This chapter explains the tasks you need to do immediately after installation of Oracle Communications IP Service Activator in order to set up domains.
The chapter describes how to:
Create domains and set up network processor assignment for the devices within the domain
Load files containing basic configuration data
Open domains
Oracle Communications IP Service Activator uses a concept of domains to define the logical networks to be managed. You can create multiple domains to represent managed networks: one domain for each AS region to be managed. No domains exist when you first install IP Service Activator, so the first step is to create one or more domains.
To create a new domain:
Select New Domain from the File menu. The Domain dialog box opens.
Enter an identifying name for the domain.
Specify the type of domain:
Public if the network only uses public IP addresses.
Private if you plan to manage independent networks with overlapping address space.
MPLS VPN if you are going to set up MPLS-based virtual private networks.
For MPLS VPN domains, specify whether interfaces on Provider Edge routers that connect to the Customer Edge routers use public or private addresses.
By default, they are assumed to use unique, public IP addresses. If they use private IP addresses, clear the Public PE to CE Addresses check box.
For further configuration, see the cartridge or driver guide that applies to your configuration.
If you want to own the domain and set permissions on it for yourself, members of your user group and other users, select the Ownership property page.
Note:
If you are setting up VPNs you also need to set parameters on the VPN BGP, VPN MPLS and ASN property pages. For full details of how to set up VPNs, see IP Service Activator VPN User's Guide.On the Domain dialog box, VPN BGP property page, you can specify a value for the Loopback ID field. The Loopback ID value is used to create a loopback interface name by appending it to the name 'loopback'. For example, if the Loopback ID is 0, the loopback interface name created is 'loopback0'. When a device in this domain is discovered, a check is made to see if a loopback interface matching this text string exists. If it does, the IP address of the loopback interface is stored with the device information. The Loopback ID value can be overridden on a per-device basis (on the Device dialog box) and on a per-discovery basis (on the Topology dialog box).
All devices in the domain that are to be managed by IP Service Activator must be assigned to a proxy agent. It is the proxy agent that controls when and what type of configuration is to be applied to a specific interface.
Although it is possible to assign devices to proxy agents manually, it is generally performed automatically during device discovery.
If you have a distributed installation with multiple proxy agents and you are creating multiple domains, you can assign specific proxy agents to each domain.
A device can only be assigned to a proxy agent that is either global or has been assigned to the domain that the device is in.
To assign a proxy agent to a domain:
Select a domain from the global setup window and select Properties from the context menu.
Select the Proxy Agent property page. The list shows all the proxy agents currently installed.
Select one or more proxy agents to be used within the domain by clicking the check box associated with the proxy agent.
Repeat these steps to assign specific proxy agents to specific domains.
Note:
If you do not explicitly define proxy agents for each domain, all proxy agents remain global and devices within any domain can be assigned to them.Devices can be assigned to a proxy agent automatically whenever devices are discovered or rediscovered. You can configure IP Service Activator either to assign all devices to one proxy agent or to assign the devices equally to a number of proxy agents.
Devices are assigned only to proxy agents that are:
Specifically assigned to the domain that the device is in, or are global (that is, not assigned to any domain) and
Defined as active for auto-assignment
To check that a proxy agent is active, display the proxy agent properties by selecting the relevant proxy agent on the System tab in the System Hosts folder and choosing Properties from the context menu. Ensure the Auto device assignment is set to On (this is the default setting).
To configure automatic proxy agent assignment within a domain:
From the Tools menu, select Options.
The Options dialog box opens.
Under Auto proxy assignment, select either First or Load balance:
First assigns each new device discovered to the first active proxy agent. This is the default setting.
Load balance allocates devices to multiple proxy agents with an equal allocation to all active proxy agents in order to balance the processing load between them.
If Off is selected, devices are not assigned to proxy agents automatically. Before they can be managed you will need to link them manually.
Only supported devices, that is, those that are included in the DeviceTypes.cfg file in the Config directory, can be automatically assigned.
When running in a multi-proxy environment:
If you discover a device and fetch capabilities under a Domain which has both a Network Processor and a Proxy Agent proxy active, you will not be able to tell which fetched the capabilities. In this case, assign the device to the desired proxy, and then reset and re-fetch the capabilities.
The next step is to install one or more set-up files that create standard policy configuration data in the IP Service Activator database – basic policy components and, if required, sample rules and PHB groups.
Note:
Oracle recommends loading the default configuration policy data. If you do not load the data, you have to create all the basic component data manually. Loading configuration policy data is mandatory if you want to use configuration policy.The following configuration files are supplied in the SamplePolicy directory:
default.policy creates some basic policy data, including:
Packet markings representing IP Precedence values 0-7
Gold, Silver and Bronze classes of service
Packet marking based traffic types representing the Gold, Silver and Bronze classes of service and port-based traffic types representing the most common TCP and UDP port numbers
Classifications based on the traffic types
advanced.policy creates additional policy data:
Packet markings based on the full range of DiffServ codepoints and MPLS experimental bits
Packet marking based traffic types representing DiffServ codepoints and MPLS experimental bits
Port-based traffic types representing the most common IP protocols
Classifications based on the packet marking traffic types
This data is useful if your routers support the full range of DiffServ codepoints and/or MPLS experimental bits.
Rule_and_PHB.policy includes some example policy rules and standard PHB groups. If you wish, you can base your own rules and PHB groups on these examples.
The files must be loaded in the order in which they are listed above. The following files are loaded automatically during startup:
ConfigletPolicyTypes.policy loads the configlets, which are needed by CTM.
ConfigurationManagementPolicyTypes.policy loads other config policies needed by Configuration Manager.
ExtensionPackAPolicyTypes.policy contains standard definitions for:
Extension Pack A Configuration Policy Types
ATM PVC Vc Class
Save Running Config
Static NAT
ExtensionPackBPolicyTypes.policy contains standard definitions for:
Extension Pack B Configuration Policy Types
VRF Custom Naming
VRF Export Route Filter
ExtensionPackCPolicyTypes.policy contains standard definitions for:
Extension Pack C Configuration Policy Types
ATM Vc Class
BGP CE
Extended ACL
GeneralPolicyTypes.policy contains standard definitions for:
General Configuration Policy Types
Banners
IP Pools
Key Chain
Prefix List
SNMP Community
SNMP Host
Static Route
User Authentication
User Data
Traffic Statistics
InterfaceManagementPolicyTypes.policy contains standard definitions for:
Interface Creation Configuration Policy Types
Interface Decoration Configuration Policy Types
Subinterface Creation Configuration Policy Types
Channelized Interface Creation Configuration Policy Types
Other Interface Management Configuration Policy Types
IPMulticastPolicyTypes.policy contains standard definitions for:
IP Multicast Configuration Policy Types
Mulitcast Interface types can be installed by loading the
MulticastInterfacePolicyTypes.policy file
IPSecPolicyTypes.policy contains standard definitions for:
IPSec Configuration Policy Types
Customer IPSec
Public IPSec
IPSec
JuniperJUNOSQoSPolicyTypes.policy contains standard definitions for:
Juniper JUNOS QoS Configuration Policy Types
Juniper JUNOS COS Attachment
VRF Custom Naming
LSPPolicyTypes.policy contains standard definitions for:
LSP Configuration Policy Types
LSP Tunnel
MulticastInterfacePolicyTypes.policy contains standard definitions for Multicast Interface Configuration Policy Types to be used with VPN and IP Multicast Policy Type services.
Role_Assignment_Rules.policy defines a set of role assignment rules that allocate system-defined roles to devices and interfaces. Do not use role assignment rules - assign roles manually.
RoutePolicyPolicyTypes.policy contains standard definitions for:
Route Policy Configuration Policy Types
BGP Route Policy
VRF Route Policy
ServiceAssurancePolicyTypes.policy contains standard definitions for:
Service Assurance Configuration Policy Types
Collector Parameters
Netflow Parameters
RTR Responder
VLANPolicyTypes.policy contains standard definitions for:
VLAN Configuration Policy Types
MGMT VLAN Interface
VLAN Interface
VLAN Definition
VPNMulticastPolicyTypes.policy contains standard definitions for:
VPN Multicast Configuration Policy Types
Mulitcast Interface types can be installed by loading the
MulticastInterfacePolicyTypes.policy file
The SharedPolicyData.policy file is loaded automatically at system start-up. It defines a set of commonly-used IP protocols which are available in any domain you create. You only need to load this file if the IP protocols are deleted or edited incorrectly.
All of the above files are domain-specific – that is, they must be loaded into each domain in which you wish to use their information.
To load a policy configuration file:
Select a domain from the global setup window and select Properties from the context menu.
On the Domain dialog box, select the Setup property page.
Click Browse to view the available configuration files in the SamplePolicy folder.
Select the file to load and click Open. A brief explanation of the file appears in the File Information box.
Click Load to load the selected file and create the data. Note that files must be loaded in the following order:
default.policy
advanced.policy
Rule_and_PHB.policy
Note:
It is important to load the files in order. Always load default.policy first, and do not load Rule_and_PHB.policy if you have already created PHB groups.