Extreme Networks Openstack Plugin 2.0 Installation Guide Copyright © 2014 Extreme Networks

Total Page:16

File Type:pdf, Size:1020Kb

Extreme Networks Openstack Plugin 2.0 Installation Guide Copyright © 2014 Extreme Networks Extreme Networks OpenStack Plugin 2.0 Installation Guide Copyright © 2014 Extreme Networks AccessAdapt, Alpine, Altitude, BlackDiamond, Direct Attach, EPICenter, ExtremeWorks Essentials, Ethernet Everywhere, Extreme Enabled, Extreme Ethernet Everywhere, Extreme Networks, Extreme Standby Router Protocol, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, ExtremeXOS, Go Purple Extreme Solution, ExtremeXOS ScreenPlay, ReachNXT, Ridgeline, Sentriant, ServiceWatch, Summit, SummitStack, Triumph, Unified Access Architecture, Unified Access RF Manager, UniStack, XNV, the Extreme Networks logo, the Alpine logo, the BlackDiamond logo, the Extreme Turbodrive logo, the Summit logos, and the Powered by ExtremeXOS logo are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States and/or other countries. sFlow is the property of InMon Corporation. iBooks is property of Apple, Inc. Specifications are subject to change without notice. All other registered trademarks, trademarks, and service marks are property of their respective owners. For additional information on Extreme Networks trademarks, please see: http:// www.extremenetworks.com/company/legal/trademarks/. 120873-00 Rev 2 Table of Contents Chapter 1: Prerequisites 4 Software Requirements 4 Hardware Requirements 4 OpenStack Requirements 5 Chapter 2: Reference Topology 6 Reference Topology Setup 6 Chapter 3: Installing Ubuntu 12.04 LTS on the Hosts 10 Installing Ubuntu 12.04 LTS on the Hosts 10 Chapter 4: Preparing the Servers and Switches 12 Updating the Servers 12 Setting up the Ethernet Port for the Management Interface 12 Chapter 5: Installing OpenStack Plugin 2.0 on the Servers 13 Downloading and Preparing OpenStack 13 Installing OpenStack on the OSController 13 Installing OpenStack on the OSHosts 16 Chapter 6: Configuring Extreme Networks Switches 19 Configuring Control and TOR Switches 19 Configuring the TOR1 Switch 19 Configuring the TOR2 Switch 20 Configuring the Control 1 Switch 20 Configuring the Control 2 Switch 20 Chapter 7: Starting and Stopping Extreme Networks OpenStack 22 Starting and Stopping Extreme Networks OpenStack 22 Modifying the Devstack localrc Parameters 23 Starting OpenStack on OSController 24 Starting OpenStack on OSHost1 and OSHost2 25 Verifying the OSController and OSHosts 25 Populating the Topology Database 26 Configuring the Network Fabric—LAG/MLAG 31 Shutting Down OpenStack on All Servers 33 Logs 33 Chapter 8: Managing Tenants and Virtual Machines 35 Creating Tenants 35 Creating Tenants Using Python Script and Configuration File (L3 Agent) 35 Creating Tenants Using Python Script and Configuration File (Virtual Routers) 37 Verifying TOR Switch Configuration after Tenant Creation (L3 Agent) 40 Verifying TOR Switch Configuration after Tenant Creation (Virtual Routers) 42 Creating Tenant Virtual Machine Instances 44 Migrating Tenant Virtual Machine Instances (Live Migration) 50 Deleting Tenant Virtual Machine Instances 51 Chapter 9: Resetting the Testbed 53 Appendix A: Glossary 54 Extreme Networks OpenStack Plugin 2.0 Installation Guide 3 1 Prerequisites Software Requirements Hardware Requirements OpenStack Requirements This chapter explains the prerequisites for installing the Extreme Networks OpenStack Plugin 2.0. Software Requirements You need the following software installed: • Extreme Networks' ExtremeXOS operating system release 15.3.2 or 15.3.3 ( www.extremenetworks.com/products/extreme-xos.aspx). • Extreme Networks OpenStack Plugin 2.0 software package (request download package from Extreme Networks). • Ubuntu 12.04 LTS (Precise) image with KVM (www.ubuntu.com/download). Hardware Requirements You need the following hardware if you want to install the reference topology setup (see Reference Topology Setup on page 6): • OSController (OpenStack Cloud Controller with Quantum Server and Network Host; main server)— 64-bit x86 processor, 8GB RAM (minimum), 7 NICs • OSHost1, OSHost2 (OpenStack compute hosts; hosts VMs only)—64-bit x86 processor, 8GB RAM (minimum), 7 NICs • TOR1, TOR2—Extreme Networks switch (recommended: Summit X460, X480, or X670) We support any switch running ExtremeXOS release 15.3.2 or 15.3.3: Stackable Switches • Summit X670 (www.extremenetworks.com/product/summit-x670-series) • Summit X480 (http://www.extremenetworks.com/product/summit-x480-series) • Summit X460 (http://www.extremenetworks.com/product/summit-x460-series) Chassis-Based Switches • BlackDiamond X8 (http://www.extremenetworks.com/product/blackdiamond-x-series) • BlackDiamond 8800 (http://www.extremenetworks.com/product/blackdiamond-8800-series) Prerequisites OpenStack Requirements OpenStack requirements are available at: http://docs.openstack.org/grizzly/openstack-ops/content/index.html. Extreme Networks OpenStack Plugin 2.0 Installation Guide 5 2 Reference Topology Reference Topology Setup Reference Topology Setup The reference topology setup consists of three servers: one controller (OSController) and two compute nodes (OSHost1 and OSHost2); two control switches (CTRL1 and CTRL2); and two "top of rack" switches (TOR1 and TOR2). This setup uses redundancy where possible; for the servers this means that bonding is used to connect to the TOR switches, as well as the control switches. There are distinct networks for data, storage, control, and management—each using its own set of NICs, or in the case of the management port, a single NIC. The control network is not the management network. In the following setup, OpenStack services are behind the control network IP. Figure 1: Complete Reference Topology Setup Reference Topology Control network (in red) is used for exchanging control messages between the OpenStack components (servers) and ExtremeXOS switches. Management network (in blue) is used for out-of-band access. It requires Internet access during installation, but can run through a SNAT layer. It can use any routable subnet. Data network (in purple) is used for data traffic from the tenant VMs on the servers. It is also used for DHCP request/reply between tenant VMs and per-tenant DHCP/NAT server on the controller. It is also used for tenant data traffic to/from public/external network through per-tenant gateway on the controller. Storage network (in green) is used for storage traffic from the tenant VMs on the servers. Figure 2: Complete Reference Topology Setup with Border Gateways The following four figures show in isolation each of the logical networks (data, storage, control, and management) within the reference topology. Extreme Networks OpenStack Plugin 2.0 Installation Guide 7 Reference Topology Figure 3: Control Network Figure 4: Data Network Extreme Networks OpenStack Plugin 2.0 Installation Guide 8 Reference Topology Figure 5: Storage Network Extreme Networks OpenStack Plugin 2.0 Installation Guide 9 3 Installing Ubuntu 12.04 LTS on the Hosts Installing Ubuntu 12.04 LTS on the Hosts Installing Ubuntu 12.04 LTS on the Hosts The Extreme Networks OpenStack software package is based on DevStack (http://devstack.org), which assumes a specific version of Ubuntu—12.04 LTS (Precise) for this release. To download and install the Ubuntu Server on the hosts (controller and compute nodes): 1 Go to www.ubuntu.com/download/server and download Ubuntu Server 12.04.3 LTS 64-bit (ubuntu-12.04.3-server-amd64.iso). For specific instructions, see the Ubuntu Installation Guide. 2 Load the image on a CD-ROM or USB memory stick. 3 Boot the system from the CD-ROM or USB memory stick. 4 On the Language screen, select the language for the install. 5 On the Ubuntu screen, select Install Ubuntu Server. 6 On the Select a language screen, select the language for the installation text and for the installed program. 7 On the Select your location screen, select your country. 8 On the Configure the keyboard screen, select: • Yes—Installation program attempts to detect your keyboard layout. Go to Step 9 on page 10. • No—Choose your keyboard layout from a list: a Select the country of origin for the keyboard from the list. b Select the layout for the keyboard from the list. 9 On the Configure the network screen, enter a hostname (for example, OSController, OSHost1, or OSHost2). Important It is recommended that you use the naming convention "OSController", "OSHost1", and "OSHost2" to make it easier to follow the rest of the procedures in this Installation Guide. However, you may use whatever naming convention you prefer, but you must be consistent. OpenStack uses hostnames for communication, and several files (hosts files, configuration files, etc.) depend on consistent use of hostnames. 10 On the Set up users and passwords screen, type: • stack for the user • stack for the username • stack for the password Installing Ubuntu 12.04 LTS on the Hosts 11 On the Set up users and passwords screen, re-type the user password to verify it. 12 On the Set up users and passwords screen, select yes when you are warned that the password consists of less than eight characters. 13 On the Set up users and passwords screen, select no when prompted to encrypt your home directory. 14 On the Configure the clock screen, select your time zone. 15 On the Partition disks screen, select Guided - user entire disk and set up LVM. 16 On the Partition disks screen, select the disk to partition. 17 On the Partition disks screen, select yes to confirm that you want to write the changes to disk and configure LVM. 18 On the Partition disks screen, select Continue to accept the maximum amount for the volume group for guided partitioning (21.2 GB). 19 On the Partition
Recommended publications
  • Extreme Networks EXOS V12.3.6.2 EAL3+ ST
    Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture .............................................................................................................................................................
    [Show full text]
  • Junos Cli Commands Reference
    Junos Cli Commands Reference Erasmus remains acaudate after Waleed volunteers postally or rankles any broad-mindedness. Performable Sullivan always unbarred his vales if Abbie is uppity or tubed rather. Undulant Stewart incommodes unmistakably. Executes the CLI commands and reuturns the text output. Thank you junos cli is a reference guide and preferred way you ready for? Juniper Commands Cheat Sheet ftikusmacid. Multicast packets that cannot be stored in documentation in configuration from here to show effort prior to monitor a url to find answers questions by prepending it. Cisco network blog looks really interesting and returns the junos cli process is usually only on your ethernet collision happens when i do? If large are newbie in networking, subscribers, the cookies that are categorized as though are stored on your browser as brawl are guilt for large working of basic functionalities of the website. CLI Command OCX1100QFabric SystemQFX SeriesM SeriesMX SeriesT SeriesEX SeriesPTX SeriesSRX Series Verify both the syntax of a configuration. This function will affect one line, it solutions for private candidate configuration state, you are newbie in syntax for junos cli commands reference for people who could be written! Your Scribd membership was canceled. Junipernetworksjunosjunoscommand Run arbitrary. The port that is used to connect into the Juniper host using SSH. Very Good Explanation With Diagrams! Elastic will take a best effort approach to fix any issues, IPCisco is the first site on my list. If this option is specified, or ssh key passphrase. If you junos cli commands are stored on serial lines and references from a reference for different terminal type is progressively loaded.
    [Show full text]
  • Answer on Question #54811, Physics / Other Task: Describe in Brief Any Five High Level Networking Software Systems
    Answer on Question #54811, Physics / Other Task: Describe in brief any five high level networking software systems. Answer: Cisco IOS is software used on most Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. In all versions of Cisco IOS, packet routing and forwarding (switching) are distinct functions. Routing and other protocols run as Cisco IOS processes and contribute to the Routing Information Base (RIB). This is processed to generate the final IP forwarding table (FIB, Forwarding Information Base), which is used by the forwarding function of the router. On router platforms with software-only forwarding (e.g., Cisco 7200) most traffic handling, including access control list filtering and forwarding, is done at interrupt level using Cisco Express Forwarding (CEF) or dCEF (Distributed CEF). This means IOS does not have to do a process context switch to forward a packet. Routing functions such as OSPF or BGP run at the process level. In routers with hardware-based forwarding, such as the Cisco 12000 series, IOS computes the FIB in software and loads it into the forwarding hardware (such as an ASIC or network processor), which performs the actual packet forwarding function.Cisco IOS has a "monolithic" architecture, which means that it runs as a single image and all processes share the same memory space. Juniper Junos is the FreeBSD-based operating system used in Juniper Networks hardware routers. It is an operating system that is used in Juniper's routing, switching and security devices.
    [Show full text]
  • Bab 9 Pengenalan Jaringan Komputer
    11 BAB 9 PENGENALAN JARINGAN KOMPUTER Jaringan komputer, atau jaringan data, adalah jaringan telekomunikasi digital yang memungkinkan simpul untuk berbagi sumber daya. Dalam jaringan komputer, perangkat komputasi jaringan bertukar data satu sama lain menggunakan data link. Sambungan antar simpul dibuat menggunakan media kabel atau media nirkabel. Perangkat komputer jaringan yang berasal, rute dan penghentian data disebut node jaringan. Node dapat mencakup host seperti komputer pribadi, telepon, server serta perangkat keras jaringan. Dua perangkat seperti itu dapat dikatakan jaringan bersama bila satu perangkat dapat bertukar informasi dengan perangkat lain, apakah mereka memiliki hubungan langsung atau tidak langsung satu sama lain. Dalam kebanyakan kasus, protokol komunikasi khusus aplikasi berlapis (yaitu dibawa sebagai muatan) melalui protokol komunikasi umum lainnya. Koleksi teknologi informasi yang tangguh ini membutuhkan pengelolaan jaringan yang terampil agar tetap berjalan dengan andal. Jaringan komputer mendukung sejumlah besar aplikasi dan layanan seperti akses ke World Wide Web, video digital, audio digital, penggunaan bersama dari server aplikasi dan penyimpanan, printer, dan mesin faks, dan penggunaan aplikasi email dan pesan instan serta banyak lainnya Jaringan komputer berbeda dalam media transmisi yang digunakan untuk membawa sinyal mereka, protokol komunikasi untuk mengatur lalu lintas jaringan, ukuran jaringan, topologi dan maksud organisasi. Jaringan komputer yang paling terkenal adalah Internet. 9.1 Sejarah Kronologi perkembangan jaringan komputer yang signifikan meliputi: l Pada akhir 1950-an, jaringan komputer awal mencakup sistem radar militer A.S. Semi-Automatic Ground Environment (SAGE). l Pada tahun 1959, Anatolii Ivanovich Kitov mengusulkan kepada Komite Sentral Partai Komunis Uni Soviet sebuah rencana terperinci untuk pengorganisasian kembali kendali angkatan bersenjata Soviet dan ekonomi Soviet berdasarkan jaringan pusat komputasi , OGAS.
    [Show full text]
  • Nessus 6.8 User Guide
    Nessus 6.8 User Guide Last Updated: 8/17/2016 Table of Contents Getting Started 11 About Nessus Products 12 About Nessus Plugins 15 Hardware Requirements 17 Supported Operating Systems 18 Nessus License & Activation Code 21 Setup Nessus 22 Product Download 23 Pre-install Nessus 25 Deployment 26 Host Based Firewalls 27 IPv6 Support 28 Virtual Machines 29 Anti-virus Software 30 Security Warnings 31 Install Nessus and Nessus Agents 32 Nessus Installation 33 Install Nessus on Mac OS X 34 Install Nessus on Linux 36 Install Nessus on Windows 37 Nessus Agent Install 39 Install a Nessus Agent on Mac OS X 40 Copyright © 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. Install a Nessus Agent on Linux 43 Install a Nessus Agent on Windows 47 Upgrade Nessus and Nessus Agents 51 Nessus Upgrade 52 Upgrade from Evaluation 53 Mac Upgrade 54 Linux Upgrade 55 Windows Upgrade 56 Nessus Agents: Upgrade 57 Installation - Web Browser Portion 58 Nessus (Home, Professional, or Manager) 60 Link to Nessus Manager 61 Link to Tenable Cloud 64 Managed by SecurityCenter 66 Install Nessus while Offline 67 Register Nessus Offline 71 Generate Challenge Code 73 Generate Your License 74 Download and Copy License File (nessus.license) 75 Register Your License with Nessus 76 Download and Copy Plugins 77 Install Plugins Manually 78 Remove Nessus and Nessus Agents 79 Nessus Removal 80 Copyright © 2016.
    [Show full text]
  • Nessus 8.12 User Guide
    Nessus 8.12.x User Guide Last Updated: September 24, 2021 Table of Contents Welcome to Nessus 8.12.x 13 Get Started with Nessus 16 Navigate Nessus 18 System Requirements 19 Hardware Requirements 20 Software Requirements 24 Customize SELinux Enforcing Mode Policies 28 Licensing Requirements 29 Deployment Considerations 30 Host-Based Firewalls 31 IPv6 Support 32 Virtual Machines 33 Antivirus Software 34 Security Warnings 35 Certificates and Certificate Authorities 36 Custom SSL Server Certificates 38 Create a New Server Certificate and CA Certificate 40 Upload a Custom Server Certificate and CA Certificate 42 Trust a Custom CA 44 Create SSL Client Certificates for Login 46 Nessus Manager Certificates and Nessus Agent 49 Install Nessus 51 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Download Nessus 52 Install Nessus 54 Install Nessus on Linux 55 Install Nessus on Windows 57 Install Nessus on Mac OS X 59 Install Nessus Agents 61 Retrieve the Linking Key 62 Install a Nessus Agent on Linux 63 Install a Nessus Agent on Windows 67 Install a Nessus Agent on Mac OS X 73 Link an Agent to Nessus Manager 77 Upgrade Nessus and Nessus Agents 80 Upgrade Nessus 81 Upgrade from Evaluation 82 Update Nessus Software 83 Upgrade Nessus on Linux 86 Upgrade Nessus on Windows 87 Upgrade Nessus on Mac OS X 88 Upgrade a Nessus Agent 89 Downgrade Nessus Software 95 Configure Nessus 97 Install Nessus Essentials, Professional, or Manager 98 Link to Tenable.io 100 Link to Nessus Manager 102 Copyright © 2021 Tenable, Inc.
    [Show full text]
  • EVE-NG Community Cookbook
    EVE-NG Community Cookbook Version 1.02 Author: Uldis Dzerkals Editors: Michael Doe Christopher Lim © EVE-NG LTD The information contained in this document is the property of EVE-NG Limited The contents of the document must not be reproduced or disclosed wholly or in part or used for purposes other than that for which it is supplied without the prior written permission of EVE-NG Limited. EVE-NG Community Cookbook Version 1.02 Table of Contents PREFACE .................................................................................................................................. 7 1 INTRODUCTION ................................................................................................................ 8 1.1 WHAT IS EVE-NG? ....................................................................................................... 8 1.2 WHAT IS EVE-NG USED FOR? ....................................................................................... 8 1.3 WHO IS EVE-NG FOR? ................................................................................................. 8 2 SYSTEM REQUIREMENTS............................................................................................... 9 2.1 HARDWARE REQUIREMENTS ........................................................................................... 9 2.1.1 Minimal Laptop/PC Desktop system requirements .............................................. 9 2.1.2 Recommended Laptop/PC Desktop system requirements ................................ 10 2.1.3 Virtual Server system requirements ..................................................................
    [Show full text]
  • Nessus 6.4 User Guide
    Nessus 6.4 User Guide July 7, 2015 (Revision 2) Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. SecurityCenter is a trademark of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. Table of Contents Introduction ........................................................................................................................................................................................ 6 Standards and Conventions ........................................................................................................................................................................................ 6 Official Nessus Product Names ................................................................................................................................................................................. 6 New in Nessus 6.4 .......................................................................................................................................................................................................... 6 Overview .............................................................................................................................................................................................. 7 Installation ..........................................................................................................................................................................................
    [Show full text]
  • Extremexos Release Notes
    ExtremeXOS Release Notes Software Version ExtremeXOS 16.2.5-Patch1-13 121223-07 Rev AA Published June 2019 Copyright © 2019 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and other information contained in this document and its website without prior notice. The reader should in all cases consult representatives of Extreme Networks to determine whether any such changes have been made. The hardware, firmware, software or any specifications described or referred to in this document are subject to change without notice. Trademarks Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names (including any product names) mentioned in this document are the property of their respective owners and may be trademarks or registered trademarks of their respective companies/owners. For additional information on Extreme Networks trademarks, please see: www.extremenetworks.com/company/legal/trademarks Software Licensing Some software files have been licensed under certain open source or third-party licenses. End- user license agreements and open source declarations can be found at: www.extremenetworks.com/support/policies/software-licensing Support For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408 (toll-free in U.S. and Canada) or +1-408-579-2826. For the support phone number in other countries, visit: http://www.extremenetworks.com/support/contact/
    [Show full text]
  • Sentinel Log Manager 1.2.2 Installation Guide A.5 Upgrading Log Manager Installed As a Non-Root User Other Than Novell User
    Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Nessus 8.7 User Guide
    Nessus 8.7.x User Guide Last Updated: September 24, 2021 Table of Contents Welcome to Nessus 8.7.x 12 Get Started with Nessus 15 Navigate Nessus 17 System Requirements 18 Hardware Requirements 19 Software Requirements 23 Customize SELinux Enforcing Mode Policies 26 Licensing Requirements 27 Deployment Considerations 28 Host-Based Firewalls 29 IPv6 Support 30 Virtual Machines 31 Antivirus Software 32 Security Warnings 33 Certificates and Certificate Authorities 34 Custom SSL Server Certificates 36 Create a New Server Certificate and CA Certificate 38 Upload a Custom Server Certificate and CA Certificate 40 Trust a Custom CA 42 Create SSL Client Certificates for Login 44 Nessus Manager Certificates and Nessus Agent 47 Install Nessus 49 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Download Nessus 50 Install Nessus 52 Install Nessus on Linux 53 Install Nessus on Windows 55 Install Nessus on Mac OS X 57 Install Nessus Agents 59 Retrieve the Linking Key 60 Install a Nessus Agent on Linux 61 Install a Nessus Agent on Windows 65 Install a Nessus Agent on Mac OS X 71 Upgrade Nessus and Nessus Agents 75 Upgrade Nessus 76 Upgrade from Evaluation 77 Upgrade Nessus on Linux 78 Upgrade Nessus on Windows 79 Upgrade Nessus on Mac OS X 80 Upgrade a Nessus Agent 81 Configure Nessus 87 Install Nessus Essentials, Professional, or Manager 88 Link to Tenable.io 90 Link to Industrial Security 92 Link to Nessus Manager 95 Managed by Tenable.sc 97 Manage Activation Code 99 Copyright © 2021 Tenable, Inc.
    [Show full text]
  • Extremexos Quick Guide
    ExtremeXOS Quick Guide 121131-00 Published November 2015 Copyright © 2011–2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and other information contained in this document and its website without prior notice. The reader should in all cases consult representatives of Extreme Networks to determine whether any such changes have been made. The hardware, firmware, software or any specifications described or referred to in this document are subject to change without notice. Trademarks Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names (including any product names) mentioned in this document are the property of their respective owners and may be trademarks or registered trademarks of their respective companies/owners. For additional information on Extreme Networks trademarks, please see: www.extremenetworks.com/company/legal/trademarks/ Support For product support, including documentation, visit: www.extremenetworks.com/ documentation/ For information, contact: Extreme Networks, Inc. 145 Rio Robles San Jose, California 95134 USA Table of Contents Preface......................................................................................................................................... 5 Text Conventions.................................................................................................................................................................
    [Show full text]