NIOS AdminGuide 7.3
NIOS AdminGuide 7.3
Trademark Statements
Infoblox, the Infoblox logo, Grid, NIOS, bloxTools, Network Automation and PortIQ are trademarks or registered
trademarks of Infoblox Inc.
All other trademarked names used herein are the properties of their respective owners and are used for identification
purposes only.
Company Information
http://www.infoblox.com/contact/
Product Information
Hardware Models
Infoblox Advanced Appliances: PT-1400, PT-2200, PT-4000, and PT-4000-10GE
Network Insight Appliances: ND-800, ND-1400, ND-2200, and ND-4000
Trinzic Appliances: TE-100, TE-810, TE-820, TE-1410, TE-1420, TE-2210, TE-2220, Infoblox-4010, and Infoblox-4020
All Trinzic Rev-1 and Rev-2 appliances
Cloud Network Automation: CP-V800, CP-V1400, and CP-V2200
Trinzic Reporting: TR-800, TR-1400, TR-2200, and TR-4000
DNS Cache Acceleration Appliances: IB-4030 and IB-4030-10GE
Document Number: 400-0615-000 Rev. A
Document Updated: January 28, 2016
Warranty Information
Your purchase includes a 90-day software warranty and a one year limited warranty on the Infoblox appliance, plus
an Infoblox Warranty Support Plan and Technical Support. For more information about Infoblox Warranty information,
refer to the Infoblox Web site, or contact Infoblox Technical Support.
Contents
Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Document Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Documentation Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
What’s New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Customer Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Software Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Part 4 DNS
Part 5 DHCP
Part 10 Reference
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1857
Document Overview
This guide describes how to configure and manage NIOS appliances using the NIOS 7.3 Alpha release. It was last
updated on January 28, 2016. For updated documentation, visit our Support site at https://support.infoblox.com.
Documentation Conventions
The text in this guide follows the following style conventions.
Style Usage
bold • Indicates anything that you input in the user interface, by clicking, choosing,
selecting, typing, or by pressing on the keyboard.
• Indicates the field names in the user interface.
input Signifies command line entries that you type.
variable Signifies variables typed into the user interface that you need to modify specifically for your
configuration. These can be command line variables, file names, and keyboard characters.
Indicates the names of the wizards, editors, and dialog boxes in Grid Manager, such as the
Add Network wizard or the DHCP Network editor.
Variables
Infoblox uses the following variables to represent values that you type, such as file names and IP addresses.
Variable Value
a_record A record
aaaa_record AAAA record
admin_group Name of a group of administrators
admin_name Name of the appliance administrator
addr_range IP address range
dhcp_template DHCP template
domain_name Domain name
directory Directory name
failover_association Failover association
filter_name Name of a DHCP filter
fingerprint DHCP fingerprint
fixed_address Fixed address
fixed_address_template Fixed address template
glb Global Load Balancer
Grid Grid name
Grid_master Grid Master
Grid_member Grid Member
Variable Value
hostname Host name of an independent appliance
host_record Host record
ifmap_client IF-MAP client
ip_addr IPv4 address
lease IP address of a lease
mac_filter Name of a MAC filter
match_rule Name of a match rule
member Grid member name
ms_server Microsoft server
named_acl Named ACL (access control list)
netmask Subnet mask
network IP address of a network
network_access_server Name of a NAS
network_template Network template
network_view Network view
option_space DHCP option space
policy Name of a policy on RADIUSone
policy_group Name of a Policy Group
port Number of a port; predefined for certain protocols
ptr_record PTR record
reservation Reservation
roaming_host Roaming host
scheduled_task Scheduled task
server_group Name of a group of servers
shared_network Shared network
service One of the services available from Grid Manager
template DHCP template
dns_view DNS view
zone DNS zone
Navigation
Infoblox technical documentation uses an arrow “->” to represent navigation through the user interface. For example,
to edit a fixed address, the description is as follows:
From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network -> fixed_address
check box, and then click the Edit icon.
What’s New
This NIOS release includes the following new features and enhancements:
• Amazon Route 53 Integration
Infoblox DDI for AWS integrates the AWS Route 53 DNS service, providing a unified DNS view across AWS and
hybrid cloud deployments through a centralized console that improves visibility and performance. Without
Infoblox, AWS deployments utilizing Route 53 have limitations with private hosted zones, which restrict DNS
resolution from outside AWS and hinder hybrid cloud deployments. For information about the Infoblox AWS
solution, refer to the Installation Guide for vNIOS for AWS.
• Enhancements for Cloud Network Automation
This NIOS release adds the following enhancements for Cloud Network Automation:
— Delegated objects: You can now add, modify, and delete fixed addresses and reservations in delegated
networks and address ranges through the Grid Manager UI in addition to using cloud API calls.
— vDiscovery: vDiscovery now automatically removes unmanaged and discovered data for VMs that have
been deleted in vSphere, OpenStack, and/or AWS EC2. Clear all discovered data; remove discovered data
from vDiscovery tasks; perform vDiscovery jobs directly in the Cloud tab.
— Visibility: A new report and dashboard widget to show dynamic license utilization has been added.
For more information, see Deploying Cloud Network Automation on page 361.
• Infoblox Reporting and Analytics
Infoblox Reporting and Analytics delivers an enhanced reporting interface so you can now create custom
dashboards, reports, and alerts. You can continue to use the traditional NIOS reports in the new interface and
customize them to meet your specific requirements, or you can create new custom dashboards and reports from
the ground up using a powerful search and visualization language or a simple graphical interface. For more
information, see Infoblox Reporting and Analytics on page 1447.
• Cisco ISE Integration
Infoblox integration with Cisco pxGrid (Cisco Platform Exchange Grid) enables Network Insight and Cisco ISE
(Cisco Identity Services Engine) to exchange valuable networking, user, device, and security-event information,
enriching both Infoblox DDI and ISE data. The pxGrid publish/subscribe architecture enables users to combine
pxGrid ecosystem products into a unified solution that enhances security-response accuracy and timeliness;
expands visibility of networks, users, and devices; and improves overall IT operations by sharing information
between network and security teams. Infoblox participation in the pxGrid community makes Infoblox data
indispensable for Cisco ISE customers. For more information, see Cisco ISE Integration on page 1733.
• STIX/TAXII Support
This release adds the TAXII (Trusted Automated eXchange of Indicator Information) service that enables NIOS to
integrate with other security software using the TAXII/STIX protocol for cyber threat mitigation. In this release,
the TAXII server is able to receive a mitigation request from a STIX/TAXII enabled third-party security platform
that adds to the DNS Firewall (RPZ) an IP address or domain that is deemed malicious. This enables the
third-party security platform to use the Infoblox Grid to apply a distributed mitigation policy. For more
information, see Mitigating Cyber Threats using TAXII on page 1704.
• Infoblox DNS Threat Analytics
DNS Threat Analytics mitigates DNS data exfiltration by employing analytics algorithms to detect DNS tunneling
traffic. When you enable the analytics service, NIOS starts analyzing incoming DNS data and applying
algorithms to detect security threats. Once threats are detected, NIOS blacklists the domains and transfers
them to the designated mitigation RPZ (Response Policy Zone), and traffic from offending domains is blocked.
DNS Threat Analytics also includes a whitelist that contains trusted domains on which NIOS allows DNS traffic.
These are known good domains that carry legitimate DNS tunneling traffic for tools such as Avast, Sophos,
McAfee, Boingo, Barracuda, and others. The whitelist is extensible so new whitelisted domains can be added
and rolled out accordingly. This release provides automatic updates for Threat Analytics modules through Grid
Manager. When you configure automatic updates for Threat Analytics modules, NIOS automatically download
the module set periodically. You can also view the current whitelist version and module set version in the
Updates tab in the Grid Threat Analytics Properties editor.
NOTE: Infoblox highly recommends that you run the analytics service for a limited time to monitor and preview
what has been detected before actually blocking any domains. To do so, set Policy Override to Log Only
(Disabled) when you create the designated local RPZ. You can carefully review the list of detected domains and
decide which domains you want to continue blocking and which domains you want to add to the analytics
whitelist. You should review the blacklisted domains on a regular basis to make sure that no legitimate use of
DNS tunneling is blocked. You can update the analytics whitelist by adding new custom whitelisted domains,
moving legitimate domains from the blacklisted domain list, or using CVS import and export. Due to memory
and capacity required to perform analytics, ensure that you install the Threat Analytics and RPZ licenses and
enable the threat analytics service on an appliance that has big enough capacity. Following are the supported
Infoblox appliance models on which you can run the threat analytics service: IB-4010, IB-4030, IB-4030-10GE,
TE-2210, TE-2220, PT-2200, PT-4000, PT-4000-10GE, IB-VM-2220, and IB-VM-4010. Using unsupported
appliance models for DNS Threat Analytics might cause performance issues.
For more information, see About DNS Threat Analytics on page 1660.
• VRF Integration for Network Insight
Through Infoblox Network Insight, the NIOS appliance is now able to discover network devices that are
configured or deployed within virtual networks, such as VRF-based (Virtual Routing and Forwarding) networks.
You now have visibility of your complete virtual network infrastructure, which allows you to view and manage
overlapping IP addresses, VRF-specific data from VRF-enabled devices, and discovered end host data. For more
information, see Discovering VRF Virtual Networks on page 665.
• Security Visibility
Grid Manage now provides the following features to increase visibility of your Infoblox security infrastructure:
— A comprehensive Security dashboard that displays the current security data, including Threat Protection
events and RPZ hits. You can view information such as the top N Grid members by events, top N rules by
volume, and more. To ensure that the Security dashboard displays correct data, use NTP to synchronize the
time of the Grid members with that of the Grid Master.
— Threat Protection widgets that display security data based on the new “grouping” feature.
— New reports that display security information related to Infoblox External DNS Security and Infoblox Internal
DNS Security.
For more information, see Status Dashboards on page 138.
• Infoblox Security Infrastructure Enhancements
This release adds a few enhancements to the Infoblox Security Infrastructure features, as follows:
— Ability to reset the appliance to use the default Threat Protection ruleset.
— Specify the interface for downloading the latest ruleset.
— Configure the MGMT port as the interface for Reporting traffic.
— Display FQDN information for Threat Protection rule match the syslog.
— Display the current active ruleset version in Grid Manager
For more information, see Infoblox External DNS Security on page 1561.
• Data Collection Virtual Appliances
Infoblox introduces phase one of the Data Collection feature in this release. You can set up a newly developed
Data Collection appliance as the data collector to work with the Infoblox Reporting member for report
generation. The purpose is to enhance the collector in a future release to enable scalable distribution of Grid
data to the Reporting server and other third-party destinations. For more information, refer to the Installation
Guide for Data Collector, when it becomes available.
• DNS Record Scavenging
The DNS record scavenging feature allows you to remove stale DNS resource records from zone data to prevent
the accumulation of invalid records. A scavenging operation determines, based on predefined rules, which
records became stale, i.e. reclaimable, and removes them. For more information, see DNS Record Scavenging
on page 803.
Related Documentation
Other Infoblox appliance documentation:
• Infoblox CLI Guide
• Infoblox API Documentation
• Infoblox CSV Import Reference
• Infoblox Installation Guide for the Trinzic 100 Appliance
• Infoblox Installation Guide for the 800 Series Platforms
• Infoblox Installation Guide for the 1400 Series Platforms
• Infoblox Installation Guide for the 2200 Series Platforms
• Infoblox Installation Guide for the 4000 Series Platforms
• Infoblox Installation Guide for the Infoblox-4010 Appliance
• Infoblox Installation Guide for the IB-4030 and IB-4030-10GE Appliances
• Infoblox DNS Cache Acceleration Administrator Guide
• Infoblox Installation Guide for vNIOS Software on Riverbed Services Platforms
• Infoblox Installation Guide for Installing vNIOS Software on Cisco Platforms
• Infoblox Installation Guide for vNIOS Software on VMware
• Infoblox Installation Guide for vNIOS on Microsoft 2008 R2 for Hyper-V
• Infoblox Installation Guide for Installing vIBOS Software on VMware Platforms
• Infoblox Installation Guide for vNIOS for KVM Hypervisor and KVM-based OpenStack
• Infoblox IBOS Administrator Guide
• Infoblox Safety Guide
To provide feedback on any of the Infoblox technical documents, please e-mail [email protected].
Customer Care
This section addresses user accounts, software upgrades, licenses and warranties, and technical support.
User Accounts
The Infoblox appliance ships with a default user name and password. Change the default admin account password
immediately after the system is installed to safeguard its use. Make sure that the NIOS appliance has at least one
administrator account with superuser privileges at all times, and keep a record of your account information in a safe
place. If you lose the admin account password, and did not already create another superuser account, the system will
need to be reset to factory defaults, causing you to lose all existing data on the NIOS appliance. You can create new
administrator accounts, with or without superuser privileges. For more information, see Managing Administrators on
page 183.
Software Upgrades
Software upgrades are available according to the Terms of Sale for your system. Infoblox notifies you when an
upgrade is available. Register immediately with Infoblox Technical Support at
http://www.infoblox.com/support/customer/evaluation-and-registration to maximize your Technical Support.
Technical Support
Infoblox Technical Support provides assistance via the Web, e-mail, and telephone. The Infoblox Support web site at
https://support.infoblox.com provides access to product documentation and release notes, but requires the user ID
and password you receive when you register your product online at:
http://www.infoblox.com/support/customer/evaluation-and-registration.
Figure 1.1 Software and Hardware Requirements for the Management System
Supported Browsers
Grid Manager supports the following operating systems and browsers. You must install and enable Javascript for Grid
Manager to function properly. Grid Manager supports only SSL version 3 and TLS version 1 connections.
Infoblox recommends that you use a computer that has a 2 GHz CPU and at least 1 GB of RAM.
Infoblox supports the following browsers for Grid Manager:
OS Browser
Microsoft Windows 8.0 and 8.1® Microsoft Internet Explorer® 11.x*, 10.x*
Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Microsoft Windows 7® Microsoft Internet Explorer® 11.x*, 10.x*, 9.x, and 8.x
Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Microsoft Windows XP® (SP2+) Microsoft Internet Explorer 7.x and 8.x
Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Red Hat® Enterprise Linux® 7.x Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Red Hat® Enterprise Linux® 6.x Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Red Hat® Enterprise Linux 5.x Mozilla Firefox 32.x, 31.x, 25.x, 21.x, 16.x, and 10.x
Google Chrome 37.x, 36.x, 30.x, 27.x, 22.x, and 16.x
Note: * Grid Manager fully supports Microsoft Internet Explorer® 11.x and 10.x when you enable compatibility view
in the browser. Features in the Reporting tab may not function properly if you disable compatibility view. In the
browser, go to Tools -> Compatibility View to enable the feature.
Infoblox recommends using the latest release of the supported versions of Internet Explorer, Mozilla Firefox or Google
Chrome for best performance.
Browser Limitations
• When you use Internet Explorer 7 or 8 without installing the latest updates, Grid Manager may stop loading a
page when you navigate from one tab to another or when you use the back navigation button to go back to a
previous page. To solve this problem, you can press Ctrl+F5 to refresh the browser or install the latest updates.
• When you use the zoom function in Internet Explorer 7 running on Microsoft Windows XP, Grid Manager may not
properly display some pop up windows. This is a known issue in Internet Explorer 7.
• In Internet Explorer 8, Grid Manager does not display the directory path of an uploaded file. Instead, it displays
“fakepath” in place of the directory path. To resolve this issue, you can add Grid Manager as a trusted site or
enable the “Include local directory path when uploading files to a server” feature in the browser. For
information, refer to the MSDN documentation at http://msdn.microsoft.com/en-us/library/ms535128.aspx.
• When you use FireFox to access Grid Manager, tooltips do not display for disabled drop-down menu items. In
addition, when you run a large query of smart folders, Grid Manager may display a warning message about
“Unresponsive Script”. Click Continue to proceed.
• Depending on the browser you use, Grid Manager may display a dialog box that indicates the system is
unavailable during a system restart or reboot.
• Infoblox strongly recommends that you do not log in to Grid Manager from different browser windows using the
same user account. Depending on the browser you use, it may cache user information in one session and apply
it to another session. This can cause inconsistent behaviors within the browser sessions.
• The network and IP address maps and lists provide views of your networks and IP addresses, so you can quickly
evaluate IP address usage and understand how your network resources are being utilized. You can quickly
determine which IP addresses are in use, when they were allocated, and to which devices they were assigned.
For information, see Chapter 13, IP Address Management, on page 575.
• Customize the Dashboard to monitor your Grid and networks. The Dashboard also provides access to
frequently-used commands and the network discovery feature. You can run network discoveries to identify IP
address conflicts and troubleshoot network issues. For information, see Dashboards on page 117.
• Tools such as the Finder panel, filters, and global search help you quickly find the information you need. For
information, see About the Grid Manager Interface on page 67.
• Use wizards to quickly create new networks and resource records. Editors allow you to configure additional
operational parameters. For information, see Wizards and Editors on page 68.
Before you can use Grid Manager, you must install and configure the NIOS appliance as described in the installation
guide that shipped with your product. You can then access Grid Manager using one of the supported browsers. For
information, see Supported Browsers on page 56.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
Click I Accept. The Grid Setup wizard appears.
— Type: Displays your user type. There are two user types: Local and Remote. The local admin accounts are
stored in the database of the appliance, and the remote admin accounts are stored on another server, such
as a RADIUS server. Grid Manager automatically deletes remote user profiles if the users have not logged in
for more than six months.
— Group: Displays the admin group to which your account belongs. The admin group determines your
administrative permissions. Only superusers can define admin groups through Grid Manager.
— Password: You can set a new password according to the requirements that are displayed.
— Set Password: If you are a local user, select this check box to set a new password for your account. If
you are a remote user, this field does not appear.
— Old Password: Enter your current password.
— New Password: Enter the new password, and then re-enter it in the Retype Password field.
— Email Address: Enter your email address. Note that this address simply provides contact information. By
default, this field is blank.
3. Save the configuration and click Restart if it appears at the top of the screen.
The client and the appliance send all their messages through the SSL tunnel
which uses the cipher settings and encryption to secure their connection.
Public Key
Private Key
To avoid possible attacks in which HTTP or HTTPS connections are made to a web server and stay open much longer
than they should be, Infoblox provides the set connection_limit and show connection_limit CLI commands
that you can use to mitigate these attacks. In general, these attacks can result in the web server reaching its maximum
number of concurrent connections, and thus denying connections from legitimate sources. You can use the CLI
commands to limit the number of concurrent HTTP and HTTPS connections from a given client that corresponds to a
particular IP address. For information about the CLI commands and how to use them, refer to the Infoblox CLI Guide.
Managing Certificates
About HTTPS Certificates
The NIOS appliance generates a self-signed certificate when it first starts. A self-signed certificate is signed by the
subject of the certificate, and not by a CA (Certificate Authority). This is the default certificate. When your computer
first connects to the NIOS appliance, it sends this certificate to authenticate itself to your browser.
Because the default certificate is self-signed, your browser does not have a trusted CA certificate or a cached NIOS
appliance server certificate (saved from an earlier connection) to authenticate the NIOS appliance certificate. Also,
the hostname in the default certificate is www.infoblox.com, which is unlikely to match the hostname of your NIOS
appliance. Consequently, messages appear warning that the certificate is not from a trusted certifying authority and
that the hostname on the certificate is either invalid or does not match the name of the site that sent the certificate.
Either accept the certificate just for this session or save it to the certificate store of your browser.
To eliminate certificate warnings, you can replace the default self-signed certificate with a different certificate that has
the hostname of your NIOS appliance. The NIOS appliance supports X.509 certificates in .PEM format. After the initial
login, you can do one of the following:
• Generate another self-signed certificate with the correct hostname and save it to the certificate store of your
browser.
• Request a CA-signed certificate with the correct hostname and load it on the NIOS appliance. For more
information, see Generating Certificate Signing Requests on page 64.
• When you receive the certificate from the CA, import it to the appliance, as described in Uploading Certificates
on page 64.
• Download the certificate from a trusted CA, as described in Downloading Certificates on page 64.
4. If the appliance already has an existing HTTPS certificate, the new certificate replaces the existing one. In the
Replace HTTPS Certificate Confirmation dialog box, click Yes. The appliance logs you out, or you can manually log
out. When you log in to the appliance again, it uses the new certificate you generated.
Uploading Certificates
When you receive the certificate from the CA, and import it to the appliance, the NIOS appliance finds the matching
CSR and takes the private key associated with the CSR and associates it with the newly imported certificate. The
appliance then automatically deletes the CSR.
If the CA sends an intermediate certificate that must be installed along with the server certificate, you can upload
both certificates to the appliance. The appliance supports the use of intermediate certificates to complete the chain
of trust from the server certificate to a trusted root CA. This eliminates intermediate certificate security warnings that
appear when you open a web browser and try to connect to an Infoblox appliance.
To import a certificate:
1. Grid: From the Grid tab, select the Grid Manager tab -> Members tab -> member check box, and then click
Certificates -> HTTPS Cert -> Upload Certificate from the Toolbar.
2. Navigate to where the certificate is located and click Open.
3. If the appliance already has an existing HTTPS certificate, the new certificate replaces the existing one. In the
Replace HTTPS Certificate Confirmation dialog box, click Yes.
The appliance imports the certificate and logs you out. When you log in to the appliance again, it uses the
certificate you imported.
Downloading Certificates
You can download the current certificate or a self-signed certificate, as described in Generating Self-Signed
Certificates on page 63.
To download a certificate:
1. Grid: From the Grid tab, select the Grid Manager tab -> Members tab -> member check box, and then click
Certificates -> HTTPS Cert -> Download Certificate from the Toolbar.
2. Navigate to where you want to save the certificate, enter the file name, and then click Save.
About CA Certificates
If the CA sends an intermediate certificate that must be installed along with the server certificate, you can upload
both certificates to the appliance. The appliance supports the use of intermediate certificates to complete the chain
of trust from the server certificate to a trusted root CA. This eliminates intermediate certificate security warnings that
appear when you open a web browser and try to connect to an Infoblox appliance.
When you configure two-factor authentication for smart card users, ensure that you upload the required CA
certificates before you enable the OCSP service. For information about two factor authentication and how to configure
it, see Defining the Authentication Policy on page 227. Only superusers and limited-access users with the required
permissions can manage CA certificates. For information about admin permissions, see Administrative Permissions
for OCSP Server Groups and CA Certificates on page 264.
Uploading CA Certificates
To upload a CA-signed certificate:
1. Grid: From the Grid tab, select the Grid Manager tab.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> member check box.
2. Select Certificates -> Manage CA Certificates from the Toolbar.
3. In the CA Certificates editor, click the Add icon.
4. In the Upload dialog box, click Select and navigate to the certificate you want to upload.
5. Select the file and click Upload.
Note: NIOS can only upload certificates that are in PEM format. A.PEM file can contain more than one certificate.
For information about how to convert CA certificates to .PEM format, see Converting CA Certificates to PEM
Format on page 66.
System Messages Banner Messages Breadcrumbs Navigation Long Running Task Global Search
System Messages
Grid Manager displays system messages at the top of the screen. In wizards and editors, it displays messages at the
top as well.
Note: Some configuration changes require a service restart. Grid Manager displays a message whenever you make
such a change. Click the Restart icon that appears in the message to restart services.
• Informational Banner - You can use the informational banner for multiple uses, such as to indicate whether the
Infoblox Grid is in production or a lab system. You can also publish messages of the day.
For more information, see Configuring Security Level Banner on page 326 and Configuring Informational Level Banner
on page 327.
Breadcrumbs Navigation
Breadcrumbs navigation displays your path to the current page. It helps you keep track of your location in Grid
Manager. You can click any of the links to get back to a previous page.
Global Search
Use Global Search to find data. Grid Manager searches the entire NIOS database for data that matches the criteria
you specify. For additional information on Global Search, see Using Global Search on page 78.
Finder Panel
The Finder panel appears on all pages in Grid Manager. It provides the following tools:
• Smart Folders: Use smart folders to organize your data according to criteria that you specify.
• Bookmarks: Stores data that you have marked for easy retrieval.
• Recycle Bin: Stores deleted objects that you can either restore or permanently remove.
• URL Links: You can add, modify, and delete third party URL links of frequently used portals and destination
pages.
You can resize, collapse, and expand the Finder panel.
Toolbar Panel
The vertical Toolbar panel provides easy access to commands. The Toolbar is available in all pages, except the
Dashboard. Its content changes depending on the type of data displayed in the work area. You can resize, collapse,
and expand the Toolbar panel.
Help Panel
The Help panel provides the following types of Help:
• Help: Expand this section to view information about the window currently displayed.
• Documentation: Expand this section to download the latest versions of the Infoblox Administrator Guide and
Infoblox API Documentation.
• Support: Expand this section to view links to the Infoblox web site and Technical Support site.
• About: Expand this section to view information about the NIOS software version.
You can resize, collapse, and expand the Help panel. In addition, each dialog box also provides a Help panel that
contains information specific to the dialog box. You can expand and collapse the Help panel in dialog boxes as well.
Tooltips
Tooltips display the function of each button. Hover your mouse over a button or icon to display its label.
Customizing Tables
Grid Manager uses dynamic tables to display information. You can customize tables by resizing columns, sorting the
data, and selecting certain columns for display. Your settings remain active until you log out.
To resize columns in a table:
1. In the table, place your pointer on the right border of the header of the column you want to resize.
2. Drag the border to the desired width.
To sort the data displayed in a table, click the header title. You can click the header title again to reverse the sort order.
Alternatively, you can do the following:
1. In the table, mouse over to a header title and click the down arrow key.
2. Select Sort Ascending or Sort Descending.
To edit columns:
1. In the table, mouse over to a header title and click the down arrow key.
2. Select Columns > Edit Columns.
3. Do the following:
— Width: Specify the width of the column in pixels. The minimum is five and the maximum is 999.
— Sorted: Indicates whether the data in the column can be sorted
— Visible: Click the check boxes of the columns you want to display, and clear the check boxes of those you
want to hide.
4. Do one of the following:
— Click Apply to apply your settings to the column.
— Click Cancel to close the editor without saving your settings.
— Click Reset to reset the settings to the default.
Grid Manager displays the selected column in the table.
To reorder columns in a table, drag and drop the columns to the desired positions.
Use these
navigational
buttons to page
through the display.
Using Bookmarks
The Bookmarks section displays objects for which you have created bookmarks. You can create bookmarks for
objects such as networks, DNS zones, and admin groups. To bookmark an object, navigate to its page and click the
Bookmark icon at the top of the page. If you have more than one network view, Grid Manager displays the name of
the bookmark with the network view to which the object belongs. For example, when you bookmark IP address
10.128.0.10 in the default network view, Grid Manager displays the bookmark as default > 12.128.0.10.
However, if you have only one network view, Grid Manager displays only the object name 12.128.0.10. If you create
a bookmark before adding more network views, the bookmark name (without the network view) remains the same.
You can rename the bookmark at anytime. You can create only one bookmark for each object, up to 500 objects. When
your bookmarks are close to 500, you may want to remove some to create room for new ones.
You can do the following in Bookmarks:
• Access a bookmarked object
• Edit the name of a bookmark
• Delete a bookmark
To access a bookmarked object, click the name of the bookmark. Grid Manager displays the network view to which
the bookmarked object belongs. For example, clicking on the bookmark of network 10.0.1/24 takes you to the
network list view. You cannot access an object that has been deleted.
You can arrange the order of the bookmarked objects by dragging and dropping the objects in the Finder panel.
To edit the name of a bookmark:
1. Mouse over to the bookmark.
2. Click the Edit icon.
3. Modify the name of the bookmark. Note that you cannot create multiple bookmarks with the same name.
To delete a bookmark:
1. Mouse over to the bookmark.
2. Click the Delete icon. Grid Manager removes the bookmark.
Note: When you upgrade to a new NIOS release, the appliance permanently deletes the objects from the Recycle Bin.
On a NIOS appliance, only superusers have permissions to fully manage the Recycle Bin. If you have limited-access
permissions, you can view, restore, and permanently remove only the objects that you deleted.
For Cloud Network Automation, the Recycle Bin is not supported on the Cloud Platform Appliance. Only deletions
perform on the Grid Master are stored in the Recycle Bin. Deleted objects can only be restored from the Grid Master.
For information about Cloud Network Automation, see Deploying Cloud Network Automation on page 361.
You can do the following in the Recycle Bin:
• View deleted objects
• Restore deleted objects
• Remove deleted objects
• Empty the Recycle Bin
Using Filters
You can control the amount and the kind of data displayed in a specific panel by adding filter criteria. When you add
filter criteria, the appliance screens the data based on your filter rules and displays only the information that matches
the rules. To narrow your search for specific information, you can add up to 10 filter rules. In some panels, such as
the DHCP Networks tab, you can switch between viewing information with and without the filter criteria by toggling
the filter on and off. You can save filter criteria as quick filters so you can reuse the same filter rules to obtain updated
information without redefining them each time you log in to the appliance. For information about quick filters, see
Using Quick Filters on page 77.
You can also use filters to find objects that have failed an operation. When you try to modify multiple objects with the
same extensible attribute, the appliance may not modify all of the selected objects. For information, see About
Extensible Attributes on page 417. For example, after you modify the extensible attribute “Building” with new value
“West”, you can find the objects that are not updated by defining a filter with “Building” “does not equal” “West”.
Depending on the filter criteria, you can use different filter operations to narrow down your search results. Grid
Manager supports the following filter operations based on your selected filter criteria:
• equals: Defines a specific value for a selected filter criterion
• does not equal: Defines a selected filter criterion that does not equal a specific value
• begins with: Specifies a beginning value for a selected filter criterion
• does not begin with: Specifies a selected filter criterion that does not begin with a specific value
• has a value: Specifies a selected filter criterion that contains a value
• does not have a value: Specifies a selected filter criterion that does not contain a value
• belongs to: Defines a selected filter criterion that belongs to a specific parent object
• Inheritance State equals: Specifies a specific inheritance state
To use a filter:
1. In a panel, click Show Filter to enable the function.
2. In the filter section, complete the following:
— In the first drop-down list, select a field such as an object name, comment, or an extensible attribute (fields
with a gray background) as the filter criterion. Grid Manager displays only the supported fields.
— In the operator drop-down list, select an operator for the filter criterion. Depending on what you select in
the first filter field, this list displays the relevant operators for the selection. The operator Inheritance State
equals is displayed only when you select an inheritable extensible attribute from the Type drop-down list.
This operator is not displayed if the extensible attribute is not inheritable.
— In the value field, enter or select the attribute value for the first filter field. Depending on what you select for
the first two filter fields, you can either enter a value or select an attribute from a drop-down list. For
example, if you select an extensible attribute in the first filter field, you can enter the attribute value here. If
you select an inheritable extensible attribute from the Type drop-down list, and select Inheritance State
equals in the operator drop-down list, the value field displays a drop-down list with these values: Inherited
and Overridden/No Parent. When you select Inherited, extensible attributes that are inherited by the
descendants are listed. When you select Overridden/No Parent, extensible attributes which are overridden
or do not have a parent are listed.
3. Optionally, click the + icon to add another filter rule. You can add up to 10 filter rules.
4. Click Apply to apply the rules
or
Click Reset to clear the filter criteria.
To view information with or without the filter criteria:
• Click Toggle Filter On to apply filter criteria to the displayed data. Grid Manager displays only the filtered data in
the panel.
or
Click Toggle Filter Off to have the appliance list all data without applying filter criteria.
Note: In the default DNS zone view, the appliance displays forward mapping zones first, followed by IPv4 reverse
mapping zones, and then IPv6 reverse mapping zones.
• Global quick filters: Only superusers can define global quick filters. You can make global filters available to all
users. Limited-access users can use global quick filters, but they cannot modify them. Global filters are prefixed
with [G] in the filter list.
• Local quick filters: Limited-access users can create local quick filters for their own use. You cannot share local
quick filters with other users in the Grid. Local filters are prefixed with [L] in the filter list.
5. In the Save Quick Filter dialog box, you can click Save to save the modified filter criteria under the same quick
filter name. You can also modify the quick filter name, as described in Modifying Quick Filters on page 77, and
save the entry as a new quick filter.
6. Save the configuration.
Note: Depending on the size of your database, global search may take a long time to complete. Grid Manager times
out when queries or searches take longer than 120 seconds. To expedite searches, use filters to refine the
search criteria. You can also use basic global searches if you have a large data set and you only need to search
by a single filter criterion.
— Optionally, click the + icon to add another filter. You can add up to 10 filter rules.
— Include Extensible Attributes Values: Select this check box to include extensible attributes in the
search results for the matching objects. Once selected, this configuration affects all future searches for
the current user. Note that it might take longer for the search results to appear if there are a large
number of extensible attributes associated with the matching objects.
Note: You can save each search that contains multiple filter criteria as a quick filter for future use. For information
about quick filters, see Using Quick Filters on page 77.
3. Optionally, you can click Reset to clear the search results and start a new search. You can also click the Refresh
icon to refresh the search results.
Grid Manager stores the search results until you reset the search parameters or log out.
4. After you finish defining filters, click Search or press Enter.
In the Results table, Grid Manager displays the following information:
• Name: The name of the matching object. This field displays the name of the matching object and the path to the
matching object if the object is a network or an IP address. You can click the link to open, view, and edit the
object.
• Type: The type of the matching object. For example, bulk host, NS record, forward-mapping authoritative zone,
or network container.
• Matched Property: The attribute or property of the matching object. For example, if the search value matches the
email address that corresponds to a hostname, this field displays Email. If the search value matches the DNS
view of a resource record in a DNS zone, this field displays DNS View/FQDN.
• Matched Value: The value of the matching object. For example, if an IP address contains the search value, this
field displays the IP address. If a hostname contains the search value, this field displays the hostname.
• IP Address: The IP address of the matching object. When you click the IP address link, Grid Manager displays the
corresponding IP address panel from which you can view detailed information.
• Comment: Comments that were entered for the matching object.
• Site: Values that were entered for the matching object.
Note: If you have selected to include extensible attribute values, you can select the corresponding columns to be
displayed in the search results. Extensible attribute columns are hidden by default.
Grid Manager deletes the selected objects from the database. Most deleted objects are stored in the Recycle
Bin. For information, see Using the Recycle Bin on page 73.
You can print search results. You can also export search results in CSV (comma separated value) format. For
information, see About CSV Import on page 101 and Exporting Displayed Data on page 111.
About Tasks
When you perform a task, such as adding a DNS zone or modifying a DHCP range, you can execute it immediately or
schedule it for a future date and time, depending on your permissions. For information about how to schedule a task,
see Scheduling Tasks on page 85.
Certain tasks, scheduled or not, may be subject to approvals if approval workflows are defined for specific admin
groups. For information about how to define submitters and approvers for an approval workflow, see Configuring
Approval Workflows on page 94.
Note that not all tasks can be scheduled or routed for approval. For a list of supported objects, see Supported Objects
for Scheduled and Approval Tasks on page 84.
When you schedule a task or submit it for approval, consider the following:
• The appliance cannot execute a scheduled or approval task that is associated with an extensible attribute, if
you delete the extensible attribute after you have scheduled the task or submitted it for approval. For
information about extensible attributes, see About Extensible Attributes on page 417.
• The appliance cannot execute, reschedule, or delete a task that is associated with a child object (such as a
DHCP range) if you delete the parent object (such as a network) after you have scheduled the task or submitted
it for approval.
• There are certain guidelines about scheduled and approval tasks when you upgrade the software, back up the
database, and restore data. For information, see Guidelines for Upgrading, Backing Up, and Restoring Data on
page 85.
Viewing Tasks
The appliance displays scheduled tasks and approval tasks in the Task Manager tab of Grid Manager. Scheduled
tasks are those with scheduled time listed and approval tasks contain approval status. A task can also be scheduled
and queued for approval at the same time. By default, all completed and rejected tasks are displayed in Task Manager
for up to 14 days before they are removed from the list. You can configure how long the completed and rejected tasks
are displayed in Task Manager using the CLI command set delete_tasks_interval. For more information about
the CLI command, refer to the Infoblox CLI Guide.
The appliance logs all tasks in the audit log and associates each with a task ID. By default, Grid Manager sorts tasks
by Task ID in Task Manager. You can view tasks that you are allowed to see based on your permissions. For information
about admin permissions, see About Administrative Permissions on page 195.
To view tasks:
1. From the Administration tab, select the Workflow tab -> Task Manager tab.
2. Grid Manager displays the following information for each task:
— Task ID: The ID associated with the task. The appliance assigns an ID to a task in chronological order. By
default, the appliance sorts tasks by Task ID.
— Type: Indicates key information about certain types of executing/executed jobs. The Type column lists
values for Port Control and for Object Change tasks undertaken by Grid Manager or submitted by Grid
Manager for approval by the administrator.
— Affected Object: The name or value of the object that is associated with the task. For example, if the task
involves an A record, this field displays the domain name of the record. If it is a fixed address, it displays
the IP address of the fixed address.
— Scheduled Time: The date, time, and time zone when the appliance executes the task.
— Submitted Time: The date, time, and time zone when the task was submitted.
— Submitter: The username of the admin who scheduled or submitted the task.
— Ticket Number: For an approval workflow, this number may be entered by the submitter to associate the
task with a help desk ticket number or a reference number.
— Submitter Comment: Comments entered by the submitter.
— Approval Status: The current approval status. Possible values are Approved, Not Applicable, Pending, and
Rejected.
— Execution Status: The execution status of the task. Possible values are Completed, Failed, Pending, and
Executing.
— Executed Time: The date, time, and time zone the task was executed.
— Associated Task: (hidden by default) Applies to Port Configuration tasks. If a port configuration task is
dependent on an object change task (such as a new Fixed Address or an edit to an existing object), this
could will show the Task ID value for the associated object change task.
— Action: The operation the appliance performs in this task. The can be: Add, Modify, Delete, Network
Discovery, Lock/Unlock Zone, or Restart Services.
— Task Details: Detailed information about the task. This message also appears in the audit log.
— Approver: The username of the admin who has approved this task.
— Approver Comment: Comments entered by the approver.
— Object Type: The object type. For example, the appliance can display A Record or Fixed Address.
You can do the following in the Task Manager tab:
• Sort the tasks in ascending or descending order by column, except for Task Details.
• Use filters and the search function to look for specific values.
Note: You cannot use the search function to search for approval or execution status. Use filters to search for
these values.
• Create a quick filter to save frequently used filter criteria. Grid Manager provides the following default quick
filters that you can select from the Quick Filter drop-down list: Pending Approvals, Rejected Tasks, and
Scheduled Tasks. For more information, see Using Quick Filters on page 77.
• Export and print the information in the table.
• Control the display of information in the panel by toggling between a single-line view and a multi-line view.
• Reschedule a task, cancel a scheduled task, or execute a task immediately.
• For approvers, select a task and click the Approve icon to approve the task, or click the Reject icon to disapprove
the task. You can also reschedule the task while approving it.
Note: If you have multiple pages of tasks in Task Manager, you can select multiple tasks on the current page for
approval or disapproval. If you click the Select all objects in this dataset link to select all the tasks in the
dataset, the Approve and Reject icons are disabled and you cannot approve or reject any task.
• (Applies only with Network Insight) Approve and Reject: Enables admins to approve or reject a pending job;
rejecting a job immediately cancels it.
• Associated Task (applies only with port configuration tasks): Choosing this option opens the object change
task, if any, for the currently selected port configuration task.
• Execution Log: Opens a completed task’s execution log window. the Execution Log lists the complete
communications sequence sent to a device to perform a port control task.
• Execute Now: Force a selected pending task to execute immediately.
• Re-execute: Allows you to re-run the selected task. Combined with the Execution Log, this process can aid in
troubleshooting a failed port control task.
• Reschedule: Opens the Reschedule window for the selected task. To immediately execute this task, click Now.
Or, in the Reschedule panel, click Later, and then specify a date, time, and time zone. You can reschedule the
task if you have the applicable permissions. Click Save to commit the changes.
• Delete: Deletes the pending task.
• View: Opens the Task Viewer to the currently selected task. For related information, see Using the Task Viewer to
View Job Logs and Approve Jobs on page 135.
Scheduling Tasks
You can schedule tasks, such as adding DNS zones, modifying fixed addresses, and restarting services, for a future
date and time. The scheduling feature is useful when you want to add, modify, or delete a record, or schedule a
network discovery at a desired date and time. Using this feature, you can streamline your day-to-day operations. For
example, you can schedule the deletion of records that you use for testing when the test time is up. You can also
reassign an IP address to a fixed address when the location of the server to which the fixed address is assigned
changes from one network to another.
You can schedule the addition, modification, and deletion of certain objects. For a list of the supported objects, see
Supported Objects for Scheduled and Approval Tasks on page 84.
Depending on your permissions and the admin group to which you belong, your scheduled tasks may be subject to
approvals by other admins in your organization. You may or may not receive email notifications about the status of
your scheduled tasks depending on the configuration of the approval workflows. Approvers can reschedule your
tasks after they have approved the tasks, if they have scheduling permissions. When you schedule and submit a task,
you may need to enter a ticket number associated with the task or a comment about the task. For more information
about approval workflows, see Configuring Approval Workflows on page 94.
Only superusers can view, reschedule, and delete all scheduled tasks. Limited-access admins can reschedule and
delete only their scheduled tasks. If your scheduled tasks require approvals, the approvers who have scheduling
permissions may reschedule your tasks to a different date and time after they have approved the tasks. Depending
on your admin permissions, there are certain scheduled and approval tasks that you may or may not be able to
perform. For more information, see Supported Tasks for Different Admin Groups on page 95.
The appliance sends email notifications to local admins, except for those who do not have email addresses, when
email notification is enabled for the admins and any of the following happens:
• A superuser schedules a task, and another superuser reschedules or deletes the task.
• A limited-access admin schedules a task, and a superuser reschedules or deletes the task.
• A superuser or a limited-access admin schedules a task, and the task fails.
• An admin is configured to receive notifications based on the configuration of an approval workflow. For
information about approval workflows, see Configuring Approval Workflows on page 94.
Superusers can also grant scheduling permissions to other admin groups. When the scheduling permission is added
or inherited from an admin role, limited-access admin groups can schedule tasks. For information, see Administrative
Permissions for Network Discovery on page 238.
1. To create the new object immediately, select Now and click Save & Close.
2. You can choose to have Grid Manager create the object at a later time. To do so, select Later. Choose a Selected
time by entering or selecting a Start Date (click the calendar icon to choose a calendar date) and a Start Time
(click the clock icon to choose a specific time in fifteen minute increments), and choose a Time Zone.
When you step through the entire Wizard process (without clicking Schedule for Later) and if you also define port
configuration settings, the object creation wizards provide a final Scheduling page with separate scheduling
definitions, for the object and for the object’s port configuration, as shown in Figure 1.8:
The final step for creating the Network, Fixed Address, Host, or IP reservation is to define when the task executes,
including associated port control definitions. The port configuration is performed in a separate task, defined on the
same wizard page. The port configuration task can be done at the same time that Grid Manager provisions the object,
or may be scheduled for a later time.
1. To create the new object immediately, select Now.
By selecting Now, no task is created by Grid Manager and it simply creates the object. The completed object
creation appears in the audit log (for related information, see the Viewing Tasks on page 82). Grid Manager
creates a task for object creation only when you use Schedule for Later. Also, all port configuration and network
provisioning instances create a new task under the Task Manager.
2. You can instruct Grid Manager to create the network at a later time. To do so, select Later. Choose a Selected time
by entering or selecting a Start Date (click the calendar icon to choose a calendar date) and a Start Time (click
the clock icon to choose a specific time in fifteen minute increments), and choose a Time Zone.
3. Port configuration and network provisioning tasks can be synchronized to take place at the same time as the
creation of the new object under IPAM/DHCP; if so, keep the At same time as above option.
a. You can also schedule the task at a different time. To do so, select Later (under Port Configuration). Choose
a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar date) and
a Start Time (click the clock icon to choose a specific time in fifteen minute increments), and choose a Time
Zone.
The Port Configuration provision cannot take place at a schedule time or date before the associated object
creation.
Object creation must successfully complete before its associated port configuration task begins.
4. Click Save & Close to complete the configuration.
Note: Port configuration tasks (or any operation that queries for or changes device configurations through Grid
Manager, including Discovery) are subject to a feature called Blackout Periods, which are defined elsewhere
in Grid Manager. Blackouts are a scheduled feature that instructs Grid Manager not to perform Discovery
operations and Port Control/provisioning operations on the managed network at specified times, days and
dates. See the section Defining Blackout Periods on page 731 for details.
Figure 1.9 Create Network Schedule page (After clicking Schedule for Later)
In cases of this type, you schedule or execute only a single task: creating the new network under DHCP/IPAM. No
network provisioning task takes place.
When you provision the network without clicking Schedule for Later, the wizard provides a final Scheduling page with
an expanded set of two task schedules as shown in Figure 1.10:
Note: Network provisioning tasks (or any operation that queries for or changes device configurations through Grid
Manager, including Discovery) are subject to a feature called Blackout periods, which are defined elsewhere
in Grid Manager. Blackouts are a scheduled feature that instructs Grid Manager not to perform Discovery
operations and Port Control/provisioning operations on the managed network at specified times, days and
dates. See the section Defining Blackout Periods on page 731 for details.
— Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
4. Save the configuration and click Restart if it appears at the top of the screen.
Scheduling Deletions
You can schedule the deletion of an object or an operation for a later date and time. However, you cannot schedule
the deletion of a previously scheduled task.
To schedule a deletion:
1. Navigate to the object.
2. Select Schedule Deletion from the Delete drop-down menu.
3. In the Schedule Deletion dialog box, complete the following:
— Delete Now: Select this to delete the object upon clicking Delete Now.
— Delete Later: Select this to schedule the deletion at a later date and time. Complete the following:
— Date: Enter the date in YYYY-MM-DD (year-month-day) format. The appliance displays today’s date. You
can also click the calendar icon to select a date from the calendar widget.
— Time: Enter the time in hh:mm:ss AM/PM (hours:minutes:seconds AM or PM) format. You can also
select a time from the drop-down list by clicking the time icon.
— Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
4. Click Schedule Deletion.
The appliance performs the deletion at the scheduled date and time.
• Delete only the parent container: Select this to delete only the parent objects and re-parent the
child objects.
• Delete the parent container and its children: Select this to delete the parent objects and all its
child objects.
4. Click Schedule Deletion.
The appliance performs the deletion at the scheduled date and time.
Schedule Icon
In the editor, Grid Manager displays the Schedule icon in green to indicate a pending scheduled task associated with
the corresponding object, as shown in Figure 1.12. You can click the Schedule icon to view the date and time of the
scheduled task. You can also reschedule the task if you have the applicable permissions. For information, see
Rescheduling Tasks on page 92.
Green icon
indicates
pending
scheduled
tasks.
Rescheduling Tasks
Superusers can reschedule any scheduled task. Limited-access admins can reschedule only the tasks that they
scheduled, depending on their permissions. Approvers can reschedule tasks that they have approved, if they have
the scheduling permission. You can reschedule a task from different panels of Grid Manager, depending on your
permissions. When you reschedule a task from the object list panel, Grid Manager displays the object or operation
configuration in a read-only mode. You can modify the date and time to reschedule the task. However, you cannot
modify the configuration of the object or operation. You can also reschedule your own task or a task you have
approved from Task Manager.
To reschedule tasks associated with objects, see Rescheduling Tasks Associated With Objects.
To reschedule tasks associated with operations, see Rescheduling Tasks Associated with Operations.
Figure 1.13 Rescheduling an object change task and a port control task
Note: When an admin group is defined as a submitter group, there are certain operations the submitters cannot
perform even though they may have the permissions to do so. For information about such operations, see
Unsupported Operations for Submitters on page 99.
You can do the following after you have created approval workflows:
• View a list of approval workflows, as described in Viewing Approval Workflows on page 97.
• Modify approval workflows, as described in Modifying Approval Workflows on page 97.
• Delete approval workflows, as described in Deleting Approval Workflows on page 98.
• View a list of approval tasks, as described in Viewing Approval Tasks on page 98.
• View approval notifications, as described in Viewing Approval Tasks on page 98.
Task ID: 32
Submitter: subm
Approver: jdoe
Submit time: 2012-10-09 05:55:01 (UTC) Coordinated Universal Time
Execution time: N/A
Object type: NS Record
Action: Add
Affected object: corp1.com
Ticket number: MKTG245
Submitter comment: Create an NS record.
Approver comment: Approved.
Note: When you can click the hyperlink displayed in the notification, you can log in to Grid Manager and access
the Task Manager tab in a separate browser tab or window.
Note: You cannot stop a long running task once you start it.
You can view the progress of the task by clicking the progress bar at the top of the interface. For information, see
Monitoring Long Running Tasks on page 101.
To access CSV Job Manager, from the Data Management tab, click CSV Job Manager from the Toolbar and select Jobs
Manager, or from the Tasks Dashboard, click CSV Import in the IPAM Task Pack. Superusers and limited-access users
that have applicable configurations and permissions can perform CSV imports and exports. For information about
user permissions for CSV imports and exports, see CSV Import User Permissions.
Note: The list of CSV import jobs are not restored when you restore a backup file or when you promote a master
candidate.
Table 1.2
Note: The replace operation might affect system performance if you try to replace a zone with a lot of changes.
Infoblox recommends that you perform the replace operation for large import files (more than 10,000 rows
of changes) during non-peak hours. This operation ignores _new_XXX fields in the imported CSV files.
— Stop import: Select this to stop the data import once it encounters an error in the uploaded file. Grid
Manager displays the row number at which it stops the import when it encounters an error. NIOS saves the
changes made to the CSV file before an error occurs. For example, if there are 100 rows of data and you
select this option, and there is an error in row 90, the appliance displays 90 of 100 completed, 1 error.
— Skip to the next row and continue: Select this to skip over errors and continue the data import. You can
download an error report to identify the erroneous data. NIOS displays the total number of rows it has
processed by skipping over. For example, if there are 100 rows of data and you select this option, the
appliance displays 100 of 100 completed, 1 error.
5. Click Next to preview your CSV file. In the File Preview table, Grid Manager displays the header row, the first six
rows, and up to 15 columns of the imported data. You cannot edit the data here. Field names with asterisks (*)
indicate required fields. Note that you must define these fields in the imported file. If any of the required fields
are missing, the appliance generates an error during the import operation. You can do the following in this
wizard:
— Import type: The type of import option you have selected.
— File name: The name of the CSV file you have selected.
— Separator: Select a separator for your CSV file from the drop-down list. The default value is Comma.
— On Error: The option you have selected.
6. Click Test to verify the content in your CSV file. Click Yes in the Test CSV Import for Replace Operation dialog box
to verify the content or click No to cancel the operation. NIOS automatically analyzes the data in the imported file
for any syntax errors or other violations. You can also view a detailed report of the file that you are importing. Note
that you can run the test as a background task. This report also displays information about the number of
deleted, updated and added files. It also displays error messages, if any. NIOS generates a results file listing the
file name, action performed, date and time, result, and the number of failures at the end of the validation. You
can view the results file only after the replace operation is complete.
Note: The Test button is enabled only when you select the Replace operation and is disabled for other import
options.
7. Click Import to import the CSV file to the database. Click Yes in the dialog box to import the CSV file or No to cancel
the operation.
8. You can view the progress and results of your import operation in the CSV Import Progress wizard. This wizard
displays the following information:
— Import type: The type of import option you have selected.
— File name: The name of the CSV file you have selected.
— Separator: The separator you have selected for your CSV file. The default value is Comma.
— On Error: The option you have selected when the import operation encounters an error.
— Current status: If an import is in progress, this field displays its current status. Otherwise, it displays the
date and time of the last import.
— Last action: Displays the last operation and the admin who initiated it.
— Rows Completed: The number of rows of data the import has processed. Depending on the import options,
Grid Manager displays either the row number at which it stops an import when it encounters an error or the
total number of rows it has processed by skipping over the erroneous data. For example, if there are 100
rows of data and you select “On error: Stop importing,” and there is an error in row 90, Grid Manager
displays 90 of 100 here. If you select “On error: Skip to the next row and continue,” Grid Manager displays
100 of 100 here and displays 1 in Rows with Errors.
— Rows with Errors: The number of rows of data the import has detected errors. Click Download Errors to
download the CSV file that contains the fields and the rows of erroneous data. You can use this report as a
reference to update the data file before you import the file again.
To cancel the import operation, click Stop Import before the operation is complete. To close the wizard and
execute the operation in the background, click Close & Run in Background. When the operation is complete, you
can click Download errors to download and view the errors. The Download errors button is enabled only if the
operation encounters errors. Click Save & Close to save the operation and close the wizard.
Note: Superusers can view all CSV import jobs and limited-access users can view only the jobs they submitted.
Note: After a product restart, which can be caused by a failover, all Import in progress jobs go into Import
stopped state; all Import pending jobs continue to be queued for execution.
Note: Superusers can view all CSV import jobs and limited-access users can view only the jobs they submitted.
Note: When you delete a parent object from the CSV file, the child objects associated with the parent objects are also
deleted.
Downloading Files
You can download various types of files based on the import operation that you have selected. You can download the
following files: uploaded, error, results, and snapshot. Superusers can download the original imported file.
Note: Limited-access users can export up to 2,000 rows (2,000 objects) of data. For performance reasons, NIOS has
limited the objects to 2,000. If data exceeds 2,000 rows, the CSV file contains the first 2,000 rows of data and
a message at the end that indicates the report is not complete. Only superusers can export data that exceeds
2,000 rows. For example, consider that you are exporting Infoblox::DNS::Host objects. The NIOS appliance
displays an output file with 4,000 lines, because the Host record consists of two lines, one for the HostRecord
and another for the HostAddress; however, the total count of objects will still remain 2,000.
The appliance exports all the fields of the records that are displayed in this panel based on your filter criteria. You can
either open the data file or save it to your computer. The appliance uses a default file name depending on the panel
from which you perform the export. For example, when you export the data from the IPAM tab, the default file name
is Allnetworks.csv. When you export data from the DNS tab, the default file name is Allzones.csv. The file contains a
header row that includes all the fields of the corresponding record type. You can update this data file, and then
re-import the data in to the database.
You can also export the displayed fields in a panel. For information, see Exporting Displayed Data on page 111.
Multilingual Support
The NIOS appliance supports UTF-8 (Unicode Transformation Format-8) encoding for the following:
• Hostnames for Microsoft Windows clients that support Microsoft Windows code pages. For information, see
Configuring UTF-8 Encoding for Hostnames on page 1092.
• Input fields through Grid Manager. For information, see UTF-8 Supported Fields on page 112.
UTF-8 is a variable-length character encoding standard for Unicode characters. Unicode is a code table that lists the
numerous scripts used by all possible characters in all possible languages. It also has a large number of technical
symbols and special characters used in publishing. UTF-8 encodes each Unicode character as a variable number of
one to four octets (8-bit bytes), where the number of octets depends on the integer value assigned to the Unicode
character. For information about UTF-8 encoding, refer to RFC 3629 (UTF-8, a transformation format of ISO 10646) and
the ISO/IEC 10646-1:2000 Annex D. For information about Unicode, refer to The Unicode Standard.
Depending on the OS (operating system) your management system uses, you must install the appropriate language
files in order to enter information in a specific language. For information about how to install language files, refer to
the documentation that comes with your management system.
Note: For data fields that do not support UTF-8 encoding, the appliance displays an error message when you use
non-English characters.
Note: You can use special characters in the Unicode and Punycode fields.
— Click Clear to clear the entries. Note that when you click Clear for a specific conversion, the appliance clears
only the error message that corresponds to that conversion.
3. Click Close.
• The IPAM tab displays IDNs for DNS resource records associated with IP addresses, such as A records, AAAA
records, hosts, and PTR records. For information, see About IP Address Management on page 577.
• The DNS Zones Last Queried report and DNS Resource Records Last Queried report support IDNs. For
information, see Predefined Report Categories on page 1429.
• The audit log entries are displayed in their original characters. The audit log contains IDN data as received by
the appliance and as specified by the administrators. Note that the punycode representation generated by NIOS
is not displayed in the audit log.
• When you upgrade from a previous NIOS release, the appliance converts all punycode to IDNs. If the conversion
fails, the appliance retains the punycode representation to avoid upgrade failure. For information about
upgrades, see Guidelines for Upgrading, Backing Up, and Restoring Data on page 85.
• When you restore a backup file from a previous NIOS release, the appliance converts all punycode to IDNs. If the
conversion fails, the appliance retains the punycode representation to avoid failure to restore the database. For
information, see Guidelines for Upgrading, Backing Up, and Restoring Data on page 85.
• If synchronized data between the appliance and Microsoft servers contains IDNs, the IDNs are preserved. For
information, see Managing Microsoft DNS Servers on page 1284.
• When you add domains in the Inclusion list and Exclusion list. For information, see Excluding Domains From
Query and Response Capture on page 1403.
• When you configure rules for a local RPZ and RPZ feed. For information, see Configuring Local RPZs on page
1677 and Infoblox RPZ feeds on page 1693.
About Dashboards
The Dashboard is your home page on Grid Manager. It provides easy access to tasks and a quick view to the status of
your Grid and core network services. Grid Manager provides the following dashboards:
• Tasks: The Tasks dashboard contains task packs that provide easy access to commonly performed tasks. A task
pack is a collection of tasks that belong to a specific service or function, such as IPAM or Automation. For
information, see The Tasks Dashboard on page 119.
• Status: A status dashboard contains widgets from which you can view and manage DNS, DHCP, and IPAM status
and data. You can configure multiple status dashboards for managing a large number of Grid members. For
information, see Status Dashboards on page 138.
When you first log in to Grid Manager, the tasks dashboard is your home page. You can change your home page for
subsequent logins.
To change your home page:
1. Navigate to any tab in Grid Manager (except for the Dashboards tab).
2. Click User Profile from the Toolbar and complete the following In the User Profile dialog box:
— Default Dashboard: Select Status or Task from the drop-down list.
3. Save the configuration.
Grid Manager displays the selected dashboard as your home page when you log in the next time.
Note: The Tasks Dashboard will not appear in the NIOS system if no task packs are licensed for the system. Some
task packs will also have dependencies. For example, the Network Automation Task Pack licensing activates
along with either the MS license or the NIOS DHCP/DNS combination license. Should either of those licenses
be disabled for any reason, the Network Automation Tasks will also be disabled.
To use the Automation Task Pack, you must enable the Network Automation Tasks feature set and establish a working
connection between the NIOS appliance and an Infoblox Network Automation appliance. See Enabling the Network
Automation Tasks on page 129 for details.
Each task in a task pack opens a workflow dialog in which you can create task-related objects without navigating
through other tabs and editors in Grid Manager. Depending on the task you perform, Grid Manager displays task
results in the Result page from which you can access newly created objects, such as networks and host records. Note
that when a task takes longer than usual to complete, it becomes a long running task. For information about long
running tasks, see About Tasks on page 81.
With valid licenses and proper registrations, Grid Manager displays the following task packs in the Tasks Dashboard:
• The IPAM Task Pack on page 120
• The Network Automation Task Pack on page 130
For information about how to install licenses, see Managing Licenses on page 478.
Add Networks
You can create IPv4 and IPv6 networks from the Tasks Dashboard (either from scratch or from a network template that
contains predefined properties). You can also create networks from the Data Management tab. For more information
about IPv4 and IPv6 networks, see Configuring IPv4 Networks on page 1111 and Configuring IPv6 Networks on page
1160.
To add networks from the Tasks Dashboard:
1. Click Add Networks in the IPAM task pack and complete the following in the Add Networks wizard:
— Regional Internet Registry: This section appears only when support for RIR updates is enabled. For
information about RIR, see RIR Registration Updates on page 555. Complete the following to create an RIR
IPv4 network container or network:
— Internet Registry: Select the RIR from the drop-down list. The default is RIPE. When you select None, the
network is not associated with an RIR organization.
— Organization ID: Click Select Organization and select an organization from the RIR Organization
Selector dialog box.
— Registration Status: The default is Not Registered. When adding an RIR allocated network, you can
change this to Registered and select the Do not update registrations check box below. Note that when
you select API as the communication method, the registration status will be updated automatically
after the registration update is completed. However, when you select Email as the communication
method, the registration status will not be automatically updated. If you are creating a new network
and the registration update is completed successfully, the status will be changed to Registered. If the
update fails, the status will be changed to Not Registered. The updated status and timestamp are
displayed in the Status of last update field in the IPv4 /IPv6 Network Container or IPv4/IPV6 Network
editor.
— Registration Action: Select the registration action from the drop-down list. When you select Create, the
appliance creates the IPv4 or IPv6 network and assigns it to the selected organization. When you select
None, the appliance does not send registration updates to RIPE. When you are adding an existing RIR
allocated network to NIOS, select None. When you are adding networks to an RIR allocated network (a
parent network), select Create. Ensure that the parent network associated with an RIR organization
already exists.
— Do not update registrations: Select this check box if you do not want the appliance to submit RIR
updates to RIPE. By default, the appliance sends updates to the RIR database based on the configured
communication method.
— Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the network.
— Protocol: Select IPv4 to add IPv4 networks and IPv6 to add IPv6 networks.
— Netmask: Enter the netmask or use the netmask slider to select the appropriate number of subnet mask
bits for the network.
— Template: Click Select Template to select a network template. When you use a template to create a network,
the configuration of the template applies to the new network. If the template specifies a fixed netmask, you
cannot edit the netmask in this dialog. You can click Clear to remove the template. For information about
templates, see About IPv4 Network Templates on page 1146 and About IPv6 Network Templates on page
1154.
— Use Active Directory Sites: This check box is displayed only if you install the Microsoft license. Click the Add
icon to associate multiple Active Directory Sites with the network. When you click Add, the appliance
displays the following:
— Active Directory Domain: The Active Directory Domains that are synchronized from the Microsoft server.
Click an Active Directory Domain that you want to associate.
To search for a particular Active Directory Domain, specify the respective name and click Go. If there are
multiple Active Directory Domains, the appliance displays the list of such domains by paging to the next
page. You can use the page navigation buttons that are displayed at the bottom of this column to
navigate through the Active Directory Domains. You can also refresh the values in the column using the
Refresh icon.
— Active Directory Site: The Active Directory Sites that are associated with the selected Active Directory
Domain. Click an Active Directory Site that you want to associate with the network.
To search for a particular Active Directory Site, specify the respective name and click Go. If there are
multiple Active Directory Sites, the appliance displays the list of such sites by paging to the next page.
You can use the page navigation buttons that are displayed at the bottom of this column to navigate
through the Active Directory Sites. You can also refresh the values in the column using the Refresh icon.
— Click Add to add the selected Active Directory Sites to the network or click Cancel to cancel the
operation. The appliance displays these domains and sites in the respective columns. Click the x icon if
you want to close the Active Directory Domains and Sites selector.
— Click the Delete icon to delete Active Directory Sites that are associated with the network.
For more information about Active Directory Domains and Sites, see About Active Directory Sites and
Services on page 1267.
NIOS may execute discovery on the newly created network after you save your settings. When you create a
network in NIOS, it inherits its discovery capabilities (whether or not it is immediately discovered, its polling
settings, and any possible exclusions from discovery), from its parent network (if it has one) or its network
container. If the new network is a parent network, it inherits its polling settings from the Grid and its discovery
member selection and Enable Discovery action must be defined by the user.
— Networks: Do one of the following to add new networks:
Click the Add icon to create a new network.
— For IPv4 networks: Grid Manager adds a row to the table. Enter the network address in the Network
field. Click the Add icon to add another network. You can also select a network and click the Delete icon
to delete it.
— For IPv6 networks: If you are adding a network for a previously defined global IPv6 prefix, you can select
the prefix from the IPv6 Prefix drop-down list. The default is None, which means that you are not
creating an IPv6 network for a previously defined subnet route. If you have defined a global prefix at the
Grid level, the default is the global prefix value. Click Add and Grid Manager adds a row to the table.
Enter the network address in the Network field. When you enter an IPv6 address, you can use double
colons to compress a contiguous sequence of zeros. You can also omit any leading zeros in a
four-hexadecimal group. For example, the complete IPv6 address
2001:0db8:0000:0000:0000:0000:0102:0304 can be shortened to 2001:db8::0102:0304. Note that
if there are multiple noncontiguous groups of zeros, the double colon can only be used for one group to
avoid ambiguity. The appliance displays an IPv6 address in its shortened form, regardless of its form
when it was entered. Click Add again to add another network. You can also select a network and click
the Delete icon to delete it.
or
Click the Next Available icon to have the appliance search for the next available network. For more
information about the next available network, see About the Next Available Network or IP Address on page
1109. Complete the following in the Next Available Networks section:
— Create new network(s) under: Enter the network container in which you want to create the new network.
When you enter a network that does not exist, the appliance adds it as a network container. When you
enter a network that is part of a parent network, the parent network is converted into a network
container if it does not have a member assignment or does not contain address ranges, fixed
addresses, reservations, shared networks, and host records that are served by DHCP. When you enter a
network that has a lower CIDR than an existing network, the appliance creates the network as a parent
network and displays a message indicating that the newly created network overlaps an existing
network. You can also click Select Network to select a specific network in the Network Selector dialog
box. For information about how the appliance searches for the next available network, see Obtaining
the Next Available on page 1110.
— Number of new networks: Enter the number of networks you want to add to the selected network
container. Note that if there is not enough network space in the selected network to create the number
of networks specified here, Grid Manager displays an error message. The maximum number is 20 at a
time. Note that when you have existing networks in the table and you select one, the number you enter
here includes the selected network.
— Click Add Next to add the networks. Grid Manager lists the networks in the table. You can click Cancel to
reset the values.
Note: You must click Add Next to add the network container you enter in the Next Available Networks section. If
you enter a network in the Next Available Networks section and then use the Add icon to add another
network, the appliance does not save the network you enter in the Next Available Networks section until
you click Add Next.
— Extensible Attributes: Click the Add icon to enter extensible attributes. Grid Manager adds a row to the table
each time you click the Add icon. Select the row and the attribute name from the drop-down list, and then
enter the value. All inheritance attributes which can be inherited from a parent object will be automatically
inherited when you add a network. Inheritable extensible attributes that are required are automatically
displayed. Optional extensible attributes that are not inheritable are not automatically displayed. For more
information about extensible attributes, see Using Extensible Attributes on page 427.
— If you are adding an RIR network, the RIR network attribute table appears. For information about these
attributes and how to enter them, see RIR Network Attributes on page 565.
Preview RIR Submissions: Click this to view the updates before the appliance submits them to the RIPE
database. This button is enabled only when the registration action is Create, Modify, or Delete, and the Do
not update registrations check box is not selected.
2. Save the configuration.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later
and enter a date, time, and time zone. For information, see About Extensible Attributes on page 417.
The appliance saves the networks you just created, and Grid Manager displays them in the Result page. When
you click a newly created network on this page, Grid Manager displays the IP Map panel from which you can
view detailed information about the network. For information about the IP Map panel, see IP Map on page 594.
You can also add and modify other information about the networks you just created. For information about modifying
network information, see Managing IPv4 DHCP Data on page 1107 and Managing IPv6 DHCP Data on page 1159.
Add Hosts
Host records provide a unique approach to the management of DNS, DHCP, and IPAM data. By using host records, you
can manage multiple DNS records and DHCP and IPAM data collectively, as one object on the appliance. You can add
IPv4 and IPv6 addresses to host records from the Tasks Dashboard or the Data Management tab. Note that when you
add a host record from the Tasks Dashboard, they are configured only for DNS. For more information about Infoblox
host records, see About Host Records on page 578.
To add host records from the Tasks Dashboard:
1. Click Add Hosts in the IPAM Task Pack and complete the following in the Add Hosts wizard:
— Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the host record.
— Zone Name: Click Select to select a DNS zone from the Zone Selector dialog box.
— Exclude from Network Discovery and Immediate Discovery. When creating the new Host record, you can
direct NIOS to immediately discover the host, or to exclude it from network discovery. By default, the Add
Hosts task enables immediate discovery.
— DNS View: Displays the DNS view of the selected zone.
— Hosts: Do one of the following to add a host record:
Click the Add icon and the appliance adds a row to the table. Complete the following in the table to add a
new host record:
— Name: Enter the name of the host record.
— Zone: Displays the DNS zone you select in Zone Name. When you enter a different zone here, the
appliance displays an error message.
— Address: Enter the IP address you want to associate with this host record.
or
Click the Next Available icon to have the appliance search for the next available IP address for the host
record. For information about the next available IP address, see About the Next Available Network or IP
Address on page 1109. Complete the following in the Next Available IP section:
— Create new host addresses under: Click Select to select the network or address range in the
Network/Range Selector dialog box from which you want the appliance to search for the next available
IP address for this host record.
— Number of new host addresses: Enter the number of host addresses. Note that if there is not enough
space in the selected network or address range to create the number of host addresses specified here,
Grid Manager displays an error message. The maximum number is 20 at a time. Note that when you
have existing host addresses in the table and you select one, the number you enter here includes the
selected host address.
— Click Add Next to add the IP addresses to their corresponding hosts. Grid Manager lists the host
addresses in the table. Ensure that you enter a name for each host record.
— Extensible Attributes table: Click the Add icon to enter extensible attributes. The appliance adds a row to
the table each time you click the Add icon. Select the row and the attribute name from the drop-down list,
and then enter the value. All inheritance attributes which can be inherited from a parent object will be
automatically inherited when you add a host. Inheritable extensible attributes that are required are
automatically displayed. Optional extensible attributes that are not inheritable are not automatically
displayed. For more information about extensible attributes, see About Extensible Attributes on page 417.
2. Save the configuration.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later
and enter a date, time, and time zone. For information about how to schedule a task, see Scheduling Tasks on
page 85.
The appliance saves the host records you just created, and Grid Manager displays them in the Result page.
When you click a newly created host on this page, Grid Manager displays the Data Management -> DNS -> Zones
tab from which you can view information about the host record.
You can also add and modify other information about the host records. For information about modifying host
information, see About Host Records on page 578.
— Exclude from Network Discovery and Immediate Discovery. When creating the new fixed address, you can
direct NIOS to immediately discover the device associated with the fixed address, or to exclude it from
network discovery. By default, the Add Fixed Addresses task enables immediate discovery.
— Addresses: Do one of the following to add fixed addresses:
Click the Add icon and Grid Manager adds a row to the table. Complete the following to create fixed
addresses:
— For IPv4 fixed addresses: Enter the IPv4 address and MAC address. Click the Add icon to add another
fixed address.
— For IPv6 fixed addresses: Enter the IPv6 address and DUID. Click the Add icon again to add another
fixed address.
or
Click the Next Available icon to have the appliance search for the next available address. Complete the
following:
— Create new fixed addresses under: Click Select to select the network or address range in the
Network/Range Selector dialog box from which you want the appliance to search for the next available
IP address for this fixed address.
— Number of new fixed addresses: Enter the number of fixed addresses you want to add to the selected
network or address range. Note that if there is not enough space in the selected network or address
range to create the number of fixed addresses specified here, Grid Manager displays an error message.
The maximum number is 20 at a time. Note that when you have existing fixed addresses in the table
and you select one, the number you enter here includes the selected fixed address.
— Click Add Next to add the fixed addresses. The appliance lists the fixed addresses to the table. Ensure
that you enter the MAC address or DUID for each fixed address.
— Extensible Attributes table: Click the Add icon to enter extensible attributes. The appliance adds a row to
the table each time you click the Add icon. Select the row and the attribute name from the drop-down list,
and then enter the value. All inheritance attributes which can be inherited from a parent object will be
automatically inherited when you add a fixed address. Inheritable extensible attributes that are required
are automatically displayed. Optional extensible attributes that are not inheritable are not automatically
displayed. For more information about extensible attributes, see About Extensible Attributes on page 417.
2. Save the configuration.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later
and enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
The appliance saves the fixed addresses you just created, and Grid Manager displays them in the Result page.
When you click a newly created fixed address on this page, Grid Manager displays the Data Management -> IPAM
-> IP Map or List tab from which you can view information about the fixed address.
You can also add and modify other information about the fixed addresses you just created. For more information
about modifying fixed address information, see Managing IPv4 DHCP Data on page 1107 and Managing IPv6 DHCP
Data on page 1159.
Add A Record
An A (address) record is a DNS resource record that maps a domain name to an IPv4 address. You can add an A record
from the Tasks Dashboard or from the Data Management tab. For more information about managing A records, see
Managing A Records on page 880.
To add networks from the Tasks Dashboard:
1. Click Add A Record in the IPAM task pack and complete the following in the Add A Record wizard:
2. In the Add A Record wizard, do the following:
— Name: If Grid Manager displays a zone name, enter the hostname that you want to map to an IP address.
The displayed zone name can either be the last selected zone or the zone from which you are adding the
host record. If no zone name is displayed or if you want to specify a different zone, click Select Zone. When
there are multiple zones, Grid Manager displays the Zone Selector dialog box. Click a zone name in the
dialog box and then enter the hostname. The name you enter is prefixed to the DNS zone name that is
displayed, and the complete name becomes the FQDN (fully qualified domain name) of the host. For
example, if the zone name displayed is corp100.com and you enter admin, then the FQDN becomes
admin.corp100.com. Ensure that the domain name you enter complies with the hostname restriction policy
defined for the zone. To create a wildcard A record, enter an asterisk (*) in this field.
— DNS View: This field displays the DNS view to which the DNS zone belongs.
— Shared Record Group: This field appears only when you are creating a shared record from the Data
Management tab. Click Select Shared Record Group. If you have only one shared record group, the
appliance displays the name of the shared record group here. If you have multiple shared record groups,
select the shared record group in the Shared Record Group Selector dialog box. You can use filters or the Go
to function to narrow down the list.
— Hostname Policy: Displays the hostname policy of the zone.
— In the IP Addresses section, click the Add icon and do one of the following:
— Select Add Address to enter the IPv4 address to which you want the domain name to map.
or
— Select Next Available IPv4 to retrieve the next available IP address in a network.
If the A record is in zone that has associated networks, the Network Selector dialog box lists the
associated networks. If the zone has no network associations, the Network Selector dialog box lists the
available networks. When you select a network, Grid Manager retrieves the next available IP address in
that network.
— Comment: Optionally, enter additional information about the A record.
— Create associated PTR record: Select this option to automatically generate a PTR record that maps the
specified IP address to the hostname. To create the PTR record, the reverse-mapping zone must be in the
database.
— Disable: Select this check box to disable the record. Clear the check box to enable it.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. For information
about how to schedule a task, see Scheduling Tasks on page 85.
5. Click Restart if it appears at the top of the screen.
— Shared Record Group: This field appears only when you are creating a shared record from the Data
Management tab. Click Select Shared Record Group. If you have only one shared record group, the
appliance displays the name of the shared record group here. If you have multiple shared record groups,
select the shared record group in the Shared Record Group Selector dialog box. You can use filters or the
Go to function to narrow down the list.
— Canonical Name: This field displays the domain name of either the current zone or the last selected zone.
To add a CNAME record to a forward-mapping zone, enter the complete canonical (or official) name of the
host. To add a CNAME record to a reverse-mapping zone, enter host_ip_addr.prefix.network.in-addr.arpa
(host IP address + 2317 prefix + network IP address + in-addr.arpa). For example, enter
1.0.25.1.1.10.in-addr.arpa. This IP address must match the address defined in the PTR record in the
delegated child zone.
— Comments: Enter useful information about this record.
— Disable: Select the check box to disable the record without deleting its configuration. Clear the check box to
enable the record.
2. Save the configuration, or click Next to define extensible attributes. For information about extensible attributes,
see Using Extensible Attributes on page 427.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later
and enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
3. Click Restart if it appears at the top of the screen.
You can also add and modify other information about the CNAME record you just created. For more information about
modifying the CNAME record, see Modifying, Disabling, and Deleting Host and Resource Records on page 899.
Add MX Record
An MX (mail exchanger) record maps a domain name to a mail exchanger. A mail exchanger is a server that either
delivers or forwards mail. You can specify one or more mail exchangers for a zone, as well as the preference for using
each mail exchanger. A standard MX record applies to a particular domain or subdomain. You can add an MX record
from the Tasks Dashboard or the Data Management tab. For more information about MX records, see Managing MX
Records on page 885.
To add MX records from the Tasks Dashboard:
1. Click Add MX Record in the IPAM task pack and complete the following in the Add TXT Record wizard:
— Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the MX record.
— Mail Destination: If Grid Manager displays a zone name, enter the mail destination here. If no zone name is
displayed or if you want to specify a different zone, click Select Zone. When there are multiple zones, Grid
Manager displays the Zone Selector dialog box. Click a zone name in the dialog box, and then enter the mail
destination. If you want to define an MX record for a domain whose name matches the zone you selected,
leave this field blank. Grid Manager automatically adds the domain name (the same as the zone name) to
the MX record. For example, if you want to create an MX record for a mail exchanger serving the
corp100.com domain and you selected the corp100.com zone, and leave this field empty.
If you want to define an MX record for a subdomain, enter the subdomain name. The appliance prefixes the
name you enter to the domain name of the selected zone. For example, if you want to create an MX record
for a mail exchanger serving site1.corp100.com—a subdomain of corp100.com—and you define the MX
record in the corp100.com zone, enter site1 in this field.
If you want to define an MX record for a domain and all its subdomains, enter an asterisk ( * ) to create a
wildcard MX record.
— DNS View: Displays the DNS view of the selected zone.
— Shared Record Group: This field appears only when you are creating a shared record from the Data
Management tab. Click Select Shared Record Group. If you have only one shared record group, the
appliance displays the name of the shared record group here. If you have multiple shared record groups,
select the shared record group in the Shared Record Group Selector dialog box. You can use filters or the Go
to function to narrow down the list.
— Host Name Policy: Displays the hostname policy of the selected zone. Ensure that the hostname you enter
complies with the hostname restriction policy defined for the zone.
— Mail Exchanger: Enter the fully qualified domain name of the mail exchanger.
— Preference: Select an integer from 10 to 100, or enter a value from 0 to 65535. The preference determines
the order in which a client attempts to contact the target mail exchanger.
— Comment: Enter useful information about this record.
— Disable: Select the check box to disable the record without deleting its configuration. Clear the check box to
enable the record.
2. Save the configuration, or click Next to define extensible attributes. For information, see About Extensible
Attributes on page 417.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later
and enter a date, time, and time zone. For information about scheduling tasks, see Scheduling Tasks on page
85.
3. Click Restart if it appears at the top of the screen.
CSV Import
You can access CSV Import Manager and perform CSV imports, manage import jobs, and view import status. You can
perform CSV imports from the Task Dashboard and the Toolbar. You can also click CSV Import Manager, which allows
for importing of data, managing import jobs, and viewing import status.
You can click New CSV import job icon in the CSV Job Manager wizard to import a CSV file to the database. You can
also verify the content in your CSV file before replacing the content of the database with the content in the imported
CSV file. For detailed information about the CSV import feature, see About CSV Import on page 101.
Note that when you register Network Automation with a NIOS HA pair, you can register only one interface at a time.
Use the IP address of the LAN1 interface, not the VIP address, for registration. When an HA failover occurs, the
Network Automation registration is disabled. You can register the Network Automation appliance again after the
failover.
1. From the Dashboards tab, select the Tasks tab.
2. At the top right corner of the Automation Tasks panel, click the Configure icon -> NetMRI Registration.
3. In the NetMRI Registration dialog, do the following:
a. Enter the IP address or resolved host name of the Network Automation appliance supporting the
Automation task pack.
b. Enter the Admin Password.
This information is specific to the Infoblox Network Automation appliance supporting the Automation tasks
in NIOS.
4. Click Register to commit settings.
After registration, the NetMRI Registration menu item changes to read NetMRI Deregistration to support
disconnecting from the Network Automation appliance.
You can also start Network Automation from the NIOS Dashboards page.
1. From the Dashboard tab, select the Tasks tab.
2. In the Automation Tasks pane, click the down arrow gadget and select Launch NetMRI.
Network Automation launches in a new browser tab.
To check on script executions, go to Configuration Management –> Job Management side tab –> Scripts and check the
Last Run column.
The NIOS Task Viewer (see Using the Task Viewer to View Job Logs and Approve Jobs) also provides the log history of
automated jobs.
d. In the New Network field, enter the IP prefix for the new network.
e. In the Router Address field, enter the IP address for the router interface.
f. Select any Extensible Attributes in the list if they are provided; otherwise, you can create new ones by
clicking Add and choosing the Attribute Name, Value and the Required setting.
4. To configure IPv6 provisioning:
a. Enter the Parent Network value (or click Select Network to choose the parent network from a list if using a
Network View).
b. Choose the Network Template from the drop-down list if one is provided by the chosen Network View. The
Network template is otherwise optional.
The Provision Network task provides subnetting tools.
c. Drag the Netmask slider to the required CIDR mask bit depth (1-32).
d. In the New Network field, enter the IP prefix for the new network.
e. In the Router Address field, enter the IP address for the router interface.
f. Select any Extensible Attributes in the list if they are provided; otherwise, you can create new ones by
clicking Add and choosing the Attribute Name, Value and the Required setting.
5. Enter the required name value in the Interface Hostname field. (Examples include “eth0” and “serial0.”)
6. Select the DNS Zone under which the hostname operates.
7. Choose a device group from the Device Group drop-down list.
8. From the Device drop-down list, choose the switch or router on which the network will originate.
9. If the selected device is a router, the VLAN Number and VLAN Name fields will be disabled.
10. From the Interface list, choose the interface to which the network will be reassigned. The drop-down list contains
all the interfaces from the chosen network device, and also shows the ports’ respective states (up/down, up/up
and so on).
If an interface shows Routed or Switched, it cannot be selected for provisioning as it is already being used as
part of an active network.
11. If the chosen device is a switch, enter the new VLAN Number on which the new network segment runs.
12. If the chosen device is a switch, enter the new VLAN Name on which the new network segment runs.
13. Click Provision Network to commit settings.
The system sends the configuration request to the Network Automation appliance and displays the task configuration
sequence.
You can start Network Automation from the registered Network Automation appliance to check job execution.
1. In the Automation Tasks pane, click the down arrow gadget and select Launch TAE.
Network Automation will launch in a new browser tab. To check on script executions, go to Configuration Management
–> Job Management side tab –> Job History and view details about provisioning jobs and other jobs that execute as a
result of NIOS-based automation tasks.
host values from the prefix address of the network. For example, setting an IPv4 Gateway Address Offset of 12
indicates that the IP for the gateway ends in *.*.*.12, as in 10.1.1.12. Offsets work the same way for any size network:
for an example such as 10.1.1.64/26, and an offset of 12, the provisioned gateway IP would be 10.1.1.76. Make sure
the defined offset value lies within the addressable boundaries of the provisioned network!
The same principles also apply for IPv6 networks, except that the IPv6 value is entered manually in hexadecimal
instead of being selected from a drop-down list. Most provisioned IPv6 networks will use a /64 network address.
You can also select a different script from the default for the Network Provisioning task.
To define settings for the Network Provisioning automated task:
1. From the Dashboards tab, select the Tasks tab. Under the Network Provisioning task, click the settings icon on
the top right.
2. If the provisioning process requires a hostname, enable the Hostname Required? check box. (The network
interface hostname (“eth0,” “serial0”) and the Zone that it belongs to are defined in the Network Provisioning
task.)
3. Choose a gateway offset value from the IPv4 Gateway Address Offset drop-down list. If no value is selected, the
offset value defaults to 1 for the provisioned network address.
4. If an IPv6 offset is required for provisioning an IPv6 network or for provisioning a network that supports both IPv4
and IPv6 addressing, enter the IPv6 Gateway Address Offset value in hexadecimal. If no value is entered, the
offset value defaults to 0000.0000.0000.0001 for the provisioned network address, indicating an offset value
of 1 for the gateway IP address.
5. In the Script Name dropdown, choose the script that you wish to run for the Port Activation task. The scripts are
located on the Trinzic Automation 4000 appliance, and referenced for use by NIOS. By default, the bundled Port
Activation script is selected.
6. Click Save to commit settings.
7. Click Cancel to close the dialog.
The system sends the request to the Network Automation appliance and displays a Provisioning Network Config
updated notification message.
VLAN Reassignment
VLANs can be reassigned to new interfaces on individual L2/L3 switches in the managed network. A VLAN can have
a path across several switches; when you make changes on a given switch, make sure that the path is maintained.
To ensure end-to-end connectivity, you may need to change VLAN port assignments on more than one switch in the
path. This feature operates with the VLAN Trunking Protocol (VTP). VLAN switching is changed across one port per
switch at a time. Should you need to change VLAN assignments across more than one switch in the path, plan
accordingly.
VLANs must already be configured on the switch(es) being changed, and be detected by the Network Automation
appliance.
1. From the Dashboards tab, select the Tasks tab -> VLAN Reassignment.
2. Begin by selecting the Device Group from the drop-down list. For VLAN Reassignments, you typically choose the
Switching device group.
3. From the Device drop-down list, choose the switch on which port reassignment will be executed.
4. From the Port list, choose the interface to which the VLAN will be reassigned. The Port list also shows the
Administrative and Operational states of each interface on the current device (Administratively Up/Operationally
Down, for example.)
Note: You can reassign a VLAN to a port that is operationally or administratively Down.
The Current VLAN value will show the VLAN to which the selected interface is currently assigned.
5. Choose the new VLAN value for port reassignment from the New VLAN drop-down list.
6. Click Move VLAN to commit settings.
The system sends the configuration request to the Network Automation appliance and displays the task configuration
sequence.
The VLAN Reassignment task will also write the full running configuration to memory, making it the saved
configuration. If the user made a change to the running configuration, in parallel with the port activation change, and
did not save it, those changes will also be saved.
Using the Task Viewer to View Job Logs and Approve Jobs
You can view the logged results from any task run from the Automation Tasks dashboard through a pair of information
pages, which are accessed through the Task Viewer window.
A Job History page provides a log history of all TAE tasks that have recently run, including all Automation Task types
in the dashboard.
A second page, Issues & Approvals, provides links to two important items: Issues, which displays details about any
network issue related to TAE tasks and jobs in an Issue Viewer page from the Network Automation appliance, and
Approvals, which are jobs that must be approved before the Network Automation appliance can execute the job. For
example, the Isolate Rogue DHCP Server job must be approved before it will run and attempt to isolate the detected
rogue DHCP server in the network.
1. From the Dashboards tab, select the Tasks tab.
2. In the Automation Tasks pane, click the down arrow gadget and select Task Viewer. The Task Viewer window
appears, displaying a scrollable and sortable Job History table. Important columns include the Start Time, the
Job ID (a numeric value with a clickable link to the TAE Job Details Viewer, which will open in a new browser tab),
the Job Name, the User account that executed the task, the job Status and the # Devices (the number of devices)
against which the task ran.
The Job History page shows the most recent subset of executed TAE jobs. A yellow bar at the top of the table
provides a click here to see more link, which takes the user to the Network Automation appliance Job History
page in a new browser tab.
3. If an item appears in the Issues & Approvals page, click the link in the Action column. You will typically see two
different link types: Issue Details or Approve Job.
a. To view an issue in more detail: Clicking an Issue Details link displays the Network Automation appliance
Job Details page in a new browser tab for the selected job.
b. To approve a job: Clicking an Approve Job link displays the Summary page of the Network Automation Job
Wizard, with an Approve Job button.
4. Click Close to close the Task Viewer.
In the Network Automation appliance, you can also check Configuration Management –> Job Management side tab –
> Job History and view details about any jobs that execute as a result of NIOS-based automation tasks.
— Locked: When you select this check box and assign this template to an admin group, users in the admin
group can only perform the tasks you configure to appear in this template. They cannot configure their
dashboards. When you clear this check box, users can still only see the tasks you configure for this
template, but they can now configure tasks in the task packs on their dashboards. Note that when you lock
a template, it applies to all users in the admin group, including those who have customized dashboards.
7. Click Save & Close.
The appliance saves the template and adds it to the Template drop-down list.
Status Dashboards
A status dashboard contains widgets from which you can view and manage data. Widgets are the building blocks of
status dashboards. For more information about widgets, see Adding Widgets to Dashboards on page 139. They
provide information about different aspects of your Grid and networks. For example, the Member Status widget
provides general information about a Grid member, and the Network Statistics widget provides data for a specified
network.
The appliance provides a default status dashboard. Grid Manager displays the default dashboard only when there
are more than one widget on the dashboard. You can add and modify widgets in the default dashboard, but you
cannot rename or delete it. From a dashboard, you can access your most commonly accessed tasks and monitor
appliance status. You can configure your own status dashboards to which you can add widgets that help you manage
different data. Configuring multiple status dashboards helps organize widgets in a meaningful way and improves
dashboard and widget performance. This is especially useful when you have a Grid serving a large number of Grid
members. When you configure a new dashboard, you can use the existing dashboard as a template. You can create
up to 100 copies at a time using the Add Dashboard option. For information about how to add status dashboards,
see Adding Status Dashboards on page 142.
You can add widgets to different dashboards, however, you can add only one widget at a time on each dashboard.
The default number of widgets per dashboard is 10. The maximum number of widgets that you can add on each
dashboard is 20 at a time. You can define the number of widgets that can be configured on each dashboard in User
Profile. This limitation applies only to dashboards that you configure and does not apply to the default dashboard.
For information about how to specify the widget limit, see Configuring Widget Limit per Dashboard on page 141.
Grid Manager provides a default Security dashboard if you have installed any or all of the following licenses on the
appliance: Threat Protection, RPZ, and Threat Analytics. The Security dashboard contains widgets that help you
monitor the security status of the Grid. In the Security dashboard, you can add and remove widgets, but you cannot
rename or delete them.
Note: To ensure that the Security dashboard displays correct data, use NTP to synchronize the time of the Grid
members with that of the Grid Master.
If you have configured a lot of status dashboards, you can use the Quick Navigation icon to quickly access each status
dashboard. For information, see Using Quick Navigation on page 142. Figure 2.1 illustrates the typical layout in Grid
Manager after you configure multiple status dashboards.
Note that you must have at least read-only permission to the objects that a widget displays. Otherwise, though you
are allowed to select and place the widget on the dashboard, it does not display any information.
To add widgets to your dashboard:
1. Default Status Dashboard: From the Dashboards -> Status tab -> Default tab, click the Configure icon -> Add
Content. This is applicable when you have the default dashboard only.
Configured Status Dashboards: From the Dashboards -> Status tab, select the configured status dashboard,
click the Configure icon -> Add Content.
Security Status Dashboard: From the Dashboards -> Status tab -> Security tab, click the Configure icon -> Add
Content. This is applicable only when at least one member in the Grid has Threat Protection, RPZ, or Threat
Analytics license. Note that the Security Status dashboard is a default dashboard and it cannot be renamed or
deleted.
Grid Manager displays thumbnails of the available widgets. Use the scroll bar on the right to scroll through the
widgets, as illustrated in the Figure 2.2.
2. Select and drag a widget to the desired location on your dashboard.
After you add a widget to the dashboard, you can configure it to provide relevant data. You can also copy or move a
widget, by selecting and dragging it to its new location on your dashboard. Grid Manager saves your dashboard
configuration and displays it the next time you log in.
You can turn on auto-refresh by clicking On in the Turn Auto Refresh field at the top of the dashboard to periodically
refresh the contents of all widgets in the dashboard. Click Off to disable auto-refresh for all widgets in the dashboard.
When auto-refresh is disabled, you can enable it for individual widgets by clicking the Configure icon in the
corresponding widgets. You can specify the auto-refresh period in seconds. The default auto-refresh period is 30
seconds.
Widgets have the following icons:
• Copy/Move: Click to copy or move the widget from a dashboard to another. For information about how to copy or
move, see Copying or Moving Widgets on page 143.
• Span Up/Span Down: Click to resize the widget. Click Span Up to increase the width of the widget. Click Span
Down to decrease the width of the widget. Note that the fully spanned widgets are moved to the top of the
dashboard.
• Refresh: Click to update the content of the widget. Each widget contains a status bar at the bottom that displays
the last date and time it was updated.
• Configure: Click to hide and show the configuration options of the widget.
• Toggle: Click to minimize and restore the widget.
• Close: Click to remove the widget from a dashboard.
Thumbnails of Widgets Widget Icons Select and drag Widgets Close button
3. In the Rename Dashboard wizard, enter the new name in the Name text box.
4. Click Save and Close to save the new name and close the wizard.
Note: If you have configured the same threshold value for both Yellow and Red color in the Global Dashboard
Properties editor and if the same number of events are triggered, then Grid Manager displays the status in red
in the Grid Security Status widget.
Grid Status
The Grid Status widget provides status information about the Grid members and services. Add the Grid Status widget
to your Dashboard to monitor the Grid status.
You can configure the Grid Status widget to display information about all Grid members or only Grid members that
have service errors. To modify the Grid Status widget, click the Configure icon and select one of the following:
• Show all Grid members (this is the default)
• Only show members with service warnings or errors: When you select Only show members with service
warnings or errors, the widget displays only the members that have service errors. The widget does not display
any data in the member table if all the services on all members are running properly.
• Group Members by: If you want to group members by the same extensible attribute value, select this and
choose an extensible attribute from the drop-down list. The appliance groups Grid members that have the same
extensible attribute value, and the Grid Status displays the following information:
• <Extensible Attribute Name>: The value of the selected extensible attribute. You can click the link of the
extensible attribute value to view all the members in this group in the Grid/Members view.
• Status: This is the overall status for all members in the group. Depending on the status of each member, the
overall status can be one of the following:
— Working: Indicates that all the members in the group are running properly.
— Warning: Indicates that one of the member in the group has operational problems. For example, if there
are two members in a group with one member Running and another member is Offline, then the overall
status will be Warning.
— Failed: Indicates that at least one of the members in the group is in the failed status and none of the
members in the group are in the Running or Working status. For example, if there are two members in
the group and one of them is in Failed status and the other is Offline, then the overall status is Failed.
— Offline: Indicates that one or more members in the group is offline and none of the members in the
group are in the Failed or Running status. For example, if a member is in the Working status and
another member is in the Offline status, then overall status is Offline.
— Inactive: Indicates that one or more members in the group is inactive and none of the members in the
group are in the Failed, Offline, Working, or Running status.
— Unknown: Indicates that the status of all the members in the group is unknown.
Note: You can click a member link to monitor the detailed status of the selected member. Grid Manager displays the
Grid tab -> Member tab. For information, see Member Status on page 1326. You can click on a group to show
the members of the group in the Grid/Members view.
The Grid Status widget also displays the following information in the member table:
• Member Name: The name of the member.
• IPv4 Address: The IPv4 address of the member.
• IPv6 Address: The IPv6 address of the member.
• Status: The current status of the member.
• System Uptime: The duration of time (days, hours, and minutes) that the Grid member has been up and
running.
In the upper section of the widget, Grid Manager displays the overall status of the Grid. The Grid status represents
the status of the most critical member in the Grid. When all Grid members are running properly, the overall Grid status
is green. When one of the members has operational issues, the overall Grid status is red. The status icon can be one
of the following:
Yellow At least one of the Grid members is connecting or synchronizing with its Grid Master.
Red At least one of the Grid members does not have a Grid license, is offline, upgrading,
downgrading, or shutting down.
This section also displays the overall operational status of the DNS, DHCP, NTP, FTP, TFTP, HTTP (File Distribution),
bloxTools, Captive Portal, DNS Accelerator usage, and Reporting services that are currently running on the Grid. The
DNS Accelerator usage feature is only available in the IB-4030 appliance. The status icon can be one of the following:
Green The enabled service is running properly on one or more Grid members.
Yellow At least one of the Grid members is having issues with the enabled service.
Red The enabled service is not running properly on at least one of the members. (A red status icon
can also appear temporarily when the service is enabled and begins running, but the
monitoring mechanism has not yet notified Grid Manager.)
Gray The service is not configured or is disabled on at least one Grid member.
— System Temperature: Click to display the system temperature. Depending on the hardware model, the
system temperature may not be available. Select to display the temperature in either Celsius or Fahrenheit.
— CPU Temperature: Click to display the CPU temperature. Depending on the hardware model, the CPU
temperature may not be available. Select to display the temperature in either Celsius or Fahrenheit.
— DNS Accelerator Usage: This feature is only available in the IB-4030 appliance. Click to display the
percentage of DNS Cache Acceleration usage, if available. When the DNS cache acceleration utilization
reaches the maximum threshold, the appliance displays both the Member Status and the banner in yellow
each time you log in to the appliance within 24 hours. It also displays the number of times the appliance
has reached the maximum limit in the past 24 hours.
For example, if you are using a DNS Cache Acceleration Tier 3 license with 300K performance, and if the
DNS Cache Acceleration usage has reached 250K, then the appliance displays the DNS Cache Acceleration
usage as 83%, which is calculated as (250*100)/300. In this case, the appliance displays the following
message in the banner:
DNS Cache accelerator usage reached 83% of the maximum capacity 6 times in the last
24 hours.
Click the Configuration icon again to hide the configuration panel after you complete the modification.
Grid Manager displays the hostname of the appliance at the top of the widget. You can click the name link to view
detailed information about the appliance. The widget also displays the upgrade status if the member is currently in
the process of an upgrade. If the member is scheduled for an upgrade, the Scheduled for upgrade link appears. You
can click this link to access the Grid tab -> Upgrade tab to view more details about the date and time of the scheduled
upgrade.
The widget also displays the service status of the following: FTP, TFTP, HTTP (File Distribution), DNS, DHCP, NTP,
bloxTools, Captive Portal, DNS Accelerator, and Reporting in the Services section. The service status can be one of
the following:
Yellow The service is enabled, but there may be some issues that require attention.
Red The service is enabled, but it is not running properly or is out of synchronization. (A red status
icon can also appear temporarily when a service is enabled and begins running, but the
monitoring mechanism has not yet notified the GUI engine.)
Gray The service is not configured or is disabled.
The widget also displays the statistics you specified, such as CPU usage, memory and database usage, in the format
you selected.
When you select the reporting server, you can also see the following information:
• Reporting Usage: Displays the daily consumption rate for the reporting service.
• Reporting Warning Count: When the data usage on the reporting server approaches or reaches the daily
maximum limit, the appliance sends an SNMP trap and email notification, if configured. When you receive five
(5) violation notifications in a rolling period of 30 days, you cannot view reports or configure reporting related
functions. You must then contact Infoblox Technical Support to resolve the issue.
For more information about reporting, see Infoblox Reporting and Analytics on page 1379.
DNS Statistics
The DNS Statistics widget provides statistics for a member or for a zone. The zone statistics are cumulative, collected
from all the members that are authoritative servers for zones or are hosting stub zones. The widget displays the totals
for each type of DNS response as well as a line graph that tracks the responses per second.
You can add a DNS Statistics widget to your Dashboard for each zone or member DNS server on the Grid.
To configure the DNS Statistics widget, click the Configure icon and do the following:
• Click Select Member. In the Member Selector dialog box, choose a Grid member to display statistics for all its
stub zones and authoritative zones.
or
• Click Select Zone. In the Zone Selector dialog box, choose a DNS zone to display statistics for that zone only.
The widget displays only the option that you selected on your subsequent logins. For example, if you clicked Select
Member, the widget displays the Select Member option only, and not the Select Zone option, when you log in again.
• Graph Configuration: Select which DNS messages you want to track in the Responses per Second graph.
— Success: The number of successful queries.
— NXDOMAIN: The number of queries for domain names that did not exist in the database.
— Referral: The number of queries that became referrals.
— NXRRSET: The number of queries for domain names that did not have the requested records.
— Failure: The number of queries that failed due to reasons other than nonexistent domain names or records
in a domain.
— Recursion: The number of recursive queries for which the name server sent queries to other name servers.
The widget displays the following information:
• DNS Responses tab: Displays a pie chart and the total number of each type of message. It also displays the total
number of full and incremental zone transfers that the Grid member performed.
• Responses per Second tab: Displays a line graph that tracks the DNS responses received per second, within an
hour. The time is displayed according to the time zone specified in the User Profile. If the auto-detect time zone
option is enabled and Grid Manager cannot determine the browser time zone, then the time is displayed in UTC
format. You can mouse over the graph to display the coordinates of any point in the graph.
DHCP Statistics
The DHCP Statistics widget displays statistics about the different types of DHCP messages that a Grid member sends
and receives. The widget displays the totals for each type of DHCP message as well as a line graph that tracks the
messages per second.
You can add a DHCP Statistics widget to your Dashboard for each member DHCP server in the Grid. If the DHCP service
is not enabled or is offline, the widget displays a message indicating that the DHCP statistic are not available.
To configure the DHCP Statistics widget, click the Configure icon and do the following:
• Protocol: Select either IPv4 or IPv6.
• Click Select Member. In the Member Selector dialog box, select a Grid member from the list.
• Graph Configuration: This section lists IPv4 or IPv6 messages, depending on the protocol you selected.
• Select which IPv4 messages you want to track in the Messages per Second graph.
— Discovers: The number of DHCPDISCOVER messages that the Grid member received from DHCP clients. A
DHCP client broadcasts a DHCPDISCOVER message to obtain an IP address.
— Offers: The number of DHCPOFFER messages that the Grid member sent to DHCP clients. If the Grid member
has an IP address that it can allocate to the DHCP client that sent the DHCPDISCOVER message, the Grid
member responds with a DHCPOFFER message that includes the IP address and configuration information.
— Requests: The number of DHCPREQUEST messages that the Grid member received from DHCP clients. A
DHCP client sends DHCPREQUEST messages when it selects a lease, connects to the network, and if it
renews the lease.
— Acks: The number of DHCPACK messages that the Grid member sent to DHCP clients. When the Grid
member receives a DHCPREQUEST message, it responds with a DHCPACK message to confirm the IP address
selected by the DHCP client.
— Nacks: The number of DHCPNACK messages that the Grid member sent to DHCP clients. The Grid member
sends a DHCPNACK message when a DHCP client requests an IP address that is not valid for the network.
— Declines: The number of DHCPDECLINE messages that the Grid member received. A DHCP client sends a
DHCPDECLINE message to a DHCP server when it discovers that the IP address offered by a DHCP server is
already in use.
— Informs: The number of DHCPINFORM messages that the Grid member received. A client that did not receive
its IP address from the DHCP server can send it a DHCPINFORM message to retrieve configuration
parameters, such as the IP addresses of DNS servers in the network.
— Releases: The number of DHCPRELEASE messages that the Grid member received. A DHCP client sends a
DHCPRELEASE message when it terminates its lease and releases its IP address.
Select which IPv6 messages you want to track in the Messages per Second graph.
— Declines: The number of Decline messages that the Grid member received. A DHCP client sends a Decline
message to a DHCP server when it discovers that the IP address offered by a DHCP server is already in use.
— Renews: The number of Renew messages that the Grid member received. A DHCP client sends a Renew
message to a DHCP server to extend the lifetimes on the leases granted by the DHCP server and to update
other properties.
— Information Requests: The number of Information-Request messages that the Grid member received. A
client sends an Information-Request message to retrieve configuration parameters, such as the IP
addresses of DNS servers in the network.
— Solicits: The number of Solicit messages that the Grid member received, including Solicit messages
embedded in Relay-Forward messages. A DHCP client sends a Solicit message to locate DHCP servers.
— Requests: The number of Request messages that the Grid member received. A DHCP client sends a Request
message to request one or more IP addresses and configuration parameters from a DHCP server.
— Rebinds: The number of Rebind messages that the Grid member received. A DHCP client sends a Rebind
message to extend the lifetime of its lease and to update configuration parameters.
— Releases: The number of Release messages that the Grid member received. A DHCP client sends a Release
message when it terminates its lease and releases its IP address.
— Advertises: The number of Advertise messages that the Grid member sent. When a DHCP server receives a
Solicit message, it can respond with an Advertise message to indicate that the server is available for DHCP
service.
— Replies: The number of Reply messages that the Grid member sent. A DHCP server sends a Reply message
that includes IP addresses and configuration parameters when it responds to Solicit, Request, Renew or
Rebind message. It sends a Reply message with configuration parameters only when it responds to an
Information-Request message.
The widget displays the following information:
• DHCP Messages tab: Displays a pie chart and the totals for each type of DHCP message. It also displays the
number of Deferred Updates, which are DDNS update requests which are deferred because the DNS primary
was not reachable when the update was first attempted.
• Messages per Second tab: Displays a line graph that tracks the DHCP messages that were sent and received per
second, within an hour. The time is displayed according to the time zone specified in the User Profile. If the
auto-detect time zone option is enabled and Grid Manager cannot determine the browser time zone, then the
time is displayed in UTC format. You can mouse over the graph to display the coordinates of any point in the
graph.
Network Statistics
The Network Statistics widget provides information about IP address usage in an IPv4 network. You can monitor
several networks simultaneously to view the distribution of address resources. Such information can indicate if there
is a sufficient number of available addresses in each network. It can also provide information about the distribution
of address resources, indicating if there are too many unused addresses in one network while all the addresses in
another are in use.
Add a Network Statistics widget to your Dashboard for each network that you want to monitor. You can monitor IPv4
networks only.
To configure the Network Statistics widget, click the Configure icon and do the following:
• Select one of the following chart types:
— Pie
— Bar
• Click Select Network. In the Network Selector dialog box, choose a network from the list and click Select.
Note that if multiple network views were previously configured, Grid Manager displays the default network view.
You can choose another network view from the drop-down list, and then select a network.
The Network Statistics widget displays the following information about the selected network:
• IPAM Utilization: When you define a network, this is the percentage based on the IP addresses in use divided by
the total addresses in the network. For example, in a /24 network, if there are 25 static IP addresses defined
and a DHCP range that includes 100 addresses, the total number of IP addresses in use is 125. Of the possible
256 addresses in the network, the IPAM utilization is about 50% for this network.
When you define a network container that contains subnets, this is the percentage of the total address space
defined within the container regardless of whether any of the IP addresses in the subnets are in use. For
example, when you define a /16 network and then 64 /24 networks underneath it, the /16 network container is
considered 25% utilized even when none of the IP addresses in the /24 networks is in use.
You can use this information to verify if there is a sufficient number of available addresses in a network. The
IPAM utilization is calculated approximately every 15 minutes.
• Unmanaged: The number of discovered IP addresses that do not have corresponding records on the appliance,
such as A records, PTR records, fixed address records, host records, or leases. To obtain this data, you must run
a discovery process on the network first.
• Conflicts: The number of IP addresses that have either a MAC address conflict or a DHCP range conflict. To
obtain this data, you must run a discovery process on the network first. A discovered host has a MAC address
conflict when its MAC address is different from that specified in its fixed address, DHCP lease, or host record. A
discovered host has a DHCP range conflict when it is part of a DHCP range, but it does not have a matching fixed
address or DHCP lease, and it is not part of an exclusion range.
Port Status
The Port Status widget provides a quick way to inspect the interface status for any discovered device in the network.
The widget shows an overview of all interfaces on all devices or for a single device (called the Data Scope).
Click the Configure icon to change settings for the widget.
1. You can choose a Bar or Pie chart for the Total Switch or Switch-Router chart, which shows the percentage of
ports that are operationally Active and that are operationally Down.
2. Under Data Scope, the All Devices setting allows the widget to show the total counts for all discovered network
infrastructure devices. This is the default.
3. To use the widget to display port information for a single device, such as a switch, enable the Select Device radio
button. Choose the device in the Device Selector window. The widget adjusts its reported values to the scale of
the selected device.
4. You can also choose the Media Type. to further filter port status information. Choices include: Ethernet Interface,
Layer 2 Virtual LAN, Proprietary Serial Interface, Proprietary Virtual/Internal Interface, Loopback Interface and
Tunnel Interface.
The counters in the widget include Total Switch and Switch-Router Ports, Total Down Switch and Switch-Router Ports
and Total Active Switch and Switch-Router Ports.
Discovery Status
The appliance can run an IP discovery to detect and obtain information about active hosts in specified networks. For
information about the discovery process, see IP Discovery and vDiscovery on page 617.
You can add the Discovery Status widget to your Dashboard. From this widget, you can access Discovery Manager and
configure parameters for a discovery. You can do the following from the widget:
• Start a discovery immediately. For more information about immediate discovery, see Configuring and Starting
an IP discovery on page 627.
• Schedule a discovery for a later date and time. For more information about discovery, see Scheduling IP
Discovery on page 628.
• Configure a recurring discovery. For more information about recurring discovery, see Scheduling IP Discovery on
page 628.
• Click the Start button to start a discovery process.
• Click the Pause button to temporarily pause the process.
• Click the Stop button to stop the process.
This widget displays the status of discovery tasks. If there are no active discovery tasks, the widget displays the
discovery results of the previous tasks. For information about starting and scheduling a discovery task, see
Guidelines for Starting and Scheduling IP Discovery on page 626.
After you start a discovery, the Discovery Status widget displays a status bar that indicates the discovery is in
progress. It also tracks the number of networks in an IP discovery. You can click the Refresh icon to update the
discovery status.
The widget displays the following information about the discovery process:
• Current Status: If a discovery is in progress, this field displays its current status. Otherwise, it displays the date
and time of the last discovery.
• Last Action: Displays the last operation and the admin who initiated it.
• IPv4 Device Discovery: Displays the total number of IPv4 networks and the IPv4 network and IP address range
on which the IP discovery is currently running. You can click Refresh to update this information.
The Discovery Status widget also displays the following information about the last discovery:
• Discovered: The total number of active hosts in the network.
• Managed: The number of discovered IP addresses that are managed by the NIOS appliance. These IP addresses
have an A record, PTR record, fixed address record, host record, lease, or are within a configured DHCP range.
• Unmanaged: The number of discovered IP addresses that do not have corresponding records on the appliance,
such as A records, PTR records, fixed address records, host records, or leases.
• Conflicts: The number of discovered hosts that have a MAC address conflict or are part of a configured DHCP
range, but do not have a fixed address or lease record and are not part of an exclusion range.
My Commands
The My Commands widget provides easy access to commands that you frequently use, so you can perform your tasks
without leaving the Dashboard. You can add one My Commands widget to your Dashboard.
To configure the My Commands widget, click the Configure icon and do the following:
• Select a command from the Available list and click the > arrow to move it to the Selected list. You can always
toggle the commands between the two lists. Select multiple commands by using SHIFT-click and CTRL-click.
DDNS Statistics
The DDNS Statistics widget provides information about the dynamic DNS (DDNS) updates that occur on the DNS
service of a selected Grid member. The widget displays the total number of DDNS updates that succeeded, failed, and
that were rejected. It also displays a line graph that tracks the status of the DDNS updates per second.
You can add a DDNS Statistics widget to your Dashboard for each DNS server on the Grid that accepts dynamic DNS
updates.
To configure the DDNS Statistics widget, click the Configure icon and do the following:
• Click Select Member. In the Member Selector dialog box, select a Grid member from the list.
• Graph Configuration: Select which updates you want to track in the Updates per Second graph:
— Success: The number of DDNS update requests that succeeded.
— Prerequisite Reject: The number of DDNS update requests that were rejected because the prerequisite
conditions specified in the request were not met.
— Reject: The number of DDNS update requests that were rejected by the DNS service.
— Failure: The number of DDNS update requests that failed.
The widget displays the following information:
• DDNS Updates tab: Displays totals for each type of update.
• Updates per Second tab: Displays a line graph that tracks the status of the DDNS updates. The time is displayed
according to the time zone specified in the User Profile. If the auto-detect time zone option is enabled and Grid
Manager cannot determine the browser time zone, then the time is displayed in UTC format. You can mouse over
the graph to display the coordinates of any point in the graph.
Gray The DNS service is stopped or management of the Microsoft DNS server is disabled.
Gray The DHCP service is stopped or management of the Microsoft DHCP server is disabled.
• Active Directory Sites: The status icon in green indicates the synchronization status of Active Directory Sites on
the Microsoft server.
• Enable DNS Monitor & Control: Displays Yes if the monitor and control status is enabled for the DNS service on
the Microsoft server and displays No if it is disabled.
• Enable DHCP Monitor & Control: Displays Yes if the monitor and control status is enabled for the DHCP service
on the Microsoft server and displays No if it is disabled.
— Import successful: The import is completed without errors. Check the Message field for information
about the import.
— Import unsuccessful: The import is completed, but with errors. Check the Message field for information
about the error message.
— Import pending: The job is in queue for execution.
— Import in progress: The job is being executed.
— Import stopped: The job has been stopped. You can select the job and restart the import.
— Test successful: Test is completed without errors. Check the Message field for information about the
test.
— Test unsuccessful: Test is completed, but with errors. Check the Message field for information about the
error message.
— Test pending: Test is in queue for execution.
— Test in progress: Test is in progress.
— Test stopped: Test has been stopped. You can select the job and restart the import.
— Saved file: The data file has been uploaded, but the import has not started.
Note: After a product restart, which can be caused by a failover, all Import in progress jobs go into Import
stopped state; all Import pending jobs continue to be queued for execution.
Note: Superusers can view all CSV import jobs and limited-access users can view only the jobs they submitted.
— Error: The GLB has a connection error. Click the Detailed Status icon to view detailed information or check
the syslog for any error messages.
— Warning: Certain issues, such as Grid member failures or licensing issues, have occurred. Click the Detailed
Status icon to view detailed information or check the syslog for messages to determine the reason for the
warning.
— Disabled: The load balancer is disabled. The Grid member does not try to connect to disabled GLB.
Pending Approvals
The Pending Approvals widget provides information about tasks that are pending your approvals. Add the Pending
Approvals widget to your Dashboard to monitor tasks that require your approvals.
You can select a task and perform the following:
• Click the Approve icon to approve the task.
• Click the Reject icon to disapprove the task.
You can also click Task Manager to access the Administration tab -> Workflow tab -> Task Manager tab.
The Pending Approvals widget displays the following information about each task that requires your approval:
• Task ID: The ID associated with the task. The appliance assigns an ID to a task in chronological order.
• Submitter: The username of the admin who scheduled or submitted the task.
• Ticket Number: The reference number entered by the submitter to identify the task. You can enter up to 20
alphanumeric characters.
• Scheduled Time: The date, time, and time zone when the task was scheduled for execution.
• Affected Object: The name or value of the object that is associated with the task. For example, if the task
involves an A record, this field displays the domain name of the record. If it is a fixed address, it displays the IP
address of the fixed address.
• Object Type: The object type. For example, the appliance can display A Record or Fixed Address.
• Action: The operation the appliance performs in this task. The can be: Add, Modify, Delete, or Network
Discovery.
• Submitted Time: The date, time, and time zone when the task was submitted. You can select this for display. It
is not displayed by default.
Infoblox Community
The Infoblox Community widget displays the latest news from Infoblox. It provides links to video clips that show you
how to perform certain tasks, such as how to prepare for IPAM Express and how to add a network. You can click
available links in the widget to get more information about Infoblox products and solutions.
Note that content in the Infoblox Community widget may not be displayed in certain versions of Mozilla FireFox,
Google Chrome, and Microsoft Internet Explorer due to restrictions these browsers use to block certain secure data.
Follow these steps to unblock the Infoblox Community widget and view data in your respective browser:
• Mozilla FireFox: Click the Shield icon in the address bar and choose Disable Protection on This Page from
the drop-down list. The icon in the address bar changes to a warning triangle and content is displayed in the
Infoblox Community widget. For more details, refer to information at
https://blog.mozilla.org/tanvi/2013/04/10/mixed-content-blocking-enabled-in-firefox-23/.
• Google Chrome: Click the Shield icon in the address bar and click Load unsafe script in the pop-up box.
Chrome automatically refreshes the webpage and loads the content in the Infoblox Community widget. For more
details, refer to information at https://support.google.com/chrome/answer/1342714?hl=en.
• Internet Explorer: Click the Compatibility View icon adjacent to the address bar. The browser refreshes and
the Security Warning dialog box is displayed. Click No in the dialog box. The Only Secure content is displayed
pop-up blocker is displayed at the bottom of the browser. Click the Show all content button in this pop-up
blocker to view the content. For more details, refer to the information at
http://windows.microsoft.com/en-in/internet-explorer/use-compatibility-view#ie=ie-8.
Note: The Mobile Devices widget updates its data every 15 minutes. A device might not be displayed in this widget
if its lease expires within 15 minutes.
To configure the Mobile Devices widget, click the Configure icon and do the following:
• Click Select Network View. In the Network View Selector dialog box, select a network view from the list and click
OK.
Note that if multiple network views were previously configured, Grid Manager displays the default network view.
You can select another network view from the Network View Selector dialog box.
The widget displays the number of active leases for the following device classes:
• Mac OS - Displays all devices that were detected to be running Mac OS.
• Windows - Displays all devices that were detected to be running Windows.
• Android Mobile - Displays Smartphones/PDAs/Tablets that were detected to be running Android.
• Apple Mobile - Displays Smartphones/PDAs/Tablets that were detected to have Apple in the DHCP fingerprint
information.
• No Match - Displays all devices whose fingerprint information does not match with any of the standard/custom
DHCP fingerprint data stored in the appliance. For information about Standard and Custom DHCP Fingerprints,
see Standard and Custom DHCP Fingerprints on page 1359.
• Other - Displays all devices that belong to a device class other than those listed above.
Cloud Statistics
The Cloud Statistics widget appears only when you have deployed the Cloud Network Automations license on the Grid
Master. This widget displays statistical information for cloud objects. It contains the following tabs: Tenant & VMs,
Fixed vs. Floating and Available vs. Allocated. You must install valid cloud related licenses to access this widget. For
more information about installing licenses and enabling Cloud Network Automation, see Deploying Cloud Network
Automation on page 361.
To modify the Cloud Statistics widget, click the Configure icon and select one of the following:
• Show Statistics From:
— All Tenants: Select this to display statistics for all tenants.
— Select Tenant: Click Select to choose a specific tenant for which statistics are displayed.
• Show:
— All IP Addresses: Select this to display all IP address allocation for all tenants or the tenant of your choice.
— Fixed: Select this to display only fixed IP address allocation for all tenants or the tenant of your choice. Fixed
IP addresses correspond to OpenStack Fixed IP Addresses.
— Floating: Select this to display only floating IP address allocation for all tenants or the tenant of your choice.
Floating IP addresses correspond to OpenStack Floating IP Addresses.
Note: If the Threat Protection license is not installed on any of the Grid members, Grid Manager does not display any
threat protection related information in this widget. Similarly, if the RPZ license is not installed on any of the
Grid members, Grid Manager does not display RPZ and DNS Threat Analytics related information in this widget
and if the Threat Analytics license is not installed on any of the Grid members, Grid Manager does not display
DNS Threat Analytics related information in this widget.
The widget displays the following information for Threat Protection, RPZ, and DNS Threat Analytics:
• Status: It displays the overall status of the security service in the Grid based on the events collected from all the
members that support Infoblox External DNS Security and Infoblox Internal Security. It represents the status of
the most critical member in the Grid.
The status icon can be one of the following for the Threat Protection, RPZ, and DNS Threat Analytics service:
— OK (Green): The license for the security service is installed and the security service is running. The rulesets
for the security service are available and the number of events triggered are less than the yellow and red
threshold values configured in the Global Dashboard Properties editor for the corresponding security
service.
— Warning (Yellow): The license for the security service is installed and the security service is running. The
rulesets for the security service are available and the number of events triggered for any of the parameters
equals or exceeds the yellow threshold value, but less than the red threshold value configured in the Global
Dashboard Properties editor for the corresponding security service.
— Critical (Red): The license for the security service is installed and the security service is running. The
rulesets might not be available or the number of events triggered for any of the parameters, equals or
exceeds the red threshold value configured in the Global Dashboard Properties editor for the corresponding
security service.
— Not Setup (Black): The license for the security service is installed, but the security service is not running.
— Unknown (Black): The data is not available from the Grid member.
You can hover your mouse over the Threat Protection status icon and view the Threat Protection Status for Grid
widget. For information about Threat Protection Status for Grid widget, see Threat Protection Status for Grid on
page 165.
• Events from <> of <> security capable members: This column displays the cumulative event counts collected from
the online Grid members that support the Infoblox External DNS Security and Infoblox Internal Security.
— Threat Protection: Displays the total threat protection event counts for the following severity levels:
— Critical (Red): The total number of critical events.
— Major (Orange): The total number of major events.
— Warning (Yellow): The total number of warning events.
— Informational (Blue): The total number of informational events.
— RPZ: Displays the total number of hits received for the following RPZ rules:
— Blocked hits (Red): Total number of queries that triggered a Block (No Data) or Block (No Such Domain)
RPZ rule.
— Passthru hits (Yellow): Total number of queries that triggered a Passthru RPZ rule.
— Substituted hits (Orange): Total number of queries that triggered a Substitute (Domain Name) or
Substitute (Record) RPZ rule.
— Analytics: Displays the total number of DNS tunneling events.
• Definitions/Rules: This column displays the status of the latest ruleset available in the database. For RPZ, the
definition status is based on the latest RPZ feed received from Infoblox specific feeds. You can hover your
mouse over the definition status to see the RPZ definition status when RPZ definitions exists.
• Configuration Status: This column indicates whether the security service is enabled and running properly or not.
Grid manager displays a green check mark if the security service is enabled and running properly in the Grid. If
the security service is disabled, a gray pause mark is displayed. You can hover your mouse over the gray pause
mark to see the status of the security service.
In addition, you can click the Configure icon and do the following:
• Click Configure Security Status Thresholds to configure the thresholds for the security status of the Grid. In the
Global Dashboard Properties editor, you can define the threshold values for Threat Protection, RPZ, and DNS
Threat Analytics. For information, see Configuring Security Status Thresholds on page 144.
• Select the Auto Refresh Period check box to turn on auto-refresh and specify the auto-refresh period in seconds.
The default auto-refresh period is 30 seconds.
Click the Configure icon again to hide the configuration panel after you complete the modification.
Note: When an HA Grid Master fails over, the new active node re-collects data from all the Grid members. Hence, it
might take a few seconds until the data is displayed in the Security dashboard. When an HA Grid member fails
over, the Grid Master stops collecting data from the HA member.
The Security Status for All Members widget displays the following information:
• Overall Status: The current overall security status of the members that support Infoblox External DNS Security
and Infoblox Internal Security. This can be OK, Warning, Critical, or Unknown.
The security status for a member might be Unknown if NTP service is out of synchronization for the member.
Hence, to ensure that the correct data is displayed for the member, use NTP to synchronize the time of the
member with that of the Grid Master.
• Member: The name of the member. You can hover your mouse over the member name and view the Member
Status widget. For information about the Member Status widget, see Member Status (System Status) on page
147.
• IPv4 Address: The IPv4 address of the member.
• IPv6 Address: The IPv6 address of the member.
• Threat Protection Status: The status of the threat protection service running on the member. This can be either
OK, Warning, Critical, Not Setup, or Unknown. You can hover your mouse over the threat protection status and
view the Threat Protection Status for Member widget. For information about the Threat Protection Status for
Member widget, see Threat Protection Status for Member on page 166.
• RPZ Status: The status of the RPZ service running on the member. This can be either OK, Warning, Critical, Not
Setup, or Unknown. You can hover your mouse over the RPZ status and view the Response Policy Zone (RPZ)
Statistics widget. For information about the Response Policy Zone (RPZ) Statistics widget, see Response Policy
Zone (RPZ) Status for Member on page 169.
• Analytics Status: The status of the DNS Threat Analytics service running on the member. This can be either OK,
Warning, Critical, Not Setup, or Unknown.
You can also do the following in this widget:
• Turn on auto-refresh. Click the Configure icon and select the Auto Refresh Period check box to turn on
auto-refresh. Specify the auto-refresh period in seconds. The default auto refresh period is 30 seconds.
• Click the Action icon (shown as a gear in each row of the table) next to the overall status of each member,
and select View Syslog to view all the events logged in the syslog. Grid Manager displays the syslog messages
in the Syslog Preview window.
• Click the Export icon to export the data displayed in this widget.
• Click the Print icon to print the data displayed in this widget.
• Click Response Policy Zones link in the Go To field at the top of the widget to view the RPZs configured on the
member. Grid Manager displays the Response Policy Zones tab in the DNS tab. To navigate back to the Security
dashboard, click Back to Security Dashboard at the top left corner of the navigation bar in the Response Policy
Zones tab.
• Click Threat Protection link in the Go To field at the top of the widget to view the threat protection rulesets
configured on the member. Grid Manager displays the Threat Protection Rules tab in the Security tab. To
navigate back to the Security dashboard, click Back to Security Dashboard at the top left corner of the
navigation bar in the Threat Protection Rules tab.
• Click Members link in the Go To field at the top of the widget to view the members configured in the Grid. Grid
Manager displays the Members tab in the Grid Manager tab. To navigate back to the Security dashboard, click
Back to Security Dashboard at the top left corner of the navigation bar in the Members tab.
Top 10 Rules
The Top 10 Rules tab displays a horizontal bar chart that tracks the top threat protection rules that have the most
number of hits. Each severity level is represented with a different color. The report displays the top 10 rules in
descending order.
If you have configured a reporting member in the Grid, the Go To History link is displayed in this tab. You can click Go
To History to view the Threat Protection Top Rules Logged report in the Reporting tab. To navigate back to the Security
dashboard from the Reporting tab, click Back to Security Dashboard at the top left corner of the navigation bar in the
Reporting tab.
Top 10 Clients
The Top 10 Clients tab displays a horizontal bar chart that tracks the total number of threat protections events
triggered by top clients (source IP addresses). This tab displays the IP addresses of the top 10 clients. For NAT clients,
it displays the NAT addresses for the clients.
If you have configured a Reporting member in the Grid, the Go To History link is displayed in this tab. You can click Go
To History to view the Threat Protection Top Rules Logged by Source report in the Reporting tab. To navigate back to
the Security dashboard from the Reporting tab, click Back to Security Dashboard at the top left corner of the
navigation bar in the Reporting tab.
Note: The data displayed in this widget may not be consistent with the data displayed in the Threat Protection Top
Rules Logged by Source report.
Click the Configure icon again to hide the configuration panel after you complete the modification.
You can do the following in this widget:
• Click the Summary tab to view the statistics for the following resources in the format you selected:
— Smart NIC CPU: The percentage of Smart NIC CPU that is in use.
— Traffic being dropped: The percentage of traffic dropped. It is displayed for both LAN1 and LAN2 interfaces.
— Traffic being received: The percentage of traffic received. It is displayed for both LAN1 and LAN2 interfaces.
• Click the Events Over Time tab to view information about the threat protection event counts for each severity
level over the given time frame. It displays line graphs that show the threat protection event counts for each
event severity over the last 30 minutes. Each event severity is represented by a different color line graph. You
can hover your mouse over the graph to view the coordinates of any point in the graph. You can also click the
Events Over Time legend and use it as a filter to view the graph for specific severity level.
• Click the Top 10 Rules tab to view information about the threat protection rules that have the most number of
hits. It displays a bar chart to track the top 10 threat protection rules with the most number of hits for critical,
major, and warning severity levels. Each event severity is displayed in a different color.
If you have configured a Reporting member in the Grid, the Go To History link is displayed in this tab. You can
click Go To History to view the Threat Protection Top Rules Logged report in the Reporting tab. To navigate back
to the Security dashboard from the Reporting tab, click Back to Security Dashboard at the top left corner of the
navigation bar in the Reporting tab.
• Click the Top 10 Clients tab to view information about the top sources (client IP addresses) that triggered threat
protection rules. It displays a bar chart to track the top 10 clients with the most number of hits.
If you have configured a Reporting member in the Grid, the Go To History link is displayed in this tab. You can
click Go To History to view the Threat Protection Top Rules Logged by Source report in the Reporting tab. To
navigate back to the Security dashboard from the Reporting tab, click Back to Security Dashboard at the top left
corner of the navigation bar in the Reporting tab
• Click the Interface Usage tab to view information about the interface usage (in megabytes per second) over a
given time frame. It displays line graphs that show the interface usage trends for the selected interface over the
last 30 minutes. You can hover your mouse over the graph to view the coordinates of any point in the graph.
• Click the Smart NIC CPU tab to view the information about the percentage of CPU usage over a given time frame.
It displays line graphs that show the CPU usage trends over the last 30 minutes. You can hover your mouse over
the graph to view the coordinates of any point in the graph.
Note that you must install the RPZ license and enable RPZ logging to access this widget. For more information about
installing licenses and enabling RPZ logging, see License Requirements and Admin Permissions on page 1673 and
Setting DNS Logging Categories on page 1340.
Fields Description
Client IP Address Data is retrieved from the src
field.
Example: 10.36.0.251
Requested FQDN It is retrieved from the data
between the rewrite and [A]
via fields. Example: w18.vg.
You can export data displayed in this tab by clicking the Export icon. For more information, see Exporting Displayed
Data on page 111.
Trend
The Trend tab displays statistics of RPZ hits during the last 60 minutes for the Grid. You can use a stacked graph or a
line graph to view the hits. Each of the RPZ policy is represented with a different color. This tab displays the following
information:
• Client Hits: Total number of queries that triggered an RPZ policy. Note that this option is not displayed when you
choose Stacked Diagram, but displayed only when you choose Line Diagram.
• Passthru Hits: Total number of queries that triggered a Passthru RPZ rule. For more information about passthru
rules, see Managing Passthru Rules on page 1679.
• Blocked Hits: Total number of queries that triggered a Block (No Data) or Block (No Such Domain) RPZ rule. For
more information, see Managing Block (No Data) Rules on page 1682 or Managing Block (No Such Domain)
Rules on page 1681 respectively.
• Substitute Hits: Total number of queries that triggered a Substitute (Domain Name) or Substitute (Record) RPZ
rule. For more information, see Managing Substitute (Domain Name) Rules on page 1683 and Managing
Substitute (Record) Rules on page 1685.
• Timestamp: The graph displays a 24 hours time window.
Note the following about this tab:
• The statistical data in DNS service will be reset when you stop and restart the DNS service or if you force an
active DNS service to restart regardless of its state. This results in loss of prior data.
• Using this graph, you can view the timestamp of statistics collection.
Health
The Health tab displays information of RPZ zones and their last updated date and time. This data is retrieved directly
from the database. Note that you cannot sort or filter values in this tab. You can export the data displayed in this tab
by clicking the Export icon. For more information, see Exporting Displayed Data on page 111.
Fields Description
Client IP Address Data is retrieved from the src
field.
Example: 10.36.0.251
Requested FQDN It is retrieved from the data
between the rewrite and [A]
via fields. Example: w18.vg.
You can export data displayed in this tab by clicking the Export icon. For more information, see Exporting Displayed
Data on page 111.
Trend
The Trend tab displays statistics of RPZ hits on the selected member during the last 60 minutes. You can use a stacked
graph or a line graph to view the hits. DNS service generates RPZ statistics for the selected member. Each of the RPZ
policy is represented with a different color. This tab displays the following information:
• Client Hits: Total number of queries that triggered an RPZ policy. Note that this option is not displayed when you
choose Stacked Diagram, but displayed only when you choose Line Diagram.
• Passthru Hits: Total number of queries that triggered a Passthru RPZ rule. For more information about passthru
rules, see Managing Passthru Rules on page 1679.
• Blocked Hits: Total number of queries that triggered a Block (No Data) or Block (No Such Domain) RPZ rule. For
more information, see Managing Block (No Data) Rules on page 1682 or Managing Block (No Such Domain)
Rules on page 1681 respectively.
• Substituted Hits: Total number of queries that triggered a Substitute (Domain Name) or Substitute (Record) RPZ
rule. For more information, see Managing Substitute (Domain Name) Rules on page 1683 and Managing
Substitute (Record) Rules on page 1685.
• Timestamp: The graph displays a 24 hours time window.
Note the following about this tab:
• The statistical data in DNS service will be reset when you stop and restart the DNS service or if you force an
active DNS service to restart regardless of its state. This results in loss of prior data.
• Using this graph, you can view the timestamp of statistics collection.
Health
The Health tab displays information of RPZ zones on the selected member and their last updated date and time. This
data is retrieved directly from the database. Note that you cannot sort or filter values in this tab. You can export the
data displayed in this tab by clicking the Export icon. For more information, see Exporting Displayed Data on page
111.
1 From Grid Manager, 2 Create a smart folder with filter 3 The appliance searches objects
define extensible criteria set to specific objects and that match the filter criteria, and
attributes. The appliance values. You can also group groups the objects by the Group
annotates core network the results by specifying the Group By rules. Grid Manager displays
services data in the database. By rules. the folder contents in a
hierarchical view.
10.2.2.0/24
10.2.2.0/24
= Belgium Networks
120.10.0.0/16 120.10.0.0/16
35.10.2.0/24
Before you set up your smart folders, decide how you want to organize your data. You can specify search and Group
By criteria to help you group information in a meaningful way. You can also decide whether you want to include
objects that do not contain attribute values when you use the Group By criteria to group filtered data by extensible
attributes. For information, see Creating Smart Folders on page 176. Note that a smart folder becomes invalid when
you delete an extensible attribute that the folder uses as a filter or Group By criterion. You must redefine the
extensible attribute and reconfigure the folder criteria to validate the smart folder.
In Grid Manager, you can create smart folders in both the Global Smart Folders and My Smart Folders panels. In Global
Smart Folders, you can create smart folders to which other administrators can create links. Only administrators with
superuser accounts can create, edit, and delete global smart folders. For information, see Global Smart Folders on
page 175. You can create personal folders as well as links to global smart folders in My Smart Folders. For
information, see My Smart Folders on page 175.
Each smart folder you create can contain up to 2,000 objects. When the number of objects exceeds 2,000, Grid
Manager sorts and displays the first 2,000 objects only. It also displays a warning message at the top of the panel.
In this case, you may want to redefine your filter criteria to further refine the filtered data in your smart folders.
Note: Infoblox strongly recommends that you use Type as one of the filter criteria to improve system
performance.
3. Create smart folders in either the My Smart Folders or Global Smart Folders panel. For information, see Creating
Smart Folders on page 176.
My Smart Folders
In My Smart Folders, you can create personal smart folders and links to global smart folders. When you create links
to global smart folders, you can only view information in the folders. However, you can create a local copy of the
global smart folder in its current state for editing purposes. Note that when the original global smart folder is
updated, information in your local copy is not updated. For information, see Saving a Copy of a Smart Folder on page
179. When you delete a link to a global smart folder in this tab, only the link is deleted. There is no impact on the
information in the original global smart folder.
Grid Manager displays a list of smart folders in the list panel. The same list of smart folders is also displayed in the
Finder panel. For information, see Finder Panel on page 68.
When you mouse over a smart folder in the list panel, the following icons appear:
• Information: Displays information about the selected smart folder. Information includes comments and filter
criteria of the folder. It also displays how you grouped the filtered data.
• Edit: Click this icon to edit the definition and filter criteria for the smart folder.
• Delete: Click this icon to delete the smart folder. This operation does not affect the objects or networks that are
in the folder. Only the smart folder is deleted.
Note: For information about DHCP fingerprints, see About DHCP Fingerprints on page 1359. For information about
discovery, see Infoblox Network Insight beginning on page 653.
Note: Infoblox strongly recommends that you use Type as the first filter criterion to improve system performance.
Note: For the folder copy, the appliance appends the word Copy to the original name of the smart folder. You can
change the name of the folder at anytime by editing the folder.
The admin policy defines how the appliance authenticates the admin: with the local database, RADIUS, Active
Directory, TACACS+, or LDAP. You must add RADIUS, Active Directory, TACACS+, or LDAP as one of the authentication
methods in the admin policy to enable that authentication method for admins. See Defining the Authentication Policy
on page 227 for more information about configuring the admin policy.
Figure 4.1 illustrates the relationship of local and remote admin accounts, admin policy, admin groups, and
permissions and properties.
Figure 4.1 Privileges and Properties Applied to Local and Remote Admin Accounts
Default
Admin-Group When admin
accounts are in
Balu an admin group
Login that matches a
group configured
Group locally, the
names appliance selects
Admin-Group2 must Admin-Group2 the first group
match. (based on remote
Christine admin policy) and
Login applies the
Login permissions and
properties to the
admin belonging
to that group.
Admin-Group3 Admin-Group3
Dan Eve
After you have created admin groups and defined their administrative permissions, you can assign administrators to
the group.
• For local admins, see Creating Local Admins on page 208.
• For remote admins, see About Remote Admins on page 211.
Note: When you assign cloud API access to an admin group, the group assumes full authority over all delegated
objects. You must however specifically assign object permissions to the admin group for the group to gain
authority over non-delegated objects. For information about how to assign object permissions, see
Defining Object Permissions on page 200.
4. Click Next and complete the following to define the dashboard template:
— Dashboard Template: From the drop-down list, select the dashboard template you want to assign to this
superuser group. When you apply a dashboard template to an admin group, the template applies to all
users in the group. The default is None, which means that users in this group can access all licensed tasks
in the Tasks Dashboard tab if they have the correct permissions to the task-related objects. Note that if you
want to delete a template, you must first unassign the template from an admin group, or select None,
before you can delete it. For more information about dashboard templates, see About Dashboard
Templates on page 128.
5. Click Next to add admin email addresses if you want the appliance to send approval workflow notifications to a
list of email addresses for the admin group. Complete the following in the Email Address table:
Click the Add icon and Grid Manager adds a row to the table. Enter the email address of the admin who should
receive workflow notifications. You can click the Add icon again to add more email addresses. You can also
select an email address and click the Delete icon to delete it. To modify an email address, click the Email
Address column and modify the existing address.
Note: When you configure an approval workflow and select Group Email Address(es) as the approver
notification addresses, the appliance sends workflow notifications to all email addresses you have added
to this table. For information, see Configuring Approval Workflows on page 86.
6. Optionally, click Next to add extensible attributes to the admin group. For information, see About Extensible
Attributes on page 393.
7. Save the configuration and click Restart if it appears at the top of the screen.
You can do one of the following after you create a superuser admin group:
• Add local admins to the superuser group. For information, see Creating Local Admins on page 208.
• Assign the superuser group to remote admins. For information, see About Remote Admins on page 211.
— Allowed Interfaces: Specify whether the admin group can use the Infoblox GUI (Grid Manager) and the API
(application programming interface) to configure the appliance. Note that you must have the Cloud Network
Automation or Cloud Platform license installed to configure access to the cloud API.
GUI: Select this to allow the admin group to use the Infoblox GUI, Grid Manager.
API: Select this to allow the admin group access to the Infoblox API. The following options are available only
if a Cloud Network Automation or Cloud Platform license is active in the Grid. You must first select this
option to enable the following options.
— API (WAPI/PAPI only): Select this to allow the admin group to use only the RESTful API and Infoblox API.
— Cloud API: Select this to allow the admin group to use the cloud API. This option is available only if a
Cloud Network Automation or Cloud Platform license is installed in the Grid. Select one of the following:
• Cloud API only (No PAPI): Select this to allow the admin group to use WAPI (RESTful API) to send
cloud API requests. Note that the Cloud API uses WAPI exclusively. The group has no access to the
Infoblox API.
• Cloud API and PAPI (No WAPI): Select this to allow the admin group to send API requests and have
access to the Infoblox API. However, the group cannot use RESTful API to send cloud API calls.
Note: When you assign cloud API access to an admin group, the group assumes full authority over all delegated
objects. You must however specifically assign object permissions to the admin group for the group to gain
authority over non-delegated objects. For information about how to assign object permissions, see
Defining Object Permissions on page 200.
4. Click Next and complete the following to define the dashboard template:
— Dashboard Template: From the drop-down list, select the dashboard template you want to assign to this
superuser group. When you assign a dashboard template to an admin group, the template applies to all
users in the group. The default is None, which means that users in this group can perform all licensed tasks
in the Tasks Dashboard tab if they have the correct permissions to the task-related objects. Note that if you
want to delete a template, you must first unassign the template from an admin group, or select None,
before you can delete it. For more information about dashboard templates, see About Dashboard
Templates on page 128.
— Display Taskflow Dashboards Only: Select this check box if you want to restrict this admin group to access
only the Tasks Dashboard in Grid Manager. Note that when you select this check box, users in this admin
group have access to the tasks you specified in the selected dashboard template, if applicable. They cannot
perform any other tasks or manage any core network services in Grid Manager the next time they log in to
the system.
5. Click Next to add admin email addresses if you want the appliance to send approval workflow notifications to a
list of email addresses for the admin group. Complete the following in the Email Address table:
Click the Add icon and Grid Manager adds a row to the table. Enter the email address of the admin who should
receive workflow notifications. You can click the Add icon again to add more email addresses. You can also
select an email address and click the Delete icon to delete it. To modify an email address, click the Email
Address column and modify the existing address.
Note: When you configure an approval workflow and select Group Email Address(es) as the approver
notification addresses, the appliance sends workflow notifications to all email addresses you have added
to this table. For information, see Creating Approval Workflows on page 87.
6. Optionally, click Next to add or delete extensible attributes for this admin group. For information, see About
Extensible Attributes on page 393.
7. Save the configuration and click Restart if it appears at the top of the screen.
• GLB (Global Load Balancer) permissions: Includes all NIOS managed GLB objects.
• DHCP fingerprint permissions: Includes all DHCP fingerprint related objects.
• Named ACL permissions: Includes all named ACLs (access control lists).
• Cloud permissions: Includes all tenant objects.
NIOS applies permissions hierarchically in a parent-child structure. When you define permissions for a resource, all
objects within that resource inherit the same permissions. For example, when you grant an admin group read/write
permission for a network, the admin group automatically has read/write permission for objects in that network. To
override permissions set at a higher level, you define permissions at a more specific level. For example, you can
override the read/write network-level permission by setting read-only or deny permission for a fixed address or a
DHCP-enabled host address. To define permissions for a more specific level, see the following:
• Permissions for common tasks, as described in Administrative Permissions for Common Tasks on page 234.
• Permissions for the Grid and Grid members, as described in Administrative Permission for the Grid on page
237.
• Permissions for IPAM resources, such as IPv6 networks, as described in Administrative Permissions for IPAM
Resources on page 240.
• Permissions for DNS resources, such as DNS views and A records, as described in Administrative Permissions
for DNS Resources on page 241.
• Permissions for DNS resource with associated IP addresses in networks and ranges, as described in
Administrative Permissions for DNS Resources with Associated IP addresses in Networks and Ranges on page
247.
• Permissions for DHCP resources, such as network views and fixed addresses, as described in Administrative
Permissions for DHCP Resources on page 253.
• Permissions for file distribution services, as described in Administrative Permissions for File Distribution
Services on page 262
• Permissions for OCSP server groups and CA certificates, as described in Administrative Permissions for OCSP
Server Groups and CA Certificates on page 264.
• Permissions for GLB and GLB objects, as described in Administrative Permissions for Load Balancers on page
264
• Permissions for Cloud objects, as described in Administrative Permissions for Cloud Objects on page 267.
When you set permissions that overlap with existing permissions, Grid Manager displays a warning about the
overlaps. You can view detailed information and find out which permissions the appliance uses and which ones it
ignores. For information, see Applying Permissions and Managing Overlaps on page 204.
4. Select Read/Write, Read-Only, or Deny for the resources you want to configure. By default, the appliance denies
access to resources if you do not specifically configure them.
5. Optionally, select additional resources from the Permission Type drop-down list. Grid Manager appends the new
resources to the ones that you have already configured. Define the permissions for the resources you select.
6. Save the configuration and click Restart if it appears at the top of the screen.
Table 4.2 lists global permissions you can assign to admin groups or admin roles:
Figure 4.2 Selecting Multiple Objects with the Same Object Type
corp400.com
corp500.com
When you select multiple objects with more than one object type, you can add permissions to the selected objects
as well as to the sub object types that are common among the selected objects. For example, when you select three
DNS forward-mapping authoritative zones and two DNS IPv4 reverse-mapping authoritative zones as illustrated in
Figure 4.3, you can apply permissions to all the five DNS zones as well as to the CNAME, DNAME, and host records in
these zones because CNAME, DNAME, and host records are the common sub object types in these zones.
When you select three DNS forward-mapping authoritative zones and two IPv4 reverse-mapping
authoritative zones, you can apply object permissions to all the DNS zones as well as the CNAME,
DNAME and Host records in these DNS zones.
CNAME records in
corp100.com 0.0.10.in-addr.arpa selected objects
DNAME records in
corp200.com 0.0.127.in-addr.arpa selected objects
Hosts in selected
corp300.com objects
— Resource: Displays the selected objects. When you select more than one object type, the appliance
displays Multiple Selected Objects here. Mouse over to the information icon to view the list of objects to
which you are defining permissions. Grant the resources an appropriate permission: Read/Write, Read
Only, or Deny.
8. Save the configuration and click Restart if it appears at the top of the screen.
Grid Manager displays a warning message when the permissions you define here overlap with other permissions in
the system. Click See Conflicts to view the overlapping permissions in the Permissions Conflict dialog box. For
information, see Applying Permissions and Managing Overlaps on page 204.
You can also set permissions for specific objects from the objects themselves. For example, to define permissions for
a particular Grid member, navigate to that Grid member and define its permissions.
To define the permissions of a specific object:
1. Navigate to the object. For example, to define permissions for a particular network, from the Data Management
tab, select the IPAM tab -> network check box, and then click the Edit icon.
2. In the editor, select the Permissions tab, and then do one of the following:
— Click the Add icon to add permission to the object. In the Admin Group/Role Selector dialog box, select an
admin group or role to which you want to assign the permission, and then click the Select icon.
— Modify the permission and resource type of a selected admin group or role.
— Select an admin group or role and click the Delete icon to delete it.
3. Save the configuration and click Restart if it appears at the top of the screen.
To specify member DNS and DHCP permissions, define DNS or DHCP permissions at the global or object level for an
admin group or admin role, as described in Defining Global Permissions on page 196 and Defining Object
Permissions on page 200. Ensure that you include the Grid member object to which you want to restrict DNS or DHCP
administration. You can assign valid permissions to administrators to manage kerberos keys. For more information,
see Admin Permissions for Configuring GSS-TSIG keys on page 887.
You can also control whether the admins can modify DNS or DHCP properties on a member, as described in Modifying
Permissions on a Grid Member on page 203.
After you add permissions to an admin group or role for a specific Grid member, you can modify the member
permissions and resources. Note that when you modify the member permissions and resources, the appliance
updates the permissions of the admin group or role accordingly.
To modify Grid member permissions:
1. From the Data Management tab, select the DHCP or DNS tab -> Members tab -> Grid_member, and then click the
Edit icon.
2. In the Member DHCP Properties or Member DNS Properties editor, select the Permissions tab.
3. Click a permission in the Permissions table, select a different permission from the Permissions drop-down list or
select a different resource from the Resources drop-down list. Note that when you select Restart DNS or Restart
DHCP, the admins with this permission can only restart the DNS or DHCP service on the selected member. They
cannot modify DNS or DHCP properties of this member.
4. Save the configuration. Note that the appliance automatically updates the permissions of the corresponding
admin group or role in the Administration tab.
The appliance checks object permissions from For each object, the appliance checks permissions
the most to the least specific, as listed. in the order listed.
1. a1.test.com A record a. DNS1 admin group
2. A records in test.com b. Role 1, Role, 2, Role 3…
3. test.com
4. All zones in the default view
5. Default view
6. All A records
7. All zones
8. All DNS views
An admin group that is assigned multiple roles and permissions can have overlaps among the different permissions.
As stated earlier, the appliance uses the first permission it finds and ignores the others. For example, as shown in
Table 4.5, if an admin group has read/write permission to all A records in the test.com zone and a role assigned to it
is denied permission to test.com, the appliance provides read/write access to A records in the test.com zone, but
denies access to the test.com zone and all its other resource records.
Permission assigned to the admin group Read/Write to all A records in the test.com
zone
Permission inherited from an admin role Deny to the test.com zone
Effective permissions Deny to the test.com zone
Read/Write to all A records in test.com zone
Deny to all other resource records in test.com
zone
If the group has multiple roles, the appliance applies the permissions in the order the roles are listed. If there are
overlaps in the permissions among the roles, the appliance uses the permission from the role that is listed first. For
example, as shown in Table 4.6, the first role assigned to the admin group has read-only permission to all A records
in the test.com zone and the second role has read/write permission to the same records. The appliance applies the
permission from the first admin role.
You can check for overlapped permissions when you add permissions to roles and to admin groups, and when you
assign roles to an admin group. When you create a permission that overlaps with existing permissions, Grid Manager
displays a warning message and the See Conflicts link on which you click to view the overlapped permissions. For
information, see Viewing Overlapping Permissions on page 205. You can also use the quick filter Overlaps to filter
overlapped permissions, the appliance lists permissions that overlap with other permissions. If you want to change
the permission the appliance uses, you must change the order in which the roles are listed or change the permissions
that are directly assigned to the admin group. For information, see Creating Limited-Access Admin Groups on page
190.
Managing Permissions
After you define permissions for an admin group and role, you can do the following:
• View the permissions, as described in Viewing Permissions on page 206.
• Modify the permissions, as described in Modifying Permissions on page 206.
• Delete the permission, as described in Deleting Permissions on page 206.
Viewing Permissions
Only superusers can view the permissions of all admin groups.
To view the permissions of an admin group or role:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table.
or
For an admin role: Select an admin role in the Roles table.
3. Grid Manager displays the following information in the Permissions table:
— Group/Role: The name of the admin group or role.
— Permission Type: The type of permissions. This can be Administration Permissions, Analytics Permissions,
Cloud Permissions, Named ACL Permissions, DHCP Permissions, DNS Permissions, File Distribution
Permissions, Grid Permissions, IPAM Permissions, Reporting Permissions, or Security Permissions.
— Resource: The name of the object. For example, this field displays All Hosts if you have defined permissions
for all the hosts in the Grid.
— Resource Type: The object type. For example, this can be Host, PTR record, or Shared Network.
— Permission: The defined permission for the resource.
When you click Show All for Admins, Groups, and Roles, Grid Manager displays all the admin accounts, admin groups,
and admin roles in their respective tables.
Modifying Permissions
You can modify the permissions of user-defined admin roles and admin groups. You cannot modify the permissions
of system-defined admin roles. When you change the permissions of a role that has been assigned to multiple admin
groups, the appliance automatically applies the change to the role in all admin groups to which it is assigned.
To modify the existing permissions of a role or an admin group:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table.
or
For an admin role: Select an admin role in the Roles table.
3. In the Permissions table, select the resource that you want to modify, and then click the Edit icon.
4. In the Mange Global Permissions or Create Object permissions editor, select the new permission: Read/Write,
Read-Only or Deny for the resource.
5. Save the configuration and click Restart if it appears at the top of the screen.
Deleting Permissions
You can remove permissions from user-defined admin roles and admin groups. You cannot remove permissions from
system-defined admin roles. When you remove permissions from a role, they are removed from the role in all admin
groups to which the role is assigned. You can remove a permission from a group as long as it is not inherited from a
role. You cannot remove permissions that are inherited from a role.
To delete a permission:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table.
or
For an admin role: Select an admin role in the Roles table.
3. In the Permissions table, select the resource that you want to modify, and then click the Delete icon.
4. In the Delete Permission Confirmation dialog box, click Yes.
Authenticating Administrators
The NIOS appliance supports the following authentication methods: local database, RADIUS, Active Directory, LDAP,
and TACACS+. The appliance can use any combination of these authentication methods. It authenticates admins
against its local database by default. Therefore, if you want to use local authentication only, you must configure the
admin groups and add the local admin accounts, as described in Creating Local Admins on page 208.
Depending on where admin user credentials are stored, you can configure the NIOS appliance to authenticate admins
locally or remotely. When you configure the authentication type as "local," NIOS authenticates admins against its
local database. When you configure the authentication type as "remote," NIOS authenticates admins whose user
credentials are stored remotely on authentication servers, such as RADIUS servers, AD domain controllers, LDAP
servers, or TACACS+ servers.
Note the following when you configure remote authentication type for local admins:
• You cannot define two local admins that have the same name and belong to different authentication server
groups.
• Only superusers can modify the authentication type for other admin accounts.
• At least one superuser account must use the remote authentication type.
To authenticate admins using RADIUS, Active Directory, TACACS+, or LDAP in addition to local authentication, you
must define those services on the appliance and define the admin authentication policy. For information, see About
Remote Admins on page 211.
The appliance also supports two-factor authentication that validates smart card users, such as the U.S. Department
of Defense (CAC) Common Access Card users. In two-factor authentication, NIOS first authenticates admins through
the admin authentication policy, and then validates the admin client certificates through the OCSP service. For more
information about two-factor authentication and how to configure it, see Defining the Authentication Policy on page
227.
Note: If you are using remote authentication, you must always have at least one local admin in a local admin group
to ensure connectivity to the NIOS appliance in case the remote servers become unreachable.
Note: You cannot configure the Remote authentication type for NIOS admin users who belong to the
fireeye-group admin groups.
— Email Address: Enter the email address for this administrator. The appliance uses this email address to
send scheduling notifications.
— Admin Group: Click Select to specify an admin group. If there are multiple admin groups, Grid Manager
displays the Admin Group Selector dialog box from which you can select one. An admin can belong to only
one admin group at a time.
NIOS appliance creates a new group, fireeye-group, when you add the first FireEye zone. The FireEye admin
group is read-only and you cannot assign permissions to it. Select fireeye-group for the admin group and
add users to this group. For more information, see About FireEye Integrated RPZs on page 1637.
Note: You cannot add a NIOS admin user that uses the Remote authentication type to the fireeye-group admin
group.
4. Optionally, click Next to add extensible attributes to the admin account. For information, see About Extensible
Attributes on page 393.
5. Save the configuration and click Restart if it appears at the top of the screen.
Managing Passwords
Superusers can define requirements for the passwords of local admins according to your organization’s policies. In
addition to specifying the minimum password length, you can define rules that specify the character types that are
allowed in the password. You can also specify whether passwords expire, their duration, and when reminders are
sent to the users. Additionally, you can require admins to change their passwords when they first log in or after their
passwords are reset.
You set the requirements at the Grid level, so they apply to all local admins who log in to the Grid. The requirements
that you define appear in the User Profile of all local admins and when users are required to change their password.
To define the password requirements for local admins:
1. From the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and select Grid Properties -> Edit.
3. In the Grid Properties editor, select the Password tab and complete the following:
— Minimum Password Length: Specify the minimum number of characters that are required in a password.
— Password Complexity: You can set up some requirements around how users compose a password by
specifying the category and the number of characters and/or symbols the password must contain. The
default is 0 for all categories, which means the password is not required to contain those characters.
Specify the minimum number of characters the password must contain for the following:
— lowercase characters [a-z]
— uppercase characters [A-Z]
— numeric characters [0-9]
— symbol characters. Allowed characters are: ! @ # $ % ^ & * ( )
— character changes from previous passwords. To discourage users from reusing previous passwords,
you can require a minimum change of characters from previous passwords.
— Password must expire: Select this check box to enable passwords to expire after a specified period. Specify
the duration of each password and the number of days before the expiration that the appliance sends a
reminder.
— Force password change at next login: Select this check box to force all new users to change their passwords
when they first log in and to force existing users whose passwords were just reset to change their
passwords.
Note: The “force password change at next login” feature does not apply to admin users in the fireeye-group.
These users will not be prompted to change their passwords at the next login. Their original passwords
continue to work. For information about FireEye integrated RPZs, see About FireEye Integrated RPZs on
page 1637.
NIOS Appliance
Admin
2 The appliance first checks the local admin
policy, and then the admin policy for the
authentication service, which can be a RADIUS
1 An admin enters his user name RADIUS, AD, LDAP, or TACACS+ service. Server
and password to log in to the The appliance sends an Access-Request
appliance. packet to the RADIUS server.
Admin
Policy 3 The RADIUS server responds with an
Access-Reject package because the admin’s user
name and password are not in its database.
AD Server
4 The appliance tries the next authentication
service on the list, which is an Active Directory
(AD) service. It sends a request to the AD server.
7 The appliance allows the admin 6 The appliance matches one of the
to log in and applies the admin’s groups with a group in the
privileges of the IT-BLDG2 admin policy.
Only superusers can perform the following tasks to configure NIOS to authenticate admins using remote
authentication servers:
• Configure the authentication server groups. You can create multiple RADIUS, LDAP, and AD server groups, but
only one TACACS+ server group.
— For information about RADIUS authentication, see Authenticating Admins Using RADIUS on page 213.
— For information about AD authentication, see Authenticating Admins Using Active Directory on page 217.
— For information about TACACS+ authentication, see Authenticating Admin Accounts Using TACACS+ on
page 220.
— For information about LDAP authentication, see Authenticating Admins Using LDAP on page 223.
• Configure admin groups with names that match those on the remote server. For information about admin
groups, see About Admin Groups on page 188.
• Configure the admin policy, as described in Defining the Authentication Policy on page 227.
Note: Infoblox strongly recommends that even if you are using remote authentication, you always have at least one
local admin in a local admin group to ensure connectivity to the appliance in case the remote servers become
unreachable. Also, when you delete an authentication server group, the appliance removes it from the system.
Deleted authentication server groups are not moved to the Recycle Bin. Once deleted, the authentication
server groups no longer exist in the system.
When remote authentication is successful, the appliance creates a remote admin user object in the NIOS database,
which stores user preferences such as time zone, table size, and active Dashboard widgets for the remote user. If the
remote user does not log in to the appliance for more than 180 days, the appliance removes the corresponding admin
user object from the database. Although the remote user can still log in to the appliance, user preferences are lost.
The Grid Master performs this clean up action once a day.
You can also authenticate users with smart cards that contain X.509 client certificates. The status of these certificates
is stored remotely on OCSP responders. You can configure NIOS to authenticate these admins through the two-factor
authentication method. For more information about two-factor authentication and how to configure it, see Defining
the Authentication Policy on page 227.
The appliance lets the user log in and 4a If the RADIUS server authenticates the
applies the authorization profile. user, it sends back an Access-Accept
packet.
The appliance does not allow the user 4b If the RADIUS server rejects the
to log in. authentication request, it sends back an
Access-Reject packet.
Authentication Protocols
When you configure the NIOS appliance to authenticate admins against a RADIUS server group, you must specify the
authentication protocol of each RADIUS server, which can be either PAP (Password Authentication Protocol) or CHAP
(Challenge Handshake Authentication Protocol).
PAP tries to establish the identity of a host using a two-way handshake. The client sends the user name and password
in clear text to the NIOS appliance. The appliance uses a shared secret to encrypt the password and sends it to the
RADIUS server in an Access-Request packet. The RADIUS server uses the shared secret to decrypt the password. If the
decrypted password matches a password in its database, the user is successfully authenticated and allowed to log
in.
With CHAP, when the client tries to log in, it sends its user name and password to the NIOS appliance. The appliance
then creates an MD5 hash of the password together with a random number that the appliance generates. It then
sends the random number, user name, and hash to the RADIUS server in an Access-Request package. The RADIUS
server takes the password that matches the user name from its database and creates its own MD5 hash of the
password and random number that it received. If the hash that the RADIUS server generates matches the hash that
it received from the appliance, then the user is successfully authenticated and allowed to log in.
You can configure one of the following modes to send the authentication request to the RADIUS server:
• Ordered: In this mode, the authentication request is sent to the first server in the list. The authentication
request is sent to the next server only when the first server is out of service or unavailable.
• Round Robin: In this mode, the first authentication request is sent to a server chosen randomly in a group. If
there is no response from the server, continued attempts are performed sequentially until it selects the last
server in the list. Then it starts with the first server in the list and continues the selection process until all the
servers have been attempted.
Note: If you have two Infoblox appliances in an HA pair, enter both the members of the HA pair as separate access
appliances and use the LAN or MGMT IP address of both appliances (not the VIP address), if configured.
Depending on your particular RADIUS server, you can configure the following RADIUS server options to enable
communication with the NIOS appliance:
• Authentication Port
• Accounting Port
• Domain Name/IP Address of the NIOS appliance
• Shared Secret Password
• Vendor Types
— Click Test to test the configuration. If the NIOS appliance connects to the RADIUS server using the
configuration you entered, it displays a message confirming the configuration is valid. If it is unable to
connect to the RADIUS server, the appliance displays a message indicating an error in the
configuration.
— Click Add to add the server to the list.
When you add multiple RADIUS servers, the appliance lists the servers in the order you added them. This
list also determines the order in which the NIOS appliance attempts to contact a RADIUS server. You can
move a server up or down the list by selecting it and clicking the up or down arrow.
You can also delete a RADIUS server by selecting it and clicking the Delete icon.
— Authentication: Optionally, modify the authentication settings. These settings apply to all RADIUS servers
that you configure on the NIOS appliance.
— Timeout(s): Specify the number of seconds that the appliance waits for a response from the RADIUS
server.
— Retries: Specify how many times the appliance attempts to contact an authentication RADIUS server.
The default is 5.
If you have configured multiple RADIUS servers for authentication and the NIOS appliance fails to contact
the first server in the list, it tries to contact the next server, and so on.
— Accounting: Optionally, modify the Accounting settings.
— Timeout(s): Specify the number of seconds that the appliance waits for a response from the RADIUS
server.
— Retries: Specify how many times the appliance attempts to contact an accounting RADIUS server. The
default is 1000.
— Mode: Specifies how the appliance contacts the RADIUS servers. The default is Ordered List.
— Ordered List: The Grid member always selects the first RADIUS server in the list when it sends an
authentication request. It queries the next server only when the first server is considered down.
— Round Robin: The Grid member sends the first authentication request to a server chosen randomly in a
group. If there is no response from the server, the Grid member selects the next server in the group.
Continued attempts are performed sequentially until it selects the last server in the group. Then it
starts with the first server in the group and continues the selection process until all the servers have
been attempted.
— Comment: Enter useful information about the RADIUS service.
— Disable: Select this to disable RADIUS authentication for the servers listed in the table.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note that the following fields in the wizard do not apply to this feature: Enable NAC Filter, Cache Time to Live, and
Recovery Interval. They are used with the NAC Integration feature described in Chapter 32, Authenticated DHCP, on
page 1145.
To configure NIOS to authenticate administrators using Active Directory domain controller groups, you must first
configure user accounts on the domain controller. Then, on the NIOS appliance, do the following:
• Configure one or more AD authentication server group on the appliance and add AD domain controllers to the
group. For information about configuring an AD authentication service group for admins, see Configuring an
Active Directory Authentication Service Group on page 218.
• If you configured admin groups on the AD controller, you must create those same groups on the NIOS appliance
and specify their privileges and settings. Note that the admin group names must match those on the AD domain
controller. You can specify a default group as well. The NIOS appliance assigns admins to the default group if
none of the admin groups on the NIOS appliance match the admin groups on the AD domain controller or if
there are no other admin groups configured. For information about configuring group permissions and
privileges, see About Admin Groups on page 188.
• Add the newly configured Active Directory service to the list of authentication services in the admin policy, and
add the admin group names as well. See Defining the Authentication Policy on page 227 for more information
about configuring an admin policy.
The appliance does not allow the user to The TACACS+ server sends a REPLY
log in. 6b
message indicating authentication
and/or authorization is unsuccessful.
TACACS+ Accounting
When you enable TACACS+ accounting, NIOS sends the TACACS+ accounting server a TACACS+ accounting event with
the same information that it sends to the Audit Log for any user command/event. NIOS sends an accounting start
packet when a user first logs in successfully using TACACS+ authentication, and it sends an accounting STOP packet
when a user logs out of the GUI or CLI or when a GUI or CLI session times out. If a product restarts or software failure
occurs, NIOS drops any outstanding accounting packets. Note that audit log entries that are greater than 3,600
characters are truncated in accounting events sent to TACAS+ servers.
Configuring TACACS+
Complete the following tasks to enable NIOS and the TACACS+ servers to communicate.
On each TACACS+ server that you are adding to the authentication server group:
• For Windows TACACS+ servers, add the NIOS appliance as an AAA client. This step is not required for LINUX
TACACS+ servers.
• Determine which user group on the TACACS+ server is used to match the admin group in NIOS, and then
configure the following settings for the user group:
— Add “infoblox” as a custom service.
— Define the custom attribute for the group, in the format: infoblox-admin-group=group_name. For example,
infoblox-admin-group=remoteadmins1. The group name can have a maximum of 64 characters.
On the NIOS appliance:
• Create a TACACS+ authentication server group. You can create only one TACACS+ server group. For more
information, see Configuring a TACACS+ Authentication Server Group on page 221.
• Create the local admin group in NIOS that matches the user group on the TACACS+ server. Note that the NIOS
admin group name must match the group name specified in the TACACS+ server and in the custom attribute. For
example, if the custom attribute is infoblox-admin-group=remoteadmins1, then the admin group name must be
remoteadmins1. In addition, you can designate a default admin group for remote admins. For information about
configuring group permissions and privileges, see About Admin Groups on page 188.
• In the authentication policy, add the newly configured TACACS+ server group and the TACACS+ admin group
name. See Defining the Authentication Policy on page 227 for more information about configuring an admin
policy.
— Shared Secret: The shared key that the NIOS appliance and the TACACS+ server use to encrypt and
decrypt messages.
— Enable Accounting: Select this to enable NIOS to send accounting information to the TACACS+ server.
— Connect through Management Interface: Select this check box to enable the appliance to use the
MGMT port to communicate with the TACACS+ server. Ensure that the MGMT port is configured.
Otherwise, the appliance will use the LAN interface
— Disable Server: Select this to prevent queries from being sent to this server. You can retain the
configuration, but disable the service.
Click Test to test the configuration. Click Add to add the TACACS+ server to the list.
When you add multiple TACACS+ servers, the appliance lists the servers in the order you added them. This
list also determines the order in which the NIOS appliance attempts to contact a TACACS+ server. You can
move a server up or down the list by selecting it and clicking the up or down arrow.
— Authentication/Authorization: Optionally, modify the authentication and authorization settings. These
settings apply to all TACACS+ servers that you configure on the NIOS appliance.
— Timeout(s): Specify the number of seconds or milliseconds that the appliance waits for a response
from the TACACS+ server before it tries to contact it again. The amount of time before the server is
retried. The default and minimum is 5000, and the maximum is 60000.
— Retries: Specify how many times NIOS attempts to contact a TACACS+ server and fails before it tries to
contact the next server on the list. The default is 0. The maximum is 5.
— Accounting: Optionally, modify the Accounting settings.
— Timeout(s): Specify the number of seconds or milliseconds that the appliance waits for a response
from the TACACS+ server. The amount of time before the server is retried. The default and minimum is
1000, and the maximum is 30000.
— Retries: Specify how many times the appliance attempts to contact an accounting TACACS+ server and
fails before it tries to contact the next accounting server on the list. The default is 0. The maximum is 5.
— Comment: Enter additional information about the service.
— Disable: Select this to retain an inactive TACACS+ authentication service profile.
4. Save the configuration.
The appliance lets the user log in and applies 4 Authentication is successful. If the
the authorization profile. LDAP server authenticates the user, the
group membership information for the
The appliance grants all permissions specific
administrator is sent to the appliance.
to the administrator based on the group
The first group in the list that matches
membership sent from the LDAP server
the groups returned by the LDAP is
associated with the admin account. If there is
assigned to the admin, along with the
no group membership information for an
associated permissions after the admin
admin, the default group is assigned (if
logs in.
configured).
The appliance does not allow the user to Authentication is unsuccessful. The LDAP
5 server sends back a deny access result to
log in.
the appliance. No group membership
information is sent.
Authentication Protocols
When you configure the NIOS appliance to authenticate admins against an LDAP server group, you must specify the
authentication protocol of each LDAP server, which can be either anonymous or authenticated. The NIOS appliance
connects anonymously to the LDAP server when the authentication type is anonymous. With authenticated type, the
NIOS appliance connects using the bind DN and bind password defined for that server.
You can configure one of the following modes to send the authentication request to the LDAP server:
• Ordered: In this mode, the authentication request is sent to the first server in the list. The authentication
request is sent to the next server only when the first server is out of service or unavailable.
• Round Robin: In this mode, the first authentication request is sent to a server chosen randomly in a group. If
there is no response from the server, continued attempts are performed sequentially until it selects the last
server in the list. Then it starts with the first server in the list and continues the selection process until all the
servers have been attempted.
You can also specify the authentication type, for admins who belong to specific groups. The NIOS appliance uses the
selected group authentication type to query the LDAP server and retrieve the group names to which the admin
belongs. In LDAP, you can group users by any custom object classes. Example: objectclass groupofNames,
objectclass posixGroup, etc. In NIOS, when you select Member Group Attribute as the group authentication type, the
appliance uses custom LDAP group attributes to query the LDAP server and retrieve the group names for
authentication. Example: memberOf, isMemberOf, etc. When you select Posix Group as the authentication type, the
appliance uses "memberuid" and "objectClass" to query the server and retrieve the group names for authentication.
Configuring LDAP
Do the following to configure NIOS to use one or more LDAP server groups to authenticate administrators:
• Configure at least one LDAP authentication server group. For more information, see Configuring an LDAP Server
Group on page 224.
• Define admin groups for the admins that are authenticated by the LDAP servers and specify their privileges and
settings. The group names in NIOS must match the admin group names on the LDAP server. For more
information about defining admin groups, see About Admin Groups on page 188.
• In the authentication policy, add the LDAP server groups and the admin groups that match those on the LDAP
server. You can also designate an admin group as the default group for remote admins. NIOS assigns admins to
this group when it does not find a matching group for a remote admin. For more information about configuring
the policy, see Defining the Authentication Policy on page 227.
— Base DN: Enter the base DN (Distinguished Name) value. All entries stored in an LDAP directory have a
unique DN.
— Authentication Type: Select the authentication type from the drop-down list. The supported
authenticated types are as follows:
• Anonymous: Select this to connect to the LDAP server anonymously. This is selected by default.
• Authenticated: Select this to connect using the bind DN and bind password defined for that server.
• Bind User DN: Enter the bind user DN.
• Bind Password: Enter the bind password.
— Encryption: Select the encryption type from the drop-down list.
• SSL: This is selected by default. All the network traffic is encrypted through an SSL (Secure Sockets
Layer) protocol. The appliance automatically updates the authentication port to 636 for SSL. You
must upload a CA certificate that verifies the LDAP server certificate. Click CA Certificates to upload
the certificate. In the CA Certificates dialog box, click the Add icon, and then navigate to the
certificate to upload it.
• NONE: Select this to unencrypt the connection. Note that Infoblox strongly recommends that you
select the SSL option to ensure the security of all communications between the server and the
member.
— Network Port: Enter the authentication port number on the LDAP server to which the appliance sends
authentication requests. The default value is 636. When you select NONE from the Encryption
drop-down list, the appliance automatically updates the authentication port to 389.
— Comment: Enter useful information about the LDAP server.
— Connect through Management Interface: Select this so that the NIOS appliance uses the MGMT port for
administrator authentication communications with just this LDAP server.
— Disable Server: Select this to disable the LDAP server if, for example, the connection to the server is
down and you want to stop the NIOS appliance from trying to connect to this server. You cannot disable
the only server in a group if it is already being used by the remote authentication policy.
— Click Test to test the configuration. If the NIOS appliance connects to the LDAP server using the
configuration you entered, it displays a message confirming the configuration is valid. If it is unable to
connect to the server, the appliance displays a message indicating an error in the configuration.
— Click Add to add the LDAP server to the group.
When you add multiple LDAP servers, the appliance lists the servers in the order you added them. This
list also determines the order in which the NIOS appliance attempts to contact an LDAP server. You can
move a server up or down the list by selecting it and clicking the up or down arrow.
You can also delete a server by selecting it and clicking the Delete icon.
— Server Timeout(s): Specify the number of seconds that the appliance waits for a response from the LDAP
server. The default value is 5 seconds.
— Retries: Specify how many times the appliance attempts to contact an authentication LDAP server. The
default value is 5.
If you have configured multiple LDAP servers for authentication and the NIOS appliance fails to contact the
first server in the list, it tries to contact the next server after completing the specified number of attempts,
and so on.
— Mode: Specifies the order in which a Grid member connects to an LDAP server.
— Ordered List: The Grid member always selects the first LDAP server in the list when it sends an
authentication request. It queries the next server only when the first server is considered down. This is
the default.
— Round Robin: The Grid member sends the first authentication request to a server chosen randomly in a
group. If there is no response from the server, the Grid member selects the next server in the group.
Continued attempts are performed sequentially until it selects the last server in the group. Then it
starts with the first server in the group and continues the selection process until all the servers have
been attempted.
— Recovery Interval: Specify the number of seconds that the appliance waits to recover from the last failed
attempt in connecting to an LDAP server. Select the time unit from the drop-down list. The default is 30
seconds. This is the time interval that NIOS waits before it tries to contact the server again since the last
attempt when the appliance could not connect to the LDAP server or when the LDAP server did not send a
reply within the configured response timeouts and retry attempts.
— Group Authentication Type: Select the group authentication type for LDAP authentication service from the
drop-down list. By default, Member Group Attribute authentication type is selected.
When you select Member Group Attribute, you can specify custom LDAP group attribute in the Group
Membership Attribute field. For example, memberOf, isMemberOf, etc. The appliance uses this attribute to
retrieve the group names to which the admin belongs. When you select Posix Group, the appliance uses
"memberuid" and "objectClass" to retrieve the group names to which the admin belongs.
— Group Membership Attribute: Specify the LDAP group attribute (such as "memberOf" and "isMemberOf").
This is used to query the server and retrieve the group names to which the admin belongs. This field is
enabled only when you select Member Group Attribute in the Group Authentication Type drop-down list.
The default value is memberOf.
— LDAP Search Scope: To search for an admin user name in the LDAP directory, select one of the following
LDAP search scope:
• Base: Specify Base to perform search only on base in the LDAP directory. This is the top level of the
LDAP directory tree.
• One Level: Specify One Level to perform search on base DN and one level below the base in the
LDAP directory.
• Sub tree: Specify Sub tree to perform search on base and all the entries below the base DN in the
LDAP directory.
The default value is One Level.
— User ID: Specify the attribute associated with the user object in the LDAP server, such as "uid" and "cn".
This attribute is used to match the NIOS user name.
— Map LDAP Field to Extensible Attribute (for Captive Portal Users only): If you configure the LDAP
authentication server group to authenticate the captive portal users, you can map an LDAP attribute value
to an existing extensible attribute. This mapping is optional. By doing so, the LDAP attribute value will be
queried from the LDAP server once the captive portal user authentication is successful. The attribute value
received from the LDAP server is mapped to the corresponding extensible attribute. NIOS updates or
creates a MAC address filter depending on the captive portal user or the client’s hardware and name.
Click the Add icon and enter the following:
— LDAP Field: Enter the LDAP attribute. This attribute is queried in the LDAP directory server.
— Extensible Attributes: Select an attribute from the drop-down list. The drop-down list displays only the
extensible attributes configured with attribute type as string. Infoblox recommends that you avoid
confidential data while mapping extensible attribute to an LDAP attribute because this data is visible in
the extensible attribute field of the corresponding MAC address filter.
Note: Mapping an extensible attribute to an LDAP attribute must be unique for a given LDAP server. Attribute not
defined in the LDAP directory for a given user is considered as null and is mapped to the corresponding
extensible attribute with a default value. The default value of extensible attribute is Not Found. This
default value is not configurable and they do not cause the authentication to fail.
— Map the remote admin group to the local group in this order: In order for the appliance to assign a remote
admin to the correct group, you must list the admin groups in the local database that match the remote
admin groups. The appliance matches a remote admin to a group in the order the groups are listed. You can
also define a default admin group to which NIOS assigns remote users with no admin groups listed. This
section is disabled when you select Passwords of Local users in the Authentication Server Groups is the
authority for section.
When the appliance receives information that the admin belongs to one or more groups, the appliance
selects the first group in the list that matches, and assigns that group to the admin. If no groups are
returned by the authentication server, the default group is assigned (if specified).
Complete the following to configure the remote admin group list:
— Click the Add icon to add an admin group to the list. In the Admin Group Selector dialog box, select an
admin group. Use Shift+click and Ctrl+click to select multiple admin groups.
— You can reorder the list by selecting an admin group and using the arrow keys to move it up or down the
list.
— Assign user to this group if remote admin group cannot be found: Click Select to assign a user to a
specific admin group if the remote admin group is not found. In the Admin Group Selector dialog box,
select an admin group. You can also click Clear Selection to clear the displayed member and select a
new one.
Note: Authentication for both the admin authentication policy and OCSP validation must be successful before a
smart card admin can access the appliance.
1 User inserts a smart card, establishes a 2 The appliance checks the authentication
successful SSL/TLS client authenticated policy.
HTTPS connection to the appliance
(through the client certificate and private
key from the smart card), and sends a
username, password, and client
certificate,
The appliance does not allow the admin 4b Authentication servers send messages
to log in. indicating authentication and/or
authorization is unsuccessful.
NIOS allows the admin to log in and 6b The OCSP responder returns a “good”
assigns it to the admin group that certificate status indicating
matches the smart card user and applies authentication is successful. In a Direct
the authorization profile. trust model, the appliance uses the
OCSP responder certificate to validate
the OCSP reply. In a Delegated trust
model, it uses the CA certificate to
validate the reply.
The appliance does not allow the admin 6b The OCSP responder returns a
to log in. “revoked” or “unknown” certificate status
indicating authentication is unsuccessful.
Note: The uploaded CA certificates must be the ones that issued the client certificates to be authenticated.
Otherwise, clients such as browsers, cannot establish a successful SSL/TLS client authenticated HTTPS
session to the appliance.
3. Configure an OCSP authentication server group and enable it, as described in Configuring the OCSP
Authentication Server Group on page 230.
Note that once you save the OCSP authentication server group configuration, the appliance terminates administrative
sessions for all admin users. After you enable the OCSP service, you can verify whether two-factor authentication is
enabled. Go to the Administration -> Administrators -> Authentication Policy tab, Grid Manager displays the
“Two-Factor Authentication Enabled” banner in this tab.
— Server Certificate: Click Select to upload a server certificate. In the Upload dialog box, click Select to
navigate to the certificate, and then click Upload. The appliance validates the certificate when you save
the configuration. A server certificate is required for the direct trust model.
— Disable: Select this check box to disable the OCSP responder if, for example, the connection to the
server is down and you want to stop the NIOS appliance from trying to connect to this server.
Note: You cannot save the OCSP configuration when you disable all OCSP responders, thus the OCSP service is
disabled and two-factor authentication is no longer in effect.
Click Add to save the configuration and add the responder to the table. You can add multiple OCSP
responders for failover purposes. You can use the up and down arrows to place the responders in the order
you desire. The appliance tries to connect with the first responder on the list. If the connection fails, it tries
the next responder on the list, and so on. Grid Manager displays the following for each responder:
— Responder: The FQDN or the IP address of the OCSP responder.
— Comment: Information you entered about the OCSP responder.
— Port: The port number on the OCSP responder to which the appliance sends authentication requests.
— Disable: Indicates whether the responder is disabled or not. Note that you must enable at least one
responder to enable the OCSP service.
You can also click Test to test the configuration. If the appliance connects to the responder using the
configuration you entered, it displays a message confirming the configuration is valid. If it is unable to
connect to the responder, the appliance displays a message indicating an error in the configuration.
— Response Timeout(s): Enter the time the appliance waits for a response from the specified OCSP responder.
The default is 1 second. You can select the time unit from the drop-down list.
— Retries: Enter the number of times the appliance tries to connect to the responders after a failed attempt.
The default is 5.
— Recovery Interval: Enter the time the appliance waits to recover from the last failed attempt in connecting to
an OCSP responder. Select the time unit from the drop-down list. The default is 30 seconds. This is the time
interval that NIOS waits before it tries to contact the responder again since the last attempt when the
appliance could not connect with the responder or when the responder did not send a reply within the
configured response timeouts and retry attempts.
— Trust Model: From the drop-down list, select Direct or Delegated as the trust model for OCSP responses. In a
direct trust model, OCSP responses are signed with an explicitly trusted OCSP responder certificate. You
must upload the OCSP responder certificate if you select Direct. In a delegated trust model, OCSP
responses are signed with a trusted CA certificate. A server certificate is not required when you select
Delegated. The default is Direct.
— SSH Remote Console Authentication: Select a method for admins to log in to the appliance through the CLI.
From the drop-down list, select No Login to disable SSH remote connection through CLI, or select Login no
Certificate to authenticate admins using their user names and passwords without authenticating their
client certificates through the OCSP service. The default is No Login.
Note: To enable SSH remote console authentication, you must also enable remote console access in the Grid or
member settings.
— Enable Superuser login when all responders are unavailable: Select this check box to enable superuser
login when all OCSP responders are unavailable. As long as the superusers are authenticated through the
configured authentication policy, enabling this allows superusers to log in to the appliance if all OCSP
responders were disconnected or did not reply within the configured response timeouts and retry attempts.
— Comment: Enter useful information about the OCSP authentication service.
— Disable: Select this to retain an inactive OCSP authentication service profile.
Note that enabling the OCSP authentication service terminates administrative services for all users. Ensure that you
have uploaded the correct CA certificates before enabling the service. Your login names must also match the CN
(Common Name) used in the certificate. When you configure multiple OCSP responders, ensure that you place them
in the correct order because the status check for a client certificate is based on the OCSP reply sent by the first OCSP
responder that replies.
Notifying Administrators
You can notify individual administrators about system status through email, or notify a group of people using an alias
email address. If you have configured DNS resolution on your network, the E-mail relay configuration function is not
required. If you did not configure the settings on the DNS Resolver section, you must enter a static IP address of the
target system in the Relay Name/IP Address field. The appliance sends e-mail to administrators when certain events
occur. This functionality supports both IPv4 and IPv6 networks. Here is a list of events that trigger e-mail notifications:
• Changes to link status on ports and online/offline replication status
• Events that generate traps, except for upgrade failures (ibUpgradeFailure). For a list of events, see Infoblox MIBs
on page 1312
The appliance attempts to send the email notification once after an event. It does not try to send the notification
again, if the first attempt fails. Infoblox recommends that you use the Test Email settings button to test the email
settings and to verify that the recipient received the notification.
You can define the email settings at the Grid and member levels.
Grid Level
To notify an administrator of an independent appliance or a Grid:
1. From the Grid tab, select the Grid Manager tab, and then select Grid Properties -> Edit from the Toolbar.
2. In the Grid Properties editor, select the Email tab, and then complete the following:
— Enable Email notification: Select this.
— Email address: Enter the email address of the administrator. Use an email alias to notify multiple
people.
— Use SMTP Relay: Select this if the NIOS appliance must send email to an intermediary SMTP (Simple Mail
Transfer Protocol) server that relays it to the SMTP server responsible for the domain name specified in the
email address. Some SMTP servers only accept email from certain other SMTP servers and might not allow
email from the NIOS appliance. In this case, specify the DNS name or IP address of a different SMTP server
that does accept email from the NIOS appliance and that will then relay it to the SMTP server that can
deliver it to its destination.
Clear this if it is unnecessary to use an email relay server.
— SMTP Relay Name or Address: If you have configured DNS resolution, enter the DNS name of the relay
server.
If DNS resolution is not configured, enter the IP address of the relay server.
3. Optionally, click Test Email settings to confirm this feature is operating properly.
4. Save the configuration and click Restart if it appears at the top of the screen.
Member Level
To define email settings for a member:
1. From the Grid tab, select the Grid Manager tab -> member check box, and then select the Edit icon.
2. In the Grid Member Properties editor, select the Email tab, and then click Override to override Grid-level settings.
3. Complete the email configuration as described in Grid Level on page 233.
Specific Network(s)
Network Discovery
All Network Views
All Grid Members
Scheduling Task
Fixed Addresses
DHCP Range(s)
All DNS Zones
All DNS Views
All Networks
Tasks
properties,
configure member
DNS properties,
assign members to
DNS objects, and
restart DNS service
on members
Configure Grid RW
DHCP properties,
configure member
DHCP properties,
assign members to
DHCP objects, and
restart DHCP
service on
members
Configure a Grid RW
member
Restart services on RW
a Grid member
Configure member RW
DNS properties,
assign member to
DNS objects, and
restart DNS service
on member
Specific Network(s)
Network Discovery
All Network Views
All Grid Members
Scheduling Task
Fixed Addresses
DHCP Range(s)
All DNS Zones
All DNS Views
All Networks
Tasks
Configure member RW
DHCP properties,
assign member to
DHCP objects, and
restart DHCP
service on member
Restart member RW
DNS service
Restart member RW
DHCP service
Initiate and control RW RW
network discovery
on all networks
Scheduling tasks RW RW RW
Create, modify, RW
Create, modify, RW RW
blank A/AAAA
records and shared
A/AAAA records.
View and search RO RO
Assign member to RW
DNS objects
Specific Network(s)
Network Discovery
All Network Views
All Grid Members
Scheduling Task
Fixed Addresses
DHCP Range(s)
All DNS Zones
All DNS Views
All Networks
Tasks
For DHCP
Resources
Create, modify, RW RW RW
properties and
statistics
Create, modify, RW RW
and delete
networks with
assigned members
Create, modify, RW
and delete
networks without
assigned members
Create, modify, RW RW RW
DHCP objects
Note: Only superusers can modify DNS and DHCP Grid properties.
The following sections describe the types of permissions that you can set with Grid permissions:
• Administrative Permissions for Grid Members on page 237
• Administrative Permissions for Network Discovery on page 238
• Administrative Permissions for Scheduling Tasks on page 238
• Administrative Permissions for Microsoft Servers on page 239
DHCP Ranges
DNS Zones
DNS Views
Networks
Tasks
Networks Selected
Network Discovery
for Discovery
Port Control
DNS Zones
Tasks
Initiate and control a discovery on selected networks RW RW
Convert unmanaged data to a host, fixed address, reservation, A record, or PTR record RW RW
Record Groups
All DNS Views
All Networks
All Shared
Tasks
Schedule the addition, modification, and deletion of all supported object types RW RW RW RW
Convert unmanaged data to a host, fixed address, reservation, A record, or PTR record RW RW RW
To schedule tasks for specific resources, admins must have Read/Write permission to scheduling tasks, plus the
required permissions to the supported resources. For information about permissions for specific resources, see the
following:
• Grid members—See Administrative Permission for the Grid on page 237.
• DNS resources—See Administrative Permissions for DNS Resources on page 241.
• DHCP resources—See Administrative Permissions for DHCP Resources on page 253.
Note that the appliance deletes all pending scheduled tasks when superusers disable task scheduling at the Grid
level. The appliance deletes an admin’s scheduled tasks when superusers do the following:
• Set the scheduling permission of admin groups and roles to “Deny”
• Delete or disable an admin group or an admin role
• Delete or disable local admins
• Delete the scheduling permission from any admin group or admin role that contains users with pending
scheduled tasks
• Change the admin group of a limited-access admin
Resource Records
Grid Member(s)
Network Views
DHCP Ranges
Superscopes
DNS Zones
DNS Views
Networks
Tasks
Assign Microsoft server to member RW RW
Microsoft Server(s)
Resource Records
Grid Member(s)
Network Views
DHCP Ranges
Superscopes
DNS Zones
DNS Views
Networks
Tasks
View and download Microsoft logs RO
Permissions
Port Control
DNS Zones
for Object
Tasks
or PTR record
Configure device interfaces, provision networks on interfaces RW RW
• Bulk Hosts
• A records
• AAAA records
• CNAME records
• DNAME records
• MX records
• PTR records
• SRV records
• TXT records
• Hosts
• Bulk Hosts
• Shared Record Groups
• Shared A records
• Shared AAAA records
• Shared CNAME records
• Shared MX records
• Shared SRV records
• Shared TXT records
• DNS64 synthesis groups
• Adding a blank A/AAAA record
The appliance applies permissions for DNS resources hierarchically. Permissions to a DNS view apply to all zones and
resource records in that view. Permissions for a zone apply to all its subzones and resource records, and resource
record permissions apply to those resource records only. To override permissions set at higher level, you must define
permissions at a more specific level. To assign permissions, see Applying Permissions and Managing Overlaps on
page 204.
You can also define permissions for specific DNS objects and Grid member to restrict admins to perform only the
specified DNS tasks on the specified member. For more information, see Defining DNS and DHCP Permissions on Grid
Members on page 202.
The following sections describe the different types of permissions that you can set for DNS resources:
• Administrative Permissions for DNS Views on page 242
• Administrative Permissions for Zones on page 243
• Administrative Permissions for Resource Records on page 244
The following table lists the tasks admins can perform and the required permissions for DNS views.
Create, modify, and delete DNS zones, subzones, and resource records in a specific DNS view RW RW
Note: Object permissions are not applicable to Response Policy Zone rules.
• Each resource record type in a zone—For example, you can define permissions for all A records and for all PTR
records in a zone. if you do not define permissions for resource records, they inherit the permissions of the zone
in which they reside.
For information on setting permissions for zones and resource records, see Applying Permissions and Managing
Overlaps on page 204.
The following table lists the tasks admins can perform and the required permissions for zones.
Resource Records
Grid Member(s)
Create, modify, and delete zones, subzones and resource records without assigned RW
members
Create, modify, and delete all zones, subzones, and resource records in a specific view RW RW
Search for zones, subzones, and resource records in a specific DNS view RO RO
• Each shared record type in a shared record group— Permissions at this level override global permissions.
• A specific shared record—Overrides zone-level permissions.
Note the following guidelines:
• Shared record group permissions override zone permissions.
• Even if a zone is locked, superusers and limited-access users with read/write access can still edit or delete a
shared record in the zone.
For information on setting permissions for shared record groups, see Applying Permissions and Managing Overlaps
on page 204. The following table lists the tasks admins can perform and the required permissions for shared record
groups.
Create, modify, and delete shared records for a specific type in a specified shared record group RW RW
View shared records for a specific type in a specified shared record group only RO RO
Delete zones with a shared record group assigned. Before you delete a shared record group, you RW RW
You can also enable and disable permissions for DNS Resources in Networks and Ranges through Grid Manager,
as described in Enabling Permissions for DNS Resources in Networks and Ranges on page 250.
• When you switch between enabling and disabling these permissions, changes take effect immediately and a
service restart in Grid Manager is not required. However, you may need to refresh Grid Manager to view the
changes.
• You can assign these permissions when DNS, DHCP, or Microsoft Management licenses are installed. If you
remove all of these licenses after you have configured relevant permissions for supported resources, the
appliance retains the permissions, but you will not be able to see the permissions nor configure them.
Note: You cannot assign permissions for zones that are auto-created.
2. In the editor, click the Permissions tab, and select the supported permission from the Permissions drop-down
list for the admin group or role.
3. Select a resource from the drop-down list in the Resources column.
4. Save the configuration.
Permission Examples
The following table lists examples for configuring new permissions for fixed addresses (or reservations) in network
10.1.2.0/24 and range 10.1.2.1-10.1.2.10.
The following table lists some examples for configuring DNS resources that have associated IP addresses in a network
or range:
Permission for
Permission for Permission for Action
range
Action DNS zone network
10.1.2.1-10.1.2
Allowed? Comment
corp100.com 10.1.2.0/24 (Yes/No)
.10
Add, modify, or Read/write Read-only Read/write for Yes for A Admins can add,
delete an A permission for permission for “A Records in record modify, and delete A
record with IP corp100.com network 10.1.2.1- No for records because they
address 10.1.2.0/24 10.1.2.10 network have read/write
10.1.2.8, and Range permissions for the
modify or zone and range; but
delete a they cannot modify or
network delete networks
because they have
read-only permission
for network
10.1.2.0/24.
Add, modify or Yes if the host is Read/write No Yes Host address
delete a DNS host. permission for 10.1.2.22 is within the
DHCP-enabled N/A if the host is “IPv4 Hosts in 10.1.2.0 network but
host address a DHCP host. 10.1.2.0 outside of the
10.1.2.22 network” 10.1.2.1- 10.1.2.10
range, so read/write
permission for “IPv4
Hosts in 10.1.2.0
network” is sufficient.
Add, modify, or Yes if the host is Read-only Read/write for Yes for A Admins can add,
delete a DNS host. permission for “Hosts in record modify, and delete
DHCP-enabled N/A if the host is network 10.1.2.1- No for DHCP-enabled hosts
host address a DHCP host. 10.1.2.0/24 10.1.2.10 network because they have
10.1.2.8, and Range read/write
modify or permissions for
delete a “Hosts in
network 10.1.2.1010.1.2.10
range”; but they
cannot modify or
delete networks
because they have
read-only permission
for network
10.1.2.0/24.
Tasks
Create and delete network views and their associated DNS views RW RW
Create and delete a network view and its associated DNS views RW RW
Create, modify, and delete IPv4 and IPv6 networks and shared networks in all network views RW
Create, modify, and delete IPv4 and IPv6 networks and shared networks in a network view RW
View and search for all IPv4 and IPv6 networks and shared networks RO
View and search for IPv4 and IPv6 networks and shared networks in a network view RO
Expand and join IPv4 and IPv6 networks in a specific network view RW
Create, modify, and delete IPv4 and IPv6 networks, DHCP ranges and fixed addresses in a RW
View and search for IPv4 and IPv6 shared networks in a network view RO
Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks
Limited-access admin groups can access IPv4 and IPv6 networks, including shared networks, only if their
administrative permissions are defined. Permissions for a network apply to all its DHCP ranges and fixed addresses.
To override network-level permissions, you must define permissions for specific DHCP ranges and fixed addresses.
For example, you can grant an admin group read-only permission to a network, read/write permission to its DHCP
ranges, and read-only permission to its fixed addresses.
You can grant read-only or read/write permission, or deny access to networks, as follows:
• All IPv4 or IPv6 networks—Global permission that applies to all IPv4 or all IPv6 networks in the database.
• All IPv4 or IPv6 shared networks—Global permission that applies to all IPv4 or all IPv6 shared networks in the
database.
• A specific IPv4 or IPv6 network—Network permissions apply to its properties and to all DHCP ranges, fixed
addresses and hosts in the network, if they do not have permissions defined. This overrides global permissions.
• All IPv4 or IPv6 DHCP ranges in a network—If you do not define permissions for DHCP ranges, they inherit the
permissions of the network in which they reside.
• All IPv4 or IPv6 fixed addresses in a network—If you do not define permissions for fixed addresses, they inherit
the permissions of the network in which they reside.
To define permissions for a specific IPv4 or IPv6 network and its DHCP ranges and fixed addresses, see Applying
Permissions and Managing Overlaps on page 204.
The following table lists the tasks admins can perform and the required permissions for IPv4 and IPv6 networks.
Create, modify, and delete IPv4 or IPv6 networks, DHCP ranges, and fixed RW
Assign a Grid member to a specific IPv4 or IPv6 network and its DHCP ranges RW RW
View IPv4 or IPv6 network properties and statistics, and search for DHCP RO
Create, modify, and delete IPv4 or IPv6 DHCP ranges and fixed addresses in a RW
specific network
Create and split an IPv4 or IPv6 network and automatically create a reverse RW RW
DNS zone
Create, modify, and delete IPv4 or IPv6 DHCP ranges with an assigned RW RW
View and search for IPv4 or IPv6 DHCP ranges in a specific network RO
View and search for IPv4 or IPv6 fixed addresses in a specific network RO
Administrative Permissions for IPv4 or IPv6 Fixed Addresses and IPv4 Reservations
IPv4 and IPv6 fixed addresses and IPv4 reservations inherit the permissions of the networks in which they reside. You
can override network-level permissions by defining permissions for fixed addresses.
You can grant read-only or read-write permission, or deny access to fixed addresses, as follows:
• All IPv4 fixed addresses/reservations—Global permission that applies to all IPv4 fixed addresses and
reservations in the database.
• All IPv6 fixed addresses—Global permission that applies to all IPv6 fixed addresses in the database.
• All IPv4 fixed addresses/reservations in a network— Permissions at this level override global permissions. If you
do not define permissions for fixed addresses and reservations, they inherit the permissions of the network in
which they reside.
• All IPv6 fixed addresses in a network— Permissions at this level override global permissions. If you do not
define permissions for IPv6 fixed addresses, they inherit the permissions of the network in which they reside.
• A single IPv4 fixed address/reservation—Overrides global and network-level permissions.
• A single IPv6 fixed address—Overrides global and network-level permissions.
For information on setting permissions for fixed addresses, see Applying Permissions and Managing Overlaps on
page 204.
The following table lists the tasks admins can perform and the required permissions for IPv4 and IPv6 fixed
addresses.
IPv4 Reservations
IPv4 Reservation
Tasks
addresses
Create, modify, and delete IPv4 fixed addresses/reservations or IPv6 fixed RW
View and search for all IPv4 fixed addresses/reservations or IPv6 fixed addresses RO
View and search for IPv4 fixed addresses/reservations or IPv6 fixed addresses in RO RO
a network
View and search for an IPv4 fixed address/reservation or IPv6 fixed address RO
host Addresses
Tasks
Create, modify, and delete IPv4 or IPv6 DHCP enabled host addresses in a RW
specified network
Modify and delete a specific IPv4 or IPv6 DHCP enabled host address RW
View and search for all IPv4 or IPv6 DHCP enabled host addresses RO
View and search for IPv4 or IPv6 DHCP enabled host addresses in a specified RO
network
Create, modify, and delete IPv4 or IPv6 DHCP ranges with an assigned member or RW RW
a failover association
Create, modify, and delete IPv4 or IPv6 DHCP ranges in a network with assigned RW RW
members
Modify and delete an IPv4 or IPv6 DHCP range with an assigned member RW RW
View and search for all IPv4 or IPv6 DHCP ranges with an assigned member RO RO
View and search for IPv4 or IPv6 DHCP ranges in a network with assigned members RO RO
View and search for an IPv4 or IPv6 DHCP range with an assigned member RO RO
View and search for an IPv4 or IPv6 DHCP range without an assigned member RO
IPv4 Reservations
Tasks
View templates RO
Tasks
Create, modify, and delete MAC address filters RW
Create, modify, and delete MAC address entries for a MAC address filter RW
Administrative Permissions for the IPv4 and IPv6 DHCP Lease Histories
A limited-access admin group can view and export the IPv4 and IPv6 DHCP lease histories if it has read-only
permission to the IPv4 and IPv6 DHCP lease history. Permissions to the IPv4 and IPv6 DHCP lease histories are
different from the network permissions. Therefore, an admin group can access the IPv4 and IPv6 DHCP lease
histories, regardless of its network permissions. Note that only superusers can import a DHCP lease history file.
To define permissions for the IPv4 and IPv6 DHCP lease histories:
1. For an admin group: From the Administration tab, select the Administrators tab -> Permissions tab -> admin_group
in the Groups table, and then click the Add icon -> Global Permissions from the Create New Permission area or
select Add -> Global Permissions from the Toolbar.
or
For an admin role: From the Administration tab, select the Administrators tab -> Permissions tab -> admin_role in
the Roles table, and then click Add icon -> Global Permissions from the Create New Permission area or select
Add -> Global Permissions from the Toolbar.
2. Complete the following in the Manage Global Permissions dialog box:
— Permission Type: Select DHCP Permissions from the drop-down list.
— In the table, select Read/Write, Read-only, or Deny for All IPv4 DHCP Lease History and All IPv6 DHCP Lease
History.
3. Save the configuration and click Restart if it appears at the top of the screen.
Specific Directory
Properties
Tasks
View the Grid and member file distribution properties, directories, and files RO
Specific Directory
Properties
Tasks
Add MX Record
Add Networks
Add Hosts
Tasks
Add MX Record
Add Networks
Add Hosts
Tasks
All CA Certificates
Grid Member(s)
Tasks
For information about setting permissions, see Applying Permissions and Managing Overlaps on page 204. The
following table lists the admin tasks and required permissions for configuring GLBs, load balancer synchronization
groups, and their associated objects.
Table 4.29 Administration Permissions for Load Balancers and Load Balancer Synchronization Groups
File Distribution
All Named ACLs
Grid Member(s)
DNS Views
Tasks
Create, modify, and delete named ACLs for all supported operations RW RW RW RW RW
Modify configuration parameters, such as action and severity, for rules on the Grid RW
Modify configuration parameters, such as action and severity, for rules on a Grid member RW RW
Introduction to Grids
A Grid is a group of two or more NIOS appliances that share sections of a common, distributed, built-in database and
which you configure and monitor through a single, secure point of access: the Grid Master. A Grid can include Infoblox
appliances and vNIOS appliances. A vNIOS appliance is a non-Infoblox hardware platform running the vNIOS software
package. For supported vNIOS platforms, see Supported vNIOS Appliance Models and Specifications on page 1775.
Infoblox appliances support both IPv4 and IPv6 networks and you can configure a Grid in one of the following modes:
• IPv4-only: An IPv4-only Grid uses IPv4 as the Grid communication protocol and it includes an IPv4 Grid Master
and the Grid members, which can be either IPv4 or dual mode (IPv4 and IPv6) independent and HA appliances.
Note that when you add a dual mode HA member to an IPv4-only Grid, the communication protocol between the
two nodes of an HA pair must be IPv4.
• IPv6-only: An IPv6-only Grid uses IPv6 as the Grid communication protocol and it includes an IPv6 Grid Master
and the Grid members, which can be either IPv6 or dual mode (IPv4 and IPv6) independent and HA appliances.
Note that when you add a dual mode HA member to an IPv6-only Grid, the communication protocol between the
two nodes of an HA pair must be IPv6.
• IPv4 and IPv6 (Dual mode): A dual mode Grid can use either IPv4 or IPv6 as the Grid communication protocol. A
dual mode Grid includes a dual mode Grid Master and the Grid members, which can be either IPv4, IPv6, or dual
mode independent and HA appliances.
Note: Infoblox appliances support IPv4 and IPv6 networking configurations in most deployments cited in this
chapter. You can set the LAN1 port to an IPv6 address and use that address to access Grid Manager. All HA
(high availability) operations can be applied across IPv6. Topics in this and following chapters generally use
IPv4 examples. Also note that the LAN2, MGMT, and VLAN ports also support IPv6. DNS services are fully
supported in IPv6 for the LAN1, LAN2, MGMT, and VLAN ports. DHCP services are fully supported in IPv6 for
the LAN1 and LAN2 ports. Examples throughout this chapter use IPv4 addressing. Interfaces on NIOS
appliances support both IPv4 and IPv6 transports and intra-Grid communication is based on the type of IP
address used by the Grid member to join the Grid.
You can also add supported Reporting platforms as a logging and reporting devices in your Grid. Infoblox provides a
few Infoblox platforms that you can use as the logging and reporting device. For information about the supported
appliances, see Supported Platforms for Reporting on page 1391. Infoblox reporting solution supports both IPv4 and
IPv6 networks and you can configure a reporting member in either IPv4, IPv6, or in dual mode (IPv4 and IPv6) network
environment. An IPv4-only Grid uses IPv4 as the Grid communication protocol, so you can add an IPv4 or dual mode
reporting member to an IPv4-only Grid. An IPv6-only Grid uses IPv6 as the Grid communication protocol, so you can
add an IPv6 or dual mode reporting member to an IPv6-only Grid. However, a dual mode Grid can use either IPv4 or
IPv6 as the Grid communication protocol, so you can add an IPv4, IPv6, or a dual mode reporting member to a dual
mode Grid. The reporting appliance collects data from members in the Grid and stores the data in the database. It
then uses the data to generate predefined and user-defined reports that you can access through Grid Manager. These
reports provide useful information about the IPAM, DNS, DHCP, and system activities and usage in your Grid. For more
information about reporting, see Infoblox Reporting and Analytics on page 1379.
Instead of manually provisioning IP addresses and DNS name spaces for network devices and interfaces, you can add
Cloud Platform Appliances to leverage DNS and DHCP features of the Grid to manage your CMPs (Cloud Management
Platforms). For information about the Infoblox Cloud Network Automation solution and supported Grid
configurations, see Deploying Cloud Network Automation on page 361.
Figure 5.1 shows the basic concept of a Grid, database distribution (or “replication”), and reporting.
vNIOS on
VMware HA Member
Grid
The Grid Master can be either an HA master or a single master; that is, an HA (high availability) pair or a single
appliance. Similarly, a Grid member can be either a single member or an HA member. You can add single appliances
and HA pairs to a Grid, forming single members and HA members respectively. A single Grid member can be either
an Infoblox appliance or a vNIOS appliance. An HA Grid member can be a pair of Infoblox appliances or vNIOS
appliances. For information, see Supported vNIOS Appliance Models and Specifications on page 1775.
The Grid Master communicates with every Grid member in a hub-and-spoke configuration. Intra-Grid communication
is based on the type of IP address used by the Grid member to join the Grid Master. An IPv4-only Grid Master uses
IPv4 and an IPv6-only Grid Master uses IPv6 for intra-Grid communication. However, a dual mode Grid Master uses
either IPv4 or IPv6 depending on the IP address type used by the Grid member to join the Grid Master. For an HA
member, the Grid Master communicates with the active node, which in turn communicates with the passive node, as
shown in Figure 5.2.
LAN1 Port
Node 2
Passive
When adding vNIOS appliances to a Grid, you centralize the management of core network services of the virtual
appliances through the Grid Master. vNIOS appliances support most of the features of the Infoblox NIOS software,
with some limitations as described in Appendix E, "vNIOS Appliances", on page 1775.
For additional information specific to each platform, refer to the Quick Start Guide for Installing vNIOS Software on
Riverbed Services Platforms and the Quick Start Guide for Installing vNIOS Software on VMware Platforms.
By default, Grid communications use the UDP transport with a source and destination port of 1194. This port number
is configurable. For a port change to take effect, one of the following must occur: the HA master fails over, the single
master reboots, or the Grid restarts services.
After adding an appliance or HA pair to a Grid, you no longer access the Infoblox GUI on that appliance. Instead, you
access the GUI running on the Grid Master. Although you can create multiple administrator accounts to manage
different services on various Grid members, all administrative access is through the Grid Master. So even if someone
has administrative privileges to a single Grid member, that administrator must access the GUI running on the Grid
Master to manage that member.
You can access the Infoblox GUI through an HTTPS connection to one of the following IP addresses and ports on the
Grid Master:
• The VIP address, which links to the HA port on the active node of an HA Grid Master
• The IP address of the LAN1 port on a single Grid Master
• The IP address of the MGMT port (if enabled) of the active node of an HA or single Grid Master. See Using the
MGMT Port on page 461.
Grid Communications
The Grid Master synchronizes data among all Grid members through encrypted VPN tunnels. The default source and
destination UDP port number for VPN tunnels is 1194. You can continue using the default port number or change it.
For example, if you have multiple Grids, you might want each Grid to use a different port so that you can set different
firewall rules for each. Whatever port number you choose to use for the VPN tunnels in a Grid, all the tunnels in that
Grid use that single port number.
Before an appliance or HA pair forms a tunnel with the master, they first authenticate each other using the
Challenge-Response Authentication Mechanism (CRAM). The source and destination port number for this traffic is
2114. During the CRAM handshake, the master tells the appliance or HA pair what port number to use when building
the subsequent VPN tunnel.
HA Member
VIP 10.1.1.11
(on Active Node) LAN1 10.1.1.18
(on Active Node of
Encrypted HA Member)
VPN Tunnels
Node 1 (Active)
HA 10.1.1.13
Node 2 (Passive)
HA 10.1.1.15 VIP 10.1.1.22
(on Active Node)
HA 10.1.1.19
LAN1 10.1.1.20
(on Passive Node
of HA Member)
Another type of traffic, which flows outside the tunnels, is the VRRP (Virtual Router Redundancy Protocol)
advertisements that pass between the active and passive nodes in an HA pair. The VRRP advertisements act like
heartbeats that convey the status of each node in an HA pair. If the active node fails, the passive node becomes
active. The VIP (virtual IP) address for that pair then shifts from the previously active node to the currently active node.
NAT Groups
Note: Infoblox NAT and NAT groups do not support NAT IPv6 operation.
NAT groups are necessary if the Grid Master is behind a NAT appliance and there are members on both sides of that
NAT appliance. Any members on the same side as the master go into the same NAT group as the master and use their
interface addresses for Grid communications with each other. Grid members on the other side of that NAT appliance
do not go in the same NAT group as the master and use the master's NAT address for Grid communications. These
other members outside the NAT appliance can—but do not always need to be—in a different NAT group. To see when
NAT groups become necessary for Grid communications, compare Figure 5.4 below with Figure 5.5 and Figure 5.6 on
page 277.
Member 2
Member 1
Interface 192.168.2.20
(Grid Master)
NAT ––––
Interface 192.168.1.10
NAT 10.1.1.10
Network Member 3
(Master Candidate)
Interface 192.168.1.30
Grid NAT 10.3.3.30
Note: A single or HA member using its MGMT port for Grid communications cannot be separated from the Grid Master
behind a NAT appliance. For more information, see Using the MGMT Port on page 461.
Member 6 Network
Member 3
Interface 192.168.1.60 (Master Candidate)
NAT 10.1.1.60
Interface 192.168.1.30
NAT 10.3.3.30
Grid
The master (Member 1) uses its interface address Member 4
(192.168.1.10) for Grid communications with Member 6 Interface 192.168.3.40
and its NAT address (10.1.1.10) when communicating with NAT 10.4.4.40
the other Grid members. Member 6 uses its interface
address (192.168.1.60) when communicating with the
Member 5
master. If Member 3 (a Master Candidate) ever became
the Grid Master, then both Members 1 and 6 would use Interface 192.168.3.50
their NAT addresses when communicating with it. NAT 10.4.4.50
The same use of NAT groups that applies to a Grid Master also applies to Master Candidates. If there are no other
members behind the same NAT appliance as a Master Candidate, then the Master Candidate does not need to be in
a NAT group. It always uses its NAT address for Grid communications. If another member is behind the same NAT
appliance as the Master Candidate, then both the candidate and that member need to be in the same NAT group so
that—if the candidate becomes master—they can use their interface addresses to communicate with each other (see
Figure 5.6 ).
Member 6 Network
Member 3
Interface 192.168.1.60
(Master Candidate)
NAT 10.1.1.60
Interface 192.168.1.30
NAT 10.3.3.30
Grid NAT Group 2
Member 4
Members 3 and 4 are Master Candidates. Because
Member 3 is alone behind a NAT appliance, it does not (Master Candidate)
need to be in a NAT group. It always uses its NAT Interface 192.168.3.40
address for Grid communications. However, Member 4 NAT 10.4.4.40
is behind the same NAT appliance as Member 5, so they
are put in the same NAT group. If Member 4 ever Member 5
became the Grid Master, it would use its interface Interface 192.168.3.50
address to communicate with Member 5 and its NAT NAT 10.4.4.50
address to communicate with all other members.
Although some members might not need to be in a NAT group, it is good practice to put all members in NAT groups in
anticipation of adding or rearranging Grid members within the network. For example, in Figure 5.4 – Figure 5.6,
Member 4 did not need to be in a NAT group until it became configured as a Master Candidate in Figure 5.6 . At that
point, because Member 5 is also behind the same NAT appliance, it became necessary to create NAT Group 2 and add
Members 4 and 5 to it. Similarly, if you add another member behind the NAT appliance in front of Member 3, then you
must create a new NAT group and add Member 3 and the new member to it. Always using NAT groups can simplify
such changes to the Grid and ensure that NAT appliances never interrupt Grid communications.
To create a NAT group:
1. From the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and select Grid Properties -> Edit.
3. In the Grid Properties editor, select the NAT Groups tab.
4. Click the Add icon, and enter a name in the Name field and optionally, a comment in the Comment field.
5. Save the configuration and click Restart if it appears at the top of the screen.
To add members to the NAT group:
1. From the Grid tab, select the Grid Manager tab -> Members tab.
2. Select a Grid member and click the Edit icon.
3. In the Grid Member Properties editor, select the Network -> Advanced tab and complete the following:
— Enable NAT Compatibility (IPv4 only): Select this check box. NAT group is not supported by IPv6 appliances.
— NAT Group: From the drop-down list, select the NAT group you previously created.
— NAT Addresses: For a single Grid Master or member, enter the address configured on the NAT appliance that
maps to the interface address of the LAN1 port. A single master or member that serves DNS uses this NAT
address for Grid communications and—if it serves DNS—DNS messages.
For an HA Grid Master or member, enter the address configured on the NAT appliance that maps to its VIP
address. An HA master uses its VIP NAT address when communicating with Grid members. An HA member
that serves DNS uses its VIP NAT address for its DNS messages. It uses its LAN1 port NAT address for Grid
communications.
— Node 1 (if HA)
• NAT IP Address: Enter the address configured on the NAT appliance that maps to the interface
address of the LAN1 port on Node 1. When Node 1 of an HA member is active, it uses its NAT
address for Grid communications.
— Node 2 (if HA)
• NAT IP Address: Enter the address configured on the NAT appliance that maps to the interface
address of the LAN1 port on Node 2. When Node 2 of an HA member is active, it uses its NAT
address for Grid communications.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: The Grid Master checks the software version every time an appliance or HA pair joins the Grid. The
software version check occurs during the initial join operation and when a member goes offline and then
rejoins the Grid.
Grid Master
Grid
(NIOS 5.0r1)
NIOS 5.0r1
Software
Download
When an appliance with a different After the appliance downloads the NIOS
version of NIOS attempts to join the software from the Grid Master, the appliance
Grid, the appliance downloads from reboots and reestablishes a tunnel with the
the Grid Master the software that the Grid Master. Then—assuming everything
rest of the Grid is using. else is in order—the appliance successfully
joins the Grid.
Appliance Joining the Grid
(NIOS 4.3r6-3 -> NIOS 5.0r1)
When a single appliance attempts to join the Grid for the first time, the following series of events takes place:
1. The appliance establishes an encrypted VPN tunnel with the Grid Master.
2. The master detects that the software version on the appliance is different from that in the rest of the Grid. For
example, the appliance is running NIOS 4.3r6-3 software but the rest of the Grid is running NIOS 5.0r1 software.
3. The appliance downloads the NIOS 5.0r1 software from the Grid Master.
4. After the upgrade is complete, the NIOS application automatically restarts.
5. After the appliance reboots, it again contacts the Grid Master and step 1 is repeated. Because the software
versions now match, the appliance can complete its attempt to join the Grid.
When an HA pair attempts to join the Grid for the first time, the following series of events takes place:
1. The active node of the HA pair establishes an encrypted VPN tunnel with the Grid Master.
2. The master detects that the software version on the node is different from that in the rest of the Grid. For example,
the active node is running NIOS 4.3r6-3 software but the rest of the Grid is running NIOS 5.0r1 software.
3. The appliance downloads the NIOS 5.0r1 software from the Grid Master.
4. After the upgrade is complete, the NIOS application on the active node automatically restarts. This causes an HA
failover.
5. The new active node (which was previously the passive node) attempts to join the Grid, repeating steps 1 – 4.
6. When the NIOS application on the currently active node restarts, there is another failover, and the currently
passive node becomes active again.
7. The active node again contacts the Grid Master and step 1 is repeated. Because the software versions now
match, it can complete its attempt to join the Grid.
Note: A Grid Master replicates data to single members and to the active node of HA members. The active node then
replicates the data to the passive node in the HA pair.
At a minimum, there must be 256 Kbps (kilobits per second) bandwidth between the Grid Master and each member,
with a maximum round-trip delay of 500 milliseconds. For ongoing database updates, the amount of data sent or
received is 15 Kb for every DDNS update, and 10 Kb for every DHCP lease -offer/renew. The baseline amount for
heartbeat and other maintenance traffic for each member is 2 Kbps. Measure the peak DNS and DHCP traffic you see
in your network to determine the bandwidth needed between the Grid Master and its members for this activity.
For example, you might decide to place your Grid members in the locations shown in Figure 5.6 on page 277.
East
Data Center Data Center Site
West East
East
West Site Site
Large Branch
West Site Central East Site
In this example, the Grid Master is optimally placed in the Data Center West. There are a total of seven members: the
HA Grid Master, three HA members, and three single members. If all the members are Master Candidates, the Grid
Master replicates all changes to the other six members. Assuming that the master receives 20 dynamic updates per
minute and 40 DHCP lease renews per minute, the calculation for Grid bandwidth is:
Another component is the upgrade process. See Upgrading NIOS Software on page 527 for more information.
Bandwidth requirements, database size, and update rate determine the maximum size of the Grid you can deploy.
Based on the various factors discussed above, you can determine the amount of bandwidth your Grid needs. If your
calculations exceed the available bandwidth, then you might need to modify your deployment strategy, perhaps by
splitting one large Grid into two or more smaller ones.
Note: This calculation does not take into account existing traffic other than DNS and DHCP services, so factor and
adjust accordingly.
For international networks, because of bandwidth and delay requirements, a geographical grouping of Grid members
might be the best approach. For example, if you have a global presence, it may make the most sense to have a North
American Grid, a South American Grid, a European Grid, and an Asia/Pacific Grid.
About HA Pairs
You can configure two appliances as an HA (high availability) pair to provide hardware redundancy for core network
services and Infoblox External DNS Security. For information about Infoblox External DNS Security, see Infoblox
External DNS Security on page 1561. An HA pair can be a Grid Master, a Grid Master candidate, a Grid member, or an
independent appliance. The two nodes that form an HA pair—identified as Node 1 and Node 2—are in an
active/passive configuration. The active node receives, processes, and responds to all service requests. The passive
node constantly keeps its database synchronized with that of the active node, so it can take over services if a failover
occurs. A failover is the reversal of the active/passive roles of each node; that is, when a failover occurs, the
previously active node becomes passive and the previously passive node becomes active. You can configure an HA
pair in either IPv4, IPv6, or in dual mode. An IPv4 HA pair uses IPv4 as the communication protocol between the two
nodes and an IPv6 HA pair uses IPv6 as the communication protocol between the two nodes. But in a dual mode HA
pair, you can select either IPv4 or IPv6 as the communication protocol between the two nodes. Note that when you
add a dual mode HA member to a Grid, the communication protocol between the two nodes of an HA pair must the
same as the Grid communication protocol.
Note: HA Grid Master and HA Grid Master candidate configurations are not supported when Threat Protection
licenses are installed on the appliance.
When you configure an HA pair using the IB-4030 (Rev-1 or Rev-2) appliance for DNS cache acceleration, the passive
node does not operate with a pre-loaded cache or hot cache during a failover; it builds up the DNS cache over time.
For more information about HA and other limitations for the IB-4030 appliances, refer to the Infoblox DNS Cache
Acceleration Application Guide.
For Infoblox External DNS Security, only the active node in an HA pair handles DNS traffic. The passive node is in a
standby mode ready to take over if a failover occurs.
The appliance uses the following components in the HA functionality:
• bloxSYNC: An Infoblox proprietary mechanism for secure, real-time synchronization of the database that
maintains the data, system configuration, and protocol service configuration between the two nodes. With
bloxSYNC, the nodes continuously synchronize changes of their configurations and states. When a failover
occurs, the passive node can quickly take over services. For information, see About HA Failover on page 284.
• VRRP (Virtual Router Redundancy Protocol): An industry-standard, MAC-level HA failover mechanism. VRRP
utilizes the concept of an active and passive node that share a single VIP (virtual IP) address. When the active
node that owns the VIP becomes unavailable, the passive node takes over the VIP and provides network core
services. For information about VRRP, refer to RFC3768, Virtual Router Redundancy Protocol (VRRP) and VRRP
Advertisements on page 285.
Using bloxSYNC and VRRP combined, if the active node fails or is taken offline for maintenance purposes, the passive
node assumes the VIP and continues to respond to requests and services with minimal interruption. You can deploy
an HA pair as a Grid Master, a Grid member, or an independent HA. To deploy an independent HA pair, see Deploying
an Independent HA Pair on page 346. To deploy an HA Grid Master, see Creating a Grid Master on page 287.
Tip: Infoblox uses VRRP advertisements for the active and passive HA design. Therefore, all HA pairs must be located
in the same location connected to the highly available switching infrastructure. Any other deployment is not
supported without a written agreement with Infoblox. Contact Infoblox Technical Support for more information
about other deployment support.
Note: You can enable ARP on the passive node of an HA pair and monitor its status externally. To enable ARP on the
passive node of an HA pair, see Enabling ARP on the Passive Node of an HA Pair on page 285.
As illustrated in Figure 5.9 on page 283, the VIP and virtual MAC addresses link to the HA port on each node. Select
five IP addresses on the same network before you configure an HA pair, as follows:
• VIP: For core network services and for management purposes when the MGMT port is disabled. Both nodes
share the same VIP.
• Node 1 HA (active): Source IP for the VIP and VRRP advertisements
• Node 1 LAN1 (active): For management through SSHv2 and listens for VRRP advertisements from the HA port
• Node 2 HA (passive): Listens for VRRP advertisements
• Node 2 LAN1 (passive): Source IP for SSL VPN to the VIP of the active node and receives bloxSYNC from the VIP
Node 1
Switch 1 Active
HA: 10.1.1.11/24
LAN1: 10.1.1.12/24
HA: 10.1.1.13/24
LAN1: 10.1.1.14/24
Switch 2 Node 2
Passive
About HA Failover
The appliance supports HA through bloxHA™, which provides a robust failover mechanism. As described in Planning
for an HA Pair on page 283, both nodes in an HA pair share a single VIP address and a virtual MAC address. The node
that is currently active is the one whose HA port owns the VIP address and virtual MAC address. When a failover
occurs, these addresses shift from the HA port of the previous active node to the HA port of the new active node, as
illustrated in Figure 5.10.
Figure 5.10 VIP Address and Virtual MAC Address and HA Failover
.
Infoblox HA Pair
bloxSYNC
Node 1 Node 2
Active Passive
Encrypted VPN Tunnel
HA Port HA Port
VIP
The clients always make service requests and The HA ports on each node of an HA pair
to—and receive replies from—the VIP Virtual MAC share the VIP address and virtual MAC
and virtual MAC address. Address address. Because Node 1 is currently
active, it owns these addresses.
Network Clients
After an HA Failover …
Node 1 Node 2
Passive Active
HA Port HA Port
VIP
The clients still make service requests and After an HA failover occurs, Node 2
to—and receive replies from—the Virtual MAC becomes the active node. Because Node 2
same VIP and virtual MAC address. Address is now active, it now owns the VIP address
and virtual MAC address.
Network Clients
WARNING: Enabling ARP on the passive node of an HA interface might affect VRRP on the local network
and could cause the firewall to send false alerts.
4. Save the configuration and click Restart if it appears at the top of the screen.
VRRP Advertisements
VRRP advertisements are periodic announcements of the availability of the HA node linked to the VIP. The two nodes
in an HA pair include a VRID (virtual router ID) in all VRRP advertisements and use it to recognize VRRP advertisements
intended for themselves. Only another appliance on the same subnet configured to use the same VRID responds to
the announcements. The active node in an HA pair sends advertisements as multicast datagrams every second. It
sends them from its HA port using the source IP address of the HA port (not from the VIP address) and the source MAC
address 00:00:5e:00:01:vrrp_id . The last two hexadecimal numbers in the source MAC address indicate the VRID
number for this HA pair. For example, if the VRID number is 143, then the source MAC address is 00:00:5e:00:01:8f
(8f in hexadecimal notation = 143 in decimal notation).
The destination MAC and IP addresses for all VRRP advertisements are 01:00:5e:00:00:12 and 224.0.0.18. Because
a VRRP advertisement is a multicast datagram that can only be sent within the immediate logical broadcast domain,
the nodes in an HA pair must be in the same subnet together.
As illustrated in Figure 5.11, when you configure an HA pair, only the appliance configured to listen for VRRP
advertisements with the same VRID number processes the datagrams, while all other appliances ignore them. The
passive node in an Infoblox HA pair listens for these on its HA port and the active node listens on its LAN1 or LAN1
(VLAN) port. If the passive node does not receive three consecutive advertisements or if it receives an advertisement
with the priority set to 0 (which occurs when you manually perform a forced failover or request the active node to
restart, reboot, or shut down), it changes to the active state and assumes ownership of the VIP address and virtual
MAC address.
If both nodes go offline, the one that comes online first becomes the active node. If they come online simultaneously,
or if they enter a dual-active state—that is, a condition arises in which both appliances assume an active role and
send VRRP advertisements, possibly because of network issues—then the appliance with the numerically higher
VRRP priority becomes the active node. The priority is based on system status and events.
If both nodes have the same priority, then the appliance whose HA port has a numerically higher IP address becomes
the active node. For example, if the IP address of the HA port on Node 1 is 10.1.1.80 and the IP address of the HA port
on Node 2 is 10.1.1.20, then Node 1 becomes the active node.
For more information about VRRP, see RFC 3768, Virtual Router Redundancy Protocol (VRRP).
VRRP
Advertisements
After you finish configuring Node 2
to join the HA pair, it initiates a
connection with Node 1. The two
appliances establish a VPN tunnel
between themselves, using the HA
Node 1
connection name and shared
(Active)
secret to authenticate each other.
Switch Node 2 downloads the database
from Node 1 and learns its VRID.
Node 2 then begins listening for
MATCH! VRRP advertisements on its HA
port. When it receives an
advertisement from Node 1, Node
Node 2 2 recognizes it and becomes the
(Passive) passive node.
Subnet
Note: For a dual mode (IPv4 and IPv6) HA Master or HA member, you can set either IPv4 or IPv6 for VRRP
advertisements.
Switch
2 Connect Node 1 to the switch, log in to its 4 Connect Node 2 to the switch, log in to its
default IP address (192.168.1.2), check default IP address (192.168.1.2), check
that a Grid license is installed, and that a Grid license is installed, and
configure the following: configure the following:
• VIP address, netmask, gateway • VIP address (for Node 1)
• Hostname • LAN1 address, netmask, gateway
• HA and LAN1 addresses of Node 1 • Hostname
• HA and LAN1 addresses of Node 2 • Grid name
• VRID (virtual router ID) • Shared secret
• NTP settings
• Grid name
Note: Because you do not set the VRID for
• Shared secret Node 2, it cannot listen for VRRP
advertisements yet. It learns its VRID
after it joins the Grid and downloads the
database from Node 1. Then, when
Node 2 receives an advertisement
3 After you configure Node 1, it listens for three containing its VRID from Node 1, it
seconds for VRRP advertisements containing assumes the passive role in the HA pair.
its VRID number. When it does not receive
any, it assumes the active role in the HA pair 5 After you configure Node 2, it contacts
and starts sending advertisements. the VIP address on Node 1 and initiates
a mutual authentication of the nodes
using the shared secret. The nodes then
Note: For more information about VRRP advertisements, construct an encrypted VPN tunnel to
see VRRP Advertisements on page 285. secure Grid communications.
After the two nodes form an HA pair, Node 2 initiates a key exchange and creates an encrypted VPN tunnel with
Node 1. The two nodes communicate between the VIP interface linked to the HA port on Node 1 and the LAN1 port
on Node 2. The initialization of VPN communications between the two nodes is shown in Figure 5.13 on page 288.
Node 1 Node 2
VPN
Tunnel 1194 – default VPN port
number (configurable)
The passive node establishes an encrypted
VPN tunnel with the active node.
Tunnel Established
After the nodes establish a VPN tunnel between themselves, Node 1 sends Node 2 its entire database (its
configuration settings and service data). Because the configuration contains the VRID (virtual router ID) for the HA
pair, Node 2 starts listening for VRRP advertisements containing that VRID number. Because Node 1 is already
sending such advertisements, Node 2 receives one and assumes the passive role in the HA pair.
After the initial transmission of its database, Node 1 continues to send Node 2 real-time database updates through
the VPN tunnel.
Node 1 maintains the synchronization of the database throughout the Grid—which, at this point, has no other
members—sends VRRP advertisements indicating its physical and network health, and—if configured to do so—
provides network services. Node 2 maintains a state of readiness to assume mastership in the event of a failover. You
can see the flow of HA- and Grid-related traffic from ports on the active node to ports on the passive node in
Figure 5.14. This illustration also shows the ports that you can use for management traffic and network service.
To Network
HA Master
Active Passive
VIP is a logical Note: If you enable the
interface linking MGMT port, you can only
to the HA port on make an HTTPS connection
the active node to the IP address of the active
of the HA pair. node. If you try to connect to
Node 1 Switch Node 2 the IP address of the passive
VIP node, the appliance redirects
VPN Tunnel your browser to the IP
address of the active node.
HA HA SSHv2, however, behaves
differently from HTTPS. If
VRRP you enable the MGMT port
Advertisements and define its network
LAN1 LAN1 settings for both nodes in the
HA pair, you can make an
SSHv2 / CLI SSHv2 / CLI SSHv2 connection to the IP
addresses of the LAN1 and
Management MGMT ports on both the
HTTPS / GUI System active and passive nodes.
From the management system, you can manage the active node of the HA master by making an HTTPS connection to
the VIP interface and using the GUI, and by making an SSHv2 connection to the LAN1 port (and MGMT port, if enabled)
and using the CLI. If you enable the MGMT port on an HA pair, you can make an HTTPS connection through the MGMT
port on the active node, and you can make an SSHv2 connection through the LAN1 or MGMT port on the active and
passive nodes.
Note: For information about enabling and using the MGMT port, the Infoblox GUI, and SSH, see Using the MGMT Port
on page 461, Logging in to the GUI on page 58, and Enabling Remote Console Access on page 439.
Note: You must disable DHCP Snooping to successfully run DHCP services on the Grid. For more information about
DHCP services, see About Infoblox DHCP Services on page 1050.
Note: By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type
(full or half duplex) on the physical links between its LAN1 or LAN1 (VLAN), HA, and MGMT ports and the
Ethernet ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal settings, see
Modifying Ethernet Port Settings on page 456 for steps you can take to resolve the problem.
Note: The Ethernet ports on the TE-810, TE-820, TE-1410, TE-1420, TE-2210, TE-2220, and IB-4010 appliances
are autosensing, so you can use either a straight-through or cross-over Ethernet cable for these
connections.
3. Use the LCD on one appliance or make a console connection to it, and configure the network settings of its LAN1
port so that it is on the local subnet and you can reach it on the network. LCD supports only IPv4 addressing and
not IPv6 addressing. You can configure IPv6 address for the appliance through CLI or GUI. IPv4 addressing is
supported on the LCD; ensure that you have the correct network address values before configuration of the
appliance.
Note: For details about using the LCD and console, refer to the installation guide that shipped with your product.
4. Similarly, configure the LAN1 port on the other appliance so that it is in the same subnet as the first appliance.
5. Connect your management system to the network so that it can reach the IP addresses of the LAN1 ports on both
appliances.
HA Master – Node 1
1. On your management system, open a browser window, and connect to https://ip_addr, where ip_addr is the
address of the LAN1 port on Node 1. IPv4 and IPv6 values are valid, based on the LAN1 port configuration.
2. Log in using the default user name and password admin and infoblox. For detailed information about logging in
to the GUI, see Logging in to the GUI on page 58.
3. Review the End-User License Agreement. If you want to participate in the Infoblox Customer Experience
Improvement Program, complete the following:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
Click I Accept. The Grid Setup wizard appears.
4. On the first screen, select Configure a Grid Master and click Next.
5. On the next screen, specify the Grid properties and click Next:
— Grid Name: Enter a text string that the two appliances use to authenticate each other when establishing a
VPN tunnel between them. The default Grid name is Infoblox.
— Shared Secret: Enter a text string that both appliances use as a shared secret to authenticate each other
when establishing a VPN tunnel between them. The default shared secret is test.
— Confirm Shared Secret: Enter the shared secret again.
— Hostname: Enter a valid domain name for the appliance.
— Type of Network Connectivity: Select the type of network connectivity from the drop-down list:
— IPv4 and IPv6: Select this to configure a dual mode HA Master.
— IPv4: Select this to configure an IPv4 HA Master.
— IPv6: Select this to configure an IPv6 HA Master.
— Is the Grid Master an HA pair?: Select Yes.
— Send HA and Grid Communication over: This field is displayed only when you are configuring a dual
mode HA pair. Select either IPv4 or IPv6 as the communication protocol for VRRP advertisements.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to a different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining the
Grid Master after the restore.
6. On the next screen, specify the network properties and click Next:
— Virtual Router ID: Enter the VRID (virtual router ID). This must be a unique VRID number—from 1 to 255—for
this subnet.
Ports and Addresses: This table lists the network interfaces based on the type of network connectivity of
the HA Master.
For IPv4 HA Master, specify the network information for VIP (IPv4), Node1 HA (IPv4), Node2 HA (IPv4),
Node1 LAN1 (IPv4), and Node2 LAN1 (IPv4) interfaces.
For IPv6 HA Master, specify the network information for VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1
(IPv6) interfaces.
For a dual mode HA Master, if you select IPv4 in the Send HA and Grid Communication over field, specify the
network information for the following interfaces: VIP (IPv4), Node1 HA (IPv4), Node1 LAN1 (IPv4), Node2 HA
(IPv4), Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA Master, if you select IPv6 in the Send HA and Grid Communication over field, specify the
network information for the following interfaces: VIP (IPv4), Node1 LAN1 (IPv4), Node2 LAN1 (IPv4), VIP
(IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
Enter correct information for the following by clicking the field:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IPv4 or IPv6 address depending on the type of interface.
— Subnet Mask (IPv4) or Prefix Length (IPv6): Specify an appropriate subnet mask for IPv4 address or
prefix length for IPv6 address. The prefix length ranges from 2 to 127.
— Gateway: Type the IPv4 or IPv6 address of the default gateway depending on the type of interface. For
IPv6 interface, you can also type Automatic to enable the appliance to acquire the IPv6 address of the
default gateway and the link MTU from router advertisements.
Note: You can now define a link-local address as the default IPv6 gateway and isolate the LAN segment so the
local router can provide global addressing and access to the network and Internet. This is supported for
both LAN1 and LAN2 interfaces as well as LAN1 and LAN2 in the failover mode.
— VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure that you
configure the corresponding switch accordingly.
— Port Settings: From the drop-down list, choose the connection speed that you want the port to use. You
can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or Half
for data transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to
negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch
automatically. This is the default setting. You cannot configure port settings for vNIOS appliances.
7. Optionally, enter a new password and click Next. The password must be a single string (no spaces) that is at least
four characters long.
8. Select the time zone of the Grid Master and indicate whether the Grid Master synchronizes its time with an NTP
(Network Time Protocol) server.
— If you choose to enable NTP, click the Add icon and enter the IP address of an NTP server. Entries may be an
IPv4 or IPv6 address. You can enter IP addresses for multiple NTP servers.
— If you choose to disable NTP, set the date and time for the appliance.
— Click Next.
9. If you want to participate in the Infoblox Customer Experience Improvement Program, complete the following and
then click Next:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Email: Enter an email address to which Infoblox sends a copy of the usage report. The email address you
enter here is also displayed in the Customer Improvement tab in the Grid Properties editor. This is optional.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
10. The last screen displays the settings you specified in the previous panels of the wizard. Verify that the
information is correct and click Finish. The application restarts after you click Finish.
Note: The Grid Setup wizard provides options such as not changing the default password and manually entering
the time and date. However, changing the password and using an NTP server improve security and
accuracy (respectively), and so these choices are presented here.
Record and retain this information in a safe place. If you forget the shared secret, you need to contact
Infoblox Technical Support for help. When you add an appliance to the Grid, you must configure it with the
same Grid name, shared secret, and VPN port number that you configure on the Grid Master.
HA Master – Node 2
1. On your management system, open a new browser window, and connect to https://ip_addr, where ip_addr is the
address of the LAN1 port on Node 2. IPv4 or IPv6 values are valid.
When you enter an IPv6 address, enclose the address in square brackets (as in https://[ip_addr] or
https://[2001:db8::256:ABCD:EF12:34:1].
2. Log in using the default user name and password admin and infoblox.
3. Review the End-User License Agreement. If you want to participate in the Infoblox Customer Experience
Improvement Program, complete the following:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
Click I Accept. The Grid Setup wizard appears.
4. On the first screen, select Join Existing Grid and click Next.
5. On the next screen, specify the Grid properties and click Next
— Grid Name: Enter a text string that the two appliances use to authenticate each other when establishing a
VPN tunnel between them. This must match the Grid name you entered for node 1.
— Grid Master’s IP Address: Enter the same VIP you entered for node 1.
— Shared Secret: Enter a text string that both appliances use as a shared secret to authenticate each other
when establishing a VPN tunnel between them. This must match your entry in node 1.
6. On the next screen verify the IP address settings of the member and click Next.
The last screen displays the settings you specified in the previous panels of the wizard.
7. Verify that the information is correct and click Finish.
The setup of the HA master is complete. From now on, when you make an HTTPS connection to the HA pair, use
the VIP address.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA Master is the same protocol as the
one used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication over field
in step 2 of the Grid Setup wizard, then IPv4 is set as the communication protocol for all the services. However, you
can override the communication protocol for all the services in a dual mode HA Master. For information, see Changing
the Communication Protocol for a Dual Mode Appliance on page 302.
Note: The Ethernet ports on the TE-810, TE-820, TE-1410, TE-1420, TE-2210, TE-2220, and IB-4010 appliances
are autosensing, so you can use either a straight-through or cross-over Ethernet cable for these
connections.
3. If you have not changed the default IP address (192.168.1.2/24) of the LAN1 port through the LCD or CLI—and
the subnet to which you connect the appliance does not happen to be 192.168.1.0/24—put your management
system in the 192.168.1.0/24 subnet and connect an Ethernet cable between your management system and the
NIOS appliance.
4. Open a web browser and make an HTTPS connection to the IP address of the LAN1 port. To reach the default IP
address, enter: https://192.168.1.2 .
Several certificate warnings appear during the login process. This is normal because the preloaded certificate is
self-signed (and, therefore, is not in the trusted certificate stores in your browser) and has the hostname
www.infoblox.com, which does not match the destination IP address you entered in step 3. To stop the warning
messages from occurring each time you log in to the GUI, you can generate a new self-signed certificate or
import a third-party certificate with a common name that matches the FQDN (fully qualified domain name) of the
appliance. For information about certificates, see Managing Certificates on page 63.
5. Log in using the default user name admin and password infoblox.
6. Review the End-User License Agreement. If you want to participate in the Infoblox Customer Experience
Improvement Program, complete the following:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
Click I Accept. The Grid Setup wizard appears.
7. On the first screen, select Configure a Grid Master and click Next.
8. On the next screen, specify the Grid properties and click Next:
— Grid Name: Enter a text string that the Grid Master and appliances joining the Grid use to authenticate each
other when establishing a VPN tunnel between them. The default Grid name is Infoblox.
— Shared Secret: Enter a text string that the Grid Master and appliances joining the Grid use as a shared
secret to authenticate each other when establishing a VPN tunnel between them. The default shared secret
is test.
— Confirm Shared Secret: Enter the shared secret again.
— Hostname: Enter a valid domain name for the appliance.
— Type of Network Connectivity: Select the type of network connectivity for the Grid Master from the
drop-down list:
— IPv4 and IPv6: Select this to configure a dual mode Grid Master.
— IPv4: Select this to configure an IPv4-only Grid Master.
— IPv6: Select this to configure an IPv6-only Grid Master.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to a different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining the
Grid Master after the restore.
Note: You can now define a link-local address as the default IPv6 gateway and isolate the LAN segment so the
local router can provide global addressing and access to the network and Internet. This is supported for
both LAN1 and LAN2 interfaces as well as LAN1 and LAN2 in the failover mode.
— VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure that you
configure the corresponding switch accordingly.
— Port Settings: From the drop-down list, choose the connection speed that you want the port to use. You
can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or Half
for data transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to
negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch
automatically. This is the default setting. You cannot configure port settings for vNIOS appliances.
10. Optionally, enter a new password and click Next. The password must be a single hexadecimal string (no spaces)
that is at least four characters long.
11. Select the time zone of the Grid Master and indicate whether the Grid Master synchronizes its time with an NTP
(Network Time Protocol) server, and then click Next.
— If you choose to enable NTP, click the Add icon and enter the IP address of an NTP server. Entries may be an
IPv4 or IPv6 address. You can enter IP addresses for multiple NTP servers.
— If you choose to disable NTP, set the date and time for the appliance.
12. If you want to participate in the Infoblox Customer Experience Improvement Program, complete the following and
then click Next:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Email: Enter an email address to which Infoblox sends a copy of the usage report. The email address you
enter here is also displayed in the Customer Improvement tab in the Grid Properties editor. This is optional.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
13. The last screen displays the settings you specified in the previous panels of the wizard. Verify that the
information is correct and click Finish. The application restarts after you click Finish.
Note: The Grid Setup wizard provides options such as not changing the default password and manually entering
the time and date. However, changing the password and using an NTP server improve security and
accuracy (respectively), and so these choices are presented here.
Record and retain this information in a safe place. If you forget the shared secret, you need to contact
Infoblox Technical Support for help. When you add an appliance to the Grid, you must configure it with the
same Grid name, shared secret, and VPN port number that you configure on the Grid Master.
The last screen of the setup wizard states that the changed settings require the appliance to restart. When you
click Finish, the appliance restarts.
The setup of the single master is complete. From now on, when you make an HTTPS connection to the appliance, use
its new IP address.
In a dual mode Grid Master, the communication protocol for all the services is set to IPv4, by default. You can change
the default communication protocol for the services. For information, see Changing the Communication Protocol for
a Dual Mode Appliance on page 302.
Note: You may provision a Port Reservation for the new Grid Member. When doing so, you select the device to which
you expect the new Grid Member to connect; In the context of a Grid member, this device type is usually an
Ethernet Switch or Switch-Router. The Add Grid Member Wizard provides a step in which you define the port
reservation settings, as described in the following section Adding a Single Member. The process also can be
applied when defining an HA pair, as described in the sections Creating an HA Grid Master and Adding an HA
Member.
You can add single appliances and HA pairs to a Grid, forming single members and HA members respectively. A single
Grid member can be either an Infoblox appliance or a vNIOS appliance. You can configure Grid members in either
IPv4, IPv6, or dual mode (IPv4 and IPv6). For information about which vNIOS appliance supports configuration as an
HA Grid member, see Supported vNIOS Appliance Models and Specifications on page 1775.
You can also define an HA member on the Grid Master and then add two individual NIOS appliances to the Grid as
Node 1 and Node 2 to complete the HA member you defined on the master.
New members inherit all settings that you create at the Grid level unless you override them at the member level. You
can also define port reservations for the network infrastructure devices to which the Grid members will connect.
The process for adding either a single appliance or HA pair to a Grid involves the following steps:
1. Adding and configuring Grid members on the Grid Master. In addition to defining the network and appliance
settings for a member, you can also configure service settings before you join the member or HA pair to the Grid.
2. Reserving a port on a switch or switch-router for connectivity to the Grid member.
3. Joining the appliance or HA pair to the Grid. This includes defining the VIP or IP address of the Grid Master, the
Grid name, and the shared secret on the single appliance or HA pair. If an appliance or HA pair cannot join the
Grid because of MTU (maximum transmission unit) limitations on its network link, you can reduce the MTU that
the master uses when communicating with it. See Setting the MTU for VPN Tunnels on page 328. If the Grid
Master is behind a NAT device and there are members on both sides of that NAT device, you must create a NAT
group, as described in NAT Groups on page 275.
In a large scale deployment of Grids across multiple sites, consider remotely provisioning your Grid members
before joining them to the Grid. For more information about this feature, see Auto-Provisioning NIOS Appliances
on page 307.
In situations where you want to define certain configurations on an offline Grid member and associate DNS and
DHCP data to the member before deploying it, you can use the pre-provisioning feature to accomplish this. For
more information, see Pre-Provisioning NIOS and vNIOS Appliances on page 309.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to a different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining the
Grid Master after the restore.
— DSCP Value: Displays the Grid DSCP value, if configured. To modify, click Override and enter the DSCP
value. You can enter a value from 0 to 63. For information about DSCP, see Implementing Quality of
Service Using DSCP on page 447.
5. In the Port Reservation page, do the following:
• Begin by checking the Reserve Port check box. Note that reserving a switch port does not guarantee its
availability once the device must connect. The port is automatically assigned for connectivity to the LAN1
port on the appliance.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
• Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to which the Infoblox appliance will connect before taking this step.
For Grid member connectivity, the chosen device should be either a switch or a switch-router.
• After choosing the device, choose the Interface with which the reservation will be bound. The drop-down
list shows only interfaces that are most recently found to be available by Grid Manager during the last
Discovery cycle. This list will not include any ports that are Administratively Up and Operationally Up or that
are otherwise already assigned to other networks or Objects.
• The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page does not allow the definition of new VLANs for port
configuration–only the assignment of an existing VLAN in the device to your new port reservation. (Recall
that you may specify the VLAN Tag across which Grid member traffic will travel, when you specified the Grid
member information in Step 2 of the Wizard.)
• Check the Configure Port check box to define specific Port Control settings for the port reservation.
• Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment. Depending on
the selected device, the Voice VLAN field may or may not appear.
• Set the Admin Status to Up if you need to activate the port after assignment in the current task.
— All Port Control operations require CLI credentials to be entered into Grid Manager. Because some IPAM
and DHCP Objects will use Port Control features as part of object creation, CLI credentials are
automatically leveraged as part of discovery. Ensure you have the correct sets of CLI credentials for
devices in your network.
• Enter a Description for the port assignment. Infoblox recommends doing so to help other technicians to
recognize the port assignment event.
• When finished, click Next to continue in the wizard.
6. Optionally, define extensible attributes. For information, see About Extensible Attributes on page 417.
7. The final step for adding a Grid member is to define when the associated Port Configuration task executes. You
may execute it immediately or schedule it for another time and date.
• To create the new port configuration immediately, select Now. The port control task is automatically
synchronized to take place at the same time as the activation of the new Grid member.
• You can choose to have Grid Manager execute the port control task at a later time. To do so, select Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
8. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the single member to the Grid and close the wizard (this is the default).
— Click Save & Edit to add the single member to the Grid and launch the editor. You can configure additional
properties, such as the MTU size, or add the member to a NAT group.
— Click Save & New to add the single member to the Grid and launch the wizard again to add another
member.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) Grid member is set to IPv4, by default.
You can change the default communication protocol for all the services. For information, see Changing the
Communication Protocol for a Dual Mode Appliance on page 302.
Adding an HA Member
The basic steps necessary to add an HA member are as follows:
1. Define the network settings of the HA pair on the Grid Master.
2. Initiate the join Grid operation, during which you specify the VIP or IP address of the Grid Master, the Grid name,
and the shared secret on the HA pair. For information, see Joining Appliances to the Grid on page 302.
In addition, on the Grid Master you can configure the service settings such as DNS zones and records, DHCP networks
and address ranges, and so on for a member before or after you join the HA pair to the Grid. The basic steps for adding
an HA member are presented below.
Note: The procedure for adding an HA pair to a Grid when it uses the MGMT port of the active node for Grid
communications differs slightly from that described below. See Grid Communications on page 463.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to a different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining the
Grid Master after the restore.
— Required Ports and Addresses: This table lists the network interfaces based on the type of network
connectivity. For IPv4 HA member, specify the network information for VIP (IPv4), Node1 HA (IPv4), Node2
HA (IPv4), Node1 LAN1 (IPv4), and Node2 LAN1 (IPv4) interfaces. For IPv6 HA member, specify the network
information for VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA member, if you select IPv4 in the Send HA and Grid Communication over field, specify
the network information for the following interfaces: VIP (IPv4), Node1 HA (IPv4), Node1 LAN1 (IPv4),
Node2 HA (IPv4), Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA member, if you select IPv6 in the Send HA and Grid Communication over field, specify
the network information for the following interfaces: VIP (IPv4), Node1 LAN1 (IPv4), Node2 LAN1 (IPv4), VIP
(IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) ports.
Enter correct information for the following by clicking the field:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IPv4 or IPv6 address depending on the type of interface. An IPv6 address is a 128-bit
number in colon hexadecimal notation. It consists of eight 16-bit groups of hexadecimal digits
separated by colons (example: 2001:db8:0000:0123:4567:89ab:0000:cdef or
2001:db8::123:4567:89ab:0:cdef).
— Subnet Mask (IPv4) or Prefix Length (IPv6): Specify an appropriate subnet mask for IPv4 interface or
prefix length for IPv6 interface. The prefix length ranges from 2 to 127.
— Gateway: Type the IPv4 or IPv6 address of the default gateway depending on the type of interface. For
IPv6 interface, you can also type Automatic to enable the appliance to acquire the IPv6 address of the
default gateway and the link MTU from router advertisements.
— VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure that you
configure the corresponding switch accordingly.
— Port Settings: From the drop-down list, choose the connection speed that you want the port to use. You
can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or Half
for data transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to
negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch
automatically. This is the default setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value, if configured. To modify, click Override and enter the DSCP
value. You can enter a value from 0 to 63. For information about DSCP, see Implementing Quality of
Service Using DSCP on page 447.
Note: When the system operates in HA mode, should the IPv6–addressed VIP value be deleted, the IPv6
address of the HA port will also be deleted.
5. Optionally, define extensible attributes. For information, see Using Extensible Attributes on page 427.
6. Do one of the following:
— Click Save & Edit to add the HA member to the Grid and launch the editor. You can configure additional
properties, such as the MTU size, or add the member to a NAT group.
— Click Save & New to add the HA member to the Grid and launch the wizard again to add another member.
— Click Save & Close to add the HA member to the Grid and close the wizard.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA member is the same protocol as
the one that is used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication
over field in step 2 of the Add Grid Member wizard, then IPv4 is set as the communication protocol for all the services.
However, you can override the communication protocol for all the services in a dual mode HA member. For
information, see Changing the Communication Protocol for a Dual Mode Appliance on page 302.
Note: You can use the “Group Results” function for the following services: DNS, DHCP, TFTP, FTP, HTTP, NTP,
bloxTools, Captive Portal, and Reporting services.
or
From the Data Management tab, select the DHCP, File Distribution, or DNS tab -> Members/Servers tab.
2. Complete the following to group members with the same extensible attribute value:
— Group Results: Select this check box to enable the appliance to group members by extensible attributes.
— Group By: From the drop-down list, select the first extensible attribute that you want the appliance to use
for filtering members.
Grid Manager displays data per group of members configured with the same extensible attribute value.
To add additional Group By filter, click the + icon, and then select a value from the drop-down list. You can apply
up to 10 Group By filters. You can also delete a filter by clicking the - icon.
When you enable reporting service on the Grid and configure multi-site cluster, you can group reporting
members by reporting site extensible attributes. For information about reporting clusters, see Configuring
Indexer Cluster on page 1396.
Grid Manager displays the following information for the specified extensible attribute:
— <Selected extensible attribute>: Displays the extensible attribute value.
— Status: This is the overall status for all members in the group. Depending on the status of each member, the
overall status can be one of the following: Working, Warning, Failed, Offline, Inactive, or Unknown. For
information about the status, see Grid Status on page 145.
Note: In an HA pair, when one of the appliance is in the Working status and the other appliance has a status other
than Working, Inactive, and Unknown, then the overall status of HA members is Warning. When you use filters
and the group by extensible attribute feature, filters take precedence over the group by function.
When you drill-down to the member level, Grid Manager displays the members in the group.
The type of network connectivity for the Grid Master should be set to IPv6. To verify, navigate to the Grid tab ->
Grid Manager tab -> Members tab -> member check box -> Edit icon. In the Grid Member Properties editor, select
the Network tab -> Basic tab, check that the Type of Network Connectivity is set to IPv6. The Grid members can
join the Grid Master using IPv6 only.
Note: You can add additional IPv4 and IPv6 addresses for LAN2 and MGMT ports for the Grid services, in the
Additional Ports and Addresses table. But for an IPv6-only Grid, you can configure IPv6 address for the
VLAN port.
5. Add IPv6 single members and HA members to the Grid. For information, see Adding Grid Members on page 297.
6. You can use the Grid Setup Wizard or access the Join Grid dialog box to join appliances to a Grid. See Joining
Appliances to the Grid on page 302.
You can also configure IPv6 address for the MGMT interface of the appliance and join the Grid through the MGMT
interface.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to IPv6-only mode. Restoring
the old backup by performing a forced restore, may prevent the Grid members from rejoining the Grid Master
after the restore.
The process of transforming an IPv4-only or dual mode Grid to an IPv6-only Grid involves the following steps:
1. Convert the Grid Master into dual mode (IPv4 and IPv6) if it is in IPv4 mode, as follows:
— Login to the Grid Master, from the Grid tab -> Grid Manager tab -> Members tab -> select the Grid Master and
click the Edit icon.
— In the Grid Member Properties editor, select the Network tab -> Basic tab.
— In the Type of Network Connectivity field, select IPv4 and IPv6 from the drop-down list and enter the
network information for LAN1 (IPv6) address in the Ports and Addresses table.
For HA Master, select IPv4 in the Send HA and Grid Communication Over field, and enter the network
information for VIP (IPv6), Node1 LAN1 (IPv6), Node2 LAN1 (IPv6) in the Ports and Addresses table.
— Save the configuration and click Restart if it appears at the top of the screen.
2. Similarly, convert all the Grid members into dual mode (IPv4 and IPv6) if it is in IPv4 mode. All the members will
rejoin the Grid using IPv4.
3. Force each Grid member to rejoin the Grid using IPv6, as follows:
— From the Grid tab, select the Grid Manager tab -> Members tab -> member check box -> Edit icon.
— In the Grid Member Properties editor, select the Network tab -> Basic tab.
— In the Always Force or Prefer this Communications Protocol field, select IPv6 from the drop-down list and
also select IPv6 in the Send HA and Grid Communication over field if the member is an HA pair.
This setting will force the Grid member to rejoin the Grid using IPv6 and it uses IPv6 for all the services.
— Save the configuration and click Restart if it appears at the top of the screen.
4. Configure each Grid member to provide DNS service using IPv6, as follows:
— From the Data Management tab, select the DNS tab -> Members tab -> member check box -> Edit icon.
— In the Member DNS Properties editor, select the General tab -> Basic tab.
— Enable the IPv6 check box and disable the IPv4 check box for the desired interface (LAN1, LAN2, or MGMT)
under DNS Interfaces.
Ensure that the primary and secondary servers are configured with an IPv6 address for each zone, before
disabling the IPv4 check box for LAN1, LAN2, or MGMT interface.
— Save the configuration and click Restart if it appears at the top of the screen.
5. Configure each Grid member to provide DHCP service using IPv6, as follows:
— From the Data Management tab, select the DHCP tab -> Members tab -> member check box -> Edit icon.
— In the Member DHCP Properties editor, select the General tab -> Basic tab.
— Disable the IPv4 check box for LAN1 and LAN2 interface under DHCP Interfaces.
— Enable the IPv6 check box for the desired interface (LAN1 or LAN2) under DHCP Interfaces.
If IPv6 network is not configured, you can create an IPv6 network. For information, see Managing IPv6
Networks on page 1161.
— Save the configuration and click Restart if it appears at the top of the screen.
6. Enable each Grid member and the Grid Master to use IPv6 for all the services, as follows:
— From the Grid tab, select the Grid Manager tab -> Members tab -> member check box -> Edit icon.
— In the Grid Member Properties editor, select the Network tab -> Basic tab, and select Customized Settings
and specify the following:
— Always Force this Communication Protocol for: Select IPv6 from the drop-down list for the Grid and
reporting service.
— Always Prefer this Communication Protocol for: Select IPv6 from the drop-down list as the preferred
communication protocol for the listed services which has two types of resolution (A and AAAA records).
The appliance uses the preferred protocol first for the service.
— Save the configuration and click Restart if it appears at the top of the screen.
7. When all the services are functioning using IPv6, you can remove the IPv4 addresses from all the Grid members
by converting the Grid member from dual mode (IPv4 and IPv6) to IPv6 mode, as follows.
— From the Grid tab, select the Grid Manager tab -> Members tab -> member check box -> Edit icon.
— In the Grid Member Properties editor, select the Network tab -> Basic tab.
— In the Type of Network Connectivity field, select IPv6 from the drop-down list.
— Save the configuration and click Restart if it appears at the top of the screen.
8. Similarly, you can convert the Grid Master from dual mode (IPv4 and IPv6) to IPv6 mode after converting all the
Grid members to IPv6 mode.
Note: Remove the IPv4 addresses from the Grid Master only after you remove the IPv4 addresses from all the Grid
members.
Note: Auto-provisioning supports only IPv4 addressing and not IPv6 addressing.
When you upgrade or downgrade the appliance to a release that includes this feature, auto-provisioning is disabled
for the appliance.
Note: When auto-provisioning is disabled for an appliance and the network address is not preserved,
auto-provisioning will be re-enabled and a DHCP lease request is sent to the DHCP server if you reset the
appliance using the CLI command reset all or reset the database using the CLI command reset database.
However, if the static IP address for an appliance is set and network settings are preserved, auto-provisioning
will be re-enabled for the appliance but the lease address will not be requested if you reset the database using
the CLI command reset database.
Note: You must have the Enterprise and vNIOS licenses pre-provisioned in order for a vNIOS appliance to join the
Grid. For a cloud virtual appliance, include the Cloud Platform license.
To pre-provision an offline Grid member and join it to the Grid at a later time, complete the following:
1. Add a new single member or HA member to the Grid, as described in Adding a Single Member on page 297 or
Adding an HA Member on page 300.
2. Pre-provision the offline member, as described in Configuring Pre-Provisioned Members on page 310.
3. Configure services to use the pre-provisioned member.
4. Obtain permanent licenses you have specified for pre-provisioning and use the set license CLI command to
install the licenses on the member. For more information about CLI commands, refer to the Infoblox CLI Guide.
5. Join the pre-provisioned member to the Grid, as described in Joining Appliances to the Grid on page 302. For
guidelines about joining pre-provisioned members, see Guidelines for Joining Pre-Provisioned Members to the
Grid on page 311.
Note: After you save the configuration, you can no longer modify the hardware model for the member. You also
cannot disable any provisional licenses, though you can add new ones. To disable provisional licenses,
you must first remove the pre-provisioned member and then configure a new one.
Note: Before you join the member to the Grid, use the CLI command set license to add corresponding permanent
licenses that you have specified for pre-provisioning. For information about CLI commands, refer to the
Infoblox CLI Guide. You can also allocate pre-purchased licenses from the pool. For information, see Managing
the Order of Match Lists on page 489.
NIOS supports the following provisional licenses: Cloud Platform, DHCP, DNS, DNS Traffic Control, Enterprise
(formerly Grid), FireEye, Microsoft Management, RPZ (Response Policy Zone), and vNIOS.
After you configure the offline member, you can select the pre-provisioned member from the corresponding wizards
and editors based on the required license(s). The following table lists the wizards and editors from which you can
select a pre-provisioned member when required pre-provisioned licenses are enabled:
Wizards and editors from which you can select a pre-provisioned Required license(s)
member
DNS Zones and Name Server Groups dns
DHCP IPv4 and IPv6 networks dhcp
Note: If you configure a DHCP Failover using an online member and a pre-provisioned member, assign it to a
range, and start DHCP service, no addresses will be served because the initial synchronization does not
happen due to the pre-provisioned offline member. NIOS logs the following message in the syslog:
2013-12-24T08:37:23+00:00 daemon (none) dhcpd[8790]: info DHCPDISCOVER from
cb:86:a8:45:6c:5c via 10.120.21.236: not responding (recovering)
Note: When adding an Infoblox appliance to an existing Grid, you must first check whether the Grid is running the
minimum required software release of the appliance. For information, refer to the document, Minimum
Required Release Software for Hardware Platforms, that was shipped with your product.
To create a Grid, you first create a Grid Master and then add members. The process involves these three steps:
1. Configuring two appliances at HQ as the Grid Master. See Create the Grid Master on page 314.
2. Logging in to the Grid Master and defining the members that you want to add to the Grid; that is, you configure
Grid member settings on the Grid Master in anticipation of later joining those appliances to the Grid. See Define
Members on the Grid Master on page 316.
3. Logging in to the individual appliances and configuring them so that they can reach the Grid Master over the
network and join the Grid. See Join Appliances to the Grid on page 317.
After creating the Grid and adding members, you use the Data Import Wizard to import DHCP and DNS data from
legacy servers. See Import DHCP Data on page 319 and Import DNS Data on page 321.
Finally, you transition DHCP and DNS service from the legacy servers to the Infoblox Grid members. See Enable DHCP
and Switch Service to the Grid on page 324.
HQ Site
Zone: corp100.com
VPN Tunnel
Internet
Firewalls
... ...
HA Grid Member Single Grid Member
ns3.site1.corp100.com ns4.site2.corp100.com
VIP: 10.1.1.10 LAN1: 10.2.1.10
VRID: 111 Secondary DNS Server Zone: site2.corp100.com
Zone: site1.corp100.com Secondary DNS Server DHCP Server
Network: 10.1.1.0/24 DHCP Server Network: 10.2.1.0/24
Address Range:10.1.1.50 - 10.1.1.200 Address Range:10.2.1.50 - 10.2.1.200
Note: When connecting the nodes of an HA pair to a power source, connect each node to a different power
source if possible. If one power source fails, the other might still be operative.
2. At Site 2, connect an Ethernet cable from the LAN1 port on the single appliance to a switch, connect the appliance
to a power source, and turn on the power for that appliance.
Note: IPv6 addressing is fully supported on Infoblox Grid Masters, HA pairs and standalone HA pairs and appliances.
Examples in the sections of this chapter use IPv4.
Configure two appliances at HQ to be the two nodes that make up the HA pair forming the Grid Master.
During the joining process, an appliance passes through the following four phases:
1. Offline – the state when a Grid member—in this case, the second node of the HA pair composing the Grid
Master—is not in contact with the active node of the master
2. Connecting – the state when an appliance matching a member configuration contacts the master to join the Grid
and negotiates secure communications and Grid membership
3. Synchronizing – the master transmits its entire database to the member
4. Running — the state when a member is in contact with the master and is functioning properly
Note: Depending on the network connection speed and the amount of data that the master needs to synchronize
with the member, the process can take from several seconds to several minutes to complete.
HQ Site – HA Member
1. From the Grid tab, select the Grid Manager -> Members tab.
2. Expand the Toolbar and click Add -> Add Grid Member.
3. In the Add Grid Member wizard, complete the following and click Next:
— Member Type: Select Infoblox.
— Host Name: Enter ns2.corp100.com.
— Comment: Enter HQ Site - ns2.corp100.com.
4. Enter the following information about the member that you are adding to the Grid and click Save & Close:
— Type of Network Connectivity: Select IPv4 from the drop-down list.
— High Availability Pair: Select this option.
— Virtual Router ID: 210
— Required Ports and Addresses:
Site 1 – HA Member
1. From the Grid tab, select the Grid Manager tab -> Members tab.
2. Expand the Toolbar and click Add -> Add Grid Member.
3. In the Add Grid Member wizard, enter the following and click Next:
— Member Type: Select Infoblox.
— Host Name: Enter ns3.site1.corp100.com
— Comment: Enter Site 1 - ns3.site1.corp100.com
4. Specify the following information about the member that you are adding to the Grid and click Save & Close:
— Type of Network Connectivity: Select IPv4 from the drop-down list.
— High Availability Pair: Select this option.
— Virtual Router ID: Enter 111.
— Required Ports and Addresses:
Note: Depending on the network connection speed and the amount of data that the master needs to synchronize
with the member, the process of joining a Grid can take from several seconds to several minutes to complete.
Legacy Server
1. Log in to the legacy name server at 10.0.1.5 and save the named.conf file, which contains all the DNS settings
that you want to import into the Infoblox name server, to a local directory on your management system.
2. On the legacy server, enable zone transfers to the NIOS appliance.
Note: When all DNS servers are members in the same Grid, the members use database replication to synchronize all
their data—including DNS zone data. You can change the default behavior so that Grid members use zone
transfers instead. In this example, Grid members use database replication.
Note: Only superusers can import A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access
users must have read/write permission to Adding a blank A/AAAA record in order to import A, AAAA, shared
A, and shared AAAA records with a blank name, otherwise the import operation might fail. You can assign
global permission for specific admin groups and roles to allow to import A, AAAA, shared A, and shared AAAA
records with a blank name. For more information, see Administrative Permissions for Adding Blank A or AAAA
Records on page 245.
Tip: You can use SHIFT+click to select multiple contiguous rows and CTRL+click to select multiple
noncontiguous rows.
5. Right-click the selected rows, and then select Set Import Options.
6. In the Set Import Options dialog box, enter the following, and then click Apply:
— Set Zone Type: No change
— Set Import Option: No change
— Set View: default
— Set Member: HQ-Group master
7. Select site1.corp100.com and all the reverse-mapping zones with 1 in the second octet in the zone name
(1.1.10.in-addr.arpa, 2.1.10.in-addr.arpa, 3.1.10.in-addr.arpa, and so on).
8. Right-click the selected rows, and select Set Import Options.
9. In the Set Import Options dialog box, make the same selections as in Step 6 , but choose Site1-Group master
from the Set Member drop-down list.
10. Similarly, select site2.corp100.com and all the reverse-mapping zones with 2in the second octet in the zone
name.
11. Right-click the selected rows, and select Set Import Options.
12. In the Set Import Options dialog box, make the same selections as in Step 6 , but choose Site2-Group master
from the Set Member drop-down list.
Note: If the wizard is unable to import a zone, an error message with an explanation appears in the log.
3. To close the Data Import Wizard, click Exit. This closes the Data Import Wizard Log as well.
Note: When importing data through the wizard rather than entering it through the GUI, the Restart Services icon
does not change to indicate you must restart service for the appliance to apply the new data. Still,
restarting service on the Grid Master is necessary for the imported configuration and data to take effect.
2. To remove A records for the legacy servers, from the Data Management tab, select DNS tab -> Zones tab ->
corp100.com.
3. Expand the Records section, select the following A records in the corp100.com zone, and then click the Delete
icon:
— ns1 (for 10.0.1.5)
— ns2 (for 10.0.2.5)
— ns3.site1.corp100 (for 10.1.1.5)
— ns4.site3.corp100 (for 10.2.1.5)
4. Remove the respective A records for legacy servers from the site1.corp100 and site3.corp100 subzones.
5. To check the imported DNS configuration file, from the Data Management tab, select DNS tab -> Members tab ->
10.0.1.10 check box. Expand the Toolbar and click View -> View DNS Configuration.
Note: If you do not see the imported DNS configuration file, make sure you enabled DNS and restarted services.
6. Scroll through the DNS configuration log to check that each imported zone has an allow-update statement like
the following one for the 10.1.10.in-addr.arpa reverse-mapping zone:
zone "10.1.10.in-addr.arpa" in {
…
allow-update { key DHCP_UPDATER; 10.0.2.10; 10.1.1.10; 10.2.1.10; };
…
};
Note: Start the DNS service, as described in Starting and Stopping the DNS Service on page 763.
The Grid members are ready to serve DHCP and DNS, and send DDNS updates.
3. Take the legacy DHCP and DNS servers offline.
Managing a Grid
After you configure a Grid Master and add members, you might need to perform the following tasks:
• Changing Grid Properties on page 325
• Configuring Security Level Banner on page 326
• Configuring Notice and Consent Banner on page 326
• Configuring Informational Level Banner on page 327
• Setting the MTU for VPN Tunnels on page 328
• Removing a Grid Member on page 328
• Promoting a Master Candidate on page 328
Note: If read-only API access is enabled for a Grid Master Candidate, then selecting the Enable GUI Redirect from
Member check box for the Grid Master Candidate does not redirect the Infoblox GUI from the Grid Master
Candidate to the Grid Master. For more information about enabling read-only API access on a Grid Master
Candidate, see Enabling Read-only API Access on the Grid Master Candidate on page 329.
— Enable GUI/API Access via both MGMT and LAN1/VIP: Select this check box to allow access to the
Infoblox GUI and API using both the MGMT and LAN1 ports for standalone appliances and MGMT and
VIP ports for an HA pair. This feature is valid only if you have enabled the MGMT port. For information
about enabling the MGMT port, see Appliance Management on page 462.
Note: The appliance uses the MGMT port only to redirect the Infoblox GUI from a Grid member to the Grid Master
even after you enable the Enable GUI/API Access via both MGMT and LAN1/VIP feature.
— Enable Notice and Consent Banner: Select the check box to enable the display of the notice and consent
banner. In the text field, enter the message that you want to be included in the banner. The message cannot
exceed 10,000 characters.
4. Save the configuration.
This banner appears as the first screen when users access Grid Manager. Users must read the terms and
conditions and then click Accept on the consent screen before they can access the login screen of Grid Manager.
Note: You must have Read/Write permission to all the child objects in order to delete a parent object. Recursive
deletion is applicable to all zone types except stub and forward-mapping zones.
The appliance puts all deleted objects in the Recycle Bin, if enabled. You can restore the objects if necessary. When
you restore a parent object from the Recycle Bin, all its contents, if any, are re-parented to the restored parent object.
For information about the Recycle Bin, see Using the Recycle Bin on page 73.
new Grid Master. The Grid Members restart and then attempt to establish normal Grid communications (via BloxSync)
with the newly promoted Grid Master. Before promoting a Master Candidate, check your firewall rules to ensure that
the Master Candidate can communicate with all the Grid members. For information, see Grid Communications on
page 273.
To promote a Master Candidate, you can make a direct serial connection to the console port on the active node of an
HA Candidate or to the console port on a single Candidate. You can also make a remote serial connection (using SSH
v2) to the candidate. Enter the following Infoblox CLI command to promote a Master Candidate:
set promote_master.
You can do one of the following to promote a Master Candidate:
• Immediately notify all Grid members about the promotion.
• Set a sequential notification to provide wait time for Grid members to join the new Grid Master. Staggering the
restarts of Grid members can minimize DNS outages. The sequential order for Grid members to join the new Grid
Master begins with the old Grid Master and then the Grid members in FQDN order. The default delay time is 120
seconds. You can configure the delay time from a minimum of 30 seconds up to 600 seconds.
Note: During a Grid Master promotion, ensure that you do not designate a Grid member as a Grid Master Candidate
or promote a Master Candidate.
Note: Note that when you promote the Master Candidate to a Grid Master, the IP address will change accordingly. If
you have configured a FireEye appliance, then any changes in the Grid Master IP address, FireEye zone name,
associated network view or the DNS view will affect the Server URL that is generated for a FireEye appliance.
The FireEye appliance will not be able to send alerts to the updated URL when there is a change in the IP
address. You must update the URL in the FireEye appliance to send alerts to the NIOS appliance. For more
information, see Configuring FireEye RPZs on page 1696.
Note: When you upgrade the Grid Master Candidate to NIOS 7.1 and later, read-only API access is disabled. But when
you upgrade the Grid Master Candidate from NIOS 7.1 to a later release with read-only API access enabled,
then this setting is retained after the upgrade is completed.
The appliance logs all API logins in the audit log and syslog. You can view the audit log and syslog of the Grid Master
Candidate under the Administration -> Logs tab.
To enable read-only API access on the Grid Master Candidate:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_Master_Candidate check box, and then
click the Edit icon.
2. In the Grid Member Properties editor, select the General tab -> Basic tab, and then do the following:
— Read Only API access: This field is displayed only when the Grid member is designated as a Master
Candidate. Select this check box to enable read-only API access on the Grid Master Candidate. Enabling this
check box will only allow read-only API access and not write API access. Note that if you enable this check
box, you cannot access the GUI using the IP address of the Grid Master Candidate.
3. Save the configuration.
— Enabling DHCP and Switching Service to the NIOS Appliance on page 358
— Managing and Monitoring on page 359
• Verifying the Deployment on page 360
— Single Independent Appliance on page 360
— Independent HA Pair on page 360
• Infoblox Tools for Migrating Bulk Data on page 360
Note: Infoblox appliances support IPv4 and IPv6 networking configurations in most deployments cited in this
chapter. You can set the LAN1 port to an IPv6 address and use that address to access the NIOS UI and the NIOS
Setup Wizard. All HA operations can be applied across IPv6. You can also set a dual mode appliance by
configuring both IPv4 and IPv6 address for the LAN1 port. Topics in this and following chapters generally use
IPv4 examples. Also note that LAN2 and the MGMT port also support IPv6. DNS services are fully supported in
IPv6 for the LAN1, LAN2, MGMT and VLAN ports. DHCP services are fully supported in IPv6 for the LAN1 and
LAN2 ports. Example networks throughout this chapter use IPv4 addressing.
You can deploy the NIOS appliance as a Grid member in an Infoblox Grid or independently as a standalone
deployment. NIOS appliances support both IPv4 and IPv6 networks and you can deploy them in either IPv4, IPv6, or
dual mode (IPv4 and IPv6). Grids offer many advantages for large organizations while independent deployments can
be sufficient for smaller sites. For example, if your ISP hosts one name server to respond to external DNS queries, you
can deploy a single independent NIOS appliance as the other name server, as shown in Figure 6.1.
Using primary and secondary name servers provides DNS protocol redundancy, and configuring two DHCP servers as
DHCP failover peers provides DHCP protocol redundancy. However, you can only have hardware redundancy if you
deploy appliances in an HA (high availability) pair. Should the active node in an HA pair fail, the passive node
becomes active and begins serving data, as shown in Figure 6.2. For more information about HA pairs, see About HA
Pairs on page 282.
Infoblox
You can deploy a single independent NIOS appliance by setting its LAN1 port IP address, netmask, and gateway
through the LCD. This is the simplest method because you do not need anything other than a physical access to the
appliance to complete the initial configuration.
1. Connect the power cable from the NIOS appliance to a power source and turn on the power.
At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls
repeatedly through a series of display screens.
2. To change the network settings for the LAN1 port, press one of the navigation buttons.
The LCD immediately goes into the input mode, in which you can enter the IP address, netmask, and gateway for
the LAN1 port.
3. Use the navigation buttons to enter an IP address, netmask, and gateway address for the LAN1 port.
4. Cable the LAN1 port of the NIOS appliance to a network as described in the installation guide that shipped with
your product.
Management NIOS
System appliance
2. Use a serial terminal emulation program, such as Hilgraeve Hyperterminal® (provided with Windows® operating
systems), to launch a session. The connection settings are:
— Bits per second: 9600
— Data bits: 8
— Parity: None
— Stop bits: 1
— Flow control: Xon/Xoff
3. Log in to the appliance using the default username and password (admin and infoblox) .
4. At the Infoblox command prompt, enter set network to change the network settings, such as the IP address,
netmask, and gateway for the LAN1 port. You can configure either IPv4 or IPv6 address for the LAN1 port.
Note: In the following example, the variable ip_addr1 is the IP address of the LAN1 port and ip_addr2 is the IP
address of the gateway for the subnet on which you set the ip_addr1 address. Infoblox appliances support
IPv4 and IPv6 networking configurations in all deployments cited in this chapter. You can set the LAN1 port to
an IPv6 address and use that address to access the NIOS UI.
You can configure an IPv4 address for the LAN1 port as follows:
Infoblox > set network
NOTICE: All HA configuration is performed from the GUI. This interface is used only
to configure a standalone node or to join a Grid.
Enter IP address: ip_addr1
Enter netmask: netmask
Enter gateway address: ip_addr2
Configure IPv6 network settings? (y or n): y
Enter IPv6 address [Default: none]: 2001:db8:a22:a00::29
Enter IPv6 Prefix Length[Default: none]: 64
Enter IPv6 gateway [Default: none] 2001:db8:a22:a00::1
Become Grid member? (y or n): n
To avoid configuring IPv6 network settings, you can press N at the command line.
You can configure an IPv6 address for the LAN1 port as follows:
Infoblox > set network
NOTICE: All HA configuration is performed from the GUI. This interface is used only
to configure a standalone node or to join a grid.
Enter IP address : 2620:010A:6000:2400:0000:0000:0000:6508
Enter IPv6 Prefix Length: 64
Enter IPv6 gateway [Default: none]: 2620:010A:6000:2400:0000:0000:0000:0001
Configure IPv4 network settings? (y or n):n
Become grid member? (y or n): n
To configure IPv4 network settings, you can press Y at the command line and configure IPv4 address,
netmask, and the gateway address.
After you confirm your network settings, the Infoblox application automatically restarts.
You can press N to avoid configuring IPv6 on the command line. After you confirm your network settings, the
Infoblox application automatically restarts.
5. Cable the LAN1 port to a network. For information about installing and cabling the appliance, refer to the user
guide or installation guide that was shipped with the product.
Note: If you have already set the IP address of the LAN1 port through the LCD or CLI so that you can reach it over the
network—and you have already cabled the appliance to the network—you can skip the first step.
1. If you have not changed the default IP address (192.168.1.2/24) of the LAN1 port through the LCD or CLI—and
the subnet to which you connect the appliance is not 192.168.1.0/24—put your management system in the
192.168.1.0/24 subnet and connect an Ethernet cable between the management system and the appliance.
2. Open an Internet browser window and enter https:// <IP address of the appliance> to make an HTTPS
connection. For information about supported browsers, see Supported Browsers on page 56.
Several certificate warnings may appear during the login process because the preloaded certificate is
self-signed and has the hostname www.infoblox.com, which may not match the destination IP address you
entered in step 1. To stop the warning messages from occurring each time you log in to Grid Manager, you can
generate a new self-signed certificate or import a third-party certificate with a common name that matches the
FQDN (fully qualified domain name) of the appliance. For information, see Managing Certificates on page 63.
3. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press Enter. For information, see Logging in to the GUI on page 58.
4. Read the Infoblox End-User License Agreement. If you want to participate in the Infoblox Customer Experience
Improvement Program, complete the following:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
Click I Accept. The NIOS Setup wizard appears.
5. In the first screen of the NIOS Setup wizard, complete the following:
— Type of Network Connectivity: Select the type of network connectivity for the appliance from the drop-down
list:
— IPv4 and IPv6: Select this to configure a dual mode appliance.
— IPv4: Select this to configure an IPv4 appliance.
— IPv6: Select this to configure an IPv6 appliance.
— Are you configuring an HA pair or a standalone appliance?: Select Configuring a standalone appliance. To
configure an independent HA pair, see Deploying an Independent HA Pair on page 346.
6. Click Next and complete the following to configure network settings:
— Host Name: Enter a valid domain name for the appliance.
— Ports and Addresses: This table lists the network interfaces based on the type of network connectivity of
the appliance. For an IPv4 appliance, specify the network information for LAN1 (IPv4) interface and for an
IPv6 appliance, specify the network information for LAN1 (IPv6) interface. For a dual mode appliance,
specify the network information for both LAN1 (IPv4) and LAN1 (IPv6) interfaces.
Enter correct information for the following by clicking the field:
— Interface: Displays the name of the interface. You cannot modify this.
— IP Address: Type the IPv4 or IPv6 address depending on the type of interface. An IPv6 address is a
128-bit number in colon hexadecimal notation. It consists of eight 16-bit groups of hexadecimal digits
separated by colons (example: 2001:db8:0000:0123:4567:89ab:0000:cdef or
2001:db8::123:4567:89ab:0:cdef).
— Subnet Mask (IPv4) or Prefix Length (IPv6): Specify an appropriate subnet mask for IPv4 address or
prefix length for IPv6 address. The prefix length ranges from 2 to 127.
— Gateway: Type the IPv4 or IPv6 address of the default gateway depending on the type of interface. For
IPv6 interface, you can also type Automatic to enable the appliance to acquire the IPv6 address of the
default gateway and the link MTU from router advertisements.
— Port Settings: Select the port settings from the drop-down list. The list contains all the settings
supported by the hardware model. The default is Automatic. The appliance automatically detects the
port settings.
7. Click Next and complete the following to set admin password:
— Yes: To change the default password.
— No: To keep the default password. Infoblox recommends that you change the default password.
When you select Yes, complete the following:
— Password: Enter a password for the superuser admin account. The password must be a single alphanumeric
string without spaces and at least four characters long. The password is case-sensitive.
— Retype Password: Enter the same password.
8. Click Next and complete the following to configure time settings:
— Time Zone: Select the applicable time zone from the drop-down list. The default is (UTC) Coordinated
Universal Time.
— Would you like to enable NTP?:
— Select Yes to synchronize the time with external NTP servers, and then click the Add icon. Grid Manager
adds a row to the NTP Server table. Click the row and enter either the IP address (IPv4 or IPv6) or the
resolvable host name of an NTP server. You can view a list of public NTP servers at ntp.isc.org.
— Select No to specify the time settings for the appliance.
— Date: Enter the date in YYYY-MM-DD format. You can also click the calendar icon to select a date from
the calendar widget.
— Time: Enter the time in HH:MM:SS AM/PM format. You can also click the clock icon to select a time from
the drop-down list.
9. If you want to participate in the Infoblox Customer Experience Improvement Program, complete the following and
then click Next:
— Participate in the Infoblox Customer Experience Improvement Program: Select the check box to send
product usage data to Infoblox on a periodic basis. Infoblox uses this data to improve product functionality.
For more information about the program, see Participating in the Customer Experience Improvement
Program on page 1349.
— Support ID (optional): Enter the Infoblox Support ID that was assigned to your account. It must be a number
with four to six digits. The value you enter here is also displayed in the Customer Improvement tab in the
Grid Properties editor. Infoblox includes this ID in the data report.
— Email: Enter an email address to which Infoblox sends a copy of the usage report. The email address you
enter here is also displayed in the Customer Improvement tab in the Grid Properties editor. This is optional.
— Infoblox Privacy Policy: Click here to view the Infoblox privacy policy. The appliance displays the policy in a
new browser tab.
10. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
11. Click Finish.
The appliance restarts and disconnects Grid Manager.
In a dual mode independent appliance, the communication protocol for all the services is set to IPv4, by default. You
can change the default communication protocol for the services. For information, see Changing the Communication
Protocol for a Dual Mode Independent Appliance.
DMZ Network
NIOS appliance
Primary DNS
10.1.5.0/24
To Internal Server
Network ns1: 10.1.5.2
Switch corp100.com
The NIOS appliance is the primary DNS server for the corp100.com domain. It answers queries from the
Internet for the three public-facing servers in the DMZ network:
• www.corp100.com
• mail.corp100.com
• ftp.corp100.com
LCD
The NIOS appliance has an LCD and navigation buttons on its front panel.
At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls repeatedly
through a series of display screens.
1. To change the network settings from the default, press one of the navigation buttons.
The LCD immediately goes into input mode, in which you can enter the IP address, netmask, and gateway for the
LAN1 port.
2. Use the navigation buttons to enter the following information:
— IP Address: 10.1.5.2
— Netmask: 255.255.255.0
— Gateway: 10.1.5.1
— Are you configuring an HA pair or a standalone appliance?: Select Configuring a standalone appliance. To
configure an independent HA pair, see Deploying an Independent HA Pair on page 346.
6. Click Next and complete the following to configure network settings:
— Host Name: Enter ns1.corp100.com.
— Ports and Addresses: Specify the network settings for LAN1(IPv4) port.
Enter correct information for the following by clicking the field:
— IP Address: Enter 10.1.5.2 as the IPv4 address for the LAN1 port.
— Subnet Mask (IPv4) or Prefix Length (IPv6): Enter 255.255.255.0 as the subnet mask for the
LAN1(IPv4) port.
— Gateway: Enter 10.1.5.1 as the gateway of the subnet on which the LAN1 port is set.
— Port Settings: Use the default value Automatic.
7. Click Next and complete the following to set admin password:
— Would you like to set admin password?: Click Yes.
— Password: Enter SnD34n534.
— Retype Password: Enter SnD34n534 again.
8. Click Next and complete the following to configure the time settings:
— Time Zone: Select UMT – 8:00 Pacific Time (US and Canada), Tijuana from the drop-down list.
— Would you like to enable NTP?: Select Yes to synchronize the time with external NTP servers, and then click
the Add icon. Grid Manager adds a row to the NTP Server table. Click the row and enter 10.120.3.10 in the
NTP Server field.
9. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
10. Click Finish.
Note: If you only have forward-mapping zones on your legacy servers and you want to add reverse-mapping zones
and automatically convert A records to host records in the imported forward-mapping zones and create reverse
host records in corresponding reverse-mapping zones, create the reverse-mapping zones on the NIOS
appliance and then import the forward-mapping zones data. The NIOS appliance automatically converts the
imported A records to host records in the forward-mapping zones and creates reverse host records in the
reverse-mapping zones.
You also have the option of using the Data Import Wizard for loading DNS and DHCP data. For large data sets, this
option is an efficient approach. To download the Data Import Wizard, visit www.infoblox.com/import/.
In this example, when you create the corp100.com forward-mapping zone, you import zone data for the existing
corp100.com zone from the legacy server at 10.1.5.3. When you create the 1.1.1.0/24 reverse-mapping zone, you
also import the reverse-mapping zone records from the legacy server. After the appliance has both the forward- and
reverse-mapping zone data, it converts the A and PTR records to Infoblox host records.
Note: To import zone data, you must first create a zone and save it.
1. To create an authoritative zone, from the Data Management tab, select the DNS tab -> Zones tab, and then click
the Add icon -> Authoritative Zone.
2. In the Add Authoritative Zone wizard, select Add an authoritative forward-mapping zone.
3. Click Next and complete the following:
— Name: Enter corp100.com.
— Comment: Enter DNS zone.
4. Click Next to assign a name server group to the zone.
5. Click the Zones tab, select the corp100.com check box, and then click the Edit icon.
6. In the Authoritative Zone editor, select the Name Servers tab, and then complete the following:
— Use this name server group: Select this, and then select Corp100 from the drop-down list.
7. Save the configuration and click Restart if it appears at the top of the screen.
12. To import reverse-mapping zone data, click the Zones tab, select the corp100.com check box, and then click
Import Zone from the Toolbar.
13. In the Import Zone editor, complete the following:
— Address: Enter 10.1.5.3 from which you want to import zone data.
— Automatically create hosts from A records: Select this to enable the appliance to create host records from
the imported A records.
14. Click Import.
15. After successfully importing the zone data, click 1.1.1.in-addr.arpa in the Zones tab.
You can see all the imported reverse-mapping zone data in the Records panel.
16. Click corp100.com in the Forward Mapping Zones list.
Because you have now imported both the forward- and reverse-mapping zone data, most of the records appear
as host records.
17. Finally, you must remove the ns1 host record for the legacy server (value 1.1.1.3). To remove it, select the ns1
check box (the host record for 1.1.1.3), and then click the Delete icon.
Designating the New Primary on the Secondary Name Server (at the ISP Site)
In this example, the external secondary name server is maintained by an ISP, so you must contact your ISP
administrator to change the IP address of the primary (or master) name server. (If you have administrative access to
the secondary name server, you can make this change yourself.)
Because a firewall performing NAT exists between the secondary and primary name servers, specify the NAT address
1.1.1.2 for the primary name server instead of 10.1.5.2.
Note: By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type
(full or half duplex) on the physical links between its LAN1, HA, and MGMT ports and the Ethernet ports on the
connecting switch. If the two appliances fail to auto-negotiate the optimal settings, see Modifying Ethernet
Port Settings on page 456 for steps you can take to resolve the problem.
Note: The Ethernet ports on the TE-810, TE-820, TE-1410, TE-1420, TE-2210, TE-2220, and IB-4010 appliances
are autosensing, so you can use either a straight-through or cross-over Ethernet cable for these
connections.
Configuring Node 1
1. Open an Internet browser window and enter https:// <the IP address of the appliance> to make an
HTTPS connection to the first node. For information about supported browsers, see Supported Browsers on page
56.
Several certificate warnings may appear during the login process because the preloaded certificate is
self-signed and has the hostname www.infoblox.com, which may not match the destination IP address you
entered in step 1. To stop the warning messages from occurring each time you log in to Grid Manager, you can
generate a new self-signed certificate or import a third-party certificate with a common name that matches the
FQDN (fully qualified domain name) of the appliance. For information, see Creating a Login Banner on page 59.
2. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press Enter. For information, see Logging in to the GUI on page 58.
3. Read the Infoblox End-User License Agreement, and then click I Accept to proceed. Grid Manager may take a few
seconds to load your user profile.
4. In the first screen of the NIOS Setup wizard, complete the following:
— Type of Network Connectivity: Select the type of network connectivity from the drop-down list:
— IPv4 and IPv6: Select this to configure a dual mode HA pair.
— IPv4: Select this to configure an IPv4 HA pair.
— IPv6: Select this to configure an IPv6 HA pair.
— Select Configuring an HA pair and click Yes for the first appliance of the HA pair.
— Send HA and Grid Communication over: Select either IPv4 or IPv6. This field is displayed only when you
configure a dual mode (IPv4 and IPv6) HA pair.
5. Click Next and complete the following to configure network settings:
— Host Name: Enter a valid domain name for the node.
— HA Pair Name: Enter a name for the HA pair. The default name is Infoblox.
— Shared Secret: Enter the shared secret that both nodes use to authenticate each other when establishing a
VPN tunnel for ensuing bloxSYNC traffic. The default shared secret is test.
— Confirm Shared Secret: Enter the shared secret again.
6. Click Next and complete the following to set properties for the first node:
— Virtual Router ID: Enter the VRID (virtual router ID). This must be a unique VRID number—from 1 to 255—for
this subnet.
Ports and Addresses: This table lists the network interfaces depending on the type of network connectivity.
For IPv4 HA pair, specify the network information for VIP (IPv4), Node1 HA (IPv4), Node2 HA (IPv4), Node1
LAN1 (IPv4), and Node2 LAN1 (IPv4) interfaces. For IPv6 HA pair, specify the network information for VIP
(IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA pair, if you select IPv4 in the Send HA and Grid Communication over field in step 2 of
the NIOS Startup wizard, specify the network information for the following interfaces: VIP (IPv4), Node1 HA
(IPv4), Node1 LAN1 (IPv4), Node2 HA (IPv4), Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2
LAN1 (IPv6) ports. If you select IPv6 in the Send HA and Grid Communication over field in step 2 of the NIOS
Startup wizard, specify the network information for the following interfaces: VIP (IPv4), Node1 LAN1 (IPv4),
Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6).
Click the empty fields and complete the following information:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IPv4 or IPv6 address depending on the type of interface.
— Subnet Mask (IPv4) or Prefix Length (IPv6): Specify an appropriate subnet mask for IPv4 address or
prefix length for IPv6 address. The prefix length ranges from 2 to 127.
— Gateway: Type the IPv4 or IPv6 address of the default gateway depending on the type of interface. For
IPv6 interface, you can also type Automatic to enable the appliance to acquire the IPv6 address of the
default gateway and the link MTU from router advertisements.
— Port Settings: Select the port settings from the drop-down list. The list contains all settings supported
by the hardware model. The default is Automatic. The appliance automatically detects the port
settings.
7. Click Next and complete the following to set admin password:
— Yes: To change the default password.
— No: To keep the default password.
If you select Yes, complete the following:
— Password: Enter a password for the superuser admin account. The password cannot contain spaces and it
must be at least four characters long. The password is case-sensitive.
— Retype Password: Enter the same password.
8. Click Next and complete the following to configure time settings:
— Time Zone: Select the applicable time zone from the drop-down list. The default is (UTC) Coordinated
Universal Time.
— Would you like to enable NTP?:
— Select Yes to synchronize the time with external NTP servers. Click the Add icon. Grid Manager adds a row to
the NTP Server table. Click the row and enter either the IPv4 or IPv6 address or the resolvable host name of
an NTP server. You can view a list of public NTP servers at ntp.isc.org.
— Select No to specify a date and time.
— Date: Enter the data in YYYY-MM-DD format. You can also click the calendar icon to select a date from
the calendar widget.
— Time: Enter the time in HH:MM:SS AM/PM format. You can also click the clock icon to select a time from
the drop-down list.
9. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
10. Click Finish.
Configuring Node 2
1. Open an Internet browser window and enter https:// <the IP address of the appliance> to make an
HTTPS connection to the second node. For information about supported browsers, see Supported Browsers on
page 56.
Several certificate warnings may appear during the login process because the preloaded certificate is
self-signed and has the hostname www.infoblox.com, which may not match the destination IP address you
entered in step 1. To stop the warning messages from occurring each time you log in to Grid Manager, you can
generate a new self-signed certificate or import a third-party certificate with a common name that matches the
FQDN (fully qualified domain name) of the appliance. For information, see Creating a Login Banner on page 59.
2. Enter the default username and password (admin and infoblox) on the Grid Manager login screen, and then click
Login or press Enter. For information, see Logging in to the GUI on page 58.
3. Read the Infoblox End-User License Agreement, and then click I Accept to proceed. Grid Manager may take a few
seconds to load your user profile.
4. In the first screen of the NIOS Setup Wizard, complete the following:
— Type of Network Connectivity: Select the type of network connectivity from the drop-down list:
— IPv4 and IPv6: Select this to configure a dual mode HA pair.
— IPv4: Select this to configure an IPv4 HA pair.
— IPv6: Select this to configure an IPv6 HA pair.
— Select Configuring an HA pair to configure an independent HA pair and click No to configure the first node of
an HA pair
5. Click Next and complete the following to configure network settings:
— HA Virtual IP address: Enter the VIP (virtual IP) address and its netmask.
— HA Pair Name: Enter a name for the HA pair. The default name is Infoblox. Ensure that you use the same
name as the first node.
— Shared Secret: Enter a text string that both nodes use as a shared secret to authenticate each other when
establishing a VPN tunnel. The default shared secret is test. This must be the same shared secret that you
entered on the first appliance.
— Show Password: Click this to display the shared secret. Clear it to conceal the shared secret.
6. Click Next, and then complete the following to set properties for the second appliance:
— IP Address: Enter the IPv4 or IPv6 address of the appliance.
— Subnet Mask: Enter the subnet mask of the appliance.
or
Prefix Length: Enter the prefix length if you have entered the IPv6 address in the IP Address field. The prefix
length ranges from 2 to 127.
— Gateway: Enter the IP address of the gateway of the subnet of the interface.
7. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
8. Click Finish.
The setup of the HA pair is complete. When you next make an HTTPS connection to the HA pair, use the VIP address.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA appliance is the same protocol as
the one used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication Over
field on the first screen of the NIOS Setup wizard, then IPv4 is set as the communication protocol for all the services.
However, you can override the communication protocol for all the services in a dual mode HA pair. For information,
see Changing the Communication Protocol for a Dual Mode Independent Appliance on page 339.
HA Pair IP Addresses
VIP 10.1.4.10 (the address that the active node of the HA pair uses)
Node 1 Node 2
• LAN1 10.1.4.6 • LAN1 10.1.4.8
• HA 10.1.4.7 • HA 10.1.4.9
The virtual router ID number for the HA pair is 150. The ID number must be unique for this network segment.
When you create the corp100.com zone on the HA pair, you import DNS data from the legacy server at 10.1.4.11.
ftp
10.1.5.7
Internet www 77:77:77
10.1.5.5
ISP 55:55:55
NOTE: The first six External Secondary
hexadecimal characters of DNS Server
all MAC addresses in the ns2: 2.2.2.2 DMZ Network
example are 00:00:00. Only ethernet1 ethernet2
the last six hexadecimal 10.1.5.0/24
1.1.1.1/24 10.1.5.1/24
characters are shown here.
Firewall
Relay Agent on
e2 interface) ethernet3
10.1.6.2/24 External Primary
DNS Server mail
ns1: 10.1.5.2 10.1.5.6
66:66:66
MGT Network
10.1.1.0/24
10.1.1.10 - ethernet0
10.1.1.50 10.1.6.1/24
ethernet1 HA Pair Primary DNS
Address printer1 10.1.1.1/24 Server, DHCP, IPAM
Range 10.1.1.2 ns3 VIP: 10.1.4.10
aa:aa:aa
ethernet2 ethernet4
10.1.2.1/24 10.1.4.1/24 Server Network
Dev Network
10.1.4.0/24
10.1.2.0/24
10.1.2.10 -
10.1.2.50 Legacy Primary DNS Server
ns3: 10.1.4.11
(Replaced by the HA Pair) storage1 proxymail
Address printer2 10.1.4.2 10.1.4.f
Range 10.1.2.2 dd:dd:dd ff:ff:ff
bb:bb:bb storage2 proxyweb
10.1.4.3 10.1.4.5
ee:ee:ee 11:11:11
An HA pair of NIOS appliances provides internal DNS services. It answers internal queries for all hosts in its
domain. It forwards internal queries for external sites to ns1 and ns2. It also serves DHCP, providing both
dynamic and fixed addresses. For information on configuring the NIOS appliance as a primary DNS server, see
Configuration Example: Deploying a NIOS Appliance as a Primary DNS Server on page 340.
Node 1
Using the LCD or console port on one of the appliances, enter the following information:
— IP Address: 10.1.4.6 (for the LAN1 port)
— Netmask: 255.255.255.0
— Gateway: 10.1.4.1
Node 2
Using the LCD or console port on the other appliance, enter the following information:
— IP Address: 10.1.4.8 (for the LAN1 port)
— Netmask: 255.255.255.0
— Gateway: 10.1.4.1
After you confirm your network settings, the Infoblox GUI application automatically restarts.
Node 1
1. Open an Internet browser window and enter https://10.1.4.6.
2. Accept the certificate when prompted.
Several certificate warnings may appear during the login process. This is normal because the preloaded
certificate is self-signed and has the hostname www.infoblox.com, which does not match the destination IP
address you entered in step 1. To stop the warning messages from occurring each time you log in to Grid
Manager, you can generate a new self-signed certificate or import a third-party certificate with a common name
that matches the FQDN (fully-qualified domain name) of the appliance. This is a very simple process. For
information about certificates, see Creating a Login Banner on page 59.
3. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press Enter. For information, see Logging in to the GUI on page 58.
4. Read the Infoblox End-User License Agreement, and then click I Accept to proceed. Grid Manager may take a few
seconds to load your user profile.
5. In the first screen of the NIOS Setup wizard, complete the following:
— Type of Network Connectivity: Select IPv4 as the communication protocol from the drop-down list.
— Select Configuring an HA pair and click Yes to configure the first appliance.
— Send HA and Grid Communication over: Select IPv4 from the drop-down list for VRRP advertisements.
6. In the NIOS Startup wizard, select Configuring an HA pair. Click Yes to configure the first appliance.
7. Click Next and complete the following to configure network settings:
— Host Name: Enter ns3.corp100.com.
— HA Pair Name: Use the default name Infoblox.
— Shared Secret: Enter 37eeT1d.
8. Click Next and complete the following to set properties for the first node:
— Virtual Router ID: Enter 150.
— Required Ports and Addresses: In the table, click the empty fields and enter the following information for
each corresponding interface in the table:
— VIP (IPv4): 10.1.4.10
— Node 1 HA (IPv4): 10.1.4.7
— Node 2 HA (IPv4): 10.1.4.9
— Node 1 LAN1 (IPv4): 10.1.4.6
— Node 2 LAN1 (IPv4): 10.1.4.8
— Subnet Mask: 255.255.255.0
— Gateway: 10.1.4.1
Note: Some fields are prepopulated by Grid Manager based on the existing configuration of the appliance. All
fields are required.
Node 2
1. From the System tab, select the System Manager tab, and then click System Properties -> Setup Wizard from the
Toolbar.
2. In the first screen of the NIOS Setup wizard, complete the following:
— Type of Network Connectivity: Select IPv4 as the communication protocol from the drop-down list.
— Select Configuring an HA pair and click Yes for configuring node 2 of the HA pair.
3. In the NIOS Startup wizard, select Configuring an HA pair to configure an independent HA pair. Click No for
configuring node 2 of the HA pair.
4. Click Next, and then complete the following to configure network settings:
— HA Virtual IP address: Enter 10.1.4.10.
— HA Pair Name: Use the default name Infoblox.
— Shared Secret: Enter 37eeT1d.
— Show Password: Click this to display the shared secret.
5. Click Next, and then complete the following to set properties for the second appliance:
— IP Address: Enter 10.1.4.8.
— Subnet Mask: Enter 255.255.255.0.
— Gateway: Enter 10.1.4.1.
6. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
7. Click Finish.
The setup of the HA pair is complete. From now on, when you make an HTTPS connection to the HA pair, use the VIP
address 10.1.4.10.
Networks
You can create all the subnetworks individually (which in this example are 10.1.1.0/24, 10.1.2.0/24, 10.1.4.0/24,
and 10.1.5.0/24), or you can create a parent network (10.1.0.0/16) that encompasses all the subnetworks and then
use the Infoblox split network feature to create the individual subnetworks automatically. The split network feature
accomplishes this by using the IP addresses that exist in the forward-mapping zones to determine which subnets it
needs to create. This example uses the split network feature. For information about creating networks, see
Configuring IPv4 Networks on page 1111.
1. From the Data Management tab, select the IPAM tab, and then click Add -> Add IPv4 Network from the Toolbar.
2. In the Add Network wizard, complete the following:
— Address: 10.1.0.0
— Netmask: Use the netmask slider to select the /16 (255.255.0.0) netmask.
3. Click Next to select a server. Click the Add icon. Grid Manager displays ns3.corp100.com in the table.
4. Click Save & Close.
5. In the IPAM tab, select the 10.1.0.0/16 check box, and then select Split from the Toolbar.
DHCP Ranges
1. From the Data Management tab, select the DHCP tab -> Networks tab -> 10.1.1.0/24, and then click Add -> DHCP
Range from the Toolbar.
2. In the Add Range wizard, complete the following:
Start: 10.1.1.10
End: 10.1.1.50
3. Click Next, and then select Server, Grid Manager displays ns3.corp100.com as the assigned member.
4. Click Save & Close.
5. In the Networks tab, click 10.1.2.0/24, and then click Add -> DHCP Range from the Toolbar.
6. In the Add Range wizard, complete the following:
Start: 10.1.2.10
End: 10.1.2.50
7. Click Next, and then select Server, Grid Manager displays ns3.corp100.com as the assigned member.
8. Click Save & Close.
Infoblox Hosts
Defining both a MAC and IP address for an Infoblox host definition creates a DHCP host entry—like a fixed address—
that you can manage through the host object. To add a MAC address to each host record that the appliance created
when you imported forward- and reverse-mapping zone records:
1. From the Data Management tab, select the IPAM tab -> 10.1.1.0/24 -> 10.1.1.2.
2. In the Related Objects tab, select the check box of the host record, and then click the Edit icon.
3. In the Host Record editor, click the MAC Address field, and then enter the following:
— MAC Address: 00:00:00:aa:aa:aa
4. Click Save & Close.
5. Follow steps 1 – 4 to modify hosts with the following information:
printer2
— IP Address: 10.1.2.2
— MAC Address: 00:00:00:bb:bb:bb
storage1
— IP Address: 10.1.4.2
— MAC Address: 00:00:00:dd:dd:dd
storage2
— IP Address: 10.1.4.3
— MAC Address: 00:00:00:ee:ee:ee
proxymail
— IP Address: 10.1.4.4
— MAC Address: 00:00:00:ff:ff:ff
proxyweb
— IP Address: 10.1.4.5
— MAC Address: 00:00:00:11:11:11
www
— IP Address: 10.1.5.5
— MAC Address: 00:00:00:55:55:55
mail
— IP Address: 10.1.5.6
— MAC Address: 00:00:00:66:66:66
ftp
— IP Address: 10.1.5.7
— MAC Address: 00:00:00:77:77:77
3. Save the configuration and click Restart if it appears at the top of the screen.
Each of the forwarders is assigned a random response time. The appliance sends the initial outbound query to the
forwarder that has the lowest response time. If the first forwarder does not reply, the appliance tries the one with the
next lowest random response time. The appliance adjusts and keeps track of the response times of the forwarders,
and uses the quicker one for future queries. If the quicker forwarder does not respond, the appliance then uses
another one.
Firewall
For example, enter the following commands on a Juniper firewall running ScreenOS 4.x or later:
DHCP Relay Configuration
set address trust ns3 10.1.4.10/32
set interface ethernet2 dhcp relay server-name 10.1.4.10
set policy from dmz to trust ns1 ns3 DHCP-Relay permit
DNS Forwarding
set interface ethernet1 mip 1.1.1.8 host 10.1.4.10
set policy from trust to untrust ns3 ns2 dns permit
set policy from trust to dmz ns3 ns1 dns permit
NTP
set policy from dmz to untrust ns1 ntp_server ntp permit
Router
For example, enter the following commands on a Cisco router running IOS for release 12.x or later:
DHCP Relay Configuration
interface ethernet1
ip helper-address 10.1.4.10
interface ethernet2
ip helper-address 10.1.4.10
Tip: To minimize the chance of duplicate IP address assignments during the transition from the legacy DHCP server
to the appliance, shorten all lease times to a one-hour length in advance of the DHCP server switch. Then, when
you take the legacy DHCP server offline, the DHCP clients quickly move to the new server when their lease
renewal efforts fail and they broadcast DHCPDISCOVER messages. To determine how far in advance you need to
shorten the lease length, find the longest lease time (for example, it might be two days). Then change the lease
length to one hour at a slightly greater interval of time before you plan to switch DNS service to the appliance
(for example, three days before the switch over). By changing the lease length this far in advance, you can be
sure that all DHCP leases will be one-hour leases at the time of the switch-over. If the longest lease length is
longer—such as five days—and you want to avoid the increased amount of traffic caused by more frequent lease
renewals over a six-day period, you can also employ a stepped approach: Six days before the switch-over,
change the lease lengths to one-day leases. Then two days before the switch-over, change them to one-hour
leases.
1. Open an Internet browser window, enter https://10.1.4.10, and then log in to the appliance using the username
admin and password SnD34n534.
2. From the Data Management tab, select the DHCP tab, and then click Start from the Toolbar.
3. In the Start Member DHCP Service dialog box, click Yes.
The HA pair is ready to provide DHCP service to the network.
4. Take the legacy DHCP server at 10.1.4.11 offline.
When the DHCP clients are unable to renew their leases from the legacy DHCP server, they broadcast
DHCPDISCOVER messages to which the new DHCP server responds.
Logs
The following are some useful information:
• Logs, as described in Monitoring the Appliance on page 1325.
— Audit Log – Contains administrator-initiated events.
— System Log – Contains events related to hardware and software operations.
• DNS statistics, as described in Configuring DNS Services on page 751.
— DNS Configuration – Contains DNS server settings for the Infoblox DNS server.
— Zone Statistics – Contains the results of all DNS queries per zone.
• DHCP information, as described in Configuring DHCP Properties on page 1069.
— DHCP Configuration – Contains DHCP server settings and network, DHCP range, and host settings for the
Infoblox DHCP server.
— DHCP Leases – Contains a real-time record of DHCP leases.
— DHCP Lease History – Contains an historical record of DHCP leases.
— DHCP Statistics – Contains the number of currently assigned static and dynamic addresses, and the high
and low watermarks per network.
— Network Statistics – Contains the number of static hosts, dynamic hosts, and available hosts per network.
Independent HA Pair
1. Make an HTTPS connection to the VIP address of the HA pair, log in, and check the status of both nodes.
2. From the Dashboard, check the appliance status in the System Status widget. For information, see Member
Status (System Status) on page 147.
— If the Status icon is green, both nodes have connectivity with each other and are operating properly.
— If the Status icon is yellow, the two nodes are in the process of forming an HA pair.
— If the Status icon is red, the passive node is offline or there is a problem. To determine what it is, look at the
system log file by selecting the Administration tab -> Logs tab -> Syslog. You can also gather information
from the System tab -> System Manager tab. For information, refer to the online Help.
made to objects on individual Cloud Platform Appliances are synchronized with the Grid Master in near real time
using Grid replication to provide centralized visibility while retaining distributed processing capability. If a Cloud
Platform Appliance is not authoritative for the object referenced in the cloud API requests, it automatically proxies
that request to the Cloud Platform Appliance that is authoritative for the object or to the Grid Master (if it is
authoritative for the object). Similarly, cloud API requests made to the Grid Master are proxied to the authoritative
Cloud Platform Appliance or processed locally on the Grid Master if it is authoritative for the object. For information
about authority delegation for supported objects, see About Authority Delegation on page 376. For information
about proxying cloud API requests, see Proxying Cloud API Requests on page 374.
Cloud API requests are processed through the cloud API service that operates on the Cloud Platform Appliance. This
service can also be enabled on the Grid Master as well as other Cloud Platform Appliances. The cloud API service is
HTTPS-based; therefore, to ensure that the cloud API service functions properly, port 443 for HTTPS connectivity must
be open between the CMP and each Cloud Platform Appliance and/or the Grid Master receiving the cloud API
requests. To ensure that the proxying function works properly, port 443 for HTTPS must be open bi-directionally
between each of the Cloud Platform Appliances as well as between each Cloud Platform Appliance and the Grid
Master. You must also configure your firewalls and ACLs accordingly. Note that this service uses the VIP address on
each Infoblox appliance as the destination address.
All objects created, modified, or deleted by the cloud adapter are reflected in the NIOS database. You can view cloud
objects and their associated data in the Cloud tab of Grid Manager if the Cloud Network Automation license is
installed on the Grid Master. For more information, see Viewing Cloud Objects on page 388. Note that it is possible
to use Cloud Platform Appliances without deploying the Cloud Network Automation license. However, without the
Cloud Network Automation license, VM and tenant information is only displayed as extensible attributes associated
with IPAM, DHCP, and DNS objects in Grid Manager rather than in separate tables under the Cloud Tab.
Before you can send cloud API requests to a Cloud Platform Appliance or the Grid Master, you must create admin
groups that have cloud API access. Only admin users that have cloud API access and applicable permissions may be
used for sending cloud API requests. If the Cloud Network Automation license is installed on the Grid Master, it is also
possible to assign Tenant permissions to admin users to restrict these users to only be able to view objects related
to a given tenant or a set of tenants. For information about admin groups and how to manage admin users, see
Managing Administrators on page 183.
Note that there is no current capability to bi-directionally synchronize NIOS data with CMP data. Therefore, cloud
information in NIOS is accurate only up to the point when specific cloud API requests are received by the Cloud
Platform Appliance from an adapter running on a CMP. Only cloud information obtained through API requests to the
Infoblox API service will be available in NIOS.
Note: Unlike standard WAPI requests, all cloud API related events are logged to the NIOS syslog instead of the NIOS
audit log.
HTTPS NIOS
Connectivity Database
Cloud
Administrator Cloud
Platform
Appliance
1 The Cloud administrator makes a HTTPS
change to the cloud such as Connectivity
creating a network or a new VM. Grid
Cloud
Platform
Note: To ensure that the cloud API service is Appliance
functioning properly, open up port 443 for Cloud Platform
HTTPS connectivity and configure your Appliance
firewalls accordingly.
Licensing Requirements
To enable Cloud Network Automation, you must install valid licenses on the Grid Master and Cloud Platform Appliance
members. Depending on your deployment scenarios, you can take advantage of Elastic Scaling to automatically
deploy virtual cloud appliances, either inside or outside your CMP. For more information about Elastic Scaling and
how to use it, see About Elastic Scaling on page 486.
The following valid licenses are part of the Cloud Network Automation solution:
— Cloud Network Automation license on the Grid Master and Grid Master Candidate
— Cloud Platform license on the Cloud Platform Appliances
The license you install on the Grid Master enables the Cloud user interface functions in Grid Manager and Tenant
permissions. The license you install on the Cloud Platform Appliance enables the cloud API service on the Cloud
Platform Appliance.
Note that it is possible to use the Cloud Network Automation solution only with the Cloud Network Automation license
or with one or more Cloud Platform Appliances. In the case when only the Cloud Network Automation license is
installed on the Grid Master, all cloud API requests are sent to the Grid Master instead of to individual Grid members.
Creation of cloud objects through cloud API requests is visible in the Cloud tab of Grid Manager on the Grid Master.
When Cloud Platform Appliances are used without the Cloud Network Automation license, cloud API requests are
sent either to the Cloud Platform Appliances or to the Grid Master. However, the Cloud tab in Grid Manager is not
available on the Grid Master for viewing cloud objects created through cloud API requests.
You can also use the CLI command set temp_license to generate and install temporary licenses. This provides
licensed features and functionality for the interim, while you wait for your permanent licenses to arrive. For
information about how to install a temporary license, see Adding Temporary Licenses on page 483. Note that the
temporary license is only effective on the Grid Master, not the Grid Master Candidate.
For an HA pair, ensure that you use the same appliance models for both nodes and install the Cloud Platform license
on both nodes as well. For information about supported models, see Supported Cloud Platform Appliance Models on
page 367. If a failover occurs and the passive node does not have a valid license, the cloud API service will stop and
all resource delegations to the Cloud Platform Appliance will also stop.
Note that the Cloud Network Automation license on the Grid Master is incompatible with the following licenses:
— Multi-Grid Manager
— Reporting
Cloud Platform licenses are only supported on Cloud Platform Appliances. They may not be installed on any other
Infoblox physical or virtual appliances. The following licenses and functionality are not supported on the Cloud
Platform Appliances:
— Microsoft Management
— Multi-Grid Management
— Network Insight
— Reporting
— Tiered DNS Cache Acceleration
— DNS Cache Acceleration
— Load Balancing
— Infoblox External DNS Security
— RIR (Regional Internet Registry)
Before you install or remove the Cloud Platform license, consider the following:
• Installing or removing the Cloud Platform license stops the cloud API service.
• When you remove the Cloud Platform license from the appliance, it still serves DNS and DHCP if those
licenses are installed on the appliance. However, the appliance will no longer be able to run the cloud API
service. In addition, you cannot delegate authority to this member for objects that have not already been
delegated to this appliance. Existing delegations to this member remain in the NIOS database, but API
requests proxied from other Cloud Platform Appliances or from the Grid Master will fail.
Licensing Configurations
Depending on your Grid configuration and how you want to deploy Cloud Network Automation, Infoblox supports the
following licensing configurations. For information about cloud licenses and how to install them, see Licensing
Requirements on page 364.
• In an Infoblox Grid, the Grid Master has the Cloud Network Automation license installed and the Cloud
Platform Appliance has the Cloud Platform license installed: The Grid Master can process both regular
RESTful API and cloud API requests and the Cloud Platform Appliance can process cloud API requests. With
the Cloud Platform license installed, cloud API requests can be proxied among the Grid Master and Cloud
Network Appliances based on the delegation authority of the referenced objects. You can also manage the
cloud API service and cloud objects through the Cloud tab in Grid Manager
• In an Infoblox Grid, the Grid Master does not have the Cloud Network Automation license installed but the
Cloud Platform Appliance has the Cloud Platform license installed: The Grid Master can process both
regular RESTful API and cloud API requests and the Cloud Platform Appliance can process cloud API
requests. With the Cloud Platform license installed, cloud API requests can be proxied among the Grid
Master and Cloud Network Appliances based on the authority delegation of the referenced objects. Without
the Cloud Network Automation license however, only objects whose authority has been delegated to Cloud
Platform Appliances can be managed through Grid Manager. You will not have visibility of cloud objects,
such as tenant information, through Grid Manager because the Cloud user interface function (the Cloud
tab) is not available without the Cloud Network Automation license. You may manage cloud objects and
their respective data through cloud API requests.
• In an Infoblox Grid with other Grid members but without Cloud Platform Appliances, the Grid Master has the
Cloud Network Automation license installed: The Grid Master can process both regular RESTful API and
cloud API requests. You can also manage cloud objects through the Cloud tab in Grid Manager.
• Standalone Grid Master with the Cloud Network Automation license installed: The appliance can process
both regular RESTful API and cloud API requests. You can also manage the cloud API service and cloud
objects through the Cloud tab in Grid Manager.
• Standalone Grid Master without the Cloud Network Automation license installed: The appliance can
process only regular RESTful API requests, but not cloud API requests. You cannot manage the cloud API
service nor cloud objects through Grid Manager because the Cloud user interface function (the Cloud tab) is
not available.
The following table summarizes the supported licensing scenarios:
Administrative Permissions
You must define admin users and their permissions in the admin group and assign specific roles to it before you can
use these admin users to send cloud API requests. You can also define object permissions to specific admin groups
or admin users so they can manage specific objects through cloud API requests. For more information, see About
Admin Accounts on page 186 and About Admin Groups on page 188.
Depending on where a cloud API request is sent and whether the scope of delegation for an object is explicit or
implicit, permissions configured for the admin user and object may or may not apply. In addition, depending on the
objects referenced in cloud API requests, specific restrictions may apply. For supported objects and their restrictions,
see Supported Cloud API Objects on page 370.
For cloud API requests, admin permissions are applied based on the delegation status of the objects referenced in
the requests. If an object is not delegated (owned by the Grid Master) and the cloud API request is sent directly to the
Grid Master or proxied to the Grid Master, all applicable admin and object permissions apply. On the other hand, if
authority for an object referenced in a cloud API request is explicitly delegated to a Cloud Platform Appliance and the
request is sent to this appliance, the admin user has full permission for this object within the scope of delegation. In
this case, specific permissions configured for the admin user and the referenced object are ignored. For more
information about admin and object permissions, see About Administrative Permissions on page 195.
It is important to note that once you delegate authority of an object to the Cloud Platform Appliance, specific admin
and object permissions are not enforced. Therefore, if you do not want certain objects to be created or modified
through a cloud API request, do not delegate the authority of these objects and their parent objects to a Cloud
Platform Appliance. For example, if you do not want host records to be created through cloud API requests, do not
delegate the authority of the relevant networks, zones, or both to the Cloud Platform Appliance.
On the other hand, if you want the ability to restrict permissions for specific objects referenced in cloud API updates,
you can create different admin groups or admin users that are authorized to make cloud API updates on respective
Cloud Platform Appliances. The following example illustrates this capability.
Configuration Example
If you want to restrict the creation and modification of records for networks 10.10.10.0/24 and 10.10.20.0/24
through cloud API updates, do the following:
1. Create two admin users APIUser1 and APIUser2 in an admin group.
2. Delegate the authority of network 10.10.10.0/24 to Cloud Platform Appliance 1 (CP1) and 10.10.20.0/24 to
Cloud Platform Appliance 2 (CP2).
3. On CPI, add APIUser1 and on CP2, add APIUser2 to the list of administrators that can send cloud API
requests, as described in Configuring Grid and Member Cloud API Properties on page 385.
Now when you use APIUser1 to send cloud API requests, you can add and modify records for network
10.10.10.0/24, but you cannot do so for network 10.10.20.0/24. Conversely, you can add and modify records for
network 10.10.20.0/24 only when you use APIUser2.
Note: Cloud Platform Appliances do not support auto-provisioning. Pre-provisioning is supported for DNS and DHCP
data. For information about pre-provisioning Cloud Platform Appliances, see Pre-Provisioning NIOS and vNIOS
Appliances on page 309.
• Communication between the cloud adapter and the Grid Master, or between Cloud Platform Appliances and
the Grid Master. This cloud API service processes requests received directly from the cloud adapter or
processes requests received by other Cloud Platform Grid members.
The admin users that you use to send cloud API requests must have applicable access to the cloud API in order for
the API requests to be processed. For information about admin groups, see Managing Admin Groups and Admin Roles
on page 193.
Note: For the cloud API service to function properly, configure your networks and firewalls accordingly to allow port
443 HTTPS connectivity between the cloud adapter and Cloud Platform Appliance, between the cloud adapter
and the Grid Master (if applicable), between the Grid Master and Cloud Platform members, and between each
Cloud Platform member.
If you are using the AWS API Proxy to send API requests, ensure that you understand how to set up and configure the
proxy. For detailed information, refer to the Infoblox Installation Guide for vNIOS for AWS.
When implementing Cloud Network Automation in AWS, you can use Elastic Scaling to allocate and deallocate
dynamic licenses and automatically spin up vNIOS Grid members and join them to the Grid. You can purchase and
install NIOS feature licenses in advance and store them in a license pool container on the Grid Master. You can then
decide when and how to automatically provision and configure vNIOS for AWS cloud virtual appliances. When you
remove a vNIOS cloud appliance, the licenses on this appliance are released and returned to the license pool and are
available for the next deployment. For more information about Elastic Scaling, see About Elastic Scaling on page 486.
In AWS (Amazon Web Services), you can create a VPC (Virtual Private Cloud) and a subnet using the same network
address and subnet mask. For example, you can add 172.29.02.0/24 as the VPC and 172.29.2.0/24 as the subnet
and create VMs in the subnet. However, you cannot add a network container and a network using the same network
address and subnet mask in NIOS. Therefore, when you send an API request to create such VPC and subnet in AWS,
NIOS recognizes only the VPC, not the subnet. As a result, you are not able to create VMs under the subnet. For more
information about how to create VPCs and subnets in AWS for NIOS, refer to the Infoblox Installation Guide for vNIOS
for AWS.
In addition, when you delegate authority for supported cloud objects, NIOS may process the requests differently
based on the following:
• How the object was first created.
• Whether authority for the object has already been delegated to a Cloud Platform Appliance.
For details about authority delegation and restrictions for each object, see About Authority Delegation on page 376.
Note: NIOS does not process cloud API requests that contain unsupported object types or any combination of
supported object types with unsupported methods and functions. Although you can use all the fields in a
supported object type, some restrictions may apply to supported values for some of these fields. For
restrictions, see the Comments field in Table 7.3 for the corresponding object.
Table 7.3 Supported Cloud API Objects for Cloud API Service
Note: The cloud API service does not support scheduling and workflow approval requests. Objects deleted
through a cloud API request are not stored in the Recycle Bin, except for DNS zones and network views.
For information about the Recycle Bin, see Using the Recycle Bin on page 73.
Supported Cloud API Object Allowed Operations in cloud Authority Delegation and Required
Object Type API Requests Restrictions Extensible
Attributes in cloud
API Requests (for
creations only)
Network View networkview Read, Create, Modify, Delete See Network Views on Tenant ID
page 378 for information Cloud API Owned
about authority CMP Type
delegation.
IPv4 Network networkcontainer Read, Create, Modify, Delete Split network, join Tenant ID
Container Function: networks, and RIR related Cloud API Owned
next_available_network operations are not CMP Type
supported. See IPv4 and
IPv6 Networks and
Network Containers on
page 378 for information
about authority
delegation.
IPv6 Network ipv6networkcontainer Read, Create, Modify, Delete Split network, join Tenant ID
Container Function: networks, and RIR related Cloud API Owned
next_available_network operations are not CMP Type
supported. See IPv4 and
IPv6 Networks and
Network Containers on
page 378 for information
about authority
delegation.
Supported Cloud API Object Allowed Operations in cloud Authority Delegation and Required
Object Type API Requests Restrictions Extensible
Attributes in cloud
API Requests (for
creations only)
IPv4 Network network Read, Create, Modify, Delete Split network, join Tenant ID
Function: next_available_ip networks, and RIR related Cloud API Owned
operations are not CMP Type
supported. See IPv4 and
IPv6 Networks and
Network Containers on
page 378 for information
about authority
delegation.
IPv6 Network ipv6network Read, Create, Modify, Delete Split network, join Tenant ID
Function: next_available_ip networks, and RIR related Cloud API Owned
operations are not CMP Type
supported. See IPv4 and
IPv6 Networks and
Network Containers on
page 378 for information
about authority
delegation.
IPv4 DHCP range Read, Create, Modify, Delete See DHCP Ranges on Tenant ID
Range Function: next_available_ip page 380 for information Cloud API Owned
about authority CMP Type
delegation.
IPv6 DHCP ipv6range Read, Create, Modify, Delete See DHCP Ranges on Tenant ID
Range Function: next_available_ip page 380 for information Cloud API Owned
about authority CMP Type
delegation.
IPv4 Fixed fixedaddress Read, Create, Modify, Delete See IPv4 and IPv6 Fixed Tenant ID
Address Function: next_available_ip Addresses on page 381 Cloud API Owned
(Reservation) You can also create and for information about CMP Type
delete through Grid Manager. authority delegation.
All required Cloud EAs are
automatically populated in
the GUI.
IPv6 Fixed ipv6fixedaddress Read, Create, Modify, Delete See IPv4 and IPv6 Fixed Tenant ID
Address Function: next_available_ip Addresses on page 381 Cloud API Owned
(Reservation) You can also create and for information about CMP Type
delete through Grid Manager. authority delegation.
All required Cloud EAs are
automatically populated in
the GUI.
DNS View view Read, Modify See DNS Views on page N/A
382 for information about
authority delegation.
DNS Zone zone_auth Read, Create, Modify, Delete See DNS Zones on page Tenant ID
382for information about Cloud API Owned
authority delegation. CMP Type
Supported Cloud API Object Allowed Operations in cloud Authority Delegation and Required
Object Type API Requests Restrictions Extensible
Attributes in cloud
API Requests (for
creations only)
Host Record record:host Read, Create, Modify, Delete See Host Records on page Tenant ID
You can also create and 384 for information about Cloud API Owned
delete through Grid Manager. authority delegation. CMP Type
All required Cloud EAs are
automatically populated in
the GUI.
Resource record:a Read, Create, Modify, Delete See DNS Resource Tenant ID
Record Function: next_available_ip Records on page 384 for Cloud API Owned
information about CMP Type
record:aaaa Read, Create, Modify, Delete authority delegation.
Function: next_available_ip
Grid Member member Read only API requests calling for N/A
Function: restartservices service restarts on a Grid
member can be
processed by the Cloud
Platform Appliance only if
the member requested is
also the Cloud Platform
Appliance processing the
request.
Supported Cloud API Object Allowed Operations in cloud Authority Delegation and Required
Object Type API Requests Restrictions Extensible
Attributes in cloud
API Requests (for
creations only)
Extensible extensibleattributedef Read only You can use cloud N/A
Attribute attributes as source
objects to obtain the next
available IP address or
network. When doing so,
you must also include the
respective network view
for the object.
To ensure that the proxying mechanism functions properly, configure your systems to allow for the following
communication:
— Allow all HTTPS connectivity among the Cloud Platform Appliances as well as to the Grid Master based on
your organization’s firewall requirements.
— Ensure that you use the VIP or the MGMT address if it is enabled (including that for the Grid Master) as the
destination IP for the HTTPS connectivity. Note that this is a per member setting.
— Grant appropriate permissions to admin groups with cloud API access to ensure that tasks for objects
outside of the delegation function properly on the Grid Master.
NIOS admin users who do not belong to admin groups with cloud API access are not allowed to create new cloud
objects, nor can they modify or delete existing cloud objects in delegated spaces; but they can modify the
permissions and certain extensible attribute values for these objects. Only admin users with cloud API access and
the correct global and object permissions can be used to send cloud API requests to create, modify, and delete
objects within the delegated scope.
Note: You can delegate authority only to Cloud Platform Appliances, but not to other Grid members.
Objects that are in queue for scheduled executions or approvals are locked and cannot be delegated. Authority
delegation and reclaiming of authority are subject to approval and can be scheduled.
• The Cloud Platform Appliance can run discovery on any network containers or networks that are reachable
by the appliance. The default discovery settings for network containers and networks are inherited from
their parent objects. For information about discovery, see About Discovery on page 619.
Note: Any Cloud Platform Appliances that are removed from the Grid automatically lose authority over objects
that were delegated to them. The Grid Master becomes authoritative for these objects.
Network Views
Consider the authority delegation guidelines in Table 7.4 when you create, modify, or delete a network view.
See Sample Cloud API Requests on page 374 for a sample cloud API request.
For information about how to create network views from the Grid Master, see Adding Network Views on page 1065.
DHCP Ranges
Consider the authority delegation guidelines in Table 7.6 when you create, modify, or delete a DHCP range.
See Sample Cloud API Requests on page 374 for a sample cloud API request.
For information about how to create IPv4 and IPv6 ranges, see Adding IPv4 Address Ranges on page 1122 and
Modifying IPv6 Address Ranges on page 1169.
For information about how to create IPv4 and IPv6 ranges using range templates, see Adding IPv4 Range Templates
on page 1143 and Adding IPv6 Range Templates on page 1151.
DNS Views
Consider the following authority delegation guidelines when you create, modify, or delete a DNS view:
• You cannot explicitly delegate authority for a DNS view. The Cloud Platform Appliance automatically gains
authority over any DNS view that exists in the network view whose authority is delegated to that appliance.
• You cannot create or delete a DNS view from the Cloud Platform Appliance.
• Through a cloud API request, you can update DNS views defined in a network view that has been delegated to
the Cloud Platform Appliance.
• You cannot create, modify, or delete a DNS view in network views that have been delegated to a Cloud Platform
Appliance through a standard API request.
• You cannot delete a DNS view as long as it contains at least one DNS zone that has been delegated to a Cloud
Platform Appliance.
DNS Zones
Consider the following authority delegation guidelines in Table 7.7 when you create, modify, or delete a DNS zone.
See Sample Cloud API Requests on page 374 for a sample cloud API request.
For information about how to create DNS zones, see About Authoritative Zones on page 829.
Host Records
Consider the following authority delegation guidelines in Table 7.9 when you create, modify, or delete a host record.
See Sample Cloud API Requests on page 374 for a sample cloud API request.
— None: When you select this, none of the admin users in admin groups with cloud API access can send cloud
API requests to the Grid Master or Cloud Platform Appliance.
— All: When you select this, all admin users in admin groups with cloud API access can send cloud API
requests to the Grid Master or cloud Platform Appliance. This is the default.
— Set of administrators: Select this to create a list of admin users, both remote and local, who can send cloud
API requests. Local users are users defined in admin groups with cloud API access. Remote users are users
who log in from other remote servers. These users will be authenticated before they can access the Grid
Master or Cloud Platform Appliance.
To add local users, click the Add icon and select Local. In the Cloud API Admin Selector, select an admin
user from the list. Grid Manager adds the selected user to the table. If you have only one cloud API user,
Grid Manager automatically adds this user to the table.
To add remote users, click the Add icon and select Remote. Grid Manager adds a row to the table. Click the
Admin column to add the username of the administrator. Note that the username you enter here must
match the username used on the remote server. Depending on the remote server type, you must create a
server group for these remote users and add the group to the admin authentication policy to ensure these
admin users can send cloud API requests. For information about how to configure admin server groups and
admin authentication policy, see About Remote Admins on page 211.
Click the Add icon again to add additional admin users.
Recycle cloud objects: This only applies to the Grid Master. Select this check box to enable the recycling of
cloud objects. This is selected by default.
3. Save the configuration.
Note: All cloud extensible attributes are displayed in the Administration tab -> Extensible Attributes tab in Grid
Manager.
Application Type String Indicates the application type, such as Web, DB, or
CRM.
Cloud API Owned List [True, False] This is read-only. Defines whether an object was
created by the cloud adapter.
CMP Type String This is read-only. Defines the type of CMP, such as
VMware or OpenStack.
Host Aggregates String
Is External List [True, False] This is read-only. Limited to the object type
Network and Network Container.
Is Shared List [True, False] This is read-only. Limited to the object type
Network and Network Container.
IP Type List [ Private, Public, Fixed, Floating, Type of IP address
Elastic]
Location String
Port Attached Device - String Device ID for associated device, such as OpenStack
Device ID or equivalent, in other CMPs.
Port Attached Device - String Device name for associated device, such as
Device Owner OpenStack or equivalent, in other CMPs (e.g.
compute:nova, network:dhcp, or
netowrk:router_interface.
Port Group String VMware or equivalent in other Hypervisors or
CMPs.
Port ID String Port ID for associated device, such as OpenStack or
equivalent, in other CMPs.
Segmentation ID String
Subnet ID String
You can modify some of the properties for the cloud extensible attributes, except for the read-only attributes. By
default, all cloud extensible attributes are configured to allow Read/Write access for the Cloud Platform Appliances.
You can change this configuration to read-only so the Cloud Platform Appliances can only access the attribute values,
but not modify them. Note that when you reference modification for a read-only attribute in a cloud API request, the
Cloud Platform Appliance returns an error because it cannot modify the attribute value. For information about how to
configure extensible attributes, see About Extensible Attributes on page 417.
Note: An upgrade could fail if the name of an existing extensible attribute matches the name of any of the cloud
extensible attribute for a different object type. You must define values for all required cloud extensible
attributes in a cloud API request.
Note: Since a VM can be defined by objects from different network views, the same IP address may appear multiple
times if it has been defined in more than one network view. A VM object is a read-only abstract object,
therefore you cannot create, modify, or delete it.
After a vDiscovery job is completed, the appliance displays discovered data for each VM in this tab. Available data is
displayed based on the vDiscovery configuration and your CMP. For example, if your CMP is AWS, discovered data can
include the VPC to which the VM belongs. You can click a VM name and drill down to the Networks and IP Addresses
sub tabs to view networks and IP addresses associated with the selected VM. For more information about vDiscovery,
see Configuring vDiscovery Jobs on page 630.
Note that in addition to managing discovered data through Grid Manager, you can clear any managed or unmanaged
discovered data, or clear all discovery data related to a vDiscovery job through a cloud API request. You can use this
feature to properly identify VMs that you spin up or de-provision through a cloud adapter. For example, when you use
Infoblox IPAM Plug-In for VMware as the cloud adapter to de-provision a VM, you can send a cloud API call to remove
the discovered data for this VM so you can avoid IP address conflict with IP addresses manually allocated by the
VMware vCenter. For information about cloud API requests, see About Cloud API Requests on page 369.
In the VMs tab, discovered VMs are highlighted in different background colors, as follows:
• Yellow: Unmanaged VMs that do not have associated NIOS objects.
• White: Discovered VMs that have at least one associated NIOS object and there is no conflicting
information between the discovered data and the NIOS data.
• Red: Discovered VMs that have at least one associated NIOS object and there is conflicting information
between the discovered data and the NIOS data. Depending on the nature of the conflict, you can resolve
them as described in Resolving Conflicting Addresses on page 647. You may also be able to convert or
clear unmanaged data, as described in Managing Unmanaged Data on page 645.
To view all VM objects in NIOS:
1. From the Cloud tab, click the VMs tab.
2. Grid Manager displays the following information for all cloud VM by IP address:
• Actions: Click the action icon (shown as a gear in each row) next to a selected tenant and select the
action you want to perform.
• Mgmt Platform: Displays the CMP to which this tenant belongs. This can be Amazon, OpenStack, or
VMware.
• VM Name: The name of the VM.
• VM ID: The unique tenant ID to which this VM belongs.
• Networks: The number of networks that belong to this VM.
• IP Address: The IP address of the VM.
• VM VPC: The VPC to which this VM belongs.
• VM Tenant: The tenant to which this VM belongs.
• Port ID: The port ID for the VM.
• Network View: The network view to which this VM belongs.
• Active Users: The number of active users on the selected network.
Administrative Permissions
You can configure a named ACL at the Grid level and override it at the member and object level. Superusers and
limited-access users with Read/Write permission to All Named ACLs can create, modify, and delete named ACLs.
Users with Read-only permission to All Named ACLs can apply a named ACL to a supported object if they have
Read/Write permission to the respective object. Other users can only view named ACLs and their entries. For
information about admin permissions, see About Administrative Permissions on page 195.
Note: * Zone transfers for Microsoft servers do not support named ACLs. However, you can still use individual ACEs
to configure access control. For more information about how to configure zone transfer settings for Microsoft
servers, see Setting Zone Properties on page 1288. In addition, the DNSone 2.x TSIG key supports only the
“Allow” permission. You cannot change “Allow” to “Deny.”
Note: The Order field in the table displays the position of each entry based on the order it is placed in the list.
You can modify this number to change the order of an ACE. You can also select the ACE check box and use
the up and down arrows next to the table to place the entry in the desired position.
4. Click Next to enter extensible attributes for the named ACL. For information, see About Extensible Attributes on
page 417.
5. Save the configuration.
Note: When you click the Validate icon in the Add Named ACL wizard or Named ACL editor, the appliance validates
all the entries in the named ACL, even if you have selected only one or a few entries in the wizard or editor.
Example 1
You configure a named ACL “foo” that includes a Deny permission to 10.0.0.0/16. You then assign “foo” to DNS zone
transfers. You later import an “Allow/10.0.0.0/24” entry to “foo” through CSV import. The appliance appends the
entry to the end of “foo.” When you perform an ACL validation on “foo” after a DNS service restart, the appliance
displays a warning message indicating that the new “Allow/10.0.0.0/24” entry is now included in the previously
configured “Deny/10.0.0.0/16” entry. Since DNS service works on a first-match access control basis, zone transfers
will not be allowed for the 10.0.0.0/24 network, which is probably not your original intent. You can then modify the
named ACL to correct this error. On the other hand, if you do not perform the ACL validation, the appliance is not
notified about the new network entry in “foo.” As a result, you are not notified about the denial of zone transfers to
10.0.0.0/24.
Example 2
You add a nested named ACL “bar” as the first entry to the named ACL “foo.” You then add a “Deny All” entry right
after “bar” (as the second entry). You later import a new “Allow All” entry to “bar” through CSV import. The “Allow
All” entry will be appended to the end of “bar.” When you perform an ACL validation on “foo” after the CSV import,
the appliance detects a conflict between the “Allow All” (in “bar”) and “Deny All” (right after “bar”) permissions and
displays a warning. Imagine if you do not perform the ACL validation on “foo,” the appliance is not notified about the
new “Allow All” entry in “bar” and therefore cannot detect the conflict between the “Allow All” and “Deny All” entries.
As a result, almost all hosts will get zone transfers, which may not be the outcome you have intended.
Note: It is important that you manually validate each named ACL after a CSV import to ensure data and performance
integrity. The appliance does not automatically perform ACL validation.
Note: It may take a long time to validate a named ACL that contains a large number of ACEs.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Print and export data in this tab.
Note: You cannot delete a named ACL that has been applied to an operation or is currently in use by another
operation.
Note: If you disable access control or select None or Any for an operation, the appliance removes the previously
applied named ACL or the configured anonymous ACEs. To avoid losing your ACE configuration, Infoblox
recommends that you convert the ACEs to a named ACL.
For information about how to apply access control to each supported operation, see the following:
• DNS zone transfers, as described in Enabling Zone Transfers on page 788
• DNS queries, as described in Controlling DNS Queries on page 767
• Recursive queries, as described in Enabling Recursive Queries on page 769
• Dynamic DNS updates, as described in Enabling DNS Servers to Accept DDNS Updates on page 928
• AAAA filtering, as described in Controlling AAAA Records for IPv4 Clients on page 770
• Blackhole list, as described in Configuring a DNS Blackhole List on page 794
• Match clients list for DNS views, as described in Defining Match Clients Lists on page 815
• Match destinations for DNS views, as described in Defining a Match Destinations List on page 817
• DNS64 clients, DNS64 mapped IPv4 addresses, and DNS64 excluded IPv6 addresses, as described in Setting
DNS64 Group Properties on page 800
• File distribution services, as described in Configuring Access Control for File Distribution on page 508
• Grid Manager and API access, as described in Configuring Security Features on page 440
• NTP access control, as described in Defining NTP Access Control on page 414
• Syslog proxy access, as described in Configuring Syslog for Grid Members on page 1339
Note: You cannot manually set the date and time if the NTP service is enabled.
To set the time and date for a Grid using the Grid Properties editor:
1. From the Grid tab, select the Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
2. In the General tab of the Grid Properties editor, complete the following:
— Date: Click the calendar icon to select a date or enter the date in YYYY-MM-DD format.
— Time: Click the clock icon to select a time or enter the time in HH:MM:SS format. For afternoon and evening
hours, use the integers 13-24.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: Changing the date and time resets the application and terminates the management session.
Note: Changing the time zone does not reset the application nor does it terminate the management session.
Red The NTP service is not running properly. View the corresponding description for additional
information.
NTP (Network Time Protocol) is a standard protocol that system clocks use to ensure their time is always accurate.
Appliances that use NTP try to get their time as close as possible to UTC (Coordinated Universal Time), the standard
timescale used worldwide. NTP uses UDP (User Datagram Protocol) on port 123 for communications between clients
and servers.
NTP is based on a hierarchy where reference clocks are at the top. Reference clocks use different methods such as
special receivers or satellite systems to synchronize their time to UTC. NTP servers on the first level of the hierarchy
synchronize their time with the reference clocks, and serve time to clients as well. Each level in the hierarchy is a
stratum; stratum-0 is a reference clock. Stratum-1 servers synchronize their clocks with reference clocks. Stratum-2
servers synchronize their clocks with stratum-1 servers, and so forth. The stratum number indicates the number of
levels between the NTP server and the reference clock. A higher stratum number could indicate more variance
between the NTP server and the reference clock.
You can configure a NIOS appliance to function as an NTP client that synchronizes its clock with an NTP server. For
more information, see NIOS Appliances as NTP Clients on page 408. NTP clients typically use time information from
at least three different sources to ensure reliability and a high degree of accuracy. There are a number of public NTP
servers on the Internet with which the NIOS appliance can synchronize its clock. For a list of these servers, you can
access http://www.ntp.org. When NTP is configured, it listens on all interfaces, including the loopback interface on
the NIOS appliance.
In a Grid, the Grid Master and Grid members can function as NTP clients that synchronize their clocks with external
NTP servers. They can in turn function as NTP servers to other appliances in the network. For more information, see
NIOS Appliances as NTP Servers on page 413. Note that when the Grid Master functions as an NTP server, it
synchronizes its local clock with its NTP clients and does not synchronize time with any other external NTP server.
This allows you to deploy multiple NTP servers to ensure accurate and reliable time across the network. To configure
the Grid Master and Grid members as NTP clients, you must first enable the NTP service and configure external NTP
servers at the Grid level. You can then configure the Grid Master and Grid members to override the Grid-level NTP
servers and use their own external NTP servers. Note that a Grid member will not function as an NTP client if you do
not enable the NTP service at the Grid level. A Grid member synchronizes its clock with the Grid Master if you do not
configure it to use external NTP servers.
Figure 8.1 illustrates how NIOS appliances (the Grid Master and Grid members) in a Grid function as the NTP server
or the NTP client, depending on your NTP configuration.
Note: The NTP service supports both IPv4 and IPv6 networks.
Internet
VPN
As an NTP client, Grid Member 1 Grid Tunnel
synchronizes its clock with the Grid Member 1
Master. It also functions as a
stratum-3 NTP server to external
devices on its network.
2 Network
1 Network
Authenticating NTP
To prevent intruders from interfering with the time services on your network, you can authenticate communications
between a NIOS appliance and a public NTP server, and between a NIOS appliance and external NTP clients. NTP
communications within the Grid go through an encrypted VPN tunnel, so you do not have to enable authentication
between members in a Grid.
NTP uses symmetric key cryptography, where the server and the client use the same algorithm and key to calculate
and verify a MAC (message authentication code). The MAC is a digital thumbprint of the message that the receiver
uses to verify the authenticity of a message.
As shown in Figure 8.2, the NTP client administrator must first obtain the secret key information from the
administrator of the NTP server. The server and the client must have the same key ID and data. Therefore, when you
configure the NIOS appliance as an NTP client and want to use authentication, you must obtain the key information
from the administrator of the external NTP server and enter the information on the NIOS appliance. When you
configure a NIOS appliance as an NTP server, you must create a key and send the key information to clients in a secure
manner. A key consists of the following:
• Key Number: A positive integer that identifies the key.
• Key Type: Specifies the key format and the algorithm used to calculate the MAC (message authentication code)
of a message.
— M: The key is a 1-31 character ASCII string using MD5 (Message Digest).
— S: The key is a 64-bit hexadecimal number in DES (Data Encryption Standard) format. The high order 7 bits
of each octet form the 56-bit key, and the low order bit of each octet is given a value so that the octet
maintains odd parity. You must specify leading zeros so the key is exactly 16 hexadecimal digits long and
maintains odd parity.
— A: The key is a DES key written as a 1-8 character ASCII string.
— N: The key is a 64-bit hexadecimal number in NTP format. It is the same as the S format, but the bits in each
octet have been rotated one bit right so the parity bit is in the high order bit of the octet. You must specify
leading zeros and odd parity must be maintained.
• Key String: The key data used to calculate the MAC. The format depends on the Key Type you select.
When the NTP client initiates a request for time services to the NTP server, it creates the MAC by using the agreed
upon algorithm to compress the message and then encrypts the compressed message (which is also called a
message digest) with the secret key. The client appends the MAC to the message it sends to the NTP server. When the
NTP server receives the message from the client, it performs the same procedure on the message — it compresses
the message it received, encrypts it with the secret key and generates the MAC. It then compares the MAC it created
with the MAC it received. If they match, the server continues to process and respond to the message. If the MACs do
not match, the receiver drops the message.
Figure 8.2 NTP Client Administrator Obtaining Secret Key from NTP Server Administrator
MD5 or DES
When the NTP client sends a request for time Message Digest
services to the NTP server, it uses the agreed
Message upon algorithm and secret key to create the MAC Message
(message authorization code). It then sends the
MAC and message to the NTP server.
+
MAC MAC
Encrypted with
Secret Key
Note: You can configure NIOS appliance as NTP client in either IPv4, IPv6, or dual mode (IPv4 and IPv6) network
environment.
When you enable a NIOS appliance to function as an NTP client, you must specify at least one NTP server with which
the appliance can synchronize its clock. Infoblox recommends that you specify multiple NTP servers that synchronize
their time with different reference clocks and that have different network paths. This increases stability and reduces
risk in case a server fails. For a list of public NTP servers, you can access www.ntp.org.
When you specify multiple NTP servers, the NTP daemon on the appliance determines the best source of time by
calculating round-trip time, network delay, and other factors that affect the accuracy of the time. NTP periodically
polls the servers and adjusts the time on the appliance until it matches the best source of time. If the difference
between the appliance and the server is less than five minutes, the appliance adjusts the time gradually until the
clock time matches the NTP server. If the difference in time is more than five minutes, the appliance immediately
synchronizes its time to match that of the NTP server.
To secure communications between a NIOS appliance and an NTP server, you can authenticate communications
between the appliance and the NTP server. When you configure authentication, you must obtain the key information
from the administrator of the NTP server and enter the key on the appliance. For information, see Authenticating NTP
on page 406.
In a Grid, you can configure the Grid Master and Grid members to synchronize their clocks with external NTP servers.
When you enable the NTP service on the Grid, the Grid Master automatically functions as an NTP server to the Grid
members. A Grid member can synchronize its time with the Grid Master, an external NTP server, or another Grid
member. When Grid members synchronize their times with the Grid Master, the Grid Master and its members send
NTP messages through an encrypted VPN tunnel, as shown in Figure 8.3. When a Grid member synchronizes its time
with another Grid member, the NTP messages are not sent through a VPN tunnel.
Grid Member 2
synchronizes its clock with
VPN Tunnels a public NTP server. The
Grid Master serves as a
backup NTP server when
the member cannot reach
Grid Member 1 the public NTP server.
Grid Member 2
Note: To prevent intruders from interfering with the time services on your network, you can authenticate
communications between a Grid member and an external NTP server, as well as between a Grid member
and external NTP clients. NTP communications within the Grid go through an encrypted VPN tunnel, so you
do not have to enable authentication between the Grid Master and Grid members.
— Authentication Key: Select a key that you previously entered from the drop-down list.
— Click Add to add the NTP server to the list or Cancel to cancel the operation. In the table, you can configure
some of the following settings:
— Preferred: Select this to mark an external NTP server as the preferred NTP server. You can select only
one server as the preferred NTP server. NIOS uses the responses from this preferred server over
responses from other external NTP servers. A response from a preferred server will be discarded if it
differs significantly from the responses of other servers. Infoblox recommends that you select an NTP
server that is known to be highly accurate as the preferred server, such as one that has special time
monitoring hardware. Note that this option is enabled only when you have selected the check box
Synchronize the Grid with these External NTP Servers.
— Server: Displays the FQDN or IP address of the NTP server that you added.
— Authentication: When you enable authentication, this column displays Yes. Otherwise, it displays No.
— Key Number: Displays the authentication key that you have selected.
— BURST: Select this check box to configure the NTP client to send a burst of eight packets if the external
NTP server is reachable and a valid source of synchronization is available. The NTP client transmits
each packet at a regular interval of two seconds. After you add an NTP server and save the
configuration, the appliance will enable this option by default. When you deselect this check box, the
client sends a single packet only once to the server.
— IBURST: Select this check box to configure the NTP client to send a burst of eight packets if the external
NTP server is not reachable when the client sends the first packet to the server. The NTP client transmits
each packet at a regular interval of two seconds. After you add an NTP server and save the
configuration, the appliance will enable this option by default. When you deselect this check box, the
client sends a single packet only once to the server.
For information about adding NTP authentication keys, see Adding NTP Authentication Keys on page 410.
4. Save the configuration and click Restart if it appears at the top of the screen.
— NTP Server (FQDN or IP Address): Enter either the IP address or the resolvable host name of an NTP
server. You can view a list of public NTP servers at ntp.isc.org. To check whether the DNS server can
resolve the NTP server host name, click Resolve Name. You must have a DNS name resolver configured.
— Enable Authentication: Select this check box to enable authentication of NTP communications between
the external NTP server and the NIOS appliance (the Grid Master or Grid member in a Grid, an
independent NIOS appliance, or the active node in an independent HA pair).
Note: To prevent intruders from interfering with the time services on your network, you can authenticate
communications between a Grid member and an external NTP server, as well as between a Grid member and
external NTP clients. NTP communications within the Grid go through an encrypted VPN tunnel, so you do not
have to enable authentication between the Grid Master and Grid members.
— Authentication Key: Select a key that you previously entered from the drop-down list. Note that you
must enter authentication keys at the Grid level when you configure a Grid Master or Grid member to
use external NTP servers.
— Click Add to add the NTP server to the list or Cancel to cancel the operation. In the table, click Override
in the table to override configurable settings. To inherit the same properties as the Grid, click Inherit.
• Preferred: Select this to mark an external NTP server as the preferred NTP server. You can select
only one server as the preferred NTP server. NIOS uses the responses from this preferred server
over responses from other external NTP servers. A response from a preferred server will be
discarded if it differs significantly from the responses of other servers. Infoblox recommends that
you select an NTP server that is known to be highly accurate as the preferred server, such as one
that has special time monitoring hardware. Note that this option is enabled only when you have
selected the check box Synchronize this Member with other NTP Servers.
• Server: Displays the FQDN or IP address of the NTP server that you added.
• Authentication: When you enable authentication, this column displays Yes. Otherwise, it displays
No.
• Key Number: Displays the authentication key that you have selected.
• BURST: Select this check box to configure the NTP client to send a burst of eight packets if the
external NTP server is reachable and a valid source of synchronization is available. The NTP client
transmits each packet at a regular interval of two seconds. After you add an NTP server and save
the configuration, the appliance will enable this option by default. When you deselect this check
box, the client sends a single packet only once to the server.
• IBURST: Select this check box to configure the NTP client to send a burst of eight packets if the
external NTP server is not reachable when the client sends the first packet to the server. The NTP
client transmits each packet at a regular interval of two seconds. After you add an NTP server and
save the configuration, the appliance will enable this option by default. When you deselect this
check box, the client sends a single packet only once to the server.
Note: NTP members inherit NTP properties from the Grid. Click Override in the Member NTP Properties wizard to
override configurable settings. To inherit the same properties as the Grid, click Inherit.
For information about adding NTP authentication keys, see Adding NTP Authentication Keys on page 410.
4. Save the configuration and click Restart if it appears at the top of the screen.
Secret Keys
The Grid Master uses three public NTP The Grid members serve time to devices on
servers to calibrate its clock to the their networks. Each member uses symmetric
correct time. It uses symmetric key key encryption to secure NTP messages. Each
cryptography to secure NTP messages. member also has an access control list that
Internet defines which appliances can access the time
services. When a client that is not on the list tries
The Grid Master serves time to the Grid to access an appliance functioning as an NTP
members. All NTP communications server, the appliance ignores the message.
with the Grid go through the encrypted
VPN tunnels.
Grid Master
Access Control List
Grid Member
VPN
Grid Member
Tunnels
X
3 Network 2 Network
In addition, the NIOS appliance can accept queries from clients using ntpq, the standard utility program used to query
NTP servers about their status and operational parameters. You can specify from which clients the NIOS appliance is
allowed to accept ntpq queries. The appliance does not accept ntpq queries from any client, by default.
You can use an existing named ACL (access control list) or multiple ACEs (access control entries) to control which
clients can use the NIOS appliance as an NTP server, as well as those clients from which the appliance can accept
queries using ntpq. For information about access control, see Configuring Access Control on page 398.
To specify which clients can access the NTP service of a NIOS appliance and from which clients a NIOS appliance can
accept ntpq queries, and to enable or disable KoD, complete the following:
1. Grid: From the Grid tab, select the Grid Manager tab, expand the Toolbar and click NTP -> NTP Grid Config.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box. Expand the
Toolbar and click NTP -> NTP Member Config.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Access Control tab of the Grid or Member NTP Properties editor, select one of the following to configure NTP
access control:
— None: Select this if you do not want to configure access control for NTP service. When you select None, the
appliance allows all clients to access the NTP service. This is selected by default.
— Use Named ACL for Time only: Select this and click Select Named ACL to select a named ACL that contains
only IPv4 addresses and networks. NTP queries do not support TSIG key based ACEs. When you select this,
the appliance allows clients that have the Allow permission in the named ACL to use its NTP service. You
can click Clear to remove the selected named ACL. The appliance accepts ntpq queries from specified NTP
clients.
— Use Named ACL for Time + NTP Control (NTPQ): Select this and click Select Named ACL to select a named
ACL that contains only IPv4 addresses and networks. NTP queries do not support TSIG key based ACEs.
When you select this, the appliance allows clients that have the Allow permission in the named ACL to use
its NTP service, and for the appliance to accept ntpq queries from those clients as well. You can click Clear
to remove the selected named ACL.
— Use this set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the
following from the drop-down list. Depending on the item you select, Grid Manager either adds a row for the
selected item or expands the panel so you can specify additional information about the item you are
adding, as follows:
— IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IPv4 address. The
default permission is Allow, which means that the appliance allows access to and from this IPv4 client.
You cannot change the default permission. In the Service field, select Time only to allow this client for
using the NTP service on the appliance; or select Time + NTP Control (NTPQ) to also accept ntpq queries
from this client.
— IPv4 Network: Select this to add an IPv4 network. Click the Value field and enter the IPv4 network. The
default permission is Allow, which means that the appliance allows access to and from this IPv4
network. You cannot change the default permission. In the Service field, select Time only to allow this
network for using the NTP service on the appliance; or select Time + NTP Control (NTPQ) to also accept
ntpq queries from this network.
— IPv6 Address: Select this to add an IPv6 address. Click the Value field and enter the IPv6 address. The
default permission is Allow, which means that the appliance allows access to and from this IPv6 client.
You cannot change the default permission. In the Service field, select Time only to allow this client for
using the NTP service on the appliance; or select Time + NTP Control (NTPQ) to also accept ntpq queries
from this client.
— IPv6 Network: Select this to add an IPv6 network. Click the Value field and enter the IPv6 network. The
default permission is Allow, which means that the appliance allows access to and from this IPv6
network. You cannot change the default permission. In the Service field, select Time only to allow this
network for using the NTP service on the appliance; or select Time + NTP Control (NTPQ) to also accept
ntpq queries from this network.
— Any Address/Network: Select this to allow access to all IPv4 and IPv6 addresses and networks. The
default permission is Allow, which means that the appliance allows access to and from all IPv4 and
IPv6 clients. You cannot change the default permission. In the Service field, select Time only to allow
clients for using the NTP service on the appliance; or select Time + NTP Control (NTPQ) to also accept
ntpq queries from all clients.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
— Enable KoD: When you select this check box, the appliance (when acting as an NTP server) sends a KoD
(Kiss-o’-Death) packet to the NTP client if the client has exceeded the rate limit. The KoD packet contains the
stratum field set to zero and the ASCII string in the Reference Source Identifier field set to RATE, indicating
the packets sent by the client have been dropped by the server. When you clear the check box, the NTP
server drops the packets but does not send any KoD packet to the client. This check box is deselected by
default. For more information about KoD, see Enabling Kiss-o’-Death for NTP on page 416.
3. Save the configuration and click Restart if it appears at the top of the screen.
Monitoring NTP
When you enable the Grid to synchronize its time with external NTP servers, you can monitor the status of the NTP
service by checking the NTP status icons in the Member Services panel. To access the panel, from the Grid tab, select
the Grid Manager tab -> Members tab -> Grid_member check box, and then select the Manage Member Services icon
in the table toolbar of the Members tab.
The following are descriptions of the NTP status icons in the Members Services panel. The type of information that
can appear in the Description column corresponds to the SNMP trap messages. For information about the Infoblox
SNMP traps, see Chapter 37, Monitoring the Appliance, on page 1325.
Yellow The NTP service is enabled, and the appliance is synchronizing its time.
After you upgrade the Grid to 6.6.x or later, the color of the Grid status icon changes based on the following:
• If you activate an external synchronization, or start the NTP service using the Grid Manager, or do not configure
any external NTP servers, except local, then the NTP behavior remains the same and the NIOS appliance
displays the Grid status icon in green.
• If you activate an external synchronization and configure one or more external NTP servers, or if the servers are
in synchronization with the Grid Master, then the Grid status icon is as follows:
— Green: NTP is synchronizing with an external server.
— Red: NTP is synchronizing with the local server and none of the external NTP servers are reachable. This
status icon also indicates if there are problems with the NTP service.
— Yellow: NTP is synchronizing with the local server and at least one external NTP server is reachable; but
there could be problems on the external server, such as an exceeded root distance error.
You can use predefined extensible attributes or specify new ones for different objects. The appliance provides the
following predefined extensible attributes that you can customize:
• Region
• Country
• State
• Site
• Building
• VLAN
• ReportingSite (Report Clustering)
When you use a predefined attribute, you can modify it and change its name, but you cannot change the type of data
it accepts. You can also delete predefined attributes that you do not use. All predefined attributes accept text strings.
You can define other settings though, as described in Modifying Extensible Attributes on page 425. You can also
create your own extensible attributes, as described in Adding Extensible Attributes on page 419.
For example, you can configure the predefined attribute Site for fixed addresses and hosts, and define a new attribute
Department for admin groups.
When you configure an extensible attribute, you can specify the following:
• The type of data that admins enter, such as text strings, integers, or email addresses. You can also restrict
admins to a list of values.
• Whether admins can enter multiple values
• A default value
• Whether the attribute is required
• Whether the attribute is inheritable
• The objects associated with the attribute, such as admin groups, DNS views, or DHCP networks.
• Whether the appliance makes an entry in the audit log each time an object with the attribute is added or
modified.
Activities such as additions, modifications, and deletions of inheritable extensible attributes, are recorded in the
audit log. For information about how to use the audit log, see Using the Audit Log on page 1344.
Figure 8.5 illustrates a network with different device types. Each device is represented as a host in the NIOS appliance
database. You can configure Device Type, Location and Owner as required attributes for hosts. Then when admins
add hosts, they will be required to enter values for these attributes in the Extensible Attributes tab of the Add Host
wizard.
evice
NAT D
Printer
Server Router
Laptop ll
Deskto
p Firewa
Network with an
assortment of classified
and unclassified device
types.
After you configure extensible attributes for an object, the attributes become available in the Extensible Attributes
tab of the wizard and editor of the corresponding object. Users then add or edit the attribute values, based on your
configuration. Users can also specify attributes when searching for data and add attributes as columns in the tables
of Grid Manager. For example, you can add the predefined Site attribute as a column in the Records panel of the Zones
tab. For information about adding columns to tables, see Customizing Tables on page 69.
Users can also group objects in smart folders according to their attributes. For example, a user can create a smart
folder that contains all networks in a certain site.
Users can enable the appliance to group members by extensible attributes. For information, see Grouping Members
by Extensible Attributes on page 303.
When you first enable Cloud Network Automation, NIOS installs a set of extensible attributes that are specific for
cloud usage. For more information, see Extensible Attributes for Cloud Objects on page 386.
— Enable Inheritance: Select this check box if you want to allow the extensible attribute and its values to be
inherited by descendants in an inheritance chain. When you select this check box, inheritance is enabled
for network related objects only. When you select this check box and restrict an attribute to certain objects,
then the extensible attribute and its value will be inherited by those objects only.
Note the following:
— If you create an extensible attribute with inheritance disabled and later enable it, the Descendant
Actions dialog box may be displayed with the available options for adding an extensible attribute. For
information, see Managing Inheritable Extensible Attributes at the Parent and Descendant Level on
page 424.
— If you create an extensible attribute with inheritance enabled and later disable it, the Descendant
Actions dialog box may be displayed with the available options for deleting an extensible attribute. For
information, see Deleting Inheritable Extensible Attributes Associated with Parent Objects on page
427.
— Allow multiple values: Select this check box if you want to allow multiple values for this attribute to be set
on an object. You cannot change this value for predefined attributes.
— Default Value: Enter the default value that the appliance displays for the attribute. Leave this blank if there
is no default value for this attribute. If the attribute type is String, you can enter up to 256 UTF-8 characters.
If the attribute type is List, the value must be one of the list values and can be up to 64 UTF-8 characters.
— Required: If you select this option, it is required to enter a value for this attribute when adding or modifying
the corresponding object in the GUI.
— Recommended: If you select this option, it is recommended to enter a value for this attribute when adding
or modifying the corresponding object in the GUI.
— Optional: This is selected by default. By selecting this option, you may or may not enter a value for this
attribute when adding or modifying the corresponding object in the GUI.
— Restrict to Specific Object Types: Click the Add icon to select the object type with which you want to
associate the attribute. The appliance adds a row to the table. To delete an object type, select an object
type and click the Delete icon. By default, the appliance associates an extensible attribute with all the
supported object types.
— Log Attribute Values When Objects are Updated: Select this check box if you want the appliance to make an
entry in the audit log each time an object with this attribute is added or modified. When you select attribute
values for audit, they are included in all the audit log entries. For information about the audit log, see Using
the Audit Log on page 1344.
— Allow cloud members to have the following access to this extensible attribute: Select this if you are
configuring this extensible attribute for Cloud Network Automation. When you select this check box, the
Cloud Platform Appliance can access this extensible attribute and perform requested tasks based on the
cloud API requests. This function is enabled by default for all cloud specific extensible attributes. Note that
if you disable this function for any cloud attributes, you will receive an error when you try to perform tasks
that involve these attributes through cloud API requests. You can select Read/Write or Read only. For
information about this feature, see Deploying Cloud Network Automation on page 361.
— Read/Write (and disallow Write access from the GUI and the standard API): When you select this, the
Cloud Platform Appliance can access and modify the value of this extensible attribute based on the
tasks requested only through cloud API requests. You cannot modify this attribute using Grid Manager
or the Infoblox API.
— Read only: When you select this, the Cloud Platform Appliance can access this extensible attribute and
report the value based on the cloud API requests, but it cannot modify the value. You receive an error if
you try to modify this attribute when this option is selected.
5. Save the configuration and click Restart if it appears at the top of the screen.
Grid Manager adds the attribute to the Extensible Attributes tab in either the wizard or editor for the specified object
types.
Note: Infoblox recommends that you define values for mandatory extensible attributes using the Grid only and do
not use PAPI or RESTful API to define values.
Inheritance
State Description
Inherited The extensible attribute inherits its value from the parent. You cannot edit the value of
an attribute when the inheritance state is set to Inherited. You can change the state to
Overridden and then change the value of the attribute or change the state to Not
Inherited to remove the inherited value.
Overridden The extensible attribute overrides the value inherited from the parent. You can change
the state to Inherited and restore the original inherited value or change the state to Not
Inherited and remove the inherited value.
Not Inherited The extensible attribute can inherit its value from the parent, but the attribute does not
exist on the descendant. You can change the state to Inherited and restore the original
inherited value or change the state to Overridden and change the value of the attribute.
Note that when the state of an inheritable extensible attribute is Not Inherited, the
corresponding attribute will not be added as a new extensible attribute for objects that
are currently not inheriting this extensible attribute.
No Parent The inheritance state is set to No Parent when an object has a parent, but the parent
does not have an extensible attribute or the parent’s extensible attribute is set to Not
Inherited.
Disabled Extensible attribute inheritance is not enabled for the attribute.
No Change The extensible attributes of the selected objects do not have the same inheritance state
for all objects. This state allows you to retain the current state on the selected objects.
Note that this state is only seen in the Multi-object Extensible Attributes editor.
When you add an inheritable extensible attribute to an object, if there are descendants of this object the Descendant
Actions dialog box is displayed which will provide options for the descendants. Following is a summary of these
options:
• Retain the original value of the attribute for all descendants.
• Inherit the extensible attribute and its value from the parent object.
• Inherit the extensible attribute and its value when it does not exist on descendants.
• If the extensible attribute does not exist on the descendant, do not add it.
• If you are deleting an inherited extensible attribute from a parent object you can retain or remove the extensible
attribute from the object's descendants.
To configure default descendant actions for inheritable extensible attributes:
1. From the Grid tab, select the Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
2. In the Extensible Attribute Inheritance tab, complete the following:
When adding an extensible attribute that already exists on a descendant:
— Keep the descendant’s existing value and change the inheritance state to Override: Select this if you want
to retain the existing extensible attribute values for all direct descendants, irrespective of the values you
define at the parent level. The inheritance state for all direct descendants will be set to Overridden. Note
that this is applicable only when you add a new extensible attribute to the parent object that already exists
on the descendant. If you modify the value of an existing extensible attribute that is already inherited by the
descendant, and select the above option in the Descendant Actions dialog box, then the new value will be
inherited by the descendant, but the inheritance state will remain Inherited. For example, consider a
network 10.0.0.0/16 that has an extensible attribute Site with the value SA (native). When you add another
network 10.0.0.0/24, extensible attribute Site inherits its value, SA, from the parent object. Now, if you add
network 10.0.0.0/8, assign extensible attribute Site and set its value to NY, then when you choose this
option, the value of Site will remain as SA, but the inheritance state will be changed to Overridden for
network 10.0.0.0/16; however, network 10.0.0.0/24 will still have its value as SA for Site with the
inheritance state set to Inherited.
— Inherit the parent’s value and change the inheritance state to Inherit: Select this to inherit the extensible
attribute values from the parent for all descendants. The inheritance state for all descendants will be set to
Inherited.
— Change the inheritance state to Inherit only if the descendant’s value is the same as the parent’s value.
Otherwise, change the state to Override: Select this to set the inheritance state to Inherit if the descendants
have the same extensible attribute value as the parent. Otherwise, retain the original extensible attribute
value on the descendants and change the inheritance state to Overridden.
When adding an extensible attribute that does not exist on a descendant:
— Do not inherit the value from the parent and change the inheritance state to Not Inherited: Select this if the
extensible attributes do not exist on the descendants and you do not want them to inherit the attributes
from the parent. The inheritance state is set to Not inherited.
— Inherit the value from the parent and change the inheritance state to Inherited: Select this if you want all
descendants to inherit extensible attributes from the parent, and the inheritance state for all descendants
will be set to Inherited.
When deleting an extensible attribute:
— Keep the descendant’s value and change the inheritance state to No Parent: Select this if you want to
preserve extensible attributes on all descendants when you delete an inheritable extensible attribute. The
inheritance state for direct descendants will be set to No Parent.
— If the current inheritance state is Inherited, remove the extensible attribute. If the current inheritance state
is Overridden, keep the value and change the inheritance state to No Parent: Select this if you want to
remove the extensible attributes that are inherited by the descendants. If the inheritance state of the
extensible attributes is set to Inherited on the descendant, the attributes will be removed; however, if the
inheritance state is set to Overridden, then the state will be changed to No Parent.
3. Save the configuration.
For more information about how to configure inheritable extensible attributes, see Configuration Examples for
Inheritable Extensible Attributes on page 430.
Note: The options above apply only to extensible attributes which no longer have a parent, due to the merge. If
the extensible attributes on descendants are also on the resulting merged network, then they will retain
their current state.
• When you add multiple inheritable networks, new networks will automatically inherit all extensible attributes
from the parent.
Note: The Descendant Actions dialog box is displayed only when an object has descendants and you are modifying
extensible attributes that affects those descendants. However, the dialog box is always displayed when a join
is performed for a network that has inheritable extensible attributes.
The following section describes configuration changes for inheritable extensible attributes:
1. Network Container: From the Dashboards tab, select the Tasks tab -> click Add Networks. Select a network, enter
the required details. You can edit the inheritable extensible attributes that are displayed automatically. If this is
a parent object, then you can add extensible attributes.
IPv4 Network: From the Data Management tab -> select the DHCP tab -> Networks tab. In the Networks section,
select IPv4 Network from the Add drop-down menu. In the Add IPv4 Network wizard, enter the attributes in the
Extensible Attributes tab after specifying the required details.
IPv6 Network: From the Data Management tab -> select the DHCP tab -> Networks tab. In the Networks section,
select IPv6 Network from the Add drop-down menu. In the Add IPv6 Network wizard, enter the attributes in the
Extensible Attributes tab after specifying the required details.
IPv4 Range: From the Data Management tab -> select the DHCP tab -> Networks tab -> Networks tab -> network ->
click addr_range, select Range from the Add drop-down menu. In the Add IPv4 Range wizard, enter the
attributes in the Extensible Attributes tab after specifying the required details.
IPv6 Range: From the Data Management tab -> select the DHCP tab -> Networks tab -> Networks tab -> network ->
click addr_range, select Range from the Add drop-down menu. In the Add IPv6 Range wizard, enter the
attributes in the Extensible Attributes tab after specifying the required details.
2. You can either add new extensible attributes to the parent object or modify original extensible attribute values.
Click on the extensible attribute value displayed in the Value column of the respective attribute to modify the
original value or click the Add icon to add a new attribute.
3. Select a state from the drop-down list displayed in the Inheritance State column. Note that you can only change
the inheritance state of a descendant. You must select Overridden from the drop-down list to enter a new value.
For more information about inheritance states, see Table 8.2 on page 421. When an object has a parent and the
parent does not have the object's inheritable extensible attribute, then the inheritance state of the extensible
attribute is set to No Parent and the state cannot be changed.
4. Select the inheritable extensible attributes for which you want to modify descendant actions: Select this check
box if you would like to apply the actions of the Descendant Actions dialog box for existing extensible attributes.
Before you select this check box, you must select the extensible attributes which will be affected by the actions
of the Descendant Actions dialog box.
Note: This check box is not displayed for hosts, fixed addresses, and reservations since they do not have
descendants.
5. In the Descendant Actions dialog box, select options that will be applied for descendant objects as described in
Configuring Inheritable Extensible Attributes on page 421.
The Descendant Actions dialog box displays all the mentioned options when you perform add and delete
operations simultaneously. Consider an example where you add a new inheritable extensible attribute Site, and
delete an existing inheritable attribute Region from the parent object, and then click Save to save both changes.
In this case, the Descendant Actions dialog box displays all the options.
6. Save the configuration.
Note: The deleted extensible attributes will not be moved to the Recycle Bin and you cannot restore extensible
attributes that are deleted.
Note: You cannot delete an extensible attribute which has its inheritance state set to Inherited, Overridden, and Not
Inherited. You can delete an extensible attribute that is directly assigned to the object and has its inheritance
state set to No Parent or if the inheritance state is Disabled.
Note: You can delete only attributes that are not required. If you have one or more required attributes, you
cannot use the delete all function.
3. Save the configuration and click Restart if it appears at the top of the screen.
Example 1
When you add an extensible attribute to the top object, the inheritance state is set to No Parent. For example, if you
add a new inheritable extensible attribute, Building, to a network view, the inheritance state of this extensible
attribute is set to No Parent for the network view.
Example 2
When you add an extensible attribute Site to the parent object Network that has a descendant Range, you can define
Site as inheritable and add it to the Network. The descendant, Range, may or may not have the same extensible
attribute. Infoblox displays a list of options that lets you either inherit the value or retain or override the existing value
of the extensible attribute at the descendant level. Another option is to inherit the value of Site, only if the value for
this attribute in Range is same as that in Network. You can also decide if Range should acquire the same value for
Site, if it is not defined for Range. This change can be inherited by the descendants of Range.
Depending on your configuration, the inheritance state of the extensible attribute can display Inherited, Overridden
or Not Inherited. If the object is at the top of the inheritance chain (Network View), then the inheritance state is not
displayed. The inheritance state is set to No Parent only if an object has a parent, but the parent does not have the
inherited extensible attribute.
Example 3
Examples in this section show different results when you add a new inheritable extensible attribute to an object
located at the top or in the middle of the inheritance chain based on the following:
Example 3.1: Add an extensible attribute Region with value DEF to 10.0.0.0/8
You select the following options for the existing extensible attribute:
• For descendants that already have this extensible attribute, the existing extensible attribute will always be set
to Inherit.
• For descendants that do not have this extensible attribute, the descendants will inherit this extensible attribute.
Result:
Example 3.2: Add an extensible attribute Region with value DEF to 10.0.0.0/8
You select the following options for the existing extensible attribute:
• For descendants that already have this extensible attribute, the existing extensible attribute will always be set
to Override.
• For descendants that do not have this extensible attribute, the descendants will not inherit this extensible
attribute (extensible attribute is set to Do not Inherit).
Result:
Example 3.3: Add an extensible attribute Region with value DEF to 10.0.0.0/8
You select the following options for the existing extensible attributes:
• For descendants that already have this extensible attribute, the existing extensible attribute will always be set
to Inherit.
• For descendants that do not have this extensible attribute, the descendants will not inherit this extensible
attribute (extensible attribute is set to Do not Inherit).
Result:
Example 4
Examples in this section show different results when you remove an existing inheritable extensible attribute from an
object located at the top or in the middle of the inheritance chain based on the following:
Example 4.1: Remove extensible attribute Region with value DEF from 10.0.0.0/8
You select the following option for the existing extensible attribute:
• Remove extensible attributes with inheritance state set to Inherited. Extensible attributes with the state set to
Overridden are not removed.
Result:
Example 4.2: Remove extensible attribute Region with value DEF from 10.0.0.0/8
You select the following option for the existing extensible attribute:
• Preserve all descendant extensible attributes, whether the state is set to Inherited or Overridden.
Result:
Example 5
Examples in this section show different results when you remove parent object based on the following:
You select the following option for the existing extensible attribute on descendants:
• Preserve all extensible attributes on the descendant.
Result:
Example 6
Examples in this section show different results after you add an object in the middle of the inheritance chain based
on the following:
Example 7
Examples in this section show different results after you modify inheritable extensible attributes with multiple values
based on the following:
Example 7.1: Adding extensible attribute Region with value GHI to 10.0.0.0/8
You select the following option for the existing extensible attributes:
• The descendants that already have this extensible attribute will inherit the value from the parent object.
Result: Multiple values will be replaced with the single inherited value.
Extensible Extensible
Object Type Attribute Attribute Value Inheritance State
Example 7.2: Adding extensible attribute Region with value GHI to 10.0.0.0/8
You select the following option for the existing extensible attributes:
• The descendants that already have this extensible attribute will override the value.
Result: Extensible attribute values on descendants are retained, but single attribute value will be overridden.
Example 8
Examples in this section show different results after you modify existing inheritable extensible attribute of an object,
but you do not have required permission to modify some descendants. For information about admin permissions,
see About Administrative Permissions on page 195.
Extensible
Extensible Inheritance
Object Type Attribute Permission
Attribute Value State
Extensible
Extensible Inheritance
Object Type Attribute Permission
Attribute State
Value
10.10.1.0/24 Network Owner Max Overridden Read
10.20.0.0/16 Network Owner Sam Inherited from Write
Container 10.0.0.0/8
10.20.0.0/24 Network Owner Read
10.20.1.0/24 Network Owner Read
Extensible
Extensible Inheritance
Object Type Attribute
Attribute
State Permission
Value
10.0.0.0/16 Network Owner Sam Native Read
Container
10.0.0.0/24 Network Owner Sam Native Read
10.0.1.0/24 Network Owner Bob Overridden Write
10.10.0.0/16 Network Owner John Overridden Read
Container
10.10.0.0/24 Network Owner John Inherited from Read
10.10.0.0/16
10.10.1.0/24 Network Owner Max Overridden Read
10.20.0.0/16 Network Owner Sam Native Write
Container
10.20.0.0/24 Network Read
10.20.1.0/24 Network Read
Extensible
Extensible Inheritance
Object Type Attribute Permission
Attribute State
Value
10.0.0.0/16 Network
Container
10.0.0.0/24 Network
Extensible
Extensible Inheritance
Object Type Attribute Permission
Attribute State
Value
10.0.1.0/24 Network Owner Bob Overridden Write
10.10.0.0/16 Network Owner John Overridden Read
Container
10.10.0.0/24 Network Owner John Inherited from Read
10.10.0.0/16
10.10.1.0/24 Network Owner Max Overridden Read
10.20.0.0/16 Network Write
Container
10.20.0.0/24 Network Read
10.20.1.0/24 Network Read
Example 9
Examples in this section show different results after you join multiple networks, based on the following:
WARNING: After permanently disabling remote console and support access, you cannot re-enable them! Not
even resetting an appliance to its factory default settings can re-enable them.
Caution: If you specify an address or network other than the one from which you are currently accessing the
appliance, when you save your configuration, you will lose your administrative session and be unable to
reconnect. If you have enabled the Enable GUI/API Access via both MGMT and LAN1/VIP feature and
configured ACLs to control access to the GUI and API, then the same set of ACLs are applicable on both the
interfaces (LAN1 and MGMT port). For information, see Enabling GUI and API Access on the MGMT and
LAN1/VIP Ports on page 444 and Configuring Security Features on page 440.
Note: If you change the session timeout value, the new setting takes effect only after you log out and log back in.
— Named ACL: Select this and click Select Named ACL to select a named ACL that contains only IPv4 and
IPv6 addresses and networks. GUI and API access restriction does not support TSIG key based ACEs.
When you select this, the appliance allows GUI and API access for all ACEs in the named ACL. You can
click Clear to remove the selected named ACL.
— Set of ACEs: Select this to configure individual access control entries (ACEs). Click the Add icon and
select one of the following from the drop-down list. Depending on the item you select, Grid Manager
either adds a row for the selected item or expands the panel so you can specify additional information
about the item you are adding.
• IPv4 Address and IPv6 Address: Select this to add an IPv4 address or an IPv6 address. Click the
Value field and enter the IP address. The appliance allows this client to access the GUI and API and
restricts others.
• IPv4 Network and IPv6 Network: Select this to add an IPv4 network or IPv6 network. Click the Value
field and enter the network. The appliance allows this network to access the GUI and API and
restricts others.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
— Access Restrictions Apply to Remote Console: Select this to restrict admins from accessing the Infoblox CLI
from a remote location using SSH (Secure Shell) v2 client.
— Enable Remote Console Access: Select this option to enable superuser admins to access the Infoblox CLI
from a remote location using SSH (Secure Shell) v2 clients. You can set this at the Grid and member levels.
— Enable Support Access: Select this check box to enable an SSH (Secure Shell) daemon that only Infoblox
Technical Support can access. You can set this at the Grid and member levels.
— Restrict Remote Console and Support Access to the MGMT Port: This field is in the Grid Member Properties
editor only. Select this check box to restrict SSH (Secure Shell) v2 access to the MGMT port only. This
restricts Infoblox Technical Support and remote console connections—both of which use SSH v2—to just
the MGMT port. For an HA pair, you can make an SSH v2 connection to the MGMT port on both the active
and passive nodes.
Clear the check box to allow SSH v2 access to both the MGMT and LAN ports.
— Permanently Disable Remote Console and Support Access: This field is in the Grid Properties editor only.
Select this option to permanently disable remote console (Secure Shell v2) access for appliance
administration and for Infoblox Technical Support.
— Enable LCD Input: Select this check box to allow use of the LCD buttons on the front panel of a NIOS
appliance to change the IP address settings of the LAN port. Clear this check box to disable this function.
You can set this at the Grid and member levels.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: Note that configured proxy settings are for the entire Grid. You cannot configure proxy settings for individual
members.
Depending on the updates you want to download, you may need to install the respective licenses in your Grid. For
example, to download threat protection ruleset updates, the Grid must have the Threat Protection Update license
installed. To download threat analytics bundles, you must install the Threat Analytics license. When you configure
your appliance to obtain periodic ruleset updates, all updates go through the MGMT port on the Grid Master by
default. You can, however, delegate this function to a Grid member using a different interface such as LAN1 or LAN2.
For information about how to delegate updates to a Grid member and configure the interface, see Configuring
Members and Interfaces for Automatic Updates on page 443.
To configure proxy settings for the Grid:
1. From the Grid tab, select the Grid Manager tab, and then click Edit -> Grid Properties from the Toolbar.
2. In the Grid Properties editor, select the Proxy Settings tab -> Basic tab, and complete the following:
— Use Proxy Server: When you select this check box, the appliance uses the connection that has been
established with the proxy server to establish connection with endpoints or download automatic updates,
such as threat protection rulesets and threat analytics bundles. This setting applies to the entire Grid.
When you clear this check box, the appliance does not use the proxy server; however, the configuration will
be not be affected.
— Name or IP Address and Port: Enter the name or IP address and port number of the proxy server you plan to
use for this connection.
— HTTPS Proxy Content Inspection: From the drop-down list, select one of the following methods the proxy
server uses to inspect packet content. Note that this section does not apply to AWS deployments.
— None: Select this to use HTTP for the connection. This method does not allow certificate authentication
for the proxy server.
— Allow Deep Packet Inspection: This option is not supported for AWS deployments. To eliminate
man-in-the-middle attacks, select this to allow deep pack inspection and information extraction for
non-compliant protocol, intrusions, or other criteria that determine whether the packets should be
routed to an alternate destination. When you select this, you must click Proxy Server Certificate and
navigate to the proxy server certificate to upload it to the Grid, or you must ensure that a trusted chain
has been established before the proxy server can perform deep packet inspection. When you have
uploaded a certificate, the appliance displays Loaded.
• Enable Strict Host Name Checking: This option is enabled only when you select Allow Deep Packet
Inspection. As part of the SSL handshake process, the appliance verifies that the CN (Common
Name) of the public certificate of the proxy server exactly matches the host name of the proxy
server.
Credentials for Proxy Server (if configured at proxy server)
— Use username and password to connect to proxy server if configured: If you have configured user
credentials on the proxy server, enter the Username and Password here. This is optional.
Note: The appliance generates an SNMP trap if any of the configured Grid members failed to receive updates.
You can do the following on some of the Ethernet ports, depending on your network requirements and configurations:
• Assign VLANs (Virtual LANs) to the LAN1 and LAN2 ports so that NIOS can provide DNS service to different
subnetworks on the same interface. For more information about VLANs, see About Virtual LANs.
• Implement DiffServ (Differentiated Services) on the appliance by configuring the DSCP (Differentiated Services
Code Point) value. For more information about DiffServ and DSCP, see Implementing Quality of Service Using
DSCP on page 447.
Enabling GUI and API Access on the MGMT and LAN1/VIP Ports
You can access the Infoblox GUI and API through the MGMT and LAN1 or VIP interfaces simultaneously. To do so, you
must first configure the MGMT port on the appliance, and then enable the Enable GUI/API Access via both MGMT and
LAN1/VIP feature. For information about the MGMT port, see Using the MGMT Port on page 461. When you enable
this feature, you can use the MGMT and LAN1ports for standalone appliances and MGMT and VIP ports for an HA pair.
This feature is disabled for all new installations and upgrades.
Note: When the Threat Protection service is running on the Advanced Standalone Appliance, then the GUI and API
access is allowed only on the MGMT port.
To enable GUI and API access on the MGMT and LAN1/VIP ports:
1. From the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and select Grid Properties -> Edit.
3. In the Grid Properties editor, select the General tab -> click the Advanced tab (or click Toggle Advanced Mode) and
complete the following:
— Enable GUI/API Access via both MGMT and LAN1/VIP: Select this check box to allow access to the Infoblox
GUI and API using both the MGMT and LAN1 ports for standalone appliances and allow both the MGMT and
VIP ports for an HA pair. This feature is valid only if you have enabled the MGMT port. For information about
enabling the MGMT port, see Appliance Management on page 462.
4. Click Save to save the changes.
Note: When you configure VLANs on the following Network Insight appliances: ND-1400, ND-2200, ND-4000,
ND-VM-1400 and ND-VM-2200, the VLAN interfaces are used exclusively for discovery. You cannot bind other
services on these VLAN interfaces of the supported Network Insight appliances. For more information about
Network Insight, see About Network Insight on page 656.
VLAN Tagging
When your VLANs span across multiple networks, VLAN tagging is required. This enables the NIOS appliance to
connect to different networks using the same port. VLAN tagging involves adding a VLAN tag or ID to the header of an
IP packet so the appliance can identify the VLAN to which the packet belongs. In addition, switches use the VLAN tag
to determine the port to which it should send a broadcast packet. The appliance uses the IEEE 802.1Q networking
standard to support VLANs and VLAN tagging. On the appliance, you can configure VLANs as tagged networks by
adding VLAN tags to them. You can create up to 10 IPv4 and IPv6 addresses per interface and configure a VLAN ID
from one to 4094. You can also configure an address, gateway, and a netmask for VLAN. Any IPv4 or IPv6 address with
a VLAN ID is considered as a tagged network. For HA pairs, the appliance supports only one VLAN interface for VRRP
over an IPv4 or IPv6. It supports one untagged IPv4 and IPv6 address for each interface and considers this as the
primary IP address for the network. For an HA pair, if you have multiple VLANs assigned to a VIP interface, then a
network failure in any one of the VLAN interface does not trigger a failover of the active member.
Untagged networks are those without VLAN tags assigned to them. When you set up a VLAN as either a tagged or
untagged network, ensure that you properly configure the corresponding switch for the VLAN to function properly.
Note: A tagged VLAN interface receives only those packets that belongs to the tagged network, but an untagged
VLAN interface receives all the packets belonging to the tagged and untagged networks of the interface.
VLANs and VLAN tagging are supported on both IPv4 and IPv6 transports. This feature is currently supported on the
following Infoblox appliances: Trinzic 1410, Trinzic 1420, Trinzic 2210, Trinzic 2220, Infoblox-4010,
Infoblox-4030-Rev1, Infoblox-4030-Rev2, Infoblox-4030-10G, PT-1400, PT-2200, PT-4000, and PT-4000-10GE. VLAN
tagging is not supported on TE-100, TE-810, and TE-820. For more information about VLAN support for an
Infoblox-4030 appliance, refer to the DNS Cache Acceleration Application Guide. For information about these
appliances, refer to the respective installation guides on the Infoblox Support web site at
http://www.infoblox.com/support.
Currently, only the DNS service can listen on specific VLAN interfaces. The DHCP service listens only on the primary
VLAN interface (tagged or untagged). However, if the primary VLAN interface is untagged, DHCP will serve all VLANs
on that interface because an untagged primary VLAN receives all broadcast packets. You can also specify VLANs as
the source port for sending DNS queries and notify messages. For information about how to configure these, see
Specifying Port Settings for DNS on page 760.
Additional VLAN support is available exclusively for discovery on the following Network Insight appliances: ND-1400,
ND-2200, ND-4000, ND-VM-1400 and ND-VM-2200. Binding other services on the VLAN interfaces of the Network
Insight appliances is not supported.
Note: When you join an appliance that supports VLANs to a Grid that does not support VLANs or revert the appliance
to a NIOS version that does not support VLANs, the appliance will become unreachable after joining the Grid
or being reverted. You must remove VLAN tagging from the corresponding switch in order to reach the
downgraded appliance.
Consider the following guidelines when tagging VLANs on the LAN1 and LAN2 ports:
• You can assign VLAN addresses to an interface and add VLAN tags to them. However, you must designate one of
the tagged VLANs as a primary address.
• If the primary IPv4 address is tagged with a VLAN ID, all other addresses on the same interface must be tagged
with a VLAN ID as well.
• You can use the same VLAN ID to tag only one IPv4 and one IPv6 address on the same interface. You cannot use
the same VLAN ID to tag multiple IPv4 and IPv6 addresses on the same interface.
• You can assign one untagged IPv4 and one untagged IPv6 address to the same interface. These addresses are
designated as the primary address for the interface.
• For IPv6, you must have a primary IPv6 address (either tagged or untagged) before you can add other tagged
IPv6 addresses on the same interface.
• If you have multiple VLANs assigned to the LAN1 interface and the primary VLAN is untagged, DHCP listens on
all VLAN interfaces and thus DHCP lease requests will succeed for the additional VLANs assigned to the LAN1
interface, but the request will actually be handled by the primary untagged VLAN interface.
Configuring VLANs
When you first set up a NIOS appliance, you can assign VLANs through the Grid Setup Wizard. For more information,
see Using the Setup Wizard on page 294. After the initial setup, you can assign VLANs to the LAN1 or LAN2 ports in
the Required Ports and Addresses table, as described in Modifying Ethernet Port Settings on page 456.
On a Grid member, you can assign up to 10 VLANS for each protocol (IPv4 or IPv6) on the LAN1 and LAN2 ports. You
can assign up to 10 IPv4 VLAN addresses and 10 IPv6 VLAN addresses for each interface. You can configure only IPv4
VLAN addresses for an IPv4 Grid member and only IPv6 VLAN addresses for an IPv6 Grid member, but for a dual mode
Grid member you can configure both IPv4 and IPv6 VLAN addresses.
To assign additional VLANs to the LAN1 or LAN2 port, complete the following:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. Select the Network -> Basic tab in the Grid Member Properties editor.
3. In the Additional Ports and Addresses table, click the Add icon and select either MGMT (IPv4), MGMT (IPv6), LAN2
(IPv4), LAN2 (IPv6), Additional Address (loopback) (IPv4), Additional Address (loopback) (IPv6), LAN1
(VLAN)(IPv4), LAN1 (VLAN)(IPv6), LAN2 (VLAN)(IPv4) or LAN2 (VLAN)(IPv6) from the drop-down list. You can add
up to 10 IPv4 and 10 IPv6 VLANs for each interface. Note that you can configure only IPv4 VLAN addresses for an
IPv4 Grid member and only IPv6 VLAN addresses for an IPv6 Grid member, but for a dual mode Grid member you
can configure both IPv4 and IPv6 VLAN addresses.
— MGMT (IPv4): Select this to configure IPv4 address for MGMT port. Note that the Infoblox-4030 appliance
supports a /32 configuration for IPv4 on MGMT and supports multi-interface only when both LAN1 and
MGMT are on the same subnet.
— MGMT (IPv6): Select this to configure IPv6 address for MGMT port. Note that Infoblox-4030 appliance
supports a /128 prefix configuration for IPv6 on MGMT and supports multi-interface only when both LAN1
and MGMT are on the same subnet.
— LAN2 (IPv4): Select this to configure IPv4 address for the LAN2 port for DHCP or DNS. Note that
Infoblox-4030 appliance supports a /32 configuration for IPv4 on LAN2 and supports multi-interface only
when both LAN1 and LAN2 are on the same subnet. This is not applicable to Trinzic 100 appliance.
— LAN2 (IPv6): Select this to configure IPv6 address for the LAN2 port for DHCP or DNS. Note that
Infoblox-4030 appliance supports a /128 prefix configuration for IPv6 on LAN2 and supports
multi-interface only when both LAN1 and LAN2 are on the same subnet. This is not applicable to Trinzic 100
appliance.
— Additional Address (loopback) (IPv4): Select this to add a non-anycast IPv4 address to the loopback
interface. Note that you can configure this for IPv4 and dual mode Grid member.
— Additional Address (loopback) (IPv6): Select this to add a non-anycast IPv6 address to the loopback
interface. Note that you can configure this for IPv6 and dual mode Grid member.
— LAN1 (VLAN) (IPv4): Select this to add a VLAN to the LAN1 interface. You can add up to 10 IPv4 VLAN
addresses. Note that you can configure this for IPv4 and dual mode Grid member. This is supported on
Trinzic 2210, Trinzic 2220, Infoblox-1410, Infoblox-4010, Infoblox-4030-Rev1, Infoblox-4030-Rev2,
Infoblox-4030-10G, PT-1400, PT-2200, PT-4000, and PT-4000-10GE appliances. VLAN tagging is not
supported on TE-100, TE-810, TE-820, and vNIOS virtual appliances.
— LAN1 (VLAN) (IPv6): Select this to add a VLAN to the LAN1 interface. You can add up to 10 IPv4 and 10 IPv6
VLAN addresses. Note that you can configure this for IPv6 and dual mode Grid member. This is supported
on Trinzic 2210, Trinzic 2220, Infoblox-1410, Infoblox-4010, Infoblox-4030-Rev1, Infoblox-4030-Rev2,
Infoblox-4030-10G, PT-1400, PT-2200, PT-4000, and PT-4000-10GE appliances.
— LAN2 (VLAN) (IPv4): Select this to add a VLAN to the LAN2 interface. You can add up to 10 IPv4 VLAN
addresses. Note that you can configure this for IPv4 and dual mode Grid member. This is supported on
Trinzic 2210, Trinzic 2220, Infoblox-1410, Infoblox-4010, Infoblox-4030-Rev1, Infoblox-4030-Rev2,
Infoblox-4030-10G, PT-1400, PT-2200, PT-4000, and PT-4000-10GE appliances.
— LAN2 (VLAN) (IPv6): Select this to add a VLAN to the LAN2 interface. You can add up to 10 IPv6 VLAN
addresses. Note that you can configure this for IPv6 and dual mode Grid member. This is supported on
Trinzic 2210, Trinzic 2220, Infoblox-1410, Infoblox-4010, Infoblox-4030-Rev1, Infoblox-4030-Rev2,
Infoblox-4030-10G, PT-1400, PT-2200, PT-4000, and PT-4000-10GE appliances.
4. Enter the following:
— Interface: Displays the name of the VLAN interface. This can be LAN1 (VLAN)(IPv4), LAN1 (VLAN)(IPv6),
LAN2 (VLAN)(IPv4), or LAN2 (VLAN)(IPv6) depending on your selection. You cannot modify this.
— Address: Type the IP address for the VLAN port.
— Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, specify an appropriate subnet mask and for
IPv6 address, specify the prefix length. The prefix length ranges from 2 to 127, with common-sense values
ranging from /48 to /127 due to the larger number of bits in the IPv6 address.
— Gateway: Type the IPv4 or IPv6 default gateway address for the VLAN port depending on the type of
interface. For IPv6 interface, you can also type Automatic to enable the appliance to acquire the IPv6
address of the default gateway and the link MTU from router advertisements.
You can now define a link-local address as the default IPv6 gateway and isolate the LAN segment so the
local router can provide global addressing and access to the network and Internet. This is supported for
both LAN1 and LAN2 interfaces as well as LAN1 and LAN2 in the failover mode.
— VLAN Tag: Enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure that you configure the
corresponding switch accordingly. For information about VLANs, see About Virtual LANs on page 444.
— Port Settings: For IPv4 only. From the drop-down list, choose the connection speed that you want the port to
use. You can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or
Half for data transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to
negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch
automatically. This is the default setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value, if configured. To modify, click Override and enter the DSCP value.
You can enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using
DSCP on page 447.
5. Save the configuration and click Restart if it appears at the top of the screen.
DSCP is supported on both IPv4 and IPv6 transports and the DSCP value for both IPv4 and IPv6 transports must be
the same. This feature is currently supported on the following Infoblox appliances: Trinzic 2210, Trinzic 2220,
Infoblox-4010, Infoblox-4030, Infoblox-4030-10GE, PT-1400, PT-2200, PT-4000, and PT-4000-10GE. For information
about these appliances, refer to the respective installation guides on the Infoblox Support web site at
http://www.infoblox.com/support.
Note: You can set the DSCP value of the primary LAN using the set network CLI command. For information about
the CLI command, refer to the Infoblox CLI Guide. DSCP values for all other interfaces and VLANs must be set
through Grid Manager.
Table 8.3 Appliance Roles and Configuration, Communication Types, and Port Usage
Table 8.4 Appliance Roles and Configuration, Communication Types, and Port Usage for Appliances with LAN2 Ports
Core
HA Database Management GUI
Appliance Role MGMT Port LAN2 Port Network
Status Synchronization Services Access
Services
HA Grid Master Active Disabled Enabled VIP on HA VIP on HA LAN1 or LAN2 VIP on HA
Single Grid Master – Disabled Enabled LAN1 LAN1 and/or LAN1 or LAN2 LAN1
LAN2
HA Grid Member Active Disabled Enabled LAN1 VIP on HA LAN1 or LAN2 –
Single Grid Member – Disabled Enabled LAN1 LAN1 and/or LAN1 or LAN2 –
LAN2
Independent HA Pair Active Disabled Enabled VIP on HA VIP on HA LAN1 or LAN2 VIP on HA
Single Grid Master – Enabled Enabled LAN1 LAN1, LAN2 MGMT MGMT
and/or
MGMT
Core
HA Database Management GUI
Appliance Role MGMT Port LAN2 Port Network
Status Synchronization Services Access
Services
Single Grid Member – Enabled Enabled LAN1 or MGMT LAN1, LAN2 MGMT –
and/or
MGMT
Reporting Member – Enabled Enabled LAN1 or MGMT LAN1, LAN2, MGMT MGMT
and/or
MGMT
To see the service port numbers and the source and destination locations for traffic that can go to and from a NIOS
appliance, see Table 8.5. This information is particularly useful for firewall administrators so that they can set policies
to allow traffic to pass through the firewall as required.
Note: The colors in both tables represent a particular type of traffic and correlate with each other.
SRC DST
Service SRC IP DST IP Proto Port Port Notes
Key LAN1 or MGMT VIP on HA Grid Master, 17 UDP 2114 2114 Initial key exchange for
Exchange on all Grid or LAN1 on single Grid establishing VPN
(Member members Master tunnels
Connection) (including Grid Required for Grid
Master and Grid
Master
Candidate)
VIP on HA Grid Master
VIP on HA Grid Candidate, or LAN1 on
Master single Grid Master
Candidate, or Candidate
LAN1 on single
Grid Master
Candidate
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
Key VIP on HA Grid LAN1 or MGMT on all 17 UDP 2114 2114
Exchange Master, or LAN1 Grid members
(Grid on single Grid (including Grid Master
Master Master and Grid Master
Candidate Candidate)
Promotion)
VIP on HA Grid
Master
Candidate or
LAN1 on Single
Grid Master
Candidate
VPN LAN1 or MGMT VIP on HA Grid Master, 17 UDP 1194 or 1194 or Default VPN port 1194
on Grid or LAN1 on single Grid 5002, 5002, for Grids with new
member Master or 1024 or 1024 DNSone 3.2
VIP on HA Grid Master -> -> installations and 5002
Candidate, or LAN1 on 63999 63999 for Grids upgraded to
single Grid Master DNSone 3.2; the port
Candidate number is configurable
Required for Grid
Network LAN1 or LAN2 LAN1 or LAN2 on UDP 1194 1194 All default VPN tunnels
Insight VPN on Probes Consolidator for Network Insight
Discovery LAN1 or LAN2 UDP 161 SNMP
on Probes
Discovery LAN1 or LAN2 UDP 260 SNMP - Needed for full
on Probes discovery of some older
Check Point models
Discovery LAN1 or LAN2 ICMP n/a Ping Sweep
on Probes
Discovery LAN1 or LAN2 UDP, 53 DNS
on Probes TCP
Discovery LAN1 or LAN2 ICMP Path Collection, for IPv4
on Probes addresses
Discovery LAN1 or LAN2 UDP 33434 Path Collection.
on Probes +1 per Standard traceroute,
probe for IPv6 addresses
packet
Discovery LAN1 or LAN2 ICMP, Port scan - all
on Probes UDP, configured by user
TCP
Discovery LAN1 or LAN2 UDP 137 NetBIOS
on Probes
Discovery LAN1 or LAN2 UDP 40125 NMAP, UDP Ping, and
on Probes credential checking
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
DHCP Client LAN1, LAN2, VIP, or 17 UDP 68 67 Required for IPv4 DHCP
broadcast on NIOS service
appliance
DHCP LAN1, LAN2 or Client 17 UDP 67 68 Required for IPv4 DHCP
VIP on NIOS service
appliance
DHCP Client LAN1, LAN2, VIP, or 17 UDP 546 547 Required for IPv6 DHCP
broadcast on NIOS service
appliance
DHCP LAN1, LAN2 or Client 17 UDP 547 546 Required for IPv6 DHCP
VIP on NIOS service
appliance
DHCP LAN1, LAN2 or LAN1, LAN2 or VIP on 6 TCP 1024 -> 519, or Required for DHCP
Failover VIP on Infoblox Infoblox DHCP failover 65535 647 failover
DHCP failover peer
peer
DHCP VIP on HA Grid LAN1, LAN2 or VIP on 6 TCP 1024 -> 7911 Informs functioning
Failover Master or LAN1 Grid member in a DHCP 65535 Grid member in a DHCP
or LAN2 on failover pair failover pair that its
single master partner is down
Required for DHCP
failover
DDNS LAN1, LAN2, or LAN1, LAN2, or VIP 17 UDP 1024 -> 53 Required for DHCP to
Updates VIP 65535 send DNS dynamic
updates
DNS LAN1, LAN2, LAN1, LAN2, VIP, or 6 TCP 53, or 53 For DNS zone transfers,
Transfers VIP, or MGMT, or MGMT 1024 -> large client queries,
client 65535 and for Grid members
to communicate with
external name servers
Required for DNS
DNS Client LAN1, LAN2, VIP, or 17 UDP 53, or 53 For DNS queries
Queries broadcast on NIOS 1024 -> Required for DNS
appliance 65535
DNS Client LAN1, LAN2, VIP, or 6 TCP 53, or 53 For DNS queries
Queries broadcast on NIOS 1024 -> Required for DNS
appliance 65535
NTP NTP client LAN1, LAN2, VIP, or 17 UDP 1024 -> 123 Required if the NIOS
MGMT 65535 appliance is an NTP
server
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
NTP NTP client LAN1, LAN2, VIP, or 17 UDP 1024 -> 123 Required if the NIOS
MGMT 65535 appliance is an NTP
server. On an HA
member, the NTP
service runs on the
active node. If there is
an HA failover, the NTP
service is automatically
launched after the
passive node becomes
active and the NTP
traffic uses the LAN2,
VIP, or MGMT port on
one of the nodes from
an HA pair, instead of
the LAN1 port. During
another HA failover, the
currently passive node
becomes active again
and the NTP traffic uses
the LAN1 port, and the
NTP is back in
synchronization.
RADIUS NAS (network LAN1 or VIP 17 UDP 1024 – 1812 For proxying RADIUS
Authenti- access server) 65535 Authentication-Reques
cation ts. The default
destination port
number is 1812, and
can be changed to
1024 – 63997. When
configuring an HA pair,
ensure that you
provision both LAN IP
addresses on the
RADIUS server.
RADIUS NAS (network LAN1 or VIP 17 UDP 1024 – 1813 For proxying RADIUS
Accounting access server) 65535 Accounting-Requests.
The default destination
port number is 1813,
and can be changed to
1024 – 63998.
RADIUS LAN1 or VIP RADIUS home server 17 UDP 1814 1024 -> Required to proxy
Proxy 63997 requests from RADIUS
(auth), clients to servers. The
or 1024 default source port
-> number is 1814, and
63998 although it is not
(acct) configurable, it is
always two greater than
the port number for
RADIUS authentication.
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
ICMP Dst VIP, LAN1, LAN1, LAN2, or 1 ICMP – – Required to respond to
Port LAN2, or MGMT, UNIX-based client Type 3 the UNIX-based
Unreach- or UNIX-based traceroute tool to
able client determine if a
destination has been
reached
ICMP Echo VIP, LAN1, VIP, LAN1, LAN2, or 1 ICMP – – Required for response
Reply LAN2, or MGMT, MGMT, or client Type 0 from ICMP echo request
or client (ping)
ICMP Echo VIP, LAN1, VIP, LAN1, LAN2, or 1 ICMP – – Required to send pings
Request LAN2, or MGMT, MGMT, or client Type 8 and respond to the
or client Windows-
based traceroute tool
ICMP TTL Gateway device Windows client 1 ICMP – – Gateway sends an ICMP
Exceeded (router or Type 11 TTL exceeded message
firewall) to a Windows client,
which then records
router hops along a
data path
NTP LAN1 on active NTP server 17 UDP 1024 -> 123 Required to
node of Grid 65535 synchronize Grid, TSIG
Master or LAN1 authentication, and
of independent DHCP failover
appliance Optional for
synchronizing logs
among multiple
appliances
SMTP LAN1, LAN2, or Mail server 6 TCP 1024 -> 25 Required if SMTP alerts
VIP 65535 are enabled
SNMP NMS (network VIP, LAN1, LAN2, or 17 UDP 1024 -> 161 Required for SNMP
management MGMT 65535 management
system) server
SNMP Traps MGMT or LAN1 NMS server 17 UDP 1024 -> 162 Required for SNMP trap
on Grid Master 65535 management.
or HA pair, or Uses MGMT (when
LAN1 on enabled) or LAN1 on
independent Grid Master or HA pair,
appliance or LAN1 on
independent appliance
for the source address,
depending on the
destination IP address.
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
SSHv2 Client LAN1, LAN2, VIP, or 6 TCP 1024 -> 22 Administrators can
MGMT on NIOS 65535 make an SSHv2
appliance connection to the
LAN1, LAN2, VIP, or
MGMT port
Optional for
management
Syslog LAN1, LAN2, or syslog server 17 UDP 1024 -> 514 Required for remote
MGMT of NIOS 65535 syslog logging
appliance
Traceroute LAN1, LAN2, or VIP, LAN1, LAN2, or 17 UDP 1024 -> 33000 NIOS appliance
UNIX-based MGMT, or client 65535 -> responds with ICMP
appliance 65535 type code 3 (port
unreachable)
TFTP Data LAN1 or MGMT TFTP server 17 UDP 1024 -> 69, For contacting a TFTP
65535 then server during database
1024 -> and configuration
63999 backup and restore
operations
VRRP HA IP on the Multicast address 112 802 For periodic
active node of 224.0.0.18 VRRP announcements of the
HA pair availability of the HA
node that is linked to
the VIP. The nodes in
the HA pair must be in
the same subnet.
HTTP Management VIP, LAN1, or MGMT 6 TCP 1024 -> 80 Required if the
System 65535 HTTP-redirect option is
set on the Grid
properties security
page
HTTPS/ Management VIP, LAN1, or MGMT 6 TCP 1024 -> 443 Required for
SSL System 65535 administration through
the GUI
Reporting Reporting LAN1, LAN2, or MGMT 6 TCP 1024 - 9997 Required for the
Forwarders on the indexer 65535 reporting service.
Communication is
single directional from
forwarders to the
indexer. For example, a
forwarder detects
events and forwards
them to the indexer.
SRC DST
Service SRC IP DST IP Proto Notes
Port Port
Threat VIP on HA Grid N/A HTTPS N/A 443 For threat protection
Protection Master or (using FQDN = rule updates.
MGMT on single https://ts.infoblox.com)
appliance (with
threat
protection
service
running)
Reporting MGMT (with Access HTTPS N/A 443 Required to access
and Threat threat www.threatstop.com www.threatstop.com to
Protection protection (64.87.26.148) display threat details
service when generating
running) reports and to export
searches.
Note: You must enable the MGMT port before modifying its port settings. See Using the MGMT Port on page 461.
2. In the Network tab of the Grid Member Properties editor, the Required Ports and Addresses table lists the network
settings that were configured. This table lists the network settings of LAN1(IPv4) interface for an IPv4 member
and LAN1(IPv6) interface for an IPv6 member. For a dual mode Grid member, this table lists the settings for both
LAN1(IPv4) and LAN1(IPv6) interfaces. Complete the following to modify port settings:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Click the field and modify the IP address for the LAN1 port, which must be in a different subnet
from that of the LAN2 and HA ports.
— Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, click the field and specify an appropriate
subnet mask and for IPv6 address, specify the prefix length.
— Gateway: Click the field and modify the default gateway for the LAN1 port.
— VLAN Tag: Click the field and enter the VLAN tag ID if the port is configured for VLANs. You can enter a
number from 1 to 4095. For information about VLAN, see About Virtual LANs on page 444.
— Port Settings: From the drop-down list, choose the connection speed that you want the port to use. You can
also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or Half for data
transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to negotiate the
optimum port connection type (full or half duplex) and speed with the connecting switch automatically. This
is the default setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value. To modify, click Override and enter the DSCP value. You can
enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using DSCP on
page 447.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: The port settings on the connecting switch must be identical to those you set on the NIOS appliance.
Note: This feature is not supported on vNIOS Grid members for Riverbed.
The LAN2 port is a 10/100/1000Base-T Ethernet connector on the front panel of the TE-810, TE-820, TE-1410,
TE-1420, TE-2210, TE-2220, and IB-4010 appliances. By default, the LAN2 port is disabled and the appliance uses
the LAN1 port (and HA port when deployed in an HA pair). Before you can enable and configure the LAN2 port on a
Grid member, you must first configure the member and join it to the Grid. You must also have read/write permission
to the Grid member on which you want to enable the port. When you enable the LAN2 port and SNMP, the appliance
sends traps from this port for LAN2 related events.
You can configure the LAN2 port in different ways. You can enable the port redundancy or port failover feature, which
groups the LAN1 and LAN2 ports into one logical interface. The LAN1/LAN2 grouping can be activated for both IPv4
and IPv6. Alternatively, you can configure the LAN2 port on a different IP network than LAN1, and enable the LAN2
port to provide DNS and DHCP services. For information about these features, see the following sections:
• For information about the LAN2 failover feature, see About Port Redundancy on page 457.
• For information about configuring the LAN2 port, see Configuring the LAN2 Port on page 459.
• For information about enabling the LAN2 port to provide DHCP services, see Enabling DHCP on LAN2 on page
459.
• For information about enabling the LAN2 port to provide DNS services, see Enabling DNS on LAN2 on page 460.
Note that you cannot use the LAN2 port to access the GUI and the API, or to connect to the Grid. This can impact the
ability of other appliances, such as the Network Automation and PortIQ appliances, to communicate with the Grid
Master.
Any IPv6 services enabled for the LAN2 port also require provisioning of an IP address on the LAN2 port.
Note: When configuring port redundancy, the speed of the interfaces is not taken into consideration when selecting
the active interface.
The LAN1 or LAN1 (VLAN) and LAN2 or LAN2 (VLAN) ports share the IP address of the LAN1 or LAN1 (VLAN) port; the
port that is currently active owns the IP address. When you enable services on the appliance, such as DNS and DHCP,
clients send their service requests to the LAN1 or LAN1 (VLAN) port IP address and receive replies from it as well. The
port supports the services and features supported on the LAN1 or LAN1 (VLAN) port as listed in Table 8.4 and
Table 8.5. You cannot enable the port redundancy feature if the LAN2 or LAN2 (VLAN) port is serving DNS or DHCP.
For example, you can use the MGMT port for Grid communications, as shown in Figure 8.6, and the LAN1 and LAN2
ports are connected to the same switch. The LAN1 and LAN2 port share the IP address of the LAN1 port, which is
1.1.1.5. In the illustration, LAN1 is the active port.
You can also have the MGMT port disabled and configure LAN1 and LAN2 for port redundancy. You can enable port
redundancy on single or HA independent appliances and Grid members.
Grid Master
LAN1
10.1.1.5
Private Network
10.1.1.0/24
for Grid Communications
and Appliance Management
The LAN1 and LAN2 ports share the LAN1
IP address. Only 1 port is active at anytime.
MGMT
10.1.1.20 Failover may be active for either IPv4 or IPv6
addresses.
LAN1
LAN1
1.1.1.5
LAN2
Public Network
1.1.1.0/24
Clients send service requests DNS and DHCP Services
and replies to the LAN1 IP
address.
Before you enable port redundancy, ensure that both LAN1 and LAN2 are enabled. To enable port redundancy:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. In the Network -> Basic tab of the Grid Member Properties editor, select the Enable port redundancy on LAN/LAN2
check box.
3. Save the configuration and click Restart if it appears at the top of the screen.
The Detailed Status panel displays the status of both the LAN1 and LAN2 ports. In an HA pair, both nodes
display the port information when port redundancy is enabled.
Note: This feature is not supported on vNIOS Grid members for Riverbed.
The MGMT (Management) port is a 10/100/1000Base-T Ethernet connector on the front panel of the TE-810, TE-820,
TE-1410, TE-1420, TE-2210, TE-2220, and IB-4010 appliances. It allows you to isolate the following types of traffic
from other types of traffic on the LAN and HA ports:
• Appliance Management on page 462
• Grid Communications on page 463
• DNS Services on page 465
For information about what types of traffic qualify as appliance management, Grid communications, and DNS
services, see Table 8.5 on page 450.
Note: The MGMT port currently does not support DHCP, NAT, or TFTP. IPv6 addressing may be applied to the MGMT
port.
Some NIOS appliance deployment scenarios support more than one concurrent use of the MGMT port. The following
table depicts MGMT port uses for various appliance configurations.
Table 8.6 Supported MGMT Port Uses for Various appliance Configurations
Appliance Management
You can restrict administrative access to a NIOS appliance by connecting the MGMT port to a subnet containing only
management systems. This approach ensures that only appliances on that subnet can access the Infoblox GUI and
receive appliance management communications such as syslog events, SNMP traps, and e-mail notifications from
the appliance.
If you are the only administrator, you can connect your management system directly to the MGMT port. If there are
several administrators, you can define a small subnet—such as 10.1.1.0/29, which provides six host IP addresses
(10.1.1.1–10.1.1.6) plus the network address 10.1.1.0 and the broadcast address 10.1.1.7—and connect to the
NIOS appliance through a dedicated switch (which is not connected to the rest of the network). Figure 8.7 shows how
an independent appliance separates appliance management traffic from network protocol services. Note that the
LAN port is on a different subnet from the MGMT port.
LAN MGMT
Public Network 1.1.1.5 10.1.1.1
1.1.1.0/24 Private Network
DNS and DHCP Services 10.1.1.0/30
Ethernet Appliance Management
Cable
NIOS
appliance-1
DNS and DHCP Clients
LAN
1.1.1.6 MGMT
10.1.1.1
Several management systems connect
to the MGMT port of the NIOS
appliance through a dedicated switch.
Infoblox
Appliance -2
Note:
Because the two private networks are Private Network
Ethernet
used solely for appliance management 10.1.1.0/29
Cable
and are completely isolated from the rest Appliance Management
of the network—and therefore from each
other—their address space can overlap Dedicated
without causing any routing issues Switch
Management Systems
10.1.1.2 - 10.1.1.5
Similarly, you can restrict management access to a Grid Master to only those appliances connected to the MGMT ports
of the active and passive nodes of the Grid Master.
To enable the MGMT port on an independent appliance or Grid Master for appliance management and then cable the
MGMT port directly to your management system or to a network forwarding appliance such as a switch or router:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. In the Network -> Basic tab of the Grid Member Properties editor, add the MGMT port to the Additional Ports and
Addresses table as follows:
3. Click the Add icon and select MGMT (IPv4) to configure an IPv4 address or select MGMT (IPv6) to configure an
IPv6 address for the MGMT port. You can configure both IPv4 and IPv6 addresses for the MGMT port.
Grid Manager adds a row for the MGMT port. For an HA pair, it adds two rows, one for each node.
4. Enter the following in the row of the MGMT port for a single Grid Master or independent appliance, and in the rows
of the two nodes for an HA Grid Master or independent HA pair:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IP address for the MGMT port, which must be in a different subnet from that of the LAN
and HA ports.
— Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, specify an appropriate subnet mask for the
number of management systems that you want to access the appliance through the MGMT port. For IPv6
address, specify the prefix length.
— Gateway: Type the default gateway for the MGMT port. If you need to define any static routes for traffic
originating from the MGMT port—such as SNMP traps, syslog events, and email notifications—destined for
remote subnets beyond the immediate subnet, specify the IP address of this gateway in the route.
— Port Settings: Choose the connection speed that you want the port to use. You can also choose the duplex
setting. Choose Full for concurrent bidirectional data transmission or Half for data transmission in one
direction at a time. Select Automatic to instruct the NIOS appliance to negotiate the optimum port
connection type (full or half duplex) and speed with the connecting switch automatically. This is the default
setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value. To modify, click Override and then enter the DSCP value. You can
enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using DSCP on
page 447.
5. In the Network -> Advanced tab, make sure that the Enable VPN on MGMT Port check box is not selected.
6. Save the configuration and click Restart if it appears at the top of the screen.
7. Log out of Grid Manager.
8. Cable the MGMT port to your management system or to a switch or router to which your management system can
also connect.
9. If your management system is in a subnet from which it cannot reach the MGMT port, move it to a subnet from
which it can.
The Infoblox Grid Manager GUI is now accessible through the MGMT port on the NIOS appliance from your
management system.
10. Open an Internet browser window and enter the IP address of the MGMT port as follows: https://<IP address of
MGMT port>.
11. Log in to Grid Manager.
12. Check the Detailed Status panel of the Grid member to make sure the status icons are green.
Grid Communications
You can isolate all Grid communications to a dedicated subnet as follows:
• For Grid communications from the Grid Master, which can be an HA pair or a single appliance, the master uses
either the VIP interface on the HA port of its active node (HA master) or its LAN port (single master). Neither a
single nor HA Grid Master can use its MGMT port for Grid communications. (This restriction applies equally to
Master Candidates.)
• Common Grid members connect to the Grid Master through their MGMT port.
This ensures that all database synchronization and Grid maintenance operations are inaccessible from other network
elements while the common Grid members provide network protocol services on their LAN ports.
Figure 8.8 shows how Grid members communicate to the master over a dedicated subnet.
Private Network
10.1.1.0/24
for Grid Communications
and appliance Management
Management MGMT
MGMT MGMT
System 10.1.1.21
10.1.1.15 10.1.1.20
10.1.1.30 Active Node
Passive
Node The common Grid
Single Member HA Member
members connect to the
private network through
HA
their MGMT ports*.
HA They connect to the
public network through
their LAN and HA ports
LAN VIP (using a VIP).
1.1.1.6 Public Network 1.1.1.7
1.1.1.0/24
DNS and DHCP Services
The common Grid
members use the public
network (1.1.1.0/24) for
DNS and DHCP services.
Enabling Grid Communications over the MGMT Port for Existing Grid Members
To enable the MGMT port for Grid communications on an existing single or HA Grid member:
1. Log in to the Grid Master with a superuser account.
2. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
Note: You must enable the MGMT port before modifying its port settings. See Using the MGMT Port on page 461.
3. In the Network -> Basic tab of the Grid Member Properties editor, add the MGMT port to the Additional Ports and
Addresses table as follows:
4. Click the Add icon and select MGMT (IPv4) to configure an IPv4 address or select MGMT (IPv6) to configure an
IPv6 address for the MGMT port. You can configure both IPv4 address and IPv6 address for the MGMT port.
Grid Manager adds a row for the MGMT port. For an HA pair, it adds two rows, one for each node.
5. Enter the following in the row of the MGMT port for a single Grid Master or independent appliance, and in the rows
of the two nodes for an HA Grid Master or independent HA pair:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IP address for the MGMT port, which must be in a different subnet from that of the LAN
and HA ports.
— Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, specify an appropriate subnet mask for the
number of management systems that you want to access the appliance through the MGMT port. For IPv6
address, specify the prefix length.
— Gateway: Type the default gateway for the MGMT port. If you need to define any static routes for traffic
originating from the MGMT port—such as SNMP traps, syslog events, and email notifications—destined for
remote subnets beyond the immediate subnet, specify the IP address of this gateway in the route.
— Port Settings: Choose the connection speed that you want the port to use. You can also choose the duplex
setting. Choose Full for concurrent bidirectional data transmission or Half for data transmission in one
direction at a time. Select Automatic to instruct the NIOS appliance to negotiate the optimum port
connection type (full or half duplex) and speed with the connecting switch automatically. This is the default
setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value. To modify, click Override and enter the DSCP value. You can
enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using DSCP on
page 447.
6. In the Network -> Advanced tab, select the Enable VPN on MGMT Port check box.
7. In the Security tab, do the following:
— Restrict Remote Console and Support Access to MGMT Port: Select this check box to restrict SSH (Secure
Shell) v2 access to the MGMT port only. This restricts Infoblox Technical Support and remote console
connections—both of which use SSH v2—to just the MGMT port. For an HA pair, you can make an SSH v2
connection to the MGMT port on both the active and passive nodes.
Clear the check box to allow SSH v2 access to both the MGMT and LAN ports. For an HA pair, you can make
an SSH v2 connection to the MGMT and LAN ports on both the active and passive nodes.
8. Save the configuration and click Restart if it appears at the top of the screen.
The master communicates the new port settings to the member, which immediately begins using them. The
member stops using its LAN port for Grid communications and begins using the MGMT port.
9. To confirm that the member still has Grid connectivity, check that the status icons for that member are green on
the Detailed Status and Grid panels.
DNS Services
You can configure a single independent appliance or single Grid member to provide DNS services through the MGMT
port in addition to the LAN port. For example, the appliance can provide DNS services through the MGMT port for
internal clients on a private network, and DNS services through the LAN port for external clients on a public network.
While providing DNS services on the MGMT port, you can still use that port simultaneously for appliance
management. Figure 8.9 shows a management system communicating with a single independent appliance through
its MGMT port while the appliance also provides DNS services on that port to a private network. Additionally, the
appliance provides DNS services to an external network through its LAN port.
Figure 8.9 DNS Services on the LAN and MGMT Ports, and appliance Management on the MGMT Port
External
Network
External DNS Client External DNS Clients
Like a single independent appliance, a single Grid member can also support concurrent DNS traffic on its MGMT and
LAN ports. However, because you manage all Grid members through the Grid Master, a Grid member only uses an
enabled MGMT port to send SNMP traps, syslog events, and email notifications, and to receive SSH connections.
In addition, the active node of an HA pair can provide DNS services through its MGMT port. To use this feature, you
must enable DNS services on the MGMT ports of both nodes in the HA pair and specify the MGMT port IP addresses
of both nodes on the DNS client as well, in case there is a failover and the passive node becomes active. Note that
only the active node can respond to queries that it receives. If a DNS client sends a query to the MGMT port of the
node that happens to be the passive node, the query can eventually time out and fail.
To enable DNS services on the MGMT port of an appliance:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
Note: You must enable the MGMT port before modifying its port settings. See Using the MGMT Port on page 461.
2. In the Network -> Basic tab of the Grid Member Properties editor, add the MGMT port to the Additional Ports and
Addresses table as follows:
3. Click the Add icon and select MGMT (IPv4) to configure an IPv4 address or select MGMT (IPv6) to configure an
IPv6 address for the MGMT port. You can configure both IPv4 and IPv6 address for the MGMT port.
Grid Manager adds a row for the MGMT port. For an HA pair, it adds two rows, one for each node.
4. Enter the following in the row of the MGMT port for a single Grid Master or independent appliance, and in the rows
of the two nodes for an HA Grid Master or independent HA pair:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: Type the IP address for the MGMT port, which must be in a different subnet from that of the LAN
and HA ports.
— Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, specify an appropriate subnet mask for the
number of management systems that you want to access the appliance through the MGMT port. For IPv6
address, specify the prefix length.
— Gateway: Type the default gateway for the MGMT port. If you need to define any static routes for traffic
originating from the MGMT port—such as SNMP traps, syslog events, and email notifications—destined for
remote subnets beyond the immediate subnet, specify the IP address of this gateway in the route.
— Port Settings: Choose the connection speed that you want the port to use. You can also choose the duplex
setting. Choose Full for concurrent bidirectional data transmission or Half for data transmission in one
direction at a time. Select Automatic to instruct the NIOS appliance to negotiate the optimum port
connection type (full or half duplex) and speed with the connecting switch automatically. This is the default
setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value. To modify, click Override and enter the DSCP value. You can
enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using DSCP on
page 447.
5. Click Save & Close to save your settings for the MGMT port.
6. From the Data Management tab, select the DNS tab -> -> Members tab -> Grid_member check box, and then click
the Edit icon.
7. In the General -> Basic tab of the Member DNS Properties editor, do the following:
— If you are running DNS service for IPv4, select the IPv4 check box for MGMT under DNS Interfaces.
— If you are running DNS service for IPv6, select the IPv6 check box for MGMT under DNS Interfaces.
8. In the General -> Advanced tab, select one of the following from the Send queries from and the Send notify
messages and zone transfer requests from drop-down lists:
— VIP: The appliance uses the IP address of the HA port as the source for queries, notifies, and zone
transfer requests.
— MGMT: The appliance uses the IP address of the MGMT port as the source for queries, notifies, and
zone transfer requests.
— LAN2: The appliance uses the IP address of the LAN2 port as the source for queries, notifies, and zone
transfer requests.
— Any: The appliance chooses which port to use as the source for queries, notifies, and zone transfer
requests.
The Send queries from drop-down list also includes loopback IP addresses that you configured. You can select a
loopback address as the source for queries.
9. Save the configuration and click Restart if it appears at the top of the screen.
To see that the appliance now also serves DNS on the MGMT port:
1. From the Data Management tab, select the DNS tab -> -> Members tab -> Grid_member check box.
2. Expand the Toolbar and click View -> View DNS Configuration.
3. Check that the IP address of the MGMT port appears in the address match list in the listen-on substatement.
Note: You can configure LOM only on appliances that support LOM. This port automatically negotiates a speed of 100
Mbps. Devices connected to the LOM port should be configured to auto-negotiate and not have a fixed speed
of 1000 Mbps.
LOM is disabled by default. Before you can configure LOM and remotely manage the appliance, ensure that the IPMI
(Intelligent Platform Management Interface) port on your appliance is properly connected to the network. By default,
IPMI uses UDP port 623. You can then enable LOM and add LOM users through the Infoblox GUI. When you add LOM
users, you can assign them specific roles so they can perform only certain functions. When you add a LOM user, you
can configure the user to be an “operator” or a “user” depending on the functions you want the user to perform. An
operator can access an appliance remotely and perform the following functions:
• Access the serial console
• Reset the appliance
• Power up and down the appliance
• Monitor system status, such as CPU usage and system temperature
A user role can only monitor system status. Users with this role cannot perform any other functions remotely.
After you set up and configure your appliance, perform the following tasks through Grid Manager to enable LOM and
set up LOM users:
1. Enable LOM for the Grid or members that support IPMI, as described in Enabling LOM on page 468.
2. Add LOM users based on your organizational needs, as described in Adding LOM User Accounts on page 469.
3. Configure the IPMI network interface on the appliance, as described in Configuring the IPMI Network Interface on
page 469.
4. After you have configured LOM and set up the IPMI interface, install a utility such as IPMItool on your Linux
management system. For information about IPMItool, visit the IPMItool web site at
http://ipmitool.sourceforge.net. For the most commonly used commands and examples, see IPMI Commands
and Examples on page 470.
You can also do the following from Grid Manager after you configure LOM:
• Enable and disable LOM for the Grid or members, as described in Enabling LOM on page 468.
• Modify LOM settings, as described in Modifying LOM Settings on page 470.
• View LOM users, as described in Modifying LOM Settings on page 470.
Enabling LOM
Before you can add LOM users and manage Infoblox appliances remotely, you must enable LOM. When LOM is
configured for the entire Grid, all members inherit the Grid settings. You can also override the Grid settings for specific
members. For an HA pair, you can configure LOM on the node that supports IPMI.
To enable and disable LOM:
1. Grid: From the Grid tab, select the Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
Independent appliance: From the System tab, select the System Manager tab, expand the Toolbar and click
System Properties -> Edit.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then
click the Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the LOM tab, complete the following:
— Enable Lights Out Management: LOM is disabled by default. Select this check box to enable LOM. When
LOM is enabled or disabled for the Grid, all members inherit the same setting.
3. Save the configuration.
Caution: Using this command has the same effect as pulling the power cord off the appliance.
Checking Various Sensors [Temperature, Voltage, FANS, Physical Security, Power supply, OEM]
with User Role
Command:
ipmitool -H 10.37.2.70 -U user -P infoblox -L USER -I lanplus sensor
Command output:
System Temp | 23.000 | degrees C | ok | -9.000 | -7.000 | -5.000 | 75.000 | 77.000 |
79.000
CPU Temp | 0x0 | discrete | 0x0000| na | na | na | na | na | na
FAN 1 | 10390.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 2 | na | RPM | na | na | na | na | na | na | na
FAN 3 | 9835.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 4 | 11870.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 5 | 10390.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
CPU Vcore | 0.832 | Volts | ok | 0.640 | 0.664 | 0.688 | 1.344 | 1.408 | 1.472
+3.3VCC | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
+12 V | 11.978 | Volts | ok | 10.494 | 10.600 | 10.706 | 13.091 | 13.197 | 13.303
CPU DIMM | 1.528 | Volts | ok | 1.152 | 1.216 | 1.280 | 1.760 | 1.776 | 1.792
+5 V | 5.088 | Volts | ok | 4.096 | 4.320 | 4.576 | 5.344 | 5.600 | 5.632
-12 V | -12.486 | Volts | ok | -13.844 | -13.650 | -13.456 | -10.934 | -10.740 | -10.546
VBAT | 3.120 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
+3.3VSB | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
AVCC | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
Chassis Intru | 0x0 | discrete | 0x0000| na | na | na | na | na | na
PS Status | 0x1 | discrete | 0x01ff| na | na | na | na | na | na
Note: This feature is not supported on vNIOS Grid members for Riverbed.
Internet
The default route points all traffic from the LAN or LAN1
1.2.2.1 port on the NIOS appliance to the DMZ interface
(1.2.2.1) on the firewall.
DMZ
Default route:
LAN Network: 0.0.0.0
Port Netmask: 0.0.0.0
Gateway: 1.2.2.1
When the NIOS appliance is on a segment of the network where there are multiple gateways through which traffic to
and from the appliance can flow, a single default route is insufficient. For an example, see Figure 8.11.
Internet
Firewall-1 1.2.2.1 The default route points all traffic from the NIOS
appliance to the DMZ interface (1.2.2.1) on
firewall-1.
DMZ
NIOS appliance
Default route:
Network: 0.0.0.0
Switch Netmask: 0.0.0.0
Gateway: 1.2.2.1
1.2.2.2
Firewall-2 DNS queries from the Internet reach the
appliance through firewall-1, and the
appliance sends its replies back through
firewall-1.
DNS queries from the internal network reach
Internal Network the appliance through firewall-2, but because
10.1.1.0/24 there is only one default route, the appliance
erroneously sends DNS replies to the DMZ
interface (1.2.2.1) on firewall-1.
To resolve the problem illustrated in Figure 8.11 on page 473, add a second route pointing traffic destined for
10.1.1.0/24 to use the gateway with IP address 1.2.2.2 on firewall-2. This is shown in Figure 8.12.
Internet
DMZ
1.2.2.0/24 Default route:
NIOS appliance Network: 0.0.0.0
Netmask: 0.0.0.0
Gateway: 1.2.2.1
Switch
Route to:
Network: 10.1.1.0
Netmask: 255.255.255.0
1.2.2.2
Gateway: 1.2.2.2
Firewall-2
Whenever you want the NIOS appliance to send traffic through a gateway other than the default gateway, you need
to define a separate route. Then, when the appliance performs a route lookup, it chooses the route that most
completely matches the destination IP address in the packet header.
When you enable the MGMT port, the gateway you reference in a static route determines which port the NIOS
appliance uses when directing traffic to a specified destination.
• If a route definition references a gateway that is in the same subnet as the IP and VIP addresses of the LAN (or
LAN1) and HA ports, the NIOS appliance uses the LAN (or LAN1) or HA port when directing traffic to that
gateway.
• If a route definition references a gateway that is in the same subnet as the MGMT port, the NIOS appliance uses
the MGMT port when directing traffic to that gateway.
Figure 8.13 Static Routes for the LAN and MGMT Ports
Internet
LAN Gateway
(Firewall-1) LAN Port MGMT Port 10.1.2.1 10.1.3.1 Administrators
1.2.2.1 1.2.2.5 10.1.2.5
NIOS MGMT
DMZ appliance Gateway Subnet
1.2.2.0/24 Subnet 10.1.3.0/24
10.1.2.0/24
Switch
Switch
1.2.2.2
LAN Gateway
(Firewall-2) 10.1.1.1 Two static routes direct traffic from the NIOS appliance:
• From the LAN port (eth1, 1.2.2.5) through the gateway at 1.2.2.2
to the 10.1.1.0/24 subnet.
From the MGMT port (eth0, 10.1.2.5) through the gateway at
Internal Network 10.1.2.1 to the 10.1.3.0/24 subnet.
10.1.1.0/24
The need for routes can apply to any type of traffic that originates from the appliance, such as DNS replies, DHCP
messages, SNMP traps, ICMP echo replies, Infoblox GUI management, and Grid communications.
To set a static route, do the following:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. In the Network -> Advanced tab of the Grid Member Properties editor, click the Add icon for the IPv4 Static Routes
table, and then enter the following:
— Network Address: Type the address and netmask of the remote network to which the NIOS appliance routes
traffic.
— Gateway Address: Type the IP address of the gateway on the local subnet through which the NIOS appliance
directs traffic to reach the remote network. The gateway address must meet the following requirements:
— It must belong to a working gateway router or gateway switch.
— It must be in the same subnet as the NIOS appliance.
Note: Consult your network administrator before specifying the gateway address for a static route on the
appliance. Specifying an invalid gateway address can cause problems, such as packets being dropped or
sent to an incorrect address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: Consult your network administrator before specifying the gateway address for a static route on the
appliance. Specifying an invalid gateway address can cause problems, such as packets being dropped or
sent to an incorrect address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Internet
— Search List: You can define a group of domain names that the NIOS appliance can add to partial queries
that do not specify a domain name. For example, if you define a RADIUS authentication home server as
“as1”, and you list "corp100.com" and "hq.corp100.com" in the domain group list, then the NIOS
appliance sends a query for "as1.corp100.com" and another query for "as1.hq.corp100.com" to the
preferred or alternate name server. To specify domain names containing IDNs, manually convert it into
punycode and specify domain names in punycode.
To add a domain name, click the Add icon and type a domain name in the Search List field. To remove a
domain name from the group, select it, and then click Delete.
3. Save the configuration and click Restart if it appears at the top of the screen.
Managing Licenses
You must install valid licenses for services and features to function properly on your NIOS and vNIOS virtual
appliances.
Licenses are classified by types, as described in License Types. You can choose to obtain licenses for the desired
features and services and install them as static or dynamic licenses depending on your network and business
requirements.
Static licenses are mapped to the hardware ID for each individual NIOS or vNIOS appliance. For more information
about how to obtain and install static licenses, see Managing Static Licenses on page 478.
In an environment, such as a CMP (Cloud Management Platform), where you need to spin up multiple remote vNIOS
appliances at different times based on business requirements, you can consider installing dynamic licenses.
Dynamic licenses are mapped to the Grid Master and stored in a license pool. For more information about dynamic
licenses and how to use them to pre-provision vNIOS appliances, see Managing Dynamic Licenses on page 481 and
About Elastic Scaling on page 486.
License Types
There are three types of licenses. You can obtain these licenses from your Infoblox representative.
• Maintenance licenses – NIOS and Enterprise (formerly Grid) are maintenance licenses. The duration of
maintenance licenses are one, two, or three years.
• Service licenses – These are permanent licenses for NIOS services such as DNS, DHCP, and Cloud Network
Automation. Note that some of these services are disabled by default. Once you have obtained licenses for
these services, follow the instructions provided in this guide to start the services after you have completed the
configuration.
• Temporary licenses – You can enable one of several sets of temporary service licenses through the CLI
command set temp_license . Temporary licenses provide licensed features and functionality for the interim,
while you wait for your permanent licenses to arrive.
Before a maintenance license or a temporary license expires, an expiration warning appears during the GUI login
process. The warning reappears during each login until you renew the license. To renew a license, contact Infoblox
Technical Support.
Note: Make a note of the hardware IDs that you obtain during this procedure. Each of these unique Hardware ID
values can be associated with a Registration Number from your Contract Notification email. If a license key
is installed for the current VM, that key value also appears in the output for the show license command.
3. Go to https://support.infoblox.com/app/licenses (you have to log in with your support account) and click the
Licenses menu. On the Licenses page, open Submit a license key registration form.
4. Enter or copy and paste the serial number and hardware ID value for a physical appliance. For a vNIOS appliance,
use the hardware ID for both the Serial Number and Hardware ID fields—they are synonymous.
5. Under the Service and Maintenance categories, select the check boxes for all options for which you have
purchased service licenses and/or maintenance licenses.
6. Enter any Comments if needed.
7. Click Submit to submit the request for your license keys.
Repeat this procedure for all NIOS and vNIOS appliances in your contract.
Infoblox Technical Support normally processes license key requests on the same day they are received; however,
allow 24-48 hours for processing. When you receive the license keys, install the licenses as described in Adding
Permanent Licenses on page 482.
Note: Each VM Registration Number should have a Hardware ID associated with it. As you install and spin up each
virtual machine, establish written records for each Hardware ID with the VM Registration Numbers in a
one-to-one ratio. These value pairs are necessary should you need to contact Infoblox Technical Support.
Note that serial numbers and Hardware IDs are the same value.
3. Select how your license key will be provided:
• Display to Screen
• Send File
• .CSV
The Display to Screen and Send File options allow for direct copying and pasting. Using a .CSV file enables you
to use the convenient Upload License File feature for your appliance in NIOS. For more information, see Adding
Permanent Licenses on page 482.
4. After making your selection, click Generate Keys at the bottom of the panel. Following is an example:
5. After you receive your key values, you can save them for your records. To install a specific license or licenses, see
Adding Permanent Licenses on page 482.
3. Enter (or copy and paste) each of the Hardware ID values or VM Registration Numbers into the entry field, each
in its own row, with a comma at the end of the value. Do not press Return between each value. An example, using
VM Registration Numbers:
4. Click Generate Keys at the bottom of the panel (you may need to scroll down to see it).
The list of keys may be quite substantial. The list shows the license entitlements and registration keys for all
vNIOS VMs that are purchased and listed with Infoblox Technical Support.
5. After you receive your key values, you can save them for your records. To install a specific license or licenses, see
Adding Permanent Licenses on page 482.
Note: You must install both the Enterprise (formerly Grid) and vNIOS licenses on a vNIOS appliance for it to join the
Grid. You can add other licenses such as DNS, DHCP, or Cloud Platform depending on how you deploy your
vNIOS virtual appliances.
c. Open the CSV file. The LPC_UID is displayed in the SIGNATURE row. Copy this ID. You will need this ID when
contacting Infoblox Technical Support.
Note: You can also use the show license_pool_container CLI command to display the LPC_UID.
2. Contact Infoblox Technical Support or your Infoblox representative to obtain the dynamic licenses.
— Paste License(s): Paste the license key in this text field. You must paste the entire string in CSV format:
serial number, hardware ID, license type, end date, and license string. If you are pasting multiple licenses,
start each string on a new line.
3. Click Save License(s).
The appliance validates the license and adds it to the table. Close the browser window and log in to the Infoblox
GUI. If you are activating licenses for an HA pair, you must follow this procedure for both nodes.
Note: To transfer licenses between vNIOS on VMware appliances, refer to the Infoblox Installation Guide for vNIOS
Software on VMware.
Viewing Licenses
If the appliance is part of a Grid, you must log in to the Grid Master to view license information from Grid Manager. If
the appliance is an independent appliance, log in to System Manager on the appliance. If you have transferred
licenses from one vNIOS appliance to another, you can view information about the new and replaced licenses.
Grid Manager displays licenses in the Grid tab -> Licenses tab. You can view license information for all static and
dynamic licenses, including temporary licenses, in the Active tab, and a summary of dynamic licenses in the Pool tab.
For more information, see Viewing Active Licenses.
— Hardware ID: The unique hardware ID of the appliance. The ID is highlighted in red if the license on the
appliance was removed.
— Serial Number: The serial number of the appliance.
— Type Context: Depending on the license type, this field displays the attribute (such as Model) that the
license controls. This field is blank if the license does not control any attribute type. This field can display
one of the following:
— Leases: Indicates that this DHCP license supports a specific number of DHCP leases. The number of
leases supported is displayed in the Type Details field.
— Model: Indicates that this vNIOS license supports a specific vNIOS virtual appliance model. The model
supported is displayed in the Type Details field.
— Tier: Indicates various levels of performance limits on the DNS cache acceleration license of the
Infoblox-4030 appliance. This is only applicable to the Infoblox-4030 appliance.
— Type Details: Information about the attribute type that the license monitors. This field can display the
following information for each attribute:
— Leases: The number of DHCP leases that the DHCP license supports.
— Model: The model of the vNIOS virtual appliance, such as IB-VM-1410 or IB-VM-800.
— Tier: The performance limit value of an Infoblox-4030 appliance with DNS Cache Acceleration, such as
Tier-1 for full capacity (up to 1M qps), Tier-2 for high (up to 600K qps), Tier-3 for base (up to 300K qps)
performance limits, and Tier-4 (up to 150K qps). This is only applicable to the Infoblox-4030 appliance.
— Expiration: The expiration date of the license.
— Replaced Hardware ID: The hardware ID of the appliance whose license was removed.
— Model: The model of the vNIOS virtual appliance, such as IB-VM-1410 or IB-VM-800.
— Tier: The performance limit value of an Infoblox-4030 appliance with DNS Cache Acceleration, such as
Tier-1 for full capacity (up to 1M qps), Tier-2 for high (up to 600K qps), and Tier-3 for base (up to 300K
qps) performance limits. This is only applicable to the Infoblox-4030 appliance.
To search for specific licenses in the Active and Pool tabs, you can use filters and the Go to function (the Go to function
is not supported in the Pool tab) to narrow down the list. With the autocomplete feature, you can just enter the first
few characters of an object name in the Go to field and select the object from the possible matches. You can also
create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
Backing Up Licenses
You can back up all the static licenses and dynamic licenses in the license pool container, in case you need to
re-install them at a later time. Infoblox recommends backing up the licenses before removing any of them.
Note: Dynamic licenses are not exported to this file. Dynamic licenses are automatically released and returned to the
license pool on the Grid Master when a member leaves the Grid. Unallocated dynamic Licenses are available
for allocations.
When you back up the licenses, Grid Manager creates a CSV file that lists the following information for each license:
serial number, hardware ID, license type, end date, license string.
To back up licenses:
1. From the Grid tab, select the Licenses tab.
2. Click Export All Licenses from the toolbar. Grid Manager generates a CSV file that contains all the licenses.
Depending on the browser you use, you can then open the file or save it to a specified location.
Removing Licenses
You can remove licenses and reset a NIOS appliance to its factory default settings. For example, if you have a NIOS
appliance running the DNSone package with the Grid upgrade, but you want to use it as an independent appliance,
you can remove the Grid license. Infoblox recommends that you back up licenses before removing them, in case you
decide to re-install them at a future time.
Note: Exercise caution when removing licenses; you may render an appliance unusable by removing the wrong
license. Other feature sets may be affected once you remove a license; for example, removing licensing for DNS
and DHCP services will also disable task packs in the NIOS Dashboards –> Tasks page.
Note: You must include the Grid and vNIOS provisional licenses for pre-provisioned vNIOS members in order to
join them to the Grid.
4. Generate a token for the Grid member, as described in Generating Tokens for Grid Members on page 487.
Note: For HA pairs, the appliance generates two tokens—one for each node of the HA pair.
5. Use cloud API calls to add network views, networks, or zones and then delegate the objects to the offline
Grid member. For information about sample cloud API requests, see Sample Cloud API Requests for Elastic
Scaling on page 375.
6. Use API requests to join the Grid member to the Grid. For sample API requests, see Sample Cloud API
Requests for Elastic Scaling on page 375. If for any reasons the automated process of Elastic Scaling fails
or if you are unable to send API calls, you can use CLI commands to join the Grid member to the Grid as a
workaround. For more information, see Using CLI Commands to Join Grid Members on page 488.
7. Verify the Grid member has successfully joined the Grid, as described in Viewing Status on page 1326.
8. Verify the dynamic licenses have been allocated correctly by viewing the license usage, as described
inViewing Dynamic Licenses on page 484
Note: You can use API calls as part of the automated deployment process to generate a token for the vNIOS Grid
member before joining it to the Grid. For information about sample API requests you can use to generate a
token, see Sample Cloud API Requests for Elastic Scaling on page 375. As a workaround, you can also
generate a token through Grid Manager.
Note: Copy this token and paste it at the CLI when you use the set token on command to set the token and
generate the token file.
1. From the Grid tab -> Grid Manager tab, click Grid Properties -> Edit from the toolbar.
2. In the Grid Properties editor, select the General tab -> Basic tab and complete the following:
— Token usage timeout: Enter the time interval (in minutes) for which the appliance sends a syslog message
to alert you about the unused permission token for a pre-provisioned member. For example, if you enter 5
here, the appliance sends a syslog message every five minutes. The default is 10.
3. Save the configuration.
Note: If for any reasons the automated process of Elastic Scaling does not function properly, you can use CLI
commands to join Grid members to the Grid as a workaround.
When using Elastic Scaling, ensure that you have generated a token for the member, as described in Generating
Tokens for Grid Members on page 487 before joining the member to the Grid.
To join the vNIOS member to the Grid:
1. Access the Infoblox CLI using an SSHv2 connection through an SSHv2 client. You can also access the CLI by
connecting a serial cable directly from the console port of a management system to the console port on the
appliance, and then using a terminal emulation program such as Hilgraeve Hyperterminal® (provided with
Windows® operating systems) and launch a session. The connection settings are:
• Bits per second: 9600
• Stop bits: 1
• Data bits: 8
• Flow control: Xon/Xoff
• Parity: None
2. Log in using the default user name and password admin and infoblox. User names and passwords are
case-sensitive.
3. To change the network settings from the default, enter the set network command. Then enter information as
prompted to change the IP address, netmask, and gateway for the LAN1 port.
Infoblox > set network
NOTICE: All HA configuration is performed from the GUI. This interface is used only to
configure a standalone node or to join a grid.
Enter IPv4 address [Default: n.n.n.41]: <Enter the LAN1 port IP address>
Enter netmask: [Default: 255.255.255.0]: <Enter the LAN1 port netmask>
Enter gateway address [Default: n.n.n.1]: <Enter the gateway IP address>
NOTICE: Additional IPv6 interface can be configured only via GUI.
Become grid member? (y or n): n
Note: You must enter n to use Elastic Scaling. If you enter y, the member becomes a Grid member and you will
not be able to set token and join the pre-provisioned member to the Grid.
4. Use the set token on command to set the member token, the Grid Master IP address and certificate to the token
file. Following is an example:
Infoblox > set token on
Enter GM-IP [Current: not defined]: <Enter the Grid Master IP address>
Enter Token [Current: not defined]: Copy token from the Your Permission Token dialog in
Grid Manager.
New Token Settings:
GM-IP: 1.1.1.1
Token: b25lLnZpcnR1YWxfbm9kZSQx
Is this correct? (y or n): y
Note: If there is incorrect information, use set token off to remove the token file.
6. Use the set token join command to register the Grid member and get licenses from the license pool before
joining the member to the Grid. Once the member joins the Grid, the token become invalid—you can use the
token only once.
Infoblox > set token join
Are you sure to start Member registration Client? (y or no): y
Starting Member registration Client...
Connecting...
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box.
2. Expand the Toolbar and click Control -> Restart.
3. In the Restart Product on Member dialog box, click OK to restart the Grid member.
Note: If there is a disruption in power when the NIOS appliance is operating, the NIOS appliance automatically
reboots itself when power is restored.
Forcing an HA Failover
If you want to change which node in an HA pair is active and which is passive, you can force a failover to occur. Within
five seconds after initiating a failover, the previously passive node becomes active and assumes ownership of the
VIP address. Note that a forced failover causes a temporary service disruption. To proceed with the forced failover,
click OK. The appliance logs this task in the audit log.
To restart a single Grid member:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box.
Note: If you have previously imported HTTPS certificates, the appliance regenerates the certificates and replaces
them.
Note: If you have previously imported HTTPS certificates, the NIOS appliance regenerates the certificates and
replaces them.
To reset the NIOS appliance to its factory settings and remove all its licenses:
1. Log in to the Infoblox CLI using a superuser account.
2. Enter the following CLI command: reset all licenses.
Caution: Never remove more than one disk at a time from the array. Removing two or more disks at once can cause
an array failure and result in an unrecoverable condition. You should replace only one disk at a time, using
a replacement disk from Infoblox. For information, see Replacing a Failed Disk Drive on page 494.
About RAID 10
RAID 10 (or sometimes called RAID 1+0) uses a minimum of four disk drives to create a RAID 0 array from two RAID 1
arrays, as shown inFigure 8.15. It uses mirroring and striping to form a stripe of mirrored subsets. This means that
the array combines—or stripes—multiple disk drives, creating a single logical volume (RAID 0). RAID 10 combines the
high performance of RAID 0 and the high fault tolerance of RAID 1. Striping disk drives improves database write
performance over a single disk drive for large databases. The disks are also mirrored (RAID 1), so that each disk in
the logical volume is fully redundant.
RAID 0
RAID 1 RAID 1
When evaluating a fault on the Infoblox-4010, it is best to think of the disk subsystem as a single, integrated unit with
four components, rather than four independent disk drives. For information, see Evaluating the Status of the Disk
Subsystem on page 493.
RAID_ARRAY: OPTIMAL
RAID_BATTERY: OK READY Yes 103 HOURS
The Detailed Status panel provides a detailed status report on the appliance and service operations. To see a detailed
status report:
• From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box -> Detailed Status icon
in the table toolbar.
After displaying the Detailed Status panel, you can view the status of the selected Grid member. For more information
on the Detailed Status panel, see Viewing Status on page 1326.
The RAID icons indicate the status of the RAID array on the Infoblox-4010.
Yellow A new disk was inserted and the RAID array is rebuilding.
Red The RAID array is degraded. At least one disk is not functioning properly. The GUI lists the disks
that are online. Replace only the disks that are offline.
The appliance also displays the type of each disk. In the event of a disk failure, you must replace the failed disk with
one that is qualified and shipped from Infoblox and has the same disk type as the rest of the disks in the array.
Infoblox-4010 uses only the IB-Type 3 disk type. All disk drives in the array must have the same disk type for the array
to function properly. You can have either IB-Type 1, IB-Type 2, or IB-Type-3, but you cannot mix both in the array. When
you have a mismatched disk in the array, you must promptly replace the disk with a replacement disk from Infoblox
to avoid operational issues.
3. Push in the latch for the drive and pull the release lever out towards you.
4. When the drive disengages, wait about 30 seconds for the disk to completely stop spinning.
5. Slide it out of the slot.
Replacement drives are shipped as a complete unit, ready to insert into the appliance. There is no preparation
required. To install a replacement drive, follow this procedure:
1. Insert the replacement drive into the drive bay slot.
2. Gently slide the drive into place. When you feel the release lever engage, continue applying gentle pressure to
the drive while pushing the release lever towards the appliance.
3. The release lever locks into place and the LED next to the disk drive lights up. Note that if the alarm buzzer is
sounding, it automatically turns off about 20 seconds after the drive is inserted.
4. The disk drive automatically goes into rebuild mode.
• Rebuild time depends on a number of factors, such as the system load and Grid replication activities. On very
busy appliances (over 90% utilization), the disk rebuild process can take as long as 40 hours. On a Grid Master
serving a very large Grid, expect the rebuild process to take at least 24 hours.
• Replace a failed or mismatched disk only with a replacement disk shipped from Infoblox. When you request a
replacement disk, report the disk type displayed in the Detailed Status panel of the GUI or the Infoblox part
number on the disk.
Restarting Services
Whenever you make a change such as adding a zone or a network, Grid Manager notifies you that a service restart is
required. There are several ways to restart services on the affected Grid members.
You can restart services at the Grid or member level, or you can restart services by groups, as described in:
• Restarting Grid Services on page 496
• Restarting Member Services on page 497
• Restarting Services by Groups on page 498
You can configure the services restart settings such as restart timeout or delay as described in Configuring Restart
Settings on page 501.
Note: When you make configuration changes for DNS or DHCP and the service is enabled on at least one Grid
member, Grid Manager suggests a restart even if the service is disabled on the member affected by the
change.
Note: When you restart services at the Grid level, the services are restarted only on those members for which you
have permissions.
3. You can specify whether the member should restart services when necessary or you can force it to restart
services. Select one of the following in the Restart Member Services section:
— If needed: Select this to restart all active DNS and DHCP services, if there are any changes requiring a
service restart.
— Force service restart: Select this to force a service restart even if it is not needed. A forced restart may be
delayed if there are pending restarts for the same service.
Affected Services: This table displays the affected services when the system restarts. It can display one of the
following for each service:
— YES: The service is active and the system will restart the service upon execution of this task.
— NO: The service will not restart unless the Force service restart option is selected.
— DISABLED: The service is currently disabled.
4. To schedule a service restart task, click the Schedule icon at the top of the editor. In the Schedule Change panel,
complete the following:
— Now: Restarts services immediately.
— Later: Enter the following information to schedule the member to restart services at a certain date and time:
— Date: Enter a date in YYYY-MM-DD (year-month-day) format. The appliance displays today’s date. You
can also click the calendar icon to select a date from the calendar widget.
— Time: Enter a time in hh:mm:ss AM/PM (hours:minutes:seconds AM or PM) format. You can also select
a time from the drop-down list by clicking the time icon.
— Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
5. Click Restart to restart services immediately or click Schedule Restart to create a scheduled restart task.
Note: You can manage restart groups only if you are a superuser. If you are a limited-access user, you can see the
restart groups and their restart status only if these groups include members for which you have permissions.
When you restart services by groups, the services are restarted only on those members for which you have
permissions.
For more information on how to create and manage restart groups, see the following sections. For how to restart
services by groups, see Restarting Groups on page 500.
Note: For how to configure the restart delay between members and member timeout, see Configuring Restart
Settings on page 501.
5. Click Next.
6. Add members by clicking the Add icon for each new member.
7. Click Next.
8. If you want to create a restart schedule for this group, select Enable Restart Schedule and specify the required
parameters.
Note: The restart schedule can run either once or on a recurring basis. It does not create scheduled tasks. If a
schedule is configured for a restart group, you can still perform one-time restarts independently for Grid
members or restart groups and create scheduled tasks for these restarts.
9. Select the restart type for the services on the affected members:
— If needed: Select this to restart services only if there are changes requiring a service restart.
— Force service restart: Select this to force a service restart even if it is not needed. A forced restart may be
delayed if there are pending restarts for the same service.
10. Click Next.
11. If necessary, specify the extensible attributes.
12. Click Save & Close.
Restarting Groups
When you already have restart groups defined, you can restart services by specific groups at any time after you make
configuration changes.
To restart services by groups:
1. Go to the restart groups view for the DNS or DHCP service.
2. Select the groups to restart.
3. In the toolbar, click Restart –> Restart Groups.
4. In the Restart Group Confirmation window, select the restart type for the services on the affected members:
— If needed: Select this to restart services only if there are changes requiring a service restart.
— Force service restart: Select this to force a service restart even if it is not needed. A forced restart may be
delayed if there are pending restarts for the same service.
5. To schedule a service restart, click the Schedule icon at the top of the wizard. In the Schedule Change panel,
complete the following:
— Now: Restarts services immediately.
— Later: Enter the following information to schedule the member to restart services at a certain date and time:
— Date: Enter a date in YYYY-MM-DD (year-month-day) format. The appliance displays today’s date. You
can also click the calendar icon to select a date from the calendar widget.
— Time: Enter a time in hh:mm:ss AM/PM (hours:minutes:seconds AM or PM) format. You can also select
a time from the drop-down list by clicking the time icon.
— Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
6. Click Restart to restart services immediately or click Schedule Restart to schedule the restart.
Note: Normally, you cannot restart or schedule a restart of services when a scheduled full Grid upgrade is in
progress. However, you can do so for the Default DNS or DHCP restart group. In this case, only the Grid Master
is restarted. The other members of the group remain in the Timed Out status and are restarted after Grid
Manager gets a response from them. For more information about the full Grid upgrades, see Guidelines for
Scheduling Full Upgrades on page 522.
Note: If the delay time from the previous group restart has not elapsed yet, the new restart requests are
displayed with the Pending restart status. To speed up the new restarts, you change the delay between
restart groups to a smaller value at any time.
— Member Restart Timeout. This is the amount of time that the appliance waits for a response from a member.
The default is 1 minute.
5. Optionally, select the check box Apply restart requests to offline members when they connect.
6. Click Save & Close.
Note: File distribution services using TFTP, HTTP, and FTP is not supported by IPv6-only appliances.
Network devices, such as VoIP phones, can use the DHCP services on the appliance for IP address assignments and
use the file distribution services for IP device configuration downloads. Downloads can be accomplished with TFTP,
HTTP, or FTP.
File uploads and downloads by FTP and TFTP file distribution clients are logged in the syslog under the Administration
-> Logs tabs. The logs store the following information:
• Client IP
• Date and Time
• Event type
• File(s) downloaded and/or uploaded
Note: To avoid data loss, after you change the storage limit FD services will be disrupted briefly and will take
some time to resume. Wait until the File Distribution services are running again on the members before
you upload any files.
Note: For HTTP service, you can grant permissions to all clients or specific clients, but you can deny permissions only
to all clients, not specific clients.
When you grant access to a network for a specific file distribution service, all clients in the network are allowed to
request file distribution service. You can deny services to specific IP addresses within the network by adding these
addresses to an access control list and denying access to the service. Ensure that you list these IP addresses before
the network address in the list because the appliance applies permissions to the addresses in the order they are
listed. You can use the arrow keys to move the addresses up and down the list after you add them. For information
about how to create a named ACL, see Configuring Access Control on page 398.
To configure an access control list for a file distribution service:
1. From the Data Management tab, select the File Distribution tab -> Members tab -> member check box, and then
click the Edit icon.
2. In the Member File Distribution Properties editor, select a service tab: TFTP, FTP, or HTTP.
3. In the Allow these clients to perform file transfers section, select one of the following:
— For TFTP and FTP: None: Select this to deny any clients from using the TFTP and FTP file distribution services.
This is selected by default.
— For HTTP: Any: Select this to allow any clients to use the HTTP file distribution service. This is selected by
default.
— Named ACL: Select this and click Select Named ACL to select a named ACL that contains only IPv4
addresses and networks. File distribution does not support IPv6 addresses/networks and TSIG key based
ACEs. When you select this, the appliance allows clients that have the Allow permission in the named ACL
to use the file distribution service. You can click Clear to remove the selected named ACL.
— Set of ACEs: Select this to configure individual access control entries (ACEs). Click the Add icon and select
one of the following from the drop-down list. Depending on the item you select, Grid Manager either adds a
row for the selected item or expands the panel so you can specify additional information about the item you
are adding.
— IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IP address. The
Permission column displays Allow by default. You can change it to Deny by clicking the field and
selecting Deny from the drop-down list.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— Any Address/Network: For TFTP and FTP only. Select this to allow or deny access to all IPv4 addresses
and networks. The default permission is Allow, which means that the appliance allows access to and
from all IPv4 clients. You can change this to Deny to block access.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: When you start or stop a service, there may be a short delay before Grid Manager displays the correct status.
Managing Directories
You can create directories on the Grid Master and on Grid members, in which you can store your files. You can manage
the directories in the following ways:
• Create a directory structure for file distribution, as described in Adding Directories.
• Modify the directory name and permissions, as described in Modifying Directories on page 511.
• Create a Virtual TFTP root directory, as described in Creating a Virtual TFTP Root Directory on page 511.
• View the directories, as described in Viewing Directories From the Files Tab on page 512.
Adding Directories
To add a directory:
1. From the Data Management tab, select the File Distribution tab -> Files tab.
2. Click the parent directory link, and then click Add -> Directory from the Toolbar.
3. Grid Manager adds a new directory to the parent directory and gives it the default name NewDirectory.
You can modify the directory name and permissions, as described in Modifying Directories on page 511.
Modifying Directories
1. From the Data Management tab, select the File Distribution tab -> Files tab.
2. Select a directory check box and click the Edit icon.
3. The Directory editor provides the following tabs from which you can modify data:
— General: You can modify the directory name here, except for the Root directory.
— Virtual TFTP Root: You can add an IP Address, a Network or a Range of IP addresses to support VMware ESX
hosts who need different PXE boot images based on where they are in the network.
— Permissions: You can add or delete admin permissions in this tab. For information, see About
Administrative Permissions on page 195.
4. Save the configuration and click Restart if it appears at the top of the screen.
You can also select a directory and click the Delete icon to delete it.
Note: When you delete a directory, the appliance automatically removes all its contents in that directory.
1. From the Data Management tab, select the File Distribution tab -> Files tab.
2. Select the directory check box and click the Edit icon.
3. In the Directory editor select Virtual TFTP Root. Click the Add icon and select one of the following:
— IP Address: This creates a virtual TFTP directory that the clients from a specified IP address will see as the
root directory.
— Network: This creates a virtual TFTP directory that the clients on a specified network will see as the root
directory.
— Range: This creates a virtual TFTP directory that the clients in a specified range of IP addresses will see as
the root directory.
4. From the drop-down in the Member column, select the member on which to make the virtual TFTP root directory.
5. In the Address/Network column, enter a value:
— IP Address: Enter the IP address of the client that will have access to the virtual TFTP root directory. This IP
address must be on the allow list in the TFTP access control list.
— Network: Enter a network address using the format 10.0.0.0/24. This allows all clients in that network to
access the virtual TFTP root directory. This network address must be on the allow list in the TFTP access
control list.
— Range: Enter the first IP address in the range Address/Network column, and the last IP address in the range
in the End column. This allows all clients in that range to access the virtual TFTP root directory. This range
must be on the allow list in the TFTP access control list.
6. Click Save & Close. Click Restart if it appears at the top of the screen.
7. To create more vIrtual TFTP root directories, repeat Steps 3 through 5.
Managing Files
This section describes how to upload files using the Grid Manager or a file transfer client. You can upload files to the
Grid Master or to individual members.
Uploading Files
Some things to keep in mind when you upload files:
• When you use the Grid Manager to upload files, you can upload files only to the Grid Master, not to
individual members of the Grid.
• To upload files to a member, you must use an FTP client, TFTP client or HTTP client. Files uploaded by file
transfer clients to any member, will be synchronized back to Grid Master.
• The logs for file transfers using third party clients can be found in syslog.
• You can use a third party file transfer client to upload and retrieve files:
— If the ‘anonymous’ login is enabled, you can retrieve files but this ‘anonymous’ user can not upload
files even if the “Allow uploads” option is enabled.
— If you create a user to use with a third party transfer client, this must be an FTP user with read/write
permissions in their directory.
• You can upload a maximum of 10,000 files.
• If uploading the file exceeds the storage limit, the appliance logs a message and does not upload the file.
For information about file distribution storage, see Modifying File Distribution Storage Limits on page 506.
• If you upload a file that has the same name and path as an existing file, the appliance automatically
replaces the old file.
Note: Administrators with superuser privileges can manage uploading files. Limited-access admins with read/write
permissions to specific directories can upload files to the directories. For information, see Administrative
Permissions for File Distribution Services on page 262.
Note: The directory structure in the compressed file is restored when the files are extracted. A directory that already
exists it will be replaced by an extracted directory with the same name.
Note: You can delete an incorrect file selection by clicking the red icon next to the filename before you click Upload
8. To verify the upload was successful. roll the mouse cursor over the green check mark next to the file name. If the
upload was successful, the message “Upload succeeded.” appears.
Viewing Files
You can view files from the Files Tab and from the Members Tab.
Tip: When you drill down on the Grid Master from the Members tab, the Add icon is activated.
4. To see the files on a member, click on the name of the member. Grid Manager displays the following information:
— Name: The name of the file.
— Type: Depending on the file type, this can be Directory or File.
— Size: The file size in B, KB, or MB depending on whether the file size crosses the unit limit or not. For
example, if the file size is 1023, Grid Manager displays 1023 B. If the file size is 1025, Grid Manager
displays 1 KB. For a directory, Grid Manager displays a dash (-).
— Date Modified: The timestamp when the directory was last created or when the file was last modified.
— Synced with Grid Master: You cannot delete files with a value other than “No”. If this value is “No”, you
must delete the file.
Note: You cannot upload, modify, or delete a file or a directory when you drill down from the Members tab.
Managing Users
This section describes how to add and modify user accounts for use with an FTP client.
You must be a NIOS admin user with super user privileges to add, modify, or delete FTP users. FTP users are created
at Grid level, so the same users will be available to access FTP service on all members.
— Each user must have unique Username.
— By default, the home directory with the user name is under the /ftpusers directory. However, the user can
also choose to use an existing directory outside of /ftpusers as his home directory. If the admin specified
home directory is not available then it will raise an error.
— Permission: Read-write or Read-only are assigned for each FTP user. Users with read-write permissions are
allowed to upload files, delete files and list the files and directories under his home directory.
— You can have multiple users to use same home directory. One user may have read-only permissions while
others have read-write permissions on same home directory.
— FTP users are not allowed to add, modify, or delete the directories, even with read-write permissions.
— If the "Allow uploads on the member" is disabled, then users with read-write permission also can not
upload files to his home directory.
About Upgrades
Infoblox frequently releases updated NIOS software. Contact Infoblox Technical Support to learn which file name to
use when downloading a new upgrade file, or watch your email for periodic notifications that a new software upgrade
is available. To get the latest upgrade, your local network must be capable of downloading a file from the Internet. For
information about how to upgrade, see Upgrading NIOS Software on page 527.
You can upgrade an appliance to a specific release if the current release on your appliance supports the upgrade
path. For information about the upgrade and revert paths of a specific release, refer to the latest release notes at
https://support.infoblox.com. Depending on whether there are database schema changes between the existing and
upgrade releases, the appliance can perform either a lite or full upgrade. For information, see Lite Upgrades and Full
Upgrades.
You can schedule certain upgrades for a Grid. Scheduling an upgrade can minimize network and operational outages,
especially when Grid members are spanned across different time zones. You can also arrange the upgrade to happen
during non-peak hours for specific members to avoid overloading the network traffic. When you schedule an upgrade,
you can schedule to update all Grid members at the same time or at different times. Depending on the configuration
of your Grid and the software version that is currently running in the Grid, you can also schedule your upgrades for
different members over a period of time. For more information, see Scheduling Upgrades on page 532.
Based on your network requirements and topology, you can organize your members into upgrade groups so these
members can be upgraded at the same time. For more information about upgrade groups, see Managing Upgrade
Groups on page 524.
You can also import and export upgrade groups and their distribution and upgrade schedules in CSV format. For
information about how to import and export in CSV format, see About CSV Import on page 101 and Exporting Data
to Files on page 108.
Note: When you promote a Grid Master candidate to a Grid Master, you cannot revert to the previous release. Also,
your login username cannot contain any uppercase letters (A to Z), otherwise an upgrade will fail.
Lite Upgrades
A lite upgrade occurs when there are incremental changes to the software that do not require any upgrade to the
database. The appliance can perform a lite upgrade only if the format of the database between the existing NIOS
version and the upgrade version is the same.
In general, when you upgrade from a patch release to another patch release, you are performing a lite upgrade. In a
lite upgrade, members can be running a different software version than the Grid Master. You can add objects, such
as zones, networks, and resource records to the members that are running an older NIOS version. Replication of
zones, networks, resource records, and DHCP leases is supported between the Grid Master and members. When you
want to revert a member however, you must revert the entire Grid.
Whenever possible, the appliance uses the lite upgrade mode to speed up the upgrade process. You can always
schedule a lite upgrade. Note that the appliance disables the testing function for lite upgrades because you do not
need to test a lite upgrade for any database translation. For information about how to schedule an upgrade, see
Scheduling Upgrades on page 532.
Full Upgrades
A full upgrade occurs when there are database schema changes between the existing and upgrade releases. In
general, when you upgrade to a major release, you are performing a full upgrade. Depending on the upgrade and
revert paths that your existing release supports, you may or may not be able to schedule a full upgrade. A full upgrade
that cannot be scheduled does not allow for data replication between the Grid Master and members. For information
about supported upgrade and revert paths, refer to the latest release notes on the Infoblox Support site.
Depending on the upgrade paths your current release supports, when you schedule a full upgrade, the Grid Master
immediately replicates certain core network service tasks to Grid members while putting other tasks in queue until
the members have been upgraded. For information about which data and tasks the Grid Master replicates to
members immediately, see Guidelines for Scheduling Full Upgrades on page 522. For information about how to
schedule an upgrade, see Scheduling Upgrades on page 532.
Note that during a scheduled full upgrade, you cannot perform the following tasks on a Grid member that has not
been upgraded yet:
• Import the DHCP lease history file
• Use the DHCP expert mode configuration feature
• Clear the NAC authentication cache of a DHCP member
• Set the time zone for a Grid member
• View the capacity report of a Grid member
• Test the email configuration settings of a Grid member
• Check whether an IPv6 address is already configured on a Grid member
When you schedule a full upgrade from a previous NIOS release to a release that includes the DHCP fingerprint
detection feature, the following rules apply until the entire Grid has been upgraded:
• DHCP fingerprint detection is disabled
• You cannot add DHCP fingerprint filters
• You cannot apply DHCP fingerprint filters to any DHCP address range
When you schedule a full upgrade from a previous NIOS release to a release that includes the multi-primary zone
feature, the following rules apply until the entire Grid has been upgraded:
• You cannot configure multiple primary servers for an authoritative zone or configure a name server group that
contains multiple primary servers.
• You cannot assign or unassign a Grid member to an authoritative zone or name server group.
• You cannot change the stealth state of an authoritative zone or name server group.
When you schedule a full upgrade from a previous NIOS release to a release that includes the Infoblox Advanced
Protection feature, you cannot complete the following on a Grid member until the member has completed the
upgrade:
• Start or stop the Threat Protection and DNS services.
• Activate a ruleset.
• Perform any threat protection related tasks such as adding custom rules and activating rulesets.
Before scheduling a full upgrade from a previous NIOS release to a release that includes the IPv6 Grid feature, the
following rules apply:
• If the Grid has an HA Master or HA member and if it is configured with IPv6 VIP address, you must configure IPv6
addresses for both node 1 and node 2.
• Both the Grid Master and the Grid Master Candidate should have the same type of network connectivity.
• You have to back up the current configuration and database.
When you schedule a full upgrade from a previous release to NIOS 7.2.x and later, the following rules apply until the
entire Grid has been upgraded:
• You cannot add, modify, or delete an NS group.
• You cannot add, modify, or delete manually created NS records.
• You cannot add, modify, or delete a zone.
• You cannot assign or unassign an NS group to a zone.
• You cannot change the NS group assigned to a zone.
• You cannot change the host name of the Grid member that is assigned to a zone.
• You cannot start or stop the DNS service.
• You cannot restart or schedule a restart for the DNS and DHCP services on the Grid members, except the Default
restart group. For more information, see Restarting Groups on page 500.
Note that when you schedule a full upgrade from a previous release to NIOS 7.2.x and later, you must not modify the
settings for automated mitigation of phantom domain attacks using the CLI commands on a Grid member until the
member has completed the upgrade. Otherwise, the changes made during the upgrade may get lost.
When you schedule a full upgrade from a previous NIOS release to NIOS 7.3.x or later that includes the DNS Traffic
Control feature, the following rules apply until the entire Grid has been upgraded:
• You cannot add an SNMP health monitor.
• You cannot configure the All available load balancing method for a DTC pool.
• The record types are reset to default record types (A and AAAA records) and you cannot modify the record types
for an LBDN.
Note that when you schedule a full upgrade for a Grid which includes members that support Infoblox External DNS
Security and Infoblox Internal Security from a previous NIOS release to NIOS 7.3.x or later, the Threat Protection
Statistics widget in the Dashboard is replaced by the Threat Protection Status for Member widget. For information
about the Threat Protection Status for Member widget, see Threat Protection Status for Member on page 166.
Note: Note that the deactivation of these functions does not affect any data on the Microsoft servers. After the
upgrade, the member automatically restarts the synchronization of Microsoft data.
On a member that synchronizes data with Microsoft DNS and DHCP servers, the following rules apply:
• You cannot modify the managing member if the old and new members have not been upgraded and have not
exited their revert time windows.
• You cannot add, modify, or delete zones, IPv4 DHCP ranges, and IPv4 networks until the managing member has
been upgraded and exits the revert time window.
• You cannot add, modify, or delete DNS resource records if the associated zone is managed by a Microsoft server
and the managing member is still in its revert time window.
• You cannot add, modify, or delete fixed addresses that are assigned to a Microsoft server and the managing
member is still in its revert time window.
• You must wait until the new managing member is upgraded to configure it as a DNS primary or secondary.
• Reporting Member —After you configure a reporting member in a Grid, it automatically becomes the only
member of this group. This group will be upgraded automatically after the Grid Master and before other upgrade
groups. You cannot modify, delete, or schedule this upgrade group. For information about reporting, see
Infoblox Reporting and Analytics on page 1379.
• Default—This is the default upgrade group to which the appliance automatically assigns Grid members. If you
do not explicitly assign a member to an upgrade group, it remains in the Default group. You cannot delete or
rename this group. For information, see Modifying Upgrade Groups on page 526.
Grid Manager provides information about the upgrade group to which a member belongs. You can add or delete an
upgrade group and monitor the software version that is currently running on the Grid and on individual member. You
can do the following:
• Add an upgrade group, as described in Adding Upgrade Groups.
• Modify an upgrade group, as described in Modifying Upgrade Groups on page 526.
• View upgrade group information, as described in Viewing Upgrade Groups on page 526.
• Delete an upgrade group, as described in Deleting Upgrade Groups on page 527.
Note: The appliance displays a warning message when you create an upgrade group that includes the two peers of
a DHCP failover association. Infoblox recommends that you assign DHCP failover peers to separate upgrade
groups to minimize the risk of a loss in DHCP services. For example, if DHCP failover peers are in the same
upgrade group and its members upgrade simultaneously, the upgrade causes a loss in DHCP services.
— Click Select. In the Member Selector dialog box, select the members you want to add to the group, and then
click the Select icon. Use Shift+click and Ctrl+click to select multiple members. Note that if you choose to
distribute and upgrade members sequentially, the distribution and upgrade occur in the order the members
are listed. You can reorder the list by dragging a member to a desired location or by selecting a member and
using the up and down arrows next to the check box to place the member at a desired location. You can also
delete a member from the list.
Note: After you add a member, the appliance adds it to the group members list. The first Grid member in the list
determines the time zone of the group when you schedule the distribution and upgrade. Therefore, Grid
Manager displays the time zone of the first Grid member in the list. (For information about setting time
zones, see Managing Time Settings on page 404.)
5. Save the configuration and click Restart if it appears at the top of the screen.
— Running Version: The NIOS software version that is currently running on the member.
— Distribution Status: The distribution status of the group.
— Timestamp: The date, time, and time zone when a distribution or upgrade is complete.
You can hide some of the default columns, but you cannot sort the information in this table. You can use filters and
the Go to function to narrow down the list. With the autocomplete feature, you can just enter the first few characters
of an object name in the Go to field and select the object from the possible matches. You can also create a quick filter
to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
Note: Grid Manager leaves a field empty when there is no available software for the specific function.
Grid Manager automatically refreshes the Upgrade tab with the latest information and displays the timestamp in the
Last Updated field below the Grid Version Information section.
• Optionally, test the upgrade, as described in Testing Software Upgrades on page 531.
• Perform the software upgrade, as described in Performing Software Upgrades on page 532.
Before upgrading, Infoblox recommends that all members in the Grid be connected to the network and operating
normally. If one or more members are offline when you upgrade the Grid, they automatically receive the distributed
software and upgrade when they join the Grid or come back online.
Note: You cannot upgrade directly to NIOS 5.x from NIOS releases less than 4.2r4. Refer to the release notes for the
appropriate upgrade and revert paths.
Before you upgrade to a later NIOS release, use the show upgrade_compatible command to check if your Grid is
compatible with the release. For information about using this command, refer to the Infoblox CLI Guide.
Caution: Do not attempt to add or remove a member, or convert an HA pair to single members or vice versa during a
distribution or upgrade.
When you upgrade from NIOS 6.4.0 to a later release, you can start, stop, or restart DNS and DHCP services, or only
the DHCP service on a member that has not been upgraded. When you start, stop, or restart other services, such as
reporting or file distribution, the operation is put in queue for execution until after the targeted member has been
upgraded.
Note: When you upload the NIOS software upgrade to an HA Grid Master, only the active node receives the software.
The passive node does not. Therefore, if the Grid Master fails over before a distribution starts, you must upload
the software again. If you do not, the distribution fails because the new active node does not have the
uploaded software.
The distribution starts and if there is an active distribution scheduled, the appliance changes its status to
inactive. The appliance distributes the upgrade files and displays the status of the distribution in the status bar.
You can pause, resume, or stop the distribution by clicking the corresponding icon in the status bar. For
information, see Managing Distributions on page 530.
Note that starting a manual distribution cancels a scheduled distribution.
Scheduling Distributions
When you schedule a distribution, you schedule the distribution of the Grid Master as well as the upgrade groups,
including the Default group. The Grid Master distribution must always occur before the distribution of the upgrade
groups.
To schedule a software distribution:
1. From the Grid tab, select the Upgrade tab, and then click Distribute -> Schedule Distribution from the Toolbar.
2. In the Schedule Distribution editor, complete the following:
— Activate Distribution Schedule: Select this to enable the distribution schedule. Clear this if you are creating
a distribution schedule you plan to activate at a later date. You can configure and save information in this
editor even when you deactivate a scheduled distribution.
— Grid Master Distribution Start Information: Enter a Grid Master distribution date, time, and time zone. The
distribution date and time must be before those of the upgrade groups.
— Date: Enter a start date of the Grid Master distribution in YYYY-MM-DD (year-month-day) format. You
can click the calendar icon to select a date from the calendar widget.
— Time: Enter a start time of the Grid Master distribution in hh:mm:ss AM/PM (hour:minute:second in AM
or PM) format. You can also select a time from the drop-down list.
— Time Zone: Select a time zone that applies to the start time you enter. If this time zone is different from
the Grid time zone, the appliance converts the time you enter here based on the Grid time zone, after
you save this schedule. When you display this schedule again, it displays the converted time. Selecting
the time zone here does not affect any time zone settings in the Grid. (For information about selecting
the Grid and member time zones, see Managing Time Settings on page 404.)
— Admin Local Time: Displays the Grid Master distribution start date and time in the time zone of the
administrator, as explained in Creating Local Admins on page 208.
— In the upgrade group table, specify the following for each upgrade group by clicking the corresponding field
in each row:
— Start Distribution: Specify when the distribution occurs. Select one of the following from the drop-down
list:
• Date/Time: Select this to configure the distribution start date, time, and time zone.
• After <group>: Select After Grid Master to start the distribution immediately after the completion of
the Grid Master distribution. Select an upgrade group that must complete its distribution before
the group you are configuring. When you select this option, you cannot enter a date, time, and time
zone.
Date, Time, and Time Zone are enabled only when you select Date/Time for Start Distribution.
— Date: Enter a distribution start date in YYYY-MM-DD (year-month-day) format. You can click the calendar
icon to select a date from the calendar widget.
— Time: Enter a distribution start time in hh:mm:ss AM/PM (hour:minute:second in AM or PM) format. You
can select a time from the drop-down list.
— Time Zone: By default, the appliance displays the time zone of the first Grid member in the Upgrade
Group. You can change this time zone if you want to enter the time using a different time zone. After you
save the schedule though, the appliance converts the time you entered to the time zone of the upgrade
group, if it is different. (For information about setting the Grid and member time zones, see Managing
Time Settings on page 404.) To change the default time zone of the upgrade group, change the time
zone of the first group member, as explained in Adding Upgrade Groups on page 525.
— Admin Local Time: Displays the start date and time in the time zone of the administrator, as explained
in Creating Local Admins on page 208.
— Distribute to Members: Indicates whether the distribution within the group occurs simultaneously or
sequentially. You cannot edit this field here. You define this when you create the upgrade group. To
change this setting, see Modifying Upgrade Groups on page 526.
3. Save the configuration and click Restart if it appears at the top of the screen.
Grid Manager confirms that the schedule is saved and indicates whether the distribution schedule is active. You
can click the Refresh icon to refresh the information in this panel.
Note that the appliance does not save the schedule and displays an error message if the schedule contains the
following:
— Circular dependencies between upgrade groups. For example, the distribution of Group A is scheduled after
Group B, and the distribution of Group B Is scheduled after Group A.
— The distribution time is in the past.
Managing Distributions
After you start a distribution, you can pause, resume, or stop it. For information, see Pausing and Resuming
Distributions on page 530 and Stopping Distributions on page 531. Grid Manager displays the status of the overall
distribution as well as the status of individual members. You can view this information in the Upgrade tab.
The Grid Distribution Status bar indicates the distribution is paused. For information about the distribution status of
each member, see Monitoring Distribution and Upgrade Status on page 537.
To skip a member from a distribution:
1. From the Grid tab, click the Upgrade tab, and then click Toggle Member List View.
2. Select a member check box, and then click Skip Member from the Toolbar. Grid Manager automatically skips the
distribution of software to the members that are offline.
To resume a distribution:
1. From the Grid Distribution Status bar, click the Resume icon.
2. When the appliance displays a dialog box confirming that you want to resume the distribution, click Yes to
continue.
Members that have not completed or started distributions that were scheduled at an earlier time resume the
distribution.
Stopping Distributions
You can stop a distribution immediately, for example, if there are offline members and you do not want to wait for
them to come back online, or if you realize that you have uploaded the wrong software version. When you stop a
distribution, you can do the following:
• If the Grid Master has completed its distribution, you can upgrade the Grid immediately. This forces members
that do not have a complete distribution to synchronize their releases with the Grid Master.
• If the Grid Master does not have a valid distribution, you can restart the distribution.
• Upload another software upgrade.
Ending a distribution does not affect the upgrade schedule, if configured. The Grid upgrade starts as scheduled, as
long as the Grid Master completes its distribution.
To stop a distribution:
1. From the Grid Distribution Status bar, click the Stop icon.
2. When the appliance displays a dialog box confirming that you want to stop the distribution, click Yes to continue.
Note: Before you upgrade the software, Infoblox recommends that you back up the current configuration and
database. For information, see Backing Up Files on page 541.
Depending on your upgrade paths, you can upgrade to a new release immediately or you can schedule the upgrade.
For information about how to upgrade immediately, see Upgrading the Grid Immediately. Before you schedule an
upgrade, ensure that you understand the limitations, as described in Managing Upgrade Groups on page 524. For
information about how to schedule an upgrade, see Scheduling Upgrades.
Note: The Grid upgrades immediately and if there is an active upgrade schedule, it becomes inactive.
Scheduling Upgrades
You can schedule lite upgrades and full upgrades for certain NIOS versions. For limitations about scheduling a full
upgrade, see Managing Upgrade Groups on page 524. When you schedule an upgrade, you schedule the upgrade for
the Grid Master and the upgrade groups, including the Default group. The Grid Master must always upgrade before
the upgrade groups. Depending on your upgrade paths, you can schedule the upgrade for the Grid Master and
upgrade groups at different times over a period of nine days. If you schedule an upgrade that takes more than nine
days, the appliance displays a warning.
To schedule an upgrade:
1. From the Grid tab, select the Upgrade tab, and then click Upgrade -> Schedule Upgrade from the Toolbar.
2. In the Upgrade Schedule editor, complete the following:
— Activate Upgrade Schedule: Select this to enable the upgrade schedule. Clear it if you are creating an
upgrade schedule that you plan to activate at a later date. You can configure and save information in this
editor even when you deactivate a distribution.
— Grid Master Upgrade Start Information: Enter a Grid Master upgrade date, time, and time zone. The date
and time must be before those of the upgrade groups.
— Date: Enter a start date of the Grid Master upgrade in YYYY-MM-DD (year-month-day) format. You can
click the calendar icon to select a date from the calendar widget.
— Time: Enter a start time of the Grid Master upgrade in hh:mm:ss AM/PM (hour:minute:second in AM or
PM) format. You can select a time from the drop-down list.
— Time Zone: Select a time zone that applies to the start time you enter. If this time zone is different from
the Grid time zone, the appliance converts the time you enter here based on the Grid time zone, after
you save this schedule. When you display this schedule again, it displays the converted time. Selecting
the time zone here does not affect any time zone settings in the Grid. (For information about setting the
Grid and member time zones, see Managing Time Settings on page 404.)
— Admin Local Time: Displays the Grid Master upgrade date and start time in the time zone of the
administrator, as explained in Creating Local Admins on page 208.
— In the upgrade member table, specify the following by clicking the corresponding field in each row:
— Group: The name of the upgrade group. You can assign a different upgrade group by selecting the
group from the drop-down list.
— Group Members: When you expand an upgrade group, this field displays the group members.
— Warning: This field turns yellow when there is a conflict among the upgrade groups. Hover your mouse
over the field and the tooltip displays the member that contains the conflict. It also displays
recommended upgrade groups in the Group column so you can change the group assignment to
resolve the conflict. The tooltip can display one of the following: GMC, DNS Primary, DHCP Logging
Member, or DHCP Failover. For information about how to resolve a conflict, see Resolving Upgrade
Warnings on page 533. Select an upgrade group from the drop-down list in the Group column to assign
a different upgrade group. Click Validate and Refresh to validate the new group assignment.
— Start Upgrade: Specify when the upgrade occurs. Select one of the following from the drop-down list:
• Date/Time: Select this to configure the upgrade start date, time, and time zone.
• After <group>: Select After Grid Master to start the distribution immediately after the completion of
the Grid Master distribution. Select an upgrade group that must complete its distribution before
the group you are configuring. If you select this option, you cannot enter a date, time, and time
zone.
Date, Time, and Time Zone are enabled only when you select Date/Time for Start Upgrade.
— Date: Enter an upgrade start date in YYYY-MM-DD (year-month-day) format. You can click the calendar
icon to select a date from the calendar widget.
— Time: Enter an upgrade start time in hh:mm:ss AM/PM (hour:minute:second in AM or PM) format. You
can select a time from the drop-down list.
— Time Zone: By default, the appliance displays the time zone of the first Grid member in the Upgrade
Group. You can change this time zone, if you want to enter the time using a different time zone. After
you save the schedule though, the appliance converts the time you entered to the time zone of the
upgrade group, if it is different. (For information about setting the Grid and member time zones, see
Managing Time Settings on page 404.) To change the default time zone of an upgrade group, change
the first group member in the Upgrade Group list, as explained in Adding Upgrade Groups on page
525.
— Admin Local Time: Displays the data and time in the time zone of the administrator, as explained in
Creating Local Admins on page 208.
— Upgrade Members: Indicates whether the upgrade within the group occurs simultaneously or
sequentially. You cannot edit this field here. You define this when you create the upgrade group. To
change this setting, see Modifying Upgrade Groups on page 526.
3. Save the configuration.
The appliance does not save the schedule and displays an error message if the schedule contains the following:
• Circular dependencies between upgrade groups; for example, the upgrade of Group A is scheduled after Group
B, and the upgrade of Group B is scheduled after Group A.
• The upgrade time is in the past.
The appliance also does not save the schedule and displays a warning when there is a group assignment conflict. For
information about how to resolve these conflicts, see Resolving Upgrade Warnings.
Otherwise, the appliance confirms that the schedule is saved and indicates whether the upgrade schedule is active.
• DHCP Failover: To resolve this warning, place the peers of a DHCP failover association in separate upgrade
groups. Ensure that you schedule upgrades of the failover peers close to each other to minimize configuration
rules. NIOS does not allow DHCP configuration changes that affect the communication between the peers until
both peers are upgraded.
Note: You may potentially lose some data when you revert a member. The appliance keeps information about DHCP
leases and DNS records intact.
Grid Manager displays a message indicating that the revert process disrupts Grid services. Read the message
carefully, and then click Yes to confirm your decision to revert the member. Be aware that when you revert a
member, some changes made since the member was last upgraded may get lost.
Upgrade Process
When an upgrade starts, Grid Manager checks if the nodes of an HA Grid Master have the same NIOS software version
on their alternate partitions. If they do not have the same software version, the upgrade process stops. Grid Manager
displays an error message and if it is a scheduled upgrade, Grid Manager deactivates the schedule as well. Otherwise,
the upgrade process continues.
Note: During the upgrade, you can view the status of the Grid Master in the serial console.
During the upgrade, if a Grid member has not completed its distribution, it automatically resynchronizes with the Grid
Master after the Grid Master upgrade is complete.
Due to the nature of the upgrade sequence, HA pairs fail over during the upgrade. Therefore, be aware that the active
and passive nodes reverse roles. The order in which Grid members upgrade, including when HA pairs fail over, is
shown in Figure 10.1 (for an HA Grid Master) and Figure 10.2 on page 536 (for a single Grid Master).
Figure 10.1 Upgrade Sequence for an HA Grid Master and Grid Members
Grid
Failover 1 The passive node (Node 2) of the
HA Grid 2 Grid Master upgrades.
Master Active Passive
2 The Grid Master fails over from Node
1 to Node 2. At this point, the active
Grid Master (Node 2) is using the
3 upgraded code. All other nodes,
1 including the passive node (Node 1)
and all Grid members, rejoin the
newly updated active node (Node 2).
Node 1 Node 2 Since the NIOS version on these
nodes does not match that of the
4 Failover active Grid Master, the nodes are
Active Passive directed to upgrade.
Node 1 Node 2
4 The HA Grid member fail overs from
Node 1 to Node 2.
Note: Grid members that do not have the correct NIOS version on their alternate partitions due to an incomplete
distribution automatically resynchronize the NIOS version with the Grid Master, and then upgrade.
Figure 10.2 Upgrade Sequence for a Single Grid Master and Grid Members
Grid
1 Single Grid Master upgrades. All
other members rejoin the newly
1 updated Grid Master. Since the NIOS
version on these nodes does not
match that of the Grid Master, the
nodes are directed to upgrade.
Single Grid
Master Failover
2 Node 2 (passive) of the HA member
and the single member upgrade.
3
Active Passive
3 The HA member fails over from Node
1 to Node 2.
HA Grid
Member 4 2
4 Node 1 (now passive) of the HA
member upgrades.
Node 1 Node 2
Single Grid 2
Member
The Grid Manager session terminates when the HA Grid Master fails over from Node 1 to Node 2, or when the single
Grid Master reboots and goes offline.
During a scheduled upgrade, the Grid members that have not upgraded yet can join the Grid and function normally
until their scheduled upgrade time. When the upgrade finishes, the upgrade schedule is set to inactive.
Managing Upgrades
During an upgrade, Grid Manager displays a system message at the top of the screen indicating the Grid is being
upgraded. After you start an upgrade, you can pause or resume it. For information, see Pausing and Resuming
Upgrades and Monitoring Distribution and Upgrade Status on page 537.
To resume an upgrade:
1. From the Grid Upgrade Status bar, click the Resume icon.
2. When the appliance displays a dialog box confirming that you want to resume the upgrade, click Yes to continue.
Members that have not completed or started upgrades that were scheduled at an earlier time resume the
upgrade.
Detailed Status
You can view detailed process information of a member during a distribution or an upgrade.
To view detailed process information:
1. From the Grid tab, select the Upgrade tab, and then click Toggle Member List View.
2. Select a member and then click the Detailed Status icon.
Grid Manager displays a panel that shows the required steps during a distribution or an upgrade. It also displays a
color indicator, next to each step, to indicate the current status of each step. The color indicator can be one of the
following:
• Grey: The process has not started yet.
• Green: The process is complete.
• Blue: The distribution or upgrade that is in progress.
• Red: There is an error; Grid Manager displays a description of the problem.
• Yellow: A warning message.
When the selected member is an HA pair, Grid Manager displays the status information for both nodes. The panel
remains open until you close it or select a different member.
Downgrading Software
Each Infoblox appliance model has a minimum required release of Infoblox software. Before downgrading an
appliance, refer to the document, Minimum Required Release Software for Hardware Platforms, that shipped with
your product.
The downgrade procedure is for single independent appliances only. Infoblox does not support software downgrades
for Grid members, but you can revert to the previous NIOS release (see the next section) on a Grid Master.
Caution: Although the downgrade process preserves license information and basic network settings, it does not
preserve data. After you complete the downgrade procedure, all data in the database is lost.
Applying Hotfixes
Infoblox periodically releases hotfixes that contain resolved issues. Only superusers can apply hotfixes through Grid
Manager. When you install hotfixes through Grid Manager, you can apply them to the Grid Master and All Grid
members, the Grid Master only, the Grid Master and Grid Master Candidates, or selected Grid members. This feature
is supported on appliances running NIOS version 7.1 or later. Note that each hotfix addresses specific issues.
Infoblox recommends that you verify the hotfix before you apply it to ensure that it is the correct version.
After you apply a hotfix, Grid manager displays the hotfix status in the Upload Status bar. In addition, you can view
the history of the most recent list of applied hotfixes in the Hotfix History dialog box. For information about viewing
hotfix history, see Viewing Hotfix History on page 540.
Note: A hotfix installation may fail if there is a mismatch in the NIOS software versions or if a hotfix image fails to
meet the software or hardware restrictions.
To apply a hotfix:
1. From the Grid tab, select the Upgrade tab, and then click Apply Hotfix from the Toolbar and select one of the
following:
— To Grid Master and all Grid Members: Click this to apply hotfix to the Grid Master and all Grid members.
— To Grid Master: Click this to apply hotfix to the Grid Master only.
— To Grid Master and Grid Master Candidates: Click this to apply hotfix only to the Grid Master and Grid
Master candidates.
— To selected Grid Members: Click this to apply hotfix to the selected Grid member. This option is available
only after you have selected a Grid member or members.
2. In the Apply Hotfix dialog box, click Select and navigate to the hotfix image file you want to upload. Click Open
to select the file, and click Upload.
Note: If you have already installed a hotfix and subsequently try to upgrade or downgrade NIOS, the appliance
displays a warning message because resolved issues in the hotfix will no longer be valid if the upgrade or
downgrade version does not contain the original hotfix.
The appliance applies the hotfix to the targeted appliance(s). You cannot stop the hotfix process once you start
it. Grid Manager displays the hotfix status in the Upload Status bar.
Note: Infoblox recommends that you backup the configuration after you convert a Grid to a different mode. Restoring
the old backup by performing a forced restore, may prevent the Grid members from rejoining the Grid Master
after the restore.
The following sections describe how to use the backup and restore functions:
• Backing Up Files
• Automatically Backing Up Data Files on page 542
• Backing Up Files on page 541
• Restoring Backup Files on page 545
• Downloading Backup Files from a Different Appliance on page 546
Note: Infoblox highly recommends that you always back up the current configuration file before upgrading, restoring,
or reverting the software on the appliance. If you are performing these operations on appliances licensed for
Discovery and that perform discovery, the discovery database can be backed up and restored using the same
mechanisms.
Backing Up Files
You can back up system files and discovery databases periodically and on demand. You can then restore the files on
the same appliance or on a different appliance. For information about restoring files, see Restoring Backup Files on
page 545. You can configure the appliance to automatically back up the files on a weekly, daily, or hourly basis.
Infoblox recommends that you back up the system files during off-hours to minimize the impact on network services.
By default, the automatic backup function is turned off. You must log in with a superuser account to back up files.
You can back up system configuration and/or discovery database files to the following:
• A local directory
• The management system that you use to operate the appliance
• A TFTP server
• An FTP server. This option requires that you have a valid username and password on the server prior to backing
up files.
• An SSH server that supports SCP. This option requires that you have a valid username and password on the
server prior to backing up files.
Local Backup
You can store a backup file on the appliance itself. However, Infoblox recommends that you store backup files in an
alternate location. When you back up the system files locally, the appliance uses the following format to name the
file: BACKUP_YYYY_MM_DD_MM.tar.gz. For example, a file name of BACKUP_2013_11_30_23_00 means that the file
is backed up on November 30th, 2013 at 11:00 PM.
The appliance can save up to 20 configuration files, regardless of how often the files are saved (weekly, hourly, or
daily). Ensure that you take the size of the configuration file into consideration when backing up files because the
storage limit on an appliance is 5 Gb (gigabytes). If your configuration file is 500 Mb (megabytes), then the appliance
can store 10 configuration files. When uploading configuration files on to a TFTP, FTP, or SCP server, you must consider
the file size on that server as well.
Using TFTP
TFTP is a client-server protocol that uses UDP as its transport protocol. It does not provide authentication or
encryption, therefore it does not require a username or password.
When you back up the system files to a TFTP server, you select the backup file you want to download, enter the name
in which the file is stored on the TFTP server and the server IP address.
Using FTP
FTP is a client-server protocol used to exchange files over TCP-based networks. The appliance, as the FTP client,
connects to a remote FTP server that you identify. When you use FTP to back up the system files, the password and
file contents are transmitted in clear text and may be intercepted by other users.
When you back up the system files to an FTP server, the appliance, as the FTP client, logs on to the FTP server. You
must specify the username and password the appliance uses to log on to the FTP server. The user account must have
write permission to the directory to which the appliance uploads the backup file.
Using SCP
SCP is more secure than TFTP and FTP. It uses the SSH protocol to provide authentication and security. You can use
SCP to back up the NIOS system files to a server running SSHv2.
When you use SCP to back up the system files to an SSH server, you must specify the username and password the
appliance uses to log on to the server. The user account must have write permission to the directory to which the
appliance uploads the backup file. In addition, make sure that you enter the correct IP address of the SSH server; the
appliance does not check the credentials of the SSH server to which it connects.
Note: The SCP protocol uses SSH for data transfer and thus provides the same authentication and security as SSH.
SCP uses LAN1 regardless of whether the MGMT port is enabled or not.
Note: If you have configured AD server for authentication, you must specify “domain name\\username”.
Note: If you have configured AD server for authentication, you must specify “domain name\\username”.
Note: When you select FTP or SCP, ensure that you have a valid username and password on the server prior to
backing up the files.
— Grid Master (Local): Back up to a local directory on the Grid Master. This is the default.
By default, the Grid Master generates a backup file and saves it locally in its own storage at 3:00 AM daily.
Be aware that backing up the Grid and saving it locally on an hourly basis increases the turnover of files
stored on the Grid Master. Backing it up hourly to a remote server increases the overall amount of traffic on
your network.
3. If the Grid has a discovery member, Grid Manager displays the NIOS data and Discovery data check boxes. You
can select the NIOS data check box, to back up NIOS configuration data for the Grid and select the Discovery data
check box, to back up discovery data for the Grid.
If the Grid has a reporting member, Grid Manager displays the Infoblox Splunk App check box. You can select
the Infoblox Splunk App check box, to back up Splunk application reporting data.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: If you have configured AD server for authentication, you must specify “domain name\\username”.
Note: If you have configured AD server for authentication, you must specify “domain name\\username”.
Note: When you select FTP or SCP, ensure that you have a valid username and password on the server prior to
backing up the files.
3. If the Grid has a discovery member, Grid Manager displays the NIOS data and Discovery data check boxes. You
can select the NIOS data check box, to back up NIOS configuration data for the Grid and select the Discovery data
check box, to back up discovery data for the Grid.
If the Grid has a reporting member, Grid Manager displays the Infoblox Splunk App check box. You can select
the Infoblox Splunk App check box, to back up Splunk application reporting data.
4. Click Backup.
Note: When you select FTP or SCP, ensure that you have a valid username and password on the server prior to
backing up the files.
You must log in with a superuser account to back up and restore files.
NIOS provides three ways to restore a backup file:
• From a local directory or the management system you use to operate the appliance
• From a TFTP server
• From a remote server using FTP. This option requires that you have a valid username and password on the FTP
server prior to performing a backup or restore.
To restore a backup file to the same independent appliance or Grid Master:
1. From the Grid tab, select the Grid Manager tab, and then click Restore from the Toolbar.
2. In the Restore dialog box, choose one of the following from the Restore from drop-down list:
— My Computer: Restore a file from your local computer. This is the default.
— Filename: Click Select File to navigate to the configuration file.
— TFTP: Restore a file from a TFTP server.
— Filename: Enter the directory path and the file name you want to restore. For example, you can enter
/archive/backups/Infoblox_2009_10_20_15_30.
— IP Address of TFTP Server: Enter the IP address of the TFTP server from which you restore the
configuration file.
— FTP: Restore a file from an FTP server.
— Filename: Enter the directory path and the file name of the backup file. For example, you can enter
/archive/backups/Infoblox_2009_10_20_15_30.
— IP Address of FTP Server: The IP address of the FTP server.
— Username: Enter the username of your FTP server account.
— Password: Enter the password of your FTP server account.
• Grid Master (Local): Restore from a local directory on the Grid Master. In the Backup Set table, select the file you
want to restore.
3. To restore NIOS configuration data, select the NIOS data check box.
4. To restore Discovery data, select the Discovery data check box. Discovery data should be restored to Consolidator
appliances with the correct licensing.
5. To download a backup file from one appliance to a different appliance, select Force Restore from Different Grid
to enable the feature, and then select one of the following:
— Retain Current Grid Master IP Settings (this is the default)
— Overwrite Grid Master IP Settings
6. Click Restore. In the Confirm Restore dialog box, click Yes.
After restoring the file, the appliance restarts. The restore process overwrites all existing data. All pending
scheduled tasks are not restored or reverted.
7. Close your current browser window, wait a few minutes, and then reconnect to the NIOS appliance.
Note: In previous NIOS releases, you could run the bloxTools service only on a Grid Master. If bloxTools has been
configured to run on a Grid Master before an upgrade, the bloxTools service continues to run on the Grid Master
after an upgrade. This configuration is preserved mainly for migration purposes only. Infoblox strongly
recommends that you move the bloxTools service to a Grid member after the upgrade. For information, see
Moving the bloxTools Service on page 553.
In a Grid, you can run the bloxTools service only on one Grid member at a time, and you cannot configure this member
as a Grid Master candidate. However, you can move the bloxTools service from one member to another. For
information, see Moving the bloxTools Service on page 553.
On an HA member, the bloxTools service runs on the active node. If there is an HA failover, the bloxTools service is
automatically launched after the passive node becomes active. For information, see About HA Pairs on page 282.
Note: When you run the bloxTools service on an independent appliance or a Grid member, the performance of other
services running on the appliance may be affected. Infoblox recommends that you run the bloxTools
environment on a member that does not host critical services.
After you enable the bloxTools service and configure its built-in file transfer services, you can upload content to the
bloxTools portal using either an FTP (File Transfer Protocol) or SFTP (SSH File Transfer Protocol) client. The uploaded
content is included in system backups and you can restore it from the backups.
For more information about the bloxTools environment and to access free applications, visit
https://community.infoblox.com/resource/bloxtools-snapins.
System Requirements
Table 11.1 shows which Infoblox appliances support the bloxTools service and the memory requirement for each. The
service “borrows” host resources such as CPU, memory, and disk space from the host Infoblox appliance.
WARNING: Resetting the Grid member using either the reset all or reset database CLI commands permanently
deletes the content you uploaded to the bloxTools environment. Infoblox recommends that you
backup the appliance before using any of these commands.
Note: When you redirect HTTP to HTTPS, the connection is not as secure as compared to connecting directly through
HTTPS.
Note the following when you configure the bloxTools service on port 443:
• HTTP to HTTPS redirection from Grid member to Grid Master is disabled.
• HTTP file distribution service is not allowed.
In previous NIOS releases, you could run the bloxTools service on a Grid Master or a Grid Master candidate. If you have
not removed the bloxTools service from a member before you upgrade it to NIOS 6.11.0 or later, you cannot configure
the bloxTools service on port 443 until you move the bloxTools service to an upgraded Grid member. For information,
see Moving the bloxTools Service on page 553.
To configure the bloxTools service:
1. Log in as a superuser.
2. From the Grid tab, select the Grid Manager tab, and then click bloxTools. In the Services tab, click Edit -> Grid
bloxTools Properties from the Toolbar.
Note: The password is sent as clear text when you use the FTP service. To maintain security on the Infoblox
appliance, this password should be different from the password set for the Infoblox appliance.
4. Save the configuration and click Restart if it appears at the top of the screen.
When you configure the bloxTools service on an independent appliance, you can configure the allocated memory in
the System bloxTools Properties editor. For information, see Allocating Memory on page 552.
Allocating Memory
You can configure the memory you want to allocate to the bloxTools service. You must configure this at the member
level. If you run the bloxTools service on an independent appliance, you can configure the allocated memory in the
System bloxTools Properties editor.
To configure the allocated memory:
1. Log in as a superuser.
2. From the Grid tab, select the Grid Manager tab, and then click bloxTools. In the Services tab, click Edit -> Member
bloxTools Properties from the Toolbar.
3. In the Member bloxTools Properties editor, complete the following:
— Allocated Memory (MB): The service “borrows” host resources such as CPU, memory, and disk space from
the host Infoblox appliance. The default amount of memory the appliance allocates for the bloxTools
environment is 256 MB. You can change this allocation, depending on the appliance platform. See System
Requirements on page 550 for the requirements and allowed values of each appliance.
Uploading Files
Use an FTP or a SFTP client to upload content, such as Perl modules, JavaScript files, PHP files, CGI files, and image
files, to the bloxTools environment. You can upload a maximum of 4 GB of data. After you have uploaded content to
your bloxTools environment, you should disable the FTP and SFTP services to prevent unauthorized or accidental
changes.
To upload files using the FTP service:
1. Open an Internet browser window and log in to the FTP service by entering:
ftp://Grid_member_ip_addr:ftp_port
For example, if the IP address of the Grid member is 10.1.1.1 and the FTP port number is 26, enter:
ftp://10.1.1.1:26
2. In the Authentication Required dialog box, enter the username and password. This is the username and
password you entered for the FTP service in the bloxTools Environment editor on the appliance.
3. Follow the instructions provided by your FTP client to upload the files.
To upload files using the SFTP service:
1. Open a terminal window and log in to the SFTP service by entering:
sftp -oPort=sftp_port sftp_user@Grid_member_ip_addr
For example, if the IP address of the Grid member is 10.1.1.1, the login username for the SFTP service is jdoe,
and the SFTP port number is 28, enter:
sftp -oPort=28 [email protected]
2. Enter the password. This is the password you entered for the SFTP service in the bloxTools Environment editor on
the appliance.
3. Follow the instructions provided by your SFTP client to upload the files.
Note: On a computer running Microsoft Windows, you can use WinSCP as the FTP or SFTP client for uploading files.
The bloxTools environment stores the uploaded data in the /portal directory.
Scheduling Tasks
bloxTools includes support for the Perl module Config::Crontab so you can manage scheduler services. You can
use the scheduler to execute commands in the future. You can also schedule recurring commands. For example, you
can schedule the creation of a host record or schedule recurring reports. The scheduler allows default “user level”
crontab access and you can use the user account ‘nobody’ to submit commands. The Grid Master replicates the
crontab data to the Master Candidates.
Usage of at least one of the following resources is greater than or equal to 80%: CPU, memory
Yellow
or disk. The description indicates the percentage of each resource.
The bloxTools Environment is down, or an essential service within the bloxTools Environment
Red
has failed.
Note: The RIR registration update feature is not supported in a Multi-Grid configuration.
Note: Before the NIOS appliance sends registration updates to the RIPE database, it does not validate the data you
submit. Therefore, if you enter invalid information that cannot be mapped to the RIPE database, your updates
will fail. In addition, the NIOS appliance does not synchronize data from the RIPE database.
Note: Ensure that you configure DNS resolvers for the Grid when you enable this feature. For information about
how to configure DNS resolvers, see Enabling DNS Resolution on page 477.
Note: You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute, you
must delete it from the table. You can enter up to 256 characters for all RIR attributes.
3. Save the configuration. Note that you cannot schedule the creation, modification, or deletion of an RIR
organization.
Note: You can also add RIR networks through Task Dashboard. For information, see The Tasks Dashboard on page
119.
After you create an RIR network container or network, you can perform the following:
• Split a network that has an organization ID. A child network that is created does not contain an organization ID
by default. You must assign an organization ID to the child network after splitting it. For information about
splitting an RIR network, see Splitting IPv4 Networks into Subnets on page 592 and Splitting IPv6 Networks into
Subnets on page 606.
• Resize an IPv4 RIR network that contains an organization ID and has been registered with RIPE. For more
information, see Resizing IPv4 Networks on page 591.
— Do not update registrations: By default, the appliance sends updates to RIPE if you specify Create, Modify,
or Delete as the registration action. Select this if you do not want the appliance to submit updates to the
RIPE database.
RIR Network Attributes: Modify the value of RIR network attributes by clicking the Value field of an attribute and
entering a new value. You can add a new RIR network attribute by clicking the Add icon and selecting an
attribute from the drop-down list. You can also select any optional attributes and click the Delete icon to delete
them. For information about RIR network attributes, see RIR Network Attributes on page 565.
You can enter up to 256 characters for all RIR network attributes, unless otherwise noted.
Preview RIR Submissions: Click this to view the updates before the appliance submits them to the RIPE
database. This button is enabled only when the registration action is Create, Modify, or Delete, and the Do not
update registrations check box is not selected. For more information, see Previewing Registration Updates on
page 569.
To schedule this task, click the Schedule icon at the top of the wizard. In the Schedule Change panel, click Later,
and then specify a date, time, and time zone.
3. Save the configuration.
Note: RIPE does not support UTF-8 data in the Description and Remarks fields. After an upgrade, the NIOS appliance
keeps the UTF-8 data in these fields. However, if you want to modify these fields after the upgrade, you must
remove the UTF-8 data before you can save the changes.
When you enter a value for the following RIR attributes that cannot be mapped to a valid reference in the RIPE
database, updates to the RIR database will fail. However, these values will still be displayed in the IPv4 or IPv6
network or network container panels of Grid Manager.
• RIPE Routes Maintainer
• RIPE Lower Level Maintainer
Corresponding Required/
Organizational Attribute RIPE Attribute Description and Format Optional
RIPE Description descr Enter a short description about the organization. Optional
RIPE Country country From the drop-down menu, select the country name, Required
followed by the two-letter ISO 3166 country code, of
the country or area within the RIPE NCC service
region or through Local Internet Registries.
RIPE Admin Contact admin-c Enter the name of the on-site admin contact for the Required
organization. Enter the name in this format: Start
with two to four optional characters, followed by up
to six optional digits, and then follow by a source
specification. The first digit cannot be "0". The
source specification starts with "-" followed by the
source name that contains up to nine characters in
length.
RIPE Technical Contact tech-c Enter the name of the technical contact for the Required
organization. Enter the name in this format: Start
with two to four optional characters, followed by up
to six optional digits, and then follow by a source
specification. The first digit cannot be "0". The
source specification starts with "-" followed by the
source name that contains up to nine characters in
length.
RIPE Remarks remarks Enter remarks about the organization. Optional
RIPE Notify notify Enter the email address to which notifications of Optional
changes to the organization will be sent.
Corresponding Required/
Organizational Attribute Description and Format
RIPE Attribute Optional
RIPE Registry Source source From the drop-down list, select the registry at which Optional
the organization is registered. The default is RIPE.
Select RIPE for the RIPE database, which is the
authoritative database. Select TEST for the RIPE
TEST database that operates in the same way as the
RIPE database but contains only test data. Note that
test data is cleaned out at the start of each month
and a predetermined set of basic objects is
re-inserted. You can use the RIPE TEST database to
learn how to update the database and try out
special scenarios. The RIPE TEST database has fewer
restrictions which allows you to create
encompassing or parent objects you may need for
testing.
RIPE Organization Type org-type From the drop-down list, select one of the following Optional
organization type:
• IANA for Internet Assigned Numbers Authority
• RIR for Regional Internet Registry
• NIR for National Internet Registry
• LIR for Local Internet Registry
• WHITEPAGES for special industry people
• DIRECT_ASSIGNMENT for direct contract with
RIPE NCC
• OTHER for all other organizations
Corresponding Required/
Organizational Attribute Description and Format
RIPE Attribute Optional
RIPE Fax Number fax-no Enter the organization fax number in numeric format Optional
starting with the + character, followed by the country
code, area code, and the fax number. For example,
you can enter +16052529000. You can also use one
of the following formats:
• '+' <integer-list>
• '+' <integer-list> "(" <integer-list> ")" <integer-list>
• '+' <integer-list> ext. <integer list>
• '+' <integer-list> "(" integer list ")" <integer-list>
ext. <integer-list>
RIPE Email email Enter the organization email address. Required
RIPE Abuse Mailbox abuse-mailbox Enter the email address to which abuse complaints Optional
are sent.
RIPE Reference Notify ref-nfy Enter the email address to which notifications are Optional
sent when a reference to the organization object is
added or removed.
Corresponding Required/
Network Attributes RIPE Attribute Descriptions and Formats
Optional
RIPE Admin Contact admin-c The name of the on-site admin contact for the Required
network address. This attribute is populated from
the organizational attribute.
You can modify the value in this format: Start with
two to four optional characters, followed by up to six
optional digits, and then follow by a source
specification. The first digit cannot be "0". The
source specification starts with "-" followed by the
source name that contains up to nine characters in
length.
RIPE Computer Security mnt-irt The name of the Computer Security Incident Optional
Incident Response Team Response Team (CSIRT) that handles security
incidents for the network address.
You can enter the value in this format: Use letters,
digits, the character underscore "_", and the
character hyphen "-". The value must start with
"irt-", and the last character of a name must be a
letter or a digit. You must enter a minimum of five
characters.
Corresponding Required/
Network Attributes Descriptions and Formats
RIPE Attribute Optional
RIPE Country country The two-letter ISO 3166 country code of the country Required
within the RIPE NCC service region or through Local
Internet Registries. This attribute is populated from
the organizational attribute. You can select a
different country code from the drop-down list.
RIPE Description descr Enter a short description about the network. Required
RIPE IPv4 Status status The status of the IPv4 network address. From the Required
drop-down list, select one of the following status:
ALLOCATED PA
ALLOCATED PI
ALLOCATED UNSPECIFIED
LIR-PARTITIONED PA
LIR-PARTITIONED PI
SUB-ALLOCATED PA
ASSIGNED PA
ASSIGNED PI
ASSIGNED ANYCAST
EARLY-REGISTRATION
NOT-SET
RIPE IPv6 Status status The status of the IPv6 network address. From the Required
drop-down list, select one of the following:
ALLOCATED-BY-RIR
ALLOCATED-BY-LIR
ASSIGNED
ASSIGNED ANYCAST
ASSIGNED PI
Corresponding Required/
Network Attributes Descriptions and Formats
RIPE Attribute Optional
RIPE Lower Level mnt-lower Enter the name of the registered maintainer for Optional
Maintainer hierarchical authorization purposes. This can
protect the creation of networks directly (one level)
below in the hierarchy of a network container or
another network. The authentication method of the
maintainer will be used upon creation of any
network directly below the network that contains
the "mnt-lower:" attribute.
Enter the maintainer name in this format: Use
letters, digits, the character underscore "_", and the
character hyphen "-". The first character must be a
letter, and the last character must be a letter or a
digit. You cannot use the following words (they are
reserved by RPSL): any, as-any, rs-any, peer, as,
and, or, not, atomic, from, to, at, action, accept,
announce, except, refine, networks, into, inbound,
outbound. Also note the following: Names starting
with certain prefixes are reserved for certain object
types. Names starting with "as-" are reserved for as
set names. Names starting with "rs-" are reserved
for route set names. Names starting with "rtrs-" are
reserved for router set names. Names starting with
"fltr-" are reserved for filter set names. Names
starting with "prng-" are reserved for peering set
names. Names starting with "irt-" are reserved for irt
names.
RIPE Network Name netname The name of the IP address range. You can enter up Required
to 80 characters. Enter the network name in this
format: Use letters, digits, the character underscore
"_", and the character hyphen "-". The first character
must be a letter, and the last character must be a
letter or a digit.
RIPE Notify notify Enter the email address to which notifications of Optional
changes to the object must be sent.
RIPE Registry Source source From the drop-down list, select the registry at which Required
the organization is registered. The default is RIPE.
Select RIPE for the RIPE database, which is the
authoritative database. Select TEST for the RIPE
TEST database that operates in the same way as the
RIPE database but contains only test data. Note that
test data is cleaned out at the start of each month
and a predetermined set of basic objects is
re-inserted. You can use the RIPE TEST database to
learn how to update the database and try out
special scenarios. The RIPE TEST database has
fewer restrictions which allows you to create
encompassing or parent objects you may need for
testing.
RIPE Remarks remarks Enter remarks about the network. Optional
Corresponding Required/
Network Attributes Descriptions and Formats
RIPE Attribute Optional
RIPE Reverse Domain mnt-domains Enter the name of a registered maintainer used for Optional
Maintainer reverse domain authorization. This can protect
domain objects. The authentication method of this
maintainer will be used for any encompassing
reverse domain object.
Enter the maintainer name in this format: You can
use letters, digits, the character underscore "_", and
the character hyphen "-". The first character must be
a letter, and the last character must be a letter or a
digit. You cannot use the following words (they are
reserved by RPSL): any, as-any, rs-any, peer, as,
and, or, not, atomic, from, to, at, action, accept,
announce, except, refine, networks, into, inbound,
outbound. Also note the following: Names starting
with certain prefixes are reserved for certain object
types. Names starting with "as-" are reserved for as
set names. Names starting with "rs-" are reserved
for route set names. Names starting with "rtrs-" are
reserved for router set names. Names starting with
"fltr-" are reserved for filter set names. Names
starting with "prng-" are reserved for peering set
names. Names starting with "irt-" are reserved for irt
names.
RIPE Routes Maintainer mnt-routes This attribute references a maintainer that is used in Optional
determining authorization for the creation of route
objects. Enter the name in this format: Start with the
reference to the maintainer, followed by an optional
list of prefix ranges inside of curly brackets or the
keyword "ANY". The default, when no additional set
items are specified, is "ANY". For more information,
refer to RFC-2622. Example: <mnt-name> [ { list of
<address-prefix-range> } | ANY ].
RIPE Technical Contact tech-c The name of the technical contact for the network. Required
Enter the name in this format: Start with two to four
optional characters, followed by up to six optional
digits, and then follow by a source specification.
The first digit cannot be "0". The source
specification starts with "-" followed by the source
name that contains up to nine characters in length.
admin-c: NP1-TEST
tech-c: NP1-TEST
mnt-by: JohnDoe
password: ***
delete: Removed network.
Configure networks and Use network maps The Dashboard Use network discovery
allocate IP addresses to and IP maps to view provides widgets that to track your network
network devices. and administer your monitor IPAM and devices and monitor
Resize, join, or split entire network space, network statistics. network performance.
networks. and manage the IP Configure how you
The syslog and audit
addresses of your want the Infoblox
Use Infoblox host log provide detailed
network devices. appliance to populate
records to centralize the information about
the discovered data.
management of DNS system and admin
and DHCP data. activities. Use DHCP fingerprint
detection to track
The reporting solution
network devices, block
automates the
those that are not
collection, analysis,
allowed, and plan for
and presentation of
future growth.
core network service
data.
You can perform the following IPAM tasks to effectively manage and control your network:
• Create host records. Host records integrate the DNS records and DHCP data of a network device. You can use a
host record to manage a network device from one central point. For more information, see About Host Records
on page 578.
• Create IPv4 and IPv6 networks. For information, see About Network Containers on page 584.
• Discover devices in IPv4 and IPv6 networks and other Objects created in IPAM. For more information, see
Adding IPv4 and IPv6 Network Containers and Networks on page 585, Adding Host Records on page 579 and
other sections throughout this chapter. View your IPv4 network and address utilization in a graphical mode. For
information, see IPv4 Network Map on page 586 and IP Map on page 594.
• When necessary, resize, join, or split networks. For information, see Resizing IPv4 Networks on page 591,
Splitting IPv4 Networks into Subnets on page 592, Joining IPv4 Networks on page 592, Splitting IPv6 Networks
into Subnets on page 606, and Joining IPv6 Networks on page 607.
• Manage IPv4 and IPv6 address data. For information, see Viewing and Managing IPv4 Addresses on page 594,
Viewing IPv6 Data on page 607, and Managing IPv4 and IPv6 Addresses on page 608.
• Add and manage DNS resource records associated with IP addresses. For information, see DNS Resource
Records on page 875.
• Monitor your core service network data using the Dashboard, audit log, syslog, and reports. For information, see
Part 7 Monitoring and Reporting on page 1323.
• Discover and track network devices. For information, see IP Discovery and vDiscovery on page 617 and DHCP
Fingerprint Detection on page 1357.
Figure 13.2 Using the Host Record for DHCP and DNS
1 The DHCP client sends its MAC DNS and 1 A resolver sends a query for the IP
address in the DHCP DISCOVER DHCP address of ftp.corp.100.com.
and REQUEST packets. server
Note that If the zone of the host record is associated with networks, the IP addresses must belong to the associated
networks. For example, if the host record is in the corp100.com zone, which is associated with 10.1.0.0/16 network,
then the IP addresses of the host record must belong to the 10.1.0.0/16 network. For information about associating
zones and networks, see Associating Networks with Zones on page 1093.
LAN 1: 2001:db8:1::/48
You create a host record for
the router and assign
three IP addresses to it.
Router has
three network
Host Record interfaces
Server
2001:db8:1::2
=
10.31.209.5
— MAC Address: For an IPv4 address, enter the MAC address of the network device associated with this
host IP address. Note that you must enter a MAC address if DHCP is enabled for the host IP address.
or
— DUID: For an IPv6 address, enter the DHCP Unique Identifier (DUID) of the network device associated
with this host IP address. Note that you must enter a DUID if DHCP is enabled for an IPv6 host address.
— DHCP: Select this to enable the DHCP services to manage the host IP address. If you do not select this
option, the host IP address is not managed by the DHCP server.
— Comment: Optionally, enter additional information about the host record.
— Disable: Select this option to temporarily disable the host record. For example, you might want to disable a
host when you need to update the network device.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. This section displays the following
information:
• Cloud Usage: This field indicates whether this object is associated with any specific cloud extensible
attributes or within a scope of delegation. It can be one of the following:
— Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may
not be within a scope of delegation at the moment.
— Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
— Used by cloud: Indicates that this network or network container is associated with the extensible
attribute Is External or Is Shared and the value is set to True, which implies the network is a private or
shared network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
— Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation
nor is it associated with any of these extensible attributes: Cloud API Owned, Is External or Is Shared.
NIOS admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created
by the Grid Master, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the object you want to create has already been
delegated. If so, it displays the name of the delegation.
4. (Applies only to Network Insight) In the current Wizard step, you can optionally define the following identification
values and settings for the new object’s port reservation:
— Choose the Device Type: Router, Switch-Router, Switch, MSFT (Microsoft) Server, NetMRI, NIOS, VNIOS, or
ESX (VMware) Server.
The values on this page are not required for defining the actual port reservation in a later wizard step.
— Choose the Device Vendor: Cisco, Juniper, Aruba, Dell, Infoblox, or HP.
— You can also enter a Location and a Description. These values are advisory and not required for
configuration.
After you define this group of settings, you will still need to define a device port reservation.
5. (Applies only with Network Insight) Click Next to initiate or disable discovery of the new host.
— Choose either Exclude from Network Discovery or Enable Immediate Discovery. If you choose to Exclude,
discovery will not execute on the host. If you choose Enable Immediate Discovery, discovery will execute on
the host after you save your settings. You may also choose to leave both options disabled.
— By default, the new host inherits its SNMP credentials from those defined at the grid level. Should you wish
to override them for a local set of credentials, check the Override Credentials check box and select the
SNMPv1/SNMPv2 or SNMPv3 option and enter the locally used credentials. For more information, see the
sections Configuring SNMP1/v2 Credentials for Polling on page 680 and Configuring SNMPv3 Properties
on page 680 for a complete description of SNMP credentials for discovery. (You can also test SNMP
credentials to ensure they work before use.)
— For the new object, you can check the Override CLI Credentials check box to override the inherited set of CLI
credentials taken from the Grid level. This set of credentials may be used for the device that is directly
associated with the new object (in this case, a Host) in its port reservation.
— You can also click Test CLI Credentials to enter and test a set of CLI login credentials against a device based
on its IP address.
Port control operations require CLI credentials for the involved devices. (If you are not using port control for
the new object, usage of CLI credentials is optional.) Because some IPAM and DHCP objects will use port
control features as part of object creation, CLI credentials are automatically leveraged as part of discovery.
Ensure you have the correct sets of CLI credentials for devices in your network. For more information, the
section Configuring CLI Discovery Properties on page 681.
— SSH is the default for CLI operations. Check the Allow Telnet check box if you know the device involved in
the object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
6. (Applies only with Network Insight) Click Next to define switch port connectivity for the device that will be
associated with the new host record. This step is optional and not required for creating the new host record. This
feature set is also termed port control in Grid Manager. The device to which the new host record will be
associated should already be discovered and managed from Grid Manager.
— Begin by checking the Reserve Port check box. Note that reserving a switch port does not guarantee its
availability.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
— Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to whose interface the new object will be associated before taking
this step. For more information, see the section Using the Device Selector on page 689.
— After choosing the device, choose the Interface with which the port reservation will be bound. The
drop-down list shows only interfaces that are most recently found to be available by Grid Manager during
the last discovery cycle. This list will not include any ports that are Administratively Up and Operationally
Up or that are otherwise already assigned to other networks or objects.
— The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page allows only the assignment of an existing VLAN in the
chosen device to the new port reservation.
— Check the Configure Port check box to define specific port control settings for the port reservation.
— Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment. Depending
on the selected device, you may or may not be able to apply VLAN settings.
— Set the Admin Status to Up if you need to activate the port after assignment in the current task.
All port control operations require CLI credentials to be entered into Grid Manager. Because some IPAM and
DHCP objects will use port control features as part of object creation, CLI credentials are automatically
leveraged as part of discovery and configuration of port configurations such as Admin Up/Down status.
Ensure you have the correct sets of CLI credentials for devices in your network.
— Enter a Description for the port assignment. Infoblox recommends doing so to help other technicians to
recognize the port assignment task.
7. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
8. As the final step in the Add Host wizard, you define when Grid Manager creates the new object by scheduling it.
As a separate task, you also schedule when the associated Port Configuration task executes.
— To create the new Host and its associated port reservation immediately, select Now. The port control event
is automatically synchronized to take place at the same time as the activation of the new host.
— You can choose to have Grid Manager execute the port reservation at the same time as the host object
creation. To do so, select At same time as Host.
— You can have Grid Manager execute the port reservation at a later time by selecting Later. Choose a
Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar date) and a
Start Time, and choose a Time Zone.
9. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the Host object and close the wizard (this is the default).
— Click Save & Edit to add the Host object and launch the editor.
— Click Save & New to add the Host object and launch the wizard again to add another Host object.
5. Save the configuration and click Restart if it appears at the top of the screen.
20.8.0.0/13 20.72.0.0/13
20.0.0.0/8
From Grid Manager, you can click the link of the network container 20.0.0.0/8 in the IP List panel and drill down to
the two network containers, 20.8.0.0/13 and 20.7.0.0/13, as shown inFigure 13.5. You can click the network
container links to drill down further to the leaf networks.
In the IPAM tab, when you create an IPv4 or IPv6 network that belongs to a larger network, the appliance automatically
creates a network container and puts the leaf network in the container. The appliance also creates network containers
when you split IPv4 or IPv6 networks into smaller networks. For information, see Splitting IPv4 Networks into Subnets
on page 592 and Splitting IPv6 Networks into Subnets on page 606.
The appliance puts the deleted network container in the Recycle Bin, if enabled. You can also schedule the deletion
for a later time. Click Schedule Deletion and in the Schedule Change panel, enter a date, time, and time zone. For
information, see Scheduling Deletions on page 90. For information about scheduling recursive deletions of network
containers, see Scheduling Recursive Deletions of Network Containers and Zones on page 90.
Network address Network container Network container Unused address space that was
that is 50% utilized that is 100% utilized selected. Note that the selection
wraps to the next row.
Leaf network with no A block of Net Map displays information about Start and end
used IP addresses multiple this network container after you addresses of the
networks mouse over it network container
Displaying IP Information
As shown in Figure 13.6, as you mouse over the map, Net Map displays IP information about the area. When you
mouse over an unused area, Net Map displays the following information:
• The start and end IP address
• The number of IP addresses that can fit in that space
• The largest possible network
• The number of /16 and /24 networks that can fit in that space
When you mouse over a network, Net Map displays the following information:
• Network address and netmask
• Utilization of the network. For a leaf network, Net Map reports the percentage of used IP addresses, except the
broadcast and network addresses. For a network container, Net Map reports the percentage of the IP address
space that has been allocated to either network containers or leaf networks.
• The first and last IP address of the network
• The total number of IP addresses in the network
When you mouse over a block of multiple networks, Net Map displays the following information:
• The start and end IP address of that block of networks
• The total number of IP addresses in that block of networks
• The number of networks in that block
• (Applies only with Network Insight) Direct NIOS to discover devices on the selected network (Discover Now). The
network must have discovery enabled before this button will be active. For more information about
requirements and discovery features, see the topics under About Network Insight on page 656.
Note: If the Discover Now button and other associated discovery elements are disabled on the Toolbar, it
indicates that discovery is not enabled for the parent network of the selected network or IP, or the network
is not associated with a discovery appliance.
• Delete one or multiple networks, as described in Discovering Networks (Under Network Insight only) on page
593.
• Clear All Unmanaged Data or Clear All Discovered Data, as described in the section Clearing Discovered Data on
page 649.
• Switch to the List view of the network. For information, see IPAM Home on page 590.
— When you select one or more networks in Net Map and then switch to the List view, the list displays the
page with the first selected network.
— If you select one or more networks in the List view and then switch to the Net Map view, the first network is
also selected in Net Map. If you select a network in the List view that is part of a Multiple Networks block in
Net Map, it is not selected when you switch to the Net Map view.
IPAM Home
The IPAM Home panel is an alternative view of an IPv4 and IPv6 network hierarchy. For a given network, the panel
shows all the networks of a selected network view in table format. This panel displays only the first-level subnets. It
does not show further descendant or child subnets. You can open a subnet to view its child subnets. Subnets that
contain child subnets are displayed as network containers. If the number of subnets in a network exceeds the
maximum page size of the table, the network list displays the subnets on multiple pages. You can use the page
navigation buttons at the bottom of the table to navigate through the pages of subnets.
The IPAM home panel displays the following:
• Network: The network address.
• Comment: The information you entered about the network.
• RIR Organization: This appears only if support for RIR updates is enabled. This displays the name of the RIR
organization to which the network is assigned.
• RIR Organization ID: This appears only if support for RIR updates is enabled. This displays the ID of the RIR
organization to which the network is assigned.
• RIR Registration Status: This appears only if support for RIR update is enabled. This field displays the RIR
registration status. This can be Registered or Not Registered. Registered indicates that the network has a
corresponding entry in the RIPE database.
• Last Registration Updated: Displays the timestamp when the last registration was updated. The displayed
timestamp reflects the timestamp used on the Grid Master.
• Status of Last Registration Update: Displays the registration status and communication method of the last
registration update. The status can be Pending, Sent, Succeeded, or Failed. Each time you send a registration
update to create, modify, or delete a network container or network, the updated status will be displayed here. If
you have selected not to send registration updates, the previous status is retained.
• IPAM Utilization: For a network, this is the percentage based on the IP addresses in use divided by the total
addresses in the network. For example, in a /24 network, if there are 25 static IP addresses defined and a DHCP
range that includes 100 addresses, the total number of IP addresses in use is 125. Of the possible 256
addresses in the network, the IPAM utilization is about 50% for this network.
For a network container that contains subnets, this is the percentage of the total address space defined within
the container regardless of whether any of the IP addresses in the subnets are in use. For example, when you
define a /16 network and then 64 /24 networks underneath it, the /16 network container is considered 25%
utilized even when none of the IP addresses in the /24 networks is in use.
You can use this information to verify if there is a sufficient number of available addresses in a network. The
appliance updates the IPAM utilization data immediately for a network container, but for a network it is updated
every 15 minutes.
The IPAM utilization data is displayed in one of the following colors:
— Red: The IPAM utilization percentage is above the configured Trigger value.
— Blue: The IPAM utilization percentage is below the configured Trigger value.
• Active Users: The number of active users on the selected network.
• Site: The site to which the IP address belongs. This is a predefined extensible attribute.
You can select the following columns for display:
• Disabled: Indicates whether the network is disabled.
• Leaf Network: Indicates whether the network is a leaf network or not. A leaf network is a network that does not
contain other networks.
• Discovery Enabled: (Applies only with Network Insight) Indicates whether discovery is allowed on the network
container or the network.
• Managed: (Applies only with Network Insight) Indicates whether the network is set to Managed status under
Grid Manager. For more information, see the section Converting Unmanaged Networks under IPAM to Managed
Status on page 694.
• First Discovered: (Applies only with Network Insight) The date and timestamp of the first occasion that Grid
Manager discovered the network.
• Last Discovered: (Applies only with Network Insight) The date and timestamp of the last occasion that Grid
Manager performed discovery on the network.
• Extensible attributes and RIR attributes: You can select the extensible attributes such as Building, Country,
Region, State, and VLAN for display. When you enable support for RIR registration updates, you can also select
associated RIR attributes for display. For information about RIR attributes, see Managing RIR Attributes on page
562.
• Active Directory Sites: You can also select Active Directory Sites for display. For information about Active
Directory Sites, see About Active Directory Sites and Services on page 1267.
You can sort the list of networks in ascending or descending order by columns. For information about customizing
tables in Grid Manager, see Customizing Tables on page 69.
You can also modify some of the data in the table. Double click a row of data, and either edit the data in the field or
select an item from a drop-down list. Note that some fields are read-only. For more information about this feature,
see Modifying Data in Tables on page 70.
Tip: If you select a network from the list and switch to the Net Map panel, the network is also selected in the network
map.
1. From the Net Map or List panel, select a network, and then click Resize from the Toolbar.
2. In the Resize Network editor, do the following:
— Address: Displays the network address. You cannot modify this field.
— Netmask: Displays the netmask of the network as you resize the network. You cannot modify this field.
— Resize slider: Use the resize network slider to specify the appropriate subnet masks for the subnets. When
you move the slider, Grid Manager displays the number of subnets and IP addresses within that subnet.
— Automatically create reverse-mapping zone: This is enabled only when you resize a /8, /16, or /24 network.
Select this check box to have the appliance automatically create reverse-mapping zones for the subnet. The
appliance automatically creates reverse-mapping zones only for /8, /16, and /24 netmasks.
3. Click OK.
Each of the adjacent networks join the expanded network and inherit the DHCP member configuration options of the
selected network. The expanded network does not inherit the default router and broadcast address configurations of
the adjacent networks. Those configurations are disabled by default.
Note: The member assignment for the expanded network combines all member assignments of the joining
networks.
Note that the join and resize features work identically only when you have a single network. If the resize feature is
disabled and if you have a single network object with additional new networks, then you must use the join feature to
combine all networks.
To join or expand a network:
1. From the Net Map or List panel, select a network, and then click Join from the Toolbar.
2. In the Join Network editor, do the following:
— Address: Displays the network address. You cannot modify this field.
— Netmask: Displays the netmask of the network as you expand the network.
— Join Network slider: Use the join network slider to specify the available subnet masks for the newly
expanded network. Select a smaller netmask value, based on your requirements of the newly-expanded
network. When you move the slider, a dialog box displays the total number of IP addresses and the IP
address range of a selected subnet mask.
— Automatically create reverse-mapping zone: Select this check box to configure the expanded network to
support reverse-mapping zones Adding Grid Members on page 297
3. Click OK.
Note: If the Discover Now button and other associated discovery elements are disabled on the Toolbar, it indicates
that discovery is not enabled for the parent network of the selected network or IP, or that a discovery appliance
(known as a Probe) is not associated with the network that you wish to discover.
Deleting Networks
From the IPAM tab, you can delete multiple IPv4 and IPv6 networks. When you delete a network, all of its data,
including all of its DHCP records, subnets, and records in its subnets, is deleted from the database and goes to the
Recycle Bin, if enabled. Because of the potentially large loss of data that can occur when you delete a network, Grid
Manager requires a confirmation to move the data to the Recycle Bin.
To delete IPv4 or IPv6 networks:
1. From the Data Management tab, select the IPAM tab -> network check box. You can select multiple check boxes
for multiple networks.
2. Select Delete or Schedule Delete from the Delete drop-down menu.
3. To delete the network now, in the Delete Confirmation dialog box, click Yes. To schedule a deletion, see About
Extensible Attributes on page 417.
The appliance puts the deleted network in the Recycle Bin, if enabled.
IP Map
The IPv4 Map panel provides a graphical representation of all IPv4 addresses in a given subnet. IP Map displays cells
that represent IPv4 addresses. Each cell in the map represents an IPv4 address, and its color indicates its status as
described in the legend section. You can run a network discovery on the selected network, and the status of each IP
address is updated accordingly. For information, see Chapter 14, IP Discovery and vDiscovery, on page 617.
Each IP Map panel can accommodate up to 256 cells with each cell representing an IP address. If a given network has
more than 256 addresses, additional IP addresses are displayed by paging to the next page. You can use the page
navigation buttons to page through the IP addresses. To go to a specific IP address, you can enter the IP address in
the Go to field or click a specific cell in IP Map.
IP Map has a basic and an advanced view. You can toggle between these views by clicking Toggle Basic View or Toggle
Advanced View.
In the basic view, the IP Map panel displays the following IP address status:
• Unused: An IP address that has not been detected and is not associated with any network device or active host
on the network.
• Conflict: An IP address that has either a MAC address conflict or a DHCP lease conflict detected through a
network discovery.
• Used: An IP address that is associated with an active host on the network. It can be a resource record, fixed
address, reservation, DHCP lease, or host record.
• Selected IP Address: The IP address that you selected.
• DHCP Range: The IP addresses within a DHCP range in the network. The appliance highlights the cells using a
blue background.
• Reserved Range: A range of IP addresses that are reserved for statically configured hosts. They are not served as
dynamic addresses. You can allocate the next available IP from the reserved range when you create a static
host.
In the advanced view, the IP Map panel displays additional status as follows:
• Unmanaged: An IP address that has a discovered host, is not previously known to the appliance, and does not
have an A record, PTR record, fixed address, host address, lease, or is not within a DHCP range. You can change
an unmanaged address to a host, DHCP fixed address, A record, or PTR record. You can also clear an unmanaged
address. All existing administrator permissions apply to the unmanaged addresses.
• Fixed Address/Reservation: A host that is either a fixed address or reservation.
• DNS Object: An object that is configured for DNS usage.
• Host Not in DNS/DHCP: An IP address that is associated with a host record, but is not configured for DHCP or
DNS services.
• Active Lease: An IP Address that has an active DHCP lease.
• DHCP Exclusion Range: A range of IP addresses within a DHCP range. The appliance cannot assign addresses in
the exclusion range to a client. You can use these addresses as static IP addresses. This prevents address
conflicts between statically configured devices and dynamically configured devices.
Note: For a Microsoft split-scope range, the appliance highlights the cells using a combination of orange and
pink background colors when the network is managed by two Microsoft servers. For a DHCP exclusion
range, the appliance highlights the cells using an orange background.
Under the IP map, Grid Manager displays the following information for the IP address that you have selected in the
map:
• Type: The object type that is associated with the IP address. For example, this can be Lease, IPv4 DHCP Range or
Fixed Address.
• Comment: Additional information about the IP address.
• Lease State: The lease state of the IP address. This can be one of the following: Free, Backup, Active, Expired,
Released, Abandoned, Reset, BootP, Static, Offered, or Declined.
• Name: The name of the object type associated with the IP address. This field displays the name of the object
type in the native character set if a host record contains IDNs. If a host record contains IDNs in punycode, this
field displays the name in the punycode representation. For example, if the IP address belongs to a host record,
this field displays the hostname. For IDNs, this field displays the name in the native character set. If punycode is
used, then the appliance displays name in punycode.
• MAC Address: The discovered MAC address of the host. This is the unique identifier of a network device. The
discovery acquires the MAC address for hosts that are located on the same network as the Grid member that is
running the discovery. This can also be the MAC address of a virtual entity on a specified vSphere server. The
appliance displays an X mark beside the MAC address if it is invalid. For more information about invalid MAC
addresses, see Synchronizing IP Addresses with Invalid MAC Addresses on page 1306.
• DHCP Fingerprint: The name of the DHCP fingerprint or vendor ID of the network device that was identified
through DHCP fingerprint detection. This field displays No Match for devices that do not have any DHCP
fingerprint information. For information about DHCP fingerprints, see DHCP Fingerprint Detection on page 1357.
You can do the following in the IP Map panel:
• Click Go to DHCP View to view DHCP properties of a selected network.
• Select an address range by clicking once on a start address and then use SHIFT+click on the end address. Click
Add -> Range from the Toolbar to add the selected range as an IPv4 or IPv6 DHCP range or reserved range.
• Click the Resolve Conflict icon to resolve IP address conflicts. For information, see Resolving Conflicting
Addresses on page 647.
• Click the Ping icon to ping a selected IP address. For information, see Pinging IP Addresses on page 612.
• Click the Reclaim icon to reclaim an IP address. For information, see Reclaiming Objects Associated with IPv4
and IPv6 Addresses on page 612.
• Click the Clear icon to clear an active lease. For information, see Clearing Active DHCP Leases on page 612.
You can also select an IP address from the IP Map panel and view the following information:
• General information, as described in IP Address Header Panel on page 599.
• Data retrieved through a network discovery or integrated from a PortIQ appliance and Trinzic Network
Automation. For information, see Viewing Discovered Data on page 642.
• The records associated with the IP address, as described in Related Objects on page 608.
• The audit history, as described in Audit History on page 608.
• Detailed lease information, as described in Viewing Detailed Lease Information on page 1246.
• Click DHCP View to view DHCP properties of the selected network. For information, see Modifying IPv4 Networks
on page 1118.
IP Address List
The IP address List panel displays all IPv4 addresses of a selected subnet in table format. The list provides
information about the IP addresses in a hierarchy view. You can use this list to view detailed information about each
IP address and its related objects in a selected network. This list provides information such as address status, object
type, and usage.
You can configure filter criteria to display only IP addresses that you want to see in the table. For example, you can
enter “MAC Address begins with 00” as the filter criteria to view only IP addresses that have associated MAC
addresses that begin with 00. You can also enter a specific IP address in the Go to field to view information about the
address.
Grid Manager can display the following information for the IP addresses. You can edit the columns to display
information that is not shown by default.
• IP Address: The IP address of the corresponding record. The appliance highlights disabled DHCP objects in gray.
A DHCP object can be an DHCP address range, fixed address, reservation, host configured for DHCP, or roaming
host with an allocated IP address.
• Name: The name of the object type associated with the IP address. For example, if the IP address belongs to a
host record, this field displays the hostname.
• MAC Address: The discovered MAC address of the host. This is the unique identifier of a network device. The
discovery acquires the MAC address for hosts that are located on the same network as the Grid member that is
running the discovery. This can also be the MAC address of a virtual entity on a specified vSphere server.
• DHCP Client Identifier: For an IPv4 address, the DHCP Unique Identifier of the host.
• Port Reservation: Lists any Port Reservation from Network Insight that is associated with the IP address. The
information takes the form of device name:interface name.
• VIP: Indicates when the IP address is operating as a Virtual IP and operates in router redundancy.
• Status: The current status of the corresponding record. This can be Used or Unused.
• Type: The object type that is associated with the IP address. For example, this can be Broadcast, Lease, IPv4
DHCP Range or Fixed Address.
• Usage: Indicates whether the IP address is configured for DNS or DHCP.
• Lease State: The lease state of the IP address. This can be one of the following: Free, Backup, Active, Expired,
Released, Abandoned, Reset, BootP, Static, Offered, or Declined.
• User Name: The name of the user who received the lease for the IP address.
• Comment: Additional information about the IP address.
• First Discovered: The timestamp when the IP address was initially discovered. This data is read-only.
• Last Discovered: The timestamp when the IP address was last discovered. This data is read-only.
• OS: The operating system of the discovered host. The OS value can be one of the following:
— Microsoft for all discovered hosts that have a non-null value in the MAC addresses using the NetBIOS
discovery method.
— A value that a TCP discovery returns.
— The OS of a virtual entity on a vSphere server.
Note that this field sometimes displays the percentage of certainty about the discovered OS.
• NetBIOS Name: The returned NetBIOS name from the last discovery.
• Device Type(s): The type of device associated with the IP address, if any: Router, Switch-Router, and other types.
• Open Port(s): Lists any TCP/UDP ports that are open on the current IP address.
• Discovered Name: The name of the discovered IP address, if any was previously assigned by an administrator.
• Discoverer: The identity of the appliance that discovered the IP address.
• Fingerprint: The name of the DHCP fingerprint or vendor ID of the network device that was identified through
DHCP fingerprint detection. This field displays No Match for devices that do not have any DHCP fingerprint
information. For information about DHCP fingerprints, see DHCP Fingerprint Detection on page 1357.
• Site: The site to which the IP address belongs. This is a predefined extensible attribute.
• Disabled (hidden): Indicates whether the DHCP or DNS record is disabled.
Note: For an IP address that falls within a DHCP range, Grid Manager displays extensible attribute values for the
DHCP range and fixed address or host record. When you view the same IP address in the DHCP tab however,
Grid Manager displays only the extensible attribute values associated with the fixed address or host record,
but not the DHCP range. For example, when you define extensible attribute State with the value California for
DHCP range 1.0.0.1 – 1.0.0.5, and then define extensible attribute State with the value of Alaska for fixed
address 1.0.0.3, Grid Manager displays both California and Alaska in the State field for IP address 1.0.0.3 in
the IP Address List view. However, when you view 1.0.0.3 from the DHCP tab, the State field displays Alaska
only.
Discovered Data
The Discovered Data tab displays discovered data through a network discovery or integrated from PortIQ and Trinzic
Network Automation appliances. For information about viewing discovered data, see Viewing Discovered Data on
page 642.
Related Objects
The Related Objects tab displays the following information about the records associated with the IP address:
• Name: The name of the object. For example, if the IP address belongs to a host record, this field displays the
hostname. The appliance highlights disabled DHCP objects in gray. A DHCP object can be a DHCP range, fixed
address, reservation, host configured for DHCP, or roaming host with an allocated IP address.
• Type: The object type, such as DHCP lease, host, A record, and bulk host.
• Comment: Information about the object.
You can also select the following for display:
• DNS view: The DNS view to which the object belongs.
You can do the following in this tab:
• Add a resource record. You can select the following from the drop-down list:
— Host Record—For information, see Adding Host Records on page 579.
— Range—For information, see Adding IPv4 Address Ranges on page 1122.
— Fixed Address—For information, see Adding IPv4 Fixed Addresses on page 1126.
— Reservation—For information, see Adding IPv4 Reservations on page 1131.
— A Record—For information, see Adding A Records on page 881.
— PTR Record—For information, see Adding PTR Records on page 884.
• Edit the properties of the selected object. Depending on the type of object, Grid Manager displays the
corresponding editor for the object. For example, if the selected object is a fixed address, Grid Manager displays
the fixed address editor. When you select a lease object, Grid Manager displays the lease viewer.
• You can also modify some of the data in the table. Double click a row of data, and either edit the data in the field
or select an item from a drop-down list. Note that some fields are read-only. For more information about this
feature, see Modifying Data in Tables on page 70.Delete a selected object or multiple objects.
• When you select a lease object and click the Show Details icon, you can view the lease start and end dates.
• Depending on the object type, you can convert a selected object to one of the following:
— Reservation
— Host
— Fixed Address
• View detailed lease information about the IP address, as described in Viewing Detailed Lease Information on
page 1246.
• Print and export the information in the Related Objects table.
Audit History
By default, the Audit History tab displays the following information about the last five actions performed on the
selected IP:
• Timestamp: The day, date, and time of the operation.
• Action: The type of operation that was performed by the administrator.
• Object Type: The object type of the entry.
• Object Name: The name of the object.
• Admin Name: The name of the administrator who performed the operation.
• Message: The description of the administrative activity.
Note: If you change the IP address of an existing record to a new one in the IP MAP tab when the Grid Audit Logging
is set to Brief, then NIOS will not display modification or transition details about the new IP address in this tab.
You can only view subsequent modifications and deletions to the new IP address. However, you can view the
audit log history and transition details of the old IP address, but you cannot view the initial transition from an
old IP address to the new IP address.
— In the table, select the host to which you want to add the selected IP address. You can also use the filters or
the Go To field to narrow down the host list. For information, see Using Filters on page 76 and Using the Go
To Function on page 81.
— Click the Select icon.
Grid Manager displays the Host Record editor.
3. In the Host Record editor, update the host properties as described in Choose one of the following from the Save
& ... drop-down button menu: on page 583.
4. Save the configuration and click Restart if it appears at the top of the screen. To close the editor without saving
the changes, click the Close icon.
Tip: If you select a network from the list and switch to the Net Map panel, the network is also selected in the network
map.
— Only networks with ranges and fixed addresses: Adds only the networks that have DHCP ranges and
fixed addresses.
— All possible networks: Adds all networks that are within the selected netmasks. You can select this
option only when you increase the CIDR by 8 bits.
— Automatically create reverse-mapping zone: Select this check box to have the appliance automatically
create reverse-mapping zones for the subnets. This function is enabled if the netmask of the network is a
multiple of four, such as 4, 12 or 16.
3. Click OK.
• Last Discovered: (Applies only with Network Insight) The date and timestamp of the last occasion that NIOS
discovered the IP address.
• OS: The operating system of the IP.
• NetBIOS Name: The returned NetBIOS name from the last discovery.
• Device Type(s): Shows the device type for the device associated with the IP address.
• Fingerprint: The name of the DHCP fingerprint or vendor ID of the network device that was identified through
DHCP fingerprint detection. This field displays No Match for devices that do not have any DHCP fingerprint
information. For information about DHCP fingerprints, see DHCP Fingerprint Detection on page 1357.
• Comment: Displays comments about the record.
• Site: The site to which the IP address belongs. This is a predefined extensible attribute.
You can display all available extensible attributes. You can also sort the list of IP addresses in ascending or
descending order by IP Address only.
You can drill down further and view the records associated with an IP address. To view the associated records of an
IP address, select it and Grid Manager displays information about the IP address in the Related Objects and Audit
History tabs.
Related Objects
Grid Manager displays the following information about the records associated with the IP address:
• Name: The record name. For example, if the IP address belongs to a host record, this field displays the
hostname.
• Type: The object type. For example, AAAA Record, PTR Record, Host Record, IPv6 Fixed Address.
• Comment: Additional information that was entered in the record about the IP address.
Audit History
Grid Manager displays the following information about the last five actions performed on the selected IP:
• Timestamp: The day, date, and time of the operation.
• Action: The type of operation that was performed by the administrator.
• Object Type: The object type of the entry.
• Admin Name: The name of the administrator that performed the operation.
• Message: Description of the administrative activity.
• Reclaim IP addresses. For information, see Reclaiming Objects Associated with IPv4 and IPv6 Addresses on
page 612.
• Ping IP addresses. For information, see Pinging IP Addresses on page 612.
• Clear DHCP leases. For information, see Clearing Active DHCP Leases on page 612.
You can also print and export in CSV format the information displayed in any panel that supports these functions.
Note: You cannot convert unmanaged IP addresses or leases served by Microsoft DHCP servers to host records.
An advantage of converting an active dynamic lease is that you do not need to learn the MAC address or DUID of the
device to which you want to assign an IP address and manually enter it in the fixed address configuration.
An IPv4 reservation is an address that you exclude from DHCP use because you intend to configure that address
manually on a device, such as a firewall, router, or printer. You can also convert an IPv4 fixed address or a dynamic
address with an active lease to a reservation.
When you convert an address in a DHCP range to a reservation, you reduce the total number of dynamically
assignable addresses in that range by one. Correspondingly, this reduces the number of allocated addresses needed
to exceed a high or low watermark threshold for that range.
Note: To return an IP address to its place in a DHCP range after converting it from an active dynamic lease to a fixed
address, reservation, or Infoblox host, delete the fixed address, reservation, or host to which you previously
converted the IP address. The IP address then becomes part of the DHCP range to which it first belonged.
You can convert IPv4 fixed addresses to reservations, as shown in Figure 13.10.
DHCP Client and Server Statically Configured Device and DHCP Server
DHCP Range
3 Appliance assigns
an address to the 10.1.1.20 - 5 Appliance excludes DHCP Addresses
DHCP client. 10.1.1.30 10.1.1.25 from
DHCP use and 10.1.1.20
10.1.1.25 marks its status 10.1.1.21
or
as “Used”.
Fixed Address 10.1.1.22
10.1.1.25 10.1.1.23
Convert 10.1.1.25 10.1.1.24
4
to a reserved 10.1.1.25
address with a null 10.1.1.25
MAC address:
...
00:00:00:00:00:00
10.1.1.30
To convert an object:
1. From the IP Map, select an IPv4 address or from the IP List panel, select an IPv4 or IPv6 address.
2. In the Related Objects tab, select the check box of the object, and then click Convert from the Toolbar or
navigation bar.
3. Select the object type to which you want to convert the object. Grid Manager displays the corresponding editor
for the object type.
4. For all IPv4 conversions, Grid Manager populates the discovered information in the corresponding editor.
Depending on the type of conversion, do one of the following:
— For host record conversions, see Choose one of the following from the Save & ... drop-down button menu:
on page 583.
— For IPv4 reservation conversions, see Modifying IPv4 Reservations on page 1134.
— For fixed address conversions, see Modifying IPv4 Fixed Addresses on page 1129.
— For A record conversions, see Modifying A Records on page 882.
— For PTR record conversions, see Modifying PTR Records on page 885.
Note: When you select an object for conversion, Grid Manager displays only the available conversion types for
the object. You must save the changes in the editor for the conversion to take place.
Pinging IP Addresses
You can find out whether an IP address is accessible and active by pinging the address. Grid Manager sends a packet
to the selected IP address and waits for a reply when you ping the address. You can ping individual IP addresses from
the IP Map and IP List panels. You can ping all IP addresses from the IP Map panel and all IP addresses on the selected
page from the IP List panel.
To ping an IPv4 or IPv6 address:
• From the IP Map or IP List panel, select the IP address that you want to ping, and then click Ping from the
Toolbar.
To ping all IPv4 addresses:
• From the IP Map panel, click Multi-ping from the Toolbar. Grid Manager pings all IP addresses displayed in the IP
Map panel and displays the ping status in the panel. When the ping or multi-ping is complete, the status bar
displays the number of active IP addresses detected through the ping. To close the ping status bar, click the
Close icon.
• From the IP List panel, click Multi-ping from the Toolbar. Grid Manager pings all IP addresses visible on the
selected page. When the ping or multi-ping is complete, the status bar displays the number of active IP
addresses detected on the selected page. To close the ping status bar, click the Close icon.
Note: Infoblox recommends that you do not enable SNMP traps and email notifications for IPAM utilization during
an upgrade, because if you have configured notifications you may have to unconfigure them during an
upgrade.
You can configure the thresholds for IPAM utilization at the Grid level and override them at the network level. To
configure the IPAM utilization thresholds at the Grid level, see Defining Thresholds for Traps on page 1369.
To configure the IPAM utilization thresholds for a IPv4 network, network container, or network template, complete the
following:
1. Network Container: From the Data Management tab, select the IPAM tab -> network_container check box, and
click the Edit icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network check box,
and click the Edit icon.
Network Template: From the Data Management tab, select the DHCP tab -> Templates tab -> DHCP_template
check box, and click the Edit icon.
2. In the editor, click Toggle Advanced Mode, select the IPv4 IPAM Utilization Notification tab, and then complete
the following:
— IPAM Utilization Notification: Click Override to override the inherited property, and specify the following:
— Enable SNMP Notifications: Select this for the appliance to send an SNMP trap to the trap receiver that
you define for the Grid when IPAM utilization crosses the configured threshold.
— Enable Email Notifications: Select this for the appliance to send an email notification to a designated
destination if IPAM utilization crosses the configured threshold.
— IPAM Threshold Settings: Click Override to override the inherited property, and specify the following:
— Trigger: Enter a Trigger value between 0 to 100. The appliance sends an SNMP trap and—if configured
to do so—sends an email notification to a designated destination when the IPAM utilization exceeds
the Trigger value. The default Trigger value is 95.
— Reset: Enter a Reset value between 0 to 100. The appliance sends an SNMP trap and —if configured to
do so—an email notification to a designated destination when the IPAM utilization drops below the
Reset value. The default Reset value is 85.
— Email Addresses: Click Override to override the inherited property. Click the Add icon, and then enter an
email address to which you want the appliance to send email notifications when IPAM utilization for the
network or network container crosses the configured threshold. You can create a list of email addresses.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: On an Infoblox appliance, the Enable Network Users Feature option is disabled by default for all new
installations.
— Last updated: Displays the timestamp when the user information was last updated.
About Discovery
Note: The discovery features described in this chapter apply to NIOS Grid deployments that do not use the Discovery
license and its accompanying features under Network Insight. Network Insight provides the ability to discover,
query, and catalog routed and switched networks and the devices within them, including infrastructure
routers, enterprise switches, security devices such as firewalls, wireless access points, end host computer
systems, and more. For more information about Network Insight, see Infoblox Network Insight on page 653.
Infoblox provides IP discovery for detecting and obtaining information about active hosts in predefined networks,
and vDiscovery for discovering virtual entities and interfaces (such as vSwitch and vRouter) in private, public, and
hybrid clouds managed through CMPs (Cloud Management Platforms) such as VMware vCenter servers and vSphere
Hypervisor, OpenStack, and AWS (Amazon Web Services). You can configure multiple discovery tasks on one or more
discovering members.
• IP discovery: You execute an IP discovery (Data Management tab -> IPAM tab -> Discovery from the Toolbar) to
detect active hosts on specified networks in a network view. You can configure the appliance to perform an IP
discovery using one of the following protocols: ICMP (Internet Control Message Protocol), NetBIOS (Network
Basic Input/Output System), and TCP (Transmission Control Protocol). For more information, see Supported IP
Discovery Methods on page 622. You can start an IP discovery immediately after you configure it, schedule it for
a later date and time, or configure a recurring discovery based on a recurrence pattern. For information about
how to configure an IP discovery, see Configuring IP Discovery on page 626.
• vDiscovery: This is an extension to the former VM discovery, in which the NIOS appliance only discovers virtual
entities on VMware vCenter and vSphere servers. A vDiscovery job (from the Data Management tab -> IPAM tab ->
vDiscovery from the Toolbar, or Cloud tab -> any sub tab -> vDiscovery from the Toolbar) now detects virtual
entities and interfaces in private, public, and hybrid clouds that are managed through VMware vCenter servers
and vSphere Hypervisor, OpenStack, or AWS. You can define vDiscovery jobs through the vDiscovery Job wizard
and manage all configured vDiscovery jobs through the vDiscovery Job Manager. Note that for a specific
vDiscovery job, NIOS synchronizes successive discovered data (not the associated NIOS objects) with the data
in the targeted CMP. For example, if you change the IP address of a VM, this information is reflected in the next
discovery of the same vDiscovery job. If you terminate a VM, the VM is deleted from the NIOS database. If you
delete certain information on the CMP, the respective discovered data is removed from the NIOS database. Be
aware that if you change the parameters of a vDiscovery Job, the last discovered data from this job will be
automatically cleaned up so that the appliance can continue to synchronize data from one discovery to the next.
If you do not want to lose discovered data for a specific vDiscovery job, you should create a new vDiscovery job
for this new collection instead of modifying the current job. For information about how to configure vDiscovery
jobs for specific CMPs and how to manage them, see Configuring vDiscovery Jobs on page 630 and Managing
vDiscovery Jobs on page 641.
Note: For new installations, an IP discovery task is automatically created by default. You can choose to disable the
IP discovery after you have set up your appliance. However, you must configure and manually schedule
vDiscovery jobs in order for the appliance to detect and collect information about virtual entities in the clouds.
When you upgrade from a previous NIOS release to NIOS 7.2 and later, former VM Discovery tasks are divided
into separate vDiscovery jobs based on the server endpoints defined in the VM Discovery tasks. All new
vDiscovery jobs inherit the same discovery schedule from the old tasks. You must manually enable the new
vDiscovery schedules in order for the appliance to perform vDiscovery jobs. For information about how to
enable the vDiscovery schedule, see Scheduling vDiscovery Jobs on page 640.
After a discovery, the appliance updates the database with the discovered data based on the discovery configuration.
For example, you can configure the appliance to merge newly discovered data, consolidate managed data, or update
unmanaged data. The appliance also identifies unmanaged and conflict data after a discovery. Unmanaged data is
discovered data that is not configured for DNS or DHCP and has no associated NIOS objects. Conflict data is
discovered data that is configured for DNS or DHCP and has associated NIOS object or objects, but certain key values
are different than those in the NIOS database. For information about guidelines the appliance uses to update
discovered data, see Guidelines Before Starting a Discovery on page 625 and Guidelines for Configuring vDiscovery
Jobs on page 630.
Grid Manager displays discovered data in the Discovered Data section of the IP address properties panel when you
drill down to individual IPs. For information about how to view and manage discovered data, see Viewing Discovered
Data on page 642 and Managing Discovered Data on page 645. The appliance records admin operations in the audit
log and discovery operations in the syslog.
Figure 14.1 shows a high-level perspective of the discovery processes. You can configure and initiate an IP discovery
from the Discovery Manager wizard and a vDiscovery from the vDiscovery Job wizard. You must first select a Grid
member that runs the discovery tasks. After you configure an IP discovery task and a vDiscovery job, the Grid Master
sends the discovery requests to the selected member. Based on the configuration of the discovery tasks, the selected
member runs the discovery and collects information about discovered hosts and virtual entities from the specified
networks and cloud platforms. The Grid member then reports the discovered results to the Grid Master. Based on the
discovery configuration, the Grid Master updates the database with discovered data.
Administrative Permissions
You can initiate a discovery and manage discovered data based on your administrative permissions. You must have
read/write permission to “Network Discovery” to initiate and manage IP discovery and vDiscovery. You must have at
least read-only permission to “All Tenants” and “All Network Views” to view discovered data in the VMs (by IP
Address) tab in the Cloud tab. To take actions on discovered data, such as resolving conflicts or clear unmanaged
data, you must have read/write permissions. For information about how to configure admin permissions, see About
Administrative Permissions on page 195.
Following are permission guidelines for initiating and controlling a discovery:
• Superusers can initiate and control a discovery on all networks and CMPs.
• Administrators with read/write permission to “Network Discovery” can initiate and control a vDiscovery job or
an IP discovery. For IP discovery, only the objects with IP addresses to which the administrators have read/write
permission are updated to include the discovered data.
After a discovery is completed, the following permission guidelines apply to viewing and managing discovered data:
• Superusers can view and manage all discovered data.
• Administrators with read/write permission to networks can view all discovered data. They can also add
unmanaged data to existing hosts, and resolve IP address conflicts.
• Only administrators with read/write permission to a DNS zone or specific record type can convert unmanaged
data to a host, fixed address, reservation, A record, or PTR record.
• Administrators with read-only permission to networks can only view discovered data. They cannot change any
discovered data.
IP Discovery Process
Once an IP discovery starts, the Grid member reports the discovery status, such as Completed, Running, Paused,
Stopped, or Error, in the Discovery Manager wizard and the Discovery Status widget on the Dashboard. In the
Discovery Status widget, Grid Manager reports the time when the discovery status was last updated and the numbers
of each type of discovered data. For information, see Discovery Status on page 153.
When an IP discovery starts, the appliance divides the IP addresses in a network into chunks, with each chunk
containing 64 contiguous IP addresses. The discovery process probes each IP address in parallel and in ascending
order, reports the detected information, updates the progress report, and then moves on to the next chunk until it
hits the last chunk of IP addresses. The appliance then updates the database with the discovered data.
An IP discovery scans the selected networks in the order the networks appear in the Discover Manager wizard.
You can configure discovery processes on the same network, but the same configuration cannot be shared between
two discovery processes.
Figure 14.2 illustrates how an IP discovery works.
Network 10.0.0.0/8
The Grid member scans
networks using a splitting
mechanism. Each IP chunk in a 10.0.0.1
network contains 64 contiguous 10.0.0.2 10.0.0.65
IP addresses. 10.0.0.3 10.0.0.66 10.0.0.130
. 10.0.0.67 10.0.0.131
. . 10.0.0.132
10.0.0.64 . .
10.0.0.129 .
1st IP Chunk
10.0.0.194
2nd IP Chunk
3rd IP Chunk
Discovery
Request
Network 10.0.1.0/24
Grid Master
10.1.1.11 10.0.1.1
Grid Member
10.0.1.2 10.0.1.65
10.1.1.16
10.0.1.3 10.0.1.66 10.0.1.130
Discovered . 10.0.1.67 10.0.1.131
Data . . 10.0.1.132
10.0.1.64 . .
Database
10.0.1.129 .
1st IP Chunk
10.0.1.194
2nd IP Chunk
The Grid member reports the 3rd IP Chunk
discovery status and discovered data.
Grid Manager displays the discovery
status in the Discovery Manager
widget and updates the database with
the discovered data.
The Grid member probes each IP address in each chunk,
reports the detected information, updates the progress
report, and then moves on to the next chunk until it hits the
last IP chunk in the last discovered network.
ICMP
This method detects active hosts on a network by sending ICMP echo request packets (also referred to as pings) and
listening for ICMP echo responses. The ICMP discovery is a simple and fast discovery that detects whether an IP
address exists or not. It returns only the IP address and MAC address (only if the Grid member running the discovery
is on the same discovered network) of a detected host. The ICMP discovery might miss some active hosts on the
network due to security measures that are put in place to block ICMP attacks.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. The ICMP discovery
method returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Grid member running the discovery is on the
same discovered network.
To use the ICMP discovery method, the ICMP protocol between the Grid member performing the discovery and the
target networks must be unfiltered.
NetBIOS
The NetBIOS method queries IP addresses for an existing NetBIOS service. This method detects active hosts by
sending NetBIOS queries and listening for NetBIOS replies. It is a fast discovery that focuses on Microsoft hosts or
non-Microsoft hosts that run NetBIOS services.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. This method returns
the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: Only if the discovered host is running Microsoft.
• OS: This value is set to Microsoft for an active host that has a MAC address in the NetBIOS reply.
• NetBIOS name: This value is set to the name returned in the NetBIOS reply.
To use the NetBIOS discovery method, ports 137 (UDP/TCP) and 139 (UDP/TCP) between the Grid member
performing the discovery and the target networks must be unfiltered.
TCP
The TCP discovery probes each active host on a list of TCP ports using TCP SYN packets. This method detects all active
hosts that generate SYN ACK responses to at least one TCP SYN. The discovery can determine the OS on a host by
analyzing how the host reacts to the requests on opened and closed ports. It then uses the TCP fingerprints to guess
the OS. To obtain a TCP fingerprint, IP discovery provides two scanning techniques, SYN and CONNECT.
When you use the SYN technique, the discovery sends a TCP SYN packet to establish a connection on a TCP port. If
the port is open, the host replies with a SYN ACK response. The discovery does not close the port connection.
The CONNECT technique is a three-way TCP handshake. The discovery starts with the same process as the SYN
technique by sending the TCP SYN packet. If the host replies with a SYN ACK response, the discovery then sends a
RST packet to close the connection. If the response contains a RST flag, it indicates that the port is closed. If there is
no reply, the port is considered as filtered. The TCP discovery is a deliberate and accurate discovery method. It can
basically detect all active hosts on a network provided that there are no firewalls implemented on the network.
You can select the TCP ports, the TCP scanning technique, and configure the timeout value and the number of
attempts in the Discovery Manager wizard. This method returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Grid member running the discovery is on the
same discovered network.
• OS: This is set to the highest probable OS reported in the response.
To use the TCP discovery method, the TCP port and a specific set of ports between the Grid member and the
discovered networks must be unfiltered. The default set of ports is defined by the factory settings.
Full
The full discovery method is a combination of an ICMP discovery, a NetBIOS discovery, a TCP discovery, and a UDP
scan. This method starts by sending an ICMP echo request. If no IP address on the network responds to the ICMP
request, the discovery ends. If there is at least one response to the ICMP echo request, a NetBIOS discovery starts. A
TCP discovery then follows by skipping through the active hosts that the NetBIOS discovery detects. The TCP
discovery also handles the NetBIOS-detected hosts that have no MAC addresses. This method also performs a UDP
scan to determine which UDP ports are open.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. The full discovery
method returns the following information for each detected host:
• IP address
• MAC address
• OS
• NetBIOS name
To use the full discovery, all the filter and firewall requirements in the ICMP, NetBIOS, and TCP discovery methods
apply.
The following is a summary of the supported IP discovery methods:
NetBIOS • IP address Use NetBIOS for discovering NetBIOS query and reply
• MAC address Microsoft networks or
• OS non-Microsoft networks that run
some NetBIOS services
• NetBIOS name
TCP • IP address Use TCP for an accurate but slow TCP SYN packet and SYN
• MAC address discovery ACK packet
• OS
Full • IP address Use Full for a general and 1. ICMP echo request and
• MAC address comprehensive discovery reply
• OS 2. NetBIOS query and
reply
• NetBIOS name
3. TCP SYN packet and
SYN ACK packet
The method you select to run an IP discovery determines the kind of information the discovery returns and the time
it takes to complete an IP discovery. If time is a concern, the following are factors you may consider when configuring
an IP discovery:
• The timeout value
• The number of attempts
• The number of ports the discovery scans
• The size of network you want to discover
Database Updates
After the Grid Master receives discovery data from the Grid member, it integrates the data based on the following
rules:
• For a discovered host with a new IP address, the appliance marks the IP address “unmanaged.”
• For a discovered host associated with one of the following, the appliance updates the data of the associated
object:
— A fixed address reservation or host address reservation
— A host address not configured for DHCP services
— A fixed address or host address with the same MAC address as that of the discovered host
— An A or PTR record
— A DHCP lease with the same MAC address as that of the discovered host
• For a DHCP lease that does not have any associated object, such as a fixed address or host record, the
appliance updates the IP address with the discovered data. When the lease expires and the IP address has no
associated objects, the appliance marks the IP address “unmanaged”. When the lease expires and the IP
address is associated with the same MAC address, the appliance preserves the discovered data.
• For a discovered host associated with one of the following, the appliance updates all data except the MAC
address and marks the IP address as a conflict. For information, see Resolving Conflicting Addresses on page
647.
— A fixed address with a different MAC address than that of the discovered host
— A DHCP lease with associated objects and with a different MAC address than that of the discovered host
— An Infoblox host address configured for DHCP services and with a different MAC address than that of the
discovered host
• For a discovered host that is part of a DHCP range but does not have a fixed or leased address or is not within an
exclusion range, the appliance assigns a DHCP range conflict to the IP address.
• For a discovered host through a vDiscovery, the appliance adds the discovered data to the database. The data is
displayed in the IP Map and IP List panels, the Discovered Data tab of an object editor, and the Discovered Data
section of the IP Address panel.
• The OS of an IP address obtained by an IP discovery supersedes that obtained by a vDiscovery, and the newly
discovered name of a host supersedes the last discovered data.
• When a vDiscovery cannot obtain the IP address of a virtual entity, it does not return any discovered data for the
entity.
• Only the objects with IP addresses to which the administrators have read/write permission are updated to
include the vDiscovery data.
Database Capacity
When the Grid Master database reaches its maximum capacity (the maximum capacity varies based on the appliance
model), the Grid Master stops updating the database and requests that the Grid member stop the discovery. When
the discovering Grid member database reaches its capacity, the Grid member pauses the discovery. The appliance
displays a dialog to inform you that the discovery pauses. The Grid member resumes the discovery once the database
falls below its capacity. When a discovery pauses because of capacity issues, you cannot resume the discovery or
start a new discovery. You can check the capacity of your appliance database before starting a discovery.
HA Failover
In an HA pair, if the Grid Master fails over to the passive node, the passive node takes over and continues with the
discovery from the last known state. If an independent appliance fails, the appliance stops the discovery process and
keeps the discovery in a paused state. The appliance resumes the discovery once it starts up again.
Configuring IP Discovery
You must have read/write permission to Network Discovery to initiate a discovery. After you start a discovery, you
cannot change the configuration of the discovery, but you can start the discovery process immediately or schedule it
for a later date. You can also configure a recurring discovery that repeats on a regular basis. For information, see
Configuring and Starting an IP discovery on page 627 and Scheduling IP Discovery on page 628. The appliance saves
the configuration of the last discovery.
When you start an IP discovery from the IPAM Home, Net Map or Network List panel, you can select the networks on
which you want the discovery to run. When you start an IP discovery from the IP Map or IP List panel, the discovered
network is the one to which the IP addresses belong. You can include additional networks when you configure the IP
discovery from the Discovery Manager wizard. You can run an IP discovery on multiple networks in one network view.
Note: If you clear this check box, the appliance replaces the existing data with the newly discovered data and if
there are no newly discovered values for some fields, the appliance removes the existing values for these
fields and the fields become empty.
— Update discovered data for managed objects: Select this check box if you want the appliance to update the
data of existing managed objects such as A records, PTR records, host records, and fixed addresses, with
the discovered data. If you clear this check box, the appliance updates only the unmanaged objects. This
check box is selected by default.
3. Click Save to save the discovery configuration. Note that you must save the configuration before you can start a
discovery.
4. Click Start to start the IP discovery. You can also do one of the following:
— Restore to Defaults: Restore the discovery configuration using the default values.
— Pause: Stop a running discovery.
— Resume: Resume the discovery that has been stopped.
— Save: Save the discovery configuration.
— Close: Cancel the configuration. If you have started a discovery, the discovery runs in the background when
you click Close. For information, see Running Tasks in the Background on page 100.
Note: Once you start a discovery, you cannot change the discovery configuration. After you click Start, the button
changes to Pause. You can click Pause to pause a discovery. When the discovery is paused, the button changes
to Resume. You can click Resume to continue the paused discovery.
— Select a network or multiple networks in the network table and click Delete to delete them.
— Click the Export icon to export the data in CSV format.
— Click the Print icon to print the data.
— Disable: Select this to exclude an IP discovery task. IP discovery is enabled by default.
3. If you select TCP or FULL in Mode, click the Advanced tab and complete the following:
— TCP Scan Technique: Select the TCP technique you want to use for the discovery. The default is SYN. For
information, see TCP on page 623.
— In the port table, select the check box of the port you want to configure. You can select all ports by clicking
the check box in the header.
Optionally, you can click the Add icon and complete the following to add a new service to the list.
— Port: Enter the port number you want to add to the list. You must enter a number between 1 and 65535.
— Service: Enter the name of the service.
You can also delete a specific TCP port in the list. You can select multiple ports for deletion.
— Timeout (ms): Enter the timeout value in milliseconds for the discovery. The timeout value determines how
long the discovery waits for a response from an IP address after probing it. The minimum is 5 and the
maximum is 4000. The default is 1000.
— Attempts: Enter the number of times you want the discovery to probe an IP address when scanning a
network. The minimum is 1 and the maximum is 5. The default is 2.
4. Click Save to save the discovery configuration. Note that you must save the configuration before you can start a
discovery.
5. Click Start to start the IP discovery. You can also do one of the following:
— Restore to Defaults: Restore the discovery configuration using the default values.
— Pause: Pause a running discovery.
— Resume: Resume the discovery that has been stopped.
— Save: Save the discovery configuration.
— Close: Cancel the configuration. If you have started a discovery, the discovery runs in the background when
you click Close. For information, see Running Tasks in the Background on page 100.
You can do the following after a discovery is complete:
• View the discovery status. You can view the current discovery status in the Discovery Status widget on the
Dashboard. For information, see Dashboards on page 117.
• View the discovered data. For information, see Viewing Discovered Data on page 642.
• Manage the discovered data. For information, see Managing Discovered Data on page 645.
Scheduling IP Discovery
After you configure a discovery (as described in Configuring and Starting an IP discovery on page 627), you can
schedule to run a one-time IP discovery at a later date and time. You can also schedule a recurring IP discovery by
configuring a recurrence pattern. The appliance automatically starts a recurring discovery based on the configured
schedule and detects any newly added or removed networks. Note that you can only schedule the start of a discovery,
you cannot schedule it to pause, stop, or resume. After a scheduled discovery starts, you can then pause, stop, or
resume it.
You can schedule only one IP discovery at a time. Once you schedule a discovery, you cannot change the configuration
until the task is cancelled or executed. You can however disable a recurring discovery. When you disable a recurring
discovery, it will not recur during the scheduled interval.
Example 1
When you configure a recurring discovery to occur every five hours, the discovery starts at the following hours on each
day: 00:00, 05:00, 10:00, 15:00, and 20:00. The first occurrence on each day starts at 00:00.
Example 2
When you configure a recurring discovery to occur every two days during a week, the discovery starts on the following
days every week: Monday, Wednesday, Friday, and Sunday. The first occurrence starts on Monday of each week.
— In addition, ensure that you select the auto consolidation options when defining policies for how to
handle the discovered cloud extensible attributes, as described in Defining Policies for Handling
Discovered Data on page 634. Note that only cloud extensible attributes for managed objects are
updated. To update cloud extensible attributes for unmanaged objects, you can first convert the
unmanaged objects to managed objects. For more information, see Managing Unmanaged Data on
page 645.
• When you select VMware as the endpoint server for the vDiscovery job, consider the following:
— Typically, vDiscovery does not collect data about “Network” from VMware vSphere and vCenter servers.
Therefore, you must first define a network in NIOS in order to discover IPs in the network.
— However, if you use vCenter to define a network as “IP_Pool,” which contains the CIDR for the network,
vDiscovery is able to collect this data and translate it into a network. NIOS then creates the network and
updates it with corresponding Cloud extensible attributes.
• If you use an AWS Elastic IP address and select AWS as the endpoint server for the vDiscovery job, you must
first manually create the network in NIOS before launching the vDiscovery job in order to discover the
Elastic IP.
• You cannot delete discovered tenants, networks, and VMs through the vDiscovery process. Conflict
management is not supported for these objects. Note the following:
— Discovered subnets are always created as managed networks. Pools of IP addresses (public pools)
when discovered are translated into managed networks. Any discovered public IP that is not linked to a
pool is marked as unmanaged data in NIOS, unless there is a corresponding network already created.
— Tenant and VM information is merged into NIOS through cloud extensible attributes, only if there is a
cloud license (Cloud Network Automation or Cloud Platform) installed in the Grid. Properties for
unmanaged tenants and VMs are always updated while properties for managed tenants and VMs are
updated only if auto-consolidation of tenant and VM information is selected when you configure the
vDiscovery job. For information about auto-consolidation options, see Defining Policies for Handling
Discovered Data on page 634.
• Properties of a VM address (such as interface name, network encapsulation, segmentation, VLAN ID) can
only be updated through cloud extensible attributes, depending on the policies you select when
configuring a vDiscovery task. To properly integrate discovered VM address properties with NIOS, ensure
that you do one of the following:
— Define cloud extensible attributes for these properties through your cloud adapter. For information
about how to define cloud extensible attributes, refer to the Quick Start Guide for your cloud adapter,
available on the Support site.
— Convert unmanaged VM addresses to managed so discovered cloud extensible attributes can be
merged into NIOS. For more information, see Converting Unmanaged Data on page 646.
• Unmanaged objects in NIOS are updated with newly discovered data and stay as unmanaged objects.
Managed objects in NIOS that have no conflict with newly discovered data are updated and stay as
managed objects.
• If there is conflict between managed objects in NIOS and newly discovered data, the managed objects are
not updated and stay as managed objects while a conflict is flagged for these objects. For information
about how to resolve the conflict, see Resolving Conflicting Addresses on page 647.
• NIOS does not automatically remove unmanaged objects that were discovered in the past but do not exist
in current discoveries. This can happen if your network topology has changed in between discoveries. You
can manually remove these unmanaged objects if you do not want them to stay in the database. For
information about how to remove these objects, see Clearing Unmanaged Data on page 646 and Clearing
Discovered Data on page 649.
• For delegated DNS and DHCP objects, changes are handled by the delegated Cloud Platform Appliance
based on the scope of delegation. Discovered data is still updated by the Grid Master.
To create a new vDiscovery job, complete the following tasks:
1. Name the new job and select a member to perform the vDiscovery, as described in Selecting the vDiscovery
Member on page 632.
2. Select a cloud platform for the vDiscovery, as described in Selecting the Endpoint Server on page 632.
3. Define network views for public and private IP addresses, as described in Defining Network Views on page 633.
4. Define policies for handling discovered data, as described in Defining Policies for Handling Discovered Data on
page 634.
5. Optionally, you can enable NIOS to automatically create DNS records for newly discovered VMs using their IP
addresses, as described in Creating DNS Records for Newly Discovered VMs on page 636.
6. Schedule the vDiscovery job, as described in Scheduling vDiscovery Jobs on page 640.
Note: You might lose some discovered data if you modify any of the following parameters for an existing
vDiscovery job. To avoid this, create a new vDiscovery job instead.
— Server Type: Choose one of the following server type for this vDiscovery:
— AWS: Collects information available for the AWS service endpoint. You can perform vDiscovery jobs
through a proxy server in an AWS deployment, including Amazon Route 53. For more information, see
Configuring Proxy Servers on page 442.
— OpenStack: When you select this server type, vDiscovery discovers network information stored in
Neutron servers, VM instance information in Nova servers, and tenant or project information in
Keystone servers.
— VMware: Supports VMware vCenter and vSphere servers v5.0 and later. Collects information for all
virtual entities running on the specified servers.
Depending on the server type you select, other options in this step change accordingly, as follows:
For AWS, complete the following:
— Service Endpoint: This is typically the regional service endpoint for the desired Amazon region.
Example: ec2.us-west-1.amazonaws.com. For more information about AWS service endpoints, refer to
the Infoblox Installation Guide for vNIOS for AWS, available on the Infoblox Support site.
— Port: Enter the port you want to use for the vDiscovery job.
— Protocol: The protocol used for AWS is always over SSL. AWS provides certificates that is linked to the
CA. By default, this certificate is embedded in NIOS and used as a reference for the CA when connecting
to AWS. You can also upload a new certificate as described in Managing Certificates on page 63. If you
upload a new certificate, the embedded certificate will be overwritten by the new one.
— Access Key ID and Secret Access Key: Enter the Access Key ID and Secret Access Key for the AWS service
endpoint. This is the secret key pair for the administrator account that executes the discovery job. For
more information, refer to the Infoblox Installation Guide for vNIOS for AWS, available on the Infoblox
Support site.
For OpenStack, complete the following:
— Keystone Server IP: Enter the Keystone Server IP address.
— Keystone Server Port: Enter the Keystone Server Port value.
— Protocol: Select HTTP or HTTPS as the protocol. When you select HTTPS, you must upload the
corresponding SSL CA certificate to the Grid in order for NIOS to communicate with OpenStack, as
described in Managing Certificates on page 63.
— Username and Password: Enter the username and password of the administrative account that was
configured on OpenStack. When you configure the administrative account, ensure that you have
authorization to obtain device information on a wide network basis.
For VMware, complete the following:
— Host: Enter the host name of the VMware server.
— Port: Enter the port number of the VMware server.
— Protocol: Select HTTP or HTTPS as the protocol. When you select HTTPS, you must upload the
corresponding SSL CA certificate in order for NIOS to communicate with the VMware server, as
described in Managing Certificates on page 63.
— Username and Password: Enter the username and password of the administrative account that was
configured on the specified VMware server. When you configure the administrative account, ensure
that you have authorization to obtain device information.
1. Click Next to define the network views to which discovered data belongs for both public and private IP addresses,
as described in Defining Network Views.
For Network Insight, when you discover networks using multiple discovery interfaces, you must configure network
views so you can associate each discovery interface with an available network view. Note that on the same
discovering member, each discovery interface must have a unique network view association.
1. For a new vDiscovery job: From the Data Management tab, select the IPAM tab, then select vDiscovery -> New from
the Toolbar; or from the Cloud tab, select vDiscovery -> New from the Toolbar.
or
To modify an existing job: From the Data Management tab, select the IPAM tab and click vDiscovery -> Discovery
Manager from the Toolbar, or from the Cloud tab, select vDiscovery -> Discovery Manager from the Toolbar. In the
vDiscovery Job Manager editor, click the Action icon (shown as a gear in each row) next to a selected job and
select Edit from the menu.
2. In step three of the vDiscovery Job wizard, or in the Network View tab of the vDiscovery Job Properties editor,
complete the following:
• Under the For Public IP Addresses section, select one of the following options the appliance uses if the
network view is not automatically detected:
— This Network View: From the drop-down list, specify a network view to which discovered data for public
IP addresses belongs. The default is the default network view. You cannot create a new network view
for this option.
— The tenant’s network view (if it does not exist, create a new one): Select this only if at least one cloud
license is installed in the Grid. When you select this, discovered data for public IP addresses belongs to
the tenant’s network view. If the network view does not exist, the appliance creates it (only if a cloud
license is installed in the Grid). The appliance uses tenant information of a discovered public IP
address to create a new NIOS network view for all discovered objects (primarily subnets) for that
tenant. For example, AWS tenants by default are associated with the user account’s 12-digit account
number (such as 2233441247523), which is the identifier for all objects that are created by that
account in AWS. That tenant value becomes the identifier for the new network view as its objects are
discovered by NIOS.
• Under the For Private IP Addresses section, select one of the following options the appliance uses if the
network view is not automatically detected:
— This Network View: From the drop-down list, select a network view to specify a network view to which
discovered data for private IP addresses belongs. The default is the default network view. You cannot
create a new network view for this option.
— The tenant’s network view (if it does not exist, create a new one): Select this only if at least one Cloud
Platform Appliance is active or a cloud license is installed in the Grid. When you select this, discovered
data for private IP addresses belongs to the tenant’s network view. If the network view does not exist,
the appliance creates it (only if a cloud license is installed in the Grid). The appliance uses tenant
information of a discovered private IP address to create a new NIOS network view for all discovered
objects (primarily subnets) for that tenant. For example, AWS tenants by default are associated with the
user account’s 12-digit account number (such as 2233441247523), which is the identifier for all
objects that are created by that account in AWS. That tenant value becomes the identifier for the new
network view as its objects are discovered by NIOS.
3. Click Next to configure how you want the appliance to handle discovered data, as described in Defining Policies
for Handling Discovered Data.
To modify an existing job: From the Data Management tab, select the IPAM tab and click vDiscovery -> Discovery
Manager from the Toolbar, or from the Cloud tab, select vDiscovery -> Discovery Manager from the Toolbar. In the
vDiscovery Job Manager editor, click the Action icon (shown as a gear in each row) next to a selected job and
select Edit from the menu.
2. In step four of the vDiscovery Job wizard, or in the Data Consolidation tab of the vDiscovery Job Properties editor,
complete the following:
Under When inserting discovered into NIOS, select one or both of the following:
— Merge the discovered data with existing data: When you select this check box, the appliance merges the
discovered data with the existing data. It appends newly discovered data to existing data and preserves the
existing data when there is no newly discovered data. This check box is selected by default.
Note: If you clear this check box, the appliance replaces the existing data with the newly discovered data and if
there are no newly discovered values for some fields, the appliance removes the existing values for these
fields and the fields become empty.
— Update discovered data for managed objects: Select this check box if you want the appliance to update
discovered data for all corresponding NIOS objects (if they exist in NIOS). If you do not select this check
box, the appliance updates only the discovered data for unmanaged objects. None of the managed data will
be updated. This check box is selected by default.
— For every newly discovered IP address, create: Select this check box to enable NIOS to automatically create
or update DNS records for discovered VM instances (except for cloud adapters such as AWS or DDNS) if the
records were originally created by vDiscovery. For more information about this feature, see Creating DNS
Records for Newly Discovered VMs on page 636.
— Host: Select this to automatically create Host records for discovered VMs.
— A & PTR Record: Select this to automatically create A and PTR records for discovered VMs. Note that the
DNS zones and reverse-mapping zones to which the records belong must exist in NIOS before the
vDicsovery job is executed. Otherwise, vDiscovery does not create the records.
— The DNS name will be computed from the formula: Enter the formula that NIOS uses to create the DNS
records for each discovered VM address. For example, if there are two IP addresses associated with a
VM, NIOS creates two DNS records, or a host record with two IP addresses, depending on your
configuration. You must use the syntax of ${parameter name} for the formula.
For AWS, OpenStack, and VMware cloud platforms, this field supports the following parameters:
vm_id, vm_name, discovered_name, tenant_ID, tenant_name, subnet_id, subnet_name,
network_id, network_name, vport_name, ip_address, ip_address_octet1 or 1,
ip_address_octet2 or 2, ip_address_octet3 or 3, ip_address_octet4 or 4. Note that it
does not support IPv6 addresses.
For example, when you enter ${vm_name}.corp100.com and the discovered vm_name = XYZ, the DNS
name for this IP becomes XYZ.corp100.com. When you enter ${discover_name} here and the
discovered name for the IP is ip-172-31-1-64.us-west-1.compute.internal, the DNS name for
this IP is ip-172-31-1-64.us-west-1.compute.internal.
Under When discovered data is linked to managed data, select any combination of the following.
Note: Tenants and VMs are managed objects when they have NIOS objects, such as Host records or fixed
addresses, associate with them. Otherwise, they are unmanaged objects. The appliance always updates
properties for all unmanaged objects.
— Auto-consolidate on managed Tenant’s properties: When you select this check box, the appliance updates
properties with discovered data for managed tenants, as well as unmanaged tenants (NIOS always update
unmanaged tenants). When you clear this check box, the appliance does not update discovered data for
managed tenants. This check box is selected by default.
— Auto-consolidate managed VM’s properties: When you select this check box, the appliance updates
properties with discovered data for managed VMs, as well as unmanaged tenants (NIOS always update
unmanaged tenants). When you clear this check box, the appliance does not update discovered data for
managed VMs. This check box is selected by default.
— Auto-consolidate Cloud EAs on managed data: When you select this check box, NIOS updates discovered
extensible attribute values for managed objects that contain cloud extensible attributes, only if a cloud
license is installed in the Grid. To update cloud extensible attributes for unmanaged objects, convert the
objects to managed objects in NIOS. For more information, see Managing Unmanaged Data on page 645.
3. Click Next to schedule this vDiscovery job and specify when the job should start, as described in Scheduling
vDiscovery Jobs on page 640.
Note: vDiscovery updates only records that are created by the vDiscovery process. It does not create or update DNS
records that are originally created by other admin users.
— Public IP’s Network View: The name of the network view to which discovered data for public IP addresses
belongs.
— Private IP’s Network View: The name of the network view to which discovered data for private IP addresses
belongs.
— Member: The Grid member that performs the vDiscovery job.
— Last Run: The timestamp when the selected vDiscovery job was last performed.
3. Click the Action icon (shown as a gear in each row) next to a selected job, and you can do one of the following:
— Edit: Modify the vDiscovery job settings in the vDiscovery Job Properties editor. The editor displays the
following tabs: General, Endpoint, Network View, Data Consolidation, and Schedule. Click the tab that
contains information you want to modify, and then modify the information as described in Configuring
vDiscovery Jobs on page 630.
— Delete: Remove the vDiscovery job from the list.
— Start: Start vDiscovery now for the selected job.
Note: The appliance might display an AMQP error when you first start a newly created vDiscovery job. This is due
to the start-on-demand mechanism experiencing a delay in executing the job. Wait a few seconds and
start the job again.
— Stop: Stop and terminate the vDiscovery job that is in progress. You cannot resume this discovery once you
stop it. All discovered data remains intact in the database.
4. Click Close to close the vDiscovery Job Manager.
• NetBIOS Name: The name returned in the NetBIOS reply or the name you manually register for the discovered
host.
• OS: The operating system of the detected host or virtual entity. The OS can be one of the following:
— Microsoft for all discovered hosts that have a non-null value in the MAC addresses using the NetBIOS
discovery method.
— A value that a TCP discovery returns.
— The OS of a virtual entity on a vSphere server.
• Discovered MAC Address: The discovered MAC address for the host. This is the unique identifier of a network
device. The discovery acquires the MAC address for hosts that are located on the same network as the Grid
member that is running the discovery. This can also be the MAC address of a virtual entity on a specified
vSphere server.
• Discovered DUID: For IPv6 address only. The DHCP unique identifier of the discovered host. This is an optional
field, and data might not be included.
• Last Discovered: The timestamp when the IP address was last discovered.
• First Discovered: The timestamp when the IP address was first discovered.
• Discovered Name: The name of the network device associated with the discovered IP address.
• Discoverer: Specifies whether the IP address was discovered by Network Automation or NIOS discovery process.
If you imported data from Trinzic Network Automation appliances, Grid Manager displays the following information,
if available. For information about the data imported from Trinzic Network Automation appliances, see Integrating
Discovered Data From Trinzic Network Automation on page 650.
• Attached Device Description: A textual description of the switch that is connected to the end device.
• Attached Device Address: The IPv4 or IPv6 address of the switch that is connected to the end device.
• Attached Device Model: If a reverse lookup was successful for the IP address associated with this switch, the
device model is displayed here.
• Attached Device Name: If a reverse lookup was successful for the IP address associated with this switch, the
host name is displayed here.
• Attached Device Port Description: A textual description of the switch port that is connected to the end device.
• Attached Device Port Name: The name of the switch port connected to the end device.
• Attached Device Vendor: The vendor name of the switch port connected to the end device.
• Attached Device Port: The number of the switch port connected to the end device.
• Attached Device Type: Identifies the switch that is connected to the end device.
• Device Vendor: The vendor name of the end device.
• Device Model: The device model of the end device.
• Device Management IP: The IPv4 or IPv6 address of the end device that is connected to the switch.
• Device Port Type: The port type for the end device.
• Device Port Name: The port name for the end device.
• Device Type(s): Identifies the device type.
• Port Duplex: The negotiated or operational duplex setting of the switch port connected to the end device. You
can modify this in the IPv6 fixed address and AAAA record editors.
• Port Link: The link status of the switch port connected to the end device. Indicates whether it is connected.
• Port Speed: The interface speed, in Mbps, of the switch port. You can modify this in the IPv6 fixed address and
AAAA record editors.
• Port Type: The switch port type.
• Port Status: The operational status of the switch port. Indicates whether the port is up or down.
• Open Port(s): Ports that are open.
• VLAN Description: The description of the VLAN of the switch port that is connected to the end device.
• VLAN Name: The name of the VLAN of the switch port.
• Attached Virtual Switch VTEP Multicast: The multicast address of the VTEP in the virtual switch that is connected
to the VM.
• Physical Host IP Address: The IP address of the physical node on which the VM is hosted.
• Physical Host Name: The name of the physical node on which the VM is hosted.
• Physical Host MAC Address: The MAC address of the physical node on which the VM is hosted.
• Physical Host CIDR Subnet: The subnet mask of the physical node on which the VM is hosted.
• Physical Host ‘s NIC Names: The list of all physical port names used by the virtual switch on the physical node
on which the virtual machine is hosted. Valid values are eth1, eth2, eth3, and so on .
Note: You cannot convert unmanaged IP addresses served by Microsoft DHCP servers to host records.
Note: Depending on the page size configuration, the search results are limited to the page size that you set. If
the search results exceed the page size limit, the appliance displays an error message to inform you to
refine your search criteria or to change the page size limit. In the Host Record editor, complete the
information as described in Choose one of the following from the Save & ... drop-down button menu: on
page 583.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: After the conversion, the status of the unmanaged address changes to Used.
Note: When you clear unmanaged addresses in a given network view, all unmanaged IPv4 and IPv6 addresses of all
networks in the network view are cleared. When you select an entire network or a specific network in the IP
Map or List panel, all the unmanaged addresses in the network are cleared. After you clear the unmanaged
data, the status of the IP addresses changes to Unused.
Note: Once the conflict is resolved, the status of the IP address changes depending on how you resolved the conflict.
To resolve a conflict:
1. In the IP Map or List panel, select a conflicting address, and then click Resolve Conflict from the Toolbar.
2. The Resolve Conflict dialog box displays the reason of the conflict and lists the existing information and
discovered information of the address in the Description field. Depending on the type of conflict, the appliance
displays the corresponding resolution options. You can compare the existing and discovered data and decide
how you want to resolve the conflict.
This option does not apply to leases served by Microsoft DHCP servers because they do not support
Infoblox reservations. For information about managing DHCP data served by Microsoft servers, see Chapter
36, Managing Microsoft DHCP Services, on page 1301.
— Keep the existing and ignore this conflict: Keeps the current DHCP lease for the address and ignores the
lease conflict.
2. Click OK or Resolve (when you have multiple conflicts). If you have multiple conflicts, Grid Manager returns to the
Resolve multiple conflicts dialog so you can resolve other conflicts.
Note: This action clears only the discovered data that is supported in the Discovered Data section for an IP address.
It does not clear any NIOS objects or information such as tenants, networks, or VMs for a cloud platform. If a
discovered IP address has the same IP as an existing NIOS object (such as a fixed address, DNS record, or host
record), the appliance removes this IP address.
Note: When you clear all discovered data in a given network view, all imported discovered data for managed
addresses in all IPv4 and IPv6 networks in the network view are cleared.
You can also clear discovered data for a specific discovery job, as follows:
1. From the Cloud tab -> VM tab, select Discovery Manager from the Toolbar.
2. In the vDiscovery Job Manager dialog, click the Action icon (shown as a gear in each row) next to the selected
vDiscovery job, and then select Clear Discovered Data.
3. In the Clear Discovered Data dialog box, click Yes. The appliance clears all the discovered managed data that is
collected by the specified vDiscovery job.
Note: If the same data is collected by the specified vDiscovery job and another non vDiscovery job such as Network
Insight or IP discovery, the discovered data remains intact and will not be removed.
To clear all discovered data for a specific vDiscovery job, do the following:
1. From the Cloud tab -> VM tab, select Discovery Manager from the Toolbar.
2. In the vDiscovery Job Manager dialog, click the Action icon (shown as a gear in each row) next to the selected
vDiscovery job, and then select Clear All Discovery Data.
3. In the Clear Discovered Data dialog box, click Yes. The appliance clears all the discovered managed and
unmanaged data that is discovered by the specified vDiscovery job.
Note: The NIOS appliance does not import IPv6 leases that contain prefixes and link-local IPv6 addresses. This data
is discarded during an import.
The appliance can import the following IPv4 and IPv6 data that Network Automation discovers:
• IP Address: The discovered IPv4 or IPv6 address.
• Discovered MAC Address: The MAC address of the discovered host.
• Last Discovered: The date and time the IP address was last discovered.
• NetBIOS Name: The name returned in the NetBIOS reply or the name you manually register for the discovered
host.
• OS: The operating system of the detected host.
• First Discovered: The date and time the IP address was first discovered.
• Discoverer: Specifies whether the IP address was discovered by a Network Automation discovery process.
• Discovered Name: The name of the network device associated with the discovered IP address.
• Attached Device Description: A textual description of the switch that is connected to the end device.
• Attached Device Address: The IP address of the switch that is connected to the end device.
• Attached Device Name: If a reverse lookup was successful for the IP address associated with this switch, the
host name is displayed here.
• Attached Device Port Description: A textual description of the switch port that is connected to the end device.
• Attached Device Port Name: The name of the switch port connected to the end device.
• Attached Device Port: The number of the switch port connected to the end device.
• Attached Device: Identifies the switch that is connected to the end device.
• Port Duplex: The negotiated or operational duplex setting of the switch port connected to the end device.
• Port Link: The link status of the switch port connected to the end device. Indicates whether it is connected.
• Port Speed: The interface speed, in Mbps, of the switch port.
• Port Status: The operational status of the switch port. Indicates whether the port is up or down.
• VLAN Name: The name of the VLAN of the switch port.
• VLAN: The ID of the VLAN of the switch port.
Consolidator
Probe
Grid Master
Encrypted IP Networks, Routers,
VPN Tunnels Firewalls, Load
Probe Balancers, End Hosts,
VRF-based Virtual
Networks, etc.
The Probes poll network devices,
collect discovered data, and send
the data to the Consolidator.
Network Insight appliances use SNMP and other protocols to discover and catalogue a diverse assortment of device
types, including the following: routers, enterprise switches, firewalls and security appliances, load balancers,
enterprise printers, wireless access points, VoIP concentrators, application servers, VRF-based virtual networks, and
end hosts.
Network Insight provides a tool for administrators to gather key information about networks, including the discovery
of routed paths and the host clouds behind enterprise switches, even in organizations where an Infoblox deployment
already exists. In Figure 15.2, an appliance running discovery connects to an enterprise router, and uses its
information to determine more about the networks that exist deeper within the unmanaged network, termed the
discovery domain in this example.
sets
As
To
Path
Col
lec 23
Discovery 17 tio . 0/
2
.16 6 .3
n
172.16.2.0/24
To
192.168.13.64/30
Switch-Router
The collection of unmanaged network information extends to the networks of distribution Ethernet switches. Data
collection also includes end hosts and application/file servers connected to edge switches in enterprise offices.
Discovery uses the term assets to describe these devices. For more information, see Viewing Assets Associated with
Discovered Devices on page 708.
The Probes return discovery data to the Consolidator, which synchronizes device information with the Grid Master.
Once information about discovered networks and devices resides on the Grid Master, you can convert unmanaged
networks and devices to managed objects, adding them to the NIOS database.
You can also configure the appliance to send SNMP and email notifications when it discovers unmanaged devices
and networks. For information about how to enable SNMP and email notifications for discovered unmanaged objects,
see Setting SNMP and Email Notifications on page 1371. You can also manage these notifications by configuring the
maximum number of unmanaged objects the appliance detects before it sends notifications and how often it notifies
about these events. For information about how to configure these parameters, see Defining Seed Routers for Probe
Members on page 684.
You provide one or more routers as seed routers to act as the initial gateways for discovering other networks and their
devices in the discovery domain (an example appears in Figure 15.2). You can also use DHCP routers (e.g., routers
serving DHCP leases) as seed routers to aid in faster discovery.
When you create new networks, you can optionally provision them onto devices and perform discovery on them. Once
you create the network, discovery can locate, poll and catalogue the network devices comprising the networks. This
information is then synchronized with the Grid Master. For more information, see Discovering Devices and Networks
on page 687.
Note: For comprehensive coverage of port control features in Grid Manager, see Port Control Features in Network
Insight on page 714 and its various subsections.
You can also exclude networks and IP addresses from discovery. The basic principle is that some devices do not need
to be discovered, perhaps because they are already managed as part of a Grid and hence should not be subjected to
discovery; because a device does not support SNMP; or for other organizational reasons. In Figure 15.2, networks
172.16.2.0/24 and 172.16.3.0/23 are excluded from discovery because they are already fully managed by a Grid.
For more information, see Excluding IP Addresses from Discovery on page 685.
You can define scheduled time periods in which Network Insight does not perform discovery operations in the
network. These time periods are called discovery blackouts. All protocols associated with discovery (SNMP, CLI
through Telnet and SSH, port scanning, fingerprinting and Ping sweeps) can be shut off during discovery blackout
periods. This prevents discovery protocols from occupying network bandwidth during periods of peak usage. Network
Insight does not communicate with devices in any way during a discovery blackout period. For more information on
discovery blackouts, see Defining Blackout Periods on page 731. Network Insight also provides a second type of
blackout period for port configuration tasks, during which no tasks to change device port settings will execute. For
more information, see Defining Port Configuration Blackout Periods on page 733.
Note: You assign each Probe appliance to a single network view, and multiple Probe appliances can share the same
network view. You can change network view assignments for Probe appliances at any time. On ND-1400,
ND-2200, ND-4000, ND-VM-1400, and ND-VM-2200 Network Insight appliances, you can assign multiple VLAN
interfaces on the same Probe to different network views.
Consolidator-Probe Appliance–You may also choose to operate a Consolidator-Probe appliance as a single discovery
system. In this deployment, the appliance operates as both a Consolidator and a Probe, performs all discovery
operations, aggregates all databases within it, and synchronizes with the Grid Master.
Standalone discovery appliances cannot be installed in a network that already has existing Probes and a
Consolidator. For more information, see Defining the Discovery Member Type and Mapping Discovery Interfaces to
Network Views on page 675.
SNMP
Note: Infoblox does not recommend using vendor default SNMP credentials on network devices. Should you need
to use vendor defaults for a given device type, you enter those values in the list of SNMP credentials on the
Grid Master.
Network Insight supports discovery of devices and networks through SNMPv1/v2c and through SNMPv3 protocols.
Discovery acquires information from standard SNMP MIB object IDs (OIDs) to correctly identify and catalogue devices.
You enter or import lists of SNMP credentials with which the appliances query devices on the network to perform
discovery.
SNMPv1 and SNMPv2c protocols are combined into a set termed SNMPv1/v2 for discovery. SNMPv1/v2 discovery
requires standard read community strings to be stored on the Grid Master.
Accounts using SNMPv3 use a standard suite of authentication and security protocols. If Network Insight uses
SNMPv3 to collect data from devices supporting the protocol, you can define specific user credentials with
combinations of authentication and protocol support, and the unique keys for each protocol. Network Insight also
supports multiple entries for the same username string, enabling checking of similar SNMPv3 credentials that use
different authentication and security protocols.
Some devices found by discovery may not have known SNMP credentials or credentials that are entered into the sets
of SNMP credentials defined for discovery.
Note: SNMP Credentials from the Grid or from the Member credential list are always tried in the specified order
unless a credential is associated with a host, fixed address or reservation being discovered.
CLI
Note: CLI is optional for discovery but is required for all Port Control operations. Discovery can perform CLI data
collection to collect information for specific device types. SNMP is required for all device discovery.
Network Insight enables the use of dynamically created and closed Telnet and SSH command-line sessions to log in,
query, and configure ports using each device’s command-line syntax. Network Insight does so without requiring
extensive configuration from the user. You need to provide known admin account login information and any Enable
passwords for devices in the networks to be discovered. CLI credentials are required for port reservation and port
configuration operations under Grid Manager. You enter CLI credentials into Grid Discovery Properties (Grid –> Grid
Manager –> click Edit –> Grid Discovery Properties) to be inherited by discovery Probe members, and as necessary for
each discovery Probe member. You can also override them for individual IPAM objects (fixed addresses, hosts and
IPv4 reservations) and test the CLI credentials against devices for correctness. For more information, see Testing
SNMP and CLI Credentials on page 683.
ICMP
Discovery uses different variations of Ping traces to perform higher-performance, brute-force device discovery. ICMP
is the last resort when devices do not support SNMP management protocols or an SNMP credential is lacking.
The ICMP Smart Ping Sweep option enables brute-force subnet Ping sweeps on IPv4 networks. Subnet ping sweeps
are used as a last resort in the discovery process. A subnet ping sweep is performed if Network Insight is unable to
identify any network devices in a given subnet. Subnet ping sweeps are performed no more that once per day, and
will end the ping sweep on a given subnet once Network Insight discovers a network device and is able to collect data
from it. You can configure the timeout value (Ping Sweep Timeout) and the number of attempts (Ping Sweep
Attempts).
Note: Smart subnet ping sweeps are not performed on subnets larger than /22. Ping sweeps of any kind do not
apply on IPv6 networks because of the greater scale of network addresses in the IPv6 realm.
Complete Ping Sweep differs from the Smart Subnet ping sweep in the following ways:
• The discovery ping sweep runs only against the specified range.
• The sweep runs regardless of the range size.
• The sweep runs regardless of the number of discovered devices within the specified range.
Discovery also performs automatic Ping traceroutes when needed for path collection. Path collections run without
user intervention or configuration.
TCP
TCP scanning probes each active host on a list of TCP ports using TCP SYN packets. This method detects all active
hosts that generate SYN ACK responses to at least one TCP SYN. The discovery can determine the OS on a host by
analyzing how the host reacts to the requests on opened and closed ports. It then uses the TCP fingerprints to guess
the OS. To obtain a TCP fingerprint, IP discovery provides two scanning techniques, SYN and CONNECT.
When you use the SYN technique, the discovery sends a TCP SYN packet to establish a connection on a TCP port. If
the port is open, the host replies with a SYN ACK response. The discovery does not close the port connection.
The CONNECT technique is a three-way TCP handshake. The discovery starts with the same process as the SYN
technique by sending the TCP SYN packet. A response containing a RST flag indicates that the port is closed. If the
host replies with a SYN ACK response, discovery sends a RST packet to close the connection. If there is no reply, the
port is considered filtered. TCP scanning is a deliberate and accurate discovery method, enabling detection of all
active hosts on a network provided that there are no firewalls blocking TCP packet exchanges.
You can choose the TCP ports and the TCP scanning technique in the Discovery Manager wizard. This method returns
the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Probe member running the discovery is on the
same discovered network.
• OS: This is set to the highest probable OS reported in the response.
To use the TCP discovery method, the TCP port and a specific set of ports between the Probe member and the
discovered networks must be unfiltered. The default set of ports is defined by the factory settings.
NetBIOS
The NetBIOS method queries IP addresses for an existing NetBIOS service. This method detects active hosts by
sending NetBIOS queries and listening for NetBIOS replies. It is a fast discovery that focuses on Microsoft hosts or
non-Microsoft hosts that run NetBIOS services.
NetBIOS discovery returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: Listed only if the discovered host is running Microsoft, otherwise blank.
• OS: This value is set to Microsoft for an active host that has a MAC address in the NetBIOS reply.
• NetBIOS name: This value is set to the name returned in the NetBIOS reply.
To use the NetBIOS discovery method, ports 137 (UDP/TCP) and 139 (UDP/TCP) between the Grid member
performing the discovery and the target networks must be unfiltered.
The following table summarizes the supported discovery methods:
SNMPv1/v2 • Open and Closed TCP Most important protocols for Queries and collects
SNMPv3 ports discovery. Ensure you have the system OIDs such as
• IP Address SNMP credentials necessary for SysDescr and sysUpTime.
probing devices using SNMP.
• System Description
• System Up Time
• Routing Neighbors
• Routing and
Forwarding Tables
• ARP tables
• SNMP credentials
CLI (Device • Similar data set to Requires correctly defined admin Uses standard
Command-Line SNMP login tuples and Enable device-language scripts
by Telnet or SSH) • May be used instead passwords where needed for and configured Telnet or
of, or in combination device types. SSH connection settings to
with, SNMP You may test credentials against collect discovery data.
devices and assign CLI credentials
to individual objects, overriding
Grid-level and Network-level
credential settings.
Starting Discovery
To ensure a successful discovery, complete the following:
1. In the Grid, install valid Discovery licenses on the Network Insight supported members that will later become the
Consolidator and Probes. For information about how to install licenses, see Managing Licenses on page 478.
2. When you join the discovery members to the Grid, the first member automatically becomes the Consolidator
while the others become Probes. If you want to change the roles of these members after they join the Grid, you
can re-define their member types, as described in Defining the Discovery Member Type on page 675. If you have
only one discovery member, it automatically becomes the Consolidator-Probe appliance after it joins the Grid.
For more information about the Consolidator and Probes, see Consolidator and Probes on page 658.
3. Configure applicable admin permissions for managing discovery and discovered data. For more information, see
Administrative Permissions for Discovery on page 673.
4. Define discovery interfaces and map them to corresponding network views. This step is especially important for
discovering VRF virtual networks. For more information, see Mapping Discovery Interfaces to Network Views on
page 675.
5. Configure Grid discovery properties such as defining polling settings and configuring SNMP and CLI credentials.
For more information, see Configuring Discovery Properties on page 676. Note that you can override the Grid
settings at the member and network levels.
6. Optionally, you can configure seed routers and map them to the corresponding network views. You can also use
the default gateways for associated DHCP ranges and networks as seed routers for discovery by selecting the Use
DHCP Routers as Seed Routers in the General -> Advanced tab of the Grid Discovery Properties editor. For more
information, see Defining Seed Routers for Probe Members on page 684 and Defining Advanced Polling Settings
for the Grid on page 678.
Note: You must map each discovery interface, seed, and VRF to its respective network view in order to have a
successful discovery for virtual routing instances.
7. Specify a network view, network container, or network to be discovered. For more information, see Discovering
Devices and Networks on page 687.
8. Optionally, define IP address exclusions when you want to exclude certain IPs from a discovery for various
reasons. For more information, see Excluding IP Addresses from Discovery on page 685.
9. Define blackout periods when you do not want the appliance to perform discovery. For information about how to
configure blackout periods, see Defining Blackout Periods on page 731.
10. Start the discovery service on the Consolidator and Probes to begin discovery, as described in Starting the
Discovery Service on page 674. The Probe members continue to discover network devices within the defined
networks.
Managing Discovery
After you start the discovery service, you can do the following to manage the discovery and discovered data:
• Monitor the discovery status, as described in Viewing Discovery Status on page 710.
• Execute discovery diagnostics to test the connection of a discovery member, as described in Executing
Discovery Diagnostics on page 712.
• Stop discovery on a specific network, as described in Disabling Discovery for a Network on page 713.
• View a complete list of discovered devices, their associated interfaces, networks, IP addresses, assets, and
components. For more information, see Viewing Discovered Devices and their Properties on page 698.
• Resolve conflicts for discovered data, as described in Conflict Resolution in Network Insight on page 736.
• Provision and de-provision networks and manage port configurations, as described in Port Control Features
in Network Insight on page 714.
Deploying Network Insight in VRF Network Type 1: All Devices on a Management Network
The following figure shows an example of integrating Network Insight with Network Type 1. In this network
deployment type, a single virtual discovery interface can manage all VRF instances’ identification of ARP entries,
because Network Insight needs only one discovery interface into the Management VRF.
• Discovery Interface: Add the active discovery interface to the management VRF and tag it with the corresponding
802.1q VLAN value.
• Discovery Ranges: Define IP discovery ranges for the management network.
• All discovered VRFs must be associated with the network view configured for the management VRF.
Deploying Network Insight in VRF Network Type 1: All Devices on a Management Network (Part 2)
The following figure shows the same topology for Network Type 1, but using multiple discovery interfaces and
multiple network views.
In this example, the switch must be configured with the trunk port ‘facing’ Network Insight to forward Network
Insight’s tagged 802.1q traffic to the appropriate destination networks (VLAN 5, VLAN 10, VLAN 20 and VLAN 30 in
this example).
The encapsulated sub-interfaces are defined using the correct values on each port; the virtual discovery interfaces
on Network Insight match these values.
Deploying Network Insight in VRF Network Type 2: All VRFs Reachable from a Shared Services
VRF
This example illustrates the use of a shared service VRF between the distribution routers in the network and how
Network Insight integrates into such a topology.
All virtual networks are reachable through a shared VRF, to which Network Insight may connect using a single virtual
discovery interface and reach all other VRFs from the one to which it is connected. Each Router in this topology also
shares routes between the VRFs.
Deploying Network Insight in VRF Network Type 2: All VRFs Reachable from a Shared Services
VRF (Part 2)
In this version of the VRF Network Type 2 deployment, you use multiple network views and multiple discovery
interfaces in a 1:1 ratio, with the same requirements for trunking and switch VLAN sub interfaces.
Network Insight
Deploying Network Insight in VRF Network Type 3: Devices Reside in Disconnected Networks
In the final example, trunking is in use between Network Insight and its facing gateway switch into the managed
network. This topology requires the use of multiple network views as all VRF networks are completely separate and
cannot be reached through any management virtual network.
After a discovery is complete, the following permission guidelines apply to viewing and managing discovery data:
• Superusers can view and manage all discovered data.
• Administrators with read permission to networks can view all discovery data without editing.
• If a user has read-only permissions for a device’s management IP address, the device is visible in the Data
Management –> Devices tab.
For more information on configuring admin user accounts and working with permissions, see the sections under
Managing Administrators on page 183. For information about discovery permissions, see Administrative Permissions
for Network Insight Tasks on page 241.
Note: The discovery service can only be started on Grid members that are configured as the Consolidator or Probe
(i.e. the Grid members with valid Discovery installed).
Each discovery member requires separate Discovery licenses, and must have a running discovery service. Consider
the following before starting or stopping the discovery service:
• The Grid Master does not run the discovery service.
• Appliances running a Discovery license and the discovery service do not support HA pairs.
• Discovery Probe appliances appear as Grid members in Grid Manager.
• All appliances running discovery must have the Discovery license installed before starting the service.
• Appliances running discovery do not run core network services such as DNS and DHCP. Discovery
appliances may also run the NTP service.
• If you expect to run a single appliance in the Grid for discovery, the appliance is designated as a
Consolidator, and also performs Probe discovery operations.
• When you add a new Grid member with a Discovery license, the appliance is set automatically to the
following:
— A Consolidator, if no other discovery member exists in the Grid.
— A Probe, when at least one discovery appliance exists in the Grid
Note: When a member joins the Grid and applies a Discovery license for the first time, the admin user needs to log
off and log in again to Grid Manager to see the discovery-enabled functionality.
For information about discovery configuration at the service level, see Configuring Discovery Properties on page 676.
1. From the Grid tab, select the Grid Manager tab, and click the Services tab.
2. Click the Discovery icon to display the list of members running the discovery service.
3. Select the discovery member or members for which you wish to stop the service.
4. Expand the Toolbar and click Stop.
The appliance asks you to verify that you want to proceed with stopping the service for the selected member.
5. Click Yes.
Note: You cannot change the member type when the discovery service is running. Stop the discovery service first
before changing the discovery member type.
6. Save the configuration. If you wish to change the interface over which the appliance sends and receives discovery
traffic, see Mapping Discovery Interfaces to Network Views on page 675.
To discover VRF virtual networks, you must discover their corresponding routes. In order to identify discovered data
by routes, you associate each discovery interface with a network view. You must have a network view configured for
each discovery interface, and you cannot share the same network view with multiple discovery interfaces on the same
Probe member. However, discovery interfaces on different Probe members can share the same network view.
To map discovery interfaces to their respective network views, complete the following:
1. From the Grid tab, select the Grid Manager tab, and then click Discovery.
2. In the Services tab, select the check box of the Probe member you want to configure, and then Click Edit –>
Member Discovery Properties in the Toolbar.
3. In the Member Discovery Properties editor, select the General tab and complete the following:
— Discovery Interfaces: Discovery members must have a designated interface or interfaces over which
discovery traffic takes place. By default, appliances use the LAN1 port for discovery traffic. You may
designate other ports such as the LAN2, MGMT, and VLAN ports as the discovery interfaces. These ports
must first be defined in the member network settings before they can be used for discovery. You cannot
modify the discovery interface settings while the discovery service is running on the appliance.
Note: The VLAN interfaces you configured on any Network Insight appliances are used for discovery only. Other
services are not supported on these appliances for VLANs. For information about how to define network
interfaces on the appliance, see Configuring Ethernet Ports on page 443.
The Discovery Interfaces table displays all interfaces you have configured on the member. To discover using
multiple interfaces, you must associate each interface with an available network view. A single default network
view exists in NIOS by default. All networks created or discovered for NIOS management must be part of a
network view. If more than one network view exists in the Grid, you can map a network view other than the
default view to the interface. This essentially serves to allow one or more discovery members to perform
discovery on separate routing domains, because a network view is comprised of a single routing domain with its
own networks. If you do not want to use a configured interface as the discovery interface, simply leave the
network view empty or unassigned for that interface. When you first set up an interface, no network view is
assigned to the interface by default.
The appliance displays the following for each interface you configure on the Probe member. To modify the
network view for an interface, click the Network View column and select the network view you want to associate
with the corresponding interface.
• Interface: Displays the name of the interface. You cannot modify this field. Discovery supports the LAN1,
LAN2, MGMT, and VLAN interfaces. You must first define these interfaces for the member before using them
for discovery.
• VLAN Tag: Displays the VLAN tag or ID for the corresponding VLAN interface. This field is left blank for all
physical interfaces. You cannot modify this field.
• Network View: Displays the current network view with which the interface is associated. An interface is not
associated with any network view and this field is left blank by default, which means the interface is not
used as a discovery interface. To modify the network view, click the Network View column for the
corresponding interface and select the network view you want to reassign to the interface from the
drop-down list. The appliance associates an interface with the default network view if you have not
configured additional network views.
4. Save the configuration.
• Define advanced polling settings for TCP scanning and Ping sweeps if you have selected these polling
methods. You can also select to use DHCP routers as seed routers or log discovery events to the syslog
while configuring advanced polling settings. For more information, see Defining Advanced Polling Settings
for the Grid on page 678.
• Configure SNMP and CLI credentials if you have selected SNMP Collection and CLI Collection as the polling
methods. For more information, see Configuring SNMP1/v2 Credentials for Polling on page 680.
• Enable discovery or port configuration blackout periods, as described in Defining Blackout Periods on page
731 and Defining Port Configuration Blackout Periods on page 733.
Note: You must be a superuser to configure discovery properties for the Grid. Some settings, such as seed router
definition, take place only on Probes.
Note: CLI Collection is the default polling method if SNMP is enabled on the member.
— Port Scanning: Select this to probe the TCP ports. Ensure that you go to the Advanced tab to configure more
settings for this option. Should you disable Port Scanning, NIOS attempts no port probes other than SNMP
on any device.
— Profile Device: If enabled, NIOS attempts to identify the network device based on the response
characteristics of its TCP stack, and uses this information to determine the device type. In the absence
of SNMP access, the Profile Device function is usually the only way to identify non-network devices. If
disabled, devices accessible via SNMP are identified correctly; all other devices are assigned a device
type of Unknown. Profile Device is disabled by default for network polling.
— Smart IPv4 Subnet Ping Sweep: Select this to execute Ping sweeps only on subnetworks that are known to
exist but no IPs can be fond within the subnet, such as through ARP or other means.
— Complete Ping Sweep: Select this to enable brute-force subnet Ping sweeps on IPv4 networks. An ICMP ping
is broadcast to all addresses in a subnet. Subnet ping sweeps are used as a last resort in the discovery
process. Perform a subnet ping sweep if NIOS cannot identify any network devices in a given subnet.
Subnet ping sweeps should be performed no more that once per day, and will stop on a given subnet once
NIOS Discovery locates a network device and is able to collect data from it. Ensure that you configure
advanced settings for this option in the Advanced tab.
Note: Note: NIOS will not perform Smart Subnet ping sweeps on subnets larger than /22. NIOS also will not
perform Ping sweeps on IPv6 networks because of the dramatically greater scale of network addresses in
the IPv6 realm. The Complete ping sweep differs from the Smart Subnet ping sweep in the following ways:
the Complete ping sweep will run only against the specified range; the sweep will run regardless of the
range size; and the sweep will run regardless of the number of discovered devices within the specified
range.
— NetBIOS Scanning: Select this to enable NIOS to collect the NetBIOS name for endpoint devices in the
network. This feature can be enabled only by users with SysAdmin privileges. This feature is globally
disabled by default (and also for device groups) to prevent unexpected scanning of the network by a new
collector.
— Automatic ARP Refresh Before Switch Port Polling: Select this to enable refreshing of ARP caches on
switches and switch-routers in the managed network before NIOS performs polling of switch ports. Enabling
this feature applies only to switched Ethernet devices. This feature enables more accurate detection of all
endpoint devices on L2 switches. Without ARP refresh, some endpoint devices may not be detected. This
feature is globally disabled by default. Individual ANPs can also be set to enable or disable this feature.
— Switch Port Data Collection: Select this to enable the Probe member to poll L2 enterprise switches. You can
completely disable switch port polling by deselecting this check box. You can also separately schedule
polling for switch port data collection as follows:
— Periodic Polling: Define regular polling time periods. Choose a polling interval of 30 or more Minutes or
in between1 and 24 Hours.
— Scheduled Polling: Schedule recurrent polling based on hourly, daily, weekly or monthly time periods.
Choosing this option, click the Calendar icon and a Polling Schedule editor appears; click the Edit icon
to make scheduling changes. Choose a recurrence pattern of Once, Hourly, Daily, Weekly or Monthly; in
all cases you must choose an Execution Time.
3. Save the configuration.
— SYN: Select this to quickly perform scans on thousands of TCP ports per system, never completing
connections across any well-known port. SYN packets are sent and the poller waits for a response while
continuing to scan other ports. A SYN/ACK response indicates the protocol port is listening while a RST
indicates it is not listening. The SYN option presents less impact on the network.
— CONNECT: Select this to scan IPv6 networks. Unlike the SYN option, complete connections are
attempted on the scanned system and each successive TCP protocol port being scanned.
In the port table, select the check boxes of the TCP ports you want to discover. You can select all ports by
clicking the check box in the header.
Optionally, you can click the Add icon and complete the following to add a new port to the list.
— Port: Enter the port number you want to add to the list. You must enter a number between 1 and 65535.
— Service: Enter the name of the service.
You can also delete a specific TCP port in the list, or select multiple ports for deletion.
— Purge expired assets data after: Removes records of discovered assets that are no longer reachable after a
specified period of time. The default is set to one day.
— Purge expired device data after: Removes records of discovered network infrastructure devices that are no
longer reachable after a specified period of time. The default is set to seven days, a more forgiving value
given that devices sometimes require maintenance, upgrades or repairs, or in cases where hosts leave the
network on long trips.
— ARP Aggregate Limit: Determines the largest ARP table collectible by discovery. The default is set to 30 ARP
table entries (MAC Addresses).
— Route Limit: Limits the size of the routing table that discovery is required to collect from any given device.
Some routers can have tables in the hundreds of thousands of entries, and collecting such a large body of
data can impose performance problems in the network and in discovery data collection. This setting
defaults to 3000, and automatically excludes BGP routes from collection. Consult Infoblox Technical
Support before making changes to this value.
— Ping Sweep Timeout (ms): Period of time allowed, in milliseconds, before a Ping times out to any given
device. Default is 1000 ms.
— Ping Sweep Attempts: The number of attempts on each address in a Ping sweep before the sweep
continues.
— Ping Sweep Frequency: Defaults to 1, because ping sweep should not be executed more than once a day
when the feature is enabled at the grid level or for a given discovery range. This setting affects the Smart
Ping Sweep and Complete Ping Sweep features under Grid Discovery Properties.
— ARP Cache Refresh: Defines the time period between ARP refreshes by Network Insight across all switch
ports. Before any other switchport polling and discovery operations take place (including any global
discovery polling operations initiated by the administrator), another ARP refresh is carried out by the Probe
appliance regardless of the time interval. The default is five minutes, because switch forwarding tables are
frequently purged from LAN switching devices. (The default on Cisco switches is five minutes/300 seconds.)
Network Insight primarily uses ARP Cache refreshes to improve the accuracy of end-device discovery.
Without this feature, some endpoints may not be discovered and cataloged.
— Ignore Conflict Duration: Used when resolving conflicts and when choosing the option to Ignore the conflict
when resolving it. The length of time during which conflicts is ignored is defined with this settings.
Increments can be defined in Hours or Days.
— Number of discovered unmanaged IP addresses per notification: The maximum number of unmanaged IP
addresses that the appliance discovers before it sends SNMP and email notifications, if enabled. The
appliance resets the counter after it hits this number and sends notifications. The default is 20.
— Interval between notifications for discovered unmanaged IP addresses: This number determines how often
the appliance sends SNMP and email notifications, if enabled, when it discovers the maximum number of
unmanaged IP addresses (configured for Number of discovered unmanaged IP addresses per notification).
This is the time interval between two notifications for discovered unmanaged objects. Select the time unit
from the drop down menu. The default is five minutes.
— Disable discovery for networks not in IPAM: Enabling this setting disallows Network Insight from executing
discovery on any infrastructure networks that are not presented in the Infoblox IPAM system; e.g. present
and managed in a network view or network container.
— Authenticate and poll using SNMPv2c or later only: For credential discovery and device polling exclusively
using SNMPv2c and up, preventing use of SNMPv1, enable this check box.
— Use DHCP Routers as Seed Routers: Select this so the Probe members can use the default gateways for
associated DHCP ranges and networks as seed routers to more quickly discover and catalogue all devices
(such as endpoint hosts, printers and other devices). All such default gateways are automatically leveraged
by discovery, and no further configuration is necessary unless you wish to exclude a device from usage.
Note: Check for a list of configured DHCP seed routers for any discovery Probe member in the Seed tab –>
Advanced tab of the Member Discovery Properties editor.
— Log IP Discovery events in Syslog: Sends a message to the configured Syslog service when an IP address of
an active host is discovered.
— Log network discovery events in Syslog: Sends a message to the configured Syslog service when a network
discovery process takes place in the Grid.
3. Save the configuration.
Note: You can test SNMPv1/v2c and SNMPv3 credentials against any device or any IP address, at the Grid level or
from any Probe member or network view. For more information, see Configuring SNMPv3 Properties on page
680 and Testing SNMP and CLI Credentials on page 683.
1. From the Grid tab, select the Grid Manager tab, and then click Discovery.
2. For the Grid: Click Edit –> Grid Discovery Properties in the Toolbar.
For the Probe member: Select the member check box, and then lick Edit –> Member Discovery Properties in the
Toolbar.
3. Click the Credentials tab. To override Grid settings for a Probe member, click Override.
4. Click the Add icon to add a new community string entry to the list. Click the Read Community cell and enter a text
string that the management system sends together with its queries to the network device during discovery.
A community string is similar to a password in that the discovered device accepts queries only from
management systems that send the correct community string. Note that this community string must exactly
match the value that is entered in the managed system. If you have a substantial list of community strings in
this list and need to find a specific string, enter the value in the Go To field and click Go. To remove a community
string entry, select the check box and click the Delete icon.
5. Optionally, you can test the credentials you added to the list by selecting a community string check box and
clicking Test Credentials, as described in Testing SNMP and CLI Credentials on page 683.
6. To export the entire list of community strings in a table file readable by a spreadsheet program, click the Export
icon and choose Export Data in Infoblox CSV Import Format. To export all data in a different format, click the
Export icon and choose Export Visible Data.
Note: You can test username/password credentials or an Enable password credential. You can also combine a
username/password credential and an Enable password credential as part of the same test.
1. From the Grid tab, select the Grid Manager tab, and then click Discovery.
2. For the Grid: Click Edit –> Grid Discovery Properties in the Toolbar.
For the Probe member: Select a member check box, and then click Edit –> Member Discovery Properties in the
Toolbar.
3. Click the Credentials tab -> CLI tab. To override Grid settings for a Probe member, click Override.
4. Click the Add icon to add a new CLI username/password entry to the list. Select the Credential Type, which can
be one of two choices:
5. In the Login Credentials list, click the Add icon to add a new CLI username/password entry:
— Protocol: Select SSH or Telnet. Infoblox recommends use of SSH.
— SSH — SSH credentials require both a username and password. The default protocol is SSH.
— Telnet — In Network Insight, Telnet credentials must use both a username or password.
Note: Should you choose to use a Telnet-based credential, Network Insight requires both the username and
password for the login account. This also applies when you override the CLI credentials on objects such
as a fixed address, host or IPv4 reservation. For more information, see the section Defining CLI Credentials
Settings for Objects on page 682.
Note: For each network, the IP list page provides a Type data column showing the IPAM object type that is
associated with any IP address. Also check the MAC Address column in the IP List page for information
about associated objects.
For a quick way to locate all objects of a certain type in the Grid, you can also create a smart folder with
settings such as: Type –> Equals –> IPv4 Fixed Address. Title the smart folder appropriately, to make clear
what data set it is presenting.
3. Click the IP address. In the IP address page, click the Related Objects tab.
4. Select the check box for the object in the Related Objects panel and click Edit.
5. In the object editor, click the Discovery tab.
6. For the object, click the Override CLI Credentials check box to override the inherited set of CLI credentials taken
from the Grid level.
By default, CLI credential definitions use SSH at the object level. Select the Allow Telnet check box if you want to
allow both SSH and Telnet credential usage; Infoblox recommends SSH because of better security.
7. Enter the Name and Password values, and the Enable Password value.
8. Click Test CLI Credentials to test the CLI discovery credential settings applied to the object.
9. When finished, click Save & Close.
Note: If the specified IP address is excluded from all discovery ranges or is not part of the selected network view, or
the credential is entered with missing information, a message appears at the top of the editor after clicking
Start. Otherwise, the test begins and its process and results appear in the lower pane of the editor.
Note: All NIOS Probe members automatically use their default gateway as a seed router. These gateways are
automatically displayed in the table. For effective use of seed routers, you must also provide SNMP credentials
to NIOS to allow it to pull the key routing and connectivity information, including the IPv6 routing table and the
local Neighbor Discovery Cache, from the device. If you do not define a seed router, it is recommended that
you enable discovery for a network or DHCP range.
You can check Discovery Status to see whether a seed router is successfully being reached and whether the seed is
providing information. By reviewing discovery status for each seed router, you can determine whether Network Insight
should be able to discover the network successfully, or if there are possible configuration errors preventing network
discovery, without having to wait to see what Network Insight finds. For seed routers, Reached Status and Overall
Status should both read Passed.
To add, view, or delete seed routers for a Probe, complete the following:
1. From the Grid tab, select the Grid Manager tab, and click Discovery.
2. Select the check box for any Probe appliance on the Discovery page and click Edit –> Member Discovery
Properties from the Toolbar.
3. In the Member Discovery Properties editor, Click the Seed tab. Grid Manager displays the following:
Click the Add icon to add a seed router. Grid Manager adds a row to the table. Complete the following in the
table:
— Router: Click this field and enter the IP address for the desired IPv4 or IPv6 seed router. Note that you can
assign a seed IP address to different network views if your deployment has overlapping IP addresses.
— Network View: Displays the current network view with which the interface is associated. A newly added
seed IP does not have any associated network view by default. From the drop-down list, select the network
view you want to reassign to the interface.
— Comment: Enter information about the seed router.
You can delete a seed router by selecting it and then click the Delete icon. Note that you cannot delete any seed router
that is a default gateway.
Note: For effective use of seed routers, provide SNMP credentials to the Probe member to allow it to pull the key
routing and connectivity information, including the IPv6 routing table and the local Neighbor Discovery Cache,
from the device. For more information, see Defining Seed Routers for Probe Members on page 684.
Note: You use the IPv4 Network or IPv6 Network editors to exclude IP addresses or ranges of IP addresses from
discovery within the specified network. For more information, see Disabling Discovery for a Network on page
713.
Host records, fixed address and IPv4 reservations can be excluded from discovery. You may also exclude an IP
address or a range of IPs within a network from discovery.
Note: You may create a network and choose not to discover it at that time, by disabling both Enable Immediate
Discovery and Enable Discovery. If you disable the Enable Discovery check box, the network will never be
discovered unless you change the setting again at a later time.
Conversely, you can explicitly exclude specific IPs or IP ranges from discovery. Discovery will never take place
on these IPs unless the admin specifically changes their exclusion setting.
Administrators can specify IPv4 and/or IPv6 addresses that must be immediately discovered by the appliance.
Some devices may need exclusion because they do not support SNMP, or for other organizational reasons.
Devices matching IP addresses selected for immediate discovery (using the Discover Now feature described in Using
Discover Now to Discover an Existing Object on page 689) are given one-time priority over other discovered devices,
for data collection and counting toward any device found matching the license limits.
A device specified through an IP address can also be excluded from discovery or management.
Note: You may also use the List page for the selected network to exclude IPs or selected ranges of IPs. However,
you have to page through or search through the pages comprising the list view to locate the IPs you want
to exclude. (If you know the IP address value in the List view but it does not appear on the page, enter it
in the Go to field to search for the IP.) The IP Map view allows you to view every IP address in a selected
network, such as a /24 prefix.
3. Select one or more IPs in the map. SHIFT+click to select a series of contiguous IPs. CTRL+click to select
non-contiguous IPs.
4. Expand the Toolbar and click Exclusion –> Enable Exclusion. The selected IP addresses are excluded from any
discovery actions.
Note: You can click the Action icon for any List record and choose Exclusion –> Enable Exclusion.
Note: The network lists between IPAM and DHCP will likely differ, because networks can be set to be Disabled from
DHCP. IPAM provides a complete list of all networks configured or discovered by Grid Manager.
2. Select a network from the IPAM home page: by checking the network’s check box, searching for the network in
the Go To box, or using the Next Page, Previous Page and Last Page selectors.
–or–
a. Select a network from the DHCP –> Networks home page by clicking its check box.
3. Expand the Toolbar and click the Add button, and select the object type from the menu, such as Host, Fixed
Address –> IPv4, or other object type.
4. In the second Wizard step, click Next Available IP to obtain the next available IP address in the chosen network.
For more information about obtaining the next available IP address, see About the Next Available Network or IP
Address on page 1109.
Note: For adding a host record, the first step in the Add Host Wizard requires adding an IP address.
5. If the network of the IP address is served by a Grid member, Grid Manager displays the Assign IP Address by
section, with its MAC Address, DHCP Client Identifier and DHCP Relay Agent settings. Select the different options
as needed to define a fixed IP Address or other object.
6. Click Next to continue to the DHCP Options page in the wizard.
Note: For more information about DHCP Options configuration, see About the Next Available Network or IP
Address on page 1109.
7. If you do not wish to configure DHCP Options for this Fixed IP, click Next to go to the following Wizard step.
8. (Optional) In the Device Information page, select the Device Type and the Device Vendor, or, if you do not wish to
configure device settings for the current object, click Next to go to the next Wizard step, for defining discovery
settings.
Note: For more information about Device Information settings, see Creating Port Reservations for IPAM Objects
on page 723.
• To override SNMP credentials for either SNMPv1/v2 or for SNMPv3 for the current Fixed IP, select the
Override Credentials check box.
You can enter both a SNMPv1/v2 Read community string and an SNMPv3 credential, or enter only the single
type you need. Each can be selected and edited in turn.
— Select SNMPv1/v2 and enter the Read community string;
–or–
— Select SNMPv3 and enter the device admin account name, and the Auth Protocol, Auth Password,
Privacy Protocol and Privacy Password values where necessary.
• You can apply a set of CLI Credentials to the specific fixed address object. To override the inherited CLI
credentials from the Grid, select the Override CLI Credentials check box. You can enter the admin user
Name and Password values and, if necessary, an Enable Password. The values you enter here are specific
only to the current object.
Note: Clicking Schedule for Later is a navigational button to allow you to skip quickly to the scheduling step in the
Wizard. You can return at any time to complete remaining Wizard steps to finish creating the object. You may
click the Schedule for Later button at any time in the Wizard process. For more information, see Scheduling
New IPAM/DHCP Objects and Associated Port Configurations on page 86.
10. (Optional) Click Next to go to the sixth Wizard step, which governs Reserve Port and Configure Port settings. (For
more information, see Defining Port Reservations for an Infoblox Grid Member on page 726.) Click Next when
finished with settings.
11. If necessary, add or apply any extensible attributes necessary for the new record. Click Next.
12. The final Wizard page governs scheduling of the object creation task and the optional port reservation task. Click
Save & Close.
6. If you have extensive end host Ethernet segments connected to Ethernet switches, enable switch port discovery,
as described in Defining Seed Routers for Probe Members on page 684.
With these settings, the Probe appliances automatically begin discovering network infrastructure devices.
You can elect to immediately discover or schedule discovery of new objects that you create and enable under IPAM
or DHCP. Objects that allow immediate discovery include the following:
• IPv4 Fixed Address (see Configuring IPv4 Fixed Addresses on page 1125 for the complete procedure).
You can Enable Immediate Discovery or Exclude from Network Discovery after creating the IPv4 fixed address,
and override the SNMP credentials if necessary.
• IPv6 Fixed Address (see Configuring IPv6 Fixed Addresses on page 1171 for the complete procedure).
You can Enable Immediate Discovery or Exclude from Network Discovery after creating the fixed address, and
override the SNMP credentials if necessary.
• IPv4 Reservation (see Configuring IPv4 Reservations on page 1131 for the complete procedure).
You can Enable Immediate Discovery or Exclude from Network Discovery after creating the IPv4 reservation, and
override the SNMP credentials if necessary.
• Host (see Adding Host Records on page 579 for the complete procedure).
You can Enable Immediate Discovery or Exclude from Network Discovery after creating the host, and override
the SNMP credentials if necessary.
• IPv4 Network (see Configuring IPv4 Networks on page 1111 for the complete procedure).
You can Enable Immediate Discovery (option is enabled by default) and override inherited discovery Polling
Options for the new network.
• IPv6 Network (see Configuring IPv6 Networks on page 1160 for the complete procedure).
You can Enable Immediate Discovery (option is enabled by default) and override inherited discovery Polling
Options for the new network.
• IPv4 DHCP Range (see Configuring IPv4 Address Ranges on page 1121 for the complete procedure).
You can Enable Immediate Discovery (option is enabled by default) and override inherited discovery Polling
Options for the new IPv4 DHCP range.
• IPv6 DHCP Range (see Configuring IPv6 Address Ranges on page 1168 for the complete procedure).
You can Enable Immediate Discovery (option is enabled by default) and override inherited discovery Polling
Options for the new IPv6 address range.
During configuration, you can choose to Exclude from Network Discovery if you wish to postpone discovery for
specific object types.
Note: Individual IP addresses within a network, and specific object types (IPv4 reservation, fixed address, and host),
may be excluded from discovery. You must explicitly select Enable Discovery for other object types (IPv4 and
IPv6 Ranges, IPv4 and IPv6 Networks); you can optionally Enable Immediate Discovery.
If you choose not to perform immediate discovery, but do Enable Discovery, the new network or other object
is discovered at a normal time determined by Network Insight.
You can manually perform discovery on any object at any time by selecting the object and choosing
Discover Now from the Toolbar. For more information, see Using Discover Now to Discover an Existing
Object on page 689. When you do so, you see a status icon appear in the Discover Now data column
for the object under IPAM, in the Data Management –> DHCP page and other locations.
By default, Grid discovery settings are the prevailing settings for all newly created objects. You can
override basic discovery polling options for networks and DHCP ranges allowing immediate discovery.
In such cases, local settings take priority. Credentials cannot be overridden for networks and DHCP ranges,
Note: If after you select a a network, object or IP and the Discover Now button is not enabled, make sure the network
or other object has a discovery Probe member assigned to it.
After you create any supported IPAM object, you may wish to perform discovery on it at a later time. You can simply
select the object and discover it.
1. From the Data Management tab, select the IPAM tab. The IPAM Home page appears.
2. Select the network or other object over which you want to perform discovery.
Depending on the object type, navigate from the network level to the individual IP table in the List page to locate
the object for immediate discovery.
3. Expand the Toolbar and click Discover Now.
You can also click the Action icon for the network and choose Discover Now from the menu.
The Probe member associated with the network or other object initiates a discovery procedure.
The chosen device is discovered and listed in the Devices panel in IPAM, or any other device on the network under
the All Devices category in the left pane of the device selector.
Clicking a managed device’s device name selects the device and brings you back to the originating page. Otherwise,
select a device and click OK to continue.
If you have a long list of devices even after selecting a smart folder, enter a device name search value or a search
expression in the Find field and click Go.
Note: When an entity of these types is converted to managed state under IPAM, you can apply permissions to them
under Grid Manager, to limit who can modify configurations and deployments, and when those changes can
be applied.
Grid Manager allows you to convert devices, interfaces and networks to managed status. What does this mean? For
all three entity types, it means that you can assign an IPAM object to them. You can discover a router or Ethernet
switch on the network, have it appear under IPAM, and then convert it to an IPAM object under Grid Manager to
resolve its identity on the network. Supported object types include the following:
• Hosts
• Fixed IPv4 Address
• Fixed IPv6 Address
• IPv4 reservation
• A Record
• PTR Record
Devices in unmanaged status may be converted to a managed object in Grid Manager: a host, fixed address, A record
or PTR record (for more information, see Converting Unmanaged Devices to Managed Devices below).
Assets, being essentially another classification of network devices, may be treated the same way (see Converting
Unmanaged Devices to Managed Devices);
Networks in unmanaged status may be converted to managed status under IPAM and DHCP (DHCP is optional) to
allow performance of tasks such as editing, splitting and resizing (under IPAM) and conversion to DHCP IP ranges
(under DHCP). For more information, see Converting Unmanaged Networks under IPAM to Managed Status on page
694);
Interfaces in unmanaged status may be converted to a managed object in Grid Manager: a host, fixed address, A
record or PTR record (for more information, see Converting Unmanaged Interfaces to Managed Status on page 696);
IP Addresses may also be converted to IPAM objects (for more information, see Converting Unmanaged IP Addresses
to Managed Status on page 697);
Finally, network devices such as server, end hosts and other network devices neighboring the current device can be
converted to managed devices under Grid Manager. For more information, see Converting Unmanaged Assets to
Managed Status on page 698.
Note: For convenience, the home Data Management –> Devices page provides a quick filter
to list only managed devices. In the Devices page, all devices highlighted in yellow
indicate a device that is unmanaged.
Device discovery allows you to define a fully managed state for any discovered and catalogued router, switch, firewall,
end host or other network infrastructure device. The process differs from converting an unmanaged network, because
you can bind a discovered device to a fixed address, a PTR Record, a host record or an IPv4 reservation. Doing so
offers the following benefits:
• Fixed Address – A fixed address represents a persistent link between an IP address and one of the
following: MAC address, Client identifier, or Circuit ID/remote ID in the DHCP relay agent option (option 82).
Most applications in the current context are for a MAC address. You can configure fixed addresses for
network devices, such as routers and printers, that do not frequently move from network to network. By
creating fixed addresses for network devices, clients can reliably reach them by their domain names. Some
network devices, such as web or FTP servers, can benefit from having fixed addresses for this reason. For
more information about these object types, see Configuring IPv4 Fixed Addresses on page 1125 and
Configuring IPv6 Fixed Addresses on page 1171.
• Host Record – Infoblox hosts are data objects that contain DNS, DHCP, and IPAM data of the assigned
addresses. Host objects allow you to assign multiple IPv4 and IPv6 addresses to a host. When you create a
host record, you are specifying the name-to-address and address-to-name mappings for the IP address that
you assign to the host. The Infoblox DNS server then uses this data to respond to DNS queries for the host.
This establishes the identity of any infrastructure device or asset on the network. For more information, see
About Host Records on page 578.
• PTR Record – Maps a device’s IP address to a host name in a reverse-mapping zone. The zone must already
be defined before assigning the new PTR record object. For more information about PTR records, see
Managing PTR Records on page 884.
• A Record – An A (address) record is a DNS resource record that maps a domain name to an IP address. A
records essentially tell DNS that a host exists inside a domain, as part of a forward-mapping zone. All traffic
to a domain or subdomain is directed to the IP address specified by the A record. The DNS zone must exist
in the Grid Manager before attempting to assign A records to devices. For more information about A records,
see Managing A Records on page 880.
Each object type has its own characteristics that you may apply to specific types of discovered devices. For many
infrastructure devices such as routers, or Assets such as servers, a fixed address is a likely choice.
Begin by examining the Data Management –> Devices page. The Managed column, as shown in Figure 15.4, can list
one of three possible states for all discovered devices:
— Blank value–indicates that the device is not known to IPAM, because insufficient information is available to
identify and catalog the device at the present time;
— No–Shows that the device in the Devices table is not managed under IPAM/Grid Manager, but enough
information is catalogued that the device can be converted to Managed state. This state is required before a
device can be converted to managed status.
— Yes–The device in the table is now Managed under IPAM, as an IPAM object type (PTR record, host, IPv4
reservation or fixed address).
An Action icon (shown as a gear in each row for the table) provides the quickest access to the Convert feature for
unmanaged devices, as shown in Figure 15.4.
Managed
column
Note: When you convert a network to managed status, Grid Manager uses the discovered Router IP for the network
to automatically populate the Router IP value in DHCP configurations for the selected network. Conversion for
DHCP is optional; you can choose to Disable for DHCP when you convert the network.
Unmanaged networks listed under discovered devices present the same conversion features as networks listed under
IPAM (see the following section Converting Unmanaged Networks under IPAM to Managed Status). Begin by
examining the Data Management –> Devices page, click a discovered device name’s Action icon and click the
device name hotlink. Open the Networks tab. The Managed column shows one of three possible states for all
discovered networks on each device:
— Blank value–indicates that the network is not known to IPAM, because insufficient information is available
to identify and catalog the network at the present time, or because the network listed at the device level is
for a loopback interface, a disconnected network, or a network prefix that is overlapped by a larger network
encompassing that prefix and defined in IPAM. These are also called non-NIOS networks. At the device
level, non-NIOS networks are highlighted in light grey;
— No–Shows that the network is not managed under IPAM/Grid Manager, but enough information is
catalogued that the network can be converted to Managed state. This state is required before a network can
be converted to managed status. Networks in this state are highlighted in yellow.
— Yes–The network is currently managed under IPAM, converted to an IPAM network. At the device level,
managed networks are highlighted in white.
Converting a network in the device context is the same as converting it at the top IPAM level. Administrators cannot
apply services or IPAM objects to IP addresses in unmanaged networks until the networks are converted to managed
status. Many operations cannot be carried out on unmanaged networks, including editing, splitting, resizing,
permissions changes and many other tasks.
1. From the Data Management tab, select the Devices tab.
2. Click the Next Page and Last Page icons to locate the device through which you want to locate the assets to
convert.
3. Click the Name of the device.
4. Click the Networks tab for the selected device.
5. Click the Action icon next to the network you want (this automatically selects it) and select Convert from the
menu. The Edit Network dialog appears, displaying the General tab.
You need take no further action other than Save & Close to set the network as Managed.
a. If necessary, select the Disable for DHCP check box to disallow the converted network from being usable
under DHCP.
Note: The Disable for DHCP check box enables or disables DHCP for the network.
b. If necessary, click the Discovery tab and click Enable Discovery to start discovery on the network after it is
converted to Managed state. You can also elect not to discover the network, by leaving the check box clear.
4. Click Select Member to choose the Probe member through which the network may be discovered.
5. If necessary, click Override under Polling Options, and modify the device discovery polling options
for the network. You can also specify Discovery Exclusions or a Discovery Blackout period.
6. A number of associated DNS and DHCP services are also available for configuration for the new
IPAM network, including DHCP Forwarding, IPv4 DDNS settings, and an array of other DDI service
settings for the network. None of these configurations are required in order for the network to be in
Managed state, but may be required for other purposes.
6. Click Save & Close to make the conversion.
The device’s Networks page shows Yes as the value for the network under the Managed column. The network is now
under the control of IPAM and can participate in DNS and DHCP services.
Note: When you convert a network to managed status, Grid Manager uses the discovered Router IP for the network
to automatically populate the Router IP value in DHCP configurations for the selected network. Conversion for
DHCP is optional; you can choose to Disable for DHCP when you convert the network.
The IPAM main page lists all discovered networks as unmanaged, highlighted in yellow. Administrators cannot apply
services or IPAM objects to IP addresses in unmanaged networks until the networks are converted to managed status.
You can explore unmanaged networks through IPAM’s IP Map and IP List views, but many operations cannot be
carried out on unmanaged networks, including editing, splitting, resizing, permissions changes and many other
tasks.
Note: Unmanaged IP addresses that are part of an unmanaged network cannot be independently converted to a
managed IP address.
Unmanaged networks can be converted at the IPAM main page and at the device level under Data Management –>
Devices, selecting a device and opening the Networks page.
Under IPAM, the Managed column for the Network tables can show one of two possible states for all discovered IPAM
networks:
— No–Shows that the network is not managed under IPAM/Grid Manager, but enough information is
catalogued that the device can be converted to Managed state. This state is required before a network can
be converted to managed status.
— Yes–The network shown in the table is now Managed under IPAM, converted to an IPAM network.
You can discover the network again after it is converted, or keep discovery disabled and execute it at another time,
or impose blackout periods that limit the time windows under which discovery can execute on the network. Other
management benefits include the ability to enable Infoblox services to the network;
1. From the Data Management tab, select the IPAM tab.
2. Select an unmanaged network from the IPAM list.
3. Click the Action icon next to the network you want (this automatically selects it) and select Convert from the
menu. The Edit Network dialog appears. The Edit Network dialog appears, displaying the General tab.
You need take no further action other than Save & Close to set the network as Managed.
a. If necessary, select the Disable for DHCP check box to disallow the converted network from being usable
under DHCP.
Note: The Disable for DHCP check box enables or disables DHCP for the network.
b. If necessary, click the Discovery tab and click Enable Discovery to start discovery on the network
immediately after it is converted to Managed state. You can also elect not to discover the network, by
leaving the check box clear.
7. Click Select Member to choose the Probe member through which the network may be discovered.
8. If necessary, click Override under Polling Options, and modify the device discovery polling options
for the network. You can also specify Discovery Exclusions, port control settings, or a Discovery
Blackout period.
9. A number of associated DNS and DHCP services are also available for configuration for the new
IPAM network, including DHCP Forwarding, IPv4 DDNS settings, and an array of other DDI service
settings for the network. None of these configurations are required in order for the network to be in
Managed state, but may be required for other purposes.
4. Click Save & Close to make the conversion.
The IPAM main page shows Yes as the value for the network under the Managed column. The network is now under
management of IPAM and can participate in Infoblox services.
Note: Most conversion operations for networks and individual IP addresses are managed under IPAM and are
described in the section Managing IPv4 and IPv6 Addresses on page 608 of this Guide.
Note: For convenience, a device’s Interfaces panel provides a quick filter to list only
managed interfaces for the device. When a device is converted to managed status,
interfaces in the device may remain in unmanaged state. If the interface has an IP
address that is recognized under IPAM, it may be converted to managed state.
Interfaces that appear in the Interfaces table for a device may be converted to managed status, under specific
circumstances. If an interface is bound to an IP address that is present in an IPAM network (for example, a leaf
network inside a network container under IPAM), that interface can be converted to managed status.
For any device, any interface with a hotlink to IPAM may be converted. Examples are shown in Figure 15.5.
In Figure 15.5, two interfaces provide a link to their respective IPAM interface pages, and show an IPAM Type of
Unmanaged. These ports may be converted to IPAM objects and managed under Grid Manager.
1. From the Data Management tab, select the Devices tab.
2. Click the Next Page and Last Page icons to locate the device through which you want to locate the interfaces to
convert.
3. Click the Name of the device.
4. Click the Interfaces tab for the chosen device. The Interfaces page lists all ports discovered on the device.
5. Click the Action icon next to the interface you want (this automatically selects it) and select Convert –> To
Host, Convert –> To A Record, Convert –> To PTR Record, or Convert –> To Fixed Address, from the menu. The object
editor dialog appears for the chosen object type. Interfaces that are already in Managed state or are not
recognized in IPAM are not allowed this action.
a. Define the required General settings for the new object.
b. Define any further settings you need from any of the other tabs in the editor.
6. Click Save & Close to make the conversion. The interface is associated with the new IPAM object.
Note: For information about unmanaged devices and managed devices and what their respective status means, see
Converting Unmanaged Devices to Managed Devices on page 692. You can also use the “Unmanaged devices
and networks” filter in global search to locate all the unmanaged devices and networks discovered through
discovery. For more information, see Using Global Search on page 78.
After discovery begins executing on the network, Grid Manager provides a Devices page under Data Management for
a complete list of every device that discovery finds, and lists all unmanaged and managed devices. Starting here, you
can explore a substantial body of information about the complete list of discovered and managed devices, and drill
down to specific information about every discovered and managed device. Listed devices inhabit one of three states
in the Devices page:
• Devices that appear with an empty value in the Managed column are devices that are discovered, but are
not recognized by IPAM, are not part of an IPAM network, and hence cannot be changed to managed status
in Grid Manager. These discovered devices cannot be changed to managed status, but you can perform
actions such as activating and deactivating ports, executing Discover Now on the device, view their list of
connected networks, and other actions. Avoid changing the state of ports or taking other actions on a
discovered device, unless the action is verified by an administrator.
• Device shown in yellow table rows are unmanaged devices, but are recognized by IPAM and can be
converted to managed status. Yellow rows appear with a value of No in the Managed column. You can
convert devices in table rows to managed objects under IPAM (host, fixed address, A record or PTR record);
• Devices shown in light grey table rows are managed devices, with a value of Yes in the Managed column.
• Click Show IPAM IP Address to open the IPAM status page to view records information for the Router IP
address, and information such as any IPAM/DHCP objects associated with the IP address (Related Objects)
and its recent history in Grid Manager (Audit History).
• Click Interfaces to display the complete table of interfaces associated with the network device.
• Click IPAM Networks and choose any network prefix in the list. The IP Map page appears for the chosen
network for which the device is a part.
• Click Edit to open the device editor, to change settings for interfaces on the selected device; apply
extensible attributes, or apply administrative permissions for Grid Manager admin access to a device.
• Choose Discover Now to apply discovery to a listed device to detect configuration changes, status changes
and other device information.
• Where applicable, choose Convert to change the status of an unmanaged device to managed status under
Grid Manager. (For more information, see Converting Unmanaged Networks under IPAM to Managed Status
on page 694.)
• Click Device Details to view a short list of key information about the selected device.
• Click Show Active Users to view all the active users on the Active Directory domain for the selected device.
For information, see Viewing Active Network Users on page 615.
Values listed in the Discovered Devices table include the following:
• IP Address: Detected the IP address (IPv4 or IPv6).
• Name: Detected the name of the device. Each device name provides a link to the complete body of information
associated with the device, arranged in five tabs: Interfaces, Networks, IP Addresses, Assets and Components.
For more information, see the sections under Accessing Detailed Device Information on page 701;
• Type: The network device type: Router, Switch-Router, Firewall, NIOS (Infoblox appliance), vNIOS, and others.
• Model: The model name as detected from the device during discovery.
• Vendor: The equipment manufacturer (Cisco, Juniper, Fortinet, F5, and others);
• Device Version: The Operating System version for the network device.
• Location: The physical location of the network device as detected from the device during discovery.
• Description: Verbose description of the network device as collected from the device by discovery.
• Discover Now: Indicates when the device is undergoing a current discovery process. A “Pending” icon appears
in this column to indicate the status.
• Managed: Indicates the status of the device in Grid Manager. A blank value in this field indicates the device has
been discovered but is not recognized in IPAM; a No value indicates the device is recognized by IPAM but is not
managed under Grid Manager; and a Yes value indicates that the device is fully managed by Grid Manager from
use of the Convert command and can support related features such as port reservations and IPAM/DHCP object
assignments. (For more information, see Converting Unmanaged Networks under IPAM to Managed Status on
page 694.)
• Active Users: The number of active users on the Active Directory domain for the selected IP address.
Click Discovery Status in the Toolbar to view the same list of network devices showing the discovery data set. You can
sort the table by Name or IP address. Use Grid Manager-standard filtering to isolate device names, IP addresses or
other values in which you are interested.
For each listed device, the Action icon provides the following options depending on the device type and its status:
Interfaces: Displays the Interfaces page for the chosen device. (For more information, see Viewing Networks
Associated with Discovered Devices on page 704.)
Show IPAM IP Address: Shows the Management IP address for the device that has a network in IPAM–the main IPAM
tab appears, showing details for the IP address. This option is greyed out for devices that have a management IP that
is not part of an IPAM network;
Edit: Displays the Device Editor window;
Interfaces: A direct link to the Interfaces page for the chosen device. Unmanaged devices may have managed
interfaces that appear in this page, and managed devices may have unmanaged interfaces that appear here;
Discover Now: Directs Network Insight to immediately perform discovery on the selected device;
Convert: For devices in unmanaged status (shown in yellow), allows conversion of the device to a managed object in
Grid Manager: a host, fixed address, A record or PTR record. (For more information, see Converting Unmanaged
Devices to Managed Devices on page 692.)
Networks: A drop-down list of all IPv4/IPv6 IPAM networks currently provisioned on the device. Each network
provides a link to the IP Map page for the selected network.
Device Details: A basic list of information about the chosen device, including the IP address by which the device is
discovered, operational status, IPAM Type (whether the device is managed or unmanaged), the Device Type and the
number of Interfaces.
Show Active Users: Displays the Active Users dialog box. You can view all the active users on the Active Directory
domain for the selected device. For more information, see Viewing Active Network Users on page 615.
— Capabilities: Describes the capabilities of each interface in the selected device. Hover the mouse over each
entry to view the complete listing. For information, see Determining Interface Capabilities on page 702.
— Site: This is a predefined extensible attribute.
You can also click the Action icon next to an interface name and select one of the following to perform the
specified task:
• Edit: This option is enabled if the network is in managed state. This opens the network editor.
• Show Assets: This option is only available for switched Ethernet interfaces with no IP Address. This opens the
Assets page for the selected device, and shows a list of end host devices or neighboring linked to the interface.
Network Insight filters the asset list for the device by the interface name.
• Show Multiple IP Addresses: Opens the IP Addresses page specifically for the interface, listing all IPv4 and IPv6
addresses associated with the interface. This option appears only if the interface has IP addresses.
• Convert: Convert a network in the unmanaged state to be managed under IPAM and (optionally) DHCP. Unlike
devices and interfaces, you do not assign objects such as fixed addresses or PTR records to a managed network.
Conversion enables a network to be fully manageable under IPAM and DHCP. For more information, see
Converting Unmanaged Networks to Managed Status on page 693.
• IPAM Networks: Choosing this option lists all IPAM networks associated with the current interface.
• Device Details: A basic list of information about the chosen device, including the IP address by which the device
is discovered, operational status, IPAM Type (whether the device is Managed or Unmanaged), the Device Type
and the number of Interfaces.
You can also do the following:
• Modify some of the data in the table. Double click a row, and either modify the data in the field or select an item
from a drop-down list. Click Save to save the changes or click Cancel to exit. Note that some fields are read only.
You can modify the following fields in this table: VLAN ID/VLAN Name, Admin Status and Description.
• Sort the data in ascending or descending order by column.
• Select an interface check box and click the Edit icon to manage device properties.
• Click the Export icon to export the list of discovered devices to a .csv file.
• Click the Print icon to print the list of discovered devices.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of a device name in the Go to field and select the device from the possible matches.
• Create a quick filter to save frequently used filter criteria.
• Delete: Select Delete to delete the network now or select Schedule Deletion to schedule the deletion at a later
time. Note that the deletion function allows you to de-provision the actual network from the device. By default,
when you choose Delete or Scheduled Delete, the network is de-provisioned from all interfaces listed in the
panel. Exercise caution when using this feature!
• Extensible Attributes: Provides access to the extensible attribute settings for the selected network.
• Permissions: Provides access to admin permissions settings for the selected network. This option is enabled if
the network is in managed status.
• Convert: Converts unmanaged network to a managed network in NIOS. All discovered networks on each device
are automatically listed as Unmanaged after a discovery. This means that the discovered network, though
visible, does not have its identities resolved by NIOS, nor are its IP address managed through IPAM or leased
through DHCP. After converting the unmanaged network to managed status, Grid Manager uses the discovered
router IP address to populate the same value under subsequent DHCP configurations for the network. You can
also select an unmanaged network and convert it to managed status by clicking Convert from the Toolbar.
• Device Details: Provides information about the device to which the selected network belongs. The list includes
information such as the IP Address and Device Type for the device, and in the IPAM Type field whether the
device itself is a managed or unmanaged object in NIOS. It also provides the following status counters for the
device:
— Administrative Up - Operational Up: The number of ports that are fully up and passing traffic
— Administrative Up - Operations Down: The number of ports that are administratively up, but have some kind
of connectivity issues.
— Administrative Down - Operational Down: The number of ports that are administratively taken down.
The horizontal navigation bar and the Toolbar also provide the following functions:
• Provision Network : Available for managed networks and for unmanaged networks that are recognized by
IPAM. For information, see Provisioning and De-Provisioning Networks on page 720). Clicking this icon opens
the Provision Network feature, allowing you to provision the network onto the actual device by selecting a
device interface, and enabling DHCP Forwarding and/or assigning a VLAN. Grid Manager creates a new port
control task under Task Manager, and you can choose the interface on which the network is provisioned, along
with VLAN configuration and other settings.
• De-Provision Network : Available for discovered networks that are not visible under IPAM. A dialog box
appears summarizing the task.
• Show Active Users: For Microsoft Management only. Displays the Active Users dialog box. You can view all the
active users on the Active Directory domain for the selected device. For more information, see Viewing Active
Network Users on page 615.
Modifying Networks
Grid Manager enables the user to edit select DHCP configurations, including the following:
IPv4 DHCP Options/IPv6 DHCP Options: DHCP options provide specific configuration and service information to DHCP
clients. For more information, see About IPv4 DHCP Options on page 1078.
DHCP Forwarding: Enables routers connecting multiple networks to act as a silent DHCP relay and forward DHCP
packets between them. The DHCP Forwarding page lists the interfaces on the currently selected network on which
DHCP Forwarding is enabled. If more than one device on the selected network also enables DHCP Forwarding, they
also appear here. DHCP Forwarding configuration involves simply enabling or disabling the service for a network
endpoint on the device. In order for DHCP forwarding to work, you must restart the DHCP service on the Grid member
that is serving the network; If you run DHCP service on both LAN1 and LAN2 of the Grid member, then both addresses
are written to the device.
1. From the Data Management tab, select the Devices tab.
2. Click the Name link for the device you want to inspect.
3. Click the Networks tab.
4. Click the Action icon for a network in the table, and choose Edit. This feature is enabled only for networks
that are managed under IPAM.
7. Click Yes to confirm the activating or deletion of DHCP forwarding on the selection, or No to reject the change.
8. Click Save & Close.
Note: One useful trick for interfaces is to pick out an interface from the Interfaces page that has multiple IPs and open
the IP Addresses tab; or sort the IP addresses table by its IP Address column, and locate the interface name
that bears multiple IPs. Frequently, an interface with multiple addresses can have IPv4 and IPv6 addresses
bound to it. Loopbacks are another example.
1. From the Data Management tab, select the Devices tab. The Devices Home page displays a list of all devices
currently found and catalogued by discovery.
2. Click the Action icon for a chosen device and choose Interfaces from the drop-down menu, or simply click the
device name to display the Interfaces list. Click Devices Home to return to the main Devices page.
3. Click the IP Addresses tab. Grid Manager displays all IP addresses associated with the chosen device.
Grid Manager displays the following information for each IP address:
— IP Address: The IP address for each discovered interface as managed by NIOS and IPAM. The table supports
IPv4 and IPv6 values. Each IP address is a link to the home IPAM page for the interface. If an IP address
does appear but is not a link, this indicates the discovered IP is not recognized under IPAM.
— VRF Name: The name of the VRF associated with the interface, if applicable.
— Network View: The name of the network view to which the VRF instance belongs, if applicable. If there is
only one network view in the Grid, which is the default view, the Network View column is hidden by default.
— VRF Description: The description about the VRF instance, if applicable.
— VRF RD: The route distinguisher associated with the VRF instance, if applicable.
— Interface Name: The name of the interface (usually a switched interface) associated with the discovered
device.
— MAC Address: The hardware MAC address associated with the interface.
— VLAN Name/VLAN ID: The data VLAN name and VLAN identifier to which the interface is
bound, if applicable. In most cases, you see both the VLAN name and the VLAN ID as two
values in the same field. Multiple VLAN entries may be present for an interface or IP
Address.Some interfaces may have a large number of associated VLANs. By default,
Network Insight does not automatically show all of them, instead providing a Show all... link for reference
within the table cell. All VLAN ID/VLAN name values appear within the table cell, with a Hide... link provided
to shorted the list back to original length.
— Admin Status: Lists whether the interface is administratively Up or administratively Down.
— Operation Status: The operational status of the interface (operationally Up or operationally Down).
— Managed: Indicates whether or not the IP Address is managed by Grid Manager. If the IP address is
unmanaged, you will be able to Convert the IP address to an Object that is managed by Grid Manager.
— Site: This is a predefined extensible attribute.
Extensible attributes may also appear in this table.
4. Click the IP Address link for any interface to open the Related Objects page for the chosen port.
Click the Action icon next to an IP address and select one of the following to perform the specified task. Note that
some of these actions are not applicable to the IP address.
• Edit Interface: Opens the interface general settings page. You can view and modify basic interface settings such
as Admin Status (on the General page), Data VLAN and Voice VLAN (on the VLAN page), and add or modify
extensible attributes.
• Convert: Depending on the address type and its IPAM status, you may be able to convert the selected IP to a
Host Record, A Record, PTR Record or a Fixed Address. Otherwise, Grid Manager shows This object cannot be
converted. You can also perform the same action by selecting an IP address check box and clicking Convert from
the Toolbar.
• Device Details: Provides information about the device to which the selected IP address belongs. The list
includes information such as the IP Address and Device Type for the device, and in the IPAM Type field whether
the device itself is a managed or unmanaged object in NIOS. It also provides the following status counters for
the device:
— Total Available Interfaces: The total number of interfaces associated with the device.
— Administrative Up - Operational Up: The number of ports that are fully up and passing traffic
— Administrative Up - Operations Down: The number of ports that are administratively up, but have some kind
of connectivity issues.
— Administrative Down - Operational Down: The number of ports that are administratively taken down.
Note: The list of assets at this level may include devices that are trunked to the current device, including
end-user host computers or routers and switch-routers neighboring the currently selected device.
Note: Click Device Details in the Toolbar to view information about the device, including its IPAM Type and the
operating status of its ports.
Note: Opening Discovery Status for viewing requires Superuser permissions under Grid Manager.
You can view a list showing the complete Discovery status of all device or of selected devices.
To isolate devices for evaluation, use filtering to reduce the list. Click Use Filter at the top of the table and choose IP
Address, Name or Overall Status as the filter.
1. From the Data Management tab, select the IPAM tab. The IPAM Home page appears.
2. Expand the Toolbar and click Discovery Status.
The same Discovery Status button can be found under Data Management –> Devices.
The Discovery Status table lists detailed information about network devices and end hosts discovered through
all methods, including SNMP, ICMP ping sweeps and other processes.
• IP Address: the IPv4 or IPv6 address of the discovered device. You can filter the table by this value.
• Name: The name of the discovered device as reported through SNMP. You can filter the table by this value.
• Type: The discovered device type. Examples include Router, NIOS, Switch-Router, Firewall, Load Balancer,
and numerous others.
• Overall Status: Indicates the overall success or failure of the discovery task on the device. Hover the mouse
over the device to see more detailed information about the discovery status, including the timestamp of the
last discovery event, confirmation of detection (“Device Exists”), and the means of detection, which are
usually methods such as SNMP, reading the ARP table or location through a Seed router. You can filter the
table by this value.
• Reached Status: Indicates the reachability of the discovered device. Typically, devices are reported Passed
for Reached Status if they are reachable through SNMP, a path trace through ICMP, or UDP-based path
tracing for an IPv6 address.
You may see a Reached Status of Passed and still receive an Overall Status of Failed. This often occurs
because either the CLI credentials or SNMP credentials provided for discovering the device do not work, or
another problem occurs in some part of the discovery process.
• SNMP Collection Enabled: Indicates whether the managed device allows SNMP as a management protocol.
This value shows Yes or No. You do not see any SNMP collection status updates if this value shows No.
• SNMP Credential Status: Indicates whether the correct SNMP credential is used by discovery. Usually shows
simple Passed or Failed status. Passing the mouse over the Failed status reading for this column shows the
location in the SNMP data collection where information gathering failed. The typical message for a failure of
this type typically shows Failure to Authenticate, which simply means that the correct SNMP credentials
have not been provided for either SNMPv1, SNMPv2c or SNMPv3 as required and defined for the device’s
discovery configuration.
If SNMP Credential Status shows Failed, you do not see a value under SNMP Collection Status, because that
is dependent on successful credential authentication. Should you succeed in SNMP Credential
Authentication for a device, this value shows Passed.
• SNMP Collection Status: Indicates whether managed device information has been successfully collected
from the device. If the current device shows an SNMP Credential Status of Failed, this field remains blank.
Should you succeed in SNMP Credential Authentication, SNMP Collection Status may or may not show a
Passed outcome. If the final outcome is successful, passing the mouse over the table value shows the
SNMP data set that was successfully collected from the device.
• CLI Credential Status: Reports the basic success state of CLI credential usage for device discovery. When
you see a Failed status in this column, hover the mouse over the table value. Details related to failed CLI
credentials normally relate to “Failed to Authenticate” events. (For more information, see the following
subsection Analyzing Discovery Status.) If you define device discovery requirements to use both SNMP and
CLI, and you receive complete SNMP discovery information but fail to authenticate for CLI, the Overall
Status for the device remains as Failed.
• CLI Collection Enabled: indicates the CLI collection configuration state for the discovered or managed
device. Possible values are Yes (CLI collection is enabled) or No (CLI collection is disabled for the device).
• Fingerprint Status: Shows the status of discovery of the device’s OS through fingerprinting.
• Last Update: Timestamp showing the conclusion of the last data update for the current device.
• First Seen: Timestamp showing the initial discovery event.
• Last Seen: The date and time when the device was last successfully polled by discovery.
• Last Action: The last action performed by discovery upon the device after the discovery took place. Hover
the mouse over this field to obtain details.
Visible columns can be changed in the Discovery Status window. At the top of any column header, click the down
arrow tool, and choose Columns – > Edit Columns.
A successful authentication also shows which protocol was used for SNMP authentication; SNMPv1, SNMPv2c or
SNMPv3. This does not guarantee successful data collection through SNMP, however.
The SNMP Collection Status counter shows possible Passed and Failed values. Hovering the mouse over a Failed
value in this column shows a tooltip reporting the set of data that discovery could not collect through SNMP. When
discovery encounters an error during collection of a specific data set (Forwarding table, or System identification data,
for example), data collection stops and issues an error message and an SNMP trap, which is reported and also
appears in the tooltip. If SNMP Collection Status shows a value of Passed, and discovery does not use CLI data
collection on the device, discovery has successfully completed on the device.
The CLI Credential Status counter also reports either Passed or Failed results, and uses tooltips to tell the user what
is going on in more detail.
CLI credentials failure messages are straightforward and can be tested by verifying login tuples or Enable passwords
from the credential sets defined in discovery configuration.
If you receive a CLI Credential Status value of Passed, the correct command-line admin login information is specified
in the discovery configuration.
For more information about checking and diagnosing discovery behavior for devices listed in the status table, see the
following topic Executing Discovery Diagnostics.
— Network View: If you have multiple network views, select the network view in which the IP address resides
from the drop-down list. If you have only one network view, which is the default view, the Network View
drop-down list is hidden by default. NIOS conducts a discovery diagnostic for the IP address in the selected
network view.
— Community String: Specify the community string for the device if the required SNMP credential is not
currently configured for the discovery member. It may not be necessary to enter a community string if the
device is already discovered by NIOS and is a managed device.
— Force Test: To force a diagnostic against the device, select Yes.
3. Click Start to start the discovery diagnostic. The lower pane displays the complete discovery sequence for the
chosen device, and whether or not the discovery is successful. You can click Stop at any time to end the
diagnostic sequence.
The output log of the diagnosis is displayed in the lower pane, and it shows the attempt for the complete discovery
process. You can click Select All to select the complete text in the lower pane for copying and pasting to the Clipboard
and a text editor. You can also monitor the test messages in this pane.
Note: An Unmanaged IP cannot be converted to Managed unless the network that contains it, is converted to
managed status. For more information, see Converting Unmanaged Networks under IPAM to Managed
Status on page 694.
Note: Adding Device Support Bundles, viewing and deleting them requires Superuser permissions.
Infoblox frequently provides support files for additional network devices that may not previously be supported by
discovery, and updates to support new operating system versions of existing devices. To add device support updates:
1. From the Grid tab, select the Device Support tab.
2. Expand the Toolbar and click Add.
3. Click Select and navigate to the file you want to upload.
4. Select the file, and then click Upload.
The Device Support table shows its installed library of files with the following data points:
• Name: The descriptive device name for the device support file.
• Version: The version of the currently active device support file.
• Author: The developer of the device support file.
• Type: The Type column lists two types of Device Support files: the System type indicates a support bundle that
is installed with the NIOS/Grid Manager system. The Downloaded type indicates device support bundles that
are installed by the administrator.
System bundles are read-only and cannot be removed or overwritten by administrators.
You may remove custom support bundles that you have installed on the Device Support Page. To do so, click the
Action icon for a chosen device and choose Delete from the popup menu.
Note: Port control involves two primary operations: network provisioning/de-provisioning and port configurations.
These operations are classified as port control tasks that can be monitored and viewed in the Task Manager
(Administration –> Workflow –> Task Manager).
Port control enables changes to the interface-level configurations of switches and switch-router devices, and
assignment of these resources to network objects defined and created within IPAM.
• Port configurations and network provisioning and de-provisioning use CLI admin credentials, supporting
SSH and Telnet. You may test credentials before use, against an IP address or a selected device;
• Port configuration consists of two primary operations: setting admin status for a port, and defining Data
VLAN and Voice VLAN assignments (where applicable), along with minor changes such as editing
descriptions;
• You can define port configuration blackout periods using the same methods provided for discovery
blackouts. These blackout periods also apply to network provisioning and de-provisioning tasks;
• Configuring a port on a device always creates a new port control task that can be viewed and managed in
the Task Manager.
• You can separately schedule port control tasks using the same method as for object creation.
• You can edit multiple interfaces at a time (see Editing Multiple Interfaces on page 717).
• You can edit interfaces, inline, from the Interfaces, IP Addresses and Assets pages in Grid Manager. These
operations generally consist of setting the interface to be Administratively Up or administratively Down, and
VLAN assignments (see Inline Interface Editing on page 719);
Network provisioning includes the following:
• If a user deletes a discovered network from the system, Grid Manager displays the list of interfaces on
which the network is currently provisioned;
• Network provisioning allows you to provision a network on one interface at a time. The network must be in
managed status under IPAM;
• The user can also de-provision a network, which removes it from one or more interfaces;
• You can perform network provisioning and de-provisioning tasks on routers and switch-routers.
Devices do not have to be in managed state for some port control operations (setting ports to Admin Up and Admin
Down, for example) but some port control operations require it:
• Provisioning a network (through IPAM) onto a port on a managed device;
• De-provisioning a network.
When you create a new object using the wizard, you can configure the port or ports that are associated with the
object’s port reservation. In this case, two new tasks are created: an object creation task, and a port control task,
which can be scheduled separately from the object creation. The port control task is a separate task that may also
require administrator approval. When you create a new task, an information feedback panel provides a link to the
port control task in the Task Manager.
You may also select and reschedule both tasks. For more information, see Rescheduling Tasks on page 92.
Note: If you edit an object, you can only edit an associated port reservation.
Objects are completed in their configuration by Grid Manager before executing a port configuration.
If, for example, a fixed address object is subject to administrative approval, no port control task takes place for that
object until the approval is executed and the object is created. This has implications for scheduling: if you schedule
the creation of a new host, IPv4 reservation or fixed address, and wish to schedule a port control task for the same
object, the scheduled object creation must take place first, and must complete, before the scheduled port
configuration executes.
All port configuration operations can be scheduled and subject to administrator approval. For more information, see
Configuring Approval Workflows on page 94.
• Grid members (including HA Pairs). For more information, see the following sections Defining Port
Reservations for an Infoblox Grid Member on page 726 and Defining Port Reservations for an HA Pair on
page 726.
• Hosts. For more information about defining hosts with included port configuration, see Adding Host
Records on page 579.
• IPv4 reservations. For more information, see Adding IPv4 Reservations on page 1131.
• Fixed addresses (IPv4 and IPv6). For more information, see Adding IPv4 Fixed Addresses on page 1126 and
Adding IPv6 Fixed Addresses on page 1171.
• IP networks (IPv4 and IPv6). For more information, see Adding IPv4 Networks on page 1111 and Adding
IPv6 Networks on page 1161.
Devices involved in these operations must be under managed status in Grid Manager. For more information, see
Converting Unmanaged Devices to Managed Devices on page 692.
Note: Voice VLAN settings are applicable only for Cisco devices.
To speed port configuration workflows, you can select one interface or multiple interfaces for a device to change the
admin status, description and VLAN settings. For example, this feature is handy if you want multiple interfaces to
participate in the same data VLAN. There are two ways to approach this feature: directly from the Devices page, or by
selecting a device on the Devices page, opening its Interfaces page and selecting ports from there.
Editing interfaces is done from the main Data Management –> Devices page.
1. From the Data Management tab, select the Devices tab.
2. Click the Action icon for a chosen device and choose Interfaces from the popup menu.
3. Select the check box for a specific interface, click the Action icon for the interface and choose Edit. The
interface editor appears as shown in Figure 15.12.
Figure 15.10 Interface Editor, with editable Admin Status and Description settings
4. The editable settings are Admin Status (Up or Down) and Description (click inside the field to edit). In some
cases, owing to device permissions, the device type or other device settings, you may not be able to edit these
values for the selected interface.
5. To edit VLANs for the chosen interface, click the VLAN tab. Figure 15.12 shows an example. VLAN editing also is
subject to permission limitations based on the device, and on the device type.
6. Choose a data VLAN to assign to the port from the Data VLAN drop-down menu.
7. If supported, choose a voice VLAN (Cisco only) from the Voice VLAN drop-down menu.
8. Click the Extensible Attributes tab to add any attributes that are necessary for the interface.
9. Click Save & Close to close the interface editor.
You can select one or more interfaces for configuration, define their settings in the dialog, and then select other
interfaces and define different settings for them.
Note: Once you change Admin Status, Data VLAN or Voice VLAN settings for any selected port, no automatic
eversion exists to the original settings from the same editing session. You must cancel out of the
Interfaces editor to reject any changes and begin with a new editing session from the Interfaces page.
Use the Verify button to verify your changes.
5. Select the check boxes for one or more ports and define the Port Configuration settings for the following:
a. Admin Status: Select Up or Down from the menu, depending on the current state of the port(s);
b. Description: Provide a brief description of the port configuration or other information;
c. Data VLAN: (Hidden if editing a VLAN is not supported) Drop-down list of all data VLANs actively configured
in the current device. One of the values can be chosen for the currently select interface(s);
d. Voice VLAN: (Hidden if editing a voice VLAN is not supported) Drop-down list of all voice VLANs actively
configured in the current device. One of the values can be chosen for the currently select interface(s).
6. After making configuration changes to all ports, click Verify to check over your changes:
8. If the port configuration changes are correct, click Save & Close or click the Scheduling icon at the top of the
editor. To schedule this task, click the Schedule icon at the top of the editor. In the Schedule Change panel, click
Later, and then specify a date, time, and time zone. The Schedule icon is green when there is a pending
scheduled task. You can reschedule the task if you have the applicable permissions.
When you complete the configuration, all port configurations in the session are combined into a single task by Grid
Manager.
Double-clicking a table row opens the editable fields for the selected record.
If editable fields are not present in the table display, you cannot change their values in the Interfaces page.
After making inline changes, click Save on the selected row to commit them. To prevent using any changes, click
Cancel. This also de-selects the row.
Note: When you make inline changes to an interface, a new task is created under Grid Manager,
which you can view in the Task Manager page (for more information, see Viewing Tasks
on page 82). A status icon appears next to the interface element you have changed,
indicating the status of the new task and providing a link to the Task Manager page. New
tasks appear with a status icon of Pending (||). When the new task completes, the icon
changes to a green checkmark.
Note: If a port control task requires administrative approval, and it is not approved before its scheduled execution,
the task appears as unsuccessful in Task Manager.
Provisioning networks also allows for provisioning VLANs. If devices do not support VLANs, options for provisioning
VLANs do not appear for those devices and their associated interfaces.
If a network is already provisioned for an interface, regardless of its status under Grid Manager, you cannot provision
another network upon it.
Only available interfaces that support network provisioning are shown in Grid Manager for provisioning tasks.
The horizontal toolbar also provides related functions:
Provision Network : Available for discovered devices and for managed devices, this icon opens the Provision
Network feature, allowing you to provision an existing IPAM network onto the selected device by selecting a device
interface or assigning a VLAN. Grid Manager creates a new Port Control task, and you can choose the interface on
which the network is provisioned, along with VLAN configuration and other settings.
De-provision Network : Available for networks that are managed under IPAM, for de-provisioning on devices that
are managed under IPAM on the Data Management –> Devices page. A dialog box appears summarizing the task you
are instructing Grid Manager to perform. This action changes the configuration of the device.
To provision IPAM networks onto a device:
1. From the Data Management tab, select the Devices tab.
2. Click the Next Page and Last Page icons to locate the device whose interfaces you want to provision.
3. Click the Name of the device. The Devices page displays the five tabs of information associated with the device.
4. Click the Networks tab.
5. The Networks page lists all discovered networks (highlighted in grey), unmanaged networks (highlighted in
yellow), and any managed networks (highlighted in white, showing Yes in the Managed column) present on the
selected device.
6. Open the vertical toolbar and click Provision Network. The Provision network wizard appears.
7. Click Select Network to choose the network the you want to provision. If only one managed network is available
on the device, that network value is populated after clicking the button.
If more than one managed network is available under IPAM, the Network Selector dialog opens, listing all
networks managed under IPAM.
8. Choose the network to provision onto the device and click OK.
9. Enter the Router IP Address. This required field may be pre-populated with the DHCP router IP address if the
device already has a DHCP configuration. If not, enter the gateway router IP address for the current device.
10. If necessary, check the DHCP Forwarding check box. Check this check box to enable DHCP forwarding for the
newly provisioned network. If a DHCP failover is already present, the IP addresses from that failover are used for
DHCP forwarding information.
11. For choosing the Interface, you can choose one out of two options:
a. Interface drop down list: If you are provisioning the network directly onto an interface, select it from this list.
Only interfaces that are available for provisioning on the chosen device appears on this list; interfaces that
are already active in a network do not appear;
–or–
b. For a switch-router, select Create VLAN, and specify the VLAN Name and its new VLAN ID. Ensure that the
VLAN ID is not one that is already provisioned on the device.
12. Click Next to go to the second step in the Provision Network wizard, in which you define whether to provision the
configuration now or to schedule it.
13. To immediately provision the new network on the chosen device, select Now.
a. You can choose to have Grid Manager create the network at a later time. To do so, select Later. Choose a
Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar date) and a
Start Time, and choose a Time Zone.
14. Click Save & Close when finished.
De-provisioning Networks
Note: De-provisioning a network changes the device configuration. As such, a separate task is created for the action
under Task Manager. However, you cannot schedule the de-provisioning of a network–once you confirm the
de-provisioning action in Grid Manager, the action takes place. Each managed and unmanaged device under
Grid Manager provides a Permissions page (Data Management –> Devices –> Select Device –> click Edit –>
Permissions tab). By default, no admin group or Role is assigned to managed devices. Infoblox recommends
using caution when assigning rights to users that may be able to access devices and change device
configurations.
De-provisioning networks is a relatively straightforward task that can be performed for any selected network, whether
it is a non-NIOS network (a network that cannot be configured in IPAM), an unmanaged network, or a managed
network.
Note: If the network is also managed under IPAM, de-provisioning the network from a device does not delete the
network from IPAM.
If you are deleting a network from the main IPAM page, any devices that have endpoints provisioned on that network
are also de-provisioned for that network.
Note: A network may not be de-provisioned until after you set the interface for the network on the device(s), to Down
in Admin Status.
Note: Ensure that the de-provisioning of the network has administrative approval.
You can also select multiple network entries from the list on the same device and de-provision all of them in a single
step. Exercise caution when performing such actions.
Note: Deleting a network under IPAM creates a new Object Change task in Task Manager. You can check the
Administration –> Workflow –> Task Manager page to view its status.
You can simply delete a managed or unmanaged network in IPAM to de-provision it. Doing so opens a Delete
Confirmation dialog. IPAM also automatically prompts you to verify that you are deleting the network from all devices
that have interfaces connecting to the network, subject to verification and permissions.
By default, when you delete the network, all devices that connect to the network, that are also managed by IPAM, are
part of the new de-provisioning port control task created by Grid Manager. If you do not want the network
de-provisioned from all devices, clear the De-provision network from all interfaces check box or simply cancel out
from the Delete Confirmation dialog.
Making a port reservation does not guarantee that the port is in fact available on the requested device. All interfaces
appearing in the Interface list are ports that are otherwise known to Network Insight as Operationally Down during its
last discovery task, and that are not already reserved by a port reservation.
1. Begin by checking the Reserve Port check box.
Note: Optionally, you can completely skip port reservation and port configuration by clicking Next.
2. Click the Device Name button to choose the device for which the port reservation is associated. You should know
the identity of the device to which the Infoblox appliance is connected before taking this step.
3. After choosing the device, choose the Interface with which the reservation is bound. The drop-down list shows
only interfaces that are most recently found to be available by Network Insight during the last discovery cycle.
This list does not include any ports that are Administratively Up and Operationally Up and are otherwise already
assigned to other networks or objects.
— The Wizard page also shows a list of any VLANs that are currently configured in the chosen device. This
Wizard page does not allow the definition of new VLANs for port configuration–only the assignment of an
existing VLAN in the device for port configuration.
4. Select the Configure Port check box to define specific port control settings for the port reservation.
Note: If you do not take this action when you create the object, you cannot perform the configuration later while
editing the object.
5. If the chosen device supports them, choose the Voice VLAN and/or the Data VLAN settings you may need for the
port assignment. You do not create new VLAN values in this step; you can select from VLANs that are provisioned
on the currently chosen device. All VLANs configured on the device and discovered by Network Insight during its
most recent discovery polling cycle appear in the drop-down lists.
6. Set the Admin Status to Up if you need to activate the port in the current task. Though the port reservation is
associated only with the current object, any port configuration creates a new Port Control task under Task
Manager.
7. Enter a Description for the port assignment. Infoblox recommends doing so to help other technicians to
recognize the port assignment event.
8. When finished, click Save and Close or select other tabs to change settings for the object.
Note: Once a switch port or other device port is reserved, Network Insight prevents further port reservations from
using the same port for another reservation.
See the following sections for examples on how to create IPAM objects with port reservations:
• Adding Host Records on page 579
• Configuring IPv4 Networks on page 1111
• Configuring IPv4 Fixed Addresses on page 1125
• Configuring IPv4 Reservations on page 1131
• Configuring IPv6 Networks on page 1160
• Configuring IPv6 Fixed Addresses on page 1171
• Adding Grid Members on page 297
• Defining Port Reservations for an Infoblox Grid Member on page 726
Unlike creating an object, editing an existing object’s port reservation does not permit configuring the selected port.
(You can edit the port from the device’s Interfaces page, including inline editing.) Physical interfaces with an
Operational Status of Down appear in the Interface drop-down list. Ports that are already active, that are reserved
through a port reservation, or that are administratively Up/Operationally Up do not appear in the Interface drop-down
list.
For object editing, you can select interfaces but you cannot edit their settings, such as setting the Admin Status to Up
or choosing the Data VLAN or Voice VLAN.
Port reservation editable settings are as follows:
• Reserve Port–Enables the port reservation task for the new object;
• Device Name–Shows the name of the chosen devices, which must be selected by clicking Select Device and
using the Device Selector window (for information, see Using the Device Selector on page 689);
• Interface–Drop-down menu listing for all interfaces on the selected device.
The Following VLANs Are Configured–A read-only panel that shows the VLANs, if any, that are configured on the
currently selected Interface setting.
Port configuration and VLAN settings cannot be performed when editing objects–you are limited to selecting a
different port (from the same device or from a different device) to be bound to the current object.
Note: Editing Grid members does not allow for port configuration when you create or change a port reservation. For
Grid member editing, you can select interfaces but you cannot edit them, such as setting the Admin Status to
Up or choosing the Data VLAN or Voice VLAN. This section applies only to creating and defining port
reservations and configurations for new Grid members. For the complete Grid member creation procedure, see
Adding Grid Members on page 297.
You can configure port reservations for a Grid member, including HA members, in the Add Grid Member wizard. All
interfaces on a member (LAN1, LAN2, HA and MGMT) may have independently defined port reservations. For Grid
members, port reservations are not subject to scheduling and workflow approval, and Grid Manager executes them
immediately.
6. Begin by clicking the check box for the Node 1 -> LAN1 appliance port. (You do not perform port reservation for
the VIP port.)
a. Select the Reserve Port check box. The Node1 -> LAN1 port listing changes to read Pending.
b. Click Select Device to choose the device (switch or switch-router) that is Node 1 of the HA Pair. (For
information, see Using the Device Selector on page 689.)
c. After selecting the device, click OK.
d. Choose the device port for Node 1’s LAN1 port by choosing it from the Interface menu.
The panel The Following VLANs are configured refreshes to show any VLANs that are currently provisioned
on the selected port.
e. (This step is optional.) Select the Configure Port check box.
f. (This step is optional.) If the Data VLAN setting is enabled, select the VLAN from the Data VLAN menu.
g. (This step is optional.) Choose an Admin Status of Up.
h. (This step is optional.) Enter a Description.
i. For the Node 1 –> HA port, follow steps 6a through 6h for that appliance port. Ensure you select the same
switch and Data VLAN settings.
j. For the Node 1 –> MGMT port, follow steps 6a through 6h for that appliance port. Ensure you select the
same switch and Data VLAN settings.
7. For the second appliance Node 2, follow steps 6a through 6j above.
8. Click Next when finished with the Reserve Port and optional Configure Port settings for all interfaces. The result
appears similar to the example shown in Figure 15.21.
9. In the final step of the Add Grid Member Wizard, if you have defined port configuration, a final wizard step shows
that the port configuration (which is a Port Control task) executes Now, without allowing a scheduling of the task.
Port reservation for the HA Pair is not scheduled and also takes effect automatically as a part of the new Grid
member configuration. (Grid Manager creates the Grid member immediately after you click Save & Close.)
10. After you click Save & Close to create the new HA pair Grid member, thus closing the Add Grid Member wizard,
opening the editor for the HA member and clicking the Port Reservations tab displays the LAN2 port along with
the previous port settings:
Figure 15.22 Completing the HA Pair Port Reservations with the LAN2 Ports
11. Select the LAN2 port for each node and follow steps 6a through 6h above. If VLANs are provisioned on the
selected port, you can also select them.
12. Click Save & Close.
Note: When editing Grid members and HA Grid members, Grid Manager does not allow changes to VLAN settings,
Admin Status or port description in the editor. You can change these values in the Interfaces table by
double-clicking the table row for the interface you want to edit.
Figure 15.24 Device Information Settings for IPAM Objects in the Wizard
Note: If you define Device Information and Device Vendor settings for a port reservation, which are optional, and
choose to discover the object to which the port reservation is associated, you may see a conflict if discovery
of the object finds that the device for the port reservation is a different type or different vendor. For example,
if the specified information states that the device is a switch, and the discovered device is a router, Network
Insight reports a conflict. Another example: you declare the vendor to be Aruba, and the discovered value is
Cisco. For information on resolving such conflicts, see Resolving Port Reservation Conflicts on page 737.
Note: You can separately define blackout periods for discovery, and for port configuration. This section describes
how to use the blackout feature for discovery. For more information on blackouts for port configuration tasks,
consult the section Defining Port Configuration Blackout Periods on page 733.
Discovery protocols can occupy significant resources within the network when discovery is taking place. While you
can schedule any discovery or port control task for any single time period or recurring time period, you can also
establish time periods when Network Insight does not talk to devices or networks for discovery.
You can define blackout settings at two levels in Grid Manager:
• Under Grid Discovery Properties, applying across the entire Grid;
— All networks managed by the Grid inherit discovery blackout settings by default;
• For individual networks under IPAM and under DHCP.
— A network must be Managed before you can edit its discovery blackout settings.
— Under IPAM, you can define discovery blackout settings for Network Containers and for networks (for
DHCP, you can also set blackouts for DHCP Ranges);
— If a network is in Managed state, it can be edited under IPAM or under DHCP for discovery settings and
discovery blackout settings.
Discovery tasks may already be running when a blackout period takes effect. Current tasks are not interrupted and
will complete within their time. Network Insight does not activate new discovery tasks during the blackout period,
however.
— Schedule the day of the month: A discovery blackout can be executed monthly on a specific day, or
instances can be executed more than one month apart on a specific day, in the Day__every__month(s)
field.
— Enter a time in the hh:mm:ss AM/PM format. You can choose a time from the drop-down list.
— Choose the Time Zone.
— Specify the Duration: 1 or more Minutes, Hours or Days.
5. If necessary, select the Enable Port Configuration Blackout check box and click the Scheduling icon to open the
scheduling window. For more information, see Defining Port Configuration Blackout Periods on page 733.
6. Follow Steps 5a–5e to schedule the port configuration blackout for the Infoblox Grid. (For related information,
see Defining Port Configuration Blackouts for the Grid on page 733.)
–or–
a. Select the Use Discovery Blackout Schedule check box to apply the discovery blackout schedule to port
configurations.
7. When you have finished configuring schedules for blackout periods, click Save & Close.
When a scheduled Grid-level blackout period goes into effect, no operations related to discovery take place for the
specified time period across the Infoblox Grid. Any discovery tasks already in progress will run to completion but no
new ones will start.
b. Click the Schedule icon below. The Blackout Scheduler dialog opens.
5. Select how often you want to execute the blackout period. You can select Once, Daily, Weekly, or Monthly.
a. If you select Once, enter the day in the date picker and select a month from the drop-down list.
1. Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
2. Choose the Time Zone.
3. Specify the Duration: 1 or more Minutes, Hours or Days.
b. When you select Daily, click either Every Day or Every Weekday.
1. Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
2. Choose the Time Zone.
3. Specify the Duration: 1 or more Minutes, Hours or Days.
c. When you select Weekly, complete the following:
1. Schedule every week on: Select the check box for any day of the week.
2. Time: Enter a time in the hh:mm:ss AM/PM format. You can also click the clock icon and select a
time from the drop-down list.
3. Choose the Time Zone.
4. Specify the Duration: 1 or more Minutes, Hours or Days.
d. When you select Monthly, complete the following:
1. Schedule the day of the month: A Discovery can be executed monthly on a specific day, or
instances can be executed more than one month apart on a specific day, in the Day__every-
__month(s) field.
2. Time: Enter a time in the hh:mm:ss AM/PM format. You can also click the clock icon and select a
time from the drop-down list.
3. Choose the Time Zone.
e. Specify the Duration: 1 or more Minutes, Hours or Days.
6. Click OK to commit the port configuration blackout schedule.
7. To commit settings, click Save & Close.
— Under IPAM, the network must be in managed status (a value of Yes appears in the Managed field, and the
table row is highlighted in white).
— Under DHCP, all networks appearing on this page may be selected for this purpose.
3. Click the Discovery Blackout tab. The editor page appears as shown in Figure 15.26.
Figure 15.26 The Discovery Blackout tab with enabled Port Configuration Blackouts
Note: Ensure that you correctly specify AM or PM when entering the start time.
b. When you select Daily, click either Every Day or Every Weekday.
1. Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
2. Choose the Time Zone.
3. Specify the Duration: 1 or more Minutes, Hours or Days.
c. When you select Weekly, complete the following:
1. Schedule every week on: Select the check box for any day of the week.
2. Time: Enter a time in the hh:mm:ss AM/PM format. You can also click the clock icon and select a
time from the drop-down list.
3. Choose the Time Zone.
4. Specify the Duration: 1 or more Minutes, Hours or Days.
d. When you select Monthly, complete the following:
1. Schedule the day of the month: A Discovery can be executed monthly on a specific day, or
instances can be executed more than one month apart on a specific day, in the Day__every-
__month(s) field.
2. Time: Enter a time in the hh:mm:ss AM/PM format. You can also click the clock icon and select a
time from the drop-down list.
3. Choose the Time Zone.
e. Specify the Duration: 1 or more Minutes, Hours or Days.
7. Click OK to commit the port configuration blackout schedule for the network.
8. To commit settings, click Save & Close.
You can sometimes encounter conflicts when defining port reservations for IPAM-managed objects such as Fixed IP
addresses or host records. The quickest way to locate any conflicts in Grid Manager is to open the Conflicts Smart
Folder as noted in Figure 15.27.
Numerous types of conflicts are possible:
• Device Information conflict;
• Port Reservation conflict, including Used Port Reservation conflicts (usually resulting from a request to
reserve a port that has already been assigned to another IPAM object);
• Fixed address conflict;
• IP Address conflicts;
• DHCP Range conflicts (such as: Discovered address is within an existing DHCP range but does not match an
existing lease, fixed address, or exclusion range);
• MAC Address conflict (such as: Discovered MAC Address conflicts with existing fixed address).
The Conflict Resolution wizard automatically recognizes the object associated with the conflict (which is listed in the
Related Objects pane as noted in Figure 15.27) and ensures that changes you make during resolution are applied
correctly to the object. An example appears in Figure 15.28.
Note: In the Grid Discovery Properties –> Advanced tab, the Ignore Conflict Duration setting governs the default
time duration to ignore (clear) certain types of conflicts that may occur when defining IPAM objects that
are associated with discovered and managed devices, interfaces, or IP addresses. Increments can be
defined in Hours or Days. For more information, see Defining Seed Routers for Probe Members on page
684.
Note: For other conflict examples, see Resolving Multiple Conflicts on page 738.
Another category of conflicts involves incorrectly defined device information for the object:
• The reserved Device Type information provided is different from the discovered vendor and device type
(Router vs. Switch, for example);
• The defined Device Vendor information does not match with the discovered information.
• A User Port Reservation conflict occurs when an unmanaged IP address attempts to use a port that is
already reserved by an IPAM object on a different IP address.
You can choose from the following options:
— Change configured information to discovered information.
— Keep the current device configuration and clear the conflict for the next 1 day(s).
In virtually all cases, replacing the configured information with the discovered information successfully clears the
conflict; click OK to commit changes or to temporarily clear the conflict.
5. Select the conflict that you want to resolve first and click Next. For example, consider choosing to resolve the MAC
Address conflict as shown in Figure 15.29. The second step of the wizard appears, listing the differences
between the Existing and Discovered information for the conflict as shown in Figure 15.30:
a. In this case, the MAC address specified in the last fixed address object configuration, for that object,
conflicts with the discovered MAC address associated with the IP. (You can verify this by checking the
Related Objects tab in the IPAM page for the IP address.) Choose from one out of two options:
— Change the configured MAC address to be the same as the discovered MAC address;
— Keep fixed address and ignore this conflict for the next 1 day(s).
In this example, the Discovered information for the MAC address associated with the Fixed Address object is
one digit off from the Existing MAC information, which was entered incorrectly by the administrator. The
DIscovered MAC, shown in red, is the correct value and should be used to overwrite the record for the conflict.
6. Select the Update... with discovered data option and click Resolve.
The wizard updates with a return to the first step, in which you select the next conflict to resolve. A banner
shows the result of the first resolution.
7. Select the next conflict to resolve and click Next. As an example, Figure 15.31 shows a device configuration
conflict.
a. To resolve the conflict, the Configured information must be overwritten with the Discovered information:
— Change configured device type and vendor to be the same as the discovered device type and vendor;
— Keep current device configuration and clear the conflict for the next 1 day(s).
Other conflict types have similar language.
8. Select from the above choices and click Resolve.
9. Continue through the wizard to resolve the last conflict associated with the IP address.
Note: In the Polling tab –> Advanced page of the Grid Discovery Properties editor, the Ignore Conflict Duration setting
governs the default time duration to ignore (clear) certain types of conflicts that may occur when defining IPAM
objects that are associated with discovered and managed devices, interfaces, or IP addresses. Increments can
be defined in Hours or Days. This setting cannot be modified when resolving conflicts.
Do you want to
configure Grid DNS
properties?
Yes
No
Do you want to
Configure Grid DNS properties.
configure member DNS
properties?
Yes
No Configure member DNS
properties.
Begin the configuration of DNS zones and resource records.
No Yes
Decide on the type of
zones to configure.
Specify the IP address - Choose the primary member Specify the IP address Specify the IP address of
of the server(s) to or specify the external primary. and FQDN of the the master server, and
which queries are
-.Choose Grid secondaries or authoritative name server select the Grid member
forwarded, and select
specify external secondaries. for the zone. that hosts the zone.
the Grid member that
hosts the zone.
Yes
Do you want to add
more zones?
No
Start DNS service on the
member
Based on the information provided, you can then decide whether to override or keep the inherited values. You must
have read/write permissions to the DNS resources to override inherited values. You can only view inherited values
and paths if you have at least read-only permissions.
In the example in Figure 16.1, the DNS zone is served by members with different query settings.
The Multiple Inheritance Viewer indicates that the two servers have different query ACLs, as shown in Figure 16.2.
You can then view the Query properties of each member and edit them, or override the setting and specify values that
apply to the zone only.
Address Structures
IPv4 uses a 32-bit, 4-octet (each octet separated by decimals) addressing structure to designate sources and
destinations within a network. Since there are 32 bits that make up the address, IPv4 can support up to 4 billion
unique addresses.
An IPv6 address is a 128-bit number in colon hexadecimal notation. It consists of eight groups of four hexadecimal
digits separated by colons (example: 12ab:0000:0000:0123:4567:89ab:0000:cdef). Since there are 128 bits that
make up the address, IPv6 can support up to 3.4x1038 unique addresses. The increase in the number of unique IPv6
addresses is one of the biggest advantages of an IPv6 implementation.
— Select Standalone Member to configure a single member or select High Availability Pair to configure an HA
member.
For an HA member, enter the Virtual Router ID number and if the HA member is configured in dual mode,
select IPv6 in the Send HA and Grid Communication Over field.
— Required Ports and Addresses: This table lists the network interfaces based on the type of network
connectivity of the Grid member.
For IPv6 Grid member, specify the network information for LAN1(IPv6) interface. For a dual mode Grid
member, specify the network information for both LAN1(IPv4) and LAN1(IPv6) interfaces.
For IPv6 HA member, specify the network information for VIP (IPv6), Node1 LAN1(IPv6), and Node2
LAN1(IPv6) ports. For a dual mode HA member, specify the network information for the following interfaces:
VIP (IPv4), Node1 LAN1(IPv4), Node2 LAN1(IPv4), VIP (IPv6), Node1 LAN1(IPv6), and Node2 LAN1(IPv6).
Enter correct information for the following by clicking the field:
— Interface: Displays the name of the interface. You cannot modify this.
— Address: You can enter IPv4 or IPv6 address depending on the type of interface. An IPv6 address is a
128-bit number in colon hexadecimal notation. It consists of eight 16-bit groups of hexadecimal digits
separated by colons (example: 2001:db8:0000:0123:4567:89ab:0000:cdef or
2001:db8::123:4567:89ab:0:cdef).
— Subnet Mask (IPv4) or Prefix Length (IPv6): Enter an appropriate subnet mask for IPv4 address and
prefix length for IPv6 address. The prefix length ranges from 2 to 127.
— Gateway: Type the default gateway for the interface. For IPv6 interface, you can also type Automatic to
enable the appliance to acquire the IPv6 address of the default gateway and the link MTU from router
advertisements.
— VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure that you
configure the corresponding switch accordingly.
— Port Settings: From the drop-down list, choose the connection speed that you want the port to use. You
can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission or Half
for data transmission in one direction at a time. Select Automatic to instruct the NIOS appliance to
negotiate the optimum port connection type (full or half duplex) and speed with the connecting switch
automatically. This is the default setting. You cannot configure port settings for vNIOS appliances.
— DSCP Value: Displays the Grid DSCP value, if configured. To modify, click Override and enter the DSCP
value. You can enter a value from 0 to 63. For information about DSCP, see Implementing Quality of
Service Using DSCP on page 447.
5. Save the configuration and click Restart if it appears at the top of the screen.
You can specify global TTL settings at the Grid level, for individual zones, or resource records. When you configure TTL
settings for auto-generated records, the following conditions apply:
• NS records that are auto-generated for delegated name servers use TTL settings from their delegated zones.
• Auto-generated glue A and AAAA records use TTL settings from a delegated zone if the name of the name server
is below the delegation point and does not belong to an authoritative child zone.
• All other auto-generated NS, A, and AAAA records continue to use TTL settings from their parent zones.
• Auto-generated PTR records do not inherit TTL settings from delegated zones. They use TTL settings from their
parent zones.
When you have an RRSET (resource record set) that contains different TTL settings for each record, Grid Manager
displays the actual TTL values for these records. However, in DNS responses, the appliance takes the least of the
values and returns that as the TTL setting for all resource records in the RRset.
For recursive DNS severs, you can specify the maximum cache TTL value that establishes the time limit for the name
server to cache positive responses. You can also specify the maximum negative cache TTL value that specifies the
time limit for the name server to cache negative responses. For information about how to configure these settings,
see Specifying Max Cache TTL and Max Negative Cache TTL Settings on page 755.
Specifying Max Cache TTL and Max Negative Cache TTL Settings
You can specify the maximum duration of time for which your name server caches positive responses using the Max
Cache TTL settings. The Max Cache TTL indicates the time limit for which the name server retains records in the cache.
When the Max Cache TTL for a record expires, the name server deletes the record from the cache.
You can also specify the maximum duration of time for which your name server caches negative responses through
the Max Negative Cache TTL settings. The Max Negative Cache TTL sets the time limit for which the name server retains
negative responses (NXDOMAIN/NXRRSET responses) in the cache. The name server deletes a negative response
from the cache when the Max Negative Cache TTL period for the entry expires.
You can define the Max Cache TTL value and the Max Negative Cache TTL value at the Grid DNS, Member DNS, and
DNS view levels.
To specify the Max Cache TTL and the Max Negative Cache TTL:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view check box ->
Edit icon.
2. In the Grid DNS Properties, Member DNS Properties, or the DNS View editor, click Toggle Advanced Mode if the
editor is in the basic mode.
3. Click the Advanced subtab of the General tab and then complete the following:
— Max Cache TTL: Specify the maximum duration of time for which the name server caches positive
responses. Select the time period in minutes, hours, or days from the drop-down list. The default value is
one week (7 days), and the maximum value is 49710 days, 1193046 hours, or 71582788 minutes. The
appliance displays an error message when you enter a value greater than the maximum value. Note that
setting the Max Cache TTL value to 0 (zero) will disable the name server from caching any data, and it is not
recommended.
— Max Negative Cache TTL: Specify the maximum duration of time for which the name server caches negative
responses. Select the time period in minutes, hours, or days from the drop-down list. The default value is
three hours, and the maximum value is 7 days, 168 hours, or 10080 minutes. The appliance displays an
error message when you enter a value greater than the maximum value. Note that setting the Max Negative
Cache TTL value to 0 (zero) will disable the name server from caching negative responses, and it is not
recommended.
The Max Cache TTL value and the Max Negative Cache TTL value are inherited from the Grid at the member
and DNS view levels. To override the inherited values, click Override and specify the new value. To retain
the Grid values, click Inherit.
4. Save the configuration and click Restart if it appears at the top of the screen.
— Server-id directive: Select either Hostname or None from the drop-down list. The default is None. If you
select Hostname, the appliance returns the hostname of the DNS name server that is currently answering
queries, when a client queries to identify the server ID of the name server that is answering queries.
Selecting None disables the Server-id directive option.
In the Member DNS Properties editor, you can also select User defined and specify a value of your choice.
The appliance returns the specified value when a client queries to identify the server ID of the DNS name
server that is answering queries.
To override an inherited setting from the Grid, click Override. To retain the same setting as the Grid, click
Inherit.
4. Save the configuration and click Restart if it appears at the top of the screen.
WARNING: The DNS Health Check monitor might not work properly if DNS blackhole feature is enabled or if
any named ACL is blocking the query sent to loopback interface.
2. In the General -> Basic tab of the Grid DNS Properties editor, enter the email address in the E-mail Address (for
SOA RNAME field) field.
Note: The appliance does not support IDN for the E-mail Address (for SOA RNAME field) field at the Grid level.
You can add an email address containing IDN for the SOA records at the zone level.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: The appliance supports IDN for the host name of the Email address (for SOA RNAME field) field. For example,
you can create admin@инфоблокс.рф but not админ@инфоблокс.рф.com.
1. Grid: From the Data Management tab -> DNS tab, expand the Toolbar, and then click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab -> Zones tab -> dns_view check box -> Edit icon.
2. In the editor, select the RRset Order tab -> click the Basic tab, and then complete the following:
— Enable fixed RRset order for following FQDNs: Select this check box to preserve the configuration of RRset
order for cached DNS responses.
— In the FQDN table, specify the list of FQDN entries for which you want to preserve the RRset order. Note that
you can configure a maximum of 25 FQDNs for the specified RRset order.
You can click the Add icon and complete the following to add a new entry to the list:
— FQDN: Enter the fully qualified domain name with which the A or AAAA record is associated.
Note: For Infoblox-4030, if you enter a wildcard character as part of the domain name, the appliance considers
the wildcard character as a literal character. For example, if you enter test*.com, the appliance matches
the domain name with test*.com only.
— Record Type: Select the record type from the drop-down list. You can select A, AAAA, or Both A and
AAAA.
3. Save the configuration and click Restart if it appears at the top of the screen.
— Listen on these additional IP addresses: Click the Add icon to add an anycast or non-anycast address you
configure on the loopback interface. You must add all IP addresses you configure on the loopback interface
so the appliance can provide DNS services on them. Adding source ports for listening supports both IPv4
and IPv6 interfaces. For information about adding IP addresses on the loopback interface, see Using the
Loopback Interface on page 1032.
— DTC health check source: Select a value from the drop-down list: VIP, MGMT, LAN2, ANY, IP. The appliance
displays VIP by default. For more information, see Viewing DNS Traffic Control Objects on page 1026.
— IP Address: This is displayed only when you select IP from the drop-down list. Specify the IP address of
the source.
— Send queries from: If you want to improve the DNS service performance, you can separate the DNS queries
from the notify messages and zone transfer requests. Select a value from the drop-down list to select an
interface name: VIP, MGMT, LAN2, ANY, IP. The appliance displays VIP by default.
— IP Address: This is displayed only when you select IP from the drop-down list. Specify the IP address of
the source.
— Send notify messages and zone transfer requests from: From the drop-down list, select the source port of
the notify messages and zone transfer requests that the Grid member sends. Select a value from the
drop-down list to select an interface name: VIP, MGMT, LAN2, ANY, IP. The appliance displays VIP by default.
You can only select a physical interface, you cannot select IP addresses on the loopback interface.
— IP Address: This is displayed only when you select IP from the drop-down list. Specify the IP address of
the source.
— Notify Delay: Specify the number of seconds that the Grid secondary servers delays sending notification
messages to the external secondaries. The default is five seconds.
5. Save the configuration and click Restart if it appears at the top of the screen.
EDNS0 is enabled on the NIOS appliance by default, which means all outgoing recursive queries are set to have a
maximum UDP packet size of 4096 bytes. Typically, when the appliance receives a DNS request that contains an OPT
RR, it assumes the DNS client supports EDNS0 and thus scales its response accordingly. When the appliance is used
as a forwarder or a resolver for recursive queries and communicates with a client that does not support EDNSO, the
appliance sends three queries starting with one that contains EDNS0 and DNSSEC support messages and is set to a
maximum UDP packet size of 4096 bytes. When the first query fails, the appliance sends another query that contains
only the EDNS0 support message. If the second attempt fails too, the appliance sends a third query that indicates a
standard 512-byte query. Note that when EDNS0 is not used, DNS packets may be sent over TCP. For DNS service to
function properly at this stage, ensure that you configure your firewall accordingly.
The following information demonstrates how the appliance responds when EDNS0 is enabled by default and the end
server does not support EDNS0:
Packet 0954: 08:19:38.925 - query for www.google.com from Infoblox to forwarder (with
EDNS0 support by setting the Extended Label Type to ‘01’ and DNSSEC OK bit to ‘1’)
Packet 1138: 08:19:47.927 - query for www.google.com from Infoblox to forwarder (with
EDNS0 support by setting the Extended Label Type to ‘01’ and DNSSEC OK bit to ‘0’)
Packet 1504: 08:19:58.929 - query for www.google.com from Infoblox to forwarder (without
EDNS0 and DNSSEC support by sending a standard 512-byte query)
Packet 1505: 08:19:30:960 - query response for www.google.com from forwarder to Infoblox
To ensure that end servers that do not support EDNS0 can respond to recursive queries from the NIOS appliance and
to improve DNS performance, you can disable EDNS0 for the Grid and override the Grid settings for individual
members. Note that you cannot configure the maximum UDP packet size, which is set for 4096 bytes by default. When
you disable EDNS0, the appliance does not include OPT RRs for all outgoing recursive DNS queries. Thus remote end
servers that do not support EDNS0 can still respond to the queries. This feature is useful when your NIOS appliance
is used as a forwarder or a resolver for recursive queries, and the end servers in the configuration do not support
EDNS0.
WARNING: When you disable EDNS0, all outgoing DNSSEC queries to zones within trusted anchors will fail
even if DNSSEC validation is enabled. This is due to the restriction of the UDP packet length when
you disable EDNS0. For information about DNSSEC, see About DNSSEC on page 965.
To disable EDNS0:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
2. In the Grid DNS Properties or Member DNS Properties editor, click the General tab -> Advanced tab, and complete
the following:
— Disable EDNS0: This check box is deselected and EDNS0 is enabled by default. To override the value
inherited from the Grid, click Override. To retain the same value as the Grid, click Inherit. Select this check
box to disable EDNS0. When you disable EDNS0, the appliance does not include OPT RRs for all outgoing
recursive DNS queries and all outgoing DNSSEC queries to zones within trusted anchors will fail even if
DNSSEC validation is enabled.
3. Save the configuration and click Restart if it appears at the top of the screen.
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
2. In the Grid DNS Properties , click the General tab -> Advanced tab, and complete the following:
— Enable PTR record removal for A/AAAA records: This check box is deselected by default. When you select
this check box, the appliance displays the Delete Confirmation dialog box to confirm that you want to delete
a PTR record associated with the A or AAAA record that is being deleted. For information about deleting an A
or AAAA record, see Modifying, Disabling, and Deleting Host and Resource Records on page 899.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: The entire name server recursive cache is cleared, if you do not specify a DNS view when you clear cache
using Clear View’s Cache and Clear Domain Name features on the NIOS appliance.
Sample Output
include "/infoblox/var/named_conf/tsig.key";
options {
zone-statistics yes;
directory "/infoblox/var/named_conf";
version none;
hostname none;
recursion yes;
listen-on { 127.0.0.1; 10.34.1.18; };
query-source address 10.34.1.18 port *;
notify-source 10.34.1.18 port *;
transfer-source 10.34.1.18;
minimal-responses yes;
max-cache-size 536870912;
infoblox-top-query yes;
infoblox-top-query-log-interval 60;
infoblox-top-query-client 500;
infoblox-top-query-name 500;
infoblox-top-query-rr-type 500;
infoblox-top-query-nxdomain 500;
infoblox-top-query-servfail 500;
infoblox-top-query-rpz 99;
infoblox-top-query-rpz-items-per-client 100;
lame-ttl 600;
# for service restart: allow_bulkhost_ddns = Refusal
allow-transfer { any; };
forwarders { 10.32.0.177; };
avoid-v4-udp-ports { 2114; 2113; 2115; 8000; 8089; 9997; 2222; 7911; 7912; 8000; 8089; 9997;
8080; 9000; 9999; 9004; 2022; 3374; 3115; 1194; };
transfer-format many-answers;
};
include "/infoblox/var/named_conf/dhcp_updater.key";
include "/infoblox/var/named_conf/rndc.key";
controls {
inet 127.0.0.1 port 953
allow { 127.0.0.1; } keys { "rndc-key"; };
};
logging {
channel ib_syslog {
syslog daemon;
severity info;
};
category default { ib_syslog; };
category rpz { null; };
};
Sample Output
;; Start view _default
;;; Cache dump of view '_default' (cache _default)
;$DATE 20121018180555
; authanswer
a.test.com.23876IN A4.4.4.4
;; Address database dump
;; Dump complete
Viewing Statistics
The View Statistics feature enables you to view DNS Statistics of a Grid member. You can view statistics through a
browser.
To view statistics:
1. From the Data Management tab, select the DNS tab -> click the Members tab.
2. Expand the Toolbar, click View -> View Cache.
You can view statistics in the DNS Statistics for Member dialog box.
Using Forwarders
A forwarder is essentially a name server to which all other name servers first send queries that they cannot resolve
locally. The forwarder then sends these queries to DNS servers that are external to the network, avoiding the need for
the other name servers in your network to send queries off-site. A forwarder eventually builds up a cache of
information, which it uses to resolve queries. This reduces Internet traffic over the network and decreases the
response time to DNS clients. This is useful in organizations that need to minimize off-site traffic, such as a remote
office with a slow connection to a company’s network.
You can select any Grid member to function as a forwarder. You must configure your firewall to allow that Grid member
to communicate with external DNS servers. You can also configure the NIOS appliance to send queries to one or more
forwarders.
You can define a list of forwarders for the entire Grid, for each Grid member, or for each DNS view.
Specifying Forwarders
To configure forwarders for a Grid, member, or DNS view:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab -> Zones tab -> dns_view check box -> Edit icon.
Note that if there is only one DNS view— for example, the predefined default view—you can just click the Edit
icon beside it.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. Click the Forwarders tab.
3. Click the Add icon.
4. Enter an IP address in the text field. The field supports entry for both IPv4 and IPv6 values.
— To remove a forwarder, select the IP address from the Forwarders list, and then click the Delete icon.
— To move a forwarder up or down on the list, select it and click the Up or Down arrow.
5. To use only forwarders on your network (and not root servers), select the Use Forwarders Only check box.
6. Save the configuration and click Restart if it appears at the top of the screen.
Specifying Queries
To configure a list of allowed queriers for the Grid or for a member:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click Toggle Advanced Mode, select the Queries tab.
3. In the Allow queries from section, select one of the following:
— None: Select this if you do not want to configure access control for DNS queries. The appliance allows
queries from all clients. This is selected by default.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission to send and receive DNS queries. You can click Clear to remove the selected
named ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows:
— IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the Value field
and enter the IP address of the remote querier. The Permission column displays Allow by default. You
can change it to Deny by clicking the field and selecting Deny from the drop-down list.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
— TSIG Key: In the Add TSIG Key panel, complete the following, and then click Add to add the TSIG key to
the list:
• Key name: Enter a meaningful name for the key, such as a zone name or the name of the remote
name server. This name must match the name of the same TSIG key on other name servers.
• Key Algorithm: Select either HMAC-MD5 or HMAC-SHA256.
• Key Data: To use an existing TSIG key, type or paste the key in the Key Data field. Alternatively, you
can select the key algorithm, select the key length from the Generate Key Data drop down list, and
then click Generate Key Data to create a new key.
— Any Address/Network: Select to allow or deny queries from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE or multiple ACEs and click the Delete icon to delete the entries.
4. Save the configuration.
Enabling Recursion
To enable recursion and create a list of recursive queriers:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member check box -> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click Toggle Advanced Mode, select the Queries tab.
3. Click Allow recursion, and then in the Allow recursive queries from section, select one of the following:
— None: Select this if you do not want to configure access control for recursive queries. When you select
None, the appliance allows recursive queries from all clients. This is selected by default.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission to send and receive recursive DNS queries. You can click Clear to remove the
selected named ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows.
— IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the Value field
and enter the IP address of the remote querier. The Permission column displays Allow by default. You
can change it to Deny by clicking the field and selecting Deny from the drop-down list.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
— TSIG Key: In the Add TSIG Key panel, complete the following, and then click Add to add the TSIG key to
the list:
• Key name: Enter a meaningful name for the key, such as a zone name or the name of the remote
name server. This name must match the name of the same TSIG key on other name servers.
• Key Algorithm: Select either HMAC-MD5 or HMAC-SHA256.
• Key Data: To use an existing TSIG key, type or paste the key in the Key Data field. Alternatively, you
can select the key algorithm, select the key length from the Generate Key Data drop down list, and
then click Generate Key Data to create a new key.
— Any Address/Network: Select to allow or deny queries from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Save the configuration.
Note: An AAAA record is filtered only when there is also an A record for the same domain name. In this case, the
appliance still sends a response, but without any AAAA or A record in it. When a client queries for an AAAA
record and there is no corresponding A record for it, the appliance returns the AAAA record even if you have
enabled AAAA filtering for this client.
Note: Be aware that when you select this option, DNSSEC configuration will no longer be in effect.
— No: Select this to disable AAAA filtering for queries over IPv4. When you select this, the appliance returns
AAAA records in response to all DNS queries issued over IPv4. This is selected by default.
— Yes: Select this to enable AAAA filtering for queries over IPv4. When you select this, the appliance removes
AAAA records in response to all DNS queries issued over IPv4, except for DNSSEC-signed requests.
3. In the AAAA Filtering section, select one of the following:
— None: Select this if you do not want to configure access control for AAAA filtering. The appliance allows all
clients to issue DNS queries over IPv4 when they do not have the ability to use IPv6 addresses. This is
selected by default.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission can filter AAAA responses. You can click Clear to remove the selected named
ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows.
— IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IP address of the
client. The Permission column displays Allow by default. You can change it to Deny by clicking the field
and selecting Deny from the drop-down list. When you select Allow, the appliance applies AAAA
filtering and removes AAAA records in response to queries sent by the specified IPv4 address. When
you select Deny, the appliance does not apply AAAA filtering and thus returns AAAA records.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— Any Address/Network: Select to allow or deny AAAA filtering from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
Note: Note that if you do not enter any addresses or networks in the table, the appliance applies AAAA filtering
to all IPv4 clients. In other words, the appliance removes AAAA records in responses to all queries sent
over IPv4.
Examples
The following example illustrates how the appliance applies NXDOMAIN rulesets.
Ruleset 1:
Pattern Action
a1.corp100.com PASS
*.corp100.com REDIRECT
• If the DNS member receives a query for a1.corp100.com, it resolves the query and forwards the response, even
if it is an NXDOMAIN response, to the client. Note that if the order of the rules was switched, the DNS client
would have been redirected immediately, because the domain name a1.corp100.com matches the
*.corp100.com pattern.
• If the DNS member receives a query for b1.corp100.com, the member immediately redirects the DNS client to
the specified IP address because the domain name in the query matches the second rule.
• If the DNS member receives a query for b1.corp200.com, it resolves the query because the domain name does
not match any rule. If the DNS member receives an A record from an authoritative server, the member forwards
the response to the client. However, if the member receives an NXDOMAIN response, it redirects the DNS client
to the specified IP address.
In the following example, the rules redirect queries for dotted domain names that do not have “.com” As shown in
the example, an explicit PASS rule is required at the end.
Ruleset 2:
Pattern Action
*.com PASS
.*.$ MODIFY
* PASS
• If the DNS member receives a query for corp100.com which matches the pattern “*.com”, the member resolves
the query and forwards the response, even if it is an NXDOMAIN response, to the client.
• If the DNS member receives a query for corp100.org, which matches the pattern “.*.$”, the member resolves the
query. If the member receives an NXDOMAIN response, it redirects the client to the specified IP address. If the
member receives a non-NXDOMAIN response, it forwards the response to the client.
• If the DNS member receives a query for corp200, the member resolves the query and forwards the response to
the client.
Creating Rulesets
To create a ruleset:
1. From the Data Management tab -> DNS tab -> NXDOMAIN Rulesets tab, click the Add icon.
2. In the NXDOMAIN Ruleset wizard, complete the following and click Next:
— Name: Enter a name for the ruleset.
— Comment: You can enter additional information.
— Disable: You can disable this ruleset for use later on. The appliance ignores disabled rulesets.
3. Click the Add icon to add a rule to the ruleset table.
— In the Pattern column, enter a domain name or pattern, using the guidelines specified in About NXDOMAIN
Rulesets.
— In the Action column, select PASS, REDIRECT or MODIFY.
— In the Order column, NIOS automatically displays the number of the entry in the list.
The appliance applies the rules in the order they are listed. You can order the list as follows:
— Use the up and down arrows to move rules up or down on the list.
— Use the go-to-top or go-to-bottom arrow to move a rule to the top or bottom of the list.
— Change the Order number of a rule to move it to the desired location.
— Delete a rule by selecting it and clicking the Delete icon.
4. Save the configuration and click Restart if it appears at the top of the screen.
Infoblox also offers the following security features to fully protect your DNS infrastructure and implementation:
• Infoblox Internal DNS Security on page 1589
• Infoblox External DNS Security on page 1561
• Infoblox DNS Firewall on page 1669
Note: Changes made to the configuration for mitigating phantom domain attacks take effect immediately on active
DNS service and do not require a service restart.
To adjust the parameters to mitigate phantom domain attack parameters, complete the following:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member check box -> Edit icon.
To override Grid settings, click Override and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click the Security tab and complete the following in
the Non-responsive servers section:
• Enable holddown for non-responsive servers: When you select this check box, the appliance stops sending
queries to non-responsive servers for a specified time interval (Holddown duration) when the number of
consecutive attempts to contact a non-responsive server exceeds the threshold value (Timeouts to trigger).
No service restart is required when you change this. Clear this check box to disable the holddown. Note that
disabling this does not clear any of the previously configured values. When you enable this feature again,
the appliance preserves the previously configured values.
— Minimum timeout: When the time taken for a timeout to happen exceeds this number, the timeout is
counted towards the number of consecutive timeouts (Timeouts to trigger). You can specify a value
between 0 and 5000 milliseconds. For example, if you set the minimum timeout to 1000 milliseconds,
only timeouts that took longer than 1000 milliseconds are counted towards the number of consecutive
timeouts. The default is 1000 milliseconds.
— Timeouts to trigger: The number of consecutive timeouts before holding down a server. You can specify
a value between 0 and 4294967295. For example, setting the threshold value to 5 means the
appliance stops sending queries to the non-responsive server after five consecutive timeouts. The
default is 5.
— Holddown duration: The holddown duration for a server. You can specify a value between 1 and 86400
seconds. For example, if you set the holddown time to 60 seconds, the server stops sending queries for
60 seconds. The default is 60 seconds.
Note: In order to get enough upstream queries and for the appliance to effectively identify non-responsive
servers and stop sending queries to them, do not set a high value for the Minimum timeout field. The
higher the value you configure for this field, the longer it takes to capture a timeout and the harder it is to
satisfy the total counts of consecutive timeouts (Timeouts to trigger). Until the total count of consecutive
timeouts is exceeded, no mitigation happens against the non-responsive servers. As a result, it is less
likely for the appliance to identify phantom domain attacks when you set the Minimum timeout field at a
high value. Infoblox highly recommends that you keep the default Minimum timeout value to achieve
optimum protection against these attacks.
• Limit recursive queries per server: Select this check box to configure the maximum number of concurrent
recursive queries that the appliance sends to a single upstream name server. Queries above the limit will
be blocked and may result in a SERVFAIL response to the client. When you enable this option, the appliance
dynamically adjusts the concurrent query limit for a specific server based on the ATR (Average Timeout
Ratio). No service restart is required when you change this. Clear this check box to disable this option. Note
that disabling this does not clear any of the previously configured values. When you enable this feature
again, the appliance preserves the previously configured values.
— Maximum fetches per server: The maximum number of concurrent recursive queries that the appliance
sends to a single upstream name server before blocking additional queries to that server. You can
specify a value between 0 and 4294967295. The default value is 500.
— Quota recalculation interval: This determines how often (in number of recursive responses) the
appliance recalculates the average timeout ratio. You can specify a value between 0 and 4294967295.
The default value is 200. Note that if you set this value to 0 (zero), the appliance will never recalculate
the ATR. Infoblox strongly recommends that you do not set this value to 0.
• Limit recursive queries per zone: Select this check box to configure the maximum number of concurrent
recursive queries the DNS server sends for a domain. If the number of recursive queries exceeds the
configured value, the server blocks new queries for that domain and returns a SERVFAIL response to the
client. No service restart is required when you change this. Clear this check box to disable the option. Note
that disabling this does not clear any of the previously configured values. When you enable this feature
again, the appliance preserves the previously configured values.
— Maximum fetches per zone: The maximum number of concurrent recursive queries that a server sends
for one of its domain. When the number of queries exceeds this number, the server blocks new queries
for the domain. You can specify a value between 0 and 4294967295. The default value is 200.
Note: The default values for these configurable parameters are set at an optimum level for general operations.
Infoblox recommends that you keep the default values when using these features. Ensure that you understand
the ramifications if you want to change the default values.
Note: Changes made to the configuration for tracking NXDOMAIN responses take effect immediately on active DNS
service and do not require a service restart.
To configure the parameters for tracking NXDOMAIN responses, complete the following:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member check box -> Edit icon.
To override Grid settings, click Override and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click the Security tab and complete the following in
the Bogus-query alerting and mitigation section:
• Track the percentage of NXDOMAIN responses to recursive queries: Select this check box to track the
percentage of NXDOMAIN responses from up-stream servers to all incoming recursive responses. Clear this
check box to disable the detection. Note that disabling this does not clear any of the previously configured
values. When you enable this feature again, the appliance preserves the previously configured values. This
is selected by default.
— Minimum responses per interval: Enter the minimum number of incoming DNS responses received
(within the detection interval) before the appliance starts calculating the NXDOMAIN ratio at the end of
the detection interval. The appliance then compares the calculated percentage to the high water
threshold. If the percentage equals or exceeds the high water threshold, the appliance sends an SNMP
trap (if enabled) about possible NXDOMAIN attacks. The default is 1000. Note that the Minimum
responses per interval is implemented to ensure that enough incoming DNS responses are received so
the appliance can calculate a meaningful NXDOMAIN ratio and does not declare possible attacks from a
small response sample. Therefore, when you change the default value, ensure that you use a
reasonable value so the appliance calculates the NXDOMAIN ratio from a reasonable amount of
responses. Raising an alert using a small response sample may not be a reliable way for detecting
possible NXDOMAIN attacks.
— NXDOMAIN threshold: Enter the Low and High water thresholds at which an alert is triggered. The
appliance sends an alert when the percentage equals or exceeds the High water threshold. When the
percentage in subsequent detection intervals falls below the Low water threshold, the appliance sends
another alert to notify that the percentage of NXDOMAIN responses has gone back to an acceptable
level. The defaults are 70% for Low and 80% for High.
— Detection interval and Responses: These parameters work as alternatives to each other in determining
when the appliance starts calculating the NXDOMAIN ratio. In the case of a very low response rate when
the total responses received within the Detection interval never reach the Minimum responses per
interval, the response counters continue to cumulate into subsequent detection intervals until the
Minimum responses per interval is met. The appliance then sends an alert at the end of the detection
interval. On the other hand, in the case of a very high response rate when the total number of
responses received equals or exceeds the Responses value before the Detection interval is reached,
the Minimum responses per interval does not apply and the appliance sends an alert as soon as the
total responses equal or exceed the Responses value you define here. It does not wait till the end of the
Detection interval. Note that the number of Responses you define here must be the same or greater
than the Minimum responses per interval. The defaults are 10 seconds for the Detection interval and
100000 for Responses.
3. Save the configuration.
Example One: Total responses per second = 250 and parameters = default values
Total
Responses 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
per Second
250/s 0 250 500 750 1000 1250 1500 1750 2000 2250 2500
In this example, the total number of responses is 250 per second and the total number of responses hits the
Minimum responses per interval (default = 1000) at the 4th second of the detection interval. This meets the
requirement for the Minimum responses per interval and triggers an NXDOMAIN ratio calculation at the end of the
detection interval (default = 10 seconds). If the percentage equals or exceeds the high water threshold, the appliance
sends an alert and logs the event to the syslog to notify about possible NXDOMAIN flood attacks. The appliance
resets the response counters for the next detection interval.
Example Two: Total responses per second = 40 per second and parameters = default values
Total
Responses 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
per Second
40/s 0 40 80 120 160 200 240 280 320 360 400
Total
Responses 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
per Second
40/s 440 480 520 560 600 640 680 720 760 800
Total
Responses 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
per Second
40/s 840 880 920 960 1000 1040 1080 1120 1160 1200
In this example, the total number of responses is 40 per second. During the first detection interval of 10 seconds, the
total number of responses is 400, which does not reach the Minimum responses per interval (default = 1000);
therefore, no NXDOMAIN ratio calculation occurs and the response counters continue to accumulate into the second
detection interval. At the end of the second interval, the total number of responses still does not reach the Minimum
responses per interval; therefore, no NXDOMAIN ratio calculation occurs and the counters continue to accumulate.
Finally, the total number of responses meets the requirement of the Minimum responses per interval when the
appliance receives 1000 responses at the 5th second during the third detection interval. This triggers an NXDOMAIN
ratio calculation at the end of the third detection interval, and the counters reset for the next detection interval. If the
NXDOMAIN percentage equals or exceeds the high water threshold, the appliance sends an alert and logs the event
to the syslog to notify about possible NXDOMAIN flood attacks.
Example Three: Total responses per second = 50000 and parameters = default values
Total
Responses 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
per Second
50000 0 50000 100000
In this example, the total number of responses per second is 50000. When the total number of responses hits
100000, which equals to the Responses value, the appliance starts calculating the NXDOMAIN ratio and sends an
alert without waiting until the end of the detection interval. If the percentage equals or exceeds the high water
threshold, the appliance sends an alert and logs the event to the syslog to notify about possible NXDOMAIN flood
attacks. The appliance resets the response counters for the next detection interval.
Note: The above configuration examples also apply to how the appliance tracks cache hit ratio of recursive queries,
as described in Tracking Cache Hit Ratio of Recursive Queries on page 782.
Note: Changes made to the configuration for mitigating possible NXDOMAIN attacks take effect immediately on
active DNS service and do not require a service restart.
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member check box -> Edit icon.
To override Grid settings, click Override and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click the Security tab and complete the following in
the Bogus-query alerting and mitigation section:
• Deprioritize caching of NXDOMAIN responses: Select this check box to split the LRU list into two: one for NX
RRsets and the other for all other RRsets, and to always remove the least recently used items from the list of
NX RRsets first. This is selected by default.
3. Save the configuration.
About Blacklists
Your organization can prevent customers or employees from accessing certain Internet resources, particularly web
sites, by prohibiting a recursive DNS member from resolving queries for domain names that you specify.
You can create blacklist rules that specify how a DNS member responds to recursive queries for data for which it is
not authoritative. Each rule specifies a domain name and the action of the DNS member when the domain name in
the query matches that in the rule. Instead of resolving the query, the DNS member can redirect the DNS client to
predefined IP addresses or return a REFUSED response code indicating that resolution is not performed because of
local policy.
When the DNS member receives a query for data for which it is not authoritative, it first tries to match the domain
name in the query with a domain name in any of its rules. If it finds a match, it responds according to the action
specified in the rule. If it does not find a match and the NXDOMAIN feature is enabled, the DNS member checks the
NXDOMAIN rulesets for a match and responds accordingly. If the NXDOMAIN feature is not enabled, the DNS member
resolves the query. (For information about the NXDOMAIN feature, see About NXDOMAIN Redirection on page 772.
Infoblox DNS members can modify their responses to queries for A records only. Therefore, if the matched query is
for a record other than an A record, including a query with a type of “ANY”, the DNS member sends a REFUSED
response if the matched rule has an action of “Redirect”.
In Figure 17.1, a DNS client opens a web browser and tries to access xxx.domain.com. When the DNS member
receives the query for xxx.domain.com, it checks its blacklist rulesets and finds xxx.domain.com in a rule with an
action of “Redirect”. The DNS client is redirected to the configured redirection destination IP address 10.1.2.3.
1 A DNS client sends its DNS 2 The resolver sends the DNS
resolver a query for server a recursive query for the
xxx.domain.com. A record of xxx.domain.com.
DNS Client DNS Resolver DNS Server Blacklist
Rulesets
5 The resolver sends the IP 4 The DNS server forwards an A 3 The DNS server checks its
address 10.1.2.3 to the record with IP address 10.1.2.3 rulesets and finds a rule, with a
DNS client, which accesses to the resolver. “redirect” action, that matches
the portal at 10.1.2.3. xxx.domain.com.
This feature supports queries for data in IPv4 and IPv6 reverse-mapping zones, as well as forward-mapping zones.
Note that when a user with a Windows DNS client with IPv6 installed tries to access a domain name, the Windows
client sends queries for AAAA records before queries for A records. After the DNS member sends a Refused response
to the query for the AAAA record, the DNS client then sends a query for the A record. The DNS member then responds
according to the blacklist rules.
When DNSSEC is enabled on the Infoblox DNS server, it does not redirect DNS clients that request DNSSEC data. (For
information about DNSSEC, see Chapter 22, DNSSEC, on page 963.) If DNSSEC is not enabled and the query includes
a request for DNS data, the appliance ignores the request for DNSSEC data and redirects the clients.
To apply the configured DNS blacklist rules regardless of whether a DNS query requests DNSSEC data, configure the
appliance accordingly. For more information about how to configure this, see Applying Policies and Rules to DNS
Queries that Request DNSSEC Data on page 995.
You can enable the blacklist feature at the Grid, member, and DNS view levels. Note that only recursive DNS servers
can support this feature. For information on enabling recursion on a DNS member, seeEnabling Recursive Queries on
page 769.
The following example illustrates how the DNS member applies blacklist rules.
Ruleset 1:
Pattern Action
a1.foo.com PASS
foo.com REDIRECT/BLOCK
• If the DNS member receives a recursive query for a1.foo.com, it resolves the query and forwards the response to
the client.
• If the DNS member receives a recursive query for the A record of b1.foo.com, it redirects the DNS client to the
specified IP address. If the query is for another record type, such as an MX record, the member sends a REFUSED
response to the client.
Blacklist Guidelines
The following summarizes how a DNS member responds to a DNS client when the blacklist feature is enabled:
• If the domain name in the query matches a domain name in a rule, the member does the following:
— If the query is for an A record, the member performs the action specified in the rule.
— If the action is “Redirect”, the member performs the action specified in the Blacklist wizard.
• If the action in the wizard is to redirect, the DNS member redirects the client to the listed IP
addresses.
• If the action in the wizard is to return a REFUSED response, the DNS member sends a REFUSED
response to the DNS client.
— If the action in the rule is” Pass”, the DNS member resolves the query and forwards the response to the
DNS client.
— If the query is for a non-A record, the member performs the action in the rule as follows:
— If the action is “Redirect”, the DNS member returns a REFUSED response to the DNS client.
— If the action is “Pass”, the DNS member resolves the query and forwards the response to the DNS
client.
• If the domain name in the query does not match a domain name in a rule:
— If the NXDOMAIN feature is enabled, the DNS member tries to find a match with the NXDOMAIN rules and
responds accordingly.
— If the NXDOMAIN feature is disabled, the DNS member resolves the query and forwards the response to the
DNS client.
Note that if an A record with a dotted hostname is added to an authoritative zone through a dynamic DNS update,
and that A record should actually belong in an existing delegation, the appliance may not redirect a query for that A
record according to the Blacklist and NXDOMAIN guidelines.
Enabling Blacklisting
Only DNS members with recursion enabled can support this feature. You can enable this feature at the Grid level and
override it for a member or DNS view with recursion enabled.
You can also enable the DNS member to log queries that matched blacklist rules. The logs include the queried domain
name, source IP address, the pattern of the matched rule, and the name of the corresponding ruleset.
To enable blacklisting:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view check box ->
Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. If the Grid DNS Properties or Member DNS Properties editor is in basic mode, click Toggle Advanced Mode.
3. Click Blacklist and complete the following:
Enable Domain Name Blacklist: Select this check box.
Blacklist Rulesets: To add a ruleset, click the Add icon. If there are multiple rulesets, select one from the Select
Ruleset dialog box. Use the up and down arrows to move rulesets up and down in the list. The appliance applies
rulesets in the order they are listed.
For blacklisted domain names, return: Select the action of the appliance when it receives a query for a record
that matches a rule with an action of Redirect/Block.
If you selected This list of IP addresses, add an IP address to the Redirect to table by clicking the Add icon and
entering the address. The addresses are listed in round robin fashion in the synthesized response of the DNS
member. You can enter up to 12 IP addresses.
Blacklist TTL: Specify how long the DNS client caches the A record with the redirected IP address.
Log queries for blacklisted domain names: Select this option to enable the appliance to log queries for
blacklisted domain names, including the source IP address of the query.
4. Save the configuration and click Restart if it appears at the top of the screen.
You can control zone transfers at the Grid, member, and zone levels. This enables you to specify a different set of
name servers for a Grid, member, and zone, if necessary. You can also control which external secondary servers
should receive notifications about zone updates by adding their IP addresses to the also-notify statement for each
authoritative zone that is served by a Grid member. Infoblox recommends that you use this feature to notify hidden
external secondary servers about zone updates, instead of putting them in stealth mode, especially when you plan
to configure a large number of them. For information about how to add IP addresses to the also-notify statement, see
Configuring Zone Transfers on page 789.
— TSIG Key: In the Add TSIG Key panel, complete the following, and then click Add to add the TSIG key to
the list:
• Key name: Enter a meaningful name for the key, such as a zone name or the name of the remote
name server with which the local server authenticates zone transfer requests and replies. This
name must match the name of the same TSIG key on other name servers that use it to authenticate
zone transfers with the local server.
• Key Algorithm: Select either HMAC-MD5 or HMAC-SHA256.
• Key Data: To use an existing TSIG key, type or paste the key in the Key Data field. Alternatively, you
can select the key algorithm, select the key length from the Generate Key Data drop down list, and
then click Generate Key Data to create a new key.
— DNSone 2.x TSIG Key: Select this when the other name server is a NIOS appliance running DNS One 2.x
code. The appliance automatically populate the value of the key in the Value field. The Permission
column displays Allow by default. You cannot change the default permission.
— Any Address/Network: Select to allow or deny the local appliance to send zone transfers to any IP
address.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Optionally, select the Add allowed IP addresses to also-notify check box to add all IPv4 and IPv6 addresses listed
in the “Allow zone transfers to” table to the also-notify statement for each authoritative zone served by a Grid
member. When you enable this, all external secondary servers that are not defined for the zone and are allowed
zone transfers will receive notifications about zone updates, in addition to name servers assigned to the zone.
Infoblox recommends that you do not configure a large number of external secondary servers in stealth mode. To
ensure that these secondary servers receive notifications about zone updates, add their addresses to the “Allow
zone transfers to” table and grant them the “Allow” permission, and then select this check box.
Note: The appliance includes only IPv4 and IPv6 addresses. It does not include network addresses, TSIG keys,
and denied addresses. When you configure a named ACL, all allowed IPv4 and IPv6 addresses in the
named ACL are added to the also-notify statement.
Note: The tcp-client value is unconditionally set to 200 to control the total number of simultaneous TCP connection,
which caps the maximum inbound and maximum outbound transfer plus any DNS request made with the TCP.
The tcp-client value specifies the maximum number of simultaneous DNS clients that can be handled with TCP
connections and does not account for UDP connections. The UDP connection accounts for the regular DNS
requests and TCP is used only for AXFR and rare DNS requests that don't fit in a UDP connection.
When the NIOS appliance receives a query from the specified IP address or network and the DNS lookup produces a
response with multiple addresses, the NIOS appliance sorts the addresses so that those in the sort list are at the
beginning of its response. This feature is also supported for the Infoblox-4030 appliance. For more information, refer
to the Infoblox DNS Cache Acceleration Application Guide.
Click to
expand/hide the
sort list of each
source address.
6. Enter the IP address or network in the Prioritized Networks field. You can add as many IP addresses as necessary.
When you add multiple IP addresses, you can change the order of the IP addresses. Select an IP address and drag
it to its new position, or click the up or down arrow.
7. You can add additional information about the source address or network in the Comment field.
8. To add another source IP address or network, click the Add icon again. You can create a separate sort list for each
source IP address or network.
9. Save the configuration and click Restart if it appears at the top of the screen.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance uses clients that have
the Exclude permission in the DNS resolution process. You can click Clear to remove the selected named
ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows.
— IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the Value field
and enter the IP address of the client. The Permission column displays Include by default. You can
change it to Exclude by clicking the field and selecting Exclude from the drop-down list. When you
select Include, the appliance adds the IP address to the blackhole list and does not allow DNS queries
and DNS resolution for this address. When you select Exclude, the appliance excludes the address
from the blackhole list and allows DNS queries and resolution for the address.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
— Any Address/Network: Select to include or exclude any IP addresses and networks for the DNS
resolution process.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Save the configuration.
Note: The hostname restriction limits the hostname of A, AAAA, Host, MX, NS, and bulk host records only.
You can define your own hostname restriction policy at the Grid level only. At the member and zone levels, you can
select a predefined policy or a policy that was defined at the Grid level. The appliance supports IDNs for DNS zones
and resource records. For more information about IDNs, see Support for Internationalized Domain Names on page
113. You can use UTF-8 characters when you configure your own hostname checking policy.
Note: The Strict Hostname Checking policy only allows alphanumeric characters and dashes ("-"). In addition,
this policy allows IDNs that are written in punycode. You cannot use other special characters, such as
underscore ("_"). Therefore, DDNS updates from Microsoft Active Directory controllers may not be
accepted.
7. Save the configuration and click Restart if it appears at the top of the screen.
After you specify a hostname restriction policy, if you create a record name that does not comply with this policy and
try to save it, an error message appears.
Note: The strict hostname checking policy only allows alphanumeric characters and dashes. It does not allow
for the use of other special characters, such as underscore ("_"). Therefore, DDNS updates from Microsoft
Active Directory controllers might not be accepted.
7. Save the configuration and click Restart if it appears at the top of the screen.
About DNS64
To support the increasing number of IPv6 and dual-stack networks, Infoblox DNS servers now support DNS64, a
mechanism that synthesizes AAAA records from A records when no AAAA records exist. When you enable DNS64 on
an Infoblox DNS server, it can operate with a third-party NAT64 device so IPv6-only nodes can communicate with
IPv4-only nodes without any changes to either of the devices.
As illustrated in Figure 17.3, when an IPv6-only host requests the AAAA record of an IPv4-only server and none exists,
a DNS64-enabled server can retrieve the A record of the IPv4 server and synthesize an AAAA record. The IPv6-only
host can then use the synthesized AAAA record, which contains the IPv6 proxy address for the IPv4 address in the
original A record, to initiate communication with the IPv4 host.
Figure 17.3
A Record
3
Synthesized
AAAA Record
4
Packet
corp100.com
If the server obtains the PTR record, then it sends the synthesized CNAME record and the PTR record to the client. If
the zone exists, but there is no PTR record, then the server sends the synthesized CNAME record only. If the zone does
not exist, then the server responds with a SERVFAIL with no answers.
Additionally, Infoblox DNS servers can generate synthesized records for DNSSEC secure zones, but only for
non-DNSSEC clients. A DNS client or resolver includes the EDNS OPT pseudo-RR with the DO (DNSSEC OK) bit set to
indicate that they are requesting DNSSEC data. DNS servers can generate synthesized AAAA records only when the
request does not have the DO bit set. This ensures that DNSSEC clients receive only valid responses.
For additional information about DNS64, refer to the following Internet drafts:
• http://tools.ietf.org/html/draft-ietf-behave-dns64-11
• http://tools.ietf.org/html/draft-ietf-behave-address-format-10
Configuring DNS64
You can enable DNS64 on both authoritative and recursive DNS servers. You can configure DNS64 at the Grid,
member or DNS view level.
To configure DNS64 on Infoblox DNS servers:
1. Create at least one DNS64 synthesis group. A synthesis group specifies the IPv6 prefix of the synthesized AAAA
records. For more information, see Adding a DNS64 Synthesis Group on page 799.
2. Optionally, specify additional parameters for the synthesis group. For more information, see Setting DNS64
Group Properties on page 800.
3. Enable the DNS64 service and assign a synthesis group to the Grid, a member or a DNS view. For more
information, see Enabling DNS64 Service on page 803.
On the NAT64 device, you must specify the IPv6 prefixes that are configured on the DNS server.
— Apply to queries requesting DNSSEC records: Select this to generate synthesized AAAA records for DNS64
synthesis groups that request DNSSEC data.
3. Click Next to define extensible attributes for the synthesis group. For information, see Using Extensible Attributes
on page 427.
4. Save the configuration
— IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IP address. The
Permission column displays Allow by default. You can change it to Deny by clicking the field and
selecting Deny from the drop-down list.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— Any Address/Network: Select this to allow or deny any IPv4 addresses for which the appliance
synthesizes AAAA records.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
Exclude IPv6 addresses: Specify IPv6 addresses of AAAA records that the appliance treats as nonexistent. The
DNS server does not return the AAAA record of an address from this list. Instead, it synthesizes an AAAA record
from the A record.
— None: Select this if you do not want to define specific IPv6 addresses or networks of AAAA records that the
appliance treats as nonexistent. The appliance treats all IPv6 addresses as nonexistent. This is selected by
default.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this option, the appliance synthesizes
AAAA records from A records for the clients that have the Allow permission in the list. You can click Clear to
remove the selected named ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows.
— IPv6 Address: Select this to add an IPv6 address. Click the Value field and enter the IP address. The
Permission column displays Allow by default. You can change it to Deny by clicking the field and
selecting Deny from the drop-down list.
— IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
— Any Address/Network: Select this to allow or deny any IP addresses of AAAA records that the appliance
treats as nonexistent.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
— Extensible Attributes: You can modify the attributes. For information, see Using Extensible Attributes on
page 427.
— Permissions: This tab displays if you logged in as a superuser. For information, see About Administrative
Permissions on page 195.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: Membership in the DNS Admin group is required to complete scavenging operations. For details, see
Administrative Permissions for DNS Records Scavenging on page 808.
Scavenging Rules
You can configure the following match rules to identify reclaimable DNS resource records:
• Resource Record Type: This rule allows you to specify the record type to run scavenging on. A record is
reclaimable if its type matches or does not match the type specified in the rule. The record types that support
scavenging include the following:
— A
— AAAA
— PTR
— CNAME
— DNAME
— MX
— SRV
— NAPTR
— TXT
• Creation Time: This rule allows you to identify reclaimable records based on the record’s creation timestamp.
You can see the “Creation Time” value for the records in the DNS Resource Records viewer.
Note: In the case of upgrade to NIOS 7.3, the creation time is not initialized. Therefore the “Creation Time” rule
does not apply to the records created before the upgrade.
• Last Queried Time: This rule allows you to identify reclaimable records based on when they were last queried for
their DNS data. You can see the last queried time for the records in the DNS Resource Records viewer.
Note: If you use this rule, also select Enable last queried time monitoring for resource records in the Grid, view,
or zone scavenging properties, as described in the next section.
• Last Discovered Time: This rule allows you to identify reclaimable records based on the record’s last discovered
timestamp. This rule is applicable to A, AAAA, and PTR records.
• Record Source: This rule allows you to specify the record source – static or dynamic – to be used as a filter when
identifying reclaimable records.
• Associated Records: This rule allows you to identify reclaimable records based on whether they have or do not
have associated records. Record associations are supported for address records (A, AAAA, and PTR).
Additionally, you can reclaim the associated records when reclaiming the original ones by enabling the option
When reclaiming A, AAAA, or PTR records, also reclaim the corresponding, symmetric A, AAAA, and PTR records
in the scavenging properties, as described in the next section.
• Extensible Attributes: You can specify extensible attributes that reclaimable records should match in addition to
the scavenging rules described above.
DNS zone: From the Data Management tab, select the DNS tab and click the Zones tab -> click a DNS view -> zone
check box -> Edit icon.
2. If the properties editor is in basic mode, click Toggle Advanced Mode.
3. Click DNS Scavenging.
4. Enable last queried time monitoring for resource records: Select this if you are going to use the Last Queried Time
rule. This setting enables monitoring the time when the resource record was last queried for its DNS data. For
more information on DNS queries monitoring for resource records, see DNS Queries Monitoring on page 808.
5. Enable last queried time monitoring for zones: This setting enables monitoring the time when the zone, i.e. at
least a single record in it, was last queried for its DNS data. The data resulting from zone last queries time
monitoring is displayed in the zones viewer (Data Management -> DNS -> Zones -> click a DNS view to open zones
list).
Note: Enabling monitoring for a zone does not enable monitoring for child zones.
Note: The extensible attributes rule is always combined with the rest of the match rules using the AND operator.
10. When reclaiming A, AAAA or PTR records, also reclaim the corresponding, symmetric A, AAAA and PTR records:
Select this if you want to reclaim records associated to the ones identified as reclaimable.
11. To configure a schedule for automatic records scavenging, select Enable scheduled record scavenging. See
Scheduling Automatic Scavenging on page 806.
12. Click Save & Close or Save.
Note: Infoblox recommends manually testing the configured scavenging settings before enabling scheduled
scavenging.
1. In the DNS record scavenging properties described in the previous section, select the Enable scheduled record
scavenging check box.
2. To enable automatic scavenging after records are marked as reclaimable, select After marking a record as
reclaimable, automatically reclaim the record.
3. Click the Scheduling icon and complete the following in the Scavenging Scheduler dialog:
— Select how often you want to execute the scavenging. You can select Once, Hourly, Daily, Weekly, or
Monthly.
— If you select Once, complete the following:
• Enter the day in the date picker and select a month from the drop-down list.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
— If you select Hourly, complete the following:
• Schedule every hour(s) at: Enter the number of hours between each scavenging instance. You can
enter a value from 1 to 24.
• Minutes past the hour: Enter the number of minutes past the hour. For example, enter 5 if you want
to schedule the scavenging operation five minutes after the hour.
• Choose the Time Zone.
— If you select Daily, complete the following:
• Click either Every day or Every weekday.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
— If you select Weekly, complete the following:
• Schedule every week on: Select any day of the week.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
— If you select Monthly, complete the following:
• Schedule the day of the month: Enter the day of the month and the monthly interval. For example,
to schedule the rule update on the first day after every 2 months, you can enter Day 1 every 2
month(s).
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
4. Click OK.
• Mark records as reclaimable: This stage analyzes the records against the scavenging rules. The records
matching the rules are marked as reclaimable, i.e. their “Reclaimable” flag is set to “Yes” in the DNS Resource
Records viewer. These records can be reclaimed by using the second stage, unless you disable scavenging for
them as described in Disabling Scavenging for Individual Records on page 807.
• Reclaim records marked as reclaimable: This stage automatically removes the records marked as reclaimable in
the result of the execution of the first option. Running only the “Reclaim records marked as reclaimable” stage
without the analysis stage does not perform a new analysis on the affected records. It only removes the records
marked as reclaimable during the previous analysis.
Also, you can reset the reclaimable flag of the records. As an example of when this may be useful: if records have
previously been marked as reclaimable and under a revised scavenging policy some records may no longer be
reclaimable.
Note: To start immediate scavenging of DNS records, you must first carefully define the scavenging properties, as
described in Configuring DNS Record Scavenging Properties on page 804.
Note: Static records are never reclaimed automatically even if they are marked as reclaimable. You can only
delete static records manually from the DNS Resource Records viewer.
4. Click Start.
To check the progress of the current scavenging task, you can use the DNS Record Scavenging widget in the
Dashboard. For more information, see DNS Record Scavenging on page 172. You can also view a scavenging report,
as described in DNS Scavenged Object Count Trend on page 1504.
The scavenging task may be subject for an approval workflow. For information on approval workflows, see Configuring
Approval Workflows on page 94.
Note: Keep in mind that the Enable record scavenging property for a lower scavenging scope (e.g. view or zone) can
override this property for the upper scope (i.e., Grid or view respectively). For example, if you run scavenging
on the Grid with the scavenging option disabled, and there are some views or zones on which scavenging is
enabled, this results in the records of the affected views and zones being scavenged. Vice versa, if scavenging
is disabled for certain views or zones and you run scavenging on the Grid with the scavenging option enabled,
the corresponding views and zones are excluded from scavenging.
Note: Only a super user can restore records reclaimed during a recurring scavenging task.
• Last Queried: Displays "Not Monitored", "Not Queried Since xxxx", or date of last query.
Note: This report does not display the Last Queried information for automatically generated NS records.
To enable last queried time monitoring for resource records, do the following in the DNS scavenging properties for the
Grid, a view, or a zone:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
DNS view: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view check box ->
Edit icon.
DNS zone: From the Data Management tab, select the DNS tab and click the Zones tab -> click a DNS view -> zone
check box -> Edit icon.
2. If the properties editor is in basic mode, click Toggle Advanced Mode.
3. Click DNS Scavenging.
4. Select the Enable last queried time monitoring for resource records check box. For more information, see
Configuring DNS Record Scavenging Properties on page 804.
5. Click Save & Close.
Note: Exporting the query monitoring data may take longer than usual if the report contains a lot of records. Also, if
a Grid secondary server uses zone transfer to update zone data from a Grid primary server, NIOS does not
monitor queries made to the Grid secondary server and it does not update the last queried timestamp for the
resource records in a zone.
When multiple values are specified with the same filter, the filter applies or logic, e.g. ‘a’ or ‘b’. Other perspectives in
NIOS UI apply and logic, e.g., ‘a’ and ‘b’. You can use the following filters to get specific information in this report:
• DNS View: DNS view name.
• Not Queried: Specify a date when the last query was made. The only operator is "Since".
• Zone: FQDN of zone.
• Type: Only a single record type filter can be specified. This filter has the following resource records:
— A Records
— AAAA Records
— BulkHost
— CNAME Records
— DNAME Records
— DS Records
— DTC LBDN Records
— Host Address
— Host Alias
— Host Record
— MX Records
— NAPTR Records
— NS Records
— PTR Records
— Resource Record
— SRV Records
— Shared A Record
— Shared AAAA Record
— Shared CNAME Record
— Shared MX Record
Note: NIOS does not monitor queries or update timestamp for DNSSEC records, except for DS records. As a result,
the Query Monitoring tab displays “Not Monitored” in the Last Queried column for all DNSSEC records. In
addition, the Not Queried filter does not display any DNSSEC records.
A-1 Client A, an internal client, sends a A-2 The appliance retrieves the
request for sales.corp100.com. answer from the internal view.
You can configure both forward and reverse mapping zones in DNS views and provide DNS services, such as name
resolution, zone transfers and dynamic DNS updates. For information about these services, see Configuring DNS
Services on page 751.
You can provide multiple views of a given zone with a different set of records in each DNS view. In Figure 18.2, both
views contain the corp100.com zone and the sales.corp100.com zone. The finance.corp100.com zone is only in the
internal DNS view, and only internal users are allowed to access records in that zone. Resource records can also exist
in multiple zones. In the example, the A records for serv1.sales.corp100.com and serv2.sales.corp100.com are in the
sales.corp100.com zones in both views.
You can control which clients access a DNS view through the use of a match list specifying IP addresses and/or TSIG
(transaction signature) keys. When the NIOS appliance receives a request from a client, it tries to match the source IP
address and/or TSIG key with its match list when determining which DNS view, if any, the client can access. After the
appliance determines that a client can access a DNS view, it checks the zone level settings to determine if it can
provide the service that the client is requesting.
For information on TSIG keys or defining zone transfer settings, see Enabling Zone Transfers on page 788. For more
information on match lists, see Defining Match Clients Lists on page 815. For information on defining query settings,
refer to Controlling DNS Queries on page 767.
Figure 18.3 illustrates how the NIOS appliance resolves a query for a domain name in a zone of a DNS view. In the
example, the internal DNS view is listed before the external DNS view. Therefore, when the appliance receives a
query, it checks the match list of the internal DNS view first. If it does not find the source address in the match list of
the internal DNS view, it checks the match list of the external DNS view. The match list of the external DNS view allows
all IP addresses.
Next, the NIOS appliance checks the zone level settings to determine if it is allowed to resolve queries from the client
for domain names in that zone. After the appliance determines it is allowed to respond to queries from this client, it
resolves the query and sends back the response to the client.
Internal View
When you create more than one DNS view, as shown in Figure 18.3, the order of the views is important. View order
determines the order in which the NIOS appliance checks the match lists. In Figure 18.3, the internal DNS view is
listed before the external DNS view. If the views were reversed, no hosts would receive DNS replies from the internal
DNS view because the match list of the external DNS view allows replies to clients with any IP address. For information
on how to order views, see Managing the DNS Views of a Grid Member on page 819.
In a Grid, each Grid member can host its own set of views. A Grid member can serve as the primary or secondary server
for multiple views of a particular zone. For information about specifying primary and secondary servers, see Assigning
Zone Authority to Name Servers on page 839.
Note: This setting overrides the recursion setting at the Grid and member levels.
If you do not configure a Match Clients list, then all devices are allowed access to the DNS view. However, if you
configure a Match Clients list, then only those devices in the list with “Allow” permission can access the DNS view.
All other devices are denied access, including Grid members. Therefore, to allow a primary server of a zone to receive
dynamic DNS updates from member DHCP servers, you must add the members to the Match Clients list as well. Note
that if you “Deny” permission to certain IP addresses or networks, you must add the “Allow Any” permission at the
end of the Match Clients list to ensure that all other IP addresses and networks that are not in the “Deny” list are
allowed access to the DNS view. You can add individual ACEs (access control entries) or a named ACL (access control
list) to the Match Clients list. For information about named ACLs and how to define them, see Defining Named ACLs
on page 400.
— Any Address/Network: Select this to allow or deny any IP addresses to access the DNS view.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
3. Save the configuration and click Restart if it appears at the top of the screen. You can also click the Schedule icon
at the top of the editor to schedule this task. In the Schedule Change panel, enter a date, time, and time zone.
Note: You can also enable or disable the match-recursive-only option for a specific DNS view on a specific member
by using the CLI command set enable_match_recursive_only. For information about this command, refer
to the Infoblox CLI Guide.
Note: You cannot copy shared records and records that the NIOS appliance automatically creates, such as NS records
and glue A records.
1. From the Data Management tab -> DNS tab, click Copy Records from the Toolbar.
2. In the Copy Records dialog box, Grid Manager displays the last selected zone or the zone from which you are
copying zone records in the Source field. Complete the following to copy records:
— Destination: Click Select Zone to select the destination zone. When there are multiple zones, Grid Manager
displays the Zone Selector dialog box from which you can select one. After you select the zone, Grid
Manager displays the associated DNS view.
— Copy All records: Select this option to copy all the zone records, including those records not created on the
NIOS appliance, such as HINFO records.
— Copy Specific Records: Select this option to copy specific types of records. Select a resource record type
from the Available column and click the right arrow to move it to the Selected column.
— Copy Options: Select one of the following:
— Delete all records in destination before copying the records: Select to delete all resource records in the
destination zone before the records are copied.
— Overwrite existing records: Select to overwrite existing resource records that have the same domain
name owners as the records being copied.
3. Click Copy & Close.
Note: When you copy resource records between zones and there are pending scheduled tasks associated with these
records, the appliance allows the copying of zone records before it executes the scheduled tasks.
Note: The 255.255.255.255 limited broadcast address is reserved. The appliance does not automatically create
glue A records for this address. You can however create an NS record without the associated glue records.
4. Save the configuration and click Restart if it appears at the top of the screen.
• If the Match Clients list of one DNS view has both IPv4 and IPv6 addresses—The appliance orders DNS views
based on both IPv4 and IPv6 addresses, but more priority is given to the IPv4 addresses in the ordering.
The DNS views are ordered based on the number of IP addresses that are matched by the Access Control Lists (ACLs).
The order of the DNS view is as follows:
• ANY
• Large Network
• Small Network
• Multiple Addresses
• Single Address
The actual precedence of the order of the views is also based on the ACL elements:
• any match: precedence = UINT_MAX + 1
• address match: precedence += 1
• TSIG match: precedence += 1
• network match: precedence += 129 - split (BOTH v4 and v6)
Note that views with the same precedence are sorted based on the internal view name. For example, ‘_default’ or ‘0’.
Master
Grid
Note: Only superusers can copy A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access
users must have read/write permission to Adding a blank A/AAAA record in order to copy A, AAAA, shared A,
and shared AAAA records with a blank name, otherwise the copying records operation might fail. You can
assign global permission for specific admin groups and roles to allow to copy A, AAAA, shared A, and shared
AAAA records with a blank name. For more information, see Administrative Permissions for Adding Blank A or
AAAA Records on page 245.
Note: A single forward-mapping zone can map names to both IPv4 and IPv6 addresses.
With the proliferation of CIDR (Classless Inter-Domain Routing) support for routing, ISPs no longer assign entire /24
networks to customers that only need a handful of IPv4 addresses. In general, IPv4 address assignments no longer
fall on classful boundaries. For DNS, a problem comes into play when an ISP gives a customer an address range that
is smaller than a /24, but the customer also wants to be delegated the DNS reverse-mapping zone.
If the ISP gives you, for example, a subnet with a 25-bit mask, then you only have half of the /24 address range. If you
configure your DNS server to be authoritative for the zone corresponding to a /24 subnet, the DNS server cannot
resolve half of the possible reverse-mapping records in the zone. RFC 2317 defines an approach, considered a best
practice, which addresses this issue.
In addition to IPv4 reverse-mapping zones, you can also configure IPv4 reverse-mapping delegation zones that have
an RFC2317 prefix. For more information about configuring a delegation for a reverse-mapping zone, see Configuring
a Delegation on page 857.
Note: Before enabling RFC 2317 support for zones, disable forwarders for the zone, especially when any sort of
delegation (including RFC 2317) is being used. If you do not, reverse lookups may fail. For more information,
contact Infoblox Support for the Tech Note on RFC 2317 delegation.
Figure 19.1 Domains and Subdomains, and Forward-Mapping Zones and Subzones
The DNS name space is logically The DNS name space is administratively
structured into domains and subdomains. structured into zones and subzones.
domain “corp100“
(subdomain of “com”) corp100 name server for
“corp100.com” ,
“sales.corp100.com” ,
and
“eng.corp100.com”
“sales”, “eng”, and “sup” (subdomains of “corp100“ )
Note: Throughout this documentation, the trailing dot indicating the root zone is not shown, although its presence
is assumed.
The procedure for adding a subzone is the same as that used to add an authoritative zone. The only difference is that
you specify the subzone name in the Name field. For information about adding authoritative zones, see Configuring
Authoritative Zones on page 829.
Note: When you temporarily disable a zone that has an associated NS group, the appliance removes all the
automatically generated NS records, glue A or AAAA records, and PTR records from the zone. The appliance
automatically generates the NS records, glue A or AAAA records, and PTR records when you re-enable the zone.
— Change the primary name server that is specified in the SOA MNAME of a zone, as described in
Changing the SOA Name for a Zone on page 841.
— Don’t use forwarders to resolve queries in subzones: If the DNS members are configured to use
forwarders to resolve queries that they cannot resolve locally, you can select this check box to disable
the use of forwarders to resolve queries for data in the subzones.
— Queries: Set restrictions for queries as described in Controlling DNS Queries on page 767.
— Zone Transfers: Specify to which servers zone transfers are allowed as described in Enabling Zone Transfers
on page 788.
— Updates: Set dynamic DNS update properties as described in Configuring DNS Servers for DDNS on page
927.
— Active Directory: Set parameters to allow zones to receive GSS-TSIG authenticated DDNS updates from
DHCP clients and servers in an AD domain. For information, see Supporting Active Directory on page 930.
— Extensible Attributes: Define extensible attributes. For information, see Using Extensible Attributes on page
427.
— Permissions: Define administrative permissions. For information, see About Administrative Permissions on
page 195.
3. Click Toggle Advanced Mode if the editor is in basic mode. When the additional tabs appear, you can do the
following in each tab:
— General: Click the Advanced subtab and view the networks associated with the zone. This tab is visible only
if the primary server is a Grid member, a Microsoft server, or unassigned.
If a zone is associated with one or more networks, the IP addresses of its host, A and AAAA records must
belong to the associated networks. You cannot change the network associations in this editor. Navigate to
the DHCP Network editor of the network, to change the zone associations. For information, see Associating
Networks with Zones on page 1093.
— DNS Integrity Check: Configure the appliance to monitor DNS data in the NS RRsets for authoritative zones.
The appliance generates alerts when data discrepancies have been detected so you can mitigate possible
DNS domain hijacking. For more information, see About DNS Integrity Check for Authoritative Zones on
page 836.
— Host Naming: Set restrictions for host names. For information, see Specifying Hostname Policies on page
795.
— Shared Record Groups: Add shared record groups to a zone. For information, see About Shared Record
Groups on page 900.
— DNSSEC: Configure DNSSEC properties. For information, see Chapter 22, DNSSEC, on page 963.
— Record Scavenging: Define the rules for DNS records scavenging in the zone, as described in Configuring
DNS Record Scavenging Properties on page 804.
— Updates: Click the Advanced subtab and specify the secure dynamic updates settings, as described in
Secure Dynamic Updates on page 959.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: Once you configure a zone for DNS integrity check, you will not be able to add a parent zone above this
zone. You must disable DNS integrity check for this zone before you can add the parent zone.
2. In the Authoritative Zone editor, toggle to the Advanced Mode, select the DNS Integrity Check tab -> Basic tab and
complete the following:
— Enable: Select this check box to enable the DNS integrity check feature.
— Member: Click Select Member to select the Grid member you want to use for DNS integrity check. When you
select a member, ensure that the member is configured to send and receive DNS queries and responses
from Grid primaries (including stealth primaries) for the zone being monitored. Note that queries generated
by DNS integrity check for the first reachable internal Grid primary (including a stealth primary) are logged in
relevant DNS reports. For information about reports, see Infoblox Reporting and Analytics on page 1379.
— Check Frequency: Enter how often the appliance monitors DNS data for the authoritative zone. Select the
time unit from the drop down list. The appliance periodically queries DNS data for the top-level zone based
on the time interval you configure here. The default value is one hour, and the minimum configurable value
is 15 minutes.
— Enable Verbose Logging: Select this to enable detailed logging of events related to DNS integrity check.
When you select this option, the appliance logs additional information in the syslog when DNS data
discrepancies are detected. It also logs a message when no data discrepancies are found during a DNS data
check. When you clear this check box, the appliance logs standard information in the syslog and does not
log an event when no data discrepancies are found during a DNS integrity check. This is disabled by default.
For information about the syslog, see Viewing the Syslog on page 1341.
3. Save the configuration.
Figure 19.2 Domains and Subdomains, and Forward-Mapping Zones and Subzones
The DNS name space is logically The DNS name space is administratively
structured into domains and subdomains. structured into zones and subzones.
domain “corp100“
(subdomain of “com”) corp100 name server for
“corp100.com” ,
“sales.corp100.com” ,
and
“eng.corp100.com”
“sales”, “eng”, and “sup” (subdomains of “corp100“ )
On the Infoblox appliance, you can configure and manage DNS zones and subzones.
The following table summarizes how the appliance displays IDNs at the DNS zone level:
Note: The primary/secondary relationship between name servers is also known as a master/slave relationship. You
can enter, modify, and remove zone data on the primary (or master) servers, which can then send new and
modified data in a read-only format to the secondary (or slave) servers. Both primary and secondary name
servers are authoritative for the zone data they serve. The distinction between them is how they get their zone
data.
In Grid Manager, you can specify the primary and secondary servers for a zone or you can specify a name server
group. A name server group is a collection of one or more primary servers and one or more secondary servers. For
information on name server groups, see Using Name Server Groups on page 847.
In Grid Manager, you can specify the primary server for a zone when you create it using the Add Authoritative Zone
wizard or when you edit an existing zone using the Authoritative Zone editor. For information on how to add a new
zone through the wizard, see Configuring Authoritative Zones on page 829. The following procedure describes how
to access the editor of a zone. To specify a primary server for an existing zone:
1. From the Data Management tab, select the DNS tab -> Zones tab -> zone check box, and then click the Edit icon.
2. In the Authoritative Zone editor, click Name Servers.
3. Select Use this set of name servers.
4. Click the Add icon and select one of the following options for a primary server:
— Grid Primary: Choose this option to select a Grid member as the primary server for the zone. See Specifying
Grid Primary Servers on page 841.
— Microsoft Primary: Choose this option to select a Microsoft DNS server as the primary server for the zone.
See Specifying Microsoft Primary Servers on page 842.
— External Primary: Choose this option if the appliance is in a Grid and you want to specify a primary server
outside the Grid (“external” to the Grid). See Specifying External Primary Servers on page 842.
5. Save the configuration and click Restart if it appears at the top of the screen.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
• Use 2.x TSIG: If you want to use TSIG authentication and the external primary name server is a NIOS appliance
running DNS One 2.x code, select this check box. The local appliance generates the required TSIG key for
authenticating DNS messages to and from appliances running DNS One 2.x code.
Note: On the appliance you configure as a secondary server for a zone, you must associate a TSIG key for each
primary server to which the secondary server requests zone transfers. On the appliance you configure as a
primary server for a zone, you can set a TSIG key at the Grid, member, or zone level. Because the secondary
server requests zone transfers, it must send a specific key in its requests to the primary server. Because the
primary server responds to the requests, it can have a set of TSIG keys from which it can draw when
responding. As long as the primary server can find the same TSIG key that the secondary sends it, it can verify
the authenticity of the requests it receives and authenticate the responses it sends. Use NTP to synchronize
the time on both name servers that use TSIG-authenticated zone transfers.
Note: To avoid an impact on your database performance, Infoblox recommends that you do not configure a large
number of external secondary servers in stealth mode. To ensure that these secondary servers receive
notifications about zone updates, you can allow zone transfers for these IP addresses and then enable the
appliance to add them to the also-notify statement. For information about how to configure this feature,
see Configuring Zone Transfers on page 789.
• Use TSIG: To authenticate zone transfers between the local appliance and the external secondary server using a
TSIG (transaction signature), select this check box. Infoblox TSIGs use HMAC-MD5 hashes. These are keyed
one-way hashes for message authentication codes using the Message Digest 5 algorithm. For details, see RFC
1321, The MD5 Message-Digest Algorithm, and RFC 2104, HMAC: Keyed-Hashing for Message Authentication.
— Key name: Type or paste the name of the TSIG key you want to use. This must be the same name as that
of the TSIG key for this zone on the external secondary server.
— Key: Type or paste a previously generated key. On the external secondary server, this key must also be
present and associated with this zone. You can generate a TSIG key, or you can obtain the TSIG key
name and key from the external name server, either by accessing the appliance yourself or by
requesting the appliance administrator to deliver them to you through some out-of-band mechanism.
Then, type or copy-and-paste the name and key into the appropriate fields.
• Use 2.x TSIG: Select this check box to use TSIG authentication and the external secondary name server is a NIOS
appliance running DNS One 2.x code. The local appliance generates the required TSIG key for authenticating
DNS messages to and from appliances running DNS One 2.x code.
Note: On the appliance you configure as a secondary server for a zone, you must associate a TSIG key for each
primary server to which the secondary server requests zone transfers. On the appliance you configure as a
primary server for a zone, you can set a TSIG key at the Grid, member, or zone level. Because the secondary
server requests zone transfers, it must send a specific key in its requests to the primary server. Because the
primary server responds to the requests, it can have a set of TSIG keys from which it can draw when
responding. As long as the primary server can find the same TSIG key that the secondary sends it, it can verify
the authenticity of the requests it receives and authenticate the responses it sends. Use NTP to synchronize
the time on both name servers that use TSIG-authenticated zone transfers.
— Auto-populate: Select this to automatically populate the Domain Controller table with the list of domain
controllers. In the Add Prepopulated Domain Controllers panel, select one of the following options:
• Zone: Select this to copy the list of domain controllers from an existing AD-integrated zone in the
NIOS database. Click Select to select the AD-integrated zone. Click Clear to remove the selected
zone.
• Servers in Domain: Select this to add the IP addresses of all the Microsoft servers available in the
NIOS database which belong to the same AD domain as the primary Microsoft server assigned to
the zone.
Click Add to add the list of domain controllers to the table. Grid Manager automatically populates the
Domain Controller table with the list of domain controllers in ascending order by IP address.
Note: The Auto-populate option to add the domain controller list is only available while configuring the
AD-integrated zone. It is not available when you edit the domain controller list in the Authoritative Zone
editor.
Note: Grid Manager does not generate an NS record when the DNS service for the member is disabled.
The performance of the following functions significantly improve when you assign an NS group to a zone instead of
specifying multiple name servers individually:
• Starting and Stopping the DNS service.
• Reparenting the zones after removing or restoring a zone.
• Modifying the zone data.
Note: Only superusers can create and manage name server groups.
You can also group a set of external name servers as a delegation name server group and assign it to delegated zones.
For information see, Using Delegation Name Server Groups on page 859.
— Select the check box beside a name server group, and then click the Edit icon.
• Delete a name server group.
— Select the check box beside a name server group, and then click the Delete icon. Note that you cannot
delete a delegation name server group that is assigned to a zone.
• Export the list of Grid members to a .csv file.
— Click the Export icon.
• Print the list of Grid members.
— Click the Print icon.
Note: If you apply a name server group to at least one zone or specify it as the default group, you cannot rename or
remove it. To rename or remove a group, you must first disassociate it from all zones and unassign it as the
default group.
Source DNS
Server
(10.1.1.15)
zone data
The appliance imports zone data through a zone transfer. Therefore, the source name server must be authoritative
for the zone data being imported. You must also configure the source name server to allow zone transfers to the
destination appliance. On the source name server, you might need to modify the allow-transfer substatement to
include the IP address of the destination appliance prior to importing the data. If you are importing zone data to an
HA pair, use the VIP (virtual IP) address shared by the HA pair. For a single independent appliance, use the LAN IP
address. If you are importing zone data to a Grid, always use the IP address of the Grid Master.
If the source name server is an Infoblox appliance, you can configure it to allow zone transfers as described in
Enabling Zone Transfers on page 788. Note that a NIOS appliance, acting as the primary name server for a zone, by
default allows zone transfers to its secondary name servers. If the zone import fails, the zone to which the data is
imported will be disabled and the system does not create records and delegated subzones.
Note: The appliance does not encode punycode when you import zone data containing punycode. For example, a
zone data containing IDNs in punycode is stored in punycode for the data being imported. The data is
managed in punycode only.
Note: Only superusers can import zone data that contains A, AAAA, shared A, or shared AAAA records with a blank
name. Limited-access users must have read/write permission to Adding a blank A/AAAA record in order to
import zone data that contains A, AAAA, shared A, or shared AAAA records with a blank name, otherwise the
import zone data operation might fail. You can assign global permission for specific admin groups and roles
to allow to import A, AAAA, shared A, or shared AAAA records with a blank name. For more information, see
Administrative Permissions for Adding Blank A or AAAA Records on page 245.
Note: If NIOS resolves the IP address of the imported zone data, an external secondary member is added to the
list of name servers with the exact IP address. If NIOS cannot resolve the IP address of the imported zone
data, it adds an external secondary member with the IP address 255.255.255.255 to the list of name
servers.
Removing Zones
Depending on the configuration, you may or may not be able to delete or schedule the deletion of a zone and all its
contents. Superusers can determine which group of users are allowed to delete or schedule the deletion of a zone
and all its contents. For information about how to configure the recursive deletion of zones, see Configuring Recursive
Deletions of Networks and Zones on page 327.
Note that you must have Read/Write permission to all the subzones and resource records in order to delete a zone.
The possible effects of removing or re-parenting are illustrated in Figure 19.4.
The appliance puts all deleted objects in the Recycle Bin, if enabled. You can restore the objects if necessary. When
you restore a parent object from the Recycle Bin, all its contents, if any, are re-parented to the restored parent object.
For information about the Recycle Bin, see Using the Recycle Bin on page 73.
The NIOS appliance removes zone B, The NIOS appliance removes zone B and
subzone C, and all their resource its resource records. It reparents subzone
records. C to zone A. It creates a new NS record in
zone A for subzone C and possibly
changes admin privileges for subzone C.
If you choose to reparent the subzones, be aware of the following caveats and possible effects of the reparenting:
• You cannot remove a zone and reparent its subzones if at least one of the subzones is a delegated zone. You
must first remove any delegated subzones, and then you can remove the zone and reparent its subzones.
• If there are AD (Active Directory) subzones (_msdcs, _sites, _tcp, _udp, domaindnszones, foresetdnszones) and
you opt to remove the parent zone only, the NIOS appliance reparents all subzones except the AD subzones,
which it removes regardless of the removal option you specify.
• The subzone reparenting option is unavailable when you select multiple zones for removal.
• A record created under a top-level reverse-mapping zone is reparented when its immediate parent zone is
created. If that parent zone is deleted, the record is restored to the top-level reverse-mapping zone.
Examples:
Example 1:
Step 1 - Add 10.in-addr.arpa under . (root zone)
Step 2 - If you add 10.in-addr.arpa, it is created under . (root zone)
Step 3 - if you add in-addr.arpa, then 10.in-addr.arpa is reparented under in-addr.arpa
Example 2
• Deleting in-addr.arpa from the hierarchy might lead to 10.in-addr.arpa reparenting under . (root
zone), depending on the Remove zone only/ Remove all subzones option you select.
• If in-addr.arpa is restored, it is restored under . (root) zone with all its resource records.
Example 3
• Consider in-addr.arpa zone having 10.10.in-addr.arpa + 10.0.0.1 (PTR record)
— If you add 10.in-addr.arpa, then 10.10.in-addr.arpa is reparented under 10.in-addr.arpa
and 10.0.0.1 PTR record is reparented from in-addr.arpa to 10.in-addr.arpa.
— If you delete 10.in-addr.arpa, then 10.10.in-addr.arpa is reparented under in-addr.arpa
(depending on the Remove zone only/ Remove all subzones option) and 10.0.0.1 PTR record is
deleted along with 10.in-addr.arpa zone.
• When you remove a zone and reparent its subzones, any subzone that inherited its admin access settings from
its previous parent zone (as opposed to having specific access settings for the subzone) now receive their
settings from its new parent zone, which might be different. See Figure 19.5.
Zone A Zone A
Read/Write Read/Write
Zone B Zone B
Deny Deny
Subzone C
Subzone C
Inherits
Inherits “Deny”
“Read/Write”
… the admin access settings for subzone C change because the privileges for its new parent
zone (zone A) are different from those of its previous parent zone (zone B).
Before you remove zone B, subzone C inherits a “Deny” admin access setting from zone B.
After the removal, subzone C inherits “Read/Write” access from its new parent zone, zone A.
Note that if you set a specific “Deny” admin access privilege for subzone C before removing its
parent zone (zone B), subzone C retains its specified “Deny” setting.
Note: Instead of removing a zone, you can also disable it. For more information, see Enabling and Disabling Zones
on page 834.
To remove a zone:
1. From the Data Management tab, select the DNS tab -> Zones tab.
2. Click the check box of the zones you want to delete.
3. Click the Delete icon.
4. Select one of the following. Note that these options appear only if you are allowed to delete zones and all its
contents. For information about how to configure this, see Configuring Recursive Deletions of Networks and
Zones on page 327.
— Remove zone only: Select this to remove the zone and all its content. The appliance reparents all subzones
to the parent zone of the zone that you want to remove, except for the automatically created AD (Active
Directory) subzones.
— Remove all subzones: Select this to remove the selected zone, all its subzones, and all the resource records
of the selected zone and its subzones.
5. Click Yes.
You can also schedule the deletion for a later time. Click Schedule Deletion and in the Schedule Change panel, enter
a date, time, and time zone. For information, see Scheduling Deletions on page 90. For information about scheduling
recursive deletions of zones, see Scheduling Recursive Deletions of Network Containers and Zones on page 90.
3 Restore Zone B
2 To restore Zone B
from the Recycle
Bin. The appliance
after the import, reparents subzones
Zone A 1 You import Zone A delete Zone B and B1 and B2 back to
select the Remove Zone B.
subzones x and y Zone only option.
to Zone B
Zone B
Zone B
Source Zone B
Sub x
Sub x Sub B1
The appliance saves Zone The appliance Sub y
Sub y B and the subzones x and Sub B2 reparents the
y from the previous import subzones B1 and
(as delegated zones) in Sub x B2 to Zone A.
the Recycle Bin. Sub y
Configuring a Delegation
Instead of a local name server, remote name servers (which the local server knows) maintain delegated zone data.
When the local name server receives a query for a delegated zone, it either responds with the NS record for the
delegated zone server (if recursion is disabled on the local server) or it queries the delegated zone server on behalf
of the resolver (if recursion is enabled).
For example, there is a remote office with its own name servers, and you want it to manage its own local data. On the
name server at the main corporate office, define the remote office zone as delegated, and then specify the remote
office name servers as authorities for the zone.
You can delegate a zone to one or more remote name servers, which are typically the authoritative primary and
secondary servers for the zone. If recursion is enabled on the local name server, it queries multiple delegated name
servers based on their round-trip times. You can also add arpa as a top-level forward-mapping zone and delegate its
subzones.
You can also configure TTL settings of auto-generated NS records and glue A and AAAA records for delegated zones
in forward-mapping, IPv4 reverse-mapping, and IPv6 reverse-mapping zones. For information, see About Time To Live
Settings on page 753.
The delegation must exist within an authoritative zone with a Grid primary server.
— Use this set of name servers: Select this to define name servers for the delegated zone. In the Name
Servers panel, click the Add icon and specify the following information:
— Name: Enter the name of a remote name server to which you want the local server to redirect queries for
zone data. This is a name server that is authoritative for the delegated zone.
— Address: Enter the IP address of the delegated server.
For information about delegation name server group, see Using Delegation Name Server Groups on page 859.
6. Save the configuration and click Restart if it appears at the top of the screen, or click Next to define extensible
attributes as described in Using Extensible Attributes on page 427.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: The use of a forward zone is different from that of a forwarder. (A forwarder is a name server that performs
recursive lookups on behalf of the name servers that forward queries to it. For more information, see Using
Forwarders on page 767.) A NIOS appliance forwards queries to the name server of a forward zone because
the name server can resolve queries for the zone. A NIOS appliance forwards queries to a forwarder regardless
of zones.
Note that a name server can have only one definition for a zone in any given DNS view; a forward zone cannot be
configured on a member that already has a zone with the same domain name configured on it in the same DNS view.
To configure a forward-mapping zone:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Zone -> Add Forward
Zone.
2. In the Add Forward Zone wizard, click Add a forward forward-mapping zone and click Next.
3. Enter the following information, and then click Next:
— Name: Enter the domain name of the zone for which you want the NIOS appliance to forward queries.
— DNS View: This field displays only when there is more than one DNS view in the current network view. Select
the DNS view of the forward zone.
— Comment: Enter a descriptive comment.
— Disable: Click this check box to temporarily disable this zone.
— Lock: Click this check box to lock the zone so that you can make changes to it and prevent others from
making conflicting changes.
4. In the Default Zone Forwarders section, click the Add icon and specify the default servers to which the NIOS
appliance forwards queries for the zone:
— Name: Enter a domain name for the server to which you want the NIOS appliance to forward queries for the
specified domain name.
— Address: Enter the IP address of the server to which you want the NIOS appliance to forward queries.
— Select Use Forwarders Only if you want the NIOS appliance to query forwarders only (not root servers) to
resolve domain names in the zone.
5. In the Members section, you can select a Grid member or multiple members to serve the forward-mapping zone
and use the default forwarders or you can override default forwarders and configure custom forwarders for the
Grid members.
— Add: Click the Add icon to select the NIOS appliance on which the forward zone is configured. For an
independent deployment, select the local appliance (it is the only choice). If there are multiple Grid
members, the Member Selector dialog box is displayed. Select the required member from the list and click
OK.
— Name: Displays the name of the Grid member.
— IPv4 Address: Displays the IPv4 address of the Grid member.
— IPv6 Address: Displays the IPv6 address of the Grid member.
— Override Default Forwarders: Displays Yes when you override default forwarders. Otherwise, this field
displays No.
— Custom Forwarders: Displays the IP address of the custom forwarders. Otherwise, this field is blank.
Note: Skip the following two steps if you want to use the default forwarders.
— Address: Enter the IP address of the server to which you want the NIOS appliance to forward queries.
— Select Use Forwarders Only if you want the NIOS appliance to query forwarders only (not root servers) to
resolve domain names in the zone.
5. In the Members section, you can select a Grid member or multiple members to serve the forward-mapping zone
and use the default forwarders or you can override default forwarders and configure custom forwarders for the
Grid members.
— Add: Click the Add icon to select the NIOS appliance on which the forward zone is configured. For an
independent deployment, select the local appliance (it is the only choice). If there are multiple Grid
members, the Member Selector dialog box is displayed. Select the required member from the list and click
OK.
— Name: Displays the name of the Grid member.
— IPv4 Address: Displays the IPv4 address of the Grid member.
— IPv6 Address: Displays the IPv6 address of the Grid member.
— Override Default Forwarders: Displays Yes when you override default forwarders. Otherwise, this field
displays No.
— Custom Forwarders: Displays the IP address of the custom forwarders. Otherwise, this field is blank.
Note: Skip the following two steps if you want to use the default forwarders.
2006::123:4567:89ab:0:cdef. Note that if there are multiple noncontiguous groups of zeros, the double
colon can only be used for one group to avoid ambiguity. The NIOS appliance displays an IPv6 address in its
shortened form, regardless of its form when it was entered. Choose the network prefix that defines the IPv6
network address space.
or
Name: Enter the domain name of the reverse-mapping zone.
— DNS View: This field displays only when there is more than one DNS view in the network view. Select a DNS
view from the drop-down list.
— Comment: Enter a descriptive comment about the zone.
— Disable: Click this check box to temporarily disable this zone.
— Lock: Click this check box to lock the zone so that you can make changes to it, and also prevent others
making conflicting changes.
4. In the Default Zone Forwarders section, click the Add icon and specify the servers to which the NIOS appliance
forwards queries for the zone:
— Name: Enter a domain name for the server to which you want the NIOS appliance to forward queries for the
specified domain name.
— Address: Enter the IP address of the server to which you want the NIOS appliance to forward queries.
— Select Use Forwarders Only if you want the NIOS appliance to query forwarders only (not root servers) to
resolve domain names in the zone.
5. In the Members section, you can select a Grid member or multiple members to serve the forward-mapping zone
and use the default forwarders or you can override default forwarders and configure custom forwarders for the
Grid members.
— Add: Click the Add icon to select the NIOS appliance on which the forward zone is configured. For an
independent deployment, select the local appliance (it is the only choice). If there are multiple Grid
members, the Member Selector dialog box is displayed. Select the required member from the list and click
OK.
— Name: Displays the name of the Grid member.
— IPv4 Address: Displays the IPv4 address of the Grid member.
— IPv6 Address: Displays the IPv6 address of the Grid member.
— Override Default Forwarders: Displays Yes when you override default forwarders. Otherwise, this field
displays No.
— Custom Forwarders: Displays the IP address of the custom forwarders. Otherwise, this field is blank.
Note: Skip the following two steps if you want to use the default forwarders.
8. Click Next to continue to the next step where you define extensible attributes as described in Using Extensible
Attributes on page 427 or save the configuration and click Restart if it appears at the top of the screen.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
“ . “ (root)
Client sends a query The appliance The appliance sends a
1 for ftp.sales.corp200
2 3 query to a root server.
determines it
.com to the NIOS does not have
appliance. the record to
...which responds with a referral
resolve the
to the .com servers.
Client query.
.com
In Figure 19.9, when the NIOS appliance receives the request for the domain name in corp200.com, it determines it
does not have the resource records to resolve the query. It does, however, have a list of the authoritative name
servers in the stub zone, corp200.com. The appliance then sends a query directly to the name server in corp200.com.
“ . “ (root)
1 Client sends query for
ftp.sales.corp200.com
2 The appliance
has a
to the NIOS appliance. corp200.com
stub zone.
Client
.com
Stub Zone
Configuration
The sales.corp200.com
server checks its resource
records and responds with
Resource
the requested data.
Records
Stub zones facilitate name resolution and alleviate name server traffic in your network. For example, the client in the
previous examples is in corp100.com. The corp100.com and corp200.com zones are partners, and send all their
communications through a VPN tunnel, as shown in Figure 19.10 on page 867. The firewall protecting corp100.com
is configured to send all messages for the 10.2.2.0/24 network through the VPN tunnel. Infoblox_A hosts the stub
zone for corp200.com. Therefore, when the host in corp100.com sends a query for ftp.sales.corp200.com, Infoblox_A
obtains the IP address of Infoblox_B (10.2.2.7) from its stub zone records and sends the query to the firewall
protecting corp100.com.
Because the destination of the query is in the 10.2.2.0/24 network, the firewall (configured to encrypt all traffic to
the network) sends the request through a VPN tunnel to Infoblox_B. Infoblox_B resolves the query and sends back
the response through the VPN tunnel. All name server traffic went through the VPN tunnel to the internal servers,
bypassing the root servers and external name servers.
corp100.com corp200.com
In parent-child zone configurations, using stub zones also eases the administration of name servers in both zones.
For example, as shown in Figure 19.10, sales.corp200.com is a child zone of corp200.com. On the corp200.com
name servers, you can create either a delegated zone or a stub zone for sales.corp200.com.
When you create a delegated zone, you must first specify the name servers in the delegated zone and manually
maintain information about these name servers. For example, if the administrator in sales.corp200.com changes the
IP address of a name server or adds a new name server, the sales.corp100.com administrator must inform the
corp200.com administrator to make the corresponding changes in the delegated zone records.
If, instead, you create a stub zone for sales.corp200.com, you set up the stub zone records once, and updates are
then done automatically. The name servers in corp200.com that are hosting a stub zone for sales.corp200.com
automatically obtain updates of the authoritative name servers in the child zone.
In addition, a name server that hosts a stub zone can cache the responses it receives. Therefore, when it receives a
request for the same resource record, it can respond without querying another name server.
— The appliance does not automatically create an A record when its host name is in a name space that is
different from the zone. For example, if the zone is corp200.com and the primary server host name is
server1.corp100.com, then the appliance creates the NS record only and sends it when it is queried by the
stub zone name server. In this case, you must manually create the A record.
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
You can define two types of reverse-mapping stub zones, one for IPv4 addresses and one for IPv6 addresses.
To configure an IPv4 reverse-mapping stub zone:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Zone -> Add Stub Zone.
2. In the Add Stub Zone wizard, click Add a stub IPv4 reverse-mapping zone and click Next.
3. Specify the following:
— IPv4 Network: Enter the IPv4 address for the address space for which you want to define the
reverse-mapping zone and select a netmask from the Netmask drop-down list. Alternatively, you can
specify the address in CIDR format, such as 192/8.
To use an RFC 2317 prefix, select a netmask value that is between 25 to 31, inclusive. Grid Manager
displays the RFC 2317 Prefix field. Enter a prefix in the text field. Prefixes can be alphanumeric characters.
For information, see Specifying an RFC 2317 Prefix on page 830.
or
Name: Enter the domain name of the reverse-mapping zone.
— DNS View: This field displays only when there is more than one DNS view in the network view. Select a DNS
view from the drop-down list.
— Comment: Optionally, enter additional information about the zone.
— Disable: Click this check box to temporarily disable this zone.
— Lock: Click this check box to lock the zone so that you can make changes to it, and also prevent others from
making conflicting changes.
4. In the Master Name Servers panel, click the Add icon and enter the Name and IP Address of the primary server
in the stub zone, and then click Next.
If the primary server is a Grid member, you must enter the host name and IP address of the Grid member. The
NIOS appliance does not validate these entries. Therefore, if you change the IP address of a Grid member listed
here, you must update the Grid member information in this list as well.
You can specify multiple primary servers for redundancy. If the primary server is a NIOS appliance, the appliance
must have the Minimal Response feature disabled so it can propagate the data to the stub server. For
information about the Minimal Response feature, see Specifying Minimal Responses on page 763.
— Optionally, click the Don’t use forwarders to resolve queries in subzones check box to indicate that the
name servers hosting the stub zone should not forward queries that end with the domain name of the stub
zone to any configured forwarders.
5. In the Name Servers panel, click the Add icon and select one of the following:
— Add Infoblox Member: Select this and select the Grid member that hosts the stub zone.
— Add Microsoft Server: Select this and select the Microsoft server that hosts the stub zone.
6. Click Next to continue to the next step where you define extensible attributes as described in Using Extensible
Attributes on page 427.
7. Save the configuration and click Restart if it appears at the top of the screen
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
To configure an IPv6 reverse-mapping stub zone:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Zone -> Add Stub Zone.
2. In the Add Stub Zone wizard, click Add a stub IPv6 reverse-mapping zone and click Next.
— Serial number: The current serial number for the primary server. This number is automatically increased
when changes are made to the zone or its record. The serial number plays a key role in determining when
and whether zone data is updated. You can change the serial number only if the primary server of the zone
is a Grid member. When the zone has multiple primary servers, each primary can have its own serial
number. In this case, the serial number displayed here is always that of the Grid Master, which will also
appear in the primary name server list if it is one of the primaries for the zone.
Note: If you change the serial number of the Grid Master, serial numbers for all primaries will be changed to the
same number. A warning is displayed when you try to decrement the serial number.
— Refresh: This interval tells secondary servers how often to send a message to the primary server for a zone
to check that their data is current, and retrieve fresh data if it is not. The default is three hours.
— Retry: This interval tells the secondary server how long to wait before attempting to recontact the primary
server after a connection failure between the two occurs. The default is one hour.
— Expire: If the secondary fails to contact the primary for the specified interval, the secondary stops giving out
answers about the zone because the zone data is too old to be useful. The default is 30 days.
— Default TTL: Specifies how long name servers can cache the data. The default is eight hours.
— Negative-caching TTL (Time to Live): Specifies how long name servers can cache negative responses. The
default is 15 minutes.
— Primary name server (for SOA MNAME field): If the primary name server of a zone is a Grid member, the
MNAME is inherited from its corresponding member, and you can change the name of the primary name
server that is published in the MNAME field of the SOA record. This field accepts names in native character
sets. If the zone has multiple primary name servers, a list of all primaries is displayed in this section. Each
primary has its own serial number and the number can be different among them. Note that the serial
numbers for these primaries are read-only and you cannot modify them. If you change the serial number of
the Grid Master, serial numbers for all primaries will be changed to the same number.
— Email Address (for SOA RNAME field): If the primary name server of a zone is a Grid member, you can enter
an administrator email address to the SOA record to help people determine who to contact about this zone.
The appliance supports IDN for the host name of the Email address. For example, you can create
admin@инфоблокс.рф but not админ@инфоблокс.рф.com.
— Don’t use forwarders to resolve queries in subzones: Select this option to disable the use of forwarders to
resolve queries for data in subzones.
3. Save the configuration and click Restart if it appears at the top of the screen.
To schedule this task, click the Schedule icon at the top of the wizard. In the Schedule Change panel, click Later, and
then specify a date, time, and time zone. The Schedule icon is green when there is a pending scheduled task. You
can reschedule the task if you have the applicable permissions.
Viewing Zones
To list zones, navigate to the Data Management tab -> DNS tab -> Zones panel. If there is more than one DNS view in
the Grid, this panel lists the DNS views. Select a DNS view to list its zones. (For information, see Listing DNS Views
on page 821.)
• Click Toggle flat view to display a flat list of all the zones in the view.
• Click Toggle hierarchical view to display only the apex zones.
In the hierarchical view, you can see one entry for the host that represents the entire host object. In a host record,
there can be multiple DNS resource records (A, PTR, CNAME) and some DHCP data (fixed addresses) as well. In the
flat view, each of the DNS resource records in the host are listed separately.
For example, the host called server1.infoblox.com contains 2 A records and an ALIAS (which is a host naming
convention for CNAME records). If you view the infoblox.com zone using the hierarchical view option, you will see one
entry host for server1.infoblox.com. In the flat view, you will see three records (one for each IP address/A record, and
one host Alias for the CNAME). In the flat view, you cannot delete one piece of the host record. You can edit the host
record and you can remove information. Deleting host records deletes the entire host record only.
This panel displays the following information for each zone, by default:
• Name: The domain name of the zone.
• MS Sync Server: When a zone is served by multiple Microsoft servers, this column shows which Microsoft
server is actually performing the synchronization of that zone with the Grid.
• MS Zone Sync: Displays Yes if you have enabled zone synchronization, and displays No when the zone
synchronization is disabled. This column appears only when you have the Microsoft license installed.
• Grid Primary Server: The primary name server configured for an authoritative zone in the DNS view.
• Type: The zone type. Possible values are Authoritative, Forward, Stub and Delegation.
• Multi-master Zone: Indicates whether this zone has multiple primary name servers.
• Comment: Comments that were entered for the zone.
• Site: Values that were entered for this pre-defined attribute.
You can also display the following columns:
• Locked: Displays Yes when a zone is locked by an admin, and displays No when the zone is unlocked.
• Function: Indicates whether the zone is a forward-mapping, or an IPv4 or IPv6 reverse-mapping zone.
• ZSK rollover date: Displays the date when the ZSK is due for next rollover. The appliance performs a rollover
automatically at this time.
• KSK rollover date: Displays the date when the KSK is due for next rollover. The appliance performs a rollover
automatically at this time if you have enabled automatic KSK rollover. For more information, see Configuring
Automatic KSK Rollovers and Notifications on page 984. You must perform the rollover manually, if you have
disabled this option.
• Disabled: This field displays Yes if the zone is disabled. Otherwise, this field displays No.
• Signed: This field displays Yes if the zone is a DNSSEC-signed zone. Otherwise, this field displays No.
You can do the following:
• List the resource records and subzones of a DNS zone.
— Click a DNS zone name.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables on page 70.
• Edit the properties of a DNS zone.
— Click the check box beside a DNS zone, and then click the Edit icon.
The suffix format is a string of ASCII characters that uses $ (unpadded) or # (zero-padded) followed by 1,2,3,4 to refer
to the first, second, third, or fourth IP address octet; it uses $1,$2,$3,$4 or #1,#2,#3,#4. $2 refers to the second
unpadded octet and #4 refers to the fourth zero-padded octet. For example:
The prefix of a bulk host = info
IP address = 10.19.32.133
Domain name = infoblox.com.
If you specify the default four-octet format -$1-$2-$3-$4, the bulk host name is
info-10-19-23-133.infoblox.com.
If you specify a custom name format such as *#1*#2*#3*#4, the bulk host name is
info*010*019*023*133.infoblox.com.
• You cannot create or change a bulk host if a zone is locked by another user. If you select a different template for
the Grid, it changes each record associated with the bulk host.
• You can define bulk host name formats only at the Grid level and override them at the bulk host level; not at the
zone or bulk host object level.
• When you upgrade to NIOS 4.3r3 or earlier releases, the system migrates existing bulk hosts as follows:
— If you did not customize the bulk host IP format, there is no action required. All migrated bulk hosts
continue to use the Grid-level default four-octet format -$1-$2-$3-$4. See Specifying Bulk Host Name
Formats on page 876.
— If you customized the bulk host IP format, the system creates a new template called Migrated Default
template. All migrated bulk hosts override the Grid default template and use the Migrated Default template.
Note: The NIOS appliance considers two bulk hosts that have the same prefix, start address, and end address as
duplicate hosts; even if they use different bulk host formats.
Rule Example
The suffix format cannot have more -$4-$5 is invalid.
than four octets.
The octets must be in order. -$2-$3-$4 is valid but -$3-$2-$4 is invalid.
Do not skip octets. -$2-$3-$4 is valid but -$2-$4 is invalid.
Do not use a combination of both the -$2-#3-$4 is invalid.
$ and # symbols together as octet
references; use only one of them.
The suffix format must contain at least -$4 is valid but -$3 is invalid.
the fourth octet. You must define at
least one -$4 or -#4.
If the suffix format uses $ references, -$2-$3-$4
it cannot be preceded by a digit. You
must add a non-digit prefix to each $
or # reference.
The \ character is the designated For the IP address 10.19.32.133, the format \#-#1-#2-#3-#4 expands
escape character for the $, # and \ to #-010-019-032-133.
characters.
You cannot use the $ or # symbols as
separators unless you prefix them
with an escape character \.
The bulk host name format must You cannot insert a bulk host name format -?-$4 in a zone that uses
comply with its zone host name policy. Allow Underscore as host name policy because the policy does not
allow you to use the ? character in the host name.
Rule Example
The bulk host name must comply with The sum of the bulk host name prefix and suffix cannot be greater
the maximum label length. than 63 characters. When you enter a suffix format, the NIOS
appliance determines the length of the longest bulk host defined, and
checks that the sum of the bulk host prefix and suffix length does not
exceed 63 characters; if it does, an error message appears.
The bulk host name cannot result in
an FQDN with more than 255
characters.
The NIOS appliance computes the For the format string -$1-$2-$3-$4, the maximum length of the suffix
maximum length of the bulk host is -255-255-255-255; that is, 16 characters. Therefore, the maximum
suffix by expanding the bulk host IP length of the host prefix is 47 characters.
format using 255.255.255.255.
The bulk host name must not be the If there is a CNAME record with alias foo-003-015, you cannot insert a
same as a CNAME/DNAME. bulk host foo/1.2.3.10/1.2.3.20 using template -#3-#4 because
foo-003-015 is also one of the synthetic host names in the bulk host.
Each host name in the bulk host must You cannot insert a bulk host foo/1.2.3.10/1.2.4.20 using the
be unique. template -$4 because the system resolves the host name foo-10 to
both 1.2.3.10 and 1.2.4.10. To ensure that the bulk host name is
unique, use the template -$3-$4.
You cannot insert a bulk host that If there is a bulk host foo/1.2.3.10/1.2.4.20 using the template
violates the uniqueness of two bulk -$3-$4, you cannot insert another bulk host foo/1.3.4.10/1.3.5.20
hosts that have the same prefix and using the same template because the system resolves host name
use the same name format. foo-4-15 to both 1.2.4.15 and 1.3.4.15. Instead, use the template
-$2-$3-$4 to ensure that the two bulk hosts are unique.
The appliance provides four predefined formats. You can define additional formats or change the default format at
the Grid level only. To define new bulk host name formats:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
2. Select the Host Naming tab of the Grid DNS Properties editor.
The Bulk Host Name Formats table displays four predefined name suffix formats. The following examples show
the host name that each format generates for the zone test.com:
Four Octets: $1-$2-$3-$4 (Default)—Generates foo-192-168-1-15.test.com.
Three Octets: -$2-$3-$4—Generates foo-168-1-15.test.com
Two Octets: -$3-$4—Generates foo-1-15.test.com
One Octet: -$4—Generates foo-15.test.com
For the IP address 10.100.0.10, the format -$1-$2-$3-$4 generates the host name suffix -10-100-0-10. The
format #1-#2-#3-#4 generates the host name suffix -010-100-000-010.
3. Click Add to enter the name and format of a new bulk host name format.
4. Optionally, click the Default column of a format and select Default to make it the Grid default.
5. Save the configuration and click Restart if it appears at the top of the screen.
Managing A Records
An A (address) record is a DNS resource record that maps a domain name to an IPv4 address. To define a specific
name-to-address mapping, you can add an A record to a previously defined authoritative forward-mapping zone. If
the zone is associated with one or more networks, the IP address must belong to one of the associated networks. For
example, if the A record is in the corp100.com zone, which is associated with 10.1.0.0/16 network, then the IP
addresses of the A record must belong to the 10.1.0.0/16 network. For information about associating zones and
networks, see Associating Networks with Zones on page 1093.
The appliance also supports wildcard A records. For example, you can use a wildcard A record in the corp100.com
domain to map queries for names such as www1.corp100.com, ftp.corp100.com, main.corp100.com, and so on to
the IP address of a public-facing web server. Note that wildcard names only apply when the domain name being
queried does not match any resource record.
NIOS allows superusers to add A records with a blank name. Limited-access users must have read/write permission
to Adding a blank A/AAAA record to add A records with a blank name. You can assign global permission for specific
admin groups and roles to allow limited-access users to add blank A records. For more information, see
Administrative Permissions for Adding Blank A or AAAA Records on page 245.
Note: If an A record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the record name in UTF-8 encoded format. For example, an A record with the
domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Name field.
Adding A Records
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Record -> Add A Record.
2. In the Add A Record wizard, do the following:
— Name: If Grid Manager displays a zone name, enter the hostname that you want to map to an IP address.
The displayed zone name can either be the last selected zone or the zone from which you are adding the
host record. If no zone name is displayed or if you want to specify a different zone, click Select Zone. When
there are multiple zones, Grid Manager displays the Zone Selector dialog box. Click a zone name in the
dialog box and then enter the hostname. The name you enter is prefixed to the DNS zone name that is
displayed, and the complete name becomes the FQDN (fully qualified domain name) of the host. For
example, if the zone name displayed is corp100.com and you enter admin, then the FQDN becomes
admin.corp100.com. Ensure that the domain name you enter complies with the hostname restriction policy
defined for the zone. To create a wildcard A record, enter an asterisk (*) in this field.
— DNS View: This field displays the DNS view to which the DNS zone belongs.
— Shared Record Group: This field appears only when you are creating a shared record. Click Select Shared
Record Group. If you have only one shared record group, the appliance displays the name of the shared
record group here. If you have multiple shared record groups, select the shared record group in the Shared
Record Group Selector dialog box. You can use filters or the Go to function to narrow down the list.
— Hostname Policy: Displays the hostname policy of the zone.
— In the IP Addresses section, click the Add icon and do one of the following:
— Select Add Address to enter the IPv4 address to which you want the domain name to map.
or
— Select Next Available IPv4 to retrieve the next available IP address in a network.
If the A record is in zone that has associated networks, the Network Selector dialog box lists the
associated networks. If the zone has no network associations, the Network Selector dialog box lists the
available networks. When you select a network, Grid Manager retrieves the next available IP address in
that network.
— Comment: Optionally, enter additional information about the A record.
— Create associated PTR record: Select this option to automatically generate a PTR record that maps the
specified IP address to the hostname. To create the PTR record, the reverse-mapping zone must be in the
database.
— Disable: Select this check box to disable the record. Clear the check box to enable it.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
4. Save the configuration and click Restart if it appears at the top of the screen.
Modifying A Records
When you modify an A record, you can do the following:
• In the General tab, you can change the information you previously entered through the wizard, as described in
Adding A Records on page 881.
• The Discovered Data tab displays discovered data, if any, for the record. For information, see Viewing
Discovered Data on page 642.
You can also enter or edit information in the TTL, Extensible Attributes and Permissions tabs. For information on
modifying and deleting resource records, see Modifying, Disabling, and Deleting Host and Resource Records on page
899.
Managing NS Records
An NS record identifies an authoritative DNS server for a domain. Each authoritative DNS server must have an NS
record. Grid Manager automatically creates NS records when you assign a Grid member as the primary server for a
zone or when you assign an NS group to a zone. Grid Manager generates two NS records; an authoritative NS record
for the current zone; and a delegation NS record for the parent zone for each name server available in the NS group.
You cannot edit an automatically generated NS record. Note that when you delete a name server from an NS group,
the NS record associated with the name server is deleted. For information about using NS Groups, see Using Name
Server Groups on page 847. You can manually create NS records for other zones. NS records associated with one or
more IP addresses are used for related A record and PTR record generation. You can configure an NS record for anycast
IP addresses on the appliance. For more information about anycast, see About Anycast Addressing for DNS on page
1035.
Adding NS Records
To add an NS record:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Record -> Add NS Record.
2. In the Add NS Record wizard, complete the following fields:
— Zone: The displayed zone name can either be the last selected zone or the zone from which you are adding
the NS record. If no zone name is displayed or if you want to specify a different zone, click Select Zone.
When there are multiple zones, Grid Manager displays the Zone Selector dialog box.
— DNS View: Displays the DNS view to which the selected zone belongs.
— Hostname Policy: Displays the hostname policy of the selected zone.
— Name Server: Enter the host name that you want to configure as the name server for the zone . IDN is not
supported in this field. You can use the punycode representation of an IDN in this field.
3. Click Next to enter IP addresses for the name server.
4. In the Name Server Addresses panel, click the Add icon and complete the following fields:
— Address: Enter the IP address of the name server.
— Add PTR Record: This field displays Yes by default, enabling the automatic generation of a PTR record for the
IP address. You can select No to disable the generation of the PTR record.
5. Click Next to define extensible attributes, or save the configuration and click Restart if it appears at the top of the
screen.
Note: If an AAAA record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the record name in UTF-8 encoded format. For example, an AAAA record with
the domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Name field.
NIOS allows superusers to add AAAA records with a blank name. Limited-access users must have read/write
permission to Adding a blank A/AAAA record to add AAAA records with a blank name. You can assign global
permission for specific admin groups and roles to allow limited-access users to add blank AAAA records. For more
information, see Administrative Permissions for Adding Blank A or AAAA Records on page 245.
— IP Address: Enter the IPv6 address to which you want the domain name to map. When you enter an IPv6
address, you can use double colons to compress a contiguous sequence of zeros. You can also omit any
leading zeros in a four-hexadecimal group. For example, the complete IPv6 address
2006:0000:0000:0123:4567:89ab:0000:cdef can be shortened to 2006::123:4567:89ab:0:cdef. Note
that if there are multiple noncontiguous groups of zeros, the double colon can only be used for one group to
avoid ambiguity. The NIOS appliance displays an IPv6 address in its shortened form, regardless of its form
when it was entered.
— Comment: Optionally, enter additional information about this record.
— Create associated PTR record: Select this option to automatically generate a PTR record that maps the
specified IP address to the hostname. To create the PTR record, the reverse-mapping zone must be in the
database.
— Disable: Clear the check box to enable the record. Select the check box to disable it.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: If a PTR record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name and Domain Name fields display the record name in UTF-8 encoded format. For example,
a PTR record with the domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Name and Domain Name fields.
— DNS View: If you entered an IP address, you must select the DNS view of the PTR record. If you entered a
name, this field displays the DNS view of the selected zone.
— Domain Name: Enter the domain name to which you want the PTR record to point. For example, you can
enter corp100.com.
— Comment: Optionally, enter information about the PTR record.
— Disable: Select this check box to disable the record. Clear the check box to enable it.
3. Save the configuration, or click Next to define extensible attributes. For information, see Using Extensible
Attributes on page 427.
4. Click Restart if it appears at the top of the screen.
To schedule this task, click the Schedule icon at the top of the wizard. In the Schedule Change panel, click Later, and
then specify a date, time, and time zone.
Note: When you add a PTR record to a forward-mapping zone, a message may appear on the top of the wizard if a
Grid member is configured to ignore DNS queries for PTR records in forward-mapping zones. Contact Infoblox
Technical Support for more information about this message.
Managing MX Records
An MX (mail exchanger) record maps a domain name to a mail exchanger. A mail exchanger is a server that either
delivers or forwards mail. You can specify one or more mail exchangers for a zone, as well as the preference for using
each mail exchanger. A standard MX record applies to a particular domain or subdomain.
You can use a wildcard MX record to forward mail to one mail exchanger. For example, you can use a wildcard MX
record in the corp100.com domain to forward mail for eng.corp100.com and sales.corp100.com to the same mail
exchange, as long as the domain names do not have any matching resource record. Wildcards only apply when the
domain name being queried does not match any record.
Note: If an MX record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Mail Destination and Mail Exchanger fields display the record name in UTF-8 encoded format. For
example, an MX record with the domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Mail Destination and Mail Exchanger fields.
The following MX records … … direct queries for one or more domains … … to the same mail exchanger:
Note: You must also create an A record for the host defined as a mail exchanger in an MX record.
Adding MX Records
To add an MX record from the Tasks Dashboard, see Add MX Record on page 128. You can also add MX records from
the Data Management tab -> DNS tab by clicking Add -> Record -> Add MX Record from the Toolbar.
Note: If an SRV record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name and SRV Target fields display the domain name in UTF-8 encoded format. For example, an
SRV record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Name and SRV Target fields.
— Service: Specify the service that the host provides. You can either select a service from the list or type in a
service, if it is not on the list. For example, if you are creating a record for a host that provides FTP service,
select _ftp. To distinguish the service name labels from the domain name, the service name is prefixed with
an underscore. If the name of the service is defined at
http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml, use
that name. Otherwise, you can use a locally-defined name.
— Protocol: Specify the protocol that the host uses. You can either select a protocol from the list or type in a
protocol, if it is not on the list. For example, if it uses TCP, select _tcp. To distinguish the protocol name
labels from the domain name, the protocol name is prefixed with an underscore.
— Domain: If Grid Manager displays a zone name, enter the name here to define an SRV record for a host or
subdomain. The displayed zone name can either be the last selected zone or the zone from which you are
adding the SRV record. If no zone name is displayed or if you want to specify a different zone, click Select
Zone. When there are multiple zones, Grid Manager displays the Zone Selector dialog box. Click a zone
name in the dialog box, and then enter the name to define the SRV record. The NIOS appliance prefixes the
name you enter to the domain name of the selected zone. For example, if you want to create an SRV record
for a web server whose host name is www2.corp100.com and you define the SRV record in the
corp100.com zone, enter www2 in this field. To define an SRV record for a domain whose name matches the
selected zone, leave this field blank. The NIOS appliance automatically adds the domain name (the same
as the zone name) to the SRV record. For example, if you want to create an SRV record for the corp100.com
domain and you selected the corp100.com zone, leave this field blank.
— Preview: After you have entered all the information, this field displays the FQDN, which is the concatenation
of the Service, Protocol, and Domain fields.
— Shared Record Group: This field appears only when you are creating a shared record. Click Select Shared
Record Group. If you have only one shared record group, the appliance displays the name of the shared
record group here. If you have multiple shared record groups, select the shared record group in the Shared
Record Group Selector dialog box. You can use filters or the Go to function to narrow down the list.
— Priority: Select or enter an integer from 0 to 65535. The priority determines the order in which a client
attempts to contact the target host; the domain name host with the lowest number has the highest priority
and is queried first. Target hosts with the same priority are attempted in the order defined in the Weight
field.
— Weight: Select or enter an integer from 0 to 65535. The weight allows you to distribute the load between
target hosts. The higher the number, the more that host handles the load (compared to other target hosts).
Larger weights give a target host a proportionately higher probability of being selected.
— Port: Specify the appropriate port number for the service running on the target host. You can use standard
or nonstandard port numbers, depending on the requirements of your network. You can select a port
number from the list or enter an integer from 0 to 65535.
— Target: Enter the canonical domain name of the host (not an alias); for example, www2.corp100.com
Note: In addition, you need to define an A record mapping the canonical name of the host to its IP address.
Note: The appliance does not match the service and protocol names to exactly how they appear in the drop-down
lists. It only checks whether the first two parts of the names start with an underscore. If the first two parts do
not start with an underscore, the appliance assumes it is a free format. For example, _abc._xyz.name is
considered as RFC 2782 format even though _abc is not in the Service drop-down list, and _xyz is not in the
Protocol drop-down list. Grid Manger displays _abc in the Service field and _xyz in the Protocol field. On the
other hand, “abc.xyz.name” is considered as a free format because the first two parts do not start with
underscores, and Grid Manager displays this in its entirety in the Domain field.
You can also enter or edit information in the TTL, Extensible Attributes and Permissions tabs. For information on
modifying and deleting resource records, see Modifying, Disabling, and Deleting Host and Resource Records on page
899.
Note: If a TXT record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the domain name in UTF-8 encoded format. For example, a TXT record with
the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Name field.
Note: If a CNAME record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Alias and Canonical Name fields display the domain name in UTF-8 encoded format. For example,
a CNAME record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Canonical Name and Alias fields.
Note: A CNAME record does not have to be in the same zone as the canonical name to which it maps. In addition, a
CNAME record cannot have the same name as any other record in that zone.
To add a CNAME record to a forward-mapping zone from the Tasks Dashboard, see Add CNAME Record on page 126.
You can also add CNAME records from the Data Management tab -> DNS tab by clicking Add -> Record -> Add CNAME
Record from the Toolbar.
Parent Zone
“10.1.1.0/24”
Delegated Child Zone Delegated Child Zone
“10.1.1.0/25” “10.1.1.128/25”
CNAME
PTR PTR
CNAME
All the PTR records for CNAME Records for Customer1 The PTR records for
Customer1 use the Customer2 also use the
addresses defined as ALIAS CANONICAL NAME addresses defined as
canonical names in the 1.1.1.10.in-addr.arpa 1.0/127.1.1.10.in-addr.arpa canonical names in the
CNAME records on the CNAME records on the
local DNS server. 2.1.1.10.in-addr.arpa 2.0/127.1.1.10.in-addr.arpa local DNS server.
Sample PTR records: ... ...
IP Address: 126.1.1.10.in-addr.arpa 126.0/127.1.1.10.in-addr.arpa
1.0/127.1.1.10.in-addr.arpa
Host Name: CNAME Records for Customer2
host1.customer1.com
ALIAS CANONICAL NAME
IP Address:
2.0/127.1.1.10.in-addr.arpa 129.1.1.10.in-addr.arpa 129.128/255.1.1.10.in-addr.arpa
Host Name: 130.1.1.10.in-addr.arpa 130.128/255.1.1.10.in-addr.arpa
host2.customer1.com
... ...
...
254.1.1.10.in-addr.arpa 254.128/255.1.1.10.in-addr.arpa
You add CNAME records in the parent zone on your name server. The aliases defined in those CNAME records point
to the addresses in PTR records in the child zone delegated to the other server.
When you define a reverse-mapping zone that has a netmask from /25 (255.255.255.128) to /31
(255.255.255.254), you must include an RFC 2317 prefix. This prefix can be anything, from the address range
(examples: 0-127, 0/127) to descriptions (examples: first-network, customer1). On a NIOS appliance, creating such
a reverse-mapping zone automatically generates all the necessary CNAME records. However, if you need to add them
manually to a parent zone that has a child zone with fewer than 255 addresses.
Note: If a DNAME record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Alias and Target fields display the domain name in UTF-8 encoded format. For example, a DNAME
record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Alias and Target fields.
When a request arrives for a domain name to which a DNAME record applies, the NIOS appliance responds with a
CNAME record that it dynamically creates based on the DNAME definition. For example, if there is a DNAME record
corp100.com. DNAME corp200.com.
and a request arrives for server1.corp100.com, the NIOS appliance responds with the following CNAME record:
server1.corp100.com. CNAME server1.corp200.com.
If responding to a name server running BIND 9.0.0 or later, the NIOS appliance also includes the DNAME record in its
response, so that name server can also create its own CNAME records based on the cached DNAME definition.
The following are two common scenarios for using DNAME records:
• One company buys another and wants people using both the old and new name spaces to reach the same
hosts.
• A virtual Web hosting operation offers different “vanity” domain names that point to the same server or servers.
There are some restrictions that apply to the use of DNAME records:
• You cannot have a CNAME record and a DNAME record for the same subdomain.
• You cannot use a DNAME record for a domain or subdomain that contains any subdomains. You can only map
the lowest level subdomains (those that do not have any subdomains below them). For an example of using
DNAME records in a multi-tiered domain structure, see Figure 20.3 on page 892.
Figure 20.3 Adding DNAME Records for the Lowest Level Subdomains
Corp200 buys Corp100 and wants to redirect queries for
corp100.com to corp200.com; however, the multitiered corp200.com
structure of corp100.com prohibits a complete mapping
of all its subdomains. In such a case, DNAME records
provide only a partial solution.
corp100.com
DNAME Record
Domain Name:
art.mktg.corp100.com
Target Domain:
art.mktg100.corp200.com
In the case of a domain structure consisting of a single domain (no subdomains), adding a DNAME record redirects
queries for every name in the domain to the target domain, as shown in Figure 20.4.
corp100.com corp100.corp200.com
When using a DNAME record, you must copy the resource records for the source domain to the zone containing the
target domain, so that the DNS server providing service for the target domain can respond to the redirected queries.
For the example in Figure 20.4, copy these records:
After copying these records to the zone containing the corp100.corp200.com domain, delete them from the zone
containing the corp100.com domain.
If DNS service for the source and target domain names is on different name servers, you can import the zone data
from the NIOS appliance hosting the source domain to the appliance hosting the target domain. For information
about this procedure, see Importing Zone Data on page 849.
If DNS service for the source and target domain names is on the same name server and the parent for the target
domain is on a different server, you can delegate DNS services for the target domain name to the name server that
provided—and continues to provide—DNS service for the source domain name (see Figure 20.5 on page 893). By
doing this, you can continue to maintain resource records on the same server, potentially simplifying the
continuation of DNS administration.
corp100.com corp100.corp200.com
www1.corp100.corp200.com mail1.corp100.corp200.com
www2.corp100.corp200.com ftp1.corp100.corp200.com
Resource Records Resource Records
corp100.com IN SOA ns1.corp100.com corp100.corp200.com IN SOA ns1.corp200.com
IN NS ns1.corp100.com IN NS ns1.corp200.com
IN NS ns2.corp100.com IN NS ns2.corp200.com
corp100.com IN DNAME corp100.corp200.com www1 IN A 10.1.1.10
www2 IN A 10.1.1.11
ftp1 IN A 10.1.1.20
mail1 IN A 10.1.1.30
The following tasks walk you through configuring the two appliances in Figure 20.5 to redirect queries for
corp100.com to corp100.corp200.com using a DNAME record:
On the ns1.corp100.com name server, do the following:
1. Create a new forward-mapping zone called corp100.corp200.com. See Creating an Authoritative
Forward-Mapping Zone on page 830.
2. Copy all the resource records for the domain or subdomain to which the DNAME record is going to apply from
corp100.com to corp100.corp200.com.
Note: Because you can only specify the records by type, not individually, you might have to copy some records
that you do not want and then delete them from the corp100.corp200.com zone.
3. In the corp100.com zone, delete all the resource records for the domain or subdomain to which the DNAME
record is going to apply.
4. Add a DNAME record to the corp100.com zone specifying “corp100.com” as the domain and
“corp100.corp200.com” as the target domain. Adding a DNAME record is explained in the next section.
5. On the ns1.corp200.com name server, add corp100.corp200.com as a delegated zone and specify
ns1.corp100.com as the name server for it. See Configuring a Delegation on page 857.
Note: If you specify a subdomain in the Domain Name field when configuring a DNAME record and the
subdomain is also a subzone, the DNAME record appears in the list view for the subzone, not in the list
view for the parent zone selected in the process of adding the record.
— Alias: If Grid Manager displays a zone name, enter the name of a subdomain here. If you are adding a
DNAME record for the entire zone, leave this field empty. This field is for adding a DNAME record for a
subdomain within the selected zone. The displayed zone name can either be the last selected zone or the
zone from which you are adding the CNAME record. If no zone name is displayed or if you want to specify a
different zone, click Select Zone. When there are multiple zones, Grid Manager displays the Zone Selector
dialog box. Click a zone name in the dialog box, and then enter the name of a subdomain.
— Target: Enter the domain name to which you want to map all the domain names specified in the Alias field.
— Comment: Enter identifying text for this record, such as a meaningful note or reminder.
— Disable: Clear the check box to enable the record. Select the check box to disable it.
3. Save the configuration, or click Next to define extensible attributes. For information, see Using Extensible
Attributes on page 427.
4. Click Restart if it appears at the top of the screen.
Note: NIOS appliances support DNAME records in reverse-mapping zones that map addresses to target zones with
a classless address space larger than a class C subnet. However, NIOS appliances do not support such target
zones.
You might also use DNAME records if you have a number of multihomed appliances whose IP addresses must be
mapped to a single set of domain names. An example of this is shown in Figure 20.6.
Instead of maintaining a PTR record for the IP address of All PTR records
each interface on every multihomed appliance, you can are here.
store all the PTR records in one reverse-mapping zone
and use DNAME records in the other zones to point
Resource Records
reverse lookups to the one set of PTR records. 3.1.10.in-addr.arpa IN NS ns1.corp100.com
3.1.10.in-addr.arpa IN NS ns2.corp100.com
1 IN PTR www1.corp100.com
Resource Records 2 IN PTR www2.corp100.com
1.1.10.in-addr.arpa IN NS ns1.corp100.com 3 IN PTR ftp1.corp100.com
1.1.10.in-addr.arpa IN NS ns2.corp100.com Multihomed 4 IN PTR stor1.corp100.com
1.1.10.in-addr.arpa IN DNAME 3.1.10.in-addr.arpa Appliances
1
1.1.10.in-addr.arpa. 3.1.10.in-addr.arpa.
2
All DNAME
Reverse-Mapping Reverse-Mapping
records are
Zones Zones
here.
3
2.1.10.in-addr.arpa. 4.1.10.in-addr.arpa.
Note: If you specify a subdomain in the Domain Name field when configuring a DNAME record, and the subdomain
is also a subzone, the DNAME record appears in the list view for the subzone, not in the list view for the parent
zone that was selected when adding it.
Note: If you specify a subdomain in the Domain Name field when configuring a DNAME record and the
subdomain is also a subzone, the DNAME record appears in the list view for the subzone, not in the list
view for the parent zone selected in the process of adding the record.
— Alias: If Grid Manager displays a zone name, enter the name of a subdomain here. If you are adding a
DNAME record for the entire zone, leave this field empty. This field is for adding a DNAME record for a
subdomain within the selected zone. The displayed zone name can either be the last selected zone or the
zone from which you are adding the CNAME record. If no zone name is displayed or if you want to specify a
different zone, click Select Zone. When there are multiple zones, Grid Manager displays the Zone Selector
dialog box. Click a zone name in the dialog box, and then enter the name of a subdomain.
— Target: Type the name of the reverse-mapping zone to which you want to map all the addresses specified in
the Domain Name field.
— Comments: Enter identifying text for this record, such as a meaningful note or reminder.
— Disable: Clear the check box to enable the record. Select the check box to disable it.
3. Save the configuration, or click Next to define extensible attributes. For information, see Using Extensible
Attributes on page 427.
4. Click Restart if it appears at the top of the screen.
Order
Preference
Flag Service Regular Expression Replacement
The DNS client then examines the fields in the NAPTR record as follows:
• If a DNS client receives multiple NAPTR records for a domain name, the value in the Order field determines
which record is processed first. It processes the record with the lowest value first.
• The DNS client uses the Preference value when the Order values are the same. Similar to the Preference field in
MX records, this value indicates which NAPTR record the DNS client should process first when the records have
the same Order value. It processes the record with the lowest value first.
In the example, the DNS client ignores the Order and Preference values because it received only one NAPTR
record.
• The Flag field indicates whether the current lookup is terminal; that is, the current NAPTR record is the last
NAPTR record for the lookup. It also provides information about the next step in the lookup process. The flags
that are currently used are:
U: Indicates that the output maps to a URI (Uniform Record Identifier).
S: Indicates that the output is a domain name that has at least one SRV record. The DNS client must then
send a query for the SRV record of the resulting domain name.
A: Indicates that the output is a domain name that has at least one A or AAAA record. The DNS client must
then send a query for the A or AAAA record of the resulting domain name.
P: Indicates that the protocol specified in the Service field defines the next step or phase.
If the Flag field is blank, this indicates that the client must use the resulting domain name to look up other
NAPTR records.
• The Service field specifies the service and protocol that are used to communicate with the host at the domain
name. In the example, the service field specifies that SIP (Session Initiation Protocol) is used to contact the
telephone service.
• The regular expression specifies the substitution expression that is applied to the original string of the client. In
the example, the regular expression !^.*$!sip:[email protected]! specifies that the domain name
7.6.5.4.3.2.1.5.5.5.1.e164.arpa is replaced with sip:[email protected].
The regular expression in a NAPTR record is always applied to the original string of the client. It must not be
applied to a domain name that resulted from a previous NAPTR rewrite.
• The Replacement field specifies the FQDN for the next lookup, if it was not specified in the regular expression.
Note: If a NAPTR record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Domain and Replacement fields display the domain name in UTF-8 encoded format. For example,
a NAPTR record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Domain and Replacement fields.
Leave this blank to indicate that the DNS client must use the resulting domain name to look up other NAPTR
records. You can use the NAPTR records as a series of rules that are used to construct a URI or domain
name.
— Order: Select an Integer from 10 to 100, or enter a value from 0 to 65535. This value indicates the order in
which the NAPTR records must be processed. The record with the lowest value is processed first.
— Preference: Select an Integer from 10 to 100, or enter a value from 0 to 65535. Similar to the Preference
field in MX records, this value indicates which NAPTR record should be processed first when the records
have the same Order value. The record with the lowest value is processed first.
— REGEX: The regular expression that is used to rewrite the original string from the client into a domain name.
RFC 2915 specifies the syntax of the regular expression. Note that the appliance validates the regular
expression syntax between the first and second delimiter against the Python re module, which is not 100%
compatible with POSIX Extended Regular Expression as specified in the RFC. For information about the
Python re module, refer to http://docs.python.org/release/2.5.1/lib/module-re.html.
— Replacement: This specifies the domain name for the next lookup. The default is a dot (.), which indicates
that the regular expression in the REGEX field provides the replacement value. Alternatively, you can enter
the replacement value in FQDN format.
— Comment: Optionally, enter a descriptive comment for this record.
— Disable: Clear the check box to enable the record. Select the check box to disable it.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427. This is
not applicable when you configure a NAPTR record for a DTC server.
4. Save the configuration and click Restart if it appears at the top of the screen.
— The Permissions tab displays if you logged in as a superuser. For information, see About Administrative
Permissions on page 195.
4. Save the configuration and click Restart if it appears at the top of the screen.
When you delete host and resource records, Grid Manager moves them to the Recycle Bin. You can use the Recycle
Bin to store deleted DNS configuration objects and selectively restore objects to the active configuration at a later
time. You can also permanently remove the objects from the Recycle Bin.
Note: You cannot delete automatically-generated records, such as NS records and SOA records.
In this example, there are two shared record groups. One group—group1— contains the A records ftp and printer1
and the MX record mx1, and the other group—group2—contains the A record web and the MX record mx2. The
resource records in group1 are shared with the internal view zones sales.corp100.com and finance.corp100.com and
the external view zone sales.corp100.com. The resource records in group2 are shared with the internal view zone
marketing.corp100.com and the external view zones sales.corp100.com and marketing.corp100.com.
group2
Internal
mx2 marketing.corp100.com view
web
External
marketing.corp100.com view
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables on page 70.
• Edit the properties of a shared resource record.
— Select the shared resource record, and then click the Edit icon.
• Delete a shared resource record.
— Select the shared resource record, and then click the Delete icon.
• Export the list of shared resource records to a .csv file.
— Click the Export icon.
• Print the list of shared resource records.
— Click the Print icon.
To set up one or more NIOS appliances for DDNS updates originating from DHCP, you must configure at least one
DHCP server and one DNS server. These servers might be on the same appliance or on separate appliances. Three
possible arrangements for a DHCP server to update a DNS server are shown in Figure 21.1.
Figure 21.1 Relationship of DHCP and DNS Servers for DDNS Updates
DDNS Update
1
Router
DHCP Server and Secondary DNS
Primary DNS Server Server
2 Zone Transfer
DDNS when the DHCP server and primary DNS server are on the different
NIOS appliances and the DHCP server updates the primary DNS server.
DDNS Update
Router Router
DHCP Secondary DNS Primary DNS
Server Server Server
Zone Transfer 2
DDNS when the DHCP server and primary DNS server are on the different
appliances and the DHCP server updates a secondary DNS server.
1 2
Router Router
DHCP Secondary DNS Primary DNS
Server Server Server
Zone Transfer 3
Here is a closer look at one setup for performing DDNS updates from a DHCP server (the steps relate to Figure 21.2).
1. When an IPv4 DHCP client requests an IP address, the client sends its host name (DHCP option 12). The client
also includes its MAC address in the ethernet frame header.
2. a. When the DHCP server responds with an IP address, it usually provides a domain name (DHCP option 15). The
combined host name (from the client) and domain name (from the server) form an FQDN (fully qualified domain
name), which the NIOS appliance associates with the IP address in the DHCP lease.
b. The DHCP server sends the A, TXT, and PTR records of the DHCP client to the primary DNS server to update its
resource records with the dynamically associated FQDN + IP address.
3. The primary DNS server notifies its secondary servers of a change. The secondary servers confirm the need for a
zone transfer, and the primary server sends the updated zone data to the secondary server, completing the
update.
Note: For information about zone transfers, see Enabling Zone Transfers on page 788.
1 2b
To enable a DHCP server to send DDNS updates to a DNS server, you must configure both servers to support the
updates. First, configure the DHCP server to do the following:
• Provide what is needed to create an FQDN: add a server-generated host name to a server-provided domain
name, add a server-provided domain name to a client-supplied host name, or permit the client to provide its
own FQDN
• Send updates to a DNS server
Then, configure the following on the DNS server:
• Accept updates from the DHCP server, a secondary DNS server, or a DHCP client
• If the DHCP server sends updates to a secondary DNS server, configure the secondary server to forward updates
to the primary DNS server
When setting up DDNS, you can determine the amount of information that DHCP clients provide to a DHCP server—
and vice versa—and where the DDNS updates originate. A summary of these options for IPv4 is shown in Figure 21.3.
It is similar for IPv6, except that the DHCP client and server exchange Request and Reply messages, AAAA records are
updated instead of A records, and the FQDN option is option 39.
Figure 21.3 DHCP Clients and Server Providing DNS Information and Updates
DHCP client updates the DNS server with its own A record (option 81).
You can configure the DHCP and DNS settings for DDNS at the Grid level, member level, and network and zone level.
By applying the inheritance model in the NIOS appliance, settings made at the Grid level apply to all members in the
Grid. Settings you make at the member level apply to all networks and zones configured on that member. Settings
made at the network and zone level apply specifically to just that network and zone. When configuring independent
appliances (that is, appliances that are not in a Grid), do not use the member-level settings. Instead, configure DDNS
updates at the Grid level to apply to all zones and, if necessary, override the Grid-level settings on a per zone basis.
Note: Whether you deploy NIOS appliance in a Grid or independently, they send updates to UDP port 53. Grid
members do not send updates through a VPN tunnel; however, Grid members do authenticate updates
between each other using TSIG (transaction signatures) based on an internal TSIG key.
IPv4 Fixed Address: From the Data Management tab, select the DHCP tab and click the Networks tab -> Networks
-> network -> ip_addr check box -> Edit icon.
IPv4 Address Range/Fixed Address Template: From the Data Management tab, select the DHCP tab and click the
Templates tab -> DHCP_template check box -> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the IPv4 DDNS -> Basic tab or the IPv6 DDNS -> Basic tab, complete the following:
— Enable DDNS Updates: Select this check box to enable DDNS updates. When setting properties for DHCP
objects other than the Grid, you must click Override and select Enable DDNS updates for the DDNS settings
to take effect.
Note: In a dual mode Grid, if IPv6 DDNS updates is enabled at the Grid level, then when you join an IPv6 Grid
member to the Grid, IPv6 DDNS updates is automatically disabled for the Grid member.
— DDNS domain name: Specify the domain name of the network that the appliance uses to update DNS. For
IPv4 clients, you can specify this at the network, network template, range, and range template levels. For
IPv6 clients, you can specify this at the Grid, member, network, shared network, and network template
levels.
— DDNS Update TTL: You can set the TTL used for A or AAAA and PTR records updated by the DHCP server. The
default is shown as zero. If you do not enter a value here, the appliance by default sets the TTL to half of the
DHCP lease time with a maximum of 3600 seconds. For example, a lease time of 1800 seconds results in a
TTL of 900 seconds, and a lease time of 86400 seconds results in a TTL of 3600 seconds. For information
about how to set the lease time, see Defining Lease Times on page 1072.
— Update DNS on DHCP Lease Renewal: Select this check box to enable the appliance to update DNS when a
DHCP lease is renewed.
3. Save the configuration and click Restart if it appears at the top of the screen.
— DNS View: If a network view has more than one DNS view, this field lists the associated DNS views. From the
drop-down list, select the DNS view to which the DHCP server sends DDNS updates. Otherwise, the
appliance uses the default DNS view.
4. Save the configuration and click Restart if it appears at the top of the screen.
The appliance sends DDNS updates to the appropriate zones in the selected DNS view. Note that you cannot
delete a DNS view that has been selected for DDNS updates. By default, the DHCP server sends DDNS updates
to zones using the domain name that you define for DHCP objects, such as networks and DHCP ranges.
Defining the Default Primary for DDNS Updates to Zones with Multiple Primaries
If you have configured multiple primary servers for an authoritative zone, you can define the default primary that the
appliance uses to perform DDNS updates for the zone. Note that you can configure a Grid primary, but not an external
primary, as the default primary. If you do not configure a default primary, the Grid Master becomes the default primary
for the zones that it serves. Otherwise, the appliance selects a primary server that serves the zone as the default
primary. For external zones that have multiple primaries, the first external primary server becomes the default
primary.
Configuring a default primary for DDNS updates is useful when you have DHCP members that span across different
locations. Performing DDNS updates becomes more efficient when you configure a default primary that is close in
proximity to the DHCP member. For example, zone corp100.com has two primaries (usa.corp100.com and
japan.corp100.com) serving two locations (USA and Japan). Service performance is faster when you select
usa.corp100.com as the default primary for DDNS updates in the USA region and japan.corp100.com as the default
primary for the Japan region.
When you configure a preferred or default primary server for DDNS updates to a zone that has multiple primaries,
ensure that the following are in place:
• The zone that you select contains multiple primary servers.
• The primary server has DNS service enabled and is authoritative for the zone.
• The appliance has DHCP service enabled.
Note: You can define the default primary for the Grid and override the setting at the member level, and you must
restart service for the configuration to take effect. Primary selection is performed at service restart, not at
runtime.
Note: All zones added to the table belong to the same DNS view.
Concatenated with the following rules defined at the Grid level: This section appears only in the Member DHCP
Properties editor. This table displays rules that are defined for zones with multiple primaries at the Grid level. Rules
configured at the member level automatically override those configured for the Grid. Note that all rules configured for
both the Grid and the member apply.
• Changes made to a hostname rewrite policy apply only to subsequent DDNS updates.
When an IPv4 DHCP client requests an IP address, it includes its host name in DHCP option 12. If you enable a
hostname rewrite policy, the appliance uses the newly translated host name when it issues a lease to the client.
The client can also include a FQDN in option 81, in which it instructs the server whether to perform DDNS updates. If
the client sends a FQDN in option 81, the appliance replaces the entire FQDN based on the policy. For example, if the
FQDN in option 81 is dev.bldg12.corp100.com, the appliance replaces invalid characters in the entire FQDN even
though the host name can be dev or dev.bldg12. For example, if your hostname rewrite policy specifies valid
characters as a-z and the replacement character is -, the newly translated FQDN is dev.bldg--.corp---.com. For
information about client FQDN in option 81, see About the Client FQDN Option on page 923.
Note that when multiple IPv4 DHCP clients specify host names that map to the same translated host name, the
appliance allocates leases to all clients, but it only sends DDNS updates to the first client request. When it tries to
update DNS for subsequent clients, the updates fail.
You can add and enable a hostname rewrite policy for the entire Grid. You can also override the policy at a member
level, as described in Overriding a Grid Hostname Rewrite Policy on page 922.
You can also select a hostname policy and click the Edit icon to modify it, or click the Delete icon to delete it.
You cannot modify or delete the default policy. For information about how to modify a policy, see Modifying a
Hostname Rewrite Policy on page 922.
4. Complete the following to enable the hostname rewrite policy:
— Enable hostname rewrite policy: Select this check box to use a hostname rewrite policy for DHCP leases and
DDNS updates for IPv4 DHCP clients. From the drop-down list, select the hostname policy you want to use.
5. Save the configuration.
Note: If you enable the policy at the Grid level, you can modify all information, including the policy name. If you
enable the policy at the member level, you can modify any information, except for the policy name.
If you do not enable support for the FQDN option and a client includes it in a DHCP request with its FQDN, the DHCP
server does not use the FQDN of the client. Instead, it creates the FQDN by combining the host name from the client
with the domain name specified in the Grid or Member DHCP Configuration editor.
Do the following to configure support for the FQDN option for both IPv4and IPv6 clients:
• Enable support for the option and specify who performs the DDNS update. For more information, see Enabling
FQDN Option Support on page 924.
• Specify the DNS zones and DNS view for the updates. For more information, see Sending Updates for DHCP
Clients Using the FQDN Option on page 924.
— DNS View: If a network view has more than one DNS view, this field lists the associated DNS views. From the
drop-down list, select the DNS view to which the DHCP server sends DDNS updates. Otherwise, the
appliance uses the default DNS view.
— Zones to Update for Hosts Using DHCP FQDN Option: In this section, you can define forward-mapping zones
to which the DHCP server sends DDNS updates for IPv4 and IPv6 DHCP clients that use the FQDN option.
You must first enable support for the FQDN option before the DHCP server can send DDNS updates to these
zones. By default, the DHCP server sends DDNS updates to zones using the domain name that you define
for DHCP objects, such as networks and DHCP ranges. For clients using this option, the DHCP server uses
the domain name defined in the option.
Click the Add icon to specify a forward-mapping zone. Note that the Forward-mapping Zone Selector dialog
box displays only the DNS zones that are associated with the selected DNS view. The zones you select here
are written to the dhcpd.conf file and the dhcpdv6.conf file as “zone” statements with the matching TSIG
key of the DNS view, so the updates are sent to the correct DNS view.
4. Save the configuration and click Restart if it appears at the top of the screen.
However, your DNS configuration might require that the NIOS appliance handle DNS record updates differently than
described in draft-ietf-dhc-dhcp-dns-12.txt. Your specific requirements might benefit from less-stringent verification
of the DHCID, or might require skipping verification entirely. Verification checks might cause complications in some
specific cases described below:
• Mobility: The TXT record is based on the DHCID unique to each client and is usually based on the MAC address
or DUID of the interface. Devices such as laptops that connect to both wired and wireless networks have
different MAC addresses or DUIDs and different DHCID values for each interface. In this scenario, after either
one of the network interfaces inserts a DNS record, updates are allowed from that interface only. This results in
a disruption of service for DDNS updates when roaming between wired and wireless networks.
• Migration: The second problem occurs during a migration from non-ISC based systems to ISC systems. For
example, if the user is migrating from a Microsoft-based system, the clients have A or AAAA and PTR records in
the DDNS updates but no TXT records. As a result, new DDNS updates fail after the migration.
• Mixed Environments: The final problem occurs in mixed ISC and non-ISC environments. For example, assume
that both Microsoft and ISC DHCP servers update DNS records on the appliance. Since the Microsoft DHCP
server does not insert the TXT records, updates from ISC-based systems fail while updates from the Microsoft
DHCP server are committed into the database.
The NIOS appliance offers four modes to handle DDNS updates as described in Figure 21.4 on page 926:
Depending on your expected usage, you must carefully consider the various options for update verification. The
following section illustrates recommendations for each verification option:
• Standard ISC: This method is the most stringent option for verification of updates. This is the default.
• ISC Transitional: This method is useful during migrations from systems that do not support the TXT record to
systems that are ISC-based.
• Check TXT only: This method is useful for the roaming laptop scenario. The NIOS appliance checks that a TXT
record exists, but does not check the value of the TXT record.
• No TXT record: This method should be used with caution because anyone can send DDNS updates and
overwrite records. This method is useful when both ISC and non-ISC-based DHCP servers and clients are
updating the same zone. Infoblox recommends that you allocate a DNS zone for this authentication method, as
a precaution.
Note: In certain situations, when a DHCP lease expires, the DHCP server might remove the TXT record even if there is
no A or AAAA record.
You can enable this feature at the Grid level. To configure TXT record handling on the DHCP server:
1. From the Data Management tab, select the DHCP tab, expand the Toolbar and click Grid DHCP Properties.
2. In the IPv4 DDNS -> Advanced tab or the IPv6 DDNS -> Advanced tab, select one of the following from the TXT
(DHCID) Record Handling drop-down list:
— Check Only: Select this check box to enable minimal checking of DDNS updates. Specifically, A or AAAA
records are modified only if a TXT record exists. The NIOS appliance checks that a TXT record exists, but
does not check its value.
— ISC: Select this check box to enable standard ISC (Internet Systems Consortium) handling for DDNS
updates. Specifically, A or AAAA records are modified or deleted only if the TXT records match. This option is
the default setting on the appliance.
— ISC Transitional: Select this check box to enable less stringent handling of DDNS updates. Specifically, the
NIOS appliance enables you to add or modify A or AAAA records whether or not TXT records exist. It checks
whether a TXT record exists and then processes the update. If the appliance does not find a TXT record, it
adds the record.
— No TXT Record: Select this check box to disable TXT record checking. Specifically, A or AAAA records are
added, modified, or deleted whether or not the TXT records match. No TXT records are added, and existing
TXT records are ignored.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: Whether you deploy NIOS appliances in a Grid or independently, they send updates to UDP port 53. Grid
members do not send updates through a VPN tunnel. Grid members do, however, authenticate updates
between them using TSIG (transaction signatures) based on an internal TSIG key.
Note: Ensure that you understand how the appliance handles match lists before you specify the list of IP sources
for DDNS updates, as described in Managing the Order of Match Lists on page 489.
Note: You must enable GSS-TSIG signed updates to receive DDNS updates from TSIG key based ACEs. For
information about how to enable this, see Accepting GSS-TSIG Updates on page 957.
— Any Address/Network: Select this to receive DDNS updates from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
— Allow GSS-TSIG signed updates: This check box is selected only if you have enabled GSS-TSIG signed
updates.
4. Optionally, you can:
— Modify an item on the list by selecting it and clicking the Edit icon.
— Remove an item from the list by selecting it and clicking the Delete icon.
— Move an item up or down the list. Select it and drag it to its new position, or click the up or down arrow. The
appliance applies permissions to items in the order they are listed.
5. Save the configuration.
Forwarding Updates
When a secondary DNS server receives DDNS updates, it must forward the updates to the primary server because it
cannot update zone data itself. In such situations, you must enable the secondary server to receive updates from the
DHCP server, and then forward them to the primary DNS server.
To configure the secondary server to accept and forward updates for all zones:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member check box ->
Edit icon.
Zones: From the Data Management tab, select the DNS tab and click the Zones tab-> dns_view -> zone check box
-> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the editor, click Toggle Advanced Mode.
3. When the additional tabs appear, click the Advanced subtab of the Updates tab, and then complete the
following:
— Allow secondary name servers to forward updates: Select this check box.
— Forward updates from: This is available only for authoritative zones. Click Add. Depending on the item that
you select, Grid Manager either adds a row for the selected item or expands the panel so you can specify
additional information about the item you are adding, as follows:
— None: Select this to deny DDNS updates from any clients. This is selected by default.
— Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this option, the appliance receives DDNS
updates from the sources that have the Allow permission in the named ACL. You can click Clear to remove
the selected named ACL.
— Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following from
the drop-down list. Depending on the item you select, Grid Manager either adds a row for the selected item
or expands the panel so you can specify additional information about the item you are adding, as follows.
— IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the Value field
and enter the IP address. The Permission column displays Allow by default. You can change it to Deny
by clicking the field and selecting Deny from the drop-down list.
— IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
— IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add the
network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
— TSIG Key: In the Add TSIG Key panel, complete the following, and then click Add to add the TSIG key to
the list:
• Key name: Enter a meaningful name for the key, such as a zone name or the name of a remote
name server. This name must match the name of the same TSIG key on other name servers.
• Key Algorithm: Select either HMAC-MD5 or HMAC-SHA256.
• Key Data: To use an existing TSIG key, type or paste the key in the Key Data field. Alternatively, you
can select the key algorithm, select the key length from the Generate Key Data drop down list, and
then click Generate Key Data to create a new key.
Note: You must enable GSS-TSIG signed updates to receive DDNS updates from TSIG key based ACEs. For
information about how to enable this, see Accepting GSS-TSIG Updates on page 957.
— Any Address/Network: Select to allow or disallow the appliance to receive DDNS updates from any IP
address.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this
operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Save the configuration and click Restart if it appears at the top of the screen.
Infoblox
DHCP Server
TCP/IP Network Note: For clarity, the DHCP
Configuration Requests and DNS servers are shown
1 on separate appliances. A
single appliance can also
provide both services.
AD/Kerberos
Connections
Infoblox
DNS Server
Clients
3
DNS Queries
and
DDNS Updates
About GSS-TSIG
GSS-TSIG (Generic Security Service Algorithm for Secret Key Transaction) is used to authenticate DDNS updates. It is
a modified form of TSIG authentication that uses the Kerberos v5 authentication system.
GSS-TSIG involves a set of client/server negotiations to establish a “security context.” It makes use of a Kerberos
server (running on the AD domain controller) that functions as the KDC (Kerberos Key Distribution Center) and
provides session tickets and temporary session keys to users and computers within an Active Directory domain. The
client and server collaboratively create and mutually verify transaction signatures on messages that they exchange.
Windows 2000 server, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server
2012, and Windows Server 2012 R2 all support DDNS updates using GSS-TSIG.
You can configure the appliance to accept GSS-TSIG signed DDNS updates from a single client or multiple clients that
belong to different AD domains in which each domain have a unique GSS-TSIG key. You can also configure the
appliance to support one or multiple GSS-TSIG keys for each Grid member. For information about how to configure
GSS-TSIG for DHCP and DNS, see Configuring GSS-TSIG keys on page 944. This feature also supports HA pairs and is
compatible with DNS zones that have multiple primary servers configured. For more information about HA pairs and
DNS zones with multiple primary servers, see About HA Pairs on page 282 and Assigning Zone Authority to Name
Servers on page 839 respectively.
You can upload keytab files that contain one or multiple GSS-TSIG keys and manage the keys globally. NIOS supports
up to 256 GSS-TSIG keys for each member in the Grid. NIOS logs administrative changes to GSS-TSIG keys in the audit
log and failures in parsing or loading the keytab files in the syslog. Note that this feature is enabled only when you
have installed the DNS license.
Note: For information about GSS-TSIG, see RFC 3645, Generic Security Service Algorithm for Secret Key Transaction
Authentication for DNS (GSS-TSIG).
A NIOS appliance can use GSS-TSIG authentication for DDNS updates for either one of the following:
• A NIOS appliance serving DHCP can send GSS-TSIG authenticated DDNS updates to a DNS server in an AD
domain or multiple AD domains whose domain controller is running Windows Server 2003, Windows Server
2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. The DNS server can be in
the same AD domain as the DHCP server or in a different domain.
— For information about sending secure DDNS updates to a DNS server in the same domain, see Sending
Secure DDNS Updates to a DNS Server in the Same Domain on page 933.
— For information about sending secure DDNS updates to a DNS server in a different domain, see Sending
Secure DDNS Updates to a DNS Server in Another Domain on page 941
• A NIOS appliance serving DNS can accept GSS-TSIG authenticated DDNS updates from DHCP clients and servers
in an AD domain or multiple AD domains whose domain controller is running Windows 2000 Server, Windows
Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012
R2.
— For information, see Accepting GSS-TSIG-Authenticated Updates on page 951.
Note: A NIOS appliance cannot support both of these features at the same time.
Figure 21.6 An Infoblox DHCP Server Sends GSS-TSIG Updates to a DNS Server
2 a
TKEY Negotiations
(GSS Handshake) b
DHCP 3 a
b
DDNS 4 c1 c2
Update
c3
After you enable the NIOS appliance to send GSS-TSIG authenticated updates to a DNS server, the following process
occurs:
1. Kerberos – Login, and TGT and Service Ticket Assignments
a. The Infoblox appliance automatically logs in to the AD/Kerberos server.
b. The Kerberos server sends the appliance a TGT (ticket-granting ticket).
c. Using the TGT, the appliance requests a service ticket for the DNS server.
d. The Kerberos server replies with a service ticket for that server.
2. TKEY negotiations (GSS Handshake):
a. The appliance sends the DNS server a TKEY (transaction key) request. A Transaction Key record establishes
shared secret keys for use with the TSIG resource record. For more information, see RFC 2930, Secret Key
Establishment for DNS (TKEY RR).
The request includes the service ticket. The service ticket includes the appliance’s principal and proposed
TSIG (transaction signature) key, along with other items such as a ticket lifetime and a timestamp.
b. The DNS server responds with a DNS server-signed TSIG, which is a “meta-record” that is never cached and
never appears in zone data. A TSIG record is a signature of the update using an HMAC-MD5 hash that
provides transaction-level authentication. For more information, see RFC 2845, Secret Key Transaction
Authentication for DNS (TSIG).
Figure 21.7 Adding an Infoblox DHCP Server to an AD Environment with GSS-TSIG Support
1 Add a user account for the 2 Generate the keytab file for the
Keytab
Infoblox DHCP server. DHCP server account and export it
File
from the Kerberos server to a local
User Account directory on your management
system. Administrator’s
Management
System
AD (Active Directory)
Kerberos Server 3 Import the keytab file to
DNS Server the NIOS appliance.
AD DNS
Zones
The Infoblox DHCP server can send GSS-TSIG-signed DDNS updates to a DNS server for one domain only, though
multiple Infoblox DHCP servers can update that domain. If you want more than one Infoblox DHCP server to update a
DNS domain, you can either import the same keytab file to the other Infoblox DHCP servers or generate and import a
different keytab file. In a Grid, each member can update a different domain.
Note: For GSS-TSIG authentication to work properly, the system clock times of the Infoblox DHCP server, AD domain
controller and DNS server must be synchronized. One approach is to use NTP and synchronize all three devices
with the same NTP servers.
To use an AD domain controller as a Kerberos Key Distribution Center, complete the following tasks on an
AD/Kerberos server:
1. Add a user account for the NIOS appliance to the AD domain controller. For information, see Creating an AD User
Account on page 935.
2. Generate the keytab file for the NIOS appliance account and export it from the AD domain controller to a local
directory on your management system. For information, see Generating and Exporting the Keytab File on page
935.
To configure a NIOS appliance to support AD and send GSS-TSIG secure DDNS updates to a DNS server, complete the
following tasks on a NIOS appliance:
1. Import the keytab file from your management system to the appliance and enable GSS-TSIG dynamic updates at
the Grid or member level. For information, see Enabling GSS-TSIG Authentication for DHCP on page 945.
2. Configure the appliance to send GSS-TSIG dynamic updates to forward-mapping and optionally, reverse-mapping
zones on the DNS server. For information, see Managing GSS-TSIG keys on page 948.
Note: The name that you enter in the User logon name is the name that you later use when exporting the keytab
file. This is also the principal name. The text in the First name, Initials, Last name, and Full name fields is
irrelevant to this task.
The AD domain controller automatically creates a Kerberos account for this user. Note the following:
• If you define an expiration date for the user account and you later create a new account when the first one
expires, the keytab for the corresponding Kerberos account changes. At that point, you must update the keytab
file on the NIOS appliance (see Generating and Exporting the Keytab File and Enabling GSS-TSIG Authentication
for DHCP on page 945). Optionally, if your security policy allows it, you can set the user account for the NIOS
appliance so that it never expires.
• If the AD domain controller is running Windows Server 2003, the user account must have the DES encryption
type enabled. You can enable this either in the Account tab of the AD domain controller when you create the
user account or by specifying +DesOnly when you use the Ktpass tool to generate the keytab file. For
instructions, see the next section, Generating and Exporting the Keytab File.
A Windows Server 2003 domain controller allows you to generate a keytab file with only one key for a principal. A
Windows Server 2008, Windows Server 2008 R2 domain controller, Windows Server 2012 or Windows Server 2012
R2 allows you to generate a keytab file with multiple keys for one principal. This is useful when the KDC has principals
with multiple encryption types. When the NIOS DHCP server uses a keytab with multiple keys, it negotiates a key
based on those in the configured keytab file.
Note: The keytab file contains highly sensitive data for the NIOS appliance account. Ensure that you store and
transport its contents securely.
Infoblox strongly recommends the following encryption types for compatibility purposes:
where:
— service_name/instance: The AD user name for the NIOS appliance and a character string. The AD user
name must match the user logon name on the AD domain controller.
— REALM: The Kerberos realm in uppercase. It must match the realm (or domain name) specified in the
–mapuser option.
For example:
C:> ktpass -princ DNS/[email protected] -mapuser [email protected] -pass 37Le37
-out ns1.keytab
Example:
ktpass -princ DNS/[email protected] -mapuser [email protected] -pass 37Le37 -out
ns1.ktb -ptype KRB5_NT_PRINCIPAL -crypto des-cbc-md5 +DesOnly
where
-princ = Kerberos principal. Note that this parameter is case sensitive. Specifies the principal name for the host
or service in this format: DNS/[email protected]
— DNS = Service name in uppercase format.
— ns1.corp100.com = Instance in FQDN (fully-qualified domain name) format; this is the same as the DNS
name of the NIOS appliance.
— GSS.LOCAL = The Kerberos realm in uppercase format. This must be the same as the AD domain name.
-mapuser = Maps the Kerberos principal name to the AD user account. If you omit the account name, mapping is
deleted from the specified principal. You can use ksetup without any parameters or arguments to see the
current mapped settings and the default realm. Example: ksetup /mapuser <Principal> <Account>. To
create an AD user account, see Creating an AD User Account on page 935.
— jsmith = The AD user name for the NIOS appliance.
— GSS.LOCAL = The Kerberos realm in uppercase. The realm (or domain name) must be the same as that
specified in the -princ option.
-pass = The AD user account password. The Ktpass command changes the account password to the specified
value, thus incrementing the version number of the user account and the resulting keytab file.
— 37Le37 = The password of the user account for the NIOS appliance.
-out = The name of the keytab file that is generated.
— ns1.ktb = The name of the keytab file
-ptype = Sets the principal type. This must be krb5_nt_principal.
-crypto = Specifies the encryption type. This must be des-cbc-md5. DES-CBC-MD5 adheres to the MIT
implementation and is used for compatibility.
+DesOnly = Specifies DES encryption for the account. This is set by default on the Windows Server 2008.
Include this if you did not enable DES encryption for the account. Note that Windows 7 and Windows Server
2008 R2 do not support DES by default.
Note: Note that the Windows Server 2003 does not support AES encryption.
After you execute the command to generate the keytab file, the AD domain controller displays a series of messages
similar to the following to confirm that it successfully generated the keytab file:
Targeting domain controller: ibtest-xu5nxd56.corp100.local
Using legacy password setting method
Successfully mapped dns/anywhere to dns.
Key created.
Output keytab to dns.ktb:
Keytab version: 0x502
keysize 56 dns/[email protected] ptype 1 (KRB5_NT_PRINCIPAL) vno 5 etype
0x3 (DES-CBC-MD5) keylength 8 (0xbae610f11552c80b)
Note: You must not use +Desonly with /crypto all or other non-DES encryption types.
+setpass = Sets a new AD user account password. This is required if the +DesOnly option is specified. When you
use this encryption type, you must change the user’s password. Otherwise, the ticket issued for the principal
becomes unusable.
After you execute the command to generate the keytab file, the AD domain controller displays a series of messages
similar to the following to confirm that it successfully generated the keytab file:
Targeting domain controller: qacert.test.local
Using legacy password setting method
Successfully mapped DNS/ns1.corp100.com to ns1.
Key created.
Output keytab to ns1.ktb:
Keytab version: 0x502
keysize 80 DNS/[email protected] ptype 1 (KRB5_NT_PRINCIPAL) vno 3 etype 0x12
(AES256-SHA1)
keylength 32 (0xea8675d7abf13fd760a744088642fb917ceb6c9d267f5c54e595597846f06407)
Figure 21.8 Sending Secure DDNS Updates to a DNS Server in Another Domain
ib.child.corp100.com ad.child.corp100.com
DHCP Server Kerberos Server
AD Domain Controller
2 ad.corp100.com
Kerberos Server
AD Domain Controller
3 ns1.corp100.com
DNS Server
10.23.2.24
After you configure the Infoblox DHCP server and AD domain controller, the following occurs:
1. Kerberos – In Same Domain
The Infoblox DHCP server uses the TGT (ticket-granting ticket) from the AD/Kerberos server,
ad.child.corp100.com, to request a service ticket for DNS/[email protected]. The Kerberos
server replies with a referral ticket for the Kerberos server in the corp100.com domain, ad.corp100.com.
2. Kerberos — In the Other Domain
The Infoblox DHCP server uses the referral ticket and requests a service ticket from ad.corp100.com for
DNS/[email protected]. The Kerberos server replies with a service ticket for
DNS/[email protected].
3. TKEY Negotiations (GSS Handshake)
The Infoblox DHCP server sends the DNS server ns1.corp100.com a TKEY (transaction key) request, which
includes the service ticket. The DNS server replies with a TKEY response that includes a TSIG (transaction
signature). The Infoblox appliance and the DNS server have established a security context, enabling the DHCP
server to send DDNS updates to the DNS server.
Configuration Example
Following are the steps to configure the example shown in Figure 21.8:
On the AD domain controller:
1. Create a user account for the Infoblox DHCP server. The user account is ibdhcp.
2. Generate the keytab file and export it to your management system. If the domain controller is running Windows
Server 2003:
ktpass -princ ibdhcp/[email protected] -mapuser
[email protected] -pass infoblox -out ibdhcp.ktb -ptype krb5_nt_principal -crypto
des-cbc-md5 +desonly
On the Infoblox DHCP server:
1. Enable GSS-TSIG at the member level.
2. From the DHCP tab, click the Members tab -> member check box -> Edit icon.
3. In the DDNS -> Basic tab of the editor, complete the following:
— Override: Select this check box.
— DDNS Updates: Select the Enable DDNS Updates check box.
— GSS-TSIG: Select Override and complete the following:
— Enable GSS-TSIG Updates: Select this check box.
— Domain Controller: Enter ad.child.corp100.com. This is the KDC in the domain of the DHCP server.
— GSS-TSIG Key: Click Manage Keytab Files. In the Keytab File Manager dialog box, click the Add icon. Click
Browse, navigate to the keytab file, select it, and then click Upload.
Figure 21.9 Sending Secure DDNS Updates to a DNS Server in Another Forest
ib.child.corp100.com
DHCP Server
ad.child.corp100.com
Kerberos Server
AD Domain Controller
ad.corp200.com ns1.corp200.com
Kerberos Server DNS Server
AD Domain Controller
ad.corp100.com
Kerberos Server
AD Domain Controller
Scheduled Upgrade
A scheduled upgrade with one or more keys in the keytab files that you have uploaded will operate the same as prior
to upgrade. NIOS will parse and extract keys from the uploaded keytab file. NIOS automatically assigns these keys to
the DNS member, DHCP member, Grid DHCP or Grid DNS to which the keytab file was uploaded before the upgrade.
You can assign these keys to Grid members after the upgrade is complete.
NIOS does not display an error message if the keys do not have an SPN with the DNS prefix, but it will record a warning
message in the syslog.
— DDNS Domain Name: Specify the domain name of the network that the appliance uses to update DNS. For
IPv4 clients, you can specify this at the network, network template, range, and range template levels. For
IPv6 clients, you can specify this at the Grid, member, network, shared network, and network template
levels.
— DDNS Update TTL: You can set the TTL used for A record and PTR records updated by the DHCP server. The
default is shown as zero. If you do not enter a value here, the appliance by default sets the TTL to half of the
DHCP lease time with a maximum of 3600 seconds. For example, a lease time of 1800 seconds results in a
TTL of 900 seconds, and a lease time of 86400 seconds results in a TTL of 3600 seconds.
— GSS-TSIG: Complete the following:
— Enable GSS-TSIG Updates: Select this to enable the DHCP server to send GSS-TSIG authenticated DDNS
updates.
— Manage Keytab Files: To upload a keytab file, click Manage GSS-TSIG keys. In the Manage GSS-TSIG
Keys dialog box, click the Add icon. In the Upload dialog box, click Select, navigate to the keytab file,
select it, and then click Upload. You can also delete individual keys. For more information about
managing GSS-TSIG keys, see Managing GSS-TSIG keys on page 948.
— Domain Controller: Enter the resolvable host name or IP address of the AD domain controller that hosts
the KDC for the domain.
— Principal: The principal member of the key. For GSS-TSIG based DDNS updates, the SPN of the key used
to carry out the update does not require the server class ‘DHCP.’ You can either specify an FQDN or an IP
address for the <host> of an SPN.
— GSS-TSIG Key: Select the name of the GSS-TSIG key from the drop-down list that you want the Grid to
use. This is only available if you have uploaded a keytab file. Click the arrow beside the Add icon to
either assign keys or upload and assign keys. You can either select Assign Keys or Upload&Assign Keys
from the drop-down list.
• Assign Keys: Select Assign Keys to select a GSS-TSIG key from the GSS-TSIG Key Selector. Click
Principal, which is displayed as a hyperlink, to select it. For more information about the GSS_TSIG
Key Selector, see Selecting Keys in the GSS-TSIG Key Selector on page 949.
• Upload&Assign Keys: Select Upload&Assign Keys to upload and assign keys. In the Upload dialog
box, select the file and navigate to the file you want to upload. Click Upload. The appliance assigns
the keys contained in the selected keytab file.
— The following are displayed in the table:
• Version: The version of the key.
• Encryption type: The encryption type of the key.
• Last update: The timestamp when the key was uploaded.
— Zones this member can update securely: Click Display to list the external zones to which the Grid member
can send secured DDNS updates.
— Lease Renewal Update: Select Update DNS on DHCP Lease Renewal to enable the DHCP server to update
DNS when a DHCP lease is renewed.
3. Save the configuration and click Restart if it appears at the top of the screen.
2. In the IPv4 DDNS tab or the IPv6 DDNS -> Basic tab of the editor, select keys from the list under GSS-TSIG Keys
and click the Delete icon to delete keys.
Logging Messages
The appliance saves the audit log entries for insert and delete operations. If you upload keys with encryption types
other than the ones that NIOS supports, the appliance displays a warning message in Grid Manager and in the syslog
and also it displays the encryption type as other in Grid Manager and in the syslog. For more information about the
syslog, see Using a Syslog Server on page 1334.
The appliance generates an audit log when you upload a key, assign the key to a member, remove the key associated
with a member or delete a key. The audit log entries are based on each key that you have uploaded. For example,
NIOS saves the following in the audit log when you upload a key:
2014-02-14 18:17:30.531Z [admin]: imported DNS Kerberos key for
principal='DNS/[email protected]', version=5, enctype=des-cbc-crc
For more information about audit logs, see Using the Audit Log on page 1344. You can search Kerberos keys using
the realm (domain), principal name or an encryption type.
The appliance generates a comment in the option section of the DNS configuration file for each Kerberos principal
that is associated with the Grid member. These comments are for information only and it indicates the principals,
their versions and encryption types that are used by the appliance.
8. Specify the domain controller from which the appliance can receive DDNS updates. An AD domain
controller replicates its data among other domain controllers within its AD domain and among domain
controllers in other domains.
9. Import zone data from the specified domain controller.
10. Enable the acceptance of DDNS updates from the AD domain controller and from the DHCP clients and
servers whose addresses the DHCP server assigns. You can set this at the Grid, member, and zone levels.
11. (For GSS-TSIG) Enable acceptance of GSS-TSIG DDNS updates from the AD domain controller and from the
addresses that the DHCP server assigns. You can set this at the Grid, member, and zone levels.
As you can see from the above task list, adding a NIOS appliance that serves DNS to an AD environment without
GSS-TSIG support involves four simple steps. To include GSS-TSIG support, there are several additional steps.
Configuring AD Support
You can configure a forward-mapping zone to support AD from the Active Directory wizard or from the Active Directory
tab of the Authoritative Zone editor. This section describes both methods.
To configure AD support using the Active Directory wizard:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Configure Active Directory.
Note that from the Zones tab, you must select a zone before you click Configure Active Directory.
2. In the Active Directory wizard, complete the following, and then click Next:
— Select Zone: Click this and select a zone. The name of the zone must match the name in the AD domain
controller so the zone transfer from the AD domain controller to the NIOS appliance can succeed.
— Allow unsigned updates from Domain Controllers: Select this option.
If you have configured DNS resolvers in the Grid, the appliance sends DNS queries for the names and addresses
of the AD domain’s domain controllers. Since the name of the zone that you selected is the same as the AD
domain name on the domain controller, the appliance can then send a DNS query for the SRV records attached
to the domain name. It also sends a DNS query for the A record of each domain controller to determine its IP
address. The query results are listed in the next panel.
3. You can edit the list of domain controllers, if necessary. Click Next to proceed to the next step.
— To add a domain controller, click the Add icon and specify the IP address.
— To delete a domain controller from the list, select it and click the Delete icon.
4. Complete the following:
— Do you want to create underscore zones to hold the records added by the Domain Controllers?
This option allows the appliance to create the following subzones that the DNS server must have to answer
AD-related DNS queries:
_msdcs.zone
_sites.zone
_tcp.zone
_udp.zone
domaindnszones.zone
forestdnszones.zone
Note that these zones are automatically generated. You cannot edit these zones or import data into them.
They cannot be modified, thus providing protection against forged updates.
5. Save the configuration and click Restart if it appears at the top of the screen.
To configure AD support using the Authoritative Zone editor:
1. From the Data Management tab, select the DNS tab -> Zones tab -> zone check box -> Edit icon.
2. In the Authoritative Zone editor, select the Active Directory tab and do the following:
— Allow unsigned updates from these Domain Controllers: Select this check box and specify the AD domain
controllers from which the appliance can receive DDNS updates.
— Automatically create underscore zones: Select this check box to automatically create the subzones.
3. Save the configuration and click Restart if it appears at the top of the screen.
You can then import zone data, as described in Importing Data into Zones on page 851.
Note: For explanations of the alphanumerically notated steps in Figure 21.10, see the section following the
illustration.
DHCP 1 a
b
Active 2 a
Directory
b
DNS 3 a
Query
b
Kerberos 4 a
b
c
d
a1
Unauthenticated DDNS
a2 Update Attempt (Refused)
b1
DDNS 5 TKEY Negotiations
Update b2 (GSS Handshake)
c1
c2 GSS-TSIG-Authenticated
DDNS Update (Accepted)
c3
Note: Computer accounts have passwords that the AD domain controller and computer maintain automatically.
There are two passwords for each computer: a computer account password and a private key password.
By default, both passwords are automatically changed every 30 days.
Note: For GSS-TSIG authentication to work properly, the system clock times of the Infoblox DHCP server, AD domain
controller and DNS server must be synchronized. One approach is to use NTP and synchronize all three devices
with the same NTP servers.
1 Add a user account 2 Generate the keytab file for the Keytab
for the DNS server. DNS server account and export it File
from the Kerberos server to a local Administrator’s
User Account directory on your management Management
system. System
AD (Active Directory)
Kerberos Server
3 Import the keytab file to
the NIOS appliance.
4 Create a forward-mapping
zone and import zone data NIOS
from the AD domain Appliance
controller.
Note: Make sure that zone
transfers from the AD domain
controller to the NIOS
appliance are enabled.
AD DNS Forward-
Zone corp100.com Import Zone Data corp100.com Mapping
Zone
Note: The name you enter in the User logon name is the name that you later use when exporting the keytab file.
This is also the principal name. The text in the First name, Initials, Last name, and Full name fields is
irrelevant to this task.
The AD domain controller automatically creates a Kerberos account for this user with an accompanying keytab. Note
the following:
• If you define an expiration date for the user account and you later create a new account when the first one
expires, the keytab for the corresponding Kerberos account changes. At that point, you must update the keytab
file on the NIOS appliance (see Generating and Exporting the Keytab File and Importing the Keytab File and
Enabling GSS-TSIG Authentication on page 957). Optionally, if your security policy allows it, you can set the
user account for the NIOS appliance so that it never expires.
• If the AD domain controller is running Windows Server 2003, the user account must have the DES encryption
type enabled. You can enable this either in the Account tab when you create the user account or by specifying
+DesOnly when you use the Ktpass tool to generate the keytab file.
— ns1.corp100.com = Instance in FQDN (fully-qualified domain name) format; this is the same as the DNS
name of the NIOS appliance
— CORP100.COM = The Kerberos realm in uppercase format; this must be the same as the AD domain
name
-mapuser = Maps the Kerberos principal name to the AD user account
— [email protected] = The AD user name for the NIOS appliance
-pass = The AD user account password
— 37Le37 = The password of the user account for the NIOS appliance
-out = Exports the keytab file
— ns1.keytab = The name of the keytab file
-ptype = Sets the principal type. This must be krb5_nt_principal.
-crypto = Specifies the encryption type. This must be des-cbc-md5.
+DesOnly = Specifies DES encryption for the account. Include this if you did not enable DES encryption for the
account.
Note: The keytab file contains highly sensitive data for the NIOS appliance account. Ensure that you store and
transport its contents securely.
— Select Zone: Click this and select a zone. The name of the zone must match the name in the AD domain
controller so the zone transfer from the AD domain controller to the NIOS appliance can succeed.
— Allow GSS-TSIG-signed (secure) updates from Domain Controllers: Select this option.
3. Complete the following:
— Do you want to create underscore zones to hold the records added by the Domain Controllers?
This option allows the appliance to create the following subzones that the DNS server must have to answer
AD-related DNS queries:
_msdcs.zone
_sites.zone
_tcp.zone
_udp.zone
domaindnszones.zone
forestdnszones.zone
Note that these zones are automatically generated. You cannot edit these zones or import data into them.
— Allow GSS-TSIG-signed updates to underscore zones: Select this check box to allow underscore zones to
accept GSS-TSIG signed updates.
4. Save the configuration and click Restart if it appears at the top of the screen.
To use the Authoritative Zone editor:
1. From the Data Management tab, select the DNS tab -> Zones tab -> zone check box -> Edit icon.
2. In the Authoritative Zone editor, select the Active Directory tab and do the following:
— Allow unsigned updates from these Domain Controllers: Clear this check box.
— Automatically create underscore zones: (select)
This option automatically creates the following subzones that the DNS server must have to answer
AD-related DNS queries:
_msdcs.zone
_sites.zone
_tcp.zone
_udp.zone
domaindnszones.zone
forestdnszones.zone
Note that these zones are automatically generated and cannot be manually edited.
— Allow GSS-TSIG-signed updates to underscore zones: Select this check box to allow underscore zones to
accept GSS-TSIG signed updates.
3. Save the configuration and click Restart if it appears at the top of the screen.
Failed attempts to dynamically update secured records are recorded in the NIOS syslog. You can view it, as described
in Viewing the Syslog on page 1341 and Searching in the Syslog on page 1343.
You can use Smart Folders to organize data by record source, principal, or protection state. For more information, see
Chapter 3, Smart Folders, on page 173.
In addition, you can use Global Search to search for records by principal name. For more information, see Using
Global Search on page 78.
Note: To use the secure dynamic updates feature, you must have a DNS license installed in the Grid Manager.
Note: For this option to work, ensure that you have selected Enable GSS-TSIG authentication of clients in the
GSS-TSIG properties of the Grid or the corresponding zone or view.
4. Select Require the appropriate GSS-TSIG principal to update RRsets that track principals.
5. Optionally, specify an active dynamic update group.
6. Click Save & Close.
Note: Viewing and modifying the configuration of a dynamic update group requires Grid DNS permissions. Selecting
a group as active for the Grid, a view, or a zone requires read permission on the Grid DNS, as well as write
permission on the object being modified.
Note: Use the DNS Traffic Control LBDN wild cards to specify FQDN patterns. For more information, see
Configuring LBDN Patterns on page 1022.
— To delete an FQDN pattern, select the check box next to the pattern and click the Delete icon.
4. Click Save & Close.
About DNSSEC
DNSSEC (DNS Security Extensions) provides mechanisms for authenticating the source of DNS data and ensuring its
integrity. It protects DNS data from certain attacks, such as man-in the middle attacks and cache poisoning. A
man-in-the middle attack occurs when an attacker intercepts responses to queries and inserts false records. Cache
poisoning can occur when a client accepts maliciously created data. DNSSEC helps you avoid such attacks on your
networks.
DNSSEC provides changes to the DNS protocol and additional resource records (RRs) as described in the following
RFCs:
• RFC 4033, DNS Security Introduction and Requirements
• RFC 4034, Resource Records for the DNS Security Extensions
• RFC 4035, DNSSEC Protocol Modifications
• RFC 4641, DNSSEC Operational Practices
• RFC 4956, DNS Security (DNSSEC) Opt-In
• RFC 4986, Requirements Related to DNS Security (DNSSEC) Trust Anchor Rollover
• RFC 5155, DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
• RFC 5702, Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC
DNSSEC uses public key cryptography to authenticate the source of DNS responses and to ensure that DNS responses
were not modified during transit. Public key cryptography uses an asymmetric key algorithm. With asymmetric keys,
one key is used to decrypt data that was encrypted using the other key.
In DNSSEC, the primary name server of a zone generates at least one public/private key pair. It “signs” each data set
in the zone by running it through a one-way hash, and then encrypting the hash value with the private key. The public
key is stored in an RR type introduced by DNSSEC, the DNSKEY RR. Resolvers use the DNSKEY record to decrypt the
hash value. If the hash values match, then the resolver is assured of the authenticity of the message.
In addition to the DNSKEY record, DNSSEC also introduces new RRs which DNS servers can use to authenticate the
non-existence of servers, zones, or resource records. For information about the DNSSEC resource records, see
DNSSEC Resource Records on page 966.
DNSSEC uses the EDNSO message extension. Resolvers include the EDNS OPT pseudo-RR with the DO (DNSSEC OK)
bit set to indicate that they are requesting DNSSEC records. A DNS client or resolver sets the EDNS DO bit when it
sends a query for data in a signed zone. When the DNS server receives such a query, it includes the additional
DNSSEC records in its response, according to the DNSSEC standard rules. In addition, because DNSSEC messages are
often large, the EDNSO message extension also provides mechanisms for handling larger DNS UDP messages. For
information about EDNS0, refer to RFC 2671, Extension Mechanisms for DNS (EDNS0). For information about the DO
bit, refer to RFC 3225, Indicating Resolver Support of DNSSEC.
WARNING: Note that when you disable EDNS0 on the appliance, all outgoing DNSSEC queries to zones within
trusted anchors will fail even if DNSSEC validation is enabled. To ensure that DNSSEC functions
properly, do not disable EDNS0 on the appliance. For more information, see Using Extension
Mechanisms for DNS (EDNS0) on page 761.
DNSSEC also supports new data in the packet header, the CD (Checking Disabled) bit and the AD (Authenticated Data)
bit. The CD bit is used by resolvers in their DNS queries and the AD bit is used by recursive name servers in their
responses to queries.
A resolver can set the CD bit in its query to indicate that the name server should not validate the DNS response and
that the resolver takes responsibility for validating the DNS data it receives.
A name server that has successfully validated the data in a DNS response sets the AD (Authenticated Data) bit in the
message header to indicate that all resource records in its response have been validated and are authentic. Note that
unless the connection between the DNS server and client has been secured, such as through TSIG, the client cannot
rely on the AD bit to indicate valid data. The data could have been changed in transit between the server and client.
Resolvers can trust a response with the AD bit set only if their communication channel is secure.
You can also configure the NIOS appliance to always apply RPZ policies, DNS blacklists, or NXDOMAIN rules to DNS
responses, regardless of whether the queries request DNSSEC data. For more information about how to configure
this, see Applying Policies and Rules to DNS Queries that Request DNSSEC Data on page 995. For information about
RPZ policies, DNS blacklists, and NXDOMAIN rules, see their respective sections in this guide.
Note: The appliance supports IDNs for DNSKEY records, DS records, NSEC records, NSEC3PARAM records, and RRSIG
records.
Note: For the remainder of this chapter, the DNSKEY record that holds the public key of the ZSK pair is referred to as
the ZSK and the DNSKEY record that holds the public key of the KSK is referred to as the KSK.
The purpose of the KSK is two-fold. First, it is referenced in the Delegation Signer (DS) RR that is stored in a parent
zone. The DS record is used to authenticate the KSK of the child zone, so a resolver can establish a chain of trust from
the parent zone to its child zone. (For more information about the DS RR, see DS Resource Records on page 970).
Second, if a zone does not have a chain of trust from a parent zone, security aware resolvers can configure the KSK
as a trust anchor; that is, the starting point from which it can build a chain of trust from that zone to its child zones.
Note that though the two key pairs, KSK and ZSK, are used in most DNSSEC environments, their use is not required
by the RFCs. A zone administrator can use a single private/public key pair to sign all zone data. (Note that Infoblox
appliances require two key pairs.)
Protocol
The first four fields specify the domain name of the zone that owns the key, the resource record TTL, class, and RR
type. The succeeding fields are:
• Flags Field: In its wire format, this field is two bytes long. (The wire format is used in DNS queries and
responses.) Bits 0 through 6 and 8 through 14 are reserved, and have a value of 0. Bit 7 indicates if the record
holds a DNS zone key. Bit 15 is the Secure Entry Point (SEP) flag, which serves as a hint that indicates whether
the DNSKEY record contains a ZSK or a KSK, as described in RFC 3757, DNSKEY RR SEP Flag. Zone administrators
typically set the SEP flag of a DNSKEY record of a zone when it contains the KSK, to indicate that it can be used
as a trust anchor. However, a DNSKEY record that does not have the SEP flag set can also be used as a trust
anchor.
Given the currently defined flags, in its text format, the flags field is represented as an unsigned decimal integer
with the possible values of 0, 256 and 257. A value of 256 indicates that the DNSKEY record holds the ZSK and
a value of 257 indicates that it contains the KSK. In general, this field contains an odd number when the
DNSKEY record holds the KSK.
• Protocol: This always has a value of 3, for DNSSEC.
• Algorithm: Identifies the public key’s cryptographic algorithm. The available types are:
— 1 = RSA/MD5
— 2 = Diffie-Hellman (This is not supported by BIND and Infoblox appliances.)
— 3 = DSA
— 4 = Reserved
— 5 = RSA/SHA1
— 6 = DSA/SHA1/NSEC3
— 7 = RSA/SHA1/NSEC3
— 8 = RSA/SHA-256
— 10 = RSA/SHA-512
• Public Key: The public key encoded in Base64.
The first four fields specify the owner name, TTL, class, and RR type. The succeeding fields are:
• Type Covered: The RR type covered by the RRSIG record. The RRSIG record in the example covers the A records
for corp100.com.
• Algorithm: The cryptographic algorithm that was used to create the signature. It uses the same algorithm types
as the DNSKEY record indicated in the Key Tag field.
• Number of Labels: Indicates the number of labels in the owner name of the signed records. There are two labels
in the example, corp100 and com.
• RRset TTL: The TTL value of the RRset covered by the RRSIG record.
• Expiration Time: The signature expiration time in UTC format.
• Inception Time: The signature inception time in UTC format.
• Key Tag: The key tag value of the DNSKEY RR that validates the signature.
• Signature Name: The zone name of the RRset.
• Public Key: The Base64 encoding of the signature.
RRsets
Owner TTL Class RR Next Owner
Name Type Name
The first four fields specify the owner name, TT, class and RR type. The succeeding fields are:
• Next Owner Name: In the canonical order of the zone, the next owner name that has authoritative data or that
contains a delegation point NS record.
• RRsets: The RRsets that exist at the owner name of the NSEC record, which are NS, SOA, RRSIG, NSEC, and
DNSKEY in the example.
Following is an example of an NSEC3 RR:
Iterations
Flags
TTL Class Algorithm
Salt Field
The first field contains the hashed owner name. It is followed by the TTL ,class and RR type. The fields after the RR
type are:
• Algorithm: The hash algorithm that was used. The currently supported algorithm is SHA-1, which is represented
by a value of 1.
• Flags Field: Contains 8 one-bit flags, of which only one flag, the Opt-Out flag, is defined by RFC 5155. The
Opt-Out flag indicates whether the NSEC3 record covers unsigned delegations.
• Iterations: The number of times the hash function was performed.
• Salt Field: A series of case-insensitive hexadecimal digits. It is appended to the original owner name as
protection against pre-calculated dictionary attacks.
• Next Owner Name: Displays the next hashed owner name.
• RRsets: The RR types that are at the owner name.
The first four fields specify the owner name, TTL, class and RR type. The succeeding fields are:
• Algorithm: The hash algorithm that was used. The currently supported algorithm is SHA-1, which is represented
by a value of 1.
• Flags Field: Contains 8 one-bit flags, of which only one flag, the Opt-Out flag, is defined by RFC 5155. The
Opt-Out flag indicates whether the NSEC3 record covers unsigned delegations.
• Iterations: The number of times the hash function was performed. The number of NSEC3 iterations is set to 10.
• Salt Field: A series of case-insensitive hexadecimal digits. It is appended to the original owner name as
protection against pre-calculated dictionary attacks. New salt value is generated when the ZSK rolls over, for
which the user can control the period. For random salt, the selected length is between one and 15 octets.
DS Resource Records
A DS RR contains a hash of a child zone's KSK and can be used as a trust anchor in some security-aware resolvers and
to create a secure delegation point for a signed subzone in DNS servers. As illustrated in Figure 22.1, the DS RR in the
parent zone corp100.com contains a hash of the KSK of the child zone sales.corp100.com, which in turn has a DS
record that contains a hash of the KSK of its child zone, nw.sales.corp100.com.
Figure 22.1
The first four fields specify the owner name, TTL, class and RR type. The succeeding fields are as follows:
• Key Tag: The key tag value that is used to determine which key to use to verify signatures.
• Algorithm: Identifies the algorithm of the DNSKEY RR to which this DS RR refers. It uses the same algorithm
values and types as the corresponding DNSKEY RR.
• Digest Type: Identifies the algorithm used to construct the digest. The supported algorithms are:
— 1 = SHA-1
— 2 = SHA-256
• Digest: If SHA-1 is the digest type, this field contains a 20 octet digest. If SHA-256 is the digest type, this field
contains a 32 octet digest.
Figure 22.2
corp100.com
Internet
ns2.corp100.com ns3.corp100.com
DNS client ns1.corp200.com Secondary Server Secondary Server
The DNSKEY of the Grid Member Grid Member
corp100.com zone is
configured as a trust anchor.
Following are the tasks to configure the Grid Master to sign zones:
1. Create the zones. For information, see Configuring Authoritative Zones on page 829.
— Specify the Grid Master as the primary server.
2. Enable DNSSEC, as described in Enabling DNSSEC.
3. Optionally, change the default DNSSEC settings. For information, see Setting DNSSEC Parameters on page 973.
4. Sign the zone. The appliance automatically generates the DNSSEC RRs when you sign a zone. For information,
see Signing a Zone on page 978.
Enabling DNSSEC
You can enable DNSSEC on a Grid, individual members, and DNS views. Because only Grid Masters can serve as
primary servers for signed zones, you must enable DNSSEC on the Grid Master before you can sign zones. You must
also enable DNSSEC on any Grid member that serves as a secondary server for signed zones.
When you enable DNSSEC on a Grid, you can set certain parameters that control the DNSSEC RRs, as described in
Setting DNSSEC Parameters on page 973.
When you enable DNSSEC on a Grid member or DNS view, you can set parameters that affect its operations as a
secondary server, as described in Configuring Grid Members to Support DNSSEC as Secondary Servers on page 991.
To enable DNSSEC on a Grid, member or DNS view:
1. Grid: From the Data Management tab, select the DNS tab. Expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the Members tab -> member check box and click the Edit icon.
DNS View: From the Data Management tab, select the Zones tab -> dns_view check box and click the Edit icon.
2. In the editor, click Toggle Expert Mode.
3. When the additional tabs appear, click DNSSEC.
4. In the DNSSEC tab, select Enable DNSSEC.
Note: When you disable EDNS0, all outgoing DNSSEC queries to zones within trusted anchors will fail even if
DNSSEC validation is enabled. This is due to the restriction of the UDP packet length when you disable
EDNS0. For information about EDNS0, see Using Extension Mechanisms for DNS (EDNS0) on page 761.
5. Save the configuration and click Restart if it appears at the top of the screen.
When a user initiates a KSK rollover, the Grid Master sets the grace period to half the KSK rollover period. It generates
a new KSK, and signs the DNSKEY records with the new KSK. Thus during the grace period, the DNSKEY records are
signed by the private keys of both the old and new KSKs. Both the old and the new KSKs can be used to validate the
zone. The grace period allows the old keys in remote caches to expire. In addition, the admin should also export the
new KSK and send it to the recursive name servers that use the KSK as trust anchors.
If the KSK rollover is for a child zone and the primary server of the parent zone is a Grid member, the Grid Master also
inserts a DS record in the parent zone for the new DNSKEY in the child zone. If the primary server of the parent zone
is external to the Grid, the admin must export either the DS record or the new KSK to the admin of the parent zone.
For information about exporting a KSK, see Exporting Trust Anchors on page 981.
The Grid Master then removes the old KSK and its RRSIG records when the grace period for the KSK rollover ends.
RRSIG Signatures
As shown in the sample RRSIG record in RRSIG Resource Records on page 968, the signatures have an inception and
an expiration time. The default validity period of signatures in RRSIG records on the Grid Master is four days. You can
change this default, as long as it is not less than one day or more than 3660 days. The Grid Master automatically
renews signatures before their expiration date.
Note: You can select the Zone-signing Key rollover method only after you enable DNSSEC.
5. Save the configuration and click Restart if it appears at the top of the screen.
When you modify the algorithms for a signed zone, you can apply the algorithm changes to the zone, as described in
Applying the Algorithm Changes on page 977 or you can unsign the zone and sign it again. For an unsigned zone
however, you can apply the algorithm changes by signing the zone. For information about signing a zone, see Signing
a Zone on page 978.
When you re-sign a zone after adding an algorithm, the DNSKEY key pairs of the old algorithms are rolled over and all
the old RRSIG records are removed. The zone is re-signed with the new DNSKEY key pairs. When you re-sign a zone
after removing an algorithm, the DNSKEY key pairs of the remaining algorithms are rolled over and the DNSKEY key
pairs of the removed algorithm is removed. All old RRSIG records are removed and the zone is re-signed with the new
DNSKEY key pairs.
Note: If you add or remove a KSK algorithm from a zone, you must update the DS RRsets at the parent zone when the
parent zone is managed by a non-Infoblox DNS server or an Infoblox server that is part of a different Grid. For
information, see Importing a Keyset on page 981.
— Time until next event: This column displays the time that is left to perform the next action for a key that is
associated with the respective ZSK. This column help you decide whether to roll over manually or wait for a
zone to resign automatically. The time is displayed in months, days, hours format. For example, 2m 3d 13 h
implies time left to perform the next action is 2 months, 3 days and 13 hours.
— Active Key: Indicates the time when the active key is rolled and zone is signed with the published key.
— Published Key: Indicates the time when the published key is used to resign a zone.
— Rolled Key: Indicates the time when a rolled key is deleted. Rolled keys are stored for quite a long
period of time and are not used. You can manually cleanup the rolled keys.
3. Click the Delete icon.
Signing a Zone
When it signs a zone, the Grid Master generates new DNSKEY key pairs. As shown in Figure 22.3, it uses the private
key of the ZSK to sign the authoritative RRsets in the zone, and stores the corresponding public key in a DNSKEY
record. It then uses the private key of the KSK to sign the DNSKEY records and stores the corresponding public key in
another DNSKEY record. It stores the private keys in the Grid database and stores the public keys in the DNSKEY
records in the database.
Zone-Signing Key-Signing
Key Pair Key Pair
Public Key
DNSKEY 257
Public Key
DNSKEY 256 DNSKEY 256
Private Key
A server1.corp100.com A server1.corp100.com
A server1.corp100.com
A ftp.corp100.com A ftp.corp100.com
A ftp.corp100.com
A sales.corp100.com A sales.corp100.com
A sales.corp100.com
A web1.corp100.com A web1.corp100.com
A web1.corp100.com
1 The A RRset is signed with the 2 The signature is stored in the 3 The private key of the KSK pair
private key of the ZSK pair. RRSIG record, the public key is signs the DNSKEY record of
stored in the DNSKEY record, and the ZSK. The public key of the
the private key is stored securely in KSK is stored in another
the Grid database. DNSKEY record.
• The appliance sets the Grid Master as the primary server for zones, enables DNSSEC on the Grid Master, and
starts DNS service on the Grid Master.
When it signs a subzone, the Grid Master automatically inserts DS records for parent zones that are hosted by Grid
members. The appliance allows you to sign a single zone or multiple zones simultaneously. For example, if you have
multiple zones that are due for rollover at the same time, you can select all such zones and sign them at once. Note
that each operation is independent of the other. For example, if you want to sign five zones at the same time, and if
one of the zones fails during this time, NIOS signs the remaining four zones. Note that the selected zones must have
an associated primary server. The appliance displays an error message if the zone does not have a primary server.
When the sign operation fails, the appliance displays the zone names, associated DNS views, and the error message
indicating the reason for failure.
To sign a zone:
1. From the Data Management tab, select the DNS tab.
2. Expand the Toolbar and click DNSSEC -> Sign Zones.
3. In the Sign Zones dialog box, the displayed zone name can either be the last selected zone or the zone from
which you are signing. If no zone name is displayed or if you want to select a different zone, click the Add icon.
The appliance displays unsigned zones only. When there are multiple zones, Grid Manager displays the Zone
Selector dialog box. Select a zone. To add multiple zones, click the Add icon and select a zone.
You can click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel,
either select Now or select Later and enter a date, time, and time zone. For information, see Scheduling Tasks
on page 85.
4. After you have selected the zones, click Sign Zones.
5. When the confirmation dialog displays, click Yes.
When you sign multiple zones, the appliance displays generic error messages for the following cases:
• The value to which the resource record TTL is reduced is not displayed.
• The appliance displays a message about name server group disassociation if at least one zone is associated
with a name server group. It will not list the affected zones.
• When you sign a zone or multiple zones, the appliance displays a warning message indicating that the
operation might take a longer time.
• The appliance displays an error message if the number of characters in the zone name, which you want to sign,
exceeds 180 characters. You can sign a zone only when the name of the zone is less than 180 characters in size.
To remove a zone from the list, select the check box adjacent to the respective zone and click the Delete icon. To view
the records of the signed zone, from the Data Management tab, select the DNS tab -> Zones tab -> zone. Expand the
Records section to list the RRs of the zone, as shown in Figure 22.4.
Figure 22.4
Importing a Keyset
A keyset is a DS RRset, or a DNSKEY RRset which is used as input to generate the DS RRset. To import a keyset:
1. From the Data Management tab, select the DNS tab.
2. Expand the Toolbar and click DNSSEC -> Import Keyset.
3. In the Import Keyset dialog box, the displayed zone name can either be the last selected zone or the zone from
which you are importing the keyset. If no zone name is displayed or if you want to select a different zone, click
Select Zone. When there are multiple zones, Grid Manager displays the Zone Selector dialog box from which you
can select a zone.
4. Paste the KSK or DS record being imported. It must be a KSK or DS record, and must belong to an immediate
subzone of the zone to which the record is being imported.
5. Click Import.
If you imported a DNSKEY RRset, the Grid Master uses the SHA-1 algorithm to generate the DS RRset, which it adds
to the parent zone. If you imported a DS RRset, the Grid Master adds it to the parent zone. The Grid Master
incrementally signs the DS RRset.
Unsigning a Zone
When you unsign a zone, the Grid Master permanently removes all automatically generated DNSSEC records in the
zone and parent zone. It does not remove any DS records associated with a child zone. You can unsign a single zone
or multiple zones at the same time.
To unsign a zone:
1. From the Data Management tab, select the DNS tab.
2. Expand the Toolbar and click DNSSEC -> Unsign Zones.
3. In the Unsign Zones dialog box, the displayed zone name can either be the last selected zone or the zone from
which you are unsigning. If no zone name is displayed or if you want to select a different zone, click the Add icon.
When there are multiple zones, Grid Manager displays the Zone Selector dialog box. The appliance displays
signed zones only. Select a zone. To add multiple zones, click the Add icon and select a zone.
You can click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel,
either select Now and click Save or select Later and enter a date, time, and time zone. For information, see
Scheduling Tasks on page 85.
— No Notifications: Select this if you do not want to receive any notifications for KSK rollover events.
— Notifications for all KSK rollover events: Select this if you want to receive notifications for all KSK
rollover events. The appliance sends notifications after the rollover.
— Notifications only for KSK rollover events requiring manual DS update to parent zone: Select this if you
want to receive notifications only for KSK rollover events that require manual DS updates to parent
zone. This is selected by default.
— Enable KSK Email Notification: Select this to receive email notifications about DNSSEC keys.
— Enable KSK SNMP Notification: Select this to receive SNMP trap alerts about DNSSEC keys.
3. Enable automatic KSK rollover: This is selected by default. When you select this option, the appliance will
automatically roll over KSKs when they are due. The appliance starts the rollover process at most six hours after
the due date. The appliance logs the messages in the syslog.
Note: The appliance enables notifications and automatic KSK rollover by default for NIOS 6.11.0 and later releases.
These are not available for earlier releases. Similar to automatic ZSK rollover, the appliance automatically
restarts the DNS service after a KSK is rolled over.
Note: The above fields are displayed only when you select NSEC3 record type.
After you enable this feature, you can monitor the HSM group, as described in Monitoring the HSM Group on page
990. In addition, the Grid sends SNMP traps when zone signing succeeds or fails. For information about these traps,
see Processing and Software Failure Traps on page 1398.
Note that NIOS does not provide key life cycle management functions; these are handled by the HSM and must be
configured via the HSM's administrative interface to adhere to corporate policies on key management. The keys (ZSK
and KSK) used for DNSSEC are stored securely on the HSM and are not deleted by NIOS when the key is no longer
required by the DNSSEC function. However, references to the keys are removed from the appliance.
Note: Make sure that the common name used in the certificates is distinct when you configure HSM servers in
HA mode.
Note: In the unlikely event that the Grid Master Candidate was registered with the Thales HSM after the Grid Master
promotion, you must restart the DNS service on the newly promoted Grid Master.
In addition, you must also set up client cooperation to allow both the Grid Master and Grid Master Candidate access
to the Remote File Server (RFS). Note that anytime you add a new Grid Master Candidate, you must enroll its IP
address and set up a client cooperation to allow it access to the RFS. For more information on these procedures, refer
to your HSM documentation.
Note that DSA cannot be used as the DNSSEC cryptographic algorithm for Thales HSMs. Therefore, migrating to Thales
HSMs is not allowed if the Grid Master uses DSA as the DNSSEC cryptographic algorithm.
You can create one Thales HSM group in the Grid, and then add HSMs to the group. The appliance tries to connect to
each of the HSMs in the order that they are listed.
3. If the primary server for the signed zone is external, then you must allow zone transfers to the secondary server.
For information, see Enabling Zone Transfers on page 788. If the primary server is the Grid Master, then the
secondary server receives data through the Grid replication process by default.
Figure 22.5
1 A security-aware resolver 2 The appliance does not have the 3 The forwarder sends the
sends a recursive query for requested data. It sends a request response to the NIOS appliance
data in the corp100.com zone. to the configured forwarder, along with the appropriate
10.2.2.1. DNSSEC RRs.
1 2
5 3
4
corp100.com with 10.2.2.1
DNSKEY record
5 The appliance sends the response 4 The appliance uses the configured
to the DNS client. The AD bit is set DNSKEY RR of the corp100.com
to indicate that the appliance zone to validate the response.
validated the data.
WARNING: When you enable this feature, NIOS applies the selected policies and rules even when it responds
to DNS clients that support DNSSEC. Note that responses to these clients may result in resolution
failure. Infoblox recommends that you use caution when enabling this feature and DNSSEC
validation at the same time.
Grid Master
After you have set up DNS Traffic Control and have defined DTC objects, you can monitor their status through the
Traffic Management tab in Grid Manager. For information about viewing these objects, see Viewing DNS Traffic Control
Objects on page 1026. You can also view the hierarchy of DNS Traffic Control objects that Infoblox supports. For
information about how to view the hierarchical map, see Viewing Traffic Management Structures on page 1027.
To achieve load balancing results for DNS Traffic Control, you may configure DTC objects in the following order:
1. Create DNS Traffic Control servers for each data center or server you want to manage. For information, see
Configuring DNS Traffic Control Servers on page 1016.
2. Optionally, if you want to monitor server health, configure health monitors and add them to your pools when you
create them. For information, see Configuring DNS Traffic Control Health Monitors on page 1007.
3. Configure any topology rulesets that will be used by DTC Pools. For information, see Defining Topology Rulesets
on page 1003.
4. Configure DTC pools, as described in Configuring DNS Traffic Control Pools on page 1018.
5. Configure any topology rulesets that will be used with LBDNs, as described in Configuring Topology Rules and
Rulesets on page 1003.
6. Configure DTC LBDNs, as described in Configuring DNS Traffic Control LBDNs on page 1020.
For detailed information about how DNS Traffic Control handles DNS queries and responses, see DNS Traffic Control
Querying Process on page 1001. You can enable or disable logging for DNS Traffic Control load balancing and health
monitors. The appliance logs this information to the syslog. For more information, see Setting DNS Logging
Categories on page 1340.
• To create and modify DTC pools, you must have read/write permission on All DTC Pools.
• You must have read/write permission on All DTC Servers to create and modify DTC servers.
• You must have read/write permission on All DTC Monitors, All DTC Certificates, and All DTC Topologies to create
and modify DTC monitors, certificates and topologies respectively.
For more information about defining global permissions, see Defining Global Permissions on page 196.
• A rule with a geography source label matches if the client IP address and geography source label matches
corresponding information in the MaxMind location database. Note that the MaxMind location database is
static over the lifetime of the querying process until you upload a new database and restart services.
Note the following information about rules and rulesets:
• A geography label, such as a subdivision or a country must exist in the current MaxMind location database. The
appliance displays an error message if the values do not match.
• When you upload a new MaxMind location database or restore a backup, the appliance does not automatically
remove rules that contain invalid labels. Instead, it marks the rules with labels that do not exist in the database
as invalid. The appliance ignores these rules during the querying process, and you cannot save the
configuration if it is modified, but you can use the existing configuration.
• The appliance does not check specific combinations of labels when the rules use multiple conditions. For
example, a rule for Country - Canada and Continent - Africa is valid because both labels exist in the MaxMind
location database in the respective categories.
• When rules have multiple source conditions, the client must match all conditions for the rule to execute.
• A ruleset may have multiple subnet rules and the subnets may overlap. Similarly, a ruleset may have multiple
geography rules and the matches may overlap. During the querying process, the rules in a topology ruleset are
evaluated in order. For example, if you configure subnet rules where #1 is 10.10.0.0/16 and #2 is 10.0.0.0/8,
both are considered valid in the appliance.
To define rulesets, complete the following:
1. From the Data Management tab, select the Traffic Management tab -> Topology tab.
2. Click the Add icon or click Add and select Add Ruleset from the drop-down list in the Toolbar.
3. In the Ruleset wizard, complete the following:
— Name: Enter a name for the ruleset.
— Destination Type: Select a destination type, Pool or Server, from the drop-down list. You cannot change the
destination type if the ruleset contains any rules.
— Comment: Enter additional information about the ruleset.
— Rules: You can associate multiple subnets and/or geography rules with the ruleset. Click the arrow next to
the Add icon to select either a Subnet Rule or a Geography Rule.
— When you select a Subnet Rule, the appliance displays the following:
• Source Subnet: Select a value from the drop-down list. You can either select equals or does not
equal and specify a subnet IP address.
• Destination: Click Select to select a destination. The appliance displays the DTC Pool Selector
dialog box when you have selected the pool destination type and displays the DTC Server Selector
dialog box when you have selected the server destination type. Click a specific pool or server to
select it.
Click Add to add the source. The appliance displays the following information in the Rules table:
• Source: The subnet address that you specified.
• Destination Type: The destination type that you selected.
• Destination: The destination that you selected.
• Valid Source: If this is a subnet rule the rule will always be marked as valid after a Save and Close.
• Order: Displays the order of the rule in the ruleset.
— When you select a Geography Rule, the appliance displays the following:
• Source Type: Select a source type.
• Continent: Select a continent from the drop-down list. You can also enter the first few characters of
the continent to match an item in the database. The drop-down list has paging controls to page
through the available values.
• Country: Select a country from the drop-down list. You can also enter the first few characters of the
country to match an item in the database. The drop-down list has paging controls to page through
the available values.
• Subdivision: Select a subdivision from the list. You can also enter the first few characters of the
subdivision to match an item in the database. The drop-down list has paging controls to page
through the available values.
• Destination: Click Select to select a destination. The appliance displays the DTC Pool Selector
dialog box when you have selected the pool destination type and the displays DTC Server Selector
dialog box when you have selected the server destination type. Click a specific pool or server to
select it.
Click Add to add the source. The appliance displays the following information in the Rules table:
• Source: The subnet address that you specified.
• Destination Type: The destination type that you selected.
• Destination: The destination that you selected.
• Valid Source: After a Save and Close the value will be True if the labels exist in the MaxMind
location database.
• Order: Displays the order of the rule in the ruleset.
— Default destination if none of the above rules match (optional): Click Select to select the default destination
if none of the above rules match. The appliance displays the DTC Pool Selector dialog box when you have
selected the pool destination type and displays the DTC Server Selector dialog box when you have selected
the server destination type. Click a specific pool or server to select it. You can click Clear to remove the
selected pool or server. Note that you can select a default destination even if there are no rules defined in
the Rules table.
4. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
5. Click Save & Close to save the configuration.
• Export topology rulesets. To export the entire list of rulesets in a format that can be imported, click the Export
icon and choose Export data in Infoblox CSV Import format. To export all data that is currently visible in the
Topology tab, click the Export icon and choose Export visible data.
• Print the data that is currently visible in the Topology tab. Click the Print icon to print.
• Import rulesets as CSV. For more information, see Configuring Import Options on page 104 and Viewing CSV
Import Jobs on page 106.
• Import topology database. For more information, see Importing a Topology Database on page 1006.
You can also do the following in the Health Monitor Certificates dialog box:
• Click the check box next to the issuer and click the Delete icon to delete it.
• Print the data or export it in .csv format.
— Interval (seconds): Enter the interval value in seconds. The interval value is measured from the end of the
previous monitor cycle. The default value is five.
— Timeout (seconds): Enter the timeout value in seconds. The monitor waits for the number of seconds that
you specify after sending a response. If it does not receive a response within the number of seconds that
you specify, then the appliance considers this check as failed. The monitor discards any response it
receives after the timeout. The default value is 15.
— Retry Up Count: Enter a retry up count. When you specify a value, the appliance checks whether the server is
up based on the following: interval*retry up count. For example, if you specify the interval as five
seconds and the retry up count as 10 seconds, then the appliance tries to connect to the server every five
seconds for a period of 50 seconds. If the server is down initially, the appliance tries to connect to the
server for a period of 50 seconds in sequence. When the connection is successful, the HTTP monitor
considers the server to be up. If the server is unavailable for an entire period of 50 seconds, the appliance
considers this connection as a failure.
— Retry Down Count: Enter a retry down count. The HTTP monitor considers the server unavailable only if the
server is unavailable during the period: interval*retry down count. For example, if you specify the
interval as five seconds and the retry down count as 10 seconds, then the appliance checks if the server is
unavailable for 50 seconds in sequence. If the server is unavailable for an entire period of 50 seconds, the
appliance considers the server to be down.
3. Click Next and complete the following:
— HTTP Request: Specify the HTTP request to send the query from the client to the server. The appliance
displays GET / by default. You can specify a HTTP request up to 1024 characters.
— Expected Return Code: The response code expected from the server. Select a value from the drop-down list:
any, equals, and does not equals. The appliance displays any by default. When you select equals or does
not equals, the appliance displays 200 by default.
— Port: For HTTP, the appliance displays port number 80 by default. When you select HTTPS, the appliance
displays 443 by default.
— Use HTTPS: Select the check box to enable HTTPS.
— Client Certificate: Optionally, you can select a certificate to use while opening the SSL connection for
HTTPS. The monitor does not inspect or validate the server certificate, if any.
— Ciphers: Specify a list of SSL ciphers in an OpenSSL format. You can specify cipher texts up to 1024
characters. The client certificate and cipher list are only used for HTTPS transport. The following example
commands list some available ciphers:
Example 1:
$ openssl ciphers 'HIGH:!DES'
DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:
DHE-DSS-CAMELLIA256-SHA:ADH-AES256-SHA:ADH-CAMELLIA256-SHA:AES256-SHA:
CAMELLIA256-SHA:PSK-AES256-CBC-SHA:EDH-RSA-DES-CBC3-SHA:
EDH-DSS-DES-CBC3-SHA:ADH-DES-CBC3-SHA:DES-CBC3-SHA:DES-CBC3-MD5:
PSK-3DES-EDE-CBC-SHA:KRB5-DES-CBC3-SHA:KRB5-DES-CBC3-MD5:DHE-RSA-AES128-SHA:
DHE-DSS-AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:
ADH-AES128-SHA:ADH-CAMELLIA128-SHA:AES128-SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA
Example 2:
$ openssl ciphers 'DEFAULT:!EDH+aRSA'
DHE-DSS-AES256-SHA:DHE-DSS-CAMELLIA256-SHA:AES256-SHA:CAMELLIA256-SHA:
PSK-AES256-CBC-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA:
KRB5-DES-CBC3-SHA:KRB5-DES-CBC3-MD5:DHE-DSS-AES128-SHA:DHE-DSS-SEED-SHA:
DHE-DSS-CAMELLIA128-SHA:AES128-SHA:SEED-SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:KRB5-RC4-SHA:KRB5-RC4-MD5:
EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:KRB5-DES-CBC-SHA:KRB5-DES-CBC-MD5:
EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-KRB5-RC2-CBC-SHA:
EXP-KRB5-DES-CBC-SHA:EXP-KRB5-RC2-CBC-MD5:EXP-KRB5-DES-CBC-MD5:EXP-RC4-MD5:
EXP-KRB5-RC4-SHA:EXP-KRB5-RC4-MD5
Note: The DHE cipher list family (“Diffie-Hellman key agreement” plus “RSA authentication”) could consume
excessive CPU and is excluded from the defaults used by DNS Traffic Control health monitors. Although
you can enable these ciphers by explicitly configuring them in the cipher list for HTTPS and SIP monitors,
you should be aware that doing so will increase CPU usage. Since health monitoring in general does not
require high security, Infoblox recommends that you enable these ciphers only for target servers that do
not accept other types of ciphers.
4. Click Next to add extensible attributes. For information, see Using Extensible Attributes on page 427.
5. Save the configuration.
The SIP monitor does not support SCTP transport. It does not receive SIP connections. Responses are normally
received over the same connection as the request was sent. The server does not attempt to open a new connection
to send the response when it encounters an error message.
1. From the Data Management tab, select the Traffic Management tab -> Monitors tab, and then click the Add icon
and select SIP Health Monitor from the drop-down list.
2. In the SIP Health Monitor wizard, complete the following:
— Name: Enter a name for the SIP health monitor.
— Comment: Enter information about the SIP health monitor.
— Interval (seconds): Enter the interval value in seconds. The health monitor runs only for the specified
interval and it is measured from the end of the previous monitor cycle. The default value is five.
— Timeout (seconds): Enter the timeout value in seconds. The monitor waits for the number of seconds that
you specify after sending a response. If it does not receive a response within the number of seconds that
you specify, then the appliance considers this check as failed. The monitor discards any response it
receives after the timeout. The default value is 15.
— Retry Up Count: Enter a retry up count. When you specify a value, the appliance checks whether the server is
up based on the following: interval*retry up count. For example, if you specify the interval as five
seconds and the retry up count as 10 seconds, then the appliance tries to connect to the server every five
seconds for a period of 50 seconds. If the server is down initially, the appliance tries to connect to the
server for 50 seconds in sequence. When the connection is successful, the SIP monitor considers the server
to be up. If the server is unavailable for an entire period of 50 seconds, the appliance considers this
connection as a failure.
— Retry Down Count: Enter a retry down count. The SIP monitor considers the server unavailable only if the
server is unavailable during the period: interval*retry down count. For example, if you specify the
interval as five seconds and the retry down count as 10 seconds, then the appliance checks if the server is
unavailable for 50 seconds in sequence. If the server is unavailable for an entire period of 50 seconds, the
appliance considers the server to be down.
3. Click Next and complete the following:
— Expected Return Code: The response code expected from the server. Select a value from the drop-down list:
any, equals, and does not equals. When you select equals or does not equals, the appliance displays 200
by default. You can specify a value between zero and 999.
— Port: Specify a port for SIP connection. The appliance displays 5060 for TCP and UDP transport by default.
When you select SIPS and TLS transport options, the appliance displays 5061 by default. You can specify a
value between zero and 65535.
— Transport: Select a transport option from the drop-down list: SIPS, TCP, TLS, and UDP.
— Client Certificate: This is enabled only when you select SIPS and TLS transport options. Click Certificate
to select a client certificate. Select a certificate from the dialog box. Click Clear to delete the certificate
that you have uploaded. The monitor does not inspect or validate the server certificate, if any.
— Ciphers: This is enabled only when you select SIPS and TLS transport options. Specify a list of SSL ciphers
in an OpenSSL format. You can specify text up to 1024 characters. The following example commands list
some available ciphers:
Example 1:
$ openssl ciphers 'HIGH:!DES'
DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:
DHE-DSS-CAMELLIA256-SHA:ADH-AES256-SHA:ADH-CAMELLIA256-SHA:AES256-SHA:
CAMELLIA256-SHA:PSK-AES256-CBC-SHA:EDH-RSA-DES-CBC3-SHA:
EDH-DSS-DES-CBC3-SHA:ADH-DES-CBC3-SHA:DES-CBC3-SHA:DES-CBC3-MD5:
PSK-3DES-EDE-CBC-SHA:KRB5-DES-CBC3-SHA:KRB5-DES-CBC3-MD5:DHE-RSA-AES128-SHA:
DHE-DSS-AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:
ADH-AES128-SHA:ADH-CAMELLIA128-SHA:AES128-SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA
Example 2:
$ openssl ciphers 'DEFAULT:!EDH+aRSA'
DHE-DSS-AES256-SHA:DHE-DSS-CAMELLIA256-SHA:AES256-SHA:CAMELLIA256-SHA:
PSK-AES256-CBC-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA:
KRB5-DES-CBC3-SHA:KRB5-DES-CBC3-MD5:DHE-DSS-AES128-SHA:DHE-DSS-SEED-SHA:
DHE-DSS-CAMELLIA128-SHA:AES128-SHA:SEED-SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:KRB5-RC4-SHA:KRB5-RC4-MD5:
EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:KRB5-DES-CBC-SHA:KRB5-DES-CBC-MD5:
EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-KRB5-RC2-CBC-SHA:
EXP-KRB5-DES-CBC-SHA:EXP-KRB5-RC2-CBC-MD5:EXP-KRB5-DES-CBC-MD5:EXP-RC4-MD5:
EXP-KRB5-RC4-SHA:EXP-KRB5-RC4-MD5
Note: The DHE cipher list family (“Diffie-Hellman key agreement” plus “RSA authentication”) could consume
excessive CPU and is excluded from the defaults used by DNS Traffic Control health monitors. Although
you can enable these ciphers by explicitly configuring them in the cipher list for HTTPS and SIP monitors,
you should be aware that doing so will increase CPU usage. Since health monitoring in general does not
require high security, Infoblox recommends that you enable these ciphers only for target servers that do
not accept other types of ciphers.
4. Click Next to add extensible attributes. For information, see Using Extensible Attributes on page 427.
5. Save the configuration.
— Timeout (seconds): Enter the timeout value in seconds. The monitor waits for the number of seconds that
you specify after sending a response. If it does not receive a response within the number of seconds that
you specify, then the appliance considers this check failed. The monitor discards any responses it receives
after the timeout. The default value is 15.
— Retry Up Count: Enter a retry up count. When you specify a value, the appliance checks whether the server is
up based on the following: interval*retry up count. For example, if you specify the interval as five
seconds and the retry up count as 10, then the appliance tries to connect to the server every five seconds
for a period of 50 seconds. If the server is down initially, the appliance tries to connect to the server for 50
seconds in sequence. When the connection is successful, the SNMP monitor considers the server to be up.
If the server is unavailable for an entire period of 50 seconds, the appliance considers this connection as a
failure.
— Retry Down Count: Enter a retry down count. The SNMP monitor considers the server unavailable only if the
server is unavailable during the period: interval*retry down count. For example, if you specify the
interval as five seconds and the retry down count as 10, then the appliance checks if the server is
unavailable for 50 seconds in sequence. If the server is unavailable for an entire period of 50 seconds, the
appliance considers the server to be down.
— Port: Specify a port for the SNMP connection. The appliance displays 161 by default. You can specify a
value between zero and 65535.
— Comment: Enter information about the SNMP health monitor.
3. Click Next to configure the community, version, and OID settings:
— Community: Enter the text string that the SNMP monitor must send along with the queries to the server for
authentication. The community string is similar to a password and the server accepts queries only from the
SNMP monitor that provide the correct community string. Note that this community string must match
exactly what you enter in the management system. The default value is public.
— Version: Select the SNMP version, v1 or v2c from the drop-down list. The default is v2c.
Click the Add icon in the Health Monitor SNMP OIDs table to add an SNMP OID entry. Complete the following:
— OID: Specify the object identifier. An OID is a unique dotted-decimal number that identifies the location of
the object in the MIB tree.
— Type: Select either String or Integer from the drop-down list. The default is Integer.
— Operator: Select one of these operators from the drop-down list: Any, Equals, Larger, Smaller, and Range.
— If the operator is Equals, Larger, or Smaller, enter a value in the Value field. If the operator is Range, enter
the minimum and maximum values in the Min value and Max value fields respectively.
— Comment: Enter information about the SNMP OID entry.
— Click Add to add the SNMP OID to the table.
4. Click Next to add extensible attributes. For information, see Using Extensible Attributes on page 427.
5. Save the configuration.
Note: You can see the Server menu only when you install the DNS Traffic Control and Load Balancer licenses. For
example, if you have installed only the DNS Traffic Control license, you can only see the DTC Server menu.
For more information about Global Load Balancers, see About Global Load Balancer Data on page 1543.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Click the Export icon to export the list of NAPTR records to a .csv file.
• Click the Print icon to print the list of NAPTR records.
A pool can contain preferred and alternative load balancing methods. You can define permissions on these pools and
associate extensible attributes with them. Each pool can contain one or more health monitors associated with it. You
can define TTLs at the LBDN level. These TTLs are valid for dynamic RRsets that are created by the querying process
for each query.
Note: You can configure a maximum of 256 DNS Traffic Control Pools.
To configure a pool:
1. From the Data Management tab, select the Traffic Management tab -> Traffic Management tab, and then click the
arrow next to the Add icon and select Pool -> DTC Pool from the drop-down list.
Note: You can see the Pool menu only when you install the DNS Traffic Control and Load Balancer licenses. For
example, if you have installed only the DNS Traffic Control license, you can only see the DTC Pool menu.
For more information about Global Load Balancers, see About Global Load Balancer Data on page 1543.
Note: You can select an alternate load balancing method only if the primary load balancing method is Topology.
— Topology Ruleset: This is displayed only when you select Topology as the alternate load balancing
method. Select a topology ruleset from the drop-down list.
Note that the alternate and preferred methods must be different.
5. Click Next to associate servers with the pool. Click the Add icon, select a server from the DTC Server Selector
dialog box and click OK. You can use SHIFT+click and CTRL+click to associate multiple servers. The appliance
displays the following information:
— Server Name: The name of the DNS Traffic Control server is displayed.
— Host: The host address of the server is displayed.
— Ratio: The appliance displays the ratio as one, by default. You can modify the ratio value. Note that the
value must be greater than zero.
Note: You can see the LBDN menu only when you install the DNS Traffic Control and Load Balancer licenses. For
example, if you have installed only the DNS Traffic Control license, you can only see the DTC LBDN menu.
For more information about Global Load Balancers, see About Global Load Balancer Data on page 1543.
Note: You must select at least one record type for an LBDN. An LBDN is disabled if no record types are selected.
The patterns and the record types cannot overlap with any other LBDN that is linked to the same zone.
— Associated Zones: Click the Add icon to associate zones with the LBDN. Select a zone from the Zone
Selector dialog box and click OK. The appliance displays the following information:
— Zones: The name of the selected zone.
— DNS View: The DNS view associated with the selected zone (if there is more than one DNS view).
Note that the LBDN is active only when you associate zones with it. You can associate only authoritative
forward-mapping zones with the LBDN. To dissociate a zone from the LBDN, select the check box next to the
respective zone name and click the Delete icon. For more information, see Managing LBDN Records on page
1024.
4. Click Next and click the Add icon to associate pools with the LBDN. Select a pool from the DTC Pool Selector dialog
box and click OK. The appliance displays the following information:
• When you select the Global Availability load balancing method, the appliance adjusts the response to the
query, so that the clients are directed to the first available server in the pool.
Consider the following example for global availability load balancing method with an LBDN x.abc.com:
— Pool= Pool_1; load balancing method= global availability; health check= HTTPS
10.10.1.1
10.10.2.2
10.10.3.3
— Pool= Pool_2; load balancing method = global availability; health check = HTTPS
10.10.4.4
10.10.5.5
10.10.5.5
In this example, the appliance always responds with 10.10.1.1 (A record) for all x.abc.com queries assuming
that all servers are available. The DNS Traffic Control LBDN determines which pool to use based on the health
check response and adjusts the response accordingly. The appliance responds with 10.10.4.4 from Pool_2 if
health check for all servers associated with Pool_1 fails.
• When you select the Ratio method, NIOS adjusts the response to the query so that the clients are directed to
servers in a pool or among pools. When multiple pools or servers are configured, the appliance uses the
weighted round robin method, a load-balancing pattern in which requests are distributed among several
servers based on a priority level or weight assigned to each pool or server. Note that the system considers the
weight of available servers only.
Consider the following example for ratio load balancing method with an LBDN x.abc.com, load balancing
method = Ratio and two linked pools: Pool_1 with weight = 70 and Pool_2 with weight = 30.
— Pool = Pool_1; load balancing method = ratio; health check = HTTPS
10.10.1.1; Weight = 50
10.10.2.2; Weight = 25
10.10.3.3; Weight = 25
— Pool = Pool_2; load balancing method = ratio; health check = HTTPS
10.10.4.4; Weight = 50
10.10.5.5; Weight = 25
10.10.5.5; Weight = 25
In this example, the appliance responds 70% of the time with a server associated with Pool_1. Within Pool_1, it
responds with 10.10.1.1 address 50% of the time.
• When you select the Round Robin method, the appliance randomizes the response to the query to select from
all available servers with each available option having an equal probability.
Consider the following example for round robin load balancing method with an LBDN x.abc.com where the load
balancing method is Round Robin:
— Pool = Pool_1; load balancing method = Round Robin; health check = HTTPS
10.10.1.1;
10.10.2.2;
10.10.3.3;
In this example, NIOS responds with a server associated with Pool_1. Within Pool_1, it responds randomly
with equal weight:
Time 1: Response = 10.10.1.1
Time 3: Response = 10.10.3.3
Time 2: Response = 10.10.2.2
Time 4: Response = 10.10.1.1
• When you select the Topology method, the appliance uses a predefined geographic mapping method and
evaluates user-defined rules sequentially. The appliance supports the MaxMind GeoIp2 city or country
database. However, the ‘country’ version of the database does not support ‘subdivision’ labels and importing it
will invalidate all rules that use ‘subdivision’ labels. The topology method allows you to create, modify, or
delete one or more custom topology rules. For more information, see Configuring Topology Rules and Rulesets
on page 1003.
— Associated Zones and Records: This tab displays the record types selected for the zone, the TTL value and
the Associated Zones. You can select any or all of the following record types: A, AAAA, and NAPTR. Note that
the default TTL value is 8 hours and is inherited from the associated zones. Note that the TTL value is
inherited from the associated zones. There can be multiple inheritance. You can override this value and
associate new zones with the LBDN or delete an associated zone.
— Pools: This tab displays the pools that are associated with the LBDN. You can delete an existing pool or add
new pools.
— Extensible Attributes: Add and delete extensible attributes that are associated with the LBDN. You can also
modify the values of extensible attributes. For information, see Using Extensible Attributes on page 427.
3. Save the configuration.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Click the Export icon to export the list of objects to a .csv file.
• Click the Print icon to print the list of objects.
• Click Extensible Attributes in the Toolbar to add and delete extensible attributes that are associated with the
objects. For information, see Using Extensible Attributes on page 427.
• Click Test DTC LBDN to test LBDNs. For more information, seeTesting DTC LBDNs on page 1025.
• Enable/Disable multiple traffic management objects. Note that you can use this dialog box to enable or disable
multiple objects that are associated with Infoblox appliances only. For more information, see Enabling or
Disabling Traffic Management Objects on page 1029.
• Use the IDN Converter from the Toolbar to convert IDNs into punycodes. For more information, see Decoding
IDNs and Encoding Punycode on page 113.
• Click Show Visualization: <LBDN name> to view the traffic management structure for the respective LBDN. This
link appears in the Traffic Management tab only when you minimize the Traffic Management Structure
visualization window for the respective LBDN using the minimize option. For more information, see Viewing
Traffic Management Structures on page 1027.
• Select the check box to view specific objects only:
— LBDN: Select the check box to edit LBDN objects only. For more information, see Configuring DNS Traffic
Control LBDNs on page 1020.
— Pool: Select the check box to edit pools only. For more information, see Configuring DNS Traffic Control
Pools on page 1018.
— Server: Select the check box to edit servers only. For more information, see Configuring DNS Traffic Control
Servers on page 1016.
When you select an object, the map displays the selected object at the center and uses lines to represent its
connections with other associated objects. For example, if you start with an LBDN object that has associated servers,
the map displays connectors from the LBDN object to all the related objects in a hierarchical tree format. If an LBDN
has more than one pool, it will display the servers for only one pool at a time. Clicking on a pool will display the
servers for that pool.
Note: If your browser has a pop-up blocker enabled, you must turn off the pop-up blocker or configure your browser
to allow pop-ups in order to view the traffic management visualizer.
You can also do the following in the Traffic Management Structure panel:
• Click the arrow next to the Tree Configuration icon and select Tree Configuration from the drop-down list to
configure the number of nodes on each level. Enter the maximum number of nodes you want displayed for each
level and then click Submit.
Note: When there are more than 30 nodes in a tree for an LBDN, the appliance displays a warning message indicating
that you can drag the display to view the hidden nodes.
• Click the arrow next to the Tree Configuration icon and click Filter Node Status from the drop-down list to filter
the node status. The appliance displays the following values: All Members and Select Member. Select All
Members to select all members associated with the LBDN to display the status. When you select this option, the
appliance displays All Members above the LBDN. Click Select Member to launch the member selector and select
a specific member to view the status. When you select a member, the appliance displays the respective member
name above the LBDN. Note that the appliance displays members that have a DNS Traffic Control license only.
The Grid Master fetches the server status for each server. The results are cached and are updated periodically. It
may take a few minutes to update the status after a configuration change. The traffic management structure
status icon can be one of the following:
Color Meaning
None Status is unknown. DNS Traffic Control object is disabled for the selected
object or it is not linked to a pool or an LBDN, or IPv4/IPv6 interfaces are not
configured.
Gray Grid member does not have DNS Traffic Control license.
Green All DNS Traffic Control servers are operating normally in a “Running” state or
monitors are not associated.
Blue Data is not available for the respective object.
Yellow The health monitor marks the status as a mix of up and down states for the
respective object.
Red The DNS Traffic Control object has an error or it is not reachable.
• Change the map orientation by clicking the Change Tree Orientation icon. The default orientation is from top to
bottom.
• Click the Refresh icon to refresh the map. You can also click Turn Auto-Refresh On to turn on auto-refresh and
Turn Auto-Refresh Off to turn it off.
• Click anywhere in the tree map and hold your mouse to drag the map to a desired location in the panel.
ns1.corp100.com
192.204.18.11
ns1.corp100.com
192.204.18.12
NIOS Appliance You can configure
Configure the an IP address for
appliance with the DNS queries and
following IP select another
addresses on the physical port for
loopback interface: DNS transfers and
192.204.18.11 ns3.corp100.com ns3.corp100.com notify messages.
192.204.18.12 192.204.18.88 192.204.18.88
192.204.18.88
You can also add an IP address that is used solely for DNS queries, to separate the DNS traffic. You first add an IP
address you want to use for DNS queries on the loopback interface. You then configure the appliance to listen for DNS
queries solely on this address. For information, see Specifying Source Ports on page 760.
When you configure non-anycast addresses on the loopback interface, ensure that you establish a static route
between the appliance and the router so queries to these addresses are routed correctly. For information, see
Advertising Loopback Addresses to the Network on page 1034.
Note: You can configure multiple interfaces on the Infoblox-4030 appliance only. To configure LAN1, LAN2 and MGMT
interfaces to the same IPv4 or IPv6 subnet, provide the same netmask for IPv4, or a CIDR prefix for IPv6, as the
LAN1 interface. Alternatively, you can use a /32 netmask (255.255.255.255) for IPv4, or /128 CIDR prefix for
IPv6 with the same subnet as LAN1 interface to configure multiple interfaces. An Infoblox-4030 can replace
three DNS cache servers that are active on the same network. When you configure multiple interfaces on the
same subnet, the outgoing traffic from NIOS host which is received through LAN2 and MGMT is directed to the
LAN1 router for all interfaces on the LAN1 subnet, irrespective of the destination IP. However, if the LAN1
interface fails, the outgoing traffic will not be re-directed to any other interface and access to LAN2 and MGMT
also fails.
Note: You cannot configure Additional Address (loopback) (IPv4) interface for an IPv6 Grid member and
Additional Address (loopback) (IPv6) interface for an IPv4 Grid member. You can only enter the IP address
you want to add to the loopback interface. You cannot configure the subnet mask, prefix length, gateway,
or port settings.
Note: You cannot configure the gateway address and port settings.
4. Save the configuration and click Restart if it appears at the top of the screen.
To add multiple IP addresses on the loopback interface, repeat the steps for each IP address.
Note: If you are configuring the loopback interface on a Grid Master, the Grid is temporarily disrupted upon saving
the configuration and restarting services on the appliance. The Grid reconnects automatically and the
appliance regains the role as Grid Master after a short delay.
A client on the
Router
10.34.0.0 subnet Appliance
queries 10.0.0.246 10.0.0.123
on the loopback Loopback IP
interface of the Static Route 10.0.0.246
appliance. (on LAN1 port)
Client
10.34.1.1
When you configure DNS anycast addresses on the loopback interface, you can select OSPF, BGP, or both, to advertise
the addresses to upstream and neighboring routers, without establishing a static route. For information, see About
Anycast Addressing for DNS on page 1035.
Note: For more information about anycast addressing, refer to RFC 1546 “Host Anycasting Service”.
IP configuration must be defined on the LAN1 interface before configuring DNS anycast addresses. Before creating
IPv6 anycast IPs on the loopback interface, IPv6 must be enabled and configured on the LAN1 interface for the NIOS
appliance, including the correct IPv6 gateway IP address.
To enable and configure anycast addressing:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box -> Edit icon.
2. In the Grid Member Properties editor, Click Toggle Advanced Mode.
3. When the additional tabs appear, click the Anycast tab.
4. Click the Add icon and choose IPv4 Address or IPv6 Address.
5. In the Anycast Interfaces list, enter the values or select the options for the new entry:
— Anycast Interface: Anycast addressing is supported on the loopback only. This value is filled in
automatically.
— Address: Enter the IP address you want to assign as the anycast address to the loopback interface. Specify
an IPv4 Address or an IPv6 Address based on the chosen type of address.
Subnet Mask: You cannot change the subnet mask of a loopback interface. The netmask is automatically
set to 255.255.255.255, or /32; or 128 for IPv6.
— OSPF: Select if you want the appliance to use OSPF to advertise the anycast address, and if necessary
configure the OSPF settings. For information, see Configuring OSPF on the NIOS Appliance on page 1041.
IPv4 and IPv6 options are configurable for this protocol. This is supported only for IPv4 and dual mode
appliances, but not for IPv6 appliances.
— BGP: Select this if you want the appliance to use BGP to advertise the anycast address, and then configure
the BGP settings. This is supported only for IPv4 and dual mode appliances, but not for IPv6 appliances.
Note: You must configure at least one routing method for DNS anycast. You can configure OSPF, BGP, or both (in
most cases only one protocol will be used). The appliance cannot save the anycast address if you do not
complete at least one routing configuration. Anycast cannot be used without dynamic routing.
— Comments: Enter a text string to help identify this interface and IP address.
6. If using OSPF for the current appliance: Under OSPF Area Configuration, click the Add icon. A new configuration
block appears in the properties editor.
— Enter the values for the OSPF configuration as described in the section Configuring OSPF on the NIOS
Appliance.
— Click the Add down arrow icon in the OSPF Area Configuration section. The new OSPF configuration is saved
into a table.
7. If using BGP for the current appliance: In the properties editor, scroll down to the configuration block for BGP
Configuration. For information, see Configuring BGP in the NIOS Appliance on page 1045.
— In the ASN field, enter the Autonomous System ID number in which the NIOS appliance resides.
— If necessary, modify the BGP Timer Keep Alive and Hold Down values. In most circumstances these values
should be left at their defaults. Check your network’s defined policies for the desired values if necessary.
— Click the Add icon.
— Enter the Neighbor Router IP address. This can be an IPv4 address or an IPv6 address.
— Enter the Remote ASN (Autonomous System ID number) for the adjacent router.
8. Save the configuration. The system will warn that you must restart the appliance services in order to use the new
configuration.
9. Log back in to the appliance.
10. From the Data Management tab, select the DNS tab -> Members/Servers tab -> Grid_member check box -> Edit
icon.
11. Select Toggle Advanced Mode (if necessary), click General and the Advanced tab.
12. Under Listen on these additional IP addresses, click the Add button. The list of one or more previously created
IPv4 and IPv6 addresses for the loopback interfaces (created in Step 4) appear in this table. (If the Add button is
not active here, this indicates that you have not configured any loopback interfaces with their IP addresses.)
Note: Should you need to configure other DNS properties on this page, see the topics in Configuring DNS
Services.
IP Routing Options
IP routing is a set of protocols that determine the path IP packets follow in order to travel across multiple networks
from the source to the destination. When information travels through a series of routers and across multiple
networks, IP routing protocols enable the routers to build up a forwarding table that correlates the final destination
with the next upstream routers.
For routing purposes, the internet is divided into ASs (Autonomous Systems). Data is routed within an AS using an
IGP (Interior Gateway Protocol) and routed between different ASs using an EGP (Exterior Gateway Protocol). NIOS
appliances support OSPFv2 (for IPv4) and OSPFv3 (for IPv6) for a routing IGP, and BGP4 to advertise DNS anycast
addresses in the larger internetwork.
As noted in the section Configuring Anycast Addresses, you configure OSPF or BGP4 to advertise anycast addresses,
which configured on the loopback interface of NIOS appliances. Use of either protocol depends on the network
topology, based on whether the advertisements will propagate only within a single AS or between more than one AS.
Figure 24.3 shows a simplified example.
BGP
BGP
BGP OSPF
Stub AS
OSPF
Multihomed AS
Within each AS, OSPF is the protocol used to forward anycast advertisements. Between ASs, BGP is the protocol
selected to advertise anycast addresses. Using this technique, DNS servers in diverse locations can operate together
to ensure continuous service.
About OSPF
OSPF is a link-state protocol based on the Dijkstra algorithm used to calculate the shortest path to a destination
address within an internetwork. This protocol uses a link-state database created using routing information advertised
from neighbors and peers, each with costs based on the state of that link to the destination.
OSPF network topologies consist of administrative domains called OSPF areas. An area is a logical collection of OSPF
routers, servers and other network devices that have the same area identifier. A router within an area keeps an OSPF
database for its OSPF area only, reducing the size of the database that is maintained.
DNS Query
(example: nslookup)
10.128.1.12
2001:db8::256:180:c223:214e
Intranet
Client
europe.corp100.com
DNS Server asiapac.corp100.com
After you configure or change DNS anycast settings, you must restart the DNS services for the settings to take effect.
When you enter any OSPF command and wait for the interface to return more information, the appliance disconnects
your CLI session after you restart services or make other OSPF configuration changes through Grid Manager. Re-enter
your credentials to log back in to the CLI. (For information, refer to the Infoblox CLI Guide.)
To enable the appliance to support OSPF and advertising anycast addresses on OSPF from the loopback, you must
first configure the LAN1 or LAN1 (VLAN) interface as an OSPF advertising interface. For information about VLAN, see
About Virtual LANs on page 444.
You can also configure authentication for OSPF advertisements to ensure that the routing information received from
a neighbor is authentic and the reachability information is accurate. This process can be implemented for OSPF over
IPv4 networks but is not supported for IPv6/OSPFv3. For information, see Configuring OSPF on the NIOS Appliance.
Note: For more information about the OSPF routing protocol, refer to RFC 2328 “OSPFv2” and RFC 5340 “OSPF for
IPv6”.
Note: Use the CLI command show ospf or show ipv6_ospf to display configuration and statistical information
about the OSPF protocol running on the appliance. You can also use the set ospf or set ipv6_ospf
command to write OSPF statistical information to the syslog. In the NIOS appliance, configuration of OSPF is
limited to Syslog and the DNS anycast application.
To support DNS anycast and other routing-dependent applications on NIOS appliances, you must first configure the
LAN1, LAN1 (VLAN), or HA (for HA pairs only) interface as an OSPF advertising interface, and then assign an area ID
on the interface to associate it with a specific OSPF area. The interface advertises the OSPF routing information to the
network so that routers can determine the best server to query. For anycasting, the advertising interface sends out
routing advertisements about the anycast address into the network out to upstream routers.
To configure the LAN(HA) or LAN1(VLAN) interface to be an OSPF advertising interface, perform the following tasks:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. Select the Anycast tab in the Grid Member Properties editor.
The Anycast Interfaces appear in a table. You can add new anycast interfaces when needed.
3. Click the Add icon of the OSPF Area Configuration table and choose IPv4 Configuration or IPv6 Configuration to
define a new OSPF Area. The OSPF Area Configuration will show a similar set of Add (IPv4/IPv6) OSPF Area
configuration settings based on the protocol type. Enter the following information to configure the LAN1,
LAN1 (VLAN), or HA interface as the OSPF advertising interface:
— Advertising Interface: Displays the interface that sends out OSPF routing advertisements. OSPF
advertisements are supported on the LAN1, LAN1(VLAN), and the HA interface, depending on whether the
appliance is an HA pair.
— Area ID: Enter the OSPF area identifier of the network containing the upstream routers, in either an IP
address format or a decimal format. All network devices configured with the same OSPF area ID belong to
the same OSPF area. The area ID configured on the Grid member must match the area ID of the upstream
router configuration. Area ID numbers are defined in the same format for IPv6 and IPv4.
— Area Type: Select the type of OSPF area to associate with the advertising interface from the drop-down list.
The area type configured on the Grid member must match the area type of the upstream router
configuration. The supported area types are described as follows:
— Standard: A standard area has no restrictions on routing advertisements, and connects to the
backbone area (Area 0) and accepts both internal and external link-state advertisements.
— Stub: A stub area is an area that does not receive external routes.
— Not-so-stubby: A not-so-stubby area (NSSA) imports autonomous system (AS) external routes and
sends them to the backbone, but cannot receive AS external routes from the backbone or other areas.
Note: OSPF for IPv6 (known as OSPFv3) configuration does not support OSPF authentication options.
— Authentication Type: Select the authentication method to use to verify OSPF routing advertisements on the
interface. The authentication type configured on the Grid member must match the authentication type of
the upstream router configuration. The supported authentication types are described as follows:
— None: No authentication for OSPF advertisement.
— Simple: A simple password for OSPF advertisement authentication, in clear text.
— MD5: An MD5 hash algorithm to authenticate OSPF advertisements. This is the most secure option.
— Authentication Key ID: Enter the key identifier to use to specify the correct hash algorithm after you select
MD as your OSPF authentication type. The authentication key ID configured on the Grid member must
match the authentication key ID of the upstream router configuration.
— Authentication Key: Enter the authentication password to use to verify OSPF advertisements after you select
Simple or MD as your OSPF authentication type. Specify a key string between 1 to 8 characters for Simple
authentication, and a string between 1 to 16 characters for MD5 authentication. The authentication key
configured on the Grid member must match the authentication key of the upstream router configuration.
— Cost: Select one of the following:
— Calculate Automatically: Select this check box to auto generate the cost to associate with the
advertising OSPF interface to the appliance. If this check box is not selected, then you specify the cost
value explicitly. Calculate the cost as 100,000,000 (reference bandwidth) divided by the interface
bandwidth. For example, a 100Mb interface has a cost of 1, and a 10Mb interface has a cost of 10.
— Fixed Metric: Enter the cost to associate with the advertising OSPF interface to the appliance.
— Hello Interval: Specify how often to send OSPF hello advertisements out from the appliance interface, in
seconds. Specify any number from 1 through 65,535. The default value is 10 seconds. The hello interval
configured on the Grid member must match the hello interval of the upstream router configuration.
— Dead Interval: Specify how long to wait before declaring that the NIOS appliance is unavailable and down,
in seconds. Specify any number from 1 through 65,535. The default value is 40 seconds. The dead interval
configured on the Grid member must match the dead interval of the upstream router configuration.
— Retransmit Interval: Specify how long to wait before retransmitting OSPF advertisements from the interface,
in seconds. Specify any number from 1 through 65,535. The default value is 5 seconds. The retransmit
interval configured on the Grid member must match the retransmit interval of the upstream router
configuration.
— Transmit Delay: Specify how long to wait before sending an advertisement from the interface, in seconds.
Specify any number from 1 through 65,535. The default value is 1 second. The transmit interval configured
on the Grid member must match the transmit interval of the upstream router configuration.
— Click Add to add the interface to the table.
The Cost, Hello Interval, Dead Interval, Retransmit Interval and Transmit Delay settings can be configured for
IPv6 deployments. OPSF authentication is not supported for IPv6 on the NIOS platform.
4. Save the configuration and click Restart if it appears at the top of the screen.
Managing OSPF
• OSPF advertises the route when the DNS service starts. The start DNS command creates an interface and
starts the OSPF daemon.
• OSPF stops advertising the route when the DNS service stops. The stop DNS command stops the OSPF daemon
and deletes the interface.
• The NIOS application does not support a route flap. For example, temporary DNS downtime such as restart,
does not stop or re-instate the OSPF advertisement.
• The OSPF advertisement stops if DNS service is down for more than 40 seconds.
Note: Use the CLI command show bgp or show ipv6_bgp to display configuration and statistical information about
the Border Gateway Protocol running on the appliance. You can also use the set bgp command to write OSPF
statistical information to the syslog. In the NIOS appliance, configuration of BGP is limited to Syslog and the
DNS anycast application.
BGP4 (henceforth referred to as BGP) is designed to distribute routing information among ASs and exchange routing
and reachability information with other BGP systems using a destination-based forwarding paradigm. Unlike OSPF,
which calculates routes within a single AS, BGP is a vector routing protocol that distributes routing information among
different ASs. A unique ASN (autonomous system number) is allocated to each AS to identify the individual network
in BGP routing. A BGP session between two BGP peers is an eBGP (external BGP) session if the BGP peers are in
different ASs. A BGP session between two BGP peers is an iBGP (internal BGP) session if the BGP peers are in the
same AS.
BGP configuration enables large enterprises using BGP as the internetworking protocol to provide resilient DNS
services using the Infoblox solution. While BGP is mostly used by ISPs, it is also used in larger enterprise
environments that must interconnect networks that span geographical and administrative boundaries. In these
environments, it is required to use BGP to advertise anycast routes. Using BGP allows the appliance to advertise DNS
anycast addresses to neighboring routers across multiple ASs that also use BGP as their routing protocols.
As illustrated in Figure 24.5, to enable anycast for DNS queries among three different networks that span different
geographical regions, you can configure two DNS servers with the same DNS anycast addresses in the AS 65497
network. Since other network routers in AS 65498 and AS 65499 also use BGP as the routing protocol, the DNS
anycast addresses can be advertised across these networks.
Europe
Enterprise network AS America
65497 uses Infoblox DNS BGP
servers to provide DNS Neighboring AS 65498
services. Anycast DNS Router
addresses and BGP are
configured on the
appliances so the AS 65497
anycast addresses can
be advertised to the BGP
enterprise networks AS
65498 and AS 65499, AS 65499
which contains BGP BGP
configured routers.
Asia
To enable DNS anycast addressing across different ASs, you configure BGP as the routing protocol on the NIOS
appliance. (As illustrated in Figure 24.6, the AS 65497 network contains the Infoblox DNS anycast servers, and the
AS 65499 network contains Router 1 and 2. The routers use BGP and are peered with the DNS servers. You can
configure anycast addressing on the loopback interface of the DNS servers and select BGP as the protocol to
advertise the anycast addresses to Router 1 and 2 in AS 65499. For information, see Configuring Anycast Addresses
on page 1036. Once you have configured the DNS servers, the appliances automatically add filters on the advertising
interfaces to limit the advertisements to the configured anycast IP addresses. Similarly, BGP filters are applied to
ensure that the DNS servers only receive default route advertisements from the neighboring routers.
BGP uses timers to determine how often the appliance sends keepalive and update messages, and when to declare
a neighboring router out of service. You can configure the time intervals for these timers. For information, see
Configuring BGP in the NIOS Appliance on page 1045.
The BGP protocol service is automatically configured to send SNMP queries about BGP runtime data. The appliance
sends SNMP traps to its neighboring routers when it encounters issues with the protocol. BGP is configured to send
SNMP traps as defined in RFC4273 Definitions of Managed Objects for BGP-4. You must enable and configure the
SNMP trap receiver on the Grid member for the member to send SNMP traps. For information, see SNMP MIB Hierarchy
on page 1376.
You can use the set bgp command to set the verbosity levels of the BGP routing service. The appliance writes BGP
statistical information to the syslog. After you configure the settings, you must restart the DNS services for the
settings to take effect. For information, refer to the Infoblox CLI Guide. Note that when you enter any BGP command
and wait for the interface to return more information, the appliance disconnects your CLI session if you restart
services or make other BGP configuration changes through Grid Manager. You must re-enter your credentials to log
back in to the CLI.
You can configure BGP on any interface to advertise anycast addresses across multiple ASs.
Note: NIOS selects the interface for BGP advertisement based on the routing configuration.
The appliance supports BGP version 4. For more information about BGP, refer to RFC4271, A Border Gateway Protocol
4 (BGP-4).
Note: If you encounter Malformed AS_PATH error, then remove the dont-capability-negotiate option. Infoblox doesn't
provide an option to create confederation of autonomous systems if the BGP peer is configured by enabling
the dont-capability-negotiate option.
Note: If you upgrade from a previous NIOS version to NIOS 6.11.0 or later, BGP authentication is disabled for existing
BGP neighbors.
The BGP service restarts automatically when any of the following authentication changes are made:
• MD5 authentication is enabled or disabled for a BGP neighbor.
• Change the authentication password of a BGP neighbor, for which MD5 authentication is enabled.
To configure BGP for anycast addresses:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member check box, and then click the Edit
icon.
2. In the Grid Member Properties editor, select the Anycast tab.
3. In the BGP Configuration section, complete the following:
— Interface Link Detection: Select this check box to enable link detection when the default connection fails.
This enables the router to track the next available route. For example, if LAN1 is set as the default gateway
when both LAN1 and LAN2 are working, and LAN1 later fails, the router will switch to LAN2. When LAN1
reconnects, the router will then switch back to LAN1.
— ASN: Enter the autonomous system number of the interface. Enter a number from 1 to 65535. You can
configure only one ASN on each Grid member.
— BGP Timers: BGP uses timers to control how often the interface sends KEEPALIVE messages and how long it
waits before declaring a neighboring router out of service. The keepalive timer determines the time interval
at which the interface sends KEEPALIVE messages to a neighboring router to inform the neighbor that the
appliance is alive. The hold down timer determines how long the interface waits to hear a KEEPALIVE or
UPDATE message before it assumes its neighbor is out of service. If a neighboring router is down, the
interface terminates the BGP session and withdraws all the BGP routing information to the neighbor.
— Keep Alive: Enter the time interval in seconds when the interface sends keepalive messages. You can
enter a time from 1 to 21845 seconds. The default is four seconds.
— Hold Down: Enter the time in seconds that the interface waits to hear a keepalive message from its
neighbor before declaring the neighbor out of service. You can enter a time from 3 to 65535 seconds.
The default is 16 seconds.
Click the Add icon to add a neighboring router to receive BGP advertisements from the NIOS appliance. The
appliance adds a new row to the table. Complete the following:
— Neighbor Router IP: Enter the IP address (IPv4 or IPv6) of the neighboring BGP router. The neighboring
router can be within the same AS (the most likely case) or from a router in an external AS.
— Remote ASN: Enter the ASN of the neighboring router. You can enter an ASN number from 1 to 65535.
— MD5 Authentication: Select this check box to enable MD5 authentication for the BGP neighbor. When you
enable MD5 authentication, you must enter the authentication password in the Password field.
— Password: Enter the authentication password that the NIOS appliance uses to connect to the BGP neighbor.
You can enter up to 80 printable ASCII characters. The password configured on the Grid member must
match the password of the BGP neighbor.
Note: When you enter the password for a BGP neighbor, it will be preserved even if you disable MD5
authentication for the BGP neighbor later. But if you change the IP address for any existing BGP neighbor,
you must re-enter the authentication password for the BGP neighbor, even if the authentication password
remains the same.
DHCP client sends a When the router (relay When the DHCP server receives
1 DHCPDISCOVER 2 3 the DHCPDISCOVER message,
agent) receives the
message for an IP DHCPDISCOVER message, it determines the network
address. it forwards the message to segment to which the client
the DHCP server. belongs, and then assigns an IP
DHCPDISCOVER address accordingly. It then
sends a DHCPOFFER message
with the IP address and other
network information.
DHCP Client
requesting an 10.1.1.1
IP address DHCP Server
DHCPOFFER (NIOS appliance)
Router
(Relay Agent)
10.1.1.0/24
DHCP server
Advertise
Request
2001:db8:1::/48
4 The client sends a Address Range
Reply
Request for IP addresses
and configuration 2001:db8:1::a -
5 The DHCP server responds with a 2001:db8:1::6d
parameters.
Reply message that includes the
IP addresses and configuration
parameters.
Infoblox DHCP servers also supports stateless configuration in which a DHCP client does not need IP addresses, but
needs configuration information only. The DHCP client sends an Information-Request packet to obtain configuration
information, and the server sends a Reply message with the requested information. For more information, refer to RFC
2462, IPv6 Stateless Address Autoconfiguration.
When you enter an IPv6 address in Grid Manager, you can use double colons to compress a contiguous sequence of
zeros. You can also omit any leading zeros in a four-hexadecimal group. For example, the complete IPv6 address
2006:0000:0000:0123:4567:89ab:0000:cdef can be shortened to 2006::123:4567:89ab:0:cdef. Note that if there
are multiple noncontiguous groups of zeros, the double colon can only be used for one group to avoid ambiguity. The
NIOS appliance displays an IPv6 address in its shortened form, regardless of its form when it was entered.
Yes
No
Do you want to
2 configure DHCP Configure the member-level
properties on another DHCP properties.
member?
Assign Member(s)
Specify the network address and netmask. - Select the member(s) that provide DHCP
services for this network.
- Specify the network address and netmask.
Define network-level
DHCP properties.
Yes
Yes
No
Define DHCP address Configure the fixed addresses.
ranges for this network.
No
Note: You must disable DHCP Snooping to successfully run DHCP services on the Grid. For more information about
DHCP services, see About Infoblox DHCP Services on page 1050.
Note: By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type
(full or half duplex) on the physical links between its LAN1 or LAN1 (VLAN), HA, and MGMT ports and the
Ethernet ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal settings, see
Modifying Ethernet Port Settings on page 456 for steps you can take to resolve the problem.
About Networks
You can configure DHCP IPv4 and IPv6 properties for the Grid and its members, and then define the IPv4 and IPv6
networks that they serve.
All networks, both IPv4 and IPv6, must belong to a network view. The appliance has one default network view and
unless you create additional network views, all networks belong to the default view. Note that because network views
are mutually exclusive, you can create networks with overlapping IP address spaces in two different network views.
For more information, see About Network Views on page 1063.
Note: The 255.255.255.255 limited broadcast address is reserved. The appliance does not automatically create
glue A records for this address. You can however create an NS record without the associated glue records. For
more information, see Changing the Interface IP Address on page 819.
when you have networks A, B, and C on the same network interface and you assign them to a shared network, the
DHCP server can allocate available IP addresses from any DHCP range within networks A, B, and C even when all the
client requests originate from network A. When adding subnets to a shared network, ensure that the subnets are
assigned to the same members to avoid DHCP inconsistencies.
Before creating a shared network, you must first create the subnets. For example, you must first create the IPv4
networks 10.32.1.0 and 10.30.0.0 before designating them to a shared network or create the IPv6 networks
2001:db8:1::/48 and 2001:db8:2::/48 before designating them to a shared network.
After you create a network, you can define their DHCP resources such as DHCP ranges, fixed addresses, reservations,
host records, and roaming hosts. IPv4 and IPv6 support most of the same DHCP objects, except that IPv6 does not
support reservations.
About Hosts
Infoblox hosts are data objects that contain DNS, DHCP, and IPAM data of the assigned addresses. You can assign
multiple IPv4 and IPv6 addresses to a host. When you create a host, you are specifying the name-to-address and
address-to-name mappings for the IP addresses that you assign to the host. For information about Infoblox hosts, see
About Host Records on page 578.
The following checklist includes the major steps for configuring DHCP service for IPv6:
{ } = DHCP Properties
Grid Setting
{ Authoritative = True
}
Override
No override Authoritative = False
{ Authoritative = True
} { Authoritative = False
}
Member 1 Member 2
{ Authoritative =
True & False } Shared
Network
10.1.1.0/24
{ Authoritative = True & False
Deny BOOTP = True }
When a DHCP property contains inherited values from different sources, the appliance displays the corresponding
information when you create or modify an object. Based on the information provided, you can then decide whether
to override or keep the inherited values. You must have read/write permissions to the DHCP resources to override
inherited values. You can only view inherited values and paths if you have read-only permissions.
Simple Inheritance
When a DHCP property has an inherited value from a specific source, the appliance displays the value. It also displays
Inherited From <object> (where <object> can be the Grid, member, network, shared network, or DHCP range) to indicate
the source from which the value is inherited.
For example, when you set DHCP properties at the Grid level and do not override the properties at any level, the
members, networks, shared networks, DHCP ranges, fixed addresses, reservations, host addresses, and roaming
hosts inherit these properties from the Grid. The appliance displays the property value and Inherited From Grid
Infoblox for each configured DHCP property, as shown in Figure 25.5.
Unknown Inheritance
In some cases, DHCP properties may not have definite inherited values and inheritance sources. The following are
examples of unknown inheritance:
• The appliance cannot determine the inheritance sources of the DHCP properties in a template until you use the
template to create an object.
• When a network or a DHCP range does not have an assigned member, it does not have a clear definition of an
inheritance source because a network or a DHCP range inherits properties from a member.
• When individual networks in a shared network do not have member assignments, the shared network has
unknown inheritance because the shared network inherits DHCP properties from a member and its networks.
• All roaming hosts have unknown inheritance because the DHCP properties can be inherited from different DHCP
ranges within a network view.
In cases where the source of the inheritance is unknown, the appliance displays Inherited From Upper Level as the
inheritance source. As shown in Figure 25.6, network 10.1.1.0 has unknown lease time value because it does not
have any assigned member.
Multiple Inheritance
As illustrated in Figure 25.7, a network can have multiple inherited values and inheritance sources for DHCP
properties when it is served by multiple members. When an object inherits a DHCP property from different sources,
the property value can be the same from all sources or it can be different. When the value is the same, the appliance
displays the value in the property field. When there are multiple values inherited from multiple paths, the appliance
displays the information to indicate so.
In a Grid, when two members serve the same network, the network inherits DHCP properties from both associated
members. If both members have the same configured DHCP property, the network inherits the same value from both
members. For example, when DHCP network 10.1.1.0 has two associated members and both members have the
lease time set for 20 hours, the appliance displays the lease time value and Inherited From Multiple to indicate the
value is inherited from multiple sources, as shown in Figure 25.7.
Figure 25.7 Multiple Inherited Paths with the Same Inherited Value
In the same Grid with the two members serving the same network, the network inherits different values for the same
properties if you override the Grid configuration on one member but not on the other. For example, you can configure
different PXE lease times for the members and configure a member as an authoritative DHCP server for the domain
and the other not. In this case, the appliance displays Settings inherited from multiple ancestors and provides a View
Multiple Inheritance Scenarios link so you can view the inherited values and paths, as shown in Figure 25.8.
For example, to view the multiple inherited values of the Authoritative field, click View Multiple Inheritance Scenarios,
and the Multiple Inheritance Viewer displays the inherited values from the two members. Since member1.foo.net
does not have a configured value for this field, the viewer displays Not Set, as shown in Figure 25.10. You can use
this information to determine whether you want to keep the inherited values or configure new ones.
Another scenario of multiple inherited levels is when you have multiple DHCP properties that can inherit the same or
multiple values from different sources. For example, when you configure multiple DHCP custom options, each of the
options can inherit the same or multiple values from multiple paths. You can override the inherited options and
configure new ones at a specific level other than the Grid level. Though these options are grouped under DHCP
Custom Options, the appliance treats each of them as a separate property. The appliance groups the inherited
options at the top, as shown in Figure 25.10. You can override these options but you cannot delete them. For multiple
values inherited from multiple sources, you can view the values in the Multiple Inheritance Viewer by clicking View
Inheritance, as shown in Figure 25.11.
When you configure email notification for the Grid or Grid member from the Data Management tab -> Grid tab, the
email address you enter there is inherited by the DHCP configuration for the Grid, members, networks, and DHCP
ranges unless you override it at a specific level. The appliance uses this email address to send notification for a DHCP
range when the DHCP usage crosses either the effective watermark threshold. For information, see Configuring
Thresholds for DHCP Ranges on page 1087.
eng.corp100.com
10.1.1.0/24
sales.corp100.com
110.10.0.0/16 corp 100 internal DNS view
34.10.2.0/24 marketing.corp100.com
35.10.2.0/24 marketing.corp200.com
A Grid member can serve one network view only, but a network view can be served by multiple Grid members. DHCP
failover associations must be defined within a single network view, and both the primary and secondary peer must
serve the same network view.
The NIOS appliance provides one default network view. You can rename the default view and change its settings, but
you cannot delete it. There must always be at least one network view in the appliance. If you do not need to manage
overlapping IP address spaces in your organization, you can use the system-defined network view for all your
networks. You do not need to create additional network views. But if there are overlapping IP address spaces and you
need more than one network view, you can create up to 1000 network views.
Each network view must be associated with at least one DNS view. The default network view is always associated with
the default DNS view, which also cannot be deleted. When you create a network view, the appliance automatically
creates a corresponding DNS view with the same name as the network view, but with “default” prepended to the
name. You can then rename that system-defined DNS view, but you cannot delete it.
A network view can be associated with multiple DNS views (as shown in Figure 25.12), but a DNS view cannot be
associated with more than one network view. Each network view must be associated with a unique set of DNS views.
You can initiate a network discovery in only one network view at a time. When you run a discovery task, the appliance
sends updates to all DNS views associated with the network view. (For information about network discoveries, see
Chapter 14, IP Discovery and vDiscovery, on page 617.)
Note: If there are more than 20 network views, the appliance lists the available network views in the Network View
Selector dialog box. If there are 20 or less than 20 network views, the appliance displays them in the
drop-down list.
The appliance removes the network view and its associated DNS views. You can restore the network view from
the Recycle Bin, if enabled. If you restore a network view, the appliance restores the associated DNS views as
well. For information about the Recycle Bin, see Using the Recycle Bin on page 73.
— Keeping Leases in Deleted IPv4 and IPv6 Networks and Ranges on page 1094
— Configuring Fixed Address Leases For Display on page 1095
— Scavenging Leases on page 1095
• Configuring DHCP Logging on page 1096
— Configuring the Lease Logging Member on page 1096
• About IF-MAP on page 1098
— Configuring a Grid to Support IF-MAP on page 1099
— Validating the IF-MAP Server Certificate on page 1099
— Configuring Members as IF-MAP Clients on page 1099
— Creating IF-MAP Client Certificates on page 1100
— Overriding IF-MAP Publishing Settings on page 1102
— Deleting Data from the IF-MAP Server on page 1102
• Starting DHCP Services on a Member on page 1103
• Viewing DHCP Member Status on page 1104
— Viewing DHCP Configuration Files on page 1105
Note: Limited-access admin groups can access certain DHCP resources only if their administrative permissions are
defined. For information on setting permissions for admin groups, see Administrative Permissions for DHCP
Resources on page 253.
Specifying Authoritative
Only authoritative DHCP servers can send clients DHCPNAK messages when they request invalid IP addresses. For
example, a client moves to a new subnet and broadcasts a DHCPREQUEST message for its old IP address. An
authoritative DHCP server responds with a DHCPNAK, causing the client to move to the INIT state and to send a
DHCPDISCOVER message for a new IP address. Authoritative servers also respond to DHCPINFORM messages from
clients that receive their IP addresses from the DHCP server and require additional options after the initial leases
have been granted.
WARNING: Inadvertently selecting the Unlimited Lease Time check box could cause a network outage when the
address range runs out of IP addresses.
You can set a default lease time at the Grid level and then override this setting for specific members, network
containers, networks, IP address ranges or fixed addresses when appropriate.
WARNING: Inadvertently selecting the Unlimited Lease Time check box could cause a network outage when
the address range runs out of IP addresses.
To set all other properties for a Grid or member, toggle to the advanced mode and select the General Advanced
tab to complete the following:
— Ignore Optionlist: Select Ignore optionlist requested by client and return all defined options if you want the
appliance to ignore the requested list of options in the DHCPREQUEST messages it receives from DHCP
clients, and to include all the configured options in the DHCPACK and DHCPOFFER messages it sends back
to the clients.
— LEASEQUERY: Select Allow LEASEQUERY to enable the DHCP server to respond to DHCPLEASEQUERY
messages.
4. Save the configuration and click Restart if it appears at the top of the screen.
1 Client broadcasts a
DHCPDISCOVER
message.
By default, the appliance pings the candidate IP address once and waits one second for the response. You can change
these default settings to better suit your environment. Though you can increase the ping or timeout value to
accommodate delays caused by problems in the network, increasing any of these values increases the delay a client
experiences when acquiring a lease. You can also disable the appliance from sending pings by changing the number
of pings to 0.
You can define ping settings for an entire Grid, and when necessary, define different ping settings for a member.
Settings at the member level override settings at the Grid level.
To configure ping settings:
1. Grid: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member check box,
and then click the Edit icon.
2. In the DHCP Properties editor, click Toggle Advanced Mode if the editor is in basic mode. When the additional
tabs appear, click the General tab -> Advanced tab and complete the following:
— Number of Ping Requests: Enter the number of pings the appliance sends to an IP address to verify that it is
not in use. The range is 0 to 10, inclusive. Enter 0 to disable DHCP pings.
— Ping Timeout: Select the ping timeout value from the drop-down list.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: This feature enables a single lease per client on a per member basis, not on a Grid wide basis. Lease
information is not replicated among members.
To configure one-lease-per-client:
1. Grid: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member check box,
and then click the Edit icon.
2. In the DHCP Properties editor, click Toggle Advanced Mode if the editor is in basic mode. Click the General tab ->
Advanced tab and complete the following:
— One Lease Per Client: Select this check box to enable one-lease-per-client. By default, this check box is not
selected.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: This feature is applicable only to dynamic leases and does not have any effect on the static lease generated
for fixed addresses or roaming hosts.
Standalone DHCP: From the Data Management tab, select the DHCP tab, and then click System DHCP
Properties.
Shared Network Editor: From the Data Management tab, select the DHCP tab -> Networks tab -> Shared Networks
section -> shared_network check box, and then click the Edit icon.
IPv4 Network Editor: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks section ->
network check box, and then click the Edit icon.
IPv4 Range Editor: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks section ->
click on the network address. Select the IP address range check box, and then click the Edit icon.
2. In the DHCP Properties editor, select the General tab -> Advanced tab (or click Toggle Advanced Mode) and then
complete the following:
— Accept Client Identifier and MAC Address: Select this check box to instruct the DHCP server to recognize
MAC address and client UID of a DHCP client when it requests for a new lease.
— Ignore Client Identifier: By default, this check box is not selected at the Grid level. Select this check box to
ignore the client identifier of a DHCP client while placing a request to the DHCP server for a new lease. The
DHCP server will only identify the MAC address and ignores the client identifier. DHCP clients requesting
leases with different client UIDs receive the same IP address based on the MAC address. The initial default
state is inherited from the Grid level. Click Override to modify the inherited setting. To inherit the Grid
settings, click Inherit at the member, IPv4 network and range, or shared network level.
— Ignore MAC Address: By default, this check box is not selected at the Grid level. Select this check box to
ignore MAC address of a DHCP client while placing a request to the DHCP server for a new lease. To override
the value that has been inherited from the Grid, click Override. Click the Add icon, the appliance adds a row
to the table. Click the row and enter the MAC address to be ignored. You can also select a check box and
click the Delete icon to delete the MAC address. To inherit the Grid settings, click Inherit at the member,
IPv4 network and range, or shared network level.
3. Save the configuration and click Restart at the top of the screen.
You can configure BOOTP and PXE properties at the Grid level and override them for members, IPv4 network
containers, IPv4 networks, DHCP ranges, fixed addresses, and reservations, host addresses, and roaming hosts. You
cannot configure BOOTP and PXE properties for IPv6 DHCP objects.
To configure or override BOOTP and PXE properties:
1. Grid Level: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the
Toolbar.
Member Level: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member
check box, and then click the Edit icon.
Network Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
check box, and then click the Edit icon.
Network Container: From the Data Management tab, select the IPAM tab -> network_container check box, and
then click the Edit icon.
DHCP Range Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
addr_range check box, and then click the Edit icon.
Fixed Address Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
-> fixed_address check box, and then click the Edit icon.
Reservation: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
reservation check box, and then click the Edit icon.
2. In the DHCP Properties editor, select the BOOTP/PXE tab and complete the following:
— PXE Lease Time: Click Override and select Enable PXE Lease Time if you want the DHCP server to use a
different lease time for PXE clients. You can specify the duration of time it takes a host to connect to a boot
server, such as a TFTP server, and download the file it needs to boot. For example, set a longer lease time if
the client downloads an OS (operating system) or configuration file, or set a shorter lease time if the client
downloads only configuration changes. Enter the lease time for the preboot execution environment for
hosts to boot remotely from a server.
— Deny BOOTP Requests: Select Deny BOOTP Requests to disable the BOOTP settings and deny BOOTP boot
requests.
— Complete the following in the BOOTP Settings section:
— Boot File: Enter the name of the boot file the client must download.
— Next Server: Enter the IP address or hostname of the boot file server where the boot file is stored.
Complete this field if the hosts in your network send requests for the IP address of the boot server. If
the TFTP server is the NIOS appliance that is also serving DHCP, enter the IP address of the appliance.
— Boot Server: Enter the name of the server on which the boot file is stored. Clients can request for either
the boot server name or IP address. Complete this field if the hosts in your network send requests for
the boot server name. If the TFTP server is the appliance that is also serving DHCP, enter the name of
the appliance.
Note: Enter values in both the Next Server and Boot Server fields if some hosts on your network require the boot
server name and others require the boot server IP address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note that a few characters need manual escaping when you configure a DHCP boot file name, in order to keep the
dhcpd.conf file consistent. If you do not use appropriate escape characters, then it might lead to a non working boot
file name. The following characters require manual escaping:
• '\t'- Tabulation character
• '\r'- Carriage return
• '\n'- New line
• '\b'- Bell
• '\xYY'- YY hex-number (a-f, 0-9)
For example, if you set the ‘Boot File’ to:
'\x86\topdir\subdir\file.img'
You might need to enter \x and \t as the manual escape characters:
'\\x86\\topdir\subdir\file.img'
You can also specify all \ as the manual escape character:
'\\x86\\topdir\\subdir\\file.img'
The above commands result in the underlying dhcpd.conf file:
'\x5cx86\x5ctopdir\\subdir\\file.img'
or
'\x5cx86\x5ctopdir\x5csubdir\x5cfile.img'
You can also create an option filter the appliance uses to filter address requests by the DHCP options of requesting
hosts. The filter instructs the appliance to either grant or deny an address request if the requesting host matches the
filter. For information, see Defining Option Filters on page 1198.
The DHCP option configuration conforms to the following RFCs:
• RFC 2132, DHCP Options and BOOTP Vendor Extension
• RFC 3046, DHCP Relay Agent Information Option. The supported options include option 60 (Client Identifier), 21
(Policy Filter), 22 (Maximum Datagram Reassembly Size), 23 (Default IP Time-to-Live), and 82 (Support for
Routed Bridge Encapsulation).
• RFC 3925, Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)
• RFC 2939, Procedures and IANA Guidelines for Definition of New DHCP Options and Message Types
String An ASCII text string (the same as the text data type) or a list of
hexadecimal characters separated by colons
Formatting to distinguish an ASCII text string from a hexadecimal string
is important. For details, see the following section
Boolean A flag with a value of either true or false (or on or off )
IP address A single IP address
Array of IP addresses A series of IP addresses, separated by commas
You can optionally include a space after each comma
Text An ASCII text string
8-, 16-, or 32-bit unsigned integer A numeric range of the following possible values
8-bit unsigned integer: from 0 to 255
16-bit unsigned integer: from 0 to 65,535
32-bit unsigned integer: from 0 to 4,294,967,295
8-, 16-, or 32-bit signed integer A numeric range of the following possible values
8-bit signed integer: from -128 to 127
16-bit signed integer: from -32,768 to 32,767
32-bit signed integer: from -2,147,483,648 to 2,147,483,647
Domain name A list of domain names, separated by spaces
When defining a hexadecimal string for a DHCP option (such as option 43, vendor encapsulated options), use only
hexadecimal characters (0-9, a-f, or A-F) without spaces and separated by colons. The accepted form for a
hexadecimal string, as presented in a regular expression, is [0-9a-fA-F]{1,2}(:[0-9a-fA-F]{1,2})*
Two examples of correctly written hexadecimal strings:
• aa:de:89:1b:34
• 1C:8:22:A3 (Note that the DHCP module treats a single hexadecimal character, such as “8” as “08”.)
A few examples of incorrectly written hexadecimal strings:
• :bb:45:d2:1f – Problem: The string erroneously begins with a colon.
• bb:45:d2:1f: – Problem: The string erroneously ends with a colon.
• bb:4 5:d2:1f – Problem: The string erroneously includes a space between two characters (“4” and “5”).
• bb:45:d2:1g – Problem: The string erroneously includes a nonhexadecimal character (“g”).
The DHCP module treats incorrectly written hexadecimal strings as simple text strings, not hexadecimal strings. If the
string appears in quotes, it is a text string.
• Specify values for the options and apply them to the Grid, or to a member, network, range, fixed address,
reservation, host, or roaming host. For more information, see Applying DHCP Options on page 1083.
1. From the Data Management tab, select the DHCP tab -> Networks tab -> Networks subtab, and click the
192.168.2.0/24 network.
2. Click the 192.168.2.10 - 100 check box, and then click the Edit icon.
3. In the DHCP Properties editor, select the DHCP tab and complete the following in the Custom DHCP Options
section:
— From the drop-down list of options, select tftp-server (150) array of address. In the second field, enter
192.168.1.2.
Click + to add another option.
— From the drop-down list of options, select pxe-configfile (209) text. In the second field, enter pxe.config,
which is the file name of the boot image.
4. Save the configuration and click Restart if it appears at the top of the screen.
The member then includes options 150 and 209 in its DHCP messages to clients that are allocated IP addresses from
the DHCP range 192.168.2.10 - 100.
3. If the NIOS appliance accepts the address request, it responds to the relay agent with a DHCPOFFER message. If
the appliance denies the request, it does not send any response in case other DHCP servers that might be
involved respond instead.
4. The relay agent forwards the response to the client, usually as a broadcast message.
The situation is different for individual hosts connecting to the Internet through an ISP, usually over a circuit-switched
data network.
1. A host connects to its ISP’s circuit access concentration point, authenticates itself, and requests an IP address.
2. The circuit access unit relays the address request to a DHCP server, which responds with a DHCPOFFER message.
To avoid broadcasting the DHCPOFFER over the network segment on which the host made the request, the relay agent
sends the response directly to the host over the established circuit.
Option 82 assists the agent in forwarding address assignments across the proper circuit. When a relay agent receives
a DHCPDISCOVER message, it can add one or two agent IDs in the DHCP option 82 suboption fields to the message.
The two relay agent IDs are:
• Circuit ID: This identifies the circuit between the remote host and the relay agent. For example, the identifier can
be the ingress interface number of the circuit access unit (perhaps concatenated with the unit ID number and
slot number). The circuit ID can also be an ATM virtual circuit ID or cable data virtual circuit ID.
• Remote ID: This identifies the remote host. The ID can be the caller ID telephone number for a dial-up
connection, a user name for logging in to the ISP, a modem ID, and so on. Because the remote ID is defined on
the relay agent, which is presumed to have a trusted relationship with the DHCP server, and not on the
untrusted DHCP client, the remote ID is also presumably a trusted identifier.
Note: For information about the relay agent option, refer to RFC3046, DHCP Relay Agent Information Option.
On the NIOS appliance, you can do the following with option 82:
• Screen address requests through a relay agent filter you set up using option 82. For more information, see
About Relay Agent Filters on page 1195.
• Use the relay agent information (circuit ID or remote ID) as a host identifier when configuring a fixed address,
though you cannot do so in a host record. For information about how to configure a circuit ID or remote ID as an
identifier, see Adding IPv4 Fixed Addresses on page 1126.
• Define how Grid Manager displays the relay agent ID, circuit ID, and remote ID (when applicable) in the detailed
lease information panel. For information about how to configure the logging format for option 82, see Defining
Logging Format for DHCP Option 82.
Note: You cannot override this Grid setting at the member level. Also, changing the logging format requires a
DHCP service restart.
High
Watermark
Allocated
Low Leases
Watermark
You can define watermarks at the Grid, member, network, and DHCP range levels, but the appliance applies them
solely to DHCP ranges. Because the appliance applies settings hierarchically in a parent-child structure, by defining
watermarks once at a higher level, DHCP ranges can then inherit these settings without your needing to redefine them
for each range. For example, if you set high and low watermarks for a Grid, then each Grid member, each network, and
each DHCP range inherits these settings. However, if you override these settings at the member level, then the
network and DHCP ranges for that member inherit its settings. If you override the Grid member settings at the network
level, then that network and any DHCP ranges within that network inherit the network-level settings. Finally, you can
set high and low watermarks for an individual DHCP range, which override anything set at a higher level.
Figure 26.3 shows different high and low watermark settings at different levels. Although you can set thresholds at
four levels (Grid, Grid member, network, and DHCP range), the NIOS appliance applies them to DHCP ranges.
Watermarks at Grid
Different Levels
80%
You can set DHCP range
usage thresholds (watermarks) 65%
for Grids, Grid members, Grid Member
networks, and DHCP ranges.
The thresholds that you set at 75%
more narrowly defined levels 20%
override thresholds set at the
more generic levels that 50% Network
contain them. For example, if 90%
address usage exceeds the 25%
70% high watermark or dips
below the 30% low watermark
for the DHCP range shown DHCP Range
40%
here, the NIOS appliance generates email and
SNMP alerts, even though address usage is Available Leases
70% High Watermark
within acceptable ranges at all higher levels. 10%
There is a parent-child relationship among different levels. 50%
If you do not set a watermark at a more specific level, it
inherits the setting from a higher level that contains it. 30% Allocated Leases
Low Watermark
Note: You can set watermarks at different levels, but the appliance
applies only watermarks that are set or inherited at the DHCP range.
Address usage in a DHCP range can trigger an event and an email notification when it crosses a watermark. You must
enable DHCP threshold and email warnings to receive events and notifications. The following are actions that do and
do not trigger an address usage event and notification:
Address usage triggers an event and the appliance sends a notification when the percentage of the allocated
addresses in the DHCP range:
— Exceeds the high watermark
— Drops below or equals to the high watermark after exceeding it
— Drops below the low watermark
— Exceeds the low watermark after dropping below it
Address usage does not trigger an event when the percentage of the allocated addresses in the DHCP range:
— Never exceeds the low watermark
— Initially exceeds the low watermark
— Reaches a watermark but does not cross it
Note: You can effectively disable address usage events for a DHCP range by setting its high watermark at 100% and
the low watermark at 0% (default setting for the low watermark). Because address usage cannot cross these
watermarks, no events can occur.
You can configure the threshold settings at the Grid level and override them at the member, network, and DHCP range
levels. To override an inherited DHCP property, click Override next to the property to enable the configuration. For
information, see Overriding DHCP Properties on page 1059.
To configure thresholds:
1. Grid: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member check box,
and then click the Edit icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network check box,
and then click the Edit icon.
Network Container: From the Data Management tab, select the IPAM tab -> network_container check box, and
then click the Edit icon.
DHCP Range: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
addr_range check box, and then click the Edit icon.
2. In the editor, select the IPv4 DHCP Thresholds tab and complete the following:
— DHCP Thresholds: Specify the following:
— Enable DHCP Thresholds: Select Enable DHCP Thresholds to enable the DHCP threshold feature.
• High: Enter a number between 0 and 100. Enter Trigger and Reset values. If the percentage of
allocated addresses in a DHCP range exceeds the Trigger value, the appliance makes a syslog entry
and—if configured to do so—sends an SNMP trap and an email notification to a designated
destination. When the percentage first reaches the Reset value after it hit the Trigger value, the
appliance sends an SNMP trap and an email notification to a designated destination. The default
Trigger value is 95, and the default Reset value is 85.
• Low: Enter a number between 0 and 100. If the percentage of allocated addresses in a DHCP range
drops below the Trigger value, the appliance makes a syslog entry and—if configured to do so—
sends an SNMP trap and an email notification to a designated destination. When the percentage
first reaches the Reset value after it hit the Trigger value, the appliance sends an SNMP trap. The
default Trigger value is 0 and the default Reset value is 10.
— Enable SNMP Warnings: Select this for the appliance to send an SNMP trap to the trap receiver that you
define for the Grid when the address usage in a DHCP range crosses a high or low mark threshold.
— Enable Email Warnings: Select this for the appliance to send an email notification to an administrator if
the address usage in a DHCP range crosses a high or low mark threshold.
— Email Addresses: Click Override to override the Grid administrator email address configured in the Data
Management tab -> Grid tab. This address is not hierarchically inherited from the Grid DHCP configuration.
Click the Add icon, and then enter an email address to which you want the appliance to send email
notifications when the DHCP range for the network crosses a threshold. You can create a list of email
addresses.
3. Save the configuration and click Restart if it appears at the top of the screen.
Fixed Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
Fixed address check box, and then click the Edit icon.
2. In the DHCP Properties editor, select the IPv6 DHCP Options tab, and complete the following:
— Valid Lifetime: Specify the length of time addresses that are assigned to DHCP clients remain in the valid
state. When this time expires, an address becomes invalid and can be assigned to another interface.
— Preferred Lifetime: Specify the length of time that a valid address is preferred. A preferred address can be
used with no restrictions. When this time expires, the address becomes deprecated.
— Domain Name: Enter the name of the domain for which the Grid serves DHCP data.
— DNS Servers: Click the Add icon. Grid Manager adds a row to the table. In the table, enter the IPv6
addresses of DNS recursive name servers to which the DHCP client can send name resolution requests. The
DHCP server includes this information in the DNS Recursive Name Server option in Advertise, Rebind,
Information-Request, and Reply messages.
3. Save the configuration.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network check box,
and then click the Edit icon.
Network Container: From the Data Management tab, select the IPAM tab -> network_container check box, and
then click the Edit icon.
Fixed Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
fixed_address check box, and then click the Edit icon.
Host Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
host_record check box, and then click the Edit icon. Select the host IP address, and then click the Edit icon.
Roaming Host: From the Data Management tab, select the DHCP tab -> Networks tab -> Roaming Hosts ->
roaming_host check box, and then click the Edit icon.
2. In the DHCP Properties editor, select the IPv6 DHCP Options and complete the following:
— Custom IPv6 DHCP Options: In the first field, select one of the following from the drop-down list:
— DHCPv6: Select this to apply DHCPv6 options.
— DHCP: Select this to apply DHCP options (dhcp-renewal-time or dhcp-rebinding-time).
In the second field, click the Choose option arrow and select an option from the list. In the third field, enter a
value for the selected option. Note that certain options have predefined data types and their values must be
entered in a specific format. For information about the data types, see DHCP Option Data Types on page 1080.
Click + to add another option, or click - to delete a previously specified option. When overriding an option, enter
the new value for the selected option.
Note that if you created an option space, this section displays a list of option spaces in the first drop-down
menu, so you can select the option space of the option you want to define.
3. Save the configuration and click Restart if it appears at the top of the screen.
1. Grid: From the Data Management tab, select the DHCP tab, and then select Grid DHCP Properties from the
Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member check box,
and then click the Edit icon.
2. In the DHCP Properties editor, select the General Basic tab and complete the following:
— IPv4 Properties
— Microsoft Clients Code Page: From the drop-down list, select the code page with which the host names
are encoded when the appliance converts the Microsoft code page encoded host names to UTF-8
characters.
— IPv6 Properties
— Microsoft Clients Code Page: From the drop-down list, select the code page with which the host names
are encoded when the appliance converts the Microsoft code page encoded host names to UTF-8
characters.
3. Save the configuration and click Restart if it appears at the top of the screen.
— Optionally, select a default zone. When you create or edit an A, AAAA or host record from a network in the
IPAM tab, Grid Manager automatically selects the default zone that is assigned to the network.
5. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
Scavenging Leases
The accumulation of free and backup DHCPv4 leases; and free, expired, and released DHCPv6 leases results in
unnecessary growth of database objects. The DHCP lease scavenging feature enables member DHCP servers to
automatically delete free and backup IPv4 leases; and free, expired, and released IPv6 leases that remain in the
database beyond the specified period of time, thus reducing the number of database objects.
When you enable this feature for DHCPv4 leases, the appliance permanently deletes the free and backup IPv4 leases,
and you can no longer view or retrieve the lease information. This option can be enabled globally at the Grid level,
and more specifically for a member, shared network, network, network container, DHCP range, network template,
DHCP range template.
When you enable this feature for DHCPv6 leases, the appliance permanently deletes the free, expired, and released
IPv6 leases, and you can no longer view or retrieve the lease information. This option can be enabled at the Grid level,
and overridden at the member level.
The period of time that you specify is the duration after the expiration date of a lease, not its release date. For
example, you specify a time period of 5 days when you enable this feature. If the lease time of an IP address is 10
days, but the lease is released after five days, the appliance still deletes the lease from the database after 15 days
because the IP address has been leased.
Note: If you plan to enable this feature after upgrading from a previous NIOS version, Infoblox recommends that you
enable it during off-peak hours, as it may impact DHCP services.
DHCP Range: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
addr_range check box, and then click the Edit icon. This is applicable for IPv4 lease scavenging only.
2. In the editor, click Toggle Advanced Mode if the editor is in basic mode, and then click the General tab ->
Advanced tab.
In the Network editor for IPv4 lease scavenging, click Toggle Advanced Mode if the editor is in basic mode, and
then click IPv4 DHCP Options -> Advanced.
Complete the following:
— IPv4 Properties
— Lease Scavenging: This is disabled by default. Select the Scavenge free and backup leases after check
box and specify the number of days or weeks that free and backup IPv4 leases remain in the database
before they are automatically deleted. This can be set for the Grid, member, network, and network
container.
— IPv6 Properties
— Lease Scavenging: This is disabled by default. Select the Scavenge free, expired and released leases
after check box and specify the number of hours, days, or weeks that free, expired, and released IPv6
leases remain in the database before they are automatically deleted. The minimum is 6 hours and the
maximum is 180 days. The default is one week. This can be set at the Grid and member level.
3. Save the configuration.
Grid
You can enable DHCP lease logging at the Grid level, and then
disable it for selected members. In this Grid, four members send
DHCP lease events to the master, which forwards them to a
designated logging member. Two Grid members do not log
DHCP lease events.
Lease Logging
Disabled
Logging Member
Note: You cannot configure vNIOS Grid members on Riverbed as DHCP lease history logging members.
4. For information about viewing current leases, see Viewing Current Leases on page 1244
About IF-MAP
You can configure Infoblox DHCP servers to publish DHCP data to an IF-MAP server. The IF-MAP server takes real-time
information from different sources and stores it in a shared database from which clients can retrieve information
about network devices, their status and activities. For details about the IF-MAP protocol, refer to
http://www.trustedcomputinggroup.org. For information about the Infoblox IF-MAP server, refer to the Infoblox
Administrator Guide for Infoblox Orchestration Server.
Each Infoblox DHCP server in a Grid can function as an IF-MAP client, with the ability to publish lease information to
an IF-MAP server. For information about how to configure an IF-MAP client, see Configuring Members as IF-MAP Clients
on page 1099. You can configure the client to publish ip-mac and ip-duid (for DHCPv6 leases) metadata at the Grid
and member levels. You can also configure the client to publish metadata for specific leases by overriding the Grid or
member publishing settings at the network (IPv4 and IPv6) or range (IPv4 only) level. The DHCP server sends updates
to the IF-MAP server using the XML format and SOAP/HTTPS bindings specified in IF-MAP v1.1r5 and v2.0r26. The
DHCP server supports the IF-MAP 2.0 protocol by default. You can also enable the support for IF-MAP 1.1, as
described in Configuring a Grid to Support IF-MAP.
When the DHCP server grants an IPv4 lease and sends the DHCPACK packet to the DHCP client, it updates the link in
the IF-MAP server between the leased IP address and client MAC address with ip-mac metadata with the following
attributes: start-time, end-time, and dhcp-server. The dhcp-server attribute contains the DHCP server hostname. The
ip-mac metadata is attached to a link with:
• An ip-address identifier with the type attribute set to IPv4, a value attribute that contains the leased IP address,
and the administrative-domain attribute set to the network view to which the IP address belongs.
• A mac-address identifier with a value attribute that contains the client MAC address. It does not have the
administrative-domain attribute.
When the DHCP server grants an IPv6 lease and sends the Reply message to the DHCP client, it updates the link in
the IF-MAP server between the leased IP address and client DHCP Unique Identifier (DUID) with ip-duid metadata that
contains the following attributes: start-time, end-time, and dhcp-server. The dhcp-server attribute contains the DHCP
server hostname. The ip-duid metadata is attached to a link with:
• An ip-address identifier with the type attribute set to IPv6, a value attribute that contains the leased IP address,
and the administrative-domain attribute set to the network view to which the IP address belongs.
• A duid identifier with a value attribute that contains the client DUID. It does not have the administrative-domain
attribute.
The Infoblox DHCP server also publishes data when an IPv4 or IPv6 lease changes. When a lease is released or when
an active lease expires, the DHCP server sends a “publish delete” request to the IF-MAP server.
You can define how the IF-MAP server handles the existing ip-mac and ip-duid information before the DHCP client
sends the next update. For example, you can specify the IF-MAP server to always delete existing ip-mac and ip-duid
information before the next update. For information, see Deleting Existing Data Before Publishing on page 1102.
Following are the tasks to enable DHCP servers in a Grid to function as IF-MAP clients:
1. Enable IF-MAP in the Grid and specify the URL and port of the IF-MAP server, as described in Configuring a Grid
to Support IF-MAP on page 1099.
2. Optionally, enable the validation of the IF-MAP server certificate and import the CA certificate, as described in
Validating the IF-MAP Server Certificate on page 1099.
3. Enable IF-MAP on each Grid member and specify an authentication method the member uses to connect to the
IF-MAP server, as described in Configuring Members as IF-MAP Clients on page 1099.
4. Optionally, override publishing settings at the member, network, or range level, as described in Overriding
IF-MAP Publishing Settings on page 1102.
You can also delete DHCP data published by a specific member, or define how the IF-MAP server deletes existing
DHCP data before a client publishes an update. For information, see Deleting Data from the IF-MAP Server on page
1102.
Note: When you upgrade to a new NIOS release, the basic authentication credentials are retained if IF-MAP was
enabled and basic authentication was used before the upgrade.
— Enable IF-MAP publishing: Click Override to override the Grid setting. Select this check box to enable
IF-MAP publishing for all the networks that are served by this member. Ensure that you enable IF-MAP
at either the Grid or member level in order to enable IF-MAP publishing for all networks.
4. Save the configuration and click Restart if it appears at the top of the screen.
Uploading Certificates
When you receive the certificate from the CA, the appliance finds the matching CSR and takes the private key
associated with the CSR and associates it with the newly imported certificate. The appliance then automatically
deletes the CSR.
To import a certificate:
1. From the Data Management tab, select the DHCP tab -> Members tab -> member check box, and then click IF-MAP
Client Certificate -> Upload Certificate from the Toolbar.
2. Navigate to where the certificate is located and click Open.
3. If the appliance already has an existing IF-MAP client certificate, the new certificate replaces the existing one. In
the Replace IF-MAP Certificate Confirmation dialog box, click Yes.
Downloading Certificates
You can download the current certificate or a self-signed certificate.
To download a certificate:
1. From the Data Management tab, select the DHCP tab -> Members tab -> member check box, and then click IF-MAP
Client Certificate -> Download Certificate from the Toolbar.
2. Navigate to where you want to save the certificate, enter the file name, and then click Save.
Note: You can mouse over on the informational icon next to the status to view detailed information.
Note: You can mouse over on the informational icon next to the status to view detailed information, including
the status description and the timestamp when the status initially changed.
— IF-MAP Last Update: The timestamp the status of the IF-MAP service was last updated. For example, if the
IF-MAP connection status is Running and this field shows 2011-11-20 12:30:42 EST, it means that an
IF-MAP operation, such as a publish, was last completed on November 20, 2011 at 12:30:42 Eastern
Standard Time.
To view status information about the IF-MAP connection on an independent appliance, from the Data Management
tab -> DHCP tab, click System DHCP Properties from the toolbar. The appliance displays the following:
• IF-MAP Connection: The status of the IF-MAP service on the independent appliance. A color icon associated with
the connection status appears before the status.
• IF-MAP Connection Information: Detailed information about the status. On a Grid member, this information
appears when you mouse over on the informational icon.
• IF-MAP Last Update: The timestamp when the status of the IF-MAP service last changed.
Note: For more information about these fields, see descriptions about Grid member status in this section.
You can view detailed information about a specific member by clicking the member link. Grid Manager displays the
following information about the selected member:
• Network: The network assigned to the member.
• Comment: The information about the network.
• IPv4 DHCP Utilization: The percentage of the DHCP usage of the network. This is the percentage of the total
number of fixed addresses, reservations, hosts, and active leases on the network over the total IP addresses in
the range, excluding the number of addresses on the network. Note that only enabled objects are included in
the calculation. It does not include abandoned addresses or leases.
• Site: The site to which the DHCP object belongs. This is one of the predefined extensible attributes.
In the member panel, you can select the following additional fields for display:
• Disabled: Indicates whether the member is disabled or not.
• IPAM Utilization: When you define a network, this is the percentage based on the IP addresses in use divided by
the total addresses in the network. For example, in a /24 network, if there are 25 static IP addresses defined
and a DHCP range that includes 100 addresses, the total number of IP addresses in use is 125. Of the possible
256 addresses in the network, the IPAM utilization is about 50% for this network.
When you define a network container that contains subnets, this is the percentage of the total address space
defined within the container regardless of whether any of the IP addresses in the subnets are in use. For
example, when you define a /16 network and then 64 /24 networks underneath it, the /16 network container is
considered 25% utilized even when none of the IP addresses in the /24 networks is in use.
You can use this information to verify if there is a sufficient number of available addresses in a network. The
IPAM utilization is calculated approximately every 15 minutes.
• Extensible attributes that associate with the network.
You can also sort the data in ascending or descending order by column. For information, see Customizing Tables on
page 69.
Note: The appliance does not search for deleted leases in the Recycle Bin.
When multiple users simultaneously request for the next available network or IP address, the appliance returns the
same unused network or IP address to all users. The user who first saves the task gets the next available network or
IP address. In some cases, other users get an error message telling them that the network or IP address is not
available when they save their tasks. They can then request another unused network or IP address or enter a new one.
— Registration Action: Select the registration action from the drop-down list. When you select Create, the
appliance creates the IPv4 network and assigns it to the selected organization. When you select None,
the appliance does not send registration updates to RIPE. When you are adding an existing RIR
allocated network to NIOS, select None. When you are adding networks to an RIR allocated network (a
parent network), select Create. Ensure that the parent network associated with an RIR organization
already exists.
— Do not update registrations: Select this check box if you do not want the appliance to submit RIR
updates to RIPE. By default, the appliance sends updates to the RIR database based on the configured
communication method.
— Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the network.
— Netmask: Enter the netmask or use the netmask slider to select the appropriate number of subnet mask
bits for the network. The appliance supports /1 to /32 netmasks. Note that when you use a template that
contains a fixed netmask, you cannot adjust the netmask for this network.
Microsoft servers can serve networks with /1 to /31 netmasks. Infoblox DHCP servers can serve networks
with /8 to /32 netmasks.
Since Infoblox DHCP servers do not support /1 to /7 networks, you can assign these networks to Microsoft
DHCP servers only. You can create DHCP ranges and fixed addresses within these subnets.
— Networks: Do one of the following to add new networks:
Click the Add icon to enter a new network. Grid Manager adds a row to the table. Enter the network address
in the Network field. Click the Add icon again to add another network.
or
Click the Next Available icon to have the appliance search for the next available network. Complete the
following in the Next Available Networks section:
— Create new network(s) under: Enter the network container in which you want to create the new network.
When you enter a network that does not exist, the appliance adds it as a network container. When you
enter a network that is part of a parent network, the parent network is converted into a network
container if it does not have a member assignment or does not contain address ranges, fixed
addresses, reservations, shared networks, and host records that are served by DHCP. When you enter a
network that has a lower CIDR than an existing network, the appliance creates the network as a parent
network and displays a message indicating that the newly created network overlaps an existing
network. You can also click Select Network to select a specific network in the Network Selector dialog
box. For information about how the appliance searches for the next available network, see Obtaining
the Next Available on page 1110.
— Number of new networks: Enter the number of networks you want to add to the selected network
container. Note that if there is not enough network space in the selected network to create the number
of networks specified here, Grid Manager displays an error message. The maximum number is 20 at a
time. Note that when you have existing networks in the table and you select one, the number you enter
here includes the selected network.
— Click Add Next to add the networks. Grid Manager lists the networks in the table. You can click Cancel to
reset the values.
Note: You must click Add Next to add the network container you enter in the Next Available Networks section. If
you enter a network in the Next Available Networks section and then use the Add icon to add another
network, the appliance does not save the network you enter in the Next Available Networks section until
you click Add Next.
— Comment: Enter useful information about the network, such as the name of the organization it serves.
— Automatically Create Reverse-Mapping Zone: This function is enabled if the netmask of the network equals
/8, /16, or /24. Select this to have the appliance automatically create reverse-mapping zones for the
network. A reverse-mapping zone is an area of network space for which one or more name servers have the
responsibility for responding to address-to-name queries. These zones are created in the DNS view
assigned to receive dynamic DNS updates at the network view level.
— Disable for DHCP: Select this if you do not want the DHCP server to provide DHCP services for this network
at this time. This feature is useful when you are in the process of setting up the DHCP server. Clear this after
you have configured the server and are ready to have it serve DHCP for this network.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. To delegate authority for this network,
complete the following:
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the network you want to create has already been
delegated to a Cloud Platform Appliance. Click Select to choose the Cloud Platform Appliance to which you
want to delegate authority. The Member Selector displays only Cloud Platform Appliances in the Grid. Click
the member, and Grid Manager displays the member name next to this field. This cloud member now
assumes authority for this network, and the Grid Master does not have authority any more. You can also
click Clear to remove authority delegation from the selected Cloud Platform Appliance and return authority
back to the Grid Master.
5. Click Next and add a Grid member or Microsoft server as a DHCP server for the network. A network can be served
by either Grid members or Microsoft servers, but not both at the same time.
— click the Add icon and select one of the following options:
— Add Infoblox Member: Select this option to add a Grid member as a DHCP server for the network. Select
the Grid member from the Member Selector dialog box. Keep in mind, DHCP properties for the network
are inherited from this member. The network can be served by multiple members, but a member can
serve networks in one network view only.
or
— Add Microsoft Server: Select this option to add a Microsoft server as a DHCP server for the network.
Select the Microsoft server from the Microsoft Server Selector dialog box.
6. Click Next to associate Active Directory Sites with the network. For more information, see Associating Active
Directory Sites with Networks on page 1272.
7. Click Next to override DHCP properties as described in About DHCP Properties on page 1071. This only applies
if you are adding a network that is served by an Infoblox Grid member.
or
8. (Applies only with Network Insight) Click Next to initiate or disable discovery of the new network(s). This step is
not required for creating a new network. Discovery settings differ based on whether you are defining one network
or multiple networks.
— Configuring one network: discovery settings include the following: Enable Discovery and Enable Immediate
Discovery, selecting a Probe member to perform the discovery; and Polling Options, which define how the
network will be discovered by the Probe member, including the ability to enable or disable the use of SNMP
Credentials and CLI Credentials, along with Switch Port Data Collection settings. By default, all Polling
Options discovery settings are inherited from the parent network (or Grid, if no parent exists) unless you
click Override. Polling Options govern the protocols used to query and collect information about the
network devices being discovered. For more information, see the section Configuring Discovery Properties
on page 676 for a complete description of discovery Polling Options.
or
— Configuring more than one network: If the networks are child networks, they automatically inherit the
settings of the parent network, including discovery settings and the discovery member. Discovery is
disabled for any parent networks. These settings will not appear in the wizard page. For discovery of
multiple networks, you can only enable or disable Immediate Discovery.
9. As part of creating a network in IPAM or DHCP, you can provision the network on an actual device (switch, router,
or switch-router), that is discovered and managed through the Grid Manager.
— Begin by checking the Enable Network Provisioning check box, and clicking the Select Device button.
Choose your device from the Device Selector dialog. (Click Clear to remove the setting. For more
information, see the section Using the Device Selector on page 689.)
— If you performed DHCP configuration in the previous step of the Add Network Wizard, the Router IP value
will automatically be populated with the DHCP Router IP address value. Otherwise, you enter the standard
router IP address (for example, if Grid Manager discovers and manages a router 172.16.22.1, the IP value
172.16.22.1 should be entered in the Router IP field).
— if required for the newly provisioned network to ensure that attached devices receive DHCP
auto-configuration, enable the DHCP Forwarding check box. For this setting, if a DHCP Failover was
previously configured, the IP addresses defined for DHCP failover are automatically used for the DHCP
forwarding configuration.
— You will also need to choose an interface on the selected device on which to provision the network by
selecting it from the Interface drop-down menu. Grid Manager ensures that only those interfaces that can
support provisioning, and are available for provisioning (that do not have an Operation Status of Up),
appear in the drop-down menu.
— Otherwise, when creating networks and provisioning them on managed devices, you can create a VLAN on
which to provision the network by clicking the Create VLAN option and entering the VLAN Name and VLAN
ID. Ensure that the VLAN ID value you enter is appropriate for the application - do not create a new VLAN and
provision a network for a VLAN value that is already actively carrying traffic for another routing domain.
If a selected device does not support VLANs, the Create VLAN option will not appear.
10. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see About Extensible Attributes on page 417.
If you are adding an RIR network, the RIR network attribute table appears. For information about these attributes
and how to enter them, see RIR Network Attributes on page 565. You can preview the information before the
appliance submits updates to the RIPE database. To preview registration updates, click Preview RIR
Submissions. For more information, see Previewing Registration Updates on page 569.
Note: You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute, you
must delete it from the table. You can enter up to 256 characters for all RIR attributes.
11. As the final step in the Add IPv4 Network wizard, you define when Grid Manager provisions the new network by
scheduling it. You also schedule when the associated port control task executes (if a port configuration has been
specified).
— To create the new network and its associated port configuration immediately, select Now. Grid Manager
synchronizes the port control task to take place at the same time as the creation of the new network.
— You can choose to have Grid Manager execute the port control task at the same time as the network
creation. To do so, select At same time as above.
— You can choose to have Grid Manager execute the port control task at a later time by selecting Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
12. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the new network and close the wizard (this is the default).
— Click Save & Edit to add the new network and launch the editor.
— Click Save & New to add the new network and launch the wizard again to add another network.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
Viewing Networks
You can view IPv4 networks from the IPAM tab -> Net Map and List panels. The Net Map panel provides a graphical
view of your networks and the List panel displays the networks in table format. For more information, seeIPv4
Network Map on page 586 and IPAM Home on page 590.
You can also view a list of IPv4 and IPv6 networks in the DHCP tab -> Networks tab -> Networks panel. This panel
displays all IPv4 and IPv6 networks.
In any of these panels, you can use filters or the Go to function to navigate to a specific network. You can also create
a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77. You can add,
delete, or edit a network. You can also monitor the DHCP utilization of a selected network.
When viewing networks, you can choose to view them in one of the following views:
• Click Toggle Hierarchical View to view networks hierarchically in a parent-child structure (networks in a network
container). You can view detailed information about the networks by clicking the network link and drilling down
to the lowest hierarchical level, and then opening a network. To go back to a previous hierarchical view, click
the link of the corresponding level in the breadcrumb. The hierarchical view is the default view.
• Click Toggle Flat View to display a flat list of all networks and network containers. The parent and child networks
are listed separately in the flat view.
Depending on where you view your networks from, Grid Manager displays some of the following information by
default. You can also select specific information for display.
• Network: The network address.
The network is displayed in one of the following colors:
— Yellow: The network is unmanaged.
— Blue: The selected network.
— Grey: The network is currently not available as a NIOS network object.
• Comment: The information you entered about the network.
• IPAM Utilization: This information is available for IPv4 networks only. It displays the percentage based on the IP
addresses in use divided by the total addresses in the network. For example, in a /24 network, if there are 25
static IP addresses defined and a DHCP range that includes 100 addresses, the total number of IP addresses in
use is 125. Of the possible 256 addresses in the network, the IPAM utilization is about 50% for this network.
The appliance updates the IPAM utilization data immediately for a network container, but for a network it is
updated every 15 minutes.
The IPAM utilization data is displayed in one of the following colors:
— Red: The IPAM utilization percentage is above the configured Trigger value.
— Blue: The IPAM utilization percentage is below the configured Trigger value.
• Site: The site to which the network belongs. This is one of the predefined extensible attributes.
• Protocol: Displays whether the network is an IPv4 or IPv6 network.
• Disabled: Indicates if the network is disabled.
• Leaf Network: Indicates whether the network is a leaf network or not. A leaf network is a network that does not
contain other networks.
• IPv4 DHCP Utilization: This information is available for IPv4 networks only. It displays the percentage of the total
DHCP usage of theIPv4 network. This is the percentage of the total number of DHCP hosts, fixed addresses,
reservations, and active leases in the network divided by the total number of IP addresses (excluding IP
addresses in the exclusion range) and all DHCP objects in the network. Note that only enabled addresses are
included in the calculation. It does not include abandoned addresses or leases. The appliance updates the
utilization data approximately every 15 minutes. The utilization data is displayed in one of the following colors:
— Red: The DHCP resources are 100% utilized.
— Yellow: The DHCP utilization percentage is over the effective high-water mark threshold.
— Blue: The DHCP utilization percentage is below the effective low-water mark threshold.
— Black: The DHCP utilization percentage is at any number other than 100%, or it is not above and below any
threshold.
You see the following when RIR is enabled (For information, see RIR Registration Updates on page 555.):
• RIR Organization: This appears only if support for RIR updates is enabled. This displays the name of the RIR
organization to which the network is assigned.
• RIR Organization ID: This appears only if support for RIR updates is enabled. This displays the ID of the RIR
organization to which the network is assigned.
• RIR Registration Status: This appears only if support for RIR update is enabled. This field displays the RIR
registration status. This can be Registered or Not Registered. Registered indicates that the network has a
corresponding entry in the RIPE database.
• Last Registration Updated: Displays the timestamp when the last registration was updated. The displayed
timestamp reflects the timestamp used on the Grid Master.
• Status of Last Registration Update: Displays the registration status and communication method of the last
registration update. The status can be Pending, Sent, Succeeded, or Failed. Each time you send a registration
update to create, modify, or delete a network container or network, the updated status will be displayed here. If
you have selected not to send registration updates, the previous status is retained.
You see the following only with Network Insight (For information, see Infoblox Network Insight on page 653.):
• Discovery Enabled: Indicates whether discovery is allowed on the network container or the network.
• Managed: Indicates whether the network is set to Managed status under NIOS.
• First Discovered: The date and timestamp of the first occasion that NIOS discovered the network.
• Last Discovered: The date and timestamp of the last occasion that NIOS performed discovery on the network.
You see the following when the Cloud Network Automation license is installed on the Grid Master (For information,
see Deploying Cloud Network Automation on page 361.):
• Cloud Usage: This field indicates whether this object is associated with any specific cloud extensible attributes
or within a scope of delegation. It can be one of the following:
— Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may not be
within a scope of delegation at the moment.
— Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
— Used by cloud: Indicates that this network or network container is associated with the extensible attribute
Is External or Is Shared and the value is set to True, which implies the network is a private or shared
network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
— Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation nor is
it associated with any of these extensible attributes: Cloud API Owned, Is External, or Is Shared. NIOS
admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created by
the Cloud Platform member, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
• Delegated To: This tells you whether a cloud object has been delegated to a Cloud Platform Appliance or not. If
the cloud object has a parent object and the parent has been delegated, this field shows the parent delegation
and you cannot modify the field.
• Extensible attributes (Building, Country, Region, State and VLAN): You can select the extensible attributes such
as Building, Country, Region, State, and VLAN for display. When you enable other features such as RIR, Network
Insight, and Cloud Network Automation, you can select additional attributes for display.
You can sort the list of networks in ascending or descending order by certain columns. For information about
customizing tables in Grid Manager, see Customizing Tables on page 69.
You can also modify some of the data in the table. Double click a row of data, and either edit the data in the field or
select an item from a drop-down list. Note that some fields are read-only. For more information about this feature,
see Modifying Data in Tables on page 70. You can edit values of inheritable extensible attributes by double clicking
on the respective row. If an extensible attribute has an inherited value, then the cell is highlighted in blue when you
perform an inline editing. The Descendant Actions dialog box is displayed when you click Save. For information, see
Managing Inheritable Extensible Attributes at the Parent and Descendant Level on page 424. If you delete the value
of an inheritable extensible attribute at the parent level, you can choose to preserve the descendant value or remove
it. For information, see Deleting Inheritable Extensible Attributes Associated with Parent Objects on page 427.
Note: Discovery blackout settings also can be defined for DHCP ranges.
— RIR Registration: Modify RIR network information. This tab appears only when support for RIR updates is
enabled. For information, see Modifying RIR Network Data on page 561.
— Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of the extensible attributes. For information, see About Extensible Attributes on
page 417. You can edit values of inheritable extensible attributes by double clicking on the respective
column. If an extensible attribute has an inherited value, then the cell is highlighted in blue when you
perform an inline editing. The Descendant Actions dialog box is displayed when you click Save. For
information, see Managing Inheritable Extensible Attributes at the Parent and Descendant Level on page
424. If you delete the value of an inheritable extensible attribute at the parent level, you can choose to
preserve the descendant value or remove it. For information, see Deleting Inheritable Extensible Attributes
Associated with Parent Objects on page 427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, click Toggle Advanced Mode to display the following tabs from which you can modify advanced data.
— General Advanced: You can associate zones with a network. For information, see Associating Networks with
Zones on page 1093.
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the network.
Note that you must click Override and select Enable DDNS updates for the DDNS settings you configure in
this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on page 915.
— IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for the
network. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects on page 1204.
— IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the network. For information, see Configuring Thresholds for DHCP Ranges on page 1087.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
5. In the Add IPv4 Shared Network wizard, complete the following and click Next:
— Name: Enter the name of the shared network.
— Comment: Enter information about the shared network.
— Disabled: Select this if you want to enable the shared network at a later time. You can disable and enable
existing networks instead of removing them from the database. This feature is especially helpful when you
have to move or repair the server for a particular network.
6. Do the following to add networks:
a. Click the Add icon.
b. In the Select Network dialog box, select the networks that you want to include in the shared network.
Ensure that the networks are served by the same Grid members to avoid DHCP inconsistencies.
7. Click Next to configure or override DHCP options as described in Defining IPv4 DHCP Options on page 1082.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes for the shared
network. For information, see Using Extensible Attributes on page 427.
9. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Networks: Displays the networks that are currently assigned to the shared network. You can add or
delete a network. To add a network, click the Add icon. In the Select Network dialog box, select the
network you want to add. To delete an existing network, select the network check box, and then click
the Delete icon.
— Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of extensible attributes. For information, see Using Extensible Attributes on
page 427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify
advanced data.
— IPv4 DHCP Options: Keep the inherited DHCP properties or override them and enter unique settings for the
shared network. For information, see Defining IPv4 DHCP Options on page 1082.
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the shared
network. Note that you must click Override and select Enable DDNS updates for the DDNS settings you
configure in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on
page 915.
— IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for the
shared network. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects on page 1204.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: Steps 6-7 apply only in deployments using Network Insight discovery features. Otherwise, skip to Step 8.
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the DHCP
range. Note that you must click Override and select Enable DDNS updates for the DDNS settings you
configure in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on
page 915.
— IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for the
DHCP range. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— Exclusion Ranges: Configure a range of IP addresses that the appliance does not use to assign to clients.
You can use these exclusion addresses as static IP addresses. Enter the start and end addresses of the
exclusion range, and optionally, enter information about this exclusion range.
— IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the DHCP range. For information, see Configuring Thresholds for DHCP Ranges on page 1087.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects on page 1204.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: The IPv4 DHCP Options tab is enabled when you select a Grid Member or IPv4 DHCP Failover Association in
the Member Assignment tab.
— Allow/Deny Clients
— Known Clients: Select this check box, and then select Allow or Deny from the drop-down list to assign
or deny IP addresses within this range to known DHCP clients. Known DHCP clients include roaming
hosts and clients with fixed addresses or DHCP host entries. Note that the appliance cannot deny an IP
address to a fixed address within this range. You must disable the fixed address if you do not want it to
obtain an IP address here.
— Unknown Clients: Select this check box, and then select Allow or Deny from the drop-down list to
assign or deny IP addresses within this range to unknown DHCP clients. Unknown DHCP clients include
clients that are not roaming hosts and clients that do not have fixed addresses or DHCP host entries.
— Deny Leases: Select Deny all lease requests for this range to deny all lease requests from DHCP clients.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: You cannot use the same circuit ID or remote ID for different fixed addresses if the addresses are in the
same network or the same shared network.
d. Name: Enter a name for the Fixed Address. This field is required if the network is served by a Microsoft
server. For information, see Adding Fixed Addresses/Microsoft Reservations on page 1313.
e. Comment: Optionally, enter additional information about the fixed address.
f. Disabled: Select this if you do not want the DHCP server to allocate this IP address at this time.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. This section displays the following
information:
• Cloud Usage: This field indicates whether this object is associated with any specific cloud extensible
attributes or within a scope of delegation. It can be one of the following:
— Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may
not be within a scope of delegation at the moment.
— Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
— Used by cloud: Indicates that this network or network container is associated with the extensible
attribute Is External or Is Shared and the value is set to True, which implies the network is a private or
shared network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
— Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation
nor is it associated with any of these extensible attributes: Cloud API Owned, Is External or Is Shared.
NIOS admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created
by the Grid Master, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the object you want to create has already been
delegated. If so, it displays the name of the delegation.
4. (Optional) Click Next to configure or override DHCP options as described in About IPv4 DHCP Options on page
1078.
5. (Applies only to Network Insight) This step is not required for creating a new Fixed Address. In the following
Wizard step, you can optionally define the following identification values and settings for the new object’s port
reservation:
— Choose the Device Type: Router, Switch-Router, Switch, MSFT (Microsoft) Server, NetMRI, NIOS, VNIOS, or
ESX (VMware) Server.
The values on this page are not required for defining the actual port reservation in a later wizard step.
Certain device types could be descriptively relevant based on the type of object you are creating. As an
example, the MSFT Server designator helps identify the new object as a Microsoft Hyper-V Host. The ESX
Server designator can be used to identify the new object as a VMware ESX Host. These values are not
required and will not affect the functionality of the object.
— Choose the Device Vendor: Cisco, Juniper, Aruba, Dell, Infoblox, or HP.
— You can also enter a Location and a Description. These values are advisory and not required for
configuration.
After you define this group of settings, you can also define a device port reservation, which is done in a later
step. This is not required for the Fixed Address object creation.
6. Click Next to initiate or disable discovery of the new Fixed Address. (Applies only to Network Insight) This step is
not required for creating a new Fixed Address.
a. Choose either Exclude from Network Discovery or Enable Immediate Discovery. If you choose to Exclude,
discovery will not execute on the fixed IP address. If you choose Enable Immediate Discovery, discovery will
execute on the object after you save your settings. You may also choose to leave both options disabled.
b. By default, the new fixed address object inherits its SNMP credentials from those defined at the grid level.
Should you wish to override them for a local set of credentials, check the Override Credentials check box
and select the SNMPv1/SNMPv2 or SNMPv3 option and enter the locally used credentials.
c. You may also test the entered SNMP credentials by clicking Test SNMP Credential.
Note: For descriptions of SNMP credentials for discovery, see the section Configuring SNMP1/v2 Credentials for
Polling on page 680 and Configuring SNMPv3 Properties on page 680. These Grid-based values are
inherited, by default, by each new object you create.
— For the new object, you can check the Override CLI Credentials check box to override the inherited set of CLI
credentials taken from the Grid level. This set of credentials may be used for the device that is directly
associated with the new object in its port reservation.
— You can also click Test CLI Credentials to enter and test a set of CLI login credentials against a device based
on its IP address.
Port control operations require CLI credentials for the involved devices. (If you are not using port control for
the new object, usage of CLI credentials is optional.) Because some IPAM and DHCP objects will use port
control features as part of object creation, CLI credentials are automatically leveraged as part of discovery.
Ensure you have the correct sets of CLI credentials for devices in your network. For more information, see
the section Configuring CLI Discovery Properties on page 681.
— SSH is the default for CLI operations. Check the Allow Telnet check box if you know the device involved in
the object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
Note: All port configuration operations require CLI credentials to be entered into Grid Manager. Because some
IPAM and DHCP objects will use port control features as part of object creation, CLI credentials are
automatically leveraged as part of discovery. Ensure you have the correct sets of CLI credentials for
devices in your network.
7. Click Next to define port connectivity for the device port that will be associated with the new object. This step is
not required for creating a new Fixed Address. This feature set is also termed port control in the NIOS/Grid
Manager system. The device whose interface the new Fixed Address will be associated should already be
discovered by Network Insight.
— Begin by checking the Reserve Port check box. Note that reserving a switch port does not guarantee its
availability.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
— Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to whose interface the new object will be associated before taking
this step. For more information, see the section Using the Device Selector on page 689.
— After choosing the device, choose the Interface with which the port reservation will be bound. The
drop-down list shows only interfaces that are most recently found to be available by Grid Manager during
the last discovery cycle.
— The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page allows only the assignment of an existing VLAN in the
chosen device to the new port reservation.
— Check the Configure Port check box to define port control settings for the port reservation.
— Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment. Depending
on the selected device, you may or may not be able to apply VLAN settings.
— Set the Admin Status to Up if you need to activate the port after assignment in the current task.
All port control operations require CLI credentials to be configured. Because some IPAM and DHCP objects
will use port control features as part of object creation, CLI credentials are automatically leveraged as part
of discovery and definition of port configurations such as Admin Up/Down status. Ensure you have the
correct sets of CLI credentials for devices in your network.
— Enter a Description for the port assignment. Infoblox recommends doing so to help other technicians to
recognize the port assignment task.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427. When you create a new fixed address whose authority is delegated
to a Cloud Platform Appliance, the required cloud extensible attributes and their values are automatically
populated.
9. As the final step in the Add Fixed Address wizard, you define when Grid Manager creates the new object by
scheduling it. You also schedule when the associated port control task executes (if a port configuration is
specified).
— To create the new object and its associated port configuration immediately, select Now. Grid Manager
synchronizes the port reservation task to take place at the same time as the activation of the new object.
— You can choose to have Grid Manager execute the port reservation task at the same time as the Fixed
Address object creation. To do so, select At same time as Fixed Address.
— You can choose to have Grid Manager execute the port reservation task at a later time by selecting Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
10. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the new object and close the wizard (this is the default).
— Click Save & Edit to add the new object and launch the editor.
— Click Save & New to add the new object and launch the wizard again to add another Fixed Address object.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85. You cannot
schedule this task when you are creating an object that is within a delegated scope.
For information on viewing fixed addresses and other DHCP objects, see Viewing IPv4 DHCP Objects on page 1135.
— Port Reservation: Review and edit any device port reservations that may be defined for the current object, or
create a new port reservation and schedule it. For a closer look, see the section Port Control Features in
Network Insight on page 714, and steps 4-8 in the section Adding IPv4 Fixed Addresses on page 1126.
— Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of extensible attributes. For information, see Using Extensible Attributes on
page 427. You can edit values of inheritable extensible attributes by double clicking on the respective
column. If an extensible attribute has an inherited value, then the cell is highlighted in blue when you
perform an inline editing.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify
advanced data.
— IPv4 DDNS: You can keep the inherited DDNS settings or override them and enter unique settings for the
fixed address. Note that you must click Override and select Enable DDNS updates for the DDNS settings you
configure in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on
page 915.
— IPv4 BOOTP/PXE: You can keep the inherited BOOTP properties or override them and enter unique settings
for the fixed address. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects on page 1204.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85. You cannot
schedule this task when you are creating an object that is within a delegated scope.
Note: NIOS removes all the static leases associated with a fixed address when you delete a fixed address out of the
DHCP range, regardless of the selection of the Delete associated leases with the fixed address (selected fixed
IP address) check box in the Delete Confirmation dialog box.
— Date: Enter the date in YYYY-MM-DD (year-month-day) format. The appliance displays today’s date. You
can also click the calendar icon to select a date from the calendar widget.
— Time: Enter the time in hh:mm:ss AM/PM (hours:minutes:seconds AM or PM) format. You can also
select a time from the drop-down list by clicking the time icon.
— Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
— Delete associated leases with the fixed address: Select this check box to delete all the leases associated
with the fixed address.
4. Click Schedule Deletion.
The appliance performs the deletion at the scheduled date and time, and puts all deleted objects in the Recycle
Bin, if enabled. You can restore the objects if necessary.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
To create a reservation:
1. Navigate to the network to which you want to add a reservation, and then select IPv4 Reservation from the Add
drop down menu.
or
From any panel in the DHCP tab, expand the Toolbar and click Add -> IPv4 Reservation.
2. In the Add Reservation wizard, select one of the following and click Next:
— Add Reservation
or
— Add Reservation using Template
Click Select Template and select the template that you want to use. Note that when you use a template to
create a reservation, the configurations of the template apply to the new address. The appliance
automatically populates the reservation properties in the wizard. You can then edit the pre-populated
properties.
3. Complete the following:
— Network: The displayed network address can either be the last selected network or the network from which
you are adding the DHCP range. If no network address is displayed or if you want to specify a different
network, click Select Network. When there are multiple networks, Grid Manager displays the Select Network
dialog box from which you can select one.
— IP Address: Enter the IP address that you want to reserve for manual assignment, or click Next Available IP
to obtain the next available IP address. For information about obtaining the next available IP address, see
Adding IPv4 Fixed Addresses on page 1126. Note that for Cloud Network Automation, Next Available IP is
not available if the reservation you want to create is within a delegated range.
— Name: Optionally, enter a name for the reservation.
— Comment: Optionally, enter additional information about the reservation.
— Disabled: Select this if you do not want the DHCP server to use this reservation at this time.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. This section displays the following
information:
• Cloud Usage: This field indicates whether this object is associated with any specific cloud extensible
attributes or within a scope of delegation. It can be one of the following:
— Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may
not be within a scope of delegation at the moment.
— Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
— Used by cloud: Indicates that this network or network container is associated with the extensible
attribute Is External or Is Shared and the value is set to True, which implies the network is a private or
shared network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
— Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation
nor is it associated with any of these extensible attributes: Cloud API Owned, Is External or Is Shared.
NIOS admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created
by the Grid Master, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the object you want to create has already been
delegated. If so, it displays the name of the delegation.
4. Click Next to configure or override DHCP options as described in Defining IPv4 DHCP Options on page 1082.
5. (Applies only to Network Insight) This step is not required for creating a new IPv4 Reservation. In the following
Wizard step, you can optionally define the following identification values and settings for the new object’s port
reservation:
— Choose the Device Type: Router, Switch-Router, Switch, MSFT (Microsoft) Server, NetMRI, NIOS, VNIOS, or
ESX (VMware) Server.
The values on this page are not required for defining the actual port reservation in a later wizard step.
Certain device types could be descriptively relevant based on the type of object you are creating. As an
example, the MSFT Server designator helps identify the new object as a Microsoft Hyper-V Host. The ESX
Server designator can be used to identify the new object as a VMware ESX Host. These values are not
required and will not affect the functionality of the object.
— Choose the Device Vendor: Cisco, Juniper, Aruba, Dell, Infoblox, or HP.
— You can also enter a Location and a Description. These values are advisory and not required for
configuration.
After you define this group of settings, you will still need to define a device port reservation, which is done
in a later step.
6. (Applies only to Network Insight) Click Next to initiate or disable discovery of the new IPv4 reservation.
— Choose either Exclude from Network Discovery or Enable Immediate Discovery. If you choose to Exclude,
discovery will not execute on the object. If you choose Enable Immediate Discovery, discovery will execute
on the object after you save your settings. You may also choose to leave both options disabled.
— By default, the new object inherits its SNMP credentials from those defined at the grid level. Should you
wish to override them for a local set of credentials, check the Override Credentials check box and select the
SNMPv1/SNMPv2 or SNMPv3 option and enter the locally used credentials. For more information, see the
sections Configuring SNMP1/v2 Credentials for Polling on page 680 and Configuring SNMPv3 Properties
on page 680 for a complete description of SNMP credentials for discovery.
— For the new object, you can check the Override CLI Credentials check box to override the inherited set of CLI
credentials taken from the Grid level. This set of credentials may be used for the device that is directly
associated with the new object (in this case, an IPv4 Reservation) in its port reservation.
— You can also click Test CLI Credentials to select and test a set of CLI login credentials against a device based
on its IP address.
Port control tasks require CLI credentials for the involved devices. (If you are not using port control for the
new object, usage of CLI credentials is not required.) Because some IPAM and DHCP objects will use port
control features as part of object creation, CLI credentials are automatically leveraged as part of discovery.
Ensure you have the correct sets of CLI credentials for devices in your network. For more information, see
the section Configuring CLI Discovery Properties on page 681.
— SSH is the default for CLI operations. Check the Allow Telnet check box if you know the device involved in
the object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
7. (Applies only with Network Insight) Click Next to define optional device port association for the IPv4 reservation.
This step is optional and not required for creating the new IPv4 Reservation. This feature set is also termed port
control in the NIOS/Grid Manager system. The device to which the new object will be associated should already
be discovered and managed from the Infoblox Grid.
— Begin by checking the Reserve Port check box. Note that reserving a switch port does not guarantee its
availability.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
— Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to whose interface the new object will be associated before taking
this step. For more information, see the section Using the Device Selector on page 689.
— After choosing the device, choose the Interface with which the reservation will be bound. The drop-down
list shows only interfaces that are most recently found to be available by Grid Manager during the last
discovery cycle.
— The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page allows only the assignment of an existing VLAN in the
chosen device to the new port reservation.
— Check the Configure Port check box to define specific port configuration settings for the port reservation.
— Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment. Depending
on the selected device, you may or may not be able to apply VLAN settings.
— Set the Admin Status to Up if you need to activate the port after assignment in the current task.
All port control operations require CLI credentials to be entered into Grid Manager. Because some IPAM and
DHCP objects will use port control features as part of object creation, CLI credentials are automatically
leveraged as part of discovery and definition of port configurations such as Admin Up/Down status. Ensure
you have the correct sets of CLI credentials for devices in your network.
— Enter a Description for the port reservation. Infoblox recommends doing so to help other technicians to
recognize the port assignment task.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
9. As the final step in the Add IPv4 Reservation wizard, you define when Grid Manager creates the new object by
scheduling it. You also schedule when the associated port control task executes (if a port configuration is
specified).
— To create the new IPv4 Reservation and its associated port reservation immediately, select Now. Grid
Manager synchronizes the port control task to take place at the same time as the activation of the new
object.
— You can choose to have Grid Manager execute the port control task at the same time as the object creation.
To do so, select At same time as IPv4 Reservation.
— You can choose to have Grid Manager execute the port control task at a later time by selecting Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
10. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the new object and close the wizard (this is the default).
— Click Save & Edit to add the new object and launch the editor.
— Click Save & New to add the new object and launch the wizard again to add another IPv4 Reservation
object.
11. Click Restart if it appears at the top of the screen.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85. You cannot
schedule this task when you are creating an object that is within a delegated scope.
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the
reservation. Note that you must click Override and select Enable DDNS updates for the DDNS settings you
configure in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on
page 915.
— IPv4 BOOTP/PXE: You can keep the inherited BOOTP properties or override them and enter unique settings
for the reservation. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects on page 1204.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85. You cannot
schedule this task when you are creating an object that is within a delegated scope.
— Comment: If both IPv4 and IPv6 templates were used to create the host, this field displays the comment
from the IPv6 template. You can change or add information.
— Disabled: Select this if you do not want the DHCP server to use this roaming host definition. When you
disable a roaming host, the host gets an IP address without the defined DHCP options.
6. Click Next to configure the IPv4 DHCP options for the roaming host, as described in Defining IPv4 DHCP Options
on page 1082.
7. Click Next to configure IPv6 properties described in Defining General IPv6 Properties on page 1089.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. If both IPv4 and
IPv6 templates were used to create the host, this panel displays the attributes from the IPv6 template. You can
change or add information. For information, see Using Extensible Attributes on page 427.
9. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Extensible Attributes: Add and delete extensible attributes that are associated with a roaming host. You can
also modify the values of extensible attributes. For information, see Using Extensible Attributes on page
427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify
advanced data.
— IPv4 DDNS: Click Override and select Enable DDNS updates for the DDNS settings you configure in this tab
to take effect. You can specify the following:
— DDNS Domain Name: Specify the domain name that the appliance uses to update DNS.
— DDNS Hostname: Select the Replace the host name dynamically provided by the client/member with
the roaming host name check box to use the name of the roaming host record as the name of the client
for DDNS updates.
For information about DDNS, see Chapter 21, Configuring DDNS Updates, on page 909.
— IPv4 BOOTP/PXE: Keep the inherited PXE and BOOTP properties or override them and enter unique settings
for the roaming host. For information, see Configuring DHCP for IPv4 on page 1109.
— IPv6 DDNS: Click Override and select Enable DDNS Updates for the DDNS settings you configure in this tab
to take effect. You can specify the following:
— DDNS Domain Name: Specify the domain name that the appliance uses to update DNS.
— DDNS Hostname: Select the Replace the host name dynamically provided by the client/member with
the roaming host name check box to use the name of the roaming host record as the name of the client
for DDNS updates.
For information about DDNS, see Chapter 21, Configuring DDNS Updates, on page 909.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
You can also click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
An offset in a DHCP range template indicates the starting IP address of the DHCP range object created from the
template. For example, you can create a network template called test_network_template and a DHCP range
template test_range_template linked to this network template. If the test_range_template has an offset value
10, when you create a 10.0.0.0/8 network using the test_network_template, the appliance creates a DHCP
range with the starting IP address 10.0.0.10. If you create a 20.0.0.0/8 network using the
test_network_template, the appliance creates a DHCP range with the starting IP address 20.0.0.10
• For the exclusion range in the template, the start and end addresses are determined by the number of offsets in
the DHCP range template's start address and the number of IP addresses in the exclusion range. For more
information about exclusion ranges, see About DHCP Ranges on page 1056.
To modify and set properties for a DHCP range template:
1. From the Data Management tab, select the DHCP tab -> Templates tab -> template check box, and then click the
Edit icon.
2. The DHCP Range Template editor contains the following tabs from which you can modify data:
— General: Modify general information described in Adding IPv4 Range Templates on page 1143.
— Member Assignment: Change the Grid member, failover association, or Microsoft server that provides DHCP
services for this template. You can also add or delete a member or failover association. For information, see
Adding IPv4 Address Ranges on page 1122.
— IPv4 DHCP Options: Keep the inherited DHCP options or override them and enter unique settings for the
template. For information, see Defining IPv4 DHCP Options on page 1082.
— Extensible Attributes: Add and delete extensible attributes that are associated with this template. You can
also modify the values of the extensible attributes. For information, see Using Extensible Attributes on
page 427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see About
Administrative Permissions on page 195.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify data:
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the template.
For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on page 915.
— IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for the
template. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
— Exclusion Ranges: Configure a range of IP addresses that the appliance does not use for dynamic address
assignments. Complete the following:
— Offset: An offset for an exclusion range determines the start IP address of the exclusion range. The
appliance adds the offset value you enter here to the start IP address of the DHCP range created using
this template. That IP address becomes the start IP address of the exclusion range.
— Number of Addresses: Enter the number of IP addresses to be included in the exclusion range.
— Comment: Enter useful information about the exclusion range.
— IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the template. For information, see Configuring Thresholds for DHCP Ranges on page 1087.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note: Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
After you create a fixed address/reservation template using the wizard, you can configure additional properties as
described in Modifying IPv4 Fixed Address/Reservation Templates on page 1145. Then when you use the template
to create a fixed address, it inherits the properties of the template.
If you have deployed the Cloud Network Automation license on the Grid Master, you can configure fixed address
templates for cloud delegation. When you configure a template for cloud delegation, all fixed addresses you create
using this template will inherit authority delegations from their parent objects. For information about Cloud Network
Automation, see Deploying Cloud Network Automation on page 361.
Note: The appliance uses the offset and number of addresses only when this template is used in a network
template.
4. Click Next to configure or override DHCP options as described in Defining IPv4 DHCP Options on page 1082.
5. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
6. Save the configuration and click Restart if it appears at the top of the screen.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify data:
— IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the template.
For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on page 915.
— IPv4 Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter for
the template. For information, see Applying Filters to DHCP Objects on page 1204.
— IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for the
template. For information, see Configuring IPv4 BOOTP and PXE Properties on page 1076.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
— Registration Action: Select the registration action from the drop-down list. When you select Create, the
appliance creates the IPv4 network and assigns it to the selected organization. When you select None,
the appliance does not send registration updates to RIPE. When you use this template to add an
existing RIR allocated network to NIOS, select None. When you use this template to add networks to an
RIR allocated network (a parent network), select Create. Ensure that the parent network associated with
an RIR organization already exists.
— Do not update registrations: Select this check box if you do not want the appliance to submit RIR
updates to RIPE. By default, the appliance sends updates to the RIR database based on the configured
communication method.
— Name: Enter a name that helps identify the network template. For example, you can enter Class C if you
want to configure the template for creating Class C networks.
— Netmask: Select one of the following options:
— Fixed: Select this and adjust the netmask slider to a fixed netmask for this network template. When you
select this option, users cannot specify another netmask when they use this template to create a
network. For example, if you select /24 as the fixed netmask, all networks created using this template
have a /24 netmask.
— Allow User to Specify Netmask: Select this to allow users to specify the subnet mask when creating
networks using this template.
— Comment: Optionally, enter additional information about the template.
— Automatically Create Reverse-Mapping Zone: This function is enabled if the fixed netmask of the template
equals /8, /16, and /24, or if you select the Allow User to Specify Netmask option. Select this if you want
the appliance to automatically create the corresponding reverse-mapping zone for the networks created
using this template. A reverse-mapping zone is an area of network space for which one or more name
servers have the responsibility for responding to address-to-name queries. These zones are created in the
DNS view assigned to receive dynamic DNS updates at the network level.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. To configure this template for cloud
delegation, complete the following:
Use for cloud delegation: Select this check box to enable cloud delegation for this template.
Note: When you select this for the network template, all range and fixed address templates that you want to
associate with this network template must also be enabled for “Use for cloud delegation.”
or
— Add Microsoft Server: Select this option to add a Microsoft server as a DHCP server for the networks
created using this template. Select the Microsoft server from the Microsoft Server Selector dialog box.
5. Click Next to associate Active Directory Sites with the network. For more information, see Associating Active
Directory Sites with Networks on page 1272.
6. Click Next and do the following to include IPv4 address range and fixed address/reservation templates in the
network template. Note that when you select a fixed address/reservation template, only reservations, not fixed
addresses, are created for networks created using this template. You cannot add a fixed address/reservation
template that does not contain an offset value or a total number of IP addresses for a range.
a. Click the Add icon.
b. In the DHCP Template Selector dialog box, choose the template that you want to include in this network
template. You can choose a DHCP range or fixed address/reservation template. Use SHIFT+click and
CTRL+click to select multiple templates.
c. Click the Select icon.
You can delete a template from the table by selecting it and clicking the Delete icon.
7. Click Next to configure or override DHCP options as described in Defining IPv4 DHCP Options on page 1082.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
If you are adding an RIR network, the RIR network attribute table appears. For information about these attributes
and how to enter them, see RIR Network Attributes on page 565.
9. Save the configuration and click Restart if it appears at the top of the screen.
— IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the template. For information, see Configuring Thresholds for DHCP Ranges on page 1087.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
192.168.2.0 /24
Network
192.132.7.9
Workstations
Router Servers Printers Fixed
Exclusion
Addresses
Range
Use the following steps to create the sample network template (shown in Figure 28.1).
1. Create the following DHCP range templates. For information, see Adding IPv4 Range Templates on page 1143.
— Server template with the following values:
— Name: Servers
— Offset: 2
— Number of Addresses: 10
— Comment: Address range 2 to 11 for Servers
— Printer template with the following values:
— Name: Printers
— Offset: 12
— Number of Addresses: 10
— Comment: Address range 12 to 21 for printers.
— Workstation template with the following values:
— Name: Workstations
— Offset: 32
— Number of Addresses: 100
— Comment: Address range 32 to 131 for DHCP on workstations
— Exclusion range with the following values. You must modify the Workstations template to add the exclusion
range. For information, see Modifying IPv4 Range Templates on page 1143.
— Name: Exclusion
— Offset: 42
— Number of Addresses: 10
— Comment: Excluding addresses 42 to 51 from the DHCP range 32 to 131.
2. Create a fixed address/reservation template with the following values. For information, see Adding IPv4 Fixed
Address/Reservation Templates on page 1145.
— Name: Router
— Comment: Fixed address template
— Offset: 1
— Number of Addresses: 1
3. Create a fixed address/reservation template with the following values. For information, see Adding IPv4 Fixed
Address/Reservation Templates on page 1145.
— Name: myFixedAddress
— Comment: Fixed address template
— Offset: 22
— Number of Addresses: 10
4. Create a network template with the following values. For information, see Adding IPv4 Network Templates on
page 1146.
— Name: myNetworkTemplate
— Netmask: Select /24 as the fixed subnet mask for the network
— Comment: Network template for /24 network
— Automatically create a reverse-mapping zone: Select this so that the NIOS appliance automatically creates
the corresponding reverse-mapping zone for the network.
5. Add the DHCP range templates Servers, Printers, and Workstations to the network template.
6. Add the fixed address/reservation template myFixedAddress to the network template.
7. Add a fixed address with the following values:
8. Create a network using the network template myNetworkTemplate with the following values. For information, see
Adding IPv4 Networks on page 1111.
— Address: Enter the IP address 192.168.2.0 of the network that you want to create using the template.
— Select template: Select the network template myNetworkTemplate.
9. To verify your configuration, from the Data Management tab, select the DHCP tab -> Templates tab. Select
myNetworkTemplate and click the Edit icon. In the Network Template editor, click the Templates tab. The Grid
Manager displays the DHCP range templates and fixed address templates.
10. Click Restart to restart services.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. To configure this template for cloud
delegation, complete the following:
Use for cloud delegation: Select this check box to enable cloud delegation for this template.
Delegate authority from the Grid Master
— Delegate To: In a non-cloud API request, this parameter defines the default member to which authority is
delegated. In a cloud API request, the appliance ignores this parameter, which allows you to use this
template to create an object on different Cloud Platform Appliances. Click Select to choose the default
Cloud Platform Appliance to which you want to delegate authority. The Member Selector displays only Cloud
Platform Appliances in the Grid. Click the member, and Grid Manager displays the member name next to
this field.
4. Click Next and select one of the following to provide DHCP services for the range:
— None (Reserved Range): Select this if you want to reserve this address range for static hosts. Addresses in
this range cannot be allocated as dynamic addresses. You can allocate the next available IP from this range
to a static host. This is selected by default.
— Grid Member: Click Select and choose a Grid member from the drop-down list.
5. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
6. Save the configuration.
Note: The appliance uses the offset and number of addresses only when this template is used in a network
template.
4. Click Next to configure or override DHCP options as described in Configuring DHCP Properties on page 1069.
5. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
6. Save the configuration.
— IPv6 DHCP Options: Keep the inherited DHCP options or override them and enter unique settings for the
template. For information, see Defining General IPv6 Properties on page 1089.
— Extensible Attributes: Add and delete extensible attributes that are associated with the template. You can
also modify the values of the extensible attributes. For information, see Using Extensible Attributes on
page 427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see About
Administrative Permissions on page 195.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify data:
— IPv6 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the template.
For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on page 915.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration.
— Registration Action: Select the registration action from the drop-down list. When you select Create, the
appliance creates the IPv4 network and assigns it to the selected organization. When you select None,
the appliance does not send registration updates to RIPE. When you use this template to add an
existing RIR allocated network to NIOS, select None. When you use this template to add networks to an
RIR allocated network (a parent network), select Create. Ensure that the parent network associated with
an RIR organization already exists.
— Do not update registrations: Select this check box if you do not want the appliance to submit RIR
updates to RIPE. By default, the appliance sends updates to the RIR database based on the configured
communication method.
— IPv6 Prefix: If you are adding a template for a previously defined global IPv6 prefix, you can select it from
the list.
— Name: Enter a name that helps identify the network template.
— Netmask: Select one of the following options:
— Fixed: Select this and adjust the netmask slider to a fixed netmask for this network template. When you
select this option, users cannot specify another netmask when they use this template to create a
network. For example, if you select /24 as the fixed netmask, all networks created using this template
have a /24 netmask.
— Allow User to Specify Netmask: Select this to allow users to specify the subnet mask when creating
networks using this template.
— Comment: Enter useful information about the template.
— Automatically create a reverse-mapping zone: This function is enabled if the fixed netmask of the template
is a multiple of 4 (4, 8, 24, and so on), or if you select the Allow User to Specify Netmask option. Select this
if you want the appliance to automatically create the corresponding reverse-mapping zone for the networks
created using this template. These zones are created in the DNS view assigned to receive dynamic DNS
updates at the network level.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. To configure this template for cloud
delegation, complete the following:
Use for cloud delegation: Select this check box to enable cloud delegation for this template.
Delegate authority from the Grid Master
— Delegate To: In a non-cloud API request, this parameter defines the default member to which authority is
delegated. In a cloud API request, the appliance ignores this parameter, which allows you to use this
template to create an object on different Cloud Platform Appliances. Click Select to choose the default
Cloud Platform Appliance to which you want to delegate authority. The Member Selector displays only Cloud
Platform Appliances in the Grid. Click the member, and Grid Manager displays the member name next to
this field.
4. Click Next to associate Active Directory Sites with the network. For more information, see Associating Active
Directory Sites with Networks on page 1272.
5. Click Next to assign Grid members to this network template. Ensure that you include members that are
associated with other templates that you plan to add to this network template. You can assign one or multiple
members to this template. However, you cannot assign a combination of NIOS Grid members and vNIOS Grid
members to the template.
— Click the Add icon to add a Grid member as a DHCP server for the networks created using this template.
Select the Grid member from the Member Selector dialog box. Keep in mind, DHCP properties for the
network are inherited from this member. Networks created using this template can be served by multiple
members, but a member can serve networks in one network view only.
6. Click Next, and then click the Add icon to include DHCP range and fixed address templates in the network
template. Choose the template that you want to include in this network template. Use SHIFT+click and CTRL+click
to select multiple templates.
You can remove a template from the list by selecting the template and clicking the Delete icon.
7. Click Next to configure or override DHCP options as described in Defining General IPv6 Properties on page 1089.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
If you are adding an RIR network, the RIR network attribute table appears. For information about these attributes
and how to enter them, see RIR Network Attributes on page 565.
9. Save the configuration.
Viewing Templates
To view a list of all IPv4 and IPv6 DHCP templates:
1. From the Data Management tab, select the DHCP tab -> Templates tab.
2. Grid Manager displays the following information:
— Name: The name of the template.
— Type: The template type, such as IPv4 Network Template or IPv6 Network Template.
— Comment: The information you entered about the template.
— Site: The site to which the template belongs. This is one of the predefined extensible attributes.
You can select predefined and user defined extensible attributes for display.
You can also do the following in this panel:
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables on page 70.
• Sort the displayed data in ascending or descending order by column.
• Delete a selected template or multiple templates. For information, see Deleting Templates.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Select an object and edit its information.
• Print or export the data in the panel.
Deleting Templates
To delete a template:
1. From the Data Management tab, select the DHCP tab -> Templates tab -> template check box, and then click the
Delete icon.
2. In the Delete Confirmation dialog box, click Yes.
— Registration Action: Select the registration action from the drop-down list. When you select Create, the
appliance creates the IPv4 network and assigns it to the selected organization. When you select None,
the appliance does not send registration updates to RIPE. When you are adding an existing RIR
allocated network to NIOS, select None. When you are adding networks to an RIR allocated network (a
parent network), select Create. Ensure that the parent network associated with an RIR organization
already exists.
— Do not update registrations: Select this check box if you do not want the appliance to submit RIR
updates to RIPE. By default, the appliance sends updates to the RIR database based on the configured
communication method.
— Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the network.
— Netmask: Use the netmask slider to select the appropriate number of subnet mask bits for the network.
— Networks: Do one of the following to add new networks:
Click the Add icon to enter a new network. If you are adding a network for a previously defined global IPv6
prefix, you can select the prefix from the IPv6 Prefix drop-down list. The default is None, which means that
you are not creating an IPv6 network for a previously defined subnet route. If you have defined a global
prefix at the Grid level, the default is the global prefix value. Click Add and Grid Manager adds a row to the
table. Enter the network address in the Network field. When you enter an IPv6 address, you can use double
colons to compress a contiguous sequence of zeros. You can also omit any leading zeros in a
four-hexadecimal group. For example, the complete IPv6 address
2001:0db8:0000:0000:0000:0000:0102:0304 can be shortened to 2001:db8::0102:0304. Note that if
there are multiple noncontiguous groups of zeros, the double colon can only be used for one group to avoid
ambiguity. The appliance displays an IPv6 address in its shortened form, regardless of its form when it was
entered. Click Add again to add another network. You can also select a network and click the Delete icon to
delete it.
or
Click the Next Available icon to have the appliance search for the next available network. Complete the
following in the Next Available Networks section:
— Create new network(s) under: Enter the network container in which you want to create the new network.
When you enter a network that does not exist, the appliance adds it as a network container. When you
enter a network that is part of a parent network, the parent network is converted into a network
container if it does not have a member assignment or does not contain fixed addresses and host
records that are served by DHCP. You can also click Select Network to select a specific network in the
Network Selector dialog box. For information about how the appliance searches for the next available
network, see Obtaining the Next Available on page 1110.
— Number of new networks: Enter the number of networks you want to add to the selected network
container. Note that if there is not enough network space in the selected network to create the number
of networks specified here, Grid Manager displays an error message. The maximum number is 20 at a
time. Note that when you have existing networks in the table and you select one, the number you enter
here includes the selected network.
— Click Add Next to add the networks. Grid Manager lists the networks in the table. You can click Cancel to
reset the values.
Note: You must click Add Next to add the network container you enter in the Next Available Networks section. If
you enter a network in the Next Available Networks section and then use the Add icon to add another
network, the appliance does not save the network you enter in the Next Available Networks section until
you click Add Next.
— Comment: Enter additional information about the network, such as the name of the organization it serves.
— Automatically create reverse-mapping zone: This function is enabled if the netmask of the network is a
multiple of four, such as 4, 8, 12 or 16. Select this to have the appliance automatically create
reverse-mapping zones for the network. A reverse-mapping zone is an area of network space for which one
or more name servers have the responsibility for responding to address-to-name queries. These zones are
created in the DNS view assigned to receive dynamic DNS updates at the network view level.
— Disable for DHCP: Select this if you do not want the DHCP server to provide DHCP services for this network
at this time. This feature is useful when you are in the process of setting up the DHCP server. Clear this after
you have configured the server and are ready to have it serve DHCP for this network.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For
information, see Deploying Cloud Network Automation on page 361. To delegate authority for this network,
complete the following:
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the network you want to create has already been
delegated to a Cloud Platform Appliance. Click Select to choose the Cloud Platform Appliance to which you
want to delegate authority. The Member Selector displays only Cloud Platform Appliances in the Grid. Click
the member, and Grid Manager displays the member name next to this field. This cloud member now
assumes authority for this network, and the Grid Master does not have authority any more. You can also
click Clear to remove authority delegation from the selected Cloud Platform Appliance and return authority
back to the Grid Master.
7. Click Next and add one or more Grid members as DHCP servers for the network.
— click the Add icon and select a Grid member from the Member Selector dialog box. Keep in mind, some
DHCP properties for the network are inherited from this member. The network can be served by multiple
members, but a member can serve networks in one network view only.
8. Click Next to associate Active Directory Sites with the network. For more information, see Associating Active
Directory Sites with Networks on page 1272.
9. (Applies only to Network Insight) Click Next to initiate or disable discovery of the new network(s). Discovery
settings differ based on whether you are defining one network or multiple networks.
— Configuring one network: discovery settings include the following: Enable Discovery and Immediate
Discovery, selecting a Probe member to perform the discovery; and Polling Options, which define how the
network will be discovered by the Probe member. By default, all Polling Options discovery settings are
inherited from the parent network (or Grid, if no parent exists) unless you click Override. Polling Options
govern the protocols used to query and collect information about the network devices being discovered.
or
— Configuring more than one network: If the networks are child networks, they automatically inherit the
settings of the parent network, including discovery settings and the discovery member. These settings will
not appear in the wizard page. For discovery of multiple networks, you can only enable or disable
Immediate Discovery. Click Next to override the DHCP properties described in Defining General IPv6
Properties on page 1089.
10. As part of creating a network, you can provision the network on an actual device (switch, router, or switch-router),
that is discovered and managed through the Grid Manager.
— Begin by checking the Enable Network Provisioning check box, and clicking the Select Device button.
Choose your device from the Device Selector dialog. (Click Clear to remove the setting. For more
information, see the section Using the Device Selector on page 689.)
— If you performed DHCP configuration in the previous step of the Add Network Wizard, the Router IP value
will automatically be populated with the DHCP Router IP address value. Otherwise, you enter the standard
router IP address.
— If required for the newly provisioned network to ensure that attached devices receive DHCP
auto-configuration, enable the DHCP Forwarding check box. For this setting, if a DHCP Failover was
previously configured, the IP addresses defined for DHCP failover are automatically used for the DHCP
forwarding configuration.
— You will also need to choose an interface on the selected device on which to provision the network by
selecting it from the Interface drop-down menu. Grid Manager ensures that only those interfaces that can
support provisioning, and are available for provisioning (that do not have an Operation Status of Up),
appear in the drop-down menu.
— Otherwise, when creating networks and provisioning them on managed devices, you can create a VLAN on
which to provision the network by clicking the Create VLAN option and entering the VLAN Name and VLAN
ID. Ensure that the VLAN ID value you enter is appropriate for the application - don’t create a new VLAN and
provision a network for a VLAN value that is already actively carrying traffic for another routing domain.
If a selected device does not support VLANs, the Create VLAN option will not appear.
11. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see About Extensible Attributes on page 417.
If you are adding an RIR network, the RIR network attribute table appears. For information about these attributes
and how to enter them, see RIR Network Attributes on page 565. You can preview the information before the
appliance submits updates to the RIPE database. To preview registration updates, click Preview RIR
Submissions. For more information, see Previewing Registration Updates on page 569.
Note: You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute, you
must delete it from the table. You can enter up to 256 characters for all RIR attributes.
12. As the final step in the Add IPv6 Network wizard, you define when Grid Manager creates the new network by
scheduling it. You also schedule when the associated port control task executes (if a port configuration has been
specified).
— To create the new network and its associated port configuration immediately, select Now. Grid Manager
synchronizes the port control task to take place at the same time as the creation of the new network.
— You can choose to have Grid Manager execute the port control task at the same time as the network
creation. To do so, select At same time as above.
— You can choose to have Grid Manager execute the port control task at a later time by selecting Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
13. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the new network and close the wizard (this is the default).
— Click Save & Edit to add the new network and launch the editor.
— Click Save & New to add the new network and launch the wizard again to add another network.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: Discovery blackout settings also can be defined for DHCP ranges.
— RIR Registration: Modify RIR network information. This tab appears only when support for RIR updates is
enabled. For information, see Modifying RIR Network Data on page 561.
— Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of the extensible attributes. For information, see About Extensible Attributes on
page 417.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify
advanced data.
— General Advanced: You can associate zones with a network. For information, see Associating Networks with
Zones on page 1093.
— IPv6 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the network.
Note that you must click Override and select Enable DDNS updates for the DDNS settings you configure in
this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients on page 915.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
9. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
For information on viewing shared networks, see Viewing Shared Networks on page 1120.
— Delegate To: This field indicates whether the authority for the range you want to create has already been
delegated to a Cloud Platform Appliance. Click Select to choose the Cloud Platform Appliance to which you
want to delegate authority. The Member Selector displays only Cloud Platform Appliances in the Grid. Click
the member, and Grid Manager displays the member name next to this field. This cloud member now
assumes authority for this range, and the Grid Master does not have authority any more. You can also click
Clear to remove authority delegation from the selected Cloud Platform Appliance and return authority back
to the Grid Master.
4. Click Next and select one of the following to provide DHCP services for the DHCP range:
— None (Reserved Range): Select this if you want to reserve this address range for static hosts. Addresses in
this range cannot be allocated as dynamic addresses. You can allocate the next available IP from this range
to a static host. This is selected by default.
— Grid Member: Select this if you want a Grid member to serve DHCP for this DHCP range. Select a Grid
member from the drop-down list. The drop-down list displays only the Grid members that are associated
with the network to which the DHCP range belongs.
5. (Applies only to Network Insight) Click Next to initiate or disable discovery of the new DHCP range.
— Configuring one network: Discovery settings include the following: Enable Discovery and Immediate
Discovery, selecting a Probe member to perform the discovery; and Polling Options, which define how the
network will be discovered by the Probe member using SNMP and CLI credentials. By default, all Polling
Options discovery settings are inherited from the parent network unless you click Override. Polling Options
govern the protocols used to query and collect information about the network devices being discovered.
See the section Configuring Discovery Properties on page 676 for a complete description of discovery
Polling Options.
6. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
7. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
When the Cloud Network Automation license is installed on the Grid Master, Grid Manager displays the
following information in the Cloud section: Cloud Usage, Owned By, and Delegated To. You cannot modify
these fields. For more information, see Adding IPv6 Address Ranges on page 1168.
— Member Assignment: Modify the Grid member that provides DHCP services for the DHCP range as described
in Adding IPv6 Address Ranges on page 1168.
— Discovery: You can enable and change discovery settings for the IPv6 range at any time after creating the
range. Discovery settings include the following: Enable Discovery and Immediate Discovery, selecting a
Probe member to perform the discovery; and Polling Options, which define how the network will be
discovered by the Probe member using SNMP and CLI credentials. By default, all Polling Options discovery
settings are inherited from the parent network unless you click Override. Polling Options govern the
protocols used to query and collect information about the network devices being discovered. See the
section Configuring Discovery Properties on page 676 for a complete description of discovery Polling
Options.
— Discovery Blackout: Define extended time periods and regularly scheduled times when discovery and/or
port configuration tasks will not take place on a network or DHCP range. Editing a network or range under
DHCP, blackout settings apply only to the specified network or range. You also specify the scheduled time
when the blackout period begins, and the duration of the blackout period. By default, the network inherits
its discovery blackout settings from the Grid level. For related information, see Defining Blackout Periods
on page 731 and its subsections.
— IPv6 DHCP Options: Keep active leases in a deleted DHCP range. For more information, see Keeping Leases
in Deleted IPv4 and IPv6 Networks and Ranges on page 1094.
— Extensible Attributes: You can add and delete extensible attributes that are associated with a specific DHCP
range. You can also modify the values of extensible attributes. For information, see Using Extensible
Attributes on page 427.
— Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions on page 205.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify
advanced data.
— Exclusion Ranges: Configure a range of IP addresses that the appliance does not use to assign to clients.
You can use these exclusion addresses as static IP addresses. For more information, see About Exclusion
Ranges on page 1056.
Note that Grid Manager displays both the basic and advanced mode tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Note: At any time during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may
not be within a scope of delegation at the moment.
— Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
— Used by cloud: Indicates that this network or network container is associated with the extensible
attribute Is External or Is Shared and the value is set to True, which implies the network is a private or
shared network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
— Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation
nor is it associated with any of these extensible attributes: Cloud API Owned, Is External or Is Shared.
NIOS admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created
by the Grid Master, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
Delegate authority from the Grid Master
— Delegate To: This field indicates whether the authority for the object you want to create has already been
delegated. If so, it displays the name of the delegation.
4. Click Next to configure or override DHCP options as described in Defining General IPv6 Properties on page 1089.
5. (Applies only with Network Insight) This step is not required for creating a new Fixed Address. In the current
Wizard step, you can optionally define the following identification values and settings for the new object’s port
reservation:
— Choose the Device Type: Router, Switch-Router, Switch, MSFT (Microsoft) Server, NetMRI, NIOS, VNIOS, or
ESX (VMware) Server.
The values on this page are not required for defining the actual port reservation in a later wizard step.
Certain device types could be descriptively relevant based on the type of object you are creating. As an
example, the MSFT Server designator helps identify the new object as a Microsoft Hyper-V Host. The ESX
Server designator can be used to identify the new object as a VMware ESX Host. These values are not
required and will not affect the functionality of the object.
— Choose the Device Vendor: Cisco, Juniper, Aruba, Dell, Infoblox, or HP.
— You can also enter a Location and a Description. These values are advisory and not required for
configuration.
After you define this group of settings, you will still need to define a device port reservation, which is done
in a later step.
6. Click Next to initiate or disable discovery of the new Fixed Address. (Applies only to Network Insight) This step is
not required for creating a new Fixed Address.
a. Choose either Exclude from Network Discovery or Enable Immediate Discovery. If you choose to Exclude,
discovery will not execute on the Fixed Address. If you choose Enable Immediate Discovery, discovery will
execute on the host after you save your settings. You may also choose to leave both options disabled.
b. By default, the new fixed address object inherits its SNMP credentials from those defined at the grid level.
Should you wish to override them for a local set of credentials, check the Override Credentials check box
and select the SNMPv1/SNMPv2 or SNMPv3 option and enter the locally used credentials.
c. You may also test the entered SNMP credentials by clicking Test SNMP Credential.
Note: For descriptions of SNMP credentials for discovery, see the section Configuring SNMP1/v2 Credentials for
Polling on page 680 and Configuring SNMPv3 Properties on page 680. These Grid-based values are
inherited, by default, by each new object you create.
— For the new object, you can check the Override CLI Credentials check box to override the inherited set of CLI
credentials taken from the Grid level. This set of credentials may be used for the device that is directly
associated with the new object in its Port Reservation.
— You can also click Test CLI Credentials to enter and test a set of CLI login credentials against a device based
on its IP address.
Port control operations require CLI credentials for the involved devices. (If you are not using port control for
the new object, usage of CLI credentials is optional.) Because some IPAM and DHCP objects will use port
control features as part of object creation, CLI credentials are automatically leveraged as part of discovery.
Ensure you have the correct sets of CLI credentials for devices in your network. See the section Configuring
CLI Discovery Properties on page 681 for related information.
— SSH is the default for CLI operations. Check the Allow Telnet check box if you know the device involved in
the object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
Note: All port control operations require CLI credentials to be entered into Grid Manager. Because some IPAM
and DHCP objects will use port control features as part of object creation, CLI credentials are automatically
leveraged as part of discovery. Ensure you have the correct sets of CLI credentials for devices in your
network.
7. Click Next to define the port reservation for the device port that will be associated with the new Fixed Address.
This step is not required for creating a new Fixed Address. This feature set is also termed port control in the
NIOS/Grid Manager system. The device to which the new Fixed Address will be associated should already be
discovered and managed from the Grid Manager.
— Begin by checking the Reserve Port check box. Note that reserving a switch port does not guarantee its
availability.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
— Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to whose interface the new object will be associated before taking
this step. For more information, see the section Using the Device Selector on page 689.
— After choosing the device, choose the Interface with which the port reservation will be bound. The
drop-down list shows only interfaces that are most recently found to be available by Grid Manager during
the last discovery cycle. This list will not include any ports that are Administratively Up and Operationally
Up, or that are otherwise already assigned to other networks or objects.
— The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page allows only the assignment of an existing VLAN in the
chosen device to the new port reservation.
— Check the Configure Port check box to define specific port control settings for the port reservation.
— Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment. Depending
on the selected device, you may or may not be able to apply VLAN settings.
— Set the Admin Status to Up if you need to activate the port after assignment in the current task.
All port control operations require CLI credentials to be entered into Grid Manager. Because some IPAM and
DHCP objects will use port control features as part of object creation, CLI credentials are automatically
leveraged as part of discovery and definition of port configurations such as Admin Up/Down status. Ensure
you have the correct sets of CLI credentials for devices in your network.
— Enter a Description for the port assignment. Infoblox recommends doing so to help other technicians to
recognize the port assignment task.
8. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
9. As the final step in the Add Fixed Address wizard, you define when Grid Manager creates the new object by
scheduling it. You also schedule when the associated port configuration task executes.
— To create the new object and its associated port configuration immediately, select Now. The port control
event is automatically synchronized to take place at the same time as the activation of the new object.
— You can choose to have Grid Manager execute the port reservation task at the same time as the Fixed
Address object creation. To do so, select At same time as Host.
— You can choose to have Grid Manager execute the port reservation task at a later time by selecting Later.
Choose a Selected time by entering or selecting a Start Date (click the calendar icon to choose a calendar
date) and a Start Time, and choose a Time Zone.
10. Choose one of the following from the Save & ... drop-down button menu:
— Click Save & Close to add the new object and close the wizard (this is the default).
— Click Save & Edit to add the new object and launch the editor.
— Click Save & New to add the new object and launch the wizard again to add another Fixed Address object.
11. Save the configuration and click Restart if it appears at the top of the screen.
Note: At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks on page 85. You cannot
schedule this task when you are creating an object that is within a delegated scope.
For information on viewing IPv6 fixed addresses in a network, see Viewing IPv6 DHCP Objects on page 1175.
TCP Connection
= 250
Router
Secondary Server
3 The load balancing split is 128.
SInce the hash result is between
128 and 255, the secondary
server responds to the host and
allocates the IP address to the
host.
Note: If both the primary and secondary servers are in a Grid, you configure the properties on the failover
association and the configuration applies to both servers.
2. Create a failover association and configure load balancing between the servers. For information, see Adding
Failover Associations on page 1180.
— Ensure that you use the same failover association name on both the primary and secondary servers.
— The appliance assigns default values to the failover timers and triggers. In general, these default values
serve the purpose of a failover. Do not change these values unless you understand the ramification of the
changes. For example, when one of the peers in a failover association fails, the other peer goes into a
COMMUNICATIONS-INTERRUPTED state, and the lease time changes to the MCLT (Maximum Client Lead
Time). You should consider how the MCLT affects the lease time when a failover occurs if you want to
change this value.
3. Assign the failover association to the DHCP ranges in the same network view. Failover associations can serve only
IPv4 DHCP ranges. For information, see Configuring IPv4 Address Ranges on page 1121.
— If you configure a shared network, and the subnets in the shared network contain ranges served by a DHCP
failover association, both the primary and secondary DHCP server must have the same shared networks
defined, containing the same networks and DHCP ranges.
Note: If you have multiple networks that are in a shared network and you plan to use a DHCP failover, you must
use the same failover association and specify the same peers on all the networks in the shared network.
4. Enable DHCP on the primary and secondary servers AFTER you complete all the configurations. For information,
see Managing Failover Associations on page 1182.
Note: When you set up a failover association for the first time, ensure that both servers are up and running and
their databases are synchronized before they can start assigning IP addresses.
When you configure a failover association, the appliance assigns default values for timers and triggers, such as the
MCLT and the maximum number of “unacked” packets. A failover may occur when some of the timers expire or when
a failover peer goes out of service. When a failover occurs, the functional peer takes over and assigns IP addresses
with the lease time set to the MCLT. When the server that is offline comes back online, it synchronizes its database
with its peer before it starts allocating IP addresses.
Note: You can configure Microsoft primary and secondary servers using this wizard only. You cannot edit
Microsoft primary and secondary servers after you configure them. You must delete and reconfigure the
primary or secondary Microsoft server for a failover association.
— External Server IP Address: Select this to use an external ISC DHCP compliant server as the primary
server. Enter the IP address of the primary server in the field.
— DHCP Failover Secondary: Select one of the of following. The default is Grid Member.
— Grid Member: Click Select member. In the Select Member dialog box, select the secondary server and
click the Select icon.
— MS Server: NIOS selects this automatically when you set the DHCP Failover Primary to MS Server. Click
Select Server. In the Microsoft Server Selector dialog box, select the Microsoft server that supports
DHCP failover. Note that only Microsoft Windows Server 2012 or later versions support synchronization
of failover relationships. This dialog box also displays the following columns: IP address, Comment,
and Site.
Note: The primary and secondary Microsoft servers that you select in a failover relationship must be in the same
network view. For more information, see About Microsoft DHCP Failover Relationships on page 1305.
— External Server IP Address: Select this to use an external ISC DHCP compliant server as the secondary
server. Enter the IP address of the secondary server in the field.
Note: You cannot select External Server IP Address for both the primary and secondary servers. One of the
servers must be an independent appliance or in an Infoblox Grid.
Note: When you configure a failover association, the slider changes its position based on the Failover mode you
select. When you edit failover settings, the slider remains in the Balanced position, at 50%, by default.
For more information about modifying failover associations, see Modifying Failover Associations on page
1182.
— Load Balancing Data: Adjust the slider to determine which server should handle more IP address requests.
The default is 50%. When you adjust the slider, a tooltip window displays the percentage of available IP
addresses that each server can allocate. When you move the slider all the way to the left, the primary server
responds to all IP address requests, and the secondary server does not respond to any. The opposite
applies when you move the slider all the way to the right. Infoblox recommends that you use the default
(50/50) to enable the primary and secondary servers to respond to IP address requests on an equal basis.
— Lease Deletion: Select the following to override settings at the Grid and member levels.
— Keep leases from deleted ranges until one week after expiration: When you select this and delete a
DHCP range with active leases, the appliance stores these leases up to one week after they expire.
When you add a new DHCP range that includes the IP addresses of these active leases, the appliance
automatically restores the leases.
— Secondary role: This is valid for Microsoft Management only. Note that the secondary role is available only
in Hot standby mode. The appliance displays Standby by default and you cannot edit this value.
— Maximum client lead time: Specify the maximum client lead time in minutes or hours. The default is one
hour. Select Minutes or Hours from the drop-down list. This specifies the maximum amount of time the
server waits before assuming control.
— Enable switchover interval: This is valid for Microsoft Management only. Select this to automatically change
the state to partner down after a specified period. NIOS does not support the “partner down” state for
Microsoft DHCP failover association.
— State switchover interval (Minutes): This is valid for Microsoft Management only. Specify the amount of
time after which the server must change the state. The default is 60 minutes.
— Enable Authentication: This is valid for Microsoft Management only. Select this if you want to secure the
communication between failover partners.
— Shared Secret: This is valid for Microsoft Management only. Enter a shared secret that can be used to
authenticate the communication between failover partners. You can specify a shared secret only if you
enable authentication.
4. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
5. Save the configuration and click Restart if it appears at the top of the screen.
— Triggers: Before editing the triggers and timers, ensure that you understand the ramification of the changes.
Improper configuration of the triggers can cause the failover association to fail. For information about the
fields in the Basic tab, see Adding Failover Associations on page 1180. The following are the triggers in the
Advanced tab:
— Max Response Delay Before Failover(s): Specifies how much time (in seconds) can transpire before a
failover occurs when a failover peer does not receive any communication from its peer. This number
should be small enough that the transient network failure does not leave the servers out of
communication for a long time, but big enough that the servers are not constantly connecting and
disconnecting. The default is 60 seconds.
— Max Number of Unacked Updates: Specifies the number of “unacked” packets the server can send
before a failover occurs. The default is 10 messages.
— Max Client Lead Time(s): Specifies the length of time that a failover peer can renew a lease without
contacting its peer. The larger the number, the longer it takes for the peer to recover IP addresses after
moving to the PARTNER-DOWN state. The smaller the number, the more load your servers experience
when they are not communicating. The default is 3600 seconds.
— Max Load Balancing Delay(s): Specifies the cutoff after load balancing is disabled. The cutoff is based
on the number of seconds since a client sent its first DHCPDISCOVER message. For instance, if one of
the failover peers gets into a state where it is busy responding to failover messages but is not
responding to other client requests, the other peer responds to the client requests when the clients
retry. This does not cause a failover. The default is three seconds.
— Failover Settings: This is valid for Microsoft Management only. Modify failover association settings. For
information, see Configuring Failover Associations on page 1179.
If you modify failover settings from secondary Microsoft server settings, the appliance does not update
failover settings on NIOS for the following reasons:
• When DHCP synchronization is disabled for primary Microsoft server, you must enable DHCP
synchronization for primary Microsoft server to reflect the settings on NIOS.
• The primary synchronization interval must be completed. For example, consider that you are
modifying failover settings from secondary Microsoft server settings where the synchronization
interval for primary server is five minutes, and the time interval for the secondary server is one
minute. In this case, failover settings are updated on NIOS only after the primary server
synchronization interval, which is five minutes.
— Extensible Attributes: Add and delete extensible attributes that are associated with a failover association.
You can also modify the values of extensible attributes. For information, see Using Extensible Attributes on
page 427.
2. To view detailed information about a failover association, select the failover_association check box, and then
click the Show Status icon.
3. In the Failover Association Status dialog box, Grid Manager displays the overall status of the failover association
and the status of both the primary and secondary servers.
The failover association can be in one of the following states:
— OK (green): The failover association is functioning properly.
— DEGRADED (yellow): The failover association is degraded when one of the peers is giving out limited
addresses.
— FAILURE (red): The failover association is not functioning, may be because it is not completely configured.
The peers are not assigning IP addresses.
For each peer, Grid Manager displays the hostname or IP address, the status, and event date. The peer can be in
one of the following states:
— STARTUP: The server is starting up.
— NORMAL: The server is in a normal operational state in which it responds to its load balancing subset of
DHCP clients.
— PAUSED: This state allows a peer to inform the other peer that it is going out of service for a short period of
time so the other peer can immediately transition to the COMMUNICATIONS-INTERRUPTED state and start
providing DHCP service to DHCP clients.
— COMMUNICATIONS-INTERRUPTED: The servers are not communicating with each other. Both servers provide
DHCP service to DHCP clients from which they receive DHCP requests.
— PARTNER-DOWN: The server assumes control of the DHCP service because its peer is out of service.
— RECOVER: The server is starting up and trying to get a complete update from its peer and discovers that its
peer is in the PARTNER-DOWN state.
— RECOVER-WAIT: The server has got a complete update from its peer and is waiting for MCLT period to pass
before transitioning to the RECOVER-DONE state.
— RECOVER-DONE: The server completed an update from its peer.
— POTENTIAL-CONFLICT: The peers are not synchronized due to an administrative error or an incorrect state
transition. Check the failover configuration and correct the error.
— CONFLICT-DONE: This is a temporary state that the primary server enters after it received updates from the
secondary server when it was in the POTENTIAL-CONFLICT state.
— RESOLUTION-INTERRUPTED: The server responds to DHCP clients in a limited way when it is in this state.
— UNKNOWN: The DHCP server is in an unknown state. The failover association is not functioning properly,
may be because it is configured improperly. For example, failover association is not assigned to any DHCP
range.
— SHUTDOWN: This state allows a peer to inform the other peer that it is going out of service for a long period
of time so the other peer can immediately transition to the PARTNER-DOWN state and completely assume
control of the DHCP service.
Note: NIOS does not support PARTNER-DOWN and Force Recovery for a Microsoft DHCP failover association.
WARNING: Before you put a peer in the partner-down state, ensure that the other peer is indeed out of
service. If both the primary and secondary servers are operational when you place one of them in
the partner-down mode, both servers may stop issuing leases for a minimum of time defined in the
MCLT.
Note: You cannot place the functional peer in the PARTNER-DOWN state for a Microsoft DHCP failover in NIOS.
Note: You cannot place the functional peer in the PARTNER-DOWN state for a force recovery in NIOS.
Note: When the failover recovery is in progress, the DHCP service on both peers are disabled and you cannot enable
the DHCP service until the failover recovery is successfully completed. You can view the logs of the failover
recovery process in the syslog and infoblox.log file.
Note: After you start the failover recovery, you cannot revert the changes.
Grid Manager starts the failover recovery and you can view the following information in the Failover Recovery Progress
dialog box:
• Failover association: The name of the failover association.
• Primary: The hostname or IP address of the primary server.
• Secondary: The hostname or IP address of the secondary server.
• Number of leases to be processed: The total number of leases to be processed.
• Number of leases processed: The number of leases that have been processed.
• Current Status: Displays the current status of the failover recovery process. The current status can be one of the
following:
— Pending: The failover recovery is initiated for a failover association and the recovery process will start soon.
— Calculating: The appliance calculates the total amount of leases to be processed.
— Applying: The appliance looks for conflicts and tries to resolve the conflicts.
— Completed: The failover recovery is completed successfully.
— Failed: The failover recovery fails.
Grid Manager also displays the reason for the failure if that happens.
After successful completion of the failover recovery, you must restart both the primary and secondary peers to bring
them back to the CONFLICT-DONE state.
You can stop the failover recovery operation by clicking Stop in the Failover Recovery Progress dialog box before the
recovery process is complete.
Note: If for any reasons the recovery is blocked when the operation is in progress, you can cancel the current
operation and start the recovery for the failover association again.
IP Address Allocation
When a DHCP client requests an IP address, the NIOS appliance draws an address from an address range associated
with the network segment for that client. Because you define that range, you can thereby control the IP address
(within the defined range) and the associated TCP/IP settings that the client receives.
In Figure 31.1, three hosts—each in a different subnet—request an IP address. Each one broadcasts a DHCPDISCOVER
message, which includes its MAC address. When the router, which also functions as a DHCP relay agent, receives the
message, it adds the IP address of the interface on which the message arrives and forwards the message to the DHCP
server—or servers—previously configured on the router. When the NIOS appliance receives the message, it uses the
ingress interface IP address of the router to determine the network segment to which the host belongs and associates
the MAC address of the requesting host with an IP address from an address range for that network.
10.2.1.1 10.4.1.1
Router
DHCPDISCOVER (Relay Agent) NIOS Appliance
10.3.1.1
Networks
10.1.1.0/24
Address Range
10.1.1.20 -
10.1.1.200
10.2.1.0/24
Address Range
10.2.1.20 -
10.2.1.200
DHCPDISCOVER 10.3.1.0/24
Address Range
10.3.1.20 -
10.3.1.200
The NIOS appliance replies to DHCPREQUEST messages by sending DHCPOFFER messages through the relay agent to
the requesting hosts, as shown in Figure 31.2 on page 1190.
10.1.1.1
10.2.1.1 10.4.1.1
Router
DHCPOFFER (Relay Agent) NIOS Appliance
10.3.1.1 Networks
10.1.1.0/24
Address Range
10.1.1.20 -
10.1.1.200
10.2.1.0/24
Address Range
10.2.1.20 -
10.2.1.200
DHCPOFFER 10.3.1.0/24
Address Range
10.3.1.20 -
10.3.1.200
The addressing scheme depicted in Figure 31.1 on page 1189 and Figure 31.2 is fairly simple: each network has a
single address range. Consequently, address assignments are fairly straightforward. However, if you have multiple
address ranges in the same network and you want to assign addresses from specific address ranges to specific hosts,
you must screen the address assignments through the use of filters. If you do not apply a filter, the NIOS appliance
assigns addresses from the highest address range to the lowest range and within each range from the highest
address to the lowest address. That is, the appliance chooses the range with the highest addresses first (that is,
closest to 255) and begins assigning addresses exclusively from that range, starting with the highest address and
finishing with the lowest (closest to 0). When all the addresses from that range are in use, it then begins assigning
addresses from the next highest range, and so on, finishing with the range with the lowest addresses. This is shown
in Figure 31.3 on page 1191.
Note: After the DHCP server runs for a while, it assigns leases based on when it last used addresses, and not just on
their positions in the range.
Host A
Network
Host B
These two rules can work in coordination. For example, when the appliance receives an address request, it first
checks if the request matches any filter. If it matches more than one filter assigned to different address ranges, the
appliance first applies the filter that belongs to the range with the highest IP addresses. If that address does not grant
an address lease (because the filter action is Deny or all address leases in that range are already in use), the
appliance then applies the matching filter for the range with the next higher set of IP addresses. If the appliance still
has not granted a lease from the address ranges whose filters match data in the request and there are unfiltered
address ranges, the appliance attempts to assign an address from one of these ranges, again beginning with the
range having the highest IP addresses.Figure 31.4 presents an example illustrating the sequence in which the
appliance assigns addresses when a request matches a MAC address filter. For information about MAC address
filters, see About MAC Address Filters on page 1193.
NIOS Appliance
The following explains how the NIOS appliance applies filters to DHCP address requests:
If then
the appliance receives a request that it applies the action specified in the filter for that address range. If it
matches a filter for one address range, does not assign an address from that range (the action is deny or the
action is grant but all addresses in that range are in use), the
appliance then checks if it can assign an address from an unfiltered
address range (if there are any), starting with the range with the
highest addresses first, as shown in Figure 31.3 on page 1191.
the same filter applies to multiple it checks the address range with the highest IP addresses matching
address ranges and the appliance that filter. If the appliance does not assign an address from that range,
receives an address request matching it checks the filtered address range with the next highest IP addresses,
that filter, and so on. If it still has not assigned an address, the appliance starts
checking unfiltered address ranges (if there are any), again beginning
with the range with the highest address first.
multiple filters for the same address the filter denying the lease takes precedence. For example, if a
range conflict with each other (one filter requesting client matches both a MAC address filter (granting a lease)
grants a lease and another denies it) and and a user class filter (denying a lease) for the same address range,
a requesting client matches both filters, the appliance denies the lease. When faced with a choice to either
allow or deny a lease based on equal but contradictory filters, the
appliance takes the more secure stance of denying it.
Internet
DHCPDISCOVER
DHCPDISCOVER +
Option 82 Data
• Remote ID
• Circuit ID
The relay agent adds option 82 data to The NIOS appliance checks for a
DHCPDISCOVER and DHCPREQUEST match between the remote and
messages that it receives from the DHCP client. circuit identifiers in the address
request and its filters for address
DHCP Option 82 suboptions can specify a ranges. When it finds a match, it
remote ID for the DHCP client and a circuit ID assigns the DHCP client an
for the connection between the client and the address from that address range.
access point. NIOS Appliance
DHCP Server
3. Click Next to define the relay agent ID type. If you apply both ID types, the relay agent must provide both
identifiers when submitting a DHCP address request.
Select one of the following for both Circuit ID and Remote ID:
— Any: Select this and the filter matches any of the circuit identifiers for remote hosts. You cannot select this
for both circuit ID and remote ID at the same time.
— Not Set: Select this and no circuit identifier is set for remote hosts.
— Matches Values: Select this and enter the circuit ID or remote ID in the field. You can enter the ID in
hexadecimal format, such as 1f:cd, ab, or ef:23:56, or in string format, such as abcd or aa:gg. The appliance
matches the value you enter here with the value sent by the DHCP client in counted octet sequence format.
This field supports wildcard characters and regular expressions. You can also select to have an exact match
or a substring match, as follows:
— Exact Match: Select this to match the exact value sent by the DHCP client that contains the value you
entered in the Matches Values field.
— Substring: Select this to match a substring of the value sent by the DHCP client. Enter the Offset and
Length values for the substring match, as follows:
• Offset: Enter the number of characters at which the match value for the substring starts. Enter 0 to
start at the beginning of the value, enter 1 for the second position, and so on. For example, when
you enter 2 and have a substring value of AFTR, the appliance matches the value AFTR starting at
the third character of the match value.
• Length: Enter the length of the substring value. For example, if the match value is AFTR, the length
is 4.
4. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
5. Save the configuration and click Restart if it appears at the top of the screen.
After you define a relay agent filter, you can assign it to a DHCP range. The appliance responds to address requests
based on the filter criteria. For information, see Applying Filters to DHCP Objects on page 1204.
2. Apply the filter to a DHCP address range or range template in the Class Filter List or Logic Filter List. For
information, see Applying Filters to DHCP Objects on page 1204.
After you define an option space and add options to it, you can set up option filters and define option values. For
example, to handle two different client classes, you can define two option filters (vendor-class_1 and vendor-class_2)
and send different option values to different clients based on the vendor-class-identifier options that you obtain from
the clients.
— Apply this filter as a global DHCP class: This check box is selected by default. When you select this check
box, the appliance defines a global class statement in the dhcpd configuration file for members that have
DHCP enabled, regardless of whether the filter is applied to a DHCP range or range template. All DHCP
clients that belong to this class receive the DHCP options and values you define in the filter. When you clear
this check box, you cannot apply this filter to the Class Filter List of a range or range template. You cannot
clear this check box if the filter is currently applied to a range or range template. The appliance displays an
error message when you try to save this configuration.
3. Click Next and complete the following to add match rules:
— In the first drop-down list, select a DHCP option. For example, select user-class (77) for a specific user class,
such as mobile users.
— In the second drop-down list, select an operator.
If you select equals or does not equal, enter the value of the selected option you want the filter to match in
the field.
If your operator and match value include a substring of an option value, enter the offset and length of the
substring based on the following definitions:
— Offset: Enter the number of characters at which the match value substring starts in the option data.
Enter 0 to start at the beginning of the option data, enter 1 for the second position, and so on. For
example, when you enter 2 and have a match value of MSFT, the appliance matches the value MSFT
starting at the third character of the option data.
— Length: Enter the length of the match value. For example, if the match value is MSFT, the length is 4.
You can do the following and repeat the filter selection steps to add another rule:
— Click + to add another rule at the same level.
— Click |<- to add an all (logical AND) or any (logical OR) operator line and a parenthetical rule that is indented
one level and above the first rule.
— Click ->| to add an all (logical AND) or any (logical OR) operator line and a parenthetical rule that is indented
one level.
After you add all the match rules, you can click Preview to view the rules that are written to the dhcpd
configuration file or click Reset to remove the previously configured rules and start again. For information about
how to use match rules, see Using Match Rules in Option Filters on page 1200.
4. Click Next and complete the following to define which DHCP options to return to the matching client:
— Option Space: Select an option space from the drop-down list. This field is not displayed if you do not have
custom option spaces. The appliance uses the DHCP option space as the default.
— Lease Time: Enter the value of the lease time in the field and select the time unit from the drop-down list.
The lease time applies to hosts that meet the filter criteria.
Options to Merge with Object Options
Click the Add icon. Grid Manager adds a new row to the table with the default DHCP option space and option
name displayed. Complete the following:
— Option Space: Click the down arrow and select an option space from the drop-down list. The selected
option space contains the corresponding DHCP options that you can use as filter criteria.
— Option Name: Click the down arrow and from the drop-down list, select the DHCP option you want to use as
filter criteria.
— Value: Enter the match value that you want the filter to use for the selected DHCP option.
To add more options to the filter, click the Add icon and repeat the steps.
5. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
6. Save the configuration and click Restart if it appears at the top of the screen.
class "microsoft-other" {
match if substring (option vendor-class-identifier,
0, 4) = "MSFT";
vendor-option-space MSFT;
DHCP option
}
Match value
You can also define more complex rules using the AND and OR logic as follows:
DHCP option = vendor-class-identifier
Match value = infoblox2000a
OR
DHCP option = vendor-encapsulated-options
Substring offset = 0 (the match value starts at the first character of the option data received from the client)
Substring length = 8 (the length of the match value infoblox)
Match value = infoblox
AND
DHCP option = vendor-encapsulated-options
Substring offset = 10 (the match value starts at the ninth character of the option data received from the client)
Substring length = 5, the length of the match value 2000a
Match value = 2000a
The appliance generates the following rules in the dhcpd configuration file:
class "infoblox" {
match if (option vendor-class-identifier=infoblox2000a:) or
((substring(option vendor-encapsulated-options,0,8)="infoblox") and
(substring(option vendor-encapsulated-options,10,5)="2000a"));
vendor-option-space DHCP
}
The user class for laptop A is mobile. When it The NIOS appliance has a filter that screens
sends DHCPDISCOVER and DHCPREQUEST address requests by user class. If the user class
messages, it includes its user class in the for a DHCP client is mobile, the appliance assigns
DHCP option 77 field. it an address from address range 2.
If the NIOS appliance receives address requests with the user class mobile and there are no available addresses in
address range 2 but there are available addresses in ranges 1 and 3, the appliance begins assigning addresses from
address range 3 (because its addresses are higher than those in range 1). Then, if all addresses in range 3 are in use,
the appliance begins assigning addresses from address range 1. If you want the appliance to assign addresses to
mobile users (that is, those identified with the user class mobile) exclusively from address range 2, then you must
apply user class filters for “mobile” to address ranges 1 and 3 that deny lease requests matching that user class.
1. Add an option space called MSFT, and then add the following options to it. For information, see Applying DHCP
Options on page 1083.
2. From the Data Management tab, select the DHCP tab -> IPv4 Filters tab and click the Add icon.
3. In the Add IPv4 Filter wizard, enter the filter name i86pc, and then select Options as the filter type.
4. Select MSFT as the option space, select an option, specify a value for it, and then add it to the i86pc option filter.
You can select multiple options. Add the following options to the i86pc option filter:
5. From the Data Management tab, select the DHCP tab -> IPv4 Filters tab -> filter_name, and then click the Add icon.
6. In the Add IPv4 Match Rule wizard, select i86pc as the option filter, select vendor-class-identifier (60) as the
matching option, and then enter MSFT as the matching value.
7. Add a DHCP range to the network. For information, see Configuring IPv4 Address Ranges on page 1121.
8. Apply the i86pc option filter to the DHCP address range. For information, see Applying Filters to DHCP Objects on
page 1204.
9. Click Restart to restart services.
You can define a DHCP fingerprint filter by selecting one or multiple DHCP fingerprints from the existing list of DHCP
fingerprints, and then assign a grant or deny permission to the filter. You can then apply the filter to a DHCP address
range, if DHCP fingerprint detection is enabled. For information about how to enable DHCP fingerprint detection, see
Enabling and Disabling DHCP Fingerprint Detection on page 1360.
Note that once you apply a DHCP fingerprint filter to an address range, you cannot disable DHCP fingerprint detection
or disable individual DHCP fingerprints that have been included in the filter. You must first delete or disable the DHCP
fingerprint filter that you have applied to the address range before you can disable any fingerprint related tasks. For
information about how to delete a DHCP fingerprint filter, see Deleting Filters on page 1212.
On lease renewals, requesting clients must send the same DHCP fingerprint information in order for the appliance to
properly grant or deny leases based on the configured DHCP fingerprint filters. For example, if a client sends option
55 in the original request but does not send the same information in the renewal request, and you have configured
a DHCP fingerprint filter to grant a lease to this client, the appliance may not be able to properly grant a lease to this
client.
Note: When you select No Match, the appliance applies the filter to all requesting clients that do not send option
55 and option 60 or to clients that send values in option 55 and 60 that do not match any existing DHCP
fingerprints.
4. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
5. Save the configuration.
Filters in the Class Filter List correspond to the class statement generated in the dhcpd configuration file, which is a
classification of the client packet. All DHCP clients that match the option filter and relay agent filter criteria become
members of the same class and are eligible to receive DHCP options for that class, regardless of the networks in which
the clients reside. However, a client can only become a member of the MAC or NAC filter class when it is granted a
lease from the DHCP range based on the filter criteria. Whether a client receives specific options and option values
depends on the hierarchy of the options and how you apply the filters. For information about how the appliance
returns DHCP options, see Adding Filters to the Logic Filter List.
Note: The appliance allows you to add an empty IPv4 logic filter at the end of the logic filter list, which means that
you can add an IPv4 logic filter without defining DHCP options in it. In addition, you can change the order of
the filters in the logic filter list.
The appliance decides which options and values to return to a client based on the following:
• If you have different DHCP options defined in a range and any DHCP filters in the Class Filter and Logic Filter
lists, and these options do not overlap, the appliance merges and returns all options to the matching client. For
example, a DHCP client obtains a lease from a DHCP address range (R) through an option filter in the Class Filter
List (CF), which contains an option statement (O1) with a value of (S1). The appliance then matches a filter in
the Logic Filter List (LF) that contains an option statement (O2) with a value of (S2). In this case, option
statements O1 and O2 and their values S1 and S2 are merged and returned to the matching client.
• If there are overlapping DHCP options in a range and any DHCP filters in the Class Filter and Logic Filter lists, the
values defined in the Class Filter List filters take precedence over those defined in the range and filters in the
Logic Filter List. The appliance returns the option value defined in the class filters to the matching client. For
example, a DHCP client obtains a lease from a DHCP address range (R) through an option filter in the Class Filter
List (CF), which contains an option statement (O1) with a value of (S1). The appliance then matches a filter in
the Logic Filter List (LF) that contains the same option statement (O1) with a value of (S2). In this case, the
option value S1 defined in the option filter in the Class Filter List takes precedence and is returned to the DHCP
client.
• When you apply option, MAC, and NAC filters to the Logic Filter List, the appliance translates their match rules
into a DHCP if/elseif/else statement using the match rules of the first filter on the list as the “if” expression in
the statement. Match rules in subsequent filters are translated into the “elseif” statements, and the last filter
that does not contain any match rules is translated into the “else” statement. Note that a filter without any
match rules can only be added as the last filter in the Logic Filter List.
For more information about how the appliance grants and denies leases to requesting clients and determines which
DHCP options to return to the matching clients, see Configuration Example: Using the Class and Logic Filter Lists on
page 1207.
To apply IPv4 filters:
1. Grid: From the Data Management tab -> DHCP tab, select Grid DHCP Properties from the Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> member check box -> Edit icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network check box,
and then click the Edit icon.
DHCP Range: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
addr_range check box, and then click the Edit icon
Fixed Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
fixed_address check box, and then click the Edit icon.
IPv4 Reservation: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
reservation check box, and then click the Edit icon.
Host Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
host_record check box, and then click the Edit icon. Select the host IP address, and then click the Edit icon.
IPv4 Network or Fixed Address Template: From the Data Management tab, select the DHCP tab -> Templates tab
-> (IPv4 network or fixed address) template check box, and then click the Edit icon.
2. In the editor, click Toggle Advanced Mode, and then select the IPv4 Filters tab.
3. Logic Filter List: You can keep the inherited IPv4 logic filters or override them. To override the value that has been
inherited from the upper level, click Override. Click the Add icon to add a filter to match a client based on the
match rules defined in the filter. For more information, see Adding Filters to the Logic Filter List on page 1205.
If you have only one configured DHCP filter, the appliance displays the filter in the table. Otherwise, in the DHCP
Filter Selector dialog box, click the filter you want to add. Use SHIFT+click and CTRL+click to select multiple
filters.
4. Complete the following to add the Class Filter to a DHCP address range:
— Click the Add icon to add a filter to identify the class of a matching client, and to grant or deny a lease to a
client. For more information, see Adding Filters to the Class Filter List on page 1204.
If you have only one configured DHCP filter, the appliance displays the filter in the table. Otherwise, in the DHCP
Filter Selector dialog box, click the filter you want to add. Use SHIFT+click and CTRL+click to select multiple
filters.
For each filter you add, click the Action column and select one of the following from the drop-down list:
— Grant lease:
For MAC address filters: Select this to assign an IP address from the address range to a requesting host
whose MAC address matches the MAC address in the filter.
For relay agent filters: Select this to assign an IP address from the address range when one or both of the
relay agent identifiers of the requesting host match the filter criteria.
For option filters: Select this to assign an IP address from the address range to a requesting host whose
DHCP options match the DHCP options and match rules defined in the filter.
For NAC filters: Select this to assign an IP address from the address range to a requesting host based on the
authentication results from a RADIUS authentication server group.
For DHCP fingerprint filters: Select this to grant a lease from the address range to a requesting host based
whose DHCP fingerprint matches the DHCP fingerprint in the filter.
— Deny lease:
For MAC address filters: Select this to deny an address request from a host whose MAC address matches a
MAC address in the filter.
For relay agent filters: Select this to deny an address request when one or both relay agent identifiers match
the filter criteria in the filter.
For option filters: Select this to deny an address request from a host whose DHCP options match the
options and match rules in the filter.
For NAC filters: Select this to deny an address request from a host based on the authentication results from
a RADIUS authentication server group.
For DHCP fingerprint filters: Select this to deny a lease request when the DHCP fingerprint of the requesting
host matches the DHCP fingerprint in the filter.
The appliance uses filters in both the Class Filter and Logic Filter lists to determine the DHCP options and values
it returns to the matching clients.
Note: You can only add a filter that does not contain any match rules as the last filter in the Logic Filter List.
5. Save the configuration and click Restart if it appears at the top of the screen.
if (substring(option vendor-class-identifier,0,4)="MSFT") {
# Option filter "Option1"
option time-servers 10.34.34.2;
}
elsif (option Sophos.ComplianceState="Compliant") {
# NAC filter "NAC1"
default-lease-time 1000;
min-lease-time 1000;
max-lease-time 1000;
option cookie-servers 10.34.34.5;
}
else {
# Option filter "Option2"
default-lease-time 2500;
min-lease-time 2500;
max-lease-time 2500;
option domain-name "www.infoblox.com"; }
}
Depending on client requests and the matching criteria, the following scenarios can happen in this example:
If the requesting client matches the MAC1 and Option1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter)
• Returned options:
— Router(3) with a value of 10.34.34.1 (from the address range)
— Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
— Time-server(4) with a value of 10.34.34.2 (from the option filter Option1)
If the requesting client matches the MAC1 and NAC1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter MAC1)Returned options:
— Router(3) with a value of 10.34.34.1 (from the address range)
— Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
— Cookie-server(8) with a value of 10.34.34.5 (from the NAC filter NAC1)
If the client matches the MAC1 filter, but not the Option1 or NAC1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter)
• Returned options:
— Router(3) with a value of 10.34.34.1 (from the address range)
— Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
— Domain-name(6) with a value of www.infoblox.com (from the option filter Option2)
If the requesting client does not match the MAC1 filter, no lease is granted.
Deleting Filters
You can delete a filter that is not currently assigned to a DHCP range. You can also remove a filter from a DHCP range,
and then delete the filter if it is not in use.
To delete a filter:
1. From the Data Management tab, select the DHCP tab -> IPv4 Filters tab -> filter_name, and then click the Delete
icon.
2. In the Delete Confirmation dialog box, click Yes.
The appliance puts the deleted filters in the Recycle Bin, if enabled. You can later restore the filter if needed.
To schedule this task, click the Delete icon -> Schedule Delete. In the Schedule Deletion dialog box, click Delete Later,
and then specify a date, time, and time zone.
Grid Master
Captive Portal
DHCP client sends a DHCP request Server
DHCP 1
to the member DHCP server. DHCP Server
Client
Authenticated authenticated
The MAC address filters for the MAC Address Filter 192.168.1.50 -
2
authorized and guest IP address ranges Grant Leases 192.168.1.150
do not contain the MAC address of the
DHCP client.
Guest guest
MAC Address Filter 192.168.1.151 -
Grant Leases 192.168.1.170
Note that the quarantine range in Figure 32.1 contains MAC address filters to deny leases in the quarantine range to
DHCP clients with MAC addresses that match those in the Guest and Authenticated MAC address filters.
When the client connects to the captive portal IP address through its web browser, the user can register and continue
the authentication process to obtain an IP address from the authenticated DHCP range, or register as a guest and
obtain an IP address from the guest DHCP range.
If the user chooses to continue the authentication process, as shown in Figure 32.2, the member authenticates the
user with the authentication service that you configured, which can be RADIUS, LDAP, or AD.
Grid Master
authenticated
Authenticated 192.168.1.50 -
192.168.1.75 192.168.1.150
4 The member adds the MAC
address of the client to the MAC
address filter for the
authenticated range and assigns
the client system an IP address in
the authenticated range.
After the client successfully passes the authentication stage, the appliance stores the MAC address of the client in
the MAC address filter for the authenticated range. When the client tries to renew its IP address, it receives a new IP
address from the authenticated DHCP range.
Note that if the MAC address filter has an expiration period, the member automatically deletes expired MAC
addresses from the filter. Therefore, if a DHCP client tries to renew its IP address after the expiration period, the client
is redirected to the captive portal because its MAC address is no longer in the MAC address filter. For more
information, see Defining MAC Address Filters on page 1194.
If the user chooses to sign in as a guest, as shown in Figure 32.3, the user can fill in the guest registration page
provided by the captive portal.
Grid Master
HTTP Connection
2 The user chooses to register as a guest, so the server displays the guest
registration page. The user enters information on the guest registration page.
Guest guest
192.168.1.165 192.168.1.151 -
192.168.1.170
3 The server adds the MAC address of
the client to the MAC address filter for
the guest range and assigns an IP
address from the guest DHCP range.
After the user signs in as a guest, the appliance stores the MAC address of the client in the MAC address filter for the
guest range. When the DHCP client tries to renew its IP address, it receives a new IP address from the guest DHCP
range, unless the MAC address of the client expired and was removed from the filter. In this case, the DHCP client is
redirected to the captive portal.
To configure an Active Directory authentication server group for a captive portal server:
1. From the Administration tab, click the Authentication Server Groups tab.
2. Click the Active Directory Services subtab and click the Add icon.
3. In the Add Active Directory Authentication Service wizard, complete the following:
— Name: Enter a name for the service.
— Active Directory Domain: Enter the AD domain name.
— Domain Controllers: Click the Add icon and complete the following to add an AD domain controller:
— Server Name or IP Address: Enter the FQDN or the IP address of the AD server that is used for
authentication.
— Comment: Enter additional information about the AD server.
— Authentication Port: Enter the port number on the domain controller to which the member sends
authentication requests. The default is 389.
— Encryption: Select SSL from the drop-down list to transmit through an SSL (Secure Sockets Layer)
tunnel. When you select SSL, the appliance automatically updates the authentication port to 636.
Infoblox strongly recommends that you select this option to ensure the security of all communications
between the member and the AD server. If you select this option, you must upload a CA certificate from
the AD server. Click CA Certificates to upload the certificate. In the CA Certificates dialog box, click the
Add icon, and then navigate to the certificate to upload it.
— Connect through Management Interface: Select this so that the member uses the MGMT port for
administrator authentication communications with just this AD server.
— Disable server: Select this to disable an AD server if, for example, the connection to the server is down
and you want to stop the Grid member from trying to connect to this server.
— Click Test to test the configuration. If the Grid member connects to the domain controller using the
configuration you entered, it displays a message confirming the configuration is valid. If it is unable to
connect to the server, the appliance displays a message indicating an error in the configuration.
— Click Add to add the domain controller to the group.
— Timeout(s): The number of seconds that the Grid member waits for a response from the specified
authentication server. The default is 5.
— Comment: Enter additional information about the service.
— Disable: Select this to retain an inactive AD authentication service profile.
4. Save the configuration and click Restart if it appears at the top of the screen.
— Use This Authentication Server Group for Authenticating Captive Portal Users: Select the authentication
server group that authenticates users for this captive portal. For information about authentication server
groups, see About Authentication Server Groups on page 1218.
— Captive Portal User Types: Specify whether the captive portal is used to register Authenticated users only,
Guest users only, or Both.
— Portal IP Address: Select the IP address of the captive portal server. The appliance lists the VIP address and
the IP addresses of the loopback interface and the LAN2 port, if enabled. You can select any of these
addresses as the portal IP address.
— Enable SSL on Portal: Select this to support encrypted web traffic through SSL/TLS. If you select this option,
you must upload a certificate or generate a self-signed certificate. For information about creating and
uploading a certificate for the captive portal, see Managing Captive Portal Certificates on page 1223.
— Network View: This field displays if there are multiple network views configured. Select the network view in
which the authenticated, quarantine, and guest DHCP ranges belong.
— Log Registration Success: Select to enable the member to log successful registrations in syslog, and then
select the logging level from the drop-down list.
— Log Registration Failure: Select to enable the member to log failed registrations in syslog, and then select
the logging level from the drop-down list.
4. In the General Advanced tab of the editor, you can specify the port on which the member listens for
authentication requests redirected from the captive portal. The default port is 4433. Depending on your firewall
and network policies, you can configure an unused port greater than 1 and less than 63999.
5. Save the configuration and click Restart if it appears at the top of the screen.
— Logo Image, Header Image, Footer Image, Acceptable Use Policy: To display the image files and the
acceptable use policy on the captive portal, click Select beside the item you want to upload. In the Upload
dialog box, click Select File and navigate to the image or text file. Select the file you want to display and
click Upload. Note that these files have size requirements, as listed earlier in this section.
5. In the Guest Users Web Page Customization section, complete the following:
— The appliance displays certain fields on the guest registration page. Select the check boxes of the fields
that users are required to complete: Require First Name, Require Middle Name, Require Last Name, Require
Email, and Require Phone.
— Custom Field 1 — Custom Field 4: You can display up to four additional fields on the guest registration page.
To add a field to the guest registration page, enter a label for that field. The label can have a maximum of 32
characters. Select Require to require users to complete the field.
Users can enter a maximum of 128 characters in each of the fields in the captive portal login page and the guest
registration page.
6. Save the configuration and click Restart if it appears at the top of the screen.
Uploading Certificates
When you upload a certificate, the NIOS appliance finds the matching CSR and takes the private key associated with
the CSR and associates it with the newly uploaded certificate. The appliance then automatically deletes the CSR.
If the CA sends an intermediate certificate that must be installed along with the server certificate, you can upload
both certificates to the appliance. The appliance supports the use of intermediate certificates to complete the chain
of trust from the server certificate to a trusted root CA.
To upload a certificate:
1. From the Grid tab, select the Grid Manager tab, and then click Captive Portal.
2. Select the member that is running the captive portal, and then click HTTPS Cert -> Upload Certificate from the
Toolbar.
3. In the Upload dialog box, click Select File, navigate to the certificate location, and click Open.
The appliance imports the certificate . When you log in to the appliance again, it uses the certificate you
imported.
Downloading Certificates
You can download the current certificate or a self-signed certificate so users can install it in their browsers.
To download a certificate:
1. From the Grid tab, select the Grid Manager tab, and then click Captive Portal.
2. Select the member that is running the captive portal, and then click HTTPS Cert -> Download Certificate from the
Toolbar.
3. Navigate to where you want to save the certificate and save it.
When a client successfully passes authentication, the member automatically stores its MAC address in the
corresponding MAC address filter. When the client attempts to renew the lease at the midpoint of its lease time, the
member matches the source MAC address in the request with a MAC address in the filter for the authenticated DHCP
address range. The member then assigns the client a new IP address from the authenticated DHCP range.
To use the Captive Portal wizard to complete the tasks for the DHCP authentication feature:
1. From the Data Management tab, select the DHCP tab, or from the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and click Configure Captive Portal.
3. In the Captive Portal wizard, complete the following and click Next:
— Member DHCP: Select the member DHCP server that uses this captive portal to authenticate users.
— Captive Portal: Select the member that runs the captive portal. Note that the member that runs the captive
portal cannot run any other service, such as DHCP or DNS, and cannot be the Grid Master or Grid Master
candidate.
4. This panel allows you to create MAC filters for the authenticated and guest DHCP ranges. The MAC filters you can
create depend on your entry in the Captive Portal properties of the Grid member. For example, if you indicated
that the captive portal is used for authenticated users only, then this panel allows you to create a MAC filter for
the authenticated DHCP range only.
You can also specify existing MAC filters, if you want to apply them to the authenticated and guest DHCP ranges.
Complete the following and click Next:
— Authenticated MAC Filter: Specify a name for the MAC filter that is used for authenticated users.
— Expiration Time: Specify how long a MAC address is stored in the MAC address filter for authenticated
users.
— Never: Select this option to store MAC addresses in the MAC address filter until they are manually
removed.
— Expires in: Select this option to store MAC addresses in the MAC address filter for the specified period
of time.
— Guest MAC Filter: Specify a name for the MAC filter that is used for guest users.
— Expiration Time: Specify how long a MAC address is stored in the MAC address filter for guest users.
— Never: Select this option to store MAC addresses in the MAC address filter until they are manually
removed.
— Expires in: Select this option to store MAC addresses in the MAC address filter for the specified period
of time.
5. In this panel, you specify the network and address ranges, so the wizard can apply the MAC address filters to the
appropriate ranges. Complete the following:
— Network: Select the network that uses DHCP authentication.
— Authenticated Range: Select the IP address range that the appliance uses for authenticated users. The
wizard applies the authenticated MAC address filter you specified in the preceding step to this DHCP range
with an action of Allow. This effectively allows the member to assign an IP address from the address range
to a requesting host whose MAC address matches the MAC address in the filter.
— Guest Range: Select the IP address range that the appliance uses for guest users.The wizard applies the
guest MAC address filter you specified in the preceding step to this DHCP range with an action of Allow. This
effectively allows the member to assign an IP address from the address range to a requesting host whose
MAC address matches the MAC address in the filter.
— Quarantine Range: Select the IP address range that the appliance uses for quarantined addresses. The
wizard applies the authenticated and guest MAC address filters to the quarantine DHCP range with an
action of Deny. This effectively denies an address request from a host whose MAC address matches an
entry in the MAC filters for the authenticated and guest DHCP ranges.
6. Save the configuration and click Restart if it appears at the top of the screen.
Figure 32.4
RADIUS ASG
Captive Portal
cp2.campus2.school.edu
10.1.3.10
DHCP Server DHCP Server
ds1.campus2.school.edu ds2.campus2.school.edu
10.1.1.10 10.1.2.10
authenticated authenticated
10.1.1.50 - 10.1.2.50 -
10.1.1.150 10.1.2.150
guest guest
10.1.1.151 - 10.1.2.151 -
10.1.1.170 10.1.2.170
quarantine quarantine
10.1.1.225 - 10.1.2.225 -
10.1.1.254 10.1.2.254
NAC Integration
You can configure member DHCP servers to send authentication requests to RADIUS servers and to allocate
addresses based on the authentication results. This allows you to place DHCP clients into separate network
segments.
You can divide your network into different segments by configuring address ranges and applying NAC filters to them.
NAC filters use authentication results from RADIUS servers as matching criteria for granting or denying address
requests.
When a DHCP client requests a lease, the member DHCP server can query a remote backend RADIUS server such as
the Sophos NAC Advanced server to determine if the DHCP client is authorized to access the network. A Sophos NAC
Advanced server is an access-control and compliance server that supports the RADIUS protocol.
The RADIUS server then checks its database and provides the compliance state and user class, if configured, of the
DHCP client. The member DHCP server matches the response with the configured NAC filters, and grants a lease to
the appropriate network segment.
Figure 32.5 presents an example illustrating the authentication process and how a member DHCP server matches the
response with NAC filters to determine whether to grant or deny a lease. In the example, there are two DHCP ranges
configured, each with a NAC filter that specifies RADIUS compliance state of DHCP clients allowed in each range.
Figure 32.5
1 2
5 Compliant
192.168.1.151-
192.168.1.200
— Retries: The number of times the member DHCP server retries connecting to a Sophos NAC Advanced server
before it considers the server unreachable. The default is five.
— Mode: Specifies how the member DHCP server selects the first Sophos NAC Advanced server to contact.
— Ordered List: The member DHCP server always selects the first Sophos NAC Advanced server in the list
when it sends an authentication request. It queries the next server only when the first server is
considered down. This is the default.
— Round Robin: The member DHCP server selects the first Sophos NAC Advanced server for the first
request, the second server for the next request, and so on. If the last server is reached, then the DHCP
server starts with the first server in the list, and so on.
— Enable Authentication Cache: The member DHCP server automatically caches authentication results for 120
seconds. When you enable this option, you can override this default in the Cache Time to Live field. You
must enable this option to clear the cache, as described in Clearing the Authentication Cache on page
1237.
— Cache Time to Live: Specifies the duration of time an authentication result is stored. The default is one
hour. The maximum is 259200 seconds (3 days).
— Recovery Interval: Specifies the duration of time a Sophos NAC Advanced server stays inactive after being
down, before becoming eligible to have RADIUS requests sent to it. The recovery interval starts when a
Sophos RADIUS server is first discovered to be down.
— Comment: You can enter additional information about the server group.
— Disable: Select this to disable the authentication server group.
4. Save the configuration and click Restart if it appears at the top of the screen.
— Success: At least one of the servers in the RADIUS authentication server group is up.
— Fail: The MAC address in the DHCP request is not in the authentication cache and all servers in the server
group are down.
— Disabled: The RADIUS authentication server group is disabled, all the servers in the group are disabled, or
the member is not assigned a server group.
• The response from the RADIUS server:
— Accept: The response is an Access-Accept packet.
— Reject: The response is an Access-Reject packet.
• Whether the Access-Accept packet contains an error. The Infoblox DHCP server expects certain RADIUS VSAs in
the Access-Accept packet. An error occurs when any of the RADIUS VSAs are missing. For information about the
Access-Accept packet and the RADIUS VSAs, refer to the documentation for the specified RADIUS server.
— Yes: The Access-Accept packet does not include one or more RADIUS VSAs.
— No: There are no errors in the Access-Accept packet.
• A compliance state: unknown, non-compliant, compliant or partially compliant
• A RADIUS server user class
When the member DHCP server receives an address request, it checks the DHCP ranges in their priority order. For
information about the order of DHCP ranges, see Listing DHCP Ranges on page 1238.
For each DHCP range, it checks if the request matches any MAC filters, relay agent filters, or DHCP option filters that
apply to the range. (For information about these filters, see Chapter 31, Configuring IPv4 DHCP Filters, on page 1187.)
If any of those filters match, then the member either grants or denies a lease to the DHCP client, based on the filter.
If none of those filters match and there are NAC filters defined, then the member tries to send an authentication
request to a server in the RADIUS authentication server group.
If you want the member DHCP server to grant leases to specific DHCP ranges in case the RADIUS authentication server
group is considered disabled (server state = disabled) or if all RADIUS servers are down (server state = failure), create
a NAC filter for each situation and apply it to the appropriate range.
Note that when you create a NAC filter, you do not have to include rules that specify prerequisite conditions. For
example, when you create a filter that specifies a RADIUS server compliance state or user class, you do not have to
include rules that specify the following: server state=success, server response=accept, and server error = no.
Server Error: The Infoblox DHCP server expects certain RADIUS VSAs in the Access-Accept packet. When any
of the VSAs are missing, then the DHCP server considers this an error. For information about the
Access-Accept packet and the VSAs, refer to the documentation for the specified RADIUS server. Select one
of the following:
— Yes: Create a rule that matches when the RADIUS server sends an Access-Accept packet with a missing
VSA.
— No: Create a rule that matches when the RADIUS server sends an Access-Accept packet with no errors.
Server Response: Select one of the following:
— Accept: Create a rule that matches when the server sends back an Access-Accept packet.
— Reject: Create a rule that matches when the server sends back an Access-Reject packet.
Server State: Select one of the following:
— Success: Create a rule that matches when at least one RADIUS server in the group is up.
— Fail: Create a rule that matches when the MAC address of the DHCP client is not in the cache and all
RADIUS servers in the server group are down.
— Disable: Create a rule that matches when the RADIUS authentication server group is disabled, all
servers in the group are disable, or the member was not assigned a server group.
User Class: Enter the RADIUS user class value, for example, NACDeny. The member DHCP server does not
validate the entry. Therefore, you must make sure that the user class you enter matches the user class name
on the RADIUS server.
To add another rule:
— Click + to add another rule at the same level.
— Click |<- to add an all (logical AND) or any (logical OR) operator line and a parenthetical rule that is indented
one level and above the first rule.
— Click ->| to add an all (logical AND) or any (logical OR) operator line and a parenthetical rule that is indented
one level.
After you add all the match rules, you can click Preview to view the rules or click Reset to remove the previously
configured rules and start again.
4. Click Next and complete the following to define DHCP options:
— Option Space: Select an option space from the drop-down list. This field is not displayed if you do not have
custom option spaces. The appliance uses the DHCP option space as the default.
— Lease Time: Enter the value of the lease time in the field and select the time unit from the drop-down list.
The lease time applies to hosts that meet the filter criteria.
Options to Merge with Object Options
Click the Add icon. Grid Manager adds a new row to the table with the default DHCP option space and option
name displayed. Complete the following:
— Option Space: Click the down arrow and select an option space from the drop-down list. The selected
option space contains the corresponding DHCP options.
— Option Name: Click the down arrow and from the drop-down list, select the DHCP option you want to return
to the matching client.
— Value: Enter the match value that you want the filter to use for the selected DHCP option. For example, enter
the value 172.124.3.0 for the SUNW.SrootIP4 option.
To add more options to the filter, click the Add icon and repeat the steps.
5. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
6. Save the configuration and click Restart if it appears at the top of the screen.
After you add NAC filters, you must then apply them to DHCP ranges, as described in Applying Filters to DHCP
Objects on page 1204. You can also list, modify or delete NAC filters, as described in Managing DHCP Filters on
page 1210.
— Abandoned: The appliance cannot lease this IP address because the appliance received a response
when pinging the address.
— End: The day, date, and time when the state of the lease ends.
— Start: The day, date, and time when the state of the lease starts.
— Username: Displays the name of the user who receives the lease for the IP address. The username enables
you to differentiate between guest users and authenticated users. If you log in as an authenticated user,
your username is whatever you choose when you log in. If you log in as a guest, your username is First:
first_name Last: last_name.
For example, if your first name is John and last name is Doe and your username is jdoe, when you log in as
an authenticated user, your username is jdoe. If you log in as a guest user, your username is First: John,
Last: Doe.
— ClientID: The DHCP client identifier (option 61) in an IPv4 lease. The client sends the client identifier as
option 61 in the DHCP DISCOVER and REQUEST packets, as described in RFC2132, DHCP Options and
BOOTP Vendor Extensions. The client identifier is either the MAC address of the network interface card
requesting the address or any string uniquely identifying the client. This field is not displayed by default.
Note: The dates and timestamps in the Leases tab are determined by the time zone setting of the admin account that
you use to log in to the appliance.
You can display the following discovered data for IPv4 leases:
— Last Discovered: The timestamp when the IP address was last discovered. This data is read-only.
— OS: The operating system of the detected host or virtual entity. The OS can be one of the following:
— Microsoft for all discovered hosts that have a non-null value in the MAC addresses using the NetBIOS
discovery method.
— A value that a TCP discovery returns.
— The OS of a virtual entity on a vSphere server.
— NetBIOS Name: The name returned in the NetBIOS reply or the name you manually register for the
discovered host.
— Discovered Name: The name of the network device associated with the discovered IP address.
— Discoverer: Specifies whether the IP address was discovered by a PortIQ or NIOS discovery process.
You can do the following in this tab:
• Sort the data in ascending or descending order by column.
• View the lease detailed information of a current lease by selecting the check box of the lease, and then clicking
the Open icon.
• Change a current lease state to Free by selecting the check box of a current lease, and then clicking the Delete
icon.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Print and export the data in this tab.
Note: The agent, circuit, and remote IDs for option 82 can be displayed in hexadecimal or plain text format. By
default, Grid Manager displays them in hexadecimal format. You can change the logging format, as
described in Defining Logging Format for DHCP Option 82 on page 1086.
— Option: Agent circuit ID and remote ID data sent by a DHCP relay agent in all DHCP options.
— UID: (User ID) The client identifier that the DHCP client sends the appliance (in DHCP option 61) when it
acquires the lease. Not all DHCP clients send a UID.
— TSFP: (Time Sent From Partner) The time—from the point of view of a remote DHCP failover peer—when the
current lease state ends.
— CLTT: (Client Last Transaction Time) The time of the last transaction with the DHCP client for this lease.
— TSTP: (Time Sent To Partner) The time—from the point of view of the local DHCP failover peer—that the
current lease state ends.
For IPv6 leases, it displays most of the same fields as IPv4 leases, plus the following information:
— DUID: The DUID of the IPv6 DHCP client that received the lease for an IPv6 address.
— Prefix Bits: The prefix length.
— Preferred Lifetime: The length of time that a valid address is preferred. A preferred address can be used with
no restrictions. When this time expires, the address becomes deprecated.
Clearing Leases
You can clear active leases for which you have read/write permission. When you clear an active lease, its IP address
becomes available and its status changes to “Free”. To clear an active lease:
1. From the Data Management tab, select the DHCP tab -> Leases tab -> Current Leases.
2. Click the check boxes beside the IP addresses of the leases you want to clear, and then click the Clear Lease icon.
Grid Manager clears the selected leases. You can view information about a cleared lease, by selecting it in the
Lease History panel and clicking the Edit icon.
This section describes how you can centrally manage Microsoft Windows® DNS and DHCP servers from Grid
Manager. You can synchronize your DNS and DHCP data from the Microsoft servers to the Grid, and then use IPAM
tools to facilitate DHCP and DNS configuration and data management. This section includes the following chapters:
• Chapter 34, Managing Microsoft Windows Servers, on page 1251
• Chapter 35, Managing Microsoft DNS Services, on page 1283
• Chapter 36, Managing Microsoft DHCP Services, on page 1301
Figure 34.1 Managing Microsoft and Infoblox DNS and DHCP Servers from the Grid Master
corp100.com
10.3.0.0/16 10.1.0.0/16
site3.corp100.com site1.corp100.com
MS DNS and Managing Managing MS DNS and
DHCP Server Member Member DHCP Server
10.4.0.0/16 10.2.0.0/16
MS DHCP Server
site4.corp100.com
MS DNS and site2.corp100.com
DHCP Server
MS DNS Server
You do not have to configure or install any application on the Microsoft servers for the Grid members to communicate
with the servers. Infoblox uses MS-RPC (Microsoft Remote Procedure Calls) to manage Microsoft servers.
A Grid member can manage a Microsoft server in either of two modes, Read-only or Read/Write. In Read-only mode,
the Grid member synchronizes data from the Microsoft server to the Grid so admins can use Grid Manager to view the
synchronized data, but not update it. Read/Write mode allows admins to update the synchronized data as well.
Updates from Grid Manager are then synchronized to the Microsoft server, and updates from the Microsoft server are
synchronized to the Grid.
Configuration changes and data synchronized from the Grid to the Microsoft server apply immediately after the
synchronization. You do not have to restart the Microsoft server or for DNS, reload the zones.
Note that due to a field length limit set on the Microsoft DHCP server, after you synchronize DHCP data on the
Microsoft server, the “Comment” and “Description” fields for a fixed address and reservation can display only up to
128 characters even though NIOS allows up to 256 characters for these fields.
Requirements
A Grid member must have a Microsoft Management license installed to manage a Microsoft server. The license allows
the member to synchronize data with Microsoft servers. It also activates the tabs, dialog boxes and other elements
in Grid Manager that you need to manage a Microsoft server.
Note that If you do not see the Microsoft Servers tab after you add a member that has a Microsoft Management
license, you might have to restart the Grid Master to view the tab and to manage Microsoft DNS and DHCP servers in
the Grid.
OS Levels Platforms
Microsoft Windows 2003 SP2 32 bits
Standard and Datacenter
Microsoft Windows 2003 R2 Initial Release 32 bits, 64 bits
Standard and Datacenter
Microsoft Windows 2008 SP2 32 bits, 64 bits
Standard and Datacenter
Microsoft Windows 2008 R2 Initial Release 64 bits
Standard and Datacenter
Microsoft Windows 2012 Initial Release 64 bits
Standard and Datacenter
Microsoft Windows 2012 R2 Initial Release 64 bits
Standard and Datacenter
Grid members check the Windows version of the Microsoft servers before each synchronization. If a Microsoft server
reports an unsupported version before a synchronization, the member logs an error and the synchronization fails.
Note that some Windows versions require certain updates and hotfixes installed, so the Microsoft server can
synchronize with the Grid member. Following are the current requirements:
• Windows Server 2003, Enterprise x64 Edition requires the installation of security update 935966.
• Windows Server 2008 R2 requires the hotfix referenced in the Knowledge Base article 981776.
• Windows Server 2008-based DNS servers might not display delegations for reverse lookup zones. For
information about this issue, including the available hotfix, refer to Knowledge Base article 958190.
For information about the updates, enter their IDs in the Search field of the Microsoft Support website at
http://support.microsoft.com.
Administrative Permissions
By default, only superusers can configure Grid members to manage Microsoft servers. Superusers can give
limited-access users Read-only or Read/Write permission to Microsoft servers. Read-only permission allows admins
to view the properties and data of a Microsoft server from Grid Manager. Write permission is required to configure
Grid members to manage Microsoft servers, edit their properties, and start or stop their DNS and DHCP services. For
additional information, see Administrative Permissions for Microsoft Servers on page 239.
Note that to view and manage the DNS and DHCP data synchronized from Microsoft servers, admins must have
permissions to the applicable DNS and DHCP resources. For example, to view DNS zones synchronized from Microsoft
servers, admins must have Read-only permission to zones, and to edit the zones, admins need Read/Write
permission to them. Similarly, to view DHCP ranges synchronized from Microsoft servers, admins must have
Read-only permission to DHCP ranges, and to edit the DHCP ranges, admins need Read/Write permission to the DHCP
ranges. For information, see Administrative Permissions for DNS Resources on page 241 and Administrative
Permissions for DHCP Resources on page 253.
The administrative permissions on the Grid are different from those on the Microsoft server. These permissions are
independent of each other and are not synchronized.
Deployment Guidelines
Following are some recommendations and considerations when configuring Grid members to manage Microsoft
servers:
• Infoblox recommends that you schedule the initial synchronization at a time when your network is less busy,
especially if you are synchronizing a large amount of data. In addition, if a Microsoft server reconnects after
being disconnected for a long period of time, it could synchronize a significant amount of data and this could
impact the Grid Master performance.
• vNIOS Grid members and Grid members running on Infoblox-250, Trinzic 100, and Trinzic 810 appliances do not
support being configured as managing members.
• The managing member must be close, in terms of network hops, latency and bandwidth, to the Microsoft
servers that it manages. This will help reduce the synchronization time and potential retries due to network
delays.
• Although a Grid member that manages Microsoft servers can run other protocols and services, to optimize
performance, Infoblox recommends that you configure one or more members solely for managing Microsoft
servers.
• Grid members connect to Microsoft servers using RPC calls over TCP/IP. You must adjust your firewall policies to
allow traffic between the managing Grid member and its assigned Microsoft servers. Grid members use the VIP
as their source port. In Windows Server 2003, RPC uses the dynamic port range 1025-5000, by default. In
Windows Server 2008, RPC uses the dynamic port range 49152-65535, by default. You can reduce the number
of available ports as follows:
— In Windows Server 2003, use the rpccfg.exe tool. For information, refer to
http://support.microsoft.com/kb/908472.
— In Windows Server 2008 and later, use the netsh tool. For information, refer to
http://support.microsoft.com/kb/929851.
The minimum number of ports required in the range is 255.
Note that TCP ports 135 and 445 must be open on the Microsoft server, in addition to the dynamic port range.
Ports 135 and 445 are used by the port mapper interface, which is a service on the Microsoft server that
provides information to clients on which port to use to connect to a specific service, such as the service that
allows the management of the DNS service.
• The capacity of the managing member must be greater than or equal to the sum of all its assigned Microsoft
servers.
• The capacity of the Grid Master must be greater than or equal to the sum of all managed Microsoft servers
• A Microsoft server can synchronize its data to only one network view, and for DNS data, only one DNS view.
• Multiple Microsoft servers can synchronize their data into the same network view and DNS view, unless there is
a conflict in their data. For example, two Microsoft servers in different locations could serve the same private IP
address space, such as 10.1.0.0/16, or serve reverse-mapping zones with the same name, such as
10.in-addr.arpa. Synchronizing their data to the same network view and DNS view would cause conflicts which
result in the Grid member synchronizing the data of only one Microsoft server and logging an error for the other
Microsoft server. In such situations, Infoblox recommends that you synchronize each Microsoft server to a
different network view and DNS view to ensure that data from both servers are synchronized.
• This release supports the following Microsoft IPAM enhancements:
— Monitor and control settings for DNS and DHCP services for Microsoft servers
— Synchronization of IP addresses with invalid MAC addresses
— Output destination for Microsoft server log messages in the syslog
— Synchronization and configuration of Microsoft DHCP failover relationships
— RPC (Remote Policy Call) timeout setting
— Maximum concurrent connections for Microsoft servers
— Enabling and Disabling DNS zone synchronization
— The ability to allow GSS-TSIG based DDNS updates from multiple clients in a single forest or multiple forests
using keys that are appropriate for their respective domains.
Earlier NIOS releases do not support these features. When you modify settings related to these features on
Microsoft servers assigned to Grid members running a NIOS release earlier than NIOS 6.11, the NIOS appliance
displays an error message.
Complete the following tasks to configure a Grid member to manage a Microsoft server:
1. On the Microsoft server, create a user account for the Grid member. For information, see Setting Microsoft Server
Credentials.
2. On the Grid Master, configure the managing member, as described in Configuring a Managing Member.
Note: The synchronization of Microsoft DHCP servers running Microsoft Windows 2012 or later includes the
synchronization of DHCP failover relationships. Note that the DNS and DHCP failover synchronization rules
do not have an impact on the Microsoft servers running a Windows version that is earlier than 2012.
— Logging Level: Select a logging level for the Microsoft server log from the drop-down list: Low, Normal,
High, and Debug. NIOS logs the messages based on the logging level you set.
• Low: Logs only error messages.
• Normal: Logs warning and error messages.
• High: Logs warning, error and information messages.
• Debug: Logs messages about all events associated with synchronization.
See Viewing Synchronization Logs on page 1281 for a description of each level.
— Logging output destination: From the drop-down list, select an output destination to which the
appliance saves log messages for Microsoft servers. When you select Microsoft Log, the appliance logs
the messages that are generated for the respective Microsoft server in the existing Microsoft log. This is
selected by default. For more information, see Viewing Synchronization Logs on page 1281. When you
select Syslog, NIOS logs the messages that are generated for the respective Microsoft server in the
syslog. For more information about the syslog, see Viewing the Syslog on page 1341.
— Synchronize Data into Network View: This field appears only when there is more than one network view
in the Grid. Specify to which network view the data from the Microsoft servers is synchronized.
— Synchronize DNS Data into DNS View: This field appears only when there is more than one DNS view in
the network view. Specify to which DNS view the data from the Microsoft servers is synchronized.
— Comment: You can enter additional information about the servers.
— Disable Synchronization: Select this to disable the Microsoft servers. This allows you to preprovision
the Microsoft servers and then enable them at a later time.
3. Click Next.
Note: Depending on your configuration in the Which features do you want to configure? section, the Add
Microsoft Server(s) wizard displays the Microsoft server setting options.
— Use General synchronization interval (from first page of wizard): Select this check box to use the same
synchronization interval that you specified in the Minimum Synchronization Interval for synchronizing
Active Directory sites.
— Minimum Synchronization interval: The default synchronization interval is two minutes. This is the time
between the completion of one synchronization and the start of a new one. Specify an interval to
synchronize the Active Directory sites.
— Manage Active Directory sites in: Select a value from the drop-down list. You can choose to manage the
Active Directory Site in either Read-only or Read/Write mode. For more information, see Setting the
Management Mode on page 1258.
— Encryption: You can encrypt the network traffic between the Grid member and the managed Microsoft
server using SSL. Select a value, None or SSL, from the drop-down list. Infoblox strongly recommends
that you select SSL from the drop-down list to ensure the security of all communications between the
NIOS appliance and the Active Directory server. When you select SSL, the appliance automatically
updates the TCP port to 636. When you select this option, you must specify the FQDN of the Microsoft
server instead of the IP address and you must upload a CA certificate from the Active Directory server.
Click CA Certificates to upload the certificate. In the CA Certificates dialog box, click the Add icon, and
then navigate to the certificate to upload it.
— TCP port for LDAP connections: The appliance displays the port number by default based on the
encryption type that you select. When you select None, the appliance automatically updates the TCP
port to 389.
5. Click Next and do the following in the Managed Servers table:
— Name or IP Address: Enter either the FQDN or IP address of the Microsoft server. In order for the member to
resolve the FQDN of a Microsoft server, you must define a DNS resolver for the Grid member in the DNS
Resolver tab of the Member Properties editor. Note that if the IP address of the Microsoft server is specified,
then the DNS resolver must resolve it when the member and Microsoft server synchronize DHCP data only.
— DNS Sync: Select this option to enable the Grid member to manage the DNS service and synchronize DNS
data with this server. Clearing this check box disables DNS service management and data synchronization.
This allows you to pre-provision specific Microsoft servers and then enable them at a later time.
— DHCP Sync: Select this option to manage the DHCP service of the Microsoft server and synchronize DHCP
data with this server. Clearing this check box disables DHCP service management and data synchronization.
This allows you to pre-provision specific Microsoft servers and then enable them at a later time.
— Active Directory Sites: Select this option to manage Active Directory sites and synchronize Active Directory
Sites and networks with the Grid.
— DNS Monitor & Control: Click Override to override the setting inherited from the Grid. To inherit the same
settings as the Grid, click Inherit. Select this to enable monitoring and the ability to control DNS service for
the Microsoft server. For more information, see Setting Grid Properties for Managing Microsoft Servers on
page 1264.
— DHCP Monitor & Control: Click Override to override the setting inherited from the Grid. To inherit the same
settings as the Grid, click Inherit. Select this to monitor and control DHCP service for the Microsoft server.
For more information, see Setting Grid Properties for Managing Microsoft Servers on page 1264.
Note: You cannot start or stop a DNS or DHCP service on a specific Microsoft server if you disable the monitor
and control setting for the respective service. You can control and monitor DNS and DHCP services at the
Grid level and override the settings at the Microsoft server level. Each monitor and control setting applies
only to the DNS or DHCP service and the respective Microsoft server.
— Synchronize Network Users: Click Override to override the settings inherited from the Grid. To inherit the
same settings as the Grid, click Inherit. Select this to enable the identity mapping for the Microsoft server.
For information, see Enabling Identity Mapping on page 615.
You can assign multiple Microsoft servers to a Grid member and test their connection to the Grid member. Click
the Add icon to add another Microsoft server.
6. Select a Microsoft server and click the Test Microsoft Server icon, or click the Action icon next to the
respective Microsoft server and select Test Microsoft Server from the menu to verify whether the appliance can
successfully connect to the Microsoft server. The appliance displays the test results in the Test Microsoft Server
Results dialog box.
7. Save the configuration and click Restart if it appears at the top of the screen.
or
Click Next: Continue to the next step and define extensible attributes for the Microsoft servers. For information,
see Using Extensible Attributes on page 427.
After you configure a Grid member to manage a Microsoft server, the member automatically connects to the Microsoft
server and starts synchronizing data. You can then do the following:
• View the status of the servers in the Microsoft Servers panel, as described in Monitoring Managed Microsoft
Servers on page 1278. Newly added servers first display a status of Connecting as the Grid member contacts
the Microsoft servers. The status changes to OK after the Grid member successfully connects to the Microsoft
server.
• View the data synchronized from the Microsoft servers. To view DNS data, navigate to the DNS view you
specified. For information, see Viewing Zones on page 873. To view DHCP data, navigate to the Networks tab of
the network view that you specified. For information, see Managing IPv4 DHCP Data on page 1107.
Network conditions and the amount of data can affect the synchronization time. Therefore, you might not be
able to view all of the synchronized data immediately.
• Use Smart Folders to organize the Microsoft servers and their data. For example, you can create a folder for DNS
zones and another folder for DHCP scopes synchronized from a Microsoft server. For information about Smart
Folders, see Chapter 3, Smart Folders, on page 173.
• Update the synchronized data. For information, see Chapter 35, Managing Microsoft DNS Services, on page
1283 and Chapter 36, Managing Microsoft DHCP Services, on page 1301.
You can also use Global Search to search for synchronized data, such as zones and IP addresses. For information, see
Global Search on page 68.
Defining Monitor and Control Settings for DNS and DHCP Services
You can enable or disable monitor and control settings of DNS and DHCP services for a specific Microsoft server. The
appliance enables this by default when you add a Microsoft server. When you upgrade the existing Microsoft servers,
the managed member inherits values from the Grid. You can monitor and control the DNS and DHCP services on a
Microsoft service only if both the management setting of the respective service and the monitor and control settings
of the corresponding Microsoft server for the selected service are enabled. To know more about how to enable
monitor and control settings, see Setting Grid Properties for Managing Microsoft Servers on page 1264.
Note: The original setting that controls the overall management of a given service is referred to as the management
setting. It controls whether the synchronization of the corresponding service is enabled or not, with no change
to the existing synchronization behavior. Note that synchronization does not depend on the value of the
monitor and control setting for the Microsoft server.
You can configure Microsoft server settings at the Grid level. Note that Microsoft servers inherit these settings by
default, and you can override these settings at the Microsoft server level.
When you enable monitor and control settings for DNS and DHCP services, the managing member verifies the
corresponding service status on the Microsoft server every 30 seconds. The Grid Master is notified of the status
through Grid replication.
When you disable monitor and control setting for DNS and DHCP services, the managing member stops verifying the
service status. NIOS administrators cannot start or stop DNS or DHCP service on the Microsoft server. When you try
to start or stop these services through the Infoblox API, the appliance generates an error message. The pending
service control requests made before disabling the monitor and control settings are sent to the Microsoft server.
For information about the displayed status, see Viewing DNS and DHCP Service Status on Microsoft Servers on page
1265.
Note: When you increase the maximum number of simultaneous connections above the recommended setting for a
given Microsoft server, it may consume additional bandwidth, memory, and CPU usage.
Note: When you disable monitor and control settings, Grid Manager displays unknown using gray color for such
services. When you enable monitor and control setting of a given service, Grid Manager displays the last
known status that is obtained before the setting was first disabled. The appliance later updates to the latest
status as soon as the monitoring resumes and Grid Manager displays the new status.
You can edit the General and Logging properties of multiple Microsoft servers at the same time by selecting the
Microsoft servers and clicking the Edit icon. When Grid Manager displays the Microsoft Server Properties editor, it
displays the values that the Microsoft servers have in common. If a property has multiple values, it indicates this. You
can then change any of the values and when you click Save, Grid Manager applies your changes to all the selected
Microsoft servers.
Disabling Synchronization
When you set the disable option, the Grid member completes any on-going synchronization and does not start a new
one. Setting this option only affects data synchronization and does not affect the operations of the Microsoft server.
Synchronization resumes when the Microsoft server is re-enabled.
To disable a Microsoft server:
1. From the Grid tab, select the Microsoft Servers tab -> Servers tab, select a Microsoft server and click the Edit icon,
or click the Action icon next to the respective Microsoft server and select Edit from the menu.
2. In the General tab, select the Disable Synchronization option.
3. Save the configuration and click Restart if it appears at the top of the screen.
— Moving one or more IPv6 networks when the destination Active Directory Site belongs to an Active Directory
Domain that is managed by a Windows 2003 server.
Note: You can specify a name up to 63 bytes and it is not case-sensitive, but it cannot contain spaces and the
following special characters: |{}~[]’:;<>=?@!”#$%^&‘()+/\,*.
You can select an Active Directory Site and click the Delete icon to delete it.
3. Click Next to associate networks with an Active Directory Site. Select an Active Directory Site and click the Add
icon to associate networks with the respective site.
4. Click Cancel to close the wizard without saving your settings. You can click Save and Close to save the settings
and close the wizard or click Save and Edit to save the settings and edit the properties. The application will close
the wizard and open the Active Directory Site Properties editor. Click Save and New to save the Active Directory
Sites in the list and open a new wizard.
Note: The identity mapping information displayed on NIOS completely depends on live event logs that are available
on the Microsoft servers. The appliance pulls event logs incrementally. So subsequent requests pull only the
latest logs since the last successful synchronization. To avoid data loss, depending on the expected activities,
you must consider the size of the event log file on the Microsoft server and how often you want to synchronize
the data with the appliance before the event log file rolls over.
Administrative Permissions
Only superusers can view identity mapping information. Limited-access admin groups can view identity mapping
information only if they have network permissions. For example, if the users have permissions to only DNS zones,
they may not be able to view identity mapping information because they do not have network permissions. The
appliance does not display a warning message if admins do not have correct permissions. For information about
network permissions, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks on page 228.
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
John 10.10.10.10 10:00:00 AM (UTC) 10:00:11 AM (UTC)
If another login request is received at 10:30 AM (10 minutes after the last seen event), then it is considered as a
different session:
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
John 10.10.10.10 10:00:00 AM (UTC) 10:00:11 AM (UTC)
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
John 10.10.10.10 10:30:00 AM (UTC)
If a Kerberos service ticket is received instead of a login event, then the previous session is extended and is updated
as Last Seen Time in the first user session.
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
John 10.10.10.10 10:00:00 AM (UTC) 10:30:00 AM (UTC)
The appliance displays separate entries (counts) for the following scenarios:
• Multiple users logging in from the same IP address. For example, User 1 logged in with 10.10.10.10 address
counts as one network user and User 2 logged in with 10.10.10.10 address counts as another network user.
• Same user logging in from multiple IP addresses. For example, a single user can log in to multiple workstations,
each with a different IP address.
• Same user logging from the same IP address at a different time intervals.
Note: The appliance displays user information only for the managed networks.
The following table illustrates how the appliance displays counts for different login scenarios:
Table 34.1 Network User Count Displayed for Different Login Scenarios
Same user from multiple IP Appliance displays separate entry (user name and IP address) for each user.
address
• There is a possibility of missing a logout or session end notifications when the user shuts down the workstation
or leaves the system. In such cases, the Microsoft event log does not specifically indicate a logout. The logout
events that are missed on the Domain Controller or Exchange server are missed on NIOS as well.
To maintain accuracy, the login timestamp is estimated as logout timestamp minus (-) the idle timeout. However,
when a login or Kerberos Authentication event is received, the login timestamp is updated to the value available in
the Kerberos authentication event or the login event.
To maintain accuracy of the logout time data, the appliance allows you to configure the length of idle time in the Grid
Properties Editor wizard. After this time interval, the status of the user changes to Timed Out. For information about
how to set timeout length, see Configuring Active User Timeout Session on page 616.
Note: The Timed Out and Logged Out user information is periodically removed from the database.
Note: On an Infoblox appliance, the Enable Network Users Feature and Synchronize Network Users with all MS
servers options are disabled by default for all new installations.
Gray The DNS service is stopped or management of the Microsoft DNS server is disabled.
• DHCP: The status of the DHCP service on the Microsoft server. When you disable DHCP synchronization, NIOS
does not display any status icon. The status icon can be one of the following:
Gray The DHCP service is stopped or management of the Microsoft DHCP server is disabled.
• Comment: Displays any comments that were entered for the Microsoft server.
• Site: Displays any values that were entered for this pre-defined attribute.
You can add the following columns for display:
• Version: The Windows version of the managed server.
• Managing Member: The hostname of the Grid member that manages the server.
• Synchronization Status: Displays the synchronization status as follows:
— Running: The Microsoft server is synchronizing data with the Grid member.
— Connecting: The Grid member is trying to connect to the server.
— Error: Synchronization failed between the member and server. You can check the messages in the Microsoft
server log to determine the reason for the failure.
• Last Changed: Displays information about when the status was last updated for Microsoft DNS and DHCP
services. It corresponds to the last time information was exchanged with the server.
• AD Domain: Displays the AD domain of the Windows server. This is displayed only if the Windows server
belongs to an Active Directory domain.
• Root AD Domain: Displays the root AD domain of the Windows server. This is displayed only if the Windows
server belongs to an Active Directory domain.
• DNS Service Status Last Updated: The date and time of the last DNS service status update from the Microsoft
DNS server.
• DHCP Service Status: For information about the status icons, see Viewing the Status of Servers on page 1278.
• DHCP Service Status Last Updated: The date and time of the last DHCP service status update from the Microsoft
DHCP server.
• Active Directory Sync Status: The Active Directory Site is synchronizing data with the Grid member when the
status icon is green.
• Active Directory sync status last updated: The date and time of the last Active Directory Site update from the
Microsoft server.
Note the following guidelines about status information:
• Grid Manager does not display any status information if there is no synchronization between DHCP and DNS.
• If the appliance has not received any information when the services are enabled, then the Synchronization
Status icon is displayed in red, whereas the DNS and DHCP status icons are displayed in grey.
You cannot use Grid Manager to create the unsupported zones and assign them to a Microsoft server. Any zone on
the Grid that has the same name as a forwarding, cached or root zone on the Microsoft server is not synchronized. In
addition, Grid members do not synchronize the contents of a zone if the Microsoft server is a secondary server.
Subdomains defined within a Microsoft DNS zone are not synchronized unless they contain at least one resource
record. For example, in the corp100.com zone, any resource record defined in a subdomain of the corp100.com zone
is synchronized. If the subdomain sub.corp100.com zone has no resource record, it is not synchronized.
The following zones and resource records are supported on Microsoft servers running Windows Server 2008 only.
Therefore, Grid members can only synchronize these DNS zones and resource records with Microsoft servers running
Windows Server 2008.
• When you disable synchronization for a zone and perform certain operations on the respective zone, the
outcomes of those operations are not replicated on any Microsoft servers assigned to the zone. For Microsoft
primary servers, any resource records or zone properties (including name servers) that you create, modify, or
delete on the NIOS appliance are not copied to the Microsoft server. For Microsoft secondary servers and stub
servers, any zone properties (including name servers and masters) that you create, modify, or delete on the
NIOS appliance are not copied to the Microsoft server.
• When you disable synchronization for a zone, the zone retains the Microsoft server that was last selected as the
master before synchronization was disabled. The master retains its role when you enable synchronization
again.
• When you disable synchronization, NIOS completes the ongoing process. The synchronization effectively stops
at the end of the synchronization. NIOS resumes the synchronization of the zone as soon as the member
assigned to the master MS server is notified through Grid replication that the zone is no longer disabled for
synchronization and the zone is overdue for synchronization. This is based on the last time the zone was
successfully synchronized and the synchronization interval at the time of re-enabling the synchronization.
• Note that the zones that are disabled for synchronization are not accounted in the overall synchronization
status.
• NIOS retains the zone synchronization disable setting when you enable or disable the DNS synchronization
setting of any MS server that is assigned to the zone.
Microsoft server
Primary Server Input Secondary Input NIOS displays displays records
Server records in...
in...
NIOS Punycode Microsoft NA Punycode Punycode
NIOS IDN Microsoft NA IDN Punycode
Microsoft Punycode NIOS Punycode Punycode Punycode
Microsoft IDN NIOS IDN IDN IDN
• You can copy records to and from zones synchronized with Microsoft servers. When copying records to a
Microsoft zone, you can copy only those records that are supported by Microsoft servers. For information about
copying records, see Defining a Match Destinations List on page 817.
1. From the Data Management tab, select the DNS tab -> Zones tab -> DNS_view -> zone check box and click the Edit
icon.
2. In the Authoritative Zone editor, you can do the following in each tab:
— General: You can add or edit comments, and set the Disable and Lock options. Setting the Disable option
sets the status of the zone to “Paused” on the Microsoft server. Grid members synchronize disabled zones
to Microsoft servers.
— Name Servers: You can modify the name servers assigned to the zone. For information, see Assigning Zone
Authority to Name Servers on page 839.
— Settings: If the zone was synchronized from a Microsoft server, this tab displays the original settings from
the Microsoft server. If the zone was created using Grid Manager, then it inherits the TTL values from the
Grid. Note that these values might be different from those on the Microsoft server. To change any of these
values, see Configuring DNS Service Properties on page 753.
— Zone Transfers: In this tab, you specify the servers to which zone transfers are allowed. For information
about zone transfers, see Enabling Zone Transfers on page 788. Set the following parameters, depending
on whether the primary or secondary servers of the zone are Infoblox or Microsoft DNS servers:
— If the primary server is an Infoblox, Microsoft or external primary and the secondary servers are both
Infoblox and Microsoft DNS servers, this tab displays two separate tables where you can specify zone
transfer settings for the Infoblox DNS servers and the Microsoft DNS servers.
Zone Transfer Settings for Infoblox Members: Specify the settings as described in Configuring Zone
Transfers on page 789.
Zone Transfer Settings for Microsoft Servers: Note that you cannot use a named ACL for access control
though you can use individual ACEs. For information about named ACLs and access control, see
Configuring Access Control on page 398. You can set access control for zone transfers for Microsoft
servers to one of the following:
• None: Does not allow zone transfers to any name server.
• Any: Allows zone transfers to any IP address.
• Any Name Server: Allows zone transfers to any name server in the Name Servers table.
• Address: Allows zone transfers to the IP address that you specify.
— If both the primary and secondary servers are Microsoft servers, the dialog box displays the Zone
Transfer Settings for Microsoft Servers table only.
— If no Microsoft servers are primary or secondary servers, then the dialog box displays the Zone Transfer
Settings for Infoblox Members table only.
— Updates: In this tab, you specify whether the zone can accept dynamic DNS updates. For information about
dynamic DNS updates, see Chapter 21, Configuring DDNS Updates, on page 909. If the primary server is a
Microsoft server, regardless of the secondary servers, the Updates tab displays the following:
— Dynamic Updates: Select one of the following:
None: The zone does not accept dynamic updates.
Secure Only: This appears only if the zone is AD-integrated. The zone accepts GSS-TSIG-signed updates
only.
Nonsecure and Secure: The zone accepts both nonsecure and GSS-TSIG-signed updates.
— Active Directory:
— Automatically create underscore zones: This option allows the appliance to create the following
subzones that the DNS server must have to answer AD-related DNS queries:
_msdcs.zone
_sites.zone
_tcp.zone
_udp.zone
domaindnszones.zone
forestdnszones.zone
Note that these zones are automatically generated. You cannot edit these zones or import data into them.
They cannot be modified, thus providing protection against forged updates.
• Extensible Attributes: Extensible attributes apply to the zones only when they are managed from Grid Manager.
For information, see Using Extensible Attributes on page 427.
• Permissions: These permissions apply to Infoblox Grid Manager administrators only. For information, see About
Administrative Permissions on page 195.
Note: If the Enable PTR record removal for A/AAAA records option is selected and if you try to delete the A or
AAAA records in zones served by Microsoft servers, the appliance displays the Delete Confirmation (A or
AAAA Record) dialog box to confirm whether you want to remove the corresponding PTR record that was
automatically generated while creating the A or AAAA record. In the Delete Confirmation dialog box, select
the Remove associated PTR resource record(s) check box and click Yes to delete the associated PTR record
or click No to cancel. For information about enabling this option, see Deleting PTR Records associated with
A or AAAA Records on page 762.
• You can add and edit DNAME records in a DNS zone assigned to a Microsoft server running Windows 2008 or
Windows Server 2012. You cannot add or edit DNAME records in zones assigned to Microsoft servers running
earlier Windows versions.
• You can disable synchronized resource records from Grid Manager. When you disable a resource record, it is
removed from the Microsoft server at the next synchronization.
• If you add a resource record with invalid data from Grid Manager, such as a DNAME record with an alias name
that has special characters, the invalid resource record is not synchronized to the Microsoft server and is
eventually deleted from the Grid. The error is logged in the Microsoft log.
• If the zone of the resource record was created using Grid Manager, then it and all its resource records inherit
their TTL values from the Grid. Note that these values might be different from those on the Microsoft server. You
can change these values to match those on the Microsoft server. For information on changing these values, see
Configuring DNS Service Properties on page 753.
• Grid Manager and Microsoft DNS servers display TXT records differently.
On Grid Manager, you enter the text string of TXT records as defined in RFC 1035. You can enter the following:
— A contiguous set of characters without spaces. If you enclose the characters in double quotes, Grid
Manager displays the character string without the double quotes. For example, if you enter "abcdef", Grid
Manager displays abcdef.
— A string that contains any character, including spaces, enclosed in quotes.
— If the string contains a quote ("), you must precede it with a backslash.
— If you enter a text string with multiple spaces between each word and the string is not enclosed in
double quotes, Grid Manager displays the text string with a single space between each word. For
example, if you enter text string, the GUI displays text string. To preserve multiple spaces, enclose the
string in double quotes.
Unlike on Microsoft DNS servers, you cannot enter a text string on multiple lines in Grid Manager. However, each
contiguous set of characters or quoted string entered on Grid Manager is equivalent to a separate line entered
on a Microsoft DNS server.
On a Microsoft DNS server, you can enter text without quotes and with each line on a separate line. Microsoft
DNS servers then display the text in a brief format where the lines are separated by a comma and a space.
For example, if you enter the following in the Text field of the TXT Record wizard or editor on Grid Manager:
"this is a line""with another line""and a third one"
It is served by the Microsoft and Infoblox DNS servers as:
"this is a line""with another line""and a third one"
But it is displayed in the Microsoft DNS server as:
this is a line, with another line, and a third one
Synchronizing Updates
A Grid member synchronizes DNS data with each managed Microsoft server at regular intervals. Grid Manager admins
with the applicable permissions can then update the synchronized DNS zones and resource records. During each
synchronization, updates from Grid Manager are applied to the Microsoft server and updates from the Microsoft
server are applied to the Grid as well. Note that the resource records are synchronized only if there is a change to the
SOA record on either the Microsoft server or the Grid.
The following examples illustrate how Grid members synchronize DNS data:
• If a Microsoft server admin adds the finance.corp100.com zone, it is also added to the Grid after a
synchronization.
• If a Grid Manager admin changes the A record of admin.corp100.com from 10.2.1.5 to 10.2.1.6, the IP address
of its corresponding A record on the Microsoft server is updated to 10.2.1.6.
• If a Grid Manager admin deletes a DNS zone that is assigned to a Microsoft server, the corresponding zone on
the Microsoft server is deleted as well in the next synchronization.
Because admins can update DNS data from the Microsoft server and from Grid Manager, conflicts can occur during
synchronization. In addition, Microsoft servers and Infoblox DNS servers have some differences in the features they
support and the way they handle certain zones and resource records.
The following guidelines describe how the Grid member resolves conflicts and handles any differences when DNS
data is synchronized between a Microsoft server and the Grid.
• On Microsoft servers, users can enter FQDNs and labels using a mix of upper and lower case characters. The
servers preserve the original case when they store the data. When the Grid member synchronizes data with the
Microsoft server, it displays the data in lower case in Grid Manager and the Infoblox API. The case of the data is
preserved as long as no change is made to the DNS zone or resource record. If a Grid Manager admin modifies a
DNS zone or resource record, the next synchronization converts the object name to lower case on the Microsoft
server.
• If a Microsoft server admin modifies an object that has a pending scheduled task and synchronization occurs
before the scheduled task, the object is modified in both the Microsoft server and the Grid member. When the
scheduled task executes at its scheduled time, it fails and an error message is logged in the audit log.
• A situation could arise where two Microsoft servers in different domains are primary servers for zones with the
same name. For example, two reverse-mapping zones could be named 1.1.10.in-addr-arpa in two Microsoft
servers managed by the same member. If the two Microsoft servers are synchronized to different DNS views, the
Grid member synchronizes each one separately. If the Microsoft servers are synchronized to the same DNS view,
then the Grid member synchronizes the zone with the first Microsoft server. During the synchronization with the
second Microsoft server, the Grid member logs an error and does not synchronize the zone.
• The Grid member does not synchronize the naming policy configured on Microsoft servers. Zones and resource
records that fail the policy check on Microsoft servers are reported in the synchronization log file.
• When you remove a Microsoft server that is assigned to a zone, the succeeding synchronization removes the
zone from the Microsoft server.
• When a Microsoft server admin and a Grid Manager admin change the same object, the Grid member retains the
version that exists on the Microsoft server. Following are some examples:
Table 35.1
• Changing the name or IP address of a resource record on the Microsoft server effectively deletes the original
resource record and creates a new record with the current information. During the synchronization, the Grid
member also deletes the original record, including its associated properties, such as its extensible attributes
and administrative permissions, and creates a new record.
For example, as shown in Figure 35.1, the A record for printer1.corp100.com is on both the Microsoft and
Infoblox Grid member. On the Grid, the A record has extensible attributes and a comment. A Microsoft server
admin changes the IP address of the A1 resource record from 10.1.1.2 to 10.1.1.3. On the Microsoft server, this
is equivalent to deleting the A1 resource record with the IP address 10.1.1.2 and then adding a new A1 resource
record with the IP address 10.1.1.3. When the data is synchronized, the Grid member deletes the original record
with its extensible attributes and comments and creates a new A record with IP address 10.1.1.3.
Figure 35.1
printer1.corp100.com A 10.1.1.3
printer1.corp100.com A 10.1.1.2
Attributes: Lab 11, ID 111
Comment: Lab printer
• If a Microsoft server admin changes the IP address of a resource record and a Grid Manager admin changes the
IP address of the same resource record, they are effectively deleting the record and each creating a new one.
For example, as shown in Figure 35.2, a Microsoft server admin changes the IP address of the A resource record
for printer1.corp100.com from 10.1.1.2 to 10.1.1.3, and a Grid Manager admin changes the IP address of the
same resource record to 10.1.1.4. When the data is synchronized, the Grid member deletes the A1 resource
record with IP address 10.1.1.2 and creates an A resource record with IP address 10.1.1.3 and another A1
resource record with IP address 10.1.1.4.
Figure 35.2
• The Microsoft server does not allow the creation of arpa subzones as forward-mapping zones, similarly, the
appliance restricts assigning arpa subzones (zone names ending with .arpa) to the Microsoft server.
• NIOS does not synchronize the top-level reverse-mapping zones (in-addr.arpa and ip6.arpa) created on the
Microsoft server and the top-level reverse-mapping zones (in-addr.arpa and ip6.arpa) created on the NIOS
appliance cannot be assigned to the Microsoft server.
• Grid members can synchronize classless IPv4 reverse-mapping zones from the Microsoft server to the Grid only
if the zone prefix is in one of the following formats: <subnet>/<subnet mask bit count> or <subnet>-<subnet mask
bit count> . For example, 128/26.2.0.192.in-addr.arpa. If the zone prefix is not in the specified format, the Grid
member skips the zone and logs an error message. For information, see
http://technet.microsoft.com/en-us/library/cc961414.aspx.
Likewise, Grid Manager admins can add a classless IPv4 reverse-mapping authoritative or stub zone to a
Microsoft server only if its prefix is in the specified format.For information about configuring classless IPv4
reverse-mapping zones in Grid Manager, see Specifying an RFC 2317 Prefix on page 830.
• Grid members synchronize DNS records that contain values that Infoblox does not support. Grid Manager
admins can view these records, but they cannot edit or restore such records. For example, if a member
synchronizes a NAPTR record that contains an unsupported value in the Service field, admins can view this
record but they cannot edit or restore it, as long as it contains an unsupported value.
• When a Grid member synchronizes a zone from a Microsoft server to the appliance and that zone contains
UTF-8 characters in the "Responsible Person" field, Grid Manager displays the “Responsible Person” value in
the RNAME field of the SOA record of the zone. Note though that you cannot edit the SOA record if the RNAME
field contains unsupported UTF-8 characters.
• Synchronizing a new zone from the Microsoft server to the Grid is a two-step process. First the zone name is
synchronized, and then its properties and records are synchronized. The zone synchronization from the
Microsoft server is not considered complete until both steps are done. NIOS drops any records that are created
on the appliance for the synchronized zone before it is completely synchronized.
For example, the corp100.com zone is created on a Microsoft server and then synchronized to the NIOS
appliance. If a NIOS admin creates a record, such as an A record, in the corp100.com zone before it is fully
synchronized, the record is removed from the corp100.com zone. Ensure that both the zone and its contents are
completely synchronized before you add a record to a zone on the NIOS appliance.
• When a Microsoft admin deletes a zone whose primary and secondary servers are Microsoft servers, the zone is
deleted from the Grid after a synchronization. If the secondary Microsoft servers are managed by the member in
Read-Write mode, the zone is removed from the secondary servers as well. But if some of the secondary
Microsoft servers are managed by the member in Read-Only mode, then at the next synchronization the zone is
recreated on the Grid with the Microsoft servers as the secondary servers and the masters defined for the zone
as external primary servers.
• If you add Grid members or other Microsoft servers as secondary servers to a zone on the Microsoft server, NIOS
does not automatically add them as Grid Secondary or Microsoft Secondary servers in the Name Servers tab of
the zone after the synchronization. Instead, NIOS creates NS records for them in the zone.
Synchronizing Delegations
When a parent zone delegates a subdomain to one or more name servers, Infoblox DNS servers require the
delegation name servers to also be authoritative for the subzone. Microsoft servers do not; they allow the delegation
servers of a subzone to be different from its authoritative servers. Infoblox DNS servers support this configuration
only if the primary server of the parent zone is a Microsoft server. This configuration is retained when delegations are
synchronized from Microsoft servers to the Grid.
For example, as shown in Figure 35.3, on a Microsoft server, corp100.com delegates sales.corp100.com to the name
server ns1.corp100.com; but the authoritative server of sales.corp100.com is 2k3r264-2.infoblox.com.
Figure 35.4 shows that after corp100.com and its subzone are synchronized to the Grid, corp100.com contains an NS
record for sales.corp100.com and an A record for the delegation name server ns1.corp100.com. The MS Delegation
Addresses column displays the IP address of the delegation server of the subzone sales.corp100.com.
After the synchronization, you can add name servers for the delegation as follows:
1. Select the zone by navigating to the Data Management tab -> DNS -> Zones -> parent_zone.
2. Click the Add icon and select Record -> NS Record.
3. Complete the following and click Next:
— Name Server: Enter the hostname you want to configure as the name server for the zone.
— Name: Specify the name of the subzone. Note that you cannot change this name when you edit the record.
4. Enter the IP address of the name server.
5. Save the configuration.
NIOS adds an NS record for the new delegation server and synchronizes this update to the Microsoft server. In
Figure 35.5, a new delegation server, ns2.corp100.com, was added.
When you navigate to the Name Servers tab of sales.corp100.com to view the authoritative name servers for the
subzone, note that as shown in Figure 35.6, the table displays 2k8r264-2.infoblox.com as the authoritative server for
the subzone. The Parent Delegation column indicates if the FQDN and IP address of the authoritative name server for
the zone matches the FQDN and IP address in the delegation zone’s NS record. In the example, the authoritative
name server 2k8r264-2.infoblox.com is different from the delegation name servers (ns1.corp100.com and
ns2.corp100.com), so the column displays No.
Note though that because Infoblox DNS servers require the delegation servers to also be authoritative for the
subzone, if you add another authoritative name server to the subzone from Grid Manager, NIOS also adds it as a
delegation server in the parent zone. For example, as shown in Figure 35.7, when an admin adds the name server
ns-100.corp100.com as an external secondary server for sales.corp100.com, NIOS automatically adds it as a
delegation server by adding an NS record for it in the parent zone.
The Grid member periodically checks if each zone has one principal server. If it does not find a principal server for a
zone, the Grid member selects one among the name servers assigned to the zone. It gives priority to the server that
was not the designated principal server the longest.
Resolving Conflicts
Some conflicts require intervention from an admin. For example, a Grid member cannot synchronize a zone when its
primary server on the Microsoft server is different from its primary server on the Grid. When a Grid member is unable
to synchronize data due to such conflicts, it logs an error, skips the object with the error and continues synchronizing
the rest of the data. You can then view the Microsoft logs to check which objects were not synchronized. If you resolve
the problem, the Grid member synchronizes the object on its next attempt. For information about the logs, see
Viewing Synchronization Logs on page 1281.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Export the list of Grid members and Microsoft servers to a .csv file.
— Click the Export icon.
• Print the list of Grid members and Microsoft servers.
— Click the Print icon.
Managing
IP Map Member 10.1.0.0/16
MS DHCP Server
Dashboard
10.2.0.0/16
MS DHCP Server
Admin Grid Master
10.3.0.0/16
MS DHCP Server
As shown in Table 36.1, Microsoft servers and Infoblox DHCP servers represent DHCP data differently. Scopes on
Microsoft servers are DHCP ranges on Infoblox DHCP servers. Additionally, Microsoft servers support split-scopes,
which is a scope assigned to two Microsoft servers. Each scope has an exclusion range on opposite ends to specify
the pool of IP addresses that the other Microsoft server allocates. On an Infoblox DHCP server, each scope in the
split-scope is represented as a DHCP range with an exclusion range. Note that NIOS also synchronizes scopes
assigned to more than two Microsoft servers, but they are not synchronized as split-scopes.
Fixed addresses on Infoblox DHCP servers are the same as reservations on Microsoft servers. Infoblox reservations,
which are IP addresses that are excluded from DHCP, are not supported on Microsoft servers. Microsoft superscopes,
which are used to group scopes, are represented as superscopes and can be managed from Infoblox DHCP servers.
Note: In this chapter, reservations always refer to Microsoft reservations (Infoblox fixed addresses), unless
otherwise specified.
When the member synchronizes a scope to the Grid, it converts the scope to a DHCP range and network. For example,
it converts the Microsoft scope 10.1.1.1- 10.1.1.200 with a netmask of /24 to the network 10.1.1.0/24 and DHCP
range 10.1.1.1- 10.1.1.200 on Grid Manager. The member associates the DHCP properties of the scope, including its
DHCP and Microsoft vendor options, with the DHCP range. It synchronizes the leases within the range and if
configured, the exclusion range as well.
NIOS synchronizes two scopes as split-scopes if the following conditions are met:
• Two scopes have the same address range.
• The scopes are assigned to two different Microsoft servers.
• Each scope has an exclusion range and the exclusion ranges are at opposite ends of the scope, so they
complement each other. For example, the scope 10.1.1.1-10.1.1.200 on Microsoft server A has an exclusion
range of 10.1.1.100-10.1.1.200 and the same scope on Microsoft server B has en exclusion range of
10.1.1.1-10.1.1.99.
When the appliance synchronizes a split-scope, it sets a split-scope flag on each scope to indicate that it is part of a
split-scope. For more information, see Viewing Scopes on page 1312. It synchronizes any reservations that are
configured in each scope as well.
When the member synchronizes a Microsoft reservation to the Grid, it converts the reservation to a fixed address and
static lease on Grid Manager. It associates the DHCP properties and DHCP and Microsoft vendor options of the
reservation with the fixed address record.
The Grid member synchronizes superscopes to the Grid as well. The Grid supports Microsoft superscopes, when an
MS management license is installed. For information about adding and managing superscopes in Infoblox DHCP
servers, see About Superscopes on page 1315.
Following are some guidelines on how a Grid member synchronizes DHCP data from Microsoft servers to the Grid:
• If two superscopes have the same name, but are served by different servers, the member creates two different
superscopes on the Grid, each appended with the Microsoft server FQDN.
• The member synchronizes all active and inactive scopes from a managed Microsoft server as long as the scopes
do not conflict or include any networks currently served by a Grid member. The member does not synchronize a
scope if its network already exists in the Grid and is served by a Grid member. It can synchronize a scope if its
network is included in an existing network, only if the network is not served by DHCP.
• Synchronizing scopes that are larger than /12 is not supported.
• NIOS synchronizes all scopes except for those with serving ranges that overlap the serving ranges of existing
DHCP ranges.
• If the appliance manages multiple Microsoft servers and synchronizes identical scopes from more than two
Microsoft servers, it does not flag the scopes as split-scopes.
• If the appliance synchronizes one or more scopes from Microsoft servers that are identical to an existing
split-scope, it removes the split-scope flag from the existing split-scope.
• NIOS does not synchronize partially overlapping scopes inside a single network from different Microsoft
servers. It synchronizes only ranges that completely overlap.
• More than two scopes are not synchronized as split-scopes, even if they are identical and have exclusion ranges
that complement each other.
• Scopes that have more than one exclusion range are not synchronized as split-scopes, even if the exclusion
ranges complement each other. In addition, if a split-scope is synchronized from a Microsoft server and one of
the scopes is split again on the Microsoft server, NIOS synchronizes the third scope, but does not set a
split-scope flag. In addition, it removes the split-scope flag from the original split-scopes.
You can view the synchronized data as follows:
• To view the networks of the scopes, select the Data Management tab -> DHCP tab -> Networks tab -> Networks
panel. This panel displays all IPv4 networks. For information about this panel, see Modifying IPv4 Networks on
page 1118.
• To view the corresponding DHCP ranges and reservations, select the Data Management tab -> DHCP tab ->
Networks tab, and click a network link. For information about this panel, see Viewing Scopes on page 1312.
You can also use the features in the IPAM tab, such as the Net Map and IP Map, to view and manage the Microsoft
DHCP data. For information, see Chapter 13, IP Address Management, on page 575.
When you remove a DHCP range from a read/write Microsoft failover relationship, NIOS deletes a copy of the DHCP
range from both the Microsoft servers defined in the failover relationship. When a DHCP range is associated with a
Microsoft failover relationship, any change made to one copy of the range is automatically saved to the other copy.
— Allow Invalid MAC Address to be synchronized: This is enabled, by default. Select this to enable
synchronization for invalid MAC addresses.
You can click Override at the member level to specify a new value. The Override button changes to Inherit.
Click Inherit to inherit the value from the Grid.
3. Save the configuration.
Note: Microsoft servers do not support Infoblox hosts and reservations. You cannot add them to networks and DHCP
ranges served by Microsoft servers.
Note: Networks served by Microsoft DHCP servers do not support the split, join, and expand functions.
You can create a network from scratch or use a network template. For information about creating network templates,
see Adding IPv4 Network Templates on page 1146. To add an IPv4 network for a scope:
1. From the Data Management tab, select the DHCP tab.
2. If you have more than one network view in the system, select the network view in which you want to add the
network. It must be the same network view to which the Microsoft server is assigned.
3. Expand the Toolbar and click Add -> Network.
4. In the Add Network wizard, select one of the following and click Next:
— Add Network
or
— Add Network using Template: Click Select Template and select a network template. For more information,
see About IPv4 Network Templates on page 1146. In the DHCP Network Template Selector dialog box,
select the template you want to use and click the Select icon. Note that when you use a template to create a
network, the configurations of the template apply to the new network. The appliance populates the
template properties in the wizard when you click Next. You can then edit the pre-populated properties,
except for Netmask.
5. Complete the following and click Next:
— Address: Enter the IP address of the network. You can enter the IP address with a CIDR block. For example,
enter 10.0.0.0/24, and the netmask slider adjusts the netmask to /24. You can also enter partial IP address
with a CIDR block. When you are done, Grid Manager displays the complete IP address with the CIDR block.
For example, when you enter 15/24, Grid Manager displays 15.0.0.0/24 and the netmask slider adjusts the
netmask to /24. Note that Microsoft DHCP servers do not support /32 subnets.
— Netmask: Use the netmask slider to select the appropriate number of subnet mask bits for the network.
Microsoft servers support /1 to /31 netmasks. Note that when you use a template that contains a fixed
netmask, you cannot adjust the netmask for this network.
— Comment: Enter additional information about the network, such as the name of the organization it serves.
— Automatically create reverse-mapping zone in view: This function is enabled if the netmask of the network
equals /8, /16, or /24. Select this to have the appliance automatically create reverse-mapping zones for
the network. A reverse-mapping zone is an area of network space for which one or more name servers have
the responsibility for responding to address-to-name queries. These zones are created in the DNS view
assigned to receive dynamic DNS updates at the network view level.
— Disabled: This option does not apply to networks assigned to Microsoft servers. The member ignores this
field when the network is assigned to Microsoft servers. You can disable DHCP ranges assigned to Microsoft
servers, but not networks.
6. Click Next to add Microsoft servers as DHCP servers for the network. Click the Add icon and select the following:
— Add Microsoft Server: Select the Microsoft server from the Microsoft Server Selector dialog box. You
can add multiple Microsoft servers, if you are adding multiple DHCP ranges served by different
Microsoft servers. For a split-scope, you must assign two Microsoft servers to the network.
7. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see About Extensible Attributes on page 417.
8. Save the configuration and click Restart if it appears at the top of the screen.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Routers: In the table, enter the IP address of the router that is connected to the same network as the DHCP
clients. Click the Add icon to add more routers.
— Domain Name: Enter the name of the domain for which the Microsoft server serves DHCP data. The DHCP
server includes this domain name in Option 15 when it responds with a DHCPOFFER packet to a
DHCPDISCOVER packet from a client.
— DNS Servers: In the table, enter the IP address of the DNS server to which the DHCP clients send name
resolution requests. The DHCP server includes this information in the DHCPOFFER and DHCPACK messages.
— Broadcast Address: Enter the broadcast IP address of the network to which the DHCP server is attached.
7. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
8. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Enable DDNS Updates: Click the check box to enable the Microsoft DHCP server to send dynamic DNS
updates or clear the check box to disable this function.
— Option 81 Support
DHCP Server Updates DNS If Requested by Client: The DHCP server updates DNS only if it is requested
by the client. Otherwise, the client updates DNS.
DHCP Server Always Updates DNS: The DHCP server always updates DNS, regardless of any client
request.
— Exclusion Ranges: Configure a range of IP addresses that the server does not use to assign to clients. You
can use these exclusion addresses as static IP addresses. For information, see Configuring IPv4 Fixed
Addresses on page 1125. In a split-scope, the exclusion range identifies the range of IP addresses that the
other Microsoft server serves. If you edit the exclusion range of either of the scopes in a split-scope and the
exclusion ranges no longer complement each other, NIOS removes the split-scope flag from both scopes.
— Thresholds: Thresholds are inherited from the Grid. These watermarks represent thresholds above or below
which address usage is unexpected and might warrant your attention.
— High-water Mark: Enter a number between 0 and 100. If the percentage of allocated addresses in a
DHCP range exceeds this number, the appliance makes a syslog entry. The default is 95.
— Low-water Mark: Enter a number between 0 and 100. If the percentage of allocated addresses in a
DHCP range drops below this number, the appliance makes a syslog entry. The default is 0. Address
usage must initially exceed the low-water mark threshold and then dip below it before the appliance
considers low address usage an event requiring an alert.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Viewing Scopes
To view the scopes in a network, navigate to DHCP -> Networks -> network. The panel displays the objects in the
network, including the scopes and split-scopes. For split-scopes, the panel displays both scopes with the same start
and end address. It displays the following information about each object:
• IP Address: The IP address of the DHCP object. For a scope, this field displays the start and end addresses of the
scope. Note that the appliance highlights all disabled DHCP objects in gray.
• Split-Scope: Displays Yes if the scope is a split-scope.
• MS Server: Displays the Microsoft server that is serving the scope.
• Type: The DHCP object type, such as DHCP Range or Fixed Address.
• Name: The object name. For example, if the IP address belongs to a host record, this field displays the
hostname.
• Comment: The information you entered for the object.
• IPv4 DHCP Utilization: The percentage of the total DHCP usage of a DHCP range. This is the percentage of the
total number of fixed addresses, reservations, hosts, and active leases in the DHCP range divided by the total IP
addresses in the range, excluding the number of addresses in the exclusion ranges. Note that only enabled
objects are included in the calculation.
• Site: The site to which the DHCP object belongs. This is one of the predefined extensible attributes.
You can select the following additional columns for display:
• Static Addresses: Indicates whether the IP address is a static address.
• Dynamic Addresses: Indicates whether the IP address is a dynamically assigned address.
• Disabled: Indicates whether the object is disabled.
• Priority: Displays the priority of a DHCP range when NAC filters are applied.
• Available extensible attributes.
You can also do the following in this panel:
• Sort the displayed data in ascending or descending order by column.
• Click Go to IPAM View to view information about the object in the IPAM tab.
• Add new objects, such as DHCP ranges, to the network.
• Delete or schedule the deletion of a selected object or multiple objects.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Print or export the data.
You can also view the scopes in the IP Map.
— Comment: Optionally, enter additional information. The text in this field appears in the Description field of
the Microsoft reservation after the fixed address is synchronized. Note that due to a length limit set by the
Microsoft DHCP server, after you synchronize DHCP data, the Description field can display only up to 128
characters even though NIOS allows up to 256 characters for this field.
5. Click Next, and optionally set operational parameters for the fixed address. Otherwise, the fixed address inherits
its parameters from its scope.
— Routers: In the table, enter the IP address of the router that is connected to the same network as the DHCP
client. Click the Add icon to add more routers.
— Domain Name: Enter the name of the domain for which the Microsoft DHCP serves DHCP data. The DHCP
server includes this domain name in Option 15 when it responds with a DHCPOFFER packet to a
DHCPDISCOVER packet from a client.
— DNS Servers: In the table, enter the IP address of the DNS server to which the DHCP client sends name
resolution requests. The DHCP server includes this information in the DHCPOFFER and DHCPACK messages.
— Broadcast Address: Enter the broadcast IP address of the network to which the DHCP server is attached.
6. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes on page 427.
7. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
— Enable DDNS Updates: Click the check box to enable the Microsoft DHCP server to send dynamic DNS
updates or clear the check box to disable this function.
— Option 81 Support
— DHCP Server Updates DNS If Requested by Client: The DHCP server updates DNS only if it is requested
by the client. Otherwise, the client updates DNS.
— DHCP Server Always Updates DNS: The DHCP server always updates DNS, regardless of any client
request.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
About Superscopes
In Grid Manager, you can group DHCP ranges served by Microsoft servers into a superscope. You can add multiple
DHCP ranges to a superscope, as long as the ranges are all served by the same Microsoft DHCP server. The Grid
member then synchronizes the superscope and its associated DHCP ranges as superscopes and scopes to the
Microsoft DHCP server.
You can also associate extensible attributes with superscopes in Grid Manager. Extensible attributes are not
synchronized to the Microsoft DHCP server.
Only admins with read/write permission to superscopes can add and manage superscopes.
Adding Superscopes
Before you add a superscope, you must first create at least one DHCP range to include in the superscope.
To add a superscope:
1. From the Data Management tab, select the DHCP tab.
2. If you have more than one network view in the system, select the network view in which you want to add the
superscope. The network view must be the same one that is assigned to the Microsoft server.
3. Expand the Toolbar and click Add -> Superscope.
4. In the Add Superscope wizard, complete the following and click Next:
— Name: Enter a name for the superscope.
— Comment: Optionally, enter additional information about the superscope.
— Disabled: Select this to disable the DHCP ranges in the superscope. They are then synchronized as inactive
scopes on the Microsoft server.
5. Click the Add icon and select a range from the Select Range dialog box. This dialog box lists only the address
ranges that are served by a Microsoft server.
6. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see About Extensible Attributes on page 417.
7. Save the configuration and click Restart if it appears at the top of the screen.
or
— Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Tasks on page 85.
Viewing Superscopes
To view superscopes, navigate to the Data Management tab -> DHCP tab -> Networks tab -> Microsoft Superscopes.
Grid Manager displays the following information about each superscope that is displayed:
• Name: The name of the superscope. Grid Manager appends the FQDN of its associated Microsoft server so you
can identify which superscope belongs to which server.
• Comment: The comment that was entered for the superscope.
• DHCP Utilization: The percentage of the total DHCP usage of the ranges in the superscope. Fixed addresses and
reservations that are outside of a range are excluded from the calculation.
• Site: The site of the superscope. This is one of the predefined extensible attributes.
You can add the following columns for viewing:
• Static Addresses: The number of static addresses.
• Dynamic Addresses: The number of dynamic addresses.
• Disabled: Indicates whether the superscope is enabled.
You can do the following in this section:
• Click the link of a superscope to list its address ranges.
• Add a superscope.
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables on page 70.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Print or export the information in this section.
• Delete a superscope.
Modifying Superscopes
To modify a superscope:
1. From the Data Management tab, select the DHCP tab -> Network tab -> Microsoft Superscopes -> ms_superscope
check box, and then click the Edit icon.
2. The Superscopes editor contains the following tabs from which you can modify data:
— General: You can modify the name and comment, and enable or disable the superscope. You can also add
and delete address ranges from the superscope. Note that when you delete the last DHCP range in a
superscope, Grid Manager automatically deletes the superscope as well.
— Extensible Attributes: Define extensible attributes for the superscope. These apply only when the
superscope is managed in Grid Manager. For information, see Using Extensible Attributes on page 427.
— Permissions: Define administrative permissions that apply to the superscope when it is managed in Grid
Manager. For information see About Administrative Permissions on page 195.
3. Save the configuration and click Restart if it appears at the top of the screen.
Deleting Superscopes
When you delete a superscope in Grid Manager, it is permanently deleted from the database. The superscope is
deleted from the Microsoft server at the next synchronization. Note that deleting a superscope does not delete the
DHCP ranges in the superscope. These are retained in the database.
To delete a superscope:
1. From the Data Management tab, select the DHCP tab -> Network tab -> Microsoft Superscopes -> ms_superscope
check box, and then click the Delete icon.
2. Click Yes when the confirmation dialog appears.
Synchronizing Updates
A Grid member synchronizes DHCP data with each of its managed Microsoft server at regular intervals. During each
synchronization, updates from Grid Manager are applied to the Microsoft server and updates from the Microsoft
server are applied to the Grid as well.
Because admins can update DHCP data from both the Microsoft server and from Grid Manager, conflicts can occur
during synchronization. The following guidelines describe how the Grid member resolves conflicts and handles any
differences when DHCP data is synchronized between a Microsoft server and the Grid.
• If a Microsoft server admin modifies an object that has a pending scheduled task in Grid Manager and
synchronization occurs before the scheduled task, the object is modified in both the Microsoft server and the
Grid member. When the scheduled task executes at its scheduled time, it fails and an error message is logged in
the audit log.
• When a Microsoft server admin and a Grid Manager admin change the same object, the Grid member retains the
version that exists on the Microsoft server. Following are some examples:
Table 36.2
• If a Grid member manages multiple Microsoft servers, it can synchronize scopes to the same network as long as
they are served by different Microsoft servers and they do not overlap. If the Microsoft servers have scopes that
overlap, the Grid member synchronizes only one of the scopes, including its reservations. It does not
synchronize the other scopes and logs an error message for each scope that is not synchronized. For
information about the Microsoft logs, see Viewing Synchronization Logs on page 1281.
Note that a Grid member can synchronize scopes with overlapping reservations because they are served by
different Microsoft servers.
• When a Grid member synchronizes a split-scope to its respective Microsoft servers, the scopes use the default
value for the DHCP Offer Delay value, since this property is not supported by NIOS.
• If you create a split-scope on a NIOS appliance, synchronization fails if there is an existing scope in the same
network on one of the Microsoft servers. Only one scope is allowed in a network, per Microsoft server.
• If a Microsoft admin adds a DHCP range and a NIOS admin is in the process of adding the same range when a
synchronization occurs, the NIOS admin will not be able to save the range after the synchronization. Grid
Manager will display an error message indicating that the range already exists.
• If both a NIOS admin and a Microsoft admin create a scope or split-scope and conflicts occur, the Microsoft
server always takes precedence. All conflicts are logged to the Microsoft log. Following are some examples:
• If the NIOS admin creates a scope and a Microsoft server admin creates a split-scope for the same DHCP
range, the split-scope is synchronized to Grid Manager.
• If the NIOS admin creates a split-scope on Microsoft servers 1 and 2, and a Microsoft admin creates the
same split-scope on Microsoft servers 1 and 3 but with different exclusion ranges, the scope created by the
NIOS admin on Microsoft server 1 is dropped upon synchronization.
• If the NIOS admin creates a split-scope on Microsoft servers 1 and 2, and a Microsoft admin creates the
same split-scope on the same Microsoft servers but with different exclusion ranges, the split-scope created
by the Microsoft admin is synchronized to NIOS and retained. The split-scope created by the NIOS admin is
dropped.
3. Optionally, you can click Toggle Expert Mode to display the Logging tab, where you can enable the managing
member to log the lease events of the Microsoft server. This setting is inherited from the Grid. You can override
that setting by clicking Override, and then selecting or clearing the Log Lease Events from DHCP server check box.
4. Save the configuration and click Restart if it appears at the top of the screen.
Viewing Status
Grid Manager provides tools for monitoring the status of the Grid, members, and services. You can monitor overall
Grid and member status from the Dashboard, which provides a high-level view of your Grid, members and IP address
data, and easy access to tasks. For information, see Dashboards on page 117.
Grid Manager also displays status icons to indicate the state of appliances, services, database capacity, Ethernet
ports, HA, and Grid replication. Depending on your appliance, Grid Manager can display status icons for the power
supplies as well as icons to indicate the state of the RAID array and disk controller backup battery.
You can monitor detailed status of the Grid, members, and services, and then decide how to manage them. Note that
when any member or service encounters issues, the appliance sends SNMP traps. For information, see Monitoring
with SNMP on page 1363.
Grid Status
You can monitor the overall status of the Grid using the Grid Status widget on the Dashboard. For information, see
Grid Status on page 145.
You can also view the Grid status from the Grid Manager tab. To view Grid status, from the Grid tab, select the Grid
Manager tab. Grid Manger displays the overall Grid status and status of all Grid services. The Grid status represents
the status of the most critical members or services in the Grid. When all Grid members are running properly, the
overall Grid status is green. When one of the members has operational problems, the overall Grid status is red. Grid
Manager lists all Grid members in the Members tab so you can identify which member has issues. For information,
see Member Status.
In addition, the service bar below the Grid status lists the status of all licensed services—DHCP, DNS, TFTP, HTTP (File
Distribution), FTP, NTP, bloxTools, DNS Accelerator—in the Grid. When you click a service link, Grid Manager displays
detailed information about the selected service running on all members. For information, see Monitoring Services on
page 1333. Grid Manager also provides icons you can use to edit Grid properties and bookmark the page.
Member Status
You can monitor the overall status, such as the memory usage and system temperature, of a Grid member or an
independent appliance using the Member Status (System Status) widget on the Dashboard. For information, see
Member Status (System Status) on page 147.
To monitor detailed status of a member, from the Grid tab, select the Grid Manager tab -> Members tab.
In the Members tab, Grid Manager displays the Grid Master first and then all other members in alphabetical order. If
a member is an HA pair, you can click the arrow next to the member row to view information about the active and
passive nodes. Grid Manager can display the following information:
• Name: The name of the member.
• HA: Indicates whether the member is an HA pair.
• Status: The service status of the member. For a vNIOS appliance whose license is revoked and is still operating
in the Grid, Grid Manager displays a license violation warning here. You should immediately remove this
member from the Grid.
• IPv4 Address: The IPv4 address of the appliance, or the VIP of an HA pair.
• IPv6 Address: The IPv6 address of the appliance, or the VIP of an HA pair.
• Identify: This field appears only if your appliance has the unit identification button. This can be On or Off. When
you identify the appliance by pressing the UID button on the appliance or through the GUI or CLI command, this
field displays On. Otherwise, this is Off.
• DHCP, DNS, TFTP, HTTP, FTP, NTP, bloxTools, Captive Portal, DNS Accelerator usage, Reporting, Discovery, Threat
Protection, Cloud-API, Threat Analytics, TAXII: The status icons indicate whether these services are running
properly. The DNS accelerator usage feature is only applicable to the IB-4030 appliance. For information, see
Service Status on page 1333.
— Reporting Site: This field appears only when you enable reporting service and configure multi-site cluster.
For information about reporting clusters, see Configuring Indexer Cluster on page 1396.
• Hardware Type: The hardware type of the appliance.
• Hardware Model: The hardware model of the appliance.
• Serial Number: The serial number of the appliance.
• DB Utilization: The current percentage of the database in use.
• Platform: The platform on which the appliance is running. For vNIOS virtual appliances, this displays the name
of the CMP, such as AWS or VMware. For physical NIOS appliances, this displays Physical.
• Comment: Information about the member.
To turn the identification button on or off on the member, click the Hardware Identify icon. Grid Manager displays a
panel with the appliance name, status, and IP address. Hover your mouse over the row and click Turn On to turn the
identification button on, or click Turn Off to turn it off.
To view detailed status, select a member check box, and then click the Detailed Status icon. Grid Manager displays
the Detailed Status panel. If the selected member is an HA pair, Grid Manager displays the information in two
columns, one for the active node and the other for the passive. The Detailed Status panel provides detailed
information described in the following sections.
You can modify some of the data in the table. Double click a row, and either modify the data in the field or select an
item from a drop-down list. Click Save to save the changes. Note that some fields are read only.
Appliance Status
The status icon indicates the operational status of a Grid member and a general description of its current operation.
The status icon can be one of the following:
Red The Grid member is offline, is not licensed (that is, it does not have a DNSone license with the
Grid upgrade that permits Grid membership), is upgrading or downgrading, or is shutting
down.
The following are descriptions that may appear: Running, Offline, Error, and Warning.
Disk Usage
Grid Manager displays the percentage of the data partition of the hard disk drive that is currently in use on the
selected Grid member. It also displays whether the percentage of usage has exceeded the trigger or reset value. Note
that the trigger and reset values are user configurable. The default trigger value is 85% and reset value is 70%. The
status icon can be one of the following:
Yellow The disk usage is decreasing from the trigger value, but has not yet reached the reset value.
DB Capacity Usage
Grid Manager displays the current percentage of the database in use on the selected Grid member. It also describes
whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user
configurable. The default trigger value is 80% and reset value is 70%. For information, see Using the Capacity Report
on page 1348. The status icon can be one of the following:
Yellow The database capacity is decreasing from the trigger value, but has not yet reached the reset
value. When the capacity exceeds the trigger value, the icon changes from green to yellow.
LCD
The LCD status icon indicates its operational status.
Memory Usage
Grid Manager displays the current percentage of system memory in use on the selected Grid member. It also
describes whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user
configurable. The default trigger value is 90% and reset value is 80%. You can see more details about memory usage
through the CLI command: show memory. The status icon can be one of the following.
Yellow The memory usage is decreasing from the trigger value, but has not yet reached the reset
value.
Green The memory usage is either below the reset value or has not yet reached the trigger value.
Swap Usage
Grid Manager displays the current percentage of swap area in use on the selected Grid member. It also describes
whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user
configurable. The default trigger value is 20% and reset value is 10%. The status icon can be one of the following:
Yellow The memory usage is decreasing from the trigger value, but has not yet reached the reset
value.
Green The memory usage is either below the reset value or has not yet reached the trigger value.
FAN
The status icon indicates whether the fan is functioning properly. The corresponding description displays the fan
speed. The status icon and fan speed are displayed for Fan1, Fan2, and Fan3.
Note: vNIOS appliances on VMware do not monitor or report the fan speed.
Power Supply
The Infoblox-4010 has redundant power supplies. The power supply icon indicates the operational status of the
power supplies.
Red One power supply is not running. To find out which power supply failed, check the LEDs of the
power supplies.
NTP Synchronization
The status icon indicates the operational status of the current NTP synchronization status.
Yellow The NTP service is enabled, and the appliance is synchronizing its time.
Red The NTP service is enabled, but it is not running properly or is out of synchronization.
CPU Temperature
This icon is always green. The description reports the CPU temperature.
Note: vNIOS appliances on VMware do not monitor or report the CPU temperature.
System Temperature
This icon is always green. The description reports the system temperature.
Note: vNIOS appliances on VMware do not monitor or report the system temperature.
CPU Usage
Grid Manager displays the current percentage of the CPU usage on the selected Grid member. The maximum is 100%.
It also describes whether the CPU usage has exceeded the trigger or reset value. Note that the trigger and reset values
are user configurable. The default trigger value is 81% and reset value is 70%. You can see more details about CPU
usage through the CLI command: show CPU. The status icon can be one of the following:
RAID
For the Infoblox-4010, Grid Manager displays one of the following icons to indicate the status of each disk in the RAID
array. Next to the status icon is a summary that includes the disk number, the operational status of the disk, and the
disk type. Grid Manager also displays a RAID summary with an overall array status icon and the percentage at which
the array is currently operating.
Yellow A new disk has been inserted and the RAID array is rebuilding.
Red The RAID array or the disk is degraded. At least one disk in the array is not functioning properly.
Grid Manager lists the disks that are online. Replace only the disks that are offline.
In the event of a disk failure, you must replace the failed disk with one that is qualified and shipped from Infoblox
and has the same disk type as the rest of the disks in the array. The appliance displays information about mismatched
disks. Infoblox-4010 uses only the IB-Type 3 disk type. All disk drives in the array must have the same disk type for
the array to function properly. You can have either IB-Type 1, IB-Type 2, or IB-Type 3, but you cannot mix both in the
array. When you have a mismatched disk in the array, you must promptly replace the disk with a replacement disk
from Infoblox to avoid operational issues.
RAID Battery
The icon indicates the status of the disk controller backup battery on the Infoblox-4010.
Monitoring Services
The Grid or device status icon and the service icon indicates whether a service running on a member or an
independent appliance is functioning properly or not.
Service Status
After you enable any of the services—DHCP, DNS, TFTP, HTTP (for file distribution), FTP, NTP, bloxTools, Captive Portal,
Reporting, Discovery, Threat Protection and Cloud API—the appliance indicates their status as follows:
Yellow The service is enabled, but there may be some issues that require attention. For Threat
Protection, this could mean that one of the members is in monitor mode.
Red The service is enabled, but it is not running properly. (A red status icon can also appear
temporarily when a service is enabled and begins running, but the monitoring mechanism has
not yet notified Grid Manager.)
Gray The service is not configured or it is disabled.
Note: When you enable reporting service on the Grid and configure multi-site cluster, you can monitor the status of
all reporting members that you have configured. For information about reporting clusters, see Configuring
Indexer Cluster on page 1396
— Click the Edit icon to edit the member service configuration. Grid Manager displays the editor for the
corresponding service. For example, when you edit the DHCP service, Grid Manager displays the Member
DHCP Configuration editor.
— Click the Start icon to start the service.
— Click the Stop icon to stop the service.
Grid Manager updates the service status based on your action.
You can configure the appliance to back up rotated syslog files to external servers through FTP or SCP. When you do
so, the appliance forwards the rotated syslog files to the external servers that you configure. You can configure up to
10 external syslog backup servers each at the Grid and member levels. You can also override the Grid-level server
configuration at the member level. For information about configuring syslog backup servers, see Configuring Syslog
Backup Servers on page 1339.
This section includes the following topics:
• Specifying Syslog Servers on page 1335
• Configuring Syslog Backup Servers on page 1339
• Configuring Syslog for Grid Members on page 1339
• Setting DNS Logging Categories on page 1340
• Viewing the Syslog on page 1341
• Searching in the Syslog on page 1343
• Downloading the Audit Log on page 1346
— Node ID: Specify the host or node identification string that identifies the appliance from which syslog
messages are originated. This string appears in the header message of the syslog packet. Select one of
the following:
• LAN: Use the LAN1 IP address of the appliance. For an HA pair, this is the LAN1 address of the
active or passive node. This is the default.
• Host Name: Use the host name of the appliance in FQDN format.
• IP and Host Name: Use both the FQDN and the IP address of the appliance. The IP address can be
the LAN1 or MGMT IP address depending on whether the MGMT port has been configured. Note
that if the MGMT port is not configured, the LAN1 IP address is used. Table 37.1 on page 1338
provides more information about which IP address is used in the syslog configuration file when the
MGMT port has been configured.
• MGMT: Use the MGMT IP address, if the port has been configured. If the MGMT port is not
configured, the LAN1 IP address is used. This can be an IPv4 or IPv6 address.
— Port: Enter the destination port number. The default is 514 for TCP and UDP. For Secure TCP, the default
port is 6514.
— Severity: Choose a severity filter from the drop-down list. When you choose a severity level, the
appliance sends log messages with the selected level and the levels above it. The severity levels range
from the lowest, debug, to the highest, emerg. For example, if you choose debug, the appliance sends
all syslog messages to the server. If you choose err, the appliance sends messages with severity levels
err, crit, alert, and emerg.
• emerg: Panic or emergency conditions. The system may be unusable.
• alert: Alerts, such as NTP service failures, that require immediate actions.
• crit: Critical conditions, such as hardware failures.
• err: Error messages, such as client update failures and duplicate leases.
• warning: Warning messages, such as missing keepalive options in a server configuration.
• notice: Informational messages regarding routine system events, such as “starting BIND”.
• info: Informational messages, such as DHCPACK messages and discovery status.
• debug: Messages that contain information for debugging purposes, such as changes in the latency
timer settings and AD authentication failures for specific users.
— Logging Category: Select one of the following logging categories:
— Send all: Select this to log all syslog messages, irrespective of categories to which it belongs. When you
select this option, the appliance logs syslog messages for all the events, including all DNS and Infoblox
External DNS Security related events. However, the syslog messages are not prefixed when you select
this option.
— Send selected categories: Select this to configure logging categories from the list of available logging
categories. Use the arrows to move logging categories from the Available table to the Selected table
and vice versa. The appliance sends syslog messages for the categories that are in the Selected table.
When you select this option, you must add at least one logging category. The syslog messages are
prefixed with a category name to which it belongs. Also, the RPZ events logged in the syslog messages
uses specific prefixes for the selected categories. Note that the syslog messages are prefixed when you
set logging categories for at least one external syslog server, even if you set other external syslog
servers as Send All. For information about syslog prefixes, see Syslog Message Prefixes on page 1337.
Note: The syslog categories you specify here is different from that of logging categories specified in the Logging
tab in the Grid DNS Properties or Member DNS Properties editor. The external server preserves contents
of the selected categories even when selection is changed from Send all to Send selected categories and
vice versa.
— Copy Audit Log Messages to Syslog: Select this for the appliance to include audit log messages it sends to
the syslog server. This function can be helpful for monitoring administrative activities on multiple
appliances from a central location.
— Syslog Facility: This is enabled when you select Copy audit log messages to syslog. Select the facility
that determines the processes and daemons from which the log messages are generated.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note: When you set Send all in the Logging Category, the appliance logs syslog messages for all the events and they
are not prefixed. The syslog messages are prefixed even if one external syslog server is set with the Send
selected categories option.
Note: There is no prefix for RPZ syslog messages that does not belong to the DNS or ADP category.
• DHCP: All DHCP related messages use the following prefixes: dhcpd, omshell, dhcrelay, and dhclient.
Sample syslog message for dhcp:
Sep 4 09:23:44 10.34.6.28 dhcpd[20310]: DHCPACK on 70.1.20.250 to fc:5c:fc:5f:10:85 via
eth1 relay 10.120.20.66 lease-duration 600
• DTC: All DTC related messages use the following prefixes: idns_healthd and idnsd.
Sample syslog message for idns_healthd:
Sep 3 12:12:35 10.34.6.30 idns_healthd[1220]: resource health status [Monitor 'icmp'
(ICMP, port 0) checked server 's1' (IP 10.34.6.23), status: IPv4=ONLINE]
• Cloud: All cloud related messages use prefix cloud_api.
Sample syslog message for cloud_api:
Sep 4 10:53:30 10.34.6.32 cloud_api[5354]: [admin]: Login_Allowed - -
to=Serial\040Console apparently_via=Remote ip=10.120.20.66 auth=Local
group=.admin-group
• NTP: All NTP related messages use prefix ntpd.
Sample syslog message for NTP:
Sep 28 06:57:21 10.35.116.7 ntpd[12186]: precision = 0.053 usec
Table 37.1 IP address Used in Syslog Config File when MGMT Port is Configured
— Enable listening on UDP: Select this if the appliance uses UDP to receive messages from other devices.
Enter the number of the port through which the appliance receives syslog messages from other
devices.
— Proxy Access Control: Select one of the following to configure access control when receiving syslog
messages from specific syslog servers or routers:
— None: Select this if you do not want to configure syslog proxy. When you select this option, none of the
devices can send syslog messages to the appliance. This is selected by default.
— Named ACL: Select this and click Select Named ACL to select a named ACL that contains only IPv4
addresses and networks. This does not support TSIG key based ACEs. When you select this, the
appliance permits clients that have Allow permission in the named ACL to allow syslog messages from
specific syslog servers or routers. You can click Clear to remove the selected named ACL.
— Set of ACLs: Select this to configure individual access control entries (ACEs). Click the Add icon and
select one of the following from the drop-down list. Grid Manager adds a row to the table.
• IPv4 Address or IPv6 Address: Select this to add an IPv4 or IPv6 address entry. Click the Value field
and enter the address. The default permission is Allow, which means that the appliance allows
access to and from this device. You can change this to Deny to block access.
• IPv4 Network or IPv6 Network: Select this to add an IPv4 or Ipv6 network entry. Click the Value field
and enter the network. The default permission is Allow, which means that the appliance allows
syslog messages sent by this network. You can change this to Deny to block access.
• Any Address/Network: Select this to allow or deny access to all IPv4 and IPv6 addresses and
networks. The default permission is Allow, which means that the appliance allows syslog
messages sent by all addresses and networks. You can change this to Deny to block access.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to group and put into a named ACL. Click the Create new named ACL
icon and enter a name in the Convert to Named ACL dialog box.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an IPv4 network and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for
deletion.
4. Save the configuration and click Restart if it appears at the top of the screen.
1. From the Data Management tab, select the DNS tab, and then click Grid DNS Properties from the Toolbar.
or
From the Data Management tab, select the DNS tab -> Members tab -> Grid_member check box, and then click
the Edit icon.
2. In the Grid DNS Properties or Member DNS Properties editor, click Toggle Expert Mode if the editor is in the basic
mode, select the Logging tab, and then complete the following:
— Logging Facility: Select a facility from the drop-down list. This is the location on the syslog server to which
you want to sort the DNS logging messages.
— Logging Category: Select one or more of these log categories:
— general: Records the BIND messages that are not specifically classified.
— client: Enables the logging of messages related to query processing, but not the queries themselves.
Examples of messages include exceeding recursive client quota, and other errors related to recursive
clients, blacklist and NXDOMAIN interception, query name rewrite, and others.
— config: Records the configuration file parsing messages.
— database: Records BIND’s internal database processes.
— dnssec: Records the DNSSEC-signed responses.
— lame servers: Records bad delegation instances.
— network: Records the network operation messages.
— notify: Records the asynchronous zone change notification messages.
— queries: Records the DNS queries. Note that enabling the logging of queries and responses will
significantly affect system performance. Ensure that your system has sufficient CPU capacity before you
enable DNS query logging.
— rate-limit: Logs RRL (Response Rate Limiting) events. You must enable RRL in order for the appliance to
log RRL events to this logging category.
— resolver: Logs messages related to outgoing queries from the 'named' process, when it is acting as a
resolver on behalf of clients.
— responses: Records DNS responses. Note that enabling the logging of queries and responses will
significantly affect system performance. Ensure that your system has sufficient CPU capacity before you
enable DNS response logging.
— rpz: Records log messages when responses are modified through RPZs or for which explicit passthrus
were invoked in the RPZs. This check box is not selected by default.
— security: Logs miscellaneous messages that are related to security, such as denial or approval (mostly
denial) of certain operations.
— transfer-in: Records zone transfer messages from the remote name servers to the appliance.
— transfer-out: Records zone transfer messages from the NIOS appliance to remote name servers.
— update: Records the dynamic update instances.
— update-security: Records the security updates.
— DTC load balancing: Records information about which client is directed to which server.
— DTC health monitors: Records any changes to the health state of a monitored server.
3. Save the configuration and click Restart if it appears at the top of the screen.
— : The Action icon column is displayed only when you have installed the RPZ license. Click this to view
threat details in the RPZ Threat Details dialog box. For information, see Viewing the RPZ Threat Details on
page 1342.
— Timestamp: The date, time, and time zone of the log message. The time zone is the time zone configured on
the member.
— Facility: The location on the syslog server that determines the processes and daemons from which the log
messages are generated.
— Level: The severity of the message. This can be ALERT, CRITICAL, DEBUG, EMERGENCY, ERROR, INFO, NOTICE,
or WARNING.
— Server: The name of the server that logs this message, plus the process ID.
— Message: Detailed information about the task performed. For Cloud Network Automation, this contains
comma separated values of the admin, source, action, object, object type and message values. Note that
source is defined only if the cloud API request was proxied by the Cloud Platform Appliance. The format for
this field is proxied from:host,IP where host and IP are the host name and IP address of the proxy.
Note: If the selected member is an HA pair, Grid Manager displays the syslog in two tabs—Active and Passive.
Click the corresponding tab to view the syslog for each node.
Note: The RPZ Threat Details dialog box may display Unknown if threat is unknown or Unavailable if threat is
known and threat details are not available.
3. Click the Close icon to close the RPZ Threat Details dialog.
• To filter Microsoft synchronization related events, click Show Filter, select Server from the first drop-down list,
and select MS_Server from the drop-down list in the value field. This filter displays entries that begin with the
prefix ms. To view values that belong to a specific Microsoft server, you must specify either the name or IP
address of a given Microsoft server in the Message field. When you filter the syslog for a specific Grid member, it
displays the log entries of Microsoft servers that are assigned to the respective Grid member when the entries
are logged.
• Print the report or export it in CSV format.
• Bookmark the syslog page.
Note: If your browser has a pop-up blocker enabled, you must turn off the pop-up blocker or configure your
browser to allow pop-ups for downloading files.
Monitoring Tools
You can use the audit log, the replication status, the traffic capture tool, and the capacity report in a Grid or HA pair
to monitor administrative activities and capture traffic for diagnostic purposes. You can also use CLI commands to
monitor certain DNS transactions.
This section includes the following topics:
• Using the Audit Log
• Viewing the Replication Status on page 1346
• Using the Traffic Capture Tool on page 1347
• Using the Capacity Report on page 1348
• Participating in the Customer Experience Improvement Program on page 1349
• Monitoring DNS Transactions on page 1350
• Viewing DNS Alert Indicator Status on page 1352
• Configuring DNS Alert Thresholds on page 1352
In addition, if Grid members manage Microsoft servers, Grid Manager creates a synchronization log file for each
managed Microsoft server. For information, see Viewing Synchronization Logs on page 1281.
2. In the Grid Properties editor, select the Security tab, and then select Enable Audit Log Rolling.
Note: The admin user displayed as $admin group name$ represents an internal user. You can create a admin
filter with “matches expression” equals ^[^$] to filter out internal users.
— Action: The action performed. This can be CALLED, CREATED, DELETED, LOGIN_ALLOWED, LOGIN_DENINED,
MESSAGE, and MODIFIED.
— Object Type: The object type of the object involved in this task. This field is not displayed by default. You
can select this for display.
— Object Name: The name of the object involved in this task.
— Execution Status: The execution status of the task. Possible values are Executed, Normal, Pending Approval
and Scheduled.
— Message: Detailed information about the performed task.
You can also do the following in the log viewer:
• Toggle between the single line view and the multi-line view for display.
• Navigate to the next or last page of the file using the paging buttons.
• Refresh the audit log view.
• Click the Follow icon to have the appliance automatically refresh the log every five seconds.
• Download the log.
• Clear the contents of the audit log.
• Use filters and the Go To function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Export or print the content of the log.
Note: If your browser has a pop-up blocker enabled, you must turn off the pop-up blocker or configure your
browser to allow pop-ups for downloading files.
• DHCP, DNS, TFTP, HTTP,FTP, NTP, bloxTools, Captive Portal, DNS Accelerator Usage, Discovery, Reporting: The
current status of the service. The status can be one of the following:
— Green: The service is enabled and running properly.
— Yellow: The service is enabled, but there may be some issues that require attention.
— Red: The service is enabled, but it is not running properly. A red status icon can also appear temporarily
when a service is enabled and begins running, but the monitoring mechanism has not yet notified the
Infoblox GUI.
— Gray: The service is not configured or it is disabled.
• Hardware Type: The hardware type of the appliance, such as IB-1400.
• Serial Number: The serial number of the appliance.
• DB Utilization: The percentage of the database that is currently in use.
• Comment: Information about the appliance.
• Site: The location to which the member belongs. This is one of the predefined extensible attributes.
• HA: Indicates whether the member is an HA pair. If the member is an HA pair, Grid Manager displays the status
of the HA pair.
• Hardware Model: The hardware model of the appliance.
You can do the following:
• Use filters and the Go To function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters on page 77.
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables on page 70.
• Edit the properties of a member.
— Click the check box beside a member, and then click the Edit icon.
• Delete a member.
— Click the check box beside a member, and then click the Delete icon.
• Export or print the list.
Note: This feature captures traffic of all the direct responses received from the cache accelerator on the IB-4030.
This section explains the process of capturing traffic, and how to download the traffic capture file to your
management system. After that, you can extract the traffic capture file and view it with a third-party traffic analyzer
application. The traffic capture file is shared between NIOS admin users.
Note: The NIOS appliance always saves a traffic capture file as tcpdumpLog.tar.gz. If you want to download multiple
traffic capture files to the same location, rename each downloaded file before downloading the next.
— Member: Grid Manager displays the selected member on which you want to capture traffic. If no member is
displayed or if you want to specify a different member, click Select. When there are multiple members, Grid
Manager displays the Member Selector dialog box from which you can select one. You cannot capture
traffic on an offline member.
— Interface: Select the port on which you want to capture traffic. Note that if you enabled the LAN2 failover
feature, the LAN and LAN2 ports generate the same output. (For information about the LAN2 failover
feature, see About Port Redundancy on page 457.)
— LAN: Select this to capture all the traffic the LAN port receives and transmits.
— MGMT: Select this to capture all the traffic the MGMT port receives and transmits.
— LAN2: Select to capture all the traffic the LAN2 port (if enabled) receives and transmits.
— All: Select this to capture the traffic addressed to all ports. Note that the NIOS appliance only captures
traffic that is addressed to it.
— LANx nnnn: If you have configured VLANs on the LAN1 or LAN2 port, the appliance displays the VLANs
in the format LANx nnnn, where x represents the port number and nnnn represents the associated
VLAN ID.
Note: Riverbed virtual appliances support capturing traffic only on the LAN port.
— Seconds to run: Specify the number of seconds you want the traffic capture tool to run.
3. Capture Control: Click the Start icon to start the capture. A warning message appears indicating that this report
will overwrite the existing file. Click Yes. You can click the Stop icon to stop the capture after you start it.
4. Uncompressed Capture File Size: Click Download to download the captured traffic after the capture stops and
then save the file. You can rename the file if you want. You cannot download the traffic report when the tool is
running. Grid Manager updates the size of the report when the capture tool is running.
5. Use terminal window commands (Linux) or a software application (such as StuffIt™ or WinZip™) to extract the
contents of the .tar.gz file.
6. When you see the traffic.cap file in the directory where you extract the .tar.gz file, open it with a third-party
network protocol analyzer application.
The capacity report filters object types you can manage through the appliance. You can configure the object types you
want to see in the following table by completing the following in the Minimum Object Total filter:
• Minimum Object Total: Enter the minimum number of objects within an object type of which Grid Manager
displays. In the Object Type table, Grid Manager displays only the object types that contain at least the specified
number of objects you enter in this field.
The capacity report displays the following information:
• Object Type: The type of objects. For example, DHCP Lease, Admin Group, or PTR Record. For objects that are
only used for internal system operations, the report groups and shows them under Other.
• Total: The total number of objects for the specific object type.
You can print the object type information or export it to a CSV file.
Infoblox
TXID
DNS Server
65534 Port 10024 UDP
UDP Port 53 (Random Port) Port 53
Authoritative
Client
Port 10024 DNS Server
Both invalid ports and invalid TXIDs could be indicators of DNS cache poisoning, although a small number of them
is considered normal in situations where valid DNS responses arrive after the DNS queries have timed out. You can
configure the appliance to track these indicators, and you can view their status. You can also configure thresholds for
them. When the number of invalid ports or invalid TXIDs exceeds the thresholds, the appliance logs an event in the
syslog file and sends an SNMP trap and e-mail notification, if you enable them. You can then configure rate limiting
rules to limit incoming traffic or completely block connections from primary sources that send the invalid DNS
responses.
Rate limiting is a token bucket system that accepts packets from a source based on the rate limit. You can configure
the number of packets per minute that the Infoblox DNS server accepts from a specified source. You can also
configure the number of packets for burst traffic, which is the maximum number of packets that the token bucket can
accept. Once the bucket reaches the limit for burst traffic, it discards the packets and starts receiving new packets
according to the rate limit.
The appliance monitors only UDP traffic from remote port 53 for the following reasons:
• The attacks that the appliance monitors do not happen over TCP.
• DNS responses are sent only from port 53. The appliance discards DNS responses that are sent from other
ports.
To monitor invalid ports and invalid TXIDs on the Infoblox DNS server, follow these procedures:
1. Enable DNS network monitoring and DNS alert monitoring. For information, see Enabling and Disabling DNS Alert
Monitoring on page 1351.
2. Configure the thresholds for DNS alert indicators. For information, see Configuring DNS Alert Thresholds on page
1352.
3. Enable SNMP traps and e-mail notifications. For information, see Configuring SNMP on page 1365.
4. Review the DNS alert status. For information, see Viewing DNS Alert Indicator Status on page 1352.
5. Identify the source of the attack by reviewing the DNS alert status, syslog file, and SNMP traps. For information
on SNMP traps for DNS alerts, see Threshold Crossing Traps on page 1405.
To mitigate cache poisoning, you can limit incoming traffic or completely block connections from specific sources, as
follows:
• Enable rate limiting on the DNS server. For information, see Enabling and Disabling Rate Limiting from External
Sources on page 1353.
• Configure rate limit traffic rules from specific sources. For information, see Configuring Rate Limiting Rules on
page 1354.
You can verify the rate limiting rules after you configure them. For information, see Viewing Rate Limiting Rules on
page 1354.
Note: When you restart DNS network monitoring, you also reset the SNMP counters for DNS alerts.
You can then view the alert status to identify the primary source of invalid DNS responses. For information, see
Viewing DNS Alert Indicator Status on page 1352.
Note: Ensure that you enable SNMP traps and e-mail notifications. For information, see Configuring SNMP on page
1365.
You can configure thresholds for both invalid ports and invalid TXIDs. The default thresholds for both invalid ports
and TXIDs are 50%. When the number of invalid ports or invalid TXIDs exceeds the thresholds, the appliance logs the
event and sends SNMP traps and notifications. You can configure the thresholds either as absolute packet counts or
as percentages of the total traffic during a one minute time interval.
To configure DNS alert thresholds:
1. Log in to the Infoblox CLI as a superuser account.
2. Enter the following CLI command:
set monitor dns alert modify port | txid over threshold_value packets | percent
where
port | txid = Enter port to set the threshold for invalid ports, or enter txid to set the threshold for invalid
TXIDs.
threshold_value = Enter the number of packets or percentage for the threshold.
packets | percent = Enter packets if you want to track the total packet count, or enter percentage if you
want to track a percentage of the total traffic. For a percentage-based threshold, the appliance does not
generate a threshold crossing event if the traffic level is less than 100 packets per minute.
For example, if you want the appliance to send a DNS alert when the percentage of DNS responses arriving on invalid
ports from UDP port 53 exceeds 70% per minute, you can enter the following command:
set monitor dns alert modify port over 70 percent
If you want the appliance to send a DNS alert when the total number of packets with invalid TXIDs from UDP port 53
is over 100 packets per minute, you can enter the following command:
set monitor dns alert modify txid over 100 packets
When there is a DNS alert, the appliance logs an event in the syslog file and sends an SNMP trap and e-mail
notification if enabled.
Note: When you enable rate limiting, the appliance discards packets based on the configured rate limiting rules.
This might affect the DNS performance when the appliance discards valid DNS responses.
Note: If you have enabled firewall, and if the corresponding firewall rules or policies are set to modify options 55 and
60 of the remote DHCP client to mask the identity of the client, then NIOS fingerprinting will not be able to
fingerprint the clients.
Note: When you upgrade to NIOS 6.7 and later, DHCP fingerprint detection is disabled during the upgrade. You must
enable it if you want the appliance to use DHCP fingerprint detection. For information, see Enabling and
Disabling DHCP Fingerprint Detection on page 1360.
You can configure custom DHCP fingerprints for devices whose DHCP fingerprints are not captured in the standard
DHCP fingerprints. For information about how to add custom DHCP fingerprints, see Adding New DHCP Fingerprints
on page 1361.
Both standard and custom DHCP fingerprints are cached in memory for matching purposes. Depending on the
information provided in a DHCP fingerprint, the appliance first matches the option number sequence sent in the DHCP
REQUEST message. If option 55 is not included in the request or if there is no match from the cached DHCP
fingerprints, the appliance then tries to match the vendor ID in option 60. When there is an option number sequence
match, the appliance displays the name of the DHCP fingerprint in Grid Manager. If there is no option number
sequence match but there is a vendor ID match, the appliance displays the vendor ID. For information about how to
view fingerprint information, see Viewing DHCP Fingerprint Information on page 1362.
You can also create IPv4 and IPv6 DHCP fingerprint filters and then apply them as class filters to specific IPv4 and
IPv6 DHCP ranges and range templates. For information about how to configure and use DHCP fingerprint filters, see
About DHCP Fingerprint Filters on page 1202.
Administrative Permissions
DHCP fingerprint detection is enabled by default for new installations. For upgrades, you must enable this feature
after the upgrade is completed. For information, see Enabling and Disabling DHCP Fingerprint Detection. No special
licenses are required for this feature.
Superusers can add, modify, and delete DHCP fingerprints and DHCP fingerprint filters. Limited-access users with
Read/Write permission to DHCP fingerprints can add, modify, and delete DHCP fingerprints while those who have
Read-only permission can only view information in the Data Management tab -> DHCP tab -> Fingerprints tab. For
information about administrative permissions, see About Administrative Permissions on page 195.
Note: The appliance periodically updates the cached DHCP fingerprints. When you add, modify, or delete a DHCP
fingerprint, you do not need to restart services but it may take up to two minutes before the appliance updates
the DHCP fingerprint.
Understanding SNMP
You can use SNMP (Simple Network Management Protocol) to manage network devices and monitor their processes.
An SNMP-managed device, such as a NIOS appliance, has an SNMP agent that collects data and stores them as
objects in MIBs (Management Information Bases). The SNMP agent can also send traps (or notifications) to alert you
when certain events occur within the appliance or on the network. You can view data in the SNMP MIBs and receive
SNMP traps on a management system running an SNMP management application, such as HP OpenView, IBM Tivoli
NetView, or any of the freely available or commercial SNMP management applications on the Internet.
Traps
NIOS Appliance
MIB Agent
The NIOS appliance supports SNMPv1, SNMPv2, and SNMPv3. It also adheres to the following RFCs:
• RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management
Frameworks
• RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
• RFC 3413, Simple Network Management Protocol (SNMP) Applications
• RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMP)
• RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)
• RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
• RFC 1155, Structure and identification of Management information for TCP/IP-based internets
• RFC 1213, Management Information Base for Network Management of TCP/IP-based internets:MIB-II
• RFC 2578, Structure of Management Information Version 2 (SMIv2)
Configuring SNMP
Note: SNMP operation is not supported across the NIOS appliance’s LAN2 interface.
You can configure the appliance to receive SNMP queries from specific management systems and send SNMP traps
to specific trap receivers. SNMP operation supports both IPv4 and IPv6 networks. The appliance supports SNMPv1,
SNMPv2, and SNMPv3. You can set up either SNMPv1/SNMPv2 or SNMPv3, or all of them for the Grid. You can also
override the Grid settings at a member level.
To configure SNMPv1 and SNMPv2 on the appliance, do the following:
• Enable the NIOS appliance to accept queries, as described in Accepting Queries on page 1367.
• Specify the management systems to which the appliance sends traps, as described in Adding Trap Receivers on
page 1368.
• Specify system information using managed objects in MIB-II, the standard MIB defined in RFC 1213. For
information, see Setting SNMP System Information on page 1368.
Note: If an SNMPv3 user is configured to send SNMP queries, you cannot delete the user.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes on page 427.
4. Save the configuration.
Accepting Queries
You can allow specific management systems to send SNMP queries to a NIOS appliance. For SNMPv1 and SNMPv2,
you must specify a community string. The appliance accepts queries only from management systems that provide the
correct community string. You can also specify SNMPv3 users to send queries. For information about configuring
SNMPv3 users, see Configuring SNMPv3 Users on page 1366.
To configure an appliance to accept SNMP queries:
1. Grid: From the Grid tab, select the Grid Manager tab, and then select Grid Properties -> Edit from the Toolbar.
Member: From the Grid tab, select the Grid Manager -> Members tab -> member, and then click the Edit icon.
2. In the Grid Properties or Grid Member Properties editor, select the SNMP tab. To override Grid settings, click
Override in the Grid Member Properties editor.
3. Complete the following in the SNMP section.
— Enable SNMPv1/SNMPv2 Queries: Select this to accept SNMPv1 and SNMPv2 queries from management
systems.
— Community String: Enter a text string that the management system must send together with its queries
to the appliance. A community string is similar to a password in that the appliance accepts queries only
from management systems that send the correct community string. Note that this community string
must match exactly what you enter in the management system.
— Engine ID: Displays the engine ID of the appliance that manages the SNMP agent. The management system
needs this ID to send traps to the appliance. If the appliance is an HA pair, this field displays the engine IDs
for both the active and passive nodes.
— Enable SNMPv3 Queries: Select this to enable queries from SNMPv3 management systems. Click the Add
icon to add SNMPv3 users that you have configured on the appliance. In the SNMPv3 User Selector dialog
box, click the SNMPv3 user you want to add. The appliance displays the selected SNMPv3 users in the
table. You can add comments in the table. You can also select an SNMPv3 user and click the Delete icon to
remove it from the table. Note that a disabled SNMPv3 user cannot send queries to the appliance.
4. Save the configuration.
3. Complete the following in the SNMP tab. For an HA member, click Override Node 2 settings to enter information
for node 2 of the HA pair.
— sysContact: Enter the name of the contact person for the appliance.
— sysLocation: Enter the physical location of the appliance.
— sysName: Enter the fully qualified domain name of the appliance.
— sysDescr: Enter useful information about the appliance, such as the software version it is running.
4. Save the configuration and click Restart if it appears at the top of the screen.
recursive client limit at 50, Trigger value at 71%, and Reset value at 70%, the value for simultaneous
recursive client queries is calculated at 50 x .71 = 35 (integer math truncation) and 50 x .70 = 35. This
could result in the appliance sending trigger and reset traps for the same value of simultaneous recursive
client queries.
— Root File System: The percentage of the root file system ("/") that is currently in use. The default Trigger
value is 85%, and the default Reset value is 70%.
— Swap Usage: The percentage of the swap area that is currently in use. The factory default Trigger value is
20% and the factory default Reset value is 10%. The swap usage threshold varies based on the appliance
models. The Infoblox GUI displays zero for both the Trigger and Reset values indicating the optimized usage
of platform specific default values. The swap usage threshold is set to 50% for 2 GB appliances and 20%
for all other appliances. For information about available memory on each appliance model, see Table 39.1.
— Reporting: The number of reports created on the system that can trigger an SNMP trap. The default Trigger
value is 85, and the default Reset value is 70. Note that the maximum number of reports supported per Grid
is 300. This field is displayed only when you have configured a reporting server.
— Reporting Volume: The percentage of data transmissions to the reporting server. The default Trigger value is
80%, and the default Reset value is 71%. This field is displayed only when you have configured a reporting
server.
— Threat Protection Dropped Traffic: The percentage of packets dropped based on the threat protection rule
configuration. The default Trigger value is 90%, and the default Reset value is 70%. This field is displayed
only when Threat Protection licenses are installed on the appliance. When the percentage of Threat
Protection dropped traffic exceeds the Trigger value or drops below the Reset value, the appliance sends an
SNMP trap and an email notification—if configured to do so. For information about setting SNMP traps and
email notifications, see Setting SNMP and Email Notifications on page 1371.
— Threat Protection Total Traffic: The percentage of total traffic received (dropped and passed packets) on the
external interfaces. The default Trigger value is 90%, and the default Reset value is 70%. This field is
displayed only when Threat Protection licenses are installed on the appliance. When the percentage of total
Threat Protection traffic exceeds the Trigger value or drops below the Reset value, the appliance sends an
SNMP trap and an email notification—if configured to do so. For information about setting SNMP traps and
email notifications, see Setting SNMP and Email Notifications on page 1371.
If you have installed Threat Protection licenses on the appliance and are using the Infoblox External DNS
Security feature, Grid Manager displays the following for Trigger events per second and Reset events per
second:
— Alert Rate: The number of SNMP traps sent per second when the appliance sends alerts while passing
packets based on threat protection rule configuration. The default Trigger value is 1 and the default Reset
value is 0.
— Drop Rate: The number of SNMP traps sent per second when the appliance drops packets based on the
threat protection rule configuration. The default Trigger value is 1 and the default Reset value is 0.
If you have installed an RPZ license on the NIOS appliance, you can configure the thresholds to monitor the RPZ
hit rate in the Response Policy Zones Hit Rate Configuration section. For information, see Configuring
Thresholds for RPZ Hit Rate on page 1713.
4. Save the configuration and click Restart if it appears at the top of the screen.
The following table lists available Infoblox appliance models and their available memory:
— Enable All Email Notifications: Select this check box if you want the appliance to send email notifications
(traps) for all events to the configured email recipients. This is deselected by default. To send email
notifications for specific events to the configured email recipients, select the check box for each respective
event type. For more information, see Selecting SNMP and Email Notification Types on page 1372.
For information on enabling email notifications and specifying recipients, see Notifying Administrators on
page 232.
— Alternatively, you can select specific event types from the table, and specify whether you want the
appliance to send SNMP Notifications and Email notifications for each type of event.
4. Save the configuration and click Restart if it appears at the top of the screen.
(.1.3.6)
U.S. Department of Defense (DOD)
(.1.3.6.1)
Internet
(.1.3.6.1.4)
Private
(.1.3.6.1.4.1)
Enterprise
(.1.3.6.1.4.1.7779.3)
Infoblox SNMP Tree
(.1.3.6.1.4.1.7779.3.1)
ibProduct
(.1.3.6.1.4.1.7779.3.1.1)
ibOne
MIB Objects
The Infoblox MIB objects were implemented according to the guidelines in RFCs 1155 and 2578. They specify two
types of macros for defining MIB objects: OBJECT-TYPE and NOTIFICATION-TYPE. These macros contain clauses that
describe the characteristics of an object, such as its syntax and its status. OBJECT-TYPE macros describe MIB objects,
and NOTIFICATION-TYPE macros describe objects used in SNMP traps.
Each object in the ibPlatformOne, ibDNSone, and ibDHCPOne MIBs contains the following clauses from the
OBJECT-TYPE macro:
• OBJECT-TYPE: Provides the administratively-assigned name of the object.
• SYNTAX: Identifies the data structure of the object, such as integers, counters, and octet strings.
• MAX-ACCESS: Identifies the type of access that a management station has to the object. All Infoblox MIB objects
provide read-only access.
• STATUS: Identifies the status of the object. Values are current, obsolete, and deprecated.
• DESCRIPTION: Provides a textual description of the object.
• INDEX or AUGMENTS: An object that represents a conceptual row must have either an INDEX or AUGMENTS
clause that defines a key for selecting a row in a table.
• OID: The dotted decimal object identifier that defines the location of the object in the universal MIB tree.
The ibTrap MIB defines the SNMP traps that a NIOS appliance can send. Each object in the ibTrap MIB contains the
following clauses from the NOTIFICATION-TYPE macro:
• NOTIFICATION-TYPE: Provides the administratively-assigned name of the object.
• OBJECTS: Provides an ordered list of MIB objects that are in the trap.
• STATUS: Identifies the status of the object. Values are current, obsolete, and deprecated.
• DESCRIPTION: Provides the notification information.
OBJECT-TYPE sysObjectID
SYNTAX Object Identifier
MAX-ACCESS read-only
STATUS current
DESCRIPTION "The vendor's authoritative identification of the network management
subsystem contained in the entity. This value is allocated within the SMI
enterprises subtree (1.3.6.1.4.1) and provides an easy and unambiguous
means for determining `what kind of box' is being managed. For example, if
vendor `Flintstones,Inc.' was assigned the subtree 1.3.6.1.4.1.424242, it could
assign the identifier 1.3.6.1.4.1.424242.1.1 to its `Fred Router'.”
Table 39.3 lists the enterprise IDs and their corresponding Infoblox hardware platforms that an SNMP query can
return when you request the sysObjectID value. Note that the IDs shown in the table do not include
1.3.6.1.4.1.7779.1. (the infobloxProducts prefix).
ID Description Definition
1000 ibDefault Default environments, such as chroot
1001 ibRsp2 vNIOS appliances on Riverbed Services Platforms
1002 ibCisco Cisco servers
1003 ibvm vNIOS appliances on VMware ESX or ESXi servers
1004 ibvnios Virtual NIOS
1031 ib4030 Infoblox-4030 appliances
1032 ib4030 Infoblox-4030 appliances
1401 ib810 Trinzic 810 appliances
1402 ib820 Trinzic 820 appliances
1403 ib1410 Trinzic 1410 appliances
1404 ib1420 Trinzic 1420 appliances
1405 ib1400 Trinzic Reporting 1400 appliances
1406 ib800 Trinzic Reporting 800 appliances
1411 ib2200 Trinzic Reporting 2200 appliances
1412 ib2210 Trinzic 2210 appliances
1413 ib2220 Trinzic 2220 appliances
1421 ib4010 Infoblox-4010 appliances
1422 ib4030 Infoblox-4030 appliances
1423 ib4000 Infoblox-4000 appliances
1407 pt1400 Infoblox Advanced 1400 appliances
1414 pt2200 Infoblox Advanced 2200 appliances
1424 pt4000 Infoblox Advanced 4000 appliances
Infoblox MIBs
You can configure a NIOS appliance as an SNMP-managed device so that an SNMP management station can send
queries to the appliance and retrieve information from its MIBs. Perform the following tasks to access the Infoblox
MIBs:
1. Configure a NIOS appliance to accept queries, as described in Configuring SNMPv3 Users on page 1366.
2. Load the MIB files onto the management system. To obtain the latest Infoblox MIB files:
a. From the Data Management tab, select the Grid tab -> Grid Manager tab, and then select Download -> SNMP
MIBs from the Toolbar.
b. In the Save As dialog box, navigate to a directory to which you want to save the MIBs.
c. Click Save.
3. Use a MIB browser or SNMP management application to query the objects in each MIB.
The NIOS appliance allows read-only access to the MIBs. This is equivalent to the Get and Get Next operations in
SNMP.
NET-SNMP MIBs
NIOS appliances support NET-SNMP (formerly UCD-SNMP), a collection of applications used to implement the SNMP
protocol. The NET-SNMP MIBs provide the top-level infrastructure for the SNMP MIB tree. They define, among other
things, the objects in the SNMP traps that the agent sends when the SNMP engine starts and stops. For information
about NET-SNMP and the MIB files distributed with NET-SNMP, refer to http://net-snmp.sourceforge.net/.
For SNMP traps to function properly, you must download the following NET-SNMP MIBs directly from
http://net-snmp.sourceforge.net/docs/mibs/:
• NET-SNMP-MIB
• UCD-SNMP-MIB
Note: Ensure that you save the MIBs as text files in the directory to which you save all the other MIB files.
BGP4 MIB
Infoblox supports BGP4 (Border Gateway Protocol) for DNS anycast addressing. BGP is configured to send SNMP traps
to neighboring routers, as defined in RFC4273 Definitions of Managed Objects for BGP-4. You must enable and
configure the SNMP trap receiver on the Grid member for the member to send SNMP traps. For information, see SNMP
MIB Hierarchy on page 1376.
The BGP protocol service is configured to send SNMP queries about BGP runtime data. The information is returned
using the following OIDs and definitions:
OID Definition
1.3.6.1.2.1.15.900.1.1 Number of peers
1.3.6.1.2.1.15.900.1.2 Number of active peers
1.3.6.1.2.1.15.900.1.3 Number of AS path entries
1.3.6.1.2.1.15.900.1.4 Number of BGP community entries
1.3.6.1.2.1.15.900.1.5 Total number of prefixes
For each configured BGP peer (a, b, c, d), the information is returned using the following OIDs and definitions:
OID Definition
1.3.6.1.2.1.15.900.1.9.a.b.c.d.1 IP address: same as a.b.c.d
1.3.6.1.2.1.15.900.1.9.a.b.c.d.2 State: 0=down, 1=up
1.3.6.1.2.1.15.900.1.9.a.b.c.d.3 ASN
1.3.6.1.2.1.15.900.1.9.a.b.c.d.4 Prefixes
1.3.6.1.2.1.15.900.1.9.a.b.c.d.5 Up/Down time
ibTrap MIB
NIOS appliances send SNMP traps when events, internal process failures, or critical service failures occur. The ibTrap
MIB defines the types of traps that a NIOS appliance sends and the value that each MIB object represents. The
Infoblox SNMP traps report objects which the ibTrap MIB defines. Figure 39.3 illustrates the ibTrap MIB structure. It
provides the OID and textual description for each object.
Note: OIDs shown in the illustrations and tables in this section do not include the prefix .1.3.6.1.4.1.7779.
The ibTrap MIB comprises two trees, ibTrapOneModule and ibNotificationVarBind. The ibTraponeModule tree
contains objects for the types of traps that a NIOS appliance sends. The ibNotificationVarBind tree contains objects
that the Infoblox SNMP traps report. You cannot send queries for the objects in this MIB module. The objects are used
only in the SNMP traps.
(3.1.1.1.1) (3.1.1.1.2)
ibTrapOneModule ibNotificationVarBind
(3.1.1.1.1.1) (3.1.1.1.2.1.0)
ibEquipmentFailureTrap ibNodeName
(3.1.1.1.2.2.0)
(3.1.1.1.1.2) ibTrapSeverity
ibProcessingFailureTrap
(3.1.1.1.2.3.0)
ibObjectName
(3.1.1.1.1.3)
ibThresholdCrossingEvent (3.1.1.1.2.4.0)
ibProbableCause
(3.1.1.1.1.4) (3.1.1.1.2.5.0)
ibStateChangeEvent ibSubsystemName
(3.1.1.1.2.6.0)
(3.1.1.1.1.5) ibCurThresholdValue
ibProcStartStopTrap
(3.1.1.1.2.7.0)
ibThresholdHigh
(3.1.1.1.1.6)
ibRevokedLicenseTrap (3.1.1.1.2.8.0)
ibThresholdLow
(3.1.1.1.1.7)
ibOperationTrap (3.1.1.1.2.9.0)
ibPreviousState
(3.1.1.1.2.10.0)
ibCurrentState
(3.1.1.1.2.11.0)
ibTrapDesc
3.1.1.1.1.1 Equipment ibEquipmentFailureTrap The NIOS appliance generates this trap when a
Failure hardware failure occurs. This trap includes the
following objects:
• ibNodeName
• ibTrapSevertiy
• ibObjectName (equipment name)
• ibProbableCause
• ibTrapDesc
For a list of trap descriptions, see Equipment
Failure Traps on page 1397.
3.1.1.1.1.2 Processing and ibProcessingFailureTrap The NIOS appliance generates this trap when a
Software failure occurs in one of the software processes. This
Failure trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibSubsystemName
• ibProbableCause
• ibTrapDesc
For a list of trap descriptions, see Processing and
Software Failure Traps on page 1398.
3.1.1.1.1.3 Threshold ibThresholdCrossingEvent The NIOS appliance generates this trap when any of
Crossing the following events occur:
• System memory or disk usage exceeds 90%.
• CPU usage exceeds the trigger value for 15
seconds.
• A problem occurs when the Grid Master
replicates its database to its Grid members.
• DHCP address usage crosses a watermark
threshold. For more information about tracking
IP address usage, see Threshold Crossing
Traps on page 1405.
• The number or percentage of the DNS security
alerts exceeds the thresholds of the DNS
security alert triggers.
This trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibObjectName (threshold name)
• ibCurThresholdvalue
• ibThresholdHigh
• ibThresholdLow
• ibTrapDesc
For a list of trap descriptions, see Threshold
Crossing Traps on page 1405.
3.1.1.1.1.4 Object State ibStateChangeEvent The NIOS appliance generates this trap when there
Change is a change in its state, such as:
• The link to one of the configured ports goes
down, and then goes back up again.
• A failover occurs in an HA (high availability)
pair configuration.
• A member connects to the Grid Master.
• An appliance in a Grid goes offline.
This trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibObjectName
• ibPreviousState
• ibCurrentState
• ibTrapDesc
For a list of possible trap descriptions, see Object
State Change Traps on page 1414.
3.1.1.1.1.5 Process Started ibProcStartStopTrap The NIOS appliance generates this type of trap
and Stopped when any of the following events occur:
• When you enable HTTP redirection.
• When you change the HTTP access setting.
• When you change the HTTP session time out
setting.
• When a failover occurs in an HA pair
configuration.
This trap includes the following objects:
• ibNodeName
• ibSubsystemName
• ibTrapDesc
For a list of possible trap descriptions, see Process
Started and Stopped Traps on page 1418.
3.1.1.1.1.6 ibRevokedLicenseTrap The NIOS appliance generates this trap when a
license is revoked.
This trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibSubsystemName
• ibTrapDesc
3.1.1.1.1.7 ibOperationTrap The NIOS appliance generates this trap when a
software operation is noteworthy.
This trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibSubsystemName
• ibProbableCause
• ibTrapDesc
Note: The OIDs shown in the following table do not include the prefix “.1.3.6.1.4.1.7779.”.
MIB Object
OID Description
(Type)
3.1.1.1.2.1.0 ibNodeName The IP address of the appliance on which the trap occurs. This may or
(DisplayString) may not be the same as the appliance that sends the trap. This object
is used in all types of traps.
MIB Object
OID Description
(Type)
3.1.1.1.2.2.0 ibTrapSeverity The severity of the trap. There are five levels of severity. See Trap
(Integer) Severity (OID 3.1.1.1.2.2.0) on page 1386 for details.
3.1.1.1.2.3.0 ibObjectName The name of the object for which the trap was generated. This is used
(DisplayString) in the Equipment Failure traps, Threshold Crossing Event traps, and
the Object State Change traps. The following shows what this object
represents depending on the type of traps:
• Equipment Failure traps: The equipment name.
• Threshold Crossing Event traps: The object name of the trap.
• State Change traps: The object that changes state.
3.1.1.1.2.4.0 ibProbableCause The probable cause of the trap. See ibProbableCause Values on page
(Integer) 1386 for the definitions of each value.
3.1.1.1.2.5.0 ibSubsystemName The subsystem for which the trap was generated, such as NTP or
(DisplayString) SNMP. This object is used in the Processing and Software Failure traps
and the Process Start and Stop traps. See ibSubsystemName Values
(OID 3.1.1.1.2.5.0) on page 1391 for definitions.
3.1.1.1.2.6.0 ibCurThresholdValue The current value of the threshold counter. This object is used in the
(Integer) Threshold Crossing traps.
3.1.1.1.2.7.0 ibThresholdHigh This object is used in Threshold Crossing traps. For CPU usage, this is
(Integer) the trigger value of the SNMP trap. For DHCP address usage, this is the
value of the high watermark. This only applies when the appliance
sends a trap to indicate that DHCP address usage is above the
configured high watermark value for a DHCP address range. For more
information, see Threshold Crossing Traps on page 1405.
3.1.1.1.2.8.0 ibThresholdLow This object is used in Threshold Crossing traps. For CPU usage, this is
(Integer) the reset value of the SNMP trap. For DHCP address usage, this is the
value for the low watermark. This only applies when the appliance
sends a trap to indicate that DHCP address usage went below the
configured low watermark value for a DHCP address range. For more
information, see Threshold Crossing Traps on page 1405.
3.1.1.1.2.9.0 ibPreviousState The previous state of the appliance. This object is used in the Object
(Integer) State Change traps. See ibPreviousState (OID 3.1.1.1.2.9.0) and
ibCurrentState (OID 3.1.1.1.2.10.0) on page 1393 for definitions of
each value.
3.1.1.1.2.10.0 ibCurrentState The current state of the appliance. This object is used in the Object
(Integer) State Change traps. See ibPreviousState (OID 3.1.1.1.2.9.0) and
ibCurrentState (OID 3.1.1.1.2.10.0) on page 1393 for the definition
of each value.
3.1.1.1.2.11.0 ibTrapDesc The description of the trap. This object is used in all types of traps.
(DisplayString) See ibTrapDesc (OID 3.1.1.1.2.11.0) on page 1396 for the
description, possible cause, and recommended actions for each
Infoblox SNMP trap.
Value Description
1 Undetermined
2 Informational: Event that requires no further action.
3 Minor: Event that does not require user intervention.
4 Major: Event that requires user intervention and assistance from Infoblox
Technical Support.
5 Critical: Problem that affects services and system operations, and requires
assistance from Infoblox Technical Support.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
0 ibClear SNMP Trap is cleared.
1 ibUnknown An unknown failure has occurred.
2 ibPrimaryDiskFailure Primary drive is full.
3 ibFanFailure-old Unused.
4 ibPowerSupplyFailure A power supply failure has occurred.
5 ibDBFailure A database daemon monitoring failure has occurred.
6 ibApacheSoftwareFailure An apache software failure has occurred.
7 ibSerialConsoleFailure An Infoblox serial console software failure has occurred.
11 ibControldSoftwareFailure A controld failure has occurred.
12 ibUpgradeFailure A system upgrade failure has occurred.
13 ibSNMPDFailure SNMP Server failure has occurred.
15 ibSSHDSoftwareFailure An SSH daemon failure has occurred.
16 ibNTPDSoftwareFailure An NTP daemon failure has occurred.
17 ibClusterdSoftwareFailure A cluster daemon failure has occurred.
18 ibLCDSoftwareFailure An LCD daemon failure has occurred.
19 ibDHCPdSoftwareFailure A DHCP daemon monitoring failure has occurred.
20 ibNamedSoftwareFailure A named daemon monitoring failure has occurred.
21 ibAuthServerGroupDown NAC Authentication server group is down.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
22 ibAuthServerGroupUp NAC Authentication server group is up.
24 ibNTLMSoftwareFailure An NTLM monitoring failure has occurred.
25 ibNetBIOSDaemonFailure A NetBIOS daemon monitoring failure has occurred.
26 ibWindowBindDaemonFailure An NT domain service monitoring failure has occurred.
27 ibTFTPDSoftwareFailure A TFTPD daemon failure has occurred.
28 ibUNUSED28 Unused.
29 ibBackupSoftwareFailure Backup failed.
30 ibBackupDatabaseSoftwareFailure Database backup failed.
31 ibBackupModuleSoftwareFailure Module backup failed.
32 ibBackupSizeSoftwareFailure File size exceeded the quota. Backup failed.
33 ibBackupLockSoftwareFailure Another backup is in progress. Backup will not be
performed.
34 ibHTTPFileDistSoftwareFailure An HTTP file distribution daemon failure has occurred.
35 ibOSPFSoftwareFailure An OSPF routing daemon failure has occurred.
36 ibAuthDHCPNamedSoftwareFailure An auth named server failure has occurred.
37 ibFan1Failure Fan 1 failure has occurred.
38 ibFan2Failure Fan 2 failure has occurred.
39 ibFan3Failure Fan 3 failure has occurred.
40 ibFan1OK Fan 1 is OK.
41 ibFan2OK Fan 2 is OK.
42 ibFan3OK Fan 3 is OK.
44 ibFTPDSoftwareFailure An FTPD daemon failure has occurred.
45 ibBloxtoolsSoftwareFailure A Bloxtools service failure has occurred.
46 ibPowerSupplyOK The power supply is OK.
47 ibWebUISoftwareFailure A WebUI software failure has occurred.
48 ibUNUSED48 Unused.
49 ibADAgentSyncFailure An AD agent client synchronizing domain data failure has
occurred.
50 ibIFMAPSoftwareFailure An IF-MAP server failure has occurred.
51 ibCaptivePortalSoftwareFailure A Captive Portal service failure has occurred.
52 ibDuplicateIPAddressFailure A Duplicate IP Address has been detected.
53 ibBGPSoftwareFailure An BGP routing daemon failure has occurred.
54 ibRevokedLicense A license has been revoked.
58 ibGUILoginFailure An admin failed to log in to the GUI.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
59 ibSerialConsoleLoginFailure An admin failed to log in to the serial console.
60 ibSystemReboot A system reboot was initiated.
61 ibSystemRestart A system restart was initiated.
62 ibZoneTransferFailure A zone transfer failure occurred.
63 ibDHCPLeaseConflict DHCP address conflicts with an existing lease.
64 ibDHCPAddressConflict DHCP address conflicts with an existing fixed address.
65 ibDHCPRangeConflict DHCP address conflicts with an existing range.
66 ibDHCPHostConflict DHCP address conflicts with an existing host.
67 ibSyslogFailure A syslog daemon failure occurred.
68 ibPowerSupply1Failure Power supply 1 failure has occurred.
69 ibPowerSupply2Failure Power supply 2 failure has occurred.
70 ibPowerSupply1OK Power supply 1 is OK.
71 ibPowerSupply2OK Power supply 2 is OK.
72 ibReportingTaskSwFailure A reporting task monitoring failure has occurred.
73 ibReportingDbBackupFailure A reporting db backup/restore operation failure has
occurred.
74 ibFan4Failure Fan 4 failure has occurred.
75 ibFan5Failure Fan 5 failure has occurred.
76 ibFan6Failure Fan 6 failure has occurred.
77 ibFan7Failure Fan 7 failure has occurred.
78 ibFan8Failure Fan 8 failure has occurred.
79 ibFan4OK Fan 4 is OK.
80 ibFan5OK Fan 5 is OK.
81 ibFan6OK Fan 6 is OK.
82 ibFan7OK Fan 7 is OK.
83 ibFan8OK Fan 8 is OK.
84 ibOSPF6SoftwareFailure OSPF for IPv6 failed.
85 ibOCSPResponderFailure OCSP responder failed.
86 ibReportingAlertTriggered A reporting alert is triggered.
87 ibCapturedQueriesUploadFailure Upload for captured DNS queries failed.
88 ibLDAPServerFailure The LDAP server failed.
89 ibRIRWIPRegistrationFailure RIR SWIP registration failed.
90 ibPowerSupply1Removed Power supply 1 has been removed.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
91 ibPowerSupply2Removed Power supply 2 has been removed.
92 ibIPMISensorErrorDetected Error detected on the sensor for the IPMI port (used for
LOM)
93 ibDiscoveryConsolidatorTaskSwFailure Discovery service on the Consolidator failed.
94 ibDiscoveryCollectorTaskSwFailure Discovery service on probes failed.
95 ibDiscoveryBackupSwFailure Discovery backup service failed.
96 ibThreatProtectionAutoDownloadFailure Automatic download of threat protection rule failed.
97 ibThreatProtectionPublishFailure Threat protection rule publish failed.
98 ibPassiveHANodeARPConnectivityFailure HA node failed to connect to local router.
99 ibPassiveHANodeARPConnectivitySuccess HA node successfully connects to local router.
100 ibDNSIntegrityCheckConnectionFailed Connection between Grid member and Grid Master failed.
101 ibDNSIntegrityCheckPrimaryServersFailed DNS data (NS RRset) check for Grid primaries failed.
102 ibDNSIntegrityCheckNameserversFailed DNS data (NS RRset) check for name servers failed.
103 ibCloudAPIFailure Cloud API service failed.
104 ibRpzRefreshFailure An RPZ refresh failure has occurred.
3001 ibRAIDIsOptimal The system’s RAID array is now running in an optimal
state.
3002 ibRAIDIsDegraded The system’s RAID array is in a degraded state.
3003 ibRAIDIsRebuilding The system’s RAID array is rebuilding.
3004 ibRAIDStatusUnknown Unable to retrieve RAID array state!
3005 ibRAIDBatteryIsOK The system’s RAID battery is OK.
3006 ibRAIDBatteryFailed A RAID battery failure has occurred.
3007 ibRAIDOptimalMismatch The system's RAID array is now running in an optimal state
(Mismatched disk(s) found).
3008 ibRAIDDegradedMismatch The system's RAID array is in a degraded state
(Mismatched disk(s) found).
3009 ibRAIDRebuildingMismatch The system's RAID array is rebuilding (Mismatched disk(s)
found).
3010 ibRAIDBatteryWeak Please replace the system's RAID battery soon.
3011 ibRAIDIsDegradedDisk1 The system's RAID array is in a degraded state. RAID Disk1
is EMPTY.
3012 ibRAIDIsDegradedDisk2 The system's RAID array is in a degraded state. RAID Disk2
is EMPTY.
3013 ibRAIDIsDegradedDisk3 The system's RAID array is in a degraded state. RAID Disk3
is EMPTY.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
3014 ibRAIDIsDegradedDisk4 The system's RAID array is in a degraded state. RAID Disk4
is EMPTY.
3015 ibRAIDIsDegradedDisk5 The system's RAID array is in a degraded state. RAID Disk5
is EMPTY.
3016 ibRAIDIsDegradedDisk6 The system's RAID array is in a degraded state. RAID Disk6
is EMPTY.
3017 ibRAIDIsDegradedDisk7 The system's RAID array is in a degraded state. RAID Disk7
is EMPTY.
3018 ibRAIDIsDegradedDisk8 The system's RAID array is in a degraded state. RAID Disk8
is EMPTY.
3019 ibRAIDIsRebuildingDisk1 The system's RAID array is rebuilding. RAID Disk1 is
OFFLINE.
3020 ibRAIDIsRebuildingDisk2 The system's RAID array is rebuilding. RAID Disk2 is
OFFLINE.
3021 ibRAIDIsRebuildingDisk3 The system's RAID array is rebuilding. RAID Disk3 is
OFFLINE.
3022 ibRAIDIsRebuildingDisk4 The system's RAID array is rebuilding. RAID Disk4 is
OFFLINE.
3023 ibRAIDIsRebuildingDisk5 The system's RAID array is rebuilding. RAID Disk5 is
OFFLINE.
3024 ibRAIDIsRebuildingDisk6 The system's RAID array is rebuilding. RAID Disk6 is
OFFLINE.
3025 ibRAIDIsRebuildingDisk7 The system's RAID array is rebuilding. RAID Disk7 is
OFFLINE.
3026 ibRAIDIsRebuildingDisk8 The system's RAID array is rebuilding. RAID Disk8 is
OFFLINE.
3027 ibRAIDDegradedMismatchDisk1 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk1 is EMPTY.
3028 ibRAIDDegradedMismatchDisk2 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk2 is EMPTY.
3029 ibRAIDDegradedMismatchDisk3 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk3 is EMPTY.
3030 ibRAIDDegradedMismatchDisk4 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk4 is EMPTY.
3031 ibRAIDDegradedMismatchDisk5 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk5 is EMPTY.
3032 ibRAIDDegradedMismatchDisk6 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk6 is EMPTY.
3033 ibRAIDDegradedMismatchDisk7 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk7 is EMPTY.
OID 3.1.1.2.4.0
Value Equipment, Software, or Process Failure Traps
ibProbableCause
3034 ibRAIDDegradedMismatchDisk8 The system's RAID array is in a degraded state
(Mismatched disk(s) found). RAID Disk8 is EMPTY.
3035 ibRAIDRebuildingMismatchDisk1 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk1 is OFFLINE.
3036 ibRAIDRebuildingMismatchDisk2 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk2 is OFFLINE.
3037 ibRAIDRebuildingMismatchDisk3 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk3 is OFFLINE.
3038 ibRAIDRebuildingMismatchDisk4 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk4 is OFFLINE.
3039 ibRAIDRebuildingMismatchDisk5 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk5 is OFFLINE.
3040 ibRAIDRebuildingMismatchDisk6 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk6 is OFFLINE.
3041 ibRAIDRebuildingMismatchDisk7 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk7 is OFFLINE.
3042 ibRAIDRebuildingMismatchDisk8 The system's RAID array is rebuilding (Mismatched disk(s)
found). RAID Disk8 is OFFLINE.
4001 ibDisconnectGridAttachFailed A disconnected Grid failed to attach to the Master Grid.
4002 ibDisconnectedGridDetachFailed A disconnected Grid failed to detach from the Master Grid.
4003 ibDisconnectedGridDetachFailedSubgrid An offline Grid failed to detach from the Master Grid.
Offline
4004 ibDisconnectedGridSnapshotFailed The snapshot operation failed on a disconnected Grid.
4005 ibDnssecAutomaticKSKRolloverApproching An automatic rollover of the KSK will be performed in
seven days.
4006 ibDnssecManualKSKRolloverDueApproching A manual KSK rollover is due within the next seven days.
4007 ibDnssecAutomaticKSKRolloverDone The KSK has been automatically rolled over.
4008 ibDnssecManualKSKRolloverDone The KSK has been manually rolled over.
4009 ibDnssecKSKRolloverOverdue The KSK rollover is overdue.
OID 3.1.1.1.2.5.0
Value
ibSubsystemName
0 Uses the original ibObjectName and ibSubsystemName
when the trap is cleared. The process failure trap is
appended to the CLEAR trap descriptions.
1 N/A
2 N/A
3 N/A
4 N/A
5 Db_jnld
6 httpd
7 serial_console
11 controld
12 N/A
13 Snmpd
15 Sshd
16 Ntpd
17 Clusterd
18 Lcd
19 Dhcpd
20 Named
24 NTLM
25 Netbiosd
26 Winbindd
27 Tftpd
29 N/A
30 db_dump
31 N/A
32 Scheduled_backups
33 N/A
34 HTTPd
35 OSPF
Note: Contact Infoblox Technical Support for assistance when the recommended actions do not resolve the
problems.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Primary Drive Full
Primary drive is full. Major The primary disk drive Review the syslog file to identify the
reached 100% of usage. possible cause of this problem.
Fan Monitoring
Fan <n> failure has Minor The specified fan <n> Inspect the specified fan for mechanical or
occurred. failed, where <n> electrical problems.
indicates the fan number.
Fan <n> is OK. Informational The specified fan <n> is No action is required.
functioning properly,
where <n> indicates the
fan number.
Power Supply Failure: monitored at 1 minute
A power supply Major The power supply failed. Inspect the power supply for the possible
failure has occurred. cause of the failure.
Power supply <n> Major The specified power Inspect the specified power supply for the
failure has occurred. supply <n> failed, where possible cause of the failure.
<n> indicates the power
supply number.
The power supply is Informational The power supply is No action is required.
OK. functioning properly.
Power supply <n> is Informational The specified power No action is required.
OK. supply <n> is functioning
properly, where <n>
indicates the power
supply number.
RAID monitoring, at 1 minute interval
A RAID battery failure Major The system RAID battery Inspect the battery for the possible cause of
has occurred. failed. The alert light is the failure.
red.
The system’s RAID Informational The system RAID battery No action is required.
battery is OK. is charging and
functioning properly. The
alert light changed from
red to green.
Unable to retrieve Undetermined The appliance failed to Review the syslog file to identify the
RAID array state! retrieve the RAID array possible cause of this problem.
state. The alert light is
red.
The system’s RAID Informational The RAID system is No action is required.
array is now running functioning at an optimal
in an optimal state. state.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
The system’s RAID Major The RAID system is Review the syslog file to identify the
array is in a degrading. The specified possible cause of this problem.
degraded state. RAID RAID Disk <n> is empty,
Disk <n> is EMPTY. where <n> indicates the
RAID disk number.
The system’s RAID Minor The RAID system is No action is required.
array is rebuilding. rebuilding. The specified
RAID Disk <n> is RAID Disk <n> is offline,
OFFLINE. where <n> indicates the
RAID disk number.
Syslog Backup Processes
The syslog backup Informational Rotated syslog files are No action is required.
process is uploaded successfully to
successful. the external backup
server.
The syslog backup Major Failed to forward the Review the syslog messages to identify the
process failed. rotated syslog files to the possible cause of this problem.
external backup server.
Note: The ibSubsystemName object is associated with certain traps of the Processing and Software Failure traps.
Therefore, you cannot map all the traps of the Processing and Software Failure traps with the
ibSubsystemName. If there is no value in the ibSubsystemName, then it belongs to the N/A category. For more
information on the values for the ibSubsystemName, see the Table 39.7 on page 1392.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Named Daemon Failure
A named daemon Critical The named process Review the syslog file to identify the
monitoring failure failed. possible cause of this problem.
has occurred.
DHCP Daemon Failure
A DHCP daemon Critical The dhcpd process failed. Review the syslog file to identify the
monitoring failure possible cause of this problem.
has occurred.
SSH Daemon Failure
An SSH daemon Major The sshd process failed. Review the syslog file to identify the
failure has occurred. possible cause of this problem.
NTP Daemon Failure, monitored every 10 minutes
An NTP daemon Major The ntpd process failed. Review the syslog file to identify the
failure has occurred. possible cause of this problem.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Cluster Daemon Failure
A grid daemon Critical The clusterd process Review the syslog file to identify the
failure has occurred. failed. possible cause of this problem.
Backup Failure
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Backup failed. Minor The backup failed. Review the syslog file to identify the
One of the following possible cause of this problem.
could be the cause of the
failure:
• The appliance could
not access a backup
directory.
• The backup was
interrupted by one of
the following signals:
SIGINT, SIGHUP, or
SIGTERM.
• Incorrect login or
connection failure in
an FTP backup.
• The backup failed to
create temporary
files.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Microsoft Server
Microsoft server Major The Microsoft server Check that the Microsoft server is
<hostname>/<IP could not be reached. connected to the network and configured
address> has failed. properly.
Microsoft server Informational The Microsoft server can No action is required.
<hostname>/<IP be reached and is
address> is OK. functioning properly.
Microsoft
DNS/DHCP Service
Service connection Major The Microsoft DNS Check that the DNS service is configured
to Microsoft DNS service is not responding. and running on the Microsoft server.
server
<hostname>/<IP
address> has failed.
Service connection Major The Microsoft DHCP Check that the DHCP service is configured
to Microsoft DHCP service is not responding. and running on the Microsoft server.
server
<hostname>/<IP
address> has failed.
Service connection Informational The Microsoft DNS No action is required.
to Microsoft DNS service is responding.
server
<hostname>/<IP
address> is OK.
Service connection Informational The Microsoft DHCP No action is required.
to Microsoft DHCP service is responding.
server
<hostname>/<IP
address> is OK.
NAC Authentication Server Group
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
NAC Authentication Major None of the servers in the Review the syslog.
server group is down NAC authentication
server group can be
reached.
NAC Authentication Informational The NAC authentication No action is required.
server group is up server group is
responding.
GUI Login
A GUI login failure Major An admin failed to log in Check the credentials of the admin.
has occurred to the GUI.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Syslog daemon is Critical Syslog process stopped. Review the syslog file to identify the
not running. possible cause of this problem.
Process Stop/Start
The system stopped Major The system restarted a Review the syslog file to identify the
and started a process. possible cause of this problem.
process.
Clear
SNMP Trap is N/A The SNMP Trap for LCD No action is required.
cleared. LCD failure failure is cleared.
SNMP Trap is N/A The SNMP Trap for Serial No action is required.
cleared. Serial Console is cleared.
Console
SNMP Trap is N/A The SNMP Trap for No action is required.
cleared. ControlD ControlD failure is
failure cleared.
SNMP Trap is N/A The SNMP Trap for GUI No action is required.
cleared. GUI Login Login is cleared.
SNMP Trap is N/A The SNMP Trap for Serial No action is required.
cleared. Serial Console Login is cleared.
Console Login
SNMP Trap is N/A The SNMP Trap for SSHD No action is required.
cleared. SSHD failure failure is cleared.
Restart
The system is being Informational A system restart No action is required.
restarted. command was sent.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0 OID 3.1.1.1.2.2
Cannot perform DNS N/A The DNS integrity check No action is required.
Integrity Check cannot be performed
because the because the appliance is
appliance is unable unable to connect to the
to connect to the external DNS server.
external DNS server.
There are list of
nameservers failure:
<IP addresses>
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause
Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
System Memory Usage
System has run Major memory The appliance ran out of memory. Review the syslog
out of memory. The appliance encountered this file to identify the
problem when one of the following possible cause of
occurred: this problem.
• The total free memory on the
appliance was less than or
equal to 0%.
• The total physical memory was
less than the total free memory.
• The percentage of free memory
compared to the total physical
memory was less than 5%, and
the free swap percentage was
less than 80%.
• The percentage of free memory
compared to the total physical
memory was less than 5%, plus
the numbers of both swap INs
and swap OUTs were greater
than or equal to 3,200.
• The percentage of free memory
compared to the total physical
memory was between 5% and
10%, the free swap percentage
was greater than or equal to
80%, plus the numbers of both
swap INs and swap OUTs were
greater than or equal to 3,200.
• The percentage of free memory
compared to the total physical
memory was greater than 10%,
the free swap percentage was
less than 80%, plus the
numbers of both swap INs and
swap OUTs were greater than or
equal to 3,200.
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
System memory Minor memory The memory usage on the appliance Review the syslog
usage exceeds exceeded the configured Trigger file to identify the
the critical value. For more information, see possible cause of
threshold value. Defining Thresholds for Traps on this problem.
page 1369.
The appliance encountered this
problem when one of the following
occurred:
• The percentage of free memory
compared to the total physical
memory was less than 5%, and
the free swap percentage was
less than 90%.
• The percentage of free memory
compared to the total physical
memory was less than 5%, plus
the number of swap INs was
less than 3,200 and the number
of swap OUTs was greater than
or equal to 3,200.
• The percentage of free memory
compared to the total physical
memory was between 5% and
10%, and the free swap
percentage was less than 80%.
• The percentage of free memory
compared to the total physical
memory was greater than 5%,
plus the number of swap INs
was less than 3,200 and the
number of swap OUTs was
greater than or equal to 3,200.
System memory Minor memory The memory usage on the system is No action is
is OK. at or below the Reset value after it required.
went above the Trigger value.
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
Note: Use the CLI command set thresholdtrap to enable the CPU usage trap and configure the trigger and reset
values. For information, refer to the Infoblox CLI Guide.
Swap Usage
System swap Major swap_usage System swap space usage exceeded Monitor System
space usage the Trigger value. swap usage.
exceeds the For more information, see Defining
critical threshold Thresholds for Traps on page 1369.
value.
System swap Minor swap_usage System swap space usage dipped No action is
space usage is below the reset value after it required.
OK. exceeded the Trigger value.
Replication Statistics Monitoring
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
Grid queue N/A For send trap: The system encountered this Review the syslog
replication Cluster_Send_ problem when all of the following file to identify the
problem. Queue conditions occurred: possible cause of
For receive • The node was online. this problem.
trap: • The number of the replication
Cluster_Recv_ queue being sent from the
Queue master column was greater than
0, or the number of the queue
received was greater than 0.
• It was more than 10 minutes
since the last replication queue
was sent and monitored.
DHCP Range Threshold Crossing
DHCP high N/A Threshold The system encountered this Review the syslog
threshold problem when the address usage in file to identify the
crossed: the DHCP range is greater than the possible cause of
Member: configured High Trigger value. this problem.
<DHCP server
node VIP>
Network:
<network>/
<network view>
Range: <DHCP
range>/ <network
view>
High Trigger Mark:
<high percentage>
(95% by default)
High Reset Mark:
<reset
percentage> (80%
by default)
Current Usage:
<current usage
percentage>
Active Leases:
<number of active
leases>
Available Leases:
<number of
available leases>
Total Addresses:
<total addresses>
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
DHCP high N/A Threshold The system encountered this
threshold reset: problem when the address usage in
Member: the DHCP range goes below the
Reset value after it hit the Trigger
<DHCP server
value.
node VIP>
Network:
<network>/
<network view>
Range: <DHCP
range>/<network
view>
High Trigger Mark:
<high percentage>
(95% by default)
High Reset Mark:
<reset
percentage> (80%
by default)
Current Usage:
<current usage
percentage>
Active Leases:
<number of active
leases>
Available Leases:
<number of
available leases>
Total Addresses:
<total addresses>
IPAM Utilization Threshold Crossing
Network IPAM N/A Threshold The appliance sends this trap when Review the syslog
Utilization the IPAM utilization for a network is file to identify the
capacity usage is above the configured Trigger value. possible cause of
over the this problem.
threshold value.
Network:
<network>/
<network view>
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
Network N/A Threshold The appliance sends this trap when Review the syslog
Container IPAM the IPAM utilization for a network file to identify the
Utilization container is above the configured possible cause of
capacity usage is Trigger value. this problem.
over the
threshold value.
Network
container:
<network>/
<network view>
Network IPAM N/A Threshold The appliance sends this trap when Review the syslog
Utilization the IPAM utilization for a network is file to identify the
capacity usage is below the configured Reset value. possible cause of
OK. Network: this problem.
<network>/
<network view>
Network N/A Threshold The appliance sends this trap when Review the syslog
Container IPAM the IPAM utilization for a network file to identify the
Utilization container is below the configured possible cause of
capacity usage is Reset value. this problem.
OK. Network
container:
<network>/
<network view>
DHCP DDNS Updates Deferred
DHCP DNS N/A Threshold The DNS updates were deferred Review the syslog
updates deferred: because of DDNS update errors. file to identify the
Retried at least possible cause of
once: <number of this problem.
retries>
Maximum
number of
deferred updates
since start of
problem episode
(or restart): <max
number>
RPZ Hit Rate
RPZ hit rate N/A Threshold The appliance sends this trap when Review the syslog
exceed normal the RPZ hit rate exceeds the file to identify the
value. configured Trigger value. possible cause of
this problem.
RPZ hit rate has N/A Threshold The appliance sends this trap when Review the syslog
returned to the RPZ hit rate equals the file to identify the
normal value. configured Reset value. possible cause of
this problem.
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
DNS Monitor
DNS security Major dns_security_ DNS security alert. There were actual 1. Review the
alert. There were port DNS responses to invalid ports in following:
actual DNS the last minute, comprising — DNS alert
responses to percent% of all responses. Primary status
invalid ports in sources: ip_address sent count, — syslog file
the last minute, ip_address sent count.
comprising 2. Limit access or
where
percent% of all block
• actual is the total number of connections
responses.
DNS responses arrive on invalid from the
Primary sources:
ports. primary
ip_address sent
count, ip_address • percent% is the percentage of sources. For
sent count. invalid DNS responses over the information,
total number of DNS responses. see Configuring
• ip_address is the IP address of Rate Limiting
the primary source that Rules on page
generated the invalid DNS 1354.
responses.
• count is the number of invalid
responses generated by the
specified IP address.
Example:
DNS security alert. There were 1072
DNS responses to invalid ports in
the last minute, comprising 92% of
all responses. Primary sources:
10.0.0.0 sent 1058, 2.2.2.2 sent 14.
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
DNS security N/A dns_security_t DNS security alert. There were actual 1. Review the
alert. There were xid DNS responses with invalid TXID in following:
actual DNS the last minute, comprising — DNS alert
responses with percent% of all responses. Primary status
invalid TXID in the sources: ip_address sent count,
— syslog file
last minute, ip_address sent count.
comprising 2. Limit access or
where
percent% of all block
• actual is the total number of connections
responses.
DNS responses that have from the
Primary sources:
invalid TXIDs. primary
ip_address sent
count, ip_address • percent% is the percentage of sources. For
sent count. invalid DNS responses over the information,
total number of DNS responses. see Configuring
• ip_address is the IP address of Rate Limiting
the primary source that Rules on page
generated the invalid DNS 1354.
responses.
• count is the number of invalid
responses generated by the
specified IP address.
Example:
DNS security alert. There were 1072
DNS responses with invalid TXID in
the last minute, comprising 92% of
all responses. Primary sources:
10.0.0.0 sent 1058, 2.2.2.2 sent 14.
ibTrapDesc ibObjectName
Recommended
OID ibTrapSeverity OID Description/Cause Actions
3.1.1.1.2.11.0 3.1.1.1.2.3.0
Reporting
Reporting drive is Major Reporting Reporting drive reached the Review the syslog
full. maximum capacity. file to identify the
possible cause of
this problem.
Reporting drive Minor Reporting The appliance sends this trap when Review the syslog
usage is over the Reporting volume first exceeds file to identify the
threshold value. the configured Trigger value. The possible cause of
default Trigger value is 80. this problem.
Reporting drive Minor Reporting The appliance sends this trap when No action
usage is OK. the Reporting volume first moves at
or below the configured Reset value
after it exceeded the Trigger value.
The default Reset value is 71.
For information on setting the Trigger
and Reset values, see Defining
Thresholds for Traps on page 1369.
File Distribution
File Distribution N/A File File distribution service storage Review the syslog
services storage Distribution reached the configured threshold file to identify the
usage reached value. possible cause of
the threshold this problem.
value.
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
Service Shutdown
Shutting down services Major The appliance is shutting down its No action is required.
due to database services while synchronizing the
snapshot. database with the Grid Master.
Network Interfaces Monitoring
LAN1 port link is down. Major The LAN1 port is up, but the link is Check the LAN1 link
Please check the down. connection.
connection.
LAN2 port link is down. Major The LAN2 port is up, but the link is Check the LAN2 link
Please check the down. connection.
connection.
HA port link is down. Major The HA port is up, but the link is down. Check the HA link
Please check the connection.
connection.
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
MGMT port link is down. Major The MGMT port is enabled, but the link Check the MGMT link
Please check the is down. connection.
connection.
LAN1 port link is up. Major The LAN1 port link is up and running. No action is required.
LAN2 port link is up. Major The LAN2 port link is up and running. No action is required.
HA port link is up. Major The HA port link is up and running. No action is required.
MGMT port link is up. Major The MGMT port link is up and running. No action is required.
HA State Change from Initial to Active
The node has become Informational A node in an HA pair becomes active. No action is required.
ACTIVE. The HA pair starts up.
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
The NTP service is Major The Infoblox NTP server synchronizes No action is required.
synchronizing to local its clients with its local clock.
clock.
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
BloxTools Service is in Informational The bloxTools service is in a warning Review the syslog file
warning state state.
BloxTools Service is Informational The bloxTools service became inactive. Check if an admin
inactive. disabled the service.
BloxTools Service failed. Critical The bloxTools daemon failed. Review the syslog file
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
Threat Protection Service Informational The Threat protection service started No action is required.
is working. working again.
Threat Protection Service Informational The Threat protection service became Check if an admin
is inactive. inactive. disabled the service.
ibTrapDesc
ibTrapSeverity Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
Httpd Start
The process started Informational The httpd process started. No action is required.
normally.
Httpd Stop
The process stopped Informational The httpd process stopped. No action is required.
normally.
Process Stop/Start
The system stopped and Major The system restarted a process. No action is required.
started a process.
ibTrapDesc ibTrapSeverity
Description/Cause Recommended Actions
OID 3.1.1.1.2.11.0
Revoked License
This trap is generated Critical A license was revoked. Obtain and install new
when a license is license
revoked
ibPlatformOne MIB
The ibPlatformOne MIB provides information about the CPU temperature of the appliance, the replication status, the
average latency of DNS requests, DNS security alerts, CPU and memory utilization of the appliance, and the Infoblox
service status. Figure 39.4 illustrates the structure of the PlatformOne MIB. (Note that the OIDs in the illustration do
not include the prefix .1.3.6.1.4.1.7779.)
The ibPlatformOne MIB contains the following objects:
• ibCPUTemperature (IbString) tracks the CPU temperature of the appliance.
• ibClusterReplicationStatusTable provides information in tabular format about the replication status of the
appliance. For information, see ibClusterReplicationStatusTable on page 1421.
• ibNetworkMonitor provides information about the average latency of authoritative and nonauthoritative replies
to DNS queries for different time intervals. It also provides information about invalid DNS responses that arrive
on invalid ports or have invalid DNS transaction IDs. For information, see ibNetwork Monitor on page 1422.
• ibHardwareType (IbString) provides information about the hardware platform. For an Infoblox appliance, it
provides the model number of the Infoblox hardware platform. For vNIOS appliances, it identifies whether the
hardware platform is Riverbed or VMware.
• ibHardwareId (IbString) provides the hardware ID of the NIOS appliance.
• ibSerialNumber (IbString) provides the serial number of the Infoblox hardware platform.
• ibNiosVersion (IbString) provides the version of the NIOS software.
• ibSystemMonitor provides information about the CPU and memory utilization of the appliance. For information,
see ibSystemMonitor on page 1429.
• ibGridStatus provides information about an appliance. It indicates whether the appliance is a Grid Master,
member, or an independent appliance.
• ibHAStatus provides information about the HA status of a member. It indicates if the member is part of an HA
configuration, and if it is the active or passive node.
• ibGridMasterCandStatus indicates if a member is a Grid Master candidate.
• ibGridMasterVIP provides the Grid Master virtual IP address.
• ibGridReplicationState provides information about the replication status.
The ibPlatformOne MIB also contains the following tables that provide status of the Infoblox services as well as
system and hardware services on the appliance you query:
• ibMemberServiceStatusTable provides status of the Infoblox services, such as the DNS and DHCP services, on a
queried appliance. For information, see ibMemberServiceStatusTable on page 1429.
• ibMemberNodeServiceStatusTable provides status of the system and hardware services on a queried
appliance. For information, see ibMemberNodeServiceStatusTable on page 1432.
• ibMemberPassiveNodeServiceStatusTable provides status of the system and hardware services on the passive
node of an HA pair if the queried appliance is the VIP or the active node of an HA pair. For independent
appliances and the passive nodes of HA pairs, this table does not display any status. For information, see
ibMemberPassiveNodeServiceStatusTable on page 1433.
(3.1.1.2.1) ibPlatformOneModule
(3.1.1.2.1.1)
ibCPUTemperature
(3.1.1.2.1.2)
ibClusterReplicationStatusTable ibClusterReplicationStatusTable Objects on page
(3.1.1.2.1.3)
ibNetworkMonitor ibNetWorkMonitor Objects on page 1423
(3.1.1.2.1.4)
ibHardwareType
(3.1.1.2.1.5)
ibHardwareId
(3.1.1.2.1.6)
ibSerialNumber
(3.1.1.2.1.7)
ibNiosVersion
(3.1.1.2.1.9)
ibMemberServiceStatusTable ibMemberServiceStatusTable Objects on page 1430
(3.1.1.2.1.10)
ibMemberNodeServiceStatusTable ibMemberNodeServiceStatusTable Objects on page 1433
(3.1.1.2.1.11)
ibMemberPassiveNodeServiceStatusTable ibMemberPassiveNodeServiceStatusTable Objects on page
1433
(3.1.1.2.1.12)
ibGridStatus
(3.1.1.2.1.13)
ibHAStatus
(3.1.1.2.1.14)
ibGridMasterCandStatus
(3.1.1.2.1.15)
ibGridMasterVIP
(3.1.1.2.1.16)
ibGridReplicationState
ibClusterReplicationStatusTable
ibClusterRepliactionStatusTable (object ID 3.1.1.2.1.2.1) provides information about the Grid replication status. For
information about Infoblox SNMP traps, see ibTrapDesc (OID 3.1.1.1.2.11.0) on page 1396.
Figure 39.5 shows the sub branches of ibClusterReplicationStatusTable.
(3.1.1.2.1.2)
ibClusterReplicationStatusTable
(3.1.1.2.1.2.1)
ibClusterReplicationStatusEntry
(3.1.1.2.1.2.1.1)
ibNodeIPAddress
(3.1.1.2.1.2.1.2)
ibNodeReplicationStatus
(3.1.1.2.1.2.1.3)
ibNodeQueueFromMaster
(3.1.1.2.1.2.1.4)
ibNodeLastRepTimeFromMaster
(3.1.1.2.1.2.1.5)
ibNodeQueueToMaster
(3.1.1.2.1.2.1.6)
ibNodeLastRepTimeToMaster
Object Description
(Type)
ibClusterReplicationStatusEntry A conceptual row that provides information about the Grid replication status.
The status indicates whether the appliance is sending replication queues,
receiving queues, or having problems with the replication.
ibNodeIPAddress IP address of a Grid member.
(IbIpAddr)
ibNodeReplicationStatus Replication status of the Grid member. The replication status can be one of the
(IbString) following: online, offline, or snapshotting.
ibNodeQueueFromMaster “Sent” queue size from master.
(Integer)
ibNodeLastRepTimeFromMaster Last sent time from master.
(IbString)
ibNodeQueueToMaster “Receive” queue size from master.
(Integer)
ibNodeLastRepTimeToMaster Last receive time from master.
(IbString)
ibNetwork Monitor
As shown in Figure 39.6, the ibNetwork Monitor has one subtree, ibNetworkMonitorDNS, that branches out into the
following:
• ibNetworkMonitorDNSActive (Integer) reports on whether DNS latency monitoring is enabled. You can enable
DNS latency monitoring using the CLI command set monitor dns. For more information, see Enabling and
Disabling DNS Alert Monitoring on page 1351. This is the only object in this branch. When you send a query for
this object, the appliance responds with either “active” (1) or “nonactive” (0).
• ibNetworkMonitorDNSNonAA provides information about the average latency of nonauthoritative replies to DNS
queries for 1-, 5-, 15-, and 60-minute intervals. For information, see ibNetworkMonitorDNSNonAA Objects on
page 1425.
• ibNetworkMonitorDNSAA provides information about the average latency of authoritative replies to DNS queries
for 1-, 5-, 15-, and 60-minute intervals. For information, see ibNetworkMonitorDNSAA Objects on page 1426.
• ibNetworkMonitorDNSSecurity provides information about the invalid DNS responses that arrive on invalid
ports or have invalid DNS transaction IDs. ibNetworkMonitorDNSSecurity branches out into the following:
— ibNetworkMonitorDNSSecurityInvalidPort
— ibNetworkMonitorDNSSecurityInvalidTxid
— ibNetworkMonitorDNSSecurityInvalidPortOnly (Counter)
— ibNetworkMonitorDNSSecurityInvalidPortCount (Counter)
— ibNetworkMonitorDNSSecurityInvalidTxidOnly (Counter)
— ibNetworkMonitorDNSSecurityInvalidTxidCount (Counter)
— ibNetworkMonitorDNSSecurityInvalidTxidAndPort (Counter)
For information, see Table 39.12 on page 1427.
(3.1.1.2.1.3)
ibNetworkMonitor
(3.1.1.2.1.3.1)
ibNetworkMonitorDNS
(3.1.1.2.1.3.1.1)
ibNetworkMonitorDNSActive
(3.1.1.2.1.3.1.2)
ibNetworkMonitorDNSNonAA
(3.1.1.2.1.3.1.3)
ibNetworkMonitorDNSAA
(3.1.1.2.1.3.1.4)
ibNetworkMonitorDNSSecurity
(3.1.1.2.1.3.1.4.1)
ibNetworkMonitorDNSSecurityInvalidPort
(3.1.1.2.1.3.1.4.2)
ibNetworkMonitorDNSSecurityInvalidTxid
(3.1.1.2.1.3.1.4.3)
ibNetworkMonitorDNSSecurityInvalidPortOnly
(3.1.1.2.1.3.1.4.4)
ibNetworkMonitorDNSSecurityInvalidTxidOnly
(3.1.1.2.1.3.1.4.5)
ibNetworkMonitorDNSSecurityInvalidTxidAndPort
(3.1.1.2.1.3.1) (3.1.1.2.1.3.1)
ibNetworkMonitorDNS ibNetworkMonitorDNS
(3.1.1.2.1.3.1.2) (3.1.1.2.1.3.1.3)
ibNetworkMonitorDNSNonAA ibNetworkMonitorDNSAA
(3.1.1.2.1.3.1.2.1) (3.1.1.2.1.3.1.3.1)
ibNetworkMonitorDNSNonAAT1 ibNetworkMonitorDNSAAT1
(3.1.1.2.1.3.1.2.1.1) (3.1.1.2.1.3.1.3.1.1)
ibNetworkMonitorDNSNonAAT1AvgLatency ibNetworkMonitorDNSAAT1AvgLatency
(3.1.1.2.1.3.1.2.1.2) (3.1.1.2.1.3.1.3.1.2)
ibNetworkMonitorDNSNonAAT1Count ibNetworkMonitorDNSAAT1Count
(3.1.1.2.1.3.1.2.2) (3.1.1.2.1.3.1.3.2)
ibNetworkMonitorDNSNonAAT5 ibNetworkMonitorDNSNonAAT5
(3.1.1.2.1.3.1.2.2.1) (3.1.1.2.1.3.1.3.2.1)
ibNetworkMonitorDNSNonAAT5AvgLatency ibNetworkMonitorDNSAAT5AvgLatency
(3.1.1.2.1.3.1.2.2.2) (3.1.1.2.1.3.1.3.2.2)
ibNetworkMonitorDNSNonAAT5Count ibNetworkMonitorDNSAAT5Count
(3.1.1.2.1.3.1.2.3) (3.1.1.2.1.3.1.3.3)
ibNetworkMonitorDNSNonAAT15 ibNetworkMonitorDNSAAT15
(3.1.1.2.1.3.1.2.3.1) (3.1.1.2.1.3.1.3.3.1)
ibNetworkMonitorDNSNonAAT15AvgLatency ibNetworkMonitorDNSAAT15AvgLatency
(3.1.1.2.1.3.1.2.3.2) (3.1.1.2.1.3.1.3.3.2)
ibNetworkMonitorDNSNonAAT15Count ibNetworkMonitorDNSAAT15Count
(3.1.1.2.1.3.1.2.4) (3.1.1.2.1.3.1.3.4)
ibNetworkMonitorDNSNonAAT60 ibNetworkMonitorDNSAAT60
(3.1.1.2.1.3.1.2.4.1) (3.1.1.2.1.3.1.3.4.1)
ibNetworkMonitorDNSNonAAT60AvgLatency ibNetworkMonitorDNSAAT60AvgLatency
(3.1.1.2.1.3.1.2.4.2) (3.1.1.2.1.3.1.3.4.2)
ibNetworkMonitorDNSNonAAT60Count ibNetworkMonitorDNSAAT60Count
(3.1.1.2.1.3.1.2.5) (3.1.1.2.1.3.1.3.5)
ibNetworkMonitorDNSNonAAT1440 ibNetworkMonitorDNSAAT1440
(3.1.1.2.1.3.1.2.5.1) (3.1.1.2.1.3.1.3.5.1)
ibNetworkMonitorDNSNonAAT1440AvgLatency ibNetworkMonitorDNSAAT1440AvgLatency
(3.1.1.2.1.3.1.2.5.2) (3.1.1.2.1.3.1.3.5.2)
ibNetworkMonitorDNSNonAAT1440Count ibNetworkMonitorDNSAAT1440Count
Table 39.10 describes the objects in ibNetworkMonitorDNSNonAA. You can send queries to retrieve values for these
objects.
Object
Description
(Type)
ibNetworkMonitorDNSNonAAT1 File that contains the objects for monitoring the average latency
of nonauthoritative replies to queries in the last minute.
ibNetworkMonitorDNSNonAAT1AvgLatency Indicates the average latency in microseconds of
(Integer) nonauthoritative replies to queries in the last minute.
ibNetworkMonitorDNSNonAAT5 File that contains the objects for monitoring the average latency
of nonauthoritative replies to queries in the last five minutes.
ibNetworkMonitorDNSNonAAT5AvgLatency Indicates the average latency in microseconds of
(Integer) nonauthoritative replies to queries in the last five minutes.
ibNetworkMonitorDNSNonAAT15 File that contains the objects for monitoring the average latency
of nonauthoritative replies to queries in the last 15 minutes.
ibNetworkMonitorDNSNonAAT15AvgLatency Indicates the average latency in microseconds of
(Integer) nonauthoritative replies to queries in the last 15 minutes.
ibNetworkMonitorDNSNonAAT60 File that contains the objects for monitoring the average latency
of nonauthoritative replies to queries in the last 60 minutes.
ibNetworkMonitorDNSNonAAT60AvgLatency Indicates the average latency in microseconds of
(Integer) nonauthoritative replies to queries in the last 60 minutes.
ibNetworkMonitorDNSNonAAT1440 File that contains the objects for monitoring the average latency
of nonauthoritative replies to queries in the last 24 hours.
ibNetworkMonitorDNSNonAAT1440AvgLatency Indicates the average latency in microseconds of
(Integer) nonauthoritative replies to queries in the last 24 hours.
Table 39.11 describes the objects in ibNetworkMonitorDNSAA. You can send queries to retrieve values for these
objects.
Object
Description
(Type)
ibNetworkMonitorDNSAAT1 File that contains the objects for monitoring the average latency
of authoritative replies to queries in the last minute.
ibNetworkMonitorDNSAAT1AvgLatency Indicates the average latency in microseconds of authoritative
(Integer) replies to queries in the last minute.
ibNetworkMonitorDNSAAT5 File that contains the objects for monitoring the average latency
of authoritative replies to queries in the last five minutes.
ibNetworkMonitorDNSAAT5AvgLatency Indicates the average latency in microseconds of authoritative
(Integer) replies to queries in the last five minutes.
ibNetworkMonitorDNSAAT15 File that contains the objects for monitoring the average latency
of authoritative replies to queries in the last 15 minutes.
ibNetworkMonitorDNSAAT15AvgLatency Indicates the average latency in microseconds of authoritative
(Integer) replies to queries in the last 15 minutes.
ibNetworkMonitorDNSAAT60 File that contains the objects for monitoring the average latency
of authoritative replies to queries in the last 60 minutes.
ibNetworkMonitorDNSAAT60AvgLatency Indicates the average latency in microseconds of authoritative
(Integer) replies to queries in the last 60 minutes.
ibNetworkMonitorDNSAAT1440 File that contains the objects for monitoring the average latency
of authoritative replies to queries in the last 24 hours.
ibNetworkMonitorDNSAAT1440AvgLatency Indicates the average latency in microseconds of authoritative
(Integer) replies to queries in the last 24 hours.
Table 39.12 describes the objects in ibNetworkMonitorDNSSecurity. You receive SNMP traps with these objects when
you enable the following:
• SNMP traps
• DNS network monitoring
• DNS alert monitoring
Object
Description
(Type)
ibNetworkMonitorDNSSecurityInvalidPort Tracks the number of invalid DNS responses that arrive on
invalid ports. For information about invalid ports, see
Monitoring DNS Transactions on page 1350.
This object contains a subtree with six objects that track
invalid ports within a certain time interval. For information,
see Table 39.13.
ibNetworkMonitorDNSSecurityInvalidTxid Tracks the number of invalid TXIDs (DNS transaction IDs).
For information about invalid TXIDs, see Monitoring DNS
Transactions on page 1350.
This object contains a subtree with six objects that track
invalid TXIDs within a certain time interval. For information,
see Table 39.14.
ibNetworkMonitorDNSSecurityInvalidPortOnly Tracks the number of DNS responses with both of the
(Counter) following conditions:
• Arrive on invalid ports
• Have valid TXIDs
ibNetworkMonitorDNSSecurityInvalidTxidOnly Tracks the number of DNS responses with both of the
(Counter) following conditions:
• Arrive on valid ports
• Have Invalid TXIDs
ibNetworkMonitorDNSSecurityInvalidPortCount Tracks the total number of invalid DNS responses that arrive
(Counter) on invalid ports.
ibNetworkMonitorDNSSecurityInvalidTxidCount Tracks the total number of DNS responses that have invalid
(Counter) DNS transaction IDs.
Object
Description
(Type)
ibNetworkMonitorDNSSecurityInvalidPort1 Tracks the number of invalid DNS responses that arrive on
(Integer) invalid ports in the last one minute.
ibNetworkMonitorDNSSecurityInvalidPort5 Tracks the number of invalid DNS responses that arrive on
(Integer) invalid ports in the last five minutes.
ibNetworkMonitorDNSSecurityInvalidPort15 Tracks the number of invalid DNS responses that arrive on
(Integer) invalid ports in the last 15minutes.
ibNetworkMonitorDNSSecurityInvalidPort60 Tracks the number of invalid DNS responses that arrive on
(Integer) invalid ports in the last 60 minutes.
ibNetworkMonitorDNSSecurityInvalidPort1440 Tracks the number of invalid DNS responses that arrive on
(Integer) invalid ports in the last 24 hours.
ibNetworkMonitorDNSSecurityInvalidPortCount Tracks the total number of invalid DNS responses that arrive
(Counter) on invalid ports.
Object
Description
(Type)
ibNetworkMonitorDNSSecurityInvalidTxid1 Tracks the number of DNS responses that have invalid DNS
(Integer) transaction IDs in the last one minute.
ibNetworkMonitorDNSSecurityInvalidTxid5 Tracks the number of DNS responses that have invalid DNS
(Integer) transaction IDs in the last five minutes.
ibNetworkMonitorDNSSecurityInvalidTxid15 Tracks the number of DNS responses that have invalid DNS
(Integer) transaction IDs in the last 15 minutes.
ibNetworkMonitorDNSSecurityInvalidTxid60 Tracks the number of DNS responses that have invalid DNS
(Integer) transaction IDs in the last 60 minutes.
ibNetworkMonitorDNSSecurityInvalidTxid1440 Tracks the number of DNS responses that have invalid DNS
(Integer) transaction IDs in the last 24 hours.
ibNetworkMonitorDNSSecurityInvalidTxidCount Tracks the total number of DNS responses that have invalid
(Counter) DNS transaction IDs.
ibSystemMonitor
As shown in Figure 39.4, ibSystemMonitor (object ID 3.1.1.2.1.2.8) has the following subtrees:
• ibSystemMonitorCpu: Contains ibSystemMonitorCpuUsage (Integer) that reports the CPU usage of the
appliance.
• ibSystemMonitorMem: Contains ibSystemMonitorMemUsage (Integer) that reports the memory usage of the
appliance.
(3.1.1.2.1.8)
ibSystemMonitor
(3.1.1.2.1.8.1)
ibSystemMonitorCpu
(3.1.1.2.1.8.1.1)
ibSystemMonitorCpuUage
(3.1.1.2.1.8.2)
ibSystemMonitorMem
(3.1.1.2.1.8.2.1)
ibSystemMonitorMemUsage
ibMemberServiceStatusTable
As shown in Figure 39.9, ibMemberServiceStatusTable (object ID 3.1.1.2.1.2.9) has one subtree,
ibMemberServiceStatusEntry, which contains the following objects:
• ibServiceName (String) reports the names of the Infoblox services. For a list of Infoblox services, see Infoblox
Services for ibMemberServiceStatusTable.
• ibServiceStatus (Integer) reports the status of the Infoblox services. For a list of service status, see Service
Status on page 1432.
• ibServiceDesc (String) describes the details of the status.
ibMemberServiceStatusTable displays the current status of the Infoblox services on the appliance that you query. For
an HA pair, this table displays the service status of the active node. If the appliance you query is the passive node of
an HA pair, this table reflects the service status of the passive node, which can be “inactive” or “unknown.”
You can also query ibMemberNodeServiceStatusTable and ibMemberPassiveNodeServiceStatusTable that display
system and hardware status on the queried appliance. For information, see ibMemberNodeServiceStatusTable on
page 1432 and ibMemberPassiveNodeServiceStatusTable on page 1433.
(3.1.1.2.1.9)
ibMemberServiceStatusTable
(3.1.1.2.1.9.1)
ibMemberServiceStatusEntry
(3.1.1.2.1.9.1.1)
ibServiceName
(3.1.1.2.1.9.1.2)
ibServiceStatus
(3.1.1.2.1.9.1.3)
ibServiceDesc
Service Status
When you query the service status on an appliance, the response includes the status of the services. Table 39.16
shows the values and descriptions of the status. Note that for internal Grid operations, the NTP service is always in
the “working” state even if it has been disabled through the Infoblox GUI.
ibMemberNodeServiceStatusTable
As shown in Figure 39.10, ibMemberNodeServiceStatusTable (object ID 3.1.1.2.1.10) has one subtree,
ibMemberNodeServiceStatusEntry, which contains the following objects:
• ibMemberNodeServiceName (String) reports the names of the system and hardware services. For a list of
service names, see Infoblox Services for ibMemberServiceStatusTable on page 1430.
• ibMemberNodeServiceStatus (Integer) reports the status of the services. For a list of service status, see Service
Status on page 1432.
• ibMemberNodeServiceDesc (String) describes the details of the status.
ibMemberNodeServiceStatusTable displays the current status of the system and hardware services on the appliance
that you query. For example, when you query an independent appliance, this table shows the information about the
independent appliance. When you query the VIP of an HA pair, this table shows the information about the active
node. For the active node of the HA pair, you can also query ibMemberPassiveNodeStatusTable to get the status of
the passive node. For information, see ibMemberPassiveNodeServiceStatusTable on page 1433.
Note: For an independent appliance and the passive node of an HA pair, no information is returned when you query
ibMemberPassiveNodeServiceStatusTable.
(3.1.1.2.1.10)
ibMemberNodeServiceStatusTable
(3.1.1.2.1.10.1)
ibMemberNodeServiceStatusEntry
(3.1.1.2.1.10.1.1)
ibMemberNodeServiceName
(3.1.1.2.1.10.1.2)
ibMemberNodeServiceStatus
(3.1.1.2.1.10.1.3)
ibMemberNodeServiceDesc
ibMemberPassiveNodeServiceStatusTable
As shown in Figure 39.11, ibMemberPassiveNodeServiceStatusTable (object ID 3.1.1.2.1.2.11) has one subtree,
ibMemberPassiveNodeServiceStatusEntry, which contains the following objects:
• ibMemberPassiveNodeServiceName (String) reports the names of the system and hardware services. For a list
of service names, see Infoblox Services for ibMemberServiceStatusTable on page 1430.
• ibMemberPassiveNodeServiceStatus (Integer) reports the status of the services. For a list of possible service
status, see Service Status on page 1432.
• ibMemberPassiveNodeServiceDesc (String) describes details of the status.
ibMemberPassiveNodeServiceStatusTable displays the current status of the system and hardware services on the
passive node of an HA pair when you query the VIP of the HA pair. For independent appliances and the passive nodes
of HA pairs, this table does not display any status.
(3.1.1.2.1.11)
ibMemberPassiveNodeServiceStatusTable
(3.1.1.2.1.11.1)
ibMemberPassiveNodeServiceStatusEntry
(3.1.1.2.1.11.1.1)
ibMemberPassiveNodeServiceName
(3.1.1.2.1.11.1.2)
ibMemberPassiveNodeServiceStatus
(3.1.1.2.1.11.1.3)
ibMemberPassiveNodeServiceDesc
ibDHCPOne MIB
The ibDHCPOne MIB provides information about address usage within a subnet, DHCP lease statistics, and DHCP
packet counts. It includes two modules, ibDHCPModule for IPv4 data and ibDHCPv6Module for IPv6 data.
ibDHCPModule
Figure 39.12 illustrates the structure of the ibDHCPModule. (Note that the OIDs shown in the illustration do not
include the prefix .1.3.6.1.4.1.7779.) ibDHCPModule contains the following objects:
• ibDHCPSubnetTable provides statistical data about the DHCP operations of the appliance. For information, see
ibDHCPSubnetTable on page 1435.
• ibDHCPStatistics maintains counters for different types of packets. For information, see ibDHCPStatistics on
page 1436.
• ibDHCPDeferredQueuesize tracks the total number of deferred DDNS updates that are currently in the queue to
be retried. When DDNS updates are deferred due to timeout or server issues, the DHCP server puts these
updates in this queue.
• ibDHCPDDNSStats monitors the average latency for the DDNS updates in microseconds and the number of
timeouts during different time intervals. For information, see ibDHCPDDNSStats on page 1437.
(3.1.1.4.1) ibDHCPModule
(3.1.1.4.1.3.1) (3.1.1.4.1.5.1)
(3.1.1.4.1.1.1) ibDHCPDDNSAvgLatency5
ibDhcpTotalNoOfDiscovers
ibDHCPSubnetEntry
(3.1.1.4.1.3.2) (3.1.1.4.1.5.2)
(3.1.1.4.1.1.1.1) ibDhcpTotalNoOfRequests ibDHCPDDNSAvgLatency15
ibDHCPSubnetNetworkAddress
(3.1.1.4.1.3.3) (3.1.1.4.1.5.3)
(3.1.1.4.1.1.1.2) ibDhcpTotalNoOfReleases ibDHCPDDNSAvgLatency60
ibDHCPSubnetNetworkMask
(3.1.1.4.1.3.4) (3.1.1.4.1.5.4)
ibDhcpTotalNoOfOffers ibDHCPDDNSAvgLatency1440
(3.1.1.4.1.1.1.3)
ibDHCPSubnetPercentUsed
(3.1.1.4.1.3.5) (3.1.1.4.1.5.5)
ibDhcpTotalNoOfAcks ibDHCPDDNSTimeoutCount5
(3.1.1.4.1.3.6) (3.1.1.4.1.5.6)
ibDhcpTotalNoOfNacks ibDHCPDDNSTimeoutCount15
(3.1.1.4.1.3.7) (3.1.1.4.1.5.7)
ibDhcpTotalNoOfDeclines ibDHCPDDNSTimeoutCount60
(3.1.1.4.1.3.8) (3.1.1.4.1.5.8)
ibDhcpTotalNoOfInforms ibDHCPDDNSTimeoutCount1440
(3.1.1.4.1.3.9)
ibDhcpTotalNoOthers
ibDHCPSubnetTable
ibDHCPSubnetTable provides statistical data about the DHCP operations of the appliance. It contains the following
objects:
Object
(Type) Description
ibDHCPSubnet Entry File that contains the objects for monitoring DHCP operations on the
appliance.
ibDHCPSubnetNetworkAddress The subnetworks, in IP address format, that have IP addresses for lease. A
(IbIpAddr) subnetwork may have many address ranges for lease.
ibDHCPSubnetNetworkMask The subnet mask in dotted decimal format.
(IbIpAddr)
ibDHCPSubnetPercentUsed The percentage of dynamic DHCP addresses leased out at this time for each
(Integer) subnet. Fixed addresses are always counted as leased for this calculation, if
the fixed addresses are within a leased address range.
ibDHCPStatistics
ibDHCPStatistics maintains counters for different types of packets. The counters always start with zero when the
DHCP service is restarted. Therefore, the numbers reflect the total number of packets received since the DHCP service
was last restarted on the appliance. The ibDHCPStatistics module contains the following objects:
Object
Description
(Type)
ibDhcpTotalNoOfDiscovers The number of DHCPDISCOVER messages that the appliance received. Clients
(Counter) broadcast DHCPDISCOVER messages when they need an IP address and
network configuration information.
ibDhcpTotalNoOfRequests The number of DHCPREQUEST messages that the appliance received. A client
(Counter) sends a DHCPREQUEST message requesting configuration information, after it
receives the DHCPOFFER message.
ibDhcpTotalNoOfReleases The number of DHCPRELEASE messages that the appliance received from its
(Counter) clients. A client sends a DHCP release when it terminates its lease on an IP
address.
ibDhcpTotalNoOfOffers The number of DHCPOFFER messages that the appliance has sent to clients.
(Counter) The appliance sends a DHCPOFFER message to a client. It contains an IP
address and configuration information.
ibDhcpTotalNoOfAcks The number of DHCPACK messages that the appliance sent to clients. It sends
(Counter) a DHCPACK message to a client to confirm that the IP address offered is still
available.
ibDhcpTotalNoOfNacks The number of DHCPNACK messages that the appliance sent to clients. It sends
(Counter) a DHCPNACK message to withdraw its offer of an IP address.
ibDhcpTotalNoOfDeclines The number of DHCPDECLINE messages that the appliance received. A client
(Counter) sends a DHCPDECLINE message if it determines that an offered IP address is
already in use.
ibDhcpTotalNoOfInforms The number of DHCPINFORM messages that the appliance received. A client
(Counter) sends a DHCPINFORM message when it has an IP address but needs
information about the network.
ibDhcpTotalNoOfOthers The total number of DHCP messages other than those used in negotiation, such
(Counter) as DHCPFORCERENEW, DHCPKNOWN, and DHCPLEASEQUERY.
ibDHCPDDNSStats
ibDHCPDDNSStats monitors the average latency for the DHCP DDNS updates in microseconds and the number of
timeouts during different time intervals. The ibDHCPDDNSStats module contains the following objects:
Object
Description
(Type)
ibDHCPDDNSAvgLatency5 Indicates the average latency in microseconds of the DHCP DDNS updates in
(Integer) the last five minutes.
ibDHCPDDNSAvgLatency15 Indicates the average latency in microseconds of the DHCP DDNS updates in
(Integer) the last 15 minutes.
ibDHCPDDNSAvgLatency60 Indicates the average latency in microseconds of the DHCP DDNS updates in
(Integer) the last 60 minutes.
ibDHCPDDNSAvgLatency1440 Indicates the average latency in microseconds of the DHCP DDNS updates in
(Integer) the last 24 hours.
ibDHCPDDNSTimeoutCount5 The number of timeouts for the DHCP DDNS updates in the last five minutes.
(Integer)
ibDHCPDDNSTimeoutCount15 The number of timeouts for the DHCP DDNS updates in the last 15 minutes.
(Integer)
ibDHCPDDNSTimeoutCount60 The number of timeouts for the DHCP DDNS updates in the last 60 minutes.
(Integer)
ibDHCPDDNSTimeoutCount1440 The number of timeouts for the DHCP DDNS updates in the last 24 hours.
(Integer)
ibDHCPv6Module
Figure 39.14 illustrates the structure of the ibDHCPv6Module, which contains the following objects:
• ibDHCPv6SubnetTable provides statistical data about the DHCPv6 operations of the appliance. For information,
see ibDHCPv6SubnetTable on page 1439.
• ibDHCPv6Statistics maintains counters for different types of packets. For information, see ibDHCPv6Statistics
on page 1439.
• ibDHCPv6DeferredQueuesize tracks the total number of deferred DDNS updates that are currently in the queue
to be retried. When DDNS updates are deferred due to timeout or server issues, the DHCP server puts these
updates in this queue.
• ibDHCPv6DDNSStats monitors the average latency for the DDNS updates in microseconds and the number of
timeouts during different time intervals. For information, see ibDHCPv6DDNSStats on page 1440.
(3.1.1.4.2.3.1) (3.1.1.4.2.5.1)
(3.1.1.4.2.1.1) ibDhcpv6TotalNoOfSolicits ibDHCPv6DDNSAvgLatency5
ibDHCPv6SubnetEntry
(3.1.1.4.2.3.2) (3.1.1.4.2.5.2)
(3.1.1.4.2.1.1.1) ibDhcpv6TotalNoOfRequest ibDHCPv6DDNSAvgLatency15
ibDHCPv6SubnetNetworkAddress s
(3.1.1.4.2.3.3) (3.1.1.4.2.5.3)
(3.1.1.4.2.1.1.2) ibDhcpv6TotalNoOfReleases ibDHCPv6DDNSAvgLatency60
ibDHCPv6SubnetNetworkMask
(3.1.1.4.2.3.4) (3.1.1.4.2.5.4)
ibDhcpv6TotalNoOfAdvertises ibDHCPv6DDNSAvgLatency1440
(3.1.1.4.2.3.5) (3.1.1.4.2.5.5)
ibDhcpv6TotalNoOfReplys ibDHCPv6DDNSTimeoutCount5
(3.1.1.4.2.3.6) (3.1.1.4.2.5.6)
ibDhcpv6TotalNoOfRenews ibDHCPv6DDNSTimeoutCount15
(3.1.1.4.2.3.7) (3.1.1.4.2.5.7)
ibDhcpv6TotalNoOfRebinds ibDHCPv6DDNSTimeoutCount60
(3.1.1.4.2.5.8)
(3.1.1.4.2.3.8) ibDHCPv6DDNSTimeoutCount1440
ibDhcpv6TotalNoOfDeclines
(3.1.1.4.2.3.9)
ibDhcpv6TotalNoOfInformationRequests
(3.1.1.4.2.3.10)
ibDhcpv6TotalNoOthers
ibDHCPv6SubnetTable
ibDHCPSubnetTable provides statistical data about the DHCPv6 operations of the appliance. It contains the following
objects:
Object
(Type) Description
ibDHCPv6Subnet Entry File that contains the objects for monitoring DHCPv6 operations on the
appliance.
ibDHCPv6SubnetNetworkAddress The subnetworks, in IPv6 address format, that have IPv6 addresses for lease.
(IbIpAddr) A subnetwork may have many address ranges for lease.
ibDHCPv6SubnetNetworkMask The subnet mask in CIDR notation format.
(IbIpAddr)
ibDHCPv6Statistics
ibDHCPv6Statistics maintains counters for different types of packets. The counters always start with zero when the
DHCP service is restarted. Therefore, the numbers reflect the total number of packets received since the DHCP service
was last restarted on the appliance. The ibDHCPv6Statistics module contains the following objects:
Object
Description
(Type)
ibDhcpv6TotalNoOfSolicits The number of Solicit messages that the Grid member received,
(Counter) including Solicit messages embedded in Relay-Forward messages. A
DHCP client sends a Solicit message to locate DHCP servers.
ibDhcpv6TotalNoOfRequests The number of Request messages that the Grid member received. A
(Counter) DHCP client sends a Request message to request one or more IP
addresses and configuration parameters from a DHCP server.
ibDhcpv6TotalNoOfReleases The number of Release messages that the Grid member received. A
(Counter) DHCP client sends a Release message when it terminates its lease
and releases its IP address.
ibDhcpv6TotalNoOfAdvertises The number of Advertise messages that the Grid member sent. When
(Counter) a DHCP server receives a Solicit message, it can respond with an
Advertise message to indicate that the server is available for DHCP
service.
ibDhcpv6TotalNoOfReplies The number of Reply messages that the Grid member sent. A DHCP
(Counter) server sends a Reply message that includes IP addresses and
configuration parameters when it responds to Solicit, Request, Renew
or Rebind message. It sends a Reply message with configuration
parameters only when it responds to an Information-Request
message.
ibDhcpv6TotalNoOfRenews The number of Renew messages that the Grid member received. A
(Counter) DHCP client sends a Renew message to a DHCP server to extend the
lifetimes on the leases granted by the DHCP server and to update
other properties.
Object
Description
(Type)
ibDhcpv6TotalNoOfRebinds The number of Rebind messages that the Grid member received. A
(Counter) DHCP client sends a Rebind message to extend the lifetime of its
lease and to update configuration parameters.
ibDhcpv6TotalNoOfDeclines The number of Decline messages that the Grid member received. A
(Counter) DHCP client sends a Decline message to a DHCP server when it
discovers that the IP address offered by a DHCP server is already in
use.
ibDhcpv6TotalNoOfInformationRequests The number of Information-Request messages that the Grid member
(Counter) received. A client sends an Information-Request message to retrieve
configuration parameters, such as the IP addresses of DNS servers in
the network.
ibDhcpv6TotalNoOfOthers The total number of DHCP messages other than those used in
(Counter) negotiation.
ibDHCPv6DDNSStats
ibDHCPv6DDNSStats monitors the average latency for the DHCPv6 DDNS updates in microseconds and the number
of timeouts during different time intervals. The ibDHCPv6DDNSStats module contains the following objects:
Object
Description
(Type)
ibDHCPv6DDNSAvgLatency5 Indicates the average latency in microseconds of the DHCPv6 DDNS updates
(Integer) in the last five minutes.
ibDHCPv6DDNSAvgLatency15 Indicates the average latency in microseconds of the DHCPv6 DDNS updates
(Integer) in the last 15 minutes.
ibDHCPv6DDNSAvgLatency60 Indicates the average latency in microseconds of the DHCPv6 DDNS updates
(Integer) in the last 60 minutes.
ibDHCPv6DDNSAvgLatency1440 Indicates the average latency in microseconds of the DHCPv6 DDNS updates
(Integer) in the last 24 hours.
ibDHCPv6DDNSTimeoutCount5 The number of timeouts for the DHCPv6 DDNS updates in the last five
(Integer) minutes.
ibDHCPv6DDNSTimeoutCount15 The number of timeouts for the DHCPv6 DDNS updates in the last 15
(Integer) minutes.
ibDHCPv6DDNSTimeoutCount60 The number of timeouts for the DHCPv6 DDNS updates in the last 60
(Integer) minutes.
ibDHCPv6DDNSTimeoutCount144 The number of timeouts for the DHCPv6 DDNS updates in the last 24 hours.
0
(Integer)
ibDNSOne MIB
The ibDNSOne MIB provides DNS statistics about all zones in all views. Figure 39.15 illustrates the structure of the
ibDNSOne MIB. (Note that the OIDs shown in the illustration do not include the prefix 1.3.6.1.4.1.7779.) The
ibDNSOne MIB contains four subtrees: ibZoneStatisticsTable (Counter64), ibZonePlusViewStatisticsTable
(Counter64), ibDDNSUpdateStatistics (Counter64), and ibBindZoneTransferCount (Counter64).
(3.1.1.3.1) ibDnsModule
(3.1.1.3.1.1.1) (3.1.1.3.1.2.1)
ibZoneStatisticsEntry ibZonePlusViewStatisticsEntry (3.1.1.3.1.3.1)
ibDDNSUpdateSuccess
(3.1.1.3.1.1.1.1) (3.1.1.3.1.2.1.1)
ibBindZoneName ibBindZonePlusViewNa (3.1.1.3.1.3.2)
me ibDDNSUpdateFailure
(3.1.1.3.1.1.1.2) (3.1.1.3.1.2.1.2)
ibBindZoneSuccess ibBindZonePlusViewSucces (3.1.1.3.1.3.3)
s ibDDNSUpdateReject
(3.1.1.3.1.1.1.3) (3.1.1.3.1.2.1.3)
ibBindZoneReferral ibBindZonePlusViewReferral (3.1.1.3.1.3.4)
ibDDNSUpdatePrerequisiteReject
(3.1.1.3.1.1.1.4) (3.1.1.3.1.2.1.4)
ibBindZoneNxRRset ibBindZonePlusViewNxRRset
(3.1.1.3.1.1.1.5) (3.1.1.3.1.2.1.5)
ibBindZoneNxDomain ibBindZonePlusViewNxDomain
(3.1.1.3.1.1.1.6) (3.1.1.3.1.2.1.6)
ibBindZoneRecursion ibBindZonePlusViewRecursion
(3.1.1.3.1.1.1.7) (3.1.1.3.1.2.1.7)
ibBindZoneFailure ibBindZonePlusViewFailure
(3.1.1.3.1.2.1.8)
ibBindViewName
ibZoneStatisticsTable
ibZoneStatisticsTable contains DNS statistics of all zones in the default DNS view. DNS statistics of user-defined DNS
views are captured in ibZonePlusViewStatisticsTable. For information, see ibZonePlusViewStatisticsTable on page
1443.
ibZoneStatisticsTable includes a “summary” zone that provides global statistics for the DNS server, including
statistics for all zones in the default and user-defined DNS views.
The syntax of the objects in ibZoneStatisticsTable uses a Counter64 format. In some cases, the counter format may
not be compatible with SNMP toolkits that use a 32-bit counter. Ensure that you reconfigure or update these tools to
use the Counter64 format. ibZoneStatisticsTable contains the following objects:
Object
Description
(Type)
ibBindZoneName DNS zone name. The index name for global statistics is “summary.”
(IbString)
ibBindZoneSuccess The number of successful responses since the DNS process started.
(Counter64)
ibBindZoneReferral The number of DNS referrals since the DNS process started.
(Counter64)
ibBindZoneNxRRset The number of DNS queries received for non-existent records.
(Counter64)
ibBindZoneNxDomain The number of DNS queries received for non-existent domains.
(Counter64)
ibBindZoneRecursion The number recursive queries received since the DNS process started.
(Counter64)
ibBindZoneFailure The number of failed queries since the DNS process started.
(Counter64)
ibZonePlusViewStatisticsTable
ibZonePlusViewStatisticsTable provides DNS statistics about all zones in user-defined DNS views. DNS statistics
about zones in the default view are captured in ibZoneStatisticsTable. Note that information in
ibZonePlusViewStatisticsTable is rolled up to the “summary” zone in ibZoneStatisticsTable. For information, see
ibZoneStatisticsTable on page 1441.
The syntax of the objects in ibZonePlusViewStatisticsTable uses a Counter64 format. In some cases, the counter
format may not be compatible with SNMP toolkits that use a 32-bit counter. Ensure that you reconfigure or update
these tools to use the Counter64 format. ibZonePlusViewStatisticsTable contains the following objects:
Object
Description
(Type)
ibBindZonePlusViewName The zone name.
(IbString)
ibBindZonePlusViewSuccess The number of successful responses since the DNS process started.
(Counter64)
ibBindZonePlusViewReferral The number of DNS referrals since the DNS process started.
(Counter64)
ibBindZonePlusViewNxRRset The number of DNS queries received for non-existent records.
(Counter64)
ibBindZonePlusViewNxDomain The number of DNS queries received for non-existent domains.
(Counter64)
ibBindZonePlusViewRecursion The number of queries that caused recursion since the DNS process started.
(Counter64)
ibBindZonePlusViewFailure The number of failed queries since the DNS process started.
(Counter64)
ibBindViewName The DNS view name.
(IbString)
index ibBindZoneNameibBindZoneSuccessibBindZoneReferralibBindZoneNxRRset
ibBindZoneNxDomainibBindZoneRecursionibBindZoneFailure
=====================================================================================================
“abc.com”abc.com000
0 0 0
“summary”summary500
0 0 0
“internal.com”internal.com100
0 0 0
index ibBindZonePlusViewNameibBindZonePlusViewSuccessibBindZonePlusViewReferralibBindZonePlusViewNxRRset
ibBindZonePlusViewNxDomainibBindZonePlusViewRecursionibBindZonePlusViewFailureibBindViewName
=====================================================================================================
“ext1.com”ext1.com100
0 00 DNS1
“ext2.com”ext2.com200
0 00 DNS1
“ext3.com”ext3.com000
0 00 DNS2
Use the ibBindZoneSuccess object in both tables to determine the total number of recursive queries. If your DNS
server is a caching-only server, the total number of recursive queries is the number indicated in the
ibBindZoneSuccess object of the “summary” zone. In this example, for a caching-only server, the total number of
recursive queries is 5.
If your DNS server is an authoritative server, add all the numbers in ibBindZoneSuccess for all zones in both tables,
excluding the “summary” zone. In this example, the total is 4. You then subtract this number from the number in
ibBindZoneSuccess of the “summary” zone. In this case, the total number of recursive queries is 1 for an
authoritative DNS server.
ibDDNSUpdateStatistics
ibDDNSUpdateStatistics provides statistical data about DDNS updates. The counters always start with zero when the
DNS service is restarted. They report the total numbers since the DNS service was last restarted.
ibDDNSUpdateStatistics contains the following objects:
Object
Description
(Type)
ibDDNSUpdateSuccess The number of successful dynamic DNS updates.
(Counter64)
ibDDNSUpdateFailure The number of all failed dynamic DNS updates, excluding those reported by
(Counter64) the ibDDNSUpdateReject object.
ibDDNSUpdateReject The number of dynamic DNS updates that failed because they were denied
(Counter64) by the DNS server.
ibDDNSUpdatePrerequisiteReject The number of dynamic DNS updates that failed because the prerequisites
(Counter64) were not satisfied. This is also included in the total number of failures
reported by the ibDDNSUpdateFailure object.
ibBindZoneTransferCount
ibBindZoneTransferCount (Counter64) provides the total number of successful zone transfers from an Infoblox
primary or secondary DNS server to a DNS client, since the DNS service was last restarted. Note that this counter
tracks the number of successful full zone transfers (AXFRs) and incremental zone transfers (IXFRs).
IB-DNSSERV-MIB
The IB-DNSSERV-MIB contains one object, ibDnsServConfig, which reports the DNS BIND version implemented by the
NIOS software.
IB-DNSHITRATIO-MIB
The IB-DNSHITRATIO-MIB contains one object, ibDnsHitRatio, which provides information about the DNS cache hit
ratio. Note that the MIB variable (ibDNSOne) for cache hit rate has an OID of 1.3.6.1.4.1.7779.3.1.1.3.1.5.0, where
1.3.6.1.4.1.7779 is the prefix.
IB-DNSQUERYRATE-MIB
The IB-DNSQUERYRATE-MIB contains one object, ibDnsQueryRate, which provides information about the DNS queries
per second. Note that the MIB variable (ibDNSOne) for DNS query rate has an OID of 1.3.6.1.4.1.7779.3.1.1.3.1.6.0,
where 1.3.6.1.4.1.7779 is the prefix.
IB-DHCPSERV-MIB
The IB-DHCPSERV-MIB contains one object, ibDhcpv4ServerSystemDescr, which provides the DHCP server name and
its DHCP version.
Note: Infoblox Reporting and Analytics integrates with Splunk to deliver an enhanced reporting interface so you can
create dashboards, reports, and alerts. This chapter attempts to explain all reporting functionality you can
perform through the enhanced interface. However, you may need to refer to the Splunk documentation for
certain functionality as indicated in specific sections of this chapter. In addition, some functions and
capabilities referenced in the Splunk documentation are not available or applicable to the Infoblox Reporting
and Analytics as some Splunk functionality in the Infoblox product may be limited or modified by Infoblox.
Infoblox does not represent or warrant that Infoblox Reporting and Analytics will function in accordance with
the Splunk documentation. Infoblox is also not responsible for the accuracy of the Splunk documentation. For
Infoblox Reporting and Analytics technical support, contact Infoblox Technical Support. DO NOT contact
Splunk.
When you set up a reporting appliance with valid licenses in the Grid, the reporting server acts as an indexer that
collects data from Grid members while the members are forwarders that transmit information to the reporting
appliance. The reporting appliance indexes all raw data and transforms it into searchable events. Depending on your
needs, you can enable certain Grid members as forwarders and disable others so the reporting server receives only
the information you need from specific members. The following diagram depicts the high-level configuration of the
NIOS reporting service:
You can set up an appliance solely for reporting purposes and install a valid reporting license on it. You cannot add
licenses to run other services, such as DNS and DHCP, on a reporting appliance. You can configure any of the
supported Trinzic Reporting platforms as a Grid member and configure it as a reporting appliance. For information
about Infoblox platforms that support reporting, see Supported Reporting Appliances and Storage Space on page
1456.
The Infoblox reporting solution supports both IPv4 and IPv6 networks and you can configure a reporting member in
IPv4, IPv6, or in dual mode (IPv4 and IPv6) network environment. An IPv4 reporting member uses IPv4 as the
communication protocol, so you can add an IPv4 reporting member to an IPv4 or dual mode Grid. An IPv6 reporting
member uses IPv6 as the Grid communication protocol, so you can add an IPv6 reporting member to an IPv6 or dual
mode Grid. But a dual mode reporting member can use either IPv4 or IPv6 as the communication protocol, so you can
add a dual mode reporting member to an IPv4, IPv6, or a dual mode Grid. For more information about how to set up
the communication protocol, see Changing the Communication Protocol for a Dual Mode Appliance on page 302.
To enable and configure the Infoblox reporting solution on supported reporting appliances, complete the following:
1. Install a valid Reporting license on the reporting appliance, as described in Licensing Requirements on page
1452.
2. Set administrative permissions, as described in Administrative Permissions on page 1454.
3. Configure reporting properties, as described in Grid Reporting Properties on page 1462.
Licensing Requirements
You must install a valid Reporting license on the reporting appliance to use the reporting feature. Infoblox offers
perpetual and subscription licensing models (programs) to meet your business needs. You can transfer a valid
license to any reporting member in the Grid. You must obtain a new replacement license from Infoblox if you want to
transfer an existing license to another member.
You can use one of the following reporting licensing program:
Perpetual Licensing: There is no expiration date for this licensing type and you can use the Infoblox reporting service
for the lifetime of an appliance.
Subscription Licensing: This model has an expiration date and the Infoblox GUI displays a 60-day warning prior to the
actual expiration date. During a license violation period, NIOS continues to index data but the search function will
cease to be operational. This means that the Reporting tab is available with the following warning message displayed:
"Reporting Service is unavailable." The effective start date for this license type starts on the day you generate a
subscription license.
Installing a Perpetual license on the appliance that already has the Subscription license installed removes the
Subscription license. You can install only one Perpetual license on the appliance.
Note: Contact your Infoblox representative for pricing and availability information. You cannot install a Perpetual or
Subscription license when you have already installed a valid DNS, DHCP, MS Management, Query Redirection,
and Multi-Grid Management license on an appliance.
Upgrade Implications
When you upgrade from a previous NIOS release to NIOS 7.3.x and later, there are some significant changes to the
Reporting and Analytics feature.
Some of the important changes are as follows:
• Terminology: The following table lists the terminology differences when you upgrade:
• Object Management: NIOS no longer manages reporting objects such as searches, smart folders, alerts, and
reports. You will not be able to perform operations such as global search, quick filtering, bookmarking, and
others for these objects. You can now manage these objects through the new user interface.
• Permissions: Permissions for all reporting objects are migrated to the new Reporting and Analytics solution and
managed through the new user interface after an upgrade. You may see the new built-in role, Everyone, when
configuring Reporting permissions. For best practices, do not alter permissions for this new built-in role. Note
that the Reporting Dashboard and Reporting Search global permissions have been removed. If an admin group
or admin role was granted these permissions before an upgrade, the permissions will still be displayed after an
upgrade. However, they won’t take any effect. The Grid Reporting Properties permission is retained. In addition,
reporting object permissions for dashboards and searches (including global dashboards and searches) are
migrated. These object permissions are retained for applicable migrated users. If permissions were granted to a
specific admin group for a dashboard or search before an upgrade, only these admin users and superusers
have permissions to access the migrated dashboard and report after an upgrade. If a limited-access user group
is created through the new interface after the upgrade, users in this admin group will not be able to access the
dashboard and report even if they are granted access to the Infoblox Reporting and Analytics App. Superusers
must explicitly grant permissions to this limited-access admin group for users in this group to access the
dashboard and report. For more information, see Granting Permissions on page 1454.
• Navigation and Visualization: Navigations for some reporting functions, such as searches, alerts, email and
page settings, and email PDF delivery, have changed. You can navigate through the new user interface to get
familiar with the changes in this release. In addition, all predefined reports might look different than the
traditional ones depending on your filtering configuration. The Grid Reporting Properties editor and Groups tab
are moved under the Administration tab–> Reporting tab.
• Extensible Attributes: The reports that supported filtering and grouping by multiple extensible attributes are
migrated into new interface with filtering and grouping only by the extensible attribute Site. You must clone the
dashboard, add filter inputs and modify the view XML to support additional extensible attributes. For
information, see Editing the XML Source Code of a Dashboard on page 1486
• Searches and Reports: Only NIOS system and global reports and searches are migrated to NIOS 7.3.0 and later
version as dashboards and reports respectively. All user private reports and searches are dropped. In addition,
bookmarked reports and searches are not migrated to 7.3.x release. If you want to keep any customizations for
the user private dashboards and reports, do one of the following:
— Create global dashboards and reports with the same settings.
— After upgrade, you can clone the corresponding migrated system or global dashboards and reports, and
then reconfigure the original settings, such as filters and scheduling in the new user interface.
• Custom Search: You can create your own search pattern and save it as a dashboard or report. For information,
see About Searches on page 1472.
After completing the NIOS upgrade successfully, make sure that you configure the Grid Reporting properties and (FTP
or SCP or TFTP) server to export search results. For information, see Configuring Grid Reporting Properties on page
1463 and Configuring Server to Export Search Results on page 1455.
Administrative Permissions
You must have the appropriate permissions to access, view, edit, and clone the searches, dashboards, reports, and
alerts that are available in the Reporting tab. NIOS synchronizes all users and admin groups as users and roles on the
reporting server. In NIOS, admin groups may have the setting “superusers” enabled or disabled. NIOS groups that
have “superusers” enabled will correspond to role with administrative permissions on the reporting server. This
documentation will refer to this role as a superuser role and the associated users as superusers. NIOS groups that do
not have “superusers” enabled will not have administrative permissions on the reporting server. This role will be
referred to as a non-superuser role and the associated users are limited-access users. The default NIOS admin group
“admin-group” will have a superuser role on the reporting server called “infoblox-admin-role.” The default NIOS
admin named “admin” will have a user name on the reporting server called “infoblox-admin.”
By default, users with a superuser role will have access to the Reporting and Analytics App and users with a
non-superuser role will not. Superusers can grant access to the Reporting and Analytics App to non-superusers.
Non-superusers will not have access to the Reporting tab until superusers grant them this access. For information
about Splunk roles, refer to the Splunk documentation.
When configuring NIOS, only superuser and users with the Grid Reporting Properties permission can configure Grid
Reporting Properties. Limited-access users can view the Grid Reporting Properties. When superusers create or delete
any admin groups in NIOS, the corresponding roles are created or deleted on the reporting server. You cannot directly
create or delete roles on the reporting server. If superuser permission is granted or removed from a NIOS group, this
permission change will be reflected in the corresponding role on the reporting server. For information about granting
permissions, see Granting Permissions on page 1454.
Note: Limited-access users cannot create, modify, and delete any user role for the Splunk App.
Granting Permissions
Superusers can grant App permissions to limited-access users. Permissions for all reporting objects are migrated to
the new Reporting solution and managed through the new user interface after an upgrade. You may see some new
built-in roles, such as Everyone, when configuring Reporting permissions. For best practices, do not alter permissions
for these new built-in roles. In addition, Reporting Dashboard and Reporting Search global permissions have been
removed. If an admin group or admin role was granted these permissions before an upgrade, the permissions will still
be displayed after an upgrade. However, they won’t take any effect. The Grid Reporting Properties permission is
retained.
To set permissions:
1. From the Reporting tab -> select the Administration tab.
2. Click Permission to manage permissions.
3. In the App Permissions, set permissions to Read and/or Write for the roles listed. You must have at least one
permission (Read or Write) to execute a task on the Reporting tab.
4. Click Save.
Editing Permissions
Users can edit permissions for objects where they are the owner, such as dashboards, reports and alerts. When a
user creates a new report, dashboard or an alert, It is only available to that user. To make that object available to other
users, you can do the following (only if your permissions allow you to do so):
• Make an object available to all users.
• Restrict or expand access to all or specific objects by roles.
• Set Read or Write permissions at the Reporting level for roles. For information about users and roles, refer to the
Splunk documentation.
To modify permissions:
1. From the Reporting tab -> select Dashboards or Reports or Alerts.
2. From the Edit drop-down list, select Edit Permissions.
3. Specify the following:
— Display for Owner, App, or All Apps. For more information about All Apps permissions, refer to the Splunk
documentation.
— Read and write privileges for users. By default, the permissions are set on the object. You cannot remove
the Read and Write permissions completely. However, you can change this permissions from Read to Write
or vice versa, based on your permissions. For more information about permissions, refer to the Splunk
documentation.
4. Click Save.
Figure 40.3 Setup Page to specify Server for Exporting Search Results
Table 40.2 Infoblox Reporting Appliances and their Usable Reporting Hard Disk Space
Note: The daily maximum data consumption includes all DNS, DDNS, IPAM, DHCP, Discovery, and system traffic or
events from all members with data transmission enabled within the Grid. When data traffic exceeds the daily
maximum, the reporting server sends an SNMP trap and email notification, if configured. After five (5) daily
maximum warnings in a rolling period of 30 days, you cannot view dashboards or perform any report related
functions. You must then contact Infoblox Technical Support to resolve the issue. Note that the reporting
server continues to process incoming data during the violation state. However, you cannot view any reports or
manage any reporting related functions until you fix the violation issue.
** support for Reporting appliance models IB-VM-800, IB-VM-1400 starts from Microsoft Windows 2012 R2.
Appliance model IB-VM-800 and IB-VM-1400 (Reporting) is supported for Microsoft Windows 2012 R2.
For information about the Trinzic Reporting platforms, their specifications, and how to install them as reporting
appliances, refer to the respective installation guides, available on the Infoblox Support site.
Table 40.3 lists the reports provided by the reporting server, report categories, and the source type, data source type
(file or script based), and queue data update frequencies for each report:
Table 40.3 Report Categories, Related Data Sources, and Update Frequencies
Data Source
Report Reports Source Type
(File Based
Update Frequency
Category or Script
Based)
Device Inactive IP Addresses ib:reserved2 File based Rotates at 120 MB;
(syslog) retains one older
copy; queued data is
between 120 MB
and 240 MB
Port Capacity Utilization by Device ib:reserved2 File based Overwritten every 6
Port Capacity Trend (csv) hours
Port Capacity Delta by Device
DHCP DHCP Message Rate Trend ib:dhcp:message File based Overwritten every 1
Performance (csv) minute
DHCPv4 Usage Trend ib:dhcp:range File based Overwritten every 1
DHCPv4 Range Utilization Trend (csv) hour
DHCP Lease DHCP Lease History ib:dhcp:lease_history File based Rotates at 120 MB;
History DHCP Top Lease Clients (syslog) retains one older
copy; queued data is
between 120 MB
and 240 MB
DHCP Top Devices Identified ib:dhcp:lease_history File based Based on summary
Fingerprint Device Trend (syslog) search report, which
is updated during
Device Class Trend
the 16th and 46th
Top Device Classes minutes of each hour
Top Devices Denied an IP Address ib:dhcp:lease_history File based Based on summary
(syslog) search report, which
is updated during
the 19th and 49th
minutes of each hour
Device Fingerprint Change ib:dhcp:lease_history File based Executed every 24
Detected (syslog) hours
DNS DNS Response Latency Trend ib:dns:perf Script based Executed every 1
Performance minute
DNS Record DNS Scavenged Object Count ib:dns:reserved File based
Scavenging Trend (csv)
DNS Query DNS Domain Query Trend ib:dns:capture File based Updated whenever
Capture DNS Domains Queried by Client (csv) the Data Collection
VM collects capture
Top DNS Clients by Query Type
query data from a
Top DNS Clients Querying MX Grid member
Records
Data Source
Report (File Based
Category Reports Source Type or Script Update Frequency
Based)
DDNS DDNS Update Rate Trend ib:ddns File based Rotates at 120MB;
(syslog) retains one older
copy; queued data is
between 120MB and
240MB.
DNS Traffic DNS Traffic Control Resource ib:dns:reserved File based Based on summary
Control Availability Trend (csv) search report, which
is updated once per
six hour at 47th
minute of each hour.
With each execution,
it summarizes raw
events indexed from
370 minutes ago to
10 minutes ago.
DNS Traffic Control Resource ib:dns:reserved File based Based on summary
Availability Status (csv) search report, which
is updated once per
six hour at 47th
minute of each hour.
With each execution,
it summarizes raw
events indexed from
370 minutes ago to
10 minutes ago.
DNS Traffic Control Resource Pool ib:dns:reserved File based Based on summary
Availability Trend (csv) search report, which
is updated once per
six hour at 23rd
minute of each hour.
With each execution,
it summarizes raw
events indexed from
370 minutes ago to
10 minutes ago.
DNS Traffic Control Resource Pool ib:dns:reserved File based Based on summary
Availability Status (csv) search report, which
is updated once per
six hour at 23rd
minute of each hour.
With each execution,
it summarizes raw
events indexed from
370 minutes ago to
10 minutes ago.
Data Source
Report (File Based
Category Reports Source Type or Script Update Frequency
Based)
DNS Traffic Control Response ib:dns:reserved File based Based on summary
Distribution Trend (csv) search report, which
is updated once per
six hour at 37th
minute of each hour.
With each execution,
it summarizes raw
events indexed from
370 minutes ago to
10 minutes ago.
DDI DHCPv4 Usage Statistics ib:dhcp:network File based Overwritten every 1
Utilization DHCPv4 Top Utilized Networks (csv) hour
DNS Zone Statistics Per DNS View ib:dns:view File based Overwritten every 24
(csv) hours
DNS Statistics per Zone ib:dns:zone File based Overwritten every 24
(csv) hours
System CPU Utilization Trend ib:system Script based Executed every 1
Utilization Memory Utilization Trend minute
Traffic Rate by Member
License Pool Utilization ib:system File based Overwritten every 24
(csv) hours
DNS Query DNS Replies Trend ib:dns:stats Script based Executed every 1
minute
DNS Cache Hit Rate Trend ib:dns:query:cache_hi Script based Executed every 1
t_rate minutes
DNS Query Rate by Query Type ib:dns:query:qps Script based Executed every 1
minute
DNS Query Rate by Member ib:dns:query:by_mem Script based Executed every 1
DNS Daily Query Rate by Member ber minute
DNS Daily Peak Hour Query Rate
by Member
DNS Top Clients ib:dns:query:top_clien Script based Executed every 10
ts minutes
DNS Top Requested Domain ib:dns:query:top_requ Script based Executed every 10
Names ested_domain_names minutes
Data Source
Report (File Based
Category Reports Source Type or Script Update Frequency
Based)
DNS Top Clients Per Domain ib:dns:reserved Script based Executed every 10
DNS Top NXDOMAIN / NOERROR minutes
(no data)
DNS Top SERVFAIL Errors Received
DNS Top SERVFAIL Errors Sent
DNS Top Timed-Out Recursive
Queries
DNS Query Trend per IP Block ib:dns:reserved Script based Executed every 5
Group minutes
Security DNS Top RPZ Hits ib:dns:reserved Script based Executed every 10
minutes
DNS Top RPZ Hits by Clients ib:dns:reserved Script based Executed every 10
minutes
Top DNS Firewall Hits ib:dns:reserved Script based Executed every 10
minutes
Malicious Activity by Client ib:dns:reserved Script based Executed every 10
minutes
DNS Firewall Executive Threat ib:dns:reserved Script based Executed every 10
Report minutes
FireEye Alerts ib:syslog Script based Updated
immediately when
alerts are logged in
the syslog.
Threat Protection Event Count By ib:reserved1 File based Overwritten every 5
Severity Trend (csv) minutes.
Threat Protection Event Count By
Member Trend
Threat Protection Event Count By
Rule
Threat Protection Event Count By
Time
Threat Protection Event Count By
Category
Threat Protection Event Count By
Member
DNS Top Tunneling Activity ib:reserved1 File based Overwritten every 5
DNS Tunneling Traffic by Category (csv) minutes.
Top Malware and DNS Tunneling
Events by Client
Ecosystem User Login History ib:reserved1 File based
Subscription Data (csv)
Publish Data
Data Source
Report (File Based
Category Reports Source Type or Script Update Frequency
Based)
Cloud VM Address History ib:reserved2 File based Updated
(csv) immediately when
there is a change
related to the VM IP
address. Rotates at
300MB and retains
one older copy.
Audit Log Audit Log Events ib:audit File based Updated
(audit log) immediately when
the audit log is
updated.
Note: When you reset the appliance using the CLI command reset all or reset the database using the CLI
command reset database, the reporting configurations are not preserved. If you reset the appliance, you
must configure Grid reporting properties and remote server settings to use the reporting service.
Note: For usable reporting hard disk space for each appliance model, see Table 40.2.
Table 40.4 Default Index Space Configured for Each Report Category
Default Index Space (%) Total Reporting Disk Space Used for
Report Category
Adjustable by User Index Storage (GB)
Audit Log 0%
DNS Query 20% Usable reporting hard disk space x 20%
DNS Performance
DDNS
DNS Record Scavenging
Cloud 0%
Device 0%
Ecosystem Subscription 0%
Ecosystem Publication
License 0%
Note: The member configured as an indexer displays only the Audit Log category.
Note: To enable threat protection reports, you must select the Security report category in the Grid Reporting
Properties editor. To select the Security check box, go to the Reporting tab -> Grid Reporting Properties ->
General tab -> Basic tab -> select the Security check box under Report Category. Ensure that you set the Security
Index% to an optimal level so the reporting database has enough storage space to accommodate all reporting
data. For information about how to configure the index %, see Configuring Grid Reporting Properties on page
1463.
Note: You have to select the Security check box before you define values here. To select the check box, Reporting tab
-> Grid Reporting Properties -> General tab -> Basic tab -> select the check box Security under Report Category.
Note: The appliance restarts the DNS service after you assign or unassign an IP block group at the Grid or member
level. Also, the appliance restarts the DNS service when you modify or delete an IP address or IP block group
assigned to the Grid or member or when you add, modify, or delete an IP block in such IP block groups.
• Import and export groups in CSV format. For more information about CSV import feature, see About CSV Import
on page 101.
Note: You can perform inline editing by double-clicking the row of data that you want to modify. The appliance
displays the inline editing editor in the selected row. Click Save after modifying the data.
Adding IP Blocks
In a group, you can add as many subnets/IP addresses as necessary. Note that adding more IP addresses results in
monitoring more queries, which may affect the performance of the reporting server.
1. From the Administration tab, select the Reporting tab -> Group -> Add.
or
From the Administration tab, select the Reporting tab, expand the Toolbar and click Add -> IP Block.
2. In the Add IP Block wizard, complete the following:
— Group: Click Select to select a group. When there are multiple groups, Grid Manager displays the Group
Selector dialog box to select a group. Click a group name in the dialog box. You can use filters or the Go to
function to narrow down the list.
— Address: Enter the source IPv4/IPv6 addresses or the IPv4/IPv6 subnets.
— Comment: Enter useful information about the IP block.
3. Do one of the following:
— Click Save & Edit to add an IP address or IP block and launch the editor. You can edit the details.
— Click Save & New to add an IP address or IP block and launch the wizard again to add another IP block.
— Click Save & Close to add an IP address or IP block and close the wizard.
Modifying IP Blocks
1. From the Administration tab, select the Reporting tab -> Group.
2. Select an IP address or IP block you want to modify and click the Edit icon.
3. In the General tab of the IP Block editor, modify the IP address or comment.
4. Click Save to save the configuration.
Note: You can modify description by using inline editing. Double-click the row that you want to modify, the appliance
displays the inline editing editor in the selected row. Click Save after modifying comment. You cannot modify
IP address using inline editing editor.
The following table summarizes the different tabs and key options that are available in the Reporting tab:
Home Dashboard Overall summary view for the reporting data in For information, see Home Dashboards on page
your Grid 1471.
Dashboard Provide table and graph views for the reporting For information, see Home Dashboards on page
data in your Grid. 1471
Reports Saved searches that retrieve specific type of For information, see About Reports on page 1477
reporting data
Alerts Set alerts to trigger actions when certain events For information, see About Alerts on page 1475
occur
Search Create a search interactively from scratch and For information, see About Searches on page 1472.
save it as a dashboard panel, alert and report.
Hierarchy settings for all the navigation menu options (listed in the Table 40.5) are available in the default.xml file.
WARNING: Infoblox recommends that you do not modify the default.xml file. The navigation menu is built on
a custom XML structure that is stored as default.xml in the navigation directory (from the
Reporting tab, select the Settings tab -> User Interface -> Navigation Menus -> default). Editing this
file changes the specific default settings for the reporting features and your changes become
permanent. In addition, you might not be able to see the latest changes made by Infoblox. To
restore the default settings, you must reset the NIOS appliance to its original factory settings.
For information, see Resetting a NIOS Appliance to Factory Settings on page 491.
Home Dashboards
You can view the overall summary of DNS, DHCP, and IPAM activities in the Home Dashboard page. This page presents
a summary view of the following:
• DDI Summary: Presents statistical information about the DNS, DHCP, and IPAM activities of all Grid members.
• DNS: Displays the statistical summary of DNS activities. You can export the search results, open in search, and
refresh.
• DHCP: Displays the statistical summary of DHCP activities. You can export the search results, open in search,
and refresh.
• IPAM: Displays the summary of the Top 10 IPAMv4 Utilized Networks dashboard.
• Reporting Health: You can view the license usage by the reporting server:
— Today’s License Usage: Current license usage by the indexer.
— License Usage Trend per Member: License usage by the indexer per member.
About Searches
Searches are criteria that the reporting server uses to save reports and dashboard panels. Each predefined report has
an associated search.
Note: For more information, refer to the official Splunk documentation: http://docs.splunk.com/Documentation.
To run a search:
1. From the Reporting tab, select the Search tab.
2. Enter the search criteria and then click the Search icon.
The search results are displayed in the New Search panel, as illustrated in the New Search View.
In the New Search panel, you can save search results as Reports, Dashboard Panel, and Alerts.
Search criteria
About Alerts
You can configure alerts to trigger actions when certain events occur. When you set up an alert, search results trigger
an alert action if they match the alert conditions. You can configure an alert to send an email notification, SNMP trap,
and log a message in the syslog. Note that alerts are executed based on update frequencies for each corresponding
search. For example, DHCP Lease History alerts are executed every 10 minutes, and Device Trend alerts are executed
every 30 minutes at the 17th and 47th minutes of each hour (one minute after the search updates). For information
about search indexes and update time intervals, see Reporting Indexes and Update Time Intervals on page 1477.
You can also throttle an alert if you want to change its frequency. For more information, refer to the Splunk
documentation.
You can do the following in the Alerts page:
• Create scheduled alerts, as described in Creating Scheduled Alerts on page 1475.
• Edit permissions, as described in Editing Permissions on page 1455.
• Edit alert type, trigger condition, and alert actions, as described in Editing Alerts on page 1476.
• Clone an alert, as described inCloning Alerts on page 1476.
4. Click Save.
Editing Alerts
You can edit alert type, trigger condition, and alert actions, as follows:
1. From the Reporting tab, select the Alerts tab -> select an alert.
2. From the Edit drop-down list, select Edit Alert Type and Trigger Condition to edit alert settings. In the Edit Alert
Type and Trigger Condition dialog box, make the required changes. For information, see Creating Scheduled
Alerts on page 1475.
or
From the Edit drop-down list, select Edit Actions to edit alert actions. In the Edit Actions dialog box, make the
required changes. For information, see Creating Scheduled Alerts on page 1475.
3. Click Save.
Cloning Alerts
1. From the Reporting tab, select the Alerts tab.
2. Select an alert you want to clone, click Edit -> Clone.
3. Enter a new title, ID, and description. Click Clone Alert.
4. Optionally, you can click Open in Search to open the cloned alert in the Search page.
5. Click View, and do one of the following in the Your report has been created dialog box:
— Click View to view your report on the Report page.
— Click Continue Editing to edit.
— Click Add to Dashboard to add new report to the dashboard panel.
You can also complete the following settings in the Your report has been created dialog box:
• Permissions: Click this to edit permissions for your report, as described in Editing Permissions on page 1455.
• Schedule: Click this to schedule a report, as described in Scheduling Reports on page 1483.
• Acceleration: For information, refer to the Splunk documentation.
Note: You can configure email addresses when scheduling dashboard PDFs, scheduling reports, and creating alerts.
About Reports
Infoblox provides reports that are named by core network service functions, such as DNS query and system
utilization. Reports contain predefined search criteria that retrieve specific data from the reporting database. Each
report is associated with a search. It is not recommended to modify predefined reports. However, when you run a
search, you can save it as reports and share it with other users. You can also create a new report by cloning an existing
report, and then modify the search criteria.
You can also create a personal report in two different ways:
• Clone a report, as described in Cloning Reports on page 1483.
• Saving a search as a report, as described in Creating Reports from a Search on page 1473.
Note: IDNs are not supported on the reporting server. The reporting server manages IDNs in punycode. The reports
generated by collecting reporting data from the DNS server displays all the data in punycode only. However,
the DNS Zones Last Queried report and DNS Resource Records Last Queried report support IDNs because these
reports collect data from the NIOS database.
When you upgrade to 7.3.x, all NIOS Global reports are migrated to the Dashboards panel without filters. However,
the filter conditions configured in NIOS are reflected in the Dashboards panel. All NIOS System and Global searches
are migrated to the Reports panel.
You can do the following in the Reports tab:
1. From the Reporting tab, select the Reports tab -> select a report.
2. In the Reports panel, you can do the following:
— Open a report in the Search page and edit the report using the Save As menu. For information, see About
Searches on page 1472.
— You can do the following using the Edit drop-down list:
— Edit Description
— Edit Permissions, as described in Editing Permissions on page 1455.
— Edit Schedule, as described in Scheduling Reports on page 1483.
— Clone a report, as described in Cloning Reports on page 1483.
Default
Summary Report Data Maximum Index Maximum
Indexes Reports/ Searches Updates Size (% of Total Retention
Index Storage)
IPAMv4 5% 2 Months
Default
Summary Report Data Maximum Index Maximum
Indexes Reports/ Searches Updates Size (% of Total Retention
Index Storage)
Default
Summary Report Data Maximum Index Maximum
Indexes Reports/ Searches Updates Size (% of Total Retention
Index Storage)
Default
Summary Report Data Maximum Index Maximum
Indexes Reports/ Searches Updates Size (% of Total Retention
Index Storage)
Default
Summary Report Data Maximum Index Maximum
Indexes Reports/ Searches Updates Size (% of Total Retention
Index Storage)
Note: When you filter a dashboard by a time frame that is larger than the maximum retention period, the reporting
server returns data within the maximum retention period. For example, when you try to view data of the CPU
Utilization Trend report for the past six months, the server only returns data up to the last two months.
Cloning Reports
1. From the Reporting tab, select the Reports tab.
2. Select the report you want to modify, click Edit -> Clone.
3. Enter a new title, ID, and description.
4. Set its permissions. Select Private if you do not want to share the cloned report with other users. Select Clone if
you want the cloned report to have the same permissions as the original report.
5. Click Clone Report.
6. Optionally, you can do the following:
— You can edit permissions, as described in Editing Permissions on page 1455.
— Click View to view the cloned report.
— Click Add to Dashboard to add the cloned report to the dashboard.
Click Open in Search to open the cloned report in the Search page.
Scheduling Reports
You can schedule a report to run on a scheduled interval and trigger an action each time it runs. When scheduling a
report, you can set up an action to send an email to receive report results. In addition, you can export results in CSV
(comma separated value) or XML format.
To schedule a report:
1. From the Reporting tab, select the Reports tab.
2. Select the report you want to schedule, click Edit -> Edit Schedule.
Note: You can schedule a report when you save search results as reports. When you set the paper size to A5, the logo
image and report name may overlap in the footer of the downloaded reports or reports sent through email.
3. In the Edit Schedule dialog box, select the Schedule Report check box.
4. Enter the Schedule and Time range. For more information about how to use the Schedule and Time range options,
refer to the Splunk documentation.
5. Click Next and do the following to set an action for the scheduled reports:
— Send Email: Select this to send an email to a set of recipients to receive report results in text format, or as
CSV or PDF attachments.
— Enter the email address in the To text box. To send the email message to multiple recipients, type a
comma between email addresses.
— In the Include section, select one of the following: Inline Table, Attach CSV, Attach PDF. Selecting Attach
PDF or Attach CSV attaches the results of the report in the form of a CSV file or a PDF. Make sure that you
specify this information.
Note: Infoblox recommends not to select Link to Report, Link to Results, Search String in the Include section.
These links might not work in our environment. Do not select the Run a Script option because there is no
script to run.
6. Click Save.
Note: In the footer of the report, you can view the logo image (if uploaded), panel name, and the timestamp when
the report was downloaded. When there is no data in a single panel report, the downloaded PDF displays “No
Results Found” along with “Last Updated” information. However, a report with multiple panels displays only
the panel name for the panel that does not have any data.
About Dashboards
Dashboards provide summary views for most of the data and trends in your Grid. Infoblox recommends not to modify
default dashboards. To modify settings of a default dashboard, you can either clone a default dashboard, or create
a new dashboard from scratch and then add panels and reports. For example, you can create a new dashboard called
“DNS and DHCP Activities,” and then add DNS report, add DHCP related reports, such as DHCP Top Lease Clients and
DHCP Lease History, to the new dashboard. When you save the “DNS and DHCP Activities” dashboard, the reporting
server saves all the reports added to the dashboard and displays dashboard with updated data. By doing this,
user-defined dashboards can provide single point of access to review multiple reports that are relevant to the
activities you want to monitor. Each dashboard comes with a set of filters to further refine report data, as described
in About Dashboard Filters on page 1488.
When you upgrade to 7.3.0 or later, all your system reports are migrated to Reporting tab > Dashboards.
WARNING: Infoblox recommends that you do not modify the predefined dashboards even if you have
appropriate permissions. Editing the default dashboards changes the default settings and your
changes become permanent. In addition, you might not be able to see the latest changes made by
Infoblox. You can select a default dashboard and clone it to modify any of the settings, such as
permissions, panels, and so on. For information, see Cloning Dashboards on page 1485.
In the Dashboard panel, you can do the following using the Edit drop-down list:
• Edit panels as described in Editing Dashboards on page 1486.
• Edit source, title, and description.
• Edit permissions as described in Editing Permissions on page 1455.
• Clone a dashboard as described in Cloning Dashboards on page 1485.
Cloning Dashboards
It is not recommended to modify default dashboards. You can select a default dashboard and clone it to modify any
of the settings, such as permissions, panels, and so on.
Note: You do not need any permission to create, modify, and delete your own personal dashboard. However,
limited-access users need Read and Write permissions to modify cloned dashboards. For information about
administrative permissions, see Administrative Permissions on page 1454.
Editing Dashboards
To edit the panels and filters of a dashboard, it is recommended to clone the default dashboard, and then add panels,
filters and reports to the cloned dashboard. When you add a report to the panel, Grid Manager generates the
corresponding dashboard in the panel. When you save the dashboard, Grid Manager updates reports in each panel.
Alternatively, you can edit the XML source code to add filters and panels to a cloned dashboard, as described in
Editing the XML Source Code of a Dashboard on page 1486.
To add panels and filters to a dashboard:
1. From the Reporting tab -> select the Dashboards tab-> select a dashboard.
2. From the Edit drop-down list, select Edit Panels.
3. In the Edit: <Dashboard> pane, you can click Add Panel or Add Input or Edit Source.
Note: You cannot modify or delete the default values set for the dashboard filters. For example, you cannot
delete or modify the filter All set for Members. When you add a new input using the editor, make sure that
you edit the source and refer to the token for the input in the search string. By doing so, the search is
updated when you change the input value. For information editing source, refer to Splunk documentation.
4. Optionally, you can click to delete a filter. When you delete a filter, make sure that you delete the filter
information from the XML source code as well. For information, see Editing the XML Source Code of a Dashboard
on page 1486.
5. Expand the panel categories and select the panel you want to add. For detailed information about how to add
panel categories, refer to the Splunk documentation.
6. Click Add to Dashboard.
Note: Before editing dashboards, forms, and panel files in simple XML source code, you should be familiar with the
basic layout of dashboards and the XML elements that define them. Make sure that
Note: Scheduled PDF delivery is not available for dashboards that include forms.
Note: To set up PDF delivery for the dashboard with multiple panels, repeat the above steps from step 1 to step 4
and add other panels to the dashboard created for the first panel.
Note: The NIOS reporting data is updated at a certain time interval, rather than updating continuously. Therefore, the
Real-time option in the Time filter might not work for most of the dashboards. For information about update
time intervals, see Reporting Indexes and Update Time Intervals on page 1477.
Note: When you apply Group By EA Tag/Field in Active Directory Sites supported reports, the values displayed
in these reports are aggregated sum of absolute values (sum of values of individual networks in a group)
and utilization% is the mathematical average of the group.
You can configure the group-by-extensible-attribute filter and data calculation methods for the following dashboards
only:
• CPU Utilization Trend (Detailed)
• IPAMv4 Network Usage Statistics on page 1494
• IPAMv4 Top Utilized Networks on page 1495
• IPAMv4 Network Usage Trend on page 1495
• DDNS Update Rate Trend on page 1502
• DHCPv4 Usage Statistics on page 1500
• DNS Daily Query Rate by Member on page 1503
• DNS Query Rate by Member on page 1504
• DNS Daily Peak Hour Query Rate by Member on page 1503
• DNS Response Latency Trend on page 1504
• DNS Cache Hit Rate Trend on page 1502
• DNS Traffic Control Resource Availability Trend on page 1507
• DNS Traffic Control Resource Pool Availability Trend on page 1507
• DNS Traffic Control Response Distribution Trend on page 1507
• Memory Utilization Trend on page 1517
• Traffic Rate by Member on page 1517
• Threat Protection Event Count By Member on page 1512
• Threat Protection Event Count By Member Trend on page 1511
Predefined Dashboards
Table 40.7 lists the dashboard categories and their corresponding dashboard. You can apply filters and view the
dashboards in table, stacked area, or in both the view.
Note: The DNS Zones Last Queried report and DNS Resource Records Last Queried report support IDNs.