Nfvis Config Guide 3 12
Nfvis Config Guide 3 12
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2019–2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
iii
Contents
About RADIUS 20
RADIUS Operation 21
Configuring RADIUS 21
TACACS+ Support 22
About TACACS+ 22
TACACS Operation 22
Configuring a TACACS+ Server 23
Default Authentication Order 24
Networking 25
Bridges 25
Creating Bridges 26
Configuring Bridge Port 26
Configuring Bridge IP Connectivity 27
Port Channels 31
Information About Port Channels 31
Physical Network Interface Cards 33
System Routes 39
Configuring System Routes 39
Troubleshooting 40
Cisco Network Plug-n-Play Support 40
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
iv
Contents
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
v
Contents
Installation 130
Image Tamper Protection 130
RPM Signing 130
RPM Signature Verification 130
Image Integrity Verification 130
ENCS Secure Boot 131
Secure Unique Device Identification 131
Device Access 132
Enforced Password Change at First Login 133
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
vi
Contents
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
vii
Contents
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
viii
Contents
Syslog 179
NETCONF Event Notifications 181
SNMP Support on NFVIS 182
Introduction about SNMP 182
SNMP Operations 182
SNMP Get 182
SNMP Notifications 184
SNMP Versions 184
SNMP MIB Support 185
Configuring SNMP Support 187
System Monitoring 192
Collection of System Monitoring Statistics 193
Host System Monitoring 193
VNF System monitoring 197
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
ix
Contents
vmlcEvent 220
Syslog Messages 237
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
x
CHAPTER 1
New and Changed Information
The following table summarizes the new and changed features and tells you where they are documented.
Table 1: New and Changed Features for Cisco Enterprise Network Function Virtualization Infrastructure Software, Release 3.12.3
Secure Tunnel enhacements for EAP and PKI authentication Secure Overlay, on page 117
PKI and EAP supported on secure overlay.
APC UPS support This feature provides support for APC UPS Support and Monitoring,
monitoring battery status for an on page 58
APC UPS connected to the ENCS
box through a USB cable.
SNMP support for CPU usage Supported SNMP MIBs for CPU SNMP MIB Support, on page 185
usage
AAA auth-order In this feature the supported aaa Default Authentication Order, on
authentication order is local page 24
authentication followed by
TACACS+.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
1
New and Changed Information
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
2
CHAPTER 2
About NFVIS Documentation
Cisco Enterprise Network Function Virtualization Infrastructure Software (Cisco Enterprise NFVIS) is designed
to help service providers and enterprises to design, deploy and manage network services. For more information
about Cisco NFVIS, hardware platforms and VMs supported on it see, About Cisco Enterprise NFVIS.
This chapter describes how documentation about Cisco NFVIS is structured.
NFVIS Workflow
Typically, enterprises and service providers would go through the following stages in their NFVIS journey:
NFVIS documentation are structured according to the stages an enterprise or service provider would go through
when they decide to setup NFVIS:
• The Getting Started Guide follows the same flow as enterprise or service providers would, at the time
of deploying Virtual Network Functions (VNFs) for the first time.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
3
About NFVIS Documentation
• Set Up Cisco Enterprise NFVIS: Provides detailed information on getting started with ENCS 5400
Series platform devices.
• Install Cisco Enterprise NFVIS: Provides information on how to install Cisco NFVIS through Cisco
IMC and USB for the supported hardware platforms.
• Upgrade Cisco NFVIS: Provides information on how to upgrade Cisco NFVIS to the latest version
of the release.
• The Configuration Guide provides detailed information once you have completed the basic installation
and set up. This guide covers managing the host system, registering and managing VNFs, security
cosiderations for your network, troubleshooting issues with NFVIS and so on.
• Host System Management: Provides detailed information about operations and management of
NFVIS host.
• VM Life Cycle Management, on page 63: Provides information on the entire process of registering,
deploying, updating, monitoring VMs, and getting them service chained as per your requirements.
• Troubleshoot and Debug Cisco NFVIS, on page 199: Information provided here helps troubleshoot
and debug system errors.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
4
CHAPTER 3
Host System Management
• System Access Configuration, on page 5
• Users, Roles and Authentication, on page 17
• Networking, on page 25
• Cisco Network Plug-n-Play Support , on page 40
• DPDK Support on NFVIS, on page 46
• Storage Access, on page 49
• Host System Operations, on page 50
• Route Distribution, on page 53
• Backup and Restore NFVIS and VM Configurations, on page 55
• APC UPS Support and Monitoring, on page 58
• Resetting to Factory Default, on page 58
• Configure Banner, Message of the day and System Time, on page 59
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
5
Host System Management
Dual WAN Bridge and DHCP Toggle
static IP is applied to the second WAN bridge and static routing is configured for connectivity through
that bridge.
• IPv6 is not supported for dual WAN toggle.
• If wan2-br is DHCP enabled WAN bridge, you must remove DHCP from wan2-br to apply default
gateway from static IP configurations.
In zero touch deployment, NFVIS requests for IPv4 assignments through DHCP for two WAN interfaces.
During system initialization a second WAN bridge is configured with GE0-1 port attached. NFVIS toggles
between the two default WAN bridges sending DHCP requests on any one of the WAN bridges at a time, for
30 second intervals. The toggling stops as soon as one WAN bridge is assigned an IP address through DHCP.
The bridge with the assigned IP address is configured with DHCP. The other WAN bridge has no default IP
configuration and can be manually configured with static IP if required.
If neither of the bridges is assigned an IP address through DHCP, the WAN DHCP toggle can be terminated
by logging in to NFVIS using the default credentials. In this case, wan-br is configured with DHCP and
wan2-br has no default IP configuration.
After zero touch deployment, the toggle feature is terminated. To add additional connectivity to the NFVIS
host, static IP address can be configured on the other WAN bridge and system static routing can be applied.
A default gateway is not supported as the system default gateway is set through DHCP. If DHCP configuration
is not required, then both WAN bridges can be configured with static IP addresses, and a default gateway can
then be applied under system settings.
Accessing NFVIS
For initial login, use admin as the default user name, and Admin123# as the default password. Immediately
after the initial login, the system prompts you to change the default password. You must set a strong password
as per the on-screen instructions to proceed with the application. All other operations are blocked until default
password is changed. API will return 401 unauthorized error if the default password is not reset.
If wan-br or wan2-br have not obtained IP addresses through DHCP, the zero touch deployment is terminated.
To manually apply the IP configurations answer 'y' and the system proceeds with DHCP assignment on wan-br
until the configurations are changed. For DHCP assignment to continue to request IP address for PnP flow
on both WAN interfaces answer 'n'.
You must adhere to the following rules to create a strong password:
• Must contain at least one upper case and one lower case letter.
• Must contain at least one number and one special character (# _ - * ?).
• Must contain seven characters or greater. Length should be between 7 and 128 characters.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
6
Host System Management
Accessing NFVIS
• Using the CLI—When you first log into Cisco Enterprise NFVIS through SSH, the system will prompt
you to change the password.
• Using PnP (for details, see the Cisco Network Plug-n-Play Support , on page 40).
• Using console - After the initial login using the default password, you are prompted to change the default
password.
The copyrights to certain works contained in this software are owned by other
third parties and used and distributed under third party license agreements.
Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0,
LGPL 2.1, LGPL 3.0 and AGPL 3.0.
login: admin
NFVIS service is OK
Warning: Permanently added 'localhost' (RSA) to the list of known hosts.
admin@localhost's password:
The copyrights to certain works contained in this software are owned by other
third parties and used and distributed under third party license agreements.
Certain components of this software are licensed under the GNU GPL 2.0, GPL 3.0,
LGPL 2.1, LGPL 3.0 and AGPL 3.0.
nfvis#
System message at 2020-01-08 03:10:10...
Commit performed by system via system using system.
nfvis#
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
7
Host System Management
Accessing NFVIS
Note To commit the target configuration to the active (running) configuration, use the commit command in any
configuration mode. Changes made during a configuration session are inactive until the commit command
is entered. By default, the commit operation is pseudo-atomic, meaning that all changes must succeed for the
entire commit operation to succeed.
Using IPv6
IPv6 can be configured in static, DHCP stateful and Stateless Autoconfiguration (SLAAC) mode. By default,
DHCP IPv6 stateful is configured on the WAN interface. If DHCP stateful is not enabled on the network, the
router advertisement (RA) flag decides which state the network stays in. If the RA shows Managed (M) flag,
then the network stays in DHCP mode, even if there is no DHCP server in the network. If the RA shows Other
(O) flag, then the network switches from DHCP server to SLAAC mode.
SLAAC provides IPv6 address and default gateway. Stateless DHCP is enabled in the SLAAC mode. If the
server has DNS and domain configured, then SLAAC also provides those values via stateless DHCP.
Note Starting from NFVIS 3.10.1 release, for ENCS 5400 and ENCS 5100, wan2-br obtains an IP address from
DHCP. To configure default gateway, first use no bridges bridge wan2-br dhcp command.
If you want to disable DHCP and use static configuration, initial configuration is done by setting the WAN
IP address and/or management IP address, and the default gateway. You can also configure a static IP on a
created bridge.
To perform initial configuration on the system without using DHCP:
configure terminal
system settings mgmt ip address 192.168.1.2 255.255.255.0
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
8
Host System Management
Accessing NFVIS
Note When an interface is configured with a static IP address, DHCP is automatically disabled on that interface.
Now you can either use the management IP or WAN IP to access the portal.
To configure static IPv6 on the WAN interface:
configure terminal
system settings mgmt ipv6 address 2001:DB8:1:1::72/64
bridges bridge wan-br ipv6 address 2001:DB8:1:1::75/64
system settings default-gw-ipv6 2001:DB8:1:1::76
commit
Note When an interface is configured with a static IPv6 address, DHCP IPv6 is automatically disabled on that
interface. There are three options for IPv6 - static, DHCP and SLAAC, out of which only one can be enabled
at a time.
configure terminal
no system settings default-gw
system settings wan dhcp
commit
exit
hostaction wan-dhcp-renew
Note Starting from NFVIS 3.10.1, you can configure DHCP IPv6 on any bridge. You can only have one DHCP
IPv6 bridge or management interface active at a time, and cannot have DHCP IPv6 and default IPv6 gateway
or SLAAC IPv6 configured at the same time.
configure terminal
no system settings default-gw-ipv6
system settings wan dhcp-ipv6
commit
exit
hostaction wan-dhcp-renew
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
9
Host System Management
Accessing NFVIS
Extract from the output of the show system settings-native command when the management interface has a
DHCP configuration and the WAN interface has a static configuration:
Extract from the output of the show system settings-native command when the WAN interface has a DHCP
configuration and the management interface has a static configuration:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
10
Host System Management
Configuring VLAN for NFVIS Management Traffic
Note You cannot have the same VLAN configured for the NFVIS management and VM traffc.
For more details on the VLAN configuration, see the Understanding and Configuring VLANs module in the
Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
configure terminal
system routes route 209.165.201.1 dev lan-br
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
11
Host System Management
Configuring the IP Receive ACL
configure terminal
system settings ip-receive-acl 198.0.2.0/24
action accept priority 10
commit
config terminal
system settings ip-receive-acl address/mask_len service scpd priority 2 action accept
commit
The Access Control List (ACL) is identify by address. If this ACL is removed, all ACLs sharing the same
address are also removed. Ensure that you configure the ACLs that share the same address once again.
Note From 3.8.1 release, only a user belonging to administrator role can use the SCP command on this port to
upload or download only from restricted folders like /data/intdatastore/. For more information, see Host System
Operations, on page 50.
Caution SCP command cannot be used to copy files from one NFVIS device to another NFVIS device.
Use the show running-config system settings ip-receive-acl command to verify the interface configuration:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
12
Host System Management
Configuring Secondary IP and Source Interface
action accept
priority 100
Configure Secondary IP
nfvis(config)# system settings wan secondary ip address 1.1.2.3 255.255.255.0
Source Interface
This feature is used to set the source interface with an ip address. The ip address configured will be used for
for packets generated by the NFVIS. The packets generated use the default route.
Configure source-interface ip
nfvis(config)# system settings source-interface
1.1.2.3
The Secondary IP and Source Interface related errors are logged in show log nfvis_config.log file.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
13
Host System Management
CIMC Access Control
APIs Commands
To access CIMC using NFVIS WAN or management interface IP address, use the system settings cimc-access
enable command. Once you configure CIMC access on NFVIS, the stand alone CIMC access using CIMC
IP address is disabled and you will be able to access CIMC using NFVIS management interface IP address.
The configurations remain on the device even after the device reboot.
When the CIMC access is configured, it enables a few ports to access services like SSH, SNMP, HTTP and
HTTPs into the CIMC.
The following port numbers are being used for forwarding services to CIMC:
• 20226 for SNMP
• 20227 for SSH
• 20228 for HTTP
• 20229 for HTTPS
If you are unable to access CIMC using NFVIS, check the show log nfvis_config.log file.
Use system settings cimc-access disable to disable this feature.
BIOS-CIMC Update
Starting from 3.8.1 release, for ENCS 5400 router, if existing BIOS/CIMC version is lower than the bundled
image in NFVIS ISO or upgrade package, it is updated automatically during the NFVIS upgrade or installation.
Also the CPU microcode is upgraded. The upgrade time takes longer than the previous releases and the upgrade
will be done automatically, and you cannot stop the process once it is initiated.
For ENCS 5100 router, BIOS will be upgraded automatically to a new version but you need to boot up the
server manually after the upgrade.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
14
Host System Management
BIOS and CIMC Password
BIOS and CIMC Password APIs BIOS and CIMC Password Commands
Note If you enable UEFI secure boot on a nonsupported OS, on the next reboot, you cannot boot from that particular
OS. If you try to boot from the previous OS, an error is reported and recorded the under system software event
in the web UI. You must disable the UEFI secure boot option using Cisco IMC to boot from your previous
OS.
Reboot the server to have your configuration boot mode settings take place.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
15
Host System Management
Enabling or Disabling the Portal Access
Commit Pending.
Server /bios *# commit
Reboot the server to have your configuration boot mode settings take place.
To install NFVIS in UEFI mode, map the iso image through vmedia or kvm first, then enable secure boot and
change the BIOS set-up parameters.
Note All VNFs and configurations are lost at reboot. Secure boot in UEFI mode works differently from the legacy
mode. Therefore, there is no compatibility in between legacy mode and UEFI mode. The previous environment
is not kept.
configure terminal
system portal access disabled
commit
Note You can enable the portal access using the enabled keyword with the system portal access configuration.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
16
Host System Management
Users, Roles and Authentication
Note All user groups are created by the system. You cannot create or modify a user group.
Starting from NFVIS 3.9.1, create-user, delete-user, change-role and change-password operations are
configurable from exec mode.
To create a user:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
17
Host System Management
Local User Account Management
rbac authentication users create-user name test1 password Test1_pass role administrators
To delete a user:
Note To change the password, use the rbac authentication users user test1 change-password new-password
newPassword old-password oldPassword command. To change the user role to administrators, operators
or auditors, use the rbac authentication users user test1 change-role new-role newRole old-role oldRole
command.
configure terminal
rbac authentication min-pwd-length 10
commit
APIs Commands
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
18
Host System Management
Local User Account Management
Note The minimum and maximum lifetime values and the rule to check for these values are not applied to the admin
user.
configure terminal
rbac authentication password-lifetime enforce true min-days 2 max-days 30
commit
APIs Commands
Note The inactivity period and the rule to check the inactivity period are not applied to the admin user.
configure terminal
rbac authentication account-inactivity enforce true inactivity-days 2
commit
APIs Commands
configure terminal
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
19
Host System Management
RADIUS Support
APIs Commands
Note You can update and recover NFVIS 3.8.1 and older passwords using NFVIS 3.9.1.
RADIUS Support
•
About RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a distributed client-server system that secures
networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco routers
and send authentication requests to a central RADIUS server that contains all user authentication and network
service access information.
RADIUS is a fully open protocol, distributed in source code format, that can be modified to work with any
security system currently available on the market.
Cisco supports RADIUS under its AAA security paradigm. RADIUS has been implemented in a variety of
network environments that require high levels of security while maintaining network access for remote users.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
20
Host System Management
RADIUS Operation
RADIUS Operation
When a user attempts to log in and authenticate to an access server using RADIUS, the following steps occur:
1. The user is prompted to enter the username and password.
2. The username and encrypted password are sent over the network to the RADIUS server.
3. The user receives one of the following responses from the RADIUS server:
a. ACCEPT—The user is authenticated.
b. CHALLENGE—A challenge is issued by the RADIUS server. The challenge collects additional data
from the user.
c. CHANGE PASSWORD—A request is issued by the RADIUS server, asking the user to select a new
password.
d. REJECT—The user is not authenticated and is prompted to reenter the username and password, or
access is denied.
The ACCEPT or REJECT response is bundled with additional data that is used for EXEC or network
authorization. You must first complete RADIUS authentication before using RADIUS authorization. The
additional data included with the ACCEPT or REJECT packets consists of the following:
• Services that the user can access, including connections such as Telnet, rlogin, or local-area transport
(LAT), and services such as PPP, Serial Line Protocol (SLIP), or EXEC services.
• Connection parameters, including the host or client IP address, access list, and user timeouts.
Configuring RADIUS
To configure RADIUS support:
configure terminal
radius-server host 103.1.4.3
shared-secret cisco123
admin-priv 15
oper-priv 11
commit
Starting from NFVIS 3.9.2 release, RADIUS secret encryption is supported. You can only configure either
secret key or encrypted secret key at a given time. Use encrypted secret if special characters are used in secret.
To configure encrypted RADIUS secret:
configure terminal
radius-server host 103.1.4.3
encrypted-shared-secret cisco123
admin-priv 15
oper-priv 11
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
21
Host System Management
TACACS+ Support
APIs Commands
TACACS+ Support
•
About TACACS+
TACACS+ is a security application that provides centralized validation of users attempting to gain access to
a router or network access server. TACACS+ services are maintained in a database on a TACACS+ daemon
running, typically, on a UNIX or Windows NT workstation. You must configure a TACACS+ server before
the configured TACACS+ features on your network access server are available.
On the TACACS+ server, ensure you configure Cisco attribute-value (AV) pair privilege level (priv-lvl) for
Cisco Enterprise NFVIS service for the minimum privilege level of administrators and operators.
Note In NFVIS 3.11.1 or earlier release, users with no privilege level or users with a privilege level that is less than
the operator's privilege level are considered as auditors with read-only permission.
After NFVIS 3.12.1 release, users with privilege level zero won't be able to login to NFVIS anymore.
TACACS Operation
When a user attempts a simple ASCII login by authenticating to NFVIS using TACACS+, this process occurs:
1. When the user tries to log in, NFVIS sends user credential to TACACS+ server.
2. NFVIS will eventually receive one of the following responses from the TACACS+ server:
a. ACCEPT—The user is authenticated and service can begin. If NFVIS is configured to require
authorization, authorization begins at this time.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
22
Host System Management
Configuring a TACACS+ Server
b. REJECT—The user is not authenticated. The user can be denied access or is prompted to retry the
login sequence, depending on the TACACS+ server.
c. ERROR—An error occurred at some time during authentication with the server or in the network
connection between the server and NFVIS. If an ERROR response is received, NFVIS typically tries
to use an alternative method for authenticating the user.
d. CONTINUE—The user is prompted for additional authentication information.
configure terminal
tacacs-server host 209.165.201.20 shared-secret
test1
key 0
admin-priv
14
oper-priv
9
commit
In this configuration, privilege level 14 is assigned to the administrator role, and privilege level 9 is assigned
to the operator role. This means a user with privilge level 14 or higher will have all admin privileges when
the user logs into the system, and a user with privilege level 9 or higher will have all privileges of an operator
at the time of login.
Starting from NFVIS 3.9.2 release, TACACS+ secret encryption is supported. You can only configure either
secret key or encrypted secret key at a given time. Encrypted secret key can contain special characters but
secret key cannot. For NFVIS 3.12.1 release, the following pattern is supported for encryped-shared-key:
[-_a-zA-Z0-9./\\<>%!*$€#{}()+].
To configure encrypted TACACS+ key:
configure terminal
tacacs-server host 209.165.201.20 encrypted-shared-secret test1
key 0
admin-priv
14
oper-priv
9
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
23
Host System Management
Default Authentication Order
Note • Only when TACACS+ or RADIUS is enabled, it can be used for authentication.
• When TACACS+ or RADIUS is not accessible, local authentication is used. It is recommended to use
aaa authentication TACACS local command to authenticate using local database. Local authentication
is disabled if the connection between TACACS+ or RADIUS and NFVIS is restored.
• If same username exists on both local and TACACS+ or RADIUS, then TACACS+ or RADIUS user is
chosen for authentication.
• It is recommended to configure Syslog, on page 179 so that it is easier to debug if TACACS+ or RADIUS
does not work as expected.
All login attempts will be logged in syslogs in the local nfvis_syslog.log, nfvis-ext-auth.log files and in remote
syslog servers.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
24
Host System Management
Networking
In NFVIS 3.12.3 release the only supported combination for authentication order is aaa auth-order local
tacacs. Any other combinations are not supported. aaa auth-order configuration is mutually exclusive to
aaa authentication and if one is configured, the other is automatically replaced.
nfvis(config)# aaa ?
Possible completions:
auth-order Configure authentication order; Mutually exclusive to authentication method
configuration
authentication Configure external authentication method; Mutually exclusive to auth-order
configuration
ios Specific IOS settings
Networking
•
Bridges
The IP configuration on bridges and show bridge-settings command were added in NFVIS 3.10.1 release.
NFVIS is installed with LAN and WAN bridges by default. A service bridge can also be created. A bridge
can be used for NFVIS connectivity. Each bridge can be configured with IPv4 or IPv6 configurations such
as Static IP, DHCP, SLAAC, or VLAN. Each bridge can have a port or port channel associated with it.
On all NFVIS systems, lan-br and wan-br are generated by default and populated with the appropriate ports
for that system. On ENCS 5000 series platforms wan2-br is also generated by default for the dual WAN
initialization. For more information, see Dual WAN Support, on page 5. Except on ENCS 5000 Series
platforms, the default LAN bridge is configured with a static IP address 192.168.1.1 and the WAN bridges
uses DHCP for initial NFVIS connectivity.
On ENCS 5400 series platforms configuration changes are not allowed on the lan-br bridge. The LAN bridge
cannot be modified in any way.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
25
Host System Management
Creating Bridges
Using IPv4
If the system has a DHCP server connected to a bridge with DHCP configured, the bridge receives the IP
address from the server. You can use this IP address to connect to the system.
You can also connect to the server locally with an ethernet cable using a static IP address. To connect to the
box remotely using a static IP address, you must configure the default gateway or setup an appropriate static
route.
Both DHCP and a default gateway cannot be configured on NFVIS simultaneously. NFVIS only supports
one system level default gateway and if DHCP is configured, the default gateway is assigned to the system
through the DHCP server. Also, only one bridge can be configured with DHCP at any time.
Using IPv6
IPv6 can be configured in static, DHCP stateful and Stateless Auto configuration (SLAAC) modes. By
default,DHCP IPv6 stateful is configured on the WAN interface. If DHCP stateful is not enabled on the
network, the router advertisement (RA) flag decides which state the network stays in. If the RA shows Managed
(M) flag, then the network stays in DHCP mode, even if there is no DHCP server in the network. If the RA
shows Other (O) flag, then the network switches from DHCP server to SLAAC mode.
SLAAC provides IPv6 address and a default gateway. Stateless DHCP is enabled in the SLAAC mode. If the
server has DNS and domain configured, then SLAAC also provides those values through stateless DHCP.
Similar to IPv4, IPv6 DHCP and IPv6 default gateway cannot be configured on the system simultaneously,
nor can stateful and stateless IPv6 DHCP. Also, only one bridge can be configured with either stateful or
stateless IPv6 DHCP at any time.
Creating Bridges
To configure a new bridge:
configure terminal
bridges bridge my-br
commit
configure terminal
bridges bridge my-br port eth3
commit
configure terminal
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
26
Host System Management
Configuring Bridge IP Connectivity
To verify the port settings applied to a bridge, use the support ovs vsctl command:
The same command can be used to verify the port channel settings applied to a bridge:
configure terminal
bridges bridge my-br dhcp
commit
To verify the DHCP settings applied to a bridge, use the show bridge-settings <br_name> dhcp command.
dhcp enabled
dhcp offer true
dhcp interface my-br
dhcp fixed_address 10.10.10.14
dhcp subnet_mask 255.255.255.128
dhcp gateway 10.10.10.1
dhcp lease_time 7200
dhcp message_type 5
dhcp name_servers NA
dhcp server_identifier 10.10.10.1
dhcp renewal_time 3600
dhcp rebinding_time 6300
dhcp vendor_encapsulated_options NA
dhcp domain_name NA
dhcp renew 2019-12-11T13:28:29-00:00
dhcp rebind 2019-12-11T14:17:12-00:00
dhcp expire 2019-12-11T14:32:12-00:00
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
27
Host System Management
Configuring Bridge IP Connectivity
configure terminal
bridges bridge my-br ip address 172.25.220.124 255.255.255.0
commit
To verify the IPv4 settings applied to a bridge, use the show bridge-settings <br_name> ip_info command.
configure terminal
bridges bridge my-br dhcp-ipv6
commit
To verify the IPv6 DHCP settings applied to a bridge, use the show bridge-settings <br_name> dhcp-ipv6
command.
configure terminal
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
28
Host System Management
Configuring Bridge IP Connectivity
To verify the IPv6 SLAAC settings applied to a bridge, use the show bridge-settings <br_name> slaac-ipv6
command.
configure terminal
bridges bridge my-br ipv6 address 2001:db8:85a3::8a2e:370:7334/64
commit
To verify the IPv6 settings applied to a bridge, use the show bridge-settings <br_name> ip_info command.
Note You cannot have the same VLAN configured for the NFVIS management and VM traffc.
For more details on the VLAN configuration, see the Understanding and Configuring VLANs module in the
Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
29
Host System Management
Configuring Bridge IP Connectivity
To configure a VLAN:
configure terminal
bridges bridge wan-br vlan 120
commit
To verify the VLAN settings applied to a bridge, use the show bridge-settings my-br vlan command.
configure terminal
bridges bridge my-br mac-aging-time 600
commit
To verify the MAC aging time settings applied to a bridge, use the show bridge-settings <br_name>
mac-aging-time command.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
30
Host System Management
Port Channels
Port Channels
Information About Port Channels
Port channels combine individual links into a group to create a single logical link that provides the aggregate
bandwidth of up to eight physical links. Creating port channels helps to increase bandwidth and redundancy
and to load balance traffic between the member ports. If a member port within a port channel fails, the traffic
from the failed port switches to the remaining member ports.
Port channels must have atleast two ports and can be configured using static mode or Link Access Control
Protocol (LACP). Configuration changes that are applied to the port channel are applied to each member port
of the port channel. A port channel can also be added to a bridge. When a port channel has two or more than
two members and the port channel is added to a bridge, a bond is created.
A port can be a member of only one port channel and all the ports in a port channel must be compatible. Each
port must use the same speed and operate in full-duplex mode.
configure terminal
pnic egroup type port_channel lacp_type active bond_mode balance-tcp trunks 10,20
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
31
Host System Management
Configuring a Port Channel
configure terminal
pnic GE0-0 member_of egroup
commit
configure terminal
pnic GE0-1 member_of egroup
commit
configure terminal
bridges bridge test-br port egroup
commit
configure terminal
no pnic pc GE0-0 member_of egroup
commit
configure terminal
no pnic GE0-1 member_of egroup
commit
configure terminal
no bridges bridge test-br port egroup
commit
configure terminal
no pnic egroup
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
32
Host System Management
Physical Network Interface Cards
----bond-egroup----
bond_mode: balance-tcp
bond may use recirculation: yes, Recirc-ID : 1
bond-hash-basis: 0
updelay: 0 ms
downdelay: 0 ms
next rebalance: 6921 ms
lacp_status: negotiated >>>this should be negotiated to indicate port channel is active
lacp_fallback_ab: false
active slave mac: 38:90:a5:1b:fe:0d(GE0-1)>>should indicate active slave mac address
APIs Commands
Note LLDP packets are not propagated to VMs. LLDP cannot be enabled on port channel or DPDK ports.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
33
Host System Management
Configuring Administrative Status of a Port
configure terminal
pnic eth0 lldp enabled
commit
configure terminal
pnic eth0 lldp disabled
commit
Use the show lldp neighbors command to display the peer information:
--------------------------------------------------------------
eth0 Switch1623 120 Bridge, Router Cisco IOS Software, Catalyst L3 Switch Software
(CAT3K_CAA-UNIVERSALK9-M), Version 15.0(1)EX3, RELEASE SOFTWARE (fc2)Ifname:
Gi1/0/4GigabitEthernet1/0/4
Use the show lldp stats command to display the tx and rx information:
APIs Commands
configure terminal
pnic GE0-1 admin status down
commit
Use the show pnic command to verify the admin status configuration. Use the show pnic link_state command
to verify the admin state configuration.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
34
Host System Management
Tracking Changes for a Port
APIs Commands
Note This feature is supported only on ENCS 5400 starting from NFVIS 3.10.1 release.
In a virtual environment when the PNIC goes down there is no indication to the interfaces inside the VNFs.
It is useful to track state changes of PNICs including switch ports to one or more VNF interfaces and accordingly
bring down or up the vNICs. This feature brings the appropriate interfaces inside the VNF up or down based
on the PNIC state changes. Most of the VNFs support this functionality.
Track state can also be configured for LAN-SRIOV. The LAN network is not physically connected to
LAN-SRIOV. Switch ports are connected to an embedded switch on the LAN side. The switch has an int-LAN
interface which is a 10G interface the VMs can connect to from the LAN network using VFs (virtual functions).
Therefore, the VM is not directly connected to LAN-SRIOV.
Track state configuration on WAN-SRIOV is not needed, as there is a one to one connection between
WAN-SRIOV and the VM.
Track state can be configured for monitored and un-monitored VMs. If a track state configuration is deleted,
the PNIC or switch port state changes will not be notified to the vNICs or VFs.
The VM has to be first deployed before you can configure PNIC track state for the VM. VNFs or vNICs do
not have to be attached to a bridge connected to the PNIC.
To configure track state on a pnic for a VM use the following commands: pnic <pnic_name> track-state
<vm_name> <vnic> or pnic <pnic_name> track-state <deploy_name.vm_grp_name> <vnic>
configure terminal
pnic GE0-0 track-state ROUTER 0
end
To verify the track state configuration on the VM use the show interface or ethtool commands or the VM
specific command that displays the interface link state.
In the following example, the vedge VM deployed and vNIC 0 is being tracked by GE0-1. The if-oper-status
command shows the state of the vNIC being tracked by pNIC. When GE0-1 is down, if-oper-status also
shows as down.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
35
Host System Management
Speed, Duplex and Autonegotiation
Note Not all ports on ENCS 5000 series platform devices support auto-mdix feature. When autonegotiation is
disabled you need to use the correct cable to configure speed and duplex correctly. The cable type depends
on the remote system, based on which you can try straight through or cross over cable.
configure terminal
pnic GE0-0 speed 100 duplex full
commit
configure terminal
pnic GE0-0 speed auto duplex auto
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
36
Host System Management
Speed, Duplex and Autonegotiation
configure terminal
pnic GE0-0 speed 100 duplex full
commit
Use the show pnic GE0-0 operational-speed, show pnic GE0-0 operational-duplex and show pnic GE0-0
autoneg to verify the configurations.
To verify the PNIC speed and duplex configurations, use the show notification stream nfvis Event command.
notification
event Time 2019-12-16T22:52:49.238604+00:00
nfvisEvent
user_id admin
config_change true
transaction_id 0
status FAILURE
status_code 0
status_message Pnic GE0-1 speed did not update successfully
details NA
event_type PNIC_SPEED_UPDATE
severity INFO
host_name nfvis
!
!
notification
event Time 2019-12-16T22:53:05.01598+00:00
nfvisEvent
user_id admin
config_change true
transaction_id 0
status SUCCESS
status_code 0
status_message Pnic GE0-1 duplex updated successfully:full
details NA
event_type PNIC_DUPLEX_UPDATE
severity INFO
host_name nfvis
!
!
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
37
Host System Management
Dynamic SR-IOV
Speed, Duplex and Autonegotiation APIs Speed, Duplex and Autonegotiation Commands
Dynamic SR-IOV
Dynamic Single-root input/output virtualization (SR-IOV) allows you to enable or disable SR-IOV on a
Physical Network Interface Controller (PNIC). You can disable SR-IOV on any PNIC to 0 and enable SR-IOV
by setting a value between 1 to maximum virtual functions (maxvfs) supported on PNICs. You can also create
and delete SR-IOV networks based on the number of virtual functions (numvfs) set on that PNIC while
enabling SR-IOV. Existing fresh installation behavior has not changed. Each PNIC has default number of
VFs created and default SR-IOV networks are created. User can use CLI, API or GUI to enable or disable
SR-IOV on a PNIC or to create or delete SR-IOV networks
Restrictions or Limitations
• The supported platforms are CSP-2100, CSP-5000, UCSc-C220-M5X and UCS-E-M3.
Dynamic SR-IOV is not supported on ENCS 5000 series.
• Dynamic SR-IOV is not supported on certain PNICs:
• PNIC with driver i40e
configure terminal
no pnic eth0-1 sriov
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
38
Host System Management
System Routes
configure terminal
pnic eth0-1 sriov numvfs 20
commit
To display SR-IOV state of all PNICs use show pnic sriov command. To display SR-IOV state of individual
PNIC use show pnic eth0-1 sriov command.
configure terminal
networks network eth0-1-SRIOV-1 sriov true
commit
configure terminal
networks network eth0-1-SRIOV-1 sriov true trunk false vlan 30
commit
configure terminal
no networks network eth0-1-SRIOV-1
commit
System Routes
You can also configure static system routes along with the default routes in the system. Static routes are for
traffic that should not go through the default gateway. When certain destinations are not reachable through
the default routes, this configuration is effective. Also it updates the system routing table.
You can create a route by providing the destination and prefix length, but a valid route requires a specified
device, a gateway or both. The gateway input represents the address of the nexthop router in the address
family. The dev input is the name of the outbound interface for the static route.
configure terminal
system routes route 172.25.222.024 gateway 172.25.221.1
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
39
Host System Management
Troubleshooting
To verify the system routes configuration, use the show system routes command.
Troubleshooting
To troubleshoot errors in configured routes, use show system routes command to identify the failed route.
The following example shows common failures with system routes:
You can find the cause for each error in the nfvos-confd log.
In this failure nfvos-confd log indicates the network is unreachable. To resolve this issue you can either
reconfigure the route with a reachable gateway or identify network connectivity issue.
In this failure there is a mismatch between the subnet address and the prefix length. To resolve this issue you
can reconfigure the route with the correct subnet address (in this case 172.25.223.0 for prefix length 24).
Note Starting from 3.10.1 release, NFVIS is integrated with PnP 1.8.
The Cisco Network Plug and Play (Cisco Network PnP) solution provides a simple, secure, unified, and
integrated offering for enterprise network customers to ease new branch or campus device rollouts, or for
provisioning updates to an existing network. The solution provides a unified approach to provision enterprise
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
40
Host System Management
Cisco Network Plug-n-Play Support
networks comprising Cisco routers, switches, and wireless devices with a near zero touch deployment
experience. This solution uses Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM)
to centrally manage remote device deployments.
Currently, you can use the Cisco Network Plug and Play client to:
• Auto discover the server
• Provide device information to the server
• Bulk provisioning of user credentials
Note For bulk provisioning of user credentials, ensure that you have the necessary configuration file uploaded to
the Cisco APIC-EM. The following are the supported configuration formats:
Sample Format 1
<config xmlns="http://tail-f.com/ns/config/1.0">
<rbac xmlns="http://www.cisco.com/nfv/rbac">
<authentication>
<users>
<user>
<name>admin</name>
<password>Cisco123#</password>
<role>administrators</role>
</user>
<user>
<name>test1</name>
<password>Test1239#</password>
<role>administrators</role>
</user>
<user>
<name>test2</name>
<password>Test2985#</password>
<role>operators</role>
</user>
</users>
</authentication>
</rbac>
</config>
Sample Format 2
If you use format 2, the system will internally convert this format into format 1.
<aaa xmlns="http://tail-f.com/ns/aaa/1.1">
<authentication>
<users>
<user>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
41
Host System Management
PnP Discovery Methods
<name>admin</name>
<password>User123#</password>
</user>
</users>
</authentication>
</aaa>
Note DNS FQDN Only lookup method is supported since 3.10.1 release.
• Cloud Redirection—This method uses the Cisco Cloud Device Redirect tool available in the Cisco
Software Central.The Cisco Plug and Play Agent falls back on the Cloud Redirection method if DNS
lookup is not successful.
configure terminal
pnp automatic dhcp disable dhcp-ipv6 disable dns disable dns-ipv6 disable cco disable
cco-ipv6 disable
pnp static ip-address 192.0.2.8 port 80 transport http
commit
pnp action command restart
configure terminal
pnp automatic dhcp disable dhcp-ipv6 disable dns disable dns-ipv6 disable cco disable
cco-ipv6 disable
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
42
Host System Management
Configuring PnP Discovery Methods
configure terminal
pnp static ip-address apic-em-fqdn.cisco.com port 80 transport http
commit
Note In FQDN support for PnP, domain names can be specified as an input. FQDN that is configured with IPv6
on a DNS server is not supported.
Note By default, the automatic discovery mode for DHCP, DNS, and CCO is enabled. You can enable or disable
the options as required. For example, you can enable all options or keep one enabled, and the rest disabled.
configure terminal
pnp automatic dhcp enable
pnp automatic dns enable
pnp automatic cco enable
pnp automatic timeout 100
commit
configure terminal
pnp automatic dhcp-ipv6 enable
pnp automatic dns-ipv6 enable
pnp automatic cco-ipv6 enable
pnp automatic timeout 30
commit
Note You cannot disable both static and automatic PnP discovery modes at the same time. You must restart PnP
action every time you make changes to the PnP discovery configuration. You can do this using the pnp action
command restart.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
43
Host System Management
Configuring PnP Discovery Methods
FQDN
nfvis# show pnp
pnp status response "PnP Agent is running\nserver-connection\n status: Success\n time:
06:23:11 Jun 17\ndevice-info\n status: Success\n time: 06:23:06 Jun 17\nbackoff\n
status: Success\n time: 06:23:11 Jun 17\ncertificate-install\n status: Success\n
time: 06:21:38 Jun 17\ncli-exec\n status: Success\n time: 06:22:50 Jun 17\ntopology\n
status: Success\n time: 06:23:00 Jun 17\n"
pnp status ip-address apic-em-fqdn.cisco.com
pnp status ipv6-address ""
pnp status port 443
pnp status transport https
pnp status cafile /etc/pnp/certs/trustpoint/pnplabel
pnp status created_by user
pnp status dhcp_opt43 0
pnp status dns_discovery 0
pnp status cco_discovery 0
pnp status dhcp-ipv6 0
pnp status dns-ipv6 0
pnp status cco-ipv6 0
pnp status timeout 0
nfvis#
The following sample output shows that the static discovery mode is disabled, and the automatic discovery
mode is enabled for DHCP, DNS, and CCO:
DHCP:
nfvis# show pnp
pnp status response "PnP Agent is running\nserver-connection\n status: Success\n time:
05:05:59 Jun 17\ninterface-info\n status: Success\n time: 05:05:56 Jun
17\ndevice-info\n status: Success\n time: 05:05:38 Jun 17\nbackoff\n status:
Success\n time: 05:05:59 Jun 17\ncapability\n status: Success\n time: 05:05:44 Jun
17\ncertificate-install\n status: Success\n time: 05:01:19 Jun 17\ncli-exec\n
status: Success\n time: 04:58:29 Jun 17\ntopology\n status: Success\n time: 05:05:49
Jun 17\n"
pnp status ip-address 192.0.2.8
pnp status ipv6-address ""
pnp status port 443
pnp status transport https
pnp status cafile /etc/pnp/certs/trustpoint/pnplabel
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
44
Host System Management
Configuring PnP Discovery Methods
DNS:
nfvis# show pnp
pnp status response "PnP Agent is running\nserver-connection\n status: Success\n time:
05:13:55 Jun 17\ndevice-info\n status: Success\n time: 05:13:49 Jun 17\nbackoff\n
status: Success\n time: 05:13:55 Jun 17\ncertificate-install\n status: Success\n
time: 05:12:26 Jun 17\ncli-exec\n status: Success\n time: 05:13:34 Jun 17\ntopology\n
status: Success\n time: 05:13:45 Jun 17\n"
pnp status ip-address pnpserver.apic-em-fqdn.cisco.com
pnp status ipv6-address ""
pnp status port 443
pnp status transport https
pnp status cafile /etc/pnp/certs/trustpoint/pnplabel
pnp status created_by dns_discovery
pnp status dhcp_opt43 1
pnp status dns_discovery 1
pnp status cco_discovery 1
pnp status dhcp-ipv6 1
pnp status dns-ipv6 1
pnp status cco-ipv6 1
pnp status timeout 60
CCO:
nfvis# show pnp
pnp status response "PnP Agent is running\nserver-connection\n status: Success\n time:
05:24:25 Jun 17\ninterface-info\n status: Success\n time: 05:23:13 Jun
17\ndevice-info\n status: Success\n time: 05:23:01 Jun 17\nbackoff\n status:
Success\n time: 05:24:25 Jun 17\ncapability\n status: Success\n time: 05:23:06 Jun
17\nredirection\n status: Success\n time: 05:09:43 Jun 17\ncli-exec\n status:
Success\n time: 05:09:53 Jun 17\ncertificate-install\n status: Success\n time:
05:18:43 Jun 17\ntopology\n status: Success\n time: 05:23:10 Jun 17\n"
pnp status ip-address 192.0.2.8
pnp status ipv6-address ""
pnp status port 443
pnp status transport https
pnp status cafile /etc/pnp/certs/trustpoint/pnplabel
pnp status created_by cco_discovery
pnp status dhcp_opt43 1
pnp status dns_discovery 1
pnp status cco_discovery 1
pnp status dhcp-ipv6 1
pnp status dns-ipv6 1
pnp status cco-ipv6 1
pnp status timeout 60
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
45
Host System Management
PnP Action
PnP Action
You can start, stop, and restart any PnP action using the PnP action command or API.
Note NICs and WAN side are not upgraded as they are configured with
SR-IOV.
Once DPDK support is successfully enabled, you can disable DPDK only by resetting NFVIS to factory
settings.
Restrictions
• SR-IOV interfaces and DPDK support:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
46
Host System Management
DPDK Support on NFVIS
Note This restriction does not apply to ENCS 5000 series devices.
To enable DPDK, every device driver must be supported by DPDK. NFVIS does not support SR-IOV
interface upgrade to enable DPDK because SR-IOV device drivers are not supported by DPDK. If any
SR-IOV network has been configured on an interface, that interface will not support DPDK. Also if an
SR-IOV interface is attached to a bridge, the bridge does not support DPDK and if a bridge is supporting
DPDK, any SR-IOV interface cannot be attached to it.
• VNF downtime:
When DPDK support is enabled on a system, NFVIS upgrades virtual NICs attached to the VNFs. The
VNFs are powered down causing a downtime for the VNF service for a short duration of time. After the
upgrade is complete, all VNFs are powered up again.
System Requirements
DPDK support optimizes the performance by utilizing additional resources such as CPU and memory. If
NFVIS is not able to acquire additional processing or memory, DPDK support can not be enabled.
Enabling DPDK support requires additional core from each socket available in the system. Depending upon
the number of sockets present in the system, NFVIS acquires additional core for DPDK support.
Total Cores Before NFVIS 3.12.x NFVIS 3.12.x Without NFVIS 3.12 with DPDK
DPDK support support
Note If hyper-threading is enabled on the device, each core reflects two vCPUs in NFVIS portal under system
resource allocation.
The amount of memory required for DPDK support is summarized in the table below.
Total System Memory Reserved for NFVIS Additional memory required for
DPDK support
Up to 16 GB 3 GB 1 GB
Up to 32 GB 3 GB 1 GB
Up to 64 GB 4 GB 2 GB
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
47
Host System Management
DPDK Support on NFVIS
Total System Memory Reserved for NFVIS Additional memory required for
DPDK support
Up to 128 GB 4 GB 4 GB
Note The additional memory required for DPDK support is counted per NUMA node available on the system.
If DPDK status is in error state, DPDK support can be manually disabled. Before enabling DPDK again,
reboot the system to defragment the system memory and increase the chance of resource allocation for a
successfull configuration.
After enabling DPDK, SR-IOV configured physical NICs will not be able to interact with DPDK bridges. To
add a physical NIC to a DPDK bridge, all SR-IOV networks created on the interface should be removed first.
NFVIS will not allow adding an SR-IOV configured interface to a DPDK bridge. For more information, see
<dynamic sriov link>
To enable DPDK support:
config terminal
system setting dpdk enable
commit
To display the operational status that indicates DPDK support, use show system native settings command.
If NFVIS is unable to acquire sufficient resources, it shows an error state, and DPDK configuration can be
removed. After removing the configuration, DPDK can be enabled again.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
48
Host System Management
Storage Access
config terminal
no system settings dpdk
commit
Storage Access
•
configure terminal
system storage nfs_storage
nfs
100
10.29.173.131
/export/vm/amol
commit
configure terminal
vm_lifecycle images image myas10 src file:///data/mount/nfs_storage/repository/asav961.tar.gz
properties property placement value nfs_storage
commit
Deploy VM on NFS
To deploy a VM on NFS, under deployment vm group use placement type zone_host host nfs_storage
command.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
49
Host System Management
External Storage for Cisco ENCS 5400
ENCS 5400 Cisco 5400 Enterprise Network Compute System Hardware Installation
Guide
RAID configurations are performed from Cisco IMC for each hardware platform. For UCS-E devices, all
RAID configurations should be performed before NFVIS installation. For ENCS 5400, RAID configurations
can be done even after the NFVIS is installed, as the installation is not done on an external storage.
For each hardware platform a maximum of two external disks are supported. Starting from NFVIS 3.8.1
release, external disks are supported on ENCS 5400. For ENCS 5400, if the external disk is raided into a
single virtual group, it shows up as extdatastore1. Without the RAID card, ENCS 5400 can support multiple
external disks called as extdatastore1 and extdatastore2 depending upon the slot it occupies.
Note Power off the system before you remove or insert disks in ENCS 5400.
To display the number of external disks on the system, use the show system ext-disks command.
NAME
---------------
extdatastore1
To display the disk space on an external disk, use the show system disk-space command.
ASSOCIATED
PHYSICAL TOTAL SIZE SIZE USE
DISK NAME DISK SIZE USED AVAILABLE PERCENT
------------------------------------------------------------
lv_data sde2 99G 4.3G 94G 5%
lv_var sde2 3.9G 245M 3.4G 7%
lv_root sde2 7.8G 1.9G 5.5G 26%
extdatastore1 sda 917G 77M 871G 1%
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
50
Host System Management
Host System Operations
A notification and syslog is sent to indicate that a power cycle was performed.
Reboot System
To reboot NFVIS, use the following command:
Shutdown System
To shutdown NFVIS, use the following command:
A notification and syslog will be sent to indicate that the system was shutdown.
System file-list
To view a list of files on the system, use the show system file-list command.
System file-copy
To copy a file from the USB drive to the /data/intdatastore/uploads directory, use the system file-copy
command. To copy a VM image from the USB drive:
configure terminal
system usb-mount mount active
system file-copy usb file name usb1/package/isrv-universalk9.16.03.01.tar.gz
commit
The system file-copy command can also be used to copy a file from the given source path to the given
destination path. The allowed directories for source path and destination path are /data/intdatastore,
/mnt/extdatastore1, /mnt/extdatastore2 and /data/mount.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
51
Host System Management
Host System Operations
System file-delete
The system file-delete command is used to delete a file from one of these directories: /data/intdatastore,
/mnt/extdatastore1, /mnt/extdatastore2, /mnt-usb/ or /data/mount
Secure Copy
The secure copy (scp) command allows only the admin user to securely copy files from NFVIS to an external
system, or from an external system to NFVIS. For example, this command can be used to copy an upgrade
package to NFVIS.
The syntax for this command is:
scp <source> <destination>
Note For detailed information about how to use the scp command to copy to or from supported locations, see the
scp section in Cisco Enterprise Network Function Virtualization Infrastructure Software Command Reference.
SCP between two NFVIS devices is not supported.
Examples
The following example copies the sample.txt file from intdatastore to an external system.
nfvis# scp intdatastore:sample.txt [email protected]:/Users/user/Desktop/sample.txt
The following example copies the test.txt file from an external system to intdatastore.
nfvis# scp [email protected]:/Users/user/Desktop/test.txt intdatastore:test_file.txt
The following example copies the test.txt file from an external system to USB.
nfvis# scp [email protected]:/user/Desktop/my_test.txt usb:usb1/test.txt
The following example copies the sample.txt file from an external system with IPv6 address.
nfvis# scp user@[2001:DB8:0:ABCD::1]:/user/Desktop/sample.txt intdatastore:sample.txt
The following example shows how to secure copy from techsupport as source:
nfvis# scp logs:nfvis_techsupport.tar.gz
[email protected]:/Users/user/Desktop/copied_techsupport.tar.gz
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
52
Host System Management
Route Distribution
There is a strong password check enforced for the new BIOS password. The new password should contain:
• At least one lowercase character
• At least one uppercase character
• At least one number
• At least one special character from #, @ or _
• Password length should be between 7 and 20 characters
• The first character cannot be a #
There is a strong password check enforced for the new CIMC password. The new password should contain:
• At least one lowercase character
• At least one uppercase character
• At least one number
• At least one special character from #, @ or _
• Password length should be between 8 and 20 characters
Route Distribution
The Route Distribution feature works together with a remote BGP router. It allows you to announce or withdraw
specified routes to the remote BGP router.
You can use this feature to announce the route of int-mgmt-net subnet to a remote BGP router. A remote user,
can access the VMs attached to int-mgmt-net through the VMs’ IP address on int-mgmt-net-br through a BGP
router, when the routes are successfully inserted on the remote BGP router.
To configure or update route distribution:
configure terminal
route-distribute 172.25.221.17local-bridge wan-br local-as 45.45remote-as 65000 network-subnet
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
53
Host System Management
Route Distribution
12.12.12.0/24
commit
Use the no route-distribute command to delete route distribution. To verify the route-distrubition status use
the show route-distribution command.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
54
Host System Management
Backup and Restore NFVIS and VM Configurations
Note To backup or restore a single VM, use vmImportAction and vmBackupAction APIs.
• The BACKUP_SUCCESS notification implies that the backup process has started successfully and does
not indicate a successful system backup.
• Backup of a large deployment is time consuming and can result in failure due to insufficient disk space.
The backup process cleans up the temporary files if the disk space is insufficient.
• You can either backup all the VMs or none.
• The final backup is a compressed file which requires temporary disk space to create the VM backup file.
If the system has only one datastore, the maximum deployment backups in a single file is around one-third
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
55
Host System Management
Backup and Restore NFVIS and VM Configurations
to half of the datastore disk space. If the deployments occupies more disk space, use vmExportAction to
backup an individual VM instead of relying on host backup for all VM deployments.
Use the hostaction backup force-stop command to stop the running backup.
To restore a previous backup on an existing NFVIS setup or on a new NFVIS setup use except-connectivity
option which preserves connectivity of the NFVIS and restores everything else from backup.
Note In hostaction restore process, the full file name (with .bkup extension) is required in the CLI.
The following example shows how to restore a backup on a different NFVIS device:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
56
Host System Management
Backup and Restore NFVIS and VM Configurations
• Factory-default-reset cleans up all files under /datastore/uploads/, but leave files under /datastore/
intact.
• hostaction restore requires backup bundle saved under /datastore/uploads/. The restore process
will not start if the backup bundle is saved in another location (bundle saved on USB or NFS should
be copied to datastore/uploads/ folder).
# Backup & Restore on the same NFVIS box without NFS & USB
# [[ BACKUP ]]
# before executing factory-default-reset
# [[RESTORE]]
# after NFVIS rebooted and login to console, copy file to uploads/ directory
For VM restoration:
• Use factory-default-reset all-except-images or factory-default-reset all-except-images-connectivity
command to keep original registered images intact.
• If you use factory-default-reset all command, you need to upload and register images before running
any hostaction restore action.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
57
Host System Management
APC UPS Support and Monitoring
This feature provides support for monitoring battery status for an APC UPS connected to the ENCS box
through a USB cable. NFVIS gracefully shuts down when the UPS battery reaches 5% and boots up again
when the battery reaches 15%. This feature is available only through NFVIS CLI and is disabled by default.
Incase of a prolonged power outage that drains the UPS battery completely, the box is powered off. When
power is restored to the UPS, CIMC boots up which in turn boots up the NFVIS.
To enable APC UPS support feature:
apcups enable
apcups disable
apcups battery-status
Note Factory default rese tmust be used only for troubleshooting purpose. We recommend you contact Cisco
Technical Support before performing factory default reset. This feature will reboot the system. Do not perform
any operations for at least twenty minutes until the system reboots successfully.
nfvis#factory-default-resetall|all-except-images|all-except-images-connectivity
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
58
Host System Management
Configure Banner, Message of the day and System Time
Note Enter Yes when you are prompted with the factory default warning message or no to cancel.
• /api/operations/factory-default-reset/all • factory-default-reset
• /api/operations/factory-default-reset/all-except-images
• /api/operations/factory-default-reset
/all-except-images-connectivity
configure terminal
banner-motd banner "This is a banner" motd "This is the message of the day"
commit
Note Currently, you can create banners and messages in English only. You can view the system-defined banner
using the show banner-motd command. This command does not display the user-defined banner or message.
• /api/config/banner-motd • banner-motd
• /api/operational/banner-motd • show banner-motd
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
59
Host System Management
Setting the System Time Manually or With NTP
configure terminal
system set-manual-time 2017-01-01T00:00:00
commit
Note NTP is automatically disabled when the time clock is set manually.
configure terminal
system time ntp preferred_server 209.165.201.20 backup_server 1.ntp.esl.cisco.com
commit
configure terminal
system time ntp-ipv6 2001:420:30d:201:ffff:ffff:fff4:35
commit
=================================================================================================================================================
If the NTP server is invalid, it will not be displayed in the table. Also, when an NTP server is queried, if a
response is not received before the timeout, the NTP server will also not be displayed in the table.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
60
Host System Management
Configuring System Logs
APIs Commands
ERROR Due to a serious problem, the software application is not able to perform
some function.
CRITICAL A serious error, indicating that the program itself may not be able to continue
running.
By default, the configuration log has a log-level of INFO. All logs of type INFO, WARNING, ERROR and
CRITICAL are logged.
By default, the operational log has a log-level of WARNING. All logs of type WARNING, ERROR and
CRITICAL are logged.
The log-level for these log files can be changed using the system set-log command:
The change to the log level is not persistant across a reboot. After a reboot, the default log levels are used.
The current log files are kept in the /var/log directory in the system:
• show log - To display the list of available log files
• show log {filename} - To display the contents of a specific log file
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
61
Host System Management
Configuring System Logs
Log Rotation
There is a size limit for the log files, under /var/log/ directory. When the log files reach the size limit, the
location of logs is rotated to another place. The space limit for the total size of all rotated log files is 2 GB.
The older log files are dropped automatically on reaching the space limit. You can also execute a command
to trigger the log rotation procedure. The log files are monitored periordically and if a log file gets too big, it
is rotated to another place.
There is a size limit for the log files stored in the /var/log directory. The size of the log files is monitored
periodically every fifteen minutes and if a log file gets too big, it is rotated to the /data/intdatastore/logs
directory. The space limit for the total size of all the rotated log files is 2 GB. The older log files are dropped
automatically on reaching the space limit. You can also execute the logrotate command to trigger the log
rotation procedure.
nfvis# logrotate
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
62
CHAPTER 4
VM Life Cycle Management
• Overview of VM Life Cycle Management, on page 63
• VM Image Packaging, on page 67
• Image Registration, on page 85
• VM Profiles or Flavors, on page 97
• Configure Internal Management Network, on page 98
• VM Deployment and Management, on page 98
• Access VNFs, on page 112
• Import and Export NFVIS VM, on page 113
• Secure Boot of VNFs, on page 115
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
63
VM Life Cycle Management
Workflow of VM Life Cycle Management
1. Register a VM Image—To register a VM image, you must first copy or download the relevant VM image
to the NFVIS server, or host the image on a http or https server. Once you have downloaded the file, you
can register the image using the registration API. The registration API allows you to specify the file path
to the location (on the http/https server) where the tar.gz file is hosted. Registering the image is a one-time
activity. Once an image is registered on the http or https server, and is in active state, you can perform
multiple VM deployments using the registered image.
2. Customizing the VM—After registering a VM image, you can optionally create a custom profile or flavor
for the VM image if the profiles defined in the image file do not match your requirement. The flavor
creation option lets you provide specific profiling details for a VM image, such as the virtual CPU on
which the VM will run, and the amount of virtual memory the VM will consume.
Depending on the topology requirement, you can create additional networks and bridges to attach the VM
to during deployment.
3. Deploy a VM— A VM can be deployed using the deployment API. The deployment API allows you to
provide values to the parameters that are passed to the system during deployment. Depending on the VM
you are deploying, some parameters are mandatory and others optional.
4. Manage and Monitor a VM—You can monitor a VM using APIs and commands that enable you to get
the VM status and debug logs. Using VM management APIs, you can start, stop, or reboot a VM, and
view statistics for a VM such as CPU usage.
A VM can also be managed by changing or updating its profile. You can change a VM's profile to one of
the existing profiles in the image file; alternatively, you can create a new custom profile for the VM.
The vNICs on a deployed VM can also be added or updated.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
64
VM Life Cycle Management
Uploading VM Images to an NFVIS Server
Note Before performing the VM life cycle management tasks, you will have to upload the VM images to the NFVIS
server or http/s server.
For details on APIs, see the VM Lifecycle Management APIs chapter in the API Reference for Cisco Enterprise
Network Function Virtualization Infrastructure Software.
configure terminal
system usb-mount mount ACTIVE
system file-copy usb file name usb1/package/isrv-universalk9.16.03.01.tar.gz
commit
Note Use the show system file-list disk usb command in privileged EXEC mode to view a list of files available
with the mounted USB drive. To save space, you can delete all unwanted text and TAR files from the default
location using the system file-delete command in global configuration mode.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
65
VM Life Cycle Management
Performing Resource Verification
00:00:01 4:01
!
!
!
62 ovs-ctl.log-20170323.gz /data/intdatastore/logs/2017-03/23/12-00 20 Other 2017-03-22
00:00:01
63 CentOS-7-x86_64-Everything-1511.ova /data/intdatastore/uploads 1.1G VM 2017-03-15 19:20:03
Package
64 TinyLinux.tar.gz /data/intdatastore/uploads 17M VM 2017-03-15 18:25:00 Package
65 Cisco-KVM-vWAAS-1300-6.3.0-b98.tar.gz /data/intdatastore/uploads 979M VM 2017-03-15
19:19:11 Package
66 ubuntu_14.04.3-server-amd64-disk1.tar /data/intdatastore/uploads 527M VM 2017-03-15
19:20:17.gz Package
67 asav961.tar.gz /data/intdatastore/uploads 164M VM 2017-03-15 18:24:57 Package
68 isrv-universalk9.16.03.01.tar.gz /data/intdatastore/uploads 1.3G VM 2017-03-15 19:19:53
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
66
VM Life Cycle Management
Configuring Management IP Subnet
Note To display information on all CPUs, VMs pinned to the CPUs, and VMs allocated to the CPUs, use the show
resources cpu-info command.
CPU Over-Subscription
Cisco Enterprise NFVIS does not allow CPU over-subscription for low-latency network appliance VMs (for
example, Cisco ISRv and Cisco ASAv). However, the CPU over-subscription is allowed for non low-latency
VMs (for example, Linux Server VM and Windows Server VM).
configure terminal
vm_lifecycle networks network int-mgmt-net subnet int-mgmt-net-subnet address 105.20.0.0
gateway 105.20.0.1 netmask 255.255.255.0 dhcp false
commit
VM Image Packaging
VM Image Packaging is a tool for converting qcow2 and img images into a tar.gz format with additional
properties and profiles. VM image packaging can be done in two ways:
• VM Image Packaging Utility: This is an enhanced packaging process that allows the VM owner to run
the nfvpt.py utility as a command with a combination of parameters to package the VM.
• Standard Image Packaging: This is a manual process in which a raw disk image (qcow2, img) is packaged
along with the image properties file and bootstrap files (if needed) into a TAR archive file.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
67
VM Life Cycle Management
VM Image Packaging Utility
Contents
The VM image packaging utility contains the following:
• nfvpt.py—It is a python based packaging tool that bundles the VM raw disk image/s along with VM
specific properties.
• image_properties_template.xml—This is the template file for the VM image properties file, and has the
parameters with default values. If the user provides new values to these parameters while creating the
VM package, the default values get replaced with the user-defined values.
• nfvis_vm_packaging_utility_examples.txt—This file contains examples on how to use the image packaging
utility to package a VM image.
Usage
To get the list of parameters that can be included in the command, and to get an explanation of each of the
parameters, run the help command for the tool.
nfvpt.py --help
optional arguments:
-h, --help show this help message and exit
--json JSON Provide JSON input for bootstrap variables; mutually
exclusive with custom and bootstrap configs
--newjson NEWJSON Provide JSON input for bootstrap variables; mutually
exclusive with custom and bootstrap configs
--log_dir LOG_DIR Log Directory to for logfiles
--multi_use Add options for use in multiple use-cases
--console_type_serial {true,false}
Attach the console serial to the VM; default is false;
--console_type_serial=true/false;
--root_file_disk_bus {virtio,ide}
root disk file type: --root_file_disk_bus=virtio/ide;
default is virtio
--virtual_interface_model {rtl8139}
--virtual_interface_model=rtl8139; default is none
--thick_disk_provisioning {true,false}
--thick_disk_provisioning=true; default is false
--eager_zero {true,false}
--eager_zero=true; default is false
--nocloud {true,false}
--nocloud=true/false; default is false
--bootstrap_cloud_init_bus_type {ide,virtio}
--bootstrap_cloud_init_bus_type=virtio; default is ide
--bootstrap_cloud_init_drive_type {cdrom,disk}
--bootstrap_cloud_init_drive_type=disk; default is
cdrom
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
68
VM Life Cycle Management
Usage
--bootstrap BOOTSTRAP
Every bootstrap file should be a different option Non
HA format: --bootstrap
<mountpoint>:<file1>,<mountpoint>:<file2>... See
usage.txt for more details HA format for SDWAN
NetworkHub: --bootstrap mount_point:<value>,file:<file
2mount>[,<attrib>:<value>] mount_point:<value> and
file:<file2mount> are mandatory followed by one or
more attributes in the format <attrib>:<value>
--interface_hot_add {true,false}
VM supports interface add without power off. Default
is set to true; --interface_hot_add=true/false
--interface_hot_delete {true,false}
VM supports interface delete without power off.
Default is set to false;
--interface_hot_delete=true/false
-v, --verbose verbose
-q, --quiet quiet
--no_compress creates tar file without compressing the input files
--cleanup deletes all the input and configuration files upon tar
file created
--tablet {true,false}
: Add input device of type tablet --tablet=true/false;
--ha_package enable HA packaging
--mgmt_vnic MGMT_VNIC
VM management interface identifier
--pack_dir <DIR> PACK
package all files in directory
Required:
-o PACKAGE_FILENAME, --package_filename PACKAGE_FILENAME
[REQUIRED] file name for the target VNF package name-
default is root disk image name with extension .tar.gz
-i ROOT_DISK_IMAGE, --root_disk_image ROOT_DISK_IMAGE
[REQUIRED] List of root disk images to be bundled
example: --root_disk_image isrv.qcow2;
--root_disk_image isrv1.qcow2,isrv2.qcow2
--prop_template PROP_TEMPLATE
image properties template file name including path
default path is the current dir of the tool and name
is image_properties_template.xml if the user doesn't
input this option example: --prop_template
/usr/bin/image_properties_template.xml
-t VNF_TYPE, --vnf_type VNF_TYPE
[REQUIRED] VNF type, e.g. ROUTER, FIREWALL, vWAAS,
vWLC, and OTHER
-n NAME, --vnf_name NAME
[REQUIRED] Name of the VNF image
-r VNF_VERSION, --vnf_version VNF_VERSION
[REQUIRED] VNF version, e.g. --vnf_version 1.0 or
--vnf_version 0.9
--app_vendor APP_VENDOR
Application Vendor e.g. Cisco, Juniper etc
--monitored {true,false}
[REQUIRED] Monitored VNF: --monitored=true/false;
--optimize {true,false}
[REQUIRED] optimized VM: --optimize=true/false;
HA options:
--ha_capable
--ha_vnic HA_VNIC VM HA vnic
--ha_vnic_count HA_VNIC_COUNT
Number of ha_vnics
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
69
VM Life Cycle Management
Usage
Resources:
Resources: min and max - vCPU, memory and disk
Profile Options:
--profile PROFILE enter the profile name, profile description, no of
vCPU required, min memory required in MB, min disk
space required in MB, example: --profile
profile1,"This is profile 1",2,2048,4096 --profile
profile2,"This is profile 2",4,4096,4096
--default_profile DEFAULT_PROFILE
default profile
Privilege/Priority Options:
--privileged {true,false}
Not supported
Custom Properties:
--custom CUSTOM custom properties format: --custom ["propattr_"<attr>:
<value>],key:<value>,[keyattr_<attr>:<value>],type:<va
lue>,val<N>:<value>,[val<N>attr_<attr>:<value>] Allows
specification of custom properties: 0 or more
propattr_<attr>:<value> pairs - 'propattr' is a
keyword and used to specify property attributes
key:<value> pairs 0 or more keyattr_<attr>:value pairs
- 'keyattr' is a keyword and is used to specify key
attributes type:<value> pair - type of value
valN:<value> pair - val1:value,val2:value etc 0 or
more valNattr_<attr>:<value> pairs - 'val<N>attr' is
an attribute for val<N> See usage_examples.txt
The table lists the parameters that can be passed to the nfvpt.py command.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
70
VM Life Cycle Management
Usage
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
71
VM Life Cycle Management
Usage
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
72
VM Life Cycle Management
NFVIS Specific Enhancements
Note Use pack_dir option if the *.tar.gz already exists and you want to modify the bootstrap configuration file or
image_properties.xml manually.
The following parameters are added as part of the NFVIS specific enhancements:
Resources:
--vnic_names VNIC_NAMES
1:GigabitEthernet2,2:GigabitEthernet4
Usage
Follow the steps to change a single line in day-0 configuration file or add a single option in
image_properties.xml:
1. Get the working VM packaging image - isrv*.tar.gz.
2. Extract the contents - tar -xvf isrv*.tar.gz.
3. Modify the file contents as required.
4. nfvpt.py --pack_dir current-working-dir-with-files -i isrv.qcow2 -o isrv.tar.gz
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
73
VM Life Cycle Management
VM Packaging Utility Usage Examples
Note The bootstrap filename has to be day0-config. This cannot be modified as ASAv looks for the exact filename.
Note The bootstrap filename has to be ovf-env.xml . This cannot be modified as ISRv looks for the exact filename.
Example 4: Usage for a third party VM with config drive (ISO) mounted at specific path on the VM:
In this case, test.1.0.pkg : bootstrap.xml gets mounted as bootstrap.xml at the root, and the license.txt gets
mounted as /license/lic.txt.
Example 5: Usage for Palo Alto Firewall
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
74
VM Life Cycle Management
Standard VM Image Packaging
Note Cisco Enterprise NFVIS supports VM packaging in .tar.gz (compressed form of OVA) format. Ensure that
all supported third party VM images are available in the supported format.
Generating a VM Package
Package files are provided for Cisco ISRv, Cisco ASAv, and tiny Linux and Windows server 2000. Vendors
are responsible for packaging all third party VMs in the supported format.
1. Create a VM qcow2 image.
2. Create an image_properties.xml file with the VM properties. Ensure that you add all mandatory fields.
Include the profiles supported for the VM in this file, and select one default profile. If you do not want
to monitor the VM bootup, make the bootup time as -1.
3. Create bootstrap-config or day0-config, if any bootstrap configuration is required for the VM. If the
bootstrap configuration requires inputs from the user, use the tokens in the xml or text file. These tokens
are populated during the VM deployment with the provided data.
Note A VM deployment may fail, if there are tokens in the configuration, and the user does not provide
the token values in the deployment payload.
4. Create a package.mf file, which lists all the files to be bundled into the .tar.gz file along with checksums.
5. Generate the packaging file using "tar -cvzf ova_file_name list_of_files_to_be_bundled".
For example, tar -cvzf isrv.tar.gz isrv-universalk9.03.16.02.S.155-3.S1a-ext-serial.qcow2
image_properties.xml isr_ovf_env.xml package.mf.
Appendix
VM Image Package Files
The table lists the contents of the VM package that are generated using the packaging tool:
Package Manifest Lists the files in the package and the expected Mandatory
(package.mf) checksum for the files.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
75
VM Life Cycle Management
Package Manifest File
VM image properties XML file with resources and features supported Mandatory
(vmname_properties.xml) by the VM
VM image (vmname.qcow2 ) Image file of the VM. Multiple images are Mandatory
supported. One root_disk image file is
mandatory.
File XML tree with details of file name, file type, and <file_info> Mandatory
information expected checksum. The root_image and
image_properties files are required.
File type Describes the file type. Supported types: <type> Mandatory
• root_image
• image_properties
• bootstrap_config_file
• ephemeral_disk1_image
• ephemeral_disk2_image
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
76
VM Life Cycle Management
Bootstrap Configuration File
Root Disk Root image disk <root_file_disk_bus> virtio, scsi, and Mandatory
Image Bus bus ide
Disk-1 bus type Additional disk1 <disk_1_file_disk_bus> virtio, scsi, and Optional
image disk bus ide
Disk-2 bus type Disk2 image disk <disk_2_file_disk_bus> virtio, scsi, and Optional
bus ide
Disk-10 bus Disk10 image disk <disk_10_file_disk_bus> virtio, scsi, and Optional
type bus ide
Root Disk Root image disk <root_image_disk_format> qcow2 and raw Mandatory
Image format format
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
77
VM Life Cycle Management
VM Image Properties File
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
78
VM Life Cycle Management
VM Image Properties File
BOOTSTRAP Bootstrap files for < bootstrap_file> File name of the Optional
the VNF. Two bootstrap file
parameters are
required in the
format of dst:src;
dst filename
including path has
to match exactly to
what the VM
expects; up to 20
bootstrap files are
accepted. For
example:
--bootstrap
ovf-env.xml for
ISRv and
--bootstrap
day0-config for
ASAv
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
79
VM Life Cycle Management
VM Image Properties File
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
80
VM Life Cycle Management
VM Image Properties File
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
81
VM Life Cycle Management
Example: Package.mf
Note A virtual console is supported by default. Specify the root disk size as zero for multiple disks (for example,
vWaas deployment) as the system does not support populating multiple disk sizes. Actual disk sizes are
calculated from the root_disk files.
Example: Package.mf
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
82
VM Life Cycle Management
Example: Bootstrap Configuration File
<sriov_driver_list>i40evf</sriov_driver_list>
<pcie_supported>true</pcie_supported>
<pcie _driver_list> igb </pcie_driver_list>
<pcie _driver_list> igbvf</pcie_driver_list>
<pcie _driver_list> i40evf</pcie_driver_list>
<bootstrap_file_1> ovf-env.xml </bootstrap_file_1>
<monitoring_supported>true</monitoring_supported>
<monitoring_methods>ICMPPing</monitoring_methods>
<low_latency>true</low_latency>
<privileged_vm>true</privileged_vm>
<cdrom>true</cdrom>
<custom_property>
<tech_package>ax</tech_package>
<tech_package>sec</tech_package>
<tech_package>ipbase</tech_package>
<tech_package>appx</tech_package>
</custom_property>
<profiles>
<profile>
<name>ISRv1kv-small</name>
<description>ISRv upto 50MBPS performance</description>
<vcpus>1</vcpus>
<memory_mb>4096</memory_mb>
<root_disk_mb>8</root_disk_mb>
</profile>
<profile>
<name>ISRv1kv-medium</name>
<description>ISRv upto 250MBPS performance</description>
<vcpus>2</vcpus>
<memory_mb>4096</memory_mb>
<root_disk_mb>8</root_disk_mb>
</profile>
</profiles>
<default_profile>small</default_profile>
</image_properties>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
83
VM Life Cycle Management
Image Properties Template File
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
84
VM Life Cycle Management
Image Registration
</profiles>
<default_profile>small</default_profile>
</image_properties>
Image Registration
To register a VM image, you must first copy or download the relevant VM image to the NFVIS server, or
host the image on a http or https server. Once you have downloaded the file, you can register the image using
the registration API. The registration API allows you to specify the file path to the location (on the http/https
server) where the tar.gz file is hosted. Registering the image is a one-time activity. Once an image is registered
on the http or https server, and is in active state, you can perform multiple VM deployments using the registered
image. All VM images are available in VM packaging and VM package content. For more information see,
VM Image Packaging Utility, on page 68
HTTP/1.1 200 OK
<image xmlns="http://www.cisco.com/nfvis/vm_lifecycle" xmlns:y="http://tail-f.com/ns/rest"
xmlns:esc="http://www.cisco.com/nfvis/vm_lifecycle">
<name>isrv.03.16.02</name>
<image_id>585a1792-145c-4946-9929-e040d3002a59</image_id>
<public>true</public>
<state>IMAGE_ACTIVE_STATE</state></image>
HTTP/1.1 200 OK
<images xmlns="[http://www.cisco.com/esc/esc|http://www.cisco.com/nfvis/vm_lifecycle]"
xmlns:y="[http://tail-f.com/ns/rest|http://tail-f.com/ns/rest]"
xmlns:esc="[http://www.cisco.com/nfvis/vm_lifecycle|http://www.cisco.com/nfvis/vm_lifecycle]">
<image>
<name>isrv-9.16.03.01</name>
<src>http://data/nfvos-pkg/isr/isrv-universalk9.16.03.01.tar.gz</src>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
85
VM Life Cycle Management
Register VM Image with Multiple Root Disks
</image>
</images>
For more information on REST APIs related to image registration, see API Reference for Cisco Enterprise
NFVIS.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
86
VM Life Cycle Management
Register a Remote VM Image
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
87
VM Life Cycle Management
Update VM Image
The following table lists the placement values supported and their respective mappings.
Note If your preferred storage location is nfs, you must have it configured to be mounted on NFVIS using appropriate
CLIs before registering the image on it.
Update VM Image
You can only update the following image properties after a VM image has been registered.
• interface_hot_add
• interface_hot_delete
Note When using the REST API, the previously set value of the property must be deleted before updating it with
the new value.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
88
VM Life Cycle Management
Image Properties
2. Add (PUT) the new property value to replace the one you deleted in the previous step.
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H
Accept:application/vnd.yang.data+xml -H
Content-Type:application/vnd.yang.data+xml -X
PUT
https://172.29.91.28/api/config/vm_lifecycle/images/image/ISR_IMAGE/properties/property/interface_hot_add
--data '<value>true</value>'
HTTP/1.1 200 OK
<properties xmlns="http://www.cisco.com/nfvis/vm_lifecycle"
xmlns:y="http://tail-f.com/ns/rest" xmlns:vmlc="http://www.cisco.com/nfvis/vm_lifecycle">
<property>
<name>interface_hot_add</name>
<value>true</value>
</property>
<property>
<name>interface_hot_delete</name>
<value>false</value>
</property>
</properties>
Image Properties
The image_properties.xml file in the tar.gz package contains the property configuration data for a particular
image. Figure 3 depicts an example image_properties.xml file.
Some of the properties are mandatory and must be specified to register an image. If any of the mandatory
properties are omitted, the image registration fails.
Optional properties can be specified on an image-by-image basis and are not required.
The following table lists all the image properties that are supported in Cisco Enterprise NFVIS.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
89
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
90
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
91
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
92
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
93
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
94
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
95
VM Life Cycle Management
Image Properties
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
96
VM Life Cycle Management
VM Profiles or Flavors
<SSH_USERNAME> </SSH_USERNAME>
</custom_property>
<custom_property>
<SSH_PASSWORD> </SSH_PASSWORD>
</custom_property>
<profiles>
<profile>
<name>ISRv-mini</name>
<description>ISRv-mini</description>
<vcpus>1</vcpus>
<memory_mb>4096</memory_mb>
<root_disk_mb>8192</root_disk_mb>
</profile>
<profile>
<name>ISRv-small</name>
<description>ISRv-small</description>
<vcpus>2</vcpus>
<memory_mb>4096</memory_mb>
<root_disk_mb>8192</root_disk_mb>
</profile>
<profile>
<name>ISRv-medium</name>
<description>ISRv-medium</description>
<vcpus>4</vcpus>
<memory_mb>4096</memory_mb>
<root_disk_mb>8192</root_disk_mb>
</profile>
</profiles>
<default_profile>ISRv-small</default_profile>
</image_properties>
VM Profiles or Flavors
Flavors or profiles define VMs in terms of number of parameters for how to run the VM. Some of the parameters
that you can define in a VM profile or flavor are: number of vCPUs, RAM , disk size and so on.
Flavors are created as part of image registration if you use the tar.gz image packages for registering a VM.
However, for other image packages such as .qcow2, iso, and raw, you must define custom flavors based on
your requirements.
Note Unless specified otherwise in the deployment payload, the value assigned to the custom image property
default_profile is used at the time of deploying the VM. Only applicable to tar.gz image packages.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
97
VM Life Cycle Management
Configure Internal Management Network
<vcpus>2</vcpus>
</flavor>'
For more information on REST APIs related to creating VM flavors, see API Reference for Cisco Enterprise
NFVIS.
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
<ip_address>10.20.0.21</ip_address>
</interface>
The deployment API allows you to provide values to the parameters that are passed to the system during
deployment. Depending on the VM you are deploying, some parameters are mandatory and others optional.
Method URL
POST /api/config/vm_lifecycle/tenants/tenant/admin/deployment
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
98
VM Life Cycle Management
Example: Deploy VMs Using REST API
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
99
VM Life Cycle Management
VM Deployment Parameters
</vm_group>
</deployment>'
Verify VM Deployment
The following example shows how to get the operational data for a VM deployment using the command
show vm_lifecycle opdata tenants tenant admin deployments
<deployment_name>/<deployment_id>/<vmgroup_name>
VM Deployment Parameters
VNFs can be deployed using multiple mandatory and option parameters. The following table lists some of
the parameters.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
100
VM Life Cycle Management
VM Deployment Parameters
volumes Optional.
Up to 2 volumes could be added to a
deployment.
Location of the volumes can be local or NFS
(needs NFS mount name to be specified in
case of NFS)
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
101
VM Life Cycle Management
VM Bootstrap Configuration Options with a VM Deployment
<type>ssh</type>
<protocol>tcp</protocol>
<vnf_port>22</vnf_port>
<external_port_range>
<start>20022</start>
<end>20022</end>
</external_port_range>
</port>
</port_forwarding>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
102
VM Life Cycle Management
VM Monitoring
For examples on how to use bootstrap configuration options in the deployment payload, see the API Reference
for Cisco Enterprise Network Function Virtualization Infrastructure Software.
VM Monitoring
After VMs are deployed, they monitored periodically based on the metrics defined in the KPI section of
deployment data model. Monitoring can be enabled or disabled by modifying the <actionType> tag. See the
VM Actions section for details on the allowed values for the action Type tag and what they mean.
The following example shows how to disable monitoring for a VM.
curl -k -v -u "admin:password" -H
"Accept:application/vnd.yang.data+xml" -H
"Content-Type:application/vnd.yang.data+xml" -X POST
https://<NFVIS_IP>/api/operations/vmAction --data '<vmAction>
<actionType>DISABLE_MONITOR</actionType><vmName><vm-instance name></vmName></vmAction>'
Note If you are placing the VNF deployment on nfs, ensure that you have configured this storage option to be
mounted on NFVIS using appropriate CLIs before deploying the VNF.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
103
VM Life Cycle Management
VNF Volumes
<enforcement>strict</enforcement>
<host>datastore1</host>
</placement>
<recovery_policy>
<recovery_type>AUTO</recovery_type>
<action_on_recovery>REBOOT_ONLY</action_on_recovery>
</recovery_policy>
</vm_group>
</deployment>'
VNF Volumes
A VNF can be created and deployed with multiple volumes. Currently, NFVIS supports a maximum of two
volumes per VNF.
Note The storage locations datastore1, datastore2 and datastore3 are not supported for NFVIS 3.12.3 and later
releases.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
104
VM Life Cycle Management
Port Forwarding
Port Forwarding
By default, the wan bridge interface (wan-br) is used to redirect incoming traffic from WAN to access the
internal management network (int-mgmt-net) of the VM.
The bridge interface that is used to redirect traffic coming from the WAN side can be modified using the
source_bridge tag in the deployment payload as shown below.
<port_forwarding>
<port>
<type>ssh</type>
<protocol>tcp</protocol>
<vnf_port>22</vnf_port>
<source_bridge>MGMT</source_bridge>
<external_port_range>
<start>20122</start>
<end>20122</end>
</external_port_range>
</port>
</port_forwarding>
With the payload above, the traffic coming from the WAN side is redirected through the management interface
(MGMT) instead of the default WAN bridge (wan-br) interface.
NGIO
Next Generation Input/Output (NGIO) is supported on Cisco ENCS platforms from NFVIS release 3.11 and
later. Using the NGIO flag, the VM image informs its capability. Between ISRv and NFVIS image, NGIO is
used to decide the NIM enablement capability available for the VM. This is only for Cisco ISRv with Cisco
IOS XE image or Cisco IOS XE with SD-WAN image.
To enable NGIO on a VNF. a config data variable is added to the deployment payload as shown below.
<config_data>
<configuration>
<dst>bootstrap_config</dst>
<variable>
<name>TECH_PACKAGE</name>
<val>ax</val>
</variable>
<variable>
<name>ngio</name>
<val>enable</val>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
105
VM Life Cycle Management
VM States
</variable>
</configuration>
The following is an example of the interfaces added to a VNF, when the NGIO variable is detected and set
to enable.
<interface type='bridge'>
<source bridge='csxbr'/>
<model type='e1000'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0' multifunction='on'
/>
</interface>
<interface type='hostdev' managed='yes'>
<driver name='vfio'/>
<source>
<address type='pci' domain='0x0000' bus='0x0e' slot='0x10' function='0x1'/>
</source>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x1'
multifunction='on'/>
</interface>
<interface type='hostdev' managed='yes'>
<driver name='vfio'/>
<source>
<address type='pci' domain='0x0000' bus='0x0e' slot='0x10' function='0x3'/>
</source>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x2' multifunction='on'
/>
</interface>
VM States
The following table describes various VM states.
VM States Description
VM_UNDEF_STATE The initial state of a VM or VNF before deployment of this VM.
VM_DEPLOYING_STATE The VM or VNF is being deployed on to the NFVIS.
VM_MONITOR_UNSET_STATE The VM or VNF is deployed in NFVIS but the monitoring rules are
not applied.
VM_MONITOR_DISABLED_STATE Due to a VM action request or recovery workflow, the monitoring
or KPI rules applied to the VM were not enabled.
VM_STOPPING_STATE VM or VNF is being stopped.
VM_SHUTOFF_STATE VM or VNF is in stopped or shutoff state.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
106
VM Life Cycle Management
VNF Deployment Update
VM States Description
VM_STARTING_STATE VM or VNF is being started.
VM_REBOOTING_STAT VM or VNF is being rebooted.
VM_INERT_STATE VM or VNF is deployed but not alive. The KPI monitor is applied
and waiting for the VM to become alive.
VM_ALIVE_STATE VM or VNF is deployed and successfully booted up or alive as shown
in the KPI metric.
VM_UNDEPLOYING_STATE The deployment of a VM or VNF is being terminated.
VM_ERROR_STATE The VM or VNF is in an error state because the deployment or some
other operation has failed.
Note Before updating a VNF with another flavor, we recommend that you check whether CPUs are avaialble for
the required update.
Updating a VNF flavor only supports CPU and Memory changes and does not support disk size change.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
107
VM Life Cycle Management
Update CPU Topology
https://<nfvis_ip>/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/<deploymentID>
/vm_group/<VMGroupName>/flavor
--data
'<flavor><FlavorName></flavor>
Example: Changing the Flavor of a VNF from Flavor from ASAv5 to ASAv10
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H Content-Type:application/vnd.yang.data+xml -X PUT
https://172.29.91.32/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/
flavor --data '<flavor>ASAv10</flavor>
--data '<flavor>Isrv_CPUToplogy</flavor>'
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
108
VM Life Cycle Management
About Updating VNF Interfaces
Note Whether you would need to do a hot or cold update depends on the custom image properties set during image
registration. Refer to the table below for various custom image properties related to hot and cold updates.
Starting from ISRv 17.1, interface_hot_add and interface_hot_delete are set to true by default.
Interface Type Hot Add Hot Delete Hot Update for Moving
VNIC
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
109
VM Life Cycle Management
Update Interfaces
Note NFVIS also supports moving VNICs from one interface to another. For example, you can move a VNIC from
a VIRTIO interface to SRIOV, or from SRIOV to DPDK, and so on.
If the VNIC is updated to a different interface type like SRIOV or DPDK, the configuration of the vnic will
not be preserved.
Syslog is not generated in ISRv when an interface is updated from a DPDK enabled network to another DPDK
enabled network.
Update Interfaces
This topic walks you through how to perform various tasks related to updating interfaces such as adding an
interface, deleting an interface, and so on.
Add Interfaces
Single Interface: The following example shows how to add a single interface to a VM deployment.
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H Content-Type:application/vnd.yang.data+xml -X PUT
https://<NfvisIpAddress>/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/interfaces
--data '
<interfaces>
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
</interface>
<interface>
<nicid>newNIC</nicid>
<network>networkName</network>
</interface>
</interfaces>'
Multiple Interfaces: The following example shows how to add multiple interfaces (in this case, two) to a
VM deployment.
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H
Content-Type:application/vnd.yang.data+xml -X PUT
https://172.29.91.32/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/interfaces
--data '
<interfaces>
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
</interface>
<interface>
<nicid>1</nicid>
<network>wan-net</network>
</interface>
<interface>
<nicid>2</nicid>
<network>lan-net</network>
</interface>
</interfaces>'
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
110
VM Life Cycle Management
Update Interfaces
Delete Interfaces
The following REST API is used to delete an interface from a VM deployment.
curl -k -v -u admin:<password> -H
Accept:application/vnd.yang.data+xml -H
Content-Type:application/vnd.yang.data+xml -X PUT
https://<NfvisIpAddress>/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/interfaces
--data '
<interfaces>
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
</interface>
**** Note: Remove the required nicID along with content between <interface> and </interface>
******
</interfaces>'
Example: The following example shows how to delete an interface called NIC ID2, which was added in the
example of adding multiple interfaces in the Add Interfaces section above.
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H
Content-Type:application/vnd.yang.data+xml -X PUT
https://172.29.91.32/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/interfaces
--data '
<interfaces>
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
</interface>
<interface>
<nicid>1</nicid>
<network>wan-net</network>
</interface>
</interfaces>'
Notice that in the example above, NIC ID 2 has been excluded from the REST API for it to be deleted from
the deployment.
Example: The following example shows how to move nicid 1 from wan-net to wan2-net .
curl -k -v -u admin:Esc123# -H
Accept:application/vnd.yang.data+xml -H Content-Type:application/vnd.yang.data+xml -X PUT
https://172.29.91.32/api/config/vm_lifecycle/tenants/tenant/admin/deployments/deployment/ASAdep/vm_group/ASAvmgrp/interfaces
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
111
VM Life Cycle Management
Access VNFs
--data '
<interfaces>
<interface>
<nicid>0</nicid>
<network>int-mgmt-net</network>
</interface>
<interface>
<nicid>1</nicid>
<network>wan2-net</network>
</interface>
</interfaces>'
Access VNFs
In Cisco NFVIS, you can access VNFs in two ways after they have been deployed: through the VNC Console
and through the Serial Console.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
112
VM Life Cycle Management
Access VMs Using Serial Console
<port_forwarding>
<port>
<type>ssh</type>
<protocol>tcp</protocol>
<vnf_port>22</vnf_port>
<external_port_range>
<start>20122</start>
<end>20122</end>
</external_port_range>
</port>
<port>
<type>telnet</type>
<protocol>tcp</protocol>
<vnf_port>23</vnf_port>
<external_port_range>
<start>20123</start>
<end>20123</end>
</external_port_range>
</port>
</port_forwarding>
2. Log into VNF using SSH and port number given in the example payload (20122):
isrv-encs#
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
113
VM Life Cycle Management
Import and Export NFVIS VM
You can only create and save a VM backup to datastores. The backup file has .vmbkp extension. To verify
the backup:
nfvis# show system file-list disk local | display xpath | include backup
/system/file-list/disk/local[si-no='84']/name tiny_backup.vmbkp
nfvis# show system file-list disk local 84
SI NO NAME PATH SIZE TYPE DATE MODIFIED
--------------------------------------------------------------------------------------------
84 tiny_backup.vmbkp /mnt/extdatastore1 17M VM Backup Package 2019-01-31 19:31:32
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
114
VM Life Cycle Management
Secure Boot of VNFs
VNFs can indicate secure boot capability using properties in the image_properties.xml file in the tar.gz package
for the VNF.
You must set the following properties to enable secure boot of VNFs:
Name of the Image Property Value for non-secure boot VNF Value for secure boot VNF
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
115
VM Life Cycle Management
Secure Boot of VNFs
• shim_signature: N/A
Note On the NFVIS portal, the Image Repository page shows if the image is capable of secure boot.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
116
CHAPTER 5
Secure Overlay and Single IP Configuration
• Secure Overlay, on page 117
• Single Public IP Address and Secure Overlay, on page 124
• Single IP Address Without Secure Overlay, on page 126
Secure Overlay
An overlay is a virtualized network layer on top of the physical network with the support of its infrastructure
to provide additional security to the newtork. IPSec is a framework with protocols and algorithms to provide
secured data transimission over unprotected or untrusted networks. IPSec secure tunnel is created between
two networks to ensure virtual private network communication.
Secure overlay in NFVIS allows IPSec tunnel establishment between NFVIS supporting the vBranch platform
and a VPN server and allows the orchestrator to manage NFVIS over the IPSec tunnel.
• IKE cipher:
• aes128-sha1-mopd1536
• Introduced in NFVIS 3.12.3 release - aes256-sha512-modp2048
• Introduced in NFVIS 3.12.3 release - aes256-sha512-modp4096
• ESP cipher:
• aes128-sha1
• Introduced in NFVIS 3.12.3 release - aes256-sha512
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
117
Secure Overlay and Single IP Configuration
Secure Overlay
• Introduced in NFVIS 3.12.1 release - Secure overlay is support on NFVIS Dual WAN feature. DHCP
client toggles between wan and wan2 to request for an IP address. When IP address and default gateway
are obtained from an interface with DHCP configuration, the toggling stops. If dual-local-bridge is
configured, to start overlay, NFVIS selects the interface between local-bridge and dual-local-bridge, in
the following order:
• Interface with DHCP configuration.
• Interface having static IP address.
• If both interfaces have static IP address, local-bridge interface.
• Local identity:
• IP address or FQDN
• Introduced in NFVIS 3.12.3 release - email domain
• Remote identity:
• IP address or FQDN
• Introduced in NFVIS 3.12.3 release - Distinguish Name
• Introduced in NFVIS 3.12.3 release - email domain
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
118
Secure Overlay and Single IP Configuration
Secure Overlay
1. NFVIS has WAN IP address, static IP address or DHCP IP address. NFVIS calls home PnP server.
2. The PnP server pushes NFVIS Day-0 configurations including the secure overlay configuration.
3. NFVIS establishes IPSec connection between NFVIS and the headend management hub which has IPSec
VPN configurations. On NFVIS side, the tunnel end point has NFVIS local system IP address.
4. After the IPSec tunnel is up, the headend can connect to NFVIS through the system IP address and manage
NFVIS over the IPSec tunnel.
configure terminal
secure-overlay mgmthub
remote-interface-ip-addr 10.85.189.36
local-bridge wan-br
remote-system-ip-addr 10.19.18.251
remote-id mgmt-hub.cloudvpn.com
local-system-ip-addr 14.14.14.4
psk local-psk Cisco1234Admin
remote-psk Cisco1234Admin
commit
confirgure terminal
secure-overlay myconn
local-system-ip-addr 12.12.12.1
local-system-ip-bridge int-mgmt-net
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
119
Secure Overlay and Single IP Configuration
Secure Overlay
remote-interface-ip-addr 172.19.160.75
remote-system-ip-addr 192.168.1.90
ike-cipher aes256-sha512-modp2048
esp-cipher aes256-sha512
remote-id "CN=vbranch, unstructuredAddress=172.19.160.75,
unstructuredName=Headend.headendvpn"
local-id [email protected]
commit
configure terminal
secure-overlay myconn eap
username admin
password Cisco123#
cacert intdatastore:uploads/csr.pem
commit
Note Secure overlay configuration on NFVIS must match with VPN configuration on the VPN server. The secure
overlay tunnel will not be established successfully if the configurations do not match.
<secure-overlay>
<name>mgmthub</name>
<local-bridge>wan-br</local-bridge>
<local-system-ip-addr>14.14.14.4</local-system-ip-addr>
<remote-interface-ip-addr>10.85.189.36</remote-interface-ip-addr>
<remote-system-ip-addr>10.19.18.251</remote-system-ip-addr>
<remote-id>mgmt-hub.cloudvpn.com</remote-id>
<psk>
<local-psk>Cisco1234Admin</local-psk>
<remote-psk>Cisco1234Admin</remote-psk>
</psk>
</secure-overlay>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
120
Secure Overlay and Single IP Configuration
Secure Overlay
interface Loopback1
description for IKEv2
ip address 10.253.254.1 255.255.255.255
interface GigabitEthernet0/0/1
description Corp_Network
ip address 10.85.189.36 255.255.255.0
negotiation auto
interface GigabitEthernet0/0/2
ip address 10.19.18.250 255.255.255.0
negotiation auto
<secure-overlay>
<name>mgmthub</name>
<local-bridge>wan-br</local-bridge>
<local-system-ip-addr>12.12.12.1</local-system-ip-addr>
<local-system-ip-bridge>int-mgmt-net</local-system-ip-bridge>
<remote-interface-ip-addr>10.85.189.36</remote-interface-ip-addr>
<remote-system-ip-addr>10.19.18.251</remote-system-ip-addr>
<remote-id>mgmt-hub.cloudvpn.com</remote-id>
<psk>
<local-psk>Cisco1234Admin</local-psk>
<remote-psk>Cisco1234Admin</remote-psk>
</psk>
</secure-overlay>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
121
Secure Overlay and Single IP Configuration
Secure Overlay
<secure-overlay>
<name>mgmthub</name>
<local-bridge>wan-br</local-bridge>
<dual-local-bridge>wan2-br</dual-local-bridge.
<local-system-ip-addr>12.12.12.1</local-system-ip-addr>
<local-system-ip-bridge>int-mgmt-net</local-system-ip-bridge>
<remote-interface-ip-addr>10.85.189.36</remote-interface-ip-addr>
<remote-system-ip-addr>10.19.18.251</remote-system-ip-addr>
<remote-id>mgmt-hub.cloudvpn.com</remote-id>
<psk>
<local-psk>Cisco1234Admin</local-psk>
<remote-psk>Cisco1234Admin</remote-psk>
</psk>
</secure-overlay>
EAP authentication
<secure-overlay>
<name>mgmthub</name>
<local-bridge>wan-br</local-bridge>
<local-system-ip-addr>12.12.12.1</local-system-ip-addr>
<local-system-ip-bridge>int-mgmt-net</local-system-ip-bridge>
<local-id>[email protected]</local-id>
<remote-interface-ip-addr> 172.19.160.75</remote-interface-ip-addr>
<remote-system-ip-addr> 192.168.1.90</remote-system-ip-addr>
<remote-id>CN=vbranch, unstructuredAddress=172.19.160.75,
unstructuredName=Headend.headendvpn</remote-id>
<ike-cipher>aes256-sha512-modp2048</ike-cipher>
<esp-cipher>aes256-sha51</esp-cipher>
<eap>
<username>admin</username>
<password>Cisco123#</password>
<cacert>https://cert/csr.pem</cacert>
</eap>
</secure-overlay>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
122
Secure Overlay and Single IP Configuration
Secure Overlay
interface Loopback1
ip address 192.168.254.1 255.255.255.0
interface GigabitEthernet1
ip address 172.19.160.75 255.255.255.0
negotiation auto
no mop enabled
no mop sysid
interface GigabitEthernet2
ip address 192.168.1.90 255.255.255.0
negotiation auto
no mop enabled
no mop sysid
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
123
Secure Overlay and Single IP Configuration
Single Public IP Address and Secure Overlay
ip unnumbered Loopback1
ip mtu 1400
ip tcp adjust-mss 1360
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4
tunnel protection ipsec profile uCPE-ips-prof
To create a single-ip-mode:
configure terminal
single-ip-mode vm-name ROUTER.ROUTER
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
124
Secure Overlay and Single IP Configuration
Single Public IP Address and Secure Overlay
After secure overlay over WAN is established, the orchestrator sends requests to configure single IP mode
and deploy the guest router that takes the public IP address.
1. NFVIS deploys the VM with specified bootstrap and Day-0 configuration. NFVIS takes down the current
IPSec tunnel and releases the public IP address.
2. The VM takes the public IP address when it is in active state. NFVIS sets up the IPSec tunnel again with
the remote management hub.
3. After the IPSec tunnel is up, the orchestrator can connect to NFVIS through its system IP address and
manage NFVIS over the IPSec tunnel.
In single IP mode, NFVIS monitors the guest VM taking the public IP address. NFVIS takes WAN IP address
back when the guest VM is:
• In error state.
• Stopped through vmAction.
• Undeployed.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
125
Secure Overlay and Single IP Configuration
Single IP Address Without Secure Overlay
3. When IPSec tunnel is up, the VPN server can connect to NFVIS through its system IP address and manage
NFVIS over the IPSec tunnel.
The guest VM has routing function to route traffic between the two interfaces and Network address translation
(NAT) enabled. NFVIS reaches remote through int-mgmt-net-br to the guest VM.
The int-mgmt-net-br address pool and gateway IP address must be unique on each NFVIS. If secure overlay
is configured, single IP mode is setup when VM is active and int-mgmt-net-br is used as a local-bridge.
/api/config/single-ip-mode single-ip-mode
/api/operational/single-ip-mode
Note This feature is only supported for WAN bridge in NFVIS 3.10.1 release.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
126
Secure Overlay and Single IP Configuration
Single IP Address Without Secure Overlay
To reach NFVIS when secure overlay is not configured, you must first configure the guest device and manage
IP addressing. The rest of the functionality, switching IP address between NFVIS and the guest device is the
same as IP address with secure overlay.
Typically you need two IP addresses in each site, one for NFVIS and one for the VM. You can enable the
single IP feature to reduce one public IP address. The single public IP address is used by NFVIS after deploying
the VM with the single IP feature. After the VM comes up, NFVIS releases the public IP address for the VM
to use. NFVIS and the VM have an internal network to communicate with each other. The traffic between
NFVIS and an external network will need to go through the new VM and NAT by the new VM.
For single IP without secure overlay feature to work:
• From the Deploy page on NFVIS portal select single IP or configure the single IP mode by using the
single-ip-mode router.router command.
• Provide a bootstrap file for the VM.
• Enable Monitor for the VM and the internal network int-mgmt-net between NFVIS and VM is created
automatically.
---------------------
interface GigabitEthernet1
ip nat inside
negotiation auto
!
interface GigabitEthernet2
ip address 172.25.221.17 255.255.255.0
ip nat outside
negotiation auto
!
ip nat inside source list NAT interface GigabitEthernet2 overload
ip route 0.0.0.0 0.0.0.0 172.25.221.1
!
ip access-list standard NAT
permit 10.20.0.0 0.0.0.25
-------------
When the VM is down, NFVIS takes back the single IP address and the external server can communicate with
NFVIS directly.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
127
Secure Overlay and Single IP Configuration
Single IP Address Without Secure Overlay
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
128
CHAPTER 6
Security Considerations
This chapter describes the security features and considerations in NFVIS. It gives a high-level overview of
security related components in NFVIS to plan a security strategy for deployments specific to you. It also has
recommendations on security best practices for enforcing the core elements of network security.
The NFVIS software has security embedded right from installation through all software layers. The subsequent
chapters focus on these out-of-the-box security aspects such as credential management, integrity and tamper
protection, session management, secure device access and more.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
129
Security Considerations
Installation
Installation
To ensure that the NFVIS software has not been tampered with , the software image is verified before
installation using the following mechanisms:
RPM Signing
All RPM packages in the Cisco Enterprise NFVIS ISO and upgrade images are signed to ensure cryptographic
integrity and authenticity. This guarantees that the RPM packages have not been tampered with and the RPM
packages are from NFVIS. The private key used for signing the RPM packages is created and securely
maintained by Cisco.
Scenario Description
Cisco Enterprise NFVIS 3.7.1 and later installations If the signature verification fails while installing Cisco
Enterprise NFVIS, the installation is aborted.
Cisco Enterprise NFVIS upgrade from 3.6.x to The RPM signatures are verified when the upgrade is
Release 3.7.1 being performed. If the signature verification fails, an
error is logged but the upgrade is completed.
Cisco Enterprise NFVIS upgrade from Release 3.7.1 The RPM signatures are verified when the upgrade
to later releases image is registered. If the signature verification fails,
the upgrade is aborted.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
130
Security Considerations
ENCS Secure Boot
NFVIS ISO image or upgrade image matches the hash published by Cisco, run the following command and
compare the hash with the published hash:
% /usr/bin/sha512sum <ImageFile>
c2122783efc18b039246ae1bcd4eec4e5e027526967b5b809da5632d462dfa6724a9b20ec318c74548c6bd7e9b8217ce96b5ece93dcdd74fda5e01bb382ad607
<ImageFile>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
131
Security Considerations
Device Access
Device Access
NFVIS provides different access mechanisms including console as well as remote access based on protocols
such as HTTPS and SSH. Each access mechanism should be carefully reviewed and configured. Ensure that
only the required access mechanisms are enabled and that they are properly secured. The key steps to securing
both interactive and management access to NFVIS are to restrict the device accessibility, restrict the capabilities
of the permitted users to what is required, and restrict the permitted methods of access. NFVIS ensures that
the access is only granted to authenticated users and they can perform just the authorized actions. Device
access is logged for auditing and NFVIS ensures the confidentiality of locally stored sensitive data.
It is critical to establish the appropriate controls in order to prevent unauthorized access to NFVIS. The
following sections describe the best practices and configurations to achieve this:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
132
Security Considerations
Enforced Password Change at First Login
API:
/api/config/rbac/authentication/min-pwd-length
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
133
Security Considerations
Limit previous password reuse
The admin user can configure minimum and maximum lifetime values for passwords for all users and enforce
a rule to check these values. The default minimum lifetime value is set to 1 day and the default maximum
lifetime value is set to 60 days.
When a minimum lifetime value is configured, the user cannot change the password until the specified number
of days have passed. Similarly, when a maximum lifetime value is configured, a user must change the password
before the specified number of days pass. If a user does not change the password and the specified number
of days have passed, a notification is sent to the user.
Note The minimum and maximum lifetime values and the rule to check for these values are not applied to the admin
user.
CLI:
configure terminal
rbac authentication password-lifetime enforce true min-days 2 max-days 30
commit
API:
/api/config/rbac/authentication/password-lifetime/
Note The inactivity period and the rule to check the inactivity period are not applied to the admin user.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
134
Security Considerations
Activating an Inactive User Account
The following CLI and API can be used to configure the enforcement of account inactivity.
CLI:
configure terminal
rbac authentication account-inactivity enforce true inactivity-days 30
commit
API:
/api/config/rbac/authentication/account-inactivity/
configure terminal
rbac authentication users user guest_user activate
commit
API:
/api/operations/rbac/authentication/users/user/username/activate
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
135
Security Considerations
Role Based Access Control
An employee's role in the enterprise should be used to determine the permissions granted, in order to ensure
that employees with lower privileges can't access sensitive information or perform critical tasks.
The following user roles and privileges are defined in NFVIS
Operators Can Start and stop a VM, and view all information.
Benefits of RBAC
There are a number of benefits to using RBAC to restrict unnecessary network access based on people's roles
within an organization, including:
• Improving operational efficiency.
Having predefined roles in RBAC makes it is easy to include new users with the right privileges or switch
roles of existing users. It also cuts down on the potential for error when user permissions are being
assigned.
• Enhancing compliance.
Every organization must comply with local, state and federal regulations. Companies generally prefer
to implement RBAC systems to meet the regulatory and statutory requirements for confidentiality and
privacy because executives and IT departments can more effectively manage how the data is accessed
and used. This is particularly important for financial institutions and healthcare companies that manage
sensitive data.
• Reducing costs.
By not allowing user access to certain processes and applications, companies may conserve or use
resources such as network bandwidth, memory and storage in a cost-effective manner.
• Decreasing risk of breaches and data leakage.
Implementing RBAC means restricting access to sensitive information, thus reducing the potential for
data breaches or data leakage.
configure terminal
rbac authentication users create-user name networkadmin password Test1_pass role
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
136
Security Considerations
Restrict Device Accessibility
administrators
commit
Note The user groups or roles are created by the system. You cannot create
or modify a user group.
To change the password, use the rbac authentication users user
change-password command in global configuration mode. To change
the user role, use the rbac authentication users user change-role
command in global configuration mode.
configure terminal
rbac authentication users delete-user name test1
• Periodically conduct audits to evaluate the roles, the employees who are assigned to them and the access
that's permitted for each role. If a user is found to have unnecessary access to a certain system, change
the user’s role.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
137
Security Considerations
Restrict Access To Authorized Networks For Authorized Services
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
138
Security Considerations
Restrict Access To Authorized Networks For Authorized Services
The following sample configurations illustrate some scenarios that can be adapted for specific use-cases.
Configuring the IP Receive ACL
The more restrictive an ACL, the more limited the exposure to unauthorized access attempts. However, a
more restrictive ACL can create a management overhead, and can impact accessibility to perform
troubleshooting. Consequently, there is a balance to be considered. One compromise is to restrict access to
internal corporate IP addresses only. Each customer must evaluate the implementation of ACLs in relation to
their own security policy, risks, exposure, and acceptance thereof.
Reject ssh traffic from a subnet:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
139
Security Considerations
Privileged Debug Access
Removing ACLs:
When an entry is deleted from ip-receive-acl, all configurations to that source are deleted since the source IP
address is the key. To delete just one service, configure other services again.
Challenge String (Please copy everything between the asterisk lines exclusively):
********************************************************************************
SPH//wkAAABORlZJU0VOQ1M1NDA4L0s5AQAAABt+dcx+hB0V06r9RkdMMjEzNTgw
RlHq7BxeAAA=
DONE.
********************************************************************************
3. The Cisco member enters the Challenge string on an Interactive Debug server maintained by Cisco. This
server verifies that the Cisco user is authorized to debug NFVIS using the shell, and then returns a response
string.
4. Enter the response string on the screen below this prompt:
Input your response when ready:
5. When prompted, the customer should enter the admin password.
6. You get shell-access if the password is valid.
7. Development or TAC team uses the shell to proceed with the debugging.
8. To exit shell-access type Exit.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
140
Security Considerations
Secure Interfaces
Secure Interfaces
NFVIS management access is allowed using the interfaces shown in the diagram. The following sections
describe security best practices for these interfaces to NFVIS.
Console
The console port is an asynchronous serial port that allows you to connect to the NFVIS CLI for initial
configuration. A user can access the console with either physical access to the NFVIS or remote access through
the use of a terminal server. If console port access is required via a terminal server, configure access lists on
the terminal server to allow access only from the required source addresses.
SSH
Users can access the NFVIS CLI by using SSH as a secure means of remote login. The integrity and
confidentiality of NFVIS management traffic is essential to the security of the administered network since
administration protocols frequently carry information which could be used to penetrate or disrupt the network.
NFVIS uses SSH version 2, which is Cisco's and the Internet's de facto standard protocol for interactive logins
and supports strong encryption, hash, and key exchange algorithms recommended by the Security and Trust
Organization within Cisco.
NETCONF
The Network Configuration Protocol (NETCONF) is a Network Management protocol developed and
standardized by the IETF for the automated configuration of network devices.
The NETCONF protocol uses an Extensible Markup Language (XML) based data encoding for the configuration
data as well as the protocol messages. The protocol messages are exchanged on top of a secure transport
protocol.
NETCONF allows NFVIS to expose an XML-based API that the network operator can use to set and get
configuration data and event notifications securely over SSH.
For more information see, NETCONF Event Notifications, on page 181.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
141
Security Considerations
REST API
REST API
NFVIS can be configured using RESTful API over HTTPS. The REST API allow the requesting systems to
access and manipulate the NFVIS configuration by using a uniform and predefined set of stateless operations.
Details on all the REST APIs can be found in the NFVIS API Reference guide.
When the user issues a REST API, a session is established with NFVIS. In order to limit risks related to denial
of service attacks, NFVIS limits the total number of concurrent REST sessions to 100.
Session Management
The stateless nature of HTTP and HTTPS requires a method of uniquely tracking users through the use of
unique session IDs and cookies.
NFVIS encrypts the user’s session. The AES-256-CBC cipher is used to encrypt the session contents with an
HMAC-SHA-256 authentication tag. A random 128-bit Initialization Vector is generated for each encryption
operation.
An Audit record is started when a portal session is created. Session information is deleted when the user logs
out or when the session times out.
The default idle timeout for portal sessions is 15 minutes. However, this can be configured for the current
session to a value between 5 and 60 minutes on the Settings page. Auto-logout will be initiated after this
period. Multiple sessions are not permitted in a single browser. The Maximum number of concurrent sessions
are set to 30.
The NFVIS portal utilizes cookies to associate data with the user. It uses the following cookie properties for
enhanced security:
• ephemeral to ensure the cookie expires when the browser is closed
• httpOnly to make the cookie inaccessible from JavaScript
• secureProxy to ensure the cookie can only be sent over SSL.
Even after authentication, attacks such as Cross-Site Request Forgery (CSRF) are possible. In this scenario,
an end user might inadvertently execute unwanted actions on a web application in which they're currently
authenticated. To prevent this, NFVIS uses CSRF tokens to validate every REST API that is invoked during
each session.
URL Redirection
In typical web servers, when a page is not found on the web server, the user gets a 404 message; for pages
that exist, they get a login page. The security impact of this is that an attacker can perform a brute force scan
and easily detect which pages and folders exist.
To prevent this on NFVIS, all non-existent URLs prefixed with the device IP are redirected to the portal login
page with a 301 status response code. This means that irrespective of the URL requested by an attacker, they
will always get the login page to authenticate themselves.
All HTTP server requests are redirected to HTTPS and have the following headers configured:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
142
Security Considerations
HTTPS
• X-Content-Type-Options
• X-XSS-Protection
• Content-Security-Policy
• X-Frame-Options
• Strict-Transport-Security
• Cache-Control
Configure terminal
System portal access disabled
commit
HTTPS
All the HTTPS data to and from NFVIS uses Transport Layer Security (TLS) to communicate across the
network. TLS is the successor to Secure Socket Layer (SSL).
The TLS handshake involves authentication during which the client verifies the server's SSL certificate with
the certificate authority that issued it. This confirms that the server is who it says it is, and that the client is
interacting with the owner of the domain.
By default, NFVIS uses a self-signed certificate to prove its identity to its clients. This certificate has a 2048-bit
public key to increase the security of the TLS encryption, since the encryption strength is directly related to
the key size.
Certificate Management
NFVIS generates a self-signed SSL certificate when first installed. It is a security best practice to replace this
certificate with a valid certificate signed by a compliant Certificate Authority (CA).
Use the following steps to replace the default self-signed certificate:
1. Generate a Certificate Signing Request (CSR) on NFVIS.
A Certificate Signing request (CSR) is a file with a block of encoded text that is given to a Certificate
Authority when applying for an SSL Certificate. This file contains information that should be included
in the certificate such as the organization name, common name (domain name), locality, and country. The
file also contains the public key that should be included in the certificate. NFVIS uses a 2048-bit public
key since encryption strength is higher with a higher key size.
To generate a CSR on NFVIS, run the following command:
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
143
Security Considerations
SNMP Access
From an external host, use the scp command to download the Certificate Signing Request.
Contact a Certificate authority to issue a new SSL server certificate using this CSR.
3. Install the CA Signed Certificate.
From an external server, use the scp command to upload the certificate file into NFVIS to the
data/intdatastore/uploads/ directory.
SNMP Access
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing
information about managed devices on IP networks, and for modifying that information to change device
behavior.
Three significant versions of SNMP have been developed. NFVIS supports SNMP version 1, version 2c and
version 3. SNMP versions 1 and 2 use community strings for authentication, and these are sent in plain-text.
So, it is a security best practice to use SNMP v3 instead.
SNMPv3 provides secure access to devices by using three aspects: - users, authentication, and encryption.
SNMPv3 uses the USM (User-based Security Module) for controlling access to information available via
SNMP. The SNMP v3 user is configured with an authentication type, a privacy type as well as a passphrase.
All users sharing a group utilize the same SNMP version, however, the specific security level settings (password,
encryption type, etc.) are specified per-user.
The following table summarizes the security options within SNMP
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
144
Security Considerations
Legal Notification Banners
Since its adoption by NIST, AES has become the dominant encryption algorithm throughout the industry. To
follow the industry's migration away from MD5 and toward SHA, it is a security best practice to configure
the SNMP v3 authentication protocol as SHA and privacy protocol as AES.
For more details on SNMP see, Introduction about SNMP, on page 182
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
145
Security Considerations
Factory Default Reset
action in the event of a security breach. In cooperation with the company legal counsel, statements which may
be included in a legal notification banner include:
• Notification that the system access and use is permitted only by specifically authorized personnel, and
perhaps information about who may authorize use.
• Notification that unauthorized access and use of the system is unlawful, and may be subject to civil and/or
criminal penalties.
• Notification that access and use of the system may be logged or monitored without further notice, and
the resulting logs may be used as evidence in court.
• Additional specific notices required by specific local laws.
From a security rather than a legal point of view, a legal notification banner should not contain any specific
information about the device, such as its name, model, software, location, operator or owner because this kind
of information may be useful to an attacker.
The following is a sample legal notification banner which can be displayed before login:
UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED You must have explicit, authorized permission
to access or configure this device. Unauthorized attempts and actions to access or use
this system may result in civil and/or criminal penalties. All activities performed on this
device are logged and monitored
NFVIS allows the configuration of a banner and Message of the Day (MOTD). The banner is displayed before
the user logs in. Once the user logs in to NFVIS, a system-defined banner provides Copyright information
about NFVIS, and the message-of-the-day (MOTD), if configured, will appear, followed by the command
line prompt or portal view, depending on the login method.
It is recommended that a login banner is implemented to ensure that a legal notification banner is presented
on all the device management access sessions prior to a login prompt being presented. Use this command to
configure the banner and MOTD.
For more information about the banner command, see Configure Banner, Message of the day and System
Time, on page 59.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
146
Security Considerations
Infrastructure Management Network
• If the same device needs to be re-used at a different site with a new configuration, perform a Factory
Default reset to remove the existing configuration and bring it to a clean state.
all All configuration, uploaded image The admin account is retained and
files, VMs and logs. the password will be changed to the
factory default password.
Connectivity to the device will be
lost.
The user must choose the appropriate option carefully based on the purpose of the Factory Default reset.
For more information, see Resetting to Factory Default, on page 58.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
147
Security Considerations
Out-of-band Management
Out-of-band Management
An Out-of-band Management (OOB) management network consists of a network which is completely
independent and physically disparate from the data network that it helps to manage. This is also sometimes
referred to as a Data Communications Network (DCN). Network devices can connect to the OOB network
in different ways: – NFVIS supports a built-in management interface that can be used to connect to the OOB
network. NFVIS allows the configuration of a predefined physical interface, the MGMT port on the ENCS,
as a dedicated management interface. Restricting management packets to designated interfaces provides greater
control over the management of a device, thereby providing more security for that device. Other benefits
include improved performance for data packets on non-management interfaces, support for network scalability,
need for fewer access control lists (ACLs) to restrict access to a device, and prevention of management packet
floods from reaching the CPU.
Network devices can also connect to the OOB network via dedicated data interfaces. In this case, ACLs should
be deployed to ensure that management traffic is only handled by the dedicated interfaces.
For further information, see Configuring the IP Receive ACL, on page 12 and Port 22222 and Management
Interface ACL, on page 12.
In-band Management
An in-band management network uses the same physical and logical paths as the data traffic.
Ultimately, this network design requires a per-customer analysis of risk versus benefits and costs. Some
general considerations include:
• An isolated OOB management network maximizes visibility and control over the network even during
disruptive events.
• Transmitting network telemetry over an OOB network minimizes the chance for disruption of the very
information which provides critical network visibility.
• In-band management access to network infrastructure, hosts, etc. is vulnerable to complete loss in the
event of a network incident, removing all the network visibility and control. Appropriate QoS controls
should be put in place to mitigate this occurrence.
• NFVIS features interfaces which are dedicated to device management, including serial console ports and
Ethernet management interfaces.
• An OOB management network can typically be deployed at a reasonable cost, since management network
traffic does not typically demand high bandwidth nor high performance devices, and only requires
sufficient port density to support the connectivity to each infrastructure device.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
148
Security Considerations
Locally Stored Information Protection
File Transfer
Files which may need to be transferred to NFVIS devices include VM image and NFVIS upgrade files. The
secure transfer of files is critical for network infrastructure security. NFVIS supports Secure Copy (SCP) to
ensure the security of file transfer. SCP relies on SSH for secure authentication and transport, enabling the
secure and authenticated copying of files.
A secure copy from NFVIS is initiated through the scp command. The secure copy (scp) command allows
only the admin user to securely copy files from NFVIS to an external system, or from an external system to
NFVIS.
The syntax for the scp command is:
We use port 22222 for the NFVIS SCP server. By default, this port is closed and users cannot secure copy
files into NFVIS from an external client. If there is a need to SCP a file from an external client, the user can
open the port using:
system settings ip-receive-acl (address)/(mask lenth) service scpd priority (number) action
accept
commit
To prevent users from accessing system directories, secure copy can be performed only to or from intdatastore:,
extdatastore1:, extdatastore2:, usb: and nfs:, if available. Secure copy can also be performed from logs: and
techsupport:
Logging
NFVIS access and configuration changes are logged as audit logs to record the following information:
• Who accessed the device
• When did a user log in
• What did a user do in terms of the host configuration and the VM lifecycle
• When did a user log off
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
149
Security Considerations
Virtual Machine security
This information is invaluable for forensic analysis in case of unauthorized attempts or access, as well as for
configuration change issues and to help plan group administration changes. It may also be used real time to
identify anomalous activities which may indicate that an attack is taking place. This analysis can be correlated
with information from additional external sources, such as IDS and firewall logs.
All the key events on the NFVIS are sent as event notifications to NETCONF subscribers and as syslogs to
the configured central logging servers. For more information on syslog messages and event notifications, see
Appendix, on page 207.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
150
Security Considerations
Encrypted VM config data variables
Pointing your browser to https://<nfvis ip>:6005/vnc_auto.html will connect to the ROUTER VM’s VNC
console.
With NFV, network functions are virtualized so that multiple functions can be run on a single server. As a
result, less physical hardware is needed, allowing for resource consolidation. In this environment, it is essential
to simulate dedicated resources for multiple VNFs from a single, physical hardware system. Using NFVIS,
VMs can be deployed in a controlled manner such that each VM receives the resources it needs. Resources
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
151
Security Considerations
CPU Isolation
are partitioned as needed from the physical environment to the many virtual environments. The individual
VM domains are isolated so they are separate, distinct, and secure environments, which are not contending
with each other for shared resources.
VMs cannot use more resources than provisioned. This avoids a Denial of Service condition from one VM
consuming the resources. As a result, CPU, memory, network and storage are protected.
CPU Isolation
The NFVIS system reserves cores for the infrastructure software running on the host. The rest of the cores
are available for VM deployment. This guarantees that the VM’s performance does not affect the NFVIS host
performance.
Low-latency VMs
NFVIS explicitly assigns dedicated cores to low latency VMs that are deployed on it. If the VM requires 2
vCPUs, it is assigned 2 dedicated cores. This prevents sharing and oversubscription of cores and guarantees
the performance of the low-latency VMs. If the number of available cores is less than the number of vCPUs
requested by another low-latency VM, the deployment is prevented since we do not have sufficient resources.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
152
Security Considerations
Memory Allocation
Memory Allocation
The NFVIS Infrastructure requires a certain amount of memory. When a VM is deployed, there is a check to
ensure that the memory available after reserving the memory required for the infrastructure and previously
deployed VMs, is sufficient for the new VM. We do not allow memory oversubscription for the VMs.
VMs are not allowed to directly access the host file system and storage.
Storage Isolation
The ENCS platform supports an internal datastore (M2 SSD) and external disks. NFVIS is installed on the
internal datastore. VNFs can also be deployed on this internal datastore. It is a security best practice to store
customer data and deploy customer application Virtual Machines on the external disks. Having physically
separate disks for the system files vs the application files helps to protect system data from corruption and
security issues.
•
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
153
Security Considerations
Interface Isolation
Interface Isolation
Single Root I/O Virtualization or SR-IOV is a specification that allows the isolation of PCI Express (PCIe)
resources such as an Ethernet port. Using SR-IOV a single Ethernet port can be made to appear as multiple,
separate, physical devices known as Virtual Functions. All of the VF devices on that adapter share the same
physical network port. A guest can use one or more of these Virtual Functions. A Virtual Function appears
to the guest as a network card, in the same way as a normal network card would appear to an operating system.
Virtual Functions have near-native performance and provide better performance than para-virtualized drivers
and emulated access. Virtual Functions provide data protection between guests on the same physical server
as the data is managed and controlled by the hardware.
NFVIS VNFs can use SR-IOV networks to connect to WAN and LAN Backplane ports.
Each such VM owns a virtual interface and its related resources achieving data protection among VMs.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
154
CHAPTER 7
Platform Specific Configurations
• ENCS Switch Configuration, on page 155
• Configuring vBranch High Availability, on page 164
Note From the switch console, there is access to debug mode and an advanced debug mode. Credentials of the local
user are synchronized to access debug mode. Advanced debug uses unique credentials for each device that
allows for additional debugging options for Cisco engineering. To enter either debug mode permission must
be granted through Consent Token.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
155
Platform Specific Configurations
Switch Settings
You can view the Switch Interface operational data and the statistics parameters in the following table:
PortType Specifies the mode of the port interface. Supported types are:
• access
• dot1q-tunnel
• private-vlan
• trunk
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
156
Platform Specific Configurations
Configuring Spanning Tree
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
157
Platform Specific Configurations
Configuring Spanning Tree
The configuration of spanning tree has the following parameters when it is enabled:
Spanning Tree Specifies the state of the Spanning Tree. Enable or Disable
The default value is Enable.
Mode Specifies the mode of the Spanning Tree. stp or rstp
Forward Time Specifies the Spanning Tree forward time in Range: 4-30 seconds
seconds.
Hello Time Specifies the Hello time in seconds. Range: 1 to10 seconds
Max Age Specifies the spanning-tree bridge maximum age Range: 6 to 40 seconds
in seconds.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
158
Platform Specific Configurations
Configuring Dot1x
Configuring Dot1x
This chapter describes how to configure dot1x port-based authentication on the Cisco Enterprise NFVIS portal.
dot1x prevents unauthorized devices (clients) from gaining access to the network. It is a standard for media-level
(Layer 2) access control, offering the capability to permit or deny network connectivity based on the identity
of the end user or device. The dot1x is disabled by default. You can click on edit to enable dot1x.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
159
Platform Specific Configurations
Configuring LACP
Authentication Specifies the authentication type for the port. radius or none
The default value is
radius.
Guest VLAN Specifies the time delay in seconds between enabling Range: 30 to 180 seconds
Timeout(s) Dot1X (or port up) and adding the port to the guest
VLAN.
Configuring LACP
The Link Aggregation Control Protocol (LACP) enables you to bundle several physical ports together to form
a single logical channel. LACP enables you to form a single Layer 2 link automatically from two or more
Ethernet links. This protocol ensures that both ends of the Ethernet link are functional and are part of the
aggregation group.
Port-channel load Specifies the load balance of the port channel. Mac Based or IP
balance Based
Configuring VLAN
You can use virtual LANs (VLANs) to divide the network into separate logical areas. VLANs can also be
considered as broadcast domains. Any switch port can belong to a VLAN, and unicast, broadcast, and multicast
packets are forwarded and flooded only to end stations in that VLAN. Each VLAN is considered a logical
network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router.
You can configure VLANs in the range <1-2349>|<2450-4093> for a specified switch port.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
160
Platform Specific Configurations
Configuring General Settings
You can configure general settings using the following parameters for each switch interface:
• Interface—Name of the interface
• Description—Set the description per interface
• Speed—10/100/1000 MBPS
• Dot1x Auth—802.1x, mac or both
• PoE Method—auto, never or four-pair
• PoE Limit—0-60000mW
• Admin Status—enable or disable
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
161
Platform Specific Configurations
Configuring Advanced Settings
You can make the advanced settings using the following parameters for each switch interface:
• Mode—access, dot1q-tunnel, private-vlan, or trunk
• Access Vlan—Specifies the number of VLANs.
• Allowed Vlan—All or VLAN IDs
• Native Vlan—Specifies the VLAN ID. You can enter a value from one of the following ranges:
• 1 to 2349
• 2450 to 4093
Note The VLAN configuration takes effect only if the global VLANs are also configured with the same values in
Configuring VLAN, on page 160.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
162
Platform Specific Configurations
Configuring Spanning Tree per Interface
You can configure spanning tree for each switch interface using the following parameters:
• Spanning Tree—Enable or Disable
• Cost—Specifies the cost. Range: 1 to 200000000
• Priority—Specifies the port priority. Range: 0 to 240, default value is 128
• Link Type—point-to-point or shared
• BPDU Guard—Enable or Disable
• Root Guard—Enable or Disable
• Port Fast—auto or enable
• BPDU Filtering—Specifies that BPDU packets are filtered when the spanning tree is disabled
• BPDU Flooding—Specifies that BPDU packets are flooded when the spanning tree is disabled
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
163
Platform Specific Configurations
Configuring Storm Control
Storm control can be configured for specific type of traffic - unicast or multicast or broadcast. The suppression
range can be in terms of a percentage level (1-100) or Kbps value (1-1000000).
Because both vEdge routers receive the same routing information from the vSmart controllers, each one is
able to continue to route traffic if one should fail, even if they are connected to different transport providers.
Two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure
on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event
that a peer goes down. Setting up two firewalls in an HA pair provides redundancy and allows you to ensure
business continuity.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
164
Platform Specific Configurations
Prerequisites for vBranch HA
Note In cases where external switch cannot be configured for MSTP, RSTP is used and the two links back-2-back
between ENCS is not in port-channel.
• One of the links carries traffic between VNFs by configuring disable spanning tree. The second
back-to-back link between ENCS processes RSTP and forward or block for the traffic from or towards
LAN.
• From each of the ENCS, a third physical link connects to the external switch. This also forwards or blocks
the traffic from or towards LAN depending on the RSTP decisions.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
165
Platform Specific Configurations
SD-Branch HA Design and Topology
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
166
Platform Specific Configurations
Isolating LAN and Transit Link Traffic for vBranch HA
Figure 7: ENCS-Right
Note In the absence of firewall in the design, the router is directly connected to the LAN side. Pt-to-Pt network
extends the TLOC connection across the ENCS devices and VRRP is enabled in the router LAN facing
connection.
configure terminal
pnic GE0-0 track-state ROUTER 1
end
configure terminal
switch interface gigabitEthernet 1/3 track-state FIREWALL 4
end
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
167
Platform Specific Configurations
Packet Flow for SD-Branch HA
Name: FIREWALL
Deployment Name : FIREWALL
VM Group Name : FIREWALL
State: ALIVE
Internal State: VM_INERT_STATE
Bootup Time: -1
Image: Palo-Alto-8.1.3.tar.gz
Flavor: VM-100
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
168
Platform Specific Configurations
Packet Flow for SD-Branch HA
Non-Failure Case
In the non-failure case, both ENCS devices are Active, up and running
• LAN to WAN through the ENCS1 Firewall and ENCS1 Router
• LAN to WAN through the ENCS1 Firewall and ENCS2 Router
• WAN to LAN through ENCS1 Router and ENCS1 Firewall
• WAN to LAN through ENCS2 Router and ENCS1 Firewall
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
169
Platform Specific Configurations
Packet Flow for SD-Branch HA
Failure Case
Following are failures that a router must be designed and configured to adapt
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
170
Platform Specific Configurations
Configuration Examples and Usage Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
171
Platform Specific Configurations
Configuration Examples and Usage Description
ENCS-Left and ENCS-Right with Same Config Description or Reasons for configuration
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
172
Platform Specific Configurations
Configuration Examples and Usage Description
ENCS-Left# show switch vlan detailed ENCS-Right# show switch vlan detail
ENCS-Left# show switch spanning-tree mstp ENCS-Right# show switch spanning-tree mstp
summary summary
spanning-tree mstp summary ist-info summary spanning-tree mstp summary ist-info summary
admin-status enabled admin-status enabled
spanning-tree mstp summary ist-info summary spanning-tree mstp summary ist-info summary
Operation-mode MSTP Operation-mode MSTP
spanning-tree mstp summary ist-info summary spanning-tree mstp summary ist-info summary
Port-Cost-Method long Port-Cost-Method long
spanning-tree mstp summary ist-info summary spanning-tree mstp summary ist-info summary
Loopback-guard disabled Loopback-guard disabled
spanning-tree mstp summary ist-info root spanning-tree mstp summary ist-info root
Priority 32768 Priority 32768
spanning-tree mstp summary ist-info root spanning-tree mstp summary ist-info root
Address 70:db:98:c3:df:14 Address 70:db:98:c3:df:14
spanning-tree mstp summary ist-info root Cost spanning-tree mstp summary ist-info root Cost
0 0
spanning-tree mstp summary ist-info root Port spanning-tree mstp summary ist-info root Port
LAG1 0
spanning-tree mstp summary ist-info root spanning-tree mstp summary ist-info root
Hello-Time 2 Hello-Time 2
spanning-tree mstp summary ist-info root spanning-tree mstp summary ist-info root
Max-Age 20 Max-Age 20
spanning-tree mstp summary ist-info root spanning-tree mstp summary ist-info root
Forward-Delay 15 Forward-Delay 15
spanning-tree mstp summary ist-info bridge spanning-tree mstp summary ist-info bridge
Priority 32768 Priority 32768
spanning-tree mstp summary ist-info bridge spanning-tree mstp summary ist-info bridge
Address 70:db:98:c3:df:a0 Address 70:db:98:c3:df:14
spanning-tree mstp summary ist-info bridge spanning-tree mstp summary ist-info bridge
Hello-Time 2 Hello-Time 2
spanning-tree mstp summary ist-info bridge spanning-tree mstp summary ist-info bridge
Max-Age 20 Max-Age 20
spanning-tree mstp summary ist-info bridge spanning-tree mstp summary ist-info bridge
Forward-Delay 15 Forward-Delay 15
spanning-tree mstp summary ist-info spanning-tree mstp summary ist-info
….. ……
….. ……
INSTANCE PRIORITY DSG ROOT ADDRESS BRIDGE INSTANCE PRIORITY DSG ROOT ADDRESS BRIDGE
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
173
Platform Specific Configurations
Configuration Examples and Usage Description
ADDRESS ADDRESS
---------------------------------------------------------- ----------------------------------------------------------
1 32768 70:db:98:c3:df:14 1 32768 70:db:98:c3:df:14
70:db:98:c3:df:a0 70:db:98:c3:df:14
2 61440 f0:b2:e5:56:e4:80 2 61440 f0:b2:e5:56:e4:80
70:db:98:c3:df:a0 70:db:98:c3:df:14
From the above summary output, MST instances indicates ID and associated VLAN, and then displays all
interfaces as part of VLAN instances. This behaviour differs from the way MST instances are displayed on
other Cisco switching platforms.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
174
Platform Specific Configurations
Configuration Examples and Usage Description
Note It is recommended that VLAN 996-998 is not allowed through the interfaces connecting to ENCS-Left and
ENCS-Right. As a result, the external switch MSTP does not participate for VLAN 996-998.
Table 13:
Note VLANs carrying traffic between VNFs are not used in external switch and not configured in any interface.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
175
Platform Specific Configurations
Configuration Examples and Usage Description
Switch#
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
176
CHAPTER 8
NFVIS Logging
• Configuring System Logs, on page 177
ERROR Due to a serious problem, the software application is not able to perform
some function.
CRITICAL A serious error, indicating that the program itself may not be able to continue
running.
By default, the configuration log has a log-level of INFO. All logs of type INFO, WARNING, ERROR and
CRITICAL are logged.
By default, the operational log has a log-level of WARNING. All logs of type WARNING, ERROR and
CRITICAL are logged.
The log-level for these log files can be changed using the system set-log command:
The change to the log level is not persistant across a reboot. After a reboot, the default log levels are used.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
177
NFVIS Logging
Configuring System Logs
The current log files are kept in the /var/log directory in the system:
• show log - To display the list of available log files
• show log {filename} - To display the contents of a specific log file
Log Rotation
There is a size limit for the log files, under /var/log/ directory. When the log files reach the size limit, the
location of logs is rotated to another place. The space limit for the total size of all rotated log files is 2 GB.
The older log files are dropped automatically on reaching the space limit. You can also execute a command
to trigger the log rotation procedure. The log files are monitored periordically and if a log file gets too big, it
is rotated to another place.
There is a size limit for the log files stored in the /var/log directory. The size of the log files is monitored
periodically every fifteen minutes and if a log file gets too big, it is rotated to the /data/intdatastore/logs
directory. The space limit for the total size of all the rotated log files is 2 GB. The older log files are dropped
automatically on reaching the space limit. You can also execute the logrotate command to trigger the log
rotation procedure.
nfvis# logrotate
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
178
CHAPTER 9
NFVIS Monitoring
• Syslog, on page 179
• NETCONF Event Notifications, on page 181
• SNMP Support on NFVIS, on page 182
• System Monitoring, on page 192
Syslog
The Syslog feature allows event notifications from NFVIS to be sent to remote syslog servers for centralized
log and event collection.The syslog messages are based on the occurrence of specific events on the device
and provide configuration and operational information such as creation of users, changes to the interface
status, and failed login attempts. Syslog data is critical to recording day-to-day events as well as notifying
operational staff of critical system alerts.
Cisco enterprise NFVIS sends syslog messages to syslog servers configured by the user. Syslogs are sent for
Network Configuration Protocol (NETCONF) notifications from NFVIS.
2017 Jun 16 11:20:22 nfvis %SYS-6-AAA_TYPE_CREATE: AAA authentication type tacacs created
successfully AAA authentication set to use tacacs server
2017 Jun 16 11:20:23 nfvis %SYS-6-RBAC_USER_CREATE: Created rbac user successfully: admin
2017 Jun 16 15:36:12 nfvis %SYS-6-CREATE_FLAVOR: Profile created: ISRv-small
2017 Jun 16 15:36:12 nfvis %SYS-6-CREATE_FLAVOR: Profile created: ISRv-medium
2017 Jun 16 15:36:13 nfvis %SYS-6-CREATE_IMAGE: Image created: ISRv_IMAGE_Test
2017 Jun 19 10:57:27 nfvis %SYS-6-NETWORK_CREATE: Network testnet created successfully
2017 Jun 21 13:55:57 nfvis %SYS-6-VM_ALIVE: VM is active: ROUTER
Note To refer to the complete list of syslog messages, see Syslog Messages, on page 237
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
179
NFVIS Monitoring
Syslog
configure terminal
system settings logging host 172.24.22.186
port 3500
transport tcp
commit
Note A maximum of 4 remote syslog servers can be configured. The remote syslog server can be specified using
its IP address or DNS name. The default protocol for sending syslogs is UDP with a default port of 514. For
TCP, the default port is 601.
configure terminal
system settings logging severity <debug | informational | notice | warning| error| critical
| alert | emergency>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
180
NFVIS Monitoring
NETCONF Event Notifications
Note By default, the logging severity of syslogs is informational which means all syslogs at informational severity
and higher will be logged. Configuring a value for severity will result in syslogs at the configured severity
and syslogs which are more severe than the configured severity.
configure terminal
system settings logging facility local5
Note The logging facility can be changed to a facility from local0 to local7
By default, NFVIS sends syslogs with the facility of local7
APIs Commands
You can view NFVIS and VM life cycle event notifications using the show notification stream nfvisEvent
and show notification stream vmlcEvent commands respectively. For more information see, Event
Notifications, on page 207.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
181
NFVIS Monitoring
SNMP Support on NFVIS
A manager can send the agent requests to get and set MIB values. The agent can respond to these requests.
Independent of this interaction, the agent can send unsolicited notifications (traps or informs) to the manager
to notify the manager of network conditions.
SNMP Operations
SNMP applications perform the following operations to retrieve data, modify SNMP object variables, and
send notifications:
• SNMP Get - The SNMP GET operation is performed by a Network Management Server (NMS) to retrieve
SNMP object variables.
• SNMP Set - The SNMP SET operation is performed by a Network Management Server (NMS) to modify
the value of an object variable.
• SNMP Notifications - A key feature of SNMP is its capability to generate unsolicited notifications from
an SNMP agent.
SNMP Get
The SNMP GET operation is performed by a Network Management Server (NMS) to retrieve SNMP object
variables. There are three types of GET operations:
• GET: Retrieves the exact object instance from the SNMP agent.
• GETNEXT: Retrieves the next object variable, which is a lexicographical successor to the specified
variable.
• GETBULK: Retrieves a large amount of object variable data, without the need for repeated GETNEXT
operations.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
182
NFVIS Monitoring
SNMP Get
SNMP Walk
SNMP walk is an SNMP application that uses SNMP GETNEXT requests to query a network entity for a tree
of information.
An object identifier (OID) may be given on the command line. This OID specifies which portion of the object
identifier space will be searched using GETNEXT requests. All variables in the subtree below the given OID
are queried and their values presented to the user.
The command for SNMP walk with SNMP v2 is:
snmpwalk -v2c -c [community-name] [nfvis-box-ip]
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
183
NFVIS Monitoring
SNMP Notifications
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do
not require that requests be sent from the SNMP manager. Unsolicited (asynchronous) notifications can be
generated as traps or inform requests. Traps are messages alerting the SNMP manager to a condition on the
network. Inform requests (informs) are traps that include a request for confirmation of receipt from the SNMP
manager. Notifications can indicate improper user authentication, restarts, the closing of a connection, loss
of connection to a neighbor router, or other significant events.
Note Starting from Release 3.8.1 NFVIS has SNMP Trap support for switch interfaces. If a trap server is setup in
the NFVIS snmp configuration, it will send trap messages for both NFVIS and switch interfaces. Both the
interfaces are triggered by the link state up or down by unplugging a cable or setting admin_state up or down
when a cable is connected.
SNMP Versions
Cisco enterprise NFVIS supports the following versions of SNMP:
• SNMP v1—The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157.
(RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is
based on community strings.
• SNMP v2c—The community-string based Administrative Framework for SNMPv2. SNMPv2c (the "c"
stands for "community") is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC
1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic),
and uses the community-based security model of SNMPv1.
• SNMPv3—Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in RFCs
3413 to 3415. SNMPv3 provides secure access to devices by authenticating and encrypting packets over
the network.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
184
NFVIS Monitoring
SNMP MIB Support
Both SNMP v1 and SNMP v2c use a community-based form of security. The community of managers able
to access the agent MIB is defined by an IP address Access Control List and password.
SNMPv3 is a security model in which an authentication strategy is set up for a user and the group in which
the user resides. A security level is the permitted level of security within a security model. A combination of
a security model and a security level determines which security mechanism is employed when handling an
SNMP packet.
Authentication of the community with the user configuration is implemented even though SNMP v1 and v2
traditionally do not require a user configuration to be set. For both SNMP v1 and v2 on NFVIS, the user must
be set with the same name and version as the corresponding community name. The user group must also
match an existing group with the same SNMP version for snmpwalk commands to work.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
185
NFVIS Monitoring
SNMP MIB Support
• ifHCOutUcastPkts
• ifInBroadcastPkts
• ifOutBroadcastPkts
• ifInMulticastPkts
• ifOutMulticastPkts
• ifHCInBroadcastPkts
• ifHCOutBroadcastPkts
• ifHCInMulticastPkts
• ifHCOutMulticastPkts
Entity MIB:
• entPhysicalIndex
• entPhysicalDescr
• entPhysicalVendorType
• entPhysicalContainedIn
• entPhysicalClass
• entPhysicalParentRelPos
• entPhysicalName
• entPhysicalHardwareRev
• entPhysicalFirmwareRev
• entPhysicalSoftwareRev
• entPhysicalSerialNum
• entPhysicalMfgName
• entPhysicalModelName
• entPhysicalAlias
• entPhysicalAssetID
• entPhysicalIsFRU
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
186
NFVIS Monitoring
Configuring SNMP Support
• cpmCPUMemoryUsed
• cpmCPUMemoryFree
• cpmCPUMemoryHCUsed
• cpmCPUMemoryHCFree
• CISCO_ENVMON_MIB
• cpmProcessDynamicMemorySizeOvrflw
• cpmProcessType
• cpmCPULoadAvg1min
• cpmCPULoadAvg5min
• cpmCPULoadAvg15min
configure terminal
snmp community <community_name> community-access <access>
SNMP community name string supports [A-Za-z0-9_-] and maximum length of 32. NFVIS supports only
readOnly access.
To create SNMP Group:
configure terminal
snmp group <group_name> <context> <version> <security_level> notify <notify_list> read
<read_list> write <write_list>
Variables Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
187
NFVIS Monitoring
Configuring SNMP Support
Variables Description
configure terminal
snmp user <user_name> user-version <version> user-group <group_name> auth-protocol <auth>
priv-protocol <priv> passphrase <passphrase_string>
configure terminal
snmp user <user_name> user-version <version> user-group <group_name> auth-protocol <auth>
passphrase <passphrase_string>
configure terminal
snmp user <user_name> user-version <version> user-group <group_name>
Variables Description
Note Do not use auth-key and priv-key. The auth and priv passphrases are encrypted after configuration and saved
in NFVIS.
configure terminal
snmp enable traps <trap_event>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
188
NFVIS Monitoring
Configuring SNMP Support
configure terminal
snmp host <host_name> host-ip-address <ip_address> host-port <port> host-user-name <user_name>
host-version <version> host-security-level noAuthNoPriv
Variables Description
configure terminal
snmp community public community-access readOnly
!
snmp group testgroup snmp 2 noAuthNoPriv read read-access write write-access notify
notify-access
!
snmp user public user-group testgroup user-version 2
!
snmp host host2 host-ip-address 2.2.2.2 host-port 162 host-user-name public host-version 2
host-security-level noAuthNoPriv
!
snmp enable traps linkup
snmp enable traps linkDown
configure terminal
snmp group testgroup3 snmp 3 authPriv notify test write test read test
!
snmp user user3 user-version 3 user-group testgroup3 auth-protocol sha priv-protocol aes
passphrase changePassphrase
! configure snmp host to enable snmp v3 trap
snmp host host3 host-ip-address 3.3.3.3 host-version 3 host-user-name user3
host-security-level authPriv host-port 162
!!
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
189
NFVIS Monitoring
Configuring SNMP Support
configure terminal
!
snmp group testgroup4 snmp 3 authNoPriv notify test write test read test
!
snmp user user4 user-version 3 user-group testgroup4 auth-protocol md5 passphrase
changePassphrase
! configure snmp host to enable snmp v3 trap
snmp host host4 host-ip-address 4.4.4.4 host-version 3 host-user-name user4
host-security-level authNoPriv host-port 162
!!
snmp enable traps linkUp
snmp enable traps linkDown
configure terminal
!
snmp group testgroup5 devop 3 authPriv notify test write test read test
!
snmp user user5 user-version 3 user-group testgroup5 auth-protocol md5 priv-protocol des
passphrase changePassphrase
!
configure terminal
!
snmp group testgroup6 "" 3 noAuthNoPriv read test write test notify test
!
snmp user user6 user-version 3 user-group testgroup6
!
Note SNMP host configuration is supported for NFVIS 3.6.1 release. Host trap server configuration will be officially
supported for NFVIS 3.7.1 release.
Note SNMP v3 context snmp is added automatically when configured from the web portal. To use a different
context value or empty context string, use NFVIS CLI or API for configuration.
NFVIS SNMP v3 only supports single passphrase for both auth-protocol and priv-protocol.
Do not use auth-key and priv-key to configure SNMP v3 passphrase. These keys are generated differently
between different NFVIS systems for the same passphrase.
Note NFVIS 3.11.1 release enhances the special character support for passphrase. Now the following characters
are supported: @#$-!&*
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
190
NFVIS Monitoring
Configuring SNMP Support
Note NFVIS 3.12.1 release supports the following special characters: -_#@%$*&! and whitespace. Backslash (\)
is not supported.
Use the show snmp traps command to verify the state of snmp traps.
TRAP TRAP
NAME STATE
--------------------
linkDown disabled
linkUp enabled
Use the show snmp stats command to verify the snmp stats.
Use the show running-config snmp command to verify the interface configuration for snmp.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
191
NFVIS Monitoring
System Monitoring
!
snmp group testgroup snmp 2 noAuthNoPriv
read read-access
write write-access
notify notify-access
!
snmp user public
user-version 2
user-group 2
auth-protocol md5
priv-protocol des
!
snmp user tachen
user-version 2
user-group tachen
!
snmp host host2
host-port 162
host-ip-address 2.2.2.2
host-version 2
host-security-level noAuthNoPriv
host-user-name public
!
APIs Commands
• /api/config/snmp/agent • agent
• /api/config/snmp/communities • community
• /api/config/snmp/enable/traps • trap-type
• /api/config/snmp/hosts • host
• /api/config/snmp/user • user
• /api/config/snmp/groups • group
System Monitoring
NFVIS provides system monitoring commands and APIs to monitor the host and the VMs deployed on NFVIS.
These commands are useful to collect statistics on CPU utilization, memory, disk and ports. The metrics
related to these resources are collected periodically and displayed for a specified duration. For larger durations
average values are displayed.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
192
NFVIS Monitoring
Collection of System Monitoring Statistics
System monitoring enables the user to view historical data on the system's operation.These metrics are also
shown as graphs on the portal.
cpu-state Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
193
NFVIS Monitoring
Host System Monitoring
cpu-state Description
nice The nice CPU state is a subset of the user state and
shows the CPU time used by processes that have a
lower priority than other tasks.
system The system CPU state shows the amount of CPU time
used by the kernel.
user The user CPU state shows CPU time used by user
space processes
The non-idle state is what the user usually needs to monitor. Use the following CLI or API for monitoring
CPU usage:
nfvis# show system-monitoring host cpu stats cpu-usage <duration> state <cpu-state>
/api/operational/system-monitoring/host/cpu/stats/cpu-usage/<duration>,<cpu-state>?deep
The data is also available in an aggregate form for the minimum, maximum, and average CPU utilization
using the following CLI and API:
/api/operational/system-monitoring/host/cpu/table/cpu-usage/<duration>?deep
Field Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
194
NFVIS Monitoring
Host System Monitoring
/api/operational/system-monitoring/host/memory/stats/mem-usage/<duration>?deep
The data is also available in an aggregate form for the minimum, maximum, and average memory utilization
using the following CLI and API:
/api/operational/system-monitoring/host/memory/table/mem-usage/<duration>?deep
Field Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
195
NFVIS Monitoring
Host System Monitoring
/api/operational/system-monitoring/host/disk/stats/disk-operations/<duration>?deep
Field Description
Use the following CLI or API for monitoring host disk space:
/api/operational/system-monitoring/host/disk/stats/disk-space/<duration>?deep
Field Description
/api/operational/system-monitoring/host/port/stats/port-usage/<duration>?deep
The data is also available in an aggregate form for the minimum, maximum, and average port utilization using
the following CLI and API:
/api/operational/system-monitoring/host/port/table/port-usage/<duration>,<name>?deep
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
196
NFVIS Monitoring
VNF System monitoring
Field Description
id Logical CPU ID
Use the following CLI or API to monitor the CPU usage of the VNF:
/api/operational/system-monitoring/vnf/vcpu/stats/vcpu-usage/<duration>?deep
/api/operational/system-monitoring/vnf/vcpu/stats/vcpu-usage/<duration>/vnf/<vnf-name>?deep
Field Description
/api/operational/system-monitoring/vnf/memory/stats/mem-usage/<duration>?deep
/api/operational/system-monitoring/vnf/memory/stats/mem-usage/<duration>/vnf/<vnf-name>?deep
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
197
NFVIS Monitoring
VNF System monitoring
Field Description
/api/operational/system-monitoring/vnf/disk/stats/disk-operations/<duration>?deep
/api/operational/system-monitoring/vnf/disk/stats/disk-operations/<duration>/vnf/<vnf-name>?deep
Field Description
/api/operational/system-monitoring/vnf/port/stats/port-usage/<duration>?deep
/api/operational/system-monitoring/vnf/port/stats/port-usage/<duration>/vnf/<vnf-name>?deep
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
198
CHAPTER 10
Troubleshoot and Debug Cisco NFVIS
• Log and Show Commands, on page 199
• SPAN Session or Port Mirroring, on page 200
• Configuring Packet Capture, on page 205
Command Description
show system disk-space To display information about the system disk space.
VM
support virsh all-info To display the output of all supported VM and index
by number.
support virsh dumpxml <num> To display all information about one VM index by
<num>
Network
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
199
Troubleshoot and Debug Cisco NFVIS
SPAN Session or Port Mirroring
Command Description
support virsh net-dumpxml <network To display the network information about one network
name> and bridge attachment.
Bridge
support ovs vsctl show: : : To display an overview of the bridge, port and vlan
tag.
support ovs appctl fdb-show To display information about the ports of a bridge.
<bridge-name>
support ovs all-info To display the output of all supported ovs commands
Firewall
Log Files
The tech-support includes all the logs. Download tech-support and record the time of the occurance of error.
Command Description
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
200
Troubleshoot and Debug Cisco NFVIS
Configuring SPAN Sessions
Note You must dedicate a destination port for SPAN use. Except for traffic that is required for the SPAN session,
destination ports do not receive or forward traffic. When the SPAN is configured on the system, there might
be some performance hit.
In the case of virtio net or SRIOV VF, you have to specify the VM group name and NIC ID of the VM
interface. If the VM vNIC is virtio net type, then the SPAN session is applied on the OVS bridge. If VM vNIC
is SRIOV VF, then the mirror is applied to the hardware bridge. The interface name is specified for a physical
interface, for example, GE0-0 or eth0.
• Destination configuration—The destination for the mirrored traffic can be one of the following:
• The mirrored traffic can be sent to interfaces of any type.
• The mirrored traffic can be sent to a speciifc VLAN. In this case, the original VLAN tag is stripped
in the mirrored traffic in favor of the destination VLAN. This loss of original VLAN information
might make the mirrored traffic hard to interpret.
configure terminal
monitor session 2
bridge wan-br
source interface GE0-0
destination vm-vnic Linux2 0
commit
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
201
Troubleshoot and Debug Cisco NFVIS
Configuration Examples for SPAN Session Scenarios
Use the show running-config monitor session command to verify the interface configuration for a SPAN
session:
APIs Commands
Note An existing SPAN session will be in FAIL state after the system reboot. In this case, you need to recreate
(delete and create) the SPAN session after the system bootup.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
202
Troubleshoot and Debug Cisco NFVIS
Example: SPAN Session Traffic on a LAN SRIOV
VM deployment interfaces:
• SPAN source: GE0-0 (traffic in both directions)
• SPAN source: Linux1/vnic0, and wan-net (traffic in both directions)
• • SPAN destination: Linux2/vnic0, and wan-net
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
203
Troubleshoot and Debug Cisco NFVIS
Example: SPAN Session Traffic on a VLAN
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
204
Troubleshoot and Debug Cisco NFVIS
Configuring Packet Capture
Benefits
• You can customize the configuration to capture specific packets such as Internet Control Message Protocol
(ICMP), TCP, UDP, and Address Resolution Protocol (ARP).
• You can specify a time period over which packets are captured. The default is 60 seconds.
configure terminal
tcpdump port eth0
configure terminal
tcpdump vnic tenant-name admin deployment-name 1489084431 vm-name ROUTER vnic-id 0 time 30
Types of Errors
Error Scenario
File/directory not created When the system is running out of disk space.
The tcpdump command fails When the system is running out of disk space.
These errors are logged in the nfvis_config.log. By default, warnings and errors are logged,
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
205
Troubleshoot and Debug Cisco NFVIS
Configuring Packet Capture
1. From NFVIS system shell-access, get the password which can be used later.
cd /opt/switch-confd/
python decrypt_switch.py
<it will print out a string, it will be the password you need to use later>
8H7)gR348V4Byq4mwjiNt
#connect debug-shell
#sldp
login <hit return>
it will print out the challenge string
enter the respond string
# switch-con ge
user-name:cisco
password: <enter the sring we get from nfvis system shell>
User Name:cisco
Password:*********************. <this is the password you get from step 1 above>
3. To configure SPAN specify the source and distribution interface and direction of the packet flow. For
example, if you want to mirror XG2 output packet to Ge0, connect an external packet capture tool in
GE1/0 and you will see all packets flow from internal XG2. In the following example, the traffic between
int_LAN and GE1/0 go through internal interface XE2 and traffic for XE2 interface is monitored:
APIs Commands
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
206
CHAPTER 11
Appendix
• Event Notifications, on page 207
• Syslog Messages, on page 237
Event Notifications
nfvisEvent
Event Type Notification Notification Output Example
Trigger
WAN_DHCP_RENEW DHCP
<?xml version="1.0" encoding="UTF-8"?>
renew
<notification
operation xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
is <eventTime>2017-04-26T18:06:46.142089+00:00</eventTime>
performed. <nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>NA</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Wan DHCP IP address is being
renewed</status_message>
<details>NA</details>
<event_type>WAN_DHCP_RENEW</event_type>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
207
Appendix
nfvisEvent
BRIDGE_DHCP_RENEW Bridge
<?xml version="1.0" encoding="UTF-8"?>
DHCP
<notification
renew xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
operation <eventTime>2018-04-26T09:47:06.066264+00:00</eventTime>
is <nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
performed.
<user_id>NA</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Bridge DHCP IP address is being
renewed</status_message>
<details>NA</details>
<event_type>BRIDGE_DHCP_RENEW</event_type>
</nfvisEvent>
</notification>
INTF_STATUS_CHANGE Interface
<?xml version="1.0" encoding="UTF-8"?>
status is
<notification
changed. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2017-04-26T18:12:09.963556+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<event_type>INTF_STATUS_CHANGE</event_type>
<intf_name>eth7</intf_name>
<intf_prv_op>up</intf_prv_op>
<intf_op>down</intf_op>
<intf_prv_link>down</intf_prv_link>
<intf_link>down</intf_link>
</nfvisEvent>
</notification>
NETWORK_CREATE A
<?xml version="1.0" encoding="UTF-8"?>
network
<notification
is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
created. <eventTime>2016-09-22T12:41:04.564298+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_message>Network created succesfully</status_message>
<event_type>NETWORK_CREATE</event_type>
<network_name>testn1</network_name>
<network_bridge>test-net-br</network_bridge>
<network_sriov>false</network_sriov>
<network_vlan/>
<network_trunk/>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
208
Appendix
nfvisEvent
NETWORK_UPDATE A
<?xml version="1.0" encoding="UTF-8"?>
network
<notification
is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
updated. <eventTime>2016-09-22T12:42:03.391986+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_message>Network updated succesfully</status_message>
<event_type>NETWORK_UPDATE</event_type>
<network_name>testn1</network_name>
<network_bridge/>
<network_sriov/>
<network_vlan/>
<network_trunk/>
</nfvisEvent>
</notification>
NETWORK_DELETE A
<?xml version="1.0" encoding="UTF-8"?>
network
<notification
is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
deleted. <eventTime>2016-09-22T12:42:03.391986+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_message>Network deleted succesfully</status_message>
<event_type>NETWORK_DELETE</event_type>
<network_name>testn1</network_name>
<network_bridge/>
<network_sriov/>
<network_vlan/>
<network_trunk/>
</nfvisEvent>
</notification>
UPGRADE_REGISTER System
<?xml version="1.0" encoding="UTF-8"?>
upgrade
<notification
is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
registered. <eventTime>2017-04-26T15:57:50.434636+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>NA</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Upgrade package registration successful:
Cisco_NFVIS_Upgrade-3.6.1-698-20170402_042811.nfvispkg</status_message>
<event_type>UPGRADE_REGISTER</event_type>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
209
Appendix
nfvisEvent
UPGRADE_APPLY System
<?xml version="1.0" encoding="UTF-8"?>
upgrade
<notification
is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
applied. <eventTime>2017-04-26T16:02:43.885516+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>NA</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Upgrade Process: In Progress</status_message>
<event_type>UPGRADE_APPLY</event_type>
</nfvisEvent>
</notification>
ROTATED_LOGS_DELETE Rotated
<?xml version="1.0" encoding="UTF-8"?>
logs older
<rpc-reply
than 30 xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1">
days are <ok/>
deleted </rpc-reply>
<?xml version="1.0" encoding="UTF-8"?>
by the
<notification
system. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2017-04-26T17:38:10.321152+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>NA</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Deleted rotated logs from archive older than 30
days</status_message>
<details>NA</details>
<event_type>ROTATED_LOGS_DELETE</event_type>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
210
Appendix
nfvisEvent
ROTATED_LOGS_DELETE Older
<?xml version="1.0" encoding="UTF-8"?>
logs
<rpc-reply
deleted xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1">
by the <ok/>
system </rpc-reply>
<?xml version="1.0" encoding="UTF-8"?>
when the
<notification
total file xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
size of <eventTime>2017-04-26T17:42:10.321152+00:00</eventTime>
rotated <nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
logs
<user_id>NA</user_id>
exceeds <config_change>true</config_change>
2GB. <transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Rotated logs had exceeded 2G, older logs have been
deleted to make space</status_message>
<details>NA</details>
<event_type>ROTATED_LOGS_DELETE</event_type>
</nfvisEvent>
</notification>
REBOOT system
<?xml version="1.0" encoding="UTF-8"?>
reboot
<notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2018-04-26T09:37:47.387525+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>System will be rebooted</status_message>
<details>NA</details>
<event_type>REBOOT</event_type>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
211
Appendix
nfvisEvent
SHUTDOWN system
<?xml version="1.0" encoding="UTF-8"?>
shutdown
<notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2018-04-26T09:47:06.066264+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>System will be shutdown</status_message>
<details>NA</details>
<event_type>SHUTDOWN</event_type>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
SECURE_OVERLAY_CREA
TN
IG create
<notification
secure
<eventTime> 2018-11-02T04:23:02.641317+00:00
overlay <nfvisEvent
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Secure Overlay mgmthub initial creation. Active
local bridge: wan-br</status_message>
<details>NA</details>
<event_type>SECURE_OVERLAY_CREATING<event_type>
<severity> INFO</severity>
<hostname>nfvis</hostname>
</nfvisEvent>
</notification>
SECURE_OVERLAY_UP Secure
Overlay
<?xml version="1.0" encoding="UTF-8"?>
is UP <notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2018-04-26T09:47:06.066264+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Secure Overlay mgmthub up. Active bridge:
wan-br</status_message>
<details>Secure overlay initial creation</details>
<event_type>SECURE_OVERLAY_UP</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
212
Appendix
nfvisEvent
WAN_DHCP_SWT
ICHOVER WAN
<?xml version="1.0" encoding="UTF-8"?>
bridge
<notification
toggle xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2018-04-26T09:47:06.066264+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Switch over to bridge wan2-br for auto DHCP
enablement successful</status_message>
<details>NA</details>
<event_type>WAN_DHCP_SWITCHOVER</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
WAN_DHCP_TOGGLE_END WAN
<?xml version="1.0" encoding="UTF-8"?>
bridge
<notification
toggle xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2018-04-26T09:47:06.066264+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Disabling bridge toggle for auto DHCP
enablement.</status_message>
<details>NA</details>
<event_type>WAN_DHCP_TOGGLE_END</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
213
Appendix
nfvisEvent
ROUTE_DS
ITRB
IUTO
IN_START To start
<?xml version="1.0" encoding="UTF-8"?>
route
<notification
distribution xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Route Distribution initial creation. Neighbor
Address: 172.25.221.106</status_message>
<details>NA</details>
<event_type>ROUTE_DISTRIBUTION_START</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
ROUTE_DS
ITRB
IUTO
IN_DOWN Route
<?xml version="1.0" encoding="UTF-8"?>
distribution
<notification
is down xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Neighbor Address: 172.25.221.106</status_message>
<details>NA</details>
<event_type>ROUTE_DISTRIBUTION_DOWN</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
214
Appendix
nfvisEvent
ROUTE_DS
ITRB
IUTO
IN_ERROR Route
<?xml version="1.0" encoding="UTF-8"?>
distribution
<notification
in error xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Neighbor Address: 172.25.221.106</status_message>
<details>NA</details>
<event_type>ROUTE_DISTRIBUTION_ERROR</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
ROUTE_DS
ITRB
IUTO
IN_DELETE Route
<?xml version="1.0" encoding="UTF-8"?>
distribution
<notification
deleted xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>All Neighbor Addresses deleted</status_message>
<details>NA</details>
<event_type>ROUTE_DISTRIBUTION_DELETE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
215
Appendix
nfvisEvent
ROUTE_DISTRIBUTION_UP Route
<?xml version="1.0" encoding="UTF-8"?>
distribution
<notification
up xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Neighbor Address: 172.25.221.106</status_message>
<details>NA</details>
<event_type>ROUTE_DISTRIBUTION_UP</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
OVS_DPDK_SUCCESS Enable
<?xml version="1.0" encoding="UTF-8"?>
DPDK
<notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>OVS-DPDK enabled</status_message>
<details>NA</details>
<event_type>OVS_DPDK_SUCCESS</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
OVS_DPDK_FAILURE DPDK
<?xml version="1.0" encoding="UTF-8"?>
failure
<notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Unable to allocate CPU</status_message>
<details>NA</details>
<event_type>OVS_DPDK_FAILURE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
216
Appendix
nfvisEvent
PNIC_SRIOV_ENABLE Enable
<?xml version="1.0" encoding="UTF-8"?>
SR-IOV
<notification
to 2 vfs xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Physical Interface: eth0-1 Number of VFs
2</status_message>
<details>NA</details>
<event_type>PNIC_SRIOV_ENABLE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
PNIC_SRIOV_DISABLE Disable
<?xml version="1.0" encoding="UTF-8"?>
SR-IOV
<notification
xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Physical Interface: eth0-1 Number of VFs
0</status_message>
<details>NA</details>
<event_type>PNIC_SRIOV_DISABLE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
217
Appendix
nfvisEvent
PNIC_SRIOV_ENABLE Enable of
<?xml version="1.0" encoding="UTF-8"?>
disable
<notification
SR-IOV xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
in error <eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Physical Interface: eth0-1 Number of VFs
2</status_message>
<details>NA</details>
<event_type>PNIC_SRIOV_ENABLE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
PNIC_SRIOV_UPDATE Set
<?xml version="1.0" encoding="UTF-8"?>
switchmode
<notification
to xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
veb/vepa <eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
<nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Physical Interface: eth0-1 Switchmode
vepa</status_message>
<details>NA</details>
<event_type>PNIC_SRIOV_UPDATE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
218
Appendix
nfvisEvent
PNIC_SRIOV_UPDATE Set
<?xml version="1.0" encoding="UTF-8"?>
switchmode
<notification
to xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
veb/vepa <eventTime>2019-03-15T21:46:28.034133+00:00</eventTime>
in error <nfvisEvent
xmlns="http://www.cisco.com/nfvis/notifier">
<user_id>admin</user_id>
<config_change>true</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>Physical Interface: eth0-1 Switchmode
vepa</status_message>
<details>NA</details>
<event_type>PNIC_SRIOV_UPDATE</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
PROMISC_ENABLED Enable
<?xml version="1.0" encoding="UTF-8"?>
promiscuous
<notification
mode xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2020-03-27T19:58:52.333682+00:00</eventTime>
<nfvisEvent
<user_id>admin</user_id>
<config_change>false</config_change>
<transaction_id>0</transaction_id>
<status>SUCCESS</status>
<status_code>0</status_code>
<status_message>GE0-0: promiscuous mode enabled</status_message>
<details>GE0-0: promiscuous mode enabled</details>
<event_type>PROMISC_ENABLED</event_type>
<severity>INFO</severity>
<hostname>NFVIS</hostname>
</nfvisEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
219
Appendix
vmlcEvent
vmlcEvent
Event Type Notification Notification Output Example
Trigger
CREATE_IMAGE The VM
<?xml version="1.0" encoding="UTF-8"?>
image is
<notification
registered. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:12:30.76+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Image creation completed
successfully.</status_message>
<image>isrv-universalk9.16.03.01.tar.gz</image>
<vm_source></vm_source>
<vm_target></vm_target>
<event>
<type>CREATE_IMAGE</type>
</event>
</vmlcEvent>
</notification>
DELETE_IMAGE The VM
<?xml version="1.0" encoding="UTF-8"?>
image is
<notification
unregistered. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:14:51.169+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Image deletion completed
successfully.</status_message>
<image>isrv-universalk9.16.03.01.tar.gz</image>
<vm_source></vm_source>
<vm_target></vm_target>
<event>
<type>DELETE_IMAGE</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
220
Appendix
vmlcEvent
CREATE_FLAVOR A flavor
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
created. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:12:29.685+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Flavor creation completed
successfully.</status_message>
<flavor>ISRv-small</flavor>
<vm_source></vm_source>
<vm_target></vm_target>
<event>
<type>CREATE_FLAVOR</type>
</event>
</vmlcEvent>
</notification>
DELETE_FLAVOR A flavor
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
deleted. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:14:51.425+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Flavor deletion completed
successfully.</status_message>
<flavor>ISRv-small</flavor>
<vm_source></vm_source>
<vm_target></vm_target>
<event>
<type>DELETE_FLAVOR</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
221
Appendix
vmlcEvent
VM_DEPLOYED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
deployed. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:19:16.927+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>VIM Driver: VM successfully created, VM Name:
[SystemAdminTena_ROUTER_0_df6733c1-0768-4ae6-8dce-b223ecdb036c]</status_message>
<depname>1479341445</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<depid>c64d79db-3a29-41a8-8114-c80d42731a5b</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d18dd252-80c8-44f2-ab66-d4481790bb79</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<port_id>vnet0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.2</ip_address>
<mac_address>52:54:00:31:c5:7f</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<port_id>vnet1</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:59:52:41</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
</interfaces>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_DEPLOYED</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
222
Appendix
vmlcEvent
VM_ALIVE The
<?xml version="1.0" encoding="UTF-8"?>
state of
<notification
a xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
monitored <eventTime>2016-11-17T17:22:47.306+00:00</eventTime>
VM <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
becomes
<status>SUCCESS</status>
ACTIVE. <status_code>200</status_code>
<status_message>VM_Alive event received, VM ID:
[SystemAdminTena_ROUTER_0_df6733c1-0768-4ae6-8dce-b223ecdb036c]</status_message>
<depname>1479341445</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<depid>c64d79db-3a29-41a8-8114-c80d42731a5b</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d18dd252-80c8-44f2-ab66-d4481790bb79</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<port_id>vnet0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.2</ip_address>
<mac_address>52:54:00:31:c5:7f</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<port_id>vnet1</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:59:52:41</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
</interfaces>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_ALIVE</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
223
Appendix
vmlcEvent
VM_UNDEPLOYED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
undeployed. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:31:40.6+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>204</status_code>
<status_message>VIM Driver: VM successfully deleted</status_message>
<depname>1479341445</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<depid>c64d79db-3a29-41a8-8114-c80d42731a5b</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d18dd252-80c8-44f2-ab66-d4481790bb79</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<port_id>vnet0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.2</ip_address>
<mac_address>52:54:00:31:c5:7f</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<port_id>vnet1</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:59:52:41</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
</interfaces>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_UNDEPLOYED</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
224
Appendix
vmlcEvent
SERVICE_UPDATED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
updated. xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-17T17:51:45.5+00:00</eventTime>
<vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Service group update completed
successfully</status_message>
<depname>1479342258</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<depid>827e871a-30d5-4f5f-a05a-263b7ee3a734</depid>
<vm_source></vm_source>
<vm_target></vm_target>
<event>
<type>SERVICE_UPDATED</type>
</event>
</vmlcEvent>
</notification>
VM_STOPPED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
stopped xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
per VM <eventTime>2016-11-17T17:26:05.762+00:00</eventTime>
action <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
requrest.
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Successfully stopped VM
[SystemAdminTena_ROUTER_0_df6733c1-0768-4ae6-8dce-b223ecdb036c].</status_message>
<depname>1479341445</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>c64d79db-3a29-41a8-8114-c80d42731a5b</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d18dd252-80c8-44f2-ab66-d4481790bb79</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_STOPPED</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
225
Appendix
vmlcEvent
VM_STARTED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
started xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
per VM <eventTime>2016-11-17T17:26:40.398+00:00</eventTime>
action <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
request.
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Started VM
[SystemAdminTena_ROUTER_0_df6733c1-0768-4ae6-8dce-b223ecdb036c].</status_message>
<depname>1479341445</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>c64d79db-3a29-41a8-8114-c80d42731a5b</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d18dd252-80c8-44f2-ab66-d4481790bb79</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_STARTED</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
226
Appendix
vmlcEvent
VM_REBOOTED The VM
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
rebooted xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
per VM <eventTime>2016-11-17T17:36:56.5+00:00</eventTime>
action <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
request.
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Rebooted VM
[SystemAdminTena_ROUTER_0_f17fc494-8535-4b05-b88d-f0fd2effdc7d]</status_message>
<depname>1479342258</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>827e871a-30d5-4f5f-a05a-263b7ee3a734</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>d918a3b1-f2a9-4065-9d8e-2135b0a37d87</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_REBOOTED</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
227
Appendix
vmlcEvent
VM_RECOVERY_INIT A
<?xml version="1.0" encoding="UTF-8"?>
monitored
<notification
VM is xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
not <eventTime>2016-11-17T16:27:51.627+00:00</eventTime>
reachable. <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Recovery event for VM
[SystemAdminTena_ROUTER_0_40ae18be-5930-4d94-95ff-dbb0b56ef12b] trigge
red. Processing Auto healing. Proceeding with
Recovery.</status_message>
<depname>1479328919</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>9e7fe4f8-a5f4-4a6d-aad7-121405be4ba4</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>000883fc-77f3-4b9e-aaf6-0f31d88a8f67</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_RECOVERY_INIT</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
228
Appendix
vmlcEvent
VM_RECOVERY_REBOOT Recovery
<?xml version="1.0" encoding="UTF-8"?>
reboot
<notification
starts xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
for the <eventTime>2016-11-17T16:27:53.979+00:00</eventTime>
monitored <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
VM,
<status>SUCCESS</status>
which is <status_code>200</status_code>
not <status_message>VM
reachable. [SystemAdminTena_ROUTER_0_40ae18be-5930-4d94-95ff-dbb0b56ef12b] is
being rebooted.
</statu
s_message>
<depname>1479328919</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>9e7fe4f8-a5f4-4a6d-aad7-121405be4ba4</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>000883fc-77f3-4b9e-aaf6-0f31d88a8f67</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_RECOVERY_REBOOT</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
229
Appendix
vmlcEvent
VM_RECOVERY_COMPLETE Recovery
<?xml version="1.0" encoding="UTF-8"?>
reboot
<notification
completes xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
for the <eventTime>2016-11-17T16:31:26.934+00:00</eventTime>
monitored <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
VM,
<status>SUCCESS</status>
which is <status_code>200</status_code>
not <status_message>Successfully recovered VM
reachable. [SystemAdminTena_ROUTER_0_40ae18be-5930-4d94-95ff-dbb0b56ef12b].<
status_message>
<depname>1479328919</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>9e7fe4f8-a5f4-4a6d-aad7-121405be4ba4</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>000883fc-77f3-4b9e-aaf6-0f31d88a8f67</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target>
<vmid>000883fc-77f3-4b9e-aaf6-0f31d88a8f67</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<port_id>vnet0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.2</ip_address>
<mac_address>52:54:00:7b:3f:de</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<port_id>vnet1</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:96:8a:4d</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
</interfaces>
</vm_target>
<event>
<type>VM_RECOVERY_COMPLETE</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
230
Appendix
vmlcEvent
VM_MONITOR_UNSET Monitoring
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
disabled xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
per VM <eventTime>2016-11-18T13:36:43.613+00:00</eventTime>
action <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
request.
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Unset monitor completed successfully</status_message>
<depname>1479413090</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>742dd335-330c-4bf0-a75d-a44003c645c5</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>23ec3793-37ab-4ec2-a978-a10e08585fdd</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_MONITOR_UNSET</type>
</event>
</vmlcEvent>
</notification>
VM_MONITOR_SET Monitoring
<?xml version="1.0" encoding="UTF-8"?>
is
<notification
enabled xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
per VM <eventTime>2016-11-18T13:40:15.276+00:00</eventTime>
action <vmlcEvent
xmlns="http://www.cisco.com/nfvis/vm_lifecycle">
request.
<status>SUCCESS</status>
<status_code>200</status_code>
<status_message>Set monitor completed successfully</status_message>
<depname>1479413090</depname>
<tenant>admin</tenant>
<tenant_id>AdminTenantId</tenant_id>
<svcid>NULL</svcid>
<depid>742dd335-330c-4bf0-a75d-a44003c645c5</depid>
<vm_group>ROUTER</vm_group>
<vm_source>
<vmid>23ec3793-37ab-4ec2-a978-a10e08585fdd</vmid>
<hostid>NFVIS</hostid>
<hostname>NFVIS</hostname>
</vm_source>
<vm_target></vm_target>
<event>
<type>VM_MONITOR_SET</type>
</event>
</vmlcEvent>
</notification>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
231
Appendix
vmlcEvent
VM_UPDATED VM's
flavor is
changed.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
232
Appendix
vmlcEvent
<vmname>1512766000_ROUTER_0_60d15064-0c6d-49b9-aa4a-80587f626004</vmname>
<hostid>NFVIS</hostid>
<hostname>nfvis</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<type>virtual</type>
<port_id>vnic0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.3</ip_address>
<mac_address>52:54:00:3c:ee:5b</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<type>virtual</type>
<port_id>vnic1</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:70:06:4a</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
<interface>
<nicid>2</nicid>
<type>virtual</type>
<port_id>vnic2</port_id>
<network>lan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:c7:30:1c</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>192.168.1.1</gateway>
</interface>
</interfaces>
</vm_source>
<event>
<type>VM_UPDATED</type>
</event>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
233
Appendix
vmlcEvent
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
234
Appendix
vmlcEvent
VM_UPDATED VNIC is
added,
deleted
or
updated.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
235
Appendix
vmlcEvent
<vmname>1512766000_ROUTER_0_60d15064-0c6d-49b9-aa4a-80587f626004</vmname>
<hostid>NFVIS</hostid>
<hostname>nfvis</hostname>
<interfaces>
<interface>
<nicid>0</nicid>
<type>virtual</type>
<port_id>vnic0</port_id>
<network>int-mgmt-net</network>
<subnet>N/A</subnet>
<ip_address>10.20.0.3</ip_address>
<mac_address>52:54:00:3c:ee:5b</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>10.20.0.1</gateway>
</interface>
<interface>
<nicid>1</nicid>
<type>virtual</type>
<port_id>vnic1</port_id>
<network>lan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:70:06:4a</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>192.168.1.1</gateway>
</interface>
<interface>
<nicid>2</nicid>
<type>virtual</type>
<port_id>vnic2</port_id>
<network>wan-net</network>
<subnet>N/A</subnet>
<mac_address>52:54:00:c7:30:1c</mac_address>
<netmask>255.255.255.0</netmask>
<gateway>172.19.181.152</gateway>
</interface>
<interface>
<nicid>3</nicid>
<type>virtual</type>
<port_id>vnic3</port_id>
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
236
Appendix
Syslog Messages
Syslog Messages
Event Trigger Condition Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
237
Appendix
Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
238
Appendix
Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
239
Appendix
Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
240
Appendix
Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
241
Appendix
Syslog Messages
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
242
CHAPTER 12
Glossary
Terms Description
BIOS BIOS is firmware used to perform hardware initialization during the booting
process, and to provide runtime services for operating systems and programs. The
BIOS firmware comes pre-installed on a personal computer's system board, and
it is the first software to run when powered on.
Cisco IMC The Cisco Integrated Management Controller (IMC) is the management service
for the C-Series servers. CIMC runs within the server. You can use a web-based
GUI or SSH-based CLI to access, configure, administer, and monitor the server.
DPDK The Data Plane Development Kit (DPDK) is a set of data plane libraries and
network interface controller drivers for fast packet processing.
IPSec Internet Protocol Security (IPsec) is a secure network protocol suite that
authenticates and encrypts the packets of data to provide secure encrypted
communication between two computers over an Internet Protocol network
LACP Link Aggregation Control Protocol (LACP) is a protocol for the collective handling
of multiple physical ports that can be seen as a single channel for network traffic
purposes.
LLDP Link Layer Discovery Protocol (LLDP) is a vendor independent link layer protocol
used by network devices for advertising their identity, capabilities to neighbors
on a LAN segment.
MIB Management Information Base (MIB) is a database of the objects that can be
managed on a device. The managed objects, or variables, can be set or read to
provide information on the network devices and interfaces.
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
243
Glossary
Terms Description
PnP Plug and Play (PnP) increases speed and reduces complexity of device
deployments.
Port Channels Port channels combine individual links into a group to create a single logical link
that provides the aggregate bandwidth of up to eight physical links.
REST API Representational state transfer (REST) suggests to create an object of the data
requested by the client and send the values of the object in response to the user.
Service Chaining Service chaining allows data traffic to be rerouted through one or more services,
such as firewall, load balancer, and intrusion detection and prevention (IDP)
devices.
SNMP Simple Network Management Protocol (SNMP) is a framework used for managing
devices on the internet. It provides a set of operations for monitoring and managing
the internet.
SPAN Switched Port Analyzer (SPAN) feature, which is sometimes called port mirroring
or port monitoring, selects network traffic for analysis by a network analyzer.
Spanning Tree Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and
switches. The main purpose of STP is to ensure that you do not create loops when
you have redundant paths in your network.
SR-IOV Single Root I/O Virtualization (SR-IOV) allows multipleVMs running a variety
of guest operating systems to share a single PCIe network adapter within a host
server. SR-IOV allows a VM to move data directly to and from the network
adapter, bypassing the hypervisor for increased network throughput and lower
server CPU burden.
UEFI The Unified Extensible Firmware Interface (UEFI) is a specification that defines
a software interface between an operating system and platform firmware.
virtio Virtual input/output (virtio) is a virtualization standard for network and disk device
drivers where just the guest's device driver "knows" it is running in a virtual
environment, and cooperates with the hypervisor.
VNF Virtual Network Functions (VNFs), the software version of network appliances
such as a router, firewall, load-balancer etc
Cisco Enterprise Network Function Virtualization Infrastructure Software Configuration Guide, Release 3.12.x
244