System Access Configuration
Dual WAN Support
Dual WAN support is introduced to provide multiple links to NFVIS connectivity. Starting from NFVIS 3.10.1 release, a second WAN bridge configured with DHCP by default is supported on ENCS 5000 series platform.
During NFVIS system initialization, NFVIS attempts to establish connectivity through DHCP on both WAN bridges. This allows connectivity to NFVIS during initial deployment even if the network is down on one of the WAN bridges. Once DHCP assigns an IP address through one WAN bridge, the other WAN bridge can be configured with static IP address for connectivity to NFVIS.
Restrictions for Dual WAN Support
-
The DHCP toggle behavior is not supported during the upgrade flow. It is only triggered during fresh installation of NFVIS or after a factory default reset.
-
Does not support active/standby or redundant WAN bridges. NFVIS does not detect connectivity failure from one WAN bridge and switchover to another WAN bridge. In case connectivity fails on the WAN bridge with DHCP configurations, connectivity through the other WAN bridge is established only if static IP is applied to the second WAN bridge and static routing is configured for connectivity through that bridge.
-
IPv6 is not supported for dual WAN toggle.
-
If wan2-br is DHCP enabled WAN bridge, you must remove DHCP from wan2-br to apply default gateway from static IP configurations.
Dual WAN Bridge and DHCP Toggle
Note |
This feature is supported only on ENCS 5000 series devices. |
In zero touch deployment, NFVIS requests for IPv4 assignments through DHCP for two WAN interfaces. During system initialization a second WAN bridge is configured with GE0-1 port attached. NFVIS toggles between the two default WAN bridges sending DHCP requests on any one of the WAN bridges at a time, for 30 second intervals. The toggling stops as soon as one WAN bridge is assigned an IP address through DHCP. The bridge with the assigned IP address is configured with DHCP. The other WAN bridge has no default IP configuration and can be manually configured with static IP if required.
If neither of the bridges is assigned an IP address through DHCP, the WAN DHCP toggle can be terminated by logging in to NFVIS using the default credentials. In this case, wan-br is configured with DHCP and wan2-br has no default IP configuration.
After zero touch deployment, the toggle feature is terminated. To add additional connectivity to the NFVIS host, static IP address can be configured on the other WAN bridge and system static routing can be applied. A default gateway is not supported as the system default gateway is set through DHCP. If DHCP configuration is not required, then both WAN bridges can be configured with static IP addresses, and a default gateway can then be applied under system settings.
Accessing NFVIS
For initial login, use admin as the default user name, and Admin123# as the default password. Immediately after the initial login, the system prompts you to change the default password. You must set a strong password as per the on-screen instructions to proceed with the application. All other operations are blocked until default password is changed. API will return 401 unauthorized error if the default password is not reset.
If wan-br or wan2-br have not obtained IP addresses through DHCP, the zero touch deployment is terminated. To manually apply the IP configurations answer 'y' and the system proceeds with DHCP assignment on wan-br until the configurations are changed. For DHCP assignment to continue to request IP address for PnP flow on both WAN interfaces answer 'n'.
You must adhere to the following rules to create a strong password:
-
Must contain at least one upper case and one lower case letter.
-
Must contain at least one number and one special character (# _ - * ?).
-
Must contain seven characters or greater. Length should be between 7 and 128 characters.
You can change the default password in three ways:
-
Using the Cisco Enterprise NFVIS portal.
-
Using the CLI—When you first log into Cisco Enterprise NFVIS through SSH, the system will prompt you to change the password.
-
Using PnP (for details, see the Cisco Network Plug-n-Play Support).
-
Using console - After the initial login using the default password, you are prompted to change the default password.
NFVIS Version: 3.12.3 Copyright (c) 2015-2020 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. login: admin NFVIS service is OK Warning: Permanently added 'localhost' (RSA) to the list of known hosts. admin@localhost's password: Cisco Network Function Virtualization Infrastructure Software (NFVIS) NFVIS Version: 3.12.3-RC8 Copyright (c) 2015-2020 by Cisco Systems, Inc. Cisco, Cisco Systems, and Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. The copyrights to certain works contained in this software are owned by other third parties and used and distributed under third party license agreements. Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0, LGPL 2.1, LGPL 3.0 and AGPL 3.0. admin connected from ::1 using ssh on nfvis admin logged with default credentials Setting admin password will disable zero touch deployment behaviors. Do you wish to proceed? [y or n]y Please provide a password which satisfies the following criteria: 1.At least one lowercase character 2.At least one uppercase character 3.At least one number 4.At least one special character from # _ - * ? 5.Length should be between 7 and 128 characters Please reset the password : Please reenter the password : Resetting admin password New admin password is set nfvis# System message at 2020-01-08 03:10:10... Commit performed by system via system using system. nfvis#
Note |
To commit the target configuration to the active (running) configuration, use the commit command in any configuration mode. Changes made during a configuration session are inactive until the commit command is entered. By default, the commit operation is pseudo-atomic, meaning that all changes must succeed for the entire commit operation to succeed. |
Connecting to the System
Using IPv4
The three interfaces that connect the user to the system are the WAN and WAN2 interfaces and the management interface. By default, the WAN interface has DHCP configuration and the management interface is configured with static IP address 192.168.1.1. If the system has a DHCP server connected to the WAN interface, the WAN interface is assigned an IP address from this server. You can use this IP address to connect to the system.
You can connect to the server locally (with an Ethernet cable) using the static management IP address; to connect to the box remotely using a static IP address, the default gateway needs to be configured.
You can connect to the system in the following three ways:
-
Using the local portal—After the initial login, you are prompted to change the default password.
-
Using the KVM console—After the initial login using the default password, you are prompted to change the default password.
-
Using PnP—After the initial provisioning through PnP, the configuration file pushed by the PNP server must include the new password for the default user (admin).
Using IPv6
IPv6 can be configured in static, DHCP stateful and Stateless Autoconfiguration (SLAAC) mode. By default, DHCP IPv6 stateful is configured on the WAN interface. If DHCP stateful is not enabled on the network, the router advertisement (RA) flag decides which state the network stays in. If the RA shows Managed (M) flag, then the network stays in DHCP mode, even if there is no DHCP server in the network. If the RA shows Other (O) flag, then the network switches from DHCP server to SLAAC mode.
SLAAC provides IPv6 address and default gateway. Stateless DHCP is enabled in the SLAAC mode. If the server has DNS and domain configured, then SLAAC also provides those values via stateless DHCP.
Performing Static Configuration without DHCP
Note |
Starting from NFVIS 3.10.1 release, for ENCS 5400 and ENCS 5100, wan2-br obtains an IP address from DHCP. To configure default gateway, first use no bridges bridge wan2-br dhcp command. |
If you want to disable DHCP and use static configuration, initial configuration is done by setting the WAN IP address and/or management IP address, and the default gateway. You can also configure a static IP on a created bridge.
To perform initial configuration on the system without using DHCP:
configure terminal
system settings mgmt ip address 192.168.1.2 255.255.255.0
bridges bridge wan-br ip address 209.165.201.22 255.255.255.0
system settings default-gw 209.165.201.1
commit
Note |
When an interface is configured with a static IP address, DHCP is automatically disabled on that interface. |
Now you can either use the management IP or WAN IP to access the portal.
To configure static IPv6 on the WAN interface:
configure terminal
system settings mgmt ipv6 address 2001:DB8:1:1::72/64
bridges bridge wan-br ipv6 address 2001:DB8:1:1::75/64
system settings default-gw-ipv6 2001:DB8:1:1::76
commit
Note |
When an interface is configured with a static IPv6 address, DHCP IPv6 is automatically disabled on that interface. There are three options for IPv6 - static, DHCP and SLAAC, out of which only one can be enabled at a time. |
To configure DHCP on the WAN interface:
configure terminal
no system settings default-gw
system settings wan dhcp
commit
exit
hostaction wan-dhcp-renew
Note |
Starting from NFVIS 3.10.1, you can configure DHCP IPv6 on any bridge. You can only have one DHCP IPv6 bridge or management interface active at a time, and cannot have DHCP IPv6 and default IPv6 gateway or SLAAC IPv6 configured at the same time. |
To configure DHCP IPv6 on the WAN interface:
configure terminal
no system settings default-gw-ipv6
system settings wan dhcp-ipv6
commit
exit
hostaction wan-dhcp-renew
Verifying Initial Configuration
The show system settings-native command is used to verify initial configuration. Use show bridge-settings and show bridge-settings bridge_name commands to verify the configuration for any bridge on the system.
Extract from the output of the show system settings-native command when both WAN and management interfaces have a static configuration:
system settings-native mgmt ip-info interface lan-br
system settings-native mgmt ip-info ipv4_address 192.168.1.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp disabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp disabled
!
!
system settings-native gateway ipv4_address 209.165.201.1
system settings-native gateway interface wan-br
Extract from the output of the show system settings-native command when the management interface has a DHCP configuration and the WAN interface has a static configuration:
system settings-native mgmt ip-info interface MGMT
system settings-native mgmt ip-info ipv4_address 192.168.1.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp enabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp disabled
Extract from the output of the show system settings-native command when the WAN interface has a DHCP configuration and the management interface has a static configuration:
system settings-native mgmt ip-info interface lan-br
system settings-native mgmt ip-info ipv4_address 209.165.201.2
system settings-native mgmt ip-info netmask 255.255.255.0
!
!
!
system settings-native mgmt dhcp disabled
system settings-native wan ip-info interface wan-br
system settings-native wan ip-info ipv4_address 209.165.201.22
system settings-native wan ip-info netmask 255.255.255.0
!
!
!
system settings-native wan dhcp enabled
Configuring VLAN for NFVIS Management Traffic
A VLAN is a method of creating independent logical networks within a physical network. VLAN tagging is the practice of inserting a VLAN ID into a packet header in order to identify which VLAN the packet belongs to.
You can configure a VLAN tag on the WAN bridge (wan-br) interface to isolate Cisco Enterprise NFVIS management traffic from VM traffic. You can also configure VLAN on any bridge on the system (wan2-br for ENCS5400 or ENCS 5100, and user-br for all systems)
By default, Wan bridge and LAN bridge are in trunk mode and allows all VLANs. When you configure native VLAN, you must also configure all the allowed VLANs at the same time. The native VLAN becomes the only allowed VLAN if you do not configure all the VLANs. If you want a network that allows only one VLAN, then create another network on top of wan-net and lan-net and make it access network.
Note |
You cannot have the same VLAN configured for the NFVIS management and VM traffc. |
For more details on the VLAN configuration, see the Understanding and Configuring VLANs module in the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
Configuring System Routes
In addition to the default routes in the system, you can configure additional system routes. This configuration is specifically useful when certain destinations are not reachable through the default routes.
While you can create a route just by providing the destination and prefix length, a valid route requires that you specify either a device or a gateway or both.
To configure additional system routes:
configure terminal
system routes route 209.165.201.1 dev lan-br
commit
Verifying the System Routes Configuration
To verify the system routes configuration, use the show system routes command as shown below:
nfvis# show system routes
DESTINATION PREFIXLEN STATUS
----------------------------------
209.165.201.1 12 -
209.165.201.2 12 -
209.165.201.3 24 -
System Routes APIs and Commands
System Routes APIs |
System Routes Commands |
---|---|
|
|
Configuring the IP Receive ACL
To filter out unwanted traffic, you can configure ip-receive-acl to block or allow certain traffic based on the IP address and service ports.
To configure the source network for Access Control List (ACL) access:
configure terminal
system settings ip-receive-acl 198.0.2.0/24
action accept priority 10
commit
Verifying the Trusted IP Connection
Use the show running-config system settings ip-receive-acl command to display the configured source network for ACL access to the management interface
nfvis# show running-config system settings ip-receive-acl
system settings ip-receive-acl 198.51.100.11/24
service
[ ssh https scpd]
action accept
priority 100
Port 22222 and Management Interface ACL
Port 22222 is used for SCP server and is closed by default on an NFVIS system. You cannot SCP a file into NFVIS from an external server. If you need to SCP file from an external server, you must first open the port.
To open port 22222:
config terminal
system settings ip-receive-acl address/mask_len service scpd priority 2 action accept
commit
The Access Control List (ACL) is identify by address. If this ACL is removed, all ACLs sharing the same address are also removed. Ensure that you configure the ACLs that share the same address once again.
Note |
From 3.8.1 release, only a user belonging to administrator role can use the SCP command on this port to upload or download only from restricted folders like /data/intdatastore/. For more information, see Host System Operations. |
Caution |
SCP command cannot be used to copy files from one NFVIS device to another NFVIS device. |
Use the show running-config system settings ip-receive-acl command to verify the interface configuration:
nfvis# show running-config system settings ip-receive-acl
system settings ip-receive-acl 10.156.0.0/16
service [ ssh https scpd ]
action accept
priority 100
!
Configuring Secondary IP and Source Interface
Secondary IP
The Cisco Enterprise NFVIS supports multiple IP addresses per interface. A Secondary IP feature can be configured on the WAN interface, as an additional IP to reach the software. Set the external routes for Secondary IP to reach the NFVIS. Routers configured with secondary addresses can route between the different subnets attached to the same physical interface.
To access secondary IP through ISRv, the WAN physical port is removed from wan-br similar to single IP.
To configure Secondary IP:
Configure Secondary IP
nfvis(config)# system settings wan secondary ip address 1.1.2.3 255.255.255.0
Source Interface
This feature is used to set the source interface with an ip address. The ip address configured will be used for for packets generated by the NFVIS. The packets generated use the default route.
Prerequisites for configuring Source Interface
-
IP must be one of the configured IP addresses in system settings.
-
The source-interface IP address can be one of the following:
-
mgmt
-
WAN
-
WAN Secondary IP
-
WAN2 IP or IP configured on any bridge
-
-
Source-interface configuration must be applied if the WAN IP is static.
-
For DHCP, Source-interface IP is accepted but cannot be applied. The configuration takes effect once you switch from DHCP to static.
To configure Source Interface:
Configure source-interface ip
nfvis(config)# system settings source-interface
1.1.2.3
The Secondary IP and Source Interface related errors are logged in show log nfvis_config.log file.
Secondary IP and Source Interface APIs and Commands
APIs |
Commands |
---|---|
|
|
|
|
CIMC Access Control
On ENCS 5400, NFVIS administrators have authoritative control of the device. This includes capability to change the IP address used to reach the CIMC and modifying the CIMC and BIOS passwords
CIMC Access using NFVIS
Note |
CIMC access using NFVIS is supported only on ENCS 5400. When CIMC access is enabled on NFVIS, ISRv can gain access to the host CIMC and internal switch management console. You must have authorization from Cisco Interactive Debug (CID) to access both consoles. |
To access CIMC using NFVIS WAN or management interface IP address, use the system settings cimc-access enable command. Once you configure CIMC access on NFVIS, the stand alone CIMC access using CIMC IP address is disabled and you will be able to access CIMC using NFVIS management interface IP address. The configurations remain on the device even after the device reboot.
When the CIMC access is configured, it enables a few ports to access services like SSH, SNMP, HTTP and HTTPs into the CIMC.
The following port numbers are being used for forwarding services to CIMC:
-
20226 for SNMP
-
20227 for SSH
-
20228 for HTTP
-
20229 for HTTPS
If you are unable to access CIMC using NFVIS, check the show log nfvis_config.log file.
Use system settings cimc-access disable to disable this feature.
BIOS-CIMC Update
Starting from 3.8.1 release, for ENCS 5400 router, if existing BIOS/CIMC version is lower than the bundled image in NFVIS ISO or upgrade package, it is updated automatically during the NFVIS upgrade or installation. Also the CPU microcode is upgraded. The upgrade time takes longer than the previous releases and the upgrade will be done automatically, and you cannot stop the process once it is initiated.
For ENCS 5100 router, BIOS will be upgraded automatically to a new version but you need to boot up the server manually after the upgrade.
BIOS and CIMC Password
To change the BIOS and CIMC password for ENCS 5400 use hostaction change-bios-password newpassword or hostaction change-cimc-password newpassword commands. The change in the password will take effect immediately after the commands are executed. For both CIMC and BIOS passwords any alphanumeric character along with some special characters (_ @ # ) are allowed.
For CIMC, the password must contain a minimum of eight characters..
For BIOS, the password must contain a minimum of seven characters and the first letter cannot be #.
BIOS and CIMC Password APIs and Commands
BIOS and CIMC Password APIs |
BIOS and CIMC Password Commands |
---|---|
|
|
Overview to ENCS 5400 for UEFI Secure Boot
You can use Unified Extensible Firmware Interface (UEFI) secure boot to ensure that all the EFI drivers, EFI applications, option ROM or operating systems prior to loading and execution are signed and verified for authenticity and integrity, before you load and execute the operating system. You can enable this option using either web UI or CLI. When you enable UEFI secure boot mode, the boot mode is set to UEFI mode and you cannot modify the configured boot mode until the UEFI boot mode is disabled.
Note |
If you enable UEFI secure boot on a nonsupported OS, on the next reboot, you cannot boot from that particular OS. If you try to boot from the previous OS, an error is reported and recorded the under system software event in the web UI. You must disable the UEFI secure boot option using Cisco IMC to boot from your previous OS. |
Enabling UEFI Secure Boot Mode
To enable UEFI secure boot mode:
Server# scope bios
Server /bios # set secure-boot enable
Setting Value : enable
Commit Pending.
Server /bios *# commit
Reboot the server to have your configuration boot mode settings take place.
Disabling UEFI Secure Boot Mode
To disable UEFI secure boot mode:
Server# scope bios
Server /bios # set secure-boot disable
Setting Value : enable
Commit Pending.
Server /bios *# commit
Reboot the server to have your configuration boot mode settings take place.
To install NFVIS in UEFI mode, map the iso image through vmedia or kvm first, then enable secure boot and change the BIOS set-up parameters.
encs# scope bios
encs /bios # scope advanced
encs /bios/advanced # set BootOpRom UEFI
encs /bios/advanced # set BootOrderRules Loose
encs /bios/advanced *# commit
Reboot the device to start installation.
Note |
All VNFs and configurations are lost at reboot. Secure boot in UEFI mode works differently from the legacy mode. Therefore, there is no compatibility in between legacy mode and UEFI mode. The previous environment is not kept. |
Enabling or Disabling the Portal Access
The Cisco Enterprise NFVIS portal access is enabled by default. You can disable the access if required.
To disable the portal access:
configure terminal
system portal access disabled
commit
Note |
You can enable the portal access using the enabled keyword with the system portal access configuration. |
Verifying the Portal Access
Use the show system portal status command to verify the portal access status as shown below:
nfvis# show system portal status
system portal status "access disabled"
Portal Access APIs and Commands
Portal Access APIs |
Portal Access Commands |
---|---|
|
|