NIOS appliance. Use a certificate from a CA by generating a certificate signing request as described in Generating a Certificate Signing Request on page 52. When you receive the certificate from the CA, import it as described in Importing a Certificate on page 52.
Additionally, before you log in to the NIOS appliance, you can manage the certificates on the client machine. For information, see Manage Certificates on page 48
NIOS 4.3r5
51
Infoblox GUI
4. Click the Save icon. The NIOS appliance logs you out, or you can log out yourself. When you log in to the appliance again, it uses the certificate you generated.
Importing a Certificate
You can replace the default server certificate with a signed certificate from your own trusted CA. First, generate a certificate signing request as described inGenerating a Certificate Signing Request on page 52. When you import a certificate, the NIOS appliance finds the matching CSR and takes the private key associated with the CSR and associates it with the newly imported certificate. The appliance then automatically deletes the CSR. To import a certificate: 1. For a grid: From the Grid perspective, click + (for grid ) -> + (for Members ) -> grid_member -> Tools -> HTTPS Certificate -> Upload Certificate. or For an independent appliance or HA pair: From the Device perspective, click hostname -> Tools -> HTTPS Certificate -> Upload Certificate. 2. Navigate to where the certificate is located and click Open. The appliance imports the certificate and logs you out. When you log in to the appliance again, it uses the certificate you imported.
52
NIOS 4.3r5
Editor Panels View and select items to edit. Detach and move panels, viewers and editors to customize the GUI layout. Properties Viewer View object properties. Enter and edit information.
Menu
Each item in the menu is a drop-down list of available options. The menu items change dynamically according to the perspective you are in. Tip: Select an item and right-click to quickly access menu options.
Tool Bar
The tool bar contains a Save icon which you click to save your configuration changes, and a Restart Services icon, which you click to restart services on a appliance or a grid.
Save Restart Services
NIOS 4.3r5
53
Infoblox GUI
Perspectives
A perspective is a container for tools used to manage the grid or appliance and its services. The Infoblox GUI application provides a set of perspectives, each focusing on a specific functional area. The GUI displays a perspective when you click the appropriate icon on the tool bar:
Home Perspective Icon DNS Perspective Icon Authentication, Authorization, and Accounting Perspective Icon Administrators Perspective Icon
Home: This perspective contains sections that display the overall grid service status and deleted objects in the recycle bin. It also contains sections with buttons and links that allow you to quickly access panels and editors for managing data in the DNS, AAA, Administrators, DHCP/IPAM, and File Distribution perspectives. For more information, see Home Perspective on page 58. Device: In this perspective, you configure an independent appliance and set its operational parameters. Grid: In this perspective, you configure a grid and set operational parameters. A Grid license is required for this feature. DNS: In this perspective, you enable and configure DNS services on the appliance or the grid. DHCP and IPAM: In this perspective, you enable and configure DHCP service and IP Address Management features. Administrators: In this perspective, you configure administrators. File Distribution: In this perspective, you enable and configure HTTP and TFTP (Trivial File Transfer Protocol) services. AAA: In this perspective, you configure RADIUS services to authenticate and authorize users, as well as manage user accounts, policies, and policy groups. Global Search: In this perspective, you search the entire database for a specific text string. All database objects matching the text string are displayed in this perspective. For information about this perspective, see Using Global Search on page 60. VitalQIP: This is not a standard part of the Infoblox GUI. In this perspective, you can configure the appliance to function as a VitalQIP remote server. A VitalQIP license is required for this feature. Note: The VitalQIP icon is displayed only when the NSQ software module and required licensing are installed.
54
NIOS 4.3r5
Panel
Panels list objects that you can select and edit. You can expand or collapse lists by selecting the + or - sign beside an object. Panels can be opened and closed from the View menu on the top menu bar.
Shortcuts
Double-click the tab of a panel to fully expand; double-click the tab again to reset the panel. Select an object and right-click to display options. Double-click an item to edit it (open its editor). Ctrl+click to select multiple items.
Editor
You can enter information and configure objects in an editor. You can open multiple editors at one time. After you enter information in an editor, you must click the Save icon to save your changes.
Properties Viewer
Viewers display information about a selected object. You cannot edit or select objects in a viewer. However, you can expand, collapse, detach and move viewers to different locations.
Online Help
The Infoblox appliance ships with online help that you can access from anywhere in the GUI. The Help menu provides access to the following: About Infoblox Grid Manager: View information about the NIOS software version running on the appliance. Download Admin Guide: Download the Infoblox Administrator Guide. API Documentation: Display the API documentation. Training: Display information about Infoblox training workshops. Help Contents: Display the main Help system. Dynamic Help: Access Help for the active panel, editor, or viewer. A window is active when its title bar is highlighted.
In addition, to access Help for a dialog box, click the question mark (?) icon in the bottom left corner of the dialog box.
NIOS 4.3r5
55
Infoblox GUI
3. Resize and tile multiple detached panels or views to create a custom layout.
56
NIOS 4.3r5
Customizing Columns
The NIOS appliance supports the ability to customize columns displayed in any perspective or panel within the GUI. (An exception to this is the Properties view panel; the NIOS appliance does not support customizing columns within the Properties view panel.) You can move columns around and display or hide certain columns from view. For example, you might want to view only columns related to IP addresses without displaying location or appliance information in the DHCP Lease History panel. Resetting a perspective does not override column settings. The appliance retains changes to the columns even after you reset a perspective. Column settings are applied to all administrators and users accessing the appliance. If you customize the columns, your column settings appear to all other users when they log in to the appliance. You can customize columns in any of the following ways: Hide columns so that they are not shown in the display Show columns so that they are displayed and not hidden Select the order in which the columns are displayed within a panel Change the size of the columns. Each column can have maximum pixel size of 999
Note: You can select extensible attributes to be displayed in any position, except for the first column position.
NIOS 4.3r5
57
Infoblox GUI
Ordering columns: Select a column from the list and click Up to move that column to the left in the display. Click Down to move that column to the right in the display. 3. Click OK. You can also change the order of the columns in a panel by dragging-and-dropping a column. The leftmost column within the tree panel has some special restrictions. You cannot move the leftmost column. However, you can move the column next to the leftmost column over as the first column. Take note that when you do this, the icons you use to expand and collapse items remains in the same location in the panel (the left side of the panel). To edit columns using the drag-and-drop method: 1. From any perspective or panel, select any column heading title. 2. Drag and then drop the column to move the column around.
Home Perspective
The Home perspective is the default perspective when you launch the Infoblox GUI for the first time. For subsequent logins, the GUI displays the perspective that you last accessed. You can go back to the Home perspective by clicking . The Home perspective contains sections with buttons and links that allow you to quickly access panels and editors for viewing and managing data. You can collapse or expand each section by clicking the down arrow key next to the section title. You can refresh the Home perspective to obtain updated information about the grid or device services and the recycle bin by pressing F5 or clicking View -> Refresh. Note: The Home perspective only displays links to functions for which you have valid licenses. For information about licenses, see Managing Licenses on page 165. The Home perspective contains the following sections: Grid Status or Device Status: Displays all the relevant grid or device services and their current status. Click Manage grid services to access the Grid perspective or click Manage device services to access the Device perspective. For information, see Service Status on page 182. Recycle Bin: Displays the first eight deleted objects that are currently in the recycle bin. Click See complete list for a complete list of deleted objects in the recycle bin. For information, see Using the Recycle Bin on page 168. Manage DNS DNS Views and Zones: Manage your DNS views and zones. For information, see Configuring a DNS View on page 367. DNS Members: Manage the DNS properties of each member. For information, see Managing DNS Data on page 359. Manage AAA Note: This section is for managing RADIUS services. You must have appropriate licenses to configure RADIUS services. User Store: Add and manage users and user authentication for local database. For information, see Managing the Local User Database on page 660. Certificates: Manage the EAP certificates on the appliance. For information, see Managing Certificates on page 694. External Devices: Configure the appliance to authenticate users against an AD (Active Directory) or LDAP (Lightweight Directory Access Protocol) server. You can also configure the appliance to communicate with RADIUS authentication home servers when the correct license is installed. For information, see About Authentication on page 660.
58
NIOS 4.3r5
Manage Administrators Groups: Create and manage admin groups. For information, see About Admin Groups on page 73. Local Admins: View a list of the local admin accounts and manage their properties. For information, see Creating Local Admins on page 107. Remote Admins: Configure authentication for remote admins. For information, see About Remote Admins on page 108.
Manage DHCP/IPAM DHCP Networks: Create and manage networks and network views. For information, see About Network Views on page 497. DHCP Members: Configure grid members to serve DHCP. For information, see Configuring DHCP Properties on page 530. DHCP Failover: Configure DHCP failover association. For information, see Configuring DHCP Failover on page 558. DHCP Option Spaces: Configure a variety of predefined DHCP options spaces and custom DHCP options. For information, see Configuring Advanced DHCP Options on page 541.
Manage File Distribution Directories: Create a directory structure for TFTP, FTP, and HTTP file management. For information, see Managing Files on page 678. File Distribution Members: Configure grid members for file distribution access using TFTP, HTTP, and FTP. For information, see File Distribution on page 674.
Scheduled Tasks: Displays the scheduled time, object type, and action of up to eight pending scheduled tasks with the earliest scheduled dates and times. Click See Complete List to view detailed information about the scheduled tasks in the Scheduled Tasks panel. For information, see Viewing Scheduled Tasks on page 137.
NIOS 4.3r5
59
Infoblox GUI
You can perform these operations by clicking matching object -> Edit.
60
NIOS 4.3r5
The amount of content printed depends on the page size configuration set by the administrator. For information on configuring the page size, see Authenticating Administrators on page 107. Note: GUI printing is supported on the Microsoft Windows operating system only.
NIOS 4.3r5
61
Infoblox GUI
Multilingual Support
The NIOS appliance supports UTF-8 (Unicode Transformation Format-8) encoding for the following: Host names for Microsoft Windows clients that support Microsoft Windows code pages RADIUS authentication Input fields through the Infoblox GUI
UTF-8 is a variable-length character encoding standard for Unicode characters. Unicode is a code table that lists the numerous scripts used by all possible characters in all possible languages. It also has a large number of technical symbols and special characters used in publishing. UTF-8 encodes each Unicode character as a variable number of one to four octets (8-bit bytes), where the number of octets depends on the integer value assigned to the Unicode character. For information about UTF-8 encoding, refer to RFC 3629 (UTF-8, a transformation format of ISO 10646) and the ISO/IEC 10646-1:2000 Annex D. For information about Unicode, refer to The Unicode Standard. Depending on the OS (operating system) that your management system uses, you must install the appropriate language files in order to enter information in a specific language. For information about how to install language files, refer to the documentation that comes with your management system.
62
NIOS 4.3r5
Multilingual Support
RADIUS Authentication
For RADIUS authentication, the NIOS appliance supports single-byte international character sets in the following: Microsoft Windows XP and Vista OS RADIUS and LDAP user names, passwords, and comments Replicated AD user names, passwords, and groups in all of the NIOS interfaces, except the Data Import Wizard Proxy requests if the RADIUS server that is proxied supports them
When you configure the NIOS appliance as a RADIUS server, you can enable RADIUS authentication and accounting on each grid member.. If you want the RADIUS server to support wireless supplicants on a Windows client that does not use a Latin I (1252) code page, you must change the default code page on the NIOS appliance to match the client set up. The NIOS appliance uses the code page to translate single-byte characters into UTF-8 encoded characters. For information about how to configure the code page for RADIUS authentication, see RADIUS Authentication on page 701.
Note: For data fields that do not support UTF-8 encoding, the appliance displays an error message when you use non-English languages.
NIOS 4.3r5
63
Infoblox GUI
64
NIOS 4.3r5
Exporting Data
Exporting Data
You can export certain types of data from the NIOS appliance to a CSV (Comma Separated Values) file and store it in a directory on your management station. You can then use a text editor or an application, such as Microsoft Excel, to view the data in the CSV file. The default name of the CSV file reflects the type of data being exported. For example, an export of grid members data has the file name Grid.csv. You can change the file name, for example, by appending a date as in Grid022908, to maintain multiple copies of the exported files.
DNS Perspective You can export a list of views and their zones from the DNS views panel. You can export the data that is displayed in the following panels: Records Shared Record Group Associations Zone Statistics
DHCP and IPAM Perspective You can export a list of networks from the Networks panel. You can export the data that is displayed in the following panels: Ranges, Fixed Addresses and Filters Ranges and Fixed Address Templates IP Address Management DHCP Leases DHCP Lease History Network Statistic DHCP Statistics DHCP Failover Status
AAA Perspective You can export data from the User Accounts panel. File Distribution Perspective You can export a list of directories from the Directories panel and the data that is displayed in the Files panel. Global Search Perspective You can export data from any search panel that is associated with any of the perspectives and windows that you can export.
NIOS 4.3r5
65
Infoblox GUI
When you export records from the Records panel and the records are individually listed, then the exported CSV file lists all records displayed in the panel, as shown in the following figure:
Figure 2.7
When you export data from the Records panel and the records are listed hierarchically, then the CSV file lists only the parent records that are displayed in the Records panel, as shown in the following figure:
66
NIOS 4.3r5
Exporting Data
If you select Run In Background, the appliance displays the status of the export at the bottom of the window, as shown in the following figure:
You can view background tasks by clicking the icon shown in Figure 2.10. The Progress panel displays the status of all the current long-running tasks. You can cancel a task by clicking the icon beside the progress bar, as shown in Figure 2.11.
Note: If you anticipate exporting large amounts of data, consider increasing the size of your java heap.
NIOS 4.3r5
67
Infoblox GUI
68
NIOS 4.3r5
About Admin Accounts on page 71 About Admin Groups on page 73 Creating a Superuser Admin Group on page 73 About Limited-Access Admin Groups on page 74 About Admin Roles on page 75 Creating Limited-Access Admin Groups on page 76 Deleting Admin Roles and Groups on page 77 Viewing Admin Group Assignments on page 77 About Administrative Permissions on page 78 Applying Permissions and Managing Conflicts on page 79 Applying Permissions and Managing Conflicts on page 79 Viewing and Managing Permissions on page 85 Modifying Permissions on page 86 Removing Permissions on page 86 Administrative Permissions for Common Tasks on page 87 Administrative Permissions for Grid Members on page 89 Administrative Permissions for Scheduling Tasks on page 90 Managing DNS Resource Permissions on page 91 Administrative Permissions for DNS Views on page 92 Administrative Permissions for Zones on page 93 Administrative Permissions for Resource Records on page 94 Administrative Permissions for Shared Record Groups on page 95 Managing Administrative Permissions for DHCP Resources on page 96 Managing Administrative Permissions for DHCP Resources on page 96 Administrative Permissions for Network Views on page 97 Administrative Permissions for Networks and Shared Networks on page 98 Administrative Permissions for Fixed Addresses on page 100 Administrative Permissions for DHCP Ranges on page 101 Administrative Permissions for DHCP Templates on page 102
NIOS 4.3r5
69
Managing Administrators
Administrative Permissions for MAC Address Filters on page 103 Administrative Permissions for Network Discovery on page 103 Administrative Permissions for the DHCP Lease History on page 104
Administrative Permissions for the RADIUS Service on page 104 Administrative Permissions for File Distribution Services on page 106 Authenticating Administrators on page 107 Creating Local Admins on page 107 Modifying and Removing an Admin Account on page 108 About Remote Admins on page 108 Authenticating Using RADIUS on page 110 Remote RADIUS Authentication on page 111 Configuring RADIUS Authentication on the NIOS Appliance on page 111 Adding RADIUS Servers on page 112 Testing the RADIUS Server on page 113 Maintaining the RADIUS Admins Server List on the NIOS Appliance on page 113 Disabling a RADIUS Server on page 113 Configuring a RADIUS Server on page 114 Configuring Admin Groups on the Remote RADIUS Server on page 114 Configuring Remote Admin Accounts on the Remote RADIUS Server on page 114 Authorization Groups Using RADIUS on page 115 Accounting Activities Using RADIUS on page 115 Authenticating Admin Accounts Using Active Directory on page 116 Admin Authentication Using Active Directory on page 117 Configuring Active Directory Authentication for Admins on page 117 Defining the Admin Policy on page 118 Specifying a List of Remote Admin Groups on page 118 Configuring the Default Admin Group on page 118 Configuring a List of Authentication Methods on page 119 Changing Password Length Requirements on page 119 Notifying Administrators on page 119
70
NIOS 4.3r5
If you use admin groups on the RADIUS server or Active Directory domain controller: To store admin accounts remotely Use an existing admin group or define a new one Set the privileges and properties for the group
If you do not use admin groups on the RADIUS server: Assign an admin group as the default
The admin policy defines how the appliance authenticates the admin: with the local database, RADIUS, or Active Directory. You must add RADIUS or Active Directory as one of the authentication methods in the admin policy to enable that authentication method for admins. See Configuring a List of Authentication Methods on page 119for more information about configuring the admin policy.
NIOS 4.3r5
71
Managing Administrators
Figure 3.1 illustrates the relationship of local and remote admin accounts, admin policy, admin groups, and
permissions and properties.
Figure 3.1 Privileges and Properties Applied to Local and Remote Admin Accounts
NIOS appliance RADIUS or Active Directory
Admin Users
Access permissions and properties come from local admin group definitions. Login
The NIOS appliance first checks the remote admin policy to determine which of the following authentication methods to use and where to get membership information from: local-admin database, RADIUS, or Active Directory.
Remote Admin Groups When remote admin accounts are not in an admin group (or in a group whose name does not match that of a local group), the NIOS appliance applies the default admin group permissions and properties (if configured).
Admin-Group1 Adam Login Default Admin-Group Balu Login Group names must match. Login Login
Admin-Group2 Christine
Admin-Group2
Admin-Group3 Dan Eve There can be admin accounts in a local and remote admin group with the same group name.
Admin-Group3
When admin accounts are in an admin group that matches a group configured locally, the appliance selects the first group (based on remote admin policy) and applies the permissions and properties to the admin belonging to that group.
Assigned from local admin group definitions: Admin Permissions (for resources, such as zones, networks, members and DHCP lease history) Properties (for page and tree sizes)
Complete the following tasks to create admin accounts: 1. Use the default admin groups or create admin groups. See About Admin Groups on page 73. 2. Define the administrative permissions of each admin group. See About Administrative Permissions on page 78. 3. Create admin accounts and assign them to the appropriate admin group. To add accounts to the local database, see Creating Local Admins on page 107. To configure the appliance to authenticate admin accounts stored remotely, see About Remote Admins on page 108.
72
NIOS 4.3r5
NIOS 4.3r5
73
Managing Administrators
74
NIOS 4.3r5
You can assign these system-defined roles to admin groups and create additional roles based on the job functions in your organization. If you are creating a role that has similar permissions to an existing role, you can copy the role and then make the necessary modifications to the new role. Thus you do not have to create each new role from scratch. You can assign up to 20 roles to an admin group, and you can assign a role to more than one admin group. When you make a change to a role, the appliance automatically applies the change to that role in all admin groups to which the role is assigned.
NIOS 4.3r5
75
Managing Administrators
76
NIOS 4.3r5
NIOS 4.3r5
77
Managing Administrators
By default, the appliance denies access to certain resources. Admin groups must have either read-only or read/write permission to access the following resources: Grid membersSee Administrative Permissions for Grid Members on page 89 Scheduling tasksSee Administrative Permissions for Scheduling Tasks on page 90 DNS resourcesSee Managing DNS Resource Permissions on page 91. DHCP resourcesSeeManaging Administrative Permissions for DHCP Resources on page 96. RADIUS resourcesSee Administrative Permissions for the RADIUS Service on page 104. File distribution resourcesSee Administrative Permissions for File Distribution Services on page 106.
You can define permissions at a global level, for example, for all DNS views or all DHCP networks in the database, and at a more granular level, such as a specific zone, network, and even an individual database object, such as a resource record or fixed address. The appliance applies permissions hierarchically in a parent-child structure. When you define a permission to a resource, the permission applies to all the other resources and objects contained within that resource. For example, if you grant an admin group read-write permission to a grid, it automatically has read-write permission to all members in the grid. However, you can override the grid-level permission by setting a different permission, read-only or deny, for a grid member. Permissions at more specific levels override those set at a higher level. When admins have permission to objects that are in a parent object, but are not given rights to the parent object, the appliance displays the parent object in the tree view, for navigational purposes only. For example, as shown in Figure 3.2, admins do not have permission to the Internal view and to corp.com, but have permission to the child zone called sales.corp.com. In this case, the admins can see the Internal view and corp.com in the tree view, but cannot see their contents. The admins can see the contents of sales.corp.com zone only.
Admins in DNS Admins3 can navigate to sales.corp.com and create resource records, even if they have no permission to the Internal view and corp.com.
78
NIOS 4.3r5
Permission assigned to the admin group Permission inherited from an admin role Effective permissions
Read/Write to all A records in the test.com zone Deny to the test.com zone Deny to the test.com zone Read/Write to all A records in test.com Deny to all other resource records in test.com
NIOS 4.3r5
79
Managing Administrators
If the group has multiple roles, the appliance applies the permissions in the order the roles are listed. If there are conflicts in the permissions among the roles, the appliance uses the permission from the role that is listed first. For example, as shown in Table 3.4, the first role assigned to the admin group has read-only permission to all A records in the test.com zone and the second role has read/write permission to the same records. The appliance applies the permission from the first admin role.
Read-only to all A records in the test.com zone Read/Write to all A records in test.com Read/Write to all MX records in test.com Deny to the test.com zone Read-only to all A records in the test.com zone Read/Write to all MX records in test.com
You can check for conflicting permissions when you add permissions to roles and to admin groups, and when you assign roles to an admin group. When you use the Check for conflicts function, the appliance lists which permissions are in conflict and indicates which ones it uses and ignores, as shown in Figure 3.3. If you want to change the permission the appliance uses, you must change the order in which the roles are listed or change the permissions that are directly assigned to the admin group.
80
NIOS 4.3r5
Defining Permissions
From the Administrators perspective, you can define global permissions and object permissions for admin groups and roles. Although you can add global permissions only from the Administrators perspective, you can add permissions to specific objects from the Administrators perspective and from the object itself. You can also select multiple objects using SHIFT+click and CTRL+click when you apply permissions to specific objects. However, you cannot select multiple objects when defining global permissions. When you add permissions to objects, you can select multiple objects with the same or different object types. When you select multiple objects with the same object type, you can apply permissions not only to the selected objects, but also to the sub object types that are contained in the selected objects. As described in Figure 3.4, when you select five DNS forward-mapping authoritative zones, the appliance labels the five DNS zones collectively as Selected Objects. Since all five DNS zones are of the same object type, forward-mapping authoritative, you can also apply permissions to all the resource records in these zones. You can choose one or more of the resources to which you want to apply permissions in the Add Permissions dialog box.
Figure 3.4 Selecting Multiple Objects with the Same Object Type
You select five forward-mapping authoritative DNS zones that have resource records such as A records, Hosts, and CNAME records.
The appliance displays the following resources in the Add Permissions dialog box.
corp100.com
corp200.com
corp300.com
corp400.com
corp500.com
As shown in Figure 3.5, the appliance displays the resources in the Permissions section of the Add Permissions dialog box. You can choose Selected objects to apply permissions to all DNS zones, A records in selected objects to apply permissions to all A records in the selected DNS zones, Hosts in selected objects to apply permissions to all host records, and so on.
NIOS 4.3r5
81
Managing Administrators
Figure 3.5 Add Object Permissions for Selected Objects with the Same Object Type
When you select multiple objects with more than one object type, you can add permissions to the selected objects as well as to the sub object types that are common among the selected objects. For example, when you select three DNS forward-mapping authoritative zones and two DNS IPv4 reverse-mapping authoritative zones as illustrated in Figure 3.6, you can apply permissions to all the five DNS zones as well as to the CNAME, DNAME, and Host records in these zones because CNAME, DNAME, and Host records are the common sub object types in these zones. In another example, when you select three DNS forward-mapping authoritative zones and two networks, you can apply permissions only to the selected objects (the three DNS zones and the two networks). You cannot apply permissions to any sub object types in the selected objects because DNS zones and networks do not have any common sub object types.
corp100.com
0.0.10.in-addr.arpa
corp200.com
0.0.127.in-addr.arpa
corp300.com
82
NIOS 4.3r5
To add permissions to a role or an admin group from the Administrators perspective: 1. Do one of the following from the Administrators perspective: To define the permissions of an admin role, click + (for Roles) -> + role -> Edit -> Add Permissions. or To define the permissions of an admin group, click + (for Groups) -> admin_group -> Edit -> Add Permissions. The Add Permissions dialog box appears. The dialog box does not list the existing permissions of the role or admin group. To view existing permissions, see Viewing and Managing Permissions on page 85. If you try to add permission to an object that has a conflict with an existing permission, the appliance displays an error message. 2. To define global permissions, click Add in the Add Global Permissions tab. The appliance displays the default resource, All Members in the Resource column. 3. Do one of the following: Select Read/Write, Read Only, or Deny for the All Members resource. or Click the arrow for Resource to expand the resource list, and then select the resource for which you are setting the global permission. Select Read/Write, Read Only, or Deny. Click Add again to define additional global permissions. 4. To define permissions for specific objects and resources, do the following in the Add Object Permissions tab: Click Find Object.... In the Select Object dialog box, identify the objects to which you want to add permissions, as follows: In the Text field, enter the value or partial value of an object. This field is not case-sensitive. Select the object type for which you are searching in the Type drop-down list. By default, the appliance searches all object types. You can select multiple object types using SHIFT+click for contiguous objects and CTRL+click for non-contiguous objects. Click Search. The appliance lists the objects that it finds in the Search Results section. In the Search Results section, select the objects to which you are defining permissions, and then click OK. You can select multiple objects using SHIFT+click for contiguous objects and CTRL+click for non-contiguous objects. In the Add Object Permissions tab, the appliance displays the following: Object: The name of the selected objects. When you select multiple objects, the appliance displays Multiple Objects in this field. Type: The object type of the selected objects. When you select more than one object type, the appliance displays Multiple Types in this field. To view the list of selected objects, click View Selected Objects. The appliance displays the selected objects to which you want to add permissions. 5. In the Permissions section, do the following: Click Add. In the Resource column, click the arrow to expand the resource list, and then select the resource for which you are setting the object permission. Select the appropriate permission: Read/Write, Read Only, or Deny. Click Add again if you want to define additional object permissions. 6. After you apply permissions to the selected objects, do one of the following: Click Check Conflicts to check whether the permissions that you define have conflict with other permissions. The appliance displays conflicting permissions in the Permissions Conflict dialog box. For information, see Applying Permissions and Managing Conflicts on page 79. Click Apply if you want to set permissions for additional objects. The appliance stores the permissions that you have defined and clears all the information in the Add Permissions dialog box so that you can define permissions for additional objects. Click Add to continue defining permissions for other objects. Click OK when you are finished.
NIOS 4.3r5 Infoblox Administrator Guide (Rev. A) 83
Managing Administrators
In addition, you can also set permissions for specific objects from the object itself. For example, to define permissions for a particular grid member, navigate to that grid member and define its permissions. To define the permission of a specific object: 1. Navigate to the object. For example, to define permissions for a particular grid member, do the following from the Grid perspective, click + (for grid) -> + (for Members) -> member. 2. Select the object and do one of the following: Right-click and select Manage Permissions from the context menu. Click Edit-> Manage Permissions. The appliance displays the Manage Resource Permissions dialog box. For example, Figure 3.7 shows the Manage Resource Permissions dialog box where you define permissions for the selected grid member.
3. In the Manage Resource Permissions dialog box, do the following: Admin Group/Role: Click Add, and then select a role or an admin group in the Select Admin Group or Role dialog box. After you click OK to close the dialog box, the appliance lists the role or admin group you selected. Permissions: Click Add. After the appliance displays the object in the Resource column, select Read/Write, Read Only or Deny.
84
NIOS 4.3r5
4. Optionally, you can check whether the permission you defined conflicts with another permission. Click Check Conflicts and the appliance displays conflicting permissions in the Permissions Conflict dialog box. For information, see Applying Permissions and Managing Conflicts on page 79 5. Click OK to close the Manage Resource Permissions dialog box.
The appliance lists the permission types of the selected role or group, which can be:
You can select a permission type and view its corresponding permissions in the Permissions panel. By default, the appliance displays the permissions in alphabetical order. You can display a hierarchical list by clicking the icon.
NIOS 4.3r5
85
Managing Administrators
Modifying Permissions
You can modify the permissions of user-defined admin roles and admin groups. You cannot modify the permissions of system-defined admin roles. When you change the permissions of a role that has been assigned to multiple admin groups, the appliance automatically applies the change to the role in all admin groups to which it is assigned. To change the existing permissions of a role or an admin group: 1. Do one of the following from the Administrator perspective: To modify the permissions of an admin role, click + (for Roles) -> + (for admin_role). To modify the permissions of an admin group, click + (for Groups) -> + (for admin_group) -> + (for Permissions). 2. Select the permission type and in the Permissions panel, select the resource that you want to modify. 3. Click Edit -> Permission Properties. 4. In the Permission Properties editor, select the new permission: Read/Write, Read-Only or Deny. 5. Optionally, click Check for conflicts to view any conflicts that result from the change. For information about conflicting permissions, see Applying Permissions and Managing Conflicts. 6. To save the change, click the Save icon.
Removing Permissions
You can remove permissions from user-defined admin roles and admin groups. You cannot remove permissions from system-defined admin roles. When you remove permissions from a role, it is removed from the role in all admin groups to which the role is assigned. You can remove a permission from a group as long as it was not inherited from a role. You cannot remove permissions that were inherited from a role. To remove a permission: 1. Do one of the following from the Administrator perspective: To remove the permissions of an admin role, click + (for Roles) -> + (for admin_role). To remove the permissions of an admin group, click + (for Groups) -> + (for admin_group) -> + (for Permissions). 2. Select the permission type and in the Permissions panel, select the resource that you want to remove 3. Right-click, and then select Remove. 4. Click Yes when the confirmation dialog appears.
86
NIOS 4.3r5
NIOS 4.3r5
87
Managing Administrators
To perform the following tasks... Assign networks to grid members Modify and delete networks Modify and delete networks that are assigned to grid members Create fixed addresses in a network Modify and delete all fixed addresses in a network View and search for fixed addresses in a network Create DHCP ranges Modify and delete DHCP ranges Schedule tasks for supported objects, such as adding an A record or deleting a host record
Admins need the following permissions Read/Write to the networks Read/Write to the grid members Read/Write to the networks Read/Write to the networks Read/Write to the grid members Read/Write to the parent network Read/Write to all fixed addresses in the network Read-only to all fixed addresses in the network Read/Write to the parent network Read/Write to the DHCP ranges in the network Read/Write to schedule tasks Read/Write to the DNS zones to which the objects belong Read/Write to the networks to which the objects belong Read/Write to network discovery Read/Write to the networks on which you want to run the discovery
For information about specific tasks and their required permissions, see the following: Grid membersSee Administrative Permissions for Grid Members on page 89 Scheduling tasksSee Administrative Permissions for Scheduling Tasks on page 90 DNS resourcesSee Managing DNS Resource Permissions on page 91. DHCP resourcesSeeManaging Administrative Permissions for DHCP Resources on page 96. RADIUS resourcesSee Administrative Permissions for the RADIUS Service on page 104. File distribution resourcesSee Administrative Permissions for File Distribution Services on page 106.
88
NIOS 4.3r5
NIOS 4.3r5
89
Managing Administrators
You can set global permissions to schedule tasks as described in Defining Permissions on page 81. The following table lists the tasks admins can perform and the required permissions. Users with read/write permission to scheduling can view, reschedule, and delete their own scheduled tasks.
To schedule tasks for specific resources, admins must have Read/Write permission to scheduling tasks, plus the required permissions to the supported resources. For information about permissions for specific resources, see the following: Grid membersSee Administrative Permissions for Grid Members on page 89 DNS resourcesSee Managing DNS Resource Permissions on page 91. DHCP resourcesSeeManaging Administrative Permissions for DHCP Resources on page 96.
Note that the appliance deletes all pending scheduled tasks when superusers disable task scheduling at the grid level. The appliance deletes an admins scheduled tasks when superusers do the following: Set the scheduling permission of admin groups and roles to Deny Delete or disable an admin group or an admin role Delete or disable local admins Delete the scheduling permission from any admin group or admin role that contains users with pending scheduled tasks Change the admin group of a limited-access admin
90
NIOS 4.3r5
The appliance applies permissions for DNS resources hierarchically. Permissions to a DNS view apply to all zones and resource records in that view. Permissions for a zone apply to all its subzones and resource records, and resource record permissions apply to those resource records only. To override permissions set at higher level, you must define permissions at a more specific level. To assign permissions, see Applying Permissions and Managing Conflicts on page 79. The following sections describe the different types of permissions that you can set for DNS resources:
Administrative Permissions for DNS Views on page 92 Administrative Permissions for Zones on page 93 Administrative Permissions for Resource Records on page 94
NIOS 4.3r5
91
Managing Administrators
For information on setting permissions for a view and its zones, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for DNS views.
92
NIOS 4.3r5
You can grant read-only or read/write permission, or deny access to zones as follows:
For information on setting permissions for zones and resource records, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for zones.
NIOS 4.3r5
93
Managing Administrators
To perform the following tasks Assign a shared record group to a zone Copy resource records from one zone to another
Admins need the following permissions Read/Write to the shared record group Read-only to the source zone Read-only to resource records to be copied Read/Write to the destination zone Read/Write to all resource records in the destination zone
Source zone:
Destination zone:
For information on setting permissions for resource records, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for resource records.
The following are additional guidelines: Only admins with read/write permission to bulk host records and read/write permission to reverse zones can create bulk host records and automatically add reverse-mapping zones. To create host records, admins must have read/write permission to the network and zone of the host. Admins must have read-only permission to the host records in a zone to view the Host Name Compliance Report. Admins must have read/write permission to the resource records in a zone to modify host names that do not comply with the host policy.
94
NIOS 4.3r5
You can grant read-only or read/write permission, or deny access to shared record groups, as follows:
For information on setting permissions for shared record groups, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for shared record groups.
Admins need the following permissions Read-only to the shared record group Read/Write to all shared record groups Read/Write to the shared record group Read/Write to the shared record group Read/Write to the target zones
NIOS 4.3r5
Managing Administrators
You can grant an admin group broad permissions to DHCP resources, such as read/write permission to all networks and shared networks in the database. In addition, you can grant permission to specific resources, such as a specific network, a DHCP range, or an individual IP address in a network. Permissions at more specific levels override global permissions. The following sections describe the different types of permissions that you can set for DHCP resources:
Administrative Permissions for Network Views on page 97 Administrative Permissions for Networks and Shared Networks on page 98 Administrative Permissions for Fixed Addresses on page 100 Administrative Permissions for DHCP Ranges on page 101 Administrative Permissions for DHCP Templates on page 102 Administrative Permissions for MAC Address Filters on page 103 Administrative Permissions for the DHCP Lease History on page 104
96
NIOS 4.3r5
NIOS 4.3r5
97
Managing Administrators
To perform the following tasks Create, modify, and delete networks, DHCP ranges and fixed addresses in a network view Expand/join networks View the properties of all shared networks in a view Search for shared networks in a view Create, modify, and delete shared networks in a network view
Admins need the following permissions Read/Write to all networks in the network view Read-only to all shared networks in the network view Read/Write to all shared networks in the network view
To define permissions for a specific network and its DHCP ranges and fixed addresses, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for networks.
98
NIOS 4.3r5
To perform the following tasks View the properties of a network View network statistics Search for a network Modify and delete a network Create, modify, and delete DHCP ranges and fixed addresses in a network Expand/join networks, if admins have read/write permission to both networks Create/Split network and automatically create a reverse zone Assign a grid member to a network and its DHCP ranges Modify and delete a network with the assigned grid member View DHCP ranges Search for DHCP ranges Create, modify, and delete DHCP ranges View fixed addresses Search for fixed addresses Create, modify, and delete fixed addresses
Read/Write to the network Read/Write to the parent zones Read/Write to the network Read/Write to the grid member Read-only to all DHCP ranges in the network Read/Write to all DHCP ranges in the network Read-only to all fixed addresses in the network Read/Write to all fixed addresses in the network
NIOS 4.3r5
99
Managing Administrators
For information on setting permissions for fixed addresses, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for fixed addresses.
Create, modify, and delete fixed addresses in a network View a fixed address Modify and delete a fixed address
100
NIOS 4.3r5
For information on setting permissions for DHCP ranges, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admin can perform and the required permissions for DHCP ranges.
NIOS 4.3r5
101
Managing Administrators
Note the following additional guidelines: DHCP range templates and fixed address templates do not inherit their permissions from network templates. You must set permissions for each type of template. An admin group can create a network using a network template that includes a DHCP range template and a fixed address template, even if it has no permission to access the DHCP range and fixed address templates.
102
NIOS 4.3r5
For information on setting permissions, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for MAC address filters.
NIOS 4.3r5
103
Managing Administrators
For information on setting permissions, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for RADIUS resources.
104
NIOS 4.3r5
Add, modify, and delete AD domains Synchronize with AD domain Delete replicated AD users and groups View RADIUS authentication and accounting home servers, network access servers, and AD, LDAP and McAfee authentication services Add, modify, and delete network access servers Add, modify, and delete RADIUS authentication home servers Add, modify, and delete RADIUS accounting home servers Add, modify, and delete AD authentication services Add, modify, and delete LDAP authentication services Add, modify, and delete McAfee validation services Associate the grid member with a NAS View policies Add, edit and delete policies
Read/Write to external services Read/Write to AAA member properties Read-only to AAA policies Read/Write to AAA policies
NIOS 4.3r5
105
Managing Administrators
For information on setting permissions, see Applying Permissions and Managing Conflicts on page 79. The following table lists the tasks admins can perform and the required permissions for file distribution services.
106
NIOS 4.3r5
Authenticating Administrators
Authenticating Administrators
The NIOS appliance supports the following authentication methods: local database, RADIUS, and Active Directory. The appliance can use any combination of these authentication methods. It authenticates admins against its local database by default. Therefore, if you want to use local authentication only, then you must configure the admin groups and add the local admin accounts, as described in Authenticating Administrators on page 107. If you want to authenticate admins using RADIUS and Active Directory in addition to local authentication, then you must define those services on the appliance and define the admin policy. For additional information, see About Remote Admins on page 108. Note: Infoblox strongly recommends that even if you are using remote authentication, you must always have at least one local admin in a local admin group to ensure connectivity to the NIOS appliance in case the remote servers become unreachable.
NIOS 4.3r5
107
Managing Administrators
Disable this admin: Select this check box to retain an inactive profile for this administrator in the configuration. For example, you might want to define a profile for a recently hired administrator who has not yet started work. Then when he or she does start, you simply need to clear this check box to activate the profile. 4. Click the Save icon to save your changes.
108
NIOS 4.3r5
1 An admin enters his user name and password to log in to the appliance. Admin Policy
RADIUS Server
3 The RADIUS server responds with an Access-Reject package because the admins user name and password are not in its database. AD Server 4 The appliance tries the next authentication method on the list, which is Active Directory (AD). It sends a request to the AD server.
5
Remote Admin Groups Eng IT-Bldg2
The AD server finds the user name and password in its database and sends an access accept together with the admins group memberships.
User Name admin10 Member Of IT-Bldg1 IT-Bldg2
7 The appliance allows the admin to log in and applies the privileges of the IT-BLDG2
6 The appliance matches one of the admins groups with a group in the admin policy.
To configure the appliance to authenticate admins against a RADIUS server and an AD controller: Configure the RADIUS authentication service and AD authentication service. For information about the RADIUS authentication service, see Authenticating Using RADIUS. For information about the AD authentication service, see Authenticating Admin Accounts Using Active Directory on page 116. Configure admin groups that match those on the remote server. Optionally, specify a default admin group. For information about admin groups, see About Admin Groups on page 73. Configure the admin policy, as described in Defining the Admin Policy on page 118.
Note: Infoblox strongly recommends that even if you are using remote authentication, you must always have at least one local admin in a local admin group to ensure connectivity to the appliance in case the remote servers become unreachable.
NIOS 4.3r5
109
Managing Administrators
A user makes an HTTPS connection to the NIOS appliance and sends a user name and password.
The appliance lets the user log in and applies the authorization profile.
110
NIOS 4.3r5
Configuring the Default Admin Group on page 118 for information about defining a default admin group.
Add RADIUS service to the list of admin authentication methods in the admin policy to enable RADIUS authentication. See Configuring a List of Authentication Methods on page 119 for more information about configuring admin policy.
If you configured multiple RADIUS servers for authentication and the NIOS appliance fails to contact the first server in the list, it tries to contact the next server, and so on.
NIOS 4.3r5
111
Managing Administrators
Optionally, modify the Accounting settings. Retry Period: Specify the number of seconds that the appliance waits for a response from the RADIUS server. The default is 5. Maximum Retries: Specify how may times the appliance attempts to contact an accounting RADIUS server. The default is 1000.
If you configured multiple RADIUS servers for accounting and the NIOS appliance fails to contact the first server in the list, it tries to contact the next server, and so on. 3. Click the Save icon to save your changes.
Accounting
Use MGMT port: If you clear the Use MGMT port check box in the General RADIUS Properties editor and select this check box, the NIOS appliance uses the MGMT port for administrator authentication communications with just this RADIUS server. If you select the Use MGMT port check box in the General RADIUS Properties editor, this check box becomes irrelevant. Whether you select or clear it, the NIOS appliance always uses the MGMT port for communications with all RADIUS servers, including this one.
112
NIOS 4.3r5
Disable this server: Select this check box to disable a RADIUS server if, for example, the connection to the server is down and you want to stop the NIOS appliance from trying to connect to this server. 4. Click OK. 5. Click the Save icon to save your changes.
NIOS 4.3r5
113
Managing Administrators
Refer to the documentation for your RADIUS server for more information.
114
NIOS 4.3r5
NIOS 4.3r5
115
Managing Administrators
Administrator
NIOS Appliance
Domain Controller
A user makes an HTTPS connection to the NIOS appliance and sends an account name and password.
The appliance lets the user log in and applies the authorization profile. The appliance grants all permissions specific to the administrator based on the group membership sent from the domain controller associated with the admin account. If there is no group membership information for the admin, the default group is assigned (if configured).
4a
Authentication is successful. The domain controller successfully authenticates the admin user. The group membership information for the administrator is sent to the appliance. The first group in the group list matching the groups returned by the domain controller is assigned to the admin, along with the associated permissions after that admin logs in.
domain controller sends back a deny access result to the appliance. No group membership information is sent.
116
NIOS 4.3r5
NIOS 4.3r5
117
Managing Administrators
118
NIOS 4.3r5
Notifying Administrators
You can notify individual administrators about system status via e-mail, or notify a group of people using an alias e-mail address. If you have configured DNS resolution on your network, the E-mail relay configuration function is not required. If you did not configure the settings on the DNS Resolver section, you must enter a static IP address of the target system in the Relay Name/IP Address field. Use the Test e-mail settings button to test the E-mail settings and to verify that the recipient received the notification. In addition, the appliance sends e-mail to administrators when certain events occur. Here is a list of events that trigger e-mail notifications: Changes to link status on ports and online/offline replication status Events that generate traps, except for upgrade failures (ibUpgradeFailure). For a list of events, see Infoblox MIBs on page 207
You can define the e-mail settings at the grid and member levels.
NIOS 4.3r5
119
Managing Administrators
Grid Level
To notify an administrator of an independent appliance or a grid: 1. From the Grid perspective, click grid -> Edit -> Grid Properties. or From the Device perspective, click hostname -> Edit -> Device Properties. 2. In the Grid (or Device) editor, click Email, and then enter the following: Enable e-mail notification: Select this check box. E-mail address: Enter the e-mail address of the administrator. Use an e-mail alias to notify multiple people. Use e-mail relay: Select this check box if the NIOS appliance must send e-mail to an intermediary SMTP (Simple Mail Transfer Protocol) server that relays it to the SMTP server responsible for the domain name specified in the e-mail address. Some SMTP servers only accept e-mail from certain other SMTP servers and might not allow e-mail from the NIOS appliance. In this case, specify the DNS name or IP address of a different SMTP server that does accept e-mail from the NIOS appliance and that will then relay it to the SMTP server that can deliver it to its destination. Clear this check box if it is unnecessary to use an e-mail relay server. Relay Name/IP Address: If you have configured DNS resolution, enter the DNS name of the relay server. If DNS resolution is not configured, enter the IP address of the relay server. 3. Optionally, click Test e-mail settings to confirm this feature is operating properly. 4. Click the Save icon to save your changes.
Member Level
To define e-mail settings for a member, follow the navigational path below and override the grid-level settings. Click the Save icon to save your changes. From the Grid perspective, click Grid -> + (for grid) -> + (for Members) -> member -> Edit -> Member Properties -> Email.
120
NIOS 4.3r5
Managing Time Settings on page 123 Changing Time and Date Settings on page 123 Changing Time Zone Settings on page 123 Monitoring Time Services on page 124 Using NTP for Time Settings on page 125 Authenticating NTP on page 126 NIOS Appliance as NTP Client on page 128 NIOS Appliance as NTP Server on page 132 Scheduling Tasks on page 136 Enabling and Disabling Task Scheduling on page 136 Scheduling a Task on page 136 Viewing Scheduled Tasks on page 137 Rescheduling and Deleting Scheduled Tasks on page 138 Guidelines for Upgrading, Backing Up, and Restoring the Database on page 138 Managing Security Operations on page 139 Enabling Support Access on page 139 Enabling Remote Console Access on page 139 Permanently Disabling Remote Console and Support Access on page 140 Restricting HTTP Access on page 140 Enabling HTTP Redirection on page 141 Modifying GUI Session Timeout Settings on page 141 Disabling the LCD Input Buttons on page 141 Modifying Security for a Grid Member on page 142 Ethernet Port Usage on page 143 Modifying Ethernet Port Settings on page 148 Using the LAN2 Port on page 149 NIC Failover on page 150 Enabling DNS on LAN2 on page 152 Enabling DHCP on LAN2 on page 151
NIOS 4.3r5
121
Using the MGMT Port on page 153 Appliance Management on page 154 Grid Communications on page 156 DNS Services on page 159 Setting Static Routes on page 161 Enabling DNS Resolution on page 164 Managing Licenses on page 165 Viewing the Installed Licenses on a NIOS Appliance on page 165 Obtaining a 60-Day Temporary License on page 165 Obtaining and Adding a License on page 166 Removing Licenses on page 166 Using the Recycle Bin on page 168 Disabling the Recycle Bin on page 169 Enabling the Recycle Bin on page 169 Viewing the Recycle Bin on page 169 Restoring Objects in the Recycle Bin on page 170 Emptying the Recycle Bin on page 170 Shutting Down, Rebooting, and Resetting a NIOS Appliance on page 171 Rebooting a NIOS Appliance on page 171 Shutting Down a NIOS Appliance on page 171 Resetting a NIOS Appliance on page 171 Managing the Disk Subsystem on the Infoblox-2000 on page 173 About RAID 10 on page 173 Evaluating the Status of the Disk Subsystem on page 174 Replacing a Failed Disk Drive on page 175 Disk Array Guidelines on page 176 Restarting Services on page 177
122
NIOS 4.3r5
NIOS 4.3r5
123
Icon
Meaning The NTP service is running properly. The appliance is synchronizing its time. The NTP service is not running properly. View the corresponding description for additional information.
When you enable NIOS appliances as NTP servers, you can monitor the status of the NTP service by checking the NTP status icons in the Grid panel. The following are descriptions of the NTP status icons in the Detailed Status panel. The type of information that can appear in the Description column corresponds to the SNMP trap messages. For information about the Infoblox SNMP traps, see Chapter 6, Monitoring with SNMP, on page 203.
Icon
Meaning The NTP service is enabled and running properly. The NTP service is enabled, and the appliance is synchronizing its time. The NTP service is enabled, but it is not running properly or is out of synchronization. The NTP service is disabled.
124
NIOS 4.3r5
NIOS 4.3r5
125
Stratum-1 NTP Servers Grid Member 2 synchronizes its clock with an external NTP server. It also functions as a stratum-2 NTP server to external devices on its network. Grid Master Grid Member 2
As an NTP client, the grid master synchronizes its time with stratum-1 NTP servers. The grid master also functions as a stratum-2 NTP server to Grid Member 1. NTP messages between the grid master and Grid Member 1 go through encrypted VPN tunnels.
As an NTP client, Grid Member 1 synchronizes its clock with the grid master. It also functions as a stratum-3 NTP server to external devices on its network.
Grid Member 1
VPN Tunnel
2 Network
1 Network
Authenticating NTP
To prevent intruders from interfering with the time services on your network, you can authenticate communications between a NIOS appliance and a public NTP server, and between a NIOS appliance and external NTP clients. NTP communications within the grid go through an encrypted VPN tunnel, so you do not have to enable authentication between members in a grid. NTP uses symmetric key cryptography, where the server and the client use the same algorithm and key to calculate and verify a MAC (message authentication code). The MAC is a digital thumbprint of the message that the receiver uses to verify the authenticity of a message. As shown in Figure 4.2, the NTP client administrator must first obtain the secret key information from the administrator of the NTP server. The server and the client must have the same key ID and data. Therefore, when you configure the NIOS appliance as an NTP client and want to use authentication, you must obtain the key information from the administrator of the external NTP server and enter the information on the NIOS appliance. When you configure a NIOS appliance as an NTP server, you must create a key and send the key information to clients in a secure manner. A key consists of the following: Key Number: A positive integer that identifies the key. Key Type: Specifies the key format and the algorithm used to calculate the MAC (message authentication code) of a message. M: The key is a 1-31 character ASCII string using MD5 (Message Digest). S: The key is a 64-bit hexadecimal number in DES (Data Encryption Standard) format. The high order 7 bits of each octet form the 56-bit key, and the low order bit of each octet is given a value so that the octet maintains odd parity. You must specify leading zeros so the key is exactly 16 hexadecimal digits long and maintains odd parity. A: The key is a DES key written as a 1-8 character ASCII string.
126 Infoblox Administrator Guide (Rev. A) NIOS 4.3r5
N: The key is a 64-bit hexadecimal number in NTP format. It is the same as the S format, but the bits in each octet have been rotated one bit right so the parity bit is in the high order bit of the octet. You must specify leading zeros and odd parity must be maintained. Key String: The key data used to calculate the MAC. The format depends on the Key Type you select. When the NTP client initiates a request for time services to the NTP server, it creates the MAC by using the agreed upon algorithm to compress the message and then encrypts the compressed message (which is also called a message digest) with the secret key. The client appends the MAC to the message it sends to the NTP server. When the NTP server receives the message from the client, it performs the same procedure on the message it compresses the message it received, encrypts it with the secret key and generates the MAC. It then compares the MAC it created with the MAC it received. If they match, the server continues to process and respond to the message. If the MACs do not match, the receiver drops the message.
Figure 4.2 NTP Client Administrator Obtaining Secret Key from NTP Server Administrator
NTP Client
NTP server administrator sends the secret key information to the NTP client administrator, who adds the key to the NTP client.
Message
When the NTP client sends a request for time services to the NTP server, it uses the agreed upon algorithm and secret key to create the MAC (message authorization code). It then sends the MAC and message to the NTP server.
MAC
+ MAC
NTP server uses the agreed upon algorithm and secret key to create the MAC. It compares this MAC with the MAC it received. If they match, the server responds to the request of the client for time services. If the MACs do not match, the server ignores the message from the client.
NIOS 4.3r5
127
Secret Keys
The grid master uses three public NTP servers to calibrate its clock to the correct time. It uses symmetric key cryptography to authenticate NTP messages. Internet The grid master serves time to Grid Member 1. All NTP communications with the grid go through encrypted VPN tunnels.
Grid Master
VPN Tunnels
Grid Member 1
Grid Member 2
Grid Member 2 synchronizes its clock with a public NTP server. The grid master serves as a backup NTP server when the member cannot reach the public NTP server.
128
NIOS 4.3r5
Note: To prevent intruders from interfering with the time services on your network, you can authenticate communications between a grid member and an external NTP server, as well as between a grid member and external NTP clients. NTP communications within the grid go through an encrypted VPN tunnel, so you do not have to enable authentication between the grid master and grid members. Authentication Key: Click Select Key. In the Select NTP Authentication Key dialog box, select a key that you previously entered, and then click OK. Note that you must enter authentication keys at the grid level when you configure a grid master or grid member to use external NTP servers. For information, see Entering an NTP Authentication Key on page 130. 4. Click the Save and Restart Services icons.
130
NIOS 4.3r5
5. Click the Save and Restart Services icons. Note: When you configure a grid master or a grid member to use external NTP servers, you cannot override the grid-level authentication keys. You must use the authentication keys that you enter at the grid level.
NIOS 4.3r5
131
Secret Keys The grid master uses three public NTP servers to calibrate its clock to the correct time. It uses symmetric key cryptography to secure NTP messages. The grid master serves time to the grid members. All NTP communications with the grid go through the encrypted VPN tunnels. The grid members serve time to devices on their networks. Each member uses symmetric key encryption to secure NTP messages. Each member also has an access control list that defines which appliances can access the time services. When a client that is not on the list tries to access an appliance functioning as an NTP server, the appliance ignores the message.
Internet
VPN Tunnels
Grid Member
3 Network
2 Network
To configure a NIOS appliance as an NTP server, perform the following tasks: Enable the appliance as an NTP server. Enable authentication between the appliance and its NTP clients. Optionally, specify which clients can access the NTP service of the appliance. Optionally, specify which clients can use ntpq to query the appliance.
132
NIOS 4.3r5
hostname ) -> NTP -> Edit -> Service Properties. In the Member NTP Properties editor, do the following:
Enable this member as an NTP server: Select this check box to configure a grid master or a grid member as an NTP server. Override Grid NTP authentication setting: Select this check box to enter NTP authentication keys at the member level. The member uses these keys when acting as an NTP server and authenticates requests from NTP clients. Clear the check box to use the grid-level authentication keys. Note: When you configure a grid master or a grid member to use external NTP servers, you cannot override the grid-level NTP authentication settings. You must use the grid-level authentication keys or enter keys at the grid level. 2. Click Add in the NTP Authentication Keys section. For information, see Entering an NTP Authentication Key on page 130. 3. Click the Save icon. After you enter the authentication keys, you can download the key file (usually called ntp.keys) and distribute it to the NTP clients. To copy an NTP authentication key for distribution to NTP clients: 1. For a grid: From the Grid perspective, click + (for grid ) -> + (for Services ) -> NTP -> Edit -> Service Properties. or For an independent appliance or HA pair: From the Device perspective, click + (for hostname ) -> NTP -> Edit -> Service Properties. or For a grid master or a grid member: From the Grid perspective, click + (for grid ) -> + (for Members ) -> + (for hostname ) -> NTP -> Edit -> Service Properties.
NIOS 4.3r5 Infoblox Administrator Guide (Rev. A) 133
2. Choose the key in the NTP Authentication Keys list, and then click Modify. 3. Note the key number and type, and select the contents of the String field.Paste the key string in a text file and include the key number and type (M, S, A, or N) in the file. 4. Distribute this to the NTP clients using a secure transport.
hostname ) -> NTP -> Edit -> Service Properties. In the Member NTP Properties editor, do the following:
Enable this member as an NTP server: Select this check box to configure a grid master or a grid member as an NTP server. Override Grid NTP access control: Select this check box to enter IP addresses for NTP access control at the member level instead of using the grid-level list. Enter the clients that can use this member as an NTP server in the Add Access Range dialog box. Clear the check box to use the grid-level access control list. 2. Click Add in the NTP Access Control section. 3. In the Add Access Range dialog box, select one of the following in IP Address Option, and then click OK. Address: The appliance allows a client from a single IP address to use its NTP service. Enter the IP address in the Address field. Network: The appliance allows clients from a subnet to use its NTP service. Enter the network address in the Address field, and then choose an appropriate netmask from the Subnet Mask drop-down list. Any: The appliance allows clients from any address to use its NTP service. 4. Click the Save icon.
134
NIOS 4.3r5
In the Member NTP Properties editor. do the following: Enable this member as an NTP server: Select this check box to configure a grid master or a grid member as an NTP server. Override Grid NTP query access control: Select this check box to enter IP addresses for NTP query access control at the member level instead of using the grid-level list. Enter the clients from which this member is allowed to accept ntpq queries in the Add NTP Query Client dialog box. Clear the check box to use the grid-level query access control list. 2. In the Add NTP Query Client dialog box, select one of the following in IP Address Option, and then click OK. Address: The appliance accepts ntpq queries from specific NTP clients. Enter the IP address in the Address field. Network: The appliance accepts ntpq queries from a subnet. Enter the network address in the Address field, and then choose an appropriate netmask from the Subnet Mask drop-down list. Any: The appliance accepts ntpq queries from any address. 3. Click the Save icon.
NIOS 4.3r5
135
Scheduling Tasks
You can schedule tasks, such as adding hosts or modifying fixed addresses, for a future date and time. The scheduling feature is useful when you want to add, modify, or delete specific records at a desired date and time. Using this feature, you can streamline your day-to-day operations. For example, you can schedule the deletion of records that you use for testing when the test time is up. You can also reassign an IP address to a fixed address when the location of the server to which the fixed address is assigned changes from one network to another. You can schedule the addition, modification, and deletion of the following objects: DNS resource records (except SOA records) Hosts Bulk hosts Shared records Fixed addresses
To schedule tasks and view scheduled tasks, superusers must first enable the scheduling feature at the grid level. For information, see Enabling and Disabling Task Scheduling on page 136. Only superusers can enable and disable this feature and grant scheduling permissions. When the scheduling permission is added or inherited from an admin role, limited-access admin groups can schedule tasks. They can also view, reschedule, and delete their own scheduled tasks. For information, see Administrative Permissions for Scheduling Tasks on page 90.
To enable scheduling at the grid level: 1. From the Grid perspective, select grid -> Edit -> Grid Properties. 2. In the Grid Properties section, select the Enable task scheduling check box. 3. Click the Save icon. 4. Log out and log back in to the appliance. To grant scheduling permissions to an admin group or an admin role: 1. Follow the steps as described in Applying Permissions and Managing Conflicts on page 79. Ensure that you select Schedule Tasks in the Resource column of the Add Permissions dialog box. You can disable the scheduling feature after you enabled it by deselecting the Enable task scheduling check box in the Grid Properties section. Ensure that you click the Save icon. When you disable the scheduling feature, the appliance immediately deletes all pending scheduled tasks and you cannot schedule any task.
Scheduling a Task
After you schedule a task, administrators cannot modify the object associated with the scheduled task until after the appliance executes the task. However, the object can still be updated with DHCP leases and other auto-generated services. The appliance implements the scheduled tasks in the order of their scheduled times. You get a warning message when the scheduled time of your task coincides with that of another scheduled task. You can choose to continue with the operation or reschedule the task for a different date and time. The appliance can handle up to 500 scheduled tasks from all users.
136
NIOS 4.3r5
Scheduling Tasks
To schedule a task: 1. Add, modify, or delete a record according to the instructions for the task in this guide. 2. After you complete the configuration, ensure that you click the Schedule Save icon a later date and time. 3. In the Schedule Change dialog box, do the following: Now: Select this to have the appliance perform the task now. Schedule: Select this to schedule the task for a future date and time. This is selected by default. Date: Enter the date when you want the appliance to perform the task. The appliance displays todays date. Time: Enter the time when you want the appliance to perform the task. Time Zone: Select the time zone for the scheduled date and time. Admin Local Time: The appliance displays the scheduled date and time in the admins local time zone. You cannot edit this field. 4. Click OK. The appliance executes the task at the scheduled date and time. It also displays the pending scheduled task in the Scheduled Tasks panel. For information, see Viewing Scheduled Tasks on page 137. to schedule the task for
Scheduled Tasks section from the Home perspective. For information, see Home Perspective on page 137. Scheduled Tasks panel from the Grid perspective. For information, see Grid Perspective on page 137.
Home Perspective
The Scheduled Tasks section of the Home perspective displays the following information for each task. Scheduled Time: The date, time, and time zone of the scheduled task. Affected Object: The name of the object that is associated with the task. For example, if the task involves an A record, this field displays the domain name of the record. If it is a fixed address, it displays the IP address of the fixed address. Action: The operation the appliance performs in this task. The value can be one of the following: INSERT: Addition UPDATE: Modification DELETE: Deletion To view a complete list of scheduled tasks, click See Complete List in the Scheduled Tasks section. The appliance displays the Scheduled Tasks panel in the Grid perspective. For information, see Grid Perspective on page 137.
Grid Perspective
The Scheduled Tasks panel of the Grid perspective displays the pending scheduled tasks that the admin is allowed to view. Superusers can view all scheduled tasks, and limited-access admins can view their own scheduled tasks. To view scheduled tasks in this panel, from the Grid perspective, click grid -> View -> Scheduled Tasks. The report displays the following information for each task: ID: The task ID in chronological order based on the date, time, and time zone when the task is scheduled. Scheduled Time: The date, time, and time zone when the task will be executed. Submitted Time: The data, time, and time zone when the task was submitted. Submitter: The admin who scheduled the task.
NIOS 4.3r5
137
Affected Object: The name of the object that is associated with the task. For example, if the task involves an A record, this field displays the domain name of the record. If it is a fixed address, it displays the IP address of the fixed address. Object Type: The object type. For example, the appliance can display A Record or Fixed Address. Action: The operation the appliance performs in this task. The value can be one of the following: INSERT: Addition UPDATE: Modification DELETE: Deletion
Change Audit Log: The message that appears in the audit log.
You can click any column header, except for Change Audit Log, to sort the tasks in ascending order. By default, the appliance sorts the tasks by Scheduled Time.
Remote admins and local admins without email addresses do not receive email notifications. To reschedule a task: 1. From the Grid perspective, click grid -> View -> Scheduled Tasks. 2. In the Scheduled Tasks panel, select the task that you want to reschedule. 3. Right-click the task and select Reschedule. 4. In the Schedule Change dialog box, modify the date and time when you want the appliance to execute the task. 5. Click OK. To delete a scheduled task: 1. From the Grid perspective, click grid -> View -> Scheduled Tasks. 2. In the Scheduled Tasks panel, select the task that you want to delete. You can select multiple tasks using SHIFT+click and CRTL+click. 3. Right-click the task and select Remove. 4. In the Confirm Delete Request dialog box, click Yes. The appliance deletes the scheduled task and does not perform the scheduled operation. Therefore, no change is made to any record after you delete a scheduled task.
138
NIOS 4.3r5
Enabling Support Access on page 139 Enabling Remote Console Access on page 139 Permanently Disabling Remote Console and Support Access on page 140 Restricting HTTP Access on page 140 Enabling HTTP Redirection on page 141 Modifying GUI Session Timeout Settings on page 141 Disabling the LCD Input Buttons on page 141 Modifying Security for a Grid Member on page 142
NIOS 4.3r5
139
140
NIOS 4.3r5
NIOS 4.3r5
141
142
NIOS 4.3r5
Table 4.1 displays the type of traffic per port for both grid and independent deployments. For a more detailed list of the different types of traffic, see Table 4.3 on page 145. Table 4.1 Appliance Roles and Configuration, Communication Types, and Port Usage
Appliance Role HA Grid Master HA Grid Master Single Grid Master HA Grid Member HA Grid Member Single Grid Member Independent HA Pair Independent HA Pair Single Independent HA Grid Master HA Grid Master Single Grid Master HA Grid Member HA Grid Member Single Grid Member Independent HA Pair Independent HA Pair Single Independent HA Pair Yes Yes No Yes Yes No Yes Yes No Yes Yes No Yes Yes No Yes Yes No HA Status Active Passive Active Passive Active Passive Active Passive Active Passive Active Passive MGMT Port Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Database Synchronization VIP on HA LAN1 LAN1 LAN1 LAN1 LAN1 VIP on HA LAN1 VIP on HA LAN1 LAN1 LAN1 or MGMT LAN1 or MGMT LAN1 or MGMT VIP on HA LAN1 Core Network Services VIP on HA LAN1 VIP on HA LAN1 VIP on HA LAN1 VIP on HA LAN1 or MGMT VIP on HA LAN1 or MGMT VIP on HA LAN1 or MGMT Management Services LAN1 LAN1 LAN1 LAN1 LAN1 LAN1 LAN1 LAN1 LAN1 MGMT MGMT MGMT MGMT MGMT MGMT MGMT MGMT MGMT GUI Access VIP on HA LAN1 VIP on HA LAN1 MGMT MGMT MGMT MGMT
NIOS 4.3r5
143
Table 4.2 Appliance Roles and Configuration, Communication Types, and Port Usage for Appliances with LAN2 Ports
HA Status Active Passive Active Passive Active Passive Active Passive Database Synchronization VIP on HA LAN1 LAN1 LAN1 LAN1 LAN1 VIP on HA LAN1 VIP on HA LAN1 LAN1 Core Network Services VIP on HA LAN1 and/or LAN2 VIP on HA LAN1 and/or LAN2 VIP on HA LAN1 and/or LAN2 VIP on HA LAN1, LAN2 and/or MGMT VIP on HA LAN1, LAN2 and/or MGMT VIP on HA LAN1, LAN2 and/or MGMT Management Services LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 LAN1 or LAN2 MGMT MGMT MGMT GUI Access VIP on HA LAN1 VIP on HA LAN1 MGMT MGMT
Appliance Role HA Grid Master HA Grid Master Single Grid Master HA Grid Member HA Grid Member Single Grid Member Independent HA Pair Independent HA Pair Single Independent HA Grid Master HA Grid Master Single Grid Master
MGMT Port Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled Enabled Enabled
LAN2 Port Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Active Passive
Active Passive
VIP on HA LAN1
MGMT MGMT
To see the service port numbers and the source and destination locations for traffic that can go to and from a NIOS appliance, see Table 4.3. This information is particularly useful for firewall administrators so that they can set policies to allow traffic to pass through the firewall as required. Note: The colors in both tables represent a particular type of traffic and correlate with each other.
144
NIOS 4.3r5
DHCP
LAN1, LAN2 or VIP on NIOS appliance LAN1, LAN2 or VIP on Infoblox DHCP failover peer VIP on HA grid master or LAN1 or LAN2 on single master LAN1, LAN2, or VIP LAN1, LAN2 , VIP, or MGMT, or client
17 UDP
67
68
DHCP Failover
LAN1, LAN2 or VIP on Infoblox DHCP failover peer LAN1, LAN2 or VIP on grid member in a DHCP failover pair LAN1, LAN2, or VIP LAN1, LAN2 , VIP, or MGMT
6 TCP
519
519
DHCP Failover
6 TCP
7911
Informs functioning grid member in a DHCP failover pair that its partner is down Required for DHCP failover
17 UDP 6 TCP
53 53
Required for DHCP to send DNS dynamic updates For DNS zone transfers, large client queries, and for grid members to communicate with external name servers Required for DNS For DNS queries Required for DNS
Client
17 UDP
53
NTP client
17 UDP
123
NIOS 4.3r5
145
Proto 17 UDP
Notes For proxying RADIUS Authentication-Requests. The default destination port number is 1812, and can be changed to 1024 63997. When configuring an HA pair, ensure that you provision both LAN IP addresses on the RADIUS server. For proxying RADIUS Accounting-Requests. The default destination port number is 1813, and can be changed to 1024 63998. Required to proxy requests from RADIUS clients to servers. The default source port number is 1814, and although it is not configurable, it is always two greater than the port number for RADIUS authentication. Required to respond to the UNIX-based traceroute tool to determine if a destination has been reached Required for response from ICMP echo request (ping) Required to send pings and respond to the Windowsbased traceroute tool Gateway sends an ICMP TTL exceeded message to a Windows client, which then records router hops along a data path Required to synchronize Grid, TSIG authentication, and DHCP failover Optional for synchronizing logs among multiple appliances
RADIUS Accounting
LAN1 or VIP
17 UDP
1024 65535
1813
RADIUS Proxy
LAN1 or VIP
17 UDP
1814
ICMP Dst Port Unreachable ICMP Echo Reply ICMP Echo Request ICMP TTL Exceeded
VIP, LAN1, LAN2, or MGMT, or UNIX-based client VIP, LAN1, LAN2, or MGMT, or client VIP, LAN1, LAN2, or MGMT, or client Gateway device (router or firewall)
LAN1, LAN2, or UNIX-based client VIP, LAN1, LAN2, or MGMT, or client VIP, LAN1, LAN2, or MGMT, or client Windows client
1 ICMP Type 3
NTP
LAN1 on active node of grid master or LAN1 of independent appliance LAN1, LAN2, or VIP
NTP server
17 UDP
123
SMTP
Mail server
6 TCP
25
146
NIOS 4.3r5
Service SNMP
SRC IP NMS (network management system) server VIP on grid master or HA pair, LAN1 or MGMT on independent appliance
Proto 17 UDP
Notes Required for SNMP management Required for SNMP trap management. Uses MGMT as the source IP when enabled. Uses VIP on grid master or HA pair, or LAN1 on independent appliance when MGMT is disabled.
SNMP Traps
17 UDP
162
SSHv2
Client
6 TCP
22
Administrators can make an SSHv2 connection to the LAN1, LAN2, VIP, or MGMT port Optional for management Required for remote syslog logging NIOS appliance responds with ICMP type code 3 (port unreachable) For contacting a TFTP server during database and configuration backup and restore operations Required if the HTTP-redirect option is set on the grid properties security page Required for administration through the GUI
Syslog
LAN1, LAN2, or MGMT of NIOS appliance LAN1, LAN2, or UNIX-based appliance LAN1 or MGMT
syslog server
17 UDP
514
Traceroute
17 UDP
TFTP Data
17 UDP
HTTP
6 TCP
HTTPS/ SSL
6 TCP
443
NIOS 4.3r5
147
148
NIOS 4.3r5
NIOS 4.3r5
149
NIC Failover
You can use the LAN2 port in conjunction with the NIC failover feature to provide redundancy and additional fault tolerance in your network. When you enable the NIC failover feature, the LAN1 and LAN2 ports are grouped into one logical interface. They share one IP address and appear as one interface to the network. Then, if a link to one of the ports fails or is disabled, the appliance fails over to the other port, avoiding a service disruption. You can connect the LAN1 and LAN2 ports to the same switch or to different switches, but they must be on the same VLAN. One port is active and the other port is idle at all times. The other port becomes active only when the previously active port fails. The LAN1 and LAN2 ports share the IP address of the LAN1 port; the port that is currently active owns the IP address. When you enable services on the appliance, such as DNS and DHCP, clients send their service requests to the LAN1 port IP address and receive replies from it as well. The port supports the services and features supported on the LAN1 port as listed in Table 4.2 and Table 4.3. Note that you cannot enable NIC failover, if the LAN2 port is serving DNS or DHCP. As shown in Figure 4.5, the appliance is connected to the grid through its MGMT port, and the LAN1 and LAN2 ports are connected to the same switch. NIC failover is enabled and the LAN1 and LAN2 port share the IP address of the LAN1 port, which is 1.1.1.5. In the illustration, LAN1 is the active port. You can enable NIC failover on a single independent appliance or grid member. You cannot enable this feature on an HA pair.
Grid Master
LAN1 10.1.1.5 Private Network 10.1.1.0/24 for Grid Communications and Appliance Management MGMT 10.1.1.20 LAN1 LAN2 The LAN1 and LAN2 ports share the LAN1 IP address. Only 1 port is active at anytime. LAN1 1.1.1.5
150
NIOS 4.3r5
To enable the LAN2 port and the NIC failover feature: 1. From the Grid perspective, click + (for grid ) -> + (for Member ) -> grid_member -> Edit -> Member Properties. or From the Device perspective, click hostname -> Edit -> Device Properties. 2. In the Grid Member editor, click LAN2 Port to expand the section, and then enter the following: Enable LAN2: Select this check box. Enable NIC failover for LAN1 and LAN2: Select this check box. The appliance greys out the IP address field. You cannot enter a separate IP address for the LAN2 port because the LAN1 and LAN2 ports share the IP address of the LAN1 port. 3. Click the Save and Restart Services icons. The Detailed Status panel displays the status of both the LAN1 and LAN2 ports.
LAN2 Virtual Router ID (if HA): If the appliance is in an HA pair, enter a VRID number. 3. From the DHCP and IPAM perspective, select the DHCP Members tab, and then click + (for grid ) -> + (for Member ) -> grid_master -> Edit -> Member Properties. 4. Click General Properties to expand the section and do the following: Enable DHCP service on the LAN2 port: Select this check box. 5. Click the Save and Restart Services icons.
NIOS 4.3r5
151
LAN2 Virtual Router ID (if HA): If the appliance is in an HA pair, enter a VRID number. 3. From the DNS perspective, select the DNS Members tab, and then click + (for grid ) -> + (for Member ) -> grid_master -> Edit -> Member Properties. 4. Click General Properties to expand the section and do the following: Enable DNS service on the LAN2 port: Select this check box and specify the following: Automatically create glue A and PTR records for LAN2 IP: The NIOS appliance can automatically generate A (address) and PTR records for a primary name server whose host name belongs to the name space of the zone. Select this check box to enable the appliance to automatically generate an A and PTR record. Select one of the following from the Source queries, notifies, and zone transfer requests drop-down list: VIP: The appliance uses the IP address of the HA port as the source for queries, notifies, and zone transfer requests. MGMT: The appliance uses the IP address of the MGMT port as the source for queries, notifies, and zone transfer requests. LAN2: The appliance uses the IP address of the LAN2 port as the source for queries, notifies, and zone transfer requests. Any: The appliance chooses which port to use as the source for queries, notifies, and zone transfer requests. 5. Click the Save and Restart Services icons.
152
NIOS 4.3r5
Appliance Management on page 154 Grid Communications on page 156 DNS Services on page 159
For information about what types of traffic qualify as appliance management, grid communications, and DNS services, see Table 4.3 on page 145. Note: The MGMT port currently does not support DHCP, NTP, NAT, RADIUS proxying, or TFTP. Some NIOS appliance deployment scenarios support more than one concurrent use of the MGMT port. The following table depicts MGMT port uses for various appliance configurations.
Table 4.4 Supported MGMT Port Uses for Various appliance Configurations
Appliance Configuration Single Independent Appliance Independent HA Pair Grid Master Grid Master Candidate HA Grid Member Single Grid Member Appliance Management Grid Communications Not Applicable Not Applicable DNS Services
* *
* Although you manage all grid members through the grid master, if you enable the MGMT port on common grid members, they can send syslog events, SNMP traps, and e-mail notifications, and receive SSH connections on that port. Infoblox does not support MGMT port usage for some appliance configurations (indicated by the symbol in Table 4.4) because it cannot provide redundancy through the use of a VIP. A grid master that is an HA pair needs the redundancy that a VIP interface on the HA port provides for grid communications. Similarly, DNS servers in an HA pair need that redundancy to answer DNS queries. Because the MGMT port does not support a VIP and thus cannot provide redundancy, grid masters (and potential grid masters) do not support grid communications on the MGMT port. In addition, NIOS appliances in an HA pair support DNS services on the active node only (indicated by the symbol in Table 4.4). Only the active node can respond to queries that it receives. If a DNS client sends a query to the MGMT port of the node that happens to be the passive node, the query can eventually time out and fail.
NIOS 4.3r5
153
The MGMT port is not enabled by default. By default, a NIOS appliance uses the LAN port (and HA port when deployed in an HA pair). You must log in using a superuser account to enable and configure the MGMT port. You can enable the MGMT port through the Infoblox GUI (as explained in the following sections) or through a console connection with the following command: set interface mgmt speed auto duplex auto Note: For information about connecting Ethernet cables to the MGMT port, refer to Cabling for the MGMT Port on page 827.
Appliance Management
You can restrict administrative access to a NIOS appliance by connecting the MGMT port to a subnet containing only management systems. This approach ensures that only appliances on that subnet can access the Infoblox GUI and receive appliance management communications such as syslog events, SNMP traps, and e-mail notifications from the appliance. If you are the only administrator, you can connect your management system directly to the MGMT port. If there are several administrators, you can define a small subnetsuch as 10.1.1.0/29, which provides six host IP addresses (10.1.1.110.1.1.6) plus the network address 10.1.1.0 and the broadcast address 10.1.1.7and connect to the NIOS appliance through a dedicated switch (which is not connected to the rest of the network). Figure 4.6 shows how an independent appliance separates appliance management traffic from network protocol services. Note that the LAN port is on a different subnet from the MGMT port.
154
NIOS 4.3r5
Similarly, you can restrict management access to a grid master to only those appliances connected to the MGMT ports of the active and passive nodes of the grid master. To enable the MGMT port on an independent appliance or grid master for appliance management and then cable the MGMT port directly to your management system or to a network forwarding appliance such as a switch or router: 1. From the Grid perspective, click + (for grid ) -> + (for Member ) -> grid_master -> Edit -> Member Properties. or From the Device perspective, click hostname -> Edit -> Device Properties. Note: You must enable the MGMT port before modifying its port settings. See Using the MGMT Port on page 153. 2. In the Grid Member or Device editor, click MGMT Port, and then enter the following in Node 1 subsection for a single grid master or independent appliance, and in the Node 1 and Node 2 subsections for an HA grid master or independent HA pair: Enable management (MGMT) port: Select check box. Enable VPN services on the MGMT port: Clear check box. Restrict Support and remote console access to MGMT port: Select the check box to restrict SSH (Secure Shell) v2 access to the MGMT port only. This restricts Infoblox Technical Support and remote console connectionsboth of which use SSH v2to just the MGMT port. For an HA pair, you can make an SSH v2 connection to the MGMT port on both the active and passive nodes. Clear the check box to allow SSH v2 access to both the MGMT and LAN ports. For an HA pair, you can make an SSH v2 connection to the MGMT and LAN ports on both the active and passive nodes. IP Address: Type the IP address for the MGMT port, which must be in a different subnet from that of the LAN and HA ports. Subnet Mask: Choose an appropriate subnet mask for the number of management systems that you want to access the appliance through the MGMT port. Gateway: Type the default gateway for the MGMT port. If you need to define any static routes for traffic originating from the MGMT portsuch as SNMP traps, syslog events, and email notificationsdestined for remote subnets beyond the immediate subnet, specify the IP address of this gateway in the route. Use automatic MGMT port settings: Select the check box to instruct the NIOS appliance to negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch automatically. If you clear the check box, manually configure the same settings on both the NIOS appliance and the switch. By default, the check box is selected. 3. Click the Save icon to save your settings. 4. Close the current JWS (Java Web Start) application window. 5. Cable the MGMT port to your management system or to a switch or router to which your management system can also connect. 6. If your management system is in a subnet from which it cannot reach the MGMT port, move it to a subnet from which it can. The Infoblox Grid (or Device) Manager GUI is now accessible through the MGMT port on the NIOS appliance from your management system. 7. Start a new JWS session, and then log in to the IP address of the MGMT port. 8. Check the Detailed Status and Grid panels to make sure the status icons are green.
NIOS 4.3r5
155
Grid Communications
You can isolate all grid communications to a dedicated subnet as follows: For grid communications from the grid master, which can be an HA pair or a single appliance, the master uses either the VIP interface on the HA port of its active node (HA master) or its LAN port (single master). Neither a single nor HA grid master can use its MGMT port for grid communications. (This restriction applies equally to master candidates.) Common grid members connect to the grid master through their MGMT port.
This ensures that all database synchronization and grid maintenance operations are inaccessible from other network elements while the common grid members provide network protocol services on their LAN ports.
Figure 4.7 shows how grid members communicate to the master over a dedicated subnet. Figure 4.7 Grid Communications
The private network (10.1.1.0/24) is reserved for grid communications between the grid master and all grid members, and for appliance management between the management system and the grid master.
Master Candidate
The grid master and master candidate connect to the private network using a VIP on their HA ports.
VIP 10.1.1.10
Private Network 10.1.1.0/24 for Grid Communications and appliance Management Management System 10.1.1.30 MGMT 10.1.1.15 Single Member MGMT 10.1.1.20 Passive Node MGMT 10.1.1.21 Active Node HA Member HA HA LAN 1.1.1.6 The common grid members use the public network (1.1.1.0/24) for DNS and DHCP services. VIP 1.1.1.7 The common grid members connect to the private network through their MGMT ports*. They connect to the public network through their LAN and HA ports (using a VIP).
DNS and DHCP Clients * Only the active node of an HA member connects to the grid master. The passive node communicates just with the active node. If there is an HA failover, the newly promoted active node must first join the grid before continuing grid communications with the grid master on behalf of the HA member.
156
NIOS 4.3r5
Enabling Grid Communications over the MGMT Port for Existing Grid Members
To enable the MGMT port for grid communications on an existing single or HA grid member: 1. Log in to the grid master with a superuser account. 2. From the Grid perspective, click + (for grid ) -> + (for Member ) -> member -> Edit -> Member Properties. 3. In the Grid Member editor, click MGMT Port, and then enter the following for Node 1. For an HA member, enter the IP address, subnet mask, and gateway address for both Node 1 and Node 2. Enable management (MGMT) Port: Select the check box. Enable VPN services on the MGMT Port: Select the check box. Restrict Support and remote console access to MGMT port: Select the check box to restrict SSH (Secure Shell) v2 access to the MGMT port only. This restricts Infoblox Technical Support and remote console connectionsboth of which use SSH v2to just the MGMT port. For an HA pair, you can make an SSH v2 connection to the MGMT port on both the active and passive nodes. Clear the check box to allow SSH v2 access to both the MGMT and LAN ports. For an HA pair, you can make an SSH v2 connection to the MGMT and LAN ports on both the active and passive nodes. IP Address: Type the IP address of the MGMT port on the grid member, which must be in a different subnet from that of the LAN and HA ports. Subnet Mask: Choose the subnet mask for the MGMT port IP address. Gateway: Type the default gateway for the MGMT port. Use automatic MGMT port settings: Select the check box to instruct the NIOS appliance to negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch automatically. If you clear the check box, manually configure the same settings on both the NIOS appliance and the switch. By default, the check box is selected. 4. If the IP addresses of the LAN and HA ports are in the same subnet as the IP address of the MGMT port, click Node Properties in the Grid Member editor, and then change the IP address of the LAN port (for a single member) and LAN and HA ports (for an HA member). 5. Click the Save icon to save your settings. The master communicates the new port settings to the member, which immediately begins using them. The member stops using its LAN port for grid communications and begins using the MGMT port. 6. To confirm that the member still has grid connectivity, check that the status icons for that member are green on the Detailed Status and Grid panels.
Enabling Grid Communications over the MGMT Port for New Grid Members
To enable the MGMT port for grid communications on a single appliance or HA pair and then join it to a grid:
NIOS 4.3r5
157
Restrict Support and remote console access to MGMT port: Select the check box to restrict SSH (Secure Shell) v2 access to the MGMT port only. This restricts Infoblox Technical Support and remote console connectionsboth of which use SSH v2to just the MGMT port. For an HA member, you can make an SSH v2 connection to the MGMT port on both the active and passive nodes. Clear the check box to allow SSH v2 access to both the MGMT and LAN ports. For an HA member, you can make an SSH v2 connection to the MGMT and LAN ports on both the active and passive nodes. IP Address: Type the IP address of the MGMT port on the grid member. This is the address that you previously set when configuring the appliance. The MGMT port address cannot be in the same subnet as the addresses of the LAN and HA ports. Subnet Mask: Choose the subnet mask for the MGMT port IP address. Gateway: Type the default gateway for the MGMT port. Use automatic MGMT port settings: Select the check box to instruct the member to negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch automatically. If you clear the check box, manually configure the same settings on both the NIOS appliance and the switch. By default, the check box is selected. 5. Click the Save icon to add the member. 6. In the Grid perspective, select the member you just created, click Edit -> Member Properties. 7. In the Grid Member editor, click MGMT Port, select Enable VPN services on the MGMT Port, and then click the Save icon.
158
NIOS 4.3r5
For a single appliance, it connects to the grid master from its MGMT port. The grid master allows it to join the grid, and sends it its configuration andif the appliance is running a different software version from the rest of the gridthe software version for the grid. When an HA pair joins the grid through their MGMT ports, each node joins separately. The process occurs as follows: 1. You join the active node to the grid first (step 7) and the grid master sends it the remainder of its configuration andif the node is running a different software version from the rest of the gridthe software version for the grid. 2. The HA pair fails over. 3. You now log in to the other node, which is now active, and join it to the grid (repeat step 7). The master sends it its configuration and (if necessary) the version of software running on the grid. 4. The HA pair fails over again, so that the node that was active when you started the join operation becomes the active node again when you finish it. After an appliance or HA pair is part of the grid, you continue configuring it through the grid master.
DNS Services
You can configure a single independent appliance or single grid member to provide DNS services through the MGMT port in addition to the LAN port. For example, the appliance can provide DNS services through the MGMT port for internal clients on a private network, and DNS services through the LAN port for external clients on a public network. While providing DNS services on the MGMT port, you can still use that port simultaneously for appliance management. Figure 4.8 shows a management system communicating with a single independent appliance through its MGMT port while the appliance also provides DNS services on that port to a private network. Additionally, the appliance provides DNS services to an external network through its LAN port.
Figure 4.8 DNS Services on the LAN and MGMT Ports, and appliance Management on the MGMT Port
External Network
Appliance management and internal DNS services go through the MGMT port.
MGMT Port
Management System
Internal Network
Like a single independent appliance, a single grid member can also support concurrent DNS traffic on its MGMT and LAN ports. However, because you manage all grid members through the grid master, a grid member only uses an enabled MGMT port to send SNMP traps, syslog events, and email notifications, and to receive SSH connections.
NIOS 4.3r5
159
In addition, the active node of an HA pair can provide DNS services through its MGMT port. To use this feature, you must enable DNS services on the MGMT ports of both nodes in the HA pair and specify the MGMT port IP addresses of both nodes on the DNS client as well, in case there is a failover and the passive node becomes active. Note that only the active node can respond to queries that it receives. If a DNS client sends a query to the MGMT port of the node that happens to be the passive node, the query can eventually time out and fail. To enable DNS services on the MGMT port of an appliance: 1. From the Grid perspective, click + (for grid ) -> + (for Member ) -> grid_master -> Edit -> Member Properties. or From the Device perspective, click hostname -> Edit -> Device Properties. 2. In the Grid Member or Device editor, click MGMT Port, and then enter the following in Node 1 subsection for a single grid master or independent appliance, and in the Node 1 and Node 2 subsections for an HA grid master or independent HA pair: Enable management (MGMT) Port: Select the check box. IP Address: Enter the IP address of the MGMT port. The MGMT port IP address must be in a different subnet from that of the LAN and HA ports. Subnet mask: Choose an appropriate subnet mask for the MGMT port. Gateway: Enter the IP address of the gateway for the MGMT port. 3. Click the Save icon to save your settings for the MGMT port. 4. From the DNS perspective of the Member DNS Properties editor, click DNS Members -> + (for grid ) -> member -> DNS -> Modify -> General. 5. In the Member DNS Properties editor, click General, and then select Enable DNS service. 6. Select the Enable DNS service on the MGMT port check box. 7. Select one of the following from the Source queries, notifies, and zone transfer requests drop-down list: VIP: The appliance uses the HA port for source queries, notifies, and zone transfer requests. MGMT: The appliance uses the MGMT port for source queries, notifies, and zone transfer requests. Any: The appliance selects the port for source queries, notifies, and zone transfer requests. This is usually the LAN port. If the LAN port is part of the MGMT port, the appliances use the MGMT port. 8. Click the Save icon to save your settings. 9. Click the Restart Services icon if it flashes. 10. To see that the appliance now also serves DNS on the MGMT port: From the DNS perspective, click DNS Members -> + (for grid ) -> member -> View -> Properties, and look in the General section. Check that the value for Enable DNS service on the MGMT Port is true. or From the DNS perspective, click DNS Members -> + (for grid ) -> member -> View -> DNS Configuration, and check that the IP address of the MGMT port appears in the address match list in the listen-on substatement.
160
NIOS 4.3r5
Internet 1.2.2.1 The default route points all traffic from the LAN or LAN1 port on the NIOS appliance to the DMZ interface (1.2.2.1) on the firewall. DMZ LAN Port Firewall NIOS appliance The appliance responds to all queries from the Internet and internal network by sending its responses to the DMZ interface (1.2.2.1) on the firewall. The appliance only needs a single default route to the firewall. The firewall then routes the traffic where it needs to go. Default route: Network: 0.0.0.0 Netmask: 0.0.0.0 Gateway: 1.2.2.1
Internal Network
When the NIOS appliance is on a segment of the network where there are multiple gateways through which traffic to and from the appliance can flow, a single default route is insufficient. For an example, see Figure 4.10.
NIOS 4.3r5
161
Internet
Firewall-1
1.2.2.1
The default route points all traffic from the NIOS appliance to the DMZ interface (1.2.2.1) on firewall-1.
DMZ NIOS appliance Default route: Network: 0.0.0.0 Netmask: 0.0.0.0 Gateway: 1.2.2.1 1.2.2.2 Firewall-2
Switch
DNS queries from the Internet reach the appliance through firewall-1, and the appliance sends its replies back through firewall-1. DNS queries from the internal network reach the appliance through firewall-2, but because there is only one default route, the appliance erroneously sends DNS replies to the DMZ interface (1.2.2.1) on firewall-1.
To resolve the problem illustrated in Figure 4.10 on page 162, add a second route pointing traffic destined for 10.1.1.0/24 to use the gateway with IP address 1.2.2.2 on firewall-2. This is shown in Figure 4.11.
Internet The default route on the NIOS appliance points traffic destined for the Internet to the DMZ interface (1.2.2.1) on firewall-1.
NIOS appliance
Default route: Network: 0.0.0.0 Netmask: 0.0.0.0 Gateway: 1.2.2.1 Route to: Network: 10.1.1.0 Netmask: 255.255.255.0 Gateway: 1.2.2.2
Switch
1.2.2.2 Firewall-2
A second route on the appliance points traffic destined for 10.1.1.0/24 to the DMZ interface (1.2.2.2) on firewall-2.
162
NIOS 4.3r5
Whenever you want the NIOS appliance to send traffic through a gateway other than the default gateway, you need to define a separate route. Then, when the appliance performs a route lookup, it chooses the route that most completely matches the destination IP address in the packet header. When you enable the MGMT port, the gateway you reference in a static route determines which port the NIOS appliance uses when directing traffic to a specified destination. If a route definition references a gateway that is in the same subnet as the IP and VIP addresses of the LAN (or LAN1) and HA ports, the NIOS appliance uses the LAN (or LAN1) or HA port when directing traffic to that gateway. If a route definition references a gateway that is in the same subnet as the MGMT port, the NIOS appliance uses the MGMT port when directing traffic to that gateway.
Figure 4.12 Static Routes for the LAN and MGMT Ports
Internet LAN Gateway (Firewall-1) 1.2.2.1 DMZ 1.2.2.0/24 Switch Switch LAN Gateway (Firewall-2) 1.2.2.2 10.1.1.1 Two static routes direct traffic from the NIOS appliance: From the LAN port (eth1, 1.2.2.5) through the gateway at 1.2.2.2 to the 10.1.1.0/24 subnet. Internal Network 10.1.1.0/24 Route Tables on the NIOS appliance
From LAN: 1.2.2.0/24 dev eth1 scope link 10.1.1.0/24 via 1.2.2.2 dev eth1 default via 1.2.2.1 dev eth1 From MGMT: 10.1.2.0/24 dev eth0 scope link 10.1.3.0/24 via 10.1.2.1 dev eth0 default via 10.1.2.1 dev eth0 From all: 10.1.1.0/24 via 1.2.2.2 dev eth1 10.1.3.0/24 via 10.1.2.1 dev eth0 1.2.2.0/24 dev eth1 proto kernel scope link src 1.2.2.5 10.1.2.0/24 dev eth0 proto kernel scope link src 10.1.2.5 default via 1.2.2.1 dev eth1
10.1.2.1
10.1.3.1
Administrators
Subnet 10.1.2.0/24
MGMT Gateway
Subnet 10.1.3.0/24
From the MGMT port (eth0, 10.1.2.5) through the gateway at 10.1.2.1 to the 10.1.3.0/24 subnet.
Note: There is a route table for each port as well as a comprehensive route table. For an HA pair, the LAN port route table is duplicated for the HA port. In this illustration, the static routes are shown in green.
The need for routes can apply to any type of traffic that originates from the appliance, such as DNS replies, DHCP messages, SNMP traps, ICMP echo replies, Infoblox GUI management, and grid communications.
NIOS 4.3r5
163
To set a static route, do the following: 1. For a grid member: From the Grid perspective, click + (for grid ) -> + (for Member s) -> member -> Edit -> Member Properties. or For an independent appliance or HA pair: From the Device perspective, click hostname -> Edit -> Device Properties. 2. In the Member or Device editor, click Static Routes, click Add, and then enter the following: Network Address: Type the address of the remote network to which the NIOS appliance routes traffic. Netmask: Choose the netmask that defines the remote network. Gateway Address: Type the IP address of the gateway on the local subnet through which the NIOS appliance directs traffic to reach the remote network. The gateway address must meet the following requirements: It must belong to a working gateway router or gateway switch. It must be in the same subnet as the NIOS appliance. Note: Consult your network administrator before specifying the gateway address for a static route on the appliance. Specifying an invalid gateway address can cause problems, such as packets being dropped or sent to an incorrect address. 3. Click the Save icon to save your settings.
164
NIOS 4.3r5
Managing Licenses
Managing Licenses
Licenses come pre-installed on a NIOS appliance according to the software packages you ordered at the time of purchase. If you wish to upgrade an existing appliance with the Grid license, you must contact Infoblox Technical Support and follow the procedures in Obtaining and Adding a License on page 166. There are three types of licenses: Maintenance licenses Examples: NIOS and Grid maintenance licenses. The duration of maintenance licenses are one, two, or three years. You can obtain these licenses from your Infoblox sales representative. Service licenses Examples: DNS, DHCP, Grid. These are permanent licenses. You can obtain these licenses from your Infoblox sales representative. Temporary licenses You can enable one of several sets of temporary service licenses through the CLI command set temp_license . These licenses last for 60 days.
Two weeks before a maintenance license or a temporary license expires, an expiration warning appears during the GUI login process. The warning reappears during each login until you renew the license. To do renew a license, contact your Infoblox sales representative. If you decide not to renew an expired license and want to stop the warning from reappearing, do the following: 1. Back up the configuration and database as described in Backing Up and Restoring a Configuration File on page 253. 2. Log in to the Infoblox CLI, enter the show license command, and save all the license key strings. 3. Remove all the licensesand the entire configuration and databaseby entering the reset all licenses command. For details, see Removing Licenses on page 166. 4. Add the unexpired licenses back to the appliance using either the Infoblox GUI or CLI. 5. Restore the backup file as described in Backing Up and Restoring a Configuration File on page 253.
The following options appear: 1. DNSone (DNS, DHCP) 2. DNSone with Grid (DNS, DHCP, Grid) 3. Network Services for Alcatel-Lucent VitalQIP (QIP, Grid) 4. Network Services for Voice (DHCP, Grid) 5. Network Services for Authentication (RADIUS, Grid)
NIOS 4.3r5
165
6. Network Services Suite (DNS, DHCP, RADIUS, Grid) 7. Add DNS Server license 8. Add DHCP Server license 9. Add RADIUS Server license 10. Add Grid license 3. Enter the number for the license you want to install. 4. Confirm the selection when prompted, and the following message appears:
Temporary license is installed.
Removing Licenses
You can remove licenses and reset a NIOS appliance to its factory default settings. For example, if you have a NIOS appliance running the DNSone package with the Grid upgrade, but you want to use it as an independent appliance and manage it through the Device Manager GUI, you can do the following: 1. Log in to the NIOS appliance CLIlocally through the Console port or remotely through an SSHv2 connection and use the show license command to view all the licenses installed on the appliance. The output of the the show license command looks similar to the following:
Infoblox > show license Version: 4.0r1 Hardware ID: ecafc0c469e8c75eb59cb7e4b5912a6 License Type: Grid Expiration Date: 11/04/2006 License String: GQAAAAOS5WYrGV/JEzH6wrHYQ8L1b25y3Y+VPPY= License Type: DNS Expiration Date: Permanent License String: EQAAAAKS4n90WFGNUSirwvyUT9/z
166
NIOS 4.3r5
Managing Licenses
License Type: DHCP Expiration Date: Permanent License String: EgAAAAKU8nMlRBzcTWX63rHYFoymOQ== License Type: Grid Maintenance Expiration Date: 11/04/2006 License String: GwAAAA2Z6HAtBkPFPyfzg/yVRsLzI2x0kYyKaPb22g== License Type: NIOS Maintenance Expiration Date: 11/04/2006 License String: GwAAAAiV/nAGGljQEDv0h/yVRsLzI2x0kYyKb/P20Q==
2. Copy the output of the show license command, and save it to a text file on your management system. 3. Reset the NIOS appliance and remove all the licenses by entering the reset all licenses command. 4. This command returns all settings to their default values and removes all licenses.
Infoblox > reset all licenses The entire system will be erased to default settings and all licenses will be removed. WARNING: THIS WILL ERASE ALL DATA AND LOG FILES THAT HAVE BEEN CREATED ON THIS SYSTEM. ARE YOU SURE YOU WANT TO PROCEED? (y or n): y
The application restarts with the default settings and no licenses. 5. Log in to the CLI through the Console port, and check that all the licenses are gone by entering the show license command.
Infoblox > show license Version: 4.0r1 Hardware ID: ecafc0c469e8c75eb59cb7e4b5912a6 Infoblox >
6. Add back only the DNS, DHCP, and NIOS Maintenance licenses by entering the set license command and then copying and pasting the text string for each license:
Infoblox > set license Enter license string: EQAAAAKS4n90WFGNUSirwvyUT9/z Install license? (y or n): y License is installed. Infoblox > set license Enter license string: EgAAAAKU8nMlRBzcTWX63rHYFoymOQ= = Install license? (y or n): y License is installed. Infoblox > set license Enter license string: GwAAAAiV/nAGGljQEDv0h/yVRsLzI2x0kYyKb/P20Q== Install license? (y or n): y License is installed.
7. To check that the licenses are now installed, enter the show license command. When you next log in to the GUI, the Infoblox Device Manager appears instead of the Infoblox Grid Manager.
NIOS 4.3r5
167
The appliance also stores the following deleted DNS resource records:
When you delete a DNS zone that contains resource records, you cannot restore the resource records individually. You must restore the zone. When you restore the zone, all the resource records in the zone are restored accordingly. The appliance does not restore resource records that are shared or automatically generated. This section discusses the following topics:
Disabling the Recycle Bin on page 169 Enabling the Recycle Bin on page 169 Viewing the Recycle Bin on page 169 Restoring Objects in the Recycle Bin on page 170 Emptying the Recycle Bin on page 170
168
NIOS 4.3r5
NIOS 4.3r5
169
170
NIOS 4.3r5
Resetting the Database on page 172 Resetting a NIOS Appliance to Factory Settings on page 172 Resetting the NIOS Appliance to Factory Settings and Removing Licenses on page 172
NIOS 4.3r5
171
3. Press the Y key to preserve the network settings or the N key to return the network settings to their default values (192.168.1.2, 255.255.255.0, 192.168.1.1).
172
NIOS 4.3r5
About RAID 10
RAID 10 (or sometimes called RAID 1+0) uses a minimum of four disk drives to create a RAID 0 array from two RAID 1 arrays, as shown inFigure 4.13 . It uses mirroring and striping to form a stripe of mirrored subsets. This means that the array combinesor stripesmultiple disk drives, creating a single logical volume (RAID 0). RAID 10 combines the high performance of RAID 0 and the high fault tolerance of RAID 1. Striping disk drives improves database write performance over a single disk drive for large databases. The disks are also mirrored (RAID 1), so that each disk in the logical volume is fully redundant.
RAID 1
RAID 1
Disk 1 Primary
Disk 1 Backup
Disk 2 Primary
Disk 2 Backup
When evaluating a fault on the Infoblox-2000, it is best to think of the disk subsystem as a single, integrated unit with four components, rather than four independent disk drives. For information, see Evaluating the Status of the Disk Subsystem on page 174.
NIOS 4.3r5
173
The Detailed Status panel provides a detailed status report on the appliance and service operations. To see a detailed status report, from the Grid perspective, select grid, and then click View -> Detailed Status. After displaying the Detailed Status panel, you can view the status of individual grid members and services by selecting them in the Grid panel. For more information on the Detailed Status panel, see Viewing Detailed Status on page 182. The RAID icon indicates the status of the RAID array on the Infoblox-2000. Icon Color Green Yellow Red Meaning The RAID array is in an optimal state. A new disk was inserted and the RAID array is rebuilding. The RAID array is degraded. At least one disk is not functioning properly. The GUI lists the disks that are online. Replace only the disks that are offline.
The Grid Manager GUI also displays detailed status of the RAID array. In the event of a disk failure, you must replace the failed disk with one that is qualified and shipped from Infoblox and has the same disk type as the rest of the disks in the array. The appliance displays information about mismatched disks in the Description column. The disk type can be one of the following: IB-Type 1: Infoblox supported disk type IB-Type 2: Infoblox supported disk type Unk: Unknown disk type that Infoblox does not support
All disk drives in the array must have the same disk type for the array to function properly. You can have either IB-Type 1 or IB-Type 2, but you cannot mix both in the array. When you have a mismatched disk in the array, you must promptly replace the disk with a replacement disk from Infoblox to avoid operational issues.
174
NIOS 4.3r5
NIOS 4.3r5
175
176
NIOS 4.3r5
Restarting Services
Restarting Services
Whenever you make a change (such as add a zone, network, or a range) you click the Restart icon to restart services. You can restart the DNS, DHCP, RADIUS, and VitalQIP services after you make configuration changes. You can also specify a future restart time. You can restart services at the grid level or the member level as described in:
Restarting Grid Services on page 177 Restarting Member Services on page 178
You can cancel a schedule that you create to restart services. A superuser can cancel any scheduled restarts. Only a superuser or administrators with read and write permission to all of the grid members can schedule a grid restart. When a superuser schedules a grid restart, a limited-access user cannot schedule a member-level restart. Limited-access users cannot cancel a superusers scheduled changes. Limited-access users cannot create or modify a schedule for a grid member if a schedule for the member (created by another user) already exists.
USER logon_id action service restart schedule 'schedule' on grid (or member) grid name or member node id
The system writes every scheduled change action to the audit log as follows:
For example:
USER jdoe insert service restart schedule '02/20/2007 01:30:00' on grid Infoblox USER jdoe deleted service restart schedule '02/22/2007 01:30:00' on node id 3
For more information on the audit log, see Using the Audit Log on page 192.
NIOS 4.3r5
177
Time Zone: Select a time zone from the drop-down menu. The drop-down menu displays the grid default time (see Changing Time Zone Settings on page 123). However, you can select a different time zone. For example, if the grid default time zone is Eastern time and you are in California, you can schedule a restart in the Pacific time zone. Enter the date and time and select the Pacific time zone and click the Save icon. When you invoke the GUI the next time, the system calculates the time difference between the two time zones and displays the scheduled time in the grid default time zone (Eastern time).
Note: The NIOS appliance converts the time zone to the grid default time zone only after you save and reinvoke the GUI. Click the Show Details button to view the following restart services details: IP address of the grid members that are restarting, services that are restarting (such as DNS, DHCP, and RADIUS), the restart date and time, and the time zone. 4. Click OK. The Restart Services icon changes from the Infoblox logo restart has been scheduled. to a clock to indicate that a
Note: The NIOS appliance converts the time zone to the grid default time zone only after you save and reinvoke the GUI.
178
NIOS 4.3r5
Restarting Services
Click the Show Details button to view the following restart services details: IP addresses of the members that are restarting, services that are restarting (such as DNS, DHCP, and RADIUS), the restart date and time, and the time zone. The Restart Services icon changes from the Infoblox logo restart has been scheduled. to a clock to indicate that a
NIOS 4.3r5
179
180
NIOS 4.3r5
Viewing Detailed Status on page 182 Appliance Status on page 182 Service Status on page 182 DB Capacity Used on page 183 Disk Usage on page 183 HA, LAN1, LAN2, or MGMT Port on page 184 LCD on page 184 Memory Usage on page 184 Replication on page 186 Using a Syslog Server on page 187 Specifying Syslog Servers on page 187 Configuring Syslog for a Grid Member on page 188 Setting DNS Logging Categories on page 189 Viewing the Syslog on page 190 Searching for Text on page 190 Downloading the Syslog File on page 191 Monitoring Tools on page 192 Using the Audit Log on page 192 Using the Replication Log on page 194 Using the Traffic Capture Tool on page 195 Using the Capacity Report on page 196 Monitoring DNS Transactions on page 197
NIOS 4.3r5
181
Appliance Status
The status icons indicate the operational status of a grid member and a general description about what it is currently doing. The appliance status icon can be one of the following colors: Icon Color Green Yellow Red Meaning The appliance is operating normally in a running state. The appliance is connecting or synchronizing with its grid master. The grid member is offline, is not licensed (that is, it does not have a DNSone license with the Grid upgrade that permits grid membership), is upgrading or downgrading, or is shutting down.
Following are some appliance descriptions that might appear in the Description column: Running, Offline, Connecting, Synchronizing, Authentication Failed, Shared secret did not match, Not Licensed, SW Revision Mismatch, Downloading Release from Master, and Shutting Down.
Service Status
After you enable DHCP, DNS, TFTP, HTTP (for file distribution), RADIUS, FTP, bloxTools Environment, VitalQIP or IPAM WinConnect services, the Infoblox GUI indicates its status with a green or red icon. Because the status icons for NTP have a different meaning, those meanings are explained in a separate table. DHCP, DNS, TFTP, HTTP (File Distribution) , RADIUS, FTP, bloxTools Environment , VitalQIP, or IPAM WinConnect Icon Color Green Red Meaning A service is enabled and running properly. A service is enabled but not running. (A red status icon can also appear temporarily when a service is enabled and begins running, but the monitoring mechanism has not yet notified the GUI engine.)
182
NIOS 4.3r5
NTP Icon Color Green Yellow Red Gray Meaning The NTP service is enabled and running properly. The NTP service is enabled, and the appliance is synchronizing its time. The NTP service is enabled, but it is not running properly or is out of synchronization. The NTP service is disabled.
The type of information that can appear in the Description column for a service corresponds to the SNMP trap messages. For information about Infoblox SNMP traps, see Chapter 6, Monitoring with SNMP, on page 203.
DB Capacity Used
Status icons for DB Capacity Used indicate the current percentage of the database in use on a selected grid member. The maximum is 100%. Icon Color Green Yellow Meaning Under 85% database capacity is currently in use. Over 85% database capacity is currently in use. When the capacity exceeds 85%, the icon changes from green to yellow and the NIOS appliance sends an SNMP trap.
Disk Usage
This indicates the percentage of the data partition on the hard disk drive currently in use. Icon Color Green Yellow Red Meaning Under 85% capacity Between 85% and 95% capacity Over 95% capacity
FAN
The status icon indicates whether the fan(s) are functioning. The corresponding description displays the fan speed. Icon Color Green Red Meaning All fans are functioning properly. At least one fan is not running.
NIOS 4.3r5
183
LCD
The LCD status icon indicates its operational status. Icon Color Green Red Meaning The LCD is functioning properly. The LCD process is not running.
Memory Usage
The status icon for memory usage indicates the current percentage of memory in use. Icon Color Green Yellow Red Meaning Under 90% capacity Between 90% and 95% capacity and increased activity Over 95% capacity and increased activity
Note: You can see more details about memory usage through the CLI command: show memory
Power Supply
The Infoblox-1552, -1552-A, and -2000 have redundant power supplies. The power supply icon indicates the operational status of the power supplies. Icon Color Green Red Meaning The power supplies are functioning properly. One power supply is not running. To find out which power supply failed, check the LEDs of the power supplies.
184
NIOS 4.3r5
RAID
This icon indicates the status of the RAID array on the Infoblox-2000. Icon Color Green Yellow Red Meaning The RAID array is functioning properly. A new disk was inserted and the RAID array is rebuilding. The RAID array is degraded. At least one disk is not functioning properly. The GUI lists the disks that are online. Replace only the disks that are offline.
The Grid Manager GUI also displays detailed status of the RAID array. In the event of a disk failure, you must replace the failed disk with one that is qualified and shipped from Infoblox and has the same disk type as the rest of the disks in the array. The appliance displays information about mismatched disks in the Description column. The disk type can be one of the following: IB-Type 1: Infoblox supported disk type IB-Type 2: Infoblox supported disk type Unk: Unknown disk type that Infoblox does not support
All disk drives in the array must have the same disk type for the array to function properly. You can have either IB-Type 1 or IB-Type 2, but you cannot mix both in the array. When you have a mismatched disk in the array, you must promptly replace the disk with a replacement disk from Infoblox to avoid operational issues.
RAID Battery
This icon indicates the status of the disk controller backup battery on the Infoblox-2000. Icon Color Green Red Meaning The battery is charged. The description indicates the estimated number of hours of charge remaining on the battery The battery is not charged.
Temperatures
This icon is always green. The description reports the CPU and system temperatures.
NIOS 4.3r5
185
Replication
The current state of replication between a grid member and master or between the passive and active nodes in an HA pair. Grid Member <> Master Icon Color Green Yellow Meaning Grid communications are operating normally and ongoing database updates are occurring. The member is synchronizing itself with the master, and either complete or partial database replication is occurring. All master candidates receive the complete database. All regular members (that is, members not configured as master candidates) receive the section of the database that applies to themselves. The member and master are not replicating the database between themselves.
Red
186
NIOS 4.3r5
Specifying Syslog Servers on page 187 Configuring Syslog for a Grid Member on page 188 Setting DNS Logging Categories on page 189 Viewing the Syslog on page 190 Searching for Text on page 190 Downloading the Syslog File on page 191
NIOS 4.3r5
187
Severity Filter: Choose a filter from the drop-down list. When you choose a severity level, grid members send messages for that severity level plus all messages for all severity levels above it. The lowest severity level is debug (at the top of the drop-down list), and the highest severity level is emerg (at the bottom of the list). Accordingly, if you choose debug, grid members send all syslog messages to the server. If you choose err, grid members send messages with the severity levels err, crit, alert, and emerg. If you choose emerg, they send only emerg messages. Message Source: Specify which syslog messages the appliance sends to the external syslog server: Internal: The appliance sends syslog messages that it generates. External: The appliance sends syslog messages that it receives from other devices, such as syslog servers and routers. Any: The appliance sends both internal and external syslog messages.
Copy audit log messages to syslog: Select the check box for the NIOS appliance to include audit log messages among the messages it sends to the syslog server. This function can be helpful for monitoring administrative activity on multiple appliances from a central location. Audit Log Facility: Choose the facility where you want the syslog server to sort the audit log messages. 3. Click the Save icon to save your settings.
188
NIOS 4.3r5
Severity Filter: Choose a filter from the drop-down list. When you choose a severity level, the NIOS appliance sends messages for that severity level plus all messages for all severity levels above it. The lowest severity level is debug (at the top of the drop-down list), and the highest severity level is emerg (at the bottom of the list). Accordingly, if you choose debug, the single appliance or active node in an HA pair sends all syslog messages to the server. If you choose err, it sends messages with the severity levels err, crit, alert, and emerg. If you choose emerg, it sends only emerg messages. Message Source: Specify which syslog messages the appliance sends to the external syslog server: Internal: The appliance sends syslog messages that it generates. External: The appliance sends syslog messages that it receives from other devices. Any: The appliance sends both internal and external syslog messages.
Enable syslog proxy: Select this check box to enable the appliance to receive syslog messages from other devices, such as syslog servers and routers, and then forward these messages to an external syslog server. Enable listening on TCP: Select this check box if the appliance uses TCP to receive messages from other devices. Port: Enter the number of the port through which the appliance receives syslog messages from other devices. Enable listening on UDP: Select this check box if the appliance uses UDP to to receive messages from other devices. Port: Enter the number of the port through which the appliance receives syslog messages from other devices. Proxy Client Access Control: Click Add, enter the following in the Access Control Item dialog box, and then click OK: IP Address option: Select IP Address if you are adding the IP address of an appliance or select Network if you are adding the network address of a group of appliances. Address: Enter the IP address of the appliance or network. Subnet Mask: If you entered a network IP address, you must also enter its subnet mask.
NIOS 4.3r5
189
Enable Update: Records the dynamic update instances. Enable Resolver: Records the DNS resolution instances, including recursive queries from resolvers. Enable Notify: Records the asynchronous zone change notification messages. Enable Lame Servers: Records bad delegation instances. Enable Database: Records BINDs internal database processes. Enable Client: Records client requests. 3. Click the Save icon to save your settings. 4. Click the Restart Services icon if it flashes.
190
NIOS 4.3r5
NIOS 4.3r5
191
Monitoring Tools
You can view the audit log, the replication log, and the traffic capture tool in a grid or HA pair to monitor administrator activity, and capture traffic for diagnostic purposes. You can also use CLI commands to monitor certain DNS transactions. This section includes the following topics:
Using the Audit Log on page 192 Using the Replication Log on page 194 Using the Traffic Capture Tool on page 195 Using the Capacity Report on page 196 Monitoring DNS Transactions on page 197
When the audit log reaches it maximum size, which is 100 MB, the appliance automatically writes the file into a new file by adding a .0 extension to the first file and incrementing subsequent file extensions by 1. Files are compressed during the rotation process, adding a .gz extension following the numerical increment (file.#.gz). The sequential incrementation goes from zero through nine. When the eleventh file is started, the first log file (file.0.gz) is deleted, and subsequent files are renumbered accordingly. For example, the current log file moves to file.0.gz, the previous file.0.gz moves to file.1.gz, and so on through file.9.gz. A maximum of 10 log files (0-9) are kept. To list the audit log files and their sizes, log in to the Infoblox CLI and execute the show logfiles command. To view the audit log: From the Grid perspective, select grid -> File -> Audit Log. or From the Device perspective, select hostname -> File -> Audit Log . To refresh the audit log view, select View -> Refresh (or press the F5 key). To delete the contents of the audit log file, select View -> Clear. You can also do the following:
You can search for audit logs that pertain to particular DNS and DHCP objects. To search the audit log file: 1. Click the Search icon in the upper right corner of the Audit Log File viewer. 2. In the Search Audit Log dialog box, enter the search criteria as follows: Match Fields: In this section, you specify the fields the appliance uses to filter the Audit Log. Enter the following:
192
NIOS 4.3r5
Monitoring Tools
Admin Name: Enter the name of the administrator to view the Audit Log changes made only by a specific administrator. The name you enter in this field need not be complete. You can use regular expressions to expand your search. For example, you can just enter ad* or adm to search for the admin name administrator. Also, the data you enter is not case sensitive. Message/Value: Enter any word or sentence from the message to be searched or the value of the object that was created, modified, or deleted. The data you enter is not case sensitive. The message you enter in this field need not be complete. You can use regular expressions to expand your search. For example, to find messages with the word created, you can just enter cre or cre*. For example, if you changed the Comment field for an authoritative zone from today is tuesday to today is wednesday, the Audit Log displays this change in the Message column as follows:
comment From: today is tuesday To: today is wednesday
In this case, you can search for the string today is wednesday but you cannot search for To: today is wednesday. You can also search based on the value of the object you changed. For example, if you change the end IP address of a DHCP range from 10.0.20.0 to 10.0.30.0, you can enter 30 in the Message/Value field to find the log for this change. Object Restrictions: In this section, you can specify additional filter criteria to restrict the Audit Log search. Object Type: This drop-down list displays the different types of objects that you can select for the search. You can select No Object Type Restrictions to search all object types or you can select a specific object type. When you select a specific object type, you can enter an object name. Object Name: To restrict the search to a specific object, you can enter a name for the object type you specified. You can enter a partial name and use regular expressions as well. For example, to find a DNS object called test.com, you can just enter tes or te*. Time Range In this section, you can either select from a predefined time range or specify your own custom range. The appliance uses the time zone that it automatically detects from the management system that the admin uses to log in. Or you can override the time zone auto-detection feature at the admin and member level by specifying a time zone. For example, if you are in the Eastern Standard Time zone, then the time range section in the dialog displays the Eastern Standard Time regardless of the grid time zone setting. If you change the time zone on your computer, you must log out and then log back in to the NIOS appliance for the new time zone to take effect. Predefined range: Select one of the following predefined date and time ranges from the drop-down menu: All: Displays all audit log messages logged at all available dates and times. Last Week: Displays all audit log activity that occurred one week before the current time. Last Day: Displays audit log activity that occurred one day (24 hours) before the current time. Last 12 Hours: Displays all audit log activity that occurred 12 hours before the current time. Last 4 Hours: Displays audit log activity that occurred four hours before the current time. Last Hour: Displays all audit log activity that occurred one hour before the current time. Custom range: Click and select one of the following: From: Either select Oldest message or click Specify and then enter the start date and time in the year/month/date and hours:minutes:seconds format. To: Either select Newest message or click Specify and then enter the end date and time in the year/month/date and hours:minutes:seconds format. 3. Click Search The appliance displays the results of your search in a Search Results panel. To download the audit log file, click the Download File icon in the upper right corner of the Audit Log File viewer, navigate to a directory where you want to save it, optionally change the file name (the default name is auditLog.tar.gz ), and click OK.
NIOS 4.3r5
193
For example:
[2007/05/05 11:13:54.208] [admin]: updated grid time zone
Note: The dates and timestamps in the audit log are determined by the time zone setting of the admin account that you use to log in to the NIOS appliance.
194
NIOS 4.3r5
Monitoring Tools
NIOS 4.3r5
195
The report categorizes object types that you can manage through the NIOS appliance. For objects that are only used for internal system operations, the report groups and shows them under the object type Other. The report displays the following information for object types: Object Type: The type of objects. For example, DHCP Lease, Admin Group, or PTR Record. Total: The total number of objects for a specific object type.
You can print the object type information or export it to a CSV file. For information on printing the object types, see Printing from the GUI on page 61; and for information on exporting to a CSV file, see Exporting Data on page 65.
196
NIOS 4.3r5
Monitoring Tools
An invalid TXID is a DNS response that arrives from UDP port 53, and the TXID does not match the TXID of an outstanding DNS request.
Figure 5.1 illustrates how the appliance detects an invalid port and an invalid TXID. Figure 5.1 Invalid Port and Invalid TXID
TXID 65534
Client
Port 10024
Malicious Source
The appliance detects an invalid port or TXID, logs the event, and sends an SNMP trap and/or e-mail when the thresholds 4 The malicious server are exceeded sends spoofed DNS responses and guesses the TXID and the UPD port
Both invalid ports and invalid TXIDs could be indicators of DNS cache poisoning, although a small number of them is considered normal in situations where valid DNS responses arrive after the DNS queries had timed out. You can configure the appliance to track these indicators, and you can view their status. You can also configure thresholds for them. When the number of invalid ports or invalid TXIDs exceeds the thresholds, the appliance logs an event in the syslog file and sends an SNMP trap and e-mail notification, if you enable them. You can then configure rate limiting rules to limit incoming traffic or completely block connections from primary sources that send the invalid DNS responses. Rate limiting is a token bucket system that accepts packets from a source based on the rate limit. You can configure the number of packets per minute that the Infoblox DNS server accepts from a specified source. You can also configure the number of packets for burst traffic, which is the maximum number of packets that the token bucket can accept. Once the bucket reaches the limit for burst traffic, it discards the packets and starts receiving new packets according to the rate limit.
NIOS 4.3r5 Infoblox Administrator Guide (Rev. A) 197
The appliance monitors only UDP traffic from remote port 53 for the following reasons: The attacks that the appliance monitors do not happen over TCP. DNS responses are sent only from port 53. The appliance discards DNS responses that are sent from other ports.
To monitor invalid ports and invalid TXIDs on the Infoblox DNS server, follow these procedures: 1. Enable DNS network monitoring and DNS alert monitoring. For information, see Enabling and Disabling DNS Alert Monitoring on page 198. 2. Configure the thresholds for DNS alert indicators. For information, see Configuring DNS Alert Thresholds on page 199. 3. Enable SNMP traps and e-mail notifications. For information, see Configuring SNMP on page 249. 4. Review the DNS alert status. For information, see Viewing DNS Alert Indicator Status on page 199. 5. Identify the source of the attack by reviewing the DNS alert status, syslog file, and SNMP traps. For information on SNMP traps for DNS alerts, see Threshold Crossing Traps on page 224. To mitigate cache poisoning, you can limit incoming traffic or completely block connections from specific sources, as follows: Enable rate limiting on the DNS server. For information, see Enabling and Disabling Rate Limiting from External Sources on page 200. Configure rate limit traffic rules from specific sources. For information, see Configuring Rate Limiting Rules on page 201.
You can verify the rate limiting rules after you configure them. For information, see Viewing Rate Limiting Rules on page 202.
When you enable DNS alert monitoring and DNS network monitoring is disabled, the appliance automatically enables DNS network monitoring and displays the following:
DNS Network Monitoring is disabled. It must be enabled for alerting to function. Enable DNS Monitoring now? (y or n):
You can also disable DNS network monitoring and DNS alert monitoring using the following commands:
set monitor dns off set monitor dns alert off
Note: When you restart DNS network monitoring, you also reset the SNMP counters for DNS alerts. You can then view the alert status to identify the primary source of invalid DNS responses. For information, see Viewing DNS Alert Indicator Status on page 199.
198
NIOS 4.3r5
Monitoring Tools
The appliance displays historical alert counts and up to five primary sources that generate invalid DNS responses, as shown in the following example:
Data last updated: Mon Oct 6 14:47:12 2008 DNS Alert1m5m15m60m24hEver ============================================ port8 txid8 12 12121212 12 12121212
There were 80 DNS responses seen in the last minute. 10% were to an invalid port. 10% had an invalid TXID.
Primary sources of invalid responses: 4.4.4.4 (unknown) sent 4 2.2.2.2 (unknown) sent 3 7.7.7.7 (unknown) sent 1
The appliance attempts to resolve the host names of the sources that sent invalid responses. If the appliance cannot resolve a host name, it displays unknown as the host name of the invalid response.
NIOS 4.3r5
199
To configure DNS alert thresholds: 1. Log in to the Infoblox CLI as a superuser account. 2. Enter the following CLI command:
set monitor dns alert modify port | txid over threshold_value packets | percent
where
port | txid = Enter port to set the threshold for invalid ports, or enter txid to set the threshold for invalid
TXIDs.
threshold_value = Enter the number of packets or percentage for the threshold. packets | percent = Enter packets if you want to track the total packet count, or enter percentage if you
want to track a percentage of the total traffic. For a percentage-based threshold, the appliance does not generate a threshold crossing event if the traffic level is less than 100 packets per minute. For example, if you want the appliance to send a DNS alert when the percentage of DNS responses arriving on invalid ports from UDP port 53 exceeds 70% per minute, you can enter the following command:
set monitor dns alert modify port over 70 percent
If you want the appliance to send a DNS alert when the total number of packets with invalid TXIDs from UDP port 53 is over 100 packets per minute, you can enter the following command:
set monitor dns alert modify txid over 100 packets
When there is a DNS alert, the appliance logs an event in the syslog file and sends an SNMP trap and e-mail notification if enabled.
The appliance displays the threshold information as shown in the following example:
DNS Network Monitoring is enabled. Alerting is enabled. DNS Alert Threshold (per minute)
200
NIOS 4.3r5
Monitoring Tools
Note: When you enable rate limiting, the appliance discards packets based on the configured rate limiting rules. This might affect the DNS performance when the appliance discards valid DNS responses. 3. Enter y to enable rate limiting. When you enable rate limiting, the appliance applies the rate limiting rules that you configured. You might want to configure the rate limiting rules before enabling rate limiting. For information on how to configure rate limiting rules, see Configuring Rate Limiting Rules on page 201. You can also disable rate limiting by entering the following command:
set ip_rate_limit off
When you disable rate limiting, the appliance stops applying the rate limiting rules.
where
all | ip_address = Enter all or 0.0.0.0 if you want to limit all traffic from all sources, or enter the IP
The following are sample commands and descriptions for rate limiting rules: To block all traffic from host 10.10.1.1, enter the following command:
set ip_rate_limit add source 10.10.1.1 limit 0
To limit traffic to five packets per minute from host 10.10.1.2, enter the following command:
set ip_rate_limit add source 10.10.1.2 limit 5/m
To limit the traffic to five packets per minute from host 10.10.2.1/24 with an allowance for burst traffic of 10 packets, enter the following command:
set ip_rate_limit add source 10.10.2.1/24 limit 5/m burst 10
To limit the traffic to 5000 packets per minute from all sources, enter the following command:
set ip_rate_limit add source all limit 5000/m
NIOS 4.3r5
201
or To remove all of the rate limiting rules from all sources, enter:
set ip_rate_limit remove all
To remove one of the existing rules for an existing host: 1. Log in to the Infoblox CLI as a superuser account. 2. Enter the following CLI command:
set ip_rate_limit remove source ip-address[/mask]
202
NIOS 4.3r5
Understanding SNMP on page 204 SNMP MIB Hierarchy on page 205 MIB Objects on page 206 Infoblox MIBs on page 207 Loading the Infoblox MIBs on page 207 ibTrap MIB on page 208 ibPlatformOne MIB on page 231 ibDNSOne MIB on page 242 ibIPWC MIB on page 244 Configuring SNMP on page 249 Accepting SNMP Queries on page 249 Setting System Information on page 249 Adding SNMP Trap Receivers on page 250 Configuring SNMP for a Grid Member on page 250
NIOS 4.3r5
203
Understanding SNMP
You can use SNMP (Simple Network Management Protocol) to manage network devices and monitor their processes. An SNMP-managed device, such as a NIOS appliance, has an SNMP agent that collects data and stores them as objects in MIBs (Management Information Bases). The SNMP agent can also send traps (or notifications) to alert you when certain events occur within the appliance or on the network. You can view data in the SNMP MIBs and receive SNMP traps on a management system running an SNMP management application, such as HP OpenView, IBM Tivoli NetView, or any of the freely available or commercial SNMP management applications on the Internet.
Agent MIB
You can configure a NIOS appliance as an SNMP-managed device. NIOS appliances support SNMP versions 1 and 2, and adhere to the following RFCs:
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) RFC 3413, Simple Network Management Protocol (SNMP) Applications RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) RFC 1155, Structure and identification of Management information for TCP/IP-based internets RFC 1213, Management Information Base for Network Management of TCP/IP-based internets:MIB-II
204
NIOS 4.3r5
(.1) International Organization for Standardization (ISO) (.1.3) ORG (.1.3.6) U.S. Department of Defense (DOD) (.1.3.6.1) Internet (.1.3.6.1.4) Private (.1.3.6.1.4.1) Enterprise (.1.3.6.1.4.1.7779) Infoblox (.1.3.6.1.4.1.7779.3) Infoblox SNMP Tree (.1.3.6.1.4.1.7779.3.1) ibProduct (.1.3.6.1.4.1.7779.3.1.1) ibOne
NIOS 4.3r5
205
MIB Objects
The Infoblox MIB objects were implemented according to the guidelines in RFCs 1155 and 2578. They specify two types of macros for defining MIB objects: OBJECT-TYPE and NOTIFICATION-TYPE. These macros contain clauses that describe the characteristics of an object, such as its syntax and its status. OBJECT-TYPE macros describe MIB objects, and NOTIFICATION-TYPE macros describe objects used in SNMP traps. Each object in the ibPlatformOne, ibDNSone, and ibDHCPOne MIBs contains the following clauses from the OBJECT-TYPE macro: OBJECT-TYPE: Provides the administratively-assigned name of the object. SYNTAX: Identifies the data structure of the object, such as integers, counters, and octet strings. MAX-ACCESS: Identifies the type of access that a management station has to the object. All Infoblox MIB objects provide read-only access. STATUS: Identifies the status of the object. Values are current, obsolete, and deprecated. DESCRIPTION: Provides a textual description of the object. INDEX or AUGMENTS: An object that represents a conceptual row must have either an INDEX or AUGMENTS clause that defines a key for selecting a row in a table. OID: The dotted decimal object identifier that defines the location of the object in the universal MIB tree.
The ibTrap MIB defines the SNMP traps that a NIOS appliance can send. Each object in the ibTrap MIB contains the following clauses from the NOTIFICATION-TYPE macro: NOTIFICATION-TYPE: Provides the administratively-assigned name of the object. OBJECTS: Provides an ordered list of MIB objects that are in the trap. STATUS: Identifies the status of the object. Values are current, obsolete, and deprecated. DESCRIPTION: Provides the notification information.
206
NIOS 4.3r5
Infoblox MIBs
Infoblox MIBs
You can configure a NIOS appliance as an SNMP-managed device so that an SNMP management station can send queries to the appliance and retrieve information from its MIBs. Perform the following tasks to access the Infoblox MIBs: 1. Configure a NIOS appliance to accept queries, as described in Accepting SNMP Queries on page 249. 2. Load the MIB files onto the management system. To obtain the latest Infoblox MIB files: a. c. From the Grid Perspective, select id_grid -> Tools -> Download SNMP MIBs. Click Save. b. In the Save As dialog box, navigate to a directory to which you want to save the MIBs. 3. Use a MIB browser or SNMP management application to query the objects in each MIB. The NIOS appliance allows read-only access to the MIBs. This is equivalent to the Get and Get Next operations in SNMP.
NET-SNMP MIBs
NIOS appliances support NET-SNMP (formerly UCD-SNMP), a collection of applications used to implement the SNMP protocol. When you download the Infoblox MIBs from the Infoblox Support site, you can download some of the NET-SNMP MIBs and load them onto your SNMP management system. The NET-SNMP MIBs provide the top-level infrastructure for the SNMP MIB tree. They define, among other things, the objects in the SNMP traps that the agent sends when the SNMP engine starts and stops. For additional information on NET-SNMP and the MIB files distributed with NET-SNMP, refer to http://net-snmp.sourceforge.net/.
RADIUS MIBs
The NIOS appliance supports the RADIUS-ACC-SERVER-MIB and RADIUS-AUTH-SERVER-MIB. You can download these MIBs along with the Infoblox enterprise MIBs. When you install the RADIUS server license on the appliance and configure RADIUS services, the appliance responds to queries for data from the RADIUS MIBs, if configured to do so. For information on these MIBs, refer to RFC 2619, RADIUS Authentication Server MIB and RFC 2621, RADIUS Accounting Server MIB.
NIOS 4.3r5
207
ibTrap MIB
NIOS appliances send SNMP traps when events, internal process failures, or critical service failures occur. The ibTrap MIB defines the types of traps that a NIOS appliance sends and the value that each MIB object represents. The Infoblox SNMP traps report objects which the ibTrap MIB defines. Figure 6.3 illustrates the ibTrap MIB structure. It provides the OID and textual description for each object. Note: OIDs shown in the illustrations and tables in this section do not include the prefix .1.3.6.1.4.1.7779. The ibTrap MIB comprises two trees, ibTrapOneModule and ibNotificationVarBind. The ibTraponeModule tree contains objects for the types of traps that a NIOS appliance sends. The ibNotificationVarBind tree contains objects that the Infoblox SNMP traps report. You cannot send queries for the objects in this MIB module. The objects are used only in the SNMP traps.
(3.1.1.1.1) ibTrapOneModule (3.1.1.1.1.1.0) ibEquipmentFailureTrap (3.1.1.1.1.2.0) ibProcessingFailureTrap (3.1.1.1.1.3.0) ibThresholdCrossingEvent (3.1.1.1.1.4.0) ibStateChangeEvent (3.1.1.1.1.5.0) ibProcStartStopTrap
(3.1.1.1.2) ibNotificationVarBind (3.1.1.1.2.1.0) ibNodeName (3.1.1.1.2.2.0) ibTrapSeverity (3.1.1.1.2.3.0) ibObjectName (3.1.1.1.2.4.0) ibProbableCause (3.1.1.1.2.5.0) ibSubsystemName (3.1.1.1.2.6.0) ibCurThresholdValue (3.1.1.1.2.7.0) ibThresholdHigh (3.1.1.1.2.8.0) ibThresholdLow (3.1.1.1.2.9.0) ibPreviousState (3.1.1.1.2.10.0) ibCurrentState (3.1.1.1.2.11.0) ibTrapDesc
208
NIOS 4.3r5
Infoblox MIBs
The sample trap lists the OIDs and their corresponding values that can help you identify the cause of the event or problem. You can find the definition for each OID or object and its value using the tables in this section. To identify possible cause and recommended actions for the trap, use the ibTrapDesc tables. For information, see ibTrapDesc (OID 3.1.1.1.2.11.0) on page 218. You can interpret the sample trap as follows: Using the ibTrapOneModule table, you find out that OID 7779.3.1.1.1.1.4.0 represents an Object State Change trap. This type of trap includes the following objects. For each object, the trap displays the OID and its corresponding value. The following is how you can interpret the rest of the trap: ibNodeName (OID 7779.3.1.1.1.2.1.0) Using the ibNotificationVarBind (OID 3.1.1.1.2) table, you find out that OID 7779.3.1.1.1.2.1.0 represents the MIB object ibNodeName, which is the IP address of the appliance on which the trap occurred. Therefore, the statement 7779.3.1.1.1.2.1.0 = STRING: "10.35.1.156" SNMPv2-SMI::enterprises. tells you that the IP address of the appliance on which the trap occurred has an IP address of 10.35.1.156. The statement 7779.3.1.1.1.2.3.0 = STRING: "ntp_sync" SNMPv2-SMI::enterprises. tells you that the MIB object ibOjectName, which is the name of the object for which the trap was generated, has a value of ntp_sync, which represents NTP synchronization issues. ibPreviousState (OID 7779.3.1.1.1.2.9.0) The statement 7779.3.1.1.1.2.9.0 = INTEGER: 15 SNMPv2-SMI::enterprises. tells you that the MIB object ibPreviousState, which indicates the previous state of the appliance, has a value of 15. Using the ibPreviousState and ibCurrentState Values table, you know that 15 represents ntp-sync-up, which means that the NTP server was up and running. The statement 7779.3.1.1.1.2.10.0 = INTEGER: 16 SNMPv2-SMI::enterprises. tells you that the MIB object ibCurrentState, which indicates the current state of the appliance, has a value of 16. Using the ibPreviousState and ibCurrentState Values table, you know that 16 represents ntp-sync-down, which means that the NTP server is now out of sync. The last statement 7779.3.1.1.1.2.11.0 = STRING: "The NTP service is out of synchronization." states the description of the trap. Using the Object State Change Traps table for ibTrapDesc, you can find out the details of the trap description and recommended actions for this problem.
NIOS 4.3r5
209
For a list of trap descriptions, see Equipment Failure Traps on page 218. 3.1.1.1.1.2.0 Processing and Software Failure ibProcessingFailureTrap The NIOS appliance generates this trap when a failure occurs in one of the software processes. This trap includes the following objects: ibNodeName ibTrapSeverity ibSubsystemName ibProbableCause ibTrapDesc
For a list of trap descriptions, see Processing and Software Failure Traps on page 219.
210
NIOS 4.3r5
Infoblox MIBs
OID 3.1.1.1.1.3.0
Description The NIOS appliance generates this trap when any of the following events occur: System memory or disk usage exceeds 90%. A problem occurs when the grid master replicates its database to its grid members. DHCP address usage crosses a watermark threshold. For more information about tracking IP address usage, see Chapter 18, Managing IP Data IPAM, on page 627. The number or percentage of the DNS security alerts exceeds the thresholds of the DNS security alert triggers. ibNodeName ibObjectName (threshold name) ibCurThresholdvalue ibThresholdHigh ibThresholdLow ibTrapDesc
NIOS 4.3r5
211
OID 3.1.1.1.1.5.0
Description The NIOS appliance generates this type of trap when any of the following events occur: When you enable HTTP redirection. When you change the HTTP access setting. When you change the HTTP session time out setting. When a failover occurs in an HA pair configuration. ibNodeName ibSubsystemName ibTrapDesc
For a list of possible trap descriptions, see Process Started and Stopped Traps on page 230.
212
NIOS 4.3r5
Infoblox MIBs
3.1.1.1.2.2.0 3.1.1.1.2.3.0
ibTrapSeverity ibObjectName
The probable cause of the trap. See ibProbableCause Values on page 215 for the definitions of each value. The subsystem for which the trap was generated, such as NTP or SNMP. This object is used in the Processing and Software Failure traps and the Process Start and Stop traps. See ibSubsystemName Values (OID 3.1.1.1.2.9.0) on page 216 for definitions of each value. The current value of the threshold counter. This object is used in the Threshold Crossing traps. The value for the high watermark. This only applies when the appliance sends a trap to indicate that DHCP address usage is above the configured high watermark value for a DHCP address range. This object is used in Threshold Crossing traps. For additional information, see Setting Watermark Properties on page 637. The value for the low watermark. This only applies when the appliance sends a trap to indicate that DHCP address usage went below the configured low watermark value for a DHCP address range. This object is used in Threshold Crossing traps. For additional information, see Setting Watermark Properties on page 637. The previous state of the appliance. This object is used in the Object State Change traps. See ibPreviousState (OID 3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0) on page 217 for definitions of each value.
3.1.1.1.2.6.0 3.1.1.1.2.7.0
ibCurThresholdValue ibThresholdHigh
3.1.1.1.2.8.0
ibThresholdLow
3.1.1.1.2.9.0
ibPreviousState
NIOS 4.3r5
213
OID 3.1.1.1.2.10.0
Description The current state of the appliance. This object is used in the Object State Change traps. See ibPreviousState (OID 3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0) on page 217 for the definition of each value. The description of the trap. This object is used in all types of traps. See ibTrapDesc (OID 3.1.1.1.2.11.0) on page 218 for the description, possible cause, and recommended actions for each Infoblox SNMP trap.
3.1.1.1.2.11.0
ibTrapDesc
214
NIOS 4.3r5
Infoblox MIBs
NIOS 4.3r5
215
OID 3.1.1.2.4.0 ibProbableCause ibOSPFSoftwareFailure ibAuthDHCPNamedSoftwareFailure ibFan1Failure ibFan2Failure ibFan3Failure ibFan1OK ibFan2OK ibFan3OK ibIPWCSoftwareFailure ibFTPDSoftwareFailure ibPowerSupplyOK ibWebUISoftwareFailure ibQIPRemoteServerStopped ibRAIDIsOptimal ibRAIDIsDegraded ibRAIDIsRebuilding ibRAIDStatusUnknown ibRAIDBatteryIsOK ibRAIDBatteryFailed
Value 0 1 2 3 4 5
216
NIOS 4.3r5
Infoblox MIBs
Value 6 7 11 12 13 15 16 17 18 19 20 23 24 25 26 27 28 29 30 31 32 33 34 35
OID 3.1.1.1.2.9.0 ibSubsystemName httpd serial_console controld N/A Snmpd Sshd Ntpd Clusterd Lcd Dhcpd Named Radiusd NTLM Netbiosd Winbindd Tftpd QIP N/A N/A N/A N/A N/A HTTPd OSPF
NIOS 4.3r5
217
Value 4 5 6 7 8 9 10 11 12 13 14 15 16
Description grid-connected grid-disconnected enet-link-up enet-link-down replication-online replication-offline replication-snapshotting service-up service-down ha-replication-online ha-replication-offline ntp-syn-up ntp-syn-down
Definition The appliance is connected to the grid. The appliance is not connected to the grid. The ethernet port link is active. The ethernet port link is inactive. The replication is online. The replication is offline. The replication is snapshotting. The service is up. The service is down. The HA pair replication is online. The HA pair replication is offline. The NTP server is synchronizing. The NTP server is out of sync.
Description/Cause
Recommended Actions
Informational
Power Supply Failure: monitored at 1 minute A power supply failure has occurred. Major The power supply failed. Inspect the power supply for the possible cause of the failure.
218
NIOS 4.3r5
Infoblox MIBs
Description/Cause
Recommended Actions
RAID monitoring, at 1 minute interval A RAID battery failure has occurred. The systems RAID battery is OK. Major The system RAID battery failed. The alert light is red. The system RAID battery is charging and functioning properly. The alert light changed from red to green. The appliance failed to retrieve the RAID array state. The alert light is red. The RAID system is functioning at an optimal state. The RAID system is degrading. The RAID system is rebuilding. Inspect the battery for the possible cause of the failure. No action is required.
Informational
Undetermined
Review the syslog file to identify the possible cause of this problem.
The systems RAID array is now running in an optimal state. The systems RAID array is in a degraded state. The systems RAID array is rebuilding.
Informational
No action is required.
Major
Review the syslog file to identify the possible cause of this problem. No action is required.
Minor
Description/Cause
Recommended Actions
NIOS 4.3r5
219
Description/Cause
Recommended Actions
VitalQIP Remote Server Failure A VitalQIP remote server failure has occurred. Critical The qip-msgd or the qip-rmtd process failed. Review the syslog file to identify the possible cause of this problem.
VitalQIP Remote Server Stopped VitalQIP DNS manually stopped. Critical The VitalQIP DNS service was manually stopped. To start the DNS service, use the
start_service or restart_service
command in the VitalQIP chroot environment. VitalQIP DHCP manually stopped. Critical The VitalQIP DHCP service was manually stopped. To start the DHCP service, use the
start_service or restart_service
command in the VitalQIP chroot environment. VitalQIP DNS and DHCP manually stopped. SSH Daemon Failure An SSH daemon failure has occurred. Major The sshd process failed. Review the syslog file to identify the possible cause of this problem. Critical Both the VitalQIP DNS and DHCP services were manually stopped. To start the DNS and DHCP services, use the start_service command in the VitalQIP chroot environment.
NTP Daemon Failure, monitored every 10 minutes An NTP daemon failure has occurred. Cluster Daemon Failure A cluster daemon failure has occurred. LCD Daemon Failure An LCD daemon failure has occurred. Major The LCD process failed. The alert light is yellow. 1. Inspect the LCD panel for the possible cause of this problem. 2. Review the syslog file to identify the possible cause of this problem. Apache Software httpd failure, monitored every 2 minutes An Apache software failure has occurred. Serial Console Failure An Infoblox serial console software failure has occurred. Major The Infoblox serial console failed. Review the syslog file to identify the possible cause of this problem. Critical The request to monitor the Apache server failed. Review the syslog file to identify the possible cause of this problem. Critical The clusterd process failed. Review the syslog file to identify the possible cause of this problem. Major The ntpd process failed. Review the syslog file to identify the possible cause of this problem.
220
NIOS 4.3r5
Infoblox MIBs
Description/Cause
Recommended Actions
Controld Software Failure A controld failure has occurred. Critical The controld process failed. Review the syslog file to identify the possible cause of this problem.
SNMP Sub-agent Failure An SNMP server failure has occurred. TFTPD and FTPD Failure A TFTPD daemon failure has occurred. An FTPD daemon failure has occurred. Critical Critical The tftpd process failed. The ftpd process failed. Review the syslog file to identify the possible cause of this problem. Review the syslog file to identify the possible cause of this problem. Major The one-subagent process failed. Review the syslog file to identify the possible cause of this problem.
HTTP File Distribution, monitored at 10 second intervals An HTTP file distribution daemon failure has occurred. Critical The HTTP file distribution process failed. Review the syslog file to identify the possible cause of this problem.
auth_named Process Failure An auth named server failure has occurred. Critical The auth_named server failed. Review the syslog file to identify the possible cause of this problem.
IPWC Processes, monitored at 30 second intervals for IB-250 and 10 second intervals for other appliances An IPAM WinConnect server failure has occurred. Critical The IPWC (IPAM WinConnect) 6server failed. Review the syslog file to identify the possible cause of this problem.
DNS ONE quagga Processes (zebra & ospfd) An OSPF routing daemon failure has occurred. Critical Either the zebra process or the ospfd process failed. Review the syslog file to identify the possible cause of this problem.
NIOS 4.3r5
221
ibTrapDesc OID 3.1.1.1.2.11.0 radiusd Monitoring A RADIUS daemon monitoring failure has occurred. Backup Failure Backup failed.
Description/Cause
Recommended Actions
Critical
Review the syslog file to identify the possible cause of this problem.
Not implemented.
The backup failed. One of the following could be the cause of the failure: The appliance could not access a backup directory. The IPAM WinConnect backup failed. The backup was interrupted by one of the following signals: SIGINT, SIGHUP, or SIGTERM. Incorrect login or connection failure in an FTP backup. The backup failed to create temporary files.
Review the syslog file to identify the possible cause of this problem.
Database Backup Failure Database backup failed. Backup Module Failure Module backup failed. Not implemented. The backup of productspecific files failed. Review the syslog file to identify the possible cause of this problem. Not implemented. The db_dump process failed. Review the syslog file to identify the possible cause of this problem.
222
NIOS 4.3r5
Infoblox MIBs
Description/Cause
Recommended Actions
Backup File Size Exceeded File size exceeded the quota. Backup failed. Another backup is in progress. Backup will not be performed. Not implemented. The backup failed because the file size exceeded the limit of 5GB. The backup failed because of an attempt to back up or merge files while another backup or restore was in progress. Limit the size of the backup file to less than 5GB.
Not implemented.
Wait until the backup or restore is complete before starting another backup.
The watchdog process detected a registered client failure on a specific server. The <registered client name> could be one of the following: Clusterd timeout thread DB Sentinel run_server loop Process manager main loop Clusterd monitor Disk monitor
Review the syslog file to identify the possible cause of this problem.
NIOS 4.3r5
223
Description/Cause
Recommended Actions
System Memory Usage System has run out of memory. Major The appliance ran out of memory. The appliance encountered this problem when one of the following occurred: The total free memory on the appliance was less than or equal to 0%. The total physical memory was less than the total free memory. The percentage of free memory compared to the total physical memory was less than 5%, and the free swap percentage was less than 80%. The percentage of free memory compared to the total physical memory was less than 5%, plus the numbers of both swap INs and swap OUTs were greater than or equal to 3,200. The percentage of free memory compared to the total physical memory was between 5% and 10%, the free swap percentage was greater than or equal to 80%, plus the numbers of both swap INs and swap OUTs were greater than or equal to 3,200. The percentage of free memory compared to the total physical memory was greater than 10%, the free swap percentage was less than 80%, plus the numbers of both swap INs and swap OUTs were greater than or equal to 3,200. Review the syslog file to identify the possible cause of this problem.
Note: Free memory = free physical RAM + free cache buffers. The high threshold for swap pages is 3,200.
224
NIOS 4.3r5
Infoblox MIBs
Description/Cause The memory usage on the appliance exceeded 90%. The appliance encountered this problem when one of the following occurred: The percentage of free memory compared to the total physical memory was less than 5%, and the free swap percentage was less than 90%. The percentage of free memory compared to the total physical memory was less than 5%, plus the number of swap INs was less than 3,200 and the number of swap OUTs was greater than or equal to 3,200. The percentage of free memory compared to the total physical memory was between 5% and 10%, and the free swap percentage was less than 80%. The percentage of free memory compared to the total physical memory was greater than 5%, plus the number of swap INs was less than 3,200 and the number of swap OUTs was greater than or equal to 3,200.
Recommended Actions Review the syslog file to identify the possible cause of this problem.
Note: Free memory = free physical RAM + free cache buffers. The high threshold for swap pages is 3,200.
Minor
The memory usage on the system is back to normal from the previous state.
No action is required.
NIOS 4.3r5
225
Description/Cause
Recommended Actions
Primary Hard Drive Usage (monitored every 30 seconds) System primary hard disk usage is over 90%. Minor The primary hard disk usage exceeded 90%. The alert light is yellow. The primary hard disk usage exceeded 95%. The alert light is red. The primary hard disk usage is 85% or lower. The alert light is green. Review the syslog file to identify the possible cause of this problem. Review the syslog file to identify the possible cause of this problem. No action is required.
Minor
Replication Statistics Monitoring Grid queue replication problem. Not implemented. The system encountered this problem when all of the following conditions occurred: The node was online. The number of the replication queue being sent from the master column was greater than 0, or the number of the queue received was greater than 0. It was more than 10 minutes since the last replication queue was sent and monitored. Review the syslog file to identify the possible cause of this problem.
226
NIOS 4.3r5
Infoblox MIBs
Description/Cause
Recommended Actions
DHCP Range Threshold Crossing DHCP threshold crossed: Member: Not implemented. The system encountered this problem when one of the following conditions occurred: The address usage in the DHCP range was greater than the high watermark. The address usage in the DHCP range was less than the low watermark. Review the syslog file to identify the possible cause of this problem.
<total addresses>
DHCP DDNS Updates Deferred DHCP DNS updates deferred: Retried at least once: <number of Not implemented. The DNS updates were deferred because of DDNS update errors. Review the syslog file to identify the possible cause of this problem.
retries>
Maximum number of deferred updates since start of problem episode (or restart): <max
number>
NIOS 4.3r5
227
Description/Cause
Recommended Actions
Database Capacity Usage Over 85% database capacity used. Database capacity used is OK. DNS Monitor DNS Monitor Major DNS security alert. There were actual DNS responses to {invalid ports | with invalid TXID} in the last minute, comprising percent% of all responses. Primary sources: ip_address sent count, ip_address sent count. where 1. Review the following: DNS alert status syslog file 2. Limit access or block connections from the primary sources. For information, see Minor The appliance database usage exceeded 85%. The appliance database usage is less than 85%. Increase the database capacity.
Minor
No action is required.
percent% is the percentage of invalid DNS responses over the total number of DNS responses. ip_address is the IP address of the primary source that generated the invalid DNS responses. count is the number of invalid responses generated by the specified IP address.
Example: DNS security alert. There were 1072 DNS responses to invalid ports in the last minute, comprising 92% of all responses. Primary sources: 10.0.0.0 sent 1058, 2.2.2.2 sent 14.
228
NIOS 4.3r5
Infoblox MIBs
ibTrapDesc OID 3.1.1.1.2.11.0 Service Shutdown Shutting down services due to database snapshot.
Description/Cause
Recommended Actions
Not implemented.
The appliance is shutting down its services while synchronizing the database with the grid master. The appliance is shutting down its services while synchronizing the database with the grid master.
No action is required.
Not implemented.
No action is required.
Network Interfaces Monitoring LAN port link is down. Please check the connection. HA port link is down. Please check the connection. MGMT port link is down. Please check the connection. LAN port link is up. HA port link is up. MGMT port link is up. Major The LAN port is up, but the link is down. The HA port is up, but the link is down. The MGMT port is enabled, but the link is down. The LAN port link is up and running. The HA port link is up and running. The MGMT port link is up and running. Check the LAN link connection.
Major
Major
HA State Change from Initial to Active The node has become ACTIVE. Not implemented. A node in an HA pair becomes active. The HA pair starts up. No action is required.
HA State Change from Passive to Active The node has become ACTIVE. Not implemented. The node changed from a passive to an active node. No action is required.
NIOS 4.3r5
229
Description/Cause A node in an HA pair becomes passive. The HA pair starts up, and the node is not a grid master candidate.
Node Connected to Grid The grid member is connected to the grid master. Not implemented. The grid member joined the grid, and it is not a grid master candidate. No action is required.
Node Disconnected to Grid The grid member is not connected to the grid master. Not implemented. The grid member lost its connection to the grid master. No action is required.
Replication State Monitoring HA replication online. HA replication offline. Not implemented. Not implemented. The replication queue is online. The replication queue is offline. No action is required. No action is required.
NTP is out of sync, monitored every 30 seconds The NTP server is out of synchronization. Major The Infoblox NTP server and the external NTP server are not synchronized. Review the syslog file to identify the possible cause of this problem.
Replication State Monitoring Replication queue is offline. Not implemented. The replication queue is offline. No action is required.
Description/Cause
Recommended Actions
230
NIOS 4.3r5
Infoblox MIBs
ibPlatformOne MIB
The ibPlatformOne MIB provides information about the CPU temperature of the appliance, the replication status, the average latency of DNS requests, DNS security alerts, as well as the CPU and memory utilization of the appliance. Figure 6.4 illustrates the structure of the PlatformOne MIB. (Note that the OIDs in the illustration do not include the prefix .1.3.6.1.4.1.7779.) The ibPlatformOne MIB branches out into the following subtrees: ibCPUTemperature tracks the CPU temperature of the appliance. ibClusterReplicationStatusTable provides information in tabular format about the replication status of the appliance. See ibClusterReplicationStatusTable on page 233 for more information. ibNetworkMonitor provides information about the average latency of authoritative and nonauthoritative replies to DNS queries for different time intervals. It also provides information about invalid DNS responses that arrive on invalid ports or have invalid DNS transaction IDs. See ibNetwork Monitor on page 233 for more information. ibHardwareType provides information about the hardware platform. For an Infoblox appliance, it provides the model number of the Infoblox hardware platform. For virtual appliances, it identifies whether the hardware platform is a Riverbed or Cisco device. For Riverbed devices, it displays the model number as well. ibHardwareId provides the hardware iD of the NIOS appliance. ibSerialNumber provides the serial number of the Infoblox hardware platform. ibNiosVersion provides the version of the NIOS software. ibSystemMonitor provides information about the CPU and memory utilization of the appliance.
NIOS 4.3r5
231
232
NIOS 4.3r5
Infoblox MIBs
ibClusterReplicationStatusTable
This table provides information about the grid replication status.
ibNetwork Monitor
As shown in Figure 6.4, the ibNetwork Monitor has one subtree, ibNetworkMonitorDNS, that branches out into the following: ibNetworkMonitorDNSActive reports on whether DNS latency monitoring is enabled. This is the only object in this branch. When you send a query for this object, the appliance responds with either active or nonactive. ibNetworkMonitorDNSNonAA provides information about the average latency of nonauthoritative replies to DNS queries for 1-, 5-, 15-, and 60-minute intervals. ibNetworkMonitorDNSAA provides information about the average latency of authoritative replies to DNS queries for 1-, 5-, 15-, and 60-minute intervals. ibNetworkMonitorDNSSecurity provides information about the invalid DNS responses that arrive on invalid ports or have invalid DNS transaction IDs. ibNetworkMonitorDNSSecurity branches out into the following: ibNetworkMonitorDNSSecurityInvalidPort ibNetworkMonitorDNSSecurityInvalidTxid ibNetworkMonitorDNSSecurityInvalidPortOnly ibNetworkMonitorDNSSecurityInvalidTxidOnly ibNetworkMonitorDNSSecurityInvalidTxidAndPort For information, see Table 6.9 on page 237.
NIOS 4.3r5
233
234
NIOS 4.3r5
Infoblox MIBs
Table 6.7 describes the objects in ibNetworkMonitorDNSNonAA. You can send queries to retrieve values for these
objects.
ibNetworkMonitorDNSNonAAT1440AvgLatency ibNetworkMonitorDNSNonAAT1440Count
NIOS 4.3r5
235
Table 6.8 describes the objects in ibNetworkMonitorDNSAA. You can send queries to retrieve values for these
objects.
236
NIOS 4.3r5
Infoblox MIBs
Table 6.9 describes the objects in ibNetworkMonitorDNSSecurity. You receive SNMP traps with these objects when
you enable the following: SNMP traps DNS network monitoring DNS alert monitoring
Tracks the number of DNS responses with both of the following conditions: Arrive on valid ports Have Invalid TXIDs
ibNetworkMonitorDNSSecurityInvalidTxidAndPort
Tracks the number of DNS responses with both of the following conditions: Arrive on invalid ports Have invalid TXIDs
NIOS 4.3r5
237
Table 6.10 describes the objects in ibNetworkMonitorDNSSecurityInvalidPort. Table 6.10 ibNetworkMonitorDNSSecurityInvalidPort Objects
Object ibNetworkMonitorDNSSecurityInvalidPort1 ibNetworkMonitorDNSSecurityInvalidPort5 ibNetworkMonitorDNSSecurityInvalidPort15 ibNetworkMonitorDNSSecurityInvalidPort60 ibNetworkMonitorDNSSecurityInvalidPort1440 ibNetworkMonitorDNSSecurityInvalidPortCount Description Tracks the number of invalid DNS responses that arrive on invalid ports in the last one minute. Tracks the number of invalid DNS responses that arrive on invalid ports in the last five minutes. Tracks the number of invalid DNS responses that arrive on invalid ports in the last 15minutes. Tracks the number of invalid DNS responses that arrive on invalid ports in the last 60 minutes. Tracks the number of invalid DNS responses that arrive on invalid ports in the last 24 hours. Tracks the total number of invalid DNS responses that arrive on invalid ports.
ibSystemMonitor
As shown in Figure 6.4, the ibSystemMonitor object has the following subtrees: ibSystemMonitorCpu: Contains ibSystemMonitorCpuUsage that reports the CPU usage of the appliance. ibSystemMonitorMem: Contains ibSystemMonitorMemUsage that reports the memory usage of the appliance.
238
NIOS 4.3r5
Infoblox MIBs
ibDHCPOne MIB
The ibDHCPOne MIB provides information about address usage within a subnet, DHCP lease statistics, and DHCP packet counts. Figure 6.6 illustrates the structure of the ibDHCPOne MIB. (Note that the OIDs shown in the illustration do not include the prefix .1.3.6.1.4.1.7779.) It has three subtrees: ibDHCPSubnetTable, ibDHCPLeaseTable, and ibDHCP Statistics.
NIOS 4.3r5
239
The ibDHCPSubnetTable provides statistical data about the DHCP operations of the appliance. It contains the following objects:
The ibDHCPLeaseTable provides statistics about the DHCP leases. It contains the following objects:
ibDHCPLeaseNextBindState
240
NIOS 4.3r5
Infoblox MIBs
Description Client provided host name during DHCP registration. Client provided UID during DHCP registration. (The UID is a number that uniquely identifies the client machine.)
ibDHCP Statistics maintains counters for different types of packets. The counters always start with zero when you enable DHCP. Therefore the numbers reflect the total number of packets received since DHCP was enabled on the NIOS appliance. The ibDHCPStatistics module contains the following objects:
ibDhcpTotalNoOfRequests
ibDhcpTotalNoOfReleases
ibDhcpTotalNoOfOffers
ibDhcpTotalNoOfAcks
ibDhcpTotalNoOfNacks ibDhcpTotalNoOfDeclines
ibDhcpTotalNoOfInforms
ibDhcpTotalNoOfOthers
NIOS 4.3r5
241
ibDNSOne MIB
The ibDNSOne MIB provides statistical information about the DNS processes and about the views and zones in the database. Figure 6.7 illustrates the structure of the ibDNSOne MIB. (Note that the OIDs shown in the illustration do not include the prefix 1.3.6.1.4.1.7779.) The ibDNSOne MIB contains two subtrees, ibZoneStatisticsTable and the ibZonePlusViewStatisticsTable.
The ibZoneStatisticsTable provides statistical data about the DNS operations on the appliance. The syntax of these objects uses a Counter64 format. In some cases, the counter format may not be compatible with SNMP toolkits that use a 32-bit counter. Ensure that you reconfigure or update these tools to use the Counter64 format. The following table lists the objects and descriptions:
242
NIOS 4.3r5
Infoblox MIBs
Description The number of DNS queries received for non-existent domains. The number of queries received using recursion since the DNS process started. The number of failed queries since the DNS process started.
The ibZonePlusViewStatisticsTable provides statistical data about DNS views and their zones. The following table lists the objects and their OIDS:
NIOS 4.3r5
243
ibIPWC MIB
The ibIPWC MIB defines the objects in the WinConnect MIB module as well as the types of traps that an IPAM WinConnect server sends. If you use the Infoblox IPAM WinConnect service, you must download the ibIPWC MIB. (For information about IPAM WinConnect, see Chapter 22, IPAM WinConnect, on page 711.) Figure 6.10 illustrates the structure of the IPWC MiB. The OIDs in the illustration do not include the prefix 1.3.6.4.1.25558. where 25558 is the IANA-assigned enterprise number for Ipanto. (Note that Ipanto is the former name of WinConnect.) The ibIPWC MIB branches out into two subtrees: ssp: The ssp tree contains objects that provide information about the WinConnect server and its client. ssp branches out into two subtrees, sipd and aipd. See tables 6.18 to 6.23 for information about the objects and their definitions in the sipd and aipd trees. traps: The traps tree provides information about the SNMP traps that the IPAM WinConnect server sends. See Table 6.23 for a list of traps that the WinConnect server generates.
See Tables 6.22 and 6.23 for details of the db tree and its subtrees.
244
NIOS 4.3r5
Infoblox MIBs
The sipd tree contains objects that provide information about the WinConnect server and its client. Table 6.17 lists the objects and their descriptions in the sipd tree.
Contains objects that provide licensing information about the WinConnect server. This subtree contains two objects: date: DEPRECATED. hostCount: The number of licensed hosts.
client db error
Contains objects that provide information about the WinConnect client. See Table 6.19 for details. Contains objects that provide information about the WinConnect database. See Table 6.21 for details. Contains objects that provide information about the error messages that the WinConnect server generates. This subtree contains two objects: description: The error description. code: The error code. name: The scheduled job name. date: The date of the last WinConnect server backup.
job backup
The aipd tree contains information about objects that provide information about the WinConnect connector. Table 6.18 lists the objects and their descriptions in the aipd tree.
NIOS 4.3r5
245
The client tree under sipd contains objects that provide information about the WinConnect client. Table 6.19 lists the objects and their descriptions in the client tree.
Contains objects that provide information about the WinConnect connector. See Table 6.20 for details.
The agent tree under client contains objects that provide information about the WinConnect connector. Table 6.20 lists the objects and their descriptions in the agent tree.
The db tree under sipd contains objects that provide information about the WinConnect database. Table 6.21 lists the objects and their descriptions in the db tree.
Table 6.21 db
Object organization dhcp dns Description The organization that owns the object in the WinConnect database. Contains objects that provide information about the IP addresses in the database. See Table 6.22 for details. Contains one object: subnet zone: The DNS zone. Contains one object: name: The zone name in the WinConnect database. Contains three objects: clockskew address: The subnet address. mask: The subnet mask. rate: The occupation rate of the subnet.
DEPRECATED.
246
NIOS 4.3r5
Infoblox MIBs
The dhcp tree under db contains objects that provide information about the IP addresses in the WinConnect database. Table 6.22 lists the objects and their descriptions in the dhcp tree.
The WinConnect server generates traps to notify the SNMP monitoring device of events. Table 6.23 lists the types of traps that the WinConnect server sends.
NIOS 4.3r5
247
Object sychroSuccess synchroFailed serviceStarted serviceStopped controlStart controlStop controlRestart controlReload unreachable poolCapacityWarning poolCapacityFull subnetCapacityWarning subnetCapacityFull jobErrorGeneration jobWarningGeneration jobErrorExecution discoverWarning restoreError restoreSuccess backupError backupSuccess cwServerSynchro applySubnetTemplateSuccess applySubnetTemplateFailure
Description DEPRECATED. DEPRECATED. The WinConnect connector informed WinConnect that the current service status is running. The WinConnect connector informed WinConnect that the current service status is stopped. A user requested to start a specific service. A user requested to stop a specific service. A user requested to restart a specific service. A user requested to reload a DNS zone. WinConnect could not contact the WinConnect connector. Over 90% of the IP addresses in the address pool have been assigned. 100% of the IP addresses in the address pool have been assigned. Over 90% of the subnet has been assigned. 100% of the subnet has been assigned. The command for a scheduled job failed and generated an error. Check the logs on the WinConnect server for the error. A scheduled job completed with warning. Check the logs on the WinConnect server for the warning. A scheduled job execution failed. The command for network discovery completed with a warning. Check the logs on the WinConnect server for the warning. The restore process completed with errors. Check the logs on the WinConnect server for the errors. The restore process completed successfully. The backup process completed with errors. Check the logs on the WinConnect server for the errors. The backup process completed successfully. The synchronization process with the CiscoWorks server is starting. WinConnect successfully applied the subnet template. WinConnect failed to apply the subnet template.
248
NIOS 4.3r5
Configuring SNMP
Configuring SNMP
Perform the following tasks to configure SNMP on the NIOS appliance: Enable the NIOS appliance to accept queries and define the community string that management systems must specify when they send queries to the appliance. Specify the management systems to which the appliance sends traps.
For a grid, you can perform these tasks at the grid level and at the member level. You can define SNMP settings for an entire grid, and when necessary, define different SNMP settings for a member. SNMP settings for a member override SNMP settings for a grid. You can also set up SNMP on an independent appliance or HA pair.
After you enter these values on the appliance, administrators can send queries for these values from management systems that are allowed to send queries to the appliance. To enter system information: 1. From the Grid perspective, click + (for grid) -> + (for Members) -> member -> Edit -> Member Properties. or From the Device perspective, click Device -> host_name -> Edit -> Device Properties. 2. In the Grid or Device editor, click Monitoring, and then enter the following: Set objects: Select check box. sysContact: Enter the name of the contact person for the appliance. sysLocation: Enter the physical location of the appliance.
NIOS 4.3r5
249
sysName: Enter the fully qualified domain name of the appliance. sysDescr: Enter useful information about the appliance, such as the software version it is running. 3. Click the Save icon to save your settings.
Enable traps: Select the check box to enable the grid member to send traps to specified SNMP management systems. Clear the check box to disable the member from sending SNMP traps. Community String: Type a community stringwhich is very much like a passwordthat the grid member must include when sending traps to the specified SNMP management systems. Trap Receiver Group: Type the IP address of an SNMP management system to which you want the grid member to send traps in the IP Address field, and then click Add. To remove an IP address from the list, select the address, and then click Delete. sysContact: Enter the name of the contact person for the appliance. sysLocation: Enter the physical location of the appliance. sysName: Enter the fully qualified domain name of the appliance. sysDescr: Enter useful information about the appliance, such as the software version it is running.
250
NIOS 4.3r5
Upgrading NIOS Software on page 252 Downgrading Software on page 252 Reverting to the Previously Running Software Version on page 252 Backing Up and Restoring a Configuration File on page 253 Backing Up Files on page 253 Automatically Backing Up a Data File on page 254 Downloading a Backup File on page 255 Restoring a Configuration File on page 257 Loading a Configuration File on a Different Appliance on page 258 Downloading a Support Bundle on page 259
NIOS 4.3r5
251
Downgrading Software
Each Infoblox appliance model has a minimum required release of Infoblox software. Before downgrading an appliance, refer to the document, Minimum Required Release Software for Hardware Platforms, that was shipped with your product. The downgrade procedure is for single independent appliances only. Infoblox does not support software downgrades for grid members, but you can revert to the last grid upgrade file (see the next section) on a grid master. Caution: Although the downgrade process preserves license information and basic network settings, it does not preserve data. After you complete the downgrade procedure, all data in the database is lost. To downgrade software on a single independent appliance running NIOS 4.0 or later: 1. For an appliance running DNSone with Grid: From the Grid perspective, click Grid -> Downgrade. or For an appliance running DNSone: From the Device perspective, click Device -> Downgrade. 2. Read the warning carefully, and then click OK to confirm your decision to downgrade. 3. Navigate to the downgrade image file, and then click OK. 4. Clear the Java cache on your system. 5. Close the browser, open another browser instance, and then log back in.
252
NIOS 4.3r5
Backing Up Files on page 253 Automatically Backing Up a Data File on page 254 Downloading a Backup File on page 255 Restoring a Configuration File on page 257 Loading a Configuration File on a Different Appliance on page 258
Note: Infoblox highly recommends you always back up the current configuration file before upgrading, restoring, or reverting the software on the appliance.
Backing Up Files
You can back up system files periodically and on demand. You can then restore the files on the same appliance or on a different appliance. For information about restoring files, see Restoring a Configuration File on page 257. You can configure the appliance to automatically back up the files on a weekly, daily, or hourly basis. Infoblox recommends that you back up the system files during off-hours to minimize any effect on network services. By default, the automatic backup function is turned off. You must log in with a superuser account to back up files. You can back up system files as follows: To a local directory or the management system used to operate the appliance To a TFTP server To an FTP server. This option requires that you have a valid user name and password for the server prior to attempting to back up. To an SSH server that supports SCP. This option requires that you have a valid user name and password for the server prior to attempting to back up.
Local Backup
When you back up the system files locally, the appliance uses the following format to name the file: year_month_day_time. For example, 2008_11_30_23_00 translates to November 30th, 2008 at 11:00 PM. The appliance saves up to 20 configuration files, regardless of how often files are saved (weekly, hourly, or daily. The size of the configuration file should be factored because the storage limit on an appliance is 5 Gb (gigabytes). If your configuration file is 500 Mb (megabytes), then the appliance stores 10 configuration files. When uploading configuration files on to a TFTP, FTP, or SCP server, you must consider the file size on that server as well.
Using TFTP
TFTP is a client-server protocol that uses UDP as its transport protocol. It does not provide authentication or encryption, therefore it does not require a user name or password. When you back up the system files to a TFTP server, you merely have to select the backup file you want to download, enter the name that it is stored under on the FTP server and the server IP address.
NIOS 4.3r5
253
Using FTP
FTP is a client-server protocol used to exchange files over TCP-based networks. The appliance, as the FTP client, connects to a remote FTP server that you identify. When you use FTP to back up the system files, the password and file contents are transmitted in clear text and may be intercepted by other users. When you back up the system files to an FTP server, the appliance, as the FTP client, logs on to the FTP server. You must specify the user name and password the appliance uses to log on to the FTP server. The user account must have write permission to the directory to which the appliance uploads the backup file.
Using SCP
SCP is more secure than TFTP and FTP. It uses the SSH protocol to provide authentication and security. You can use SCP to back up the NIOS system files to a server running SSHv2. When you use SCP to back up the system files to an SSH server, you must specify the user name and password the appliance uses to log on to the server. The user account must have write permission to the directory to which the appliance uploads the backup file. In addition, make sure that you enter the correct IP address of the SSH server; the appliance does not check the credentials of the SSH server to which it connects.
254
NIOS 4.3r5
Directory Path: Type a directory path, for example: /archive/backups. The directory and file names cannot have spaces. The directory path must contain forward slashes (/). The folder or directory you type must already exist on the specified server. Disable schedule backups: Select this check box if you want to disable automatic backups from occurring, but want to save the settings for future use. 4. Click the Save icon.
NIOS 4.3r5
255
Username on FTP server: Type the user name for your FTP account. This account must have write permission to the directory to which the appliance uploads the backup file. Password on FTP server: Type the password for your FTP account in this field and in the Re-type Password on FTP server field. 3. To download the specified backup file to the specified FTP server, click OK. To backup a grid or an independent appliance or HA pair to an SCP server: 1. From the Grid perspective, click Grid -> Backup -> to SCP Server. or From the Device perspective, click Device -> Backup -> to SCP Server. 2. Enter the following in the SCP Backup dialog box: Existing backup files: To back up the current configuration and data set, choose None. To download a previously made backup file (made using the scheduled backup feature), choose the backup file name. File name on SCP server: You can enter the directory path and name for the backup file. If you enter a directory path and file name, the directory and file names must not contain spaces and you must use forward slashes; for example, archive/backup. If you do not specify a directory path, the appliance uploads the backup file to the root directory. You can leave this field blank if you are downloading a previously made backup file and want to use that name. A NIOS appliance names backup files by concatenating the grid name or hostname with the date and time it creates the file. IP address of SCP server: Type the IP address of the SCP server. Username on SCP server: Type the user name for your SCP account. This account must have write permission to the directory to which the appliance uploads the backup file. Password on SCP server: Type the password for your SCP account in this field and in the Re-type Password on SCP server field. 3. To download the specified backup file to the specified SCP server, click OK.
256
NIOS 4.3r5
To restore a configuration file to the same independent appliance or grid master: 1. From the Grid perspective, click Grid -> Restore Grid -> From Local File or From TFTP Server or From FTP Server or From Grid Master. or From the Device perspective, click Device -> Restore Device -> From Local File or From TFTP Server or From FTP Server or From Grid. 2. Do one of the following: From Local File: Navigate to the location of the configuration file, select the file, and then click OK. or From TFTP Server: In the Restore Grid From TFTP dialog box, enter the following, and then click OK: or From FTP Server: In the Restore Grid From FTP dialog box, enter the following, and then click OK: or From Grid Master: Select a configuration file from the drop-down list, and then click OK. 3. When the Confirm Grid Restore message appears, click OK to load the configuration file. After the file loads, the appliance reboots. 4. Close your current browser window or JWS (Java Web Start) application, wait a few minutes, and then reconnect to the NIOS appliance. FTP Server IP address: Type the IP address of the FTP server in whose root directory the backup file is stored. File Name: Type the name of the backup file. Do not include .tar.gz at the end of the file name. User Name: Type the name of the FTP server account. Password: Type the password of the FTP server account. Retype Password: To ensure accuracy, type the account password again. File Path: Type the directory path to where the backup file is stored. TFTP Server IP Address: Type the IP address of the TFTP server in whose root directory the backup file is stored. File Name: Type the name of the backup file. (Because the file must be in .tar.gz format, the file type is included as a read-only extension of the file name.) File Path: Type the directory path to where the backup file is stored.
NIOS 4.3r5
257
3. When the Confirm Grid Restore confirmation message appears, click OK to load the backup file. After the file loads, the appliance reboots. 4. Close your current browser window or JWS (Java Web Start) application, wait a few minutes, and then reconnect to the NIOS appliance.
258
NIOS 4.3r5
NIOS 4.3r5
259
260
NIOS 4.3r5
NIOS 4.3r5
261
262
NIOS 4.3r5
Independent Deployment Overview on page 264 Deploying a Single Independent Appliance on page 265 Method 1 Using the LCD on page 266 Method 2 Using the CLI on page 266 Method 3 Using the Infoblox NIOS Startup Wizard on page 268 Method 4 Using the GUI on page 269 Configuration Example: Deploying a NIOS Appliance for External DNS on page 270 Deploying an Independent HA Pair on page 277 Method 1 Using the Infoblox NIOS Startup Wizard on page 279 Method 2 Using the GUI on page 281 Configuration Example: Configuring an HA Pair for Internal DNS and DHCP on page 283 Verifying the Deployment on page 295 Single Independent Appliance on page 295 Independent HA Pair on page 295 Forcing an HA Failover on page 295 Infoblox Tools for Migrating Data on page 296 Upgrading Software on an Independent Appliance or HA Pair on page 297 Acquiring Software Upgrade Files on page 297 Distributing Software Upgrade Files on page 297 Running the Software Upgrade on page 297
NIOS 4.3r5
263
The ISP hosts a secondary DNS server for the corp100.com domain.
A NIOS appliance is the primary DNS server for the corp100.com domain. It answers queries from the Internet for public-facing servers in the DMZ network. Firewall
DMZ
Switch Internal Network LAN or LAN1 Port Servers for Public Access
Using primary and secondary name servers provides DNS protocol redundancy and configuring two DHCP servers as DHCP failover peers provides DHCP protocol redundancy. However, you can only have hardware redundancy if you deploy appliances in an HA (high availability) pair. Should the active node in an HA pair fail, the passive node becomes active and begins serving data, as shown in Figure 8.2.
DMZ
The following sections describe the procedures for deploying independent appliances singly and in HA pairs.
264
NIOS 4.3r5
Note: On Infoblox-500, -1000, and -1200 appliances, the LAN port is labeled LAN. On Infoblox-250, -550, -550-A, -1050, -1050-A, -1550, -1550-A, -1552, -1552-A, and -2000 appliances, use the port labeled LAN1. Infoblox provides the following methods for performing a basic configuration to deploy a single independent appliance:
These methods are explained in the following subsections. After you set the network settings, you can then migrate data and settings from legacy DNS and DHCP servers to the NIOS appliances. Several tools and methods are available for migrating data and configuration settings. For a list of the available options, see Infoblox Tools for Migrating Data on page 296.
NIOS 4.3r5
265
Infoblox
LCD Navigation Buttons
You can deploy a single independent NIOS appliance by setting its LAN or LAN1 port IP address, netmask, and gateway through the LCD. This is the simplest method because you do not need anything other than physical access to the appliance to complete the initial configuration. 1. Connect the power cable from the NIOS appliance to a power source and turn on the power. At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls repeatedly through a series of display screens. 2. To change the network settings for the LAN or LAN1 port, press one of the navigation buttons. The LCD immediately goes into input mode, in which you can enter the IP address, netmask, and gateway for the LAN or LAN1 port. 3. Use the navigation buttons to enter an IP address, netmask, and gateway address for the LAN or LAN1 port. 4. Cable the LAN or LAN1 port of the NIOS appliance to a network as described in Independent Appliance Cabling Using the LAN or Serial Port on page 825.
266
NIOS 4.3r5
2. Using a serial terminal emulation program such as Hilgraeve Hyperterminal (provided with Windows operating systems), launch a session. The connection settings are: Bits per second: 9600 Data bits: 8 Parity: None Stop bits: 1 Flow control: Xon/Xoff 3. Log in using the default user name and password admin and infoblox . User names and passwords are case-sensitive. 4. To change the network settings from the default, enter the set network command. Then enter information as prompted to change the IP address, netmask, and gateway for the LAN or LAN1 port. Note: In the following commands, the variable ip_addr1 is the IP address of the LAN or LAN1 port and ip_addr2 is the IP address of the gateway for the subnet on which you set the ip_addr1 address.
Infoblox > set network NOTICE: All HA configuration is performed from the GUI. This interface is used only to configure a standalone node or to join a grid. Enter IP address: ip_addr1 Enter netmask: [Default: 255.255.255.0]: netmask Enter gateway address [Default: n.n.n.1]: ip_addr2 Become grid member? (y or n): n
After you confirm your network settings, the Infoblox application automatically restarts. 5. Cable the LAN or LAN1 port to a network as described in Independent Appliance Cabling Using the LAN or Serial Port on page 825.
NIOS 4.3r5
267
268
NIOS 4.3r5
Enter or Select Enable NTP: (select) NTP Server List: ip_addr3 (click Add) Time zone: (choose the time zone for the location of the appliance)
Note: The startup wizard provides options such as not changing the default password and manually entering the time and date. However, changing the password and using an NTP server provide increased security and accuracy (respectively), and so these choices are presented above. The last screen of the startup wizard states that the changed settings require the application to restart. When you click Finish, it restarts. 6. Open a new web browser instance and make an HTTPS connection to the new IP address of the LAN or LAN1 port. 7. Log back in using the default user name (admin ) and your new password. When you log in the second time, you access the Infoblox GUI application. For system requirements to use the GUI, see Management System Requirements on page 41.
When you create the corp100.com zone on the NIOS appliance, you import zone data from the legacy DNS server at 10.1.5.3.
Internet ISP
ethernet2 10.1.5.1/24 NIOS appliance External Primary DNS Server ns1: 10.1.5.2 Switch Legacy Primary DNS Server ns1: 10.1.5.3 (Replaced by the NIOS appliance)
www 10.1.5.5
ftp 10.1.5.7
To Internal Network
mail 10.1.5.6
The NIOS appliance is the external primary DNS server for the corp100.com domain. It answers queries from the Internet for the three public-facing servers in the DMZ network:
270
NIOS 4.3r5
LCD
The NIOS appliance has an LCD and navigation buttons on its front panel. At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls repeatedly through a series of display screens. 1. To change the network settings from the default, press one of the navigation buttons. The LCD immediately goes into input mode, in which you can enter the IP address, netmask, and gateway for the LAN1 port. 2. Use the navigation buttons to enter the following information: IP Address: 10.1.5.2 Netmask: 255.255.255.0 Gateway: 10.1.5.1
Console Port
The NIOS appliance has a male DB-9 console port on the front panel. You can log in to the appliance through this port and specify initial network settings using the Infoblox CLI. 1. Connect a console cable from the console port of the management system to the console port of the NIOS appliance. 2. Access the Infoblox CLI. For more information about the Infoblox CLI, refer to the Infoblox CLI Guide. 3. To change the network settings from the default, enter the set network command. Then enter information as prompted to change the IP address, netmask, and gateway for the LAN1 port.
Infoblox > set network NOTICE: All HA configuration is performed from the GUI. This interface is used only to configure a standalone node or to join a grid. Enter IP address: 10.1.5.2 Enter netmask: [Default: 255.255.255.0]: Enter gateway address [Default: 10.1.5.1]: Become grid member? (y or n): n
After you confirm your network settings, the appliance automatically restarts.
NIOS 4.3r5
271
1. Open a browser window and enter https://10.1.5.2. 2. Accept the certificate when prompted. Several certificate warnings appear during the login process. This is normal because the preloaded certificate is self-signed (and, therefore, is not in the trusted certificate stores in your browser, Java application, and Java Web Start application) and has the hostname www.infoblox.com, which does not match the destination IP address you entered in step 1. To stop the warning messages from occurring each time you log in to the GUI, you can generate a new self-signed certificate or import a third-party certificate with a common name that matches the FQDN (fully-qualified domain name) of the appliance. This is a very simple process. For information about certificates, see Managing Certificates on page 51. 3. Click LAUNCH DEVICE MANAGER. 4. If the browser prompts you for an application to use, see Accessing the Infoblox GUI on page 41. 5. Log in using the default user name and password admin and infoblox. Note: User names and passwords are case-sensitive. 6. The Infoblox Appliance Startup Wizard opens with a splash screen that provides basic information about the wizard, and then displays license agreement information. Beginning on the third screen, enter the following: Wizard Screen Deployment type Node type Node information Default password Time settings Enter or Select Standalone Standalone appliance Host name: ns1.corp100.com Change admins password: (select), SnD34n534 Enable NTP: (select) NTP Server: 3.3.3.3 (click Add) Time zone: (UMT 8:00 Pacific Time (US and Canada), Tijuana
The last screen of the wizard states that the changed settings require the application to restart. When you click Finish, the Infoblox GUI application restarts. 7. Log back in to the appliance. When you log in the second time, you access the Infoblox GUI application. For system requirements to use the GUI, see Management System Requirements on page 41.
272
NIOS 4.3r5
For a Single Zone To set the allow-transfer statement in the named.conf file for the corp100.com zone:
zone "corp100.com" in { type master; allow-transfer {10.1.5.2;}; notify yes; };
2. After editing the named.conf file, restart DNS service for the change to take effect.
NIOS 4.3r5
273
274
NIOS 4.3r5
7. Enter the following information, and then click OK to close the dialog box: Name: ns2.corp100.com IP Address: 2.2.2.2 Stealth: Clear check box. 8. Click the Save and Restart Services icons. 9. Edit the zone that you just created as follows: in the DNS Views panel of the DNS perspective, click + (for Forward Mapping Zones) -> corp100.com -> Edit -> Authoritative Zone Properties. Note: To import zone data, you must first create a zone, save it, and then edit it. 10. In the Forward Authoritative Zone editor, click Settings and enter the following: E-mail address: admin@corp100.com Import zone from: Select check box, and enter 10.1.5.3 in the adjacent text field. 11. Click the Save icon. 12. After successfully importing the zone data, click corp100.com in the DNS Views panel. You can see all the imported forward-mapping zone data in the Records panel. Because you have not yet imported the reverse-mapping zone data, most of the records appear as A records. 13. From the DNS perspective, click DNS Views -> + (for DNS Views) -> + (for default) -> Reverse Mapping Zones -> Edit -> Add Reverse Mapping Zone -> Authoritative. 14. In the Authoritative Zone Properties section of the Add Reverse Authoritative Zone editor, enter the following: Network Address: 1.1.1.0 Subnet Mask: /24 (255.255.255.0) Comment: External DNS zone 15. In the Primary Server Assignment section, click Select Member to open the Select Grid Member dialog box. 16. Select ns1.corp100.com, and then click OK to close the dialog box. 17. In the Secondary Server Assignment section, click Add in the External Secondaries table to open the Zone External Secondary Server dialog box. 18. Enter the following information, and then click OK to close the dialog box: Name: ns2.corp100.com IP Address: 2.2.2.2 Stealth: Clear check box. 19. Click the Save icon. 20. In the DNS Views panel of the DNS perspective, click + (for Reverse Mapping Zones) -> 1.1.1.in-addr.arpa -> Edit -> Authoritative Zone Properties. 21. In the Authoritative Reverse Zone editor, click Settings and enter the following: E-mail address: admin@corp100.com Import zone from: Select check box, and enter 10.1.5.3 in the adjacent text field. 22. Click the Save and Restart Services icons. 23. Click 1.1.1.in-addr.arpa -> View -> Records. You can see all the imported reverse-mapping zone data in the Records panel. 24. Click corp100.com in the Forward Mapping Zones list. Because you have now imported both the forward- and reverse-mapping zone data, most of the records appear as host records. 25. Finally, you must remove the ns1 host record for the legacy server (value 1.1.1.3). To remove it, select ns1 (the host record for 1.1.1.3), and then click Edit -> Remove.
NIOS 4.3r5
275
Designate the New Primary on the Secondary Name Server (at the ISP Site)
In this example, the external secondary name server is maintained by an ISP, so you must contact your ISP administrator to change the IP address of the primary (or master) name server. (If you have administrative access to the secondary name server, you can make this change yourself.) Because a firewall performing NAT exists between the secondary and primary name servers, specify the NAT address 1.1.1.2 for the primary name server instead of 10.1.5.2.
2. After editing the named.conf file, restart DNS service for the change to take effect.
At this point, the new DNS server can take over DNS service from the legacy server. You can remove the legacy server and unset any firewall policies permitting traffic to and from 10.1.5.3.
276
NIOS 4.3r5
Figure 8.6 VIP Address and Virtual MAC Address and HA Failover
Infoblox HA Pair bloxSYNC Node 1 Active HA Port VIP and Virtual MAC Address Encrypted VPN Tunnel Node 2 Passive HA Port
The clients always make service requests toand receive replies fromthe VIP and virtual MAC address.
The HA ports on each node of an HA pair share the VIP (virtual IP) address and virtual MAC address. Because Node 1 is currently active, it owns these addresses.
Network Clients
After an HA Failover
Node 1 Passive HA Port VIP and Virtual MAC Address Node 2 Active HA Port
The clients still make service requests toand receive replies fromthe same VIP and virtual MAC address.
After an HA failover occurs, Node 2 becomes the active node. Because Node 2 is now active, it now owns the VIP address and virtual MAC address.
Network Clients
NIOS 4.3r5
277
The two nodes in an HA pair include a VRID (virtual router ID) in all VRRP advertisements and use it to recognize VRRP advertisements intended just for themselves. Only another appliance on the same subnet configured to use the same VRID responds to the announcements. The VRID must be a unique number between 1 and 255 for the subnet on which the HA pair is located. (There is no default VRID number.) For more information, see RFC 3768, Virtual Router Redundancy Protocol (VRRP), and also VRRP Advertisements on page 311.
Any device on that subnet that is not configured to listen for VRRP advertisements with VRID 10 drops the packet.
Subnet
To deploy an independent HA pair, you cable the HA and LAN (or LAN1) or LAN2 ports to the network and configure the IP settings for these ports and the VIP address within the same subnet. Note: On Infoblox-500, -1000, and -1200 appliances, the LAN port is labeled LAN . On Infoblox-250, -550, -550-A, -1050, -1050-A, -1550, -1550-A, -1552, -1552-A, and -2000 appliances, use the port labeled LAN1. The default LAN or LAN2 settings are as follows: IP address: 192.168.1.2 Netmask: 255.255.255.0 Gateway: 192.168.1.1.
Note: By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type (full or half duplex) on the physical links between its LAN (or LAN1), HA, and MGMT ports and the ethernet ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal settings, see Modifying Ethernet Port Settings on page 148 for steps you can take to resolve the problem.
Configuring Node 1
1. Open a web browser and make an HTTPS connection to the IP address of the LAN or LAN1 port of Node 1. Several certificate warnings appear during the login process. This is normal because the preloaded certificate is self-signed (and, therefore, is not in the trusted certificate stores in your browser, Java application, and Java Web Start application) and has the hostname www.infoblox.com, which does not match the destination IP address you entered in step 1. To stop the warning messages from occurring each time you log in to the GUI, you can generate a new self-signed certificate or import a third-party certificate with a common name that matches the FQDN (fully qualified domain name) of the appliance. This is a very simple process. For information about certificates, see Managing Certificates on page 51. 2. Click LAUNCH DEVICE MANAGER. 3. Log in to Node 1. For detailed information about logging in to the GUI, see Accessing the Infoblox GUI on page 41. The Infoblox NIOS Startup Wizard appears. The first screen provides basic information about the wizard, and the second screen displays license agreement information. 4. Beginning on the third screen, enter the following, where string1 is a text string that the two nodes use to authenticate each other when establishing a VPN tunnel for ensuing bloxSYNC traffic. (The default grid name is Infoblox.) string2 is a text string that both nodes use as a shared secret to authenticate each other when establishing a VPN tunnel for ensuing bloxSYNC traffic. (The default shared secret is test.)
NIOS 4.3r5 Infoblox Administrator Guide (Rev. A) 279
vip_addr and netmask are the VIP (virtual IP) address and its netmask. ip_addr1 is the IP address of the gateway for the subnet on which the LAN or LAN1 port is set. hostname is a valid domain name for the appliance. ip_addr2-5 are the IP addresses of the LAN and HA ports for Nodes 1 and 2. number is the VRID (virtual router ID). This must be a unique VRID numberfrom 1 to 255for this subnet. string3 is a single alphanumeric string (no spaces) for a password that is at least four characters long. ip_addr6 is the IP address of an NTP (Network Time Protocol) server. Wizard Screen Deployment Type Independent Device Deployment Type HA Pair Settings Node 1 Network Settings Enter or Select Independent Device or HA Pair HA Node 1 HA Pair Name: string1 Shared Secret: string2 VIP Address: vip_addr Netmask: netmask Gateway: ip_addr1 Host Name: hostname Node 1: LAN/LAN1 Address: ip_addr2 HA Address: ip_addr3 Node 2: LAN/LAN1 Address: ip_addr4 HA Address: ip_addr5 Virtual Router ID: number Admin Account Password Time Settings Change Admin Password: (select), string3 Enable NTP: (select) NTP Server List: ip_addr6 (click Add) Time zone: (choose the time zone for the location of the appliance)
Note: The startup wizard provides options such as not changing the default password and manually entering the time and date. However, changing the password and using an NTP server improve security and accuracy (respectively), and so these choices are presented above. The last screen of the startup wizard states that the changed settings require the appliance to restart. When you click Finish, the appliance restarts.
280
NIOS 4.3r5
Configuring Node 2
1. Open a new browser instance and make an HTTPS connection to the IP address of the LAN or LAN1 port of Node 2. 2. The Infoblox NIOS Startup Wizard opens with a splash screen that provides basic information about the wizard, and then displays license agreement information. Beginning on the third wizard screen, enter the following to set up Node 2 (the variables are explained in the previous section for Node 1): Wizard Screen Deployment Type Independent Device Deployment Type Node 2 Network Settings Enter or Select Independent Device or HA Pair HA Node 2 IP Address: ip_addr4 Netmask: netmask Gateway: ip_addr1 HA Pair Properties Virtual IP Address: vip_addr HA Pair Name: string1 Shared Secret: string2 The setup of the HA pair is complete. When you next make an HTTPS connection to the HA pair, use the VIP address.
Note: By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type (full or half duplex) on the physical links between its LAN (or LAN1), HA, and MGMT ports and the ethernet ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal settings, see Modifying Ethernet Port Settings on page 148 for steps you can take to resolve the problem.
Configuring Node 1
1. Open a web browser and make an HTTPS connection to the IP address of the LAN or LAN1 port of Node 1. 2. Click LAUNCH DEVICE MANAGER. 3. Log in to Node 1. For detailed information about logging in to the GUI, see Accessing the Infoblox GUI on page 41. The Infoblox NIOS Startup Wizard appears. 4. To bypass the wizard and access the Device Manager GUI, click Cancel or the Close button (). 5. From the Device perspective, click hostname -> Edit -> Device Properties. Note: (For the DNSone with Grid package) From the Grid perspective, click + (for Infoblox) -> + (for Members) -> hostname -> Edit -> Member Properties. 6. In the Device editor, click Device Properties, and then enter the following network settings: Host Name: Type the FQDN (fully qualified domain name) for the HA pair. (V)IP Address: Type the VIP (virtual IP) address for the HA pair. Subnet Mask: Choose the netmask for the subnet to which the VIP address connects. Gateway: Type the IP address of the default gateway of the subnet to which the VIP address connects. Comment: Type a comment that provides some useful information about the HA pair, such as its location. High-availability Pair: (select) Virtual Router ID: Enter a unique VRID numberfrom 1 to 255for the local subnet. Note: The VIP address and the IP addresses for all the following ports must be in the same subnet. Node #1: LAN Address: Enter an IP address for the LAN (or LAN1) port of Node 1. HA Address: Enter an IP address for the HA port of Node 1. LAN Address: Enter an IP address for the LAN (or LAN1) port of Node 2. HA Address: Enter an IP address for the HA port of Node 2.
Node #2:
7. In the Device editor, click High Availability Connection, and then enter the following settings: Name: Type a name for the HA pair. (The default name is Infoblox.) Shared Secret: Type the shared secret that both nodes use to authenticate each other when establishing a VPN tunnel for ensuing bloxSYNC traffic. (The default shared secret is test.) Retype Shared Secret: Retype the shared secret you entered in the Shared Secret field. VPN Port Number: Leave as the default number (1194), or enter a different number for the two nodes to use when building a VPN tunnel between themselves. 8. Click Save. The management window closes.
282
NIOS 4.3r5
Configuring Node 2
1. Open a web browser and make an HTTPS connection to the IP address of the LAN or LAN1 port of Node 2. 2. Click LAUNCH DEVICE MANAGER. 3. Log in to Node 2. The Infoblox NIOS Startup Wizard appears. 4. To bypass the wizard, click Cancel or the Close button (). 5. From the Device perspective, click hostname -> Edit -> Join HA Pair. Note: For the DNSone with Grid package, from the Grid perspective, click + (for Infoblox) -> + (for Members) -> hostname -> Edit -> Join Grid. 6. In the Join HA Pair dialog box, enter the following network settings: Virtual IP of HA Pair: Type the VIP (virtual IP) address for the HA pair. HA Connection Name: Type the same text string that you typed in the Name field in the High Availability Connection section of the Device editor on Node 1. The default HA connection name is Infoblox. Shared Secret: Type the shared secret that both nodes use to authenticate each other when establishing a VPN tunnel for ensuing bloxSYNC traffic. The default shared secret is test. Retype Shared Secret: Retype the shared secret you entered in the Shared Secret field. VPN Port Number: Leave as the default number (1194), or enter a different number for the two nodes to use when building a VPN tunnel between themselves. 7. Click Save. The management window closes.
The virtual router ID number for the HA pair is 150. The ID number must be unique for this network segment. When you create the corp100.com zone on the HA pair, you import DNS data from the legacy server at 10.1.4.11.
NIOS 4.3r5
283
Internet ISP NOTE: The first six hexadecimal characters of all MAC addresses in the example are 00:00:00:00. Only the last six hexadecimal characters are shown here. External Secondary DNS Server ns2: 2.2.2.2 ethernet2 10.1.5.1/24 ethernet3 10.1.6.2/24
MGT Network 10.1.1.0/24 10.1.1.10 10.1.1.50 Address Range printer1 10.1.1.2 aa:aa:aa ethernet0 10.1.6.1/24 ethernet1 10.1.1.1/24 HA Pair Internal Primary DNS Server DHCP, IPAM ns3 VIP: 10.1.4.10 ethernet4 10.1.4.1/24 Server Network 10.1.4.0/24
ethernet2 10.1.2.1/24
storage1 proxymail 10.1.4.2 10.1.4.f dd:dd:dd:dd ff:ff:ff:ff storage2 proxyweb 10.1.4.3 10.1.4.5 ee:ee:ee:ee 11:11:11:11 An HA pair of NIOS appliances provides internal DNS services. It answers internal queries for all hosts in its domain. It forwards internal queries for external sites to ns1 and ns2. It also serves DHCP, providing both dynamic and fixed addresses. For information on configuring the NIOS appliance external primary DNS server, see Configuration Example: Deploying a NIOS Appliance for External DNS on page 270. Address Range