Top Banner
NETWORK CONFIGURATION Prepared by: Menna Hamza Mohamad Hesham Mona Abdel Mageed Yasmine Shaker
34

Network Configuration

Jan 01, 2016

Download

Documents

celeste-clarke

Network Configuration. Prepared by: Menna Hamza Mohamad Hesham Mona Abdel Mageed Yasmine Shaker. Agenda. OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Configuration

NETWORK CONFIGURATION

Prepared by:Menna HamzaMohamad HeshamMona Abdel MageedYasmine Shaker

Page 2: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 3: Network Configuration

OPERATIONS AND MANAGEMENT AREA

Area Workgroups Examples: Adslmib : ADSL MIB

Capwap : Control And Provisioning of Wireless Access Points.

Bmwg : Benchmarking Methodology

Dime : Diameter Maintenance and Extensions

Netconf : Network Configuration

Page 4: Network Configuration

NETCONF WORKING GROUP

The NETCONF Working Group is chartered to produce a protocol suitable for network configuration. required characteristics includes: Differentiate between configuration data and

non-configuration data. Extensible. Integration with user authentication methods. Integration with configuration database systems. Wide configuration transactions with features

such as locking and rollback capability.

Page 5: Network Configuration

NETCONFIG PROTOCOL

The protocol provides mechanism to transfer and manipulate configuration data in a network device

It uses an Extensible Markup Language (XML)-based data encoding for the configuration data and the protocol messages.

The NETCONF protocol operations are realized on top of a simple Remote Procedure Call (RPC) layer.

Page 6: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 7: Network Configuration

XML DETOUR

XML Why XML? XSD and Schemas Xpath XML Node XML Sub Tree Example

Page 8: Network Configuration

XML EXAMPLE <top xmlns="http://example.com/schema/1.2/config">

<users>

<user>

<name>root</name>

<type>superuser</type>

<full-name>Charlie Root</full-name>

<company-info>

<dept>1</dept>

<id>1</id>

</company-info>

</user>

</users>

</top>

Value of Xpath (top/users/user/name)

Page 9: Network Configuration

DEFINITIONS

Application / client Server / Device Data Store / Configuration file Capabilities

Page 10: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 11: Network Configuration

PROTOCOL LAYERS•C

onfiguration Data

•Status Data?

Content

•<get-config>

•<edit-config>

•…..

Operation

•<rpc-call>

•<rpc-reply>

RPC

•SSL, SSH, BEEP, console

Transport Protocol

Page 12: Network Configuration

<HELLO>

A way for both client and server to announce there existence

It also serves as an announcement of session ID as well as supported features !!!

Extendible protocol means that there is no guarantee that the server and client support the same set features.

Base capability must be supported How to handle different set of features?

Page 13: Network Configuration

SERVE ME

The client the needed advertised capabilities requests to the Server.

The Server processes the requests on a FIFO basis (Pipe Line)

The Server sends Required Data/ request status to the client

How to associate a request with a reply? Client closes the session or Server terminates

session due to timeout

Page 14: Network Configuration

RPC FOR LIFE

Client Requests are RPC calls The data store is conceptually a list of XML

namespaces The RPC manipulates these XML namespaces Changes to the XML name spaces are

mapped by the device to actual changes in it’s internal configuration (registers, etc..)

Server reply contains requested XML data, errors, warnings and optionally execution success feedback

Page 15: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 16: Network Configuration

BASIC OPERATIONS

Get get get-config

Manipulate edit-config copy-config delete-config

Parallel access control Lock unlock

End session close-session kill-session

Page 17: Network Configuration

RPC BLOCKS

<rpc-call> <rpc-reply>

<rpc-error> </ok> <data>

Page 18: Network Configuration

FILTERS

What’s a filter Using a filter <filter> Demo

Page 19: Network Configuration

<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <get-config> <source> <running/> </source> <filter type="subtree"> <top

xmlns="http://example.com/schema/1.2/config"><users> <user><name>root</name></user></users>

</top> </filter> </get-config> </rpc>

Page 20: Network Configuration

<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <data> <top xmlns="http://example.com/schema/1.2/config"> <users> <user> <name>root</name> <type>superuser</type> <full-name>Charlie Root</full-name> <company-info> <dept>1</dept> <id>1</id> </company-info> </user>

</users> </top> </data> </rpc-reply>

Page 21: Network Configuration

EXTENDED CAPABILITIES CASE STUDIES

Partial lock With default Capabilities

Page 22: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 23: Network Configuration

PARTIAL LOCK RPC

Describes the lock and unlock operations on parts of configuration data stores using XPath filtering mechanisms

Definition of Terms Scope of the lock Protected area

Page 24: Network Configuration

PARTIAL LOCKING CAPABILITY

Usage Scenarios Multiple managers with overlapping sections Multiple managers, distinct management areas

New Operations <partial-lock> <partial-unlock>

Page 25: Network Configuration

<PARTIAL-LOCK> Locking a node protects the node itself and the

complete sub-tree under the node The XPath expressions are evaluated only once at

lock time NETCONF server that supports partial locking MUST

be able to grant multiple simultaneous partial locks to a single NETCONF session

Failure Global lock Already locked User does not have access rights

Page 26: Network Configuration

<PARTIAL-LOCK> (CTD.)

RPC Call Parameters

Filter (Lock) ID (Unlock)

Deadlock Avoidance RPC Reply

Positive (Lock ID in case of lock) Negative

Page 27: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 28: Network Configuration

WITH DEFAULT CAPABILITY

It’s just a new XML child element added to the method-name element.

part of the configuration data is not set by the NETCONF client, but rather a default value is used.

Some times NETCONF client has a prior knowledge about this default data, so the NETCONF server does not need to send it to the client.

In other situations the NETCONF client will need this data so it must be sent at the NETCONF <rpc-reply> messages.

Page 29: Network Configuration

REPORTING MODES report-all:

All default data is always reported. trim:

Values are not reported if they match the default. explicit:

Default data is not reported except explicitly set default data.

Page 30: Network Configuration

NETCONF OVER TLS

Configuration exchange must be secure.

TLS Provide support for certificate-based mutual authentication.

TLS is application-protocol-independent.

How NETCONF can be used within a TLS session?

Page 31: Network Configuration

OPS NetConfig Work Group NetConfig Protocol XML Detour Definitions Protocol Layers Protocol Main Scenario Basic Operations Filters Example Partial Lock RPC With Default Capability TLS

AGENDA

Page 32: Network Configuration

NETCONF OVER TLS

Connection Initiation

Client Hello message

Handshake

Start Exchange XML

Connection Closure

Agent(NETCON

F)

Server(TLS)

Manger(NETCON

F)

Client(TLS )

Page 33: Network Configuration

NETCONF OVER TLS

Endpoint Authentication and Identification Server Identity

1. The server hostname2. Matching is case-insensitive.3. A "*" wildcard character.4. multiple names is acceptable.

Client Identity

Page 34: Network Configuration

QUESTIONS!