V3.5 IP Address Management Software

Total Page:16

File Type:pdf, Size:1020Kb

V3.5 IP Address Management Software GestióIP IPAM v3.5 IP address management software Documentation v1.11 www.gestioip.net GestióIP Copyright © Marc Uebel 2021 Documentation GestióIP IPAM v3.5 Table of Contents 1 Introduction......................................................................................................................................7 2 Use....................................................................................................................................................8 2.1 Access.......................................................................................................................................8 2.2 Show networks..........................................................................................................................8 2.2.1 Root networks.................................................................................................................10 2.3 Show hosts..............................................................................................................................11 2.3.1 Host list view..................................................................................................................11 2.3.2 Host overview.................................................................................................................13 2.3.3 Host status view..............................................................................................................13 2.3.4 Host check.......................................................................................................................14 2.4 Search functions......................................................................................................................15 2.4.1 Quick search....................................................................................................................15 2.4.2 Advanced network search...............................................................................................17 2.4.3 Advanced host search......................................................................................................17 2.5 History....................................................................................................................................18 2.6 Audit.......................................................................................................................................18 3 Administration................................................................................................................................21 3.1 Administration of host entries/IP addresses............................................................................21 3.1.1 Insert or edit host entries.................................................................................................21 3.1.2 Delete host entries...........................................................................................................22 3.1.3 Host mass update............................................................................................................23 3.1.3.1 Edit multiple host entries.........................................................................................23 3.1.3.2 Delete multiple host entries.....................................................................................24 3.2 Network administration..........................................................................................................25 3.2.1 New - add networks manually........................................................................................25 3.2.1.1 Create one network..................................................................................................25 3.2.1.2 Create multiple networks with same bitmasks........................................................26 3.2.1.3 Create multiple networks with different bitmasks..................................................27 3.2.2 Network actions..............................................................................................................28 3.2.2.1 Edit..........................................................................................................................29 3.2.2.2 Reserved ranges.......................................................................................................29 3.2.2.3 Manual update against DNS....................................................................................31 3.2.2.3.1 Generic rDNS entries.......................................................................................31 3.2.2.4 Manual host update via SNMP................................................................................33 3.2.2.5 Split.........................................................................................................................33 3.2.2.6 Clear........................................................................................................................35 3.2.2.7 Delete.......................................................................................................................35 3.2.2.8 Network mass update..............................................................................................35 3.2.2.8.1 Edit multiple network entries..........................................................................36 3.2.2.8.2 Clear multiple networks...................................................................................36 3.2.2.8.3 Delete multiple network entries.......................................................................37 3.2.3 Join networks..................................................................................................................37 3.2.4 Show free ranges.............................................................................................................38 2 Documentation GestióIP IPAM v3.5 3.2.5 Subnet calculator.............................................................................................................39 3.3 VLANs....................................................................................................................................40 3.3.1 show, edit, delete.............................................................................................................40 3.3.2 New.................................................................................................................................41 3.3.3 Unify...............................................................................................................................41 3.3.4 VLAN provider...............................................................................................................42 3.3.4.1 Show VLAN provider.............................................................................................42 3.3.4.2 New VLAN provider...............................................................................................42 3.3.5 Import VLANs via SNMP..............................................................................................43 3.4 Autonomous system management..........................................................................................44 3.4.1 show, edit, delete.............................................................................................................44 3.4.2 new..................................................................................................................................44 3.4.3 show AS clients...............................................................................................................45 3.4.4 new AS client..................................................................................................................45 3.5 Line management....................................................................................................................45 3.5.1 show, edit, delete.............................................................................................................45 3.5.2 new..................................................................................................................................46 3.5.3 show line provider...........................................................................................................46 3.5.4 new line provider............................................................................................................46 3.6 MAC management..................................................................................................................46 3.6.1 show, edit, delete.............................................................................................................47 3.6.2 Add..................................................................................................................................47 3.7 Clients.....................................................................................................................................48 3.7.1 Manage clients................................................................................................................48 3.7.1.1 Add clients...............................................................................................................49 3.7.1.2 Edit clients...............................................................................................................49 3.7.1.3 Delete clients...........................................................................................................50 3.8 Sites and categories.................................................................................................................50
Recommended publications
  • Working with DHCP in Oracle® Solaris 11.2
    ® Working With DHCP in Oracle Solaris 11.2 Part No: E36812 July 2014 Copyright © 1999, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Pf3e Index.Pdf
    INDEX Note: Pages numbers followed by f, n, priority-based queues, 136–145 or t indicate figures, notes, and tables, match rule for queue assignment, respectively. 137–138 overview, 134–135 Symbols performance improvement, 136–137 # (hash mark), 13, 15 queuing for servers in DMZ, ! (logical NOT) operator, 42 142–144 setting up, 135–136 A on FreeBSD, 135–136 on NetBSD, 136 Acar, Can Erkin, 173 on OpenBSD, 135 ACK (acknowledgment) packets transitioning to priority and class-based bandwidth allocation, queuing system, 131–133 139–140 anchors, 35–36 HFSC algorithm, 124, 126, 142 authpf program, 61, 63 priority queues, 132, 137–138 listing current contents of, 92 two-priority configuration, loading rules into, 92 120–121, 120n1 manipulating contents, 92 adaptive.end value, 188 relayd daemon, 74 adaptive firewalls, 97–99 restructuring rule set with, 91–94 adaptive.start value, 188 tagging to help policy routing, 93 advbase parameter, 153–154 ancontrol command, 46n1 advskew parameter, 153–154, 158–159 antispoof tool, 27, 193–195, 194f aggressive value, 192 ARP balancing, 151, 157–158 ALTQ (alternate queuing) framework, atomic rule set load, 21 9, 133–145, 133n2 authpf program, 59–63, 60 basic concepts, 134 basic authenticating gateways, class-based bandwidth allocation, 60–62 139–140 public networks, 62–63 overview, 135 queue definition, 139–140 tying queues into rule set, 140 B handling unwanted traffic, 144–145 bandwidth operating system-based queue actual available, 142–143 assignments, 145 class-based allocation of, 139–140 overloading to
    [Show full text]
  • What's New in IPAM
    What's New in IPAM 5 out of 8 rated this helpful - Rate this topic Published: June 24, 2013 Updated: July 3, 2014 Applies To: Windows Server 2012, Windows Server 2012 R2 This topic describes the IP Address Management (IPAM) functionality that is new or changed in Windows Server 2012 R2 and Windows Server 2012. IPAM provides highly customizable administrative and monitoring capabilities for the IP address infrastructure on a corporate network. You can monitor, audit, and manage servers running Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). In this topic: What’s new in IPAM in Windows Server 2012 R2 What’s new in IPAM in Windows Server 2012 What’s new in IPAM in Windows Server 2012 R2 In Windows Server 2012 R2, IPAM offers enhanced support in the following areas. New or Feature/Functionality Description improved Role based access control enables you to customize Role-based access control New the types of operations and access permissions for users and groups of users on specific objects. IPAM streamlines management of physical and virtual Virtual address space New IP address space in System Center Virtual Machine management Manager. Several new operations are available in IPAM to Enhanced DHCP server Improved enhanced the monitoring and management of the management DHCP Server service on the network. In addition to Windows Internal Database (WID), External database support New IPAM also optionally supports the use of a Microsoft 1 SQL database. If you installed IPAM on Windows Server 2012, your Upgrade and migration New data is maintained and migrated when you upgrade to support Windows Server 2012 R2.
    [Show full text]
  • Install and Setup DHCP Service
    Install and setup DHCP Service Synopsis: DHCP or Dynamic Host Configuration Protocol allows for automatic management of IP addresses on your internal network. By providing DHCP on your LAN, you eliminate the bother of having to configure manually PCs, laptops, or smart phones. They will automatically get an IP address and be configured with default gateway and DNS server information. It is important that only one DHCP server be active on a network. So, check carefully any other network devices on your network, especially wireless Access Points, to be sure their DHCP service is disabled. I. Installation Log into the Freebsd system as root. (Assumes networking is already configured.) # # cd /usr/ports/net/isc-dhcp44-server && make install clean # II. Startup Configuration Enable DHCP daemon at startup and assign the internal LAN (sk0 in this project) interface; # # echo 'dhcpd_enable="YES"' >> /etc/rc.conf # echo 'dhcpd_ifaces="sk0"' >> /etc/rc.conf # III. Setup configuration file # # cd /usr/local/etc # If there is a dhcpd.conf file, rename it; # # mv dhcpd.conf dhcpd.conf.original # Copy the following text, modify for your personal use, and paste it into a new dhcpd.conf file. You will need to modify the subnet (i.e., your network zero) and mask, the IP pool range, the DNS server (in this case 8.8.8.8 is the Google DNS server), the domain name, the router/gateway and the broadcast address (i.e., your network 255). The settings shown assumes our LAN subnet will be the private range 192.168.1.0 to 192.168.1.255. This machine will have LAN address configured as 192.168.1.254 and will be the default gateway for the LAN network.
    [Show full text]
  • The Complete Freebsd
    The Complete FreeBSD® If you find errors in this book, please report them to Greg Lehey <grog@Free- BSD.org> for inclusion in the errata list. The Complete FreeBSD® Fourth Edition Tenth anniversary version, 24 February 2006 Greg Lehey The Complete FreeBSD® by Greg Lehey <[email protected]> Copyright © 1996, 1997, 1999, 2002, 2003, 2006 by Greg Lehey. This book is licensed under the Creative Commons “Attribution-NonCommercial-ShareAlike 2.5” license. The full text is located at http://creativecommons.org/licenses/by-nc-sa/2.5/legalcode. You are free: • to copy, distribute, display, and perform the work • to make derivative works under the following conditions: • Attribution. You must attribute the work in the manner specified by the author or licensor. • Noncommercial. You may not use this work for commercial purposes. This clause is modified from the original by the provision: You may use this book for commercial purposes if you pay me the sum of USD 20 per copy printed (whether sold or not). You must also agree to allow inspection of printing records and other material necessary to confirm the royalty sums. The purpose of this clause is to make it attractive to negotiate sensible royalties before printing. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. • For any reuse or distribution, you must make clear to others the license terms of this work. • Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above.
    [Show full text]
  • Architecture of Network Management Tools for Heterogeneous System
    (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 Architecture of Network Management Tools for Heterogeneous System Rosilah Hassan, Rozilawati Razali, Shima Mohseni, Ola Mohamad and Zahian Ismail Department of Computer Science, Faculty of Information Science and Technology Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia . Human: where human manager defines the policy and organization approaches. Abstract— Managing heterogeneous network systems is Methodology: defines the architectural a difficult task because each of these networks has its own curious management system. These networks framework and the functions to be usually are constructed on independent management performed. protocols which are not compatible with each other. Instrumentation: the actual operational This results in the coexistence of many management aspects that establish the procedures, systems with different managing functions and services methods and algorithms for data collection, across enterprises. Incompatibility of different processing and reporting, and analysis of management systems makes management of whole problems, their repair, prediction or system a very complex and often complicated job. forecasting of service levels and probable Ideally, it is necessary to implement centralized meta- level management across distributed heterogeneous improvements to enhance performance. systems and their underlying supporting network systems where the information flow and guidance is S&NM aims to provide network
    [Show full text]
  • Assessing the Impact of Lack of Network Documentation in Higher Learning Institutions: Case of University of Dodoma
    The University of Dodoma University of Dodoma Institutional Repository http://repository.udom.ac.tz Information and Communication Technology Master Dissertations 2014 Assessing the impact of lack of network documentation in higher learning institutions: Case of University of Dodoma Kachemela, Seif J The University of Dodoma Kachemela, J. S. (2014). Assessing the impact of lack of network documentation in higher learning institutions: Case of University of Dodoma (Master's dissertation). The University of Dodoma, Dodoma. http://hdl.handle.net/20.500.12661/1352 Downloaded from UDOM Institutional Repository at The University of Dodoma, an open access institutional repository. ASSESSING THE IMPACT OF LACK OF NETWORK DOCUMENTATION IN HIGHER LEARNING INSTITUTIONS: CASE OF UNIVERSITY OF DODOMA By Seif J. Kachemela Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science of the University of Dodoma The University of Dodoma October, 2014 CERTIFICATION The undersigned certify that they have read and hereby recommend for acceptance by the University of Dodoma a dissertation entitled “Assessing the severity of the technological impact of lack of network documentation in higher learning institutions: Case of University of Dodoma”, in partial fulfillment of the requirements for the degree of Master of Science in Computer Science of the University of Dodoma. ………………………..……. Dr. Leonard. J. MseIle (SUPERVISOR) ………………………………. Prof. Justinian Anatory (SUPERVISOR) Date……………………………….. i DECLARATION AND COPYRIGHT I, Seif J. Kachemela, declare that this dissertation is my own original work and that it has not been presented and will not be presented to any other University for a similar or any other degree award.
    [Show full text]
  • Utilising Configuration Management Node Data for Network Infrastructure
    Aalto University School of Science Degree Programme in Computer Science and Engineering Lauri Tirkkonen Utilising configuration management node data for network infrastructure man- agement Master's Thesis Espoo, May 4, 2016 Supervisor: Professor Heikki Saikkonen Advisor: Jaakko Kotim¨akiM.Sc. (Tech.) Aalto University School of Science ABSTRACT OF Degree Programme in Computer Science and Engineering MASTER'S THESIS Author: Lauri Tirkkonen Title: Utilising configuration management node data for network infrastructure man- agement Date: May 4, 2016 Pages: 38 Major: Software Technology Code: T-106 Supervisor: Professor Heikki Saikkonen Advisor: Jaakko Kotim¨akiM.Sc. (Tech.) Configuration management software running on nodes solves problems such as configuration drift on the nodes themselves, but the necessary node configura- tion data can also be utilised in managing network infrastructure, for example to reduce configuration errors by facilitating node life cycle management. Many configuration management software systems depend on a working network, but we can utilise the data to create large parts of the network infrastructure config- uration itself using node data from the configuration management system before the nodes themselves are provisioned, as well as remove obsolete configuration as nodes are decommissioned. Keywords: configuration management, network infrastructure configura- tion, life cycle management Language: English 2 Aalto-yliopisto Perustieteiden korkeakoulu DIPLOMITYON¨ Tietotekniikan koulutusohjelma TIIVISTELMA¨ Tekij¨a: Lauri Tirkkonen
    [Show full text]
  • Ubuntu Server Guide Basic Installation Preparing to Install
    Ubuntu Server Guide Welcome to the Ubuntu Server Guide! This site includes information on using Ubuntu Server for the latest LTS release, Ubuntu 20.04 LTS (Focal Fossa). For an offline version as well as versions for previous releases see below. Improving the Documentation If you find any errors or have suggestions for improvements to pages, please use the link at thebottomof each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are viewing. There you can share your comments or let us know aboutbugs with any page. PDFs and Previous Releases Below are links to the previous Ubuntu Server release server guides as well as an offline copy of the current version of this site: Ubuntu 20.04 LTS (Focal Fossa): PDF Ubuntu 18.04 LTS (Bionic Beaver): Web and PDF Ubuntu 16.04 LTS (Xenial Xerus): Web and PDF Support There are a couple of different ways that the Ubuntu Server edition is supported: commercial support and community support. The main commercial support (and development funding) is available from Canonical, Ltd. They supply reasonably- priced support contracts on a per desktop or per-server basis. For more information see the Ubuntu Advantage page. Community support is also provided by dedicated individuals and companies that wish to make Ubuntu the best distribution possible. Support is provided through multiple mailing lists, IRC channels, forums, blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions.
    [Show full text]
  • Free, Functional, and Secure
    Free, Functional, and Secure Dante Catalfamo What is OpenBSD? Not Linux? ● Unix-like ● Similar layout ● Similar tools ● POSIX ● NOT the same History ● Originated at AT&T, who were unable to compete in the industry (1970s) ● Given to Universities for educational purposes ● Universities improved the code under the BSD license The License The license: ● Retain the copyright notice ● No warranty ● Don’t use the author's name to promote the product History Cont’d ● After 15 years, the partnership ended ● Almost the entire OS had been rewritten ● The university released the (now mostly BSD licensed) code for free History Cont’d ● AT&T launching Unix System Labories (USL) ● Sued UC Berkeley ● Berkeley fought back, claiming the code didn’t belong to AT&T ● 2 year lawsuit ● AT&T lost, and was found guilty of violating the BSD license History Cont’d ● BSD4.4-Lite released ● The only operating system ever released incomplete ● This became the base of FreeBSD and NetBSD, and eventually OpenBSD and MacOS History Cont’d ● Theo DeRaadt ○ Originally a NetBSD developer ○ Forked NetBSD into OpenBSD after disagreement the direction of the project *fork* Innovations W^X ● Pioneered by the OpenBSD project in 3.3 in 2002, strictly enforced in 6.0 ● Memory can either be write or execute, but but both (XOR) ● Similar to PaX Linux kernel extension (developed later) AnonCVS ● First project with a public source tree featuring version control (1995) ● Now an extremely popular model of software development anonymous anonymous anonymous anonymous anonymous IPSec ● First free operating system to implement an IPSec VPN stack Privilege Separation ● First implemented in 3.2 ● Split a program into processes performing different sub-functions ● Now used in almost all privileged programs in OpenBSD like httpd, bgpd, dhcpd, syslog, sndio, etc.
    [Show full text]
  • Alcatel-Lucent Vitalqip DNS/DHCP & IP MANAGEMENT SOFTWARE
    Alcatel-Lucent VitalQIP DNS/DHCP & IP MANAGEMENT SOFTWARE | LUCENT DHCP RELEASE 5.4 BUILD 45 RELEASE NOTES ALCATEL-LUCENT PROPRIETARY This document contains proprietary information of Alcatel-Lucent and 190-409-113R5.4 is not to be disclosed or used except in accordance with applicable NOVEMBER 2008 agreements. ISSUE 12 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2008 Alcatel-Lucent. All Rights Reserved. Alcatel-Lucent – Proprietary See notice on first page Contents About this document vii Reason for reissue..........................................................................................................vii Conventions used............................................................................................................ ix Typographical conventions............................................................................................. ix Technical Support............................................................................................................ x How to comment............................................................................................................. xi 1 Overview 1-1 2 Release components 2-1 Software deliverables..................................................................................................2-2 Software
    [Show full text]
  • Introduction to Networking Monitoring and Management
    Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) as part of the ICANN, ISOC and NSRC Registry Operations Curriculum. Part I: Overview Core concepts presented: – What is network monitoring – What is network management – Getting started – Why network management – The big three – Attack detection – Documentation – Consolidating the data – The big picture Network Monitoring “Monitoring an active communications network in order to diagnose problems and gather statistics for administration and fine tuning.” PC Magazine Network Management …the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. wikipedia Network Management Details We Monitor • System & Services – Available, reachable • Resources – Expansion planning, maintain availability • Performance – Round-trip-time, throughput • Changes and configurations – Documentation, revision control, logging Network Management Details We Keep Track Of • Statistics – For purposes of accounting and metering • Faults (Intrusion Detection) – Detection of issues, – Troubleshooting issues and tracking their history • Ticketing systems are good at this • Help Desks are an important component Expectations A network in operation needs to be monitored in order to: - Deliver projected SLAs (Service Level Agreements) - SLAs depend on
    [Show full text]